You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/api-management/virtual-network-reference.md
+18-12Lines changed: 18 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: dlepow
6
6
7
7
ms.service: api-management
8
8
ms.topic: reference
9
-
ms.date: 01/06/2023
9
+
ms.date: 08/29/2023
10
10
ms.author: danlep
11
11
ms.custom: references_regions
12
12
---
@@ -78,28 +78,21 @@ NSG rules allowing outbound connectivity to Storage, SQL, and Azure Event Hubs s
78
78
79
79
## TLS functionality
80
80
81
-
To enable TLS/SSL certificate chain building and validation, the API Management service needs outbound network connectivity to `ocsp.msocsp.com`, `mscrl.microsoft.com`, and `crl.microsoft.com`. This dependency is not required if any certificate you upload to API Management contains the full chain to the CA root.
81
+
To enable TLS/SSL certificate chain building and validation, the API Management service needs outbound network connectivity on ports `80` and `443` to `ocsp.msocsp.com`, `oneocsp.msocsp.com`, `mscrl.microsoft.com`, `crl.microsoft.com`, and `csp.digicert.com`. This dependency is not required if any certificate you upload to API Management contains the full chain to the CA root.
82
+
82
83
83
84
## DNS access
84
85
85
86
Outbound access on port `53` is required for communication with DNS servers. If a custom DNS server exists on the other end of a VPN gateway, the DNS server must be reachable from the subnet hosting API Management.
86
87
87
-
### FQDN dependencies
88
-
89
-
To operate properly, the API Management service needs outbound connectivity on port 443 to the following endpoints associated with its cloud-based API Management instance:
88
+
## Azure Active Directory integration
90
89
91
-
| Description | Required | Notes |
92
-
|:------------|:---------------------|:------|
93
-
| Endpoints for Azure Active Directory integration | ✔️ | Required endpoints are `<region>.login.microsoft.com` and `login.microsoftonline.com`. |
90
+
To operate properly, the API Management service needs outbound connectivity on port 443 to the following endpoints associated with Azure Active Directory: `<region>.login.microsoft.com` and `login.microsoftonline.com`.
94
91
95
92
## Metrics and health monitoring
96
93
97
94
Outbound network connectivity to Azure Monitoring endpoints, which resolve under the following domains, are represented under the **AzureMonitor** service tag for use with Network Security Groups.
98
95
99
-
### Metrics and health monitoring
100
-
101
-
Outbound network connectivity to Azure Monitoring endpoints, which resolve under the following domains, are represented under the AzureMonitor service tag for use with Network Security Groups.
| Azure Public | <ul><li>gcs.prod.monitoring.core.windows.net</li><li>global.prod.microsoftmetrics.com</li><li>shoebox2.prod.microsoftmetrics.com</li><li>shoebox2-red.prod.microsoftmetrics.com</li><li>shoebox2-black.prod.microsoftmetrics.com</li><li>prod3.prod.microsoftmetrics.com</li><li>prod3-black.prod.microsoftmetrics.com</li><li>prod3-red.prod.microsoftmetrics.com</li><li>gcs.prod.warm.ingestion.monitoring.azure.com</li></ul> |
@@ -126,6 +119,18 @@ Enable publishing the [developer portal](api-management-howto-developer-portal.m
126
119
127
120
When adding virtual machines running Windows to the VNet, allow outbound connectivity on port `1688` to the [KMS endpoint](/troubleshoot/azure/virtual-machines/custom-routes-enable-kms-activation#solution) in your cloud. This configuration routes Windows VM traffic to the Azure Key Management Services (KMS) server to complete Windows activation.
128
121
122
+
## Internal infrastructure and diagnostics
123
+
124
+
The following settings and FQDNs are required to maintain and diagnose API Management's internal compute infrastructure.
125
+
126
+
* Allow outbound UDP access on port `123` for NTP.
127
+
* Allow outbound TCP access on port `12000` for diagnostics.
128
+
* Allow outbound access on port `443` to the following endpoints for internal diagnostics: `azurewatsonanalysis-prod.core.windows.net`, `*.data.microsoft.com`, `azureprofiler.trafficmanager.net`, `shavamanifestazurecdnprod1.azureedge.net`, `shavamanifestcdnprod1.azureedge.net`.
129
+
* Allow outbound access on port `443` to the following endpoint for internal PKI: `issuer.pki.azure.com`.
130
+
* Enable outbound access on ports `80` and `443` to the following endpoints for Windows Update: `*.update.microsoft.com`, `*.ctldl.windowsupdate.com`, `ctldl.windowsupdate.com`, `download.windowsupdate.com`.
131
+
* Allow outbound access on ports `80` and `443` to the endpoint `go.microsoft.com`.
132
+
* Allow outbound access on port `443` to the following endpoints for Windows Defender: `wdcp.microsoft.com`, `wdcpalt.microsoft.com `.
133
+
129
134
## Control plane IP addresses
130
135
131
136
The following IP addresses are divided by **Azure Environment** and **Region**. In some cases, two IP addresses are listed. Permit both IP addresses.
@@ -196,6 +201,7 @@ The following IP addresses are divided by **Azure Environment** and **Region**.
0 commit comments