You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-cli.md
+30-21Lines changed: 30 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: quickstart
8
-
ms.date: 11/04/2024
8
+
ms.date: 11/06/2024
9
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure CLI, so that I can control the network traffic to and from the resource.
10
10
---
11
11
@@ -46,7 +46,7 @@ To get started, connect to [Azure Cloud Shell](https://shell.azure.com) or use y
46
46
47
47
```azurecli-interactive
48
48
# List all subscriptions
49
-
az account set --subscription "Azure Subscription"
49
+
az account set --subscription <Azure Subscription>
50
50
51
51
# Re-register the Microsoft.Network resource provider
52
52
az provider register --namespace Microsoft.Network
@@ -55,23 +55,22 @@ To get started, connect to [Azure Cloud Shell](https://shell.azure.com) or use y
55
55
## Create a resource group and key vault
56
56
57
57
Before you can create a network security perimeter, you have to create a resource group and a key vault resource.
58
-
This example creates a resource group named **test-rg** in the WestCentralUS location and a key vault named **key-vault-YYYYDDMM** in the resource group with the following commands:
58
+
This example creates a resource group named **resource-group** in the WestCentralUS location and a key vault named **key-vault-YYYYDDMM** in the resource group with the following commands:
59
59
60
60
```azurecli-interactive
61
61
az group create \
62
-
--name test-rg \
62
+
--name resource-group \
63
63
--location westcentralus
64
64
65
65
# Create a key vault using a datetime value to ensure a unique name
66
66
67
67
key_vault_name="key-vault-$(date +%s)"
68
68
az keyvault create \
69
69
--name $key_vault_name \
70
-
--resource-group test-rg \
70
+
--resource-group resource-group \
71
71
--location westcentralus \
72
72
--query 'id' \
73
73
--output tsv
74
-
75
74
```
76
75
77
76
## Create a network security perimeter
@@ -84,7 +83,7 @@ In this step, create a network security perimeter with the `az network perimeter
84
83
```azurecli-interactive
85
84
az network perimeter create\
86
85
--name network-security-perimeter \
87
-
--resource-group test-rg \
86
+
--resource-group resource-group \
88
87
-l westcentralus
89
88
```
90
89
@@ -101,7 +100,7 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
101
100
# Create a new profile
102
101
az network perimeter profile create \
103
102
--name network-perimeter-profile \
104
-
--resource-group test-rg \
103
+
--resource-group resource-group \
105
104
--perimeter-name network-security-perimeter
106
105
107
106
```
@@ -112,21 +111,21 @@ In this step, you create a new profile and associate the PaaS resource, the Azur
112
111
# Get key vault id
113
112
az keyvault show \
114
113
--name $key_vault_name \
115
-
--resource-group test-rg \
114
+
--resource-group resource-group \
116
115
--query 'id'
117
116
118
117
# Get the profile id
119
118
az network perimeter profile show \
120
119
--name network-perimeter-profile \
121
-
--resource-group test-rg \
120
+
--resource-group resource-group \
122
121
--perimeter-name network-security-perimeter
123
122
124
123
# Associate the Azure Key Vault with the network security perimeter profile
125
124
# Replace <PaaSArmId> and <networkSecurityPerimeterProfileId> with the ID values for your key vault and profile
## Create and update network security perimeter access rules
149
-
150
-
In this step, you create and update network security perimeter access rules with public IP address prefixes using the `az network perimeter profile access-rule create` command.
149
+
In this step, you create, update, and delete a network security perimeter access rules with public IP address prefixes using the `az network perimeter profile access-rule` command.
