Skip to content

Commit 25e2ad9

Browse files
committed
docs: Fix UI field labels in secure-hybrid-network tutorial
- Corrected 'architecture enters' to 'architecture types' - Fixed 'Rule collection enter' to 'Rule collection type' - Fixed 'Destination enter' to 'Destination type' - Fixed 'Gateway enter' to 'Gateway type' - Fixed 'Connection enter' to 'Connection type' - Fixed 'Security enter' to 'Security type' - Fixed 'Authentication enter' to 'Authentication Type' - Corrected VpnType references - All UI field names now match actual Azure portal labels
1 parent a1366ab commit 25e2ad9

1 file changed

Lines changed: 16 additions & 16 deletions

File tree

articles/firewall-manager/secure-hybrid-network.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ When you connect your on-premises network to an Azure virtual network to create
1818

1919
Using Azure Firewall Manager, you can create a hub virtual network to secure your hybrid network traffic destined to private IP addresses, Azure PaaS, and the Internet. You can use Azure Firewall Manager to control network access in a hybrid network using policies that define allowed and denied network traffic.
2020

21-
Firewall Manager also supports a secured virtual hub architecture. For a comparison of the secured virtual hub and hub virtual network architecture enters, see [What are the Azure Firewall Manager architecture options?](vhubs-and-vnets.md)
21+
Firewall Manager also supports a secured virtual hub architecture. For a comparison of the secured virtual hub and hub virtual network architecture types, see [What are the Azure Firewall Manager architecture options?](vhubs-and-vnets.md)
2222

2323
For this tutorial, you create three virtual networks:
2424

@@ -94,7 +94,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
9494

9595
1. For **Name**, enter **RCNet01**.
9696

97-
1. For **Rule collection enter**, select **Network**.
97+
1. For **Rule collection type**, select **Network**.
9898

9999
1. For **Priority**, enter **100**.
100100

@@ -110,7 +110,7 @@ If you don't have an Azure subscription, create a [free account](https://azure.m
110110

111111
1. For **Destination Ports**, enter **80**.
112112

113-
1. For **Destination enter**, select **IP Address**.
113+
1. For **Destination Type**, select **IP Address**.
114114

115115
1. For **Destination**, enter **10.6.0.0/16**.
116116

@@ -320,7 +320,7 @@ The hub and on-premises virtual networks are connected via VPN gateways.
320320
### Create a VPN gateway for the hub virtual network
321321

322322

323-
Now create the VPN gateway for the hub virtual network. Network-to-network configurations require a RouteBased Vpnenter. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway SKU.
323+
Now create the VPN gateway for the hub virtual network. Network-to-network configurations require a RouteBased VpnType. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway SKU.
324324

325325

326326
1. In the search box at the top of the portal, enter **virtual network gateway**. Select **Virtual network gateways** in the search results.
@@ -331,7 +331,7 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
331331

332332
1. For **Region**, select **(US) East US**.
333333

334-
1. For **Gateway enter**, select **VPN**.
334+
1. For **Gateway type**, select **VPN**.
335335

336336
1. For **SKU**, select **VpnGw2**.
337337

@@ -351,7 +351,7 @@ Now create the VPN gateway for the hub virtual network. Network-to-network confi
351351
### Create a VPN gateway for the on-premises virtual network
352352

353353

354-
Now create the VPN gateway for the on-premises virtual network. Network-to-network configurations require a RouteBased Vpnenter. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway SKU.
354+
Now create the VPN gateway for the on-premises virtual network. Network-to-network configurations require a RouteBased VpnType. Creating a VPN gateway can often take 45 minutes or more, depending on the selected VPN gateway SKU.
355355

356356

357357
1. In the search box at the top of the portal, enter **virtual network gateway**. Select **Virtual network gateways** in the search results.
@@ -362,7 +362,7 @@ Now create the VPN gateway for the on-premises virtual network. Network-to-netwo
362362

