You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/search/service-configure-firewall.md
+2-6Lines changed: 2 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ Azure Cognitive Search supports IP rules for inbound firewall support. This mode
22
22
23
23
To set the IP access control policy in the Azure portal, go to your Azure Cognitive Search service page and select **Networking** on the navigation menu. Endpoint networking connectivity must be **Public**. If your connectivity is set to **Private**, you can only access your search service via a Private Endpoint.
24
24
25
-

25
+

26
26
27
27
The Azure portal provides the ability to specify IP addresses and IP address ranges in the CIDR format. An example of CIDR notation is 8.8.8.0/24, which represents the IPs that range from 8.8.8.0 to 8.8.8.255.
28
28
@@ -37,7 +37,7 @@ The portal automatically detects your client IP address. It might be the client
37
37
38
38
To add your current IP to the list of IPs, check **Add your client IP address**. Then select **Save**.
39
39
40
-

40
+

41
41
42
42
## <aid="troubleshoot-ip-firewall"></a>Troubleshoot issues with an IP access control policy
43
43
@@ -51,10 +51,6 @@ Enabling an IP access control policy for your Azure Cognitive Search service blo
51
51
52
52
When you access Azure Cognitive Search service using the SDK from machines that are not in the allowed list, a generic **403 Forbidden** response is returned with no additional details. Verify the allowed IP list for your account, and make sure that the correct configuration updated for your search service.
53
53
54
-
### Requests from a subnet with a service endpoint for Azure Cosmos DB enabled
55
-
56
-
Requests from a subnet in a virtual network that has a service endpoint for Azure Cosmos DB enabled sends the virtual network and subnet identity to Azure Cosmos DB accounts. These requests don't have the public IP of the source, so IP filters reject them. To allow access from specific subnets in virtual networks, add an access control list as outlined in [How to configure virtual network and subnet-based access for your Azure Cosmos DB account](how-to-configure-vnet-service-endpoint.md). It can take up to 15 minutes for firewall rules to apply.
57
-
58
54
## Next steps
59
55
60
56
For more information on accessing your search service via Private Link, see the following article:
0 commit comments