%3CLINGO-SUB%20id%3D%22lingo-sub-1667283%22%20slang%3D%22en-US%22%3EIPv4%2FIPv6%20dual%20stack%20webservices%20in%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1667283%22%20slang%3D%22en-US%22%3E%3CP%3EIPv6%20is%20the%20most%20recent%20version%20of%20the%20%3CSTRONG%3EInternet%20Protocol%20(IP)%3C%2FSTRONG%3E%20and%20the%20%3CSTRONG%3EInternet%20Engineering%20Task%20Force%20(IETF)%3C%2FSTRONG%3E%20standard%20is%20already%20more%20than%2020%20years%20old%2C%20but%20for%20most%20of%20us%20is%20it%20still%20not%20something%20we%20have%20to%20deal%20with%20on%20a%20day-to-day%20basis.%20This%20is%20slowly%20changing%20as%20some%20areas%20of%20the%20world%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FIPv6%23IPv4_address_exhaustion%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eare%20running%20out%20of%20IPv4%20addresses%3C%2FA%3E%3C%2FSPAN%3E%20and%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FIPv6_deployment%23Deployment_by_country_and_region%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Elocal%20governments%20start%20to%20make%20IPv6%20support%20mandatory%3C%2FA%3E%3C%2FSPAN%3E%20for%20%3CSPAN%3E%3CA%20href%3D%22http%3A%2F%2Fwww.cnstandards.net%2Findex.php%2Fstrategy%2Finternet-protocol-version-6-ipv6%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esome%20verticals%3C%2FA%3E%3C%2FSPAN%3E.%20This%20results%20in%20urgent%20requests%20by%20some%20of%20our%20customers%20to%20provide%20their%20webservices%20via%20IPv4%20and%20IPv6%20(so%20called%20dual%20stack)%20to%20fulfill%20their%20regulatory%20requirements.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.internetsociety.org%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EInternet%20Society%3C%2FA%3E%3C%2FSPAN%3E%20published%20an%20article%20already%20back%20in%20June%202013%20(see%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.internetsociety.org%2Fresources%2Fdeploy360%2F2013%2Fmaking-content-available-over-ipv6%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%E2%80%9CMaking%20Content%20Available%20Over%20IPv6%E2%80%9D%3C%2FA%3E%3C%2FSPAN%3E)%20on%20what%20potential%20implementations%20could%20look%20like.%20Their%20article%20is%20covering%20native%20IPv6%2C%20proxy%20servers%20and%20Network%20Address%20Translation%20(NAT).%20Even%20though%20the%20article%20is%20already%20a%20few%20years%20old%2C%20the%20different%20options%20are%20still%20valid.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESo%20how%20does%20this%20apply%20to%20Azure%3F%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fvirtual-network%2Fipv6-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20supports%20IPv6%3C%2FA%3E%3C%2FSPAN%3E%20and%20has%20done%20for%20quite%20some%20time%20now%20for%20most%20of%20its%20the%20foundational%20network%20and%20compute%20services.%20This%20enables%20native%20implementations%20using%20IPv4%20and%20IPv6%20by%20leveraging%20Azure%E2%80%99s%20dual%20stack%20capabilities.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFor%20example%2C%20in%20scenarios%20where%20applications%20are%20mainly%20based%20on%20%3CSTRONG%3EVirtual%20Machines%20(VMs)%3C%2FSTRONG%3E%20and%20other%20%3CSTRONG%3EInfrastructure-as-a-Service%20(IaaS)%3C%2FSTRONG%3E%20services%20with%20full%20IPv6%20support%2C%20we%20are%20able%20to%20use%20native%20IPv4%20and%20IPv6%20end-to-end.%20This%20avoids%20any%20complications%20caused%20by%20translations%20and%20it%20provides%20the%20most%20information%20to%20the%20server%20and%20the%20application.%20But%20it%20also%20means%20that%20every%20device%20along%20the%20path%20between%20the%20client%20and%20the%20server%20must%20handle%20IPv6%20traffic.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20following%20diagram%20depicts%20a%20simple%20dual%20stack%20(IPv4%2FIPv6)%20deployment%20in%20Azure%3A%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorHeyko%20Oelrichs_0%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22ipv6_image_1.