Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stoppping ASA impact: get new outbound IPs #38

Öffnen Sie
ezYakaEagle442 opened this issue Mar 11, 2023 · 1 comment
Öffnen Sie

Stoppping ASA impact: get new outbound IPs #38

ezYakaEagle442 opened this issue Mar 11, 2023 · 1 comment
Assignees
Labels
Enhancement New feature or request Tracking

Kommentare

@ezYakaEagle442
Copy link

Stopping ASA results in getting new outbound IPs, as a result , when the Apps restart they fail as blocked by the Firewall initially set on MySQL, KeyVault etc. as the rules were set on new outbound IPs which have changed.

Solution : update IP Rule on Firewalls where required, then restart ALL Apps in ASA.

This should be documented.

See allso MicrosoftDocs/azure-docs#106478

@Caoxuyang
Copy link

Hi @ezYakaEagle442 ,

Thank you for submitting this issue.
The outbound IP address after stopping ASA has different behaviors depending on whether you bring your own virtual network.

If so and this ASA is injected into your own VNet, the outbound IP address do have chance to be changed after stopping operation. And sorry for not mentioning this in the doc, I will update it ASAP.

If the ASA is a default one and not injected into a customer's VNet, actually the outbound IP address will keep the same after the stop operation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Enhancement New feature or request Tracking
Projects
None yet
Development

No branches or pull requests

4 participants