Skip to content

Commit 6f65497

Browse files
committed
Service tag info
1 parent 276c59e commit 6f65497

File tree

2 files changed

+16
-6
lines changed

2 files changed

+16
-6
lines changed

articles/app-service/overview-inbound-outbound-ips.md

Lines changed: 15 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ nslookup <app-name>.azurewebsites.net
3838

3939
## Get a static inbound IP
4040

41-
Sometimes you might want a dedicated, static IP address for your app. To get a static inbound IP address, you need to [secure a custom DNS name with an IP-based certificate binding](configure-ssl-bindings.md). If you don't actually need TLS functionality to secure your app, you can even upload a self-signed certificate for this binding. In an IP-based TLS binding, the certificate is bound to the IP address itself, so App Service provisions a static IP address to make it happen.
41+
Sometimes you might want a dedicated, static IP address for your app. To get a static inbound IP address, you need to [secure a custom DNS name with an IP-based certificate binding](./configure-ssl-bindings.md). If you don't actually need TLS functionality to secure your app, you can even upload a self-signed certificate for this binding. In an IP-based TLS binding, the certificate is bound to the IP address itself, so App Service provisions a static IP address to make it happen.
4242

4343
## When outbound IPs change
4444

@@ -81,11 +81,21 @@ az webapp show --resource-group <group_name> --name <app_name> --query possibleO
8181
```
8282

8383
## Get a static outbound IP
84+
8485
You can control the IP address of outbound traffic from your app by using regional VNet integration together with a virtual network NAT gateway to direct traffic through a static public IP address. [Regional VNet integration](./overview-vnet-integration.md) is available on **Basic**, **Standard**, **Premium**, **PremiumV2** and **PremiumV3** App Service plans. To learn more about this setup, see [NAT gateway integration](./networking/nat-gateway-integration.md).
8586

86-
## Next steps
87+
## Service tag
88+
89+
By using the `AppService` service tag, you can define network access for the Azure App Service service without specifying individual IP addresses. The service tag is a group of IP address prefixes that you use to minimize the complexity of creating security rules. When you use service tags, Azure automatically updates the IP addresses as they change for the service. However, the service tag isn't a security control mechanism. The service tag is merely a list of IP addresses.
90+
91+
The `AppService` service tag includes only the inbound IP addresses of multi-tenant apps. Inbound IP addresses from apps deployed in isolated (App Service Environment) and apps using [IP-based TLS bindings](./configure-ssl-bindings.md) are not included. Further all outbound IP addresses used in both multi-tenant and isolated are not included in the tag.
8792

88-
Learn how to restrict inbound traffic by source IP addresses.
93+
The tag can be used to allow outbound traffic in a Network security group (NSG) to apps. If the app is using IP-based TLS or the app is deployed in isolated mode, you must use the dedicated IP address instead.
94+
95+
> [!NOTE]
96+
> Service tag helps you define network access, but it shouldn't be considered as a replacement for proper network security measures as it doesn't provide granular control over individual IP addresses.
97+
98+
## Next steps
8999

90-
> [!div class="nextstepaction"]
91-
> [Static IP restrictions](app-service-ip-restrictions.md)
100+
* Learn how to [restrict inbound traffic](./app-service-ip-restrictions.md) by source IP addresses.
101+
* Learn more about [service tags](../virtual-network/service-tags-overview.md).

articles/app-service/toc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -306,7 +306,7 @@
306306
items:
307307
- name: Networking features overview
308308
href: networking-features.md
309-
- name: Find inbound and outbound IPs
309+
- name: Inbound and outbound IPs
310310
href: overview-inbound-outbound-ips.md
311311
- name: Access restriction
312312
items:

0 commit comments

Comments
 (0)