Important note: This article applies to PaaS 2.0 deployments done between 08/2023 and 01/2024 only. Review KB1003312: Sitecore Managed Cloud Standard – PaaS 2.0: Virtual Network Overview for all new deployments, provisioned after 01/02/2024. |
This article describes the default network architecture for a PaaS 2.0 deployment.
Review the following knowledge base articles for a definitive list of Azure services included when purchasing Sitecore Managed Cloud – PaaS 2.0:
PaaS 2.0 is the first time that Sitecore on Azure Managed Cloud has implemented Microsoft’s Hub and Spoke Network Architecture. This architecture allows for centralized control and cost optimization by directing all network ingress for each Azure region through a central hub.
Sitecore offers two tiers of hubs:
Ingress traffic passes through Azure Front Door Standard. We split Azure Front Door Standard into Production and Non-Production Configurations to allow for simple administration and support, while providing cost optimization by reusing Azure Front Door across multiple environments.
The Basic Hub Resource Group includes several key components, a private DNS service, an Azure Recovery Vault, an Azure Key Vault, an Azure Storage Account, a virtual network (vNet) and an Azure Bastion service with associated Bastion VM. The Azure Bastion service, which requires Sitecore corporate multi-factor authentication, allows authorized Sitecore employees to connect to the Hub vNet and peered Spoke vNets for remote desktop purposes, app services KUDU access, and more. For customer access to the Hub and Spoke vNet, we provide two key options:
The Advanced Hub extends the capability and functionality of the Basic Hub by adding Advanced Security capabilities with the inclusion of Azure Front Door Premium.
Key features include an advanced Web Application Firewall with Microsoft Managed Rule Sets and Bot Management.
As Azure Front Door advances over time, visit Microsoft’s website for the latest comparison.
Service and SKU Description | Basic Hub | Advanced Hub |
Production/Disaster Recovery – Azure Front Door Standard | Yes | - |
Non-Production Environment – Azure Front Door Standard* | Yes | - |
Azure Bastion & Automation VM – Virtual Machine | Yes | Yes |
Azure Private DNS (zones & Queries) | Yes | Yes |
Internet Egress (Bandwidth) | Yes | Yes |
Deployment of Azure Bastion Service |
Yes | Yes |
Deployment Site to Site VPN |
Yes | Yes |
Azure Key Vault | Yes | Yes |
Production Environment/Disaster Recovery – Azure Front Door Premium | - | Yes |
Non-Production Environment – Azure Front Door Premium* | - | Yes |
* One Azure Front Door to support multiple Sitecore XM/XP Non-Production Deployments
The Hub above is peered to each Sitecore environment’s Virtual Networks which is called a spoke.
Where possible Sitecore has moved Network Ingress and Egress between the Azure Services Sitecore uses to a Virtual Network.
Each Spoke has its own Virtual Network, Each Virtual Network contains multiple Subnets, and each Subnet has an attached Network Security Groups to control authorized access and prevent any unauthorized access to Azure Services. We do use a feature called VNet Peering to connect the Hub Virtual Network to allow each Spoke Virtual Network.
Note: It is important to note that if you select to have a VPN connecting to your own organizations network, each VNet IP Address Range must be assigned a range of IPs that will not overlap with the existing IPs.
Important note: vNet CIDR Range can be customized at Initial Deployment time only. |
The Network and Subnet information noted within this knowledge base article defines the vanilla deployment provided by Sitecore.
When the Hub Provisioning Pipeline is executed, the following range will be used as default: 10.0.0.0/16
Name | Range | Description |
Variable Subnet Name | 10.0.1.0/24 | Azure Bastion Service Subnet |
Variable Subnet Name | 10.0.2.0/24 | Azure Bastion Host Subnet |
Variable Subnet Name | 10.0.3.0/24 | Gateway Subnet |
It is possible to customize the network subnet ranges to suit your needs and to ensure the Sitecore-provided network ranges do not overlap with your internal network ranges.
