You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/how-to-block-high-risk-ports.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ main branch.
17
17
# How to block high-risk network ports with Security Admin Rules in Azure Virtual Network Manager
18
18
19
19
20
-
In this article, you will learn to block high risk network ports using Azure Virtual Network Manager and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with network groups, and create & deploy security admin configurations for your organization. You'll deploy an general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This is will allow you to manage access to the application VNets using network security groups.
20
+
In this article, you'll learn to block high risk network ports using Azure Virtual Network Manager and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with network groups, and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This allows you to manage access to the application VNets using network security groups.
21
21
22
22
### Describe Scenario
23
23
@@ -33,8 +33,8 @@ In this article, you will learn to block high risk network ports using Azure Vir
33
33
* An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
34
34
* A group of virtual networks that can be split into
For this How-to, you will need a virtual network environment that includes production and test virtual networks. For the this, you may use the following table or your own configuration of virtual networks:
36
+
## Deploy Virtual Network environment
37
+
For this How-to, you'll need a virtual network environment that includes production and test virtual networks. You may use the following table or your own configuration of virtual networks:
@@ -49,7 +49,7 @@ For this How-to, you will need a virtual network environment that includes produ
49
49
Not sure how to build a virtual network? Learn more in [Quickstart: Create a virtual network using the Azure portal](quick-create-portal.md).
50
50
51
51
## Create a Virtual Network Manager
52
-
In this section, you will deploy a Virtual Network Manager instance with the Security admin feature in your organization.
52
+
In this section, you'll deploy a Virtual Network Manager instance with the Security admin feature in your organization.
53
53
54
54
1. Select **+ Create a resource** and search for **Network Manager**. Then select **Create** to begin setting up Azure Virtual Network Manager.
55
55
@@ -71,7 +71,7 @@ In this section, you will deploy a Virtual Network Manager instance with the Sec
71
71
1. Select **Go to resource** when deployment is complete and review the virtual network manager configuration
72
72
73
73
## Create a Network Group
74
-
With your virtual network manager created, you now create a network group to encapsulate the VNets you want to protect. This will include all of the VNets in the organization as a general all-encompassing rule to block high risk network ports is needed. You will manually add all of the VNets.
74
+
With your virtual network manager created, you now create a network group to encapsulate the VNets you want to protect. This will include all of the VNets in the organization as a general all-encompassing rule to block high risk network ports is needed. You'll manually add all of the VNets.
75
75
1. Select **Network Groups**, under **Settings**.
76
76
1. Select **+ Create**, enter a *name* for the network group, and select **Add**.
77
77
1. On the *Network groups* page, select the network group you created.
@@ -124,7 +124,7 @@ It’s time to construct our security admin rules within a configuration so that
124
124
| Source IP addresses | This field will appear when you select the source type of *IP address*. Enter an IPv4 or IPv6 address or a range using CIDR notation. When defining more than one address or blocks of addresses separate using a comma. Leave blank for this example.|
125
125
| Source service tag | This field will appear when you select the source type of *Service tag*. Select service tag(s) for services you want to specify as the source. See [Available service tags](../virtual-network/service-tags-overview.md#available-service-tags), for the list of supported tags. |
126
126
| Source port | Enter a single port number or a port range such as (1024-65535). When defining more than one port or port ranges, separate them using a comma. To specify any port, enter *. Leave blank for this example.|
127
-
|**Desination**||
127
+
|**Destination**||
128
128
| Destination type | Select the destination type of either **IP address** or **Service tags**. |
129
129
| Destination IP addresses | This field will appear when you select the destination type of *IP address*. Enter an IPv4 or IPv6 address or a range using CIDR notation. When defining more than one address or blocks of addresses separate using a comma. |
130
130
| Destination service tag | This field will appear when you select the destination type of *Service tag*. Select service tag(s) for services you want to specify as the destination. See [Available service tags](../virtual-network/service-tags-overview.md#available-service-tags), for the list of supported tags. |
@@ -152,13 +152,13 @@ If you just created a new security admin configuration, make sure to deploy this
152
152
153
153
1. Select **Next** and **Deploy** to deploy the security admin configuration.
154
154
## Create a Network Group for exception virtual networks
155
-
With traffic blocked across all of your VNets, you need an exception to allow traffic to your application virtual networks. To do this, you will create a network group specifically for the application VNets and deploy a security admin rule allowing SSH traffic to application resources.
155
+
With traffic blocked across all of your VNets, you need an exception to allow traffic to your application virtual networks. To do this, you'll create a network group specifically for the application VNets and deploy a security admin rule allowing SSH traffic to application resources.
156
156
157
157
1. From your virtual network manager, select **Network Groups**, under **Settings**.
158
158
1. Select **+ Create**, enter a *name* for the application network group, and select **Add**.
159
159
1. Under **Define Dynamic Membership**, select **Define**.
160
160
1. Enter or select the values to allow traffic to your application virtual network.
161
-
1. Select **Preview Resources** to review the **Effective Virtuals Networks** included, and select **Close**.
161
+
1. Select **Preview Resources** to review the **Effective Virtual Networks** included, and select **Close**.
162
162
1. Select **Save**.
163
163
164
164
## Create a Security Admin Rule Collection for Application 1
@@ -175,8 +175,8 @@ We can now create an exception for Application 1’s VNets by adding a new rule
175
175
1. Enter or select the values to allow specific network traffic to your application network group, and select **add** when completed.
176
176
177
177
1. Repeat the add rule process for all traffic needing an exception.
178
-
1. Select **Save** when you are done.
179
-
## Re-deploy the Security Admin Configuration
178
+
1. Select **Save** when you're done.
179
+
## Redeploy the Security Admin Configuration
180
180
We’re at the final step, which is to redeploy OurSecurityConfig since we’ve modified this configuration by adding a rule collection.
181
181
182
182
1. From your virtual network manager, select **Configurations**.
0 commit comments