Skip to content

Commit 07b5539

Browse files
authored
Merge pull request #69239 from spelluru/ehubendpoint0312
IP Firewall
2 parents 509c891 + e086bad commit 07b5539

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

articles/event-hubs/event-hubs-service-endpoints.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Virtual Network service endpoints - Azure Event Hubs | Microsoft Docs
3-
description: This article provides information on how to adda Microsoft.EventHub service endpoint to a virtual network.
3+
description: This article provides information on how to add a Microsoft.EventHub service endpoint to a virtual network.
44
services: event-hubs
55
documentationcenter: ''
66
author: ShubhaVijayasarathy
@@ -10,7 +10,7 @@ ms.service: event-hubs
1010
ms.devlang: na
1111
ms.topic: article
1212
ms.custom: seodec18
13-
ms.date: 12/06/2018
13+
ms.date: 03/12/2019
1414
ms.author: shvija
1515

1616
---
@@ -19,9 +19,10 @@ ms.author: shvija
1919

2020
The integration of Event Hubs with [Virtual Network (VNet) Service Endpoints][vnet-sep] enables secure access to messaging capabilities from workloads such as virtual machines that are bound to virtual networks, with the network traffic path being secured on both ends.
2121

22-
Once configured to be bound to at least one virtual network subnet service endpoint, the respective Event Hubs namespace no longer accepts traffic from anywhere but authorized subnets in virtual networks. From the virtual network perspective, binding an Event Hubs namespace to a service endpoint configures an isolated networking tunnel from the virtual network subnet to the messaging service.
22+
Once configured to bound to at least one virtual network subnet service endpoint, the respective Event Hubs namespace no longer accepts traffic from anywhere but authorized subnets in virtual networks. From the virtual network perspective, binding an Event Hubs namespace to a service endpoint configures an isolated networking tunnel from the virtual network subnet to the messaging service.
23+
24+
The result is a private and isolated relationship between the workloads bound to the subnet and the respective Event Hubs namespace, in spite of the observable network address of the messaging service endpoint being in a public IP range. There is an exception to this behavior. Enabling a service endpoint, by default, enables the denyall rule in the IP firewall associated with the virtual network. You can add specific IP addresses in the IP firewall to enable access to the Event Hub public endpoint.
2325

24-
The result is a private and isolated relationship between the workloads bound to the subnet and the respective Event Hubs namespace, in spite of the observable network address of the messaging service endpoint being in a public IP range.
2526

2627
>[!WARNING]
2728
> Implementing Virtual Networks integration can prevent other Azure services from interacting with Event Hubs.
@@ -45,7 +46,7 @@ The result is a private and isolated relationship between the workloads bound to
4546
4647
## Advanced security scenarios enabled by VNet integration
4748

48-
Solutions that require tight and compartmentalized security, and where virtual network subnets provide the segmentation between the compartmentalized services, generally still need communication paths between services residing in those compartments.
49+
Solutions that require tight and compartmentalized security, and where virtual network subnets provide the segmentation between the compartmentalized services, still need communication paths between services residing in those compartments.
4950

5051
Any immediate IP route between the compartments, including those carrying HTTPS over TCP/IP, carries the risk of exploitation of vulnerabilities from the network layer on up. Messaging services provide completely insulated communication paths, where messages are even written to disk as they transition between parties. Workloads in two distinct virtual networks that are both bound to the same Event Hubs instance can communicate efficiently and reliably via messages, while the respective network isolation boundary integrity is preserved.
5152

0 commit comments

Comments
 (0)