When the Spoke Provisioning Pipeline is executed, the following range will be used as default: 10.1.0.0/16
XP Scaled
Name | Range | Description |
Verification_subnet | 10.1.100.0/24 | Temporary subnet used to verify the availability of the internal endpoints |
pe | 10.1.1.0/24 | Includes all the private endpoints of the Azure PaaS resources |
agw | 10.1.0.0/24 | Application Gateway |
cd | 10.1.4.0/24 | Content Delivery Server (XM and XP) |
cm | 10.1.2.0/24 | Content Management Server |
si | 10.1.3.0/24 | Identity Server |
xc-resourceintensive | 10.1.7.0/24 | XC Resource Intensive App Plan (XP Only) |
xc-basic | 10.1.6.0/24 | XC Basic App Plan (XP Only) |
prc | 10.1.5.0/24 | xDB Processing Service (XP Only) |
headless | 10.1.8.0/24 | Option Subnet for Headless services (Node JS) |
It is possible to customize the network subnet ranges to suit your needs and to ensure the Sitecore-provided network ranges do not overlap with your internal network ranges.
XP Single
Name | Range | Description |
verification_subnet | 10.1.100.0/24 | A temporary subnet used to verify the availability of the internal endpoints |
pe | 10.1.1.0/24 | Includes all the private endpoints of the Azure PaaS resources |
agw | 10.1.0.0/24 | Application Gateway |
single | 10.1.2.0/24 | ####Provide info ( -single and –si endpoints are using it) |
xc-single | 10.1.3.0/24 | ####Provide info ( -xc-single endpoints is using it) |
XM Scaled
Name | Range | Description |
Verification_subnet | 10.1.100.0/24 | Temporary subnet used to verify the availability of the internal endpoints |
pe | 10.1.1.0/24 | Includes all the private endpoints of the Azure PaaS resources |
agw | 10.1.0.0/24 | Application Gateway |
cd | 10.1.4.0/24 | Content Delivery Server (XM and XP) |
cm | 10.1.2.0/24 | Content Management Server |
si | 10.1.3.0/24 | Identity Server |
XM Single
Name | Range | Description |
Verification_subnet | 10.1.100.0/24 | Temporary subnet used to verify the availability of the internal endpoints |
pe | 10.1.1.0/24 | Includes all the private endpoints of the Azure PaaS resources |
agw | 10.1.0.0/24 | Application Gateway |
single | 10.1.2.0/24 | ####Provide info (single endpoint is using it) |
It is possible to customize the network subnet ranges to suit your needs and to ensure the Sitecore-provided network ranges do not overlap with your internal network ranges.
The following alternative IP Ranges are available for selection. These ranges can be used for the Hub and the Spoke(s) environments.
During the Sitecore Provisioning process, Sitecore will check to see if the requested range is already in use within the Sitecore Managed Cloud deployment. This check will validate the previously deployed Hub and Spoke Environments. If the nominated range is unavailable the Sitecore Cloud Operations support will reply to the Service Request Ticket requesting the customer to provide an alternative IP Range.
When selecting an alternative IP Range, the Sitecore provisioning process will dynamically assign the following subnet ranges to the aligned service types. The process is handled by the provisioning pipeline and does not require customer input. Note that it is NOT possible to alter the "/24" subnet allocations.
