You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-cli.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ To get started, connect to [Azure Cloud Shell](https://shell.azure.com) or use y
56
56
57
57
## Create a resource group and key vault
58
58
59
-
Before you can create a network security perimeter, you have to create a resource group and a key vault resource.
59
+
Before you can create a network security perimeter, you have to create a resource group and a key vault resource with [az group create](/cli/azure/group) and [az keyvault create](/cli/azure/keyvault).
60
60
This example creates a resource group named **resource-group** in the WestCentralUS location and a key vault named **key-vault-YYYYDDMM** in the resource group with the following commands:
61
61
62
62
```azurecli-interactive
@@ -77,10 +77,10 @@ az keyvault create \
77
77
78
78
## Create a network security perimeter
79
79
80
-
In this step, create a network security perimeter with the `az network perimeter create` command.
80
+
In this step, create a network security perimeter with the [az network perimeter create](/cli/azure/network/perimeter#az-network-perimeter-create) command.
81
81
82
82
> [!NOTE]
83
-
> Please do not put any personal identifiable or sensitive data in the network security perimeter rules or other network security perimeter configuration.
83
+
> Please don't put any personal identifiable or sensitive data in the network security perimeter rules or other network security perimeter configuration.
84
84
85
85
```azurecli-interactive
86
86
az network perimeter create\
@@ -91,7 +91,7 @@ az network perimeter create\
91
91
92
92
## Create and update PaaS resources’ association with a new profile
93
93
94
-
In this step, you create a new profile and associate the PaaS resource, the Azure Key Vault with the profile using the `az network perimeter profile create` and `az network perimeter association create` commands.
94
+
In this step, you create a new profile and associate the PaaS resource, the Azure Key Vault with the profile using the [az network perimeter profile create](/cli/azure/network/perimeter#az-network-perimeter-profile) and [az network perimeter association create](/cli/azure/network/perimeter#az-network-perimeter-association) commands.
95
95
96
96
> [!NOTE]
97
97
> For the `--private-link-resource` and `--profile` parameter values, replace `<PaaSArmId>` and `<networkSecurityPerimeterProfileId>` with the values for the key vault and the profile ID, respectively.
@@ -134,7 +134,7 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
134
134
135
135
```
136
136
137
-
1. Update association by changing the access mode to **enforced** with the `az network perimeter association create` command as follows:
137
+
1. Update association by changing the access mode to **enforced** with the [az network perimeter association create](/cli/azure/network/perimeter#az-network-perimeter-association-create) command as follows:
138
138
139
139
```azurecli-interactive
140
140
az network perimeter association create \
@@ -148,7 +148,7 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
148
148
149
149
## Manage network security perimeter access rules
150
150
151
-
In this step, you create, update, and delete a network security perimeter access rules with public IP address prefixes using the `az network perimeter profile access-rule` command.
151
+
In this step, you create, update, and delete a network security perimeter access rules with public IP address prefixes using the [az network perimeter profile access-rule create](/cli/azure/network/perimeter#az-network-perimeter-profile-access-rule-create) command.
152
152
153
153
1. Create an inbound access rule with a public IP address prefix for the profile created with the following command:
154
154
@@ -178,7 +178,7 @@ In this step, you create, update, and delete a network security perimeter access
178
178
179
179
```
180
180
181
-
1. If you need to delete an access rule, use the following command:
181
+
1. If you need to delete an access rule, use the [az network perimeter profile access-rule delete](/cli/azure/network/perimeter#az-network-perimeter-profile-access-rule-delete) command:
182
182
183
183
```azurepowershell-interactive
184
184
# Delete the access rule
@@ -192,7 +192,7 @@ In this step, you create, update, and delete a network security perimeter access
192
192
193
193
## Delete all resources
194
194
195
-
To delete a network security perimeter and other resources in this quickstart, use the following commands:
195
+
To delete a network security perimeter and other resources in this quickstart, use the following [az network perimeter](/cli/azure/network/perimeter) commands:
0 commit comments