You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/networking-features.md
+21-36Lines changed: 21 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: madsd
5
5
6
6
ms.assetid: 5c61eed1-1ad1-4191-9f71-906d610ee5b7
7
7
ms.topic: article
8
-
ms.date: 09/01/2022
8
+
ms.date: 01/23/2023
9
9
ms.author: madsd
10
10
11
11
---
@@ -50,7 +50,7 @@ For any given use case, there might be a few ways to solve the problem. Choosing
50
50
| Expose your app on a private IP in your virtual network | ILB ASE </br> Private endpoints </br> Private IP for inbound traffic on an Application Gateway instance with service endpoints |
51
51
| Protect your app with a web application firewall (WAF) | Application Gateway and ILB ASE </br> Application Gateway with private endpoints </br> Application Gateway with service endpoints </br> Azure Front Door with access restrictions |
52
52
| Load balance traffic to your apps in different regions | Azure Front Door with access restrictions |
53
-
| Load balance traffic in the same region |[Application Gateway with service endpoints][appgwserviceendpoints]|
53
+
| Load balance traffic in the same region |[Application Gateway with service endpoints](./networking/app-gateway-with-service-endpoints.md)|
54
54
55
55
The following outbound use cases suggest how to use App Service networking features to solve outbound access needs for your app:
56
56
@@ -92,7 +92,7 @@ When you use an app-assigned address, your traffic still goes through the same f
92
92
* Support IP-based SSL needs for your app.
93
93
* Set a dedicated address for your app that's not shared.
94
94
95
-
To learn how to set an address on your app, see [Add a TLS/SSL certificate in Azure App Service][appassignedaddress].
95
+
To learn how to set an address on your app, see [Add a TLS/SSL certificate in Azure App Service](./configure-ssl-certificate.md).
96
96
97
97
### Access restrictions
98
98
@@ -109,7 +109,7 @@ This feature allows you to build a list of allow and deny rules that are evaluat
109
109
110
110
Private endpoint is a network interface that connects you privately and securely to your Web App by Azure private link. Private endpoint uses a private IP address from your virtual network, effectively bringing the web app into your virtual network. This feature is only for *inbound* flows to your web app.
111
111
For more information, see
112
-
[Using private endpoints for Azure Web App][privateendpoints].
112
+
[Using private endpoints for Azure Web App](./networking/private-endpoint.md).
113
113
114
114
Some use cases for this feature:
115
115
@@ -127,7 +127,7 @@ App Service Hybrid Connections enables your apps to make *outbound* calls to spe
127
127
128
128
App Service Hybrid Connections is built on the Azure Relay Hybrid Connections capability. App Service uses a specialized form of the feature that only supports making outbound calls from your app to a TCP host and port. This host and port only need to resolve on the host where Hybrid Connection Manager is installed.
129
129
130
-
When the app, in App Service, does a DNS lookup on the host and port defined in your hybrid connection, the traffic automatically redirects to go through the hybrid connection and out of Hybrid Connection Manager. To learn more, see [App Service Hybrid Connections][hybridconn].
130
+
When the app, in App Service, does a DNS lookup on the host and port defined in your hybrid connection, the traffic automatically redirects to go through the hybrid connection and out of Hybrid Connection Manager. To learn more, see [App Service Hybrid Connections](./app-service-hybrid-connections.md).
131
131
132
132
This feature is commonly used to:
133
133
@@ -143,23 +143,11 @@ App Service Hybrid Connections is unaware of what you're doing on top of it. So
143
143
144
144
Hybrid Connections is popular for development, but it's also used in production applications. It's great for accessing a web service or database, but it's not appropriate for situations that involve creating many connections.
Gateway-required App Service virtual network integration enables your app to make *outbound* requests into an Azure virtual network. The feature works by connecting the host your app is running on to a Virtual Network gateway on your virtual network by using a point-to-site VPN. When you configure the feature, your app gets one of the point-to-site addresses assigned to each instance. This feature enables you to access resources in either classic or Azure Resource Manager virtual networks in any region.
148
+
App Service virtual network integration enables your app to make *outbound* requests into an Azure virtual network.
149
149
150
-

151
-
152
-
This feature solves the problem of accessing resources in other virtual networks. It can even be used to connect through a virtual network to either other virtual networks or on-premises. It doesn't work with ExpressRoute-connected virtual networks, but it does work with site-to-site VPN-connected networks. It's inappropriate to use this feature from an app in an App Service Environment (ASE) because the ASE is already in your virtual network. Use cases for this feature:
153
-
154
-
* Access resources in cross region virtual networks that aren't peered to a virtual network in the region.
155
-
156
-
When this feature is enabled, your app will use the DNS server that the destination virtual network is configured with. For more information on this feature, see [App Service virtual network integration][vnetintegrationp2s].
Gateway-required virtual network integration is useful, but it doesn't solve the problem of accessing resources across ExpressRoute. On top of needing to reach across ExpressRoute connections, there's a need for apps to be able to make calls to services secured by service endpoint. Another virtual network integration capability can meet these needs.
161
-
162
-
The regional virtual network integration feature enables you to place the back end of your app in a subnet in a Resource Manager virtual network in the same region as your app. This feature isn't available from an App Service Environment, which is already in a virtual network. Use cases for this feature:
150
+
The virtual network integration feature enables you to place the back end of your app in a subnet in a Resource Manager virtual network. The virtual network must be in the same region as your app. This feature isn't available from an App Service Environment, which is already in a virtual network. Use cases for this feature:
163
151
164
152
* Access resources in Resource Manager virtual networks in the same region.
165
153
* Access resources in peered virtual networks, including cross region connections.
@@ -171,7 +159,15 @@ The regional virtual network integration feature enables you to place the back e
171
159
172
160

