You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/app-service-app-service-environment-control-inbound-traffic.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,10 +27,10 @@ Before locking down inbound network traffic with a network security group, it is
27
27
28
28
The following is a list of ports used by an App Service Environment. All ports are **TCP**, unless otherwise clearly noted:
29
29
30
-
* 454: **Required port** used by Azure infrastructure for managing and maintaining App Service Environments via SSL. Do not block traffic to this port. This port is always bound to the public VIP of an ASE.
31
-
* 455: **Required port** used by Azure infrastructure for managing and maintaining App Service Environments via SSL. Do not block traffic to this port. This port is always bound to the public VIP of an ASE.
30
+
* 454: **Required port** used by Azure infrastructure for managing and maintaining App Service Environments via TLS. Do not block traffic to this port. This port is always bound to the public VIP of an ASE.
31
+
* 455: **Required port** used by Azure infrastructure for managing and maintaining App Service Environments via TLS. Do not block traffic to this port. This port is always bound to the public VIP of an ASE.
32
32
* 80: Default port for inbound HTTP traffic to apps running in App Service Plans in an App Service Environment. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
33
-
* 443: Default port for inbound SSL traffic to apps running in App Service Plans in an App Service Environment. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
33
+
* 443: Default port for inbound TLS traffic to apps running in App Service Plans in an App Service Environment. On an ILB-enabled ASE, this port is bound to the ILB address of the ASE.
34
34
* 21: Control channel for FTP. This port can be safely blocked if FTP is not being used. On an ILB-enabled ASE, this port can be bound to the ILB address for an ASE.
35
35
* 990: Control channel for FTPS. This port can be safely blocked if FTPS is not being used. On an ILB-enabled ASE, this port can be bound to the ILB address for an ASE.
36
36
* 10001-10020: Data channels for FTP. As with the control channel, these ports can be safely blocked if FTP is not being used. On an ILB-enabled ASE, this port can be bound to the ASE's ILB address.
@@ -58,7 +58,7 @@ The following demonstrates creating a network security group:
58
58
59
59
Once a network security group is created, one or more network security rules are added to it. Since the set of rules may change over time, it is recommended to space out the numbering scheme used for rule priorities to make it easy to insert additional rules over time.
60
60
61
-
The example below shows a rule that explicitly grants access to the management ports needed by the Azure infrastructure to manage and maintain an App Service Environment. Note that all management traffic flows over SSL and is secured by client certificates, so even though the ports are opened they are inaccessible by any entity other than Azure management infrastructure.
61
+
The example below shows a rule that explicitly grants access to the management ports needed by the Azure infrastructure to manage and maintain an App Service Environment. Note that all management traffic flows over TLS and is secured by client certificates, so even though the ports are opened they are inaccessible by any entity other than Azure management infrastructure.
Copy file name to clipboardExpand all lines: articles/app-service/environment/app-service-app-service-environment-create-ilb-ase-resourcemanager.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,8 +24,8 @@ App Service Environments can be created with a virtual network internal address
24
24
There are three steps involved in automating creation of an ILB ASE:
25
25
26
26
1. First the base ASE is created in a virtual network using an internal load balancer address instead of a public VIP. As part of this step, a root domain name is assigned to the ILB ASE.
27
-
2. Once the ILB ASE is created, an SSL certificate is uploaded.
28
-
3. The uploaded SSL certificate is explicitly assigned to the ILB ASE as its "default" SSL certificate. This SSL certificate will be used for SSL traffic to apps on the ILB ASE when the apps are addressed using the common root domain assigned to the ASE (e.g. `https://someapp.mycustomrootcomain.com`)
27
+
2. Once the ILB ASE is created, a TLS/SSL certificate is uploaded.
28
+
3. The uploaded TLS/SSL certificate is explicitly assigned to the ILB ASE as its "default" TLS/SSL certificate. This TLS/SSL certificate will be used for TLS traffic to apps on the ILB ASE when the apps are addressed using the common root domain assigned to the ASE (e.g. `https://someapp.mycustomrootcomain.com`)
29
29
30
30
## Creating the Base ILB ASE
31
31
An example Azure Resource Manager template, and its associated parameters file, are available on GitHub [here][quickstartilbasecreate].
@@ -45,17 +45,17 @@ Once the *azuredeploy.parameters.json* file has been filled in for an ILB ASE, t
45
45
46
46
After the Azure Resource Manager template is submitted it will take a few hours for the ILB ASE to be created. Once the creation completes, the ILB ASE will show up in the portal UX in the list of App Service Environments for the subscription that triggered the deployment.
47
47
48
-
## Uploading and Configuring the "Default" SSL Certificate
49
-
Once the ILB ASE is created, an SSL certificate should be associated with the ASE as the "default" SSL certificate use for establishing SSL connections to apps. Continuing with the hypothetical Contoso Corporation example, if the ASE's default DNS suffix is *internal-contoso.com*, then a connection to *https://some-random-app.internal-contoso.com* requires an SSL certificate that is valid for **.internal-contoso.com*.
