Edit

Share via


Things to consider before you use ExpressRoute with Power Platform

Setting up ExpressRoute is often more complex than you think it will be. In planning or in execution, it's easy to overlook or underestimate factors like these:

  • Configuring your network to route traffic to the subnet that connects to ExpressRoute.

  • Avoiding asymmetric routing, where traffic goes directly to Power Platform across the internet but is returned by ExpressRoute to the corporate network and rejected by the firewall.

  • Determining whether to establish multiple ExpressRoute circuits for distributed deployments.

  • The overall costs associated with using ExpressRoute, including Microsoft Azure services, connectivity provider provisioning, and ongoing service and internal IT network routing configuration.

You should also consider the possibility of connectivity performance problems and security risks. This article discusses issues that can arise when using ExpressRoute with Power Platform and how to mitigate them.

Connectivity performance issues

It's important to understand the connectivity performance issues that can arise with ExpressRoute.

  • Poor LAN connectivity: New services might strain an already saturated local network. For example, your Power Platform solution replaces a thick client application where only the data was transmitted across the network. Although a browser application requires less client-side deployment administration, it requires higher bandwidth to transmit both data and presentation information.

  • Poor WAN connectivity: At the level of the wide area network (WAN), traffic might traverse the corporate network rather than routing out to the internet earlier. It might be routed through a proxy server, or the WAN link might be saturated. These factors introduce latency that can significantly affect performance. If Power Platform traffic suffers from these challenges, performance at the client might also suffer.

  • Poor internet connectivity: Adding cloud services can introduce extra consumption and load on the corporate connection to the internet. The internet connection might not be able to support the extra load, especially at times of peak usage. The internet provider might inefficiently route traffic to Microsoft's network. The connection might suffer from a mix of traffic that competes for the available bandwidth, which affects the quality of the connection.

    You can address these issues by getting more bandwidth or separate connections through your internet provider. A separate connection that's dedicated to priority traffic can help improve both the performance and the predictability of the traffic. Make sure that you set up Quality of Service (QoS) correctly. Learn more in ExpressRoute QoS requirements.

Security control

The next consideration is security. ExpressRoute doesn't encrypt or filter traffic natively, except for ExpressRoute Direct with MACsec enabled. It simply establishes a private connection directly between the Microsoft and customer datacenters through a connectivity provider.

Any request from any Microsoft online service or Azure service to the subnet that's advertised through an ExpressRoute circuit is routed through that circuit, regardless of the service or the customer. Because the request routes at the network layer, there's no application-level control to check if the requester is appropriate for the destination service.

Traffic to the Microsoft Cloud uses public shared services, which can be accessed directly over the public internet. Application-level authentication and authorization control access to these services. Infrastructure-level protections guard against intrusion and threats like denial-of-service attacks. For traffic from Microsoft services to on-premises hosted services, you're responsible for providing similar protection to your services when traffic is received across an ExpressRoute connection.

Ability to restrict ExpressRoute use to only certain Microsoft services

One of the challenges you might face is wanting to use ExpressRoute for a particular Microsoft cloud service but not for others. Although the different peering options provide some level of control, the peering itself doesn't provide granular control within services of the same peering type; for example, to allow routing to Azure virtual machines but not to Microsoft 365. Because Power Platform and Microsoft 365 services are both offered through Microsoft peering, setting up Microsoft peering advertises all Power Platform and Microsoft 365 services across the ExpressRoute circuit by default.

ExpressRoute doesn't offer the ability to directly configure services to be routed through a specific circuit. It's possible, however, to use Border Gateway Protocol (BGP) community tags to control the routing so that only specific services use the ExpressRoute connection.

Microsoft advertises routes in the Microsoft peering paths with the routes tagged with appropriate BGP community values for geographical locations and service types. You can configure your routers to use the tags for Microsoft 365 services to route traffic only for those services through the ExpressRoute circuit, and route the rest either across a different ExpressRoute circuit or the public internet.

Not all Microsoft 365 services are designed to work with ExpressRoute. Power Platform services don't have a designated BGP community like some Microsoft 365 services do. Instead, you should use regional BGP communities to match with the region where the Power Platform environment was created. Because Power Platform environments use two sets of datacenters, be sure to check the Regions overview to identify which two datacenters are used.

Keep in mind that allowing BGP communities to route traffic for one service leads to both being routed across ExpressRoute, which can have unfavorable results. For example, if you determine the network bandwidth that Power Platform needs and size the ExpressRoute connection accordingly, but inadvertently route all your Microsoft 365 traffic through ExpressRoute, you can saturate your network and cause performance challenges.

