Skip to content

Commit f37344e

Browse files
authored
Merge pull request #206480 from xuehongg/mybranch4
Clarify that listed are multitenant IP addresses
2 parents 0d16fff + b8f8e83 commit f37344e

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/logic-apps/logic-apps-limits-and-config.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: logic-apps
55
ms.suite: integration
66
ms.reviewer: rohithah, laveeshb, rarayudu, azla
77
ms.topic: reference
8-
ms.date: 04/08/2022
8+
ms.date: 07/30/2022
99
---
1010

1111
# Limits and configuration reference for Azure Logic Apps
@@ -536,7 +536,7 @@ For Azure Logic Apps to receive incoming communication through your firewall, yo
536536
537537
<a name="multi-tenant-inbound"></a>
538538

539-
#### Multi-tenant & single-tenant - Inbound IP addresses
539+
#### Multi-tenant - Inbound IP addresses
540540

541541
| Region | IP |
542542
|--------|----|
@@ -613,7 +613,7 @@ Also, if your workflow also uses any [managed connectors](../connectors/managed.
613613
614614
<a name="multi-tenant-outbound"></a>
615615

616-
#### Multi-tenant & single-tenant - Outbound IP addresses
616+
#### Multi-tenant - Outbound IP addresses
617617

618618
This section lists the outbound IP addresses that Azure Logic Apps requires in your logic app's Azure region to communicate through your firewall. Also, if your workflow uses any managed connectors or custom connectors, your firewall has to allow traffic in your logic app's Azure region for [*all the managed connectors' outbound IP addresses*](/connectors/common/outbound-ip-addresses/#azure-logic-apps). If you have custom connectors that access on-premises resources through the on-premises data gateway resource in Azure, set up your *gateway installation* to allow access for the corresponding managed connector outbound IP addresses.
619619

0 commit comments

Comments
 (0)