You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/ai-studio/how-to/configure-managed-network.md
+22-12Lines changed: 22 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -43,6 +43,10 @@ There are three different configuration modes for outbound traffic from the mana
43
43
<sup>1</sup> You can use outbound rules with _allow only approved outbound_ mode to achieve the same result as using allow internet outbound. The differences are:
44
44
45
45
* Always use private endpoints to access Azure resources.
46
+
47
+
> [!IMPORTANT]
48
+
> While you can create a private endpoint for Azure AI services and Azure AI Search, the connected services must allow public networking. For more information, see [Connectivity to other services](#connectivity-to-other-services).
49
+
46
50
* You must add rules for each outbound connection you need to allow.
47
51
* Adding FQDN outbound rules __increase your costs__ as this rule type uses Azure Firewall.
48
52
* The default rules for _allow only approved outbound_ are designed to minimize the risk of data exfiltration. Any outbound rules you add might increase your risk.
@@ -60,6 +64,21 @@ The following diagram shows a managed VNet configured to __allow only approved o
60
64
61
65
:::image type="content" source="../media/how-to/network/only-approved-outbound.svg" alt-text="Diagram of managed VNet isolation configured for allow only approved outbound." lightbox="../media/how-to/network/only-approved-outbound.png":::
62
66
67
+
## Limitations
68
+
69
+
* Azure AI Studio currently doesn't support bring your own virtual network, it only supports managed VNet isolation.
70
+
* Once you enable managed VNet isolation of your Azure AI, you can't disable it.
71
+
* Managed VNet uses private endpoint connection to access your private resources. You can't have a private endpoint and a service endpoint at the same time for your Azure resources, such as a storage account. We recommend using private endpoints in all scenarios.
72
+
* The managed VNet is deleted when the Azure AI is deleted.
73
+
* Data exfiltration protection is automatically enabled for the only approved outbound mode. If you add other outbound rules, such as to FQDNs, Microsoft can't guarantee that you're protected from data exfiltration to those outbound destinations.
74
+
* Using FQDN outbound rules increases the cost of the managed VNet because FQDN rules use Azure Firewall. For more information, see [Pricing](#pricing).
75
+
* When using a compute instance with a managed network, you can't connect to the compute instance using SSH.
76
+
77
+
### Connectivity to other services
78
+
79
+
* Azure AI services provisioned with Azure AI hub and Azure AI Search attached with Azure AI hub should be public.
80
+
* The "Add your data" feature in the Azure AI Studio playground doesn't support private storage account.
81
+
63
82
## Configure a managed virtual network to allow internet outbound
64
83
65
84
> [!TIP]
@@ -306,6 +325,9 @@ Private endpoints are currently supported for the following Azure services:
306
325
* Azure Database for MySQL
307
326
* Azure SQL Managed Instance
308
327
328
+
> [!IMPORTANT]
329
+
> While you can create a private endpoint for Azure AI services and Azure AI Search, the connected services must allow public networking. For more information, see [Connectivity to other services](#connectivity-to-other-services).
330
+
309
331
When you create a private endpoint, you provide the _resource type_ and _subresource_ that the endpoint connects to. Some resources have multiple types and subresources. For more information, see [what is a private endpoint](/azure/private-link/private-endpoint-overview).
310
332
311
333
When you create a private endpoint for Azure AI hub dependency resources, such as Azure Storage, Azure Container Registry, and Azure Key Vault, the resource can be in a different Azure subscription. However, the resource must be in the same tenant as the Azure AI hub.
@@ -321,15 +343,3 @@ The Azure AI hub managed VNet feature is free. However, you're charged for the f
321
343
322
344
> [!IMPORTANT]
323
345
> The firewall isn't created until you add an outbound FQDN rule. If you don't use FQDN rules, you will not be charged for Azure Firewall. For more information on pricing, see [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
324
-
325
-
## Limitations
326
-
327
-
* Azure AI Studio currently doesn't support bring your own virtual network, it only supports managed VNet isolation.
328
-
* Azure AI services provisioned with Azure AI hub and Azure AI Search attached with Azure AI hub should be public.
329
-
* The "Add your data" feature in the Azure AI Studio playground doesn't support private storage account.
330
-
* Once you enable managed VNet isolation of your Azure AI, you can't disable it.
331
-
* Managed VNet uses private endpoint connection to access your private resources. You can't have a private endpoint and a service endpoint at the same time for your Azure resources, such as a storage account. We recommend using private endpoints in all scenarios.
332
-
* The managed VNet is deleted when the Azure AI is deleted.
333
-
* Data exfiltration protection is automatically enabled for the only approved outbound mode. If you add other outbound rules, such as to FQDNs, Microsoft can't guarantee that you're protected from data exfiltration to those outbound destinations.
334
-
* Using FQDN outbound rules increases the cost of the managed VNet because FQDN rules use Azure Firewall. For more information, see [Pricing](#pricing).
335
-
* When using a compute instance with a managed network, you can't connect to the compute instance using SSH.
0 commit comments