You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-cli.md
+28-16Lines changed: 28 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: quickstart
8
-
ms.date: 09/16/2024
8
+
ms.date: 10/30/2024
9
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure CLI, so that I can control the network traffic to and from the resource.
10
10
---
11
11
@@ -15,12 +15,20 @@ Get started with network security perimeter by creating a network security perim
@@ -29,20 +37,23 @@ Get started with network security perimeter by creating a network security perim
29
37
30
38
To get started, connect to [Azure Cloud Shell](https://shell.azure.com) or use your local CLI environment.
31
39
32
-
1.For Azure Cloud Shell, sign in and select your subscription.
40
+
1. If using Azure Cloud Shell, sign in and select your subscription.
33
41
1. If you installed CLI locally, sign in with the following command:
34
42
35
43
```azurecli-interactive
44
+
# Sign in to your Azure account
36
45
az login
37
46
```
38
47
39
-
1. Select your active subscription locally with the following command:
48
+
1. Once in your shell, select your active subscription locally with the following command:
40
49
41
50
```azurecli-interactive
51
+
# List all subscriptions
42
52
az account set --subscription "Azure Subscription"
43
-
```
44
53
45
-
1. Now you can create your resources in the next steps.
54
+
# Re-register the Microsoft.Network resource provider
55
+
az provider register --namespace Microsoft.Network
56
+
```
46
57
47
58
## Create a resource group and key vault
48
59
@@ -94,8 +105,7 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
94
105
az network perimeter profile create \
95
106
--name network-perimeter-profile \
96
107
--resource-group test-rg \
97
-
--perimeter-name network-security-perimeter \
98
-
--location westcentralus
108
+
--perimeter-name network-security-perimeter
99
109
100
110
```
101
111
2. Associate the Azure Key Vault (PaaS resource) with the network security perimeter profile with the following commands.
@@ -140,9 +150,9 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
140
150
141
151
## Create and update network security perimeter access rules
142
152
143
-
In this step, you create and update network security perimeter access rules with the `az network perimeter profile access-rule create` command.
153
+
In this step, you create and update network security perimeter access rules with public IP address prefixes using the `az network perimeter profile access-rule create` command.
144
154
145
-
1. Create an inbound access rule for the profile created with the following command:
155
+
1. Create an inbound access rule with a public IP address prefix for the profile created with the following command:
146
156
147
157
```azurecli-interactive
148
158
@@ -152,11 +162,11 @@ In this step, you create and update network security perimeter access rules with
152
162
--profile-name network-perimeter-profile \
153
163
--perimeter-name network-security-perimeter \
154
164
--resource-group test-rg \
155
-
--address-prefixes "[10.10.0.0/16]"
165
+
--address-prefixes "[192.0.2.0/24]"
156
166
157
167
```
158
168
159
-
1. Update your inbound access rule with another IP address range with the following command:
169
+
1. Update your inbound access rule with another public IP address prefix with the following command:
160
170
161
171
```azurecli-interactive
162
172
@@ -166,10 +176,12 @@ In this step, you create and update network security perimeter access rules with
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-portal.md
+29-27Lines changed: 29 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: quickstart
8
-
ms.date: 09/16/2024
8
+
ms.date: 10/30/2024
9
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource in the Azure portal, so that I can control the network traffic to and from the resource.
10
10
---
11
11
@@ -29,78 +29,80 @@ Sign in to the [Azure portal](https://portal.azure.com) with your Azure account.
29
29
30
30
## Create a resource group and key vault
31
31
32
-
Before creating a network security perimeter, you create a resource group to hold all resources and a key vault that will be protected by the network security perimeter.
32
+
Before creating a network security perimeter, you create a resource group to hold all resources and a key vault that's protected by a network security perimeter.
33
33
34
34
> [!NOTE]
35
35
> Azure Key Vault requires a unique name. If you receive an error that the name is already in use, try a different name. In our example, we use a unique name by appending Year (YYYY), Month (MM), and Day (DD) to the name - **key-vault-YYYYDDMM**.
