You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall-manager/secure-hybrid-network.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ When you connect your on-premises network to an Azure virtual network to create
18
18
19
19
Using Azure Firewall Manager, you can create a hub virtual network to secure your hybrid network traffic destined to private IP addresses, Azure PaaS, and the Internet. You can use Azure Firewall Manager to control network access in a hybrid network using policies that define allowed and denied network traffic.
20
20
21
-
Firewall Manager also supports a secured virtual hub architecture. For a comparison of the secured virtual hub and hub virtual network architecture enters, see [What are the Azure Firewall Manager architecture options?](vhubs-and-vnets.md)
21
+
Firewall Manager also supports a secured virtual hub architecture. For a comparison of the secured virtual hub and hub virtual network architecture types, see [What are the Azure Firewall Manager architecture options?](vhubs-and-vnets.md)
22
22
23
23
For this tutorial, you create three virtual networks:
24
24
@@ -94,7 +94,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
94
94
95
95
1. For **Name**, enter **RCNet01**.
96
96
97
-
1. For **Rule collection enter**, select **Network**.
97
+
1. For **Rule collection type**, select **Network**.
98
98
99
99
1. For **Priority**, enter **100**.
100
100
@@ -110,7 +110,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
110
110
111
111
1. For **Destination Ports**, enter **80**.
112
112
113
-
1. For **Destination enter**, select **IP Address**.
113
+
1. For **Destination Type**, select **IP Address**.
114
114
115
115
1. For **Destination**, enter **10.6.0.0/16**.
116
116
@@ -320,7 +320,7 @@ The hub and on-premises virtual networks are connected via VPN gateways.
320
320
### Create a VPN gateway for the hub virtual network
321
321
322
322
323
-
Now create the VPN gateway for the hub virtual network. Network-to-network configurations require a RouteBased Vpnenter. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway SKU.
323
+
Now create the VPN gateway for the hub virtual network. Network-to-network configurations require a RouteBased VpnType. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway SKU.
324
324
325
325
326
326
1. In the search box at the top of the portal, enter **virtual network gateway**. Select **Virtual network gateways** in the search results.
@@ -331,7 +331,7 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
331
331
332
332
1. For **Region**, select **(US) East US**.
333
333
334
-
1. For **Gateway enter**, select **VPN**.
334
+
1. For **Gateway type**, select **VPN**.
335
335
336
336
1. For **SKU**, select **VpnGw2**.
337
337
@@ -351,7 +351,7 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
351
351
### Create a VPN gateway for the on-premises virtual network
352
352
353
353
354
-
Now create the VPN gateway for the on-premises virtual network. Network-to-network configurations require a RouteBased Vpnenter. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway SKU.
354
+
Now create the VPN gateway for the on-premises virtual network. Network-to-network configurations require a RouteBased VpnType. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway SKU.
355
355
356
356
357
357
1. In the search box at the top of the portal, enter **virtual network gateway**. Select **Virtual network gateways** in the search results.
@@ -362,7 +362,7 @@ Now create the VPN gateway for the on-premises virtual network. Network-to-netwo
362
362
363
363
1. For **Region**, select **(US) East US**.
364
364
365
-
1. For **Gateway enter**, select **VPN**.
365
+
1. For **Gateway type**, select **VPN**.
366
366
367
367
1. For **SKU**, select **VpnGw2**.
368
368
@@ -395,7 +395,7 @@ In this step, you create the connection from the hub virtual network to the on-p
395
395
396
396
1. For the connection name, enter **Hub-to-Onprem**.
397
397
398
-
1. Select **VNet-to-VNet** for **Connection enter**.
398
+
1. Select **VNet-to-VNet** for **Connection type**.
399
399
400
400
1. Select **Next : Settings**.
401
401
@@ -420,7 +420,7 @@ Create the on-premises to hub virtual network connection. This step is similar t
420
420
421
421
1. For the connection name, enter **Onprem-to-Hub**.
422
422
423
-
1. Select **VNet-to-VNet** for **Connection enter**.
423
+
1. Select **VNet-to-VNet** for **Connection type**.
424
424
425
425
1. Select **Next : Settings**.
426
426
@@ -523,11 +523,11 @@ Next, create a couple routes:
523
523
524
524
1. For the route name, enter **ToSpoke**.
525
525
526
-
1. For **Destination enter**, select **IP addresses**.
526
+
1. For **Destination type**, select **IP addresses**.
527
527
528
528
1. For **Destination IP addresses/CIDR ranges**, enter **10.6.0.0/16**.
529
529
530
-
1. For next hop enter, select **Virtual appliance**.
530
+
1. For next hop type, select **Virtual appliance**.
531
531
532
532
1. For next hop address, enter the firewall's private IP address that you noted earlier.
533
533
@@ -577,11 +577,11 @@ Now create the default route from the spoke subnet.
577
577
578
578
1. For the route name, enter **ToHub**.
579
579
580
-
1. For **Destination enter**, select **IP addresses**
580
+
1. For **Destination type**, select **IP addresses**
581
581
582
582
1. For **Destination IP addresses/CIDR ranges**, enter **0.0.0.0/0**.
583
583
584
-
1. For next hop enter, select **Virtual appliance**.
584
+
1. For next hop type, select **Virtual appliance**.
585
585
586
586
1. For next hop address, enter the firewall's private IP address that you noted earlier.
587
587
@@ -630,7 +630,7 @@ Create a virtual machine in the spoke virtual network with a web server, with no
0 commit comments