Skip to content

Commit 2e1437c

Browse files
Remove catch-all deny all inbound APIM rule
The rule is appropriate when all traffic to APIM is forced through App Gateway, but it is too restrictive at this time.
1 parent e103e51 commit 2e1437c

File tree

1 file changed

+1
-4
lines changed

1 file changed

+1
-4
lines changed

articles/api-management/api-management-howto-integrate-internal-vnet-appgateway.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -144,12 +144,9 @@ The following example shows how to create a virtual network by using Resource Ma
144144
$apimRule4 = New-AzNetworkSecurityRuleConfig -Name AllowKeyVault -Description "Allows outbound traffic to Azure Key Vault" `
145145
-Access Allow -Protocol Tcp -Direction Outbound -Priority 100 -SourceAddressPrefix "10.0.1.0/24" `
146146
-SourcePortRange * -DestinationAddressPrefix AzureKeyVault -DestinationPortRange 443
147-
$apimRule5 = New-AzNetworkSecurityRuleConfig -Name DenyAll -Description "Denies all inbound traffic" `
148-
-Access Deny -Protocol * -Direction Inbound -Priority 4096 -SourceAddressPrefix "10.0.1.0/24" `
149-
-SourcePortRange * -DestinationAddressPrefix * -DestinationPortRange *
150147
151148
$apimNsg = New-AzNetworkSecurityGroup -ResourceGroupName $resGroupName -Location $location -Name `
152-
"NSG-APIM" -SecurityRules $apimRule1, $apimRule2, $apimRule3, $apimRule4, $apimRule5
149+
"NSG-APIM" -SecurityRules $apimRule1, $apimRule2, $apimRule3, $apimRule4
153150
```
154151
155152
1. Assign the address range 10.0.0.0/24 to the subnet variable to be used for Application Gateway while you create a virtual network.

0 commit comments

Comments
 (0)