Skip to content

Commit 47c10bc

Browse files
Merge pull request #281253 from seligj95/networkchanges
add nsg note
2 parents 2458a81 + a72cfb4 commit 47c10bc

File tree

1 file changed

+7
-1
lines changed

1 file changed

+7
-1
lines changed

articles/app-service/environment/networking.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: App Service Environment networking
33
description: App Service Environment networking details
44
author: madsd
55
ms.topic: overview
6-
ms.date: 04/23/2024
6+
ms.date: 07/18/2024
77
ms.author: madsd
88
---
99

@@ -74,6 +74,10 @@ You can bring your own inbound address to your App Service Environment. If you c
7474

7575
For your app to receive traffic, ensure that inbound network security group (NSG) rules allow the App Service Environment subnet to receive traffic from the required ports. In addition to any ports, you'd like to receive traffic on, you should ensure that Azure Load Balancer is able to connect to the subnet on port 80. This port is used for health checks of the internal virtual machine. You can still control port 80 traffic from the virtual network to your subnet.
7676

77+
> [!NOTE]
78+
> Changes to NSG rules can take up to 14 days to take effect due to HTTP connection persistence. If you make a change that blocks platform/management traffic, it could take up to 14 days for the impact to be seen.
79+
>
80+
7781
It's a good idea to configure the following inbound NSG rule:
7882

7983
|Source / Destination Port(s)|Direction|Source|Destination|Purpose|
@@ -87,6 +91,7 @@ The minimal requirement for App Service Environment to be operational is:
8791
|* / 80|Inbound|AzureLoadBalancer|App Service Environment subnet range|Allow internal health ping traffic|
8892

8993
If you use the minimum required rule, you might need one or more rules for your application traffic. If you're using any of the deployment or debugging options, you must also allow this traffic to the App Service Environment subnet. The source of these rules can be the virtual network, or one or more specific client IPs or IP ranges. The destination is always the App Service Environment subnet range.
94+
9095
The internal health ping traffic on port 80 is isolated between the Load balancer and the internal servers. No outside traffic can reach the health ping endpoint.
9196

9297
The normal app access ports inbound are as follows:
@@ -100,6 +105,7 @@ The normal app access ports inbound are as follows:
100105

101106
> [!NOTE]
102107
> For FTP access, even if you want to disallow standard FTP on port 21, you still need to allow traffic from the LoadBalancer to the App Service Environment subnet range on port 21, as this is used for internal health ping traffic for the ftp service specifically.
108+
>
103109
104110
## Network routing
105111

0 commit comments

Comments
 (0)