Skip to content

Commit ba3a2af

Browse files
committed
updated security topics
1 parent 27a4a02 commit ba3a2af

File tree

3 files changed

+11
-8
lines changed

3 files changed

+11
-8
lines changed

articles/service-bus-relay/ip-firewall-virtual-networks.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,14 +19,19 @@ By default, Relay namespaces are accessible from internet as long as the request
1919

2020
This feature is helpful in scenarios in which Azure Relay should be only accessible from certain well-known sites. Firewall rules enable you to configure rules to accept traffic originating from specific IPv4 addresses. For example, if you use Relay with [Azure Express Route](../expressroute/expressroute-faqs.md#supported-services), you can create a **firewall rule** to allow traffic from only your on-premises infrastructure IP addresses.
2121

22+
23+
> [!IMPORTANT]
24+
> This feature is currently in preview.
25+
26+
2227
## Enable IP firewall rules
2328
The IP firewall rules are applied at the namespace level. Therefore, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that does not match an allowed IP rule on the namespace is rejected as unauthorized. The response does not mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
2429

2530
### Use Azure portal
2631
This section shows you how to use the Azure portal to create IP firewall rules for a namespace.
2732

2833
1. Navigate to your **Relay namespace** in the [Azure portal](https://portal.azure.com).
29-
2. On the left menu, select **Networking** option. If you select the **All networks** option, the Relay namespace accepts connections from any IP address. This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
34+
2. On the left menu, select **Networking** option. If you select the **All networks** option in the **Allow access from** section, the Relay namespace accepts connections from any IP address. This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
3035

3136
![Firewall - All networks option selected](./media/ip-firewall/all-networks-selected.png)
3237
1. To restrict access to specific networks and IP addresses, select the **Selected networks** option. In the **Firewall** section, follow these steps:

articles/service-bus-relay/network-security.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.author: spelluru
1313
# Network security for Azure Relay
1414
This article describes how to use the following security features with Azure Relay:
1515

16-
- IP Firewall rules
16+
- IP firewall rules (preview)
1717
- Private endpoints (preview)
1818

1919
> [!NOTE]

articles/service-bus-relay/private-link-service.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -207,23 +207,21 @@ There are four provisioning states:
207207
3. You should see the status changed to **Disconnected**. Then, you will see the endpoint disappear from the list.
208208

209209
## Validate that the private link connection works
210+
You should validate that resources within the same subnet of the private endpoint are connecting to your Azure Relay namespace over its private IP address.
210211

211-
You should validate that the resources within the same subnet of the private endpoint resource are connecting to your Azure Relay namespace over its private IP address.
212+
For this test, create a virtual machine by following the steps in the [Create a Windows virtual machine in the Azure portal](../virtual-machines/windows/quick-create-portal.md)
212213

213-
First, create a virtual machine by following the steps in [Create a Windows virtual machine in the Azure portal](../virtual-machines/windows/quick-create-portal.md)
214-
215-
For this test, create a VM in the Azure portal. Do the following steps in the **Networking** tab of the wizard:
214+
In the **Networking** tab:
216215

217216
1. Specify **Virtual network** and **Subnet**. You must select the Virtual Network on which you deployed the private endpoint.
218217
2. Specify a **public IP** resource.
219218
3. For **NIC network security group**, select **None**.
220219
4. For **Load balancing**, select **No**.
221220

222-
223221
Connect to the VM and open the command line and run the following command:
224222

225223
```console
226-
nslookup <your-relay-namespace-name>.servicebus.azure.net
224+
nslookup <your-relay-namespace-name>.servicebus.windows.net
227225
```
228226

229227
You should see a result that looks like the following.

0 commit comments

Comments
 (0)