You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/connect-virtual-network-vnet-isolated-environment.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: logic-apps
5
5
ms.suite: integration
6
6
ms.reviewer: klam, logicappspm
7
7
ms.topic: conceptual
8
-
ms.date: 03/11/2020
8
+
ms.date: 03/12/2020
9
9
---
10
10
11
11
# Connect to Azure virtual networks from Azure Logic Apps by using an integration service environment (ISE)
@@ -94,7 +94,7 @@ To make sure that your ISE is accessible and that the logic apps in that ISE can
94
94
95
95
### Network ports used by your ISE
96
96
97
-
This table describes the ports in your Azure virtual network that your ISE uses and where those ports get used. The [Resource Manager service tags](../virtual-network/security-overview.md#service-tags)represents a group of IP address prefixes that help minimize complexity when creating security rules.
97
+
This table describes the ports in your Azure virtual network that your ISE uses and where those ports get used. The [Resource Manager service tags](../virtual-network/security-overview.md#service-tags)represent groups of IP address prefixes that help minimize complexity when creating security rules.
98
98
99
99
> [!IMPORTANT]
100
100
> Source ports are ephemeral, so make sure that you set them to `*` for all rules. Where noted, internal ISE and external ISE refer to the
@@ -104,11 +104,11 @@ This table describes the ports in your Azure virtual network that your ISE uses
104
104
| Purpose | Direction | Destination ports | Source service tag | Destination service tag | Notes |
| Intersubnet communication within your virtual network | Inbound & Outbound | * | The address space for the virtual network that has your ISE's subnets | The address space for the virtual network that has your ISE's subnets | Required for traffic to flow *between* the subnets in your virtual network. <p><p>**Important**: For traffic to flow between the *components* in each subnet, make sure that you open all the ports within each subnet. |
107
-
| Communication to your logic app | Inbound | 443 | Internal ISE: <br>VirtualNetwork <p><p>External ISE: <br>Internet | VirtualNetwork |The source IP address for the computer or service that calls any request triggers or webhooks in your logic app. <p><p>**Important**: Closing or blocking this port prevents HTTP calls to logic apps that have request triggers. |
108
-
| Logic app run history | Inbound | 443 | Internal ISE: <br>VirtualNetwork <p><p>External ISE: <br>Internet | VirtualNetwork |The source IP address for the computer or service from where you want to view your logic app's run history. <p><p>**Important**: Although closing or blocking this port doesn't prevent you from viewing the run history, you can't view the inputs and outputs for each step in that run history. |
109
-
| Logic Apps Designer - dynamic properties | Inbound | 454 |See **Notes** column for IP addresses to allow| VirtualNetwork | Requests come from the Logic Apps access endpoint [inbound](../logic-apps/logic-apps-limits-and-config.md#inbound) IP addresses for that region. |
107
+
| Communication to your logic app | Inbound | 443 | Internal ISE: <br>VirtualNetwork <p><p>External ISE: <br>Internet <br>(see **Notes** column) | VirtualNetwork |Rather than use the **Internet** service tag, you can select the IP address option so that you can specify the source IP address for the computer or service that calls any request triggers or webhooks in your logic app. <p><p>**Important**: Closing or blocking this port prevents HTTP calls to logic apps that have request triggers. |
108
+
| Logic app run history | Inbound | 443 | Internal ISE: <br>VirtualNetwork <p><p>External ISE: <br>Internet <br>(see **Notes** column) | VirtualNetwork |Rather than the **Internet** service tag, you can select the IP address option so you that can specify the source IP address for the computer or service from where you want to view your logic app's run history. <p><p>**Important**: Although closing or blocking this port doesn't prevent you from viewing the run history, you can't view the inputs and outputs for each step in that run history. |
109
+
| Logic Apps Designer - dynamic properties | Inbound | 454 |LogicAppsManagement| VirtualNetwork | Requests come from the Logic Apps access endpoint [inbound](../logic-apps/logic-apps-limits-and-config.md#inbound) IP addresses for that region. |
110
110
| Connector deployment | Inbound | 454 | AzureConnectors | VirtualNetwork | Required for deploying and updating connectors. Closing or blocking this port causes ISE deployments to fail and prevents connector updates or fixes. |
111
-
| Network health check | Inbound | 454 |See **Notes** column for IP addresses to allow| VirtualNetwork | Requests come from the Logic Apps access endpoint for both [inbound](../logic-apps/logic-apps-limits-and-config.md#inbound) and [outbound](../logic-apps/logic-apps-limits-and-config.md#outbound) IP addresses for that region. |
111
+
| Network health check | Inbound | 454 |LogicApps| VirtualNetwork | Requests come from the Logic Apps access endpoint for both [inbound](../logic-apps/logic-apps-limits-and-config.md#inbound) and [outbound](../logic-apps/logic-apps-limits-and-config.md#outbound) IP addresses for that region. |
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-limits-and-config.md
+14-15Lines changed: 14 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: logic-apps
5
5
ms.suite: integration
6
6
ms.reviewer: klam, logicappspm
7
7
ms.topic: article
8
-
ms.date: 03/11/2020
8
+
ms.date: 03/12/2020
9
9
---
10
10
11
11
# Limits and configuration information for Azure Logic Apps
@@ -288,17 +288,20 @@ take significant time to complete.
