Skip to content

Commit b8f8e83

Browse files
committed
Clarify that listed are multitenant IP addresses
1 parent 5778e47 commit b8f8e83

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: rohithah, laveeshb, rarayudu, azla
77
ms.topic: reference
8-
ms.date: 04/08/2022
8+
ms.date: 07/30/2022
99
---
1010

1111
# Limits and configuration reference for Azure Logic Apps
@@ -536,7 +536,7 @@ For Azure Logic Apps to receive incoming communication through your firewall, yo
536536
537537
<a name="multi-tenant-inbound"></a>
538538

539-
#### Multi-tenant & single-tenant - Inbound IP addresses
539+
#### Multi-tenant - Inbound IP addresses
540540

541541
| Region | IP |
542542
|--------|----|
@@ -613,7 +613,7 @@ Also, if your workflow also uses any [managed connectors](../connectors/managed.
613613
614614
<a name="multi-tenant-outbound"></a>
615615

616-
#### Multi-tenant & single-tenant - Outbound IP addresses
616+
#### Multi-tenant - Outbound IP addresses
617617

618618
This section lists the outbound IP addresses that Azure Logic Apps requires in your logic app's Azure region to communicate through your firewall. Also, if your workflow uses any managed connectors or custom connectors, your firewall has to allow traffic in your logic app's Azure region for [*all the managed connectors' outbound IP addresses*](/connectors/common/outbound-ip-addresses/#azure-logic-apps). If you have custom connectors that access on-premises resources through the on-premises data gateway resource in Azure, set up your *gateway installation* to allow access for the corresponding managed connector outbound IP addresses.
619619

0 commit comments

Comments
 (0)