You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> * Inbound NSG rules do not apply when a v2 tier instance is integrated in a virtual network for private outbound access. To enforce inbound NSG rules, use virtual network injection instead of integration.
55
+
> * This differs from networking in the classic Premium tier, where inbound NSG rules are enforced in both external and internal virtual network injection modes. [Learn more](virtual-network-injection-resources.md)
56
+
51
57
### Subnet delegation
52
58
53
59
The subnet needs to be delegated to the **Microsoft.Web/serverFarms** service.
Copy file name to clipboardExpand all lines: articles/api-management/virtual-network-workspaces-resources.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: dlepow
5
5
6
6
ms.service: azure-api-management
7
7
ms.topic: concept-article
8
-
ms.date: 06/18/2025
8
+
ms.date: 07/08/2025
9
9
ms.author: danlep
10
10
---
11
11
@@ -45,7 +45,6 @@ For information about configuring subnet delegation, see [Add or remove a subnet
45
45
46
46
#### [Virtual network integration](#tab/external)
47
47
48
-
49
48
For virtual network integration, the subnet needs to be delegated to the **Microsoft.Web/serverFarms** service.
50
49
51
50
:::image type="content" source="media/virtual-network-injection-workspaces-resources/delegate-external.png" alt-text="Screenshot showing subnet delegation to Microsoft.Web/serverFarms in the portal.":::
@@ -65,21 +64,20 @@ For virtual network injection, the subnet needs to be delegated to the **Microso
65
64
66
65
---
67
66
67
+
## Network security group
68
68
69
-
##Network security group (NSG) rules
69
+
#### [Virtual network integration](#tab/external)
70
70
71
-
A network security group (NSG) must be attached to the subnet to explicitly allow certain inbound or outbound connectivity. Configure the following rules in the NSG. Set the priority of these rules higher than that of the default rules.
A network security group (NSG) must be associated with the subnet. To set up a network security group, see [Create a network security group](../virtual-network/manage-network-security-group.md).
81
77
82
-
#### [Virtual network injection](#tab/internal)
78
+
* Configure the following rules in the NSG. Set the priority of these rules higher than that of the default rules.
79
+
* Configure other outbound rules you need for the gateway to reach your API backends.
80
+
* Configure other NSG rules to meet your organization’s network access requirements. For example, NSG rules can also be used to block outbound traffic to the internet and allow access only to resources in your virtual network.
83
81
84
82
| Direction | Source | Source port ranges | Destination | Destination port ranges | Protocol | Action | Purpose |
@@ -89,6 +87,10 @@ Configure other NSG rules to meet your organization's network access requirement
89
87
90
88
---
91
89
90
+
> [!IMPORTANT]
91
+
> * Inbound NSG rules do not apply when you integrate a workspace gateway in a virtual network for private outbound access. To enforce inbound NSG rules, use virtual network injection instead of integration.
92
+
> * This differs from networking in the classic Premium tier, where inbound NSG rules are enforced in both external and internal virtual network injection modes. [Learn more](virtual-network-injection-resources.md)
93
+
92
94
## DNS settings for virtual network injection
93
95
94
96
For virtual network injection, you have to manage your own DNS to enable inbound access to your workspace gateway.
Copy file name to clipboardExpand all lines: includes/api-management-virtual-network-v2-nsg-rules.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,17 @@
2
2
author: dlepow
3
3
ms.service: azure-api-management
4
4
ms.topic: include
5
-
ms.date: 06/25/2025
5
+
ms.date: 07/08/2025
6
6
ms.author: danlep
7
7
---
8
8
9
-
### Network security group
10
9
11
10
A network security group (NSG) must be associated with the subnet. To set up a network security group, see [Create a network security group](../articles/virtual-network/manage-network-security-group.md).
12
11
13
-
* Configure an outbound NSG rule to allow access to Azure Storage on port 443.
12
+
* Configure the following rule to allow outbound access to Azure Storage, which is a dependency for API Management.
14
13
* Configure other outbound rules you need for the gateway to reach your API backends.
15
-
* Configure other NSG rules to meet your organization’s network access requirements. For example, NSG rules can also be used to block outbound traffic to the internet and allow access only to resources in your virtual network.
14
+
* Configure other NSG rules to meet your organization’s network access requirements. For example, NSG rules can also be used to block outbound traffic to the internet and allow access only to resources in your virtual network.
15
+
16
+
| Direction | Source | Source port ranges | Destination | Destination port ranges | Protocol | Action | Purpose |
0 commit comments