You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/tutorial-filter-network-traffic.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -191,9 +191,9 @@ Once you've completed steps 1-3, review the rules you created. Your list should
191
191
192
192
:::image type="content" source="./media/tutorial-filter-network-traffic/security-rules.png" alt-text="Screenshot of Security rules of a network security group." border="true":::
193
193
194
-
## Create virtual machines (VMs)
194
+
## Create virtual machines
195
195
196
-
Create two VMs in the virtual network.
196
+
Create two virtual machines (VMs) in the virtual network.
197
197
198
198
### Create the first virtual machine
199
199
@@ -277,7 +277,7 @@ Add the network interface of each VM to one of the application security groups y
277
277
278
278
5. You may receive a certificate warning during the connection process. If you receive the warning, select **Yes** or **Continue**, to continue with the connection.
279
279
280
-
The connection succeeds, because port 3389 is allowing inbound traffic from the internet to the **myAsgMgmtServers** application security group.
280
+
The connection succeeds, because inbound traffic from the internet to the **myAsgMgmtServers** application security group is allowed through port 3389.
281
281
282
282
The network interface for **myVMMgmt** is associated with the **myAsgMgmtServers** application security group and allows the connection.
283
283
@@ -309,7 +309,7 @@ Add the network interface of each VM to one of the application security groups y
309
309
310
310
11. To confirm that you can access the **myVMWeb** web server from the internet, open an internet browser on your computer and browse to `http://<public-ip-address-from-previous-step>`.
311
311
312
-
You see the IIS default page, because port 80 is allowing inbound traffic from the internet to the **myAsgWebServers** application security group.
312
+
You see the IIS default page, because inbound traffic from the internet to the **myAsgWebServers** application security group is allowed through port 80.
313
313
314
314
The network interface attached for **myVMWeb** is associated with the **myAsgWebServers** application security group and allows the connection.
0 commit comments