Skip to content

Commit 4b627ca

Browse files
committed
fixes
1 parent b0d8cfb commit 4b627ca

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

articles/private-link/private-link-faq.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ sections:
7575
- question: |
7676
Do all Azure services reside in the Azure virtual network that the customer provides? How does a virtual network service endpoint work with Azure services?
7777
answer: |
78-
Not all Azure services reside in the customer's virtual network. Most Azure data services (such as Azure Storage, Azure SQL, and Azure Cosmos DB) are multitenant services that can be accessed over public IP addresses. For more information, see [Deploy dedicated Azure services into virtual networks](virtual-network-for-azure-services.md).
78+
Not all Azure services reside in the customer's virtual network. Most Azure data services (such as Azure Storage, Azure SQL, and Azure Cosmos DB) are multitenant services that can be accessed over public IP addresses. For more information, see [Deploy dedicated Azure services into virtual networks](/azure/virtual-network/vnet-integration-for-azure-services).
7979
8080
When you turn on virtual network service endpoints on the network side, and set up appropriate virtual network ACLs on the Azure service side, access to an Azure service is restricted to an allowed virtual network and subnet.
8181
@@ -164,7 +164,7 @@ sections:
164164
answer: |
165165
Service endpoints add a system route that takes precedence over Border Gateway Protocol (BGP) routes and provides optimum routing for the service endpoint traffic. Service endpoints always take service traffic directly from your virtual network to the service on the Microsoft Azure backbone network.
166166
167-
For more information about how Azure selects a route, see [Virtual network traffic routing](virtual-networks-udr-overview.md).
167+
For more information about how Azure selects a route, see [Virtual network traffic routing](/azure/virtual-network/virtual-networks-udr-overview).
168168
169169
- question: |
170170
Do service endpoints work with ICMP?
@@ -190,12 +190,12 @@ sections:
190190
answer: |
191191
You can use virtual network service endpoint policies to filter virtual network traffic to Azure services, allowing only specific Azure service resources over the service endpoints. Endpoint policies provide granular access control from the virtual network traffic to the Azure services.
192192
193-
To learn more, see [Virtual network service endpoint policies for Azure Storage](virtual-network-service-endpoint-policies-overview.md).
193+
To learn more, see [Virtual network service endpoint policies for Azure Storage](/azure/virtual-network/virtual-network-service-endpoint-policies-overview).
194194
195195
- question: |
196196
Does Microsoft Entra ID support virtual network service endpoints?
197197
answer: |
198-
Microsoft Entra ID doesn't support service endpoints natively. For a complete list of Azure services that support virtual network service endpoints, see [Virtual network service endpoints](./virtual-network-service-endpoints-overview.md).
198+
Microsoft Entra ID doesn't support service endpoints natively. For a complete list of Azure services that support virtual network service endpoints, see [Virtual network service endpoints](/azure/virtual-network/virtual-network-service-endpoints-overview).
199199
200200
In that list, the *Microsoft.AzureActiveDirectory* tag listed under services that support service endpoints is used for supporting service endpoints to Azure Data Lake Storage Gen1. [Virtual network integration for Data Lake Storage Gen1](../data-lake-store/data-lake-store-network-security.md?toc=%2fazure%2fvirtual-network%2ftoc.json) makes use of the virtual network service endpoint security between your virtual network and Microsoft Entra ID to generate additional security claims in the access token. These claims are then used to authenticate your virtual network to your Data Lake Storage Gen1 account and allow access.
201201
@@ -236,12 +236,12 @@ sections:
236236
answer: |
237237
You can use virtual network service endpoint policies to filter virtual network traffic to Azure services, allowing only specific Azure service resources over the service endpoints. Endpoint policies provide granular access control from the virtual network traffic to the Azure services.
238238
239-
To learn more, see [Virtual network service endpoint policies for Azure Storage](virtual-network-service-endpoint-policies-overview.md).
239+
To learn more, see [Virtual network service endpoint policies for Azure Storage](/azure/virtual-network/virtual-network-service-endpoints-overview).
240240
241241
- question: |
242242
Does Microsoft Entra ID support virtual network service endpoints?
243243
answer: |
244-
Microsoft Entra ID doesn't support service endpoints natively. For a complete list of Azure services that support virtual network service endpoints, see [Virtual network service endpoints](./virtual-network-service-endpoints-overview.md).
244+
Microsoft Entra ID doesn't support service endpoints natively. For a complete list of Azure services that support virtual network service endpoints, see [Virtual network service endpoints](/azure/virtual-network/virtual-network-service-endpoints-overview).
245245
246246
In that list, the *Microsoft.AzureActiveDirectory* tag listed under services that support service endpoints is used for supporting service endpoints to Azure Data Lake Storage Gen1. [Virtual network integration for Data Lake Storage Gen1](../data-lake-store/data-lake-store-network-security.md?toc=%2fazure%2fvirtual-network%2ftoc.json) makes use of the virtual network service endpoint security between your virtual network and Microsoft Entra ID to generate additional security claims in the access token. These claims are then used to authenticate your virtual network to your Data Lake Storage Gen1 account and allow access.
247247

articles/private-link/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
- name: Private Link service
1010
href: private-link-service-overview.md
1111
- name: Service endpoints
12-
href: Service-endpoints-overview.md
12+
href: /azure/virtual-network/virtual-network-service-endpoints-overview?toc=/azure/private-link/toc.json
1313
- name: What is a network security perimeter?
1414
href: network-security-perimeter-concepts.md
1515
- name: Availability

articles/virtual-network/virtual-network-service-endpoints-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ The following table compares Azure Service Endpoints and Private Endpoints acros
8383
| Scope | Per service | Per instance |
8484
| Connectivity | Uses Azure PaaS public IP; traffic goes over Azure backbone | PaaS resource gets a private IP in your VNET; traffic stays within the VNET |
8585
| Data Security | Traffic leaves VNET to Azure backbone | No data exfiltration; traffic remains private |
86-
| On-Premises Connectivity | Not supported natively; requires public IP whitelisting | Supported via ExpressRoute and VPN |
86+
| On-Premises Connectivity | Not supported natively; requires public IP added to allow list. | Supported via ExpressRoute and VPN |
8787
| UDRs and NSGs | No specific overlaps; traffic can bypass endpoint | May require special configuration to avoid bypass |
8888
| Data Protection | Requires integration with firewall/NVA for exfiltration protection | Built-in data protection |
8989
| Cost | No additional cost | Charged based on traffic and number of endpoints |

0 commit comments

Comments
 (0)