Skip to content

Commit 8724da6

Browse files
authored
Merge pull request #126989 from taylorrees1/patch-21
Update oracle-database-network-plan.md
2 parents eb9337c + 39b2587 commit 8724da6

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

articles/oracle/oracle-db/oracle-database-network-plan.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,9 @@ There are two types of network features: default and advance.
1818

1919
### Default network features
2020
Default network features enable basic network connectivity for both new and existing Oracle Database@Azure deployments. These features are available across all supported Oracle Database@Azure regions and provide the foundational networking required for your deployment
21-
### Advanced network features (preview)
22-
Advanced network features enhance the virtual networking experience, offering improved security, performance, and control—similar to standard Azure VMs. These features are currently in public preview and available in the following regions:
21+
### Advanced network features
22+
Advanced network features enhance the virtual networking experience, offering improved security, performance, and control—similar to standard Azure VMs. These features are generally available for new deployments in the following regions:
23+
2324
* Australia East
2425
* Australia Southeast
2526
* Central US
@@ -79,8 +80,8 @@ The following table describes required configurations of supported network featu
7980
|Connectivity from an Oracle database cluster to a [private endpoint](../../private-link/private-endpoint-overview.md) in a different spoke virtual network connected to a virtual WAN|Yes| Yes|
8081
|NSG support on the Private link | No| Yes|
8182
| Connectivity to serverless Apps like Azure functions via private endpoints | No| Yes|
82-
|Load balancers for Oracle database cluster traffic|No| Yes|
8383
|Dual stack (IPv4 and IPv6) virtual network|Only IPv4 is supported| Only IPv4 is supported|
84+
| Service tags support| No | Yes |
8485

8586
> [!NOTE]
8687
> When using NSGs (Network Security Groups) on the Azure side, ensure that any security rules configured on the Oracle (OCI) side are reviewed to avoid conflicts. While applying security policies on both Azure and OCI can enhance the overall security posture, it also introduces additional complexity in terms of management and requires careful manual synchronization between the two environments. Misalignment between these policies could lead to unintended access issues or operational disruptions.

0 commit comments

Comments
 (0)