You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Quickstart - Create a network security perimeter - Bicep
14
14
15
-
In this quickstart, you'll use a Bicep template to create a network security perimeter for an Azure resource. This example demonstrates the creation of a networksecurity perimeter for an Azure Key Vault.
15
+
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Bicep. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
You can also create a network security perimeter by using the [Azure portal](create-network-security-perimeter-portal.md), [Azure PowerShell](create-network-security-perimeter-powershell.md), or the [Azure CLI](create-network-security-perimeter-cli.md).
You need an Azure account with an active subscription. If you don't already have an Azure account, [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
25
+
- An Azure account with an active subscription. If you don't already have an Azure account, [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
This Bicep file creates a network security perimeter for an instance of Azure Key Vault.
28
32
29
33
The Bicep file that this quickstart uses is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/network-security-perimeter-create/).
-[**Microsoft.KeyVault/vaults**](/azure/templates/microsoft.keyvault/vaults): The instance of Key Vault with the sample database.
36
41
-[**Microsoft.Network/networkSecurityPerimeters**](/azure/templates/microsoft.network/networksecurityperimeters): The network security perimeter that you use to access the instance of Key Vault.
37
42
-[**Microsoft.Network/networkSecurityPerimeters/profiles**](/azure/templates/microsoft.network/networksecurityperimeters/profiles): The network security perimeter profile that you use to access the instance of Key Vault.
When the deployment finishes, you should see a message indicating the deployment succeeded.
61
66
62
67
## Validate the deployment
63
68
69
+
1. Sign into the Azure portal.
70
+
1. Enter **Network security perimeter** in the search box at the top of the portal. Select **Network security perimeters** in the search results.
71
+
1. Select the **networkPerimeter** resource from the list of network security perimeters.
72
+
1. Verify that the **networkPerimeter** resource is created successfully. The **Overview** page shows the details of the network security perimeter, including the profiles, associated resources, and Policy assignments.
73
+
64
74
> [!NOTE]
65
75
> The Bicep file generates a unique name for the virtual machine myVm<b>{uniqueid}</b> resource, and for the SQL Database sqlserver<b>{uniqueid}</b> resource. Substitute your generated value for **{uniqueid}**.
66
76
67
77
## Clean up resources
68
78
69
-
When you no longer need the resources that you created with the private link service, delete the resource group. This removes the private link service and all the related resources.
79
+
When you no longer need the resources that you created with the network security perimeter service, delete the resource group. This removes the network security perimeter service and all the related resources.
70
80
71
81
# [CLI](#tab/CLI)
72
82
@@ -80,3 +90,10 @@ az group delete --name resource-group
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-portal.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -96,14 +96,14 @@ Once you create a key vault, you can proceed to create a network security perime
96
96
97
97
## Delete a network security perimeter
98
98
99
-
When you no longer need a network security perimeter, you remove any resources associated with the network security perimeter and then remove the perimeter following these steps:
100
-
101
-
1.From your network security perimeter, select **Associated resources**under **Settings**.
102
-
2. Select **key-vault-YYYYDDMM** from the list of associated resources.
103
-
3. From the action bar, select **Settings **and then select **Remove**in the confirmation window.
104
-
4. Navigate back to the **Overview**page of your network security perimeter.
105
-
5. Select **Delete**and confirm the deletion by entering **network-security-perimeter** in the text box for the name of the resource.
106
-
6. Browse to the **resource-group** and select **Delete** to remove the resource group and all resources within it.
99
+
When you no longer need a network security perimeter and associated resources, you can delete the resource group that contains the network security perimeter and all associated resources. This action removes the network security perimeter and all resources within it.
100
+
101
+
1.In the Azure portal, select **Resource groups**from the left-hand menu.
102
+
1. Select **resource-group** from the list of resource groups.
103
+
1. In the **resource-group**window, select **Delete resource group**from the action bar.
104
+
1. In the **Delete a resource group**window, enter the name of the resource group to confirm the deletion.
105
+
1. Select **Delete**to remove the resource group and all resources within it.
106
+
1. Verify the resourcegroup is no longer listed in the **Resource groups** window.
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-powershell.md
+1-3Lines changed: 1 addition & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,8 @@ description: Learn how to create a network security perimeter for an Azure resou
4
4
author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
-
ms.custom:
8
-
- ignite-2024
9
7
ms.topic: quickstart
10
-
ms.date: 11/06/2024
8
+
ms.date: 03/05/2024
11
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure PowerShell, so that I can control the network traffic to and from the resource.
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource in the Azure Resource Manager template, so that I can control the network traffic to and from the resource.
12
-
---
11
+
---
12
+
13
+
# # Quickstart - Create a network security perimeter - ARM Template
14
+
15
+
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure Resource Manager (ARM) template. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quicks.
You can also create a network security perimeter by using the [Azure portal](create-network-security-perimeter-portal.md), [Azure PowerShell](create-network-security-perimeter-powershell.md), or the [Azure CLI](create-network-security-perimeter-cli.md).
20
+
21
+
If your environment meets the prerequisites and you're familiar with using ARM templates, select the **Deploy to Azure** button here. The ARM template will open in the Azure portal.
