Skip to content

Commit c7c6755

Browse files
committed
Revisions to articles
1 parent 6ee04c7 commit c7c6755

File tree

2 files changed

+26
-21
lines changed

2 files changed

+26
-21
lines changed

articles/storage/common/storage-network-security-set-default-access.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 06/18/2025
1010
ms.author: normesta
1111
---
1212

13-
# Set the default public network access rule of an Azure Storage account
13+
# Set the default public network access rule of a Azure Storage account
1414

1515
By default, storage accounts accept connections from clients on any network. You can limit access to selected networks *or* prevent traffic from all networks and permit access only through a [private endpoint](storage-private-endpoints.md).
1616

articles/storage/common/storage-network-security.md

Lines changed: 25 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Azure Storage firewall and virtual network rules
3-
description: Configure layered network security for your storage account by using the Azure Storage firewall.
3+
description: Learn about settings that you can use to secure traffic to the public endpoints of your Azure Storage account.
44
services: storage
55
author: normesta
66
ms.service: azure-storage
@@ -13,16 +13,21 @@ ms.author: normesta
1313

1414
# Azure Storage firewall and virtual network rules
1515

16-
You can disable public network access to your storage account, and permit traffic only if it originates from sources that you specify. Sources can include [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md) subnets, public IP address ranges, specific Azure resource instances or traffic from trusted Azure services. Clients that make requests from allowed sources must also meet the authorization requirements of the storage account. To learn more about account authorization, see [Authorize access to data in Azure Storage](../common/authorize-data-access.md).
16+
You can disable public network access to your storage account and permit traffic only if it originates from sources that you specify. Sources can include [Azure Virtual Network](../../virtual-network/virtual-networks-overview.md) subnets, public IP address ranges, specific Azure resource instances, or traffic from trusted Azure services.
17+
18+
> [!NOTE]
19+
> Clients that make requests from allowed sources must also meet the authorization requirements of the storage account. To learn more about account authorization, see [Authorize access to data in Azure Storage](../common/authorize-data-access.md).
1720
1821
<a id="grant-access-from-a-virtual-network"></a>
1922
<a id="azure-storage-cross-region-service-endpoints"></a>
2023

21-
## Virtual network subnets
24+
## Virtual network rules
25+
26+
You can enable traffic from subnets in any Azure Virtual Network. The virtual network can be from any subscription within any Microsoft Entra tenant across any Azure region. To enable traffic to a subnet, add a *virtual network rule*. You can add up to 400 of them in a storage account.
2227

23-
You can enable traffic from subnets in any Azure Virtual network in any subscription from any Microsoft Entra tenant in any Azure region. Create a *virtual network rule* for each subnet. Each storage account supports up to **400** virtual network rules.
28+
In the settings of the subnet's virtual network, you must also enable a Virtual Network *service endpoint*. That endpoint is specifically designed to provide secure and direct connectivity to your storage account.
2429

25-
Creating a virtual network rule is only one part of what is required to enable traffic from a virtual network. In the settings of the virtual network, you must enable a Virtual Network *service endpoint* that is specifically designed to provide secure and direct connectivity to your storage account. If you create network rules by using the Azure portal, then these service endpoints are created for you as you choose each target subnet. PowerShell and Azure CLI provide commands that you can run to create them. To learn more about service endpoints, see [Virtual Network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
30+
When you create network rules using the Azure portal, these service endpoints are automatically created as you select each target subnet. PowerShell and Azure CLI provide commands that you can run to create them manually. To learn more about service endpoints, see [Virtual Network service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md).
2631

2732
The following table describes each type of service endpoint that you can enable for Azure Storage:
2833

@@ -32,49 +37,49 @@ The following table describes each type of service endpoint that you can enable
3237
| Azure Storage cross-region service endpoint | Microsoft.Storage.Global | Provides connectivity to storage accounts in **any region**. |
3338

3439
> [!NOTE]
35-
> You can associate only one of these endpoint types to a subnet. If one of these endpoints is already associated with the subnet, you'll have to delete that endpoint before adding the other.
40+
> You can associate only one of these endpoint types with a subnet. If one of these endpoints is already associated with the subnet, you must delete that endpoint before adding the other.
3641
3742
To learn how to configure a virtual network rule and enable service endpoints, see [Create a virtual network rule for Azure Storage](storage-network-security-virtual-networks.md).
3843

3944
<a id="grant-access-from-an-internet-ip-range"></a>
4045
<a id="managing-ip-network-rules"></a>
4146

42-
### Paired regions
47+
### Access from a paired region
4348

4449
Service endpoints also work between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md).
4550

46-
Configuring service endpoints between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md) can be an important part of your disaster recovery plan. Service endpoints allow continuity during a regional failover and access to read-only geo-redundant storage (RA-GRS) instances. Virtual network rules that grant access from a virtual network to a storage account also grant access to any RA-GRS instance.
51+
Configuring service endpoints between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md) can be an important part of your disaster recovery plan. Service endpoints enable continuity during a regional failover and provide access to read-only geo-redundant storage (RA-GRS) instances. Virtual network rules that grant access from a virtual network to a storage account also grant access to any RA-GRS instance.
4752

