Skip to content

Commit 9ca4c47

Browse files
committed
acrolinx
1 parent fbc6980 commit 9ca4c47

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

articles/app-service/overview-access-restrictions.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ When traffic reaches App Service, it first evaluates if the traffic originates f
1818

1919
If you send traffic through the default endpoint (often a public endpoint), the traffic is first evaluated at the app access level. Here you can either enable or disable access. If you enable app access, the traffic is evaluated at the site access level. For any app, you have both the main site and the advanced tools site (also known as scm or kudu site).
2020

21-
You have the option of configuring a set of access restriction rules for each site. Access restriction rules are evaluated in priority order. If some rules have the same priority they are evaluated in the order they are listed when returned from the Azure Resource Manager API and in Azure portal before sorting. You can also specify the behavior if no rules are matched. The following sections go into details.
21+
You have the option of configuring a set of access restriction rules for each site. Access restriction rules are evaluated in priority order. If some rules have the same priority, they're evaluated in the order they're listed when returned from the Azure Resource Manager API and in Azure portal before sorting. You can also specify the behavior if no rules are matched. The following sections go into details.
2222

2323
:::image type="content" source="media/overview-access-restrictions/access-restriction-diagram.png" alt-text="Diagram of access restrictions high-level flow.":::
2424

@@ -71,7 +71,8 @@ For testing or in specific scenarios, you may want to allow traffic from any ser
7171

7272
[Azure service tags](../virtual-network/service-tags-overview.md) are well defined sets of IP addresses for Azure services. Service tags group the IP ranges used in various Azure services and is often also further scoped to specific regions. This type of rule allows you to filter *inbound* traffic from specific Azure services.
7373

74-
For a full list of tags and more information, visit the service tag link above.
74+
For a full list of tags and more information, visit the service tag link.
75+
7576
To learn how to enable this feature, see [Configuring access restrictions](./app-service-ip-restrictions.md).
7677

7778
### Multi-source rules

0 commit comments

Comments
 (0)