288
288
289
289
<aname="configuration"></a>
290
290
291
-
## Firewall configuration: IP addresses
291
+
## Firewall configuration: IP addresses and service tags
292
292
293
-
The IP addresses that Azure Logic Apps uses for incoming and outgoing calls depend on the region where your logic app exists. *All* logic apps that are in the same region use the same IP address ranges.
293
+
The IP addresses that Azure Logic Apps uses for incoming and outgoing calls depend on the region where your logic app exists. *All* logic apps in the same region use the same IP address ranges. Some [Power Automate](https://docs.microsoft.com/power-automate/getting-started) calls, such as **HTTP** and **HTTP + OpenAPI** requests, go directly through the Azure Logic Apps service and come from the IP addresses that are listed here. For more information about IP addresses used by Power Automate, see [Limits and configuration in Power Automate](https://docs.microsoft.com/flow/limits-and-config#ip-address-configuration).
294
294
295
-
> [!NOTE]
296
-
> Some Power Automate calls, such as **HTTP** and **HTTP + OpenAPI** requests,
297
-
> go directly through the Azure Logic Apps service and come from the IP addresses
298
-
> that are listed here. For more information about IP addresses used by Power Automate, see
299
-
> [Limits and configuration in Power Automate](https://docs.microsoft.com/flow/limits-and-config#ip-address-configuration).
295
+
> [!TIP]
296
+
> To help reduce complexity when you create security rules, you can optionally use
297
+
> [service tags](../virtual-network/security-overview.md#service-tags), rather than
298
+
> specify the Logic Apps IP addresses for each region, described later in this section.
299
+
> These tags work across the regions where the Logic Apps service is available:
300
+
>
301
+
> ***LogicAppsManagement**: Represents the inbound IP address prefixes for the Logic Apps service.
302
+
> ***LogicApps**: Represents the outbound IP address prefixes for the Logic Apps service.
300
303
301
-
* To support the calls that your logic apps directly make with [HTTP](../connectors/connectors-native-http.md), [HTTP + Swagger](../connectors/connectors-native-http-swagger.md), and other HTTP requests, set up your firewall with *all* the [inbound](#inbound)*and*[outbound](#outbound) IP addresses that are used by the Logic Apps service, based on the regions where your logic apps exist. These addresses appear under the **Inbound** and **Outbound** headings in this section, and are sorted by region.
304
+
* To support the calls that your logic apps directly make with [HTTP](../connectors/connectors-native-http.md), [HTTP + Swagger](../connectors/connectors-native-http-swagger.md), and other HTTP requests, set up your firewall with all the [inbound](#inbound)*and*[outbound](#outbound) IP addresses that are used by the Logic Apps service, based on the regions where your logic apps exist. These addresses appear under the **Inbound** and **Outbound** headings in this section, and are sorted by region.
302
305
303
306
* To support the calls that [Microsoft-managed connectors](../connectors/apis-list.md) make, set up your firewall with *all* the [outbound](#outbound) IP addresses used by these connectors, based on the regions where your logic apps exist. These addresses appear under the **Outbound** heading in this section, and are sorted by region.
304
307
@@ -310,15 +313,11 @@ The IP addresses that Azure Logic Apps uses for incoming and outgoing calls depe
310
313
311
314
* For custom connectors, [Azure Government](../azure-government/documentation-government-overview.md), and [Azure China 21Vianet](https://docs.microsoft.com/azure/china/), fixed or reserved IP addresses aren't available.
312
315
313
-
> [!IMPORTANT]
314
-
> If you have firewall configurations that you set up before September 1, 2018,
315
-
> make sure that they match the current IP addresses in these lists for the regions where your logic apps exist.
316
-
317
316
<aname="inbound"></a>
318
317
319
318
### Inbound IP addresses
320
319
321
-
This section lists the inbound IP addresses for the Logic Apps service only. For Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
320
+
This section lists the inbound IP addresses for the Azure Logic Apps service only. To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/security-overview.md#service-tags), **LogicAppsManagement**, rather than specify inbound Logic Apps IP address prefixes for each region. This tag works across the regions where the Logic Apps service is available. If you have Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
322
321
323
322
<aname="multi-tenant-inbound"></a>
324
323
@@ -374,7 +373,7 @@ This section lists the inbound IP addresses for the Logic Apps service only. For
374
373
375
374
### Outbound IP addresses
376
375
377
-
This section lists the outbound IP addresses for the Logic Apps service and managed connectors. For Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound).
376
+
This section lists the outbound IP addresses for the Azure Logic Apps service and managed connectors. To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/security-overview.md#service-tags), **LogicApps**, rather than specify outbound Logic Apps IP address prefixes for each region. This tag works across the regions where the Logic Apps service is available. For managed connectors, use the IP addresses. If you have Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound).
0 commit comments