Skip to content

Commit 1e2a8ec

Browse files
aadetayonormesta
andauthored
Update articles/storage/common/storage-private-endpoints.md
Co-authored-by: Norm Estabrook <[email protected]>
1 parent b6feaa7 commit 1e2a8ec

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

articles/storage/common/storage-private-endpoints.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ Storage account owners can manage consent requests and the private endpoints thr
4949
5050
You can secure your storage account to only accept connections from your virtual network by [configuring the storage firewall](storage-network-security-set-default-access.md) to deny access through its public endpoint by default. You don't need a firewall rule to allow traffic from a virtual network that has a private endpoint, since the storage firewall only controls access through the public endpoint. Private endpoints instead rely on the consent flow for granting subnets access to the storage service.
5151

52-
Additionally when a Private Endpoint is configured, traffic from the associated virtual network is always allowed, even if Public Network Access is disabled on the storage account.
52+
Additionally, when a private endpoint is configured, traffic from the associated virtual network is always allowed, even if public network access is disabled on the storage account.
5353

5454
> [!NOTE]
5555
> When copying blobs between storage accounts, your client must have network access to both accounts. So if you choose to use a private link for only one account (either the source or the destination), make sure that your client has network access to the other account. To learn about other ways to configure network access, see [Configure Azure Storage firewalls and virtual networks](storage-network-security.md?toc=/azure/storage/blobs/toc.json).

0 commit comments

Comments
 (0)