36
36
37
37
1. In the search box at the top of the portal, enter **Key vaults**. Select **Key vaults** in the search results.
38
-
1. In the Key vaults accounts window that appears, select **Create +**.
38
+
1. In the Key vaults accounts window that appears, select **+ Create**.
39
39
1. In the **Create a key vault** window, enter the following information:
40
40
41
41
|**Setting**|**Value**|
42
42
| --- | --- |
43
43
| Subscription | Select the subscription you want to use for this key vault. |
44
-
| Resource group | Select **Create new**, then enter **test-rg** as the name. |
44
+
| Resource group | Select **Create new**, then enter **resource-group** as the name. |
45
45
| Key vault name | Enter **key-vault-`<RandomNameInformation>`**. |
46
46
| Region | Select the region in which you want your key vault to be created. For this quickstart, **(US) West Central US** is used. |
47
47
48
-
1. Leave the remaining default settings, and select **Review > Create**.
48
+
2. Leave the remaining default settings, and select **Review + Create** > **Create**.
49
49
50
50
## Create a network security perimeter
51
51
52
52
Once you create a key vault, you can proceed to create a network security perimeter.
53
53
54
54
> [!NOTE]
55
-
> Please do not put any personal identifiable or sensitive data in the network security perimeter rules or other network security perimeter configuration.
55
+
> For organizational and informational safety, it's advised **not to include any personally identifiable or sensitive data** in the network security perimeter rules or other network security perimeter configuration.
56
56
57
-
1. From **Home**, select **Create a resource**.
58
-
1. In the search box, enter **network security perimeters**. Select **network security perimeters** from the search results.
59
-
1. In the **network security perimeters** window, select **+ Create**.
60
-
1. In the **Create a network security perimeter** window, enter the following information:
57
+
1. In the search box of the Azure portal, enter **network security perimeters**. Select **network security perimeters** from the search results.
58
+
2. In the **network security perimeters** window, select **+ Create**.
59
+
3. In the **Create a network security perimeter** window, enter the following information:
61
60
62
61
|**Setting**|**Value**|
63
62
| --- | --- |
64
63
| Subscription | Select the subscription you want to use for this network security perimeter. |
65
-
| Resource group | Select **test-rg**. |
64
+
| Resource group | Select **resource-group**. |
66
65
| Name | Enter **network-security-perimeter**. |
67
66
| Region | Select the region in which you want your network security perimeter to be created. For this quickstart, **(US) West Central US** is used. |
68
67
| Profile name | Enter **profile-1**. |
69
68
70
-
1. Select the **Resources** tab or **Next** to proceed to the next step.
71
-
1. In the **Resources** tab, select **Associate resource**.
72
-
1. In the **Select resources** window, check **key-vault-YYYYDDMM** and choose **Select**.
When you no longer need a network security perimeter, you remove any resources associated with the network security perimeter and then remove the perimeter following these steps:
97
98
98
-
1. From your network security perimeter, select **Resources** under **Settings**.
99
-
2. Select **key-vault-YYYYDDMM** and select **Settings>Remove** from the action bar.
100
-
3. Navigate back to the **Overview** page of your network security perimeter.
101
-
4. Select **Delete** and confirm the deletion by entering **network-security-perimeter** in the text box for the name of the resource.
99
+
1. From your network security perimeter, select **Associated resources** under **Settings**.
100
+
2. Select **key-vault-YYYYDDMM** from the list of associated resources.
101
+
3. From the action bar,select **Settings ** and then select **Remove** in the .
102
+
4. Navigate back to the **Overview** page of your network security perimeter.
103
+
5. Select **Delete** and confirm the deletion by entering **network-security-perimeter** in the text box for the name of the resource.
102
104
103
105
## Next steps
104
106
105
107
> [!div class="nextstepaction"]
106
-
> [Diagnostic logging for Azure Network Security Perimeter](./network-security-perimeter-collect-resource-logs.md)
108
+
> [Diagnostic logging for Azure Network Security Perimeter](./network-security-perimeter-diagnostic-logs.md)
0 commit comments