173
161
174
-
To learn more, see [App Service virtual network integration][vnetintegration].
162
+
To learn more, see [App Service virtual network integration](./overview-vnet-integration.md).
163
+
164
+
#### Gateway-required virtual network integration
165
+
166
+
Gateway-required virtual network integration was the first edition of virtual network integration in App Service. The feature works by connecting the host your app is running on to a Virtual Network gateway on your virtual network by using a point-to-site VPN. When you configure the feature, your app gets one of the point-to-site assigned addresses assigned to each instance.
167
+
168
+

169
+
170
+
Gateway required integration allows you to connect directly to a virtual network in another region without peering and to connect to a classic virtual network. The feature is limited to App Service Windows plans and doesn't work with ExpressRoute-connected virtual networks. It's recommended to use the regional virtual network integration. For more information on this feature, see [App Service virtual network integration](./configure-gateway-required-vnet-integration.md).
175
171
176
172
### App Service Environment
177
173
@@ -198,15 +194,15 @@ Some things aren't currently possible from the multi-tenant service but are poss
198
194
199
195
The ASE provides the best story around isolated and dedicated app hosting, but it does involve some management challenges. Some things to consider before you use an operational ASE:
200
196
201
-
* An ASE runs inside your virtual network, but it does have dependencies outside the virtual network. Those dependencies must be allowed. For more information, see [Networking considerations for an App Service Environment][networkinfo].
197
+
* An ASE runs inside your virtual network, but it does have dependencies outside the virtual network. Those dependencies must be allowed. For more information, see [Networking considerations for an App Service Environment](./environment/network-info.md).
202
198
* An ASE doesn't scale immediately like the multi-tenant service. You need to anticipate scaling needs rather than reactively scaling.
203
199
* An ASE does have a higher up-front cost. To get the most out of your ASE, you should plan to put many workloads into one ASE rather than using it for small efforts.
204
200
* The apps in an ASE can't selectively restrict access to some apps in the ASE and not others.
205
201
* An ASE is in a subnet, and any networking rules apply to all the traffic to and from that ASE. If you want to assign inbound traffic rules for just one app, use access restrictions.
206
202
207
203
## Combining features
208
204
209
-
The features noted for the multi-tenant service can be used together to solve more elaborate use cases. Two of the more common use cases are described here, but they're just examples. By understanding what the various features do, you can meet nearly all your system architecture needs.
205
+
The features noted for the multi-tenant service can be used together to solve more elaborate use cases. Two of the more common use cases are described here, but that's just examples. By understanding what the various features do, you can meet nearly all your system architecture needs.
210
206
211
207
### Place an app into a virtual network
212
208
@@ -251,7 +247,7 @@ Line-of-business (LOB) applications are internal applications that aren't normal
251
247
252
248
If neither of these needs apply, you're better off using private endpoints. With private endpoints available in App Service, you can expose your apps on private addresses in your virtual network. The private endpoint you place in your virtual network can be reached across ExpressRoute and VPN connections.
253
249
254
-
Configuring private endpoints will expose your apps on a private address, but you'll need to configure DNS to reach that address from on-premises. To make this configuration work, you'll need to forward the Azure DNS private zone that contains your private endpoints to your on-premises DNS servers. Azure DNS private zones don't support zone forwarding, but you can support zone forwarding by using a DNS server for that purpose. The [DNS Forwarder](https://azure.microsoft.com/resources/templates/dns-forwarder/) template makes it easier to forward your Azure DNS private zone to your on-premises DNS servers.
250
+
Configuring private endpoints will expose your apps on a private address, but you'll need to configure DNS to reach that address from on-premises. To make this configuration work, you'll need to forward the Azure DNS private zone that contains your private endpoints to your on-premises DNS servers. Azure DNS private zones don't support zone forwarding, but you can support zone forwarding by using [Azure DNS private resolver](../dns/dns-private-resolver-overview.md).
255
251
256
252
## App Service ports
257
253
@@ -264,15 +260,4 @@ If you scan App Service, you'll find several ports that are exposed for inbound
264
260
| FTP/FTPS | 21, 990, 10001-10300 |
265
261
| Visual Studio remote debugging | 4020, 4022, 4024 |
0 commit comments