Skip to content

Commit e9becb3

Browse files
authored
Merge pull request #194493 from MayankBargali-MSFT/patch-70
(AzureCXP) Added protocol details
2 parents e7b809a + 215c96b commit e9becb3

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/service-bus-messaging/service-bus-ip-filtering.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ By default, Service Bus namespaces are accessible from internet as long as the r
1111
This feature is helpful in scenarios in which Azure Service Bus should be only accessible from certain well-known sites. Firewall rules enable you to configure rules to accept traffic originating from specific IPv4 addresses. For example, if you use Service Bus with [Azure Express Route][express-route], you can create a **firewall rule** to allow traffic from only your on-premises infrastructure IP addresses or addresses of a corporate NAT gateway.
1212

1313
## IP firewall rules
14-
The IP firewall rules are applied at the Service Bus namespace level. Therefore, the rules apply to all connections from clients using any supported protocol. Any connection attempt from an IP address that doesn't match an allowed IP rule on the Service Bus namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
14+
The IP firewall rules are applied at the Service Bus namespace level. Therefore, the rules apply to all connections from clients using any **supported protocol** (AMQP (5671) and HTTPS (443)). Any connection attempt from an IP address that doesn't match an allowed IP rule on the Service Bus namespace is rejected as unauthorized. The response doesn't mention the IP rule. IP filter rules are applied in order, and the first rule that matches the IP address determines the accept or reject action.
1515

1616
## Important points
1717
- Firewalls and Virtual Networks are supported only in the **premium** tier of Service Bus. If upgrading to the **premier** tier isn't an option, we recommend that you keep the Shared Access Signature (SAS) token secure and share with only authorized users. For information about SAS authentication, see [Authentication and authorization](service-bus-authentication-and-authorization.md#shared-access-signature).
@@ -159,4 +159,4 @@ For constraining access to Service Bus to Azure virtual networks, see the follow
159159

160160
[lnk-deploy]: ../azure-resource-manager/templates/deploy-powershell.md
161161
[lnk-vnet]: service-bus-service-endpoints.md
162-
[express-route]: ../expressroute/expressroute-faqs.md#supported-services
162+
[express-route]: ../expressroute/expressroute-faqs.md#supported-services

0 commit comments

Comments
 (0)