Skip to content

Commit 2b1e2ae

Browse files
authored
Merge pull request #32152 from stefsch/stefsch-local-pr3
2 parents 4da7bcf + 94594e7 commit 2b1e2ae

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/app-service-web/app-service-app-service-environment-network-configuration-expressroute.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
ms.tgt_pltfrm="na"
1414
ms.devlang="na"
1515
ms.topic="article"
16-
ms.date="10/04/2016"
16+
ms.date="10/14/2016"
1717
ms.author="stefsch"/>
1818

1919
# Network Configuration Details for App Service Environments with ExpressRoute
@@ -60,7 +60,7 @@ The combined effect of these steps is that the subnet level UDR will take preced
6060

6161
> [AZURE.IMPORTANT] The routes defined in a UDR **must** be specific enough to take precedence over any routes advertised by the ExpressRoute configuration. The example below uses the broad 0.0.0.0/0 address range, and as such can potentially be accidentally overridden by route advertisements using more specific address ranges.
6262
>
63-
>App Service Environments are not supported with ExpressRoute configurations that **incorrectly cross-advertise routes from the public peering path to the private peering path**. ExpressRoute configurations that have public peering configured, will receive route advertisements from Microsoft for a large set of Microsoft Azure IP address ranges. If these address ranges are incorrectly cross-advertised on the private peering path, the end result is that all outbound network packets from the App Service Environment's subnet will be incorrectly force-tunneled to a customer's on-premises network infrastructure. This network flow will break App Service Environments. The solution to this problem is to stop cross-advertising routes from the public peering path to the private peering path.
63+
>App Service Environments are not supported with ExpressRoute configurations that **cross-advertise routes from the public peering path to the private peering path**. ExpressRoute configurations that have public peering configured, will receive route advertisements from Microsoft for a large set of Microsoft Azure IP address ranges. If these address ranges are cross-advertised on the private peering path, the end result is that all outbound network packets from the App Service Environment's subnet will be force-tunneled to a customer's on-premises network infrastructure. This network flow is currently not supported with App Service Environments. One solution to this problem is to stop cross-advertising routes from the public peering path to the private peering path.
6464
6565
Background information on user defined routes is available in this [overview][UDROverview].
6666

@@ -93,7 +93,7 @@ Remember that 0.0.0.0/0 is a broad address range, and as such will be overridden
9393

9494
As an alternative, you can download a comprehensive and updated list of CIDR ranges in use by Azure. The Xml file containing all of the Azure IP address ranges is available from the [Microsoft Download Center][DownloadCenterAddressRanges].
9595

96-
Note though that these ranges change over time, thus necessitating periodic manual updates to a UDR to keep in sync. Also, since there is an upper limit of 100 routes in a single UDR, you will need to "summarize" the Azure IP address ranges to fit within the 100 route limit, keeping in mind that UDR defined routes need to be more specific than the routes advertised by your ExpressRoute.
96+
Note though that these ranges change over time, thus necessitating periodic manual updates to the user defined routes to keep in sync. Also, since there is a default upper limit of 100 routes in a single UDR, you will need to "summarize" the Azure IP address ranges to fit within the 100 route limit, keeping in mind that UDR defined routes need to be more specific than the routes advertised by your ExpressRoute.
9797

9898

9999
**Step 3: Associate the route table to the subnet containing the App Service Environment**

0 commit comments

Comments
 (0)