Create a new subnet on an existing virtual network (vNet)
- Login into Microsoft Azure portal
- From the Azure portal home page, in the search box, enter virtual networks
- Select virtual networks under services and create, name it "guided-project-vnet "
- Select the guided-project-vnet virtual network.
5.From the guided-project-vnet blade, under settings, select Subnets.
- To add a subnet, select + Subnet.
- For Subnet purpose leave it as Default.
- For Name enter: ftpSubnet.
- Leave the rest of the settings alone and select Add.
Congratulations – you’ve completed the creation of a subnet. This subnet is only going to be used for SFTP traffic. To increase security, you need to configure a Network security group to restrict which ports are allowed on the subnet.
Create a network security group
- From the Azure portal home page, in the search box, enter virtual networks.
- Select virtual networks under services.
- Select Network security groups.
- Select + Create.
- Verify the subscription is correct.
- Select the guided-project-rg resource group.
- Enter ftpNSG for the network security group name.
- Select Review + create.
- Once the validation is complete, select Create.
- Wait for the screen to refresh and display Your deployment is complete.
- Select Go to resource.
Create an inbound security rule
- Under settings, select Inbound security rules.
- Select + Add.
- Change the Destination port ranges from 8080 to 22.
- Select TCP for the protocol.
- Set the name to ftpInbound.
- Select Add.
- Select Home to return to the Azure portal home page.
Congratulations – you’ve created a new Network security group and configured rules to allow inbound FTP traffic. Now, you’ll need to associate the new network security group with the ftpSubnet.
Associate a network security group to a subnet
- From the Azure portal home page, in the search box, enter virtual networks.
- Select virtual networks under services.
- Select the guided-project-vnet virtual network.
- Under settings, select Subnets.
- Select the ftpSubnet you created.
- On the Edit subnet page, under the Security section heading, update the Network security group field to ftpNSG.
- Select Save.
Nicely done. It looks like you’ve completed the work needed to prepare the network for shifting the current Linux VM to a new subnet that’s designed to handle incoming FTP traffic.
Congratulations! You’ve completed this exercise.
Top comments (1)
Welldone!