Skip to content

Commit 95678aa

Browse files
Merge pull request #213556 from jimmart-dev/jammart-storage-network-rules
add caution about disabling public network access and trusted svcs
2 parents 5ea26bc + f5b2a58 commit 95678aa

File tree

1 file changed

+6
-3
lines changed

1 file changed

+6
-3
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: storage
55
author: jimmart-dev
66
ms.service: storage
77
ms.topic: how-to
8-
ms.date: 03/31/2022
8+
ms.date: 10/04/2022
99
ms.author: jammart
1010
ms.reviewer: santoshc
1111
ms.subservice: common
@@ -51,7 +51,7 @@ By default, storage accounts accept connections from clients on any network. You
5151

5252
> [!WARNING]
5353
> Changing this setting can impact your application's ability to connect to Azure Storage. Make sure to grant access to any allowed networks or set up access through a [private endpoint](storage-private-endpoints.md) before you change this setting.
54-
54+
5555
### [Portal](#tab/azure-portal)
5656

5757
1. Go to the storage account you want to secure.
@@ -120,6 +120,9 @@ By default, storage accounts accept connections from clients on any network. You
120120
121121
---
122122
123+
> [!CAUTION]
124+
> If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [Resource instances](#grant-access-from-azure-resource-instances) and [Exceptions](#manage-exceptions) you previously configured, including [Allow Azure services on the trusted services list to access this storage account](#grant-access-to-trusted-azure-services), will remain in effect. For this reason, those resources and services may still have access to the storage account.
125+
123126
## Grant access from a virtual network
124127
125128
You can configure storage accounts to allow access only from specific subnets. The allowed subnets may belong to a VNet in the same subscription, or those in a different subscription, including subscriptions belonging to a different Azure Active Directory tenant.
@@ -159,7 +162,7 @@ When planning for disaster recovery during a regional outage, you should create
159162
To enable access from a virtual network that is located in another region over service endpoints, register the `AllowGlobalTagsForStorage` feature in the subscription of the virtual network. All the subnets in the subscription that has the _AllowedGlobalTagsForStorage_ feature enabled will no longer use a public IP address to communicate with any storage account. Instead, all the traffic from these subnets to storage accounts will use a private IP address as a source IP. As a result, any storage accounts that use IP network rules to permit traffic from those subnets will no longer have an effect.
160163
161164
> [!NOTE]
162-
> For updating the existing service endpoints to access a storage account in another region, perform an [update subnet](/cli/azure/network/vnet/subnet?view=azure-cli-latest#az-network-vnet-subnet-update) operation on the subnet after registering the subscription with the `AllowGlobalTagsForStorage` feature. Similarly, to go back to the old configuration, perform an [update subnet](/cli/azure/network/vnet/subnet?view=azure-cli-latest#az-network-vnet-subnet-update) operation after deregistering the subscription with the `AllowGlobalTagsForStorage` feature.
165+
> For updating the existing service endpoints to access a storage account in another region, perform an [update subnet](/cli/azure/network/vnet/subnet?view=azure-cli-latest#az-network-vnet-subnet-update&preserve-view=true) operation on the subnet after registering the subscription with the `AllowGlobalTagsForStorage` feature. Similarly, to go back to the old configuration, perform an [update subnet](/cli/azure/network/vnet/subnet?view=azure-cli-latest#az-network-vnet-subnet-update&preserve-view=true) operation after deregistering the subscription with the `AllowGlobalTagsForStorage` feature.
163166
164167
165168
#### [Portal](#tab/azure-portal)

0 commit comments

Comments
 (0)