Ang pag-access sa pahinang ito ay nangangailangan ng pahintulot. Maaari mong subukang baguhin ang mga direktoryo.
Set the default public network access rule for an Azure Storage account
By default, storage accounts accept connections from clients on any network. You can limit access to selected networks or prevent traffic from all networks and permit access only through a private endpoint.
Go to the storage account that you want to secure.
In the service menu, under Security + networking, select Networking.
Select Manage, and then choose the network access that is enabled through the storage account's public endpoint:
To allow traffic from all networks, select Enable, and then select Enabled from all networks.
To allow traffic only from specific virtual networks, IP address ranges, or specific Azure resources, select Enable, and then select Enabled from selected networks. You are prompted to add virtual networks, IP address ranges, or resource instances.
To block traffic from all networks, select Disable.
To secure traffic by using a network security perimeter, select Secured by perimeter.
To allow traffic only from specific virtual networks, use the Update-AzStorageAccountNetworkRuleSet command and set the -DefaultAction parameter to Deny:
Network rules have no effect unless you set the -DefaultAction parameter to Deny. However, changing this setting can affect your application's ability to connect to Azure Storage. Be sure to grant access to any allowed networks or set up access through a private endpoint before you change this setting.
To block traffic from all networks, use the Set-AzStorageAccount command and set the -PublicNetworkAccess parameter to Disabled. Traffic will be allowed only through a private endpoint. You need to create that private endpoint.
Choose the type of public network access you want to allow:
To allow traffic from all networks, use the az storage account update command and set the --default-action parameter to Allow:
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --default-action Allow
To allow traffic only from specific virtual networks, use the az storage account update command and set the --default-action parameter to Deny:
az storage account update --resource-group "myresourcegroup" --name "mystorageaccount" --default-action Deny
Important
Network rules have no effect unless you set the --default-action parameter to Deny. However, changing this setting can affect your application's ability to connect to Azure Storage. Be sure to grant access to any allowed networks or set up access through a private endpoint before you change this setting.
To block traffic from all networks, use the az storage account update command and set the --public-network-access parameter to Disabled. Traffic will be allowed only through a private endpoint. You need to create that private endpoint.
az storage account update --name MyStorageAccount --resource-group MyResourceGroup --public-network-access Disabled
Note
Firewall settings that restrict access to storage services remain in effect for up to a minute after you save settings that allow access.