Skip to content

Commit c4084bf

Browse files
author
Michael Bender
committed
small edits on styling
1 parent 58c1f6b commit c4084bf

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/private-link/network-security-perimeter-transition.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -85,23 +85,23 @@ In special cases when `publicNetworkAccess` is set to `SecuredByPerimeter`
8585

8686
| **publicNetworkAccess** | **SecuredByPerimeter (new value)** |
8787
|-----------------|-----------------|
88-
| **Perimeter access** | Denied |
89-
| **Public inbound** | Denied |
90-
| **Public outbound** | Denied |
91-
| **Trusted access** | Denied |
92-
| **Trusted access** | Denied |
93-
| **Private access** | Allowed |
88+
| Perimeter access | Denied |
89+
| Public inbound | Denied |
90+
| Public outbound | Denied |
91+
| Trusted access | Denied |
92+
| Trusted access | Denied |
93+
| Private access | Allowed |
9494

9595
The **locked down for public access** mode exists by-design and helps prevent PaaS resources not yet associated with a perimeter from being temporarily exposed to public networks or to other PaaS resources. Administrators can apply Azure Policy to ensure publicNetworkAccess is set to SecuredByPerimeter from the moment a resource is created.
9696

97-
The behavior of public network access on PaaS resources according to the association's accessMode value and the resource's `publicNetworkAccess` value can be summarized as follows:
97+
The behavior of public network access on PaaS resources according to the association's `accessMode` value and the resource's `publicNetworkAccess` value can be summarized as follows:
9898

99-
| **Association access mode** | | | |
99+
| **Association access mode** | **Not associated** | **Learning mode** | **Enforced mode** |
100100
|-----------------|-------------------|-----------------|-----------------|
101-
| **Public network access** | **Not associated** | **Learning mode** | **Enforced mode** |
102-
| **Enabled** | Inbound: Resource rules</br>Outbound: Allowed | Inbound: Network security perimeter + Resource rules</br> Outbound: Network security perimeter rules + Allowed | Inbound: Network security perimeter rules</br>Outbound: Network security perimeter rules |
103-
| **Disabled** | Inbound: Denied</br>Outbound: Allowed | Inbound: Network security perimeter rules</br>Outbound: Network security perimeter rules + Allowed | Inbound: Network security perimeter rules</br>Outbound: Network security perimeter rules |
104-
| **SecuredByPerimeter** | Inbound: Denied</br>Outbound: Denied | Inbound: Network security perimeter rules</br>Outbound: Network security perimeter rules | Inbound: Network security perimeter rules</br>Outbound: Network security perimeter rules |
101+
| **Public network access** | | | |
102+
| Enabled | *Inbound:* Resource rules</br>*Outbound:* Allowed | *Inbound:* Network security perimeter + Resource rules</br>*Outbound:* Network security perimeter rules + Allowed | *Inbound:* Network security perimeter rules</br>*Outbound:* Network security perimeter rules |
103+
| Disabled | *Inbound:* Denied</br>*Outbound:* Allowed | *Inbound:* Network security perimeter rules</br>*Outbound:* Network security perimeter rules + Allowed | *Inbound:* Network security perimeter rules</br>*Outbound:* Network security perimeter rules |
104+
| SecuredByPerimeter | *Inbound:* Denied</br>*Outbound:* Denied | *Inbound:* Network security perimeter rules</br>*Outbound:* Network security perimeter rules | *Inbound:* Network security perimeter rules</br>*Outbound:* Network security perimeter rules |
105105

106106
## Next steps
107107

0 commit comments

Comments
 (0)