You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/vnet-integration-for-azure-services.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,13 +16,13 @@ Azure virtual network integration enables you to securely isolate and control ac
16
16
17
17
Virtual network integration provides Azure services with enhanced security and network isolation through one or more of the following integration methods:
18
18
19
-
-**Dedicated service deployment**: [Deploying dedicated instances of the service into a virtual network](virtual-network-for-azure-services.md)allows services to be privately accessed within the virtual network and from on-premises networks, providing complete control over network traffic and routing.
19
+
-**Dedicated service deployment**: [Deploy dedicated instances of the service into a virtual network](virtual-network-for-azure-services.md) to enable private access within the virtual network and from on-premises networks. This deployment method provides complete control over network traffic and routing.
20
20
21
21
-**Private connectivity**: Using [Private Endpoint](../private-link/private-endpoint-overview.md) that connects you privately and securely to a service powered by [Azure Private Link](../private-link/private-link-overview.md). Private Endpoint uses a private IP address from your virtual network, effectively bringing the service into your virtual network and eliminating internet exposure.
22
22
23
23
-**Service endpoint integration**: Accessing the service using public endpoints by extending a virtual network to the service, through [service endpoints](virtual-network-service-endpoints-overview.md). Service endpoints allow service resources to be secured to the virtual network while maintaining optimized routing over the Azure backbone.
24
24
25
-
-**Network access control**: Using[service tags](service-tags-overview.md) to allow or deny traffic to your Azure resources to and from public IP endpoints, providing granular control over network access without requiring knowledge of specific IP addresses.
25
+
-**Network access control**: Use[service tags](service-tags-overview.md) to allow or deny traffic to your Azure resources to and from public IP endpoints. Service tags provide granular control over network access without requiring knowledge of specific IP addresses.
26
26
27
27
## Deploy dedicated Azure services into virtual networks
28
28
@@ -52,24 +52,24 @@ Deploying a dedicated Azure service into your virtual network provides the follo
52
52
53
53
| Category | Service | Dedicated<sup>1</sup> Subnet |
54
54
|-|-|-|
55
-
| Compute | Virtual machines: [Linux](/previous-versions/azure/virtual-machines/linux/infrastructure-example?toc=%2fazure%2fvirtual-network%2ftoc.json) or [Windows](/previous-versions/azure/virtual-machines/windows/infrastructure-example?toc=%2fazure%2fvirtual-network%2ftoc.json) <br/>[Virtual machine scale sets](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-mvss-existing-vnet?toc=%2fazure%2fvirtual-network%2ftoc.json)<br/>[Cloud Service](/previous-versions/azure/reference/jj156091(v=azure.100)): Virtual network (classic) only <br/> [Azure Batch](../batch/nodes-and-pools.md?toc=%2fazure%2fvirtual-network%2ftoc.json#virtual-network-vnet-and-firewall-configuration) <br/> [Azure Baremetal Infrastructure](../baremetal-infrastructure/concepts-baremetal-infrastructure-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json)| No <br/> No <br/> No <br/> No<sup>2</sup> </br> No |
55
+
| Compute | Virtual machines: [Linux](/previous-versions/azure/virtual-machines/linux/infrastructure-example?toc=%2fazure%2fvirtual-network%2ftoc.json) or [Windows](/previous-versions/azure/virtual-machines/windows/infrastructure-example?toc=%2fazure%2fvirtual-network%2ftoc.json) <br/>[Virtual machine scale sets](/azure/virtual-machine-scale-sets/virtual-machine-scale-sets-mvss-existing-vnet?toc=%2fazure%2fvirtual-network%2ftoc.json)<br/>[Cloud Service](/previous-versions/azure/reference/jj156091(v=azure.100)): Virtual network (classic) only <br/> [Azure Batch](../batch/nodes-and-pools.md?toc=%2fazure%2fvirtual-network%2ftoc.json#virtual-network-vnet-and-firewall-configuration) <br/> [Azure Bare metal Infrastructure](../baremetal-infrastructure/concepts-baremetal-infrastructure-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json)| No <br/> No <br/> No <br/> No<sup>2</sup> </br> No |
56
56
| Network | [Application Gateway - WAF](../application-gateway/application-gateway-ilb-arm.md?toc=%2fazure%2fvirtual-network%2ftoc.json)<br/>[Azure Bastion](../bastion/bastion-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json)<br/>[Azure Firewall](../firewall/overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json) <br/>[Azure Route Server](../route-server/overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json)<br/>[ExpressRoute Gateway](../expressroute/expressroute-about-virtual-network-gateways.md)<br/>[Network Virtual Appliances](/windows-server/networking/sdn/manage/use-network-virtual-appliances-on-a-vn)<br/>[VPN Gateway](../vpn-gateway/vpn-gateway-about-vpngateways.md?toc=%2fazure%2fvirtual-network%2ftoc.json) <br/>[Azure DNS Private Resolver](../dns/dns-private-resolver-overview.md?toc=%2fazure%2fvirtual-network%2ftoc.json) </br> [Virtual Network Data Gateway for Fabric and Power BI](/data-integration/vnet/overview) | Yes <br/> Yes <br/> Yes <br/> Yes <br/> Yes <br/> No <br/> Yes </br> No </br> Yes |
