Skip to content

Commit 1350ec4

Browse files
committed
Minor changes to network docs
1 parent 3d4fc39 commit 1350ec4

File tree

2 files changed

+4
-4
lines changed

2 files changed

+4
-4
lines changed

articles/app-service/app-service-ip-restrictions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ author: madsd
55

66
ms.assetid: 3be1f4bd-8a81-4565-8a56-528c037b24bd
77
ms.topic: article
8-
ms.date: 09/01/2022
8+
ms.date: 10/05/2022
99
ms.author: madsd
1010

1111
---
1212
# Set up Azure App Service access restrictions
1313

14-
By setting up access restrictions, you can define a priority-ordered allow/deny list that controls network access to your app. The list can include IP addresses or Azure Virtual Network subnets. When there are one or more entries, an implicit *deny all* exists at the end of the list.
14+
By setting up access restrictions, you can define a priority-ordered allow/deny list that controls network access to your app. The list can include IP addresses or Azure Virtual Network subnets. When there are one or more entries, an implicit *deny all* exists at the end of the list. To learn more about access restrictions, go to the [access restrictions overview](./overview-access-restrictions.md).
1515

1616
The access restriction capability works with all Azure App Service-hosted workloads. The workloads can include web apps, API apps, Linux apps, Linux custom containers and Functions.
1717

articles/app-service/overview-vnet-integration.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate your app with an Azure virtual network
33
description: Integrate your app in Azure App Service with Azure virtual networks.
44
author: madsd
55
ms.topic: conceptual
6-
ms.date: 09/27/2022
6+
ms.date: 10/05/2022
77
ms.author: madsd
88

99
---
@@ -90,7 +90,7 @@ Through application routing or configuration routing options, you can configure
9090
Application routing applies to traffic that is sent from your app after it has been started. See [configuration routing](#configuration-routing) for traffic during startup. When you configure application routing, you can either route all traffic or only private traffic (also known as [RFC1918](https://datatracker.ietf.org/doc/html/rfc1918#section-3) traffic) into your virtual network. You configure this behavior through the **Route All** setting. If **Route All** is disabled, your app only routes private traffic into your virtual network. If you want to route all your outbound app traffic into your virtual network, make sure that **Route All** is enabled.
9191

9292
* Only traffic configured in application or configuration routing is subject to the NSGs and UDRs that are applied to your integration subnet.
93-
* When **Route All** is enabled, outbound traffic from your app is still sent from the addresses that are listed in your app properties, unless you provide routes that direct the traffic elsewhere.
93+
* When **Route All** is enabled, the source address for your outbound public traffic from your app is still one of the IP addresses that are listed in your app properties. If you route your traffic through a firewall or a NAT gateway, the source IP address will then originate from this service.
9494

9595
Learn [how to configure application routing](./configure-vnet-integration-routing.md).
9696

0 commit comments

Comments
 (0)