You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/batch/network-security-perimeter.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,15 +8,15 @@ ms.custom: references_regions
8
8
9
9
# Network Security Perimeter
10
10
11
-
The [network security perimeter (NSP)](/azure/private-link/network-security-perimeter-concepts.md) provided by Azure networking serves as a comprehensive tool for customers to ensure optimal security when utilizing PaaS resources. It allows customers to establish logical boundaries for network isolation and collectively manage public access controls for numerous PaaS resources.
11
+
The [network security perimeter (NSP)](../../private-link/network-security-perimeter-concepts.md) provided by Azure networking serves as a comprehensive tool for customers to ensure optimal security when utilizing PaaS resources. It allows customers to establish logical boundaries for network isolation and collectively manage public access controls for numerous PaaS resources.
12
12
13
13
With a network security perimeter:
14
14
- PaaS resources associated with a specific perimeter are, by default, only able to communicate with other PaaS resources within the same perimeter.
15
15
- Explicit access rules can actively permit external inbound and outbound communication.
16
-
-[Diagnostic Logs](/azure/private-link/network-security-perimeter-diagnostic-logs.md) are enabled for PaaS resources within perimeter for Audit and Compliance.
16
+
-[Diagnostic Logs](../../private-link/network-security-perimeter-diagnostic-logs.md) are enabled for PaaS resources within perimeter for Audit and Compliance.
17
17
18
18
> [!IMPORTANT]
19
-
> Network security perimeter rules do not govern the private link with the [private endpoint](/azure/private-link/private-endpoint-overview.md).
19
+
> Network security perimeter rules do not govern the private link with the [private endpoint](../../private-link/private-endpoint-overview.md).
20
20
21
21
## Network Security Perimeter Scenarios in Batch service
22
22
@@ -25,7 +25,7 @@ Azure Batch service is designed to support various scenarios that necessitate ac
25
25
- Application packages requires communication with Azure Storage. For more information, see [batch-application-packages](./batch-application-packages.md).
26
26
- Customer managed key requires communication with Azure KeyVault. For more information, see [batch-customer-managed-key](./batch-customer-managed-key.md).
27
27
28
-
Network administrators can use the network security perimeter feature to create an isolation boundary for their PaaS services. This security perimeter permits the setting up of public access controls for various PaaS resources, providing a consistent user experience and a uniform API. Setting up network security perimeter for PaaS communications supported by Batch, refer to the [Network security perimeter in Azure Storage](/azure/storage/common/storage-network-security?tabs=azure-portal#network-security-perimeter-preview) and [Network security perimeter in Azure Key Vault](/azure/key-vault/general/network-security#network-security-perimeter-preview) for more details.
28
+
Network administrators can use the network security perimeter feature to create an isolation boundary for their PaaS services. This security perimeter permits the setting up of public access controls for various PaaS resources, providing a consistent user experience and a uniform API. Setting up network security perimeter for PaaS communications supported by Batch, refer to the [Network security perimeter in Azure Storage](/azure/storage/common/storage-network-security#network-secuirty-perimeter-preview) and [Network security perimeter in Azure Key Vault](/azure/key-vault/general/network-security#network-security-perimeter-preview) for more details.
29
29
30
30
Network security perimeter provides several methods to enable Batch to interact with other PaaS services if the target PaaS service is in network security perimeter:
31
31
- Associate the Batch account with the same perimeter as the target resource and assign the necessary permissions to the Managed Identity used across these resources.
@@ -52,7 +52,7 @@ Batch users can also use the network security perimeter to secure inbound traffi
52
52
53
53
### Create a Network Security Perimeter
54
54
55
-
Create your own network security perimeter resource using [Azure portal](/azure/private-link/create-network-security-perimeter-portal.md) or [PowerShell](/azure/private-link/create-network-security-perimeter-powershell.md) or [Azure CLI](/azure/private-link/create-network-security-perimeter-cli.md).
55
+
Create your own network security perimeter resource using [Azure portal](../../private-link/create-network-security-perimeter-portal.md) or [PowerShell](../../private-link/create-network-security-perimeter-powershell.md) or [Azure CLI](../../private-link/create-network-security-perimeter-cli.md).
56
56
57
57
### Associate Batch account with the Network Security Perimeter
58
58
@@ -145,7 +145,7 @@ Create your own network security perimeter resource using [Azure portal](/azure/
145
145
## Next steps
146
146
147
147
- Learn more about [Security Best Practices in Azure Batch](security-best-practices.md).
148
-
- Learn more about [Network Security Perimeter Concepts](/azure/private-link/network-security-perimeter-concepts.md).
149
-
- Learn more about [Network Security Perimeter Diagnostic Logs](/azure/private-link/network-security-perimeter-diagnostic-logs.md).
150
-
- Learn more about [Network Security Perimeter Role Based Access Control](/azure/private-link/network-security-perimeter-role-based-access-control-requirements.md).
151
-
- Learn more about [Network Security Perimeter Transition](/azure/private-link/network-security-perimeter-transition.md).
148
+
- Learn more about [Network Security Perimeter Concepts](../../private-link/network-security-perimeter-concepts.md).
149
+
- Learn more about [Network Security Perimeter Diagnostic Logs](../../private-link/network-security-perimeter-diagnostic-logs.md).
150
+
- Learn more about [Network Security Perimeter Role Based Access Control](../../private-link/network-security-perimeter-role-based-access-control-requirements.md).
151
+
- Learn more about [Network Security Perimeter Transition](../../private-link/network-security-perimeter-transition.md).
0 commit comments