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F218299i36F83BD0530D4B4A%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22ipv6_image_1.png%22%20alt%3D%22ipv6_image_1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20native%20end-to-end%20implementation%20is%20most%20interesting%20for%20scenarios%20and%20use%20cases%20where%20direct%20server-to-server%20or%20client-to-server%20communication%20is%20required.%20This%20is%20not%20the%20case%20for%20most%20webservices%20and%20applications%20as%20they%20are%20typically%20already%20exposed%20through%2C%20or%20shielded%20behind%20a%20Firewall%2C%20a%20%3CSTRONG%3EWeb%20Application%20Firewall%20(WAF)%3C%2FSTRONG%3E%20or%20a%20reverse%20proxy.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOther%20more%20complex%20deployments%20and%20applications%20often%20times%20contain%20a%20set%20of%203%3CSUP%3Erd%3C%2FSUP%3E-party%20applications%20or%20%3CSTRONG%3EPlatform-as-a-Service%20(PaaS)%3C%2FSTRONG%3E%20services%20like%20%3CSTRONG%3EAzure%20Application%20Gateway%20(AppGw)%3C%2FSTRONG%3E%2C%20%3CSTRONG%3EAzure%20Kubernetes%20Services%20(AKS)%2C%20Azure%20SQL%20databases%3C%2FSTRONG%3E%20and%20others%20that%20do%20not%20necessarily%20support%20native%20IPv6%20today.%20And%20there%20might%20be%20also%20other%20backend%20services%20and%20solutions%2C%20in%20some%20cases%20hosted%20on%20IaaS%20VMs%20that%20are%20also%20not%20capable%20of%20speaking%20IPv6.%20This%20is%20where%20NAT%2FNAT64%20or%20an%20IPv6%20proxy%20solution%20comes%20to%20play.%20These%20solutions%20allow%20us%20to%20transition%20from%20IPv6%20to%20IPv4%20and%20vice%20versa.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EBesides%20the%20technical%20motivation%20and%20need%20to%20translate%20from%20IPv6%20to%20IPv4%20are%20there%20also%20other%20considerations%20especially%20around%20education%2C%20the%20costs%20of%20major%20application%20changes%20and%20modernization%20as%20well%20as%20the%20complexity%20of%20an%20application%20architecture%20why%20customers%20consider%20using%20a%20gateway%20to%20offer%20services%20via%20IPv4%2FIPv6%20while%20still%20leveraging%20IPv4-only%20infrastructure%20in%20the%20background.%3C%2FP%3E%0A%3CP%3EA%20very%20typical%20deployment%20today%2C%20for%20example%20using%20a%20WAF%2C%20looks%20like%20this%3A%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorHeyko%20Oelrichs_1%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22ipv6_image_2.png%22%20style%3D%22width%3A%20480px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F218300i96E0B24DF826B1B2%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22ipv6_image_2.png%22%20alt%3D%22ipv6_image_2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20difference%20between%20the%20first%20and%20the%20second%20drawing%20in%20this%20post%20is%20that%20the%20latter%20has%20a%20front-end%20subnet%20that%20contains%20for%20example%20a%203%3CSUP%3Erd%3C%2FSUP%3E-Party%20%3CSTRONG%3ENetwork%20Virtual%20Appliance%20(NVA)%3C%2FSTRONG%3E%20that%20accepts%20IPv4%20and%20IPv6%20traffic%20and%20translates%20it%20into%20IPv4-only%20traffic%20in%20the%20backend.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20allows%20customers%20to%20expose%20existing%20applications%20via%20IPv4%20and%20IPv6%2C%20making%20them%20accessible%20to%20their%20end-users%20natively%20via%20both%20IP%20versions%20without%20the%20need%20to%20re-architect%20their%20application%20workloads%20and%20to%20overcome%20limitations%20in%20some%20Azure%20services%20and%203%3CSUP%3Erd%3C%2FSUP%3E-Party%20services%20that%20do%20not%20support%20IPv6%20today.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EHere%20is%20a%20closer%20look%20on%20how%20a%20typical%20architecture%20could%20look%20like%3A%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorHeyko%20Oelrichs_2%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22ipv6_image_3.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F218301iA311E42B3AC8AF91%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22ipv6_image_3.png%22%20alt%3D%22ipv6_image_3.