Skip to content

Commit 61d7489

Browse files
Service tags can be used from other services to provide access to SB, in this case they can reach namespaces in all SKUs
1 parent 4f16b3c commit 61d7489

File tree

1 file changed

+1
-2
lines changed

1 file changed

+1
-2
lines changed

articles/service-bus-messaging/network-security.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,8 @@ You can use service tags to define network access controls on [network security
2525
| --- | -------- |:---:|:---:|:---:|:---:|:---:|:---:|:---:|
2626
| **ServiceBus** | Azure Service Bus traffic. | Outbound | Yes | Yes |
2727

28-
2928
> [!NOTE]
30-
> Service Bus service tags include the IP addresses of namespaces on all SKUs, however, using service tags with private or service endpoints for Service Bus is only supported on **premium** namespaces. If you are using a **standard** namespace, use the FQDN of the namespace instead, in the form of <contoso.servicebus.windows.net>. Alternatively you can use the IP address that you see when you run the following command: `nslookup <host name for the namespace>`, however this is not recommended or supported, and you will need to keep track of changes to the IP addresses.
29+
Previously, Service Bus service tags included only the IP addresses of namespaces on the **premium** SKU. This has now been updated to include the IP addresses of **all namespaces**, regardless of the SKU.
3130

3231
## IP firewall
3332
By default, Service Bus namespaces are accessible from internet as long as the request comes with valid authentication and authorization. With IP firewall, you can restrict it further to only a set of IPv4 addresses or IPv4 address ranges in [CIDR (Classless Inter-Domain Routing)](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) notation.

0 commit comments

Comments
 (0)