Skip to content

Commit 13122ae

Browse files
committed
Add info about service tags
1 parent 2223d29 commit 13122ae

File tree

2 files changed

+20
-21
lines changed

2 files changed

+20
-21
lines changed

articles/logic-apps/connect-virtual-network-vnet-isolated-environment.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: klam, logicappspm
77
ms.topic: conceptual
8-
ms.date: 03/11/2020
8+
ms.date: 03/12/2020
99
---
1010

1111
# Connect to Azure virtual networks from Azure Logic Apps by using an integration service environment (ISE)
@@ -94,7 +94,7 @@ To make sure that your ISE is accessible and that the logic apps in that ISE can
9494

9595
### Network ports used by your ISE
9696

97-
This table describes the ports in your Azure virtual network that your ISE uses and where those ports get used. The [Resource Manager service tags](../virtual-network/security-overview.md#service-tags) represents a group of IP address prefixes that help minimize complexity when creating security rules.
97+
This table describes the ports in your Azure virtual network that your ISE uses and where those ports get used. The [Resource Manager service tags](../virtual-network/security-overview.md#service-tags) represent groups of IP address prefixes that help minimize complexity when creating security rules.
9898

9999
> [!IMPORTANT]
100100
> Source ports are ephemeral, so make sure that you set them to `*` for all rules. Where noted, internal ISE and external ISE refer to the
@@ -104,11 +104,11 @@ This table describes the ports in your Azure virtual network that your ISE uses
104104
| Purpose | Direction | Destination ports | Source service tag | Destination service tag | Notes |
105105
|---------|-----------|-------------------|--------------------|-------------------------|-------|
106106
| Intersubnet communication within your virtual network | Inbound & Outbound | * | The address space for the virtual network that has your ISE's subnets | The address space for the virtual network that has your ISE's subnets | Required for traffic to flow *between* the subnets in your virtual network. <p><p>**Important**: For traffic to flow between the *components* in each subnet, make sure that you open all the ports within each subnet. |
107-
| Communication to your logic app | Inbound | 443 | Internal ISE: <br>VirtualNetwork <p><p>External ISE: <br>Internet | VirtualNetwork | The source IP address for the computer or service that calls any request triggers or webhooks in your logic app. <p><p>**Important**: Closing or blocking this port prevents HTTP calls to logic apps that have request triggers. |
108-
| Logic app run history | Inbound | 443 | Internal ISE: <br>VirtualNetwork <p><p>External ISE: <br>Internet | VirtualNetwork | The source IP address for the computer or service from where you want to view your logic app's run history. <p><p>**Important**: Although closing or blocking this port doesn't prevent you from viewing the run history, you can't view the inputs and outputs for each step in that run history. |
109-
| Logic Apps Designer - dynamic properties | Inbound | 454 | See **Notes** column for IP addresses to allow | VirtualNetwork | Requests come from the Logic Apps access endpoint [inbound](../logic-apps/logic-apps-limits-and-config.md#inbound) IP addresses for that region. |
107+
| Communication to your logic app | Inbound | 443 | Internal ISE: <br>VirtualNetwork <p><p>External ISE: <br>Internet <br>(see **Notes** column) | VirtualNetwork | Rather than use the **Internet** service tag, you can select the IP address option so that you can specify the source IP address for the computer or service that calls any request triggers or webhooks in your logic app. <p><p>**Important**: Closing or blocking this port prevents HTTP calls to logic apps that have request triggers. |
108+
| Logic app run history | Inbound | 443 | Internal ISE: <br>VirtualNetwork <p><p>External ISE: <br>Internet <br>(see **Notes** column) | VirtualNetwork | Rather than the **Internet** service tag, you can select the IP address option so you that can specify the source IP address for the computer or service from where you want to view your logic app's run history. <p><p>**Important**: Although closing or blocking this port doesn't prevent you from viewing the run history, you can't view the inputs and outputs for each step in that run history. |
109+
| Logic Apps Designer - dynamic properties | Inbound | 454 | LogicAppsManagement | VirtualNetwork | Requests come from the Logic Apps access endpoint [inbound](../logic-apps/logic-apps-limits-and-config.md#inbound) IP addresses for that region. |
110110
| Connector deployment | Inbound | 454 | AzureConnectors | VirtualNetwork | Required for deploying and updating connectors. Closing or blocking this port causes ISE deployments to fail and prevents connector updates or fixes. |
111-
| Network health check | Inbound | 454 | See **Notes** column for IP addresses to allow | VirtualNetwork | Requests come from the Logic Apps access endpoint for both [inbound](../logic-apps/logic-apps-limits-and-config.md#inbound) and [outbound](../logic-apps/logic-apps-limits-and-config.md#outbound) IP addresses for that region. |
111+
| Network health check | Inbound | 454 | LogicApps | VirtualNetwork | Requests come from the Logic Apps access endpoint for both [inbound](../logic-apps/logic-apps-limits-and-config.md#inbound) and [outbound](../logic-apps/logic-apps-limits-and-config.md#outbound) IP addresses for that region. |
112112
| App Service Management dependency | Inbound | 454, 455 | AppServiceManagement | VirtualNetwork | |
113113
| Communication from Azure Traffic Manager | Inbound | Internal ISE: 454 <p><p>External ISE: 443 | AzureTrafficManager | VirtualNetwork | |
114114
| API Management - management endpoint | Inbound | 3443 | APIManagement | VirtualNetwork | |

