You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-relay/ip-firewall-virtual-networks.md
+64-57Lines changed: 64 additions & 57 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Configure IP firewall for Azure Relay namespace
3
3
description: This article describes how to Use firewall rules to allow connections from specific IP addresses to Azure Relay namespaces.
4
4
ms.topic: article
5
-
ms.date: 06/21/2022
5
+
ms.date: 02/15/2023
6
6
---
7
7
8
8
# Configure IP firewall for an Azure Relay namespace
@@ -18,15 +18,14 @@ The IP firewall rules are applied at the namespace level. Therefore, the rules a
18
18
This section shows you how to use the Azure portal to create IP firewall rules for a namespace.
19
19
20
20
1. Navigate to your **Relay namespace** in the [Azure portal](https://portal.azure.com).
21
-
2. On the left menu, select **Networking** option. If you select the **All networks** option in the **Allow access from** section, the Relay namespace accepts connections from any IP address. This setting is equivalent to a rule that accepts the 0.0.0.0/0 IP address range.
22
-
23
-

21
+
2. On the left menu, select **Networking**.
24
22
1. To restrict access to specific networks and IP addresses, select the **Selected networks** option. In the **Firewall** section, follow these steps:
25
23
1. Select **Add your client IP address** option to give your current client IP the access to the namespace.
26
24
2. For **address range**, enter a specific IPv4 address or a range of IPv4 address in CIDR notation.
27
-
28
-

29
-
3. Select **Save** on the toolbar to save the settings. Wait for a few minutes for the confirmation to show up on the portal notifications.
25
+
3. If you want to allow Microsoft services trusted by the Azure Relay service to bypass this firewall, select **Yes** for **Allow trusted Microsoft services to bypass this firewall?**.
26
+
27
+
:::image type="content" source="./media/ip-firewall/selected-networks-trusted-access-disabled.png" alt-text="Screenshot showing the Public access tab of the Networking page with the Firewall enabled.":::
28
+
1. Select **Save** on the toolbar to save the settings. Wait for a few minutes for the confirmation to show up on the portal notifications.
30
29
31
30
32
31
### Use Resource Manager template
@@ -51,64 +50,72 @@ The template takes one parameter: **ipMask**, which is a single IPv4 address or
0 commit comments