You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-services/openai/how-to/network-security-perimeter.md
+32-24Lines changed: 32 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,18 +54,21 @@ Azure Network Security Perimeter allows administrators to define a logical netwo
54
54
You can add Azure OpenAI to a network security perimeter so that all indexing and query requests occur within the security boundary.
55
55
56
56
1. In the Azure portal, find the network security perimeter service for your subscription.
57
-
2. Select **Resources** from the left-hand menu.
57
+
2. Select **Associated Resources** from the left-hand menu.
58
58
59
-
[Image 1]
59
+
:::image type="content" source="../media/network-security-perimeter/associated-resources-selection.png" alt-text="A screenshot showing the associated resources selection in the left navigation menu." lightbox="../media/network-security-perimeter/associated-resources-selection.png":::
60
60
61
-
3. Select **Add** > **Associate** resources with an existing profile.
61
+
3. Select **Add** > **Associate resources with an existing profile**.
62
62
63
-
[Image 2]
64
63
65
-
4. Select the profile you created when you created the network security perimeter for Profile.
66
-
5. Select Associate, and then select the Azure OpenAI service you created.
64
+
:::image type="content" source="../media/network-security-perimeter/add-associated-resources.png" alt-text="A screenshot showing the button to add associated resources." lightbox="../media/network-security-perimeter/add-associated-resources.png":::
65
+
66
+
4. Select the profile you created when you created the network security perimeter for a profile.
67
+
5. Select **Associate**, and then select the Azure OpenAI service you created.
68
+
69
+
:::image type="content" source="../media/network-security-perimeter/associate-with-profile.png" alt-text="A screenshot showing the screen for associating resources with a profile." lightbox="../media/network-security-perimeter/associate-with-profile.png":::
70
+
67
71
68
-
[Image 3]
69
72
70
73
6. Select Associate in the bottom left-hand section of the screen to create the association.
71
74
@@ -87,29 +90,31 @@ The `publicNetworkAccess` setting determines the Azure OpenAI services associati
87
90
1. Navigate to your network security perimeter resource in the Azure portal.
88
91
2. Select **Resources** in the left-hand menu.
89
92
90
-
[Image 4]
93
+
:::image type="content" source="../media/network-security-perimeter/associated-resources-selection.png" alt-text="A screenshot showing the associated resources selection in the left navigation menu." lightbox="../media/network-security-perimeter/associated-resources-selection.png":::
91
94
92
95
3. Find your Azure OpenAI service in the table.
93
-
4. Select the three dots in the far right of the Azure OpenAI service row. Select Change access mode in the popup.
96
+
4. Select the three dots in the far right of the Azure OpenAI service row. Select **Change access mode** in the popup.
97
+
98
+
:::image type="content" source="../media/network-security-perimeter/change-access-mode.png" alt-text="A screenshot showing the button to change the access mode." lightbox="../media/network-security-perimeter/change-access-mode.png":::
94
99
95
-
[Image 5]
96
100
97
101
5. Select the desired access mode and select Apply.
98
102
99
-
[Image 6]
103
+
:::image type="content" source="../media/network-security-perimeter/apply-access-mode.png" alt-text="A screenshot showing the button to apply the access mode." lightbox="../media/network-security-perimeter/apply-access-mode.png":::
100
104
101
105
## Enable logging network access
102
106
1. Navigate to your network security perimeter resource in the Azure portal.
103
107
2. Select **Diagnostic settings** in the left-hand menu.
104
108
105
-
[Image 7]
109
+
:::image type="content" source="../media/network-security-perimeter/diagnostic-settings.png" alt-text="A screenshot showing the button for navigating to the diagnostic settings." lightbox="../media/network-security-perimeter/diagnostic-settings.png":::
110
+
106
111
107
112
3. Select **Add diagnostic setting**.
108
113
4. Enter any name such as "diagnostic" for Diagnostic setting name.
109
114
5. Under Logs, select `allLogs`. `allLogs` ensures all inbound and outbound network access to resources in your network security perimeter is logged.
110
115
6. Under Destination details, select Archive to a storage account or Send to Log Analytics workspace. The storage account must be in the same region as the network security perimeter. You can either use an existing storage account or create a new one. A Log Analytics workspace can be in a different region than the one used by the network security perimeter. You can also select any of the other applicable destinations.
