You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/event-hubs/event-hubs-ip-filtering.md
+16-10Lines changed: 16 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,9 +1,15 @@
1
1
---
2
-
title: Azure Event Hubs Firewall Rules | Microsoft Docs
3
-
description: Use Firewall Rules to allow connections from specific IP addresses to Azure Event Hubs.
2
+
title: Configure IP Firewall Rules for Azure Event Hubs Namespaces
3
+
description: Learn how to configure IP firewall rules for Azure Event Hubs namespaces to restrict access from specific IP addresses and CIDR ranges using Azure portal, CLI, or PowerShell.
4
+
#customer intent: As a network administrator, I want to configure IP firewall rules for my Azure Event Hubs namespace so that I can restrict access to only specific IP addresses and improve security
# Allow access to Azure Event Hubs namespaces from specific IP addresses or ranges
@@ -21,7 +27,7 @@ You specify IP firewall rules at the Event Hubs namespace level. So, the rules a
21
27
- Specify **at least one IP firewall rule or virtual network rule** for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network. If there are no IP and virtual network rules, the namespace can be accessed over the public internet (using the access key).
22
28
23
29
24
-
## Use Azure portal
30
+
## Configure firewall rules using Azure portal
25
31
26
32
When creating a namespace, you can either allow public only (from all networks) or private only (only via private endpoints) access to the namespace. Once the namespace is created, you can allow access from specific IP addresses or from specific virtual networks (using network service endpoints).
27
33
@@ -51,7 +57,7 @@ This section shows you how to use the Azure portal to create IP firewall rules f
51
57
3. For **address range**, enter specific IPv4 or IPv6 addresses or address ranges in CIDR notation.
52
58
53
59
> [!IMPORTANT]
54
-
> When the service starts supporting IPv6 connections in the future and clients automatically switch to using IPv6, your clients will break if you have only IPv4 addresses, not IPv6 addresses. Therefore, we recommend that you add IPv6 addresses to the list of allowed IP addresses now so that your clients don't break when the service eventually switches to supporting IPv6.
60
+
> When the service starts supporting IPv6 connections in the future and clients automatically switch to using IPv6, your clients break if you have only IPv4 addresses, not IPv6 addresses. Therefore, we recommend that you add IPv6 addresses to the list of allowed IP addresses now so that your clients don't break when the service eventually switches to supporting IPv6.
55
61
1. Specify whether you want to **allow trusted Microsoft services to bypass this firewall**. See [Trusted Microsoft services](#trusted-microsoft-services) for details.
56
62
57
63
:::image type="content" source="./media/event-hubs-firewall/firewall-selected-networks-trusted-access-disabled.png" lightbox="./media/event-hubs-firewall/firewall-selected-networks-trusted-access-disabled.png" alt-text="Firewall section highlighted in the Public access tab of the Networking page.":::
@@ -63,7 +69,7 @@ This section shows you how to use the Azure portal to create IP firewall rules f
## Configure firewall rules using Resource Manager templates
67
73
68
74
> [!IMPORTANT]
69
75
> The Firewall feature isn't supported in the basic tier.
@@ -158,12 +164,12 @@ The following Resource Manager template enables adding an IP filter rule to an e
158
164
To deploy the template, follow the instructions for [Azure Resource Manager][lnk-deploy].
159
165
160
166
> [!IMPORTANT]
161
-
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
167
+
> If there are no IP and virtual network rules, all the traffic flows into the namespace even if you set the `defaultAction` to `deny`. The namespace can be accessed over the public internet (using the access key). Specify at least one IP rule or virtual network rule for the namespace to allow traffic only from the specified IP addresses or subnet of a virtual network.
162
168
163
-
## Use Azure CLI
169
+
## Configure firewall rules using Azure CLI
164
170
Use [`az eventhubs namespace network-rule-set`](/cli/azure/eventhubs/namespace/network-rule-set) add, list, update, and remove commands to manage IP firewall rules for an Event Hubs namespace.
165
171
166
-
## Use Azure PowerShell
172
+
## Configure firewall rules using Azure PowerShell
167
173
Use the [`Set-AzEventHubNetworkRuleSet`](/powershell/module/az.eventhub/set-azeventhubnetworkruleset) cmdlet to add one or more IP firewall rules. An example from the article:
0 commit comments