Skip to content

Commit 832a5c1

Browse files
Updating the doc MicrosoftDocs/azure-docs#43294
Updating the doc to include the note for lock down MicrosoftDocs/azure-docs#43294
1 parent f322b77 commit 832a5c1

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/app-service/environment/firewall-integration.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,9 @@ The ASE outbound dependencies are almost entirely defined with FQDNs, which do n
2626

2727
The solution to securing outbound addresses lies in use of a firewall device that can control outbound traffic based on domain names. Azure Firewall can restrict outbound HTTP and HTTPS traffic based on the FQDN of the destination.
2828

29+
> [!NOTE]
30+
> At this moment, we can't fully lockdown the outbound connection currently.
31+
2932
## System architecture
3033

3134
Deploying an ASE with outbound traffic going through a firewall device requires changing routes on the ASE subnet. Routes operate at an IP level. If you are not careful in defining your routes, you can force TCP reply traffic to source from another address. When your reply address is different from the address traffic was sent to, the problem is called asymmetric routing and it will break TCP.

0 commit comments

Comments
 (0)