Skip to content

Commit 0ca7a90

Browse files
Merge pull request #208909 from Ericgre/patch-10
removed nsg limitation
2 parents 82153f7 + c7326de commit 0ca7a90

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/app-service/networking/private-endpoint.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Connect privately to a Web App using Azure Private Endpoint
44
author: ericgre
55
ms.assetid: 2dceac28-1ba6-4904-a15d-9e91d5ee162c
66
ms.topic: article
7-
ms.date: 03/04/2022
7+
ms.date: 08/23/2022
88
ms.author: ericg
99
ms.service: app-service
1010
ms.workload: web
@@ -49,7 +49,6 @@ From a security perspective:
4949
- By default, when you enable Private Endpoints to your Web App, you disable all public access.
5050
- You can enable multiple Private Endpoints in others VNets and Subnets, including VNets in other regions.
5151
- The IP address of the Private Endpoint NIC must be dynamic, but will remain the same until you delete the Private Endpoint.
52-
- The NIC of the Private Endpoint can't have an NSG associated.
5352
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint: see [Disable network policies for private endpoints][disablesecuritype]. As a result, you can't filter by any NSG the access to your Private Endpoint.
5453
- By default, when you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App isn't evaluated.
5554
- You can eliminate the data exfiltration risk from the VNet by removing all NSG rules where destination is tag Internet or Azure services. When you deploy a Private Endpoint for a Web App, you can only reach this specific Web App through the Private Endpoint. If you have another Web App, you must deploy another dedicated Private Endpoint for this other Web App.

0 commit comments

Comments
 (0)