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: klam, logicappspm
77
ms.topic: article
8-
ms.date: 03/11/2020
8+
ms.date: 03/12/2020
99
---
1010

1111
# Limits and configuration information for Azure Logic Apps
@@ -288,17 +288,20 @@ take significant time to complete.
288288

289289
<a name="configuration"></a>
290290

291-
## Firewall configuration: IP addresses
291+
## Firewall configuration: IP addresses and service tags
292292

293-
The IP addresses that Azure Logic Apps uses for incoming and outgoing calls depend on the region where your logic app exists. *All* logic apps that are in the same region use the same IP address ranges.
293+
The IP addresses that Azure Logic Apps uses for incoming and outgoing calls depend on the region where your logic app exists. *All* logic apps in the same region use the same IP address ranges. Some [Power Automate](https://docs.microsoft.com/power-automate/getting-started) calls, such as **HTTP** and **HTTP + OpenAPI** requests, go directly through the Azure Logic Apps service and come from the IP addresses that are listed here. For more information about IP addresses used by Power Automate, see [Limits and configuration in Power Automate](https://docs.microsoft.com/flow/limits-and-config#ip-address-configuration).
294294

295-
> [!NOTE]
296-
> Some Power Automate calls, such as **HTTP** and **HTTP + OpenAPI** requests,
297-
> go directly through the Azure Logic Apps service and come from the IP addresses
298-
> that are listed here. For more information about IP addresses used by Power Automate, see
299-
> [Limits and configuration in Power Automate](https://docs.microsoft.com/flow/limits-and-config#ip-address-configuration).
295+
> [!TIP]
296+
> To help reduce complexity when you create security rules, you can optionally use
297+
> [service tags](../virtual-network/security-overview.md#service-tags), rather than
298+
> specify the Logic Apps IP addresses for each region, described later in this section.
299+
> These tags work across the regions where the Logic Apps service is available:
300+
>
301+
> * **LogicAppsManagement**: Represents the inbound IP address prefixes for the Logic Apps service.
302+
> * **LogicApps**: Represents the outbound IP address prefixes for the Logic Apps service.
300303
301-
* To support the calls that your logic apps directly make with [HTTP](../connectors/connectors-native-http.md), [HTTP + Swagger](../connectors/connectors-native-http-swagger.md), and other HTTP requests, set up your firewall with *all* the [inbound](#inbound) *and* [outbound](#outbound) IP addresses that are used by the Logic Apps service, based on the regions where your logic apps exist. These addresses appear under the **Inbound** and **Outbound** headings in this section, and are sorted by region.
304+
* To support the calls that your logic apps directly make with [HTTP](../connectors/connectors-native-http.md), [HTTP + Swagger](../connectors/connectors-native-http-swagger.md), and other HTTP requests, set up your firewall with all the [inbound](#inbound) *and* [outbound](#outbound) IP addresses that are used by the Logic Apps service, based on the regions where your logic apps exist. These addresses appear under the **Inbound** and **Outbound** headings in this section, and are sorted by region.
302305

303306
* To support the calls that [Microsoft-managed connectors](../connectors/apis-list.md) make, set up your firewall with *all* the [outbound](#outbound) IP addresses used by these connectors, based on the regions where your logic apps exist. These addresses appear under the **Outbound** heading in this section, and are sorted by region.
304307

@@ -310,15 +313,11 @@ The IP addresses that Azure Logic Apps uses for incoming and outgoing calls depe
310313

311314
* For custom connectors, [Azure Government](../azure-government/documentation-government-overview.md), and [Azure China 21Vianet](https://docs.microsoft.com/azure/china/), fixed or reserved IP addresses aren't available.
312315

313-
> [!IMPORTANT]
314-
> If you have firewall configurations that you set up before September 1, 2018,
315-
> make sure that they match the current IP addresses in these lists for the regions where your logic apps exist.
316-
317316
<a name="inbound"></a>
318317

319318
### Inbound IP addresses
320319

321-
This section lists the inbound IP addresses for the Logic Apps service only. For Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
320+
This section lists the inbound IP addresses for the Azure Logic Apps service only. To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/security-overview.md#service-tags), **LogicAppsManagement**, rather than specify inbound Logic Apps IP address prefixes for each region. This tag works across the regions where the Logic Apps service is available. If you have Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
322321

323322
<a name="multi-tenant-inbound"></a>
324323

@@ -374,7 +373,7 @@ This section lists the inbound IP addresses for the Logic Apps service only. For
374373

375374
### Outbound IP addresses
376375

377-
This section lists the outbound IP addresses for the Logic Apps service and managed connectors. For Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound).
376+
This section lists the outbound IP addresses for the Azure Logic Apps service and managed connectors. To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/security-overview.md#service-tags), **LogicApps**, rather than specify outbound Logic Apps IP address prefixes for each region. This tag works across the regions where the Logic Apps service is available. For managed connectors, use the IP addresses. If you have Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound).
378377

379378
<a name="multi-tenant-outbound"></a>
380379

0 commit comments

Comments
 (0)