You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/devtest-labs/network-isolation.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,7 @@ You can use the Azure portal to enable network isolation only during lab creatio
30
30
31
31
During lab creation, you can enable network isolation for the default lab virtual network, or for another, preexisting virtual network that you use for the lab.
32
32
33
-
## Enable network isolation for the default virtual network
33
+
###Enable network isolation for the default virtual network
34
34
35
35
To create the lab in the default virtual network and enable network isolation:
36
36
@@ -41,7 +41,7 @@ To create the lab in the default virtual network and enable network isolation:
41
41
42
42
If you enable network isolation for the default network, no further action is needed. The lab handles isolating resources from now on.
43
43
44
-
## Enable network isolation for a different virtual network
44
+
###Enable network isolation for a different virtual network
45
45
46
46
To use a different, existing virtual network for the lab, and enable network isolation for that network:
47
47
@@ -72,21 +72,21 @@ If you enabled network isolation for a virtual network other than the default, c
72
72
73
73
1. On the storage account page, expand **Security + networking** and select **Networking** from the left navigation menu.
74
74
75
-
1. On the **Firewalls and virtual networks** tab, ensure that **Enabled from selected virtual networks and IP addresses** is selected, and select **Add existing virtual network**..
75
+
1. On the **Firewalls and virtual networks** tab, ensure that **Enabled from selected virtual networks and IP addresses** is selected, and select **Add existing virtual network**.
76
76
77
-
:::image type="content" source="./media/network-isolation/add-existing-virtual-network.png" alt-text="Screenshot that shows the resource group networking pane with add existing virtual network highlighted.":::
77
+
:::image type="content" source="./media/network-isolation/add-existing-virtual-network.png" alt-text="Screenshot that shows the resource group networking page with add existing virtual network highlighted.":::
78
78
79
79
1. On the **Add networks** pane, select the virtual network and subnet you chose when you created the lab, and then select **Enable**.
80
80
81
-
:::image type="content" source="./media/network-isolation/contoso-lab.png" alt-text="Screenshot that shows the resource group networking pane with add existing virtual network highlighted.":::
81
+
:::image type="content" source="./media/network-isolation/contoso-lab.png" alt-text="Screenshot that shows the resource group networking pane with Enable highlighted.":::
82
82
83
83
1. Once the service endpoint is successfully enabled, select **Add**.
84
84
85
-
:::image type="content" source="./media/network-isolation/allow-trusted-services.png" alt-text="Screenshot that shows allowing trusted services access to a resource group.":::
85
+
:::image type="content" source="./media/network-isolation/key-vault-allow-access.png" alt-text="Screenshot that shows the resource group networking pane with Add highlighted.":::
86
86
87
87
1. On the **Networking** page, ensure that **Allow Azure services on the trusted services list to access this storage account** at the bottom of the page is selected. DevTest Labs is a [trusted Microsoft service](/azure/storage/common/storage-network-security#trusted-microsoft-services), so selecting this option lets the lab operate normally in a network isolated mode.
88
88
89
-
1. Select **Save**.
89
+
1. Select **Save** at the top of the page.
90
90
91
91
:::image type="content" source="./media/network-isolation/allow-trusted-services.png" alt-text="Screenshot that shows allowing trusted services access to a resource group.":::
92
92
@@ -140,7 +140,7 @@ Enabling the key vault service endpoint affects only the firewall. Make sure to
140
140
141
141
For more information, see [Assign a Key Vault access policy](/azure/key-vault/general/assign-access-policy).
0 commit comments