Skip to content

Commit 5b2b691

Browse files
authored
Merge pull request #295941 from madsd/madsd/ippropclarification
Clarification on IP properties in portal
2 parents 03f8d79 + 414adc9 commit 5b2b691

File tree

2 files changed

+11
-3
lines changed

2 files changed

+11
-3
lines changed
108 KB
Loading

articles/app-service/overview-inbound-outbound-ips.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how inbound and outbound IP addresses are used in Azure App S
44
author: msangapu-msft
55
ms.author: msangapu
66
ms.topic: article
7-
ms.date: 05/13/2024
7+
ms.date: 03/10/2025
88
ms.custom: UpdateFrequency3
99
---
1010

@@ -26,7 +26,7 @@ Regardless of the number of scaled-out instances, each app has a single inbound
2626

2727
- Delete an app and recreate it in a different resource group (deployment unit may change).
2828
- Delete the last app in a resource group _and_ region combination and recreate it (deployment unit may change).
29-
- Delete an existing IP-based TLS/SSL binding, such as during certificate renewal (see [Renew certificate](configure-ssl-certificate.md#renew-an-expiring-certificate)).
29+
- Delete an existing IP-based TLS binding, such as during certificate renewal (see [Renew certificate](configure-ssl-certificate.md#renew-an-expiring-certificate)).
3030

3131
## Find the inbound IP
3232

@@ -86,13 +86,21 @@ For function apps, see [Function app outbound IP addresses](/azure/azure-functio
8686

8787
You can control the IP address of outbound traffic from your app by using virtual network integration together with a virtual network NAT gateway to direct traffic through a static public IP address. [Virtual network integration](./overview-vnet-integration.md) is available on **Basic**, **Standard**, **Premium**, **PremiumV2**, and **PremiumV3** App Service plans. To learn more about this setup, see [NAT gateway integration](./networking/nat-gateway-integration.md).
8888

89+
## IP Address properties in Azure portal
90+
91+
IP Addresses appear in multiple places in Azure portal. The properties page will show you the raw output from `inboundIpAddress`, `possibleInboundIpAddresses`, `outboundIpAddresses`, and `possibleOutboundIpAddresses`. The overview page will also show the same values, but not include the **Possible Inbound IP Addresses**.
92+
93+
Networking overview shows the combination of **Inbound IP Address** and any private endpoint IP addresses in the **Inbound addresses** field. If public network access is disabled, the public IP address won't be shown. The **Outbound addresses** field has a combined list of **(Possible) Outbound IP Addresses**, and if the app is virtual network integrated and is routing all traffic, and the subnet has a NAT gateway attached, the field will also include the IP addresses from the NAT gateway.
94+
95+
:::image type="content" source="./media/overview-inbound-outbound-ips/networking-overview.png" alt-text="Screenshot that shows how IP addresses are shown in the networking overview page.":::
96+
8997
## Service tag
9098

9199
By using the `AppService` service tag, you can define network access for the Azure App Service service without specifying individual IP addresses. The service tag is a group of IP address prefixes that you use to minimize the complexity of creating security rules. When you use service tags, Azure automatically updates the IP addresses as they change for the service. However, the service tag isn't a security control mechanism. The service tag is merely a list of IP addresses.
92100

93101
The `AppService` service tag includes only the inbound IP addresses of multitenant apps. Inbound IP addresses from apps deployed in isolated (App Service Environment) and apps using [IP-based TLS bindings](./configure-ssl-bindings.md) aren't included. Further all outbound IP addresses used in both multitenant and isolated aren't included in the tag.
94102

95-
The tag can be used to allow outbound traffic in a Network security group (NSG) to apps. If the app is using IP-based TLS or the app is deployed in isolated mode, you must use the dedicated IP address instead.
103+
The tag can be used to allow outbound traffic in a Network security group (NSG) to apps. If the app is using IP-based TLS or the app is deployed in isolated mode, you must use the dedicated IP address instead. As the tag only includes inbound IP addresses, the tag can't be used in access restrictions to limit access to an app from other apps in App Service.
96104

97105
> [!NOTE]
98106
> Service tag helps you define network access, but it shouldn't be considered as a replacement for proper network security measures as it doesn't provide granular control over individual IP addresses.

0 commit comments

Comments
 (0)