363363
1. For **Region**, select **(US) East US**.
364364

365-
1. For **Gateway enter**, select **VPN**.
365+
1. For **Gateway type**, select **VPN**.
366366

367367
1. For **SKU**, select **VpnGw2**.
368368

@@ -395,7 +395,7 @@ In this step, you create the connection from the hub virtual network to the on-p
395395

396396
1. For the connection name, enter **Hub-to-Onprem**.
397397

398-
1. Select **VNet-to-VNet** for **Connection enter**.
398+
1. Select **VNet-to-VNet** for **Connection type**.
399399

400400
1. Select **Next : Settings**.
401401

@@ -420,7 +420,7 @@ Create the on-premises to hub virtual network connection. This step is similar t
420420

421421
1. For the connection name, enter **Onprem-to-Hub**.
422422

423-
1. Select **VNet-to-VNet** for **Connection enter**.
423+
1. Select **VNet-to-VNet** for **Connection type**.
424424

425425
1. Select **Next : Settings**.
426426

@@ -523,11 +523,11 @@ Next, create a couple routes:
523523

524524
1. For the route name, enter **ToSpoke**.
525525

526-
1. For **Destination enter**, select **IP addresses**.
526+
1. For **Destination type**, select **IP addresses**.
527527

528528
1. For **Destination IP addresses/CIDR ranges**, enter **10.6.0.0/16**.
529529

530-
1. For next hop enter, select **Virtual appliance**.
530+
1. For next hop type, select **Virtual appliance**.
531531

532532
1. For next hop address, enter the firewall's private IP address that you noted earlier.
533533

@@ -577,11 +577,11 @@ Now create the default route from the spoke subnet.
577577

578578
1. For the route name, enter **ToHub**.
579579

580-
1. For **Destination enter**, select **IP addresses**
580+
1. For **Destination type**, select **IP addresses**
581581

582582
1. For **Destination IP addresses/CIDR ranges**, enter **0.0.0.0/0**.
583583

584-
1. For next hop enter, select **Virtual appliance**.
584+
1. For next hop type, select **Virtual appliance**.
585585

586586
1. For next hop address, enter the firewall's private IP address that you noted earlier.
587587

@@ -630,7 +630,7 @@ Create a virtual machine in the spoke virtual network with a web server, with no
630630
| Virtual machine name | Enter **VM-Spoke-01**. |
631631
| Region | Select **East US**. |
632632
| Availability options | Select **No infrastructure redundancy required**. |
633-
| Security enter | Select **Standard**. |
633+
| Security type | Select **Standard**. |
634634
| Image | Select **Ubuntu Server 24.04 LTS -x64 Gen2** |
635635
| Size | Select a size for the virtual machine. |
636636
| **Administrator account** | |
@@ -707,7 +707,7 @@ This is a virtual machine that you use to connect through Azure Bastion to test
707707
| Virtual machine name | Enter **VM-Onprem**. |
708708
| Region | Select **East US**. |
709709
| Availability options | Select **No infrastructure redundancy required**. |
710-
| Security enter | Select **Standard**. |
710+
| Security type | Select **Standard**. |
711711
| Image | Select **Ubuntu Server 24.04 LTS -x64 Gen2** |
712712
| Size | Select a size for the virtual machine. |
713713
| **Administrator account** | |
@@ -744,7 +744,7 @@ Now, test the firewall to confirm that it works as expected.
744744
1. Connect to **VM-Onprem** virtual machine using Azure Bastion and the SSH key you downloaded:
745745
- From the Azure portal, select the **VM-Onprem** virtual machine.
746746
- Select **Connect** > **Connect** > **Connect via Bastion**.
747-
- For **Authentication enter**, select **SSH Private Key from Local File**.
747+
- For **Authentication Type**, select **SSH Private Key from Local File**.
748748
- For **Username**, enter **azureuser**.
749749
- For **Local File**, select **Upload a file** and browse to the **VM-Onprem_key.pem** file you downloaded earlier.
750750
- Select **Connect**.

0 commit comments

Comments
 (0)