Skip to content

Commit e432399

Browse files
authored
Merge pull request #114391 from ecfan/patch-4
Clarify value for address prefix
2 parents b0572b7 + c33241a commit e432399

File tree

1 file changed

+10
-8
lines changed

1 file changed

+10
-8
lines changed

articles/logic-apps/connect-virtual-network-vnet-set-up-single-ip-address.md

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@ title: Set up a public outbound IP address for ISEs
33
description: Learn how to set up a single public outbound IP address for integration service environments (ISEs) in Azure Logic Apps
44
services: logic-apps
55
ms.suite: integration
6-
ms.reviewer: klam, logicappspm
6+
ms.reviewer: jonfan, logicappspm
77
ms.topic: conceptual
8-
ms.date: 02/10/2020
8+
ms.date: 05/06/2020
99
---
1010

1111
# Set up a single IP address for one or more integration service environments in Azure Logic Apps
1212

13-
When you work with Azure Logic Apps, you can set up an [*integration service environment* (ISE)](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md) for hosting logic apps that need access to resources in an [Azure virtual network](../virtual-network/virtual-networks-overview.md). When you have multiple ISE instances that need access to other endpoints that have IP restrictions, deploy an [Azure Firewall](../firewall/overview.md) or a [network virtual appliance](../virtual-network/virtual-networks-overview.md#filter-network-traffic) into your virtual network and route outbound traffic through that firewall or network virtual appliance. You can then have all the ISE instances in your virtual network use a single, public, static, and predictable IP address to communicate with destination systems. That way, you don't have to set up additional firewall openings at those destination systems for each ISE.
13+
When you work with Azure Logic Apps, you can set up an [*integration service environment* (ISE)](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md) for hosting logic apps that need access to resources in an [Azure virtual network](../virtual-network/virtual-networks-overview.md). When you have multiple ISE instances that need access to other endpoints that have IP restrictions, deploy an [Azure Firewall](../firewall/overview.md) or a [network virtual appliance](../virtual-network/virtual-networks-overview.md#filter-network-traffic) into your virtual network and route outbound traffic through that firewall or network virtual appliance. You can then have all the ISE instances in your virtual network use a single, public, static, and predictable IP address to communicate with the destination systems that you want. That way, you don't have to set up additional firewall openings at your destination systems for each ISE.
1414

1515
This topic shows how to route outbound traffic through an Azure Firewall, but you can apply similar concepts to a network virtual appliance such as a third-party firewall from the Azure Marketplace. While this topic focuses on setup for multiple ISE instances, you can also use this approach for a single ISE when your scenario requires limiting the number of IP addresses that need access. Consider whether the additional costs for the firewall or virtual network appliance make sense for your scenario. Learn more about [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
1616

@@ -30,7 +30,7 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
3030

3131
![Add route for directing outbound traffic](./media/connect-virtual-network-vnet-set-up-single-ip-address/add-route-to-route-table.png)
3232

33-
1. On the **Add route** pane, [set up the new route](../virtual-network/manage-route-table.md#create-a-route) with a rule that specifies that all the outgoing traffic to the destination system follows this behavior:
33+
1. On the **Add route** pane, [set up the new route](../virtual-network/manage-route-table.md#create-a-route) with a rule that specifies that all the outbound traffic to the destination system follows this behavior:
3434

3535
* Uses the [**Virtual appliance**](../virtual-network/virtual-networks-udr-overview.md#user-defined) as the next hop type.
3636

@@ -47,11 +47,13 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
4747
| Property | Value | Description |
4848
|----------|-------|-------------|
4949
| **Route name** | <*unique-route-name*> | A unique name for the route in the route table |
50-
| **Address prefix** | <*destination-address*> | The destination system's address where you want the traffic to go. Make sure that you use [Classless Inter-Domain Routing (CIDR) notation](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) for this address. |
50+
| **Address prefix** | <*destination-address*> | The address prefix for your destination system where you want outbound traffic to go. Make sure that you use [Classless Inter-Domain Routing (CIDR) notation](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) for this address. In this example, this address prefix is for an SFTP server, which is described in the section, [Set up network rule](#set-up-network-rule). |
5151
| **Next hop type** | **Virtual appliance** | The [hop type](../virtual-network/virtual-networks-udr-overview.md#next-hop-types-across-azure-tools) that's used by outbound traffic |
5252
| **Next hop address** | <*firewall-private-IP-address*> | The private IP address for your firewall |
5353
|||
5454

55+
<a name="set-up-network-rule"></a>
56+
5557
## Set up network rule
5658

5759
1. In the Azure portal, find and select your firewall. On the firewall menu, under **Settings**, select **Rules**. On the rules pane, select **Network rule collection** > **Add network rule collection**.
@@ -60,7 +62,7 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
6062

6163
1. In the collection, add a rule that permits traffic to the destination system.
6264

63-
For example, suppose that you have a logic app that runs in an ISE and needs to communicate with an SFTP system. You create a network rule collection that's named `LogicApp_ISE_SFTP_Outbound`, which contains a network rule named `ISE_SFTP_Outbound`. This rule permits traffic from the IP address of any subnet where your ISE runs in your virtual network to the destination SFTP system by using your firewall's private IP address.
65+
For example, suppose that you have a logic app that runs in an ISE and needs to communicate with an SFTP server. You create a network rule collection that's named `LogicApp_ISE_SFTP_Outbound`, which contains a network rule named `ISE_SFTP_Outbound`. This rule permits traffic from the IP address of any subnet where your ISE runs in your virtual network to the destination SFTP server by using your firewall's private IP address.
6466

6567
![Set up network rule for firewall](./media/connect-virtual-network-vnet-set-up-single-ip-address/set-up-network-rule-for-firewall.png)
6668

@@ -80,7 +82,7 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
8082
| **Name** | <*network-rule-name*> | The name for your network rule |
8183
| **Protocol** | <*connection-protocols*> | The connection protocols to use. For example, if you're using NSG rules, select both **TCP** and **UDP**, not only **TCP**. |
8284
| **Source addresses** | <*ISE-subnet-addresses*> | The subnet IP addresses where your ISE runs and where traffic from your logic app originates |
83-
| **Destination addresses** | <*destination-IP-address*> | The IP address for your destination system where you want the traffic to go |
85+
| **Destination addresses** | <*destination-IP-address*> | The IP address for your destination system where you want outbound traffic to go. In this example, this IP address is for the SFTP server. |
8486
| **Destination ports** | <*destination-ports*> | Any ports that your destination system uses for inbound communication |
8587
|||
8688

@@ -94,4 +96,4 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
9496

9597
## Next steps
9698

97-
* [Connect to Azure virtual networks from Azure Logic Apps](../logic-apps/connect-virtual-network-vnet-isolated-environment.md)
99+
* [Connect to Azure virtual networks from Azure Logic Apps](../logic-apps/connect-virtual-network-vnet-isolated-environment.md)

0 commit comments

Comments
 (0)