Skip to content

Commit 856af4e

Browse files
committed
add alternate subnet join details
1 parent fd2fe9d commit 856af4e

1 file changed

Lines changed: 42 additions & 1 deletion

File tree

articles/app-service/environment/networking.md

Lines changed: 42 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: App Service Environment networking
33
description: App Service Environment networking details
44
author: seligj95
55
ms.topic: overview
6-
ms.date: 10/15/2025
6+
ms.date: 02/03/2026
77
ms.author: jordanselig
88
ms.service: azure-app-service
99
---
@@ -132,6 +132,47 @@ Your application uses one of the default outbound addresses for egress traffic t
132132
> [!NOTE]
133133
> Outbound SMTP connectivity (port 25) is supported for App Service Environment v3. The supportability is determined by a setting on the subscription where the virtual network is deployed. For virtual networks/subnets created before 1. August 2022 you need to initiate a temporary configuration change to the virtual network/subnet for the setting to be synchronized from the subscription. An example could be to add a temporary subnet, associate/dissociate an NSG temporarily, or configure a service endpoint temporarily. For more information and troubleshooting, see [Troubleshoot outbound SMTP connectivity problems in Azure](../../virtual-network/troubleshoot-outbound-smtp-connectivity.md).
134134
135+
## Outbound network segmentation
136+
137+
Outbound network segmentation allows you to join apps to alternate subnets to control how outbound traffic is routed. By default, all outbound traffic from an App Service Environment originates from the subnet hosting the App Service Environment.
138+
139+
### Enable outbound network segmentation
140+
141+
You must enable outbound network segmentation when you create your App Service Environment. You can't enable this feature on existing App Service Environments. Portal support for enabling this cluster setting or joining alternate subnets isn't available.
142+
143+
To enable the feature, configure the `MultipleSubnetJoinEnabled` cluster setting when you create the App Service Environment using an Azure Resource Manager or Bicep template:
144+
145+
```json
146+
"clusterSettings": [
147+
{
148+
"name": "MultipleSubnetJoinEnabled",
149+
"value": "true"
150+
}
151+
]
152+
```
153+
154+
For guidance on configuring cluster settings, see [Custom configuration settings for App Service Environments](app-service-app-service-environment-custom-settings.md).
155+
156+
### Join an app to an alternate subnet
157+
158+
The alternate subnet must be empty and delegated to `Microsoft.Web/serverFarms`. Ensure that [application traffic routing is enabled for your app](../configure-vnet-integration-routing.md#configure-application-routing) to route all traffic through the alternate subnet.
159+
160+
To join an app to an alternate subnet, use the following Azure CLI command:
161+
162+
```azurecli-interactive
163+
az webapp vnet-integration add --resource-group <APP-RESOURCE-GROUP> --name <APP-NAME> --vnet <VNET-NAME> --subnet <ALTERNATE-SUBNET-NAME>
164+
```
165+
166+
If your alternate subnet is in a different resource group than your app, run `az webapp vnet-integration add -h` to learn how to specify the resource ID.
167+
168+
To change the alternate subnet for an app, first remove the existing integration and then add a new one.
169+
170+
### Limitations
171+
172+
- Each app from a given plan can only integrate with one alternate subnet.
173+
- A plan can have up to four different subnet connections, and apps in the same plan can use any of the connections.
174+
- This feature isn't compatible with the [multi-plan subnet join](../overview-vnet-integration.md#subnet-requirements) feature available in the multitenant App Service offering.
175+
135176
## Private endpoint
136177

137178
In order to enable Private Endpoints for apps hosted in your App Service Environment, you must first enable this feature at the App Service Environment level.

0 commit comments

Comments
 (0)