You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/connect-virtual-network-vnet-set-up-single-ip-address.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,14 @@ title: Set up a public outbound IP address for ISEs
3
3
description: Learn how to set up a single public outbound IP address for integration service environments (ISEs) in Azure Logic Apps
4
4
services: logic-apps
5
5
ms.suite: integration
6
-
ms.reviewer: klam, logicappspm
6
+
ms.reviewer: jonfan, logicappspm
7
7
ms.topic: conceptual
8
-
ms.date: 02/10/2020
8
+
ms.date: 05/06/2020
9
9
---
10
10
11
11
# Set up a single IP address for one or more integration service environments in Azure Logic Apps
12
12
13
-
When you work with Azure Logic Apps, you can set up an [*integration service environment* (ISE)](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md) for hosting logic apps that need access to resources in an [Azure virtual network](../virtual-network/virtual-networks-overview.md). When you have multiple ISE instances that need access to other endpoints that have IP restrictions, deploy an [Azure Firewall](../firewall/overview.md) or a [network virtual appliance](../virtual-network/virtual-networks-overview.md#filter-network-traffic) into your virtual network and route outbound traffic through that firewall or network virtual appliance. You can then have all the ISE instances in your virtual network use a single, public, static, and predictable IP address to communicate with destination systems. That way, you don't have to set up additional firewall openings at those destination systems for each ISE.
13
+
When you work with Azure Logic Apps, you can set up an [*integration service environment* (ISE)](../logic-apps/connect-virtual-network-vnet-isolated-environment-overview.md) for hosting logic apps that need access to resources in an [Azure virtual network](../virtual-network/virtual-networks-overview.md). When you have multiple ISE instances that need access to other endpoints that have IP restrictions, deploy an [Azure Firewall](../firewall/overview.md) or a [network virtual appliance](../virtual-network/virtual-networks-overview.md#filter-network-traffic) into your virtual network and route outbound traffic through that firewall or network virtual appliance. You can then have all the ISE instances in your virtual network use a single, public, static, and predictable IP address to communicate with the destination systems that you want. That way, you don't have to set up additional firewall openings at your destination systems for each ISE.
14
14
15
15
This topic shows how to route outbound traffic through an Azure Firewall, but you can apply similar concepts to a network virtual appliance such as a third-party firewall from the Azure Marketplace. While this topic focuses on setup for multiple ISE instances, you can also use this approach for a single ISE when your scenario requires limiting the number of IP addresses that need access. Consider whether the additional costs for the firewall or virtual network appliance make sense for your scenario. Learn more about [Azure Firewall pricing](https://azure.microsoft.com/pricing/details/azure-firewall/).
16
16
@@ -30,7 +30,7 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
30
30
31
31

32
32
33
-
1. On the **Add route** pane, [set up the new route](../virtual-network/manage-route-table.md#create-a-route) with a rule that specifies that all the outgoing traffic to the destination system follows this behavior:
33
+
1. On the **Add route** pane, [set up the new route](../virtual-network/manage-route-table.md#create-a-route) with a rule that specifies that all the outbound traffic to the destination system follows this behavior:
34
34
35
35
* Uses the [**Virtual appliance**](../virtual-network/virtual-networks-udr-overview.md#user-defined) as the next hop type.
36
36
@@ -47,11 +47,13 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
47
47
| Property | Value | Description |
48
48
|----------|-------|-------------|
49
49
|**Route name**| <*unique-route-name*> | A unique name for the route in the route table |
50
-
|**Address prefix**| <*destination-address*> | The destination system's address where you want the traffic to go. Make sure that you use [Classless Inter-Domain Routing (CIDR) notation](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) for this address. |
50
+
|**Address prefix**| <*destination-address*> | The address prefix for your destination systemwhere you want outbound traffic to go. Make sure that you use [Classless Inter-Domain Routing (CIDR) notation](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing) for this address. In this example, this address prefix is for an SFTP server, which is described in the section, [Set up network rule](#set-up-network-rule). |
51
51
|**Next hop type**|**Virtual appliance**| The [hop type](../virtual-network/virtual-networks-udr-overview.md#next-hop-types-across-azure-tools) that's used by outbound traffic |
52
52
|**Next hop address**| <*firewall-private-IP-address*> | The private IP address for your firewall |
53
53
|||
54
54
55
+
<aname="set-up-network-rule"></a>
56
+
55
57
## Set up network rule
56
58
57
59
1. In the Azure portal, find and select your firewall. On the firewall menu, under **Settings**, select **Rules**. On the rules pane, select **Network rule collection** > **Add network rule collection**.
@@ -60,7 +62,7 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
60
62
61
63
1. In the collection, add a rule that permits traffic to the destination system.
62
64
63
-
For example, suppose that you have a logic app that runs in an ISE and needs to communicate with an SFTP system. You create a network rule collection that's named `LogicApp_ISE_SFTP_Outbound`, which contains a network rule named `ISE_SFTP_Outbound`. This rule permits traffic from the IP address of any subnet where your ISE runs in your virtual network to the destination SFTP system by using your firewall's private IP address.
65
+
For example, suppose that you have a logic app that runs in an ISE and needs to communicate with an SFTP server. You create a network rule collection that's named `LogicApp_ISE_SFTP_Outbound`, which contains a network rule named `ISE_SFTP_Outbound`. This rule permits traffic from the IP address of any subnet where your ISE runs in your virtual network to the destination SFTP server by using your firewall's private IP address.
64
66
65
67

66
68
@@ -80,7 +82,7 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
80
82
|**Name**| <*network-rule-name*> | The name for your network rule |
81
83
|**Protocol**| <*connection-protocols*> | The connection protocols to use. For example, if you're using NSG rules, select both **TCP** and **UDP**, not only **TCP**. |
82
84
|**Source addresses**| <*ISE-subnet-addresses*> | The subnet IP addresses where your ISE runs and where traffic from your logic app originates |
83
-
|**Destination addresses**| <*destination-IP-address*> | The IP address for your destination system where you want the traffic to go |
85
+
|**Destination addresses**| <*destination-IP-address*> | The IP address for your destination system where you want outbound traffic to go. In this example, this IP address is for the SFTP server.|
84
86
|**Destination ports**| <*destination-ports*> | Any ports that your destination system uses for inbound communication |
85
87
|||
86
88
@@ -94,4 +96,4 @@ This topic shows how to route outbound traffic through an Azure Firewall, but yo
94
96
95
97
## Next steps
96
98
97
-
*[Connect to Azure virtual networks from Azure Logic Apps](../logic-apps/connect-virtual-network-vnet-isolated-environment.md)
99
+
*[Connect to Azure virtual networks from Azure Logic Apps](../logic-apps/connect-virtual-network-vnet-isolated-environment.md)
0 commit comments