Skip to content

Commit 6ef9007

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents 6f3d824 + cd4abe7 commit 6ef9007

19 files changed

+289
-281
lines changed

articles/active-directory-b2c/custom-domain.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ Follow these steps to create an Azure Front Door:
108108

109109
1. To choose the directory that contains the Azure subscription that you’d like to use for Azure Front Door and *not* the directory containing your Azure AD B2C tenant select the **Settings** icon in the top menu to switch to your Azure AD B2C tenant from the **Directories + subscriptions** menu.
110110

111-
1. Follow the steps in [Create Front Door profile - Quick Create](../frontdoor/create-front-door-portal.md#create-front-door-profile---quick-create) to create a Front Door for your Azure AD B2C tenant using the following settings:
111+
1. Follow the steps in [Create Front Door profile - Quick Create](../frontdoor/create-front-door-portal.md#create-an-azure-front-door-profile) to create a Front Door for your Azure AD B2C tenant using the following settings:
112112

113113

114114
|Key |Value |
@@ -202,7 +202,7 @@ To create a CNAME record for your custom domain:
202202
The **default-route** routes the traffic from the client to Azure Front Door. Then, Azure Front Door uses your configuration to send the traffic to Azure AD B2C. Follow these steps to enable the default-route.
203203

204204
1. Select **Front Door manager**.
205-
1. To add enable the **default-route**, first expand an endpoint from the list of endpoints in the Front Door manager. Then, select the **default-route**.
205+
1. To enable the **default-route**, first expand an endpoint from the list of endpoints in the Front Door manager. Then, select the **default-route**.
206206

207207
The following screenshot shows how to select the default-route.
208208

articles/dns/dns-operations-dnszones-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,7 @@ The following example is the response.
119119
```json
120120
{
121121
"etag": "00000002-0000-0000-3d4d-64aa3689d201",
122-
"id": "/subscriptions/147a22e9-2356-4e56-b3de-1f5842ae4a3b/resourceGroups/myresourcegroup/providers/Microsoft.Network/dnszones/contoso.com",
122+
"id": "/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e/resourceGroups/myresourcegroup/providers/Microsoft.Network/dnszones/contoso.com",
123123
"location": "global",
124124
"maxNumberOfRecordSets": 5000,
125125
"name": "contoso.com",

articles/dns/dns-protect-zones-recordsets.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ The following example shows a custom role definition for managing CNAME records
152152
"NotActions": [
153153
],
154154
"AssignableScopes": [
155-
"/subscriptions/c276fc76-9cd4-44c9-99a7-4fd71546436e"
155+
"/subscriptions/aaaa0a0a-bb1b-cc2c-dd3d-eeeeee4e4e4e"
156156
]
157157
}
158158
```

articles/firewall/management-nic.md

Lines changed: 35 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,6 +86,40 @@ Now when you view the firewall in the Azure portal, you see the assigned Managem
8686
> [!NOTE]
8787
> If you remove all other IP address configurations on your firewall, the management IP address configuration is removed as well, and the firewall is deallocated. The public IP address assigned to the management IP address configuration can't be removed, but you can assign a different public IP address.
8888
89+
## Deploying a New Azure Firewall with Management NIC for Forced Tunneling
90+
91+
If you prefer to deploy a new Azure Firewall instead of the Stop/Start method, make sure to include a Management Subnet and Management NIC as part of your configuration.
92+
93+
**Important Note**
94+
* **Single Firewall per Virtual Network (VNET)**: Since two firewalls cannot exist within the same virtual network, it is recommended to delete the old firewall before starting the new deployment if you plan to reuse the same VNET.
95+
* **Pre-create Subnet**: Ensure the **AzureFirewallManagementSubnet** is created in advance to avoid deployment issues when using an existing VNET.
96+
97+
**Prerequisites**
98+
* Create the **AzureFirewallManagementSubnet**:
99+
* Minimum subnet size: /26
100+
* Example: 10.0.1.0/26
101+
102+
**Deployment Steps**
103+
1. Go to **Create a Resource** in the Azure Portal.
104+
1. Search for **Firewall** and select **Create**.
105+
1. On the Create a Firewall page, configure the following:
106+
* **Subscription**: Select your subscription.
107+
* **Resource Group**: Select or create a new resource group.
108+
* **Name**: Enter a name for the firewall.
109+
* **Region**: Choose your region.
110+
* **Firewall SKU**: Select Basic, Standard, or Premium.
111+
* **Virtual Network**: Create a new virtual network or use an existing one.
112+
* Address space: e.g., 10.0.0.0/16
113+
* Subnet for AzureFirewallSubnet: e.g., 10.0.0.0/26
114+
* **Public IP Address**: Add new Public IP
115+
* Name: e.g., FW-PIP
116+
1. Firewall Management NIC
117+
* Select **Enable Firewall Management NIC**
118+
* Subnet for AzureFirewallManagementSubnet: e.g., 10.0.1.0/24
119+
* Create Management public IP address: e.g., Mgmt-PIP
120+
1. Select **Review + Create** to validate and deploy the firewall. This will take a few minutes to deploy.
121+
122+
89123
## Related content
90124

91-
- [Azure Firewall forced tunneling](forced-tunneling.md)
125+
- [Azure Firewall forced tunneling](forced-tunneling.md)

articles/frontdoor/blue-green-deployment.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ Azure Front Door is Microsoft's modern cloud Content Delivery Network (CDN) that
7979
> [!NOTE]
8080
> Initially, set the weight of the current origin higher than the new origin to ensure most traffic is routed to the current origin. Gradually increase the weight of the new origin and decrease the weight of the current origin as you test. The total weight doesn't need to be 100, but it helps visualize traffic distribution. The example sets the existing origin to receive three times as much traffic as the new origin.
8181
82-
1. Enable session affinity if your application requires it. For more information, see [Session affinity](routing-methods.md#session-affinity).
82+
1. Enable session affinity if your application requires it. For more information, see [Session affinity](routing-methods.md).
8383

8484
> [!NOTE]
8585
> *Session affinity* ensures the end user is routed to the same origin after the first request. Enable this feature based on your application and the type of enhancements being rolled out. For major revisions, enable session affinity to keep users on the new codebase. For minor enhancements, you can leave session affinity disabled. When in doubt, enable session affinity.

0 commit comments

Comments
 (0)