Skip to content

Commit 5ec2649

Browse files
committed
Some incremental updates:
1 parent e8e7d42 commit 5ec2649

5 files changed

+224
-326
lines changed

articles/storage/blobs/TOC.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -305,7 +305,9 @@ items:
305305
href: ../common/storage-network-security.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
306306
- name: Manage public access
307307
items:
308-
- name: Set default access
308+
- name: Manage public access
309+
href: ../common/storage-network-security-public-access-configuration.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
310+
- name: Set the default access level
309311
href: ../common/storage-network-security-set-default-access.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
310312
- name: Permit virtual networks
311313
href: ../common/storage-network-security-virtual-networks.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json

articles/storage/common/storage-network-security-ip-address-range.md

Lines changed: 0 additions & 107 deletions
Original file line numberDiff line numberDiff line change
@@ -14,113 +14,6 @@ ms.author: normesta
1414

1515
Put something here.
1616

17-
## Grant access from an internet IP range
18-
19-
You can use IP network rules to allow access from specific public internet IP address ranges by creating IP network rules. Each storage account supports up to 400 rules. These rules grant access to specific internet-based services and on-premises networks and block general internet traffic.
20-
21-
### Restrictions for IP network rules
22-
23-
The following restrictions apply to IP address ranges:
24-
25-
- IP network rules are allowed only for *public internet* IP addresses.
26-
27-
IP address ranges reserved for private networks (as defined in [RFC 1918](https://tools.ietf.org/html/rfc1918#section-3)) aren't allowed in IP rules. Private networks include addresses that start with 10, 172.16 to 172.31, and 192.168.
28-
29-
- You must provide allowed internet address ranges by using [CIDR notation](https://tools.ietf.org/html/rfc4632) in the form 16.17.18.0/24 or as individual IP addresses like 16.17.18.19.
30-
31-
- Small address ranges that use /31 or /32 prefix sizes are not supported. Configure these ranges by using individual IP address rules.
32-
33-
- Only IPv4 addresses are supported for configuration of storage firewall rules.
34-
35-
> [!IMPORTANT]
36-
> You can't use IP network rules in the following cases:
37-
>
38-
> - To restrict access to clients in same Azure region as the storage account. IP network rules have no effect on requests that originate from the same Azure region as the storage account. Use [Virtual network rules](storage-network-security-virtual-networks.md) to allow same-region requests.
39-
> - To restrict access to clients in a [paired region](../../reliability/cross-region-replication-azure.md) that are in a virtual network that has a service endpoint.
40-
> - To restrict access to Azure services deployed in the same region as the storage account. Services deployed in the same region as the storage account use private Azure IP addresses for communication. So, you can't restrict access to specific Azure services based on their public outbound IP address range.
41-
42-
### Configuring access from on-premises networks
43-
44-
To grant access from your on-premises networks to your storage account by using an IP network rule, you must identify the internet-facing IP addresses that your network uses. Contact your network administrator for help.
45-
46-
If you're using [Azure ExpressRoute](../../expressroute/expressroute-introduction.md) from your premises, you need to identify the NAT IP addresses used for Microsoft peering. Either the service provider or the customer provides the NAT IP addresses.
47-
48-
To allow access to your service resources, you must allow these public IP addresses in the firewall setting for resource IPs.
49-
50-
## Change the default network access rule
51-
52-
By default, storage accounts accept connections from clients on any network. You can limit access to selected networks *or* prevent traffic from all networks and permit access only through a [private endpoint](storage-private-endpoints.md).
53-
54-
You must set the default rule to **deny**, or network rules have no effect. However, changing this setting can affect your application's ability to connect to Azure Storage. Be sure to grant access to any allowed networks or set up access through a private endpoint before you change this setting.
55-
56-
[!INCLUDE [updated-for-az](~/reusable-content/ce-skilling/azure/includes/updated-for-az.md)]
57-
58-
### [Portal](#tab/azure-portal)
59-
60-
1. Go to the storage account that you want to secure.
61-
62-
2. In the service menu, under **Security + networking**, select **Networking**.
63-
64-
3. Choose what network access is enabled through the storage account's public endpoint:
65-
66-
- Select either **Enabled from all networks** or **Enabled from selected virtual networks and IP addresses**. If you select the second option, you'll be prompted to add virtual networks and IP address ranges.
67-
68-
- To restrict inbound access while allowing outbound access, select **Disabled**.
69-
70-
4. Select **Save** to apply your changes.
71-
72-
<a id="powershell"></a>
73-
74-
### [PowerShell](#tab/azure-powershell)
75-
76-
1. Install [Azure PowerShell](/powershell/azure/install-azure-powershell) and [sign in](/powershell/azure/authenticate-azureps).
77-
78-
2. Choose which type of public network access you want to allow:
79-
80-
- To allow traffic from all networks, use the `Update-AzStorageAccountNetworkRuleSet` command and set the `-DefaultAction` parameter to `Allow`:
81-
82-
```powershell
83-
Update-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -DefaultAction Allow
84-
```
85-
86-
- To allow traffic only from specific virtual networks, use the `Update-AzStorageAccountNetworkRuleSet` command and set the `-DefaultAction` parameter to `Deny`:
87-
88-
```powershell
89-
Update-AzStorageAccountNetworkRuleSet -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -DefaultAction Deny
90-
```
91-
92-
- To block traffic from all networks, use the `Set-AzStorageAccount` command and set the `-PublicNetworkAccess` parameter to `Disabled`. Traffic will be allowed only through a [private endpoint](storage-private-endpoints.md). You'll have to create that private endpoint.
93-
94-
```powershell
95-
Set-AzStorageAccount -ResourceGroupName "myresourcegroup" -Name "mystorageaccount" -PublicNetworkAccess Disabled
96-
```
97-
98-
### [Azure CLI](#tab/azure-cli)
99-
100-
1. Install the [Azure CLI](/cli/azure/install-azure-cli) and [sign in](/cli/azure/authenticate-azure-cli).
101-
102-
2. Choose which type of public network access you want to allow:
103-
104-
- To allow traffic from all networks, use the `az storage account update` command and set the `--default-action` parameter to `Allow`:
105-
106-
```azurecli
107-
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --default-action Allow
108-
```
109-
110-
- To allow traffic only from specific virtual networks, use the `az storage account update` command and set the `--default-action` parameter to `Deny`:
111-
112-
```azurecli
113-
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --default-action Deny
114-
```
115-
116-
- To block traffic from all networks, use the `az storage account update` command and set the `--public-network-access` parameter to `Disabled`. Traffic will be allowed only through a [private endpoint](storage-private-endpoints.md). You'll have to create that private endpoint.
117-
118-
```azurecli
119-
az storage account update --name MyStorageAccount --resource-group MyResourceGroup --public-network-access Disabled
120-
```
121-
122-
---
123-
12417
### Managing IP network rules
12518

12619
You can manage IP network rules for storage accounts through the Azure portal, PowerShell, or the Azure CLI v2.

0 commit comments

Comments
 (0)