Skip to content

Commit 74c8623

Browse files
authored
Update private-endpoint.md
little improvments
1 parent 1b7cd58 commit 74c8623

File tree

1 file changed

+10
-9
lines changed

1 file changed

+10
-9
lines changed

articles/app-service/networking/private-endpoint.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Connect privately to a Web App and secure data exfiltration using Azure Private Endpoint
3-
description: Connect privately to a Web App and secure data exfiltration using Azure Private Endpoint
2+
title: Connect privately to a Web App using Azure Private Endpoint
3+
description: Connect privately to a Web App using Azure Private Endpoint
44
author: ericgre
55
ms.assetid: 2dceac28-1ba6-4904-a15d-9e91d5ee162c
66
ms.topic: article
@@ -13,14 +13,14 @@ ms.workload: web
1313

1414
# Using Private Endpoints for Azure Web App (Preview)
1515

16-
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access to the app over Private Link. The Private Endpoint uses an IP address from your Azure VNet address space. Network traffic between client on your private network and the Web App traverses over the Vnet and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet. With Private Endpoint, you can disable outgoing network flows from the subnet with NSG and eliminate the data leakage risk.
16+
You can use Private Endpoint for your Azure Web App to allow clients located in your private network to securely access to the app over Private Link. The Private Endpoint uses an IP address from your Azure VNet address space. Network traffic between client on your private network and the Web App traverses over the Vnet and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet.
1717

1818
Using Private Endpoint for your Web App enables you to:
1919

2020
- Secure your Web App by configuring the Service Endpoint, eliminating public exposure
2121
- Securely connect to Web App from on-premises networks that connect to the Vnet using a VPN or ExpressRoute private peering.
2222

23-
If you just need a secure connection between your Vnet and your Web App, Service Endpoint is the simplest solution. if you also need to reach the web app from on-premises, Private Endpoint is the solution.
23+
If you just need a secure connection between your Vnet and your Web App, Service Endpoint is the simplest solution. If you also need to reach the web app from on-premises through an Azure gateway, a regionally peered Vnet or a globally peered Vnet, Private Endpoint is the solution.
2424

2525
For more information about [Service Endpoint][serviceendpoint]
2626

@@ -31,23 +31,24 @@ When you create a Private Endpoint for your Web App, it provides a secure connec
3131
The connection between the Private Endpoint and the Web App uses a secure [Private Link][privatelink]. Private endpoint is only used for incoming flows to your Web App. Outgoing flows will not use this Private Endpoint, but you can inject outgoing flows to your network in a different subnet through the [Vnet integration feature][vnetintegrationfeature].
3232

3333
The Subnet where you plug the Private Endpoint can have other resources in it, you don't need a dedicated empty Subnet.
34-
You can deploy Private Endpoint in region A for the Web App deployed in region B.
34+
You can deploy Private Endpoint in a different region than the Web App.
3535

3636
> [!Note]
3737
>The Vnet integration feature cannot use the same subnet than Private Endpoint, this is a limitation of the Vnet integration feature
3838
3939
From the security perspective:
4040

4141
- When you enable Service Endpoint to your Web App, you disable all public access
42-
- You can enable multiple Private Endpoints in others Vnets and Subnets
42+
- You can enable multiple Private Endpoints in others Vnets and Subnets, including Vnets in other regions
43+
- The IP address of the Private endpoint NIC must be dynamic, but will remain the same until you delete the Private Endpoint
4344
- The NIC of the Private Endpoint cannot have an NSG associated
44-
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint see [this article] [disablesecuritype]. As a result, you cannot filter by any NSG the access to your Private Endpoint.
45+
- The Subnet that hosts the Private Endpoint can have an NSG associated, but you must disable the network policies enforcement for the Private Endpoint see [this article] [disablesecuritype]. As a result, you cannot filter by any NSG the access to your Private Endpoint
4546
- When you enable Private Endpoint to your Web App, the [access restrictions][accessrestrictions] configuration of the Web App is not evaluated.
46-
- You can reduce data exfiltration from the vnet by removing all NSG rules where destination is tag Internet or Azure services, but adding a Service Endpoint in your subnet will allow you to reach any Web App hosted in the same stamp and exposed to Internet.
47+
- You can reduce data exfiltration risk from the vnet by removing all NSG rules where destination is tag Internet or Azure services. But adding a Web App Service Endpoint in your subnet, will let you reach any Web App hosted in the same stamp and exposed to Internet.
4748

4849
Private Endpoint for Web App is available for tier PremiumV2, and Isolated with an external ASE.
4950

50-
In the Web http logs of your Web App, you will discover that we are aware of the client source IP. We implemented the TCP Proxy protocol, forwarding up to the Web App the client IP. For more information, see [this article][tcpproxy].
51+
In the Web http logs of your Web App, you will find the client source IP. We implemented the TCP Proxy protocol, forwarding up to the Web App the client IP property. For more information, see [this article][tcpproxy].
5152

5253
![Global overview][1]
5354

0 commit comments

Comments
 (0)