Skip to content

Commit 25bcb4f

Browse files
Merge pull request #266025 from b-ahibbard/cmk-edits
issue #119692
2 parents 592856b + be935b5 commit 25bcb4f

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/azure-netapp-files/azure-netapp-files-network-topologies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ Configuring UDRs on the source VM subnets with the address prefix of delegated s
205205
> To access an Azure NetApp Files volume from an on-premises network via a VNet gateway (ExpressRoute or VPN) and firewall, configure the route table assigned to the VNet gateway to include the `/32` IPv4 address of the Azure NetApp Files volume listed and point to the firewall as the next hop. Using an aggregate address space that includes the Azure NetApp Files volume IP address will not forward the Azure NetApp Files traffic to the firewall.
206206
207207
>[!NOTE]
208-
>If you want to configure a UDR route in the VM VNet, to control the routing of packets destined for a VNet-peered Azure NetApp Files standard volume, the UDR prefix must be more specific or equal to the delegated subnet size of the Azure NetApp Files volume. If the UDR prefix is of size greater than the delegated subnet size, it will not be effective.
208+
>If you want to configure a UDR route in the VM VNet, to control the routing of packets destined for a regionally VNet-peered Azure NetApp Files standard volume, the UDR prefix must be more specific or equal to the delegated subnet size of the Azure NetApp Files volume. If the UDR prefix is of size greater than the delegated subnet size, it will not be effective.
209209
210210
## Azure native environments
211211

articles/azure-netapp-files/configure-customer-managed-keys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.author: anfdocs
1212

1313
# Configure customer-managed keys for Azure NetApp Files volume encryption
1414

15-
Customer-managed keys for Azure NetApp Files volume encryption enable you to use your own keys rather than a Microsoft-managed key when creating a new volume. With customer-managed keys, you can fully manage the relationship between a key's life cycle, key usage permissions, and auditing operations on keys.
15+
Customer-managed keys for Azure NetApp Files volume encryption enable you to use your own keys rather than a platform-managed key when creating a new volume. With customer-managed keys, you can fully manage the relationship between a key's life cycle, key usage permissions, and auditing operations on keys.
1616

1717
The following diagram demonstrates how customer-managed keys work with Azure NetApp Files:
1818

@@ -23,7 +23,7 @@ The following diagram demonstrates how customer-managed keys work with Azure Net
2323
3. You use the managed identity to which the Azure Key Vault admin granted permissions in step 1 to authenticate access to Azure Key Vault via Microsoft Entra ID.
2424
4. Azure NetApp Files wraps the account encryption key with the customer-managed key in Azure Key Vault.
2525

26-
Customer-managed keys have no performance impact on Azure NetApp Files. Its only difference from Microsoft-managed keys is how the key is managed.
26+
Customer-managed keys have no performance impact on Azure NetApp Files. Its only difference from platform-managed keys is how the key is managed.
2727
1. For read/write operations, Azure NetApp Files sends requests to Azure Key Vault to unwrap the account encryption key to perform encryption and decryption operations.
2828

2929
## Considerations
-4.99 KB
Loading

0 commit comments

Comments
 (0)