Skip to content

Commit 3c8a666

Browse files
authored
Merge pull request #224674 from madsd/vnetoverview
vnet overview change
2 parents 7fc99fd + 409c8e9 commit 3c8a666

File tree

1 file changed

+21
-36
lines changed

1 file changed

+21
-36
lines changed

articles/app-service/networking-features.md

Lines changed: 21 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: madsd
55

66
ms.assetid: 5c61eed1-1ad1-4191-9f71-906d610ee5b7
77
ms.topic: article
8-
ms.date: 09/01/2022
8+
ms.date: 01/23/2023
99
ms.author: madsd
1010

1111
---
@@ -50,7 +50,7 @@ For any given use case, there might be a few ways to solve the problem. Choosing
5050
| Expose your app on a private IP in your virtual network | ILB ASE </br> Private endpoints </br> Private IP for inbound traffic on an Application Gateway instance with service endpoints |
5151
| Protect your app with a web application firewall (WAF) | Application Gateway and ILB ASE </br> Application Gateway with private endpoints </br> Application Gateway with service endpoints </br> Azure Front Door with access restrictions |
5252
| Load balance traffic to your apps in different regions | Azure Front Door with access restrictions |
53-
| Load balance traffic in the same region | [Application Gateway with service endpoints][appgwserviceendpoints] |
53+
| Load balance traffic in the same region | [Application Gateway with service endpoints](./networking/app-gateway-with-service-endpoints.md) |
5454

5555
The following outbound use cases suggest how to use App Service networking features to solve outbound access needs for your app:
5656

@@ -92,7 +92,7 @@ When you use an app-assigned address, your traffic still goes through the same f
9292
* Support IP-based SSL needs for your app.
9393
* Set a dedicated address for your app that's not shared.
9494

95-
To learn how to set an address on your app, see [Add a TLS/SSL certificate in Azure App Service][appassignedaddress].
95+
To learn how to set an address on your app, see [Add a TLS/SSL certificate in Azure App Service](./configure-ssl-certificate.md).
9696

9797
### Access restrictions
9898

@@ -109,7 +109,7 @@ This feature allows you to build a list of allow and deny rules that are evaluat
109109

110110
Private endpoint is a network interface that connects you privately and securely to your Web App by Azure private link. Private endpoint uses a private IP address from your virtual network, effectively bringing the web app into your virtual network. This feature is only for *inbound* flows to your web app.
111111
For more information, see
112-
[Using private endpoints for Azure Web App][privateendpoints].
112+
[Using private endpoints for Azure Web App](./networking/private-endpoint.md).
113113

114114
Some use cases for this feature:
115115

@@ -127,7 +127,7 @@ App Service Hybrid Connections enables your apps to make *outbound* calls to spe
127127

128128
App Service Hybrid Connections is built on the Azure Relay Hybrid Connections capability. App Service uses a specialized form of the feature that only supports making outbound calls from your app to a TCP host and port. This host and port only need to resolve on the host where Hybrid Connection Manager is installed.
129129

130-
When the app, in App Service, does a DNS lookup on the host and port defined in your hybrid connection, the traffic automatically redirects to go through the hybrid connection and out of Hybrid Connection Manager. To learn more, see [App Service Hybrid Connections][hybridconn].
130+
When the app, in App Service, does a DNS lookup on the host and port defined in your hybrid connection, the traffic automatically redirects to go through the hybrid connection and out of Hybrid Connection Manager. To learn more, see [App Service Hybrid Connections](./app-service-hybrid-connections.md).
131131

132132
This feature is commonly used to:
133133

@@ -143,23 +143,11 @@ App Service Hybrid Connections is unaware of what you're doing on top of it. So
143143

144144
Hybrid Connections is popular for development, but it's also used in production applications. It's great for accessing a web service or database, but it's not appropriate for situations that involve creating many connections.
145145

146-
### Gateway-required virtual network integration
146+
### <a id="regional-vnet-integration"></a>Virtual network integration
147147

148-
Gateway-required App Service virtual network integration enables your app to make *outbound* requests into an Azure virtual network. The feature works by connecting the host your app is running on to a Virtual Network gateway on your virtual network by using a point-to-site VPN. When you configure the feature, your app gets one of the point-to-site addresses assigned to each instance. This feature enables you to access resources in either classic or Azure Resource Manager virtual networks in any region.
148+
App Service virtual network integration enables your app to make *outbound* requests into an Azure virtual network.
149149

150-
![Diagram that illustrates gateway-required virtual network integration.](media/networking-features/gw-vnet-integration.png)
151-
152-
This feature solves the problem of accessing resources in other virtual networks. It can even be used to connect through a virtual network to either other virtual networks or on-premises. It doesn't work with ExpressRoute-connected virtual networks, but it does work with site-to-site VPN-connected networks. It's inappropriate to use this feature from an app in an App Service Environment (ASE) because the ASE is already in your virtual network. Use cases for this feature:
153-
154-
* Access resources in cross region virtual networks that aren't peered to a virtual network in the region.
155-
156-
When this feature is enabled, your app will use the DNS server that the destination virtual network is configured with. For more information on this feature, see [App Service virtual network integration][vnetintegrationp2s].
157-
158-
### <a id="regional-vnet-integration"></a>Regional virtual network integration
159-
160-
Gateway-required virtual network integration is useful, but it doesn't solve the problem of accessing resources across ExpressRoute. On top of needing to reach across ExpressRoute connections, there's a need for apps to be able to make calls to services secured by service endpoint. Another virtual network integration capability can meet these needs.
161-
162-
The regional virtual network integration feature enables you to place the back end of your app in a subnet in a Resource Manager virtual network in the same region as your app. This feature isn't available from an App Service Environment, which is already in a virtual network. Use cases for this feature:
150+
The virtual network integration feature enables you to place the back end of your app in a subnet in a Resource Manager virtual network. The virtual network must be in the same region as your app. This feature isn't available from an App Service Environment, which is already in a virtual network. Use cases for this feature:
163151

