Skip to content

Commit 45b22dd

Browse files
authored
Merge pull request #289241 from mbender-ms/wb-nsp-001
Working Branch - Final Updates pt 1
2 parents 7e57c6e + e70d858 commit 45b22dd

15 files changed

+255
-276
lines changed

articles/private-link/create-network-security-perimeter-cli.md

Lines changed: 28 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: azure-private-link
77
ms.topic: quickstart
8-
ms.date: 09/16/2024
8+
ms.date: 10/30/2024
99
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure CLI, so that I can control the network traffic to and from the resource.
1010
---
1111

@@ -15,12 +15,20 @@ Get started with network security perimeter by creating a network security perim
1515

1616
[!INCLUDE [network-security-perimeter-preview-message](../../includes/network-security-perimeter-preview-message.md)]
1717

18-
[!INCLUDE [azure-cli-prepare-your-environment.md](~/reusable-content/azure-cli/azure-cli-prepare-your-environment.md)]
18+
## Prerequisites
1919

2020
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
2121
- The [latest Azure CLI](/cli/azure/install-azure-cli), or you can use Azure Cloud Shell in the portal.
22-
- This article requires version 2.38.0 or later of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.
23-
- After upgrading to the latest version, you can import the network security perimeter commands using `az extension add --name nsp`.
22+
- This article **requires version 2.38.0 or later** of the Azure CLI. If using Azure Cloud Shell, the latest version is already installed.
23+
- After upgrading to the latest version of Azure CLI, import the network security perimeter commands using `az extension add --name nsp`.
24+
- Re-register the `Microsoft.Network` resource provider with the following command:
25+
26+
```azure
27+
az provider register --namespace Microsoft.Network
28+
```
29+
30+
[!INCLUDE [azure-cli-prepare-your-environment.md](~/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
31+
2432
2533
[!INCLUDE [network-security-perimeter-add-preview](../../includes/network-security-perimeter-add-preview.md)]
2634
@@ -29,20 +37,23 @@ Get started with network security perimeter by creating a network security perim
2937
3038
To get started, connect to [Azure Cloud Shell](https://shell.azure.com) or use your local CLI environment.
3139
32-
1. For Azure Cloud Shell, sign in and select your subscription.
40+
1. If using Azure Cloud Shell, sign in and select your subscription.
3341
1. If you installed CLI locally, sign in with the following command:
3442
3543
```azurecli-interactive
44+
# Sign in to your Azure account
3645
az login
3746
```
3847
39-
1. Select your active subscription locally with the following command:
48+
1. Once in your shell, select your active subscription locally with the following command:
4049
4150
```azurecli-interactive
51+
# List all subscriptions
4252
az account set --subscription "Azure Subscription"
43-
```
4453
45-
1. Now you can create your resources in the next steps.
54+
# Re-register the Microsoft.Network resource provider
55+
az provider register --namespace Microsoft.Network
56+
```
4657
4758
## Create a resource group and key vault
4859
@@ -94,8 +105,7 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
94105
az network perimeter profile create \
95106
--name network-perimeter-profile \
96107
--resource-group test-rg \
97-
--perimeter-name network-security-perimeter \
98-
--location westcentralus
108+
--perimeter-name network-security-perimeter
99109
100110
```
101111
2. Associate the Azure Key Vault (PaaS resource) with the network security perimeter profile with the following commands.
@@ -140,9 +150,9 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
140150
141151
## Create and update network security perimeter access rules
142152
143-
In this step, you create and update network security perimeter access rules with the `az network perimeter profile access-rule create` command.
153+
In this step, you create and update network security perimeter access rules with public IP address prefixes using the `az network perimeter profile access-rule create` command.
144154
145-
1. Create an inbound access rule for the profile created with the following command:
155+
1. Create an inbound access rule with a public IP address prefix for the profile created with the following command:
146156
147157
```azurecli-interactive
148158
@@ -152,11 +162,11 @@ In this step, you create and update network security perimeter access rules with
152162
--profile-name network-perimeter-profile \
153163
--perimeter-name network-security-perimeter \
154164
--resource-group test-rg \
155-
--address-prefixes "[10.10.0.0/16]"
165+
--address-prefixes "[192.0.2.0/24]"
156166
157167
```
158168
159-
1. Update your inbound access rule with another IP address range with the following command:
169+
1. Update your inbound access rule with another public IP address prefix with the following command:
160170
161171
```azurecli-interactive
162172
@@ -166,10 +176,12 @@ In this step, you create and update network security perimeter access rules with
166176
--profile-name network-perimeter-profile \
167177
--perimeter-name network-security-perimeter \
168178
--resource-group test-rg \
169-
--address-prefixes "['10.11.0.0/16', '10.10.0.0/16']"
179+
--address-prefixes "['198.51.100.0/24', '192.0.2.0/24']"
170180
171181
```
172182
183+
[!INCLUDE [network-security-perimeter-note-managed-id](../../includes/network-security-perimeter-note-managed-id.md)]
184+
173185
## Delete all resources
174186
175187
To delete a network security perimeter and other resources in this quickstart, use the following commands:
@@ -203,4 +215,4 @@ To delete a network security perimeter and other resources in this quickstart, u
203215
## Next steps
204216

