Skip to content

Commit f6915ed

Browse files
committed
acrolinx
1 parent 7ae51a7 commit f6915ed

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

articles/virtual-network/application-security-groups.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Azure Application Security Groups Overview
33
titlesuffix: Azure Virtual Network
4-
description: Learn how application security groups in Azure Virtual Network enable you to configure network security policies, group virtual machines, and simplify network management at scale.
4+
description: Learn how application security groups enable you to configure network security policies and group virtual machines.
55
author: asudbring
66
ms.service: azure-virtual-network
77
ms.topic: concept-article
@@ -22,25 +22,25 @@ In the previous picture, *NIC1* and *NIC2* are members of the *AsgWeb* applicati
2222

2323
This rule is needed to allow traffic from the internet to the web servers. Because inbound traffic from the internet is denied by the **DenyAllInbound** default security rule, no extra rule is needed for the *AsgLogic* or *AsgDb* application security groups.
2424

25-
|Priority|Source|Source ports| Destination | Destination ports | Protocol | Access |
26-
|---|---|---|---|---|---|---|
27-
| 100 | Internet | * | AsgWeb | 80 | TCP | Allow |
25+
| Priority | Source | Source ports | Destination | Destination ports | Protocol | Access |
26+
|----------|----------|--------------|-------------|-------------------|----------|--------|
27+
| 100 | Internet | * | AsgWeb | 80 | TCP | Allow |
2828

2929
## Deny-Database-All
3030

3131
Because the **AllowVNetInBound** default security rule allows all communication between resources in the same virtual network, you need this rule to deny traffic from all resources.
3232

33-
|Priority|Source|Source ports| Destination | Destination ports | Protocol | Access |
34-
|---|---|---|---|---|---|---|
35-
| 120 | * | * | AsgDb | 1433 | Any | Deny |
33+
| Priority | Source | Source ports | Destination | Destination ports | Protocol | Access |
34+
|----------|--------|--------------|-------------|-------------------|----------|--------|
35+
| 120 | * | * | AsgDb | 1433 | Any | Deny |
3636

3737
## Allow-Database-BusinessLogic
3838

3939
This rule allows traffic from the *AsgLogic* application security group to the *AsgDb* application security group. The priority for this rule is higher than the priority for the *Deny-Database-All* rule. As a result, this rule is processed before the *Deny-Database-All* rule, so traffic from the *AsgLogic* application security group is allowed, whereas all other traffic is blocked.
4040

41-
|Priority|Source|Source ports| Destination | Destination ports | Protocol | Access |
42-
|---|---|---|---|---|---|---|
43-
| 110 | AsgLogic | * | AsgDb | 1433 | TCP | Allow |
41+
| Priority | Source | Source ports | Destination | Destination ports | Protocol | Access |
42+
|----------|----------|--------------|-------------|-------------------|----------|--------|
43+
| 110 | AsgLogic | * | AsgDb | 1433 | TCP | Allow |
4444

4545
Network interfaces that are members of the application security group apply the network security group rules that specify it as the source or destination. The network security group rules don't affect other network interfaces. If the network interface isn't a member of an application security group, the rule doesn't apply to the network interface, even though the network security group is associated to the subnet.
4646

0 commit comments

Comments
 (0)