Skip to content

Commit 9589150

Browse files
committed
First draft
1 parent 5529c1f commit 9589150

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

articles/app-service/overview-inbound-outbound-ips.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,13 +86,19 @@ For function apps, see [Function app outbound IP addresses](/azure/azure-functio
8686

8787
You can control the IP address of outbound traffic from your app by using virtual network integration together with a virtual network NAT gateway to direct traffic through a static public IP address. [Virtual network integration](./overview-vnet-integration.md) is available on **Basic**, **Standard**, **Premium**, **PremiumV2**, and **PremiumV3** App Service plans. To learn more about this setup, see [NAT gateway integration](./networking/nat-gateway-integration.md).
8888

89+
## IP Address properties in Azure portal
90+
91+
IP Addresses appear in multiple places in Azure portal. The properties page will show you the raw output from `inboundIpAddress`, `possibleInboundIpAddresses`, `outboundIpAddresses` and `possibleOutboundIpAddresses`. The overview page will also show the same values, but not include the Possible Inbound Ip Addresses.
92+
93+
Networking overview shows the combination of **Inbound IP Address** and any private endpoint IP addresses. If public network access is disabled, the public IP address will not be shown. The **Outbound addresses** field will have a combined list of (Possible) Outbound IP Addresses and if the app is virtual network integrated and is routing all traffic, and the subnet has a NAT gateway attached, the field will also include the IP addresses from the NAT gateway.
94+
8995
## Service tag
9096

9197
By using the `AppService` service tag, you can define network access for the Azure App Service service without specifying individual IP addresses. The service tag is a group of IP address prefixes that you use to minimize the complexity of creating security rules. When you use service tags, Azure automatically updates the IP addresses as they change for the service. However, the service tag isn't a security control mechanism. The service tag is merely a list of IP addresses.
9298

9399
The `AppService` service tag includes only the inbound IP addresses of multitenant apps. Inbound IP addresses from apps deployed in isolated (App Service Environment) and apps using [IP-based TLS bindings](./configure-ssl-bindings.md) aren't included. Further all outbound IP addresses used in both multitenant and isolated aren't included in the tag.
94100

95-
The tag can be used to allow outbound traffic in a Network security group (NSG) to apps. If the app is using IP-based TLS or the app is deployed in isolated mode, you must use the dedicated IP address instead.
101+
The tag can be used to allow outbound traffic in a Network security group (NSG) to apps. If the app is using IP-based TLS or the app is deployed in isolated mode, you must use the dedicated IP address instead. As the tag only includes inbound IP address, the tag can't be used in access restrictions to limit access to an app from other apps in App Service.
96102

97103
> [!NOTE]
98104
> Service tag helps you define network access, but it shouldn't be considered as a replacement for proper network security measures as it doesn't provide granular control over individual IP addresses.

0 commit comments

Comments
 (0)