Skip to content

Commit

Permalink
Apply suggestions from code review
Browse files Browse the repository at this point in the history
Co-authored-by: vinay-gopalan <86625824+vinay-gopalan@users.noreply.github.com>
  • Loading branch information
robmonte and vinay-gopalan authored Feb 28, 2025
1 parent a6cdefc commit b71d297
Showing 1 changed file with 2 additions and 2 deletions.
4 changes: 2 additions & 2 deletions website/content/docs/sync/index.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -254,13 +254,13 @@ for each destination type below:
### Endpoint security

By default, Vault restricts the allowed IP addresses and port numbers used by the sync clients to safeguard against
server-side request forgery (SSRF). All special purpose IP's defined at the IANA special-purpose registry for
server-side request forgery (SSRF). All special purpose IPs defined at the IANA special-purpose registry for
[IPv4](https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml) and
[IPv6](https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml) are blocked, while the only
two allowed ports are 80 and 443.

Both IP addresses and port numbers can be customized to fit the specific needs of the environment. This is useful in environments such
as when the destination service is behind things such as a private endpoint, a load balancer, or a proxy. This strict networking policy
where the destination service is behind things such as a private endpoint, a load balancer, or a proxy. This strict networking policy
can also be entirely disabled in environments where IP addresses or port numbers are not static values.
Refer to the [API](#api) section for more information on these parameters.

Expand Down

0 comments on commit b71d297

Please sign in to comment.