Skip to content

Commit ec04b94

Browse files
committed
edit pass: tutorial-hybrid-portal-ps
1 parent 602181a commit ec04b94

File tree

3 files changed

+64
-66
lines changed

3 files changed

+64
-66
lines changed

articles/firewall/tutorial-hybrid-portal.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ For this article, you create three virtual networks:
2121

2222
- **VNet-Hub**: The firewall is in this virtual network.
2323
- **VNet-Spoke**: The spoke virtual network represents the workload located on Azure.
24-
- **VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a VPN connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
24+
- **VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a Virtual Private Network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
2525

2626
![Diagram that shows a firewall in a hybrid network.](media/tutorial-hybrid-ps/hybrid-network-firewall.png)
2727

@@ -49,7 +49,7 @@ Azure Firewall must have direct internet connectivity. If your **AzureFirewallSu
4949
> [!NOTE]
5050
> You can configure Azure Firewall to support forced tunneling. For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
5151
52-
Traffic between directly peered virtual networks is routed directly, even if a UDR points to Azure Firewall as the default gateway. To send subnet to subnet traffic to the firewall in this scenario, a UDR must contain the target subnet network prefix explicitly on both subnets.
52+
Traffic between directly peered virtual networks is routed directly, even if a UDR points to Azure Firewall as the default gateway. To send subnet-to-subnet traffic to the firewall in this scenario, a UDR must contain the target subnet network prefix explicitly on both subnets.
5353

5454
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
5555

@@ -204,7 +204,7 @@ The hub and on-premises virtual networks are connected via VPN gateways.
204204

205205
### Create a VPN gateway for the hub virtual network
206206

207-
Create the VPN gateway for the hub virtual network. Network-to-network configurations require a route-based VPN type. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway's SKU.
207+
Create the VPN gateway for the hub virtual network. Network-to-network configurations require a route-based VPN type. Creating a VPN gateway can often take 45 minutes or more, depending on the SKU that you select.
208208

209209
1. From the Azure portal's home page, select **Create a resource**.
210210
1. In the search box, enter **virtual network gateway**.
@@ -222,7 +222,7 @@ Create the VPN gateway for the hub virtual network. Network-to-network configura
222222

223223
### Create a VPN gateway for the on-premises virtual network
224224

225-
Create the VPN gateway for the on-premises virtual network. Network-to-network configurations require a route-based VPN type. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway's SKU.
225+
Create the VPN gateway for the on-premises virtual network. Network-to-network configurations require a route-based VPN type. Creating a VPN gateway can often take 45 minutes or more, depending on the SKU that you select.
226226

227227
1. From the Azure portal's home page, select **Create a resource**.
228228
1. In the search box, enter **virtual network gateway**.
@@ -256,7 +256,7 @@ In the following steps, you create the connection from the hub virtual network t
256256
1. Select **Review + Create**.
257257
1. Select **Create**.
258258

259-
Create the virtual network connection between on-premises and the hub. The following steps are similar to the previous ones, except that you create the connection from **VNet-Onprem** to **VNet-Hub**. Make sure the shared keys match. The connection is established after a few minutes.
259+
Create the virtual network connection between on-premises and the hub. The following steps are similar to the previous ones, except that you create the connection from **VNet-Onprem** to **VNet-Hub**. Make sure that the shared keys match. The connection is established after a few minutes.
260260

261261
1. Open the **RG-fw-hybrid-test** resource group and select the **GW-Onprem** gateway.
262262
1. Select **Connections** in the left column.
@@ -376,7 +376,7 @@ Create the spoke workload and on-premises virtual machines, and place them in th
376376

377377
### Create the workload virtual machine
378378

379-
Create a virtual machine in the spoke virtual network that's running Internet Information Services (IIS) and has no public IP address:
379+
Create a virtual machine in the spoke virtual network that runs Internet Information Services (IIS) and has no public IP address:
380380

381381
1. From the Azure portal's home page, select **Create a resource**.
382382
1. Under **Popular Marketplace products**, select **Windows Server 2019 Datacenter**.
@@ -415,7 +415,7 @@ Create a virtual machine in the spoke virtual network that's running Internet In
415415

416416
### Create the on-premises virtual machine
417417

418-
Create a virtual machine that you use to connect via remote desktop to the public IP address. From there, you can connect to the spoke server through the firewall.
418+
Create a virtual machine that you use to connect via remote access to the public IP address. From there, you can connect to the spoke server through the firewall.
419419

420420
1. From the Azure portal's home page, select **Create a resource**.
421421
1. Under **Popular**, select **Windows Server 2019 Datacenter**.
@@ -448,7 +448,7 @@ Create a virtual machine that you use to connect via remote desktop to the publi
448448

449449
![Screenshot that shows the webpage for the spoke virtual machine.](media/tutorial-hybrid-portal/VM-Spoke-01-web.png)
450450

451-
1. From the **VM-Onprem** virtual machine, open a remote desktop connection to **VM-Spoke-01** at the private IP address.
451+
1. From the **VM-Onprem** virtual machine, open a remote access connection to **VM-Spoke-01** at the private IP address.
452452

453453
Your connection should succeed, and you should be able to sign in.
454454

@@ -465,7 +465,7 @@ Next, change the action for the collection of firewall network rules to **Deny**
465465
4. For **Action**, select **Deny**.
466466
5. Select **Save**.
467467

468-
Close any existing remote desktops before you test the changed rules. Now run the tests again. They should all fail this time.
468+
Close any existing remote access connections. Run the tests again to test the changed rules. They should all fail this time.
469469

470470
## Clean up resources
471471

0 commit comments

Comments
 (0)