Skip to content

Commit 5ad62c8

Browse files
author
Larry Franks
committed
revising per feedback
1 parent 24d17ea commit 5ad62c8

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/machine-learning/how-to-access-azureml-behind-firewall.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ __Outbound traffic__
8282
| `AzureMonitor` | 443 | Used to log monitoring and metrics to Azure Monitor. Only needed if you haven't [secured Azure Monitor](how-to-secure-workspace-vnet.md#secure-azure-monitor-and-application-insights) for the workspace. </br>* This outbound is also used to log information for support incidents. |
8383

8484
> [!IMPORTANT]
85-
> If a compute instance or compute cluster is configured for no public IP, it can still send outbound traffic to the public network using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access#when-is-default-outbound-access-provided) Azure provides for VMs. However, if you need outbound access we recommend implementing your own instead of relying on the default. We recommend using one of the following options:
85+
> If a compute instance or compute cluster is configured for no public IP, by default it can't access the internet. If it *can* still send outbound traffic to the internet, Azure has enabled [default outbound access](/azure/virtual-network/ip-services/default-outbound-access#when-is-default-outbound-access-provided) in an NSG. We **don't recocmmend** using the default outbound access. If you need outbound access to the internet, we recommend using one of the following options instead of the default outbound access:
8686
>
8787
> * __Azure Virtual Network NAT with a public IP__: For more information on using Virtual Network Nat, see the [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) documentation.
8888
> * __User-defined route and firewall__: Create a user-defined route in the subnet that contains the compute. The __Next hop__ for the route should reference the private IP address of the firewall, with an address prefix of 0.0.0.0/0.

articles/machine-learning/how-to-secure-training-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ The following configurations are in addition to those listed in the [Prerequisit
131131
| `*.table.core.windows.net` | TCP | 443 | Communication with Azure Table storage. |
132132

133133

134-
+ The [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) provided by Azure allows a no public IP compute to access the public network. However, we recommend using either a firewall and outbound rules or a NAT gateway and network service groups to allow outbound traffic instead.
134+
+ By default, a compute instance/cluster configured for no public IP doesn't have outbound access to the internet. If you *can* access the internet from it, it is because Azure has enabled [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) in an NSG. However, we **don't recommend** using the default outbound access. If you need outbound access to the internet, we recommend using either a firewall and outbound rules or a NAT gateway and network service groups to allow outbound traffic instead.
135135

136136
For more information on the outbound traffic that is used by Azure Machine Learning, see the following articles:
137137
- [Configure inbound and outbound network traffic](how-to-access-azureml-behind-firewall.md).

articles/machine-learning/v1/how-to-secure-training-vnet.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ The following table contains the differences between these configurations:
3333
| Configuration | With public IP | Without public IP |
3434
| ----- | ----- | ----- |
3535
| Inbound traffic | AzureMachineLearning | None |
36-
| Outbound traffic | By default, can access the public internet with no restrictions.<br>You can restrict what it accesses using a Network Security Group or firewall. | By default, can access the public network using the [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) provided by Azure.<br>We recommend using a Virtual Network NAT gateway or Firewall instead if you need to route outbound traffic to required resources on the internet. |
36+
| Outbound traffic | By default, can access the public internet with no restrictions.<br>You can restrict what it accesses using a Network Security Group or firewall. | By default, it should not be able to access the internet. If it can access the internet, then Azure has enabled [default outbound access](/azure/virtual-network/ip-services/default-outbound-access) in an NSG. We **don't recommend** using the default outbound access.<br>If you need outbound access to the internet, we recommend using a Virtual Network NAT gateway or Firewall instead if you need to route outbound traffic to required resources on the internet. |
3737
| Azure networking resources | Public IP address, load balancer, network interface | None |
3838

3939
You can also use Azure Databricks or HDInsight to train models in a virtual network.

0 commit comments

Comments
 (0)