Skip to content

Commit e50a410

Browse files
authored
Merge pull request #78584 from cherylmc/retire2
Retire2
2 parents 793b2ae + 8e2cd42 commit e50a410

9 files changed

+22
-3153
lines changed

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,26 @@
2020
"redirect_url": "https://docs.microsoft.com/previous-versions/azure/batch-ai/how-to-migrate",
2121
"redirect_document_id": true
2222
},
23+
{
24+
"source_path": "articles/best-practices-network-security.md",
25+
"redirect_url": "https://docs.microsoft.com/azure/architecture/vdc/networking-virtual-datacenter",
26+
"redirect_document_id": true
27+
},
28+
{
29+
"source_path": "articles/virtual-network/virtual-networks-dmz-nsg-asm.md",
30+
"redirect_url": "https://docs.microsoft.com/azure/architecture/vdc/networking-virtual-datacenter",
31+
"redirect_document_id": true
32+
},
33+
{
34+
"source_path": "articles/virtual-network/virtual-networks-dmz-nsg-fw-asm.md",
35+
"redirect_url": "https://docs.microsoft.com/azure/architecture/vdc/networking-virtual-datacenter",
36+
"redirect_document_id": true
37+
},
38+
{
39+
"source_path": "articles/virtual-network/virtual-networks-dmz-nsg-fw-udr-asm.md",
40+
"redirect_url": "https://docs.microsoft.com/azure/architecture/vdc/networking-virtual-datacenter",
41+
"redirect_document_id": true
42+
},
2343
{
2444
"source_path": "articles/batch-ai/migrate-to-new-api.md",
2545
"redirect_url": "https://docs.microsoft.com/previous-versions/azure/batch-ai/how-to-migrate",

articles/app-service/overview-security.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,6 @@ Alternatively, you can integrate your App Service app with [Azure Key Vault](/az
109109

110110
Except for the **Isolated** pricing tier, all tiers run your apps on the shared network infrastructure in App Service. For example, the public IP addresses and front-end load balancers are shared with other tenants. The **Isolated** tier gives you complete network isolation by running your apps inside a dedicated [App Service environment](environment/intro.md). An App Service environment runs in your own instance of [Azure Virtual Network](/azure/virtual-network/). It lets you:
111111

112-
- Restrict network access with [network security groups](../virtual-network/virtual-networks-dmz-nsg.md).
113112
- Serve your apps through a dedicated public endpoint, with dedicated front ends.
114113
- Serve internal application using an internal load balancer (ILB), which allows access only from inside your Azure Virtual Network. The ILB has an IP address from your private subnet, which provides total isolation of your apps from the internet.
115114
- [Use an ILB behind a web application firewall (WAF)](environment/integrate-with-application-gateway.md). The WAF offers enterprise-level protection to your public-facing applications, such as DDoS protection, URI filtering, and SQL injection prevention.

articles/best-practices-network-security.md

Lines changed: 0 additions & 551 deletions
This file was deleted.

articles/virtual-network/toc.yml

Lines changed: 1 addition & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -205,8 +205,6 @@
205205
href: virtual-network-scenario-udr-gw-nva.md
206206
- name: DMZ between Azure and the Internet
207207
href: ../guidance/guidance-iaas-ra-secure-vnet-dmz.md?toc=%2fazure%2fvirtual-network%2ftoc.json
208-
- name: Create a DMZ with NSGs
209-
href: virtual-networks-dmz-nsg.md
210208
- name: Configure
211209
items:
212210
- name: Name resolution for VMs and cloud services
@@ -331,14 +329,8 @@
331329
- name: Move VM to a different subnet
332330
href: virtual-networks-move-vm-role-to-subnet.md
333331
- name: Cloud service and network security
334-
href: ../best-practices-network-security.md?toc=%2fazure%2fvirtual-network%2ftoc.json
332+
href: https://docs.microsoft.com/azure/architecture/vdc/networking-virtual-datacenter
335333
items:
336-
- name: Create a DMZ with NSGs
337-
href: virtual-networks-dmz-nsg-asm.md
338-
- name: Create a DMZ with firewall and NSGs
339-
href: virtual-networks-dmz-nsg-fw-asm.md
340-
- name: DMZ with firewall, UDR, and NSGs
341-
href: virtual-networks-dmz-nsg-fw-udr-asm.md
342334
- name: Sample application
343335
href: virtual-networks-sample-app.md
344336
- name: Reference

articles/virtual-network/virtual-network-vnet-plan-design-arm.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ You can filter network traffic to and from resources in a virtual network using
7373
- If different VMs within a subnet need different security rules applied to them, you can associate the network interface in the VM to one or more application security groups. A security rule can specify an application security group in its source, destination, or both. That rule then only applies to the network interfaces that are members of the application security group. Learn more about [network security groups](security-overview.md) and [application security groups](security-overview.md#application-security-groups).
7474
- Azure creates several default security rules within each network security group. One default rule allows all traffic to flow between all resources in a virtual network. To override this behavior, use network security groups, custom routing to route traffic to an NVA, or both. It's recommended that you familiarize yourself with all of Azure's [default security rules](security-overview.md#default-security-rules) and understand how network security group rules are applied to a resource.
7575

76-
You can view sample designs for implementing a perimeter network (also known as a DMZ) between Azure and the internet using an [NVA](/azure/architecture/reference-architectures/dmz/secure-vnet-dmz?toc=%2Fazure%2Fvirtual-network%2Ftoc.json) or [network security groups](virtual-networks-dmz-nsg.md).
76+
You can view sample designs for implementing a perimeter network (also known as a DMZ) between Azure and the internet using an [NVA](/azure/architecture/reference-architectures/dmz/secure-vnet-dmz?toc=%2Fazure%2Fvirtual-network%2Ftoc.json).
7777

7878
### Traffic routing
7979

0 commit comments

Comments
 (0)