Skip to content

Commit 192b448

Browse files
authored
Merge pull request #301394 from dlepow/netstorage
[APIM] NSG rules - v2 tiers
2 parents 803f898 + 85191e0 commit 192b448

File tree

3 files changed

+18
-12
lines changed

3 files changed

+18
-12
lines changed

articles/api-management/inject-vnet-v2.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -54,14 +54,7 @@ If you want to enable *public* inbound access to an API Management instance in t
5454
* Minimum: /27 (32 addresses)
5555
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
5656

57-
### Network security group
58-
59-
A network security group must be associated with the subnet.
60-
61-
* Configure an outbound NSG rule to allow access to Azure Storage on port 443.
62-
* Configure other rules to meet your organization's network access requirements.
63-
64-
To set up a network security group, see [Create a network security group](../virtual-network/manage-network-security-group.md).
57+
[!INCLUDE [api-management-virtual-network-v2-nsg-rules](../../includes/api-management-virtual-network-v2-nsg-rules.md)]
6558

6659
### Subnet delegation
6760

articles/api-management/integrate-vnet-outbound.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dlepow
55
ms.author: danlep
66
ms.service: azure-api-management
77
ms.topic: how-to
8-
ms.date: 04/03/2025
8+
ms.date: 06/16/2025
99
---
1010

1111
# Integrate an Azure API Management instance with a private virtual network for outbound connections
@@ -46,9 +46,7 @@ If you want to inject a Premium v2 (preview) API Management instance into a virt
4646
* Minimum: /27 (32 addresses)
4747
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
4848

49-
### Network security group
50-
51-
A network security group must be associated with the subnet. Configure any network security group rules that you need for the gateway to access your API backends. Network security groups (NSG) can also be used to block outbound traffic to the internet and access only resources in your virtual network. To set up a network security group, see [Create a network security group](../virtual-network/manage-network-security-group.md).
49+
[!INCLUDE [api-management-virtual-network-v2-nsg-rules](../../includes/api-management-virtual-network-v2-nsg-rules.md)]
5250

5351
### Subnet delegation
5452

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
author: dlepow
3+
ms.service: azure-api-management
4+
ms.topic: include
5+
ms.date: 06/25/2025
6+
ms.author: danlep
7+
---
8+
9+
### Network security group
10+
11+
A network security group (NSG) must be associated with the subnet. To set up a network security group, see [Create a network security group](../articles/virtual-network/manage-network-security-group.md).
12+
13+
* Configure an outbound NSG rule to allow access to Azure Storage on port 443.
14+
* Configure other outbound rules you need for the gateway to reach your API backends.
15+
* Configure other NSG rules to meet your organization’s network access requirements. For example, NSG rules can also be used to block outbound traffic to the internet and allow access only to resources in your virtual network.

0 commit comments

Comments
 (0)