Skip to content

Commit fc32ef0

Browse files
committed
edit pass: tutorial-hybrid-portal-ps
1 parent ec04b94 commit fc32ef0

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/firewall/tutorial-hybrid-portal.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ For this article, you create three virtual networks:
2121

2222
- **VNet-Hub**: The firewall is in this virtual network.
2323
- **VNet-Spoke**: The spoke virtual network represents the workload located on Azure.
24-
- **VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a Virtual Private Network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
24+
- **VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a virtual private network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
2525

2626
![Diagram that shows a firewall in a hybrid network.](media/tutorial-hybrid-ps/hybrid-network-firewall.png)
2727

@@ -58,7 +58,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
5858
First, create the resource group to contain the resources:
5959

6060
1. Sign in to the [Azure portal](https://portal.azure.com).
61-
1. On the Azure portal home page, select **Resource groups** > **Create**.
61+
1. On the Azure portal's home page, select **Resource groups** > **Create**.
6262
1. For **Subscription**, select your subscription.
6363
1. For **Resource group**, enter **RG-fw-hybrid-test**.
6464
1. For **Region**, select a region. All resources that you create later must be in the same region.
@@ -473,4 +473,4 @@ You can keep your firewall resources for further testing. If you no longer need
473473

474474
## Next steps
475475

476-
[Tutorial: Monitor Azure Firewall logs](./firewall-diagnostics.md)
476+
[Monitor Azure Firewall logs](./firewall-diagnostics.md)

articles/firewall/tutorial-hybrid-ps.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ For this article, you create three virtual networks:
2121

2222
- **VNet-Hub**: The firewall is in this virtual network.
2323
- **VNet-Spoke**: The spoke virtual network represents the workload located on Azure.
24-
- **VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a Virtual Private Network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
24+
- **VNet-Onprem**: The on-premises virtual network represents an on-premises network. In an actual deployment, you can connect to it by using either a virtual private network (VPN) connection or an Azure ExpressRoute connection. For simplicity, this article uses a VPN gateway connection, and an Azure-located virtual network represents an on-premises network.
2525

2626
![Diagram that shows a firewall in a hybrid network.](media/tutorial-hybrid-ps/hybrid-network-firewall.png)
2727

@@ -38,13 +38,13 @@ There are three key requirements for this scenario to work correctly:
3838
- A user-defined route (UDR) on the spoke subnet that points to the Azure Firewall IP address as the default gateway. Virtual network gateway route propagation must be *disabled* on this route table.
3939
- A UDR on the hub gateway subnet must point to the firewall IP address as the next hop to the spoke networks.
4040

41-
No UDR is required on the Azure Firewall subnet, because it learns routes from BGP.
41+
No UDR is required on the Azure Firewall subnet, because it learns routes from Border Gateway Protocol (BGP).
4242
- Be sure to set `AllowGatewayTransit` when you're peering **VNet-Hub** to **VNet-Spoke**. Set `UseRemoteGateways` when you're peering **VNet-Spoke** to **VNet-Hub**.
4343

4444
The [Create the routes](#create-the-routes) section later in this article shows how to create these routes.
4545

4646
>[!NOTE]
47-
>Azure Firewall must have direct internet connectivity. If your **AzureFirewallSubnet** subnet learns a default route to your on-premises network via Border Gateway Protocol (BGP), you must configure Azure Firewall in forced tunneling mode. If this is an existing Azure Firewall instance that can't be reconfigured in forced tunneling mode, we recommend that you add a 0.0.0.0/0 UDR on the **AzureFirewallSubnet** subnet with the `NextHopType` value set as `Internet` to maintain direct internet connectivity.
47+
>Azure Firewall must have direct internet connectivity. If your **AzureFirewallSubnet** subnet learns a default route to your on-premises network via BGP, you must configure Azure Firewall in forced tunneling mode. If this is an existing Azure Firewall instance that can't be reconfigured in forced tunneling mode, we recommend that you add a 0.0.0.0/0 UDR on the **AzureFirewallSubnet** subnet with the `NextHopType` value set as `Internet` to maintain direct internet connectivity.
4848
>
4949
>For more information, see [Azure Firewall forced tunneling](forced-tunneling.md).
5050
@@ -407,7 +407,7 @@ Set-AzVMExtension `
407407
-SettingString '{"commandToExecute":"powershell Add-WindowsFeature Web-Server"}' `
408408
-Location $Location1
409409
410-
#Create a host firewall rule to allow ping in
410+
#Create a host firewall rule to allow pings in
411411
Set-AzVMExtension `
412412
-ResourceGroupName $RG1 `
413413
-ExtensionName IIS `
@@ -458,7 +458,7 @@ Now that you've verified that the firewall rules are working, you can:
458458
- Browse to web server on the spoke virtual network.
459459
- Connect to the server on the spoke virtual network by using RDP.
460460

461-
Next, run the following script to change the collection action for the firewall network rules to `Deny`:
461+
Next, run the following script to change the action for the collection of firewall network rules to `Deny`:
462462

463463
```azurepowershell
464464
$rcNet = $azfw.GetNetworkRuleCollectionByName("RCNet01")
@@ -475,4 +475,4 @@ You can keep your firewall resources for the next tutorial. If you no longer nee
475475

476476
## Next steps
477477

478-
[Tutorial: Monitor Azure Firewall logs](./firewall-diagnostics.md)
478+
[Monitor Azure Firewall logs](./firewall-diagnostics.md)

0 commit comments

Comments
 (0)