151
150
152
151
1. Create an inbound access rule with a public IP address prefix for the profile created with the following command:
153
152
@@ -158,7 +157,7 @@ In this step, you create and update network security perimeter access rules with
158
157
--name access-rule \
159
158
--profile-name network-perimeter-profile \
160
159
--perimeter-name network-security-perimeter \
161
-
--resource-group test-rg \
160
+
--resource-group resource-group \
162
161
--address-prefixes "[192.0.2.0/24]"
163
162
164
163
```
@@ -172,11 +171,21 @@ In this step, you create and update network security perimeter access rules with
Copy file name to clipboardExpand all lines: articles/private-link/create-network-security-perimeter-powershell.md
+32-12Lines changed: 32 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,13 +5,13 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: quickstart
8
-
ms.date: 11/04/2024
8
+
ms.date: 11/06/2024
9
9
#CustomerIntent: As a network administrator, I want to create a network security perimeter for an Azure resource using Azure PowerShell, so that I can control the network traffic to and from the resource.
10
10
---
11
11
12
12
# Quickstart: Create a network security perimeter - Azure PowerShell
13
13
14
-
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure PowerShell. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. Next, You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
14
+
Get started with network security perimeter by creating a network security perimeter for an Azure key vault using Azure PowerShell. A [network security perimeter](network-security-perimeter-concepts.md) allows [Azure Platform as a Service (PaaS)](./network-security-perimeter-concepts.md#onboarded-private-link-resources) resources to communicate within an explicit trusted boundary. You create and update a PaaS resource's association in a network security perimeter profile. Then you create and update network security perimeter access rules. When you're finished, you delete all resources created in this quickstart.
* [Install the latest version of the Az PowerShell module](/powershell/azure/install-azure-powershell).
39
-
* Connect to your Azure account using the
45
+
> [!NOTE]
46
+
> The preview version of the Az.Network module is required to use network security perimeter capabilities. The latest version of the Az.Network module is available in the PowerShell Gallery. Look for the newest version that ends in `-preview`.
47
+
48
+
- If you choose to use Azure PowerShell locally:
49
+
- [Install the latest version of the Az PowerShell module](/powershell/azure/install-azure-powershell).
To delete a network security perimeter, use the following commands:
210
+
When you no longer need the network security perimeter, remove all resources associated with the network security perimeter, remove the perimeter, and then remove the resource group.
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-concepts.md
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,20 +51,20 @@ When creating a network security perimeter, you can specify the following proper
51
51
|**Property**|**Description**|
52
52
|------------------|-------------|
53
53
|**Name**| A unique name within the resource group. |
54
-
|**Location**|Supported regions. |
54
+
|**Location**|A supported Azure region where the resource is located. |
55
55
|**Resource group name**| Name of the resource group where the network security perimeter should be present. |
56
56
57
57
## Access modes in network security perimeter
58
58
59
-
Administrators add PaaS resources to a perimeter by creating resource associations. These associations offer different access modes for PaaS resources. The access modes are:
59
+
Administrators add PaaS resources to a perimeter by creating resource associations. These associations can be made in two access modes. The access modes are:
60
60
61
61
|**Mode**|**Description**|
62
62
|----------------|--------|
63
63
|**Learning mode**| - Default access mode.</br>- Helps network administrators to understand the existing access patterns of their PaaS resources.</br>- Advised mode of use before transitioning to enforced mode.|
64
64
|**Enforced mode**| - Must be set by the administrator.</br>- By default, all traffic except intra perimeter traffic is denied in this mode unless an *Allow* access rule exists. |
65
65
66
66
67
-
Learn more on transitioning from learning mode to enforced mode in [transitioning to a network security perimeter](network-security-perimeter-transition.md) article.
67
+
Learn more on transitioning from learning mode to enforced mode in [Transitioning to a network security perimeter](network-security-perimeter-transition.md) article.
68
68
69
69
## Why use Network Security Perimeter?
70
70
@@ -86,7 +86,6 @@ Access rules can be used to approve public inbound and outbound traffic outside
86
86
87
87
For example, when creating a network security perimeter and associating a set of PaaS resources, like Azure Key Vault and SQL DB, with the perimeter, all incoming and outgoing public traffic is denied to these PaaS resources by default. To allow any access outside the perimeter, necessary access rules can be created. Within the same perimeter, profiles can also be created to group PaaS resources with similar set of inbound and outbound access requirements.
88
88
89
-
90
89
## Onboarded private link resources
91
90
A network security perimeter-aware private link resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded private link resources are as follows:
0 commit comments