mirror of
https://github.com/MicrosoftLearning/AZ-104-MicrosoftAzureAdministrator.git
synced 2026-02-09 10:27:04 +00:00
Merge pull request #3 from zainHaseeb/zainHaseeb-patch-3
Update LAB_04-Implement_Virtual_Networking.md
This commit is contained in:
commit
605292d266
@ -39,7 +39,7 @@ In this task, you will create a virtual network with multiple subnets by using t
|
|||||||
|
|
||||||
1. Sign in to the [Azure portal](https://portal.azure.com).
|
1. Sign in to the [Azure portal](https://portal.azure.com).
|
||||||
|
|
||||||
1. In the Azure portal, search for and select **Virtual networks**, and, on the **Virtual networks** blade, click **+ Add**.
|
1. In the Azure portal, search for and select **Virtual networks**, and, on the **Virtual networks** blade, click **+ Create**.
|
||||||
|
|
||||||
1. Create a virtual network with the following settings (leave others with their default values):
|
1. Create a virtual network with the following settings (leave others with their default values):
|
||||||
|
|
||||||
@ -179,7 +179,7 @@ In this task, you will configure network security groups in order to allow for r
|
|||||||
|
|
||||||
>**Note**: This is expected, because public IP addresses of the Standard SKU, by default, require that the network interfaces to which they are assigned are protected by a network security group. In order to allow Remote Desktop connections, you will create a network security group explicitly allowing inbound RDP traffic from Internet and assign it to network interfaces of both virtual machines.
|
>**Note**: This is expected, because public IP addresses of the Standard SKU, by default, require that the network interfaces to which they are assigned are protected by a network security group. In order to allow Remote Desktop connections, you will create a network security group explicitly allowing inbound RDP traffic from Internet and assign it to network interfaces of both virtual machines.
|
||||||
|
|
||||||
1. In the Azure portal, search for and select **Network security groups**, and, on the **Network security groups** blade, click **+ Add**.
|
1. In the Azure portal, search for and select **Network security groups**, and, on the **Network security groups** blade, click **+ Create**.
|
||||||
|
|
||||||
1. Create a network security group with the following settings (leave others with their default values):
|
1. Create a network security group with the following settings (leave others with their default values):
|
||||||
|
|
||||||
@ -234,7 +234,7 @@ In this task, you will configure network security groups in order to allow for r
|
|||||||
|
|
||||||
In this task, you will configure DNS name resolution within a virtual network by using Azure private DNS zones.
|
In this task, you will configure DNS name resolution within a virtual network by using Azure private DNS zones.
|
||||||
|
|
||||||
1. In the Azure portal, search for and select **Private DNS zones** and, on the **Private DNS zones** blade, click **+ Add**.
|
1. In the Azure portal, search for and select **Private DNS zones** and, on the **Private DNS zones** blade, click **+ Create**.
|
||||||
|
|
||||||
1. Create a private DNS zone with the following settings (leave others with their default values):
|
1. Create a private DNS zone with the following settings (leave others with their default values):
|
||||||
|
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user