22
+
23
+
:::image type="content" source="~/reusable-content/ce-skilling/azure/media/template-deployments/deploy-to-azure-button.svg" alt-text="Button to deploy the Resource Manager template to Azure." border="false" link="https://portal.azure.com/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2Fquickstarts%2Fmicrosoft.network%2Fnetwork-security-perimeter-create%2Fazuredeploy.json":::
24
+
25
+
## Prerequisites
26
+
27
+
- An Azure account with an active subscription. If you don't already have an Azure account, [create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
This template creates a private endpoint for an instance of Azure SQL Database.
34
+
35
+
The template that this quickstart uses is from [Azure Quickstart Templates](https://azure.microsoft.com/resources/templates/network-security-perimeter-create/).
-[**Microsoft.KeyVault/vaults**](/azure/templates/microsoft.keyvault/vaults): The instance of Key Vault with the sample database.
42
+
-[**Microsoft.Network/networkSecurityPerimeters**](/azure/templates/microsoft.network/networksecurityperimeters): The network security perimeter that you use to access the instance of Key Vault.
43
+
-[**Microsoft.Network/networkSecurityPerimeters/profiles**](/azure/templates/microsoft.network/networksecurityperimeters/profiles): The network security perimeter profile that you use to access the instance of Key Vault.
44
+
-[**Microsoft.Network/networkSecurityPerimeters/profiles/accessRules**](/azure/templates/microsoft.network/networksecurityperimeters/profiles/accessrules): The access rules that you use to access the instance of Key Vault.
45
+
-[**Microsoft.Network/networkSecurityPerimeters/resourceAssociations**](/azure/templates/microsoft.network/networksecurityperimeters/resourceassociations): The resource associations that you use to access the instance of Key Vault.
46
+
47
+
## Deploy the template
48
+
49
+
Deploy the ARM template to Azure by doing the following:
50
+
51
+
1. Sign in to Azure and open the ARM template by selecting the **Deploy to Azure** button here. The template creates the network security perimeter and an Azure Key Vault instance.
52
+
53
+
54
+
55
+
1. Select your resource group or create a new one.
56
+
1. Enter the SQL administrator sign-in name and password.
57
+
1. Enter the virtual machine administrator username and password.
58
+
1. Read the terms and conditions statement. If you agree, select **I agree to the terms and conditions stated above**, and then select **Purchase**. The deployment can take 20 minutes or longer to complete.
59
+
60
+
## Validate the deployment
61
+
62
+
> [!NOTE]
63
+
> The ARM template generates a unique name for the virtual machine myVm<b>{uniqueid}</b> resource, and for the SQL Database sqlserver<b>{uniqueid}</b> resource. Substitute your generated value for **{uniqueid}**.
64
+
65
+
### Connect to a VM from the internet
66
+
67
+
Connect to the VM _myVm{uniqueid}_ from the internet by doing the following:
68
+
69
+
1. In the portal's search bar, enter _myVm{uniqueid}_.
70
+
71
+
1. Select **Connect**. **Connect to virtual machine** opens.
72
+
73
+
1. Select **Download RDP File**. Azure creates a Remote Desktop Protocol (RDP) file and downloads it to your computer.
74
+
75
+
1. Open the downloaded RDP file.
76
+
77
+
a. If you're prompted, select **Connect**.
78
+
b. Enter the username and password that you specified when you created the VM.
79
+
80
+
> [!NOTE]
81
+
> You might need to select **More choices** > **Use a different account** to specify the credentials you entered when you created the VM.
82
+
83
+
1. Select **OK**.
84
+
85
+
You might receive a certificate warning during the sign-in process. If you do, select **Yes** or **Continue**.
86
+
87
+
1. After the VM desktop appears, minimize it to go back to your local desktop.
88
+
89
+
### Access the SQL Database server privately from the VM
90
+
91
+
To connect to the SQL Database server from the VM by using the private endpoint, do the following:
92
+
93
+
1. On the Remote Desktop of _myVM{uniqueid}_, open PowerShell.
You'll receive a message that's similar to this one:
99
+
100
+
```
101
+
Server: UnKnown
102
+
Address: 168.63.129.16
103
+
Non-authoritative answer:
104
+
Name: sqlserver.privatelink.database.windows.net
105
+
Address: 10.0.0.5
106
+
Aliases: sqlserver.database.windows.net
107
+
```
108
+
109
+
1. Install SQL Server Management Studio.
110
+
111
+
1. On the **Connect to server** pane, do the following:
112
+
- For **Server type**, select **Database Engine**.
113
+
- For **Server name**, select **sqlserver{uniqueid}.database.windows.net**.
114
+
- For **Username**, enter the username that was provided earlier.
115
+
- For **Password**, enter the password that was provided earlier.
116
+
- For **Remember password**, select **Yes**.
117
+
118
+
1. Select **Connect**.
119
+
1. On the left pane, select **Databases**. Optionally, you can create or query information from _sample-db_.
120
+
1. Close the Remote Desktop connection to _myVm{uniqueid}_.
121
+
122
+
## Clean up resources
123
+
124
+
When you no longer need the resources that you created with the private endpoint, delete the resource group. Doing so removes the private endpoint and all the related resources.
125
+
126
+
To delete the resource group, run the `Remove-AzResourceGroup` cmdlet:
127
+
128
+
```azurepowershell-interactive
129
+
Remove-AzResourceGroup -Name <your resource group name>
130
+
```
131
+
132
+
## Next steps
133
+
134
+
For more information about the services that support private endpoints, see:
135
+
> [!div class="nextstepaction"]
136
+
> [What is Azure Private Link?](private-link-overview.md#availability)
0 commit comments