You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Fix inaccurate NOTE block: Geo-Replication works with NSP, legacy Geo-DR
requires both namespaces on the same perimeter (not unsupported)
- Add CLI verification section (az servicebus namespace network-rule-set show)
- Add troubleshooting section for feature flag errors and Geo-DR pairing error
- Update ms.date to 04/10/2026
Copy file name to clipboardExpand all lines: articles/service-bus-messaging/network-security-perimeter.md
+37-2Lines changed: 37 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Network Security Perimeter
3
3
titleSuffix: Azure Service Bus
4
4
description: Learn how to associate an Azure Service Bus namespace with a network security perimeter
5
5
ms.reviewer: spelluru
6
-
ms.date: 03/30/2026
6
+
ms.date: 04/10/2026
7
7
author: EldertGrootenboer
8
8
ms.author: egrootenboer
9
9
ms.topic: feature-guide
@@ -34,7 +34,7 @@ Azure Service Bus supports scenarios that require access to other PaaS resources
34
34
-**Customer-managed keys (CMK)** require communication with Azure Key Vault. For more information, see [Configure customer-managed keys for encrypting Azure Service Bus data at rest](configure-customer-managed-key.md).
35
35
36
36
> [!NOTE]
37
-
> -Network security perimeter currently doesn't support [Azure Service Bus Geo-Replication](./service-bus-geo-replication.md).
37
+
> -For legacy Geo-disaster recovery (alias-based pairing), both the primary and secondary namespaces must be associated with the same network security perimeter. If only the primary is associated, pairing fails.
38
38
> - Network security perimeter rules don't govern private link traffic through [private endpoints](../private-link/private-endpoint-overview.md).
39
39
40
40
## Create a network security perimeter
@@ -52,6 +52,41 @@ You can associate your Service Bus namespace with a network security perimeter d
52
52
1. Select a profile to associate with the namespace.
53
53
1. Select **Associate** to complete the association.
54
54
55
+
## Verify NSP association using Azure CLI
56
+
57
+
To verify that your namespace is associated with a network security perimeter:
58
+
59
+
```azurecli
60
+
az servicebus namespace network-rule-set show \
61
+
--name <namespace-name> \
62
+
--resource-group <resource-group>
63
+
```
64
+
65
+
When associated, the `publicNetworkAccess` field shows `SecuredByPerimeter`.
66
+
67
+
## Troubleshooting
68
+
69
+
### "This feature isn't available for given subscription"
70
+
71
+
Some network security perimeter capabilities require feature flags to be registered on your subscription. If you encounter this error when configuring access rules or perimeter links, register the required feature flag and re-register the network provider:
72
+
73
+
| Capability | Feature flag | Registration command |
When creating a legacy Geo-disaster recovery pairing, both the primary and secondary namespaces must be associated with the same network security perimeter. Associate the secondary namespace with the same perimeter, then retry the pairing.
0 commit comments