Hi @Sai Kalyan Kalapala
Thank you for posting in Q & A.
It is similar question i answered in previous post.
It's similar to the network security group (NSG) feature in Azure networking. You can use this feature in an App Service Environment (ASE) or in the multitenant service. When you use it with an ILB ASE or private endpoint, you can restrict access from private address blocks.
Azure App Service has two variations on the VNet Integration feature:
The multitenant systems that support the full range of pricing plans except Isolated.
The App Service Environment, which deploys into your VNet and supports Isolated pricing plan apps.
When you use VNet Integration with VNets in the same region, you can use the following Azure networking features:
- Network security groups (NSGs): You can block outbound traffic with an NSG that's placed on your integration subnet. The inbound rules don't apply because you can't use VNet Integration to provide inbound access to your app.
- Route tables (UDRs): You can place a route table on the integration subnet to send outbound traffic where you want.
https://learn.microsoft.com/en-us/azure/app-service/web-sites-integrate-with-vnet#regional-vnet-integration
https://learn.microsoft.com/en-us/azure/app-service/networking-features
If the Answer is helpful, please click Accept Answer
and up-vote, this can be beneficial to other community members.