SOLVED

Private Endpoints - Disable Public Access

Brass Contributor

Hi,

We are developing our new software in Azure and we are using some CosmosDB, Key Vaults...

By default, all of them are published to internet. We use the default URI (https://testxxxxx.mongo.cosmos.azure.com:443/) and in Networking the Public Network Access is opened to "All networks".

 

For security reasons we want to change it. We don't want that our services are published to internet (now you can telnet to testdwh.mongo.cosmos.azure.com using 443 and 10255 ports.

 

So we disabled Public Access for one CosmosDB account:

mgfeal_0-1677494986166.png

 

And then we enabled the Private Access adding a Private Endpoint:

mgfeal_1-1677495058742.png

 

mgfeal_2-1677495138821.png

 

But... after these changes, we don't know why but we still connect to testxxxxxx.mongo.cosmos.azure.com using 443 and 10255 from internet.

 

How can we block this connections from internet?

Thanks!

2 Replies
best response confirmed by mgfeal (Brass Contributor)
Solution
Have you employed the network security group and blocked inbound traffic?
Also, have you reviewed this article by chance?
https://learn.microsoft.com/en-us/azure/virtual-network/tutorial-restrict-network-access-to-resource...

@mgfeal 

How about NSG? Please verify the rules under NSG

1 best response

Accepted Solutions
best response confirmed by mgfeal (Brass Contributor)
Solution
Have you employed the network security group and blocked inbound traffic?
Also, have you reviewed this article by chance?
https://learn.microsoft.com/en-us/azure/virtual-network/tutorial-restrict-network-access-to-resource...

View solution in original post