Skip to content

Commit 166878c

Browse files
Merge pull request #208965 from Ericgre/patch-10
update about VNet
2 parents 5efbc2f + 3133cfb commit 166878c

File tree

1 file changed

+13
-15
lines changed

1 file changed

+13
-15
lines changed

articles/app-service/networking/private-endpoint.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -17,41 +17,39 @@ ms.custom: fasttrack-edit, references_regions
1717
> [!IMPORTANT]
1818
> Private Endpoint is available for Windows and Linux Web App, containerized or not, hosted on these App Service Plans : **Basic**, **Standard**, **PremiumV2**, **PremiumV3**, **IsolatedV2**, **Functions Premium** (sometimes referred to as the Elastic Premium plan).
1919
20-
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access the app over Private Link. The Private Endpoint uses an IP address from your Azure VNet address space. Network traffic between a client on your private network and the Web App traverses over the VNet and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet.
20+
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access the app over Private Link. The Private Endpoint uses an IP address from your Azure virtual network address space. Network traffic between a client on your private network and the Web App traverses over the virtual network and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet.
2121

2222
Using Private Endpoint for your Web App enables you to:
2323

2424
- Secure your Web App by configuring the Private Endpoint, eliminating public exposure.
25-
- Securely connect to Web App from on-premises networks that connect to the VNet using a VPN or ExpressRoute private peering.
26-
- Avoid any data exfiltration from your VNet.
25+
- Securely connect to Web App from on-premises networks that connect to the virtual network using a VPN or ExpressRoute private peering.
26+
- Avoid any data exfiltration from your virtual network.
2727

28-
If you just need a secure connection between your VNet and your Web App, a Service Endpoint is the simplest solution.
29-
If you also need to reach the web app from on-premises through an Azure Gateway, a regionally peered VNet, or a globally peered VNet, Private Endpoint is the solution.
28+
If you just need a secure connection between your virtual network and your Web App, a Service Endpoint is the simplest solution.
29+
If you also need to reach the web app from on-premises through an Azure Gateway, a regionally peered virtual network, or a globally peered virtual network, Private Endpoint is the solution.
3030

3131
For more information, see [Service Endpoints][serviceendpoint].
3232

3333
## Conceptual overview
3434

35-
A Private Endpoint is a special network interface (NIC) for your Azure Web App in a Subnet in your Virtual Network (VNet).
36-
When you create a Private Endpoint for your Web App, it provides secure connectivity between clients on your private network and your Web App. The Private Endpoint is assigned an IP Address from the IP address range of your VNet.
37-
The connection between the Private Endpoint and the Web App uses a secure [Private Link][privatelink]. Private Endpoint is only used for incoming flows to your Web App. Outgoing flows won't use this Private Endpoint. You can inject outgoing flows to your network in a different subnet through the [VNet integration feature][vnetintegrationfeature].
35+
A Private Endpoint is a special network interface (NIC) for your Azure Web App in a Subnet in your virtual network.
36+
When you create a Private Endpoint for your Web App, it provides secure connectivity between clients on your private network and your Web App. The Private Endpoint is assigned an IP Address from the IP address range of your virtual network.
37+
The connection between the Private Endpoint and the Web App uses a secure [Private Link][privatelink]. Private Endpoint is only used for incoming flows to your Web App. Outgoing flows won't use this Private Endpoint. You can inject outgoing flows to your network in a different subnet through the [virtual network integration feature][vnetintegrationfeature].
3838

3939
Each slot of an app is configured separately. You can plug up to 100 Private Endpoints per slot. You can't share a Private Endpoint between slots.
4040

4141
The Subnet where you plug the Private Endpoint can have other resources in it, you don't need a dedicated empty Subnet.
4242
You can also deploy the Private Endpoint in a different region than the Web App.
4343

4444
> [!Note]
45-
>The VNet integration feature cannot use the same subnet as Private Endpoint, this is a limitation of the VNet integration feature.
45+
>The virtual network integration feature cannot use the same subnet as Private Endpoint, this is a limitation of the virtual network integration feature.
4646
4747
From a security perspective:
4848

4949
- By default, when you enable Private Endpoints to your Web App, you disable all public access.
50-
- You can enable multiple Private Endpoints in others VNets and Subnets, including VNets in other regions.
51-
- The IP address of the Private Endpoint NIC must be dynamic, but will remain the same until you delete the Private Endpoint.
52-
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint: see [Disable network policies for private endpoints][disablesecuritype]. As a result, you can't filter by any NSG the access to your Private Endpoint.
53-
- By default, when you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App isn't evaluated.
54-
- You can eliminate the data exfiltration risk from the VNet by removing all NSG rules where destination is tag Internet or Azure services. When you deploy a Private Endpoint for a Web App, you can only reach this specific Web App through the Private Endpoint. If you have another Web App, you must deploy another dedicated Private Endpoint for this other Web App.
50+
- You can enable multiple Private Endpoints in others virtual networks and Subnets, including virtual network in other regions.
51+
- The access restrictions configuration of a Web App isn't evaluated for traffic through the Private Endpoint.
52+
- You can eliminate the data exfiltration risk from the virtual network by removing all NSG rules where destination is tag Internet or Azure services. When you deploy a Private Endpoint for a Web App, you can only reach this specific Web App through the Private Endpoint. If you have another Web App, you must deploy another dedicated Private Endpoint for this other Web App.
5553

5654
In the Web HTTP logs of your Web App, you'll find the client source IP. This feature is implemented using the TCP Proxy protocol, forwarding the client IP property up to the Web App. For more information, see [Getting connection Information using TCP Proxy v2][tcpproxy].
5755

@@ -119,7 +117,7 @@ az appservice ase update --name myasename --allow-new-private-endpoint-connectio
119117

120118
## Specific requirements
121119

122-
If the Virtual Network is in a different subscription than the app, you must ensure that the subscription with the Virtual Network is registered for the Microsoft.Web resource provider. You can explicitly register the provider [by following this documentation][registerprovider], but it will also automatically be registered when creating the first web app in a subscription.
120+
If the virtual network is in a different subscription than the app, you must ensure that the subscription with the virtual network is registered for the Microsoft.Web resource provider. You can explicitly register the provider [by following this documentation][registerprovider], but it will also automatically be registered when creating the first web app in a subscription.
123121

124122
## Pricing
125123

0 commit comments

Comments
 (0)