@van Boheemen, Matthew Thanks for asking question! Inbound and outbound network traffic on a subnet is controlled using a network security group. Controlling inbound traffic requires creating network security rules in a network security group, and then assigning the network security group the subnet containing the App Service Environment. Once a network security group is assigned to a subnet, inbound traffic to apps in the App Service Environment is allowed/blocked based on the allow and deny rules defined in the network security group.
You may refer below document, which describes regarding Outbound network address with ASE:
https://learn.microsoft.com/en-us/azure/app-service/environment/app-service-app-service-environment-network-architecture-overview#outbound-network-addresses.
Also, you could use IP restrictions in App Services or you can connect to a WebApp from IIS manager and config Restrict IP:
Using web.config to restrict IP manually is also a way.