You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/tutorial-filter-network-traffic.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: virtual-network
6
6
author: mbender-ms
7
7
ms.service: virtual-network
8
8
ms.topic: tutorial
9
-
ms.date: 06/26/2022
9
+
ms.date: 06/28/2022
10
10
ms.author: mbender
11
11
ms.custom: template-tutorial #Required; leave this attribute/value as-is.
12
12
# Customer intent: I want to filter network traffic to virtual machines that perform similar functions, such as web servers.
@@ -22,8 +22,9 @@ In this tutorial, you learn how to:
22
22
23
23
> [!div class="checklist"]
24
24
> * Create a network security group and security rules
25
+
> * Create application security groups
25
26
> * Create a virtual network and associate a network security group to a subnet
26
-
> * Deploy virtual machines (VMs) into a subnet
27
+
> * Deploy virtual machines and associate their network interfaces to the application security groups
27
28
> * Test traffic filters
28
29
29
30
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -97,7 +98,7 @@ An [application security group (ASGs)](application-security-groups.md) enables y
97
98
98
99
## Create a network security group
99
100
100
-
A [network security group (NSG)](network-security-groups-overview.md) secures network traffic in your virtual network. In this section you'll create a network security group.
101
+
A [network security group (NSG)](network-security-groups-overview.md) secures network traffic in your virtual network.
101
102
102
103
1. From the Azure portal menu, select **+ Create a resource** > **Networking** > **Network security group**, or search for *Network security group* in the portal search box.
103
104
@@ -188,7 +189,7 @@ In this section, you'll associate the network security group with the subnet of
188
189
189
190
Once you've completed steps 1-3, review the rules you created. Your list should look like the list in the following example:
:::image type="content" source="./media/tutorial-filter-network-traffic/security-rules.png" alt-text="Screenshot of Security rules of a network security group." border="true":::
192
193
193
194
## Create virtual machines (VMs)
194
195
@@ -254,7 +255,7 @@ Add the network interface of each VM to one of the application security groups y
254
255
255
256
3. Select the **Application security groups** tab, then select **Configure the application security groups**.
:::image type="content" source="./media/tutorial-filter-network-traffic/configure-app-sec-groups.png" alt-text="Screenshot of Configure application security groups." border="true":::
258
259
259
260
4. In **Configure the application security groups**, select **myAsgWebServers**. Select **Save**.
260
261
@@ -304,7 +305,7 @@ Add the network interface of each VM to one of the application security groups y
304
305
305
306
11. On the **Overview** page of **myVMWeb**, note the **Public IP address** for your VM. The address shown in the following example is 23.96.39.113, but your address is different:
306
307
307
-
:::image type="content" source="./media/tutorial-filter-network-traffic/public-ip-address.png" alt-text="Public IP address." border="true":::
308
+
:::image type="content" source="./media/tutorial-filter-network-traffic/public-ip-address.png" alt-text="Screenshot of Public IP address of a virtual machine in the Overview page." border="true":::
308
309
309
310
11. To confirm that you can access the **myVMWeb** web server from the internet, open an internet browser on your computer and browse to `http://<public-ip-address-from-previous-step>`.
310
311
@@ -326,7 +327,7 @@ In this tutorial, you:
326
327
327
328
* Created a network security group and associated it to a virtual network subnet.
328
329
* Created application security groups for web and management.
329
-
* Created two virtual machines.
330
+
* Created two virtual machines and associated their network interfaces with the application security groups.
330
331
* Tested the application security group network filtering.
331
332
332
333
To learn more about network security groups, see [Network security group overview](./network-security-groups-overview.md) and [Manage a network security group](manage-network-security-group.md).
0 commit comments