You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/networking.md
+5-6Lines changed: 5 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: App Service Environment networking
3
3
description: App Service Environment networking details
4
4
author: madsd
5
5
ms.topic: overview
6
-
ms.date: 02/17/2022
6
+
ms.date: 08/01/2022
7
7
ms.author: madsd
8
8
---
9
9
@@ -83,6 +83,9 @@ You can put your web application firewall devices, such as Azure Application Gat
83
83
84
84
Your application will use one of the default outbound addresses for egress traffic to public endpoints. If you want to customize the outbound address of your applications on an App Service Environment, you can add a NAT gateway to your subnet.
85
85
86
+
> [!NOTE]
87
+
> Outbound SMTP connectivity (port 25) is supported for App Service Environment v3. However, the supportability is determined by the subscription where the virtual network is deployed. For virtual networks created before 1. August 2022, you will have to re-enable outbound SMTP connectivity support on the subscription. For more information on subscription type support and how to request support to re-enable outbound SMTP connectivity, see [Troubleshoot outbound SMTP connectivity problems in Azure](../../virtual-network/troubleshoot-outbound-smtp-connectivity.md).
88
+
86
89
## Private endpoint
87
90
88
91
In order to enable Private Endpoints for apps hosted in your App Service Environment, you must first enable this feature at the App Service Environment level.
@@ -96,7 +99,6 @@ az appservice ase update --name myasename --allow-new-private-endpoint-connectio
96
99
97
100
For more information about Private Endpoint and Web App, see [Azure Web App Private Endpoint][privateendpoint]
98
101
99
-
100
102
## DNS
101
103
102
104
The following sections describe the DNS considerations and configuration that apply inbound to and outbound from your App Service Environment.
@@ -137,10 +139,7 @@ The apps in your App Service Environment will use the DNS that your virtual netw
137
139
138
140
## Limitations
139
141
140
-
While App Service Environment does deploy into your virtual network, there are a few networking features that aren't available:
141
-
142
-
* Sending SMTP traffic. Although you can still have email-triggered alerts, your app can't send outbound traffic on port 25.
143
-
* Using Azure Network Watcher or NSG flow to monitor outbound traffic.
142
+
While App Service Environment does deploy into your virtual network, you currently cannot use Azure Network Watcher or NSG flow to monitor outbound traffic.
Copy file name to clipboardExpand all lines: articles/app-service/overview-vnet-integration.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Integrate your app with an Azure virtual network
3
3
description: Integrate your app in Azure App Service with Azure virtual networks.
4
4
author: madsd
5
5
ms.topic: conceptual
6
-
ms.date: 06/30/2022
6
+
ms.date: 08/01/2022
7
7
ms.author: madsd
8
8
9
9
---
@@ -86,24 +86,20 @@ Through application routing or configuration routing options, you can configure
86
86
87
87
Application routing applies to traffic that is sent from your app after it has been started. See [configuration routing](#configuration-routing) for traffic during start up. When you configure application routing, you can either route all traffic or only private traffic (also known as [RFC1918](https://datatracker.ietf.org/doc/html/rfc1918#section-3) traffic) into your virtual network. You configure this behavior through the **Route All** setting. If **Route All** is disabled, your app only routes private traffic into your virtual network. If you want to route all your outbound app traffic into your virtual network, make sure that **Route All** is enabled.
88
88
89
-
> [!NOTE]
90
-
> * Only traffic configured in application or configuration routing is subject to the NSGs and UDRs that are applied to your integration subnet.
91
-
> * When **Route All** is enabled, outbound traffic from your app is still sent from the addresses that are listed in your app properties, unless you provide routes that direct the traffic elsewhere.
89
+
* Only traffic configured in application or configuration routing is subject to the NSGs and UDRs that are applied to your integration subnet.
90
+
* When **Route All** is enabled, outbound traffic from your app is still sent from the addresses that are listed in your app properties, unless you provide routes that direct the traffic elsewhere.
92
91
93
92
Learn [how to configure application routing](./configure-vnet-integration-routing.md).
94
93
95
94
We recommend that you use the **Route All** configuration setting to enable routing of all traffic. Using the configuration setting allows you to audit the behavior with [a built-in policy](https://portal.azure.com/#blade/Microsoft_Azure_Policy/PolicyDetailBlade/definitionId/%2Fproviders%2FMicrosoft.Authorization%2FpolicyDefinitions%2F33228571-70a4-4fa1-8ca1-26d0aba8d6ef). The existing `WEBSITE_VNET_ROUTE_ALL` app setting can still be used, and you can enable all traffic routing with either setting.
96
95
96
+
> [!NOTE]
97
+
> Outbound SMTP connectivity (port 25) is supported for App Service when the SMTP traffic is routed through the virtual network integration. The supportability is determined by the subscription where the virtual network is deployed. For virtual networks created before 1. August 2022, you will have to re-enable outbound SMTP connectivity support on the subscription. For more information on subscription type support and how to request support to re-enable outbound SMTP connectivity, see [Troubleshoot outbound SMTP connectivity problems in Azure](../virtual-network/troubleshoot-outbound-smtp-connectivity.md).
98
+
97
99
#### Configuration routing
98
100
99
101
When you are using virtual network integration, you can configure how parts of the configuration traffic is managed. By default, configuration traffic will go directly over the public route, but for the mentioned individual components, you can actively configure it to be routed through the virtual network integration.
100
102
101
-
> [!NOTE]
102
-
> * Windows containers don't support pulling custom container images over virtual network integration.
103
-
> * Backup/restore to private storage accounts is currently not supported.
104
-
> * Configure SSL/TLS certificates from private Key Vaults is currently not supported.
105
-
> * App Service Logs to private storage accounts is currently not supported. We recommend using Diagnostics Logging and allowing Trusted Services for the storage account.
106
-
107
103
##### Content storage
108
104
109
105
Bringing your own storage for content in often used in Functions where [content storage](./../azure-functions/configure-networking-how-to.md#restrict-your-storage-account-to-a-virtual-network) is configured as part of the Functions app.
@@ -118,6 +114,12 @@ When using custom containers for Linux, you can pull the container over the virt
118
114
119
115
App settings using Key Vault references will attempt to get secrets over the public route. If the Key Vault is blocking public traffic and the app is using virtual network integration, an attempt will then be made to get the secrets through the virtual network integration.
120
116
117
+
> [!NOTE]
118
+
> * Windows containers don't support pulling custom container images over virtual network integration.
119
+
> * Backup/restore to private storage accounts is currently not supported.
120
+
> * Configure SSL/TLS certificates from private Key Vaults is currently not supported.
121
+
> * App Service Logs to private storage accounts is currently not supported. We recommend using Diagnostics Logging and allowing Trusted Services for the storage account.
122
+
121
123
#### Network routing
122
124
123
125
You can use route tables to route outbound traffic from your app without restriction. Common destinations can include firewall devices or gateways. You can also use a [network security group](../virtual-network/network-security-groups-overview.md) (NSG) to block outbound traffic to resources in your virtual network or the internet. An NSG that's applied to your integration subnet is in effect regardless of any route tables applied to your integration subnet.
0 commit comments