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20Azure%20Virtual%20Network%20is%20enabled%20for%20IPv6%20and%20has%20address%20prefixes%20for%20IPv4%20and%20IPv6%20(these%20prefixes%20are%20examples%20only).%20The%20%E2%80%9CFront-end%20subnet%E2%80%9D%20is%20enabled%20for%20IPv6%20as%20well%20and%20contains%20a%20pair%20of%20NVAs.%20These%20NVAs%20are%20deployed%20into%20an%20Azure%20Availability%20Set%2C%20to%20increase%20their%20availability%2C%20and%20exposed%20through%20an%20%3CSTRONG%3EAzure%20Load%20Balancer%20(ALB)%3C%2FSTRONG%3E.%20The%20first%20ALB%20(on%20the%20left)%20has%20a%20public%20IPv4%20and%20a%20public%20IPv6%20address.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20NVAs%20(for%20example%20a%20WAF)%20in%20the%20Front-end%20subnet%20accept%20IPv4%20and%20IPv6%20traffic%20and%20can%20offer%2C%20depending%20on%20the%20ISV%20solution%20and%20SKU%20a%20broad%20set%20of%20functionality%20and%20translate%20the%20inbound%20traffic%20into%20IPv4%20to%20access%20the%20application%20that%20is%20running%20in%20our%20%E2%80%9CApplication%20subnet%E2%80%9D.%20The%20application%20is%20again%20exposed%20(internally%3B%20no%20public%20IP%20addresses)%20via%20IPv4%20only%20through%20an%20internal%20ALB%20and%20only%20accessible%20from%20the%20NVAs%20in%20the%20front-end%20subnet.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20results%20in%20an%20architecture%20that%20provides%20services%20via%20IPv4%20and%20IPv6%20to%20end-users%20while%20the%20backend%20application%20is%20still%20using%20IPv4-only.%20The%20benefit%20of%20this%20approach%20is%20the%20reduced%20complexity%2C%20the%20application%20teams%20do%20not%20need%20to%20know%20and%20take%20care%20of%20IPv6%2C%20on%20one%20hand%20and%20on%20the%20other%20hand%20a%20reduced%20attach%20surface%20as%20between%20the%20front-end%20and%20the%20application%20subnet%20we%E2%80%99re%20only%20using%20the%20well-known%20and%20fully%20supported%20IPv4%20protocol.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EInstead%20of%20using%20a%203%3CSUP%3Erd%3C%2FSUP%3E-party%20NVA%2C%20Azure%20offers%20similar%2C%20managed%20capabilities%20using%20the%20%3CSTRONG%3EAzure%20Front%20Door%20(AFD)%20service%3C%2FSTRONG%3E.%20AFD%20is%20a%20global%20Azure%20service%20that%20%E2%80%9Cenables%20you%20to%20define%2C%20manage%20and%20monitor%20global%20routing%20for%20web%20traffic%20by%20optimizing%20for%20best%20performance%20and%20quick%20global%20failover%20for%20high%20availability%E2%80%9D%20(see%20%E2%80%9C%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Ffrontdoor%2Ffront-door-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EWhat%20is%20Azure%20Front%20Door%3F%3C%2FA%3E%3C%2FSPAN%3E%E2%80%9D).%20AFD%20works%20at%20Layer%207%20(%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FOSI_model%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOSI%20model%3C%2FA%3E%3C%2FSPAN%3E)%20or%20HTTP%2FHTTPS%20layer%20and%20uses%20the%20anycast%20protocol%20and%20allows%20you%20to%20route%20client%20requests%20to%20the%20fastest%20and%20most%20available%20application%20backend.%20An%20application%20backend%20can%20be%20any%20Internet-facing%20service%20hosted%20inside%20or%20outside%20of%20Azure.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAFD%E2%80%99s%20capabilities%20include%20proxying%20IPv6%20client%20requests%20and%20traffic%20to%20an%20IPv4-only%20backend%20as%20shown%20below%3A%3C%2FP%3E%0A%3CDIV%20id%3D%22tinyMceEditorHeyko%20Oelrichs_3%22%20class%3D%22mceNonEditable%20lia-copypaste-placeholder%22%3E%26nbsp%3B%3C%2FDIV%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22ipv6_image_4.png%22%20style%3D%22width%3A%20738px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F218302i7755665BDF41D513%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22ipv6_image_4.png%22%20alt%3D%22ipv6_image_4.