48-
When you're planning for disaster recovery during a regional outage, create the virtual networks in the paired region in advance. Enable service endpoints for Azure Storage, with network rules granting access from these alternative virtual networks. Then apply these rules to your geo-redundant storage accounts.
53+
When planning for disaster recovery during a regional outage, create the virtual networks in the paired region in advance. Enable service endpoints for Azure Storage with network rules that grant access from these alternative virtual networks. Then apply these rules to your geo-redundant storage accounts.
4954

50-
## IP address ranges
55+
## IP network rules
5156

52-
For clients and services not located in a virtual network, you can enable traffic by creating *IP network rules*. Each IP network rule can enable traffic from a specific public IP address range. For example, if a client from an on-premises network needs to access storage data, then a rule can include the public IP address of that client. Each storage account supports up to **400** IP network rules.
57+
For clients and services not located in a virtual network, you can enable traffic by creating *IP network rules*. Each IP network rule enables traffic from a specific public IP address range. For example, if a client from an on-premises network needs to access storage data, you can create a rule that includes the public IP address of that client. Each storage account supports up to **400** IP network rules.
5358

5459
To learn how to create IP network rules, see [Create an IP network rule for Azure Storage](storage-network-security-ip-address-range.md).
5560

56-
If you've enabled a service endpoint for a subnet, then traffic from that subnet won't use a public IP address to communicate with a storage account. Instead, all the traffic uses a private IP address as a source IP. As a result, IP network rules that permit traffic from those subnets no longer have an effect.
61+
If you've enabled a service endpoint for a subnet, traffic from that subnet won't use a public IP address to communicate with a storage account. Instead, all traffic uses a private IP address as the source IP. As a result, IP network rules that permit traffic from those subnets no longer have an effect.
5762

5863
> [!IMPORTANT]
5964
> Some restrictions apply to IP address ranges. For a list of restrictions, see [Restrictions for IP network rules](storage-network-security-limitations.md#restrictions-for-ip-network-rules).
6065
6166
<a id="configuring-access-from-on-premises-networks"></a>
6267

63-
### Configuring access from on-premises networks
68+
### Access from an on-premises network
6469

65-
To grant access from your on-premises networks to your storage account by using an IP network rule, you must identify the internet-facing IP addresses that your network uses. Contact your network administrator for help.
70+
You can enable traffic from an on-premises network by using an IP network rule. First, you must identify the internet-facing IP addresses that your network uses. Contact your network administrator for help.
6671

67-
If you're using [Azure ExpressRoute](../../expressroute/expressroute-introduction.md) from your premises, you need to identify the NAT IP addresses used for Microsoft peering. Either the service provider or the customer provides the NAT IP addresses.
72+
If you're using [Azure ExpressRoute](../../expressroute/expressroute-introduction.md) from your premises, you need to identify the NAT IP addresses used for Microsoft peering. The service provider or the customer provides the NAT IP addresses.
6873

6974
To allow access to your service resources, you must allow these public IP addresses in the firewall setting for resource IPs.
7075

7176
<a id="grant-access-from-azure-resource-instances"></a>
7277

73-
## Azure resource instances
78+
## Azure resource instance rules
7479

75-
Some Azure resources can't be isolated through a virtual network or IP address rule. You can enable traffic from those resources by creating a *resource instance network rule*. The Azure role assignments of the resource instance determine the types of operations that a resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
80+
Some Azure resources can't be isolated through a virtual network or IP address rule. You can enable traffic from those resources by creating a *resource instance network rule*. The Azure role assignments of the resource instance determine the types of operations that the resource instance can perform on storage account data. Resource instances must be from the same tenant as your storage account, but they can belong to any subscription in the tenant.
7681

77-
To learn how to configure a resource instance rule, see [Create an resource instance network rule for Azure Storage](storage-network-security-resource-instances.md).
82+
To learn how to configure a resource instance rule, see [Create a resource instance network rule for Azure Storage](storage-network-security-resource-instances.md).
7883

7984
<a id="grant-access-to-trusted-azure-services"></a>
8085
<a id="manage-exceptions"></a>
@@ -84,9 +89,9 @@ To learn how to configure a resource instance rule, see [Create an resource inst
8489
<a id="trusted-access-based-on-a-managed-identity"></a>
8590
<a id="trusted-access-for-resources-registered-in-your-microsoft-entra-tenant"></a>
8691

87-
## Trusted Azure services
92+
## Exceptions for trusted Azure services
8893

89-
If you need to enable traffic from an Azure service outside of the network boundary, you can add a *network security exception*. This can be useful in cases where an Azure service operates from a network that you can't include in your virtual network or IP network rules. For example, some services might need to read resource logs and metrics in your account. You can allow read access for the log files, metrics tables, or both by creating a network rule exception. These services connect to your storage account by using strong authentication.
94+
If you need to enable traffic from an Azure service outside of the network boundary, you can add a *network security exception*. This can be useful when an Azure service operates from a network that you can't include in your virtual network or IP network rules. For example, some services might need to read resource logs and metrics in your account. You can allow read access for the log files, metrics tables, or both by creating a network rule exception. These services connect to your storage account using strong authentication.
9095

9196
To learn more about how to add a network security exception, see [Manage network security exceptions](storage-network-security-manage-exceptions.md).
9297

0 commit comments

Comments
 (0)