Sitecore Managed Cloud Standard – PaaS 2.0: Virtual Network Overview


 

Important note:
This article applies to PaaS 2.0 Deployments from March 2024 and later.
For PaaS 2.0 deployments prior to March 2023, refer to KB1003100 - Sitecore Managed Cloud - PaaS 2.0 - Network Guide

 

Table of Contents

 

Overview 

This article describes the default network architecture for a PaaS 2.0 deployment.

Review the following knowledge base articles for a definitive list of Azure services included when purchasing Sitecore Managed Cloud – PaaS 2.0:

Hub and Spoke Architecture

PaaS 2.0 is the first time that Sitecore on Azure Managed Cloud has implemented Microsoft’s Hub and Spoke Network Architecture. This architecture allows for centralized control and cost optimization by directing all network ingress for each Azure region through a central hub.

Sitecore offers two tiers of hubs: Basic and Advanced.

Basic Hub

Ingress traffic passes through Azure Front Door Standard. We split Azure Front Door Standard into Production and Non-Production Configurations to allow for simple administration and support, while providing cost optimization by reusing Azure Front Door across multiple environments.

The Basic Hub Resource Group includes several key components, a private DNS service, an Azure Recovery Vault, an Azure Key Vault, an Azure Storage Account, a virtual network (vNet) and an Azure Bastion service with associated Bastion VM. The Azure Bastion service, which requires Sitecore corporate multi-factor authentication, allows authorized Sitecore employees to connect to the Hub vNet and peered Spoke vNets for remote desktop purposes, app services KUDU access, and more. For customer access to the Hub and Spoke vNet, we provide two key options:

Advanced Hub

The Advanced Hub extends the capability and functionality of the Basic Hub by adding Advanced Security capabilities with the inclusion of Azure Front Door Premium.

Key features include an advanced Web Application Firewall with Microsoft Managed Rule Sets and Bot Management.

The Advanced also includes the provisioning of Azure Defender for Cloud. Review KB1003247 - Sitecore Managed Cloud - PaaS 2.0 - Defender Implementation Guide, for further details.

As Azure Front Door advances over time, visit Microsoft’s website for the latest comparison.

Hub and Spoke Architecture – High-Level Network Diagram

A screenshot of a computer screenDescription automatically generated

Basic and Advanced Hub – Services and Features Comparison

RACI Description Basic HubAdvanced hub

 Production/Disaster Recovery – Azure Front Door Standard

Yes-
 Non-Production Environment – Azure Front Door Standard *Yes-
 Azure Bastion & Automation VM – Virtual MachineYesYes 
 Azure Private DNS (zones & Queries)  YesYes
 Internet Egress (Bandwidth)YesYes

 Deployment of Azure Bastion Service
(Required for Sitecore Support your environment)

YesYes

 Deployment Site to Site VPN
(Defined by the customer during environment provisioning request )

YesYes
 Azure Key Vault YesYes
 Production Environment/Disaster Recovery – Azure Front Door Premium -Yes
 Non-Production Environment – Azure Front Door Premium *-Yes
 Azure Defender for Cloud with Workload Protection -Yes
 Azure DDoS IP Protection Via Add-on PurchaseVia Add-on Purchase

* One Azure Front Door to support multiple Sitecore XM/XP Non-Production Deployments 

 

We peer the Hub above to each Sitecore environment’s Virtual Networks which we call a Spoke.

IMPORTANT NOTE:
Sitecore Managed Cloud PaaS 2.0 includes several enhancements to the private network architecture and how Sitecore reserves Virtual Network Address spaces and Subnet Ranges. The information noted below applies to PaaS 2.0 deployments from February 2024 onwards. PaaS 2.0 customers deployed prior to this date should review Sitecore Managed Cloud - PaaS 2.0 - Network Guide

PaaS 2.0 Sitecore now provides customers with the full flexibility to choose the IP Ranges they would like to apply to their Sitecore Managed Cloud Deployments.

 

PaaS 2.0: Virtual Network Address Spaces and Subnet Ranges

Where possible Sitecore has moved Network Ingress and Egress between the Azure Services Sitecore uses to a Virtual Network.

Each Spoke has its own Virtual Network, Each Virtual Network contains multiple Subnets, and each Subnet has an attached Network Security Groups to control authorized access and prevent any unauthorized access to Azure Services. We do use a feature called vNet Peering to connect the Hub Virtual Network to allow each Spoke(s) Virtual Network.

NOTE: It is important to note that if you select to have a VPNGW1AZ connecting to your own organization's network, each vNet IP Address Range must be assigned a range of IPs that will not overlap with the existing IPs. vNet CIDR Range can be customized at Initial Deployment time only.

The Network and Subnet information noted within this knowledge base article defines the vanilla deployment provided by Sitecore.

