Skip to content

Commit 76657db

Browse files
committed
adding images
1 parent 581575c commit 76657db

16 files changed

+32
-24
lines changed

articles/ai-services/openai/how-to/network-security-perimeter.md

Lines changed: 32 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -54,18 +54,21 @@ Azure Network Security Perimeter allows administrators to define a logical netwo
5454
You can add Azure OpenAI to a network security perimeter so that all indexing and query requests occur within the security boundary.
5555

5656
1. In the Azure portal, find the network security perimeter service for your subscription.
57-
2. Select **Resources** from the left-hand menu.
57+
2. Select **Associated Resources** from the left-hand menu.
5858

59-
[Image 1]
59+
:::image type="content" source="../media/network-security-perimeter/associated-resources-selection.png" alt-text="A screenshot showing the associated resources selection in the left navigation menu." lightbox="../media/network-security-perimeter/associated-resources-selection.png":::
6060

61-
3. Select **Add** > **Associate** resources with an existing profile.
61+
3. Select **Add** > **Associate resources with an existing profile**.
6262

63-
[Image 2]
6463

65-
4. Select the profile you created when you created the network security perimeter for Profile.
66-
5. Select Associate, and then select the Azure OpenAI service you created.
64+
:::image type="content" source="../media/network-security-perimeter/add-associated-resources.png" alt-text="A screenshot showing the button to add associated resources." lightbox="../media/network-security-perimeter/add-associated-resources.png":::
65+
66+
4. Select the profile you created when you created the network security perimeter for a profile.
67+
5. Select **Associate**, and then select the Azure OpenAI service you created.
68+
69+
:::image type="content" source="../media/network-security-perimeter/associate-with-profile.png" alt-text="A screenshot showing the screen for associating resources with a profile." lightbox="../media/network-security-perimeter/associate-with-profile.png":::
70+
6771

68-
[Image 3]
6972

7073
6. Select Associate in the bottom left-hand section of the screen to create the association.
7174

@@ -87,29 +90,31 @@ The `publicNetworkAccess` setting determines the Azure OpenAI services associati
8790
1. Navigate to your network security perimeter resource in the Azure portal.
8891
2. Select **Resources** in the left-hand menu.
8992

90-
[Image 4]
93+
:::image type="content" source="../media/network-security-perimeter/associated-resources-selection.png" alt-text="A screenshot showing the associated resources selection in the left navigation menu." lightbox="../media/network-security-perimeter/associated-resources-selection.png":::
9194

9295
3. Find your Azure OpenAI service in the table.
93-
4. Select the three dots in the far right of the Azure OpenAI service row. Select Change access mode in the popup.
96+
4. Select the three dots in the far right of the Azure OpenAI service row. Select **Change access mode** in the popup.
97+
98+
:::image type="content" source="../media/network-security-perimeter/change-access-mode.png" alt-text="A screenshot showing the button to change the access mode." lightbox="../media/network-security-perimeter/change-access-mode.png":::
9499

95-
[Image 5]
96100

97101
5. Select the desired access mode and select Apply.
98102

99-
[Image 6]
103+
:::image type="content" source="../media/network-security-perimeter/apply-access-mode.png" alt-text="A screenshot showing the button to apply the access mode." lightbox="../media/network-security-perimeter/apply-access-mode.png":::
100104

101105
## Enable logging network access
102106
1. Navigate to your network security perimeter resource in the Azure portal.
103107
2. Select **Diagnostic settings** in the left-hand menu.
104108

105-
[Image 7]
109+
:::image type="content" source="../media/network-security-perimeter/diagnostic-settings.png" alt-text="A screenshot showing the button for navigating to the diagnostic settings." lightbox="../media/network-security-perimeter/diagnostic-settings.png":::
110+
106111

107112
3. Select **Add diagnostic setting**.
108113
4. Enter any name such as "diagnostic" for Diagnostic setting name.
109114
5. Under Logs, select `allLogs`. `allLogs` ensures all inbound and outbound network access to resources in your network security perimeter is logged.
110115
6. Under Destination details, select Archive to a storage account or Send to Log Analytics workspace. The storage account must be in the same region as the network security perimeter. You can either use an existing storage account or create a new one. A Log Analytics workspace can be in a different region than the one used by the network security perimeter. You can also select any of the other applicable destinations.
111116

112-
[Image 8]
117+
:::image type="content" source="../media/network-security-perimeter/log-catagories.png" alt-text="A screenshot showing the available log catagories." lightbox="../media/network-security-perimeter/log-catagories.png":::
113118

114119
7. Select Save to create the diagnostic setting and start logging network access.
115120

@@ -153,19 +158,20 @@ To add an inbound access rule in the Azure portal:
153158
1. Navigate to your network security perimeter resource in the Azure portal.
154159
2. Select **Profiles** in the left-hand menu.
155160

