Hello Đỗ Hoàng Minh Hưng,
As of May 2025, Microsoft removed the "Consumption-only" (v1) environment option from the Azure Portal UI. Now, every new ACA environment created via the portal defaults to the "Workload Profiles" (v2) model and includes a Consumption profile by default (screenshot 1 confirms this behavior).
This is by design and is documented here: Environment types in ACA
How to Restrict Access Using NSG with Workload Profiles?
Ans- You're still fully able to control public traffic using NSG rules, even under the newer Workload Profiles environment.
I tested this exact scenario by creating a VNet-injected ACA environment with a public endpoint. Deployed a container app to it. Applied NSG rules to the subnet. Allow only my own IP on ports 80/443. Deny all others
Result: Access from other IPs was blocked successfully even though the app was public. This behavior is confirmed by Microsoft here: Firewall integration via NSG (Workload Profiles)
So even though your ACA is public (as shown in your screenshot), the NSG on the subnet still controls access effectively.
Want to Use Legacy "Consumption-only" (v1) Environment?
Ans- You won’t find it in the Portal anymore, but you can still create it using Azure CLI.
az containerapp env create \
--name aca-env-consumption-v1 \
--resource-group arkorg \
--location eastus \
--infrastructure-subnet-resource-id <subnet-id-for-/23-subnet> \
--enable-workload-profiles false
Note- You must use a subnet with at least a /23
address range for v1 to work.