 

PaaS 2.0: Acceptable/Valid IP Addresses

Sitecore Managed Cloud is delivered on Microsoft Azure. As such, when provisioning a Sitecore Managed Cloud PaaS 2.0 environment, it is important to familiarize yourself with the acceptable IP ranges available for use by Microsoft. Sitecore currently supports ranges defined in RFC 1918:

Official Microsoft Documentation can be found here.

 

Known IP Address Restrictions

Azure reserves the first four addresses and the last address, for a total of five IP addresses within each subnet.

For example, the IP address range of 192.168.1.0/24 has the following reserved addresses:

 

PaaS 2.0: Customer Required Inputs

Prior to the deployment of your Managed Cloud PaaS 2.0 deployment, you will be required to specify a network address space for each of your Sitecore Hub and Spoke Environments.

 

Hub Environment

When the Hub Provisioning Pipeline is executed, the Sitecore Cloud Operation team will require the customer to provide a valid /24 network address space. This subnet should be provided when logging the request in the ServiceNow portal.

Note: Sitecore requires a unique virtual network address space for each Hub environment.

TypeCIDRAvailable IPsExampleUsable Range 

Primary Hub: Virtual Network Address Space 

/24 251 IPS 10.0.0.0/24 10.0.0.0 - 10.0.0.255 
 Secondary Hub: Virtual Network Address Space * /24 251 IPS 10.0.0.0/24 10.0.0.0 - 10.0.0.255 

* Only applicable for customers who have purchased Disaster Recovery Protection. Note that Sitecore does not include vNet peering between the Primary and Secondary Hubs. Whilst it is not recommended, it is technically possible to re-use the same network address space for both the Primary and Secondary Hubs

During the Hub provisioning process, the customer-provided /24 network address space will be carved up into the following network subnets. The process is repeated for both the Primary and Secondary Hub Environments.

TypeCIDRAvailable IPsExampleUsable Range 

Azure Bastion Subnet 

/2659 IPS 10.0.0.0/2610.0.0.0 – 10.0.0.63 
 Gateway Subnet  /2727 IPS 10.0.0.0/2710.0.0.64 – 10.0.0.95 
 Azure Bastion VM Subnet  /2811 IPS10.0.0.0/2810.0.0.96 – 10.0.0.111 

 

Spoke Environment

When the Hub Provisioning Pipeline is executed, the Sitecore Cloud Operation team will require the customer to provide a valid network address space for each Spoke deployment. This subnet should be provided when pinging the request in the ServiceNow portal.

The CIDR for the network address space must honor the minimum required CIDR as defined below.

Note: Sitecore requires a unique virtual network address space for each spoke environment.

 

Experience Manager (XM)

XM Spoke Environment Types

TypeCIDRAvailable IPsExampleUsable Range 
 XM Single: Virtual Network Address Space /23512 IPS 10.0.0.0/23 10.0.0.0 - 10.0.1.255
XM Scaled: Virtual Network Address Space /221024 IPS 10.0.0.0/22 10.0.0.0 – 10.0.3.254 

 

XM Single Spoke – Subnet Allocation

When requesting the provision of an XM Single Spoke, the provisioning process will automatically designate the following Subnet. 

TypeCIDRAvailable IPsExampleUsable Range 
XM Single: Virtual Network Address Space /23512 IPS 10.0.0.0/23 10.0.0.0 - 10.0.1.255 
Application Gateway /24251 IPS 10.0.0.0/24  10.0.0.0 - 10.0.0.255 
Private Endpoints /2659 IPS 10.0.1.0/26  10.0.1.0 - 10.0.1.63 
Single (All Services) /2811 IPS 10.0.1.64/28  10.0.1.64 - 10.0.1.79 

 

XM Single Spoke – Static Private Endpoints 

TypeAvailable IPsExample
SQL Server1st Available IP 10.0.1.4 
SI (Identity)2nd Available IP 10.0.1.5 
Single (All) 5th Available IP 10.0.1.8 

 

XM Scaled Spoke – Subnet Allocation 

When requesting the provision of an XM Scaled Spoke, the provisioning process will automatically designate the following Subnet.

