You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall-manager/secure-cloud-network.md
+3-21Lines changed: 3 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall-manager
5
5
author: duau
6
6
ms.service: azure-firewall-manager
7
7
ms.topic: tutorial
8
-
ms.date: 01/22/2026
8
+
ms.date: 01/29/2026
9
9
ms.author: duau
10
10
ms.custom: sfi-image-nochange
11
11
---
@@ -366,34 +366,16 @@ So now you verified that the firewall application rule is working:
366
366
367
367
### Test the network rule
368
368
369
-
Now test the network rule by connecting from **Srv-Workload-01** to **Srv-Workload-02** using SSH and HTTP.
370
-
371
-
1. From the SSH session on **Srv-Workload-01**, note the private IP address of **Srv-Workload-02** (visible in the Azure portal under the VM's networking settings).
372
-
373
-
1. Test SSH connectivity to **Srv-Workload-02**:
374
-
375
-
```bash
376
-
ssh azureuser@<Srv-Workload-02-private-IP>
377
-
```
378
-
379
-
Type `yes` to accept the host key, then enter the connection. You may need to upload the private key for Srv-Workload-02 if using key-based authentication.
380
-
381
-
1. Exit the SSH session to Srv-Workload-02:
382
-
383
-
```bash
384
-
exit
385
-
```
369
+
Now test the network rule by connecting from **Srv-Workload-01** to **Srv-Workload-02** using HTTP.
386
370
387
371
1. Test HTTP connectivity to the Nginx web server on **Srv-Workload-02**:
388
372
389
373
```bash
390
374
curl http://<Srv-Workload-02-private-IP>
391
375
```
392
376
393
-
You should see the HTML content `<h1>Srv-workload-02</h1>`, confirming the network rule allows HTTP traffic between spokes.
377
+
You should see the status returned by the web server.
394
378
395
-
So now you verified that the firewall network rule is working:
396
-
* You can connect a remote desktop to a server located in another virtual network.
0 commit comments