Skip to content

Commit 8466eb5

Browse files
authored
Merge pull request #57529 from vhorne/fw-fix-deploy
Update rule procedure
2 parents b2cef05 + 33c5c66 commit 8466eb5

File tree

1 file changed

+12
-10
lines changed

1 file changed

+12
-10
lines changed

articles/firewall/tutorial-firewall-deploy-portal.md

+12-10
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: tutorial
8-
ms.date: 11/6/2018
8+
ms.date: 11/9/2018
99
ms.author: victorh
1010
ms.custom: mvc
1111
#Customer intent: As an administrator new to this service, I want to control outbound network access from resources located in an Azure subnet.
@@ -191,22 +191,24 @@ This is the application rule that allows outbound access to github.com.
191191

192192
1. Open the **Test-FW-RG**, and click the **Test-FW01** firewall.
193193
2. On the **Test-FW01** page, under **Settings**, click **Rules**.
194-
3. Click **Add application rule collection**.
195-
4. For **Name**, type **App-Coll01**.
196-
5. For **Priority**, type **200**.
197-
6. For **Action**, select **Allow**.
198-
7. Under **Rules**, for **Name**, type **AllowGH**.
199-
8. For **Source Addresses**, type **10.0.2.0/24**.
200-
9. For **Protocol:port**, type **http, https**.
201-
10. For **Target FQDNS**, type **github.com**
202-
11. Click **Add**.
194+
3. Click the **Application rule collection** tab.
195+
4. Click **Add application rule collection**.
196+
5. For **Name**, type **App-Coll01**.
197+
6. For **Priority**, type **200**.
198+
7. For **Action**, select **Allow**.
199+
8. Under **Rules**, **Target FQDNs**, for **Name**, type **AllowGH**.
200+
9. For **Source Addresses**, type **10.0.2.0/24**.
201+
10. For **Protocol:port**, type **http, https**.
202+
11. For **Target FQDNS**, type **github.com**
203+
12. Click **Add**.
203204

204205
Azure Firewall includes a built-in rule collection for infrastructure FQDNs that are allowed by default. These FQDNs are specific for the platform and can't be used for other purposes. For more information, see [Infrastructure FQDNs](infrastructure-fqdns.md).
205206

206207
## Configure a network rule
207208

208209
This is the network rule that allows outbound access to two IP addresses at port 53 (DNS).
209210

211+
1. Click the **Network rule collection** tab.
210212
1. Click **Add network rule collection**.
211213
2. For **Name**, type **Net-Coll01**.
212214
3. For **Priority**, type **200**.

0 commit comments

Comments
 (0)