Skip to content

Commit 44e0976

Browse files
Merge pull request #286035 from nevko/patch-7
CSS-Networking: Update deploy-cli.md
2 parents 4052c46 + e5f2b0f commit 44e0976

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/firewall/deploy-cli.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this article, you learn how to:
3535
* Set up a test network environment
3636
* Deploy a firewall
3737
* Create a default route
38-
* Configure an application rule to allow access to www.google.com
38+
* Configure an application rule to allow access to www.microsoft.com
3939
* Configure a network rule to allow access to external DNS servers
4040
* Test the firewall
4141

@@ -116,7 +116,7 @@ az network nic create \
116116
--vnet-name Test-FW-VN \
117117
--subnet Workload-SN \
118118
--public-ip-address "" \
119-
--dns-servers 209.244.0.3 209.244.0.4
119+
--dns-servers <replace with External DNS ip #1> <replace with External DNS ip #2>
120120
```
121121

122122
Now create the workload virtual machine.
@@ -203,16 +203,16 @@ az network vnet subnet update \
203203

204204
## Configure an application rule
205205

206-
The application rule allows outbound access to www.google.com.
206+
The application rule allows outbound access to www.microsoft.com.
207207

208208
```azurecli-interactive
209209
az network firewall application-rule create \
210210
--collection-name App-Coll01 \
211211
--firewall-name Test-FW01 \
212-
--name Allow-Google \
212+
--name Allow-Microsoft \
213213
--protocols Http=80 Https=443 \
214214
--resource-group Test-FW-RG \
215-
--target-fqdns www.google.com \
215+
--target-fqdns www.microsoft.com \
216216
--source-addresses 10.0.2.0/24 \
217217
--priority 200 \
218218
--action Allow
@@ -222,12 +222,12 @@ Azure Firewall includes a built-in rule collection for infrastructure FQDNs that
222222

223223
## Configure a network rule
224224

225-
The network rule allows outbound access to two IP addresses at port 53 (DNS).
225+
The network rule allows outbound access to two public DNS IP addresses of your choosing at port 53 (DNS).
226226

227227
```azurecli-interactive
228228
az network firewall network-rule create \
229229
--collection-name Net-Coll01 \
230-
--destination-addresses 209.244.0.3 209.244.0.4 \
230+
--destination-addresses <replace with DNS ip #1> <replace with DNS ip #2> \
231231
--destination-ports 53 \
232232
--firewall-name Test-FW01 \
233233
--name Allow-DNS \
@@ -264,14 +264,14 @@ Now, test the firewall to confirm that it works as expected.
264264
1. Run the following commands:
265265

266266
```
267-
Invoke-WebRequest -Uri https://www.google.com
268-
Invoke-WebRequest -Uri https://www.google.com
269-
270267
Invoke-WebRequest -Uri https://www.microsoft.com
271268
Invoke-WebRequest -Uri https://www.microsoft.com
269+
270+
Invoke-WebRequest -Uri <Replace with external website>
271+
Invoke-WebRequest -Uri <Replace with external website>
272272
```
273273

274-
The `www.google.com` requests should succeed, and the `www.microsoft.com` requests should fail. This demonstrates that your firewall rules are operating as expected.
274+
The `www.microsoft.com` requests should succeed, and the other `External Website` requests should fail. This demonstrates that your firewall rules are operating as expected.
275275

276276
So now you've verified that the firewall rules are working:
277277

0 commit comments

Comments
 (0)