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20main%20architectural%20difference%20between%20the%20NVA-based%20approach%20we%20have%20described%20in%20the%20beginning%20of%20this%20post%20and%20the%20use%20of%20AFD%20service%20is%2C%20that%20the%20NVAs%20are%20customer-managed%2C%20work%20at%20Layer%204%20(%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FOSI_model%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOSI%20model%3C%2FA%3E%3C%2FSPAN%3E)%20and%20can%20be%20deployed%20into%20the%20same%20Azure%20Virtual%20Network%20as%20the%20application%20in%20a%20way%20where%20the%20NVA%20has%20a%20private%20and%20a%20public%20interface.%20The%20application%20is%20then%20only%20accessible%20through%20the%20NVAs%20which%20allows%20filtering%20of%20all%20ingress%20(and%20egress)%20traffic.%20Whereas%20AFD%20is%20a%20global%20PaaS%20service%20in%20Azure%2C%20living%20outside%20of%20a%20specific%20Azure%20Region%20and%20works%20at%20Layer%207%20(HTTP%2FHTTPS).%20The%20application%20backend%20is%20an%20Internet-facing%20service%20hosted%20inside%20or%20outside%20of%20Azure%20and%20can%20be%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Ffrontdoor%2Ffront-door-faq%23how-do-i-lock-down-the-access-to-my-backend-to-only-azure-front-door%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Elocked%20down%3C%2FA%3E%3C%2FSPAN%3E%20to%20accept%20traffic%20only%20from%20your%20specific%20Front%20Door.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20we%20are%20in%20this%20post%20explaining%20these%20two%20solutions%20as%20different%20options%20to%20make%20IPv4-only%20applications%20and%20services%20hosted%20in%20Azure%20available%20to%20users%20via%20IPv4%20and%20IPv6%2C%20it%20is%20in%20general%20and%20especially%20in%20more%20complex%20environments%20not%20either%20a%20WAF%2FNVA%20solution%20or%20Azure%20Front%20Door.%20It%20can%20be%20a%20combination%20of%20both%20where%20NVAs%20are%20used%20within%20a%20regional%20deployment%20while%20AFD%20is%20used%20to%20route%20the%20traffic%20to%20one%20or%20more%20regional%20deployments%26nbsp%3B%20in%20different%20Azure%20regions%20(or%20other%20Internet-facing%20locations).%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhat%E2%80%99s%20next%3F%20Take%20a%20closer%20look%20into%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Ffrontdoor%2F%23features%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20Front%20Door%3C%2FA%3E%3C%2FSPAN%3E%20service%20and%20its%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Ffrontdoor%2Ffront-door-overview%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%3C%2FSPAN%3E%20to%20learn%20more%20about%20its%20capabilities%20to%20decide%20if%20either%20native%20end-to-end%20IPv4%2FIPv6%20dual%20stack%2C%20a%203%3CSUP%3Erd%3C%2FSUP%3E-party%20NVA-based%20solution%20or%20Azure%20Front%20Door%20services%20fulfils%20your%20needs%20to%20support%20IPv6%20with%20your%20web%20application.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1667283%22%20slang%3D%22en-US%22%3E%3CP%3EIPv6%20is%20the%20most%20recent%20version%20of%20the%20%3CSTRONG%3EInternet%20Protocol%20(IP)%3C%2FSTRONG%3E%20and%20the%20%3CSTRONG%3EInternet%20Engineering%20Task%20Force%20(IETF)%3C%2FSTRONG%3E%20standard%20is%20already%20more%20than%2020%20years%20old%2C%20but%20for%20most%20of%20us%20is%20it%20still%20not%20something%20we%20have%20to%20deal%20with%20on%20a%20day-to-day%20basis.%20This%20is%20slowly%20changing%20as%20some%20areas%20of%20the%20world%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FIPv6%23IPv4_address_exhaustion%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eare%20running%20out%20of%20IPv4%20addresses%3C%2FA%3E%3C%2FSPAN%3E%20and%20%3CSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FIPv6_deployment%23Deployment_by_country_and_region%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Elocal%20governments%20start%20to%20make%20IPv6%20support%20mandatory%3C%2FA%3E%3C%2FSPAN%3E%20for%20%3CSPAN%3E%3CA%20href%3D%22http%3A%2F%2Fwww.cnstandards.net%2Findex.php%2Fstrategy%2Finternet-protocol-version-6-ipv6%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Esome%20verticals%3C%2FA%3E%3C%2FSPAN%3E.%20This%20results%20in%20urgent%20requests%20by%20some%20of%20our%20customers%20to%20provide%20their%20webservices%20via%20IPv4%20and%20IPv6%20(so%20called