Skip to content

Commit 33912a0

Browse files
committed
updates for transition wording change
1 parent 145a045 commit 33912a0

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

articles/private-link/network-security-perimeter-concepts.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mbender-ms
66
ms.author: mbender
77
ms.service: azure-private-link
88
ms.topic: overview
9-
ms.date: 01/06/2025
9+
ms.date: 05/16/2025
1010
ms.custom: references_regions, ignite-2024
1111
#CustomerIntent: As a network security administrator, I want to understand how to use Network Security Perimeter to control network access to Azure PaaS resources.
1212
---
@@ -59,11 +59,11 @@ Administrators add PaaS resources to a perimeter by creating resource associatio
5959

6060
| **Mode** | **Description** |
6161
|----------------|--------|
62-
| **Learning mode** | - Default access mode.</br>- Helps network administrators to understand the existing access patterns of their PaaS resources.</br>- Advised mode of use before transitioning to enforced mode.|
62+
| **Transition mode (formerly Learning mode)** | - Default access mode.</br>- Helps network administrators to understand the existing access patterns of their PaaS resources.</br>- Advised mode of use before transitioning to enforced mode.|
6363
| **Enforced mode** | - Must be set by the administrator.</br>- By default, all traffic except intra perimeter traffic is denied in this mode unless an *Allow* access rule exists. |
6464

6565

66-
Learn more on transitioning from learning mode to enforced mode in [Transitioning to a network security perimeter](network-security-perimeter-transition.md) article.
66+
Learn more on move from transition mode (formerly learning mode) to enforced mode in [Transitioning to a network security perimeter](network-security-perimeter-transition.md) article.
6767

6868
## Why use a network security perimeter?
6969

articles/private-link/network-security-perimeter-transition.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ ms.service: azure-private-link
88
ms.custom:
99
- ignite-2024
1010
ms.topic: overview
11-
ms.date: 11/06/2024
11+
ms.date: 05/16/2025
1212
#CustomerIntent: As a network administrator, I want to understand the different access modes and how to transition to a network security perimeter in Azure.
1313
---
1414

@@ -22,25 +22,25 @@ The **access mode** configuration point is part of a resource association on the
2222

2323
The property `accessMode` can be set in a resource association to control the resource's public network access.
2424

25-
The possible values of `accessMode` are currently **Enforced** and **Learning**.
25+
The possible values of `accessMode` are currently **Enforced** and **Transition**.
2626

2727
| **Access Mode** | **Description** |
2828
|-------------|-------------|
29-
| **Learning** | This is the default access mode. Evaluation in this mode will use the network security perimeter configuration as a baseline, but in the case of not finding a matching rule, evaluation will fall back to the resource firewall configuration which can then approve access with existing settings. |
29+
| **Transition** | This is the default access mode. Evaluation in this mode will use the network security perimeter configuration as a baseline, but in the case of not finding a matching rule, evaluation will fall back to the resource firewall configuration which can then approve access with existing settings. |
3030
| **Enforced** | When explicitly set, the resource obeys **only** network security perimeter access rules. |
3131

3232
## Prevent connectivity disruptions while adopting network security perimeter
3333

34-
### Enable Learning mode
34+
### Enable Transition mode
3535

36-
To prevent undesired connectivity disruptions while adopting network security perimeter to existing PaaS resources and ensure a smooth transition to secure configurations, administrators can add PaaS resources to network security perimeter in Learning mode. While this step does not secure the PaaS resources, it will:
36+
To prevent undesired connectivity disruptions while adopting network security perimeter to existing PaaS resources and ensure a smooth transition to secure configurations, administrators can add PaaS resources to network security perimeter in Transition mode (formerly Learning mode). While this step does not secure the PaaS resources, it will:
3737

3838
- Allow connections to be established in accordance with the network security perimeter configuration. Additionally, resources in this configuration fallback to honoring resource-defined firewall rules and trusted access behavior when connections aren't permitted by the network security perimeter access rules.
3939
- When diagnostic logs are enabled, generates logs detailing whether connections were approved based on network security perimeter configuration or the resource's configuration. Administrators can then analyse those logs to identify gaps in access rules, missing perimeter memberships, and undesired connections.
4040

4141

4242
> [!IMPORTANT]
43-
> Operating PaaS resources in **Learning** mode should serve only as a transitional step. Malicious actors may exploit unsecured resources to exfiltrate data. Therefore, it is crucial to transition to a fully secure configuration as soon as possible with the access mode set to **Enforced**.
43+
> Operating PaaS resources in **Transition (formerly Learning)** mode should serve only as a transitional step. Malicious actors may exploit unsecured resources to exfiltrate data. Therefore, it is crucial to transition to a fully secure configuration as soon as possible with the access mode set to **Enforced**.
4444
4545
### Transition to enforced mode for existing resources
4646

@@ -57,7 +57,7 @@ Network security perimeter supports secure by default behavior by introducing a
5757

5858
On resource creation, if `publicNetworkAccess` is set to `SecuredByPerimeter`, the resource is created in the lockdown mode even when not associated with a perimeter. Only private link traffic will be allowed if configured. Once associated to a perimeter, network security perimeter governs the resource access behavior. The following table summarizes access behavior in various modes and public network access configuration:
5959

60-
| **Association access mode** | **Not associated** | **Learning mode** | **Enforced mode** |
60+
| **Association access mode** | **Not associated** | **Transition mode** | **Enforced mode** |
6161
|-----------------|-------------------|-----------------|-----------------|
6262
| **Public network access** | | | |
6363
| **Enabled** | **Inbound:** Resource rules</br></br>**Outbound** Allowed | **Inbound:** Network security perimeter + Resource rules</br>**Outbound** Network security perimeter rules + Allowed | **Inbound:** Network security perimeter rules</br>**Outbound** Network security perimeter rules |

0 commit comments

Comments
 (0)