Diagram showing that Microsoft peering doesn't allow you to keep specific services out of network traffic.

Because Power Platform services work partially as part of the Microsoft 365 service, many crossover services such as the admin portal and authentication are also required. It's not possible to protect all of these services by using ExpressRoute. The Microsoft 365 admin center, for example, isn't published across ExpressRoute.

Learn more in Azure ExpressRoute for Microsoft 365.

Support for sovereign clouds

Customers that are required to meet government- or country-/region-specific regulations can choose to use a sovereign cloud. Sovereign clouds are physically located in a region to meet the requirements that are specific to a government or country/region. For example, Power Apps for Government Community Cloud (GCC) is located in the United States, where it meets US government–specific regulations and certifications and satisfies protocols to meet those requirements.

Watch this video to learn how Power Platform is available with sovereign clouds: Video: Sovereign Clouds with Marty Carreras.

When you consider using a sovereign cloud environment, you must also consider what limitations exist. Not all features are available when compared with public cloud environments. The following table lists the availability of ExpressRoute for Power Platform by environment. Learn about other differences in availability in Power Automate regions overview.

Region ExpressRoute support
US Government Community Cloud (GCC) Supported 1
US Government Community Cloud High (GCC High) Supported 1
China Supported 2

1 You must use Azure Government ExpressRoute, not Azure commercial cloud ExpressRoute.

2 You must use Azure China 21Vianet ExpressRoute, not Azure commercial cloud ExpressRoute.

Azure ExpressRoute costs

To determine the business case accurately, remember to include Azure costs, connectivity provider costs, and internal setup effort costs when you estimate the costs for ExpressRoute for Power Platform.

Azure costs

Azure ExpressRoute can be purchased in different models. The model you choose depends on the type of connection you want to establish and the services you want to access.

  • Billing type

    • Pay-as-you-go: A base subscription cost per month with unlimited inbound traffic but a per-GB charge for outbound traffic
    • Unlimited: A base subscription cost per month with unlimited inbound and outbound traffic
  • SKU/Plan

    • Standard

      • Basic connection using ExpressRoute
      • Offers access to services within a single geographical region

      If the ExpressRoute circuit is in the same region as the Power Platform environment that users are connecting to, only ExpressRoute standard is required for that circuit.

    • Premium

      • Offers access to worldwide geographical services from wherever the connection is made

      If a user connects through an ExpressRoute circuit from a different region than their end service, they require ExpressRoute Premium for that circuit.

Learn more in Azure ExpressRoute pricing.

Connectivity provider costs

In some cases, the costs of establishing the connection with the connectivity provider can be significant. These costs are separate from the Azure costs for ExpressRoute.

Internal customer effort to configure the network routing

To use ExpressRoute, the network routing must be set up internally. For many customers, this effort requires an internal cross-charge to the network team, an external cost to an IT outsourcing provider, or at least an opportunity cost for the efforts of internal staff to focus on the configuration.

Impacts to existing Power Platform, Microsoft 365, and Azure services

When you use Microsoft peering, traffic for Power Platform services, Microsoft 365, and Azure is routed through ExpressRoute by default. If you already use Power Platform, Dynamics 365 applications, or Microsoft 365 without ExpressRoute, it's important to be sensitive to the impact on these existing services when you allow Microsoft peering through ExpressRoute. It might be necessary to configure routing using BGP communities to separate traffic to different services.

Reuse of ExpressRoute across multiple online services

A single ExpressRoute connection can be used to access multiple online services, such as Power Platform, Dynamics 365, Microsoft 365, and Azure.

Diagram showing a shared ExpressRoute connection with Microsoft public services and Azure.

Diagram showing a shared ExpressRoute connection with Microsoft public services and Azure. Microsoft peering for Microsoft 365, Power Platform, Dynamics 365, and Azure public services share the same ExpressRoute connection with Azure private peering for virtual networks.

ExpressRoute doesn't separate different types of Microsoft services from a particular subnet. It's possible to use BGP community tags to control the routing of traffic to particular services across ExpressRoute. Microsoft doesn't route traffic back across ExpressRoute selectively based on BGP community tags. If traffic needs to be returned differently based on the service type, make sure that the traffic comes from different public IP addresses. Because traffic returning to a subnet is handled at the network level, configuring only some traffic from a subnet to use ExpressRoute is dangerous and can lead to asymmetric routing.

Next step