Network topology and connectivity for Azure Arc-enabled servers

You can use Azure Arc-enabled servers to manage your Windows and Linux physical servers and virtual machines via the Azure control plane. This article describes key design considerations and best practices for Azure Arc-enabled servers connectivity as part of the Cloud Adoption Framework enterprise-scale landing zone guidance. This guidance is for physical servers and virtual machines that you host in your on-premises environment or via a partner cloud provider.

This article assumes that you have successfully implemented an enterprise-scale landing zone and established hybrid network connections. The guidance focuses on the connectivity of the connected machine agent for Azure Arc-enabled servers. For more information, see Enterprise-scale landing zones overview and Implement enterprise-scale landing zones.

Architecture

The following diagram shows a conceptual reference architecture for the connectivity of Azure Arc-enabled servers.

Diagram that shows Azure Arc-enabled servers connectivity options.

Design considerations

Consider the following network design considerations for Azure Arc-enabled servers.

  • Define the agent's connectivity method: Review your existing infrastructure and security requirements. Decide how the connected machine agent should communicate with Azure from your on-premises network or other cloud provider. This connection can go directly over the internet, through a proxy server, or you can implement Azure Private Link for a private connection.

  • Manage access to Azure service tags: Create an automated process to keep the firewall and proxy network rules updated according to the connected machine agent network requirements.

  • Secure your network connectivity to Azure Arc: Configure the machine operating system to use Transport Layer Security (TLS) version 1.2. We don't recommend older versions because of known vulnerabilities.

  • Define an extensions connectivity method: Ensure that Azure extensions that you deploy on an Azure Arc-enabled server can communicate with other Azure services. You can provide this connectivity directly through public networks, a firewall, or a proxy server. You must configure private endpoints for the Azure Arc agent. If your design requires private connectivity, you need to take extra steps to enable private endpoint connectivity for each service that extensions access. Also, consider the use of either shared or dedicated circuits depending on your cost, availability, and bandwidth requirements.

  • Review your overall connectivity architecture: Review the network topology and connectivity design area to assess how Azure Arc-enabled servers affect your overall connectivity.

Design recommendations

Consider the following network design recommendations for Azure Arc-enabled servers.

Define an Azure Arc agent connectivity method

You can use Azure Arc-enabled servers to connect hybrid machines via:

  • A direct connection, optionally from behind a firewall or a proxy server.
  • Private Link.

Direct connection

Azure Arc-enabled servers can provide direct connectivity to Azure public endpoints. When you use this connectivity method, all machine agents use a public endpoint to open a connection to Azure via the internet. The connected machine agent for Linux and Windows securely communicates outbound to Azure via the HTTPS protocol (TCP/443).

When you use the direct connection method, evaluate your internet access for the connected machine agent. We recommend that you configure the required network rules.

Proxy server or firewall connection

If your machine uses a firewall or a proxy server to communicate over the internet, the agent connects outbound via the HTTPS protocol.

If you use a firewall or a proxy server to restrict outbound connectivity, make sure to allow the IP ranges in accordance with the connected machine agent network requirements. When you allow only the required IP ranges or domain names for the agent to communicate with the service, use service tags and URLs to configure your firewall or proxy server.

If you deploy extensions on your Azure Arc-enabled servers, every extension connects to its own endpoint or endpoints, and you must also allow all corresponding URLs in the firewall or proxy. Add these endpoints to ensure granular secured network traffic and to meet the principle of least privilege.

To ensure that all traffic from your Azure Arc agents remains on your network, use an Azure Arc-enabled server with Azure Arc Private Link Scope. This configuration provides security advantages. The traffic doesn't traverse the internet, and you don't need to open as many outbound exceptions on your datacenter firewall. But Private Link imposes a number of management challenges and increases the overall complexity and cost, especially for global organizations. Consider the following challenges:

  • Azure Arc Private Link Scope encompasses all Azure Arc clients under the same Domain Name System (DNS) scope. You can't have some Azure Arc clients that use private endpoints and some that use public endpoints when they share a DNS server. But you can implement workarounds like DNS policies.

  • Your Azure Arc clients can have all private endpoints in a primary region. If they don't, you need to configure DNS so that the same private endpoint names resolve to different IP addresses. For example, you might use selectively replicated DNS partitions for Windows Server Active Directory-integrated DNS. If you use the same private endpoints for all your Azure Arc clients, you must have the ability to route traffic from all your networks to the private endpoints.

  • You must do extra steps to use private endpoints for any Azure services that are accessed by extension software components that you deploy via Azure Arc. These services include Log Analytics workspaces, Azure Automation accounts, Azure Key Vault, and Azure Storage.

  • Connectivity to Microsoft Entra ID uses public endpoints, so clients require some internet access.

  • If you use Azure ExpressRoute for private connectivity, consider reviewing the resiliency best practices for circuits, gateways, connections, and ExpressRoute Direct.

Because of these challenges, we recommend that you evaluate if you need Private Link for your Azure Arc implementation. Public endpoints encrypt traffic. Depending on how you use Azure Arc for servers, you might limit traffic to management and metadata traffic. To address security concerns, implement local agent security controls.

For more information, see Private Link security and see the restrictions and limitations that are associated with Private Link support for Azure Arc.

Diagram that shows the Azure Arc-enabled servers Private Link topology.

Manage access to Azure service tags

We recommend that you implement an automated process to update the firewall and proxy network rules according to the Azure Arc network requirements.

Next steps

For more guidance for your hybrid cloud adoption journey, see the following resources: