Skip to content

Commit 4a2d0a8

Browse files
author
Michael Bender
committed
removed old article
1 parent 7cd1683 commit 4a2d0a8

7 files changed

+8
-71
lines changed

articles/private-link/create-network-security-perimeter-cli.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -179,7 +179,8 @@ In this step, you create and update network security perimeter access rules with
179179
--address-prefixes "['198.51.100.0/24', '192.0.2.0/24']"
180180
181181
```
182-
[!INCLUDE [network-security-perimeter-note-managed-id](../../includes/network-security-perimeter-note-managed-id.md)]
182+
183+
[!INCLUDE [network-security-perimeter-note-managed-id](../../includes/network-security-perimeter-note-managed-id.md)]
183184
184185
## Delete all resources
185186

articles/private-link/create-network-security-perimeter-powershell.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,7 +192,7 @@ In this step, you create and update network security perimeter access rules with
192192
Update-AzNetworkSecurityPerimeterAccessRule @updateInboundRule | format-list
193193
```
194194

195-
[!INCLUDE [network-security-perimeter-note-managed-id](../../includes/network-security-perimeter-note-managed-id.md)]
195+
[!INCLUDE [network-security-pe~rimeter-note-managed-id](../../includes/network-security-perimeter-note-managed-id.md)]
196196

197197
## Delete a network security perimeter
198198

articles/private-link/network-security-perimeter-collect-resource-logs.md

Lines changed: 0 additions & 64 deletions
This file was deleted.

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,6 @@ Administrators add PaaS resources to a perimeter by creating resource associatio
5959
| **Mode** | **Description** |
6060
|----------------|--------|
6161
| **Learning mode** | - Default access mode.</br>- Helps network administrators to understand the existing access patterns of their PaaS resources.</br>- Advised mode of use before transitioning to enforced mode.|
62-
|
6362
| **Enforced mode** | - Must be set by the administrator.</br>- By default, all traffic except intra perimeter traffic is denied in this mode unless an *Allow* access rule exists. |
6463

6564

articles/private-link/network-security-perimeter-diagnostic-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: 'Diagnostic logging for Network Security Perimeter'
2+
title: 'Diagnostic logs for Network Security Perimeter'
33
description: Learn the options for storing diagnostic logs for Network Security Perimeter and how to enable logging through the Azure portal.
44
author: mbender-ms
55
ms.author: mbender
@@ -9,7 +9,7 @@ ms.date: 10/30/2024
99
#CustomerIntent: As a network administrator, I want to enable diagnostic logging for Network Security Perimeter, so that I can monitor and analyze the network traffic to and from my resources.
1010
---
1111

12-
# Diagnostic logging for Network Security Perimeter
12+
# Diagnostic logs for Network Security Perimeter
1313

1414
In this article, you learn about the diagnostic logs for Network Security Perimeter and how to enable logging. You learn access logs categories used. Then, you discover the options for storing diagnostic logs and how to enable logging through the Azure portal.
1515

articles/private-link/network-security-perimeter-transition.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,7 @@ Both the `publicNetworkAccess` and `accessMode` properties can be set using the
5353
1. Navigate to your network security perimeter resource in the Azure portal.
5454
2. Select **Settings** > **Resources** to view the list of resources associated with the perimeter.
5555
3. Select *...* (ellipsis) next to the resource you want to configure.
56+
5657
:::image type="content" source="media/network-security-perimeter-transition/network-security-perimeter-resources-page-full-size.png" alt-text="Screenshot of resources page with management options selected for resource." lightbox="media/network-security-perimeter-transition/network-security-perimeter-association-settings-lightbox.png":::
5758

5859
4. From the dropdown menu, select **Configure public network access**, and then select the desired access mode from the three options available: **Enabled**, **Disabled**, or **SecuredByPerimeter**.

articles/private-link/toc.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -69,12 +69,12 @@
6969
items:
7070
- name: What is a network security perimeter?
7171
href: network-security-perimeter-concepts.md
72+
- name: Transition to a network security perimeter
73+
href: network-security-perimeter-transition.md
7274
- name: Diagnostic logs
7375
href: network-security-perimeter-diagnostic-logs.md
7476
- name: Role-based access control permissions
7577
href: network-security-perimeter-role-based-access-control-requirements.md
76-
- name: Transition to a network security perimeter
77-
href: network-security-perimeter-transition.md
7878
- name: DNS
7979
items:
8080
- name: Private DNS zone values

0 commit comments

Comments
 (0)