Skip to content

Commit 16c74f0

Browse files
authored
Updates for ASE to CAP
Will require another update once the NSG Service Tag for ASE is fixed.
1 parent e09195f commit 16c74f0

File tree

1 file changed

+24
-16
lines changed

1 file changed

+24
-16
lines changed
Lines changed: 24 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Use DISA CAP to connect to Azure Government
2+
title: ASE deployment with DISA CAP
33
description: This document provides a comparison of features and guidance on developing applications for Azure Government
44
services: azure-government
55
cloud: gov
@@ -18,53 +18,61 @@ ms.author: joscot
1818

1919
---
2020

21-
# App Service Environment reference for DoD customers using a DISA CAP connection
21+
# App Service Environment reference for DoD customers connected to the DISA CAP
2222

2323
This article explains the baseline configuration of an App Service Environment (ASE) with an internal load balancer (ILB) for customers who use the DISA CAP to connect to Azure Government.
2424

2525
## Environment configuration
2626

2727
### Assumptions
2828

29-
The customer has deployed an ASE with an ILB and has implemented an ExpressRoute connection via the DISA Cloud Access Point (CAP) process.
29+
The customer has deployed an ASE with an ILB and has implemented an ExpressRoute connection to the DISA Cloud Access Point (CAP).
3030

3131
### Route table
3232

33-
When creating the ASE via the portal, a route table with a default route of 0.0.0.0/0 and next hop “Internet” is created. However, the DISA BGP routes will advertise for 0.0.0.0/0 and this route table should be removed from the ASE subnet.
33+
When creating the ASE via the portal, a route table with a default route of 0.0.0.0/0 and next hop “Internet” is created.
34+
However, since DISA advertises a default route out the ExpressRoute circuit, the User Defined Route (UDR) should either be deleted, or remove the default route to internet.
3435

35-
### Network security group (NSG)
36-
37-
The ASE will be created with inbound and outbound security rules as shown below. The inbound security rules MUST allow ports 454-455 with an ephemeral source port range (*). Source IPs must include the following Azure Government ranges see [App Service Environment management addresses](https://docs.microsoft.com/azure/app-service/environment/management-addresses
36+
You will need to create new routes in the UDR for the management addresses in order to keep the ASE healthy. For Azure Government ranges see [App Service Environment management addresses](https://docs.microsoft.com/azure/app-service/environment/management-addresses
3837
)
3938

40-
* 23.97.29.209
41-
* 23.97.0.17
42-
* 23.97.16.184
43-
* 13.72.180.105
44-
* 13.72.53.37
39+
Rule 1: 23.97.29.209 --> Internet
40+
Rule 2: 23.97.0.17 --> Internet
41+
Rule 3: 23.97.16.184 --> Internet
42+
Rule 4: 13.72.180.105 --> Internet
43+
Rule 5: 13.72.53.37 --> Internet
44+
45+
Make sure the UDR is applied to the subnet your ASE is deployed to.
46+
47+
### Network security group (NSG)
4548

46-
#### Default NSG security rules
49+
The ASE will be created with inbound and outbound security rules as shown below. The inbound security rules MUST allow ports 454-455 with an ephemeral source port range (*).
4750

4851
The images below describe the default NSG rules created during the ASE creation. For more information, see [Networking considerations for an App Service Environment](https://docs.microsoft.com/azure/app-service/environment/network-info#network-security-groups)
4952

5053
![Default inbound NSG security rules for an ILB ASE](media/documentation-government-ase-disacap-inbound-route-table.png)
5154

5255
![Default outbound NSG security rules for an ILB ASE](media/documentation-government-ase-disacap-outbound-route-table.png)
5356

57+
### Service Endpoints
58+
59+
Depending what storage you are using you will be required to enable Service Endpoints for SQL and Azure Storage to access them without going back down to the DISA BCAP. You also need to enable EventHub Service Endpoint for ASE logs.
60+
5461
## FAQs
5562

56-
* Some configuration changes may take some time to take effect. Allow for several hours for changes to routing, NSGs, ASE Health, etc. to propagate and take effect.
63+
* Some configuration changes may take some time to take effect. Allow for several hours for changes to routing, NSGs, ASE Health, etc. to propagate and take effect, or optionally you can reboot the ASE.
5764

5865
## Resource manager template sample
5966

6067
> [!NOTE]
61-
> The Azure Portal will not allow the ASE to be configured with non-RFC 1918 IP addresses. If your solution requires non-RFC 1918 IP addresses, you must use a Resource Manager Template to deploy the ASE.
68+
>In order to deploy non-RFC 1918 IP addresses in the portal you must pre-stage the VNet and Subnet for the ASE. You can use a Resource Manager Template to deploy the ASE with non-RFC1918 IPs as well.
6269
6370
<a href="https://portal.azure.us/#create/Microsoft.Template/uri/https%3A%2F%2Fraw.githubusercontent.com%2FAzure%2Fazure-quickstart-templates%2Fmaster%2FApp-Service-Environment-AzFirewall%2Fazuredeploy.json" target="_blank">
71+
6472
<img src="https://raw.githubusercontent.com/Azure/azure-quickstart-templates/master/1-CONTRIBUTION-GUIDE/images/deploytoazuregov.png"/>
6573
</a>
6674

67-
This template deploys an **ILB ASE** into the Azure Government DoD regions.
75+
This template deploys an **ILB ASE** into the Azure Government or Azure DoD regions.
6876

6977
## Next steps
7078
[Azure Government overview](documentation-government-welcome.md)

0 commit comments

Comments
 (0)