You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Use DISA CAP to connect to Azure Government
2
+
title: ASE deployment with DISA CAP
3
3
description: This document provides a comparison of features and guidance on developing applications for Azure Government
4
4
services: azure-government
5
5
cloud: gov
@@ -18,53 +18,61 @@ ms.author: joscot
18
18
19
19
---
20
20
21
-
# App Service Environment reference for DoD customers using a DISA CAP connection
21
+
# App Service Environment reference for DoD customers connected to the DISA CAP
22
22
23
23
This article explains the baseline configuration of an App Service Environment (ASE) with an internal load balancer (ILB) for customers who use the DISA CAP to connect to Azure Government.
24
24
25
25
## Environment configuration
26
26
27
27
### Assumptions
28
28
29
-
The customer has deployed an ASE with an ILB and has implemented an ExpressRoute connection via the DISA Cloud Access Point (CAP) process.
29
+
The customer has deployed an ASE with an ILB and has implemented an ExpressRoute connection to the DISA Cloud Access Point (CAP).
30
30
31
31
### Route table
32
32
33
-
When creating the ASE via the portal, a route table with a default route of 0.0.0.0/0 and next hop “Internet” is created. However, the DISA BGP routes will advertise for 0.0.0.0/0 and this route table should be removed from the ASE subnet.
33
+
When creating the ASE via the portal, a route table with a default route of 0.0.0.0/0 and next hop “Internet” is created.
34
+
However, since DISA advertises a default route out the ExpressRoute circuit, the User Defined Route (UDR) should either be deleted, or remove the default route to internet.
34
35
35
-
### Network security group (NSG)
36
-
37
-
The ASE will be created with inbound and outbound security rules as shown below. The inbound security rules MUST allow ports 454-455 with an ephemeral source port range (*). Source IPs must include the following Azure Government ranges see [App Service Environment management addresses](https://docs.microsoft.com/azure/app-service/environment/management-addresses
36
+
You will need to create new routes in the UDR for the management addresses in order to keep the ASE healthy. For Azure Government ranges see [App Service Environment management addresses](https://docs.microsoft.com/azure/app-service/environment/management-addresses
38
37
)
39
38
40
-
* 23.97.29.209
41
-
* 23.97.0.17
42
-
* 23.97.16.184
43
-
* 13.72.180.105
44
-
* 13.72.53.37
39
+
Rule 1: 23.97.29.209 --> Internet
40
+
Rule 2: 23.97.0.17 --> Internet
41
+
Rule 3: 23.97.16.184 --> Internet
42
+
Rule 4: 13.72.180.105 --> Internet
43
+
Rule 5: 13.72.53.37 --> Internet
44
+
45
+
Make sure the UDR is applied to the subnet your ASE is deployed to.
46
+
47
+
### Network security group (NSG)
45
48
46
-
#### Default NSG security rules
49
+
The ASE will be created with inbound and outbound security rules as shown below. The inbound security rules MUST allow ports 454-455 with an ephemeral source port range (*).
47
50
48
51
The images below describe the default NSG rules created during the ASE creation. For more information, see [Networking considerations for an App Service Environment](https://docs.microsoft.com/azure/app-service/environment/network-info#network-security-groups)
49
52
50
53

51
54
52
55

53
56
57
+
### Service Endpoints
58
+
59
+
Depending what storage you are using you will be required to enable Service Endpoints for SQL and Azure Storage to access them without going back down to the DISA BCAP. You also need to enable EventHub Service Endpoint for ASE logs.
60
+
54
61
## FAQs
55
62
56
-
* Some configuration changes may take some time to take effect. Allow for several hours for changes to routing, NSGs, ASE Health, etc. to propagate and take effect.
63
+
* Some configuration changes may take some time to take effect. Allow for several hours for changes to routing, NSGs, ASE Health, etc. to propagate and take effect, or optionally you can reboot the ASE.
57
64
58
65
## Resource manager template sample
59
66
60
67
> [!NOTE]
61
-
>The Azure Portal will not allow the ASE to be configured with non-RFC 1918 IP addresses. If your solution requires non-RFC 1918 IP addresses, you must use a Resource Manager Template to deploy the ASE.
68
+
>In order to deploy non-RFC 1918 IP addresses in the portal you must pre-stage the VNet and Subnet for the ASE. You can use a Resource Manager Template to deploy the ASE with non-RFC1918 IPs as well.
0 commit comments