Skip to content

Commit 7dd4a2d

Browse files
committed
headings
1 parent 0c215d3 commit 7dd4a2d

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

articles/api-management/virtual-network-workspaces-resources.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,7 @@ For background about networking options in API Management, see [Use a virtual ne
2222

2323
[!INCLUDE [api-management-virtual-network-workspaces-alert](../../includes/api-management-virtual-network-workspaces-alert.md)]
2424

25-
## Network prerequisites
26-
27-
### Network location
25+
## Network location
2826

2927
The virtual network must be in the same region and Azure subscription as the API Management instance.
3028

@@ -66,7 +64,7 @@ For virtual network injection, the subnet needs to be delegated to the **Microso
6664
---
6765

6866

69-
### Network security group (NSG) rules
67+
## Network security group (NSG) rules
7068

7169
A network security group (NSG) must be attached to the subnet to explicitly allow certain inbound or outbound connectivity. Configure the following rules in the NSG. Set the priority of these rules higher than that of the default rules.
7270

@@ -84,6 +82,7 @@ Configure other NSG rules to meet your organization's network access requirement
8482
| Direction | Source | Source port ranges | Destination | Destination port ranges | Protocol | Action | Purpose |
8583
|-------|--------------|----------|---------|------------|-----------|-----|--------|
8684
| Inbound | AzureLoadBalancer | * | Workspace gateway subnet range | 80 | TCP | Allow | Allow internal health ping traffic |
85+
| Inbound | Internet | * | Workspace gateway subnet range | 80,443 | TCP | Allow | Allow inbound traffic |
8786
| Outbound | VirtualNetwork | * | Storage | 443 | TCP | Allow | Dependency on Azure Storage |
8887

8988
---

0 commit comments

Comments
 (0)