You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/tutorial-hybrid-portal.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ For this article, you create three virtual networks:
21
21
22
22
-**VNet-Hub**: The firewall is in this virtual network.
23
23
-**VNet-Spoke**: The spoke virtual network represents the workload located on Azure.
24
-
-**VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a VPN connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
24
+
-**VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a Virtual Private Network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
25
25
26
26

27
27
@@ -49,7 +49,7 @@ Azure Firewall must have direct internet connectivity. If your **AzureFirewallSu
49
49
> [!NOTE]
50
50
> You can configure Azure Firewall to support forced tunneling. For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
51
51
52
-
Traffic between directly peered virtual networks is routed directly, even if a UDR points to Azure Firewall as the default gateway. To send subnet to subnet traffic to the firewall in this scenario, a UDR must contain the target subnet network prefix explicitly on both subnets.
52
+
Traffic between directly peered virtual networks is routed directly, even if a UDR points to Azure Firewall as the default gateway. To send subnet-to-subnet traffic to the firewall in this scenario, a UDR must contain the target subnet network prefix explicitly on both subnets.
53
53
54
54
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
55
55
@@ -204,7 +204,7 @@ The hub and on-premises virtual networks are connected via VPN gateways.
204
204
205
205
### Create a VPN gateway for the hub virtual network
206
206
207
-
Create the VPN gateway for the hub virtual network. Network-to-network configurations require a route-based VPN type. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway's SKU.
207
+
Create the VPN gateway for the hub virtual network. Network-to-network configurations require a route-based VPN type. Creating a VPN gateway can often take 45 minutes or more, depending on the SKU that you select.
208
208
209
209
1. From the Azure portal's home page, select **Create a resource**.
210
210
1. In the search box, enter **virtual network gateway**.
@@ -222,7 +222,7 @@ Create the VPN gateway for the hub virtual network. Network-to-network configura
222
222
223
223
### Create a VPN gateway for the on-premises virtual network
224
224
225
-
Create the VPN gateway for the on-premises virtual network. Network-to-network configurations require a route-based VPN type. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway's SKU.
225
+
Create the VPN gateway for the on-premises virtual network. Network-to-network configurations require a route-based VPN type. Creating a VPN gateway can often take 45 minutes or more, depending on the SKU that you select.
226
226
227
227
1. From the Azure portal's home page, select **Create a resource**.
228
228
1. In the search box, enter **virtual network gateway**.
@@ -256,7 +256,7 @@ In the following steps, you create the connection from the hub virtual network t
256
256
1. Select **Review + Create**.
257
257
1. Select **Create**.
258
258
259
-
Create the virtual network connection between on-premises and the hub. The following steps are similar to the previous ones, except that you create the connection from **VNet-Onprem** to **VNet-Hub**. Make sure the shared keys match. The connection is established after a few minutes.
259
+
Create the virtual network connection between on-premises and the hub. The following steps are similar to the previous ones, except that you create the connection from **VNet-Onprem** to **VNet-Hub**. Make sure that the shared keys match. The connection is established after a few minutes.
260
260
261
261
1. Open the **RG-fw-hybrid-test** resource group and select the **GW-Onprem** gateway.
262
262
1. Select **Connections** in the left column.
@@ -376,7 +376,7 @@ Create the spoke workload and on-premises virtual machines, and place them in th
376
376
377
377
### Create the workload virtual machine
378
378
379
-
Create a virtual machine in the spoke virtual network that's running Internet Information Services (IIS) and has no public IP address:
379
+
Create a virtual machine in the spoke virtual network that runs Internet Information Services (IIS) and has no public IP address:
380
380
381
381
1. From the Azure portal's home page, select **Create a resource**.
382
382
1. Under **Popular Marketplace products**, select **Windows Server 2019 Datacenter**.
@@ -415,7 +415,7 @@ Create a virtual machine in the spoke virtual network that's running Internet In
415
415
416
416
### Create the on-premises virtual machine
417
417
418
-
Create a virtual machine that you use to connect via remote desktop to the public IP address. From there, you can connect to the spoke server through the firewall.
418
+
Create a virtual machine that you use to connect via remote access to the public IP address. From there, you can connect to the spoke server through the firewall.
419
419
420
420
1. From the Azure portal's home page, select **Create a resource**.
421
421
1. Under **Popular**, select **Windows Server 2019 Datacenter**.
@@ -448,7 +448,7 @@ Create a virtual machine that you use to connect via remote desktop to the publi
448
448
449
449

450
450
451
-
1. From the **VM-Onprem** virtual machine, open a remote desktop connection to **VM-Spoke-01** at the private IP address.
451
+
1. From the **VM-Onprem** virtual machine, open a remote access connection to **VM-Spoke-01** at the private IP address.
452
452
453
453
Your connection should succeed, and you should be able to sign in.
454
454
@@ -465,7 +465,7 @@ Next, change the action for the collection of firewall network rules to **Deny**
465
465
4. For **Action**, select **Deny**.
466
466
5. Select **Save**.
467
467
468
-
Close any existing remote desktops before you test the changed rules. Now run the tests again. They should all fail this time.
468
+
Close any existing remote access connections. Run the tests again to test the changed rules. They should all fail this time.
0 commit comments