Skip to content

Commit 3272f5f

Browse files
authored
Merge pull request #205946 from madsd/port25
Port 25 support
2 parents 979c5a8 + 9a8e7dd commit 3272f5f

File tree

2 files changed

+17
-16
lines changed

2 files changed

+17
-16
lines changed

articles/app-service/environment/networking.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: App Service Environment networking
33
description: App Service Environment networking details
44
author: madsd
55
ms.topic: overview
6-
ms.date: 02/17/2022
6+
ms.date: 08/01/2022
77
ms.author: madsd
88
---
99

@@ -83,6 +83,9 @@ You can put your web application firewall devices, such as Azure Application Gat
8383

8484
Your application will use one of the default outbound addresses for egress traffic to public endpoints. If you want to customize the outbound address of your applications on an App Service Environment, you can add a NAT gateway to your subnet.
8585

86+
> [!NOTE]
87+
> Outbound SMTP connectivity (port 25) is supported for App Service Environment v3. However, the supportability is determined by the subscription where the virtual network is deployed. For virtual networks created before 1. August 2022, you will have to re-enable outbound SMTP connectivity support on the subscription. For more information on subscription type support and how to request support to re-enable outbound SMTP connectivity, see [Troubleshoot outbound SMTP connectivity problems in Azure](../../virtual-network/troubleshoot-outbound-smtp-connectivity.md).
88+
8689
## Private endpoint
8790

8891
In order to enable Private Endpoints for apps hosted in your App Service Environment, you must first enable this feature at the App Service Environment level.
@@ -96,7 +99,6 @@ az appservice ase update --name myasename --allow-new-private-endpoint-connectio
9699

97100
For more information about Private Endpoint and Web App, see [Azure Web App Private Endpoint][privateendpoint]
98101

99-
100102
## DNS
101103

102104
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment.
@@ -137,10 +139,7 @@ The apps in your App Service Environment will use the DNS that your virtual netw
137139

138140
## Limitations
139141

140-
While App Service Environment does deploy into your virtual network, there are a few networking features that aren't available:
141-
142-
* Sending SMTP traffic. Although you can still have email-triggered alerts, your app can't send outbound traffic on port 25.
143-
* Using Azure Network Watcher or NSG flow to monitor outbound traffic.
142+
While App Service Environment does deploy into your virtual network, you currently cannot use Azure Network Watcher or NSG flow to monitor outbound traffic.
144143

145144
## More resources
146145

articles/app-service/overview-vnet-integration.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Integrate your app with an Azure virtual network
33
description: Integrate your app in Azure App Service with Azure virtual networks.
44
author: madsd
55
ms.topic: conceptual
6-
ms.date: 06/30/2022
6+
ms.date: 08/01/2022
77
ms.author: madsd
88

99
---
@@ -86,24 +86,20 @@ Through application routing or configuration routing options, you can configure
8686

8787
Application routing applies to traffic that is sent from your app after it has been started. See [configuration routing](#configuration-routing) for traffic during start up. When you configure application routing, you can either route all traffic or only private traffic (also known as [RFC1918](https://datatracker.ietf.org/doc/html/rfc1918#section-3) traffic) into your virtual network. You configure this behavior through the **Route All** setting. If **Route All** is disabled, your app only routes private traffic into your virtual network. If you want to route all your outbound app traffic into your virtual network, make sure that **Route All** is enabled.
8888

89-
> [!NOTE]
90-
> * Only traffic configured in application or configuration routing is subject to the NSGs and UDRs that are applied to your integration subnet.
91-
> * When **Route All** is enabled, outbound traffic from your app is still sent from the addresses that are listed in your app properties, unless you provide routes that direct the traffic elsewhere.
89+
* Only traffic configured in application or configuration routing is subject to the NSGs and UDRs that are applied to your integration subnet.
90+
* When **Route All** is enabled, outbound traffic from your app is still sent from the addresses that are listed in your app properties, unless you provide routes that direct the traffic elsewhere.
9291

9392
Learn [how to configure application routing](./configure-vnet-integration-routing.md).
9493

9594
We recommend that you use the **Route All** configuration setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F33228571-70a4-4fa1-8ca1-26d0aba8d6ef). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
9695

96+
> [!NOTE]
97+
> Outbound SMTP connectivity (port 25) is supported for App Service when the SMTP traffic is routed through the virtual network integration. The supportability is determined by the subscription where the virtual network is deployed. For virtual networks created before 1. August 2022, you will have to re-enable outbound SMTP connectivity support on the subscription. For more information on subscription type support and how to request support to re-enable outbound SMTP connectivity, see [Troubleshoot outbound SMTP connectivity problems in Azure](../virtual-network/troubleshoot-outbound-smtp-connectivity.md).
98+
9799
#### Configuration routing
98100

99101
When you are using virtual network integration, you can configure how parts of the configuration traffic is managed. By default, configuration traffic will go directly over the public route, but for the mentioned individual components, you can actively configure it to be routed through the virtual network integration.
100102

101-
> [!NOTE]
102-
> * Windows containers don't support pulling custom container images over virtual network integration.
103-
> * Backup/restore to private storage accounts is currently not supported.
104-
> * Configure SSL/TLS certificates from private Key Vaults is currently not supported.
105-
> * App Service Logs to private storage accounts is currently not supported. We recommend using Diagnostics Logging and allowing Trusted Services for the storage account.
106-
107103
##### Content storage
108104

109105
Bringing your own storage for content in often used in Functions where [content storage](./../azure-functions/configure-networking-how-to.md#restrict-your-storage-account-to-a-virtual-network) is configured as part of the Functions app.
@@ -118,6 +114,12 @@ When using custom containers for Linux, you can pull the container over the virt
118114

119115
App settings using Key Vault references will attempt to get secrets over the public route. If the Key Vault is blocking public traffic and the app is using virtual network integration, an attempt will then be made to get the secrets through the virtual network integration.
120116

117+
> [!NOTE]
118+
> * Windows containers don't support pulling custom container images over virtual network integration.
119+
> * Backup/restore to private storage accounts is currently not supported.
120+
> * Configure SSL/TLS certificates from private Key Vaults is currently not supported.
121+
> * App Service Logs to private storage accounts is currently not supported. We recommend using Diagnostics Logging and allowing Trusted Services for the storage account.
122+
121123
#### Network routing
122124

123125
You can use route tables to route outbound traffic from your app without restriction. Common destinations can include firewall devices or gateways. You can also use a [network security group](../virtual-network/network-security-groups-overview.md) (NSG) to block outbound traffic to resources in your virtual network or the internet. An NSG that's applied to your integration subnet is in effect regardless of any route tables applied to your integration subnet.

0 commit comments

Comments
 (0)