Skip to content

Commit 5f09637

Browse files
committed
Edits per review comments
1 parent e84124a commit 5f09637

File tree

1 file changed

+18
-20
lines changed

1 file changed

+18
-20
lines changed

articles/communication-services/quickstarts/network-security-perimeter.md

Lines changed: 18 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -23,43 +23,41 @@ This article provides a comprehensive guide to set up a Network Security Perimet
2323

2424
- An active Azure subscription.
2525

26-
- Enable the Azure Feature Exposure Control (AFEC) flag `AllowNetworkSecurityPerimeter` and `AcsNspPreview` for your subscription.
26+
- The latest Azure CLI. This article requires [Azure CLI version 2.38.0 or later](/cli/azure/install-azure-cli-windows).
2727

28-
- Register for the Azure Network Security Perimeter public preview. To register, add the `AllowNSPInPublicPreview` feature flag to your subscription.
29-
30-
:::image type="content" source="media/allow-nsp-public-preview.png" alt-text="Screen capture of Preview features page showing AllowNSPInPublicPreview for Azure Subscription and the display name Feature flag to approve creation of Network Security Perimeter.":::
31-
32-
For more information on adding feature flags, see [Set up preview features in Azure subscription](/azure/azure-resource-manager/management/preview-features).
33-
34-
- After adding the feature flag, you need to re-register the `Microsoft.Network` resource provider in your subscription.
35-
36-
`az provider register --namespace Microsoft.Network`
37-
38-
- The latest Azure CLI.
39-
40-
- This article requires version 2.38.0 or later of the Azure CLI.
41-
42-
- After upgrading to the latest version of Azure CLI, import the network security perimeter commands using:
28+
- After installing or upgrading to the latest version of Azure CLI, import the network security perimeter commands using:
4329

4430
`az extension add –name nsp`
4531

4632
- Import the Azure communications commands using:
4733

4834
`az extension add --name communication`
4935

50-
## Set up your Network Security Perimeter for Email
36+
## Set up your Network Security Perimeter for Email
5137

5238
### Step 1: Share the subscription ID to test NSP
5339

5440
Complete and submit the form at [Network Security Perimeter for Azure Communication Services](https://aka.ms/acs-nsp). You need to provide a company name, subscription ID, and scenario.
5541

42+
1. Enable the Azure Feature Exposure Control (AFEC) flag `AllowNetworkSecurityPerimeter` and `AcsNspPreview` for your subscription.
43+
44+
2. Register for the Azure Network Security Perimeter public preview. To register, add the `AllowNSPInPublicPreview` feature flag to your subscription.
45+
46+
:::image type="content" source="media/allow-nsp-public-preview.png" alt-text="Screen capture of Preview features page showing AllowNSPInPublicPreview for Azure Subscription and the display name Feature flag to approve creation of Network Security Perimeter.":::
47+
48+
For more information on adding feature flags, see [Set up preview features in Azure subscription](/azure/azure-resource-manager/management/preview-features).
49+
50+
3. After adding the feature flag, you need to re-register the `Microsoft.Network` resource provider in your subscription.
51+
52+
`az provider register --namespace Microsoft.Network`
53+
5654
### Step 2: Create a new resource or update an existing Azure Communication Services resource using Azure CLI/Cloud Shell
5755

5856
Use the following command to set `PublicNetworkAccess` to `SecuredByPerimeter`.
5957

6058
`az rest --method PUT --uri https://management.azure.com/subscriptions/<subscription ID>/resourceGroups/<resource-group-name> /providers/Microsoft.Communication/communicationServices/<acs-resource name>?api-version=2023-12-25-preview --body "{'location': 'Global', 'properties': {'dataLocation': ''<acs-datalocation>, 'publicNetworkAccess': 'SecuredByPerimeter',}}"`
6159

62-
## Step 3: Create a network security perimeter
60+
### Step 3: Create a network security perimeter
6361

6462
`az network perimeter create --name <network-security-perimeter-name> --resource-group <resource-group-name> -l <location>`
6563

@@ -75,15 +73,15 @@ Provide the same network security perimeter name used in **Step 3**.
7573

7674
> [!NOTE]
7775
>
78-
> NSP currently supports only IPV4 addresses. Use Classless Inter-Domain Routing (CIDR), not just one IP address. For more information, see [Understanding CIDR Notation when designing Azure Virtual Networks and Subnets](https://devblogs.microsoft.com/premier-developer/understanding-cidr-notation-when-designing-azure-virtual-networks-and-subnets/).
76+
> NSP currently supports only IPV4 addresses. Use Microsoft Classless Inter-Domain Routing (CIDR), not just one IP address. For more information, see [Understanding CIDR Notation when designing Azure Virtual Networks and Subnets](https://devblogs.microsoft.com/premier-developer/understanding-cidr-notation-when-designing-azure-virtual-networks-and-subnets/).
7977
8078
### Step 6: Associate the Azure Communication Services (PaaS resource) with the network security perimeter profile with the following commands
8179

8280
1. Get your Azure Communication Services resource ID.
8381

8482
`az communication show --name <acs-resource-name> --resource-group <acs-resource-group> --query 'id'`
8583

86-
2. Get the profile ID.
84+
2. Get the profile ID.
8785

8886
`az network perimeter profile show --name <network-perimeter-profile-name> --resource-group <network-perimeter-resource-group> --perimeter-name <network-security-perimeter-name> --query 'id'`
8987

0 commit comments

Comments
 (0)