Skip to content

Commit 93d209e

Browse files
committed
docs: Remove CAUTION notes about port 443 exposure in tutorial-filter-network-traffic.md
1 parent 29cb34c commit 93d209e

1 file changed

Lines changed: 0 additions & 30 deletions

File tree

articles/virtual-network/tutorial-filter-network-traffic.md

Lines changed: 0 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -357,13 +357,6 @@ az network vnet subnet update \
357357

358358
1. Select **Add**.
359359

360-
> [!CAUTION]
361-
> In this article, HTTPS (port 443) is exposed to the internet for the VM that is assigned to the **asg-mgmt** application security group.
362-
>
363-
> For production environments, instead of exposing port 443 to the internet, it's recommended that you connect to Azure resources that you want to manage using a VPN, private network connection, or Azure Bastion.
364-
>
365-
> For more information on Azure Bastion, see [What is Azure Bastion?](../bastion/bastion-overview.md).
366-
367360
### [PowerShell](#tab/powershell)
368361

369362
Create a security rule with [New-AzNetworkSecurityRuleConfig](/powershell/module/az.network/new-aznetworksecurityruleconfig). The following example creates a rule that allows traffic inbound from the internet to the _asg-web_ application security group over port 80:
@@ -426,13 +419,6 @@ $nsg.SecurityRules += $mgmtRule
426419
Set-AzNetworkSecurityGroup -NetworkSecurityGroup $nsg
427420
```
428421

429-
> [!CAUTION]
430-
> In this article, HTTPS (port 443) is exposed to the internet for the VM that is assigned to the **asg-mgmt** application security group.
431-
>
432-
> For production environments, instead of exposing port 443 to the internet, it's recommended that you connect to Azure resources that you want to manage using a VPN, private network connection, or Azure Bastion.
433-
>
434-
> For more information on Azure Bastion, see [What is Azure Bastion?](../bastion/bastion-overview.md).
435-
436422
### [CLI](#tab/cli)
437423

438424
Create a security rule with [az network nsg rule create](/cli/azure/network/nsg/rule). The following example creates a rule that allows traffic inbound from the internet to the *asg-web* application security group over port 80:
@@ -469,14 +455,6 @@ az network nsg rule create \
469455
--destination-port-range 443
470456
```
471457

472-
> [!CAUTION]
473-
> In this article, HTTPS (port 443) is exposed to the internet for the VM that is assigned to the **asg-mgmt** application security group.
474-
>
475-
> For production environments, instead of exposing port 443 to the internet, it's recommended that you connect to Azure resources that you want to manage using a VPN, private network connection, or Azure Bastion.
476-
>
477-
> For more information on Azure Bastion, see [What is Azure Bastion?](../bastion/bastion-overview.md).
478-
479-
480458
---
481459

482460
## Create virtual machines
@@ -825,14 +803,6 @@ az network nic ip-config update \
825803

826804
1. Select **vm-web**.
827805

828-
1. On the **Overview** page, select the **Connect** button and then select **Connect with SSH using Azure CLI**.
829-
830-
1. Copy the **Login command** and run it in your terminal. The connection succeeds because the network security group allows SSH traffic from your location.
831-
832-
1. Install nginx web server on **vm-web** using the Azure Run Command:
833-
834-
1. Select **vm-web** from the **Virtual machines** page.
835-
836806
1. Select **Run command** from the **Operations** section.
837807

838808
1. Select **RunShellScript**.

0 commit comments

Comments
 (0)