You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/private-link/network-security-perimeter-diagnostic-logs.md
+13-10Lines changed: 13 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: mbender-ms
6
6
ms.author: mbender
7
7
ms.service: azure-private-link
8
8
ms.topic: concept-article
9
-
ms.date: 03/25/2025
9
+
ms.date: 05/16/2025
10
10
ms.custom: references_regions, ignite-2024
11
11
#CustomerIntent: As a network administrator, I want to enable diagnostic logging for Network Security Perimeter, so that I can monitor and analyze the network traffic to and from my resources.
12
12
---
@@ -23,17 +23,20 @@ Access logs categories for a network security perimeter are based on the results
23
23
24
24
|**Log category**|**Description**|**Applicable to Modes**|
25
25
| --- | --- | --- |
26
-
|**NspPublicInboundPerimeterRulesAllowed**| Inbound access is allowed based on network security perimeter access rules. |Learning/Enforced |
26
+
|**NspPublicInboundPerimeterRulesAllowed**| Inbound access is allowed based on network security perimeter access rules. |Transition/Enforced |
27
27
|**NspPublicInboundPerimeterRulesDenied**| Public inbound access denied by network security perimeter. | Enforced |
28
-
|**NspPublicOutboundPerimeterRulesAllowed**| Outbound access is allowed based on network security perimeter access rules. |Learning/Enforced |
28
+
|**NspPublicOutboundPerimeterRulesAllowed**| Outbound access is allowed based on network security perimeter access rules. |Transition/Enforced |
29
29
|**NspPublicOutboundPerimeterRulesDenied**| Public outbound access denied by network security perimeter. | Enforced |
30
-
|**NspOutboundAttempt**| Outbound attempt within network security perimeter. | Learning/Enforced |
31
-
|**NspIntraPerimeterInboundAllowed**| Inbound access within perimeter is allowed. | Learning/Enforced |
32
-
|**NspPublicInboundResourceRulesAllowed**| When network security perimeter rules deny, inbound access is allowed based on PaaS resource rules. | Learning |
33
-
|**NspPublicInboundResourceRulesDenied**| When network security perimeter rules deny, inbound access denied by PaaS resource rules. | Learning |
34
-
|**NspPublicOutboundResourceRulesAllowed**| When network security perimeter rules deny, outbound access allowed based on PaaS resource rules. | Learning |
35
-
|**NspPublicOutboundResourceRulesDenied**| When network security perimeter rules deny, outbound access denied by PaaS resource rules. | Learning |
36
-
|**NspPrivateInboundAllowed**| Private endpoint traffic is allowed. | Learning/Enforced |
30
+
|**NspOutboundAttempt**| Outbound attempt within network security perimeter. | Transition/Enforced |
31
+
|**NspIntraPerimeterInboundAllowed**| Inbound access within perimeter is allowed. | Transition/Enforced |
32
+
|**NspPublicInboundResourceRulesAllowed**| When network security perimeter rules deny, inbound access is allowed based on PaaS resource rules. | Transition |
33
+
|**NspPublicInboundResourceRulesDenied**| When network security perimeter rules deny, inbound access denied by PaaS resource rules. | Transition |
34
+
|**NspPublicOutboundResourceRulesAllowed**| When network security perimeter rules deny, outbound access allowed based on PaaS resource rules. | Transition |
35
+
|**NspPublicOutboundResourceRulesDenied**| When network security perimeter rules deny, outbound access denied by PaaS resource rules. | Transition |
36
+
|**NspPrivateInboundAllowed**| Private endpoint traffic is allowed. | Transition/Enforced |
37
+
38
+
> [!NOTE]
39
+
> The available access modes for a network security perimeter are **Transition** and **Enforced**. The **Transition** mode was previously named **Learning** mode.You may continue to see references to **Learning** mode in some instances.
0 commit comments