Skip to content

Commit eaf2819

Browse files
authored
Add "preview" and CIDR note
1 parent 043bc2e commit eaf2819

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/container-apps/ingress.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ You can get access to the environment's unique identifier by querying the enviro
9898

9999
[!INCLUDE [container-apps-get-fully-qualified-domain-name](../../includes/container-apps-get-fully-qualified-domain-name.md)]
100100

101-
## Inbound access restrictions by IP address ranges
101+
## Inbound access restrictions by IP address ranges (preview)
102102

103103
By default, ingress doesn't filter traffic. You can add restrictions to limit access based on IP addresses. There are two ways to filter traffic:
104104

@@ -107,6 +107,8 @@ By default, ingress doesn't filter traffic. You can add restrictions to limit ac
107107

108108
> [!NOTE]
109109
> If defined, all rules must be the same type. You cannot combine allow rules and deny rules.
110+
>
111+
> IPv4 addresses are supported. Define each IPv4 address block in Classless Inter-Domain Routing (CIDR) notation. To learn more about CIDR notation, see [Classless Inter-Domain Routing](https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing).
110112
111113
### Configure an allowlist
112114

@@ -122,7 +124,7 @@ az containerapp ingress access-restriction set \
122124
--action Allow
123125
```
124126

125-
Add more allow rules by repeating the command with different IP address ranges in the `--ip-address` parameter. When you configure one or more allow rules, any traffic from an IP address that doesn't match any of the rules is denied.
127+
Add more allow rules by repeating the command with a different IP address range in the `--ip-address` parameter. When you configure one or more allow rules, any traffic from an IP address that doesn't match any of the rules is denied.
126128

127129
### Configure a denylist
128130

@@ -138,7 +140,7 @@ az containerapp ingress access-restriction set \
138140
--action Deny
139141
```
140142

141-
Add more deny rules by repeating the command with different IP address ranges in the `--ip-address` parameter. When you configure one or more deny rules, any traffic from an IP address that doesn't match any of the rules is allowed.
143+
Add more deny rules by repeating the command with a different IP address range in the `--ip-address` parameter. When you configure one or more deny rules, any traffic from an IP address that doesn't match any of the rules is allowed.
142144

143145
### Remove access restrictions
144146

0 commit comments

Comments
 (0)