Skip to content

Commit d02572e

Browse files
author
gitName
committed
[APIM] NSG rules - v2 tiers
1 parent 63f89d2 commit d02572e

File tree

3 files changed

+21
-9
lines changed

3 files changed

+21
-9
lines changed

articles/api-management/inject-vnet-v2.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,14 +54,10 @@ If you want to enable *public* inbound access to an API Management instance in t
5454
* Minimum: /27 (32 addresses)
5555
* Recommended: /24 (256 addresses) - to accommodate scaling of API Management instance
5656

57-
### Network security group
57+
## Network security group
5858

59-
A network security group must be associated with the subnet.
60-
61-
* Configure an outbound NSG rule to allow access to Azure Storage on port 443.
62-
* Configure other rules to meet your organization's network access requirements.
63-
64-
To set up a network security group, see [Create a network security group](../virtual-network/manage-network-security-group.md).
59+
[!INCLUDE [api-management-virtual-network-v2-nsg-rules](../../includes/api-management-virtual-network-v2-nsg-rules.md)]
60+
* Configure inbound rules to meet your requirements for access to the API Management instance.
6561

6662
### Subnet delegation
6763

articles/api-management/integrate-vnet-outbound.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: dlepow
55
ms.author: danlep
66
ms.service: azure-api-management
77
ms.topic: how-to
8-
ms.date: 04/03/2025
8+
ms.date: 06/16/2025
99
---
1010

1111
# Integrate an Azure API Management instance with a private virtual network for outbound connections
@@ -48,7 +48,7 @@ If you want to inject a Premium v2 (preview) API Management instance into a virt
4848

4949
### Network security group
5050

51-
A network security group must be associated with the subnet. Configure any network security group rules that you need for the gateway to access your API backends. Network security groups (NSG) can also be used to block outbound traffic to the internet and access only resources in your virtual network. To set up a network security group, see [Create a network security group](../virtual-network/manage-network-security-group.md).
51+
[!INCLUDE [api-management-virtual-network-v2-nsg-rules](../../includes/api-management-virtual-network-v2-nsg-rules.md)]
5252

5353
### Subnet delegation
5454

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
author: dlepow
3+
ms.service: azure-api-management
4+
ms.topic: include
5+
ms.date: 06/16/2025
6+
ms.author: danlep
7+
---
8+
9+
A network security group (NSG) must be associated with the subnet. To set up a network security group, see [Create a network security group](../articles/virtual-network/manage-network-security-group.md).
10+
11+
* Configure an outbound NSG rule to allow access to Azure Storage on port 443.
12+
* Configure other outbound rules you need for the gateway to reach your API backends.
13+
* NSG rules can also be used to block outbound traffic to the internet and access only resources in your virtual network.
14+
15+
16+

0 commit comments

Comments
 (0)