Skip to content

Commit 2de8e1d

Browse files
authored
cleared up a few things
1 parent 35faede commit 2de8e1d

File tree

1 file changed

+27
-19
lines changed

1 file changed

+27
-19
lines changed

articles/app-service/environment/network-info.md

Lines changed: 27 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -53,38 +53,46 @@ When you scale up or down, new roles of the appropriate size are added and then
5353

5454
### ASE inbound dependencies ###
5555

56-
The ASE inbound access dependencies are:
56+
Just for the ASE to operate, the ASE requires the following ports to be open:
5757

5858
| Use | From | To |
5959
|-----|------|----|
6060
| Management | App Service management addresses | ASE subnet: 454, 455 |
6161
| ASE internal communication | ASE subnet: All ports | ASE subnet: All ports
62-
| Allow Azure load balancer inbound | Azure load balancer | ASE subnet: All ports
63-
| App assigned IP addresses | App assigned addresses | ASE subnet: All ports
62+
| Allow Azure load balancer inbound | Azure load balancer | ASE subnet: 16001
6463

65-
The inbound management traffic provides command and control of the ASE in addition to system monitoring. The source addresses for this traffic are listed in the [ASE Management addresses][ASEManagement] document. The network security configuration needs to allow access from all IPs on ports 454 and 455. If you block access from those addresses, your ASE will become unhealthy and then become suspended.
64+
There are 2 other ports that can show as open on a port scan, 7654 and 1221. They reply with an IP address and nothing more. They can be blocked if desired.
65+
66+
The inbound management traffic provides command and control of the ASE in addition to system monitoring. The source addresses for this traffic are listed in the [ASE Management addresses][ASEManagement] document. The network security configuration needs to allow access from the ASE management addresses on ports 454 and 455. If you block access from those addresses, your ASE will become unhealthy and then become suspended. The TCP traffic that comes in on ports 454 and 455 must go back out from the same VIP or you will have an asymmetric routing problem.
6667

6768
Within the ASE subnet, there are many ports used for internal component communication and they can change. This requires all of the ports in the ASE subnet to be accessible from the ASE subnet.
6869

69-
For the communication between the Azure load balancer and the ASE subnet the minimum ports that need to be open are 454, 455 and 16001. The 16001 port is used for keep alive traffic between the load balancer and the ASE. If you are using an ILB ASE, then you can lock traffic down to just the 454, 455, 16001 ports. If you are using an External ASE, then you need to take into account the normal app access ports. If you are using app assigned addresses, you need to open it to all ports. When an address is assigned to a specific app, then the load balancer will use ports that are not known of in advance to send HTTP and HTTPS traffic to the ASE.
70+
For the communication between the Azure load balancer and the ASE subnet the minimum ports that need to be open are 454, 455 and 16001. The 16001 port is used for keep alive traffic between the load balancer and the ASE. If you are using an ILB ASE, then you can lock traffic down to just the 454, 455, 16001 ports. If you are using an External ASE, then you need to take into account the normal app access ports.
71+
72+
The other ports you need to concern yourself with are the application ports:
7073

71-
If you are using app assigned IP addresses, you need to allow traffic from the IPs assigned to your apps to the ASE subnet.
74+
| Use | Ports |
75+
|----------|-------------|
76+
| HTTP/HTTPS | 80, 443 |
77+
| FTP/FTPS | 21, 990, 10001-10020 |
78+
| Visual Studio remote debugging | 4020, 4022, 4024 |
79+
| Web Deploy service | 8172 |
7280

73-
The TCP traffic that comes in on ports 454 and 455 must go back out from the same VIP or you will have an asymmetric routing problem.
81+
If you block the application ports, your ASE can still function but your app might not. If you are using app assigned IP addresses with an External ASE, you will need to allow traffic from the IPs assigned to your apps to the ASE subnet on the ports shown in the ASE portal > IP Addresses page.
7482

7583
### ASE outbound dependencies ###
7684

7785
For outbound access, an ASE depends on multiple external systems. Many of those system dependencies are defined with DNS names and don't map to a fixed set of IP addresses. Thus, the ASE requires outbound access from the ASE subnet to all external IPs across a variety of ports.
7886

7987
The ASE communicates out to internet accessible addresses on the following ports:
8088

81-
| Port | Uses |
89+
| Uses | Ports |
8290
|-----|------|
83-
| 53 | DNS |
84-
| 123 | NTP |
85-
| 80/443 | CRL, Windows updates, Linux dependencies, Azure services |
86-
| 1433 | Azure SQL |
87-
| 12000 | Monitoring |
91+
| DNS | 53 |
92+
| NTP | 123 |
93+
| 8CRL, Windows updates, Linux dependencies, Azure services | 80/443 |
94+
| Azure SQL | 1433 |
95+
| Monitoring | 12000 |
8896

8997
The complete list of outbound dependencies are listed in the document that describes [Locking down App Service Environment outbound traffic](./firewall-integration.md). If the ASE loses access to its dependencies, it stops working. When that happens long enough, the ASE is suspended.
9098

@@ -160,12 +168,12 @@ The required entries in an NSG, for an ASE to function, are to allow traffic:
160168

161169
The DNS port does not need to be added as traffic to DNS is not affected by NSG rules. These ports do not include the ports that your apps require for successful use. The normal app access ports are:
162170

163-
| Use | From | To |
164-
|----------|---------|-------------|
165-
| HTTP/HTTPS | User configurable | 80, 443 |
166-
| FTP/FTPS | User configurable | 21, 990, 10001-10020 |
167-
| Visual Studio remote debugging | User configurable | 4020, 4022, 4024 |
168-
| Web Deploy service | User configurable | 8172 |
171+
| Use | Ports |
172+
|----------|-------------|
173+
| HTTP/HTTPS | 80, 443 |
174+
| FTP/FTPS | 21, 990, 10001-10020 |
175+
| Visual Studio remote debugging | 4020, 4022, 4024 |
176+
| Web Deploy service | 8172 |
169177

170178
When the inbound and outbound requirements are taken into account, the NSGs should look similar to the NSGs shown in this example.
171179

0 commit comments

Comments
 (0)