You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/common/storage-network-security-ip-address-range.md
-107Lines changed: 0 additions & 107 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,113 +14,6 @@ ms.author: normesta
14
14
15
15
Put something here.
16
16
17
-
## Grant access from an internet IP range
18
-
19
-
You can use IP network rules to allow access from specific public internet IP address ranges by creating IP network rules. Each storage account supports up to 400 rules. These rules grant access to specific internet-based services and on-premises networks and block general internet traffic.
20
-
21
-
### Restrictions for IP network rules
22
-
23
-
The following restrictions apply to IP address ranges:
24
-
25
-
- IP network rules are allowed only for *public internet* IP addresses.
26
-
27
-
IP address ranges reserved for private networks (as defined in [RFC 1918](https://tools.ietf.org/html/rfc1918#section-3)) aren't allowed in IP rules. Private networks include addresses that start with 10, 172.16 to 172.31, and 192.168.
28
-
29
-
- You must provide allowed internet address ranges by using [CIDR notation](https://tools.ietf.org/html/rfc4632) in the form 16.17.18.0/24 or as individual IP addresses like 16.17.18.19.
30
-
31
-
- Small address ranges that use /31 or /32 prefix sizes are not supported. Configure these ranges by using individual IP address rules.
32
-
33
-
- Only IPv4 addresses are supported for configuration of storage firewall rules.
34
-
35
-
> [!IMPORTANT]
36
-
> You can't use IP network rules in the following cases:
37
-
>
38
-
> - To restrict access to clients in same Azure region as the storage account. IP network rules have no effect on requests that originate from the same Azure region as the storage account. Use [Virtual network rules](storage-network-security-virtual-networks.md) to allow same-region requests.
39
-
> - To restrict access to clients in a [paired region](../../reliability/cross-region-replication-azure.md) that are in a virtual network that has a service endpoint.
40
-
> - To restrict access to Azure services deployed in the same region as the storage account. Services deployed in the same region as the storage account use private Azure IP addresses for communication. So, you can't restrict access to specific Azure services based on their public outbound IP address range.
41
-
42
-
### Configuring access from on-premises networks
43
-
44
-
To grant access from your on-premises networks to your storage account by using an IP network rule, you must identify the internet-facing IP addresses that your network uses. Contact your network administrator for help.
45
-
46
-
If you're using [Azure ExpressRoute](../../expressroute/expressroute-introduction.md) from your premises, you need to identify the NAT IP addresses used for Microsoft peering. Either the service provider or the customer provides the NAT IP addresses.
47
-
48
-
To allow access to your service resources, you must allow these public IP addresses in the firewall setting for resource IPs.
49
-
50
-
## Change the default network access rule
51
-
52
-
By default, storage accounts accept connections from clients on any network. You can limit access to selected networks *or* prevent traffic from all networks and permit access only through a [private endpoint](storage-private-endpoints.md).
53
-
54
-
You must set the default rule to **deny**, or network rules have no effect. However, changing this setting can affect your application's ability to connect to Azure Storage. Be sure to grant access to any allowed networks or set up access through a private endpoint before you change this setting.
1. Go to the storage account that you want to secure.
61
-
62
-
2. In the service menu, under **Security + networking**, select **Networking**.
63
-
64
-
3. Choose what network access is enabled through the storage account's public endpoint:
65
-
66
-
- Select either **Enabled from all networks** or **Enabled from selected virtual networks and IP addresses**. If you select the second option, you'll be prompted to add virtual networks and IP address ranges.
67
-
68
-
- To restrict inbound access while allowing outbound access, select **Disabled**.
69
-
70
-
4. Select **Save** to apply your changes.
71
-
72
-
<aid="powershell"></a>
73
-
74
-
### [PowerShell](#tab/azure-powershell)
75
-
76
-
1. Install [Azure PowerShell](/powershell/azure/install-azure-powershell) and [sign in](/powershell/azure/authenticate-azureps).
77
-
78
-
2. Choose which type of public network access you want to allow:
79
-
80
-
- To allow traffic from all networks, use the `Update-AzStorageAccountNetworkRuleSet` command and set the `-DefaultAction` parameter to `Allow`:
- To allow traffic only from specific virtual networks, use the `Update-AzStorageAccountNetworkRuleSet` command and set the `-DefaultAction` parameter to `Deny`:
- To block traffic from all networks, use the `Set-AzStorageAccount` command and set the `-PublicNetworkAccess` parameter to `Disabled`. Traffic will be allowed only through a [private endpoint](storage-private-endpoints.md). You'll have to create that private endpoint.
1. Install the [Azure CLI](/cli/azure/install-azure-cli) and [sign in](/cli/azure/authenticate-azure-cli).
101
-
102
-
2. Choose which type of public network access you want to allow:
103
-
104
-
- To allow traffic from all networks, use the `az storage account update` command and set the `--default-action` parameter to `Allow`:
105
-
106
-
```azurecli
107
-
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --default-action Allow
108
-
```
109
-
110
-
- To allow traffic only from specific virtual networks, use the `az storage account update` command and set the `--default-action` parameter to `Deny`:
111
-
112
-
```azurecli
113
-
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --default-action Deny
114
-
```
115
-
116
-
- To block traffic from all networks, use the `az storage account update` command and set the `--public-network-access` parameter to `Disabled`. Traffic will be allowed only through a [private endpoint](storage-private-endpoints.md). You'll have to create that private endpoint.
117
-
118
-
```azurecli
119
-
az storage account update --name MyStorageAccount --resource-group MyResourceGroup --public-network-access Disabled
120
-
```
121
-
122
-
---
123
-
124
17
### Managing IP network rules
125
18
126
19
You can manage IP network rules for storage accounts through the Azure portal, PowerShell, or the Azure CLI v2.
0 commit comments