Skip to content

Commit 9b29dfc

Browse files
committed
Adding link references
1 parent 4a8c2fa commit 9b29dfc

8 files changed

+46
-47
lines changed

articles/storage/blobs/TOC.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -309,20 +309,20 @@ items:
309309
href: ../common/storage-network-security-set-default-access.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
310310
- name: Firewall and virtual networks
311311
items:
312-
- name: Overview
312+
- name: Firewall and virtual networks
313313
href: ../common/storage-network-security.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
314314
- name: Restrictions and considerations
315315
href: ../common/storage-network-security-limitations.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
316-
- name: Allow virtual networks
316+
- name: Virtual network rules
317317
href: ../common/storage-network-security-virtual-networks.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
318-
- name: Allow IP address ranges
318+
- name: IP network rules
319319
href: ../common/storage-network-security-ip-address-range.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
320-
- name: Allow resource instances
320+
- name: Resource instance rules
321321
href: ../common/storage-network-security-resource-instances.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
322-
- name: Manage Exceptions
322+
- name: Network rule exceptions
323323
href: ../common/storage-network-security-manage-exceptions.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
324324
- name: Trusted Azure services
325-
href: ../common/storage-network-security-trusted-microsoft-services.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
325+
href: ../common/storage-network-security-trusted-azure-services.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
326326
- name: Network security perimeter
327327
href: ../common/storage-network-security-perimeter.md?toc=/azure/storage/blobs/toc.json&bc=/azure/storage/blobs/breadcrumb/toc.json
328328
- name: Private endpoints

articles/storage/common/storage-network-security-ip-address-range.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -119,7 +119,6 @@ You can deny all public access to your storage account, and then configure Azure
119119
120120
---
121121
122-
## Next steps
122+
## See also
123123
124-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
125-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
124+
- [Azure Storage firewall and virtual network rules](storage-network-security.md)

articles/storage/common/storage-network-security-manage-exceptions.md

Lines changed: 11 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Manage network security exceptions
3-
description: Put something here.
2+
title: Manage network security exceptions for Azure Storage
3+
description: Learn how to enable traffic from an Azure service outside of the network boundary by adding a *network security exception*.
44
services: storage
55
author: normesta
66
ms.service: azure-storage
@@ -11,9 +11,13 @@ ms.author: normesta
1111

1212
---
1313

14-
# Manage Network security exceptions
14+
# Manage network security exceptions
1515

16-
Something goes here.
16+
You can enable traffic from an Azure service outside of the network boundary by adding a *network security exception*.
17+
18+
For a complete list of trusted Azure services, see [Trusted Azure services](storage-network-security-trusted-azure-services.md).
19+
20+
## Add a network security exception
1721

1822
### [Portal](#tab/azure-portal)
1923

@@ -73,9 +77,7 @@ Something goes here.
7377
7478
---
7579
80+
## See also
7681
77-
78-
## Next steps
79-
80-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
81-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
82+
- [Azure Storage firewall and virtual network rules](storage-network-security.md)
83+
- [Trusted Azure services](storage-network-security-trusted-azure-services.md)

articles/storage/common/storage-network-security-resource-instances.md

Lines changed: 7 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Grant Access to Azure Storage from Resource Instances
2+
title: Create an resource instance network rule for Azure Storage
33
description: Configure the Azure Storage firewall to accept requests from from resource instances.
44
services: storage
55
author: normesta
@@ -11,17 +11,13 @@ ms.author: normesta
1111

1212
---
1313

14-
# Configure Azure Storage to accept requests from resource instances
14+
# Create an resource instance network rule for Azure Storage
1515

16-
Put something here.
16+
You can enable traffic from specific Azure resource instances by creating a *resource instance network rule*.
1717

18-
<a id="grant-access-specific-instances"></a>
18+
Resource instance network rules can be added together with other network rules to control traffic to the storage account. To learn more, see [Azure Storage firewall and virtual network rules](storage-network-security.md).
1919

20-
## Grant access from Azure resource instances
21-
22-
In some cases, an application might depend on Azure resources that can't be isolated through a virtual network or an IP address rule. But you still want to secure and restrict storage account access to only your application's Azure resources. You can configure storage accounts to allow access to specific resource instances of trusted Azure services by creating a resource instance rule.
23-
24-
The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
20+
## Create a resource instance network rule
2521

