You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-concepts.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,10 +18,10 @@ For access patterns involving traffic from virtual networks to PaaS resources, s
18
18
19
19
Features of Network Security Perimeter include:
20
20
21
-
- Service to service communication within perimeter members, preventing data exfiltration to non-authorized destinations.
22
-
- Public network access control for PaaS resources.
23
-
- Access logs for audit and compliance.
21
+
- Resource to resource access communication within perimeter members, preventing data exfiltration to non-authorized destinations.
24
22
- Manage external public access with explicit rules for PaaS resources associated with the perimeter.
23
+
- Access logs for audit and compliance.
24
+
- Unified experience across PaaS resources.
25
25
26
26
27
27
@@ -80,11 +80,11 @@ Network security perimeter provides a secure perimeter for communication of PaaS
80
80
81
81
## How does Network Security Perimeter work?
82
82
83
-
When a network security perimeter is created and the PaaS resources are associated with the perimeter, all public traffic is denied by default. Thus preventing data exfiltration outside the perimeter.
83
+
When a network security perimeter is created and the PaaS resources are associated with the perimeter in enforced mode, all public traffic is denied by default thus preventing data exfiltration outside the perimeter.
84
84
85
-
Access rules can be used to approve public inbound and outbound traffic outside the perimeter. Public inbound access can be approved using network and identity attributes of the client such as source IP addresses and subscriptions. Public outbound access can be approved using FQDNs (Fully Qualified Domain Names) of the external destinations.
85
+
Access rules can be used to approve public inbound and outbound traffic outside the perimeter. Public inbound access can be approved using Network and Identity attributes of the client such as source IP addresses, subscriptions. Public outbound access can be approved using FQDNs (Fully Qualified Domain Names) of the external destinations.
86
86
87
-
For example, when creating a network security perimeter and associating a set of PaaS resources, like Azure Key Vault and SQL DB, with the perimeter, all incoming and outgoing public traffic is denied to these PaaS resources by default. To allow any access outside the perimeter, necessary access rules can be created. Within the same perimeter, profiles can also be created to group PaaS resources with similar set of inbound and outbound access requirements.
87
+
For example, upon creating a network security perimeter and associating a set of PaaS resources like Azure Key Vault and SQL DB in enforced mode, with the perimeter, all incoming and outgoing public traffic is denied to these PaaS resources by default. To allow any access outside the perimeter, necessary access rules can be created. Within the same perimeter, profiles may also be created to group PaaS resources with similar set of inbound and outbound access requirements.
88
88
89
89
## Onboarded private link resources
90
90
A network security perimeter-aware private link resource is a PaaS resource that can be associated with a network security perimeter. Currently the list of onboarded private link resources are as follows:
@@ -98,16 +98,16 @@ A network security perimeter-aware private link resource is a PaaS resource that
Network security perimeter is currently available in all Azure public cloud regions. However, while enabling access logs for network security perimeter, consider the region availability of Azure monitor.
108
+
Network security perimeter is currently available in all Azure public cloud regions. However, while enabling access logs for network security perimeter, the Log Analytics workspace to be associated with the network security perimeter needs to be located in one of the Azure Monitor supported regions. Currently, those regions are **East US**, **East US 2**, **North Central US**, **South Central US**, **West US**, and **West US 2**.
108
109
109
110
> [!NOTE]
110
-
> Though the network security perimeter can be created in any region, the Log analytics workspace to be associated with the network security perimeter needs to be located in one of the Azure Monitor supported regions.
111
111
> For PaaS resource logs, use **Storage and Event Hub** as the log destination for any region associated to the same perimeter.
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-diagnostic-logs.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ ms.author: mbender
6
6
ms.service: azure-private-link
7
7
ms.topic: conceptual
8
8
ms.date: 11/04/2024
9
+
ms.custom: references_regions
9
10
#CustomerIntent: As a network administrator, I want to enable diagnostic logging for Network Security Perimeter, so that I can monitor and analyze the network traffic to and from my resources.
