Skip to content

Commit 53aaecc

Browse files
authored
Fix per PG
1 parent 5197c43 commit 53aaecc

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/logic-apps/secure-single-tenant-workflow-virtual-network-private-endpoint.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.suite: integration
66
ms.reviewer: estfan, azla
77
ms.topic: how-to
88
ms.custom: engagement-fy23
9-
ms.date: 10/03/2022
9+
ms.date: 02/22/2023
1010

1111
# As a developer, I want to connect to my Standard logic app workflows with virtual networks using private endpoints and virtual network integration.
1212
---
@@ -126,10 +126,10 @@ To secure outbound traffic from your logic app, you can integrate your logic app
126126

127127
- For the Azure Logic Apps runtime to work, you need to have an uninterrupted connection to the backend storage. If the backend storage is exposed to the virtual network through a private endpoint, make sure that the following ports are open:
128128

129-
| Source port | Direction | Protocol | Source / Destination | Purpose |
130-
|-------------|-----------|----------|----------------------|---------|
131-
| 443 | Outbound | TCP | Subnet integrated with Standard logic app / Storage account | Storage account |
132-
| 445 | Outbound | TCP | Subnet integrated with Standard logic app / Storage account | Server Message Block (SMB) File Share |
129+
| Source port | Destination port | Source | Destination | Protocol | Purpose |
130+
|-------------|------------------|--------|-------------|----------|---------|
131+
| * | 443 | Subnet integrated with Standard logic app | Storage account | TCP | Storage account |
132+
| * | 445 | Subnet integrated with Standard logic app | Storage account | TCP | Server Message Block (SMB) File Share |
133133

134134
- For Azure-hosted managed connectors to work, you need to have an uninterrupted connection to the managed API service. With virtual network integration, make sure that no firewall or network security policy blocks these connections. If your virtual network uses a network security group (NSG), user-defined route table (UDR), or a firewall, make sure that the virtual network allows outbound connections to [all managed connector IP addresses](/connectors/common/outbound-ip-addresses#azure-logic-apps) in the corresponding region. Otherwise, Azure-managed connectors won't work.
135135

0 commit comments

Comments
 (0)