Merge pull request #3 from zainHaseeb/zainHaseeb-patch-3

Update LAB_04-Implement_Virtual_Networking.md
This commit is contained in:
zainHaseeb 2021-09-23 01:24:42 +05:00 committed by GitHub
commit 605292d266
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -39,7 +39,7 @@ In this task, you will create a virtual network with multiple subnets by using t
1. Sign in to the [Azure portal](https://portal.azure.com).
1. In the Azure portal, search for and select **Virtual networks**, and, on the **Virtual networks** blade, click **+ Add**.
1. In the Azure portal, search for and select **Virtual networks**, and, on the **Virtual networks** blade, click **+ Create**.
1. Create a virtual network with the following settings (leave others with their default values):
@ -179,7 +179,7 @@ In this task, you will configure network security groups in order to allow for r
>**Note**: This is expected, because public IP addresses of the Standard SKU, by default, require that the network interfaces to which they are assigned are protected by a network security group. In order to allow Remote Desktop connections, you will create a network security group explicitly allowing inbound RDP traffic from Internet and assign it to network interfaces of both virtual machines.
1. In the Azure portal, search for and select **Network security groups**, and, on the **Network security groups** blade, click **+ Add**.
1. In the Azure portal, search for and select **Network security groups**, and, on the **Network security groups** blade, click **+ Create**.
1. Create a network security group with the following settings (leave others with their default values):
@ -234,7 +234,7 @@ In this task, you will configure network security groups in order to allow for r
In this task, you will configure DNS name resolution within a virtual network by using Azure private DNS zones.
1. In the Azure portal, search for and select **Private DNS zones** and, on the **Private DNS zones** blade, click **+ Add**.
1. In the Azure portal, search for and select **Private DNS zones** and, on the **Private DNS zones** blade, click **+ Create**.
1. Create a private DNS zone with the following settings (leave others with their default values):