Skip to content

Commit 325b26d

Browse files
committed
docs: Replace Bastion deployment with NSG and Bastion note
1 parent 355b37d commit 325b26d

1 file changed

Lines changed: 10 additions & 27 deletions

File tree

articles/application-gateway/quick-create-cli.md

Lines changed: 10 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: application-gateway
66
author: mbender-ms
77
ms.service: azure-application-gateway
88
ms.topic: quickstart
9-
ms.date: 07/11/2025
9+
ms.date: 02/25/2026
1010
ms.author: mbender
1111
ms.custom:
1212
- mvc
@@ -69,44 +69,26 @@ az network vnet subnet create \
6969
--resource-group myResourceGroupAG \
7070
--vnet-name myVNet \
7171
--address-prefix 10.21.1.0/24
72-
az network vnet subnet create \
73-
--name AzureBastionSubnet \
74-
--resource-group myResourceGroupAG \
75-
--vnet-name myVNet \
76-
--address-prefix 10.21.2.0/24
7772
az network public-ip create \
7873
--resource-group myResourceGroupAG \
7974
--name myAGPublicIPAddress \
8075
--allocation-method Static \
8176
--sku Standard
8277
```
8378

84-
## Deploy Azure Bastion
85-
86-
Azure Bastion uses your browser to connect to VMs in your virtual network over secure shell (SSH) or remote desktop protocol (RDP) by using their private IP addresses. The VMs don't need public IP addresses, client software, or special configuration. For more information about Azure Bastion, see [Azure Bastion](/azure/bastion/bastion-overview).
79+
## Create a network security group
8780

88-
>[!NOTE]
89-
>[!INCLUDE [Pricing](~/reusable-content/ce-skilling/azure/includes/bastion-pricing.md)]
90-
91-
Create a public IP address for the Azure Bastion host with `az network public-ip create`. Then create the Azure Bastion host with `az network bastion create`.
81+
Create a network security group with [az network nsg create](/cli/azure/network/nsg#az-network-nsg-create). The default rules in the network security group block all inbound access from the internet.
9282

9383
```azurecli-interactive
94-
az network public-ip create \
95-
--resource-group myResourceGroupAG \
96-
--name myBastionIP \
97-
--location eastus \
98-
--allocation-method Static \
99-
--sku Standard
100-
az network bastion create \
84+
az network nsg create \
10185
--resource-group myResourceGroupAG \
102-
--name myBastionHost \
103-
--vnet-name myVNet \
104-
--public-ip-address myBastionIP \
105-
--location eastus \
106-
--sku Basic \
107-
--no-wait
86+
--name myNSG
10887
```
10988

89+
> [!NOTE]
90+
> The default rules of the network security group block all inbound access from the internet, including SSH. To connect to the virtual machine, use Azure Bastion. For more information, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
91+
11092
## Create the backend servers
11193

11294
A backend can have NICs, virtual machine scale sets, public IP addresses, internal IP addresses, fully qualified domain names (FQDN), and multitenant backends like Azure App Service. In this example, you create two virtual machines to use as backend servers for the application gateway. You also install NGINX on the virtual machines to test the application gateway.
@@ -168,7 +150,8 @@ for i in `seq 1 2`; do
168150
--resource-group myResourceGroupAG \
169151
--name myNic$i \
170152
--vnet-name myVNet \
171-
--subnet myBackendSubnet
153+
--subnet myBackendSubnet \
154+
--network-security-group myNSG
172155
az vm create \
173156
--resource-group myResourceGroupAG \
174157
--name myVM$i \

0 commit comments

Comments
 (0)