How to access the Azure App service using organisation VPN without VPN Client and Virtual Machine? - azure-web-app-service

I have created my project pipeline in the Azure DevOps, and the same has been deployed into the Azure App Service using Tomcat-Server.
I could access the app with the link provided by the app service with public Ip.
But I need to access the app using my organization's VPN from anywhere by just turning on the VPN without using the VPN client and Virtual Machine.
I have created the private endpoint, site-to-site VPN configuration everything, and the IP of this has also been mapped to my organization firewall. The connection has been established successfully, but I cannot connect with the app service using my organization's VPN.
So, could you please help me with this?

Related

Using Azure for VPN

We have a combination of people working from home and people in an office. The office internet has a static IP and the router allows people outside to VPN in. We use the static IP to allow restricted access to our own Azure & AWS resources, but also to clients Azure, AWS and on-site physical hardware.
We are moving to a multi tenancy office that provides a communal internet connection for all tenants.
We'd like to set up some form of VPN in Azure that employees can connect to, authenticated by their O365 accounts (already used to log into their machines), that allows both access to our azure, but also an onward static IP that we can provide to customers who use Azure, AWS or on-site physical hardware.
Note that: You can deploy a VPN gateway in Azure and create a site-to-site VPN with the on-prem VPN router and also another site-to-site connection between Azure and AWS, then configure P2S VPN on the same VPN gateway with AD authentication using Radius server.
I created an Azure virtual network along with gateway subnet and virtual network gateway, gateway type as VPN and VPN type as route-based like below:
You can see public ip, this public IP address will be used to configure on-premise VPN device
Created local network gateway like below:
Created site-to-site VPN connection between virtual network gateway and on-premises VPN device like below.
In Azure portal -> type connection;
In virtual network gateway, under setting -> Add connection like below:
And try to verify the connection in local network gateway like below:
You can view the connection in the virtual network gateway.
Reference:
Tutorial - Configure a BGP-enabled connection between Azure and Amazon Web Services (AWS) using the portal - Azure VPN Gateway | Microsoft Learn
https://learn.microsoft.com/en-us/azure/vpn-gateway/point-to-site-vpn-client-configuration-radius-password

How to connect to Microsoft cloud services using ExpressRoute from home network?

I am prototyping mounting a azure blob storge account as NFS drive, part of it i have configured as it specified in the following docs, however i don't have success with site to point vpn solution
https://learn.microsoft.com/en-us/azure/storage/blobs/network-file-system-protocol-support-how-to?tabs=windows
https://learn.microsoft.com/en-us/azure/storage/blobs/network-file-system-protocol-support
i would like to try "An on-premises network that is connected to your primary VNet by using VPN Gateway or an ExpressRoute gateway"
to try this do i need additional configuration on my home router? my ISP assigned with a static IP. What additional networking configurations are needed so that i can connect azure blob storage over NFS via express route?
From supported network connections for NFS3.0, it should work by using a VPN gateway or an ExpressRoute gateway from an on-premise network.
If you are using point to site VPN connection, you could reference from tunneling traffic over a virtual private network or ExpressRoute to configure a private endpoint and enable a service endpoint for your storage account in that VPN VNet, refer here. When you use When you create a private endpoint, ensure that your client could resolve the Azure storage account FQDN to a private IP address, for this, you need to configure DNS on your environment.

Azure App Service - VNet Integration vs Private Endpoint vs Hybrid Connection

I have a .NET Web API running in Azure App Service. It needs to connect to the RabbitMQ service running on my On-Prem server. How should I establish that connection between Azure App Service and RabbitMQ service port?
Do I need to whitelist the outbound IP addresses of Azure App Service in my firewall for this change?
The outbound IP address of Azure app service might change, see when it will change.
So you could have two options:
Hybrid connection.
It makes outbound calls to Azure over port 443. Hybrid Connections provides access from your app to a TCP endpoint and does not enable a new way to access your app. As used in App Service, each Hybrid Connection correlates to a single TCP host and port combination.
VNet integration and VPN gateway. With these methods, you can access the RabbitMQ service in a private network with a point to site or site to site VPN connection. VNet Integration is used only to make outbound calls from your app into your VNet. It doesn't grant inbound private access to your app from the VNet. In this case, If you want to use Private Endpoints for Azure Web App, then you need to either integrate with Azure DNS Private Zones or manage the private endpoint in the DNS server used by your app.

Azure web app accessing service fabric's virtual network

I have a Service Fabric cluster hosting many legacy WCF services and I would like to connect an Azure App Service (running a website) to the fabric cluster's VNET, such that it can communicate with the WCF services in the cluster.
I connected my fabric cluster's VNET to an existing virtual network of our organization using VNET peering and I can connect to the WCF services from VMs within the existing virtual network.
However, when connecting from the app service, I got the following error:
Could not connect to net.tcp://10.0.0.250:8020/. The connection attempt
lasted for a time span of 00:00:00. TCP error code 10013: An attempt was made to access a socket in a way forbidden by its access permissions 10.0.0.250:8020.
I have configured an internal load balancer and its working ok if I connect from within the virtual network. Does anyone know why it doesn't work for the web app?
If you want to access the resources in a VNet from Azure App Service, you could enable networking for app service. Note that
VNet Integration gives your web app access to resources in your
virtual network but doesn't grant inbound private access to your web
app from the virtual network. Private site access refers to making
your app only accessible from a private network such as from within an
Azure virtual network. VNet Integration is only for making outbound
calls from your app into your VNet.
There are two versions of VNet integration, you could use Regional VNet Integration if service fabric's virtual network in the same region as your web app.

What ip address do you use to connect to a VM from a Web App through point-to-site VNET Integration?

I have a .Net Web API deployed as a Web App and am trying to connect it to a MySQL db on a VM in a virtual network, but it's responding with a 500 internal server error.
My VNET just consists of one VM with no DNS or site-to-site configuration.
The preview portal says VNET Integration is connected, my certificates are in sync and the gateway is online.
I gave my VM a static IP address which I'm using in my web.config connection string, thinking requests would be routed through the gateway to the VM, but according to my general mysql log their aren't any connection attempts to the mysql server.
The address I gave my VM is within the range of addresses being routed to the VNET, and I setup an endpoint on the VM for the port I'm trying to connect to mysql on with an access rule that allows all connections, so I'm not sure why the connection doesn't appear to be getting through the gateway to my VM.
You may check this link which provides instructions on how to connect Azure App Service - Web App with Azure Virtual Network, so that it can use resources visible within network itself:
https://azure.microsoft.com/en-us/documentation/articles/web-sites-integrate-with-vnet/
App Service supports three ways to connect to VNETs.
ASE - (App Service Environment) is a dedicated Cloud Service that includes all the needed pieces for App Service and as such can be joined to a VNET. A good starting point on ASE is this blog (https://azure.microsoft.com/en-us/blog/introducing-app-service-environment/).
Hybrid Connections - an agent based way to punch an application specific "wormhole" through network boundaries (https://azure.microsoft.com/en-us/documentation/articles/integration-hybrid-connection-overview/)
Virtual Networks - a way to "dial up" from an App Service App into an network (https://azure.microsoft.com/en-us/documentation/articles/web-sites-integrate-with-vnet/)

Resources