48
+
## Uploading and Configuring the "Default" TLS/SSL Certificate
49
+
Once the ILB ASE is created, a TLS/SSL certificate should be associated with the ASE as the "default" TLS/SSL certificate use for establishing TLS/SSL connections to apps. Continuing with the hypothetical Contoso Corporation example, if the ASE's default DNS suffix is *internal-contoso.com*, then a connection to *https://some-random-app.internal-contoso.com* requires a TLS/SSL certificate that is valid for **.internal-contoso.com*.
50
50
51
-
There are a variety of ways to obtain a valid SSL certificate including internal CAs, purchasing a certificate from an external issuer, and using a self-signed certificate. Regardless of the source of the SSL certificate, the following certificate attributes need to be configured properly:
51
+
There are a variety of ways to obtain a valid TLS/SSL certificate including internal CAs, purchasing a certificate from an external issuer, and using a self-signed certificate. Regardless of the source of the TLS/SSL certificate, the following certificate attributes need to be configured properly:
52
52
53
53
**Subject*: This attribute must be set to **.your-root-domain-here.com*
54
-
**Subject Alternative Name*: This attribute must include both **.your-root-domain-here.com*, and **.scm.your-root-domain-here.com*. The reason for the second entry is that SSL connections to the SCM/Kudu site associated with each app will be made using an address of the form *your-app-name.scm.your-root-domain-here.com*.
54
+
**Subject Alternative Name*: This attribute must include both **.your-root-domain-here.com*, and **.scm.your-root-domain-here.com*. The reason for the second entry is that TLS connections to the SCM/Kudu site associated with each app will be made using an address of the form *your-app-name.scm.your-root-domain-here.com*.
55
55
56
-
With a valid SSL certificate in hand, two additional preparatory steps are needed. The SSL certificate needs to be converted/saved as a .pfx file. Remember that the .pfx file needs to include all intermediate and root certificates, and also needs to be secured with a password.
56
+
With a valid TLS/SSL certificate in hand, two additional preparatory steps are needed. The TLS/SSL certificate needs to be converted/saved as a .pfx file. Remember that the .pfx file needs to include all intermediate and root certificates, and also needs to be secured with a password.
57
57
58
-
Then the resultant .pfx file needs to be converted into a base64 string because the SSL certificate will be uploaded using an Azure Resource Manager template. Since Azure Resource Manager templates are text files, the .pfx file needs to be converted into a base64 string so it can be included as a parameter of the template.
58
+
Then the resultant .pfx file needs to be converted into a base64 string because the TLS/SSL certificate will be uploaded using an Azure Resource Manager template. Since Azure Resource Manager templates are text files, the .pfx file needs to be converted into a base64 string so it can be included as a parameter of the template.
59
59
60
60
The Powershell code snippet below shows an example of generating a self-signed certificate, exporting the certificate as a .pfx file, converting the .pfx file into a base64 encoded string, and then saving the base64 encoded string to a separate file. The Powershell code for base64 encoding was adapted from the [Powershell Scripts Blog][examplebase64encoding].
61
61
@@ -71,7 +71,7 @@ The Powershell code snippet below shows an example of generating a self-signed c
Once the SSL certificate has been successfully generated and converted to a base64 encoded string, the example Azure Resource Manager template on GitHub for [configuring the default SSL certificate][configuringDefaultSSLCertificate] can be used.
74
+
Once the TLS/SSL certificate has been successfully generated and converted to a base64 encoded string, the example Azure Resource Manager template on GitHub for [configuring the default TLS/SSL certificate][configuringDefaultSSLCertificate] can be used.
75
75
76
76
The parameters in the *azuredeploy.parameters.json* file are listed below:
77
77
@@ -80,7 +80,7 @@ The parameters in the *azuredeploy.parameters.json* file are listed below:
80
80
**pfxBlobString*: The based64 encoded string representation of the .pfx file. Using the code snippet shown earlier, you would copy the string contained in "exportedcert.pfx.b64" and paste it in as the value of the *pfxBlobString* attribute.
81
81
**password*: The password used to secure the .pfx file.
82
82
**certificateThumbprint*: The certificate's thumbprint. If you retrieve this value from Powershell (e.g. *$certificate.Thumbprint* from the earlier code snippet), you can use the value as-is. However if you copy the value from the Windows certificate dialog, remember to strip out the extraneous spaces. The *certificateThumbprint* should look something like: AF3143EB61D43F6727842115BB7F17BBCECAECAE
83
-
**certificateName*: A friendly string identifier of your own choosing used to identity the certificate. The name is used as part of the unique Azure Resource Manager identifier for the *Microsoft.Web/certificates* entity representing the SSL certificate. The name **must** end with the following suffix: \_yourASENameHere_InternalLoadBalancingASE. This suffix is used by the portal as an indicator that the certificate is used for securing an ILB-enabled ASE.