164152
* Access resources in Resource Manager virtual networks in the same region.
165153
* Access resources in peered virtual networks, including cross region connections.
@@ -171,7 +159,15 @@ The regional virtual network integration feature enables you to place the back e
171159

172160
![Diagram that illustrates virtual network integration.](media/networking-features/vnet-integration.png)
173161

174-
To learn more, see [App Service virtual network integration][vnetintegration].
162+
To learn more, see [App Service virtual network integration](./overview-vnet-integration.md).
163+
164+
#### Gateway-required virtual network integration
165+
166+
Gateway-required virtual network integration was the first edition of virtual network integration in App Service. The feature works by connecting the host your app is running on to a Virtual Network gateway on your virtual network by using a point-to-site VPN. When you configure the feature, your app gets one of the point-to-site assigned addresses assigned to each instance.
167+
168+
![Diagram that illustrates gateway-required virtual network integration.](media/networking-features/gw-vnet-integration.png)
169+
170+
Gateway required integration allows you to connect directly to a virtual network in another region without peering and to connect to a classic virtual network. The feature is limited to App Service Windows plans and doesn't work with ExpressRoute-connected virtual networks. It's recommended to use the regional virtual network integration. For more information on this feature, see [App Service virtual network integration](./configure-gateway-required-vnet-integration.md).
175171

176172
### App Service Environment
177173

@@ -198,15 +194,15 @@ Some things aren't currently possible from the multi-tenant service but are poss
198194

199195
The ASE provides the best story around isolated and dedicated app hosting, but it does involve some management challenges. Some things to consider before you use an operational ASE:
200196

201-
* An ASE runs inside your virtual network, but it does have dependencies outside the virtual network. Those dependencies must be allowed. For more information, see [Networking considerations for an App Service Environment][networkinfo].
197+
* An ASE runs inside your virtual network, but it does have dependencies outside the virtual network. Those dependencies must be allowed. For more information, see [Networking considerations for an App Service Environment](./environment/network-info.md).
202198
* An ASE doesn't scale immediately like the multi-tenant service. You need to anticipate scaling needs rather than reactively scaling.
203199
* An ASE does have a higher up-front cost. To get the most out of your ASE, you should plan to put many workloads into one ASE rather than using it for small efforts.
204200
* The apps in an ASE can't selectively restrict access to some apps in the ASE and not others.
205201
* An ASE is in a subnet, and any networking rules apply to all the traffic to and from that ASE. If you want to assign inbound traffic rules for just one app, use access restrictions.
206202

207203
## Combining features
208204

209-
The features noted for the multi-tenant service can be used together to solve more elaborate use cases. Two of the more common use cases are described here, but they're just examples. By understanding what the various features do, you can meet nearly all your system architecture needs.
205+
The features noted for the multi-tenant service can be used together to solve more elaborate use cases. Two of the more common use cases are described here, but that's just examples. By understanding what the various features do, you can meet nearly all your system architecture needs.
210206

211207
### Place an app into a virtual network
212208

@@ -251,7 +247,7 @@ Line-of-business (LOB) applications are internal applications that aren't normal
251247

252248
If neither of these needs apply, you're better off using private endpoints. With private endpoints available in App Service, you can expose your apps on private addresses in your virtual network. The private endpoint you place in your virtual network can be reached across ExpressRoute and VPN connections.
253249

254-
Configuring private endpoints will expose your apps on a private address, but you'll need to configure DNS to reach that address from on-premises. To make this configuration work, you'll need to forward the Azure DNS private zone that contains your private endpoints to your on-premises DNS servers. Azure DNS private zones don't support zone forwarding, but you can support zone forwarding by using a DNS server for that purpose. The [DNS Forwarder](https://azure.microsoft.com/resources/templates/dns-forwarder/) template makes it easier to forward your Azure DNS private zone to your on-premises DNS servers.
250+
Configuring private endpoints will expose your apps on a private address, but you'll need to configure DNS to reach that address from on-premises. To make this configuration work, you'll need to forward the Azure DNS private zone that contains your private endpoints to your on-premises DNS servers. Azure DNS private zones don't support zone forwarding, but you can support zone forwarding by using [Azure DNS private resolver](../dns/dns-private-resolver-overview.md).
255251

256252
## App Service ports
257253

@@ -264,15 +260,4 @@ If you scan App Service, you'll find several ports that are exposed for inbound
264260
| FTP/FTPS | 21, 990, 10001-10300 |
265261
| Visual Studio remote debugging | 4020, 4022, 4024 |
266262
| Web Deploy service | 8172 |
267-
| Infrastructure use | 7654, 1221 |
268-
269-
<!--Links-->
270-
[appassignedaddress]: ./configure-ssl-certificate.md
271-
[serviceendpoints]: ./app-service-ip-restrictions.md
272-
[hybridconn]: ./app-service-hybrid-connections.md
273-
[vnetintegrationp2s]: ./overview-vnet-integration.md
274-
[vnetintegration]: ./overview-vnet-integration.md
275-
[networkinfo]: ./environment/network-info.md
276-
[appgwserviceendpoints]: ./networking/app-gateway-with-service-endpoints.md
277-
[privateendpoints]: ./networking/private-endpoint.md
278-
[servicetags]: ../virtual-network/service-tags-overview.md
263+
| Infrastructure use | 7654, 1221 |

0 commit comments

Comments
 (0)