15.Create a Vm and configure security groups with defined Inbound and Outbound rules like Letting traffic through HTTP,ICMP,TCP,SSL(TLS)

 







Comments

Popular posts from this blog

3.PHYSICAL TO VIRTUAL MIGRATION