Skip to content

Commit 29a6979

Browse files
Merge pull request #288420 from asudbring/vnet-encrypt-patch
Minor updates for style to article
2 parents 9bbcfcd + 1de27a7 commit 29a6979

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/virtual-network/virtual-network-encryption-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,9 @@ Virtual network encryption is supported in the following scenarios:
6363

6464
| Scenario | Support |
6565
| --- | --- |
66-
| VMs in the same virtual network (including virtual machine scale sets and their internal load balancer) | Supported on traffic between VMs from these [SKUs](#requirements). |
67-
| Virtual network peering | Supported on traffic between VMs across regional peering. |
68-
| Global virtual network peering | Supported on traffic between VMs across global peering. |
66+
| Virtual machines in the same virtual network (including virtual machine scale sets and their internal load balancer) | Supported on traffic between virtual machines from these [SKUs](#requirements). |
67+
| Virtual network peering | Supported on traffic between virtual machines across regional peering. |
68+
| Global virtual network peering | Supported on traffic between virtual machines across global peering. |
6969
| Azure Kubernetes Service (AKS) | - Supported on AKS using Azure CNI (regular or overlay mode), Kubenet, or BYOCNI: node and pod traffic is encrypted.<br> - Partially supported on AKS using Azure CNI Dynamic Pod IP Assignment (podSubnetId specified): node traffic is encrypted, but pod traffic isn't encrypted.<br> - Traffic to the AKS managed control plane egresses from the virtual network and thus isn't in scope for virtual network encryption. However, this traffic is always encrypted via TLS. |
7070

7171
> [!NOTE]

0 commit comments

Comments
 (0)