Skip to content

Commit 1d9ffe8

Browse files
authored
Update firewall-integration.md
1 parent 12116c8 commit 1d9ffe8

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/container-apps/firewall-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Network Security Groups (NSGs) needed to configure virtual networks closely rese
1616

1717
You can lock down a network via NSGs with more restrictive rules than the default NSG rules to control all inbound and outbound traffic for the Container Apps environment at the subscription level.
1818

19-
In the workload profiles environment, user-defined routes (UDRs) and securing outbound traffic with a firewall are supported. When using an external workload profiles environment with external Ingress, inbound traffic routes through the infrastructure’s public IP rather than through your subnet. So locking down inbound traffic via NSG and Firewall on an external workload profiles environment is not supported. Learn more in the [networking concepts document](./networking.md#user-defined-routes-udr).
19+
In the workload profiles environment, user-defined routes (UDRs) and securing outbound traffic with a firewall are supported. When using an external workload profiles environment, inbound traffic to Container Apps that use external Ingress routes through the public IP that exists in the [managed resource group](networking?tabs=azure-cli#workload-profiles-environment-1) rather than through your subnet. So locking down inbound traffic via NSG or Firewall on an external workload profiles environment is not supported. Learn more in the [networking concepts document](./networking.md#user-defined-routes-udr).
2020

2121
In the Consumption only environment, custom user-defined routes (UDRs) and ExpressRoutes aren't supported.
2222

0 commit comments

Comments
 (0)