Skip to content

Commit 24d17ea

Browse files
author
Larry Franks
committed
rewording per feedback
1 parent 0c6fa51 commit 24d17ea

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/machine-learning/how-to-access-azureml-behind-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ __Outbound traffic__
8282
| `AzureMonitor` | 443 | Used to log monitoring and metrics to Azure Monitor. Only needed if you haven't [secured Azure Monitor](how-to-secure-workspace-vnet.md#secure-azure-monitor-and-application-insights) for the workspace. </br>* This outbound is also used to log information for support incidents. |
8383

8484
> [!IMPORTANT]
85-
> If a compute instance or compute cluster is configured for no public IP, it can still send outbound traffic to the internet using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access#when-is-default-outbound-access-provided) Azure provides for VMs. However, if you need outbound access we recommend implementing your own instead of relying on the default. We recommend using one of the following options:
85+
> If a compute instance or compute cluster is configured for no public IP, it can still send outbound traffic to the public network using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access#when-is-default-outbound-access-provided) Azure provides for VMs. However, if you need outbound access we recommend implementing your own instead of relying on the default. We recommend using one of the following options:
8686
>
8787
> * __Azure Virtual Network NAT with a public IP__: For more information on using Virtual Network Nat, see the [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) documentation.
8888
> * __User-defined route and firewall__: Create a user-defined route in the subnet that contains the compute. The __Next hop__ for the route should reference the private IP address of the firewall, with an address prefix of 0.0.0.0/0.

articles/machine-learning/how-to-secure-training-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The following table contains the differences between these configurations:
3232
| Configuration | With public IP | Without public IP |
3333
| ----- | ----- | ----- |
3434
| Inbound traffic | AzureMachineLearning | None |
35-
| Outbound traffic | By default, can access the public internet with no restrictions.<br>You can restrict what it accesses using a Network Security Group or firewall. | By default, can access the public internet using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) provided by Azure.<br>We recommend using a Virtual Network NAT gateway or Firewall instead if you need to route outbound traffic to required resources on the internet. |
35+
| Outbound traffic | By default, can access the public internet with no restrictions.<br>You can restrict what it accesses using a Network Security Group or firewall. | By default, can access the public network using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) provided by Azure.<br>We recommend using a Virtual Network NAT gateway or Firewall instead if you need to route outbound traffic to required resources on the internet. |
3636
| Azure networking resources | Public IP address, load balancer, network interface | None |
3737

3838
You can also use Azure Databricks or HDInsight to train models in a virtual network.

articles/machine-learning/v1/how-to-secure-training-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following table contains the differences between these configurations:
3333
| Configuration | With public IP | Without public IP |
3434
| ----- | ----- | ----- |
3535
| Inbound traffic | AzureMachineLearning | None |
36-
| Outbound traffic | By default, can access the public internet with no restrictions.<br>You can restrict what it accesses using a Network Security Group or firewall. | By default, it cannot access the public internet since there is no public IP resource.<br>You need a Virtual Network NAT gateway or Firewall to route outbound traffic to required resources on the internet. |
36+
| Outbound traffic | By default, can access the public internet with no restrictions.<br>You can restrict what it accesses using a Network Security Group or firewall. | By default, can access the public network using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) provided by Azure.<br>We recommend using a Virtual Network NAT gateway or Firewall instead if you need to route outbound traffic to required resources on the internet. |
3737
| Azure networking resources | Public IP address, load balancer, network interface | None |
3838

3939
You can also use Azure Databricks or HDInsight to train models in a virtual network.

0 commit comments

Comments
 (0)