Skip to content

Commit 7958e32

Browse files
committed
Freshness
1 parent 4b646e5 commit 7958e32

File tree

1 file changed

+16
-10
lines changed

1 file changed

+16
-10
lines changed

articles/event-hubs/event-hubs-ip-filtering.md

Lines changed: 16 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,15 @@
11
---
2-
title: Azure Event Hubs Firewall Rules | Microsoft Docs
3-
description: Use Firewall Rules to allow connections from specific IP addresses to Azure Event Hubs.
2+
title: Configure IP Firewall Rules for Azure Event Hubs Namespaces
3+
description: Learn how to configure IP firewall rules for Azure Event Hubs namespaces to restrict access from specific IP addresses and CIDR ranges using Azure portal, CLI, or PowerShell.
4+
#customer intent: As a network administrator, I want to configure IP firewall rules for my Azure Event Hubs namespace so that I can restrict access to only specific IP addresses and improve security
45
ms.topic: article
5-
ms.custom: devx-track-azurepowershell, devx-track-azurecli
6-
ms.date: 02/02/2024
6+
ms.custom:
7+
- devx-track-azurepowershell, devx-track-azurecli
8+
- ai-gen-docs-bap
9+
- ai-gen-title
10+
- ai-seo-date:07/25/2025
11+
- ai-gen-description
12+
ms.date: 07/25/2025
713
---
814

915
# Allow access to Azure Event Hubs namespaces from specific IP addresses or ranges
@@ -21,7 +27,7 @@ You specify IP firewall rules at the Event Hubs namespace level. So, the rules a
2127
- Specify **at least one IP firewall rule or virtual network rule** for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network. If there are no IP and virtual network rules, the namespace can be accessed over the public internet (using the access key).
2228

2329

24-
## Use Azure portal
30+
## Configure firewall rules using Azure portal
2531

2632
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace. Once the namespace is created, you can allow access from specific IP addresses or from specific virtual networks (using network service endpoints).
2733

@@ -51,7 +57,7 @@ This section shows you how to use the Azure portal to create IP firewall rules f
5157
3. For **address range**, enter specific IPv4 or IPv6 addresses or address ranges in CIDR notation.
5258

5359
> [!IMPORTANT]
54-
> When the service starts supporting IPv6 connections in the future and clients automatically switch to using IPv6, your clients will break if you have only IPv4 addresses, not IPv6 addresses. Therefore, we recommend that you add IPv6 addresses to the list of allowed IP addresses now so that your clients don't break when the service eventually switches to supporting IPv6.
60+
> When the service starts supporting IPv6 connections in the future and clients automatically switch to using IPv6, your clients break if you have only IPv4 addresses, not IPv6 addresses. Therefore, we recommend that you add IPv6 addresses to the list of allowed IP addresses now so that your clients don't break when the service eventually switches to supporting IPv6.
5561
1. Specify whether you want to **allow trusted Microsoft services to bypass this firewall**. See [Trusted Microsoft services](#trusted-microsoft-services) for details.
5662

5763
:::image type="content" source="./media/event-hubs-firewall/firewall-selected-networks-trusted-access-disabled.png" lightbox="./media/event-hubs-firewall/firewall-selected-networks-trusted-access-disabled.png" alt-text="Firewall section highlighted in the Public access tab of the Networking page.":::
@@ -63,7 +69,7 @@ This section shows you how to use the Azure portal to create IP firewall rules f
6369
[!INCLUDE [event-hubs-trusted-services](./includes/event-hubs-trusted-services.md)]
6470

6571

66-
## Use Resource Manager template
72+
## Configure firewall rules using Resource Manager templates
6773

6874
> [!IMPORTANT]
6975
> The Firewall feature isn't supported in the basic tier.
@@ -158,12 +164,12 @@ The following Resource Manager template enables adding an IP filter rule to an e
158164
To deploy the template, follow the instructions for [Azure Resource Manager][lnk-deploy].
159165

160166
> [!IMPORTANT]
161-
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
167+
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
162168
163-
## Use Azure CLI
169+
## Configure firewall rules using Azure CLI
164170
Use [`az eventhubs namespace network-rule-set`](/cli/azure/eventhubs/namespace/network-rule-set) add, list, update, and remove commands to manage IP firewall rules for an Event Hubs namespace.
165171

166-
## Use Azure PowerShell
172+
## Configure firewall rules using Azure PowerShell
167173
Use the [`Set-AzEventHubNetworkRuleSet`](/powershell/module/az.eventhub/set-azeventhubnetworkruleset) cmdlet to add one or more IP firewall rules. An example from the article:
168174

169175
```azurepowershell-interactive

0 commit comments

Comments
 (0)