2622
### [Portal](#tab/azure-portal)
2723

@@ -147,8 +143,6 @@ az storage account network-rule list \
147143

148144
---
149145

146+
## See also
150147

151-
## Next steps
152-
153-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
154-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
148+
- [Azure Storage firewall and virtual network rules](storage-network-security.md)

articles/storage/common/storage-network-security-set-default-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -94,5 +94,5 @@ By default, storage accounts accept connections from clients on any network. You
9494
9595
## Next steps
9696
97-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
98-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
97+
- [Azure Storage firewall and virtual network rules](storage-network-security.md)
98+
- [Private endpoints](storage-private-endpoints.md)

articles/storage/common/storage-network-security-trusted-azure-services.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -103,7 +103,7 @@ You can also combine Azure roles and ACLs together to grant access. To learn mor
103103

104104
We recommend that you [use resource instance rules to grant access to specific resources](storage-network-security-resource-instances.md).
105105

106-
## Next steps
106+
## See also
107107

108-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
109-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
108+
- [Azure Storage firewall and virtual network rules](storage-network-security.md)
109+
- [Manage Network security exceptions](storage-network-security-manage-exceptions.md)

articles/storage/common/storage-network-security-virtual-networks.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -133,7 +133,6 @@ To apply a virtual network rule to a storage account, the user must have the app
133133
134134
---
135135
136-
## Next steps
136+
## See also
137137
138-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
139-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
138+
- [Azure Storage firewall and virtual network rules](storage-network-security.md)

articles/storage/common/storage-network-security.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Configure Azure Storage firewalls and virtual networks
2+
title: Azure Storage firewall and virtual network rules
33
description: Configure layered network security for your storage account by using the Azure Storage firewall.
44
services: storage
55
author: normesta
@@ -11,7 +11,7 @@ ms.author: normesta
1111

1212
---
1313

14-
# Configure Azure Storage firewalls and virtual networks
14+
# Azure Storage firewall and virtual network rules
1515

1616
You can disable public network access to your storage account, and permit traffic only if it originates from sources that you specify. Sources can include [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md) subnets, public IP address ranges, specific Azure resource instances or traffic from trusted Azure services. Clients that make requests from allowed sources must also meet the authorization requirements of the storage account. To learn more about account authorization, see [Authorize access to data in Azure Storage](../common/authorize-data-access.md).
1717

@@ -72,9 +72,9 @@ To allow access to your service resources, you must allow these public IP addres
7272

7373
## Azure resource instances
7474

75-
Some Azure resources can't be isolated through a virtual network or IP address rule. You can enable traffic from those resources by creating a *resource instance rule*. The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
75+
Some Azure resources can't be isolated through a virtual network or IP address rule. You can enable traffic from those resources by creating a *resource instance network rule*. The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
7676

77-
To learn how to configure a resource instance rule, see [Configure Azure Storage to accept requests from resource instances](storage-network-security-resource-instances.md).
77+
To learn how to configure a resource instance rule, see [Create an resource instance network rule for Azure Storage](storage-network-security-resource-instances.md).
7878

7979
<a id="grant-access-to-trusted-azure-services"></a>
8080
<a id="manage-exceptions"></a>
@@ -88,15 +88,20 @@ To learn how to configure a resource instance rule, see [Configure Azure Storage
8888

8989
If you need to enable traffic from an Azure service outside of the network boundary, you can add a *network security exception*. This can be useful in cases where an Azure service operates from a network that you can't include in your virtual network or IP network rules. For example, some services might need to read resource logs and metrics in your account. You can allow read access for the log files, metrics tables, or both by creating a network rule exception. These services connect to your storage account by using strong authentication.
9090

91-
To learn more about how to add a network security exception, see [Manage Network security exceptions](storage-network-security-manage-exceptions.md).
91+
To learn more about how to add a network security exception, see [Manage network security exceptions](storage-network-security-manage-exceptions.md).
9292

9393
For a complete list of Azure services you can enable traffic for, see [Trusted Azure services](storage-network-security-trusted-azure-services.md).
9494

9595
## Restrictions and considerations
9696

9797
Before implementing network security for your storage accounts, make sure to review all restrictions and considerations. For a complete list, see [Restrictions and limitations for Azure Storage firewall and virtual network configuration](storage-network-security-limitations.md).
9898

99-
## Next steps
99+
## See also
100100

101-
- Learn more about [Azure network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
102-
- Dig deeper into [security recommendations for Azure Blob storage](../blobs/security-recommendations.md).
101+
- [Azure Storage network security overview](azure-storage-network-security-overview.md)
102+
- [Restrictions and considerations](storage-network-security-limitations.md)
103+
- [Virtual network rules](storage-network-security-virtual-networks.md)
104+
- [IP network rules](storage-network-security-ip-address-range.md)
105+
- [Resource instance rules](storage-network-security-resource-instances.md)
106+
- [Network rule exceptions](storage-network-security-manage-exceptions.md)
107+
- [Trusted Azure services](storage-network-security-trusted-azure-services.md)

0 commit comments

Comments
 (0)