You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/storage/files/encryption-in-transit-for-nfs-shares.md
+40-31Lines changed: 40 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,10 @@
1
1
---
2
-
title: How to Encrypt Data in Transit for NFS shares (preview)
2
+
title: How to Encrypt Data in Transit for NFS shares
3
3
description: This article explains how you can encrypt data in transit (EiT) for NFS Azure file shares by using a TLS channel.
4
4
author: guptasonia
5
5
ms.service: azure-file-storage
6
6
ms.topic: how-to
7
-
ms.date: 06/11/2025
7
+
ms.date: 06/27/2025
8
8
ms.author: kendownie
9
9
ms.custom:
10
10
- devx-track-azurepowershell
@@ -13,15 +13,11 @@ ms.custom:
13
13
# Customer intent: As a network administrator, I want to securely encrypt data in transit for NFS Azure file shares using TLS, so that I can protect sensitive information from interception and ensure data confidentiality without complex network security or authentication setups.
14
14
---
15
15
16
-
# Encryption in transit for NFS Azure file shares (preview)
16
+
# Encryption in transit for NFS Azure file shares
17
17
18
-
This article explains how you can encrypt data in transit for NFS Azure file shares.
18
+
This article explains how you can encrypt data in transit for NFS Azure file shares. Azure Files NFS v4.1 volumes enhance network security by enabling secure TLS connections, protecting data in transit from interception, including MITM attacks.
19
19
20
-
> [!IMPORTANT]
21
-
> - Encryption in transit for Azure file shares NFS v4.1 is currently in **preview**.
22
-
> - See the [Preview Terms Of Use | Microsoft Azure](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
23
-
24
-
Azure Files NFS v4.1 volumes enhance network security by enabling secure TLS connections, protecting data in transit from interception, including MITM attacks.
20
+
## Overview
25
21
26
22
Using [Stunnel](https://www.stunnel.org/), an open-source TLS wrapper, Azure Files encrypts the TCP stream between the NFS client and Azure Files with strong encryption using AES-GCM, without needing Kerberos. This ensures data confidentiality while eliminating the need for complex setups or external authentication systems like Active Directory.
27
23
@@ -33,15 +29,25 @@ The [AZNFS](https://github.com/Azure/AZNFS-mount) utility package simplifies enc
33
29
34
30
-**AZNFS watchdog**: The AZNFS package runs a background job that ensures stunnel processes are running, automatically restarts terminated tunnels, and cleans up unused processes after all associated NFS mounts are unmounted.
All regions that support Azure Premium Files now support encryption in transit.
44
+
## Supported regions
39
45
46
+
EiT is now Generally Available (GA) in all regions that support Azure Premium Files except China North3, New Zealand North, West Europe, US East2, US Central, US South and Korea Central. These remaining regions are currently running preview. You must register your subscription per the instructions below to use EiT in the preview regions.
40
47
41
-
## Register for preview
48
+
###Register for preview (not needed for GA regions)
42
49
43
-
To enable encryption in transit for your NFS shares, you must register for the preview feature.
44
-
50
+
To enable encryption in transit for your storage accounts and NFS shares in the preview regions (China North3, New Zealand North, West Europe, US East2, US Central, US South, and Korea Central), you must register for the preview. **No registration is needed in the GA regions.**
By enabling the **Secure transfer required** setting on the storage account, you can ensure that all the mounts to the NFS volumes in the storage account are encrypted.
81
+
By enabling the **Secure transfer required** setting on the storage account, you can ensure that all the mounts to the NFS volumes in the storage account are encrypted. EiT can be enabled on both new and existing storage accounts and NFS Azure file shares. There is no additional cost for enabling EiT.
76
82
77
83
:::image type="content" source="./media/encryption-in-transit-nfs-shares/storage-account-settings.png" alt-text="Screenshot showing how to enable Secure transfer on a storage account." lightbox="./media/encryption-in-transit-nfs-shares/storage-account-settings.png":::
78
84
79
85
However, for users who prefer to maintain flexibility between TLS and non-TLS connections on the same storage account, the **Secure transfer** setting must remain OFF.
80
-
81
-
## How to encrypt data in transit for NFS shares (preview)
82
-
86
+
87
+
## Encrypt data in transit for NFS shares
88
+
89
+
You can encrypt data in transit for NFS Azure file shares by using the Azure portal or Azure CLI.
90
+
91
+
### Encrypt data in transit for NFS shares using the Azure portal
92
+
93
+
Azure portal offers a step-by-step, ready-to-use installation script tailored to your selected Linux distribution for installing the AZNFS mount helper package. Once installed, you can use the provided AZNFS mount script to securely mount the NFS share, establishing an encrypted transmission channel between the client and the server.
94
+
95
+
:::image type="content" source="./media/encryption-in-transit-nfs-shares/mount-using-encryption-in-transit.png" alt-text="Screenshot showing AZNFS mount instructions in the Azure portal." lightbox="./media/encryption-in-transit-nfs-shares/mount-using-encryption-in-transit.png":::
96
+
97
+
Users who prefer to maintain flexibility in having TLS and non-TLS connections on the same storage account should ensure that the *Secure transfer required* setting remains disabled.
98
+
99
+
### Encrypt data in transit for NFS shares using Azure CLI
100
+
83
101
Follow these steps to encrypt data in transit:
84
-
102
+
85
103
1. Ensure the required AZNFS mount helper package is installed on the client.
@@ -190,7 +197,7 @@ To have the share **mounted automatically on reboot**, create an entry in the `/
190
197
191
198
Run the command `df -Th`.
192
199
193
-
:::image type="content" source="./media/encryption-in-transit-nfs-shares/powershell-capture.png" alt-text="Diagram showing the Powershell screen to test if EiT is applied." lightbox="./media/encryption-in-transit-nfs-shares/powershell-capture.png":::
200
+
:::image type="content" source="./media/encryption-in-transit-nfs-shares/powershell-capture.png" alt-text="Diagram showing the PowerShell screen to test if EiT is applied." lightbox="./media/encryption-in-transit-nfs-shares/powershell-capture.png":::
194
201
195
202
It indicates that the client is connected through the local port 127.0.0.1, not an external network. The **stunnel** process listens on 127.0.0.1 (localhost) for incoming NFS traffic from the NFS client. Stunnel then **intercepts** this traffic and securely forwards it over **TLS** to the Azure Files NFS server on Azure.
196
203
@@ -217,6 +224,8 @@ To resolve this issue, remount the share using the clean option, which immediate
217
224
sudo mount -t aznfs <storage-account-name>.file.core.windows.net:/<storage-account-name>/<share-name> /mount/<storage-account-name>/<share-name> -o vers=4,minorversion=1,sec=sys,nconnect=4,notls,clean
218
225
```
219
226
227
+
If a VM is **custom domain joined**, use custom DNS FQDN or short names for file share in `/etc/fstab` as defined in the DNS. To verify the hostname resolution, check using `nslookup <hostname>` and `getent host <hostname>` commands. Before running the mount command, ensure that the environment variable `AZURE_ENDPOINT_OVERRIDE` is set.
228
+
220
229
If mounting issues continue, check the log files for more troubleshooting details:
221
230
222
231
-**Mount Helper and Watchdog Logs**: `/opt/microsoft/aznfs/data/aznfs.log`
0 commit comments