111
116
112
-
[Image 8]
117
+
:::image type="content" source="../media/network-security-perimeter/log-catagories.png" alt-text="A screenshot showing the available log catagories." lightbox="../media/network-security-perimeter/log-catagories.png":::
113
118
114
119
7. Select Save to create the diagnostic setting and start logging network access.
115
120
@@ -153,19 +158,20 @@ To add an inbound access rule in the Azure portal:
153
158
1. Navigate to your network security perimeter resource in the Azure portal.
154
159
2. Select **Profiles** in the left-hand menu.
155
160
156
-
[Image 9]
161
+
:::image type="content" source="../media/network-security-perimeter/profiles-selector.png" alt-text="A screenshot showing the button to navigate to the profiles screen." lightbox="../media/network-security-perimeter/profiles-selector.png":::
162
+
157
163
158
164
3. Select the profile you're using with your network security perimeter.
159
165
160
-
[Image 10]
166
+
:::image type="content" source="../media/network-security-perimeter/selected-profile.png" alt-text="A screenshot showing a selected profile." lightbox="../media/network-security-perimeter/selected-profile.png":::
161
167
162
168
4. Select **Inbound access rules** in the left-hand menu.
163
169
164
-
[Image 11]
170
+
:::image type="content" source="../media/network-security-perimeter/inbound-network-navigation.png" alt-text="A screenshot showing button to navigate to the inbound access rules." lightbox="../media/network-security-perimeter/inbound-network-navigation.png":::
165
171
166
172
5. Select **Add**.
167
173
168
-
[Image 12]
174
+
:::image type="content" source="../media/network-security-perimeter/add-rule.png" alt-text="A screenshot showing the add button." lightbox="../media/network-security-perimeter/add-rule.png":::
169
175
170
176
6. Enter or select the following values:
171
177
@@ -177,34 +183,36 @@ To add an inbound access rule in the Azure portal:
177
183
178
184
7. Select **Add** to create the inbound access rule.
179
185
180
-
[Image 13]
186
+
:::image type="content" source="../media/network-security-perimeter/add-rule-2.png" alt-text="A screenshot showing the add button." lightbox="../media/network-security-perimeter/add-rule-2.png":::
187
+
181
188
182
189
### Add an outbound access rule
183
190
184
191
The Azure OpenAI service makes outbound calls during indexer-based indexing and skillset execution. If your indexer data sources, Azure AI services, or custom skill logic is outside of the network security perimeter, you should create an outbound access rule that allows your Azure OpenAI service to make the connection.
185
192
186
193
Recall that in public preview, Azure AI Azure OpenAI can only connect to Azure Storage or Azure Cosmos DB within the security perimeter. If your indexers use other data sources, you need an outbound access rule to support that connection.
187
194
188
-
Network security perimeter supports outbound access rules based on the Fully Qualified Domain Name (FQDN) of the destination. For example, you can allow outbound access from any service associated with your network security perimeter to an FQDN such as mystorageaccount.blob.core.windows.net.
195
+
Network security perimeter supports outbound access rules based on the Fully Qualified Domain Name (FQDN) of the destination. For example, you can allow outbound access from any service associated with your network security perimeter to an FQDN such as `mystorageaccount.blob.core.windows.net`.
189
196
190
197
To add an outbound access rule in the Azure portal:
191
198
192
199
1. Navigate to your network security perimeter resource in the Azure portal.
193
200
2. Select **Profiles** in the left-hand menu.
194
201
195
-
[Image 14]
202
+
:::image type="content" source="../media/network-security-perimeter/profiles-selector.png" alt-text="A screenshot showing the add button." lightbox="../media/network-security-perimeter/profiles-selector.png":::
203
+
196
204
197
205
3. Select the profile you're using with your network security perimeter.
198
206
199
-
[Image 15]
207
+
:::image type="content" source="../media/network-security-perimeter/selected-profile.png" alt-text="A screenshot showing the add button." lightbox="../media/network-security-perimeter/selected-profile.png":::
200
208
201
209
4. Select **Outbound access rules** in the left-hand menu.
202
210
203
-
[Image 16]
211
+
:::image type="content" source="../media/network-security-perimeter/outbound-network-navigation.png" alt-text="A screenshot showing the button to navigate to outbound access rules." lightbox="../media/network-security-perimeter/outbound-network-navigation.png":::
204
212
205
213
5. Select **Add**.
206
214
207
-
[Image 17]
215
+
:::image type="content" source="../media/network-security-perimeter/add-outbound.png" alt-text="A screenshot showing the button to navigate to outbound access rules." lightbox="../media/network-security-perimeter/add-outbound.png":::
208
216
209
217
6. Enter or select the following values:
210
218
@@ -216,7 +224,7 @@ To add an outbound access rule in the Azure portal:
216
224
217
225
7. Select **Add** to create the outbound access rule.
218
226
219
-
[Image 18]
227
+
:::image type="content" source="../media/network-security-perimeter/add-outbound-2.png" alt-text="A screenshot showing the screen to add an outbound access rule." lightbox="../media/network-security-perimeter/add-outbound-2.png":::
220
228
221
229
## Test your connection through network security perimeter
0 commit comments