Skip to content

Commit c26fc3f

Browse files
committed
storage networking highlight important rule restrictions - pr 103207
1 parent 59a3a8b commit c26fc3f

File tree

1 file changed

+7
-12
lines changed

1 file changed

+7
-12
lines changed

articles/storage/common/storage-network-security.md

Lines changed: 7 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: storage
55
author: jimmart-dev
66
ms.service: azure-storage
77
ms.topic: how-to
8-
ms.date: 06/16/2023
8+
ms.date: 08/01/2023
99
ms.author: jammart
1010
ms.reviewer: santoshc
1111
ms.custom: devx-track-azurepowershell, devx-track-azurecli, build-2023, engagement-fy23
@@ -266,17 +266,12 @@ The following restrictions apply to IP address ranges:
266266
267267
- Only IPv4 addresses are supported for configuration of storage firewall rules.
268268
269-
You can't use IP network rules in the following cases:
270-
271-
- To restrict access to clients in same Azure region as the storage account.
272-
273-
IP network rules have no effect on requests that originate from the same Azure region as the storage account. Use [Virtual network rules](#grant-access-from-a-virtual-network) to allow same-region requests.
274-
275-
- To restrict access to clients in a [paired region](../../availability-zones/cross-region-replication-azure.md) that are in a virtual network that has a service endpoint.
276-
277-
- To restrict access to Azure services deployed in the same region as the storage account.
278-
279-
Services deployed in the same region as the storage account use private Azure IP addresses for communication. So, you can't restrict access to specific Azure services based on their public outbound IP address range.
269+
> [!IMPORTANT]
270+
> You can't use IP network rules in the following cases:
271+
>
272+
> - To restrict access to clients in same Azure region as the storage account. IP network rules have no effect on requests that originate from the same Azure region as the storage account. Use [Virtual network rules](#grant-access-from-a-virtual-network) to allow same-region requests.
273+
> - To restrict access to clients in a [paired region](../../availability-zones/cross-region-replication-azure.md) that are in a virtual network that has a service endpoint.
274+
> - To restrict access to Azure services deployed in the same region as the storage account. Services deployed in the same region as the storage account use private Azure IP addresses for communication. So, you can't restrict access to specific Azure services based on their public outbound IP address range.
280275
281276
### Configuring access from on-premises networks
282277

0 commit comments

Comments
 (0)