Skip to content

Commit 6c4a942

Browse files
edits
1 parent 4d9f1e9 commit 6c4a942

File tree

1 file changed

+12
-11
lines changed

1 file changed

+12
-11
lines changed

articles/container-apps/user-defined-routes.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,32 +16,33 @@ ms.date: 03/29/2023
1616
1717
This article shows you how to use user defined routes (UDR) with [Azure Firewall](../firewall/overview.md) to lock down outbound traffic from your Container Apps to back-end Azure resources or other network resources.
1818

19-
Azure creates a default route table for your virtual networks on create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In this guide, you'll setup UDR on the Container Apps virtual network to restrict outbound traffic with Azure Firewall.
19+
Azure creates a default route table for your virtual networks on create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In this guide, you setup UDR on the Container Apps virtual network to restrict outbound traffic with Azure Firewall.
2020

2121
You can also use a NAT gateway or any other 3rd party appliances instead of Azure Firewall.
2222

2323
For more information on networking concepts in Container Apps, see [Networking Architecture in Azure Container Apps](./networking.md).
2424

2525
## Prerequisites
2626

27-
* An **internal** container app environment on the workload profiles architecture that's integrated with a custom virtual network. When you create an internal container app environment, your container app environment has no public IP addresses, and all traffic is routed through the virtual network. For more information, see the [guide for how to create a container app environment on the workload profiles architecture](./workload-profiles-manage-cli.md). Ensure that you're creating an **internal** environment.
27+
* **Internal environment**: An internal container app environment on the workload profiles architecture that's integrated with a custom virtual network. When you create an internal container app environment, your container app environment has no public IP addresses, and all traffic is routed through the virtual network. For more information, see the [guide for how to create a container app environment on the workload profiles architecture](./workload-profiles-manage-cli.md).
2828

29-
* In your container app, have a container that supports `curl` commands. You can use `curl` to verify the container app is deployed correctly. The *helloworld* container from the sample container image already supports `curl` commands.
29+
* **`curl` support**: Your container app must have a container that supports `curl` commands. You use `curl` to verify the container app is deployed correctly. The *helloworld* container from the sample container image already supports `curl` commands.
3030

3131
## Create the firewall subnet
3232

3333
A subnet called **AzureFirewallSubnet** is required in order to deploy a firewall into the integrated virtual network.
3434

35-
1. In the [Azure portal](https://portal.azure.com), navigate to the virtual network that's integrated with your app.
35+
1. Open the virtual network that's integrated with your app in the [Azure portal](https://portal.azure.com).
3636

3737
1. From the menu on the left, select **Subnets**, then select **+ Subnet**.
3838

3939
1. Enter the following values:
4040

4141
| Setting | Action |
4242
| ------------ | ---------------- |
43-
| **Name** | Enter **AzureFirewallSubnet**. |
43+
| **Name** | Enter **AzureFirewallSubnet**. |
4444
| **Subnet address range** | Use the default or specify a [subnet range /26 or larger](../firewall/firewall-faq.yml#why-does-azure-firewall-need-a--26-subnet-size).
45+
4546
1. Select **Save**
4647

4748
## Deploy the firewall
@@ -73,7 +74,7 @@ A subnet called **AzureFirewallSubnet** is required in order to deploy a firewal
7374

7475
## Route all traffic to the firewall
7576

76-
Your virtual networks in Azure have default route tables in place upon create. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In the following steps, you create a UDR to route all traffic to your Azure Firewall.
77+
Your virtual networks in Azure have default route tables in place when you create the network. By implementing a user-defined route table, you can control how traffic is routed within your virtual network. In the following steps, you create a UDR to route all traffic to your Azure Firewall.
7778

7879
1. On the Azure portal menu or the *Home* page, select **Create a resource**.
7980

@@ -107,14 +108,14 @@ Your virtual networks in Azure have default route tables in place upon create. B
107108

108109
1. Select **Add** to create the route.
109110

110-
1. From the menu on the left, select **Subnets**, then select **Associate** to associate your route table with the subnet your Container App is integrated with.
111+
1. From the menu on the left, select **Subnets**, then select **Associate** to associate your route table with the container app's subnet.
111112

112113
1. Configure the *Associate subnet* with the following values:
113114

114115
| Setting | Action |
115116
|--|--|
116-
| **Address prefix** | Select the virtual network your container app is integrated with |
117-
| **Next hop type** | Select the subnet your container app is integrated with |
117+
| **Address prefix** | Select the virtual network for your container app. |
118+
| **Next hop type** | Select the subnet your for container app. |
118119

119120
1. Select **OK**.
120121

@@ -161,13 +162,13 @@ To verify your firewall configuration is set up correctly, you can use the `curl
161162

162163
1. Navigate to your Container App that is configured with Azure Firewall.
163164

164-
1. From the menu on the left, select **Console**, then select your container that supports the `curl` command. If you're using the helloworld container from the sample container image quickstart, you can run the `curl` command.
165+
1. From the menu on the left, select **Console**, then select your container that supports the `curl` command. If you're using the *helloworld* container from the sample container image quickstart, you can run the `curl` command.
165166

166167
1. In the **Choose start up command** menu, select **/bin/sh**, and select **Connect**.
167168

168169
1. In the console, run `curl -s https://mcr.microsoft.com`. You should see a successful response as you added `mcr.microsoft.com` to the allowlist for your firewall policies.
169170

170-
1. Run `curl -s https://<fqdn-address>` for a URL that doesn't match any of your destination rules such as `example.com`. The example command would be `curl -s https://example.com`. You should get no response, which indicates that your firewall has blocked the request.
171+
1. Run `curl -s https://<FQDN_ADDRESS>` for a URL that doesn't match any of your destination rules such as `example.com`. The example command would be `curl -s https://example.com`. You should get no response, which indicates that your firewall has blocked the request.
171172

172173
## Next steps
173174

0 commit comments

Comments
 (0)