Skip to content

Commit b3cc0a5

Browse files
authored
Merge pull request #90064 from ecfan/patch-6
Restructuring IP section for scannability
2 parents e6066c7 + ca14ab2 commit b3cc0a5

File tree

1 file changed

+19
-12
lines changed

1 file changed

+19
-12
lines changed

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 19 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -278,24 +278,31 @@ take significant time to complete.
278278

279279
## Firewall configuration: IP addresses
280280

281-
All logic apps in the same region use the same IP address ranges. To support the calls that your logic apps directly make with [HTTP](../connectors/connectors-native-http.md), [HTTP + Swagger](../connectors/connectors-native-http-swagger.md), and other HTTP requests, set up your firewalls with *all* the [inbound](#inbound) *and* [outbound](#outbound) IP addresses that are used by the Logic Apps service, based on the regions where your logic apps exist. These addresses appear under the **Inbound** and **Outbound** headings in this section, and are sorted by region.
281+
The IP addresses that Azure Logic Apps uses for incoming and outgoing calls depend on the region where your logic app exists. *All* logic apps that are in the same region use the same IP address ranges.
282282

283-
To support the calls that [Microsoft-managed connectors](../connectors/apis-list.md) make, set up your firewall with *all* the [outbound](#outbound) IP addresses used by these connectors, based on the regions where your logic apps exist. These addresses appear under the **Outbound** heading in this section, and are sorted by region. For logic apps that run in an integration service environment (ISE), make sure that you [open these ports](../logic-apps/connect-virtual-network-vnet-isolated-environment.md#ports).
283+
> [!NOTE]
284+
> Some Microsoft Flow calls, such as **HTTP** and **HTTP + OpenAPI** requests,
285+
> go directly through the Azure Logic Apps service and come from the IP addresses
286+
> that are listed here. For more information about IP addresses used by Microsoft Flow, see
287+
> [Limits and configuration in Microsoft Flow](https://docs.microsoft.com/flow/limits-and-config#ip-address-configuration).
284288
285-
For custom connectors, [Azure Government](../azure-government/documentation-government-overview.md), and [Azure China 21Vianet](https://docs.microsoft.com/azure/china/), fixed or reserved IP addresses aren't available.
289+
* To support the calls that your logic apps directly make with [HTTP](../connectors/connectors-native-http.md), [HTTP + Swagger](../connectors/connectors-native-http-swagger.md), and other HTTP requests, set up your firewall with *all* the [inbound](#inbound) *and* [outbound](#outbound) IP addresses that are used by the Logic Apps service, based on the regions where your logic apps exist. These addresses appear under the **Inbound** and **Outbound** headings in this section, and are sorted by region.
286290

287-
> [!IMPORTANT]
288-
>
289-
> If you have existing configurations, please update them
290-
> **as soon as possible before September 1, 2018** so they
291-
> include and match the IP addresses in these lists for the
292-
> regions where your logic apps exist.
291+
* To support the calls that [Microsoft-managed connectors](../connectors/apis-list.md) make, set up your firewall with *all* the [outbound](#outbound) IP addresses used by these connectors, based on the regions where your logic apps exist. These addresses appear under the **Outbound** heading in this section, and are sorted by region.
292+
293+
* For logic apps that run in an integration service environment (ISE), make sure that you [open these ports](../logic-apps/connect-virtual-network-vnet-isolated-environment.md#ports).
293294

294-
Logic Apps doesn't support directly connecting to Azure storage accounts through firewalls. To access these storage accounts, use either option here:
295+
* Logic apps can't directly access Azure storage accounts that have [firewall rules](https://docs.microsoft.com/azure/storage/common/storage-network-security) and exist in the same region. However, logic apps can access Azure storage accounts that exist in a different region because a public IP address is used for communicating across regions. Or, you can use either option here:
295296

296-
* Create an [integration service environment](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md), which can connect to resources in an Azure virtual network.
297+
* Create an [integration service environment](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md), which can connect to resources in an Azure virtual network.
297298

298-
* If you already use API Management, you can use this service for this scenario. For more info, see [Simple enterprise integration architecture](https://aka.ms/aisarch).
299+
* If you already use API Management, you can use this service for this scenario. For more info, see [Simple enterprise integration architecture](https://aka.ms/aisarch).
300+
301+
* For custom connectors, [Azure Government](../azure-government/documentation-government-overview.md), and [Azure China 21Vianet](https://docs.microsoft.com/azure/china/), fixed or reserved IP addresses aren't available.
302+
303+
> [!IMPORTANT]
304+
> If you have firewall configurations that you set up before September 1, 2018,
305+
> make sure that they match the current IP addresses in these lists for the regions where your logic apps exist.
299306
300307
<a name="inbound"></a>
301308

0 commit comments

Comments
 (0)