Skip to content

Commit 5e5611a

Browse files
authored
Merge pull request #96895 from MonikaReddy-MSFT/patch-9
Updating the doc MicrosoftDocs/azure-docs#43294
2 parents fc27d0c + 832a5c1 commit 5e5611a

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/app-service/environment/firewall-integration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ The ASE outbound dependencies are almost entirely defined with FQDNs, which do n
2626

2727
The solution to securing outbound addresses lies in use of a firewall device that can control outbound traffic based on domain names. Azure Firewall can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination.
2828

29+
> [!NOTE]
30+
> At this moment, we can't fully lockdown the outbound connection currently.
31+
2932
## System architecture
3033

3134
Deploying an ASE with outbound traffic going through a firewall device requires changing routes on the ASE subnet. Routes operate at an IP level. If you are not careful in defining your routes, you can force TCP reply traffic to source from another address. When your reply address is different from the address traffic was sent to, the problem is called asymmetric routing and it will break TCP.

0 commit comments

Comments
 (0)