Skip to content

Commit 7367d65

Browse files
Merge pull request #282720 from spelluru/sbusvnet0731
Update screenshots, Acrolynx, Learn Linter - pattern compliance,
2 parents 4905533 + ffc362d commit 7367d65

File tree

8 files changed

+8
-5
lines changed

8 files changed

+8
-5
lines changed
-777 Bytes
Loading
-1.03 KB
Loading
1.18 KB
Loading
5.05 KB
Loading
4.94 KB
Loading
2.07 KB
Loading
3.3 KB
Loading

articles/service-bus-messaging/service-bus-service-endpoints.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,10 @@
11
---
2-
title: Configure virtual network service endpoints for Azure Service Bus
2+
title: Configure network service endpoints
33
description: This article provides information on how to add a Microsoft.ServiceBus service endpoint to a virtual network.
4-
ms.topic: article
5-
ms.date: 07/24/2024
4+
ms.topic: how-to
5+
ms.date: 07/31/2024
66
ms.custom: fasttrack-edit, devx-track-azurecli, devx-track-azurepowershell
7+
# Customer intent: As a developer or IT Admin, I want to know how to allow access to my Service Bus namespace only from selected networks.
78
---
89

910
# Allow access to Azure Service Bus namespace from specific virtual networks
@@ -61,6 +62,9 @@ This section shows you how to use Azure portal to add a virtual network service
6162
> [!NOTE]
6263
> You see the **Networking** tab only for **premium** namespaces.
6364
1. On the **Networking** page, for **Public network access**, you can set one of the three following options. Choose **Selected networks** option to allow access from only specified IP addresses.
65+
- **All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, Service Bus accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
66+
67+
:::image type="content" source="./media/service-bus-ip-filtering/firewall-all-networks-selected.png" alt-text="Screenshot of the Networking tab of a Service Bus namespace with the default option All networks selected.":::
6468
- **Disabled**. This option disables any public access to the namespace. The namespace is accessible only through [private endpoints](private-link-service.md).
6569

6670
:::image type="content" source="./media/service-bus-ip-filtering/public-access-disabled-page.png" alt-text="Screenshot that shows the Networking page of a namespace with public access disabled.":::
@@ -70,7 +74,6 @@ This section shows you how to use Azure portal to add a virtual network service
7074

7175
> [!IMPORTANT]
7276
> If you choose **Selected networks**, add at least one IP firewall rule or a virtual network that will have access to the namespace. Choose **Disabled** if you want to restrict all traffic to this namespace over [private endpoints](private-link-service.md) only.
73-
- **All networks** (default). This option enables public access from all networks using an access key. If you select the **All networks** option, Service Bus accepts connections from any IP address (using the access key). This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
7477
2. To restrict access to specific virtual networks, select the **Selected networks** option if it isn't already selected.
7578
1. In the **Virtual Network** section of the page, select **+Add existing virtual network**. Select **+ Create new virtual network** if you want to create a new virtual network.
7679

@@ -242,7 +245,7 @@ Azure portal always uses the latest API version to get and set properties. If yo
242245

243246
:::image type="content" source="./media/service-bus-ip-filtering/firewall-all-networks-selected.png" alt-text="Screenshot of the Azure portal Networking page. The option to allow access from All networks is selected on the Firewalls and virtual networks tab.":::
244247

245-
## Next steps
248+
## Related content
246249

247250
For more information about virtual networks, see the following links:
248251

0 commit comments

Comments
 (0)