You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/communication-services/quickstarts/network-security-perimeter.md
+18-20Lines changed: 18 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,43 +23,41 @@ This article provides a comprehensive guide to set up a Network Security Perimet
23
23
24
24
- An active Azure subscription.
25
25
26
-
-Enable the Azure Feature Exposure Control (AFEC) flag `AllowNetworkSecurityPerimeter` and `AcsNspPreview` for your subscription.
26
+
-The latest Azure CLI. This article requires [Azure CLI version 2.38.0 or later](/cli/azure/install-azure-cli-windows).
27
27
28
-
- Register for the Azure Network Security Perimeter public preview. To register, add the `AllowNSPInPublicPreview` feature flag to your subscription.
29
-
30
-
:::image type="content" source="media/allow-nsp-public-preview.png" alt-text="Screen capture of Preview features page showing AllowNSPInPublicPreview for Azure Subscription and the display name Feature flag to approve creation of Network Security Perimeter.":::
31
-
32
-
For more information on adding feature flags, see [Set up preview features in Azure subscription](/azure/azure-resource-manager/management/preview-features).
33
-
34
-
- After adding the feature flag, you need to re-register the `Microsoft.Network` resource provider in your subscription.
- This article requires version 2.38.0 or later of the Azure CLI.
41
-
42
-
- After upgrading to the latest version of Azure CLI, import the network security perimeter commands using:
28
+
- After installing or upgrading to the latest version of Azure CLI, import the network security perimeter commands using:
43
29
44
30
`az extension add –name nsp`
45
31
46
32
- Import the Azure communications commands using:
47
33
48
34
`az extension add --name communication`
49
35
50
-
## Set up your Network Security Perimeter for Email
36
+
## Set up your Network Security Perimeter for Email
51
37
52
38
### Step 1: Share the subscription ID to test NSP
53
39
54
40
Complete and submit the form at [Network Security Perimeter for Azure Communication Services](https://aka.ms/acs-nsp). You need to provide a company name, subscription ID, and scenario.
55
41
42
+
1. Enable the Azure Feature Exposure Control (AFEC) flag `AllowNetworkSecurityPerimeter` and `AcsNspPreview` for your subscription.
43
+
44
+
2. Register for the Azure Network Security Perimeter public preview. To register, add the `AllowNSPInPublicPreview` feature flag to your subscription.
45
+
46
+
:::image type="content" source="media/allow-nsp-public-preview.png" alt-text="Screen capture of Preview features page showing AllowNSPInPublicPreview for Azure Subscription and the display name Feature flag to approve creation of Network Security Perimeter.":::
47
+
48
+
For more information on adding feature flags, see [Set up preview features in Azure subscription](/azure/azure-resource-manager/management/preview-features).
49
+
50
+
3. After adding the feature flag, you need to re-register the `Microsoft.Network` resource provider in your subscription.
@@ -75,15 +73,15 @@ Provide the same network security perimeter name used in **Step 3**.
75
73
76
74
> [!NOTE]
77
75
>
78
-
> NSP currently supports only IPV4 addresses. Use Classless Inter-Domain Routing (CIDR), not just one IP address. For more information, see [Understanding CIDR Notation when designing Azure Virtual Networks and Subnets](https://devblogs.microsoft.com/premier-developer/understanding-cidr-notation-when-designing-azure-virtual-networks-and-subnets/).
76
+
> NSP currently supports only IPV4 addresses. Use Microsoft Classless Inter-Domain Routing (CIDR), not just one IP address. For more information, see [Understanding CIDR Notation when designing Azure Virtual Networks and Subnets](https://devblogs.microsoft.com/premier-developer/understanding-cidr-notation-when-designing-azure-virtual-networks-and-subnets/).
79
77
80
78
### Step 6: Associate the Azure Communication Services (PaaS resource) with the network security perimeter profile with the following commands
81
79
82
80
1. Get your Azure Communication Services resource ID.
83
81
84
82
`az communication show --name <acs-resource-name> --resource-group <acs-resource-group> --query 'id'`
0 commit comments