Skip to content

Commit ac35fe3

Browse files
Merge pull request #254041 from madsd/cust-feedback-nsg
Customer feedback on NSG details
2 parents 3917fe0 + 796602b commit ac35fe3

File tree

1 file changed

+1
-15
lines changed

1 file changed

+1
-15
lines changed

articles/app-service/environment/network-info.md

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -139,8 +139,6 @@ All these IP addresses are visible in the Azure portal from the App Service Envi
139139
> [!NOTE]
140140
> These IP addresses don't change, as long as your App Service Environment is running. If your App Service Environment becomes suspended and is then restored, the addresses used will change. The normal cause for a suspension is if you block inbound management access, or you block access to a dependency.
141141
142-
![Screenshot that shows IP addresses.][3]
143-
144142
### App-assigned IP addresses
145143

146144
With an external deployment, you can assign IP addresses to individual apps. You can't do that with an internal deployment. For more information on how to configure your app to have its own IP address, see [Secure a custom DNS name with a TLS/SSL binding in Azure App Service](../configure-ssl-bindings.md).
@@ -183,23 +181,12 @@ The normal app access ports are:
183181
| Visual Studio remote debugging | 4020, 4022, 4024 |
184182
| Web Deploy service | 8172 |
185183

186-
When the inbound and outbound requirements are taken into account, the NSGs should look similar to the NSGs shown in the following screenshot:
187-
188-
![Screenshot that shows inbound security rules.][4]
189-
190184
A default rule enables the IPs in the virtual network to talk to the subnet. Another default rule enables the load balancer, also known as the public VIP, to communicate with the App Service Environment. To see the default rules, select **Default rules** (next to the **Add** icon).
191185

192-
If you put a *deny everything else* rule before the default rules, you prevent traffic between the VIP and the App Service Environment. To prevent traffic coming from inside the virtual network, add your own rule to allow inbound. Use a source equal to `AzureLoadBalancer`, with a destination of **Any** and a port range of **\***. Because the NSG rule is applied to the subnet, you don't need to be specific in the destination.
186+
If you put a _deny everything else_ rule before the default rules, you prevent traffic between the VIP and the App Service Environment. To prevent traffic coming from inside the virtual network, add your own rule to allow inbound. Use a source equal to `AzureLoadBalancer`, with a destination of **Any** and a port range of **\***. Because the NSG rule is applied to the subnet, you don't need to be specific in the destination.
193187

194188
If you assigned an IP address to your app, make sure you keep the ports open. To see the ports, select **App Service Environment** > **IP addresses**.  
195189

196-
All the items shown in the following outbound rules are needed, except for the rule named **ASE-internal-outbound**. They enable network access to the App Service Environment dependencies that were noted earlier in this article. If you block any of them, your App Service Environment stops working. The rule named **ASE-internal-outbound** in the list enables your App Service Environment to communicate with other resources in your virtual network.
197-
198-
![Screenshot that shows outbound security rules.][5]
199-
200-
> [!NOTE]
201-
> The IP range in the ASE-internal-outbound rule is only an example and should be changed to match the subnet range for the App Service Environment subnet.
202-
203190
After your NSGs are defined, assign them to the subnet. If you don't remember the virtual network or subnet, you can see it from the App Service Environment portal. To assign the NSG to your subnet, go to the subnet UI and select the NSG.
204191

205192
## Routes
@@ -239,7 +226,6 @@ When service endpoints are enabled on a subnet with an instance of Azure SQL, al
239226
<!--Image references-->
240227
[1]: ./media/network_considerations_with_an_app_service_environment/networkase-overflow.png
241228
[2]: ./media/network_considerations_with_an_app_service_environment/networkase-overflow2.png
242-
[3]: ./media/network_considerations_with_an_app_service_environment/networkase-ipaddresses.png
243229
[4]: ./media/network_considerations_with_an_app_service_environment/networkase-inboundnsg.png
244230
[5]: ./media/network_considerations_with_an_app_service_environment/networkase-outboundnsg.png
245231
[6]: ./media/network_considerations_with_an_app_service_environment/networkase-udr.png

0 commit comments

Comments
 (0)