You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/networking.md
+42-1Lines changed: 42 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: App Service Environment networking
3
3
description: App Service Environment networking details
4
4
author: seligj95
5
5
ms.topic: overview
6
-
ms.date: 10/15/2025
6
+
ms.date: 02/03/2026
7
7
ms.author: jordanselig
8
8
ms.service: azure-app-service
9
9
---
@@ -132,6 +132,47 @@ Your application uses one of the default outbound addresses for egress traffic t
132
132
> [!NOTE]
133
133
> Outbound SMTP connectivity (port 25) is supported for App Service Environment v3. The supportability is determined by a setting on the subscription where the virtual network is deployed. For virtual networks/subnets created before 1. August 2022 you need to initiate a temporary configuration change to the virtual network/subnet for the setting to be synchronized from the subscription. An example could be to add a temporary subnet, associate/dissociate an NSG temporarily, or configure a service endpoint temporarily. For more information and troubleshooting, see [Troubleshoot outbound SMTP connectivity problems in Azure](../../virtual-network/troubleshoot-outbound-smtp-connectivity.md).
134
134
135
+
## Outbound network segmentation
136
+
137
+
Outbound network segmentation allows you to join apps to alternate subnets to control how outbound traffic is routed. By default, all outbound traffic from an App Service Environment originates from the subnet hosting the App Service Environment.
138
+
139
+
### Enable outbound network segmentation
140
+
141
+
You must enable outbound network segmentation when you create your App Service Environment. You can't enable this feature on existing App Service Environments. Portal support for enabling this cluster setting or joining alternate subnets isn't available.
142
+
143
+
To enable the feature, configure the `MultipleSubnetJoinEnabled` cluster setting when you create the App Service Environment using an Azure Resource Manager or Bicep template:
144
+
145
+
```json
146
+
"clusterSettings": [
147
+
{
148
+
"name": "MultipleSubnetJoinEnabled",
149
+
"value": "true"
150
+
}
151
+
]
152
+
```
153
+
154
+
For guidance on configuring cluster settings, see [Custom configuration settings for App Service Environments](app-service-app-service-environment-custom-settings.md).
155
+
156
+
### Join an app to an alternate subnet
157
+
158
+
The alternate subnet must be empty and delegated to `Microsoft.Web/serverFarms`. Ensure that [application traffic routing is enabled for your app](../configure-vnet-integration-routing.md#configure-application-routing) to route all traffic through the alternate subnet.
159
+
160
+
To join an app to an alternate subnet, use the following Azure CLI command:
If your alternate subnet is in a different resource group than your app, run `az webapp vnet-integration add -h` to learn how to specify the resource ID.
167
+
168
+
To change the alternate subnet for an app, first remove the existing integration and then add a new one.
169
+
170
+
### Limitations
171
+
172
+
- Each app from a given plan can only integrate with one alternate subnet.
173
+
- A plan can have up to four different subnet connections, and apps in the same plan can use any of the connections.
174
+
- This feature isn't compatible with the [multi-plan subnet join](../overview-vnet-integration.md#subnet-requirements) feature available in the multitenant App Service offering.
175
+
135
176
## Private endpoint
136
177
137
178
In order to enable Private Endpoints for apps hosted in your App Service Environment, you must first enable this feature at the App Service Environment level.
0 commit comments