You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/networking/private-endpoint.md
+21-20Lines changed: 21 additions & 20 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,6 +8,7 @@ ms.date: 03/12/2020
8
8
ms.author: ericg
9
9
ms.service: app-service
10
10
ms.workload: web
11
+
ms.custom: fasttrack-edit
11
12
12
13
---
13
14
@@ -16,48 +17,48 @@ ms.workload: web
16
17
> [!Note]
17
18
> The preview is available in East US region for all PremiumV2 Windows and Linux Web Apps and Elastic Premium Functions.
18
19
19
-
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access to the app over Private Link. The Private Endpoint uses an IP address from your Azure VNet address space. Network traffic between client on your private network and the Web App traverses over the Vnet and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet.
20
+
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access the app over Private Link. The Private Endpoint uses an IP address from your Azure VNet address space. Network traffic between a client on your private network and the Web App traverses over the VNet and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet.
20
21
21
22
Using Private Endpoint for your Web App enables you to:
22
23
23
-
- Secure your Web App by configuring the Service Endpoint, eliminating public exposure
24
-
- Securely connect to Web App from on-premises networks that connect to the Vnet using a VPN or ExpressRoute private peering.
24
+
- Secure your Web App by configuring the Service Endpoint, eliminating public exposure.
25
+
- Securely connect to Web App from on-premises networks that connect to the VNet using a VPN or ExpressRoute private peering.
25
26
26
-
If you just need a secure connection between your Vnet and your Web App, Service Endpoint is the simplest solution. If you also need to reach the web app from on-premises through an Azure gateway, a regionally peered Vnet or a globally peered Vnet, Private Endpoint is the solution.
27
+
If you just need a secure connection between your VNet and your Web App, a Service Endpoint is the simplest solution. If you also need to reach the web app from on-premises through an Azure gateway, a regionally peered VNet or a globally peered VNet, Private Endpoint is the solution.
27
28
28
-
For more information about[Service Endpoint][serviceendpoint]
29
+
For more information, see[Service Endpoints][serviceendpoint].
29
30
30
31
## Conceptual overview
31
32
32
-
A Private Endpoint is a special network interface (nic) for your Azure Web App in your Subnet in your Virtual Network (Vnet).
33
-
When you create a Private Endpoint for your Web App, it provides a secure connectivity between clients on your private network and your Web App. The private Endpoint is assigned an IP Address from the IP address range of your Vnet.
34
-
The connection between the Private Endpoint and the Web App uses a secure [Private Link][privatelink]. Private endpoint is only used for incoming flows to your Web App. Outgoing flows will not use this Private Endpoint, but you can inject outgoing flows to your network in a different subnet through the [Vnet integration feature][vnetintegrationfeature].
33
+
A Private Endpoint is a special network interface (NIC) for your Azure Web App in a Subnet in your Virtual Network (VNet).
34
+
When you create a Private Endpoint for your Web App, it provides secure connectivity between clients on your private network and your Web App. The Private Endpoint is assigned an IP Address from the IP address range of your VNet.
35
+
The connection between the Private Endpoint and the Web App uses a secure [Private Link][privatelink]. Private Endpoint is only used for incoming flows to your Web App. Outgoing flows will not use this Private Endpoint, but you can inject outgoing flows to your network in a different subnet through the [VNet integration feature][vnetintegrationfeature].
35
36
36
37
The Subnet where you plug the Private Endpoint can have other resources in it, you don't need a dedicated empty Subnet.
37
-
You can deploy Private Endpoint in a different region than the Web App.
38
+
You can also deploy the Private Endpoint in a different region than the Web App.
38
39
39
40
> [!Note]
40
-
>The Vnet integration feature cannot use the same subnet than Private Endpoint, this is a limitation of the Vnet integration feature
41
+
>The VNet integration feature cannot use the same subnet than Private Endpoint, this is a limitation of the VNet integration feature.
41
42
42
-
From the security perspective:
43
+
From a security perspective:
43
44
44
-
- When you enable Service Endpoint to your Web App, you disable all public access
45
-
- You can enable multiple Private Endpoints in others Vnets and Subnets, including Vnets in other regions
46
-
- The IP address of the Private endpoint NIC must be dynamic, but will remain the same until you delete the Private Endpoint
47
-
- The NIC of the Private Endpoint cannot have an NSG associated
48
-
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint see [this article][disablesecuritype]. As a result, you cannot filter by any NSG the access to your Private Endpoint
45
+
- When you enable Private Endpoints to your Web App, you disable all public access.
46
+
- You can enable multiple Private Endpoints in others VNets and Subnets, including VNets in other regions.
47
+
- The IP address of the Private Endpoint NIC must be dynamic, but will remain the same until you delete the Private Endpoint.
48
+
- The NIC of the Private Endpoint cannot have an NSG associated.
49
+
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint: see [Disable network policies for private endpoints][disablesecuritype]. As a result, you cannot filter by any NSG the access to your Private Endpoint.
49
50
- When you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App is not evaluated.
50
-
- You can reduce data exfiltration risk from the vnet by removing all NSG rules where destination is tag Internet or Azure services. But adding a Web App Service Endpoint in your subnet, will let you reach any Web App hosted in the same stamp and exposed to Internet. (This is only a limitation of the current preview.)
51
+
- You can reduce the data exfiltration risk from the VNet by removing all NSG rules where destination is tag Internet or Azure services. But adding a Web App Service Endpoint in your subnet will let you reach any Web App hosted in the same deployment stamp and exposed to the Internet.
51
52
52
-
In the Web http logs of your Web App, you will find the client source IP. We implemented the TCP Proxy protocol, forwarding up to the Web App the client IP property. For more information, see [this article][tcpproxy].
53
+
In the Web HTTP logs of your Web App, you will find the client source IP. This is implemented using the TCP Proxy protocol, forwarding the client IP property up to the Web App. For more information, see [Getting connection Information using TCP Proxy v2][tcpproxy].
53
54
54
55
![Global overview][1]
55
56
56
57
57
58
## DNS
58
59
59
-
As this feature is in preview, we don't change the DNS entry during the preview. You need to manage yourself the DNS entry in your private DNS server or Azure DNS private zone.
60
-
If you need to use a custom DNS name, you must add the custom name in your Web App. During the preview, the custom name must be validated like any custom name, using public DNS resolution. [custom DNS validation technical reference][dnsvalidation]
60
+
As this feature is in preview, we don't change the DNS entry during the preview. You need to manage the DNS entry in your private DNS server or Azure DNS private zone yourself.
61
+
If you need to use a custom DNS name, you must add the custom name in your Web App. During the preview, the custom name must be validated like any custom name, using public DNS resolution. See [custom DNS validation][dnsvalidation] for more information.
0 commit comments