Skip to content

Commit a22c595

Browse files
authored
removed nsg limitation
1 parent 3f2ce0d commit a22c595

File tree

1 file changed

+0
-1
lines changed

1 file changed

+0
-1
lines changed

articles/app-service/networking/private-endpoint.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,6 @@ From a security perspective:
4949
- By default, when you enable Private Endpoints to your Web App, you disable all public access.
5050
- You can enable multiple Private Endpoints in others VNets and Subnets, including VNets in other regions.
5151
- The IP address of the Private Endpoint NIC must be dynamic, but will remain the same until you delete the Private Endpoint.
52-
- The NIC of the Private Endpoint can't have an NSG associated.
5352
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint: see [Disable network policies for private endpoints][disablesecuritype]. As a result, you can't filter by any NSG the access to your Private Endpoint.
5453
- By default, when you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App isn't evaluated.
5554
- You can eliminate the data exfiltration risk from the VNet by removing all NSG rules where destination is tag Internet or Azure services. When you deploy a Private Endpoint for a Web App, you can only reach this specific Web App through the Private Endpoint. If you have another Web App, you must deploy another dedicated Private Endpoint for this other Web App.

0 commit comments

Comments
 (0)