You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-firewall-access-rules.md
+29-8Lines changed: 29 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Firewall access rules
3
3
description: Configure rules to access an Azure container registry from behind a firewall, by allowing access to ("whitelisting") REST API and data endpoint domain names or service-specific IP address ranges.
4
4
ms.topic: article
5
-
ms.date: 05/07/2020
5
+
ms.date: 05/18/2020
6
6
---
7
7
8
8
# Configure rules to access an Azure container registry behind a firewall
@@ -13,7 +13,7 @@ If instead you want to configure inbound network access to a container registry
13
13
14
14
## About registry endpoints
15
15
16
-
To pull or push images or other artifacts to an Azure container registry, a client such as a Docker daemon needs to interact over HTTPS with two distinct endpoints. For clients that access a registry from behind a firewall, you need to configure access rules for both endpoints.
16
+
To pull or push images or other artifacts to an Azure container registry, a client such as a Docker daemon needs to interact over HTTPS with two distinct endpoints. For clients that access a registry from behind a firewall, you need to configure access rules for both endpoints. Both endpoints are reached over port 443.
17
17
18
18
***Registry REST API endpoint** - Authentication and registry management operations are handled through the registry's public REST API endpoint. This endpoint is the login server name of the registry. Example: `myregistry.azurecr.io`
19
19
@@ -26,7 +26,7 @@ If your registry is [geo-replicated](container-registry-geo-replication.md), a c
26
26
***REST endpoint** - Allow access to the fully qualified registry login server name, `<registry-name>.azurecr.io`, or an associated IP address range
27
27
***Storage (data) endpoint** - Allow access to all Azure blob storage accounts using the wildcard `*.blob.core.windows.net`, or an associated IP address range.
28
28
> [!NOTE]
29
-
> Azure Container Registry is introducing [dedicated data endpoints](#enable-dedicated-data-endpoints-preview) (preview), allowing you to tightly scope client firewall rules for your registry storage. Optionally enable data endpoints in all regions where the registry is located or replicated, using the form `<registry-name>.<region>.data.azurecr.io`.
29
+
> Azure Container Registry is introducing [dedicated data endpoints](#enable-dedicated-data-endpoints), allowing you to tightly scope client firewall rules for your registry storage. Optionally enable data endpoints in all regions where the registry is located or replicated, using the form `<registry-name>.<region>.data.azurecr.io`.
30
30
31
31
## Allow access by IP address range
32
32
@@ -112,26 +112,45 @@ In an Azure virtual network, use network security rules to filter traffic from a
112
112
113
113
For example, create an outbound network security group rule with destination **AzureContainerRegistry** to allow traffic to an Azure container registry. To allow access to the service tag only in a specific region, specify the region in the following format: **AzureContainerRegistry**.[*region name*].
114
114
115
-
## Enable dedicated data endpoints (preview)
115
+
## Enable dedicated data endpoints
116
116
117
117
> [!WARNING]
118
118
> If you previously configured client firewall access to the existing `*.blob.core.windows.net` endpoints, switching to dedicated data endpoints will impact client connectivity, causing pull failures. To ensure clients have consistent access, add the new data endpoint rules to the client firewall rules. Once completed, enable dedicated data endpoints for your registries using the Azure CLI or other tools.
119
119
120
-
Dedicated data endpoints is an optional feature of the **Premium** container registry service tier. For information about registry service tiers and limits, see [Azure Container Registry Tiers](container-registry-skus.md). To enable data endpoints using the Azure CLI, use Azure CLI version 2.4.0 or higher. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
120
+
Dedicated data endpoints is an optional feature of the **Premium** container registry service tier. For information about registry service tiers and limits, see [Azure Container Registry service tiers](container-registry-skus.md).
121
121
122
-
The following [az acr update][az-acr-update] command enables dedicated data endpoints on a registry *myregistry*. For demonstration purpose, assume that the registry is replicated in two regions:
122
+
You can enable dedicated data endpoints using the Azure portal or the Azure CLI. The data endpoints follow a regional pattern, `<registry-name>.<region>.data.azurecr.io`. In a geo-replicated registry, enabling data endpoints enables endpoints in all replica regions.
123
+
124
+
### Portal
125
+
126
+
To enable data endpoints using the portal:
127
+
128
+
1. Navigate to your container registry.
129
+
1. Select **Networking** > **Public access**.
130
+
1. Select the **Enable dedicated data endpoint** checkbox.
131
+
1. Select **Save**.
132
+
133
+
The data endpoint or endpoints appear in the portal.
134
+
135
+

136
+
137
+
### Azure CLI
138
+
139
+
To enable data endpoints using the Azure CLI, use Azure CLI version 2.4.0 or higher. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli).
140
+
141
+
The following [az acr update][az-acr-update] command enables dedicated data endpoints on a registry *myregistry*.
123
142
124
143
```azurecli
125
144
az acr update --name myregistry --data-endpoint-enabled
126
145
```
127
146
128
-
The data endpoints use a regional pattern, `<registry-name>.<region>.data.azurecr.io`. To view the data endpoints, use the [az acr show-endpoints][az-acr-show-endpoints] command:
147
+
To view the data endpoints, use the [az acr show-endpoints][az-acr-show-endpoints] command:
129
148
130
149
```azurecli
131
150
az acr show-endpoints --name myregistry
132
151
```
133
152
134
-
Output:
153
+
Output for demonstration purposes shows two regional endpoints
135
154
136
155
```
137
156
{
@@ -161,6 +180,8 @@ If you need to access Microsoft Container Registry (MCR) from behind a firewall,
161
180
162
181
* Learn more about [security groups](/azure/virtual-network/security-overview) in an Azure virtual network
163
182
183
+
* Learn more about setting up [Private Link](container-registry-private-link.md) for a container registry
184
+
164
185
* Learn more about [dedicated data endpoints](https://azure.microsoft.com/blog/azure-container-registry-mitigating-data-exfiltration-with-dedicated-data-endpoints/) for Azure Container Registry
0 commit comments