83
+
**certificateName*: A friendly string identifier of your own choosing used to identity the certificate. The name is used as part of the unique Azure Resource Manager identifier for the *Microsoft.Web/certificates* entity representing the TLS/SSL certificate. The name **must** end with the following suffix: \_yourASENameHere_InternalLoadBalancingASE. This suffix is used by the portal as an indicator that the certificate is used for securing an ILB-enabled ASE.
84
84
85
85
An abbreviated example of *azuredeploy.parameters.json* is shown below:
86
86
@@ -109,7 +109,7 @@ An abbreviated example of *azuredeploy.parameters.json* is shown below:
109
109
}
110
110
}
111
111
112
-
Once the *azuredeploy.parameters.json* file has been filled in, the default SSL certificate can be configured using the following Powershell code snippet. Change the file PATHs to match where the Azure Resource Manager template files are located on your machine. Also remember to supply your own values for the Azure Resource Manager deployment name, and resource group name.
112
+
Once the *azuredeploy.parameters.json* file has been filled in, the default TLS/SSL certificate can be configured using the following Powershell code snippet. Change the file PATHs to match where the Azure Resource Manager template files are located on your machine. Also remember to supply your own values for the Azure Resource Manager deployment name, and resource group name.
113
113
114
114
$templatePath="PATH\azuredeploy.json"
115
115
$parameterPath="PATH\azuredeploy.parameters.json"
@@ -118,9 +118,9 @@ Once the *azuredeploy.parameters.json* file has been filled in, the default SSL
118
118
119
119
After the Azure Resource Manager template is submitted it will take roughly forty minutes per ASE front-end to apply the change. For example, with a default sized ASE using two front-ends, the template will take around one hour and twenty minutes to complete. While the template is running the ASE will not be able to scaled.
120
120
121
-
Once the template completes, apps on the ILB ASE can be accessed over HTTPS and the connections will be secured using the default SSL certificate. The default SSL certificate will be used when apps on the ILB ASE are addressed using a combination of the application name plus the default hostname. For example *https://mycustomapp.internal-contoso.com* would use the default SSL certificate for **.internal-contoso.com*.
121
+
Once the template completes, apps on the ILB ASE can be accessed over HTTPS and the connections will be secured using the default TLS/SSL certificate. The default TLS/SSL certificate will be used when apps on the ILB ASE are addressed using a combination of the application name plus the default hostname. For example *https://mycustomapp.internal-contoso.com* would use the default TLS/SSL certificate for **.internal-contoso.com*.
122
122
123
-
However, just like apps running on the public multi-tenant service, developers can also configure custom host names for individual apps, and then configure unique SNI SSL certificate bindings for individual apps.
123
+
However, just like apps running on the public multi-tenant service, developers can also configure custom host names for individual apps, and then configure unique SNI TLS/SSL certificate bindings for individual apps.
124
124
125
125
## Getting started
126
126
To get started with App Service Environments, see [Introduction to App Service Environment](app-service-app-service-environment-intro.md)
Copy file name to clipboardExpand all lines: articles/app-service/environment/app-service-app-service-environment-network-configuration-expressroute.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ App Service Environment requires the following network connectivity settings to
35
35
36
36
* Outbound network connectivity to the Azure management-plane endpoints (both Azure classic deployment model and Azure Resource Manager endpoints). Connectivity to these endpoints includes the management.core.windows.net and management.azure.com domains.
37
37
38
-
* Outbound network connectivity to the ocsp.msocsp.com, mscrl.microsoft.com, and crl.microsoft.com domains. Connectivity to these domains is needed to support SSL functionality.
38
+
* Outbound network connectivity to the ocsp.msocsp.com, mscrl.microsoft.com, and crl.microsoft.com domains. Connectivity to these domains is needed to support TLS functionality.
39
39
40
40
* The DNS configuration for the virtual network must be able to resolve all endpoints and domains mentioned in this article. If the endpoints can't be resolved, App Service Environment creation fails. Any existing App Service Environment is marked as unhealthy.
Copy file name to clipboardExpand all lines: articles/app-service/environment/app-service-app-service-environment-web-application-firewall.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ Clicking on the **Services** tab lets you configure your WAF for services it is
67
67
![Management Add Services][ManagementAddServices]
68
68
69
69
> [!NOTE]
70
-
> Depending on how your applications are configured and what features are being used in your App Service Environment, you need to forward traffic for TCP ports other than 80 and 443, for example, if you have IP SSL setup for an App Service app. For a list of network ports used in App Service Environments, see [Control Inbound Traffic documentation's](app-service-app-service-environment-control-inbound-traffic.md) Network Ports section.
70
+
> Depending on how your applications are configured and what features are being used in your App Service Environment, you need to forward traffic for TCP ports other than 80 and 443, for example, if you have IP TLS setup for an App Service app. For a list of network ports used in App Service Environments, see [Control Inbound Traffic documentation's](app-service-app-service-environment-control-inbound-traffic.md) Network Ports section.
0 commit comments