Skip to content

Commit c2ebce6

Browse files
Update create-peering-different-subscriptions.md
Corrects the order numbering of the steps for the peering creation and the references between the steps.
1 parent 0119b5c commit c2ebce6

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

articles/virtual-network/create-peering-different-subscriptions.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,9 @@ The following steps use different accounts for each subscription. If you're usin
5353
4. In the **Search resources** box at the top of the portal, type *myVnetA*. Select **myVnetA** when it appears in the search results.
5454
5. Select **Access control (IAM)** from the vertical list of options on the left side.
5555
6. Assign the **Network contributor** role to *UserB* using the procedure decribed in [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
56-
10. Under **myVnetA - Access control (IAM)**, select **Properties** from the vertical list of options on the left side. Copy the **RESOURCE ID**, which is used in a later step. The resource ID is similar to the following example: `/subscriptions/<Subscription Id>/resourceGroups/myResourceGroupA/providers/Microsoft.Network/virtualNetworks/myVnetA`.
57-
11. Log out of the portal as UserA, then log in as UserB.
58-
12. Complete steps 2-3, entering or selecting the following values in step 3:
56+
7. Under **myVnetA - Access control (IAM)**, select **Properties** from the vertical list of options on the left side. Copy the **RESOURCE ID**, which is used in a later step. The resource ID is similar to the following example: `/subscriptions/<Subscription Id>/resourceGroups/myResourceGroupA/providers/Microsoft.Network/virtualNetworks/myVnetA`.
57+
8. Log out of the portal as UserA, then log in as UserB.
58+
9. Complete steps 2-3, entering or selecting the following values in step 3:
5959

6060
- **Name**: *myVnetB*
6161
- **Address space**: *10.1.0.0/16*
@@ -65,29 +65,29 @@ The following steps use different accounts for each subscription. If you're usin
6565
- **Resource group**: Select **Create new** and enter *myResourceGroupB*
6666
- **Location**: *East US*
6767

