You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/logic-apps/logic-apps-limits-and-config.md
+32-38Lines changed: 32 additions & 38 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -526,34 +526,31 @@ Before you set up your firewall with IP addresses, review these considerations:
526
526
527
527
### Inbound IP addresses
528
528
529
-
For Azure Logic Apps to receive incoming communication through your firewall, you have to allow traffic through the inbound IP addresses described in this section for your logic app's Azure region. If you're using Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
530
-
531
-
> [!TIP]
532
-
> To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/service-tags-overview.md),
533
-
> **LogicAppsManagement**, rather than specify inbound Logic Apps IP address prefixes for each region.
529
+
For Azure Logic Apps to receive incoming communication through your firewall, you have to allow traffic through the inbound IP addresses described in this section for your logic app's Azure region. To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/service-tags-overview.md), **LogicAppsManagement**, rather than specify the Azure Logic Apps inbound IP address prefixes for each region. If you're using Azure Government, see [Azure Government - Inbound IP addresses](#azure-government-inbound).
534
530
535
-
> [!Note]
536
-
> Some managed connectors make inbound webhook callbacks to the Azure Logic Apps service. If you use access control on the logic
537
-
> app, you need to make sure the calls from these target systems (aka IPs) are allowed to access the logic app.
538
-
> The following connectors make inbound webhook callbacks to the Azure Logic Apps service:
531
+
> [!NOTE]
532
+
>
533
+
> Some managed connectors make inbound webhook callbacks to Azure Logic Apps. If you use access control on the logic app resource,
534
+
> you must make sure that the calls from these target systems (IP addresses) have permissions to access your logic app. The following
535
+
> connectors make inbound webhook callbacks to Azure Logic Apps:
539
536
>
540
-
> Adobe Creative Cloud, Adobe Sign, Adobe Sign Demo, Adobe Sign Preview, Adobe Sign Stage, Microsoft Sentinel, Event Grid, Microsoft Form, Business Central, Calendly,
541
-
> Common Data Service, DocuSign, DocuSign Demo, Dynamics 365 for Fin & Ops, LiveChat, Office 365 Outlook, Outlook.com, Parserr, SAP*,
542
-
> Shifts for Microsoft Teams, Teamwork Projects, Typeform etc.
> Microsoft Form, Business Central, Calendly, Common Data Service, DocuSign, DocuSign Demo, Dynamics 365 for Fin & Ops,
539
+
> LiveChat, Office 365* Outlook, Outlook.com, Parserr, SAP*, Shifts for Microsoft Teams, Teamwork Projects, Typeform, and so on:
543
540
>
544
-
> \***Office 365**: The return caller is actually the Office 365 connector. You can specify outbound managed connector IP address prefixes for each region or optionally use the
545
-
> **AzureConnectors** service tag for these managed connectors.
541
+
> -**Office 365**: The return caller is actually the Office 365 connector. You can specify the managed connector outbound
542
+
> IP address prefixes for each region, or optionally, you can use the **AzureConnectors** service tag for these managed connectors.
546
543
>
547
-
> \***SAP**: The return caller depends on whether the deployment environment is either multi-tenant Azure or ISE. In the
548
-
> multi-tenant environment, the on-premises data gateway makes the call back to the Azure Logic Apps service. In an ISE, the SAP
549
-
> connector makes the call back to the Azure Logic Apps service.
544
+
> -**SAP**: The return caller depends on whether the deployment environment is either multi-tenant Azure or ISE.
545
+
> In the multi-tenant environment, the on-premises data gateway makes the call back to the Azure Logic Apps service.
546
+
> In an ISE, the SAP connector makes the call back to Azure Logic Apps.
550
547
551
548
<aname="multi-tenant-inbound"></a>
552
549
553
550
#### Multi-tenant - Inbound IP addresses
554
551
555
-
| Region | IP |
556
-
|--------|----|
552
+
| Region |Azure Logic Apps IP |
553
+
|--------|---------------------|
557
554
| Australia East | 13.75.153.66, 104.210.89.222, 104.210.89.244, 52.187.231.161, 20.53.94.103, 20.53.107.215 |
| Brazil South | 191.235.86.199, 191.235.95.229, 191.235.94.220, 191.234.166.198, 20.201.66.147, 20.201.25.72 |
@@ -593,46 +590,46 @@ For Azure Logic Apps to receive incoming communication through your firewall, yo
593
590
| West India | 104.211.164.112, 104.211.165.81, 104.211.164.25, 104.211.157.237 |
594
591
| West US | 52.160.90.237, 138.91.188.137, 13.91.252.184, 157.56.160.212, 104.40.34.112, 52.160.68.27, 13.88.168.158, 104.42.40.164, 13.87.207.79, 13.87.204.210, 168.62.9.100 |
595
592
| West US 2 | 13.66.224.169, 52.183.30.10, 52.183.39.67, 13.66.128.68, 20.99.190.19, 20.72.244.108 |
596
-
| West US 3| 20.150.172.240, 20.150.172.242, 20.150.172.243, 20.150.172.241, 20.106.116.172, 20.106.116.225 |
597
-
|||
593
+
| West US 3 | 20.150.172.240, 20.150.172.242, 20.150.172.243, 20.150.172.241, 20.106.116.172, 20.106.116.225 |
598
594
599
595
<aname="azure-government-inbound"></a>
600
596
601
597
#### Azure Government - Inbound IP addresses
602
598
603
-
| Azure Government region | IP |
604
-
|-------------------------|----|
599
+
| Azure Government region |Azure Logic Apps IP |
600
+
|-------------------------|---------------------|
605
601
| US Gov Arizona | 52.244.67.164, 52.244.67.64, 52.244.66.82 |
606
602
| US Gov Texas | 52.238.119.104, 52.238.112.96, 52.238.119.145 |
607
603
| US Gov Virginia | 52.227.159.157, 52.227.152.90, 23.97.4.36 |
608
604
| US DoD Central | 52.182.49.204, 52.182.52.106 |
609
-
|||
610
605
611
606
<aname="outbound"></a>
612
607
613
608
### Outbound IP addresses
614
609
615
610
For Azure Logic Apps to send outgoing communication through your firewall, you have to allow traffic in your logic app's Azure region for *all the outbound IP addresses* described in this section. If you're using Azure Government, see [Azure Government - Outbound IP addresses](#azure-government-outbound).
