Skip to content

Commit 2ba8733

Browse files
committed
Resolve blocking issues.
1 parent 44e3dd4 commit 2ba8733

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

articles/batch/network-security-perimeter.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
2-
title: Configure Network Security Perimeter for Azure Batch accounts
3-
description: Learn how to associate an Azure Batch account with Network Security Perimeter
2+
title: Configure network security perimeter for Azure Batch accounts
3+
description: Learn how to associate an Azure Batch account with network security perimeter
44
ms.topic: how-to
55
ms.date: 3/17/2025
66
ms.custom: references_regions
77
---
88

9-
# Network Security Perimeter
9+
# Network security perimeter
1010

1111
The [network security perimeter (NSP)](../private-link/network-security-perimeter-concepts.md) provided by Azure networking serves as a comprehensive tool for customers to ensure optimal security when utilizing PaaS resources. It allows customers to establish logical boundaries for network isolation and collectively manage public access controls for numerous PaaS resources.
1212

@@ -18,11 +18,11 @@ With a network security perimeter:
1818
> [!IMPORTANT]
1919
> Network security perimeter rules do not govern the private link with the [private endpoint](../private-link/private-endpoint-overview.md).
2020
21-
## Network Security Perimeter Scenarios in Batch service
21+
## Network security perimeter scenarios in Batch service
2222

2323
Azure Batch service is designed to support various scenarios that necessitate access to other PaaS resources:
2424

25-
- Application packages requires communication with Azure Storage. For more information, see [batch-application-packages](./batch-application-packages.md).
25+
- Application packages require communication with Azure Storage. For more information, see [batch-application-packages](./batch-application-packages.md).
2626
- Customer managed key requires communication with Azure KeyVault. For more information, see [batch-customer-managed-key](./batch-customer-managed-key.md).
2727

2828
Network administrators can use the network security perimeter feature to create an isolation boundary for their PaaS services. This security perimeter permits the setting up of public access controls for various PaaS resources, providing a consistent user experience and a uniform API. Setting up network security perimeter for PaaS communications supported by Batch, refer to the [Network security perimeter in Azure Storage](/azure/storage/common/storage-network-security#network-secuirty-perimeter-preview) and [Network security perimeter in Azure Key Vault](/azure/key-vault/general/network-security#network-security-perimeter-preview) for more details.
@@ -37,7 +37,7 @@ Batch users can also use the network security perimeter to secure inbound traffi
3737
> Network security perimeters do not regulate nodes within Batch pools. To ensure network isolation for the pool, you may still need to create a **nodeManagement** private endpoint for [the Batch pool without public ip addresses](./simplified-node-communication-pool-no-public-ip.md).
3838
> To enable a node to access Azure Storage and other PaaS resources associated with a network security perimeter, ensure that relevant access rules are added to the target PaaS resource's profile. These access rules grant the node the necessary permissions to visit.
3939
40-
## Configure Network Security Perimeter for Azure Batch account
40+
## Configure network security perimeter for Azure Batch account
4141

4242
### Prerequisite
4343

@@ -50,24 +50,24 @@ Batch users can also use the network security perimeter to secure inbound traffi
5050

5151
3. Make sure your Batch account operates only with the simplified node communication pool.
5252

53-
### Create a Network Security Perimeter
53+
### Create a network security perimeter
5454

5555
Create your own network security perimeter resource using [Azure portal](../private-link/create-network-security-perimeter-portal.md) or [PowerShell](../private-link/create-network-security-perimeter-powershell.md) or [Azure CLI](../private-link/create-network-security-perimeter-cli.md).
5656

57-
### Associate Batch account with the Network Security Perimeter
57+
### Associate Batch account with the network security perimeter
5858

5959
#### Using Azure portal
6060
1. Navigate to your network security perimeter resource in the Azure portal, where you should establish a profile for your Batch account to associate with. If you do not create the profile, go to **Settings** -> **Profiles** to create a network security perimeter profile initially.
6161

62-
![Profiles](./media/network-security-perimeter/create-profile.png)
62+
![Screenshot of the profile creation process in the portal.](./media/network-security-perimeter/create-profile.png)
6363

6464
2. In **Overview**, select the third option **Associate resources to your profile**
6565

66-
![NSP Get Started](./media/network-security-perimeter/nsp-get-started.png)
66+
![Screenshot of associating resources to your profile in the portal.](./media/network-security-perimeter/associate-resources.png)
6767

6868
3. Associate resources with a new profile or associate resources with an existing profile
6969

70-
![Associate Profile](./media/network-security-perimeter/associate-profile.png)
70+
![Screenshot of associating resources with either a new or existing profile in the portal.](./media/network-security-perimeter/associate-resources-with-profile.png)
7171

7272
#### Using PowerShell
7373
1. Create a new profile for your network security perimeter

0 commit comments

Comments
 (0)