

To learn more, see App Services Networking Features. By default, apps that are hosted in App Service are accessible directly through the internet and can reach only internet-hosted endpoints. Virtual network integration doesn't provide inbound private access to your app from the virtual network.īecause of the nature of how virtual network integration operates, the traffic from virtual network integration doesn't show up in Azure Network Watcher or NSG flow logs.Īpp services isn't using the NAT gateway public IP address to connect outboundĪpp services can still connect outbound to the internet even if VNet integration isn't enabled. Important notes about the NAT gateway and Azure App Services integration:
IP UNBLOCK FIREWALL HOW TO
To see step-by-step instructions on how to configure NAT gateway with virtual network integration, see Configuring NAT gateway integration To use NAT gateway with Azure App services, follow these steps:Įnsure that your application(s) have virtual network integration configured, see Enable virtual network integration.Įnsure that Route All is enabled for your virtual network integration, see Configure virtual network integration routing.Ĭreate a new public IP address or attach an existing public IP address in your network to NAT gateway.Īssign NAT gateway to the same subnet being used for Virtual network integration with your application(s). See how regional virtual network integration works to learn more.

To use this integration between Azure app services and NAT gateway, regional virtual network integration must be enabled. NAT gateway can be used with Azure app services to allow applications to make outbound calls from a virtual network. This article provides guidance on how to troubleshoot connectivity issues when using NAT gateway with other Azure services, including:Īzure App Services Azure App Services regional Virtual network integration turned off