156-
[Image 9]
161+
:::image type="content" source="../media/network-security-perimeter/profiles-selector.png" alt-text="A screenshot showing the button to navigate to the profiles screen." lightbox="../media/network-security-perimeter/profiles-selector.png":::
162+
157163

158164
3. Select the profile you're using with your network security perimeter.
159165

160-
[Image 10]
166+
:::image type="content" source="../media/network-security-perimeter/selected-profile.png" alt-text="A screenshot showing a selected profile." lightbox="../media/network-security-perimeter/selected-profile.png":::
161167

162168
4. Select **Inbound access rules** in the left-hand menu.
163169

164-
[Image 11]
170+
:::image type="content" source="../media/network-security-perimeter/inbound-network-navigation.png" alt-text="A screenshot showing button to navigate to the inbound access rules." lightbox="../media/network-security-perimeter/inbound-network-navigation.png":::
165171

166172
5. Select **Add**.
167173

168-
[Image 12]
174+
:::image type="content" source="../media/network-security-perimeter/add-rule.png" alt-text="A screenshot showing the add button." lightbox="../media/network-security-perimeter/add-rule.png":::
169175

170176
6. Enter or select the following values:
171177

@@ -177,34 +183,36 @@ To add an inbound access rule in the Azure portal:
177183

178184
7. Select **Add** to create the inbound access rule.
179185

180-
[Image 13]
186+
:::image type="content" source="../media/network-security-perimeter/add-rule-2.png" alt-text="A screenshot showing the add button." lightbox="../media/network-security-perimeter/add-rule-2.png":::
187+
181188

182189
### Add an outbound access rule
183190

184191
The Azure OpenAI service makes outbound calls during indexer-based indexing and skillset execution. If your indexer data sources, Azure AI services, or custom skill logic is outside of the network security perimeter, you should create an outbound access rule that allows your Azure OpenAI service to make the connection.
185192

186193
Recall that in public preview, Azure AI Azure OpenAI can only connect to Azure Storage or Azure Cosmos DB within the security perimeter. If your indexers use other data sources, you need an outbound access rule to support that connection.
187194

188-
Network security perimeter supports outbound access rules based on the Fully Qualified Domain Name (FQDN) of the destination. For example, you can allow outbound access from any service associated with your network security perimeter to an FQDN such as mystorageaccount.blob.core.windows.net.
195+
Network security perimeter supports outbound access rules based on the Fully Qualified Domain Name (FQDN) of the destination. For example, you can allow outbound access from any service associated with your network security perimeter to an FQDN such as `mystorageaccount.blob.core.windows.net`.
189196

190197
To add an outbound access rule in the Azure portal:
191198

192199
1. Navigate to your network security perimeter resource in the Azure portal.
193200
2. Select **Profiles** in the left-hand menu.
194201

195-
[Image 14]
202+
:::image type="content" source="../media/network-security-perimeter/profiles-selector.png" alt-text="A screenshot showing the add button." lightbox="../media/network-security-perimeter/profiles-selector.png":::
203+
196204

197205
3. Select the profile you're using with your network security perimeter.
198206

199-
[Image 15]
207+
:::image type="content" source="../media/network-security-perimeter/selected-profile.png" alt-text="A screenshot showing the add button." lightbox="../media/network-security-perimeter/selected-profile.png":::
200208

201209
4. Select **Outbound access rules** in the left-hand menu.
202210

203-
[Image 16]
211+
:::image type="content" source="../media/network-security-perimeter/outbound-network-navigation.png" alt-text="A screenshot showing the button to navigate to outbound access rules." lightbox="../media/network-security-perimeter/outbound-network-navigation.png":::
204212

205213
5. Select **Add**.
206214

207-
[Image 17]
215+
:::image type="content" source="../media/network-security-perimeter/add-outbound.png" alt-text="A screenshot showing the button to navigate to outbound access rules." lightbox="../media/network-security-perimeter/add-outbound.png":::
208216

209217
6. Enter or select the following values:
210218

@@ -216,7 +224,7 @@ To add an outbound access rule in the Azure portal:
216224

217225
7. Select **Add** to create the outbound access rule.
218226

219-
[Image 18]
227+
:::image type="content" source="../media/network-security-perimeter/add-outbound-2.png" alt-text="A screenshot showing the screen to add an outbound access rule." lightbox="../media/network-security-perimeter/add-outbound-2.png":::
220228

221229
## Test your connection through network security perimeter
222230

163 KB
Loading
74.9 KB
Loading
103 KB
Loading
73.5 KB
Loading
103 KB
Loading
148 KB
Loading
80.7 KB
Loading
73.2 KB
Loading
128 KB
Loading

0 commit comments

Comments
 (0)