Skip to content

Commit dd71f0e

Browse files
Merge pull request #256054 from asudbring/vnet-patch
Modified paragraph for no NSG assigned to NIC or subnet from testing
2 parents 4993cef + 1c9da4c commit dd71f0e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/virtual-network/network-security-group-how-it-works.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ For inbound traffic, Azure processes the rules in a network security group assoc
3232

3333
- **VM3**: Since there's no network security group associated to *Subnet2*, traffic is allowed into the subnet and processed by *NSG2*, because *NSG2* is associated to the network interface attached to *VM3*.
3434

35-
- **VM4**: Traffic is allowed to *VM4,* because a network security group isn't associated to *Subnet3*, or the network interface in the virtual machine. All network traffic is allowed through a subnet and network interface if they don't have a network security group associated to them.
35+
- **VM4**: Traffic is blocked to *VM4,* because a network security group isn't associated to *Subnet3*, or the network interface in the virtual machine. All network traffic is blocked through a subnet and network interface if they don't have a network security group associated to them.
3636

3737
## Outbound traffic
3838

0 commit comments

Comments
 (0)