TypeCIDRAvailable IPsExampleUsable Range 
XM Scaled: Virtual Network Address Space /221024 IPS 10.0.0.0/2210.0.0.0 – 10.0.0.3.254 
Application Gateway /24251 IPS 10.0.0.0/24  10.0.0.0 - 10.0.0.255 
Private Endpoints /2659 IPS 10.0.1.0/26  10.0.1.0 - 10.0.1.63 
SI (Identity) /2659 IPS 10.0.1.64/26  10.0.1.64 - 10.0.1.127 
CM (Content Management) /2659 IPS 10.0.1.128/26  10.0.1.128 - 10.0.1.191 
CD (Content Delivery) /2659 IPS 10.0.1.192/26  10.0.1.192 - 10.0.1.255 

 

XM Scaled Spoke – Static Private Endpoints

TypeAvailable IPsExample
SQL Server1st Available IP 10.0.1.4 
SI (Identity)2nd Available IP 10.0.1.5 
CM (Content Management) 3rd Available IP 10.0.1.6
CD (Content Delivery) 4th Available IP 10.0.1.7
Redis Private Endpoint 16th Available IP 10.0.1.19

 

Experience Platform (XP)

XP Spoke Environment Types

TypeCIDRAvailable IPsExampleUsable Range 
 XP Single: Virtual Network Address Space /23512 IPS 10.0.0.0/23 10.0.0.0 - 10.0.1.255
XP Scaled: Virtual Network Address Space /221024 IPS 10.0.0.0/22 10.0.0.0 – 10.0.3.254 

 

XP Single Spoke – Subnet Allocation

When requesting the provision of an XP Single Spoke, the provisioning process will automatically designate the following Subnet. 

TypeCIDRAvailable IPsExampleUsable Range 
 XP Single: Virtual Network Address Space /23512 IPS 10.0.0.0/23 10.0.0.0 - 10.0.1.255 
 Application Gateway /24251 IPS 10.0.0.0/24  10.0.0.0 - 10.0.0.255 
 Private Endpoints /2659 IPS 10.0.1.0/26  10.0.1.0 - 10.0.1.63 
 Single (All Services) /2811 IPS 10.0.1.64/28  10.0.1.64 - 10.0.1.79 
 XC-Single  /2811 IPS 10.0.1.80/28 10.0.1.80 - 10.0.1.95 

Additionally, when requesting the provision of your Sitecore Environment, you have the option to select either Dynamic or Static IP address. The table below represents the Static IP Allocation should you choose this deployment option. 

 

XP Single Spoke – Static Private Endpoints 

TypeAvailable IPsExample
 SQL Server1st Available IP 10.0.1.4 
 SI (Identity)2nd Available IP 10.0.1.5 
 Single (All) 5th Available IP 10.0.1.8 
 XC-Single (XP Services)  6th Available IP 10.0.1.9 
 Service Bus 15th Available IP 10.0.1.18 

 

XP Scaled Spoke – Subnet Allocation 

When requesting the provision of an XP Scaled Spoke, the provisioning process will automatically designate the following Subnet.

TypeCIDRAvailable IPsExampleUsable Range 
 XP Scaled:  Virtual Network Address Space/221024 IPS 10.0.0.0/2210.0.0.0 – 10.0.0.3.254 
 Application Gateway /24251 IPS 10.0.0.0/24  10.0.0.0 - 10.0.0.255 
 Private Endpoints /2659 IPS 10.0.1.0/26  10.0.1.0 - 10.0.1.63 
 SI (Identity) /2659 IPS 10.0.1.64/26  10.0.1.64 - 10.0.1.127 
 CM (Content Management) /2659 IPS 10.0.1.128/26  10.0.1.128 - 10.0.1.191 
 CD (Content Delivery) /2659 IPS 10.0.1.192/26  10.0.1.192 - 10.0.1.255 
 PRC (Processing Service)  /2659 IPS 10.0.2.0/26  10.0.2.0 - 10.0.2.63 
 XC-Basic (Multi-Service: Basic) /2659 IPS 10.0.2.64/26 10.0.2.64/26 
 XC-ResourceIntensive (Multi-Service: Intensive)  /2659 IPS 10.0.2.128/26  10.0.2.128 - 10.0.2.191 
 Headless – Optional  /2659 IPS 10.0.2.192/26  10.0.2.192 - 10.0.2.255 

Additionally, when requesting the provision of your Sitecore Environment, you have the option to select either Dynamic or Static IP address. The table below represents the Static IP Allocation should you choose this deployment option.

 

XP Scaled Spoke – Static Private Endpoints

TypeAvailable IPsExample
SQL Server1st Available IP 10.0.1.4 
SI (Identity)2nd Available IP 10.0.1.5 
CM (Content Management) 3rd Available IP 10.0.1.6
CD (Content Delivery) 4th Available IP 10.0.1.7
cortex-processing 7th available IP 10.0.1.10
cortex-reporting 8th available IP 10.0.1.11
ma-ops 9th available IP 10.0.1.12
ma-rep 10th available IP 10.0.1.13
PRC (Processing Service) 11th available IP 10.0.1.14
xc-collect 12th available IP 10.0.1.15
xc-refdata 13th available IP 10.0.1.16
xc-search 14th available IP 10.0.1.17
service bus private endpoint 15th available IP 10.0.1.18
Redis Private Endpoint 16th available IP 10.0.1.19