You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/app-service-ip-restrictions.md
+12-16Lines changed: 12 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: madsd
5
5
6
6
ms.assetid: 3be1f4bd-8a81-4565-8a56-528c037b24bd
7
7
ms.topic: article
8
-
ms.date: 03/21/2022
8
+
ms.date: 09/01/2022
9
9
ms.author: madsd
10
10
11
11
---
@@ -75,9 +75,8 @@ On the **Add Access Restriction** pane, when you create a rule, do the following
75
75
76
76
1. Optionally, enter a name and description of the rule.
77
77
1. In the **Priority** box, enter a priority value.
78
-
1. In the **Type** drop-down list, select the type of rule.
79
-
80
-
The different types of rules are described in the following sections.
78
+
1. In the **Type** drop-down list, select the type of rule. The different types of rules are described in the following sections.
79
+
1. After typing in the rule specific input select **Save** to save the changes.
81
80
82
81
> [!NOTE]
83
82
> - There is a limit of 512 access restriction rules. If you require more than 512 access restriction rules, we suggest that you consider installing a standalone security product, such as Azure Front Door, Azure App Gateway, or an alternative WAF.
@@ -120,7 +119,9 @@ All available service tags are supported in access restriction rules. Each servi
120
119
121
120
1. To begin editing an existing access restriction rule, on the **Access Restrictions** page, select the rule you want to edit.
122
121
123
-
1. On the **Edit Access Restriction** pane, make your changes, and then select **Update rule**. Edits are effective immediately, including changes in priority ordering.
122
+
1. On the **Edit Access Restriction** pane, make your changes, and then select **Update rule**.
123
+
124
+
1. Select **Save** to save the changes.
124
125
125
126
:::image type="content" source="media/app-service-ip-restrictions/access-restrictions-ip-edit.png?v2" alt-text="Screenshot of the 'Edit Access Restriction' pane in the Azure portal, showing the fields for an existing access restriction rule.":::
126
127
@@ -129,7 +130,9 @@ All available service tags are supported in access restriction rules. Each servi
129
130
130
131
### Delete a rule
131
132
132
-
To delete a rule, on the **Access Restrictions** page, select the ellipsis (**...**) next to the rule you want to delete, and then select **Remove**.
133
+
1. To delete a rule, on the **Access Restrictions** page, check the rule or rules you want to delete, and then select **Delete**.
134
+
135
+
1. Select **Save** to save the changes.
133
136
134
137
:::image type="content" source="media/app-service-ip-restrictions/access-restrictions-delete.png" alt-text="Screenshot of the 'Access Restrictions' page, showing the 'Remove' ellipsis next to the access restriction rule to be deleted.":::
135
138
@@ -162,17 +165,15 @@ PowerShell example:
162
165
163
166
### Block a single IP address
164
167
165
-
When you add your first access restriction rule, the service adds an explicit *Deny all* rule with a priority of 2147483647. In practice, the explicit *Deny all* rule is the final rule to be executed, and it blocks access to any IP address that's not explicitly allowed by an *Allow* rule.
166
-
167
-
For a scenario where you want to explicitly block a single IP address or a block of IP addresses, but allow access to everything else, add an explicit *Allow All* rule.
168
+
For a scenario where you want to explicitly block a single IP address or a block of IP addresses, but allow access to everything else, add a **Deny** rule for the specific IP address and configure the unmatched rule action to **Allow**.
168
169
169
170
:::image type="content" source="media/app-service-ip-restrictions/block-single-address.png" alt-text="Screenshot of the 'Access Restrictions' page in the Azure portal, showing a single blocked IP address.":::
170
171
171
172
### Restrict access to an SCM site
172
173
173
-
In addition to being able to control access to your app, you can restrict access to the SCM site that's used by your app. The SCM site is both the web deploy endpoint and the Kudu console. You can assign access restrictions to the SCM site from the app separately or use the same set of restrictions for both the app and the SCM site. When you select the **Same restrictions as \<app name>** check box, everything is blanked out. If you clear the check box, your SCM site settings are reapplied.
174
+
In addition to being able to control access to your app, you can restrict access to the SCM (Advanced tool) site that's used by your app. The SCM site is both the web deploy endpoint and the Kudu console. You can assign access restrictions to the SCM site from the app separately or use the same set of restrictions for both the app and the SCM site. When you select the **Use main site rules** check box, the rules list will be hidden and it will use the rules from the main site. If you clear the check box, your SCM site settings will appear again.
174
175
175
-
:::image type="content" source="media/app-service-ip-restrictions/access-restrictions-scm-browse.png" alt-text="Screenshot of the 'Access Restrictions' page in the Azure portal, showing that no access restrictions are set for the SCM site or the app.":::
176
+
:::image type="content" source="media/app-service-ip-restrictions/access-restrictions-advancedtools-browse.png" alt-text="Screenshot of the 'Access Restrictions' page in the Azure portal, showing that no access restrictions are set for the SCM site or the app.":::
176
177
177
178
### Restrict access to a specific Azure Front Door instance
178
179
Traffic from Azure Front Door to your application originates from a well known set of IP ranges defined in the AzureFrontDoor.Backend service tag. Using a service tag restriction rule, you can restrict traffic to only originate from Azure Front Door. To ensure traffic only originates from your specific instance, you will need to further filter the incoming requests based on the unique http header that Azure Front Door sends.
@@ -199,18 +200,13 @@ You can add access restrictions programmatically by doing either of the followin
199
200
--rule-name 'IP example rule' --action Allow --ip-address 122.133.144.0/24 --priority 100
200
201
```
201
202
202
-
> [!NOTE]
203
-
> Working with service tags, http headers or multi-source rules in Azure CLI requires at least version 2.23.0. You can verify the version of the installed module with: ```az version```
204
-
205
203
* Use [Azure PowerShell](/powershell/module/Az.Websites/Add-AzWebAppAccessRestrictionRule). For example:
-Name "Ip example rule" -Priority 100 -Action Allow -IpAddress 122.133.144.0/24
211
209
```
212
-
> [!NOTE]
213
-
> Working with service tags, http headers or multi-source rules in Azure PowerShell requires at least version 5.7.0. You can verify the version of the installed module with: ```Get-InstalledModule -Name Az```
214
210
215
211
You can also set values manually by doing either of the following:
0 commit comments