57
-
| Data |[RedisCache](../azure-cache-for-redis/cache-how-to-premium-vnet.md?toc=%2fazure%2fvirtual-network%2ftoc.json)<br/>[Azure SQL Managed Instance](/azure/azure-sql/managed-instance/connectivity-architecture-overview?toc=%2fazure%2fvirtual-network%2ftoc.json) </br> [Azure Database for MySQL - Flexible Server](/azure/mysql/flexible-server/concepts-networking-vnet) </br> [Azure Database for PostgreSQL - Flexible Server](/azure/postgresql/flexible-server/concepts-networking#private-access-vnet-integration)| Yes <br/> Yes <br/> Yes </br> Yes |
57
+
| Data |[Redis cache](../azure-cache-for-redis/cache-how-to-premium-vnet.md?toc=%2fazure%2fvirtual-network%2ftoc.json)<br/>[Azure SQL Managed Instance](/azure/azure-sql/managed-instance/connectivity-architecture-overview?toc=%2fazure%2fvirtual-network%2ftoc.json) </br> [Azure Database for MySQL - Flexible Server](/azure/mysql/flexible-server/concepts-networking-vnet) </br> [Azure Database for PostgreSQL - Flexible Server](/azure/postgresql/flexible-server/concepts-networking#private-access-vnet-integration)| Yes <br/> Yes <br/> Yes </br> Yes |
<sup>1</sup> 'Dedicated' implies that only service specific resources can be deployed in this subnet and can't be combined with customer VM/VMSSs <br/>
68
-
<sup>2</sup> It's recommended as a best practiceto have these services in a dedicated subnet, but not a mandatory requirement imposed by the service.
68
+
<sup>2</sup> As a best practice, it's recommended to have these services in a dedicated subnet, but it's not a mandatory requirement imposed by the service.
69
69
70
70
## Private Link and private endpoints
71
71
72
-
Private endpoints allow ingress of traffic from your virtual network to an Azure resource securely. This private link is established without the need of public IP addresses. A private endpoint is a special network interface for an Azure service in your virtual network. When you create a private endpoint for your resource, it provides secure connectivity between clients on your virtual network and your Azure resource. The private endpoint is assigned an IP address from the IP address range of your virtual network. The connection between the private endpoint and the Azure service is a private link.
72
+
Private endpoints allow ingress of traffic from your virtual network to an Azure resource securely. This private link is established without the need of public IP addresses. A private endpoint is a special network interface for an Azure service in your virtual network. When you create a private endpoint for your resource, it provides secure connectivity between clients on your virtual network and your Azure resource. An IP address from the IP address range of your virtual network is assigned to the private endpoint. The connection between the private endpoint and the Azure service is a private link.
73
73
74
74
In the diagram, the right shows an Azure SQL Database as the target PaaS service. The target can be [any service that supports private endpoints](../private-link/availability.md). There are multiple instances of the logical SQL Server for multiple customers, which are all reachable over public IP addresses.
75
75
@@ -97,7 +97,7 @@ In the following diagram, the right side is the same target PaaS service. On the
97
97
98
98
When a resource in Subnet B tries to reach any SQL Server, it uses a public IP address for outbound communication. The blue arrow represents this traffic. The SQL Server firewall must use that public IP address to allow or block the network traffic.
99
99
100
-
When a resource in Subnet A tries to reach a database server, it's seen as a private IP address from within the virtual network. The green arrows represent this traffic. The SQL Server firewall can now specifically allow or block Subnet A. Knowledge of the public IP address of the source service is unneeded.
100
+
When a resource in Subnet A tries to reach a database server, the connection is seen as a private IP address from within the virtual network. The green arrows represent this traffic. The SQL Server firewall can now specifically allow or block Subnet A. Knowledge of the public IP address of the source service is unneeded.
101
101
102
102
:::image type="content" source="./media/network-isolation/architecture-service-endpoints.png" alt-text="Screenshot of Service Endpoints architecture diagram.":::
103
103
@@ -118,7 +118,7 @@ For more information about Service Tags and Azure services that support them, se
118
118
## Compare private endpoints and service endpoints
119
119
120
120
>[!NOTE]
121
-
> Microsoft recommends using Azure Private Link. Private Link offers better capabilities in terms of privately accessing PaaS from on-premises, in built data-exfiltration protection and mapping service to Private IP in your own network. For more information, see [Azure Private Link](../private-link/private-link-overview.md)
121
+
> Microsoft recommends using Azure Private Link. Private Link offers better capabilities for privately accessing PaaS from on-premises, provides built-in data-exfiltration protection, and maps services to private IPs in your own network. For more information, see [Azure Private Link](../private-link/private-link-overview.md).
122
122
123
123
Rather than looking only at their differences, it's worth pointing out that both service endpoints and private endpoints have characteristics in common.
0 commit comments