Skip to content

Commit b6e27b4

Browse files
committed
Fixing more validation issues
1 parent 3d2ba6d commit b6e27b4

File tree

3 files changed

+5
-15
lines changed

3 files changed

+5
-15
lines changed

articles/storage/common/storage-network-security-overview.md

Lines changed: 3 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -45,17 +45,6 @@ Storage firewall rules apply to the public endpoint of a storage account. You do
4545
> For a list of data plane operations, see the [Azure Storage REST API Reference](/rest/api/storageservices/).
4646
> For a list of control plane operations, see the [Azure Storage Resource Provider REST API Reference](/rest/api/storagerp/).
4747
48-
## Configure network access to Azure Storage
49-
50-
You can control access to the data in your storage account over network endpoints, or through trusted services or resources in any combination including:
51-
52-
- [Allow access from selected virtual network subnets using private endpoints](storage-private-endpoints.md).
53-
- [Allow access from selected virtual network subnets using service endpoints](storage-network-security-virtual-networks.md).
54-
- [Allow access from specific public IP addresses or ranges](storage-network-security-ip-address-range.md).
55-
- [Allow access from selected Azure resource instances](storage-network-security-resource-instances.md).
56-
- [Allow access from trusted Azure services](storage-network-security-trusted-services.md).
57-
- [Configure exceptions for logging and metrics services](storage-network-security-trusted-services.md).
58-
5948
### About virtual network endpoints
6049

6150
There are two types of virtual network endpoints for storage accounts:
@@ -92,15 +81,15 @@ Before implementing network security for your storage accounts, review the impor
9281
> [!div class="checklist"]
9382
>
9483
> - Azure Storage firewall rules only apply to [data plane](../../azure-resource-manager/management/control-plane-and-data-plane.md#data-plane) operations. [Control plane](../../azure-resource-manager/management/control-plane-and-data-plane.md#control-plane) operations are not subject to the restrictions specified in firewall rules.
95-
> - Review the [Restrictions for IP network rules](#restrictions-for-ip-network-rules).
84+
> - Review the [Restrictions for IP network rules](storage-network-security.md#restrictions-for-ip-network-rules).
9685
> - To access data by using tools such as the Azure portal, Azure Storage Explorer, and AzCopy, you must be on a machine within the trusted boundary that you establish when configuring network security rules.
9786
> - Network rules are enforced on all network protocols for Azure Storage, including REST and SMB.
9887
> - Network rules don't affect virtual machine (VM) disk traffic, including mount and unmount operations and disk I/O, but they do help protect REST access to page blobs.
99-
> - You can use unmanaged disks in storage accounts with network rules applied to back up and restore VMs by [creating an exception](#manage-exceptions). Firewall exceptions aren't applicable to managed disks, because Azure already manages them.
88+
> - You can use unmanaged disks in storage accounts with network rules applied to back up and restore VMs by [creating an exception](storage-network-security.md#manage-exceptions). Firewall exceptions aren't applicable to managed disks, because Azure already manages them.
10089
> - Classic storage accounts don't support firewalls and virtual networks.
10190
> - If you delete a subnet that's included in a virtual network rule, it will be removed from the network rules for the storage account. If you create a new subnet by the same name, it won't have access to the storage account. To allow access, you must explicitly authorize the new subnet in the network rules for the storage account.
10291
> - When referencing a service endpoint in a client application, it's recommended that you avoid taking a dependency on a cached IP address. The storage account IP address is subject to change, and relying on a cached IP address may result in unexpected behavior. Additionally, it's recommended that you honor the time-to-live (TTL) of the DNS record and avoid overriding it. Overriding the DNS TTL may result in unexpected behavior.
103-
> - By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](#grant-access-from-azure-resource-instances) and [exceptions](#manage-exceptions) that you previously configured, including [Allow Azure services on the trusted services list to access this storage account](#grant-access-to-trusted-azure-services), will remain in effect. As a result, those resources and services might still have access to the storage account.
92+
> - By design, access to a storage account from trusted services takes the highest precedence over other network access restrictions. If you set **Public network access** to **Disabled** after previously setting it to **Enabled from selected virtual networks and IP addresses**, any [resource instances](#storage-network-security.mdgrant-access-from-azure-resource-instances) and [exceptions](storage-network-security.md#manage-exceptions) that you previously configured, including [Allow Azure services on the trusted services list to access this storage account](storage-network-security.md#grant-access-to-trusted-azure-services), will remain in effect. As a result, those resources and services might still have access to the storage account.
10493
10594
### Authorization
10695

articles/storage/common/storage-network-security-virtual-networks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: normesta
1313

1414
# Configure Azure Storage to accept requests from virtual networks
1515

16-
You can deny all public access to your storage account, and then configure Azure network settings to accept requests that originate from specific virtual network subnets. To learn more, see [Permit access to virtual network subnets](storage-network-security-public-access-configuration.md#grant-access-from-a-virtual-network).
16+
You can deny all public access to your storage account, and then configure Azure network settings to accept requests that originate from specific virtual network subnets. To learn more, see [Permit access to virtual network subnets](storage-network-security.md#grant-access-from-a-virtual-network).
1717

1818
## [Portal](#tab/azure-portal)
1919

articles/storage/common/storage-network-security.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -104,6 +104,7 @@ The Azure role assignments of the resource instance determine the types of opera
104104
<a id="grant-access-to-trusted-azure-services"></a>
105105
<a id="manage-exceptions"></a>
106106
<a id="trusted-microsoft-services"></a>
107+
<a id="exceptions"></a>
107108

108109
## Grant access to trusted Azure services
109110

0 commit comments

Comments
 (0)