You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/create-virtual-network-manager-template.md
+1-4Lines changed: 1 addition & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,10 +77,7 @@ The template defines multiple Azure resources:
77
77
:::image type="content" source="media/create-virtual-network-manager-template/template-resources.png" alt-text="Screenshot of all deployed resources in Azure portal.":::
78
78
79
79
1. Select the **avnm-EastUS** resource.
80
-
1. In the **Network Groups** page, select **Settings>NetworkGroups>ng-EastUS-static**.
81
-
82
-
:::image type="content" source="media/create-virtual-network-manager-template/static-network-group.png" alt-text="Screenshot of deployed network groups in Azure portal.":::
83
-
80
+
1. In the **Network Groups** page, select **Settings** > **NetworkGroups** > **ng-EastUS-static**.
84
81
1. On the **ng-EastUS-static** page, select **Settings>Group Members** and verify a set of virtual networks are deployed.
85
82
86
83
:::image type="content" source="media/create-virtual-network-manager-template/mesh-group-members.png" alt-text="Screenshot of static members in network group for a static topology deployment.":::
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/how-to-block-network-traffic-portal.md
+1-22Lines changed: 1 addition & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,24 +26,12 @@ Before you start to configure security admin rules, confirm that you've done the
26
26
1. Select **Security configuration** from the drop-down menu.
27
27
1. On the **Basics** tab, enter a *Name* to identify this security configuration and select **Next: Rule collections**.
28
28
29
-
:::image type="content" source="./media/how-to-block-network-traffic-portal/security-configuration-name.png" alt-text="Screenshot of security configuration name field.":::
30
-
31
-
## Add a rule collection
29
+
## Add a rule collection and security rule
32
30
33
31
1. Enter a *Name* to identify this rule collection and then select the *Target network groups* you want to apply the set of rules to.
34
-
35
-
:::image type="content" source="./media/how-to-block-network-traffic-portal/rule-collection-target.png" alt-text="Screenshot of rule collection name and target network groups.":::
36
-
37
-
## Add a security rule
38
-
39
32
1. Select **+ Add** from the *Add a rule collection page*.
40
-
41
-
:::image type="content" source="./media/how-to-block-network-traffic-portal/add-rule-button.png" alt-text="Screenshot of add a rule button.":::
42
-
43
33
1. Enter or select the following information, then select **Add** to add the rule to the rule collection.
44
34
45
-
:::image type="content" source="./media/how-to-block-network-traffic-portal/add-rule.png" alt-text="Screenshot of add a rule page.":::
46
-
47
35
| Setting | Value |
48
36
| ------- | ----- |
49
37
| Name | Enter the name **Deny_RDP** for the rule name. |
@@ -66,9 +54,6 @@ Before you start to configure security admin rules, confirm that you've done the
66
54
1. Repeat steps 1-3 again if you want to add more rules to the rule collection.
67
55
68
56
1. Once you're satisfied with all the rules you wanted to create, select **Add** to add the rule collection to the security admin configuration.
69
-
70
-
:::image type="content" source="./media/how-to-block-network-traffic-portal/save-rule-collection.png" alt-text="Screenshot of a rule collection.":::
71
-
72
57
1. Then select **Review + Create** and **Create** to complete the security configuration.
73
58
74
59
@@ -77,13 +62,7 @@ Before you start to configure security admin rules, confirm that you've done the
77
62
If you just created a new security admin configuration, make sure to deploy this configuration to apply to virtual networks in the network group.
78
63
79
64
1. Select **Deployments** under *Settings*, then select **Deploy configuration**.
80
-
81
-
:::image type="content" source="./media/how-to-block-network-traffic-portal/deploy-configuration.png" alt-text="Screenshot of deploy a configuration button.":::
82
-
83
65
1. Select the **Include security admin in your goal state** checkbox and choose the security configuration you created in the last section from the dropdown menu. Then choose the region(s) you would like to deploy this configuration to.
84
-
85
-
:::image type="content" source="./media/how-to-block-network-traffic-portal/deploy-security-configuration.png" alt-text="Screenshot of deploy a security configuration page.":::
86
-
87
66
1. Select **Next** and **Deploy** to deploy the security admin configuration.
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/how-to-configure-cross-tenant-portal.md
+1-12Lines changed: 1 addition & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,12 +37,10 @@ In this task, you set up a scope connection to add a subscription from a target
37
37
1. Log in to the Azure portal on the central management tenant.
38
38
1. Search for **Virtual network managers** and select your network manager from the list.
39
39
1. Under **Settings**, select **Cross-tenant connections**, and then select **Create cross-tenant connection**.
40
-
41
-
:::image type="content" source="media/how-to-configure-cross-tenant-portal/create-cross-tenant-connection.png" alt-text="Screenshot of cross-tenant connections in a network manager.":::
42
-
43
40
1. On the **Create a connection** page, enter the connection name and target tenant information, and then select **Create**.
44
41
45
42
:::image type="content" source="media/how-to-configure-cross-tenant-portal/create-connection-settings.png" alt-text="Screenshot of settings entered to create a connection.":::
43
+
46
44
1. Verify that the scope connection is listed under **Cross-tenant connections** and the status is **Pending**.
47
45
48
46
## Create a network manager connection on a subscription in another tenant
@@ -51,13 +49,7 @@ After you create the scope connection, switch to the target managed tenant. Conn
51
49
52
50
1. In the target tenant, search for **Virtual network manager** and select **Virtual Network Managers**.
53
51
1. Under **Virtual Network Manager**, select **Cross-tenant connections**.
54
-
55
-
:::image type="content" source="media/how-to-configure-cross-tenant-portal/virtual-network-manager-overview.png" alt-text="Screenshot of network managers in Virtual Network Manager on a target tenant.":::
56
-
57
52
1. Select **+ Create** or **Create a connection**.
58
-
59
-
:::image type="content" source="media/how-to-configure-cross-tenant-portal/create-connection-target.png" alt-text="Screenshot of the pane for cross-tenant connections.":::
60
-
61
53
1. On the **Create a connection** page, enter the information for your central management tenant, and then select **Create**.
62
54
63
55
:::image type="content" source="media/how-to-configure-cross-tenant-portal/create-connection-settings-target.png" alt-text="Screenshot of settings for creating a cross-tenant connection.":::
@@ -81,9 +73,6 @@ Now, add virtual networks from both tenants into a network group for static memb
81
73
1. From your network manager, add a network group if needed.
82
74
1. Select your network group, and then select **Add virtual networks** under **Manually add members**.
83
75
1. On the **Manually add members** page, select **Tenant:...** next to the search box, select the linked tenant from the list, and then select **Apply**.
84
-
85
-
:::image type="content" source="media/how-to-configure-cross-tenant-portal/select-target-tenant-network-group.png" alt-text="Screenshot of available tenants to choose for static network group membership.":::
86
-
87
76
1. To view the available virtual networks from the target managed tenant, select **Authenticate** and proceed through the authentication process. If you have multiple Azure accounts, select the one you're currently signed in with that has permissions to the target managed tenant.
88
77
1. Select the virtual networks to include in the network group, and then select **Add**.
0 commit comments