You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/tutorial-filter-network-traffic.md
-30Lines changed: 0 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -357,13 +357,6 @@ az network vnet subnet update \
357
357
358
358
1. Select **Add**.
359
359
360
-
> [!CAUTION]
361
-
> In this article, HTTPS (port 443) is exposed to the internet for the VM that is assigned to the **asg-mgmt** application security group.
362
-
>
363
-
> For production environments, instead of exposing port 443 to the internet, it's recommended that you connect to Azure resources that you want to manage using a VPN, private network connection, or Azure Bastion.
364
-
>
365
-
> For more information on Azure Bastion, see [What is Azure Bastion?](../bastion/bastion-overview.md).
366
-
367
360
### [PowerShell](#tab/powershell)
368
361
369
362
Create a security rule with [New-AzNetworkSecurityRuleConfig](/powershell/module/az.network/new-aznetworksecurityruleconfig). The following example creates a rule that allows traffic inbound from the internet to the _asg-web_ application security group over port 80:
> In this article, HTTPS (port 443) is exposed to the internet for the VM that is assigned to the **asg-mgmt** application security group.
431
-
>
432
-
> For production environments, instead of exposing port 443 to the internet, it's recommended that you connect to Azure resources that you want to manage using a VPN, private network connection, or Azure Bastion.
433
-
>
434
-
> For more information on Azure Bastion, see [What is Azure Bastion?](../bastion/bastion-overview.md).
435
-
436
422
### [CLI](#tab/cli)
437
423
438
424
Create a security rule with [az network nsg rule create](/cli/azure/network/nsg/rule). The following example creates a rule that allows traffic inbound from the internet to the *asg-web* application security group over port 80:
@@ -469,14 +455,6 @@ az network nsg rule create \
469
455
--destination-port-range 443
470
456
```
471
457
472
-
> [!CAUTION]
473
-
> In this article, HTTPS (port 443) is exposed to the internet for the VM that is assigned to the **asg-mgmt** application security group.
474
-
>
475
-
> For production environments, instead of exposing port 443 to the internet, it's recommended that you connect to Azure resources that you want to manage using a VPN, private network connection, or Azure Bastion.
476
-
>
477
-
> For more information on Azure Bastion, see [What is Azure Bastion?](../bastion/bastion-overview.md).
478
-
479
-
480
458
---
481
459
482
460
## Create virtual machines
@@ -825,14 +803,6 @@ az network nic ip-config update \
825
803
826
804
1. Select **vm-web**.
827
805
828
-
1. On the **Overview** page, select the **Connect** button and then select **Connect with SSH using Azure CLI**.
829
-
830
-
1. Copy the **Login command** and run it in your terminal. The connection succeeds because the network security group allows SSH traffic from your location.
831
-
832
-
1. Install nginx web server on **vm-web** using the Azure Run Command:
833
-
834
-
1. Select **vm-web** from the **Virtual machines** page.
835
-
836
806
1. Select **Run command** from the **Operations** section.
0 commit comments