Skip to content

Commit 0c6fa51

Browse files
author
Larry Franks
committed
updates per feedback from support & PM team
1 parent f25c2dc commit 0c6fa51

File tree

2 files changed

+8
-6
lines changed

2 files changed

+8
-6
lines changed

articles/machine-learning/how-to-access-azureml-behind-firewall.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -82,10 +82,12 @@ __Outbound traffic__
8282
| `AzureMonitor` | 443 | Used to log monitoring and metrics to Azure Monitor. Only needed if you haven't [secured Azure Monitor](how-to-secure-workspace-vnet.md#secure-azure-monitor-and-application-insights) for the workspace. </br>* This outbound is also used to log information for support incidents. |
8383

8484
> [!IMPORTANT]
85-
> If a compute instance or compute cluster is configured for no public IP, they can't access the public internet by default. However, they do need to communicate with the resources listed above. To enable outbound communication, you have two possible options:
86-
>
87-
> * __User-defined route and firewall__: Create a user-defined route in the subnet that contains the compute. The __Next hop__ for the route should reference the private IP address of the firewall, with an address prefix of 0.0.0.0/0.
88-
> * __Azure Virtual Network NAT with a public IP__: For more information on using Virtual Network Nat, see the [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) documentation.
85+
> If a compute instance or compute cluster is configured for no public IP, it can still send outbound traffic to the internet using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access#when-is-default-outbound-access-provided) Azure provides for VMs. However, if you need outbound access we recommend implementing your own instead of relying on the default. We recommend using one of the following options:
86+
>
87+
> * __Azure Virtual Network NAT with a public IP__: For more information on using Virtual Network Nat, see the [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) documentation.
88+
> * __User-defined route and firewall__: Create a user-defined route in the subnet that contains the compute. The __Next hop__ for the route should reference the private IP address of the firewall, with an address prefix of 0.0.0.0/0.
89+
>
90+
> For more information, see the [Default outbound access in Azure](/azure/virtual-network/ip-services/default-outbound-access) article.
8991
9092
### Recommended configuration for training and deploying models
9193

articles/machine-learning/how-to-secure-training-vnet.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The following table contains the differences between these configurations:
3232
| Configuration | With public IP | Without public IP |
3333
| ----- | ----- | ----- |
3434
| Inbound traffic | AzureMachineLearning | None |
35-
| Outbound traffic | By default, can access the public internet with no restrictions.<br>You can restrict what it accesses using a Network Security Group or firewall. | By default, it cannot access the public internet since there is no public IP resource.<br>You need a Virtual Network NAT gateway or Firewall to route outbound traffic to required resources on the internet. |
35+
| Outbound traffic | By default, can access the public internet with no restrictions.<br>You can restrict what it accesses using a Network Security Group or firewall. | By default, can access the public internet using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) provided by Azure.<br>We recommend using a Virtual Network NAT gateway or Firewall instead if you need to route outbound traffic to required resources on the internet. |
3636
| Azure networking resources | Public IP address, load balancer, network interface | None |
3737

3838
You can also use Azure Databricks or HDInsight to train models in a virtual network.
@@ -131,7 +131,7 @@ The following configurations are in addition to those listed in the [Prerequisit
131131
| `*.table.core.windows.net` | TCP | 443 | Communication with Azure Table storage. |
132132

133133

134-
+ Create either a firewall and outbound rules or a NAT gateway and network service groups to allow outbound traffic. Since the compute has no public IP address, it can't communicate with resources on the public internet without this configuration. For example, it wouldn't be able to communicate with Azure Active Directory or Azure Resource Manager. Installing Python packages from public sources would also require this configuration.
134+
+ The [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) provided by Azure allows a no public IP compute to access the public network. However, we recommend using either a firewall and outbound rules or a NAT gateway and network service groups to allow outbound traffic instead.
135135

136136
For more information on the outbound traffic that is used by Azure Machine Learning, see the following articles:
137137
- [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md).

0 commit comments

Comments
 (0)