68-
13. In the **Search resources** box at the top of the portal, type *myVnetB*. Select **myVnetB** when it appears in the search results.
69-
14. Under **myVnetB**, select **Properties** from the vertical list of options on the left side. Copy the **RESOURCE ID**, which is used in a later step. The resource ID is similar to the following example: `/subscriptions/<Subscription ID>/resourceGroups/myResourceGroupB/providers/Microsoft.ClassicNetwork/virtualNetworks/myVnetB`.
70-
15. Select **Access control (IAM)** under **myVnetB**, and then assign the **Network contributor** role to *UserA* using the procedure decribed in [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
71-
16. Log out of the portal as UserB and log in as UserA.
72-
17. In the **Search resources** box at the top of the portal, type *myVnetA*. Select **myVnetA** when it appears in the search results.
73-
18. Select **myVnetA**.
74-
19. Under **SETTINGS**, select **Peerings**.
75-
20. Under **myVnetA - Peerings**, select **+ Add**
76-
21. Under **Add peering**, enter, or select, the following options, then select **OK**:
68+
10. In the **Search resources** box at the top of the portal, type *myVnetB*. Select **myVnetB** when it appears in the search results.
69+
11. Under **myVnetB**, select **Properties** from the vertical list of options on the left side. Copy the **RESOURCE ID**, which is used in a later step. The resource ID is similar to the following example: `/subscriptions/<Subscription ID>/resourceGroups/myResourceGroupB/providers/Microsoft.ClassicNetwork/virtualNetworks/myVnetB`.
70+
12. Select **Access control (IAM)** under **myVnetB**, and then assign the **Network contributor** role to *UserA* using the procedure decribed in [Assign Azure roles using the Azure portal](../role-based-access-control/role-assignments-portal.md).
71+
13. Log out of the portal as UserB and log in as UserA.
72+
14. In the **Search resources** box at the top of the portal, type *myVnetA*. Select **myVnetA** when it appears in the search results.
73+
15. Select **myVnetA**.
74+
16. Under **SETTINGS**, select **Peerings**.
75+
17. Under **myVnetA - Peerings**, select **+ Add**
76+
18. Under **Add peering**, enter, or select, the following options, then select **OK**:
7777
- **Name**: *myVnetAToMyVnetB*
7878
- **Virtual network deployment model**: Select **Resource Manager**.
7979
- **I know my resource ID**: Check this box.
80-
- **Resource ID**: Enter the resource ID from step 14.
80+
- **Resource ID**: Enter the resource ID from step 11.
8181
- **Allow virtual network access:** Ensure that **Enabled** is selected.
8282
No other settings are used in this tutorial. To learn about all peering settings, read [Manage virtual network peerings](virtual-network-manage-peering.md#create-a-peering).
83-
22. The peering you created appears a short wait after selecting **OK** in the previous step. **Initiated** is listed in the **PEERING STATUS** column for the **myVnetAToMyVnetB** peering you created. You've peered myVnetA to myVnetB, but now you must peer myVnetB to myVnetA. The peering must be created in both directions to enable resources in the virtual networks to communicate with each other.
84-
23. Log out of the portal as UserA and log in as UserB.
85-
24. Complete steps 17-21 again for myVnetB. In step 21, name the peering *myVnetBToMyVnetA*, select *myVnetA* for **Virtual network**, and enter the ID from step 10 in the **Resource ID** box.
86-
25. A few seconds after selecting **OK** to create the peering for myVnetB, the **myVnetBToMyVnetA** peering you just created is listed with **Connected** in the **PEERING STATUS** column.
87-
26. Log out of the portal as UserB and log in as UserA.
88-
27. Complete steps 17-19 again. The **PEERING STATUS** for the **myVnetAToVNetB** peering is now also **Connected**. The peering is successfully established after you see **Connected** in the **PEERING STATUS** column for both virtual networks in the peering. Any Azure resources you create in either virtual network are now able to communicate with each other through their IP addresses. If you're using default Azure name resolution for the virtual networks, the resources in the virtual networks are not able to resolve names across the virtual networks. If you want to resolve names across virtual networks in a peering, you must create your own DNS server. Learn how to set up [Name resolution using your own DNS server](virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server).
89-
28. **Optional**: Though creating virtual machines is not covered in this tutorial, you can create a virtual machine in each virtual network and connect from one virtual machine to the other, to validate connectivity.
90-
29. **Optional**: To delete the resources that you create in this tutorial, complete the steps in the [Delete resources](#delete-portal) section of this article.
83+
19. The peering you created appears a short wait after selecting **OK** in the previous step. **Initiated** is listed in the **PEERING STATUS** column for the **myVnetAToMyVnetB** peering you created. You've peered myVnetA to myVnetB, but now you must peer myVnetB to myVnetA. The peering must be created in both directions to enable resources in the virtual networks to communicate with each other.
84+
20. Log out of the portal as UserA and log in as UserB.
85+
21. Complete steps 14-18 again for myVnetB. In step 18, name the peering *myVnetBToMyVnetA*, select *myVnetA* for **Virtual network**, and enter the ID from step 7 in the **Resource ID** box.
86+
22. A few seconds after selecting **OK** to create the peering for myVnetB, the **myVnetBToMyVnetA** peering you just created is listed with **Connected** in the **PEERING STATUS** column.
87+
23. Log out of the portal as UserB and log in as UserA.
88+
24. Complete steps 14-16 again. The **PEERING STATUS** for the **myVnetAToVNetB** peering is now also **Connected**. The peering is successfully established after you see **Connected** in the **PEERING STATUS** column for both virtual networks in the peering. Any Azure resources you create in either virtual network are now able to communicate with each other through their IP addresses. If you're using default Azure name resolution for the virtual networks, the resources in the virtual networks are not able to resolve names across the virtual networks. If you want to resolve names across virtual networks in a peering, you must create your own DNS server. Learn how to set up [Name resolution using your own DNS server](virtual-networks-name-resolution-for-vms-and-role-instances.md#name-resolution-that-uses-your-own-dns-server).
89+
25. **Optional**: Though creating virtual machines is not covered in this tutorial, you can create a virtual machine in each virtual network and connect from one virtual machine to the other, to validate connectivity.
90+
26. **Optional**: To delete the resources that you create in this tutorial, complete the steps in the [Delete resources](#delete-portal) section of this article.
9191

9292
## <a name="cli"></a>Create peering - Azure CLI
9393

0 commit comments

Comments
 (0)