Skip to content

Commit 6002a17

Browse files
committed
edits
1 parent 5eb88b2 commit 6002a17

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/iot-dps/iot-dps-public-network-access.md renamed to articles/iot-dps/public-network-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,17 +31,17 @@ To turn on public network access:
3131
1. Select **All networks**.
3232
2. Select **Save**.
3333

34-
### Access the DPS after disabling the public network access
34+
## Access the DPS after disabling the public network access
3535

3636
After public network access is disabled, the DPS instance is accessible only through [its VNet private endpoint using Azure private link](virtual-network-support.md). This restriction includes accessing through the Azure portal.
3737

38-
### DPS endpoint, IP address, and ports after disabling public network access
38+
## DPS endpoint, IP address, and ports after disabling public network access
3939

4040
DPS is a multi-tenant Platform-as-a-Service (PaaS), where different customers share the same pool of compute, networking, and storage hardware resources. DPS's hostnames map to a public endpoint with a publicly routable IP address over the internet. Different customers share this DPS public endpoint, and IoT devices in wide-area networks and on-premises networks can all access it.
4141

4242
Disabling public network access is enforced on a specific DPS resource, ensuring isolation. To keep the service active for other customer resources using the public path, its public endpoint remains resolvable, IP addresses discoverable, and ports remain open. This is not a cause for concern as Microsoft integrates multiple layers of security to ensure complete isolation between tenants. To learn more, see [Isolation in the Azure Public Cloud](../security/fundamentals/isolation-choices.md#tenant-level-isolation).
4343

44-
### IP Filter
44+
## IP Filter
4545

4646
If public network access is disabled, all [IP Filter](../iot-dps/iot-dps-ip-filtering.md) rules are ignored. This is because all IPs from the public internet are blocked. To use IP Filter, use the **Selected IP ranges** option.
4747

articles/iot-dps/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,7 @@
9797
- name: Configure IP filtering
9898
href: iot-dps-ip-filtering.md
9999
- name: Managing public network access
100-
href: iot-dps-public-network-access.md
100+
href: public-network-access.md
101101
- name: Provision IoT Edge devices
102102
items:
103103
- name: Linux

0 commit comments

Comments
 (0)