Skip to content

Commit 287fa9f

Browse files
authored
Merge pull request #106756 from Ericgre/patch-1
Update private-endpoint.md
2 parents cedd21d + 7b836b7 commit 287fa9f

File tree

1 file changed

+17
-10
lines changed

1 file changed

+17
-10
lines changed

articles/app-service/networking/private-endpoint.md

Lines changed: 17 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -13,46 +13,48 @@ ms.workload: web
1313

1414
# Using Private Endpoints for Azure Web App (Preview)
1515

16-
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access to the app over Private Link. The Private Endpoint uses an IP address from the Azure VNet address space. Network traffic between client on your private network and the Web App traverses over the Vnet and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet. With Private Endpoint you can disable outgoing network flows from the subnet with NSG and eliminate the data leakage risk.
16+
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access to the app over Private Link. The Private Endpoint uses an IP address from your Azure VNet address space. Network traffic between client on your private network and the Web App traverses over the Vnet and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet. With Private Endpoint, you can disable outgoing network flows from the subnet with NSG and eliminate the data leakage risk.
1717

18-
Using private endpoints for your Web App enables you to:
18+
Using Private Endpoint for your Web App enables you to:
1919

2020
- Secure your Web App by configuring the Service Endpoint, eliminating public exposure
2121
- Increase security for the Vnet by enabling you to block data exfiltration from the Vnet
2222
- Securely connect to Web App from on-premises networks that connect to the Vnet using a VPN or ExpressRoute private peering.
2323

24-
If you just need a secure connection between your Vnet and your Web App, Service Endpoint is the simplest solution. If you need to protect against data exfiltration or route access from on-premises Private Endpoint is the solution.
24+
If you just need a secure connection between your Vnet and your Web App, Service Endpoint is the simplest solution.
25+
If you need to protect against data exfiltration or route access from on-premises, Private Endpoint is the solution.
2526

2627
For more information about [Service Endpoint][serviceendpoint]
2728

2829
## Conceptual overview
2930

3031
A Private Endpoint is a special network interface (nic) for your Azure Web App in your Subnet in your Virtual Network (Vnet).
3132
When you create a Private Endpoint for your Web App, it provides a secure connectivity between clients on your private network and your Web App. The private Endpoint is assigned an IP Address from the IP address range of your Vnet.
32-
The connection between the Private Endpoint and the Web App uses a secure [Private Link][privatelink]. Private endpoint is only used for incoming flows to your Web App, outgoing flows will not use this Private Endpoint, but you can inject outgoing flows to your network in a different subnet through the [Vnet integration feature][vnetintegrationfeature].
33+
The connection between the Private Endpoint and the Web App uses a secure [Private Link][privatelink]. Private endpoint is only used for incoming flows to your Web App. Outgoing flows will not use this Private Endpoint, but you can inject outgoing flows to your network in a different subnet through the [Vnet integration feature][vnetintegrationfeature].
3334

3435
The Subnet where you plug the Private Endpoint can have other resources in it, you don't need a dedicated empty Subnet.
3536
> [!Note]
3637
>The Vnet integration feature cannot use the same subnet than Private Endpoint, this is a limitation of the Vnet integration feature
3738
3839
From the security perspective:
3940

40-
- When you enable Service Endpoint to your Web App, you disable all public access. But you can enable multiple Private Endpoints in others Vnets and Subnets.
41-
- The NIC of the Private Endpoint cannot have an NSG associated.
42-
- The Subnet that hosts the Private endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint see [this article] [disablesecuritype]. As a result, you cannot filter by any NSG the access to your Private Endpoint.
41+
- When you enable Service Endpoint to your Web App, you disable all public access
42+
- You can enable multiple Private Endpoints in others Vnets and Subnets
43+
- The NIC of the Private Endpoint cannot have an NSG associated
44+
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint see [this article] [disablesecuritype]. As a result, you cannot filter by any NSG the access to your Private Endpoint.
4345
- When you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App is not evaluated.
4446

4547
Private Endpoint for Web App is available for tier Standard, PremiumV2, and Isolated with an external ASE.
4648

47-
In the Web http logs of your web app, you will discover that we are aware of the source IP of the client. We implemented the TCP Proxy protocol, forwarding up to the web app the client IP. For more information, see [this article][tcpproxy].
49+
In the Web http logs of your Web App, you will discover that we are aware of the client source IP. We implemented the TCP Proxy protocol, forwarding up to the Web App the client IP. For more information, see [this article][tcpproxy].
4850

4951
![Global overview][1]
5052

5153

5254
## DNS
5355

54-
As this feature is in preview, we don't change the DNS entry today, you need to manage yourself the DNS entry in your private DNS server or Azure DNS private zone.
55-
If you need to use a custom DNS name, you must add the custom name in your web app. During the preview, the custom name must be validated like any custom name, using public DNS resolution. [custom DNS validation technical reference][dnsvalidation]
56+
As this feature is in preview, we don't change the DNS entry during the preview. You need to manage yourself the DNS entry in your private DNS server or Azure DNS private zone.
57+
If you need to use a custom DNS name, you must add the custom name in your Web App. During the preview, the custom name must be validated like any custom name, using public DNS resolution. [custom DNS validation technical reference][dnsvalidation]
5658

5759
## Pricing
5860

@@ -62,6 +64,10 @@ For pricing details, see [Azure Private Link pricing][pricing].
6264

6365
We are improving Private Link feature and Private Endpoint regularly, check [this article][pllimitations] for up-to-date information about limitations.
6466

67+
## Next steps
68+
69+
To deploy Private endpoint for your Web App through the portal see [How to connect privately to a Web App][howtoguide]
70+
6571

6672
<!--Image references-->
6773
[1]: ./media/private-endpoint/schemaglobaloverview.png
@@ -76,3 +82,4 @@ We are improving Private Link feature and Private Endpoint regularly, check [thi
7682
[dnsvalidation]: https://docs.microsoft.com/azure/app-service/app-service-web-tutorial-custom-domain
7783
[pllimitations]: https://docs.microsoft.com/azure/private-link/private-endpoint-overview#limitations
7884
[pricing]: https://azure.microsoft.com/pricing/details/private-link/
85+
[howtoguide]: https://docs.microsoft.com/azure/private-link/create-private-endpoint-webapp-portal

0 commit comments

Comments
 (0)