Share via


IpSecurityRestriction Class

IP security restriction on an app.

ivar ip_address: IP address the security restriction is valid for. It can be in form of pure ipv4 address (required SubnetMask property) or CIDR notation such as ipv4/mask (leading bit match). For CIDR, SubnetMask property must not be specified.

vartype ip_address: str

ivar subnet_mask: Subnet mask for the range of IP addresses the restriction is valid for.

vartype subnet_mask: str

ivar vnet_subnet_resource_id: Virtual network resource id.

vartype vnet_subnet_resource_id: str

ivar vnet_traffic_tag: (internal) Vnet traffic tag.

vartype vnet_traffic_tag: int

ivar subnet_traffic_tag: (internal) Subnet traffic tag.

vartype subnet_traffic_tag: int

ivar action: Allow or Deny access for this IP range.

vartype action: str

ivar tag: Defines what this IP filter will be used for. This is to support IP filtering on proxies. Known values are: "Default", "XffProxy", and "ServiceTag".

vartype tag: str or ~azure.mgmt.web.models.IpFilterTag

ivar priority: Priority of IP restriction rule.

vartype priority: int

ivar name: IP restriction rule name.

vartype name: str

ivar description: IP restriction rule description.

vartype description: str

ivar headers: IP restriction rule headers.

X-Forwarded-Host (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-Host#Examples).

The matching logic is ..

  • If the property is null or empty (default), all hosts(or lack of) are allowed.

  • A value is compared using ordinal-ignore-case (excluding port number).

  • Subdomain wildcards are permitted but don't match the root domain. For example, >>*<<.contoso.com matches the subdomain foo.contoso.com

but not the root domain contoso.com or multi-level foo.bar.contoso.com

  • Unicode host names are allowed but are converted to Punycode for matching.

X-Forwarded-For (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For#Examples).

The matching logic is ..

  • If the property is null or empty (default), any forwarded-for chains (or lack of) are allowed.

  • If any address (excluding port number) in the chain (comma separated) matches the CIDR defined by the property.

X-Azure-FDID and X-FD-HealthProbe. The matching logic is exact match.

vartype headers: dict[str, list[str]]

  keyword ip_address:
     IP address the security restriction is valid for.
     It can be in form of pure ipv4 address (required SubnetMask property) or
     CIDR notation such as ipv4/mask (leading bit match). For CIDR,
     SubnetMask property must not be specified.

  paramtype ip_address:
     str

  keyword subnet_mask:
     Subnet mask for the range of IP addresses the restriction is valid for.

  paramtype subnet_mask:
     str

  keyword vnet_subnet_resource_id:
     Virtual network resource id.

  paramtype vnet_subnet_resource_id:
     str

  keyword vnet_traffic_tag:
     (internal) Vnet traffic tag.

  paramtype vnet_traffic_tag:
     int

  keyword subnet_traffic_tag:
     (internal) Subnet traffic tag.

  paramtype subnet_traffic_tag:
     int

  keyword action:
     Allow or Deny access for this IP range.

  paramtype action:
     str

  keyword tag:
     Defines what this IP filter will be used for. This is to support IP filtering on
     proxies. Known values are: "Default", "XffProxy", and "ServiceTag".

  paramtype tag:
     str or ~azure.mgmt.web.models.IpFilterTag

  keyword priority:
     Priority of IP restriction rule.

  paramtype priority:
     int

  keyword name:
     IP restriction rule name.

  paramtype name:
     str

  keyword description:
     IP restriction rule description.

  paramtype description:
     str

  keyword headers:
     IP restriction rule headers.

X-Forwarded-Host (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-Host#Examples).

The matching logic is ..

  • If the property is null or empty (default), all hosts(or lack of) are allowed.

  • A value is compared using ordinal-ignore-case (excluding port number).

  • Subdomain wildcards are permitted but don't match the root domain. For example, >>*<<.contoso.com matches the subdomain foo.contoso.com

but not the root domain contoso.com or multi-level foo.bar.contoso.com

  • Unicode host names are allowed but are converted to Punycode for matching.

X-Forwarded-For (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Forwarded-For#Examples).

The matching logic is ..

  • If the property is null or empty (default), any forwarded-for chains (or lack of) are allowed.

  • If any address (excluding port number) in the chain (comma separated) matches the CIDR defined by the property.

X-Azure-FDID and X-FD-HealthProbe. The matching logic is exact match.

paramtype headers: dict[str, list[str]]

Constructor

IpSecurityRestriction(*, ip_address: str | None = None, subnet_mask: str | None = None, vnet_subnet_resource_id: str | None = None, vnet_traffic_tag: int | None = None, subnet_traffic_tag: int | None = None, action: str | None = None, tag: str | _models.IpFilterTag | None = None, priority: int | None = None, name: str | None = None, description: str | None = None, headers: dict[str, list[str]] | None = None, **kwargs: Any)

Keyword-Only Parameters

Name Description
ip_address
Default value: None
subnet_mask
Default value: None
vnet_subnet_resource_id
Default value: None
vnet_traffic_tag
Default value: None
subnet_traffic_tag
Default value: None
action
Default value: None
tag
Default value: None
priority
Default value: None
name
Default value: None
description
Default value: None
headers
Default value: None