You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: articles/firewall/tutorial-firewall-deploy-portal.md
+12-10
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: tutorial
8
-
ms.date: 11/6/2018
8
+
ms.date: 11/9/2018
9
9
ms.author: victorh
10
10
ms.custom: mvc
11
11
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -191,22 +191,24 @@ This is the application rule that allows outbound access to github.com.
191
191
192
192
1. Open the **Test-FW-RG**, and click the **Test-FW01** firewall.
193
193
2. On the **Test-FW01** page, under **Settings**, click **Rules**.
194
-
3. Click **Add application rule collection**.
195
-
4. For **Name**, type **App-Coll01**.
196
-
5. For **Priority**, type **200**.
197
-
6. For **Action**, select **Allow**.
198
-
7. Under **Rules**, for **Name**, type **AllowGH**.
199
-
8. For **Source Addresses**, type **10.0.2.0/24**.
200
-
9. For **Protocol:port**, type **http, https**.
201
-
10. For **Target FQDNS**, type **github.com**
202
-
11. Click **Add**.
194
+
3. Click the **Application rule collection** tab.
195
+
4. Click **Add application rule collection**.
196
+
5. For **Name**, type **App-Coll01**.
197
+
6. For **Priority**, type **200**.
198
+
7. For **Action**, select **Allow**.
199
+
8. Under **Rules**, **Target FQDNs**, for **Name**, type **AllowGH**.
200
+
9. For **Source Addresses**, type **10.0.2.0/24**.
201
+
10. For **Protocol:port**, type **http, https**.
202
+
11. For **Target FQDNS**, type **github.com**
203
+
12. Click **Add**.
203
204
204
205
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by default. These FQDNs are specific for the platform and can't be used for other purposes. For more information, see [Infrastructure FQDNs](infrastructure-fqdns.md).
205
206
206
207
## Configure a network rule
207
208
208
209
This is the network rule that allows outbound access to two IP addresses at port 53 (DNS).
0 commit comments