Skip to content

Commit 9abd11c

Browse files
authored
Merge pull request #125256 from changeworld/patch-2
Fix typo
2 parents 73234f5 + 4d8dd1b commit 9abd11c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/azure-government/compliance/compliance-tic.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ The following diagram shows the general network flow for access to Azure PaaS se
153153
:::image type="content" source="./media/tic-diagram-e.png" alt-text="PaaS connectivity options for TIC" border="false":::
154154

155155
1. A private connection is made to Azure by using ExpressRoute. ExpressRoute private peering with forced tunneling is used to force all customer virtual network traffic over ExpressRoute and back to on-premises. Microsoft Peering isn't required.
156-
2. Azure VPN Gateway, when used with ExpressRoute and Microsoft Peering, can overlay end-to-end IPSec encryption between the customer virtual network and the on-premises edge.
156+
2. Azure VPN Gateway, when used with ExpressRoute and Microsoft Peering, can overlay end-to-end IPsec encryption between the customer virtual network and the on-premises edge.
157157
3. Network connectivity to the customer virtual network is controlled by using network security groups that allow customers to permit/deny traffic based on IP, port, and protocol.
158158
4. Traffic to and from the customer private virtual network is monitored through Azure Network Watcher and data is analyzed using Log Analytics and Microsoft Defender for Cloud.
159159
5. The customer virtual network extends to the PaaS service by creating a service endpoint for the customer's service.

0 commit comments

Comments
 (0)