You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-cli.md
+36-28Lines changed: 36 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: quickstart
8
-
ms.date: 10/30/2024
8
+
ms.date: 11/06/2024
9
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure CLI, so that I can control the network traffic to and from the resource.
10
10
---
11
11
@@ -18,19 +18,16 @@ Get started with network security perimeter by creating a network security perim
18
18
## Prerequisites
19
19
20
20
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/?WT.mc_id=A261C142F).
## Connect to your Azure account and select your subscription
@@ -49,7 +46,7 @@ To get started, connect to [Azure Cloud Shell](https://shell.azure.com) or use y
49
46
50
47
```azurecli-interactive
51
48
# List all subscriptions
52
-
az account set --subscription "Azure Subscription"
49
+
az account set --subscription <Azure Subscription>
53
50
54
51
# Re-register the Microsoft.Network resource provider
55
52
az provider register --namespace Microsoft.Network
@@ -58,23 +55,22 @@ To get started, connect to [Azure Cloud Shell](https://shell.azure.com) or use y
58
55
## Create a resource group and key vault
59
56
60
57
Before you can create a network security perimeter, you have to create a resource group and a key vault resource.
61
-
This example creates a resource group named **test-rg** in the WestCentralUS location and a key vault named **key-vault-YYYYDDMM** in the resource group with the following commands:
58
+
This example creates a resource group named **resource-group** in the WestCentralUS location and a key vault named **key-vault-YYYYDDMM** in the resource group with the following commands:
62
59
63
60
```azurecli-interactive
64
61
az group create \
65
-
--name test-rg \
62
+
--name resource-group \
66
63
--location westcentralus
67
64
68
65
# Create a key vault using a datetime value to ensure a unique name
69
66
70
67
key_vault_name="key-vault-$(date +%s)"
71
68
az keyvault create \
72
69
--name $key_vault_name \
73
-
--resource-group test-rg \
70
+
--resource-group resource-group \
74
71
--location westcentralus \
75
72
--query 'id' \
76
73
--output tsv
77
-
78
74
```
79
75
80
76
## Create a network security perimeter
@@ -87,7 +83,7 @@ In this step, create a network security perimeter with the `az network perimeter
87
83
```azurecli-interactive
88
84
az network perimeter create\
89
85
--name network-security-perimeter \
90
-
--resource-group test-rg \
86
+
--resource-group resource-group \
91
87
-l westcentralus
92
88
```
93
89
@@ -104,7 +100,7 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
104
100
# Create a new profile
105
101
az network perimeter profile create \
106
102
--name network-perimeter-profile \
107
-
--resource-group test-rg \
103
+
--resource-group resource-group \
108
104
--perimeter-name network-security-perimeter
109
105
110
106
```
@@ -115,21 +111,21 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
115
111
# Get key vault id
116
112
az keyvault show \
117
113
--name $key_vault_name \
118
-
--resource-group test-rg \
114
+
--resource-group resource-group \
119
115
--query 'id'
120
116
121
117
# Get the profile id
122
118
az network perimeter profile show \
123
119
--name network-perimeter-profile \
124
-
--resource-group test-rg \
120
+
--resource-group resource-group \
125
121
--perimeter-name network-security-perimeter
126
122
127
123
# Associate the Azure Key Vault with the network security perimeter profile
128
124
# Replace <PaaSArmId> and <networkSecurityPerimeterProfileId> with the ID values for your key vault and profile
## Create and update network security perimeter access rules
152
-
153
-
In this step, you create and update network security perimeter access rules with public IP address prefixes using the `az network perimeter profile access-rule create` command.
149
+
In this step, you create, update, and delete a network security perimeter access rules with public IP address prefixes using the `az network perimeter profile access-rule` command.
154
150
155
151
1. Create an inbound access rule with a public IP address prefix for the profile created with the following command:
156
152
@@ -161,7 +157,7 @@ In this step, you create and update network security perimeter access rules with
161
157
--name access-rule \
162
158
--profile-name network-perimeter-profile \
163
159
--perimeter-name network-security-perimeter \
164
-
--resource-group test-rg \
160
+
--resource-group resource-group \
165
161
--address-prefixes "[192.0.2.0/24]"
166
162
167
163
```
@@ -175,12 +171,22 @@ In this step, you create and update network security perimeter access rules with
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-portal.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: quickstart
8
-
ms.date: 10/30/2024
8
+
ms.date: 11/04/2024
9
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource in the Azure portal, so that I can control the network traffic to and from the resource.
10
10
---
11
11
@@ -98,9 +98,12 @@ When you no longer need a network security perimeter, you remove any resources a
98
98
99
99
1. From your network security perimeter, select **Associated resources** under **Settings**.
100
100
2. Select **key-vault-YYYYDDMM** from the list of associated resources.
101
-
3. From the action bar,select **Settings ** and then select **Remove** in the .
101
+
3. From the action bar,select **Settings ** and then select **Remove** in the confirmation window.
102
102
4. Navigate back to the **Overview** page of your network security perimeter.
103
103
5. Select **Delete** and confirm the deletion by entering **network-security-perimeter** in the text box for the name of the resource.
104
+
6. Browse to the **resource-group** and select **Delete** to remove the resource group and all resources within it.
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-powershell.md
+33-20Lines changed: 33 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: quickstart
8
-
ms.date: 09/16/2024
8
+
ms.date: 11/06/2024
9
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure PowerShell, so that I can control the network traffic to and from the resource.
10
10
---
11
11
12
12
# Quickstart: Create a network security perimeter - Azure PowerShell
13
13
14
-
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure PowerShell. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. Next, You create and update a PaaS resources association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
14
+
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure PowerShell. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
> The preview version of the Az.Network module is required to use network security perimeter capabilities. The latest version of the Az.Network module is available in the PowerShell Gallery. Look for the newest version that ends in `-preview`.
44
47
45
-
* If you choose to use Azure PowerShell locally:
46
-
* [Install the latest version of the Az PowerShell module](/powershell/azure/install-azure-powershell).
47
-
* Connect to your Azure account using the
48
+
- If you choose to use Azure PowerShell locally:
49
+
- [Install the latest version of the Az PowerShell module](/powershell/azure/install-azure-powershell).
To delete a network security perimeter, use the following commands:
210
+
When you no longer need the network security perimeter, remove all resources associated with the network security perimeter, remove the perimeter, and then remove the resource group.
200
211
201
212
```azurepowershell-interactive
202
213
203
214
# Retrieve the network security perimeter and place it in a variable
0 commit comments