Skip to content

Commit 7632799

Browse files
committed
Address PR feedback
1 parent 351f947 commit 7632799

File tree

1 file changed

+2
-6
lines changed

1 file changed

+2
-6
lines changed

articles/search/service-configure-firewall.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Azure Cognitive Search supports IP rules for inbound firewall support. This mode
2222

2323
To set the IP access control policy in the Azure portal, go to your Azure Cognitive Search service page and select **Networking** on the navigation menu. Endpoint networking connectivity must be **Public**. If your connectivity is set to **Private**, you can only access your search service via a Private Endpoint.
2424

25-
![Screenshot showing how to configure the IP firewall in the Azure portal](./media/service-configure-firewall/search-azure-portal-firewall.png)
25+
![Screenshot showing how to configure the IP firewall in the Azure portal](./media/service-configure-firewall/azure-portal-firewall.png)
2626

2727
The Azure portal provides the ability to specify IP addresses and IP address ranges in the CIDR format. An example of CIDR notation is 8.8.8.0/24, which represents the IPs that range from 8.8.8.0 to 8.8.8.255.
2828

@@ -37,7 +37,7 @@ The portal automatically detects your client IP address. It might be the client
3737

3838
To add your current IP to the list of IPs, check **Add your client IP address**. Then select **Save**.
3939

40-
![Screenshot showing a how to configure IP firewall settings to allow the current IP](./media/how-to-configure-firewall/enable-current-ip.png)
40+
![Screenshot showing a how to configure IP firewall settings to allow the current IP](./media/service-configure-firewall/enable-current-ip.png)
4141

4242
## <a id="troubleshoot-ip-firewall"></a>Troubleshoot issues with an IP access control policy
4343

@@ -51,10 +51,6 @@ Enabling an IP access control policy for your Azure Cognitive Search service blo
5151

5252
When you access Azure Cognitive Search service using the SDK from machines that are not in the allowed list, a generic **403 Forbidden** response is returned with no additional details. Verify the allowed IP list for your account, and make sure that the correct configuration updated for your search service.
5353

54-
### Requests from a subnet with a service endpoint for Azure Cosmos DB enabled
55-
56-
Requests from a subnet in a virtual network that has a service endpoint for Azure Cosmos DB enabled sends the virtual network and subnet identity to Azure Cosmos DB accounts. These requests don't have the public IP of the source, so IP filters reject them. To allow access from specific subnets in virtual networks, add an access control list as outlined in [How to configure virtual network and subnet-based access for your Azure Cosmos DB account](how-to-configure-vnet-service-endpoint.md). It can take up to 15 minutes for firewall rules to apply.
57-
5854
## Next steps
5955

6056
For more information on accessing your search service via Private Link, see the following article:

0 commit comments

Comments
 (0)