Glad to have you back guys, in our last post, we set up a two virtual networks app-net (for our app webservices in the cloud) and hub-vnet(for our Firewall). The app-vnet had two subnets frontend(for internet and web services with the app) and backend(for the apps database). Now we need the Security group to cover the web services of our Networks. In order to test this out, we will create virual machines in both of the Subnets.
** Create two Virtual MAchines vm1 and vm2 **
- Search for Application Security Groups ** it lets you group together servers with similar functions. For example, all the web servers hosting your application. **
Note: You are creating the application security group in the same region as the existing virtual network
Now we associate the application security group to the network interface of the VM
- Add application security groups
- Select our ASG name and select add
- Now we create and associate the Network Security Group Network security groups (NSGs) secure network traffic in a virtual network.
- name, review and create
- Now we can associate the NSG with the app-vnet backend subnet.
NSGs can be associated with subnets and/or individual network interfaces attached to Azure virtual machines.
- So we can create Network Security Group rules now, NSG use security rules to filter inbound and outbound network traffic.
- In the Settings blade, select Inbound security rules
- Awesom Job everyone!
Top comments (0)