Skip to content

Commit 1b981ac

Browse files
committed
Updating subnet limit
1 parent e659073 commit 1b981ac

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/cosmos-db/vnet-service-endpoint.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ There are two steps required to limit access to Azure Cosmos account from a subn
3030

3131
### Will virtual network ACLs and IP Firewall reject requests or connections?
3232

33-
When IP firewall or virtual network access rules are added, only requests from allowed sources get valid responses. Other requests are rejected with a 403 (Forbidden). It is important to distinguish Azure Cosmos account's firewall from a connection level firewall. The source can still connect to the service and the connections themselves arent rejected.
33+
When IP firewall or virtual network access rules are added, only requests from allowed sources get valid responses. Other requests are rejected with a 403 (Forbidden). It is important to distinguish Azure Cosmos account's firewall from a connection level firewall. The source can still connect to the service and the connections themselves aren't rejected.
3434

3535
### My requests started getting blocked when I enabled service endpoint to Azure Cosmos DB on the subnet. What happened?
3636

@@ -46,7 +46,7 @@ The authorization validates permission for VNet resource action even if the user
4646
Only virtual network and their subnets added to Azure Cosmos account have access. Their peered VNets cannot access the account until the subnets within peered virtual networks are added to the account.
4747

4848
### What is the maximum number of subnets allowed to access a single Cosmos account?
49-
Currently, you can have at most 64 subnets allowed for an Azure Cosmos account.
49+
Currently, you can have at most 256 subnets allowed for an Azure Cosmos account.
5050

5151
### Can I enable access from VPN and Express Route?
5252
For accessing Azure Cosmos account over Express route from on premises, you would need to enable Microsoft peering. Once you put IP firewall or virtual network access rules, you can add the public IP addresses used for Microsoft peering on your Azure Cosmos account IP firewall to allow on premises services access to Azure Cosmos account.
@@ -55,7 +55,7 @@ For accessing Azure Cosmos account over Express route from on premises, you woul
5555
NSG rules are used to limit connectivity to and from a subnet with virtual network. When you add service endpoint for Azure Cosmos DB to the subnet, there is no need to open outbound connectivity in NSG for your Azure Cosmos account.
5656

5757
### Are service endpoints available for all VNets?
58-
No, Only Azure Resource Manager virtual networks can have service endpoint enabled. Classic virtual networks dont support service endpoints.
58+
No, Only Azure Resource Manager virtual networks can have service endpoint enabled. Classic virtual networks don't support service endpoints.
5959

6060
### Can I "Accept connections from within public Azure datacenters" when service endpoint access is enabled for Azure Cosmos DB?
6161
This is required only when you want your Azure Cosmos DB account to be accessed by other Azure first party services like Azure Data factory, Azure Cognitive Search or any service that is deployed in given Azure region.

0 commit comments

Comments
 (0)