Skip to content

Commit 8dffd62

Browse files
Merge pull request #249738 from dlepow/vnfw
[APIM] Additional infrastructure endpoints for VNet
2 parents db89c57 + 512a71f commit 8dffd62

File tree

2 files changed

+22
-12
lines changed

2 files changed

+22
-12
lines changed

articles/api-management/api-management-howto-ip-addresses.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,10 @@ GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/
8080
}
8181
```
8282

83+
> [!IMPORTANT]
84+
> The private IP addresses of internal load balancer and API Management units are assigned dynamically. Therefore, it is impossible to anticipate the private IP of the API Management instance prior to its deployment. Additionally, changing to a different subnet and then returning may cause a change in the private IP address.
85+
86+
8387
### IP addresses for outbound traffic
8488

8589
API Management uses a public IP address for a connection outside the VNet or a peered VNet and a private IP address for a connection in the VNet or a peered VNet.

articles/api-management/virtual-network-reference.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: dlepow
66

77
ms.service: api-management
88
ms.topic: reference
9-
ms.date: 01/06/2023
9+
ms.date: 08/29/2023
1010
ms.author: danlep
1111
ms.custom: references_regions
1212
---
@@ -78,28 +78,21 @@ NSG rules allowing outbound connectivity to Storage, SQL, and Azure Event Hubs s
7878

7979
## TLS functionality
8080

81-
To enable TLS/SSL certificate chain building and validation, the API Management service needs outbound network connectivity to `ocsp.msocsp.com`, `mscrl.microsoft.com`, and `crl.microsoft.com`. This dependency is not required if any certificate you upload to API Management contains the full chain to the CA root.
81+
To enable TLS/SSL certificate chain building and validation, the API Management service needs outbound network connectivity on ports `80` and `443` to `ocsp.msocsp.com`, `oneocsp.msocsp.com`, `mscrl.microsoft.com`, `crl.microsoft.com`, and `csp.digicert.com`. This dependency is not required if any certificate you upload to API Management contains the full chain to the CA root.
82+
8283

8384
## DNS access
8485

8586
Outbound access on port `53` is required for communication with DNS servers. If a custom DNS server exists on the other end of a VPN gateway, the DNS server must be reachable from the subnet hosting API Management.
8687

87-
### FQDN dependencies
88-
89-
To operate properly, the API Management service needs outbound connectivity on port 443 to the following endpoints associated with its cloud-based API Management instance:
88+
## Azure Active Directory integration
9089

91-
| Description | Required | Notes |
92-
|:------------|:---------------------|:------|
93-
| Endpoints for Azure Active Directory integration | ✔️ | Required endpoints are `<region>.login.microsoft.com` and `login.microsoftonline.com`. |
90+
To operate properly, the API Management service needs outbound connectivity on port 443 to the following endpoints associated with Azure Active Directory: `<region>.login.microsoft.com` and `login.microsoftonline.com`.
9491

9592
## Metrics and health monitoring
9693

9794
Outbound network connectivity to Azure Monitoring endpoints, which resolve under the following domains, are represented under the **AzureMonitor** service tag for use with Network Security Groups.
9895

99-
### Metrics and health monitoring
100-
101-
Outbound network connectivity to Azure Monitoring endpoints, which resolve under the following domains, are represented under the AzureMonitor service tag for use with Network Security Groups.
102-
10396
| Azure Environment | Endpoints |
10497
|-------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
10598
| Azure Public | <ul><li>gcs.prod.monitoring.core.windows.net</li><li>global.prod.microsoftmetrics.com</li><li>shoebox2.prod.microsoftmetrics.com</li><li>shoebox2-red.prod.microsoftmetrics.com</li><li>shoebox2-black.prod.microsoftmetrics.com</li><li>prod3.prod.microsoftmetrics.com</li><li>prod3-black.prod.microsoftmetrics.com</li><li>prod3-red.prod.microsoftmetrics.com</li><li>gcs.prod.warm.ingestion.monitoring.azure.com</li></ul> |
@@ -126,6 +119,18 @@ Enable publishing the [developer portal](api-management-howto-developer-portal.m
126119

127120
When adding virtual machines running Windows to the VNet, allow outbound connectivity on port `1688` to the [KMS endpoint](/troubleshoot/azure/virtual-machines/custom-routes-enable-kms-activation#solution) in your cloud. This configuration routes Windows VM traffic to the Azure Key Management Services (KMS) server to complete Windows activation.
128121

122+
## Internal infrastructure and diagnostics
123+
124+
The following settings and FQDNs are required to maintain and diagnose API Management's internal compute infrastructure.
125+
126+
* Allow outbound UDP access on port `123` for NTP.
127+
* Allow outbound TCP access on port `12000` for diagnostics.
128+
* Allow outbound access on port `443` to the following endpoints for internal diagnostics: `azurewatsonanalysis-prod.core.windows.net`, `*.data.microsoft.com`, `azureprofiler.trafficmanager.net`, `shavamanifestazurecdnprod1.azureedge.net`, `shavamanifestcdnprod1.azureedge.net`.
129+
* Allow outbound access on port `443` to the following endpoint for internal PKI: `issuer.pki.azure.com`.
130+
* Allow outbound access on ports `80` and `443` to the following endpoints for Windows Update: `*.update.microsoft.com`, `*.ctldl.windowsupdate.com`, `ctldl.windowsupdate.com`, `download.windowsupdate.com`.
131+
* Allow outbound access on ports `80` and `443` to the endpoint `go.microsoft.com`.
132+
* Allow outbound access on port `443` to the following endpoints for Windows Defender: `wdcp.microsoft.com`, `wdcpalt.microsoft.com `.
133+
129134
## Control plane IP addresses
130135

131136
The following IP addresses are divided by **Azure Environment** and **Region**. In some cases, two IP addresses are listed. Permit both IP addresses.
@@ -196,6 +201,7 @@ The following IP addresses are divided by **Azure Environment** and **Region**.
196201
| Azure Government| USDoD Central| 52.182.32.132|
197202
| Azure Government| USDoD East| 52.181.32.192|
198203

204+
199205
## Next steps
200206

201207
Learn more about:

0 commit comments

Comments
 (0)