Skip to content

Commit 925779c

Browse files
committed
Clarity edits
1 parent 5ff8c60 commit 925779c

File tree

1 file changed

+5
-12
lines changed

1 file changed

+5
-12
lines changed

articles/logic-apps/connect-virtual-network-vnet-isolated-environment.md

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -81,25 +81,18 @@ To make sure that your ISE is accessible and that the logic apps in that ISE can
8181
8282
* If you created a new Azure virtual network and subnets without any constraints, you don't need to set up [network security groups (NSGs)](../virtual-network/security-overview.md#network-security-groups) in your virtual network to control traffic across subnets.
8383

84-
* On an existing virtual network, you can *optionally* set up NSGs by [filtering network traffic across subnets](../virtual-network/tutorial-filter-network-traffic.md). If you want to go this route, or if you're already using NSGs, make sure that you [open the ports described in this table](#network-ports-for-ise) on the virtual network where you have NSGs or want to set up NSGs.
84+
* For an existing virtual network, you can *optionally* set up [network security groups (NSGs)](../virtual-network/security-overview.md#network-security-groups) to [filter network traffic across subnets](../virtual-network/tutorial-filter-network-traffic.md). If you want to go this route, or if you're already using NSGs, make sure that you [open the ports described in this table](#network-ports-for-ise) for those NSGs.
8585

86-
> [!NOTE]
87-
> If you use [NSG security rules](../virtual-network/security-overview.md#security-rules),
88-
> you need to use *both* the TCP and UDP protocols. NSG security rules describe the ports
89-
> that you must open for the IP addresses that need access to those ports. Make sure that
90-
> any firewalls, routers, or other items that exist between these endpoints also keep those
91-
> ports accessible to those IP addresses.
86+
When you set up [NSG security rules](../virtual-network/security-overview.md#security-rules), you need to use *both* the **TCP** and **UDP** protocols. NSG security rules describe the ports that you must open for the IP addresses that need access to those ports. Make sure that any firewalls, routers, or other items that exist between these endpoints also keep those ports accessible to those IP addresses.
9287

9388
<a name="network-ports-for-ise"></a>
9489

9590
### Network ports used by your ISE
9691

97-
This table describes the ports in your Azure virtual network that your ISE uses and where those ports get used. To help reduce complexity when you create security rules, the [service tags](../virtual-network/service-tags-overview.md) in the table represent groups of IP address prefixes for a specific Azure service.
92+
This table describes the ports that your ISE requires to be accessible and the purpose for those ports. To help reduce complexity when you set up security rules, the table uses [service tags](../virtual-network/service-tags-overview.md) that represent groups of IP address prefixes for a specific Azure service. Where noted, *internal ISE* and *external ISE* refer to the [access endpoint that's selected during ISE creation](connect-virtual-network-vnet-isolated-environment.md#create-environment). For more information, see [Endpoint access](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md#endpoint-access).
9893

9994
> [!IMPORTANT]
100-
> Source ports are ephemeral, so make sure that you set them to `*` for all rules. Where noted, internal ISE and external ISE refer to the
101-
> [endpoint that's selected at ISE creation](connect-virtual-network-vnet-isolated-environment.md#create-environment).
102-
> For more information, see [Endpoint access](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md#endpoint-access).
95+
> For all rules, make sure that you set source ports to `*` because source ports are ephemeral.
10396
10497
#### Inbound security rules
10598

@@ -118,7 +111,7 @@ This table describes the ports in your Azure virtual network that your ISE uses
118111
| Access Azure Cache for Redis Instances between Role Instances | **VirtualNetwork** | * | **VirtualNetwork** | 6379 - 6383 | And, for ISE to work with Azure Cache for Redis, you must also open these [outbound and inbound ports described by the Azure Cache for Redis FAQ](../azure-cache-for-redis/cache-how-to-premium-vnet.md#outbound-port-requirements). |
119112
|||||||
120113

121-
#### Outbound
114+
#### Outbound security rules
122115

123116
| Purpose | Source service tag or IP addresses | Source ports | Destination service tag or IP addresses | Destination ports | Notes |
124117
|---------|------------------------------------|--------------|-----------------------------------------|-------------------|-------|

0 commit comments

Comments
 (0)