Skip to content

Commit e1198d0

Browse files
committed
Removing some anchors
1 parent ea587db commit e1198d0

File tree

3 files changed

+8
-11
lines changed

3 files changed

+8
-11
lines changed

articles/storage/common/storage-network-security-overview.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,11 @@ By default, storage accounts accept requests over HTTPS only. Any requests made
2424

2525
## Private endpoints
2626

27-
Where possible, create private links to your storage account to secure access through a *private endpoint*. A private endpoint assigns a private IP address from your virtual network to your storage account. Clients connect to your storage account using the private link. Traffic is routed over the Microsoft backbone network, ensuring it doesn't travel over the public internet. You can fine-tune access rules using [Network policies for private endpoints](../../private-link/disable-private-endpoint-network-policy.md). To permit traffic only from private links, you can block all access over the public endpoint. Private endpoints incur extra costs but provide maximum network isolation.
28-
29-
To learn more about using a private endpoint to secure traffic to your storage account, see [Use private endpoints for Azure Storage](storage-private-endpoints.md).
27+
Where possible, create private links to your storage account to secure access through a *private endpoint*. A private endpoint assigns a private IP address from your virtual network to your storage account. Clients connect to your storage account using the private link. Traffic is routed over the Microsoft backbone network, ensuring it doesn't travel over the public internet. You can fine-tune access rules using [Network policies for private endpoints](../../private-link/disable-private-endpoint-network-policy.md). To permit traffic only from private links, you can block all access over the public endpoint. Private endpoints incur extra costs but provide maximum network isolation. To learn more, see [Use private endpoints for Azure Storage](storage-private-endpoints.md).
3028

3129
## Public endpoints
3230

33-
The *public endpoint* of your storage account is accessed through a public IP address. If you block all access over the public endpoint, you disable all traffic to the storage account's public IP address. However, if there are clients that can't access your storage account over a private link, or if you choose not to use private endpoints for cost or other reasons, then you can secure the public endpoint of your storage account by using firewall rules or by adding your storage account to a network security perimeter.
31+
The *public endpoint* of your storage account is accessed through a public IP address. If you use only private endpoints, then you should disable all traffic to the storage account's public IP address. If some clients use a private link, or you choose not to use private endpoints for cost or other reasons, then you can secure the public endpoint of your storage account by using firewall rules or by adding your storage account to a network security perimeter.
3432

3533
### Firewall rules
3634

articles/storage/common/storage-network-security-trusted-azure-services.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,14 @@ ms.author: normesta
1313

1414
# Trusted Azure services
1515

16+
<a id="trusted-microsoft-services"></a>
17+
1618
If you need to enable traffic from an Azure service outside of your network boundary, you can add a *network security exception*. This is useful when an Azure service operates from a network that you can't include in your virtual network or IP network rules. For example, some services might need to read resource logs and metrics in your account. You can allow read access for log files, metrics tables, or both by creating a network rule exception. These services connect to your storage account using strong authentication.
1719

1820
To learn how to add a network security exception, see [Manage Network security exceptions](storage-network-security-manage-exceptions.md).
1921

2022
<a id="trusted-access-based-on-system-assigned-managed-identity"></a>
23+
<a id="trusted-access-for-resources-registered-in-your-microsoft-entra-tenant"></a>
2124

2225
### Trusted access for resources registered in your Microsoft Entra tenant
2326

articles/storage/common/storage-network-security.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -50,9 +50,6 @@ The following table describes each type of service endpoint that you can enable
5050
5151
To learn how to configure a virtual network rule and enable service endpoints, see [Create a virtual network rule for Azure Storage](storage-network-security-virtual-networks.md).
5252

53-
<a id="grant-access-from-an-internet-ip-range"></a>
54-
<a id="managing-ip-network-rules"></a>
55-
5653
### Access from a paired region
5754

5855
Service endpoints also work between virtual networks and service instances in a [paired region](../../best-practices-availability-paired-regions.md).
@@ -61,6 +58,9 @@ Configuring service endpoints between virtual networks and service instances in
6158

6259
When planning for disaster recovery during a regional outage, create the virtual networks in the paired region in advance. Enable service endpoints for Azure Storage with network rules that grant access from these alternative virtual networks. Then apply these rules to your geo-redundant storage accounts.
6360

61+
<a id="managing-ip-network-rules"></a>
62+
<a id="grant-access-from-an-internet-ip-range"></a>
63+
6464
## IP network rules
6565

6666
For clients and services that aren't located in a virtual network, you can enable traffic by creating *IP network rules*. Each IP network rule enables traffic from a specific public IP address range. For example, if a client from an on-premises network needs to access storage data, you can create a rule that includes the public IP address of that client. Each storage account supports up to **400** IP network rules.
@@ -94,11 +94,7 @@ To learn how to configure a resource instance rule, see [Create a resource insta
9494

9595
<a id="grant-access-to-trusted-azure-services"></a>
9696
<a id="manage-exceptions"></a>
97-
<a id="trusted-microsoft-services"></a>
9897
<a id="exceptions"></a>
99-
<a id="trusted-access-based-on-system-assigned-managed-identity"></a>
100-
<a id="trusted-access-based-on-a-managed-identity"></a>
101-
<a id="trusted-access-for-resources-registered-in-your-microsoft-entra-tenant"></a>
10298

10399
## Exceptions for trusted Azure services
104100

0 commit comments

Comments
 (0)