How to web app service networking restriction bet. group of web apps

Kuldeep Singh(OT) 20 Reputation points
2024-05-02T16:28:08.1066667+00:00

Hi Team, am facing one issue where am unable to restrict incoming traffic to web app.

infrastructure i have

we have 6 web app

frontend-webapp1, frontend-webapp2, frontend-webapp3

backend-webapp1, backend-webapp2, backend-webapp3

Problem statement -

frontend-web app1 should communicate with backend-webapp1, but it when it try to communicate with other backend--app2 and 3 they should deny the request/traffic.

same traffic flow i want for other apps.

but am not able to achieve -

i have tried

inbound restriction rule

vnet integration and apply nsg on it, but its not working,

if i try endpoint - it is giving 403 ip forbidden error as from fronted request is coming.

any possible solution via involing any components or any feature of app service.

Azure App Service
Azure App Service
Azure App Service is a service used to create and deploy scalable, mission-critical web apps.
7,124 questions
{count} votes

3 answers

Sort by: Most helpful
  1. chad.carlton@gmail.com 0 Reputation points
    2024-05-02T16:46:51.5833333+00:00

    Enabling vnet integration and private endpoint does not remove the public/global dns entry. it only puts up a FW (causing the 403) for that name/IP address. This means that without additional things, your references to the app will use the public IP and be blocked.

    You will need to make a private dns zone for the endpoint for your web app with the private IP address (the endpoint). You should name the zone "privatelink.azurewebsites.net", and add your apps and their private ips. You will also need to make sure that private dns zone is linked to the vnet that is calling your app and overrides the public dns entry for your web app.

    what is in front of your web apps? we have a similar setup, but have an Azure AppGW in front , with a listener for of our web apps, and our webapps are 100% private, i.e. the Azure AppGW has a front end public IP, and also sits tis backend in our private vnet space. It accepts traffic off the internet via the public IP, matches it via listeners, and request routing rules, and then forwards on the traffic to the appropriate backend pools using the private Ip addresses.

    These backend pools are our web apps, using private endpoints.

    We have a private DNSZone that is linked to the appgw Vnet, where our App services are listed, with their private ip addresses.

    Anywhere we want to reference the web apps, because they are 100% private we either need to use the public listener name and public IP with no private dns link (and go through the appgw), or have a link to that private dns zone which allows us to reference the apps privately.

    We try to encourage only using the front end public IP, as that gives us a single place to manage configuration/monitor etc. but your needs might be different.


  2. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more

  3. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more