205217
> [!div class="nextstepaction"]
206-
> [Diagnostic logging for Azure Network Security Perimeter](./network-security-perimeter-collect-resource-logs.md)
218+
> [Diagnostic logging for Azure Network Security Perimeter](./network-security-perimeter-diagnostic-logs.md)

articles/private-link/create-network-security-perimeter-portal.md

Lines changed: 29 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: azure-private-link
77
ms.topic: quickstart
8-
ms.date: 09/16/2024
8+
ms.date: 10/30/2024
99
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource in the Azure portal, so that I can control the network traffic to and from the resource.
1010
---
1111

@@ -29,78 +29,80 @@ Sign in to the [Azure portal](https://portal.azure.com) with your Azure account.
2929

3030
## Create a resource group and key vault
3131

32-
Before creating a network security perimeter, you create a resource group to hold all resources and a key vault that will be protected by the network security perimeter.
32+
Before creating a network security perimeter, you create a resource group to hold all resources and a key vault that's protected by a network security perimeter.
3333

3434
> [!NOTE]
3535
> Azure Key Vault requires a unique name. If you receive an error that the name is already in use, try a different name. In our example, we use a unique name by appending Year (YYYY), Month (MM), and Day (DD) to the name - **key-vault-YYYYDDMM**.
3636
3737
1. In the search box at the top of the portal, enter **Key vaults**. Select **Key vaults** in the search results.
38-
1. In the Key vaults accounts window that appears, select **Create +**.
38+
1. In the Key vaults accounts window that appears, select **+ Create**.
3939
1. In the **Create a key vault** window, enter the following information:
4040

4141
|**Setting**| **Value** |
4242
| --- | --- |
4343
| Subscription | Select the subscription you want to use for this key vault. |
44-
| Resource group | Select **Create new**, then enter **test-rg** as the name. |
44+
| Resource group | Select **Create new**, then enter **resource-group** as the name. |
4545
| Key vault name | Enter **key-vault-`<RandomNameInformation>`**. |
4646
| Region | Select the region in which you want your key vault to be created. For this quickstart, **(US) West Central US** is used. |
4747

48-
1. Leave the remaining default settings, and select **Review > Create**.
48+
2. Leave the remaining default settings, and select **Review + Create** > **Create**.
4949

5050
## Create a network security perimeter
5151

5252
Once you create a key vault, you can proceed to create a network security perimeter.
5353

5454
> [!NOTE]
55-
> Please do not put any personal identifiable or sensitive data in the network security perimeter rules or other network security perimeter configuration.
55+
> For organizational and informational safety, it's advised **not to include any personally identifiable or sensitive data** in the network security perimeter rules or other network security perimeter configuration.
5656
57-
1. From **Home**, select **Create a resource**.
58-
1. In the search box, enter **network security perimeters**. Select **network security perimeters** from the search results.
59-
1. In the **network security perimeters** window, select **+ Create**.
60-
1. In the **Create a network security perimeter** window, enter the following information:
57+
1. In the search box of the Azure portal, enter **network security perimeters**. Select **network security perimeters** from the search results.
58+
2. In the **network security perimeters** window, select **+ Create**.
59+
3. In the **Create a network security perimeter** window, enter the following information:
6160

