|
5 | 5 | author: jlian
|
6 | 6 | ms.service: iot-fundamentals
|
7 | 7 | ms.topic: conceptual
|
8 |
| - ms.date: 04/28/2020 |
| 8 | + ms.date: 05/12/2020 |
9 | 9 | ms.author: jlian
|
10 | 10 | ---
|
11 | 11 |
|
@@ -42,10 +42,7 @@ This article describes how to achieve these goals using [private endpoints](../p
|
42 | 42 |
|
43 | 43 | ## Ingress connectivity to IoT Hub using private endpoints
|
44 | 44 |
|
45 |
| -A private endpoint is a private IP address allocated inside a customer-owned VNET via which an Azure resource is reachable. By having a private endpoint for your IoT hub, you will be able to allow services operating inside your VNET to reach IoT Hub without requiring traffic to be sent to IoT Hub's public endpoint. Similarly, devices that operate in your on-premises can use [Virtual Private Network (VPN)](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-about-vpngateways) or [ExpressRoute](https://azure.microsoft.com/services/expressroute/) Private Peering to gain connectivity to your VNET in Azure and subsequently to your IoT Hub (via its private endpoint). As a result, customers who wish to restrict connectivity to their IoT hub's public endpoints (or possibly completely block it off) can achieve this goal by using [IoT Hub firewall rules](./iot-hub-ip-filtering.md) while retaining connectivity to their Hub using the private endpoint. |
46 |
| - |
47 |
| -> [!NOTE] |
48 |
| -> The main focus of this setup is for devices inside an on-premises network. This setup is not advised for devices deployed in a wide-area network. |
| 45 | +A private endpoint is a private IP address allocated inside a customer-owned VNET via which an Azure resource is reachable. By having a private endpoint for your IoT hub, you will be able to allow services operating inside your VNET to reach IoT Hub without requiring traffic to be sent to IoT Hub's public endpoint. Similarly, devices that operate in your on-premises can use [Virtual Private Network (VPN)](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-about-vpngateways) or [ExpressRoute](https://azure.microsoft.com/services/expressroute/) Private Peering to gain connectivity to your VNET in Azure and subsequently to your IoT Hub (via its private endpoint). As a result, customers who wish to restrict connectivity to their IoT hub's public endpoints (or possibly completely block it off) can achieve this goal by using [IoT Hub IP filter](./iot-hub-ip-filtering.md) and [configuring routing to not send any data to the built-in endpoint](#built-in-event-hub-compatible-endpoint-doesnt-support-access-over-private-endpoint). This approach retains connectivity to their Hub using the private endpoint for devices. The main focus of this setup is for devices inside an on-premises network. This setup is not advised for devices deployed in a wide-area network. |
49 | 46 |
|
50 | 47 | 
|
51 | 48 |
|
@@ -91,8 +88,19 @@ To set up a private endpoint, follow these steps:
|
91 | 88 |
|
92 | 89 | 6. Click **Next: Tags**, and optionally provide any tags for your resource.
|
93 | 90 |
|
94 |
| -7. Click **Review + create** to create your private endpoint resource. |
| 91 | +7. Click **Review + create** to create your private link resource. |
| 92 | +
|
| 93 | +### Built-in Event Hub compatible endpoint doesn't support access over private endpoint |
| 94 | +
|
| 95 | +The [built-in Event Hub compatible endpoint](iot-hub-devguide-messages-read-builtin.md) doesn't support access over private endpoint. When configured, an IoT hub's private endpoint is for ingress connectivity only. Consuming data from built-in Event Hub compatible endpoint can only be done over the public internet. |
| 96 | +
|
| 97 | +IoT Hub's [IP filter](iot-hub-ip-filtering.md) also doesn't control public access to the built-in endpoint. To completely block public network access to your IoT hub, you must: |
95 | 98 |
|
| 99 | +1. Configure private endpoint access for IoT Hub |
| 100 | +1. Turn off public network access by using IP filter to block all IP |
| 101 | +1. Turn off the built-in Event Hub endpoint by [setting up routing to not send data to it](iot-hub-devguide-messages-d2c.md) |
| 102 | +1. Turn off the [fallback route](iot-hub-devguide-messages-d2c.md#fallback-route) |
| 103 | +1. Configure egress to other Azure resources using [Azure first party trusted services](#egress-connectivity-from-iot-hub-to-other-azure-resources) |
96 | 104 |
|
97 | 105 | ### Pricing (private endpoints)
|
98 | 106 |
|
|
0 commit comments