Skip to content

Commit ebebc5f

Browse files
authored
Clarity edits
1 parent b2da53b commit ebebc5f

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -513,8 +513,8 @@ Before you set up your firewall with IP addresses, review these considerations:
513513

514514
### Inbound IP addresses
515515

516-
For incoming communication received by Azure Logic Apps from external services, this section lists the inbound IP addresses that Azure Logic Apps uses in the Azure region that you select for your logic apps. If you're using Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
517-
516+
For Azure Logic Apps to receive incoming communication through your firewall, you have to allow traffic through the inbound IP addresses described in this section for your logic app's Azure region. If you're using Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
517+
518518
> [!TIP]
519519
> To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/service-tags-overview.md),
520520
> **LogicAppsManagement**, rather than specify inbound Logic Apps IP address prefixes for each region.
@@ -597,7 +597,7 @@ For incoming communication received by Azure Logic Apps from external services,
597597

598598
### Outbound IP addresses
599599

600-
For outgoing communication sent by Azure Logic Apps to external services, this section lists the outbound IP addresses that Azure Logic Apps uses in the Azure region that you select for your logic apps. If you're using Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound). If your workflow also uses [managed connectors](../connectors/managed.md), such as the Office 365 Outlook connector or SQL connector, or uses [custom connectors](/connectors/custom-connectors/), the firewall also needs to allow access for *all* the [managed connector outbound IP addresses](/connectors/common/outbound-ip-addresses) in your logic app's Azure region. If your workflow uses custom connectors that access on-premises resources through the [on-premises data gateway resource in Azure](logic-apps-gateway-connection.md), you need to set up the gateway installation to allow access for the corresponding [*managed connector* outbound IP addresses](/connectors/common/outbound-ip-addresses). For more information about setting up communication settings on the gateway, review these topics:
600+
For Azure Logic Apps to send outgoing communication through your firewall, you have to allow traffic through *all* the outbound IP addresses described in this section for your logic app's Azure region. If you're using Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound). If your workflow also uses any [managed connectors](../connectors/managed.md), such as the Office 365 Outlook connector or SQL connector, or uses any [custom connectors](/connectors/custom-connectors/), your firewall has to allow traffic through *all* the [managed connector outbound IP addresses](/connectors/common/outbound-ip-addresses) in your logic app's Azure region. If your workflow uses custom connectors that access on-premises resources through the [on-premises data gateway resource in Azure](logic-apps-gateway-connection.md), you need to set up the gateway installation to allow access for the corresponding [*managed connector* outbound IP addresses](/connectors/common/outbound-ip-addresses). For more information about setting up communication settings on the gateway, review these topics:
601601

602602
* [Adjust communication settings for the on-premises data gateway](/data-integration/gateway/service-gateway-communication)
603603
* [Configure proxy settings for the on-premises data gateway](/data-integration/gateway/service-gateway-proxy)

0 commit comments

Comments
 (0)