6261
| **Setting** | **Value** |
6362
| --- | --- |
6463
| Subscription | Select the subscription you want to use for this network security perimeter. |
65-
| Resource group | Select **test-rg**. |
64+
| Resource group | Select **resource-group**. |
6665
| Name | Enter **network-security-perimeter**. |
6766
| Region | Select the region in which you want your network security perimeter to be created. For this quickstart, **(US) West Central US** is used. |
6867
| Profile name | Enter **profile-1**. |
6968

70-
1. Select the **Resources** tab or **Next** to proceed to the next step.
71-
1. In the **Resources** tab, select **Associate resource**.
72-
1. In the **Select resources** window, check **key-vault-YYYYDDMM** and choose **Select**.
73-
1. Select **Inbound access rules** and select **Add inbound access rule**.
74-
1. In the **Add inbound access rule** window, enter the following information, and select **Add**:
69+
4. Select the **Resources** tab or **Next** to proceed to the next step.
70+
5. In the **Resources** tab, select **+ Add**.
71+
6. In the **Select resources** window, check **key-vault-YYYYDDMM** and choose **Select**.
72+
7. Select **Inbound access rules** and select **+ Add**.
73+
8. In the **Add inbound access rule** window, enter the following information, and select **Add**:
7574

7675
| **Settings** | **Value** |
7776
| --- | --- |
7877
| Rule name | Enter **inbound-rule**. |
7978
| Source type | Select **IP address ranges**. |
80-
| Allowed Sources | Enter **10.1.0.0/16** or another internal IP address range. |
79+
| Allowed Sources | Enter a public IP address range you wish to allow inbound traffic from. |
8180

82-
1. Select **Outbound access rules** and select **Add outbound access rule**.
83-
1. In the **Add outbound access rule** window, enter the following information, and select **Add**:
81+
9. Select **Outbound access rules** and select **+ Add**.
82+
10. In the **Add outbound access rule** window, enter the following information, and select **Add**:
8483

8584
| **Settings** | **Value** |
8685
| --- | --- |
8786
| Rule name | Enter **outbound-rule**. |
8887
| Destination type | Select **FQDN**. |
89-
| Allowed Destinations | Enter the FQDN of the service you want to allow. For example, **www.contoso.com**. |
88+
| Allowed Destinations | Enter the FQDN of the destinations you want to allow. For example, **www.contoso.com**. |
9089

91-
1. Select **Review + create** and then **Create**.
92-
1. Select **Go to resource** to view the newly created network security perimeter.
90+
11. Select **Review + create** and then **Create**.
91+
12. Select **Go to resource** to view the newly created network security perimeter.
92+
93+
[!INCLUDE [network-security-perimeter-note-managed-id](../../includes/network-security-perimeter-note-managed-id.md)]
9394

9495
## Delete a network security perimeter
9596

9697
When you no longer need a network security perimeter, you remove any resources associated with the network security perimeter and then remove the perimeter following these steps:
9798

98-
1. From your network security perimeter, select **Resources** under **Settings**.
99-
2. Select **key-vault-YYYYDDMM** and select **Settings>Remove** from the action bar.
100-
3. Navigate back to the **Overview** page of your network security perimeter.
101-
4. Select **Delete** and confirm the deletion by entering **network-security-perimeter** in the text box for the name of the resource.
99+
1. From your network security perimeter, select **Associated resources** under **Settings**.
100+
2. Select **key-vault-YYYYDDMM** from the list of associated resources.
101+
3. From the action bar,select **Settings ** and then select **Remove** in the .
102+
4. Navigate back to the **Overview** page of your network security perimeter.
103+
5. Select **Delete** and confirm the deletion by entering **network-security-perimeter** in the text box for the name of the resource.
102104

103105
## Next steps
104106

105107
> [!div class="nextstepaction"]
106-
> [Diagnostic logging for Azure Network Security Perimeter](./network-security-perimeter-collect-resource-logs.md)
108+
> [Diagnostic logging for Azure Network Security Perimeter](./network-security-perimeter-diagnostic-logs.md)

0 commit comments

Comments
 (0)