10
11
---
11
12
@@ -25,8 +26,8 @@ Access logs categories for a network security perimeter are based on the results
25
26
|**NspPublicInboundPerimeterRulesDenied**| Public inbound access denied by network security perimeter. | Enforced |
26
27
|**NspPublicOutboundPerimeterRulesAllowed**| Outbound access is allowed based on network security perimeter access rules. | Learning/Enforced |
27
28
|**NspPublicOutboundPerimeterRulesDenied**| Public outbound access denied by network security perimeter. | Enforced |
28
-
|**nspOutboundAttempt**| Outbound attempt within network security perimeter. | Learning/Enforced |
29
-
|**nspIntraPerimeterInboundAllowed**| Inbound access within perimeter is allowed. | Learning/Enforced |
29
+
|**NspOutboundAttempt**| Outbound attempt within network security perimeter. | Learning/Enforced |
30
+
|**NspIntraPerimeterInboundAllowed**| Inbound access within perimeter is allowed. | Learning/Enforced |
30
31
|**NspPublicInboundResourceRulesAllowed**| When network security perimeter rules deny, inbound access is allowed based on PaaS resource rules. | Learning |
31
32
|**NspPublicInboundResourceRulesDenied**| When network security perimeter rules deny, inbound access denied by PaaS resource rules. | Learning |
32
33
|**NspPublicOutboundResourceRulesAllowed**| When network security perimeter rules deny, outbound access allowed based on PaaS resource rules. | Learning |
@@ -43,6 +44,9 @@ You can enable diagnostic logging for a network security perimeter by using the
43
44
44
45
:::image type="content" source="media/network-security-perimeter-diagnostic-logs/network-security-perimeter-diagnostic-settings.png" alt-text="Screenshot of diagnostic settings options for a network security perimeter.":::
45
46
47
+
> [!NOTE]
48
+
> When using Azure Monitor with a network security perimeter, the Log Analytics workspace to be associated with the network security perimeter needs to be located in one of the Azure Monitor supported regions. For more information on available regions, see [Regional limits for Network Security Perimeter](./network-security-perimeter-concepts.md#regional-limitations).
Copy file name to clipboardExpand all lines: includes/network-security-perimeter-limits.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@
7
7
ms.topic: include
8
8
ms.date: 10/28/2024
9
9
ms.author: mbender-ms
10
-
ms.custom: include file
10
+
ms.custom: include file, regions_references
11
11
---
12
12
13
13
### Scale limitations
@@ -19,14 +19,16 @@ Network security perimeter functionality can be used to support deployments of P
19
19
|**Number of network security perimeters**| Supported up to 100 as recommended limit per subscription. |
20
20
|**Profiles per network security perimeters**| Supported up to 200 as recommended limit. |
21
21
|**Number of rule elements per profile**| Supported up to 200 as hard limit. |
22
-
|**Number of PaaS resources associated with the same network security perimeter**| Supported up to 1000 as recommended limit. |
22
+
|**Number of PaaS resources across subscriptions associated with the same network security perimeter**| Supported up to 1000 as recommended limit. |
23
23
24
24
### Other limitations
25
25
26
26
Network security perimeter has other limitations as follows:
27
27
28
28
|**Limitation/Issue**|**Description**|
29
29
|-----------------|-------------|
30
+
|**Resource group move operation cannot be performed if multiple network security perimeters are present**| If there are multiple network security perimeters present in the same resource group, then the network security perimeter cannot be moved across resource groups/subscriptions. |
31
+
|**Associations must be removed before deleting network security perimeter**| Forced delete option is currently unavailable. Thus all associations must be removed before deleting a network security perimeter. Only remove associations after taking precautions for allowing access previously controlled by network security perimeter. |
30
32
|**Resource names cannot be longer than 44 characters to support network security perimeter**| The network security perimeter resource association created from the Azure portal has the format `{resourceName}-{perimeter-guid}`. To align with the requirement name field can't have more than 80 characters, resources names would have to be limited to 44 characters. |
31
33
|**Service endpoint traffic is not supported.**| It's recommended to use private endpoints for IaaS to PaaS communication. Currently, service endpoint traffic can be denied even when an inbound rule allows 0.0.0.0/0. |
0 commit comments