You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/create-ssl-portal.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: mbender-ms
6
6
ms.service: azure-application-gateway
7
7
ms.topic: tutorial
8
-
ms.date: 06/30/2022
8
+
ms.date: 02/26/2026
9
9
ms.author: mbender
10
10
ms.custom: sfi-image-nochange
11
11
#Customer intent: As an IT administrator, I want to use the Azure portal to configure Application Gateway with TLS termination so I can secure my application traffic.
@@ -197,9 +197,14 @@ To do this, you'll:
197
197
-**Virtual machine name**: Enter *myVM* for the name of the virtual machine.
198
198
-**Username**: Enter a name for the administrator user name.
199
199
-**Password**: Enter a password for the administrator account.
200
+
-**Public inbound ports**: Select **None**.
201
+
202
+
> [!NOTE]
203
+
> The default rules of the network security group block all inbound access from the internet, including RDP. To connect to the virtual machine, use Azure Bastion. For more information, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
204
+
200
205
1. Accept the other defaults and then select **Next: Disks**.
201
206
2. Accept the **Disks** tab defaults and then select **Next: Networking**.
202
-
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. Accept the other defaults and then select **Next: Management**.
207
+
3. On the **Networking** tab, verify that **myVNet** is selected for the **Virtual network** and the **Subnet** is set to **myBackendSubnet**. For **Public IP**, select **None**. Accept the other defaults and then select **Next: Management**.
203
208
204
209
Application Gateway can communicate with instances outside of the virtual network that it is in, but you need to ensure there's IP connectivity.
205
210
1. On the **Management** tab, set **Boot diagnostics** to **Disable**. Accept the other defaults and then select **Review + create**.
@@ -228,7 +233,7 @@ In this example, you install IIS on the virtual machines only to verify Azure cr
228
233
-Location <location>
229
234
```
230
235
231
-
3. Create a second virtual machine and install IIS by using the steps that you previously completed. Use *myVM2* for the virtual machine name and for the **VMName** setting of the **Set-AzVMExtension** cmdlet.
236
+
3. Create a second virtual machine and install IIS by using the steps that you previously completed. Use *myVM2* for the virtual machine name and for the **VMName** setting of the **Set-AzVMExtension** cmdlet. Set **Public inbound ports** to **None** and **Public IP** to **None** as you did for *myVM*.
0 commit comments