Skip to content

Commit 4a8c2fa

Browse files
committed
Some revisions
1 parent 2dd9c10 commit 4a8c2fa

File tree

4 files changed

+35
-18
lines changed

4 files changed

+35
-18
lines changed

articles/storage/blobs/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -321,6 +321,8 @@ items:
321321
href: ../common/storage-network-security-resource-instances.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
322322
- name: Manage Exceptions
323323
href: ../common/storage-network-security-manage-exceptions.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
324+
- name: Trusted Azure services
325+
href: ../common/storage-network-security-trusted-microsoft-services.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
324326
- name: Network security perimeter
325327
href: ../common/storage-network-security-perimeter.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
326328
- name: Private endpoints

articles/storage/common/storage-network-security-ip-address-range.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Configure Azure Storage to accept requests from IP address ranges
3-
description: Configure the Azure Storage firewall to accept requests from IP address ranges.
2+
title: Create an IP network rule for Azure Storage
3+
description: Learn how to create an IP network rule that enables traffic to an Azure Storage account from IP address ranges.
44
services: storage
55
author: normesta
66
ms.service: azure-storage
@@ -10,11 +10,13 @@ ms.date: 06/18/2025
1010
ms.author: normesta
1111
---
1212

13-
# Configure the Azure Storage firewall to accept requests from IP address ranges
13+
# Create an IP network rule for Azure Storage
1414

15-
You can deny all public access to your storage account, and then configure Azure network settings to accept requests from specific IP address ranges. To learn more, see [Permit access to IP address ranges](storage-network-security.md#grant-access-from-an-internet-ip-range).
15+
You can deny all public access to your storage account, and then configure Azure network settings to accept requests from specific IP address ranges. To enable traffic from a specific public IP address ranges, create one or more IP network rules. To learn more, see [Permit access to IP address ranges](storage-network-security.md#grant-access-from-an-internet-ip-range).
1616

17-
## [Portal](#tab/azure-portal)
17+
## Create an IP network rule
18+
19+
### [Portal](#tab/azure-portal)
1820

1921
1. Go to the storage account for which you want to manage IP network rules.
2022

@@ -28,7 +30,7 @@ You can deny all public access to your storage account, and then configure Azure
2830

2931
6. Select **Save** to apply your changes.
3032

31-
## [PowerShell](#tab/azure-powershell)
33+
### [PowerShell](#tab/azure-powershell)
3234

3335
1. Install [Azure PowerShell](/powershell/azure/install-azure-powershell) and [sign in](/powershell/azure/authenticate-azureps).
3436

