Skip to content

Commit e5f2b0f

Browse files
authored
ANPTA - Update deploy-cli.md
Remove Reference to Google.com. Remove the public IPs being used for DNS servers. Customer will now be choosing their own external DNS servers This is part of the Copilot Knowledge Base updates.
1 parent a0c73e4 commit e5f2b0f

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/firewall/deploy-cli.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ In this article, you learn how to:
3535
* Set up a test network environment
3636
* Deploy a firewall
3737
* Create a default route
38-
* Configure an application rule to allow access to www.google.com
38+
* Configure an application rule to allow access to www.microsoft.com
3939
* Configure a network rule to allow access to external DNS servers
4040
* Test the firewall
4141

@@ -116,7 +116,7 @@ az network nic create \
116116
--vnet-name Test-FW-VN \
117117
--subnet Workload-SN \
118118
--public-ip-address "" \
119-
--dns-servers 209.244.0.3 209.244.0.4
119+
--dns-servers <replace with External DNS ip #1> <replace with External DNS ip #2>
120120
```
121121

122122
Now create the workload virtual machine.
@@ -203,16 +203,16 @@ az network vnet subnet update \
203203

204204
## Configure an application rule
205205

206-
The application rule allows outbound access to www.google.com.
206+
The application rule allows outbound access to www.microsoft.com.
207207

208208
```azurecli-interactive
209209
az network firewall application-rule create \
210210
--collection-name App-Coll01 \
211211
--firewall-name Test-FW01 \
212-
--name Allow-Google \
212+
--name Allow-Microsoft \
213213
--protocols Http=80 Https=443 \
214214
--resource-group Test-FW-RG \
215-
--target-fqdns www.google.com \
215+
--target-fqdns www.microsoft.com \
216216
--source-addresses 10.0.2.0/24 \
217217
--priority 200 \
218218
--action Allow
@@ -222,12 +222,12 @@ Azure Firewall includes a built-in rule collection for infrastructure FQDNs that
222222

223223
## Configure a network rule
224224

225-
The network rule allows outbound access to two IP addresses at port 53 (DNS).
225+
The network rule allows outbound access to two public DNS IP addresses of your choosing at port 53 (DNS).
226226

227227
```azurecli-interactive
228228
az network firewall network-rule create \
229229
--collection-name Net-Coll01 \
230-
--destination-addresses 209.244.0.3 209.244.0.4 \
230+
--destination-addresses <replace with DNS ip #1> <replace with DNS ip #2> \
231231
--destination-ports 53 \
232232
--firewall-name Test-FW01 \
233233
--name Allow-DNS \
@@ -264,14 +264,14 @@ Now, test the firewall to confirm that it works as expected.
264264
1. Run the following commands:
265265

266266
```
267-
Invoke-WebRequest -Uri https://www.google.com
268-
Invoke-WebRequest -Uri https://www.google.com
269-
270267
Invoke-WebRequest -Uri https://www.microsoft.com
271268
Invoke-WebRequest -Uri https://www.microsoft.com
269+
270+
Invoke-WebRequest -Uri <Replace with external website>
271+
Invoke-WebRequest -Uri <Replace with external website>
272272
```
273273

274-
The `www.google.com` requests should succeed, and the `www.microsoft.com` requests should fail. This demonstrates that your firewall rules are operating as expected.
274+
The `www.microsoft.com` requests should succeed, and the other `External Website` requests should fail. This demonstrates that your firewall rules are operating as expected.
275275

276276
So now you've verified that the firewall rules are working:
277277

0 commit comments

Comments
 (0)