Skip to content

Commit 9b8ae26

Browse files
Merge pull request #227881 from dem108/patch-17
Clarify for egress public network access flag
2 parents b5e8ee0 + 93cd26c commit 9b8ae26

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

articles/machine-learning/how-to-secure-online-endpoint.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,8 @@ The following table lists the supported configurations when configuring inbound
180180
| public inbound with public outbound | `public_network_access` is enabled</br>The workspace must also allow public access. | `egress_public_network_access` is enabled | Yes |
181181

182182
> [!IMPORTANT]
183-
> Outbound communication from managed online endpoint deployment is to the _workspace API_. When the endpoint is configured to use __public outbound__, then the workspace must be able to accept that public communication (allow public access).
183+
> - Outbound communication from managed online endpoint deployment is to the _workspace API_. When the endpoint is configured to use __public outbound__, then the workspace must be able to accept that public communication (allow public access).
184+
> - When `egress_public_network_access` is disabled, the deployment can only access the resources secured in the VNET. When `egress_public_network_access` is enabled, the deployment can only access the resources with public access, which means it cannot access the resources secured in the VNET.
184185
185186
## End-to-end example
186187

0 commit comments

Comments
 (0)