Skip to content

Commit af7fb0d

Browse files
committed
backed out some changes to internal vnet article
1 parent 59fe884 commit af7fb0d

File tree

1 file changed

+10
-11
lines changed

1 file changed

+10
-11
lines changed

articles/api-management/api-management-using-with-internal-vnet.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,15 @@ After successful deployment, you should see your API Management service's **priv
111111

112112
## DNS configuration
113113

114-
In external VNET mode, Azure manages the DNS. For internal VNET mode, you have to manage your own DNS to enable access to your API Management service endpoints.
114+
In external VNET mode, Azure manages the DNS. For internal VNET mode, you have to manage your own DNS to enable inbound access to your API Management service endpoints.
115+
116+
We recommend:
117+
118+
1. Configure an Azure [DNS private zone](../dns/private-dns-overview.md).
119+
1. Link the Azure DNS private zone to the VNET into which you've deployed your API Management service.
120+
121+
Learn how to [set up a private zone in Azure DNS](../dns/private-dns-getstarted-portal.md).
122+
115123

116124
> [!NOTE]
117125
> The API Management service does not listen to requests on its IP addresses. It only responds to requests to the host name configured on its service endpoints. These endpoints include:
@@ -144,7 +152,6 @@ To access these API Management service endpoints, you can create a virtual machi
144152

145153
You can then access all the service endpoints from the virtual machine you created.
146154

147-
148155
### Access on custom domain names
149156

150157
If you don't want to access the API Management service with the default host names:
@@ -155,14 +162,6 @@ If you don't want to access the API Management service with the default host nam
155162

156163
2. Create records in your DNS server to access the endpoints accessible from within your VNET. Map the endpoint records to the [private virtual IP address](#routing) for your service.
157164

158-
We recommend:
159-
160-
1. Configure an Azure [DNS private zone](../dns/private-dns-overview.md).
161-
1. Link the Azure DNS private zone to the VNET into which you've deployed your API Management service.
162-
1. Create DNS A-records in the private zone to access each of the API Management endpoints.
163-
164-
Learn how to [set up a private zone in Azure DNS](../dns/private-dns-getstarted-portal.md).
165-
166165
## Routing
167166

168167
The following virtual IP addresses are configured for an API Management instance in an internal virtual network. Learn more about the [IP addresses of API Management](api-management-howto-ip-addresses.md).
@@ -184,7 +183,7 @@ The load-balanced public and private IP addresses can be found on the **Overview
184183
185184
### VIP and DIP addresses
186185

187-
DIP addresses will be assigned to each underlying virtual machine in the service and used to access resources *within* the VNET. A VIP address will be used to access resources *outside* the VNET. If IP restriction lists secure resources within the VNET, you must specify the entire subnet range where the API Management service is deployed to grant or restrict access from the service.
186+
Dynamic IP (DIP) addresses will be assigned to each underlying virtual machine in the service and used to access resources *within* the VNET. The API Management service's public virtual IP (VIP) address will be used to access resources *outside* the VNET. If IP restriction lists secure resources within the VNET, you must specify the entire subnet range where the API Management service is deployed to grant or restrict access from the service.
188187

189188
Learn more about the [recommended subnet size](virtual-network-concepts.md#subnet-size).
190189

0 commit comments

Comments
 (0)