You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Inbound access restrictions by IP address ranges
101
+
## Inbound access restrictions by IP address ranges (preview)
102
102
103
103
By default, ingress doesn't filter traffic. You can add restrictions to limit access based on IP addresses. There are two ways to filter traffic:
104
104
@@ -107,6 +107,8 @@ By default, ingress doesn't filter traffic. You can add restrictions to limit ac
107
107
108
108
> [!NOTE]
109
109
> If defined, all rules must be the same type. You cannot combine allow rules and deny rules.
110
+
>
111
+
> IPv4 addresses are supported. Define each IPv4 address block in Classless Inter-Domain Routing (CIDR) notation. To learn more about CIDR notation, see [Classless Inter-Domain Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).
110
112
111
113
### Configure an allowlist
112
114
@@ -122,7 +124,7 @@ az containerapp ingress access-restriction set \
122
124
--action Allow
123
125
```
124
126
125
-
Add more allow rules by repeating the command with different IP address ranges in the `--ip-address` parameter. When you configure one or more allow rules, any traffic from an IP address that doesn't match any of the rules is denied.
127
+
Add more allow rules by repeating the command with a different IP address range in the `--ip-address` parameter. When you configure one or more allow rules, any traffic from an IP address that doesn't match any of the rules is denied.
126
128
127
129
### Configure a denylist
128
130
@@ -138,7 +140,7 @@ az containerapp ingress access-restriction set \
138
140
--action Deny
139
141
```
140
142
141
-
Add more deny rules by repeating the command with different IP address ranges in the `--ip-address` parameter. When you configure one or more deny rules, any traffic from an IP address that doesn't match any of the rules is allowed.
143
+
Add more deny rules by repeating the command with a different IP address range in the `--ip-address` parameter. When you configure one or more deny rules, any traffic from an IP address that doesn't match any of the rules is allowed.
0 commit comments