@@ -71,7 +73,7 @@ You can deny all public access to your storage account, and then configure Azure
7173
Remove-AzStorageAccountNetworkRule -ResourceGroupName "myresourcegroup" -AccountName "mystorageaccount" -IPAddressOrRange "16.17.18.0/24"
7274
```
7375
74-
## [Azure CLI](#tab/azure-cli)
76+
### [Azure CLI](#tab/azure-cli)
7577
7678
1. Install the [Azure CLI](/cli/azure/install-azure-cli) and [sign in](/cli/azure/authenticate-azure-cli).
7779

articles/storage/common/storage-network-security-virtual-networks.md

Lines changed: 21 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Configure Azure Storage to accept requests from virtual networks
3-
description: Learn how to configure Azure Storage to accept requests from virtual networks.
2+
title: Create a virtual network rule for Azure Storage
3+
description: Learn how to create a virtual network rule that enables traffic to an Azure Storage account from subnets in an Azure Virtual network.
44
services: storage
55
author: normesta
66
ms.service: azure-storage
@@ -11,13 +11,15 @@ ms.author: normesta
1111

1212
---
1313

14-
# Configure Azure Storage to accept requests from virtual networks
14+
# Create a virtual network rule for Azure Storage
1515

16-
You can deny all public access to your storage account, and then configure Azure network settings to accept requests that originate from specific virtual network subnets. To learn more, see [Permit access to virtual network subnets](storage-network-security.md#grant-access-from-a-virtual-network).
16+
You can deny all public access to your storage account, and then configure Azure network settings to accept requests that originate from specific virtual network subnets. To learn more, see [virtual network subnets](storage-network-security.md#grant-access-from-a-virtual-network).
1717

1818
To apply a virtual network rule to a storage account, the user must have the appropriate permissions for the subnets that are being added. A [Storage Account Contributor](../../role-based-access-control/built-in-roles.md#storage-account-contributor) or a user who has permission to the `Microsoft.Network/virtualNetworks/subnets/joinViaServiceEndpoint/action` [Azure resource provider operation](../../role-based-access-control/resource-provider-operations.md#microsoftnetwork) can apply a rule by using a custom Azure role.
1919

20-
## [Portal](#tab/azure-portal)
20+
## Create a virtual network rule
21+
22+
### [Portal](#tab/azure-portal)
2123

2224
> [!NOTE]
2325
> If you want to enable access from a virtual network in another Microsoft Entra tenant, you must use PowerShell or the Azure CLI. The Azure portal doesn't show subnets in other Microsoft Entra tenants.
@@ -26,9 +28,19 @@ To apply a virtual network rule to a storage account, the user must have the app
2628

2729
2. In the service menu, under **Security + networking**, select **Networking**.
2830

29-
3. To allow traffic only from specific virtual networks, make sure that **Enabled from selected virtual networks and IP addresses** is selected.
31+
3. In the **Firewalls and virtual networks** tab of the network settings page, make sure that **Enabled from selected virtual networks and IP addresses** is selected.
32+
33+
4. Under **Virtual networks**, select **Add existing virtual network**.
34+
35+
The **Add networks pane** appears.
36+
37+
5. From the **Virtual networks** drop-down list, select a virtual network.
38+
39+
6. From the **Subnets** drop-down list, select the desired subnets, then select **Add**.
40+
41+
6. If you need to create a new virtual network, select **Add new virtual network**. Provide the necessary information to create the new virtual network, and then select **Create**.
3042

31-
4. To grant access to a virtual network by using a new network rule, under **Virtual networks**, select **Add existing virtual network**. Select the **Virtual networks** and **Subnets** options, and then select **Add**. To create a new virtual network and grant it access, select **Add new virtual network**. Provide the necessary information to create the new virtual network, and then select **Create**. Currently, only virtual networks that belong to the same Microsoft Entra tenant appear for selection during rule creation. To grant access to a subnet in a virtual network that belongs to another tenant, use PowerShell, the Azure CLI, or REST API.
43+
Only virtual networks that belong to the same Microsoft Entra tenant appear for selection during rule creation. To grant access to a subnet in a virtual network that belongs to another tenant, use PowerShell, the Azure CLI, or REST API.
3244

3345
5. To remove a virtual network or subnet rule, select the ellipsis (**...**) to open the context menu for the virtual network or subnet, and then select **Remove**.
3446

@@ -37,7 +49,7 @@ To apply a virtual network rule to a storage account, the user must have the app
3749
> [!IMPORTANT]
3850
> If you delete a subnet that's included in a network rule, it will be removed from the network rules for the storage account. If you create a new subnet by the same name, it won't have access to the storage account. To allow access, you must explicitly authorize the new subnet in the network rules for the storage account.
3951
40-
## [PowerShell](#tab/azure-powershell)
52+
### [PowerShell](#tab/azure-powershell)
4153

4254
1. Install [Azure PowerShell](/powershell/azure/install-azure-powershell) and [sign in](/powershell/azure/authenticate-azureps).
4355

@@ -78,7 +90,7 @@ To apply a virtual network rule to a storage account, the user must have the app
7890
Remove-AzStorageAccountNetworkRule -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -VirtualNetworkResourceId $subnet.Id
7991
```
8092
81-
## [Azure CLI](#tab/azure-cli)
93+
### [Azure CLI](#tab/azure-cli)
8294
8395
1. Install the [Azure CLI](/cli/azure/install-azure-cli) and [sign in](/cli/azure/authenticate-azure-cli).
8496

articles/storage/common/storage-network-security.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ The following table describes each type of service endpoint that you can enable
3434
> [!NOTE]
3535
> You can associate only one of these endpoint types to a subnet. If one of these endpoints is already associated with the subnet, you'll have to delete that endpoint before adding the other.
3636
37-
To learn how to configure a virtual network rule and enable service endpoints, see [Configure Azure Storage to accept requests from virtual networks](storage-network-security-virtual-networks.md).
37+
To learn how to configure a virtual network rule and enable service endpoints, see [Create a virtual network rule for Azure Storage](storage-network-security-virtual-networks.md).
3838

3939
<a id="grant-access-from-an-internet-ip-range"></a>
4040
<a id="managing-ip-network-rules"></a>
@@ -51,7 +51,7 @@ When you're planning for disaster recovery during a regional outage, create the
5151

5252
For clients and services not located in a virtual network, you can enable traffic by creating *IP network rules*. Each IP network rule can enable traffic from a specific public IP address range. For example, if a client from an on-premises network needs to access storage data, then a rule can include the public IP address of that client. Each storage account supports up to **400** IP network rules.
5353

54-
To learn how to create IP network rules, see [Configure the Azure Storage firewall to accept requests from IP address ranges](storage-network-security-ip-address-range.md).
54+
To learn how to create IP network rules, see [Create an IP network rule for Azure Storage](storage-network-security-ip-address-range.md).
5555

5656
If you've enabled a service endpoint for a subnet, then traffic from that subnet won't use a public IP address to communicate with a storage account. Instead, all the traffic uses a private IP address as a source IP. As a result, IP network rules that permit traffic from those subnets no longer have an effect.
5757

@@ -82,6 +82,7 @@ To learn how to configure a resource instance rule, see [Configure Azure Storage
8282
<a id="exceptions"></a>
8383
<a id="trusted-access-based-on-system-assigned-managed-identity"></a>
8484
<a id="trusted-access-based-on-a-managed-identity"></a>
85+
<a id="trusted-access-for-resources-registered-in-your-microsoft-entra-tenant"></a>
8586

8687
## Trusted Azure services
8788

0 commit comments

Comments
 (0)