616
611
617
-
Also, if your workflow also uses any [managed connectors](../connectors/managed.md), such as the Office 365 Outlook connector or SQL connector, or uses any [custom connectors](/connectors/custom-connectors/), your firewall has to allow traffic in your logic app's Azure region for [*all the managed connector outbound IP addresses*](/connectors/common/outbound-ip-addresses/#azure-logic-apps). If your workflow uses custom connectors that access on-premises resources through the [on-premises data gateway resource in Azure](logic-apps-gateway-connection.md), you need to set up the gateway installation to allow access for the corresponding [*managed connector* outbound IP addresses](/connectors/common/outbound-ip-addresses#azure-logic-apps). For more information about setting up communication settings on the gateway, review these topics:
612
+
> [!TIP]
613
+
>
614
+
> To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/service-tags-overview.md),
615
+
> **LogicApps**, rather than specify the Azure Logic Apps outbound IP address prefixes for each region. Optionally, you can also use the
616
+
> **AzureConnectors** service tag for managed connectors that make outbound calls to their respective services, such as Azure Storage or
617
+
> Azure Event Hubs, rather than specify the outbound managed connector IP address prefixes for each region. These tags work across the
618
+
> regions where Azure Logic Apps is available.
619
+
620
+
If your workflow also uses any [managed connectors](../connectors/managed.md), such as the Office 365 Outlook connector or SQL connector, or uses any [custom connectors](/connectors/custom-connectors/), your firewall has to allow traffic in your logic app's Azure region for [*all the managed connector outbound IP addresses*](/connectors/common/outbound-ip-addresses/#azure-logic-apps). If your workflow uses custom connectors that access on-premises resources through the [on-premises data gateway resource in Azure](logic-apps-gateway-connection.md), you need to set up the gateway installation to allow access for the corresponding [*managed connector* outbound IP addresses](/connectors/common/outbound-ip-addresses#azure-logic-apps). For more information about setting up communication settings on the gateway, review these topics:
618
621
619
622
*[Adjust communication settings for the on-premises data gateway](/data-integration/gateway/service-gateway-communication)
620
623
*[Configure proxy settings for the on-premises data gateway](/data-integration/gateway/service-gateway-proxy)
621
624
622
-
> [!TIP]
623
-
> To help reduce complexity when you create security rules, you can optionally use the [service tag](../virtual-network/service-tags-overview.md),
624
-
> **LogicApps**, rather than specify outbound Logic Apps IP address prefixes for each region. Optionally, you can also use the **AzureConnectors**
625
-
> service tag for managed connectors that make outbound calls to their respective services, such as Azure Storage or Azure Event Hubs, rather than
626
-
> specify outbound managed connector IP address prefixes for each region. These tags work across the regions where the Azure Logic Apps service is available.
627
-
628
625
<aname="multi-tenant-outbound"></a>
629
626
630
627
#### Multi-tenant - Outbound IP addresses
631
628
632
629
This section lists the outbound IP addresses that Azure Logic Apps requires in your logic app's Azure region to communicate through your firewall. Also, if your workflow uses any managed connectors or custom connectors, your firewall has to allow traffic in your logic app's Azure region for [*all the managed connectors' outbound IP addresses*](/connectors/common/outbound-ip-addresses/#azure-logic-apps). If you have custom connectors that access on-premises resources through the on-premises data gateway resource in Azure, set up your *gateway installation* to allow access for the corresponding managed connector outbound IP addresses.
633
630
634
-
| Region | Logic Apps IP |
635
-
|--------|---------------|
631
+
| Region |Azure Logic Apps IP |
632
+
|--------|---------------------|
636
633
| Australia East | 13.75.149.4, 104.210.91.55, 104.210.90.241, 52.187.227.245, 52.187.226.96, 52.187.231.184, 52.187.229.130, 52.187.226.139, 20.53.93.188, 20.53.72.170, 20.53.107.208, 20.53.106.182 |
0 commit comments