Skip to content

Commit 0d7965e

Browse files
Merge pull request #7067 from meerakurup/patch-22
Update add-foundry-to-network-security-perimeter.md
2 parents ea3e306 + 6df244c commit 0d7965e

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

articles/ai-foundry/how-to/add-foundry-to-network-security-perimeter.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Add Azure AI Foundry to Network Security Perimeter
2+
title: Add Azure AI Foundry to Network Security Perimeter (preview)
33
description: Discover how to secure your Azure AI Foundry resource by joining it to a network security perimeter, ensuring enhanced data protection and controlled access.
44
author: jonburchel
55
ms.author: jburchel
@@ -10,7 +10,7 @@ ms.service: azure-ai-foundry
1010
ai.usage: ai-assisted
1111
---
1212

13-
# Add Azure AI Foundry to a network security perimeter
13+
# Add Azure AI Foundry to a network security perimeter (preview)
1414

1515
> [!NOTE]
1616
> Azure AI Foundry support for network security perimeter is in public preview under supplemental terms of use. It's available in regions providing the feature. This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. Review the limitations and considerations section before you start.
@@ -45,6 +45,8 @@ You can add an Azure AI Foundry resource to a network security perimeter in the
4545

4646
- The Foundry Agent Service supports [Network security perimeter](/azure/private-link/network-security-perimeter-concepts). However, in Secured Standard Agents with network isolation, NSP is neither required nor supported, as all resources connect securely via Private Link within the customer's virtual network, eliminating the need for public IP or FQDN definitions.
4747

48+
- If you implemented Private Endpoints to another PaaS resource through Azure Private Link Service, the network traffic has a preference to check for Private Link and send traffic through that pathway first before NSP. Network traffic follows the order of Private Link before NSP.
49+
4850
## Prerequisites
4951

5052
> [!CAUTION]

0 commit comments

Comments
 (0)