Skip to content

Commit af5ae70

Browse files
committed
minor updates
1 parent bef0595 commit af5ae70

File tree

1 file changed

+1
-8
lines changed

1 file changed

+1
-8
lines changed

articles/app-service/app-service-ip-restrictions.md

Lines changed: 1 addition & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -165,9 +165,7 @@ PowerShell example:
165165

166166
### Block a single IP address
167167

168-
When you add your first access restriction rule, the service adds an explicit *Deny all* rule with a priority of 2147483647. In practice, the explicit *Deny all* rule is the final rule to be executed, and it blocks access to any IP address that's not explicitly allowed by an *Allow* rule.
169-
170-
For a scenario where you want to explicitly block a single IP address or a block of IP addresses, but allow access to everything else, add an explicit *Allow All* rule.
168+
For a scenario where you want to explicitly block a single IP address or a block of IP addresses, but allow access to everything else, add a **Deny** rule for the specific IP address and configure the unmatched rule action to **Allow**.
171169

172170
:::image type="content" source="media/app-service-ip-restrictions/block-single-address.png" alt-text="Screenshot of the 'Access Restrictions' page in the Azure portal, showing a single blocked IP address.":::
173171

@@ -202,18 +200,13 @@ You can add access restrictions programmatically by doing either of the followin
202200
--rule-name 'IP example rule' --action Allow --ip-address 122.133.144.0/24 --priority 100
203201
```
204202

205-
> [!NOTE]
206-
> Working with service tags, http headers or multi-source rules in Azure CLI requires at least version 2.23.0. You can verify the version of the installed module with: ```az version```
207-
208203
* Use [Azure PowerShell](/powershell/module/Az.Websites/Add-AzWebAppAccessRestrictionRule). For example:
209204

210205

211206
```azurepowershell-interactive
212207
Add-AzWebAppAccessRestrictionRule -ResourceGroupName "ResourceGroup" -WebAppName "AppName"
213208
-Name "Ip example rule" -Priority 100 -Action Allow -IpAddress 122.133.144.0/24
214209
```
215-
> [!NOTE]
216-
> Working with service tags, http headers or multi-source rules in Azure PowerShell requires at least version 5.7.0. You can verify the version of the installed module with: ```Get-InstalledModule -Name Az```
217210

218211
You can also set values manually by doing either of the following:
219212

0 commit comments

Comments
 (0)