Skip to content

Commit 627a5f8

Browse files
Merge pull request #249718 from spelluru/updates0829
public access disabled - but TCP connections
2 parents bbbf5e1 + 705e687 commit 627a5f8

File tree

2 files changed

+11
-13
lines changed

2 files changed

+11
-13
lines changed

articles/event-hubs/private-link-service.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -197,7 +197,7 @@ There are four provisioning states:
197197
2. In the search bar, type in **event hubs**.
198198
3. Select the **namespace** that you want to manage.
199199
4. Select the **Networking** tab.
200-
5. Go to the appropriate section below based on the operation you want to: approve, reject, or remove.
200+
5. Go to the appropriate following section based on the operation you want to: approve, reject, or remove.
201201

202202
### Approve a private endpoint connection
203203
1. If there are any connections that are pending, you see a connection listed with **Pending** in the provisioning state.
@@ -252,11 +252,10 @@ Aliases: <event-hubs-namespace-name>.servicebus.windows.net
252252

253253
## Limitations and design considerations
254254

255-
**Pricing**: For pricing information, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
256-
257-
**Limitations**: This feature is available in all Azure public regions.
258-
259-
**Maximum number of private endpoints per Event Hubs namespace**: 120.
255+
- For pricing information, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
256+
- This feature is available in all Azure public regions.
257+
- Maximum number of private endpoints per Event Hubs namespace: 120.
258+
- The traffic is blocked at the application layer, not at the TCP layer. Therefore, you see TCP connections or `nslookup` operations succeeding against the public endpoint even though the public access is disabled.
260259

261260
For more, see [Azure Private Link service: Limitations](../private-link/private-link-service-overview.md#limitations)
262261

articles/service-bus-messaging/private-link-service.md

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: devx-track-azurepowershell
1111
# Allow access to Azure Service Bus namespaces via private endpoints
1212
Azure Private Link Service enables you to access Azure services (for example, Azure Service Bus, Azure Storage, and Azure Cosmos DB) and Azure hosted customer/partner services over a **private endpoint** in your virtual network.
1313

14-
A private endpoint is a network interface that connects you privately and securely to a service powered by Azure Private Link. The private endpoint uses a private IP address from your VNet, effectively bringing the service into your VNet. All traffic to the service can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute or VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network, eliminating exposure from the public Internet. You can connect to an instance of an Azure resource, giving you the highest level of granularity in access control.
14+
A private endpoint is a network interface that connects you privately and securely to a service powered by Azure Private Link. The private endpoint uses a private IP address from your virtual network, effectively bringing the service into your virtual network. All traffic to the service can be routed through the private endpoint, so no gateways, NAT devices, ExpressRoute or VPN connections, or public IP addresses are needed. Traffic between your virtual network and the service traverses over the Microsoft backbone network, eliminating exposure from the public Internet. You can connect to an instance of an Azure resource, giving you the highest level of granularity in access control.
1515

1616
For more information, see [What is Azure Private Link?](../private-link/private-link-overview.md)
1717

@@ -183,7 +183,7 @@ There are four provisioning states:
183183
1. In the search bar, type in **Service Bus**.
184184
1. Select the **namespace** that you want to manage.
185185
1. Select the **Networking** tab.
186-
5. Go to the appropriate section below based on the operation you want to: approve, reject, or remove.
186+
5. See the appropriate following section based on the operation you want to: approve, reject, or remove.
187187

188188
### Approve a private endpoint connection
189189

@@ -252,11 +252,10 @@ Aliases: <service-bus-namespace-name>.servicebus.windows.net
252252

253253
## Limitations and Design Considerations
254254

255-
**Pricing**: For pricing information, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
256-
257-
**Limitations**: This feature is available in all Azure public regions.
258-
259-
**Maximum number of private endpoints per Service Bus namespace**: 120.
255+
- For pricing information, see [Azure Private Link pricing](https://azure.microsoft.com/pricing/details/private-link/).
256+
- This feature is available in all Azure public regions.
257+
- Maximum number of private endpoints per Service Bus namespace: 120.
258+
- The traffic is blocked at the application layer, not at the TCP layer. Therefore, you see TCP connections or `nslookup` operations succeeding against the public endpoint even though the public access is disabled.
260259

261260
For more, see [Azure Private Link service: Limitations](../private-link/private-link-service-overview.md#limitations)
262261

0 commit comments

Comments
 (0)