Skip to content

Commit bbe281f

Browse files
Merge pull request #266292 from iriaosara/vpndoc
update the description
2 parents 3af4330 + e1711d6 commit bbe281f

File tree

1 file changed

+3
-1
lines changed
  • articles/managed-instance-apache-cassandra

1 file changed

+3
-1
lines changed

articles/managed-instance-apache-cassandra/use-vpn.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,9 @@ ms.devlang: azurecli
1111
---
1212
# Use VPN with Azure Managed Instance for Apache Cassandra
1313

14-
By using a VPN with your Azure Managed Instance for Apache Cassandra, you can securely connect our management service and your cluster without making it public. It lets you keep full control over the network where your cluster is located, and it lets you use your own security rules to manage access to your cluster.
14+
Azure Managed Instance for Apache Cassandra nodes requires access to many other Azure services when injected into your VNet. Normally this is enabled by ensuring your VNet has outbound access to the internet. If your security policy prohibits outbound access, you can also configure firewall rules or UDRs for the appropriate access, for more information, see [here](network-rules.md).
15+
16+
However, if you have internal security concerns around data exfiltration, your security policy might also even prohibit direct access to these services from your VNet. By using a VPN with your Azure Managed Instance for Apache Cassandra, you can ensure that data nodes in the VNet communicate only to a single secure VPN endpoint, with no direct access to any other services.
1517

1618
> [!IMPORTANT]
1719
> Using VPN with Azure Managed Instance for Apache Cassandra is in public preview.

0 commit comments

Comments
 (0)