|
1 | 1 | ---
|
2 | 2 | title: 'Quickstart: Create a private endpoint by using the Azure portal'
|
| 3 | +titleSuffix: Azure Private Link |
3 | 4 | description: In this quickstart, you'll learn how to create a private endpoint by using the Azure portal.
|
4 | 5 | services: private-link
|
5 | 6 | author: asudbring
|
6 | 7 | ms.service: private-link
|
7 | 8 | ms.topic: quickstart
|
8 |
| -ms.date: 06/28/2022 |
| 9 | +ms.date: 11/17/2022 |
9 | 10 | ms.author: allensu
|
10 | 11 | ms.custom: mode-ui
|
11 | 12 | #Customer intent: As someone who has a basic network background but is new to Azure, I want to create a private endpoint on a SQL server so that I can securely connect to it.
|
@@ -81,7 +82,7 @@ You use the bastion host to connect securely to the VM for testing the private e
|
81 | 82 | | Setting | Value |
|
82 | 83 | |--------------------|----------------------------|
|
83 | 84 | | Bastion name | Enter **myBastionHost** |
|
84 |
| - | AzureBastionSubnet address space | Enter **10.1.1.0/27** | |
| 85 | + | AzureBastionSubnet address space | Enter **10.1.1.0/26** | |
85 | 86 | | Public IP Address | Select **Create new**. </br> For **Name**, enter **myBastionIP**. </br> Select **OK**. |
|
86 | 87 |
|
87 | 88 | 13. Select the **Review + create** tab or select the **Review + create** button.
|
@@ -111,7 +112,7 @@ Next, create a VM that you can use to test the private endpoint.
|
111 | 112 | | Region | Select **West Europe**. |
|
112 | 113 | | Availability options | Select **No infrastructure redundancy required**. |
|
113 | 114 | | Security type | Select **Standard**. |
|
114 |
| - | Image | Select **Windows Server 2019 Datacenter - Gen2**. | |
| 115 | + | Image | Select **Windows Server 2022 Datacenter - Gen2**. | |
115 | 116 | | Size | Select the VM size or use the default setting. |
|
116 | 117 | | **Administrator account** | |
|
117 | 118 | | Username | Enter a username. |
|
@@ -184,7 +185,7 @@ Next, you create a private endpoint for the web app that you created in the "Pre
|
184 | 185 | | **Networking** | |
|
185 | 186 | | Virtual network | Select **myVNet**. |
|
186 | 187 | | Subnet | Select **myVNet/mySubnet (10.1.0.0/24)**. |
|
187 |
| - | Enable network policies for all private endpoints in this subnet. | Select the checkbox if you plan to apply Application Security Groups or Network Security groups to the subnet that contains the private endpoint. </br> For more information, see [Manage network policies for private endpoints](disable-private-endpoint-network-policy.md) | |
| 188 | + | Network policy for private endpoints | Select **edit** to apply Network security groups and/or Route tables to the subnet that contains the private endpoint. </br> In **Edit subnet network policy**, select the checkbox next to **Network security groups** and **Route Tables**. </br> Select **Save**. </br></br>For more information, see [Manage network policies for private endpoints](disable-private-endpoint-network-policy.md) | |
188 | 189 |
|
189 | 190 | # [**Dynamic IP**](#tab/dynamic-ip)
|
190 | 191 |
|
@@ -214,7 +215,7 @@ Next, you create a private endpoint for the web app that you created in the "Pre
|
214 | 215 |
|
215 | 216 | ## Test connectivity to the private endpoint
|
216 | 217 |
|
217 |
| -Use the VM that you created earlier to connect to the web app across the private endpoint. |
| 218 | +Use the virtual machine that you created earlier to connect to the web app across the private endpoint. |
218 | 219 |
|
219 | 220 | 1. In the search box at the top of the portal, enter **Virtual machine**. Select **Virtual machines**.
|
220 | 221 |
|
|
0 commit comments