You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The inbound management traffic provides command and control of the ASE in addition to system monitoring. The source addresses for this traffic are listed in the [ASE Management addresses][ASEManagement] document. The network security configuration needs to allow access from all IPs on ports 454 and 455. If you block access from those addresses, your ASE will become unhealthy and then become suspended.
64
+
There are 2 other ports that can show as open on a port scan, 7654 and 1221. They reply with an IP address and nothing more. They can be blocked if desired.
65
+
66
+
The inbound management traffic provides command and control of the ASE in addition to system monitoring. The source addresses for this traffic are listed in the [ASE Management addresses][ASEManagement] document. The network security configuration needs to allow access from the ASE management addresses on ports 454 and 455. If you block access from those addresses, your ASE will become unhealthy and then become suspended. The TCP traffic that comes in on ports 454 and 455 must go back out from the same VIP or you will have an asymmetric routing problem.
66
67
67
68
Within the ASE subnet, there are many ports used for internal component communication and they can change. This requires all of the ports in the ASE subnet to be accessible from the ASE subnet.
68
69
69
-
For the communication between the Azure load balancer and the ASE subnet the minimum ports that need to be open are 454, 455 and 16001. The 16001 port is used for keep alive traffic between the load balancer and the ASE. If you are using an ILB ASE, then you can lock traffic down to just the 454, 455, 16001 ports. If you are using an External ASE, then you need to take into account the normal app access ports. If you are using app assigned addresses, you need to open it to all ports. When an address is assigned to a specific app, then the load balancer will use ports that are not known of in advance to send HTTP and HTTPS traffic to the ASE.
70
+
For the communication between the Azure load balancer and the ASE subnet the minimum ports that need to be open are 454, 455 and 16001. The 16001 port is used for keep alive traffic between the load balancer and the ASE. If you are using an ILB ASE, then you can lock traffic down to just the 454, 455, 16001 ports. If you are using an External ASE, then you need to take into account the normal app access ports.
71
+
72
+
The other ports you need to concern yourself with are the application ports:
70
73
71
-
If you are using app assigned IP addresses, you need to allow traffic from the IPs assigned to your apps to the ASE subnet.
74
+
| Use | Ports |
75
+
|----------|-------------|
76
+
| HTTP/HTTPS | 80, 443 |
77
+
| FTP/FTPS | 21, 990, 10001-10020 |
78
+
| Visual Studio remote debugging | 4020, 4022, 4024 |
79
+
| Web Deploy service | 8172 |
72
80
73
-
The TCP traffic that comes in on ports 454 and 455 must go back out from the same VIP or you will have an asymmetric routing problem.
81
+
If you block the application ports, your ASE can still function but your app might not. If you are using app assigned IP addresses with an External ASE, you will need to allow traffic from the IPs assigned to your apps to the ASE subnet on the ports shown in the ASE portal > IP Addresses page.
74
82
75
83
### ASE outbound dependencies ###
76
84
77
85
For outbound access, an ASE depends on multiple external systems. Many of those system dependencies are defined with DNS names and don't map to a fixed set of IP addresses. Thus, the ASE requires outbound access from the ASE subnet to all external IPs across a variety of ports.
78
86
79
87
The ASE communicates out to internet accessible addresses on the following ports:
80
88
81
-
|Port|Uses|
89
+
|Uses|Ports|
82
90
|-----|------|
83
-
|53|DNS|
84
-
|123|NTP|
85
-
|80/443 | CRL, Windows updates, Linux dependencies, Azure services |
86
-
|1433 |Azure SQL |
87
-
|12000|Monitoring|
91
+
|DNS|53|
92
+
|NTP|123|
93
+
|8CRL, Windows updates, Linux dependencies, Azure services| 80/443|
94
+
| Azure SQL| 1433|
95
+
|Monitoring|12000|
88
96
89
97
The complete list of outbound dependencies are listed in the document that describes [Locking down App Service Environment outbound traffic](./firewall-integration.md). If the ASE loses access to its dependencies, it stops working. When that happens long enough, the ASE is suspended.
90
98
@@ -160,12 +168,12 @@ The required entries in an NSG, for an ASE to function, are to allow traffic:
160
168
161
169
The DNS port does not need to be added as traffic to DNS is not affected by NSG rules. These ports do not include the ports that your apps require for successful use. The normal app access ports are:
0 commit comments