Customer Defined Network Range: 10.”X”.1.0 / 24
"X" = 0 to 250
Name | Range | Description |
Variable Subnet Name | 10.”x”.1.0/24 | Azure Bastion Service Subnet |
Variable Subnet Name | 10.”x”.2.0/24 | Azure Bastion Host Subnet |
Variable Subnet Name | 10.”x”.3.0/24 | Gateway Subnet |
Customer Defined Network Range: 10.”X”.1.0 / 24
"X" = 0 to 250
Name | Range | Description |
Verification_subnet | 10.”x”.100.0/24 | Temporary subnet used to verify the availability of the internal endpoints |
pe | 10.”x”.1.0/24 | Includes all the private endpoints of the Azure PaaS resources |
agw | 10.”x”.0.0/24 | Application Gateway |
cd | 10.”x”.4.0/24 | Content Delivery Server (XM and XP) |
cm | 10.”x”.2.0/24 | Content Management Server |
si | 10.”x”.3.0/24 | Identity Server |
xc-resourceintensive | 10.”x”.7.0/24 | XC Resource Intensive App Plan (XP Only) |
xc-basic | 10.”x”.6.0/24 | XC Basic App Plan (XP Only) |
prc | 10.”x”.5.0/24 | xDB Processing Service (XP Only) |
headless | 10.”x”.8.0/24 | Option Subnet for Headless services (Node JS) |
For customers with Disaster Recovery Services included in their agreement, it is worth considering which IP Ranges you require in your secondary region.
Sitecore Managed Cloud DR 2.0 is fully isolated from a network perspective, meaning the DR Hub and Spoke deployments do not include VNet peering back to the Primary region. For this reason it is possible to allocate the same IP Ranges to your DR Hub and Spoke Environments as you have with your Production Hub and Spoke Environments. It Is equally possible to allocate IP Ranges from the list above.
The following alternative IP Ranges are available for selection. These ranges can be used for the Hub and the Spoke(s) environments.
The following alternative IP Ranges are available for selection. These ranges can be used for the Hub and the Spokes environments.
During the Sitecore Provisioning process, Sitecore will check to see if the requested range is already in use within the Sitecore Managed Cloud deployment. This check will validate the previously deployed Hub and Spoke Environments. If the nominated range is unavailable the Sitecore Cloud Operations team will reply to the Service Request Ticket requesting the customer to provide an alternative IP Range.
When selecting an alternative IP Range, the Sitecore provisioning process will dynamically assign the following subnet ranges to the aligned service types. The process is handled by the provisioning pipeline and does not require customer input. Note that it is NOT possible to alter the /24 subnet allocations.
Customer Defined Network Range: 172.”X”.1.0 / 24
"X" = 16 to 31
Name | Allocated Subnet | Description |
Variable Name | 172.”x”.1.0/24 | Azure Bastion Service Subnet |
Variable Name | 172.”x”.2.0/24 | Azure Bastion Host Subnet |
Variable Name | 172.”x”.3.0/24 | Application Gateway |
Customer Defined Network Range: 172.”X”.1.0 / 24
"X" = 16 to 31
Name | Range | Description |
Verification_subnet | 172.”x”.100.0/24 | Temporary subnet used to verify the availability of the internal endpoints |
pe | 172.”x”.1.0/24 | Includes all the private endpoints of the Azure PaaS resources |
agw | 172.”x”.0.0/24 | Application Gateway |
cd | 172.”x”.4.0/24 | Content Delivery Server (XM and XP) |
cm | 172.”x”.2.0/24 | Content Management Server |
si | 172.”x”.3.0/24 | Identity Server |
xc-resourceintensive | 172.”x”.7.0/24 | XC Resource Intensive App Plan (XP Only) |
xc-basic | 172.”x”.6.0/24 | XC Basic App Plan (XP Only) |
prc | 172.”x”.5.0/24 | xDB Processing Service (XP Only) |
headless | 172.”x”.8.0/24 | Option Subnet for Headless services (Node JS) |
For customers with Disaster Recovery Services included in their agreement, it is worth considering which IP Ranges you require in your secondary region.
Sitecore Managed Cloud DR 2.0 is fully isolated from a network perspective, meaning the DR Hub and Spoke deployments do not include VNet peering back to the Primary region. For this reason, it is possible to allocate the same IP Ranges to your DR Hub and Spoke Environments as you have with your Production Hub and Spoke Environments. It Is equally possible to the allocated IP Ranges from the list above.
The following alternative IP Ranges are available for selection. These ranges can be used for the Hub and the Spokes environments.