Skip to content

Commit 2cba99e

Browse files
committed
[APIM] Remove control plane IPs
1 parent d6eda22 commit 2cba99e

File tree

3 files changed

+17
-84
lines changed

3 files changed

+17
-84
lines changed

articles/api-management/api-management-howto-disaster-recovery-backup-restore.md

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ author: dlepow
77

88
ms.service: api-management
99
ms.topic: how-to
10-
ms.date: 07/27/2022
10+
ms.date: 11/30/2023
1111
ms.author: danlep
1212
ms.custom: devx-track-azurepowershell
1313
---
@@ -334,13 +334,8 @@ Restore is a long-running operation that may take up to 30 or more minutes to co
334334

335335
## Storage networking constraints
336336

337-
### Access using storage access key
338-
339-
If the storage account is **[firewall][azure-storage-ip-firewall] enabled** and a storage key is used for access, then the customer must **Allow** the set of [Azure API Management control plane IP addresses][control-plane-ip-address] on their storage account for backup or restore to work. The storage account can be in any Azure region except the one where the API Management service is located. For example, if the API Management service is in West US, then the Azure Storage account can be in West US 2 and the customer needs to open the control plane IP 13.64.39.16 (API Management control plane IP of West US) in the firewall. This is because the requests to Azure Storage aren't SNATed to a public IP from compute (Azure API Management control plane) in the same Azure region. Cross-region storage requests will be SNATed to the public IP address.
340-
341-
### Access using managed identity
342337

343-
If an API Management system-assigned managed identity is used to access a firewall-enabled storage account, ensure that the storage account [grants access to trusted Azure services](../storage/common/storage-network-security.md?tabs=azure-portal#grant-access-to-trusted-azure-services).
338+
If the storage account is **[firewall][azure-storage-ip-firewall] enabled**, it's recommended to use the API Management instance's system-assigned managed identity for access to the account. Ensure that the storage account [grants access to trusted Azure services](../storage/common/storage-network-security.md?tabs=azure-portal#grant-access-to-trusted-azure-services).
344339

345340
## What is not backed up
346341
- **Usage data** used for creating analytics reports **isn't included** in the backup. Use [Azure API Management REST API][azure api management rest api] to periodically retrieve analytics reports for safekeeping.

articles/api-management/virtual-network-reference.md

Lines changed: 13 additions & 72 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: api-management
88
ms.topic: reference
9-
ms.date: 10/19/2023
9+
ms.date: 11/29/2023
1010
ms.author: danlep
1111
ms.custom: references_regions
1212
---
@@ -25,7 +25,7 @@ When an API Management service instance is hosted in a VNet, the ports in the fo
2525
>[!IMPORTANT]
2626
> * **Bold** items in the *Purpose* column indicate port configurations required for successful deployment and operation of the API Management service. Configurations labeled "optional" enable specific features, as noted. They are not required for the overall health of the service.
2727
>
28-
> * We recommend using [service tags](../virtual-network/service-tags-overview.md) instead of IP addresses in NSG rules to specify network sources and destinations. Service tags prevent downtime when infrastructure improvements necessitate IP address changes.
28+
> * We recommend using the indicated [service tags](../virtual-network/service-tags-overview.md) instead of IP addresses in NSG and other network rules to specify network sources and destinations. Service tags prevent downtime when infrastructure improvements necessitate IP address changes.
2929
3030

3131
### [stv2](#tab/stv2)
@@ -137,85 +137,26 @@ The following settings and FQDNs are required to maintain and diagnose API Manag
137137

138138
## Control plane IP addresses
139139

140-
The following IP addresses are divided by **Azure Environment** and **Region**. In some cases, two IP addresses are listed. Permit both IP addresses.
141-
142140
> [!IMPORTANT]
143-
> Control plane IP addresses should be configured for network access rules only when needed in certain networking scenarios. We recommend using the **ApiManagement** [service tag](../virtual-network/service-tags-overview.md) instead of control plane IP addresses to prevent downtime when infrastructure improvements necessitate IP address changes.
144-
145-
| **Azure Environment**| **Region**| **IP address**|
146-
|-----------------|-------------------------|---------------|
147-
| Azure Public| Australia Central| 20.37.52.67|
148-
| Azure Public| Australia Central 2| 20.39.99.81|
149-
| Azure Public| Australia East| 20.40.125.155|
150-
| Azure Public| Australia Southeast| 20.40.160.107|
151-
| Azure Public| Brazil South| 191.233.24.179, 191.238.73.14|
152-
| Azure Public| Brazil Southeast| 191.232.18.181|
153-
| Azure Public| Canada Central| 52.139.20.34, 20.48.201.76|
154-
| Azure Public| Canada East| 52.139.80.117|
155-
| Azure Public| Central India| 13.71.49.1, 20.192.45.112|
156-
| Azure Public| Central US| 13.86.102.66|
157-
| Azure Public| Central US EUAP| 52.253.159.160|
158-
| Azure Public| East Asia| 52.139.152.27|
159-
| Azure Public| East US| 52.224.186.99|
160-
| Azure Public| East US 2| 20.44.72.3|
161-
| Azure Public| East US 2 EUAP| 52.253.229.253|
162-
| Azure Public| France Central| 40.66.60.111|
163-
| Azure Public| France South| 20.39.80.2|
164-
| Azure Public| Germany North| 51.116.0.0|
165-
| Azure Public| Germany West Central| 51.116.96.0, 20.52.94.112|
166-
| Azure Public| Japan East| 52.140.238.179|
167-
| Azure Public| Japan West| 40.81.185.8|
168-
| Azure Public| India Central| 20.192.234.160|
169-
| Azure Public| India West| 20.193.202.160|
170-
| Azure Public| Korea Central| 40.82.157.167, 20.194.74.240|
171-
| Azure Public| Korea South| 40.80.232.185|
172-
| Azure Public| North Central US| 40.81.47.216|
173-
| Azure Public| North Europe| 52.142.95.35|
174-
| Azure Public| Norway East| 51.120.2.185|
175-
| Azure Public| Norway West| 51.120.130.134|
176-
| Azure Public| South Africa North| 102.133.130.197, 102.37.166.220|
177-
| Azure Public| South Africa West| 102.133.0.79|
178-
| Azure Public| South Central US| 20.188.77.119, 20.97.32.190|
179-
| Azure Public| South India| 20.44.33.246|
180-
| Azure Public| Southeast Asia| 40.90.185.46|
181-
| Azure Public| Switzerland North| 51.107.246.176, 51.107.0.91|
182-
| Azure Public| Switzerland West| 51.107.96.8|
183-
| Azure Public| UAE Central| 20.37.81.41|
184-
| Azure Public| UAE North| 20.46.144.85|
185-
| Azure Public| UK South| 51.145.56.125|
186-
| Azure Public| UK West| 51.137.136.0|
187-
| Azure Public| West Central US| 52.253.135.58|
188-
| Azure Public| West Europe| 51.145.179.78|
189-
| Azure Public| West India| 40.81.89.24|
190-
| Azure Public| West US| 13.64.39.16|
191-
| Azure Public| West US 2| 51.143.127.203|
192-
| Azure Public| West US 3| 20.150.167.160|
193-
| Microsoft Azure operated by 21Vianet| China North (Global)| 139.217.51.16|
194-
| Microsoft Azure operated by 21Vianet| China East (Global)| 139.217.171.176|
195-
| Microsoft Azure operated by 21Vianet| China North| 40.125.137.220|
196-
| Microsoft Azure operated by 21Vianet| China East| 40.126.120.30|
197-
| Microsoft Azure operated by 21Vianet| China North 2| 40.73.41.178|
198-
| Microsoft Azure operated by 21Vianet| China East 2| 40.73.104.4|
199-
| Azure Government| USGov Virginia (Global)| 52.127.42.160|
200-
| Azure Government| USGov Texas (Global)| 52.127.34.192|
201-
| Azure Government| USGov Virginia| 52.227.222.92|
202-
| Azure Government| USGov Iowa| 13.73.72.21|
203-
| Azure Government| USGov Arizona| 52.244.32.39|
204-
| Azure Government| USGov Texas| 52.243.154.118|
205-
| Azure Government| USDoD Central| 52.182.32.132|
206-
| Azure Government| USDoD East| 52.181.32.192|
207-
208-
209-
## Next steps
141+
> Control plane IP addresses for Azure API Management should be configured for network access rules only when needed in certain networking scenarios. We recommend using the **ApiManagement** [service tag](../virtual-network/service-tags-overview.md) instead of control plane IP addresses to prevent downtime when infrastructure improvements necessitate IP address changes.
142+
143+
144+
145+
## Related content
210146

211147
Learn more about:
212148

213149
* [Connecting a virtual network to backend using VPN Gateway](../vpn-gateway/design.md#s2smulti)
214150
* [Connecting a virtual network from different deployment models](../vpn-gateway/vpn-gateway-connect-different-deployment-models-powershell.md)
215-
* [Debug your APIs using request tracing](api-management-howto-api-inspector.md)
216151
* [Virtual Network frequently asked questions](../virtual-network/virtual-networks-faq.md)
217152
* [Service tags](../virtual-network/network-security-groups-overview.md#service-tags)
218153

154+
For more guidance on configuration issues, see:
155+
* [API Management - Networking FAQs (Demystifying series I)](https://techcommunity.microsoft.com/t5/azure-paas-blog/api-management-networking-faqs-demystifying-series-i/ba-p/1500996)
156+
* [API Management - Networking FAQs (Demystifying series II)](https://techcommunity.microsoft.com/t5/azure-paas-blog/api-management-networking-faqs-demystifying-series-ii/ba-p/1502056)
157+
158+
159+
219160
[api-management-using-vnet-menu]: ./media/api-management-using-with-vnet/api-management-menu-vnet.png
220161
[api-management-setup-vpn-select]: ./media/api-management-using-with-vnet/api-management-using-vnet-select.png
221162
[api-management-setup-vpn-add-api]: ./media/api-management-using-with-vnet/api-management-using-vnet-add-api.png

includes/api-management-virtual-network-forced-tunneling.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
author: dlepow
33
ms.service: api-management
44
ms.topic: include
5-
ms.date: 06/01/2022
5+
ms.date: 11/29/2023
66
ms.author: danlep
77
---
88

@@ -21,11 +21,8 @@ Forced tunneling lets you redirect or "force" all internet-bound traffic from yo
2121
> [!NOTE]
2222
> We strongly recommend enabling service endpoints directly from the API Management subnet to dependent services such as Azure SQL and Azure Storage that support them. However, some organizations may have requirements to force tunnel all traffic from the API Management subnet. In this case, ensure that you configure your firewall or virtual appliance to allow this traffic. You will need to allow the complete [IP address range](https://www.microsoft.com/download/details.aspx?id=56519) of each dependent service, and keep this configuration up to date when the Azure infrastructure changes. Your API Management service may also experience latency or unexpected timeouts because of the force tunneling of this network traffic.
2323

24-
* All the control plane traffic from the internet to the management endpoint of your API Management service is routed through a specific set of inbound IPs, hosted by API Management. When the traffic is force tunneled, the responses won't symmetrically map back to these inbound source IPs and connectivity to the management endpoint is lost. To overcome this limitation, configure user-defined routes ([UDRs][UDRs]) for these inbound IPs with next hop type set to "Internet", to steer traffic back to Azure. Configure the **ApiManagement** [service tag](../articles/virtual-network/service-tags-overview.md), or find the set of inbound IPs for control plane traffic documented in [Control plane IP addresses](../articles/api-management/virtual-network-reference.md#control-plane-ip-addresses).
24+
* All the control plane traffic from the internet to the management endpoint of your API Management service is routed through a specific set of inbound IPs, hosted by API Management, encompassed by the **ApiManagement** [service tag](../articles/virtual-network/service-tags-overview.md). When the traffic is force tunneled, the responses won't symmetrically map back to these inbound source IPs and connectivity to the management endpoint is lost. To overcome this limitation, configure a user-defined route ([UDR][UDRs]) for the ApiManagement service tag with next hop type set to "Internet", to steer traffic back to Azure.
2525

26-
> [!IMPORTANT]
27-
> Control plane IP addresses should be configured for network access rules and routes only when needed in certain networking scenarios. We recommend using the ApiManagement service tag instead of control plane IP addresses to prevent downtime when infrastructure improvements necessitate IP address changes.
28-
2926
> [!NOTE]
3027
> Allowing API Management management traffic to bypass an on-premises firewall or network virtual appliance isn't considered a significant security risk. The [recommended configuration](../articles/api-management/virtual-network-reference.md#required-ports) for your API Management subnet allows inbound management traffic on port 3443 only from the set of Azure IP addresses encompassed by the ApiManagement service tag. The recommended UDR configuration is only for the return path of this Azure traffic.
3128

0 commit comments

Comments
 (0)