DEV Community

Cover image for Updating Virtual Networks
lotanna obianefo
lotanna obianefo

Posted on

Updating Virtual Networks

As businesses increasingly rely on cloud infrastructure, maintaining and updating virtual networks (VNets) in platforms like Microsoft Azure is critical to ensure performance, security, and scalability. A virtual network is the foundation of cloud-based networking, enabling secure communication between resources such as virtual machines, databases, and applications.

Create a new subnet on an existing virtual network (vNet)

Login to Microsoft Azure at https://portal.azure.com
From the Azure portal home page, in the search box, enter virtual networks. Select virtual networks under services.
Select the project-vnet virtual network.
1112
From the project-vnet blade, under settings, select Subnets.
To add a subnet, select + Subnet.
For Subnet purpose leave it as Default.
For Name enter: ftpSubnet.
Leave the rest of the settings alone and select Add.
6345356
45345y
you’ve completed the creation of a subnet. This subnet is only going to be used for SFTP traffic. To increase security, you need to configure a Network security group to restrict which ports are allowed on the subnet.

Create a network security group

From the Azure portal home page, in the search box, enter virtual networks.
Select virtual networks under services.
Select Network security groups.
Select + Create.
sefw32
Verify the subscription is correct.
Select the project-rg resource group.
Enter ftpNSG for the network security group name.
Select Review + create.
Once the validation is complete, select Create.
tr54
htre443
Wait for the screen to refresh and display Your deployment is complete.
Select Go to resource.
fdr432

Create an inbound security rule

Under settings, select Inbound security rules.
Select + Add.
Change the Destination port ranges from 8080 to 22.
Select TCP for the protocol.
Set the name to ftpInbound.
Select Add.
3643y2
73riwjd
943kfskfq
Select Home to return to the Azure portal home page.
You’ve created a new Network security group and configured rules to allow inbound FTP traffic. Now, you’ll need to associate the new network security group with the ftpSubnet.

Associate a network security group to a subnet

From the Azure portal home page, in the search box, enter virtual networks.
Select virtual networks under services.
Select the project-vnet virtual network.
Under settings, select Subnets.
Select the ftpSubnet you created.
On the Edit subnet page, under the Security section heading, update the Network security group field to ftpNSG.
Select Save.
e4lkwf
8kwdw3
aprkpo43
oieir
This completes the work needed to prepare the network for shifting the current Linux VM to a new subnet that’s designed to handle incoming FTP traffic.

Top comments (0)