Skip to content

Commit 2639b89

Browse files
docs: update NSP page - fix Geo-DR claims, add CLI verify and troubleshooting
- Fix inaccurate NOTE block: Geo-Replication works with NSP, legacy Geo-DR requires both namespaces on the same perimeter (not unsupported) - Add CLI verification section (az servicebus namespace network-rule-set show) - Add troubleshooting section for feature flag errors and Geo-DR pairing error - Update ms.date to 04/10/2026
1 parent 10992d3 commit 2639b89

1 file changed

Lines changed: 37 additions & 2 deletions

File tree

articles/service-bus-messaging/network-security-perimeter.md

Lines changed: 37 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Network Security Perimeter
33
titleSuffix: Azure Service Bus
44
description: Learn how to associate an Azure Service Bus namespace with a network security perimeter
55
ms.reviewer: spelluru
6-
ms.date: 03/30/2026
6+
ms.date: 04/10/2026
77
author: EldertGrootenboer
88
ms.author: egrootenboer
99
ms.topic: feature-guide
@@ -34,7 +34,7 @@ Azure Service Bus supports scenarios that require access to other PaaS resources
3434
- **Customer-managed keys (CMK)** require communication with Azure Key Vault. For more information, see [Configure customer-managed keys for encrypting Azure Service Bus data at rest](configure-customer-managed-key.md).
3535

3636
> [!NOTE]
37-
> - Network security perimeter currently doesn't support [Azure Service Bus Geo-Replication](./service-bus-geo-replication.md).
37+
> - For legacy Geo-disaster recovery (alias-based pairing), both the primary and secondary namespaces must be associated with the same network security perimeter. If only the primary is associated, pairing fails.
3838
> - Network security perimeter rules don't govern private link traffic through [private endpoints](../private-link/private-endpoint-overview.md).
3939
4040
## Create a network security perimeter
@@ -52,6 +52,41 @@ You can associate your Service Bus namespace with a network security perimeter d
5252
1. Select a profile to associate with the namespace.
5353
1. Select **Associate** to complete the association.
5454

55+
## Verify NSP association using Azure CLI
56+
57+
To verify that your namespace is associated with a network security perimeter:
58+
59+
```azurecli
60+
az servicebus namespace network-rule-set show \
61+
--name <namespace-name> \
62+
--resource-group <resource-group>
63+
```
64+
65+
When associated, the `publicNetworkAccess` field shows `SecuredByPerimeter`.
66+
67+
## Troubleshooting
68+
69+
### "This feature isn't available for given subscription"
70+
71+
Some network security perimeter capabilities require feature flags to be registered on your subscription. If you encounter this error when configuring access rules or perimeter links, register the required feature flag and re-register the network provider:
72+
73+
| Capability | Feature flag | Registration command |
74+
|------------|-------------|---------------------|
75+
| Cross-perimeter links | `AllowNspLink` | `az feature register --namespace Microsoft.Network --name AllowNspLink` |
76+
| Service tag inbound rules | `EnableServiceTagsInNsp` | `az feature register --namespace Microsoft.Network --name EnableServiceTagsInNsp` |
77+
78+
After registering, propagate the change:
79+
80+
```azurecli
81+
az provider register -n Microsoft.Network
82+
```
83+
84+
Feature flag propagation can take up to 15 minutes.
85+
86+
### "DisasterRecoveryConfigSecondaryMustHaveAssociationsUnderSameNSP"
87+
88+
When creating a legacy Geo-disaster recovery pairing, both the primary and secondary namespaces must be associated with the same network security perimeter. Associate the secondary namespace with the same perimeter, then retry the pairing.
89+
5590
## Related content
5691

5792
- [Network security perimeter concepts](../private-link/network-security-perimeter-concepts.md)

0 commit comments

Comments
 (0)