You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-concepts.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-private-link
8
8
ms.topic: overview
9
-
ms.date: 01/06/2025
9
+
ms.date: 05/16/2025
10
10
ms.custom: references_regions, ignite-2024
11
11
#CustomerIntent: As a network security administrator, I want to understand how to use Network Security Perimeter to control network access to Azure PaaS resources.
12
12
---
@@ -59,11 +59,11 @@ Administrators add PaaS resources to a perimeter by creating resource associatio
59
59
60
60
|**Mode**|**Description**|
61
61
|----------------|--------|
62
-
|**Learning mode**| - Default access mode.</br>- Helps network administrators to understand the existing access patterns of their PaaS resources.</br>- Advised mode of use before transitioning to enforced mode.|
62
+
|**Transition mode (formerly Learning mode)**| - Default access mode.</br>- Helps network administrators to understand the existing access patterns of their PaaS resources.</br>- Advised mode of use before transitioning to enforced mode.|
63
63
|**Enforced mode**| - Must be set by the administrator.</br>- By default, all traffic except intra perimeter traffic is denied in this mode unless an *Allow* access rule exists. |
64
64
65
65
66
-
Learn more on transitioning from learning mode to enforced mode in [Transitioning to a network security perimeter](network-security-perimeter-transition.md) article.
66
+
Learn more on move from transition mode (formerly learning mode) to enforced mode in [Transitioning to a network security perimeter](network-security-perimeter-transition.md) article.
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-transition.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ ms.service: azure-private-link
8
8
ms.custom:
9
9
- ignite-2024
10
10
ms.topic: overview
11
-
ms.date: 11/06/2024
11
+
ms.date: 05/16/2025
12
12
#CustomerIntent: As a network administrator, I want to understand the different access modes and how to transition to a network security perimeter in Azure.
13
13
---
14
14
@@ -22,25 +22,25 @@ The **access mode** configuration point is part of a resource association on the
22
22
23
23
The property `accessMode` can be set in a resource association to control the resource's public network access.
24
24
25
-
The possible values of `accessMode` are currently **Enforced** and **Learning**.
25
+
The possible values of `accessMode` are currently **Enforced** and **Transition**.
26
26
27
27
|**Access Mode**|**Description**|
28
28
|-------------|-------------|
29
-
|**Learning**| This is the default access mode. Evaluation in this mode will use the network security perimeter configuration as a baseline, but in the case of not finding a matching rule, evaluation will fall back to the resource firewall configuration which can then approve access with existing settings. |
29
+
|**Transition**| This is the default access mode. Evaluation in this mode will use the network security perimeter configuration as a baseline, but in the case of not finding a matching rule, evaluation will fall back to the resource firewall configuration which can then approve access with existing settings. |
30
30
|**Enforced**| When explicitly set, the resource obeys **only** network security perimeter access rules. |
31
31
32
32
## Prevent connectivity disruptions while adopting network security perimeter
33
33
34
-
### Enable Learning mode
34
+
### Enable Transition mode
35
35
36
-
To prevent undesired connectivity disruptions while adopting network security perimeter to existing PaaS resources and ensure a smooth transition to secure configurations, administrators can add PaaS resources to network security perimeter in Learning mode. While this step does not secure the PaaS resources, it will:
36
+
To prevent undesired connectivity disruptions while adopting network security perimeter to existing PaaS resources and ensure a smooth transition to secure configurations, administrators can add PaaS resources to network security perimeter in Transition mode (formerly Learning mode). While this step does not secure the PaaS resources, it will:
37
37
38
38
- Allow connections to be established in accordance with the network security perimeter configuration. Additionally, resources in this configuration fallback to honoring resource-defined firewall rules and trusted access behavior when connections aren't permitted by the network security perimeter access rules.
39
39
- When diagnostic logs are enabled, generates logs detailing whether connections were approved based on network security perimeter configuration or the resource's configuration. Administrators can then analyse those logs to identify gaps in access rules, missing perimeter memberships, and undesired connections.
40
40
41
41
42
42
> [!IMPORTANT]
43
-
> Operating PaaS resources in **Learning** mode should serve only as a transitional step. Malicious actors may exploit unsecured resources to exfiltrate data. Therefore, it is crucial to transition to a fully secure configuration as soon as possible with the access mode set to **Enforced**.
43
+
> Operating PaaS resources in **Transition (formerly Learning)** mode should serve only as a transitional step. Malicious actors may exploit unsecured resources to exfiltrate data. Therefore, it is crucial to transition to a fully secure configuration as soon as possible with the access mode set to **Enforced**.
44
44
45
45
### Transition to enforced mode for existing resources
46
46
@@ -57,7 +57,7 @@ Network security perimeter supports secure by default behavior by introducing a
57
57
58
58
On resource creation, if `publicNetworkAccess` is set to `SecuredByPerimeter`, the resource is created in the lockdown mode even when not associated with a perimeter. Only private link traffic will be allowed if configured. Once associated to a perimeter, network security perimeter governs the resource access behavior. The following table summarizes access behavior in various modes and public network access configuration:
0 commit comments