An Azure service that provides private connectivity from a virtual network to Azure platform as a service, customer-owned, or Microsoft partner services.
Hi @ Gilad Sharabi,
Welcome to Microsoft Q&A Platform.
If a Private Endpoint is deployed in a subnet and you want to manage traffic using Network Security Groups or User-Defined Routes , network policies must be enabled on the Private Endpoint subnet.
By default, network policies are disabled for subnets that contain Private Endpoints. To use network policies such as NSG or UDR support, network policy support must be explicitly enabled on the subnet. This setting applies only to Private Endpoints in the subnet and affects all Private Endpoints deployed within it.
Network policies can be enabled for:
- Network Security Groups only
- User-Defined Routes only
If network policies are not enabled on the Private Endpoint subnet, NSG and UDR rules will not be evaluated for Private Endpoint traffic.
Network security groups (NSGs) support for private endpoints is now generally available. This feature enhancement provides you with the ability to enable advanced security controls on traffic destined to a private endpoint. In order to leverage this feature, you will need to set a specific subnet level property, called PrivateEndpointNetworkPolicies, to enabled on the subnet containing private endpoint resources.
Please verify whether network policies are enabled on the Private Endpoint subnet. If not, enable them and re-test the connectivity.
The following examples describe how to enable and disable network policies on the PE Subnet.: Manage network policies for private endpoints
I hope this information helps resolve your issue. Please feel free to ask if the provided solution does not help or if you have any additional questions.
Please
and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.