Skip to content

Commit bab9e8e

Browse files
author
Michael Bender
committed
Acrolinx
1 parent 89826a0 commit bab9e8e

File tree

2 files changed

+8
-9
lines changed

2 files changed

+8
-9
lines changed

articles/virtual-network-manager/how-to-block-high-risk-ports.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ ms.custom: template-how-to #Required; leave this attribute/value as-is.
1111
# Protect high-risk network ports with Security Admin Rules in Azure Virtual Network Manager
1212

1313

14-
In this article, you'll learn to block high risk network ports using [Azure Virtual Network Manager](overview.md) and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with [network groups](concept-network-groups.md), and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This allows you to manage access to the application VNets using network security groups.
14+
In this article, you'll learn to block high risk network ports using [Azure Virtual Network Manager](overview.md) and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with [network groups](concept-network-groups.md), and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet using network security groups.
1515

16-
While this article focuses on a single port, SSH, you can use protect any high-risk ports in your environment with the same steps. To learn more, review this list of [high risk ports](concept-security-admins.md#protect-high-risk-ports)
16+
While this article focuses on a single port, SSH, you can protect any high-risk ports in your environment with the same steps. To learn more, review this list of [high risk ports](concept-security-admins.md#protect-high-risk-ports)
1717

1818
> [!IMPORTANT]
1919
> Azure Virtual Network Manager is currently in public preview.
@@ -26,8 +26,7 @@ While this article focuses on a single port, SSH, you can use protect any high-r
2626
* A group of virtual networks that can be split into network groups for applying granular security admin rules.
2727

2828
## Deploy virtual network environment
29-
30-
For this how-to, you'll need a virtual network environment that includes virtual networks that can be segregated for allowing and blocking specific network traffic. You may use the following table or your own configuration of virtual networks:
29+
You'll need a virtual network environment that includes virtual networks that can be segregated for allowing and blocking specific network traffic. You may use the following table or your own configuration of virtual networks:
3130

3231
| Name | IPv4 address space | subnet |
3332
| ---- | ----| ---- |
@@ -66,7 +65,7 @@ In this section, you'll deploy a Virtual Network Manager instance with the Secur
6665

6766
## Create a network group
6867

69-
With your virtual network manager created, you now create a network group to encapsulate the VNets you want to protect. This will include all of the VNets in the organization as a general all-encompassing rule to block high risk network ports is needed. You'll manually add all of the VNets.
68+
With your virtual network manager created, you now create a network group containing all of the VNets in the organization. You'll manually add all of the VNets.
7069
1. Select **Network Groups**, under **Settings**.
7170
1. Select **+ Create**, enter a *name* for the network group, and select **Add**.
7271
1. On the *Network groups* page, select the network group you created.
@@ -136,7 +135,7 @@ In this section, you define the security rule to block high-risk network traffic
136135
1. Then select **Review + Create** and **Create** to complete the security configuration.
137136
## Deploy a security admin configuration
138137

139-
In this section, you deploy the newly created security admin configuration to block high-risk ports to your network group. This is how the security admin configuration will take effect on the virtual networks included in the network group
138+
In this section, the rules created will take effect when you deploy the security admin configuration.
140139

141140
1. Select **Deployments** under *Settings*, then select **Deploy configuration**.
142141

@@ -149,7 +148,7 @@ In this section, you deploy the newly created security admin configuration to bl
149148
1. Select **Next** and **Deploy** to deploy the security admin configuration.
150149
## Create a network group for exception virtual networks
151150

152-
With traffic blocked across all of your VNets, you need an exception to allow traffic to specific virtual networks. To do this, you'll create a network group specifically for the VNets needing exclusion from the other security admin rule above.
151+
With traffic blocked across all of your VNets, you need an exception to allow traffic to specific virtual networks. You'll create a network group specifically for the VNets needing exclusion from the other security admin rule.
153152

154153
1. From your virtual network manager, select **Network Groups**, under **Settings**.
155154
1. Select **+ Create**, enter a *name* for the application network group, and select **Add**.
@@ -162,7 +161,7 @@ With traffic blocked across all of your VNets, you need an exception to allow tr
162161

163162
## Create an exception Security Admin Rule collection and Rule
164163

165-
In this section, you create a new rule collection that will allow high-risk traffic to a subset of virtual networks you've defined in a network group, and create security admin rule to add to our existing security admin configuration.
164+
In this section, you create a new rule collection and security admin rule that will allow high-risk traffic to the subset of virtual networks you've defined as exceptions. Next, you'll add it to your existing security admin configuration.
166165

167166
> [!IMPORTANT]
168167
> In order for your security admin rule to allow traffic to your application virtual networks, the priority needs to be set to a **lower number** than existing rules blocking traffic.

articles/virtual-network-manager/how-to-block-network-traffic-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ Before you start to configure security admin rules, confirm that you've done the
6868
| Source IP addresses | This field will appear when you select the source type of *IP address*. Enter an IPv4 or IPv6 address or a range using CIDR notation. When defining more than one address or blocks of addresses separate using a comma. Leave blank for this example.|
6969
| Source service tag | This field will appear when you select the source type of *Service tag*. Select service tag(s) for services you want to specify as the source. See [Available service tags](../virtual-network/service-tags-overview.md#available-service-tags), for the list of supported tags. |
7070
| Source port | Enter a single port number or a port range such as (1024-65535). When defining more than one port or port ranges, separate them using a comma. To specify any port, enter *. Leave blank for this example.|
71-
|**Desination**| |
71+
|**Destination**| |
7272
| Destination type | Select the destination type of either **IP address** or **Service tags**. |
7373
| Destination IP addresses | This field will appear when you select the destination type of *IP address*. Enter an IPv4 or IPv6 address or a range using CIDR notation. When defining more than one address or blocks of addresses separate using a comma. |
7474
| Destination service tag | This field will appear when you select the destination type of *Service tag*. Select service tag(s) for services you want to specify as the destination. See [Available service tags](../virtual-network/service-tags-overview.md#available-service-tags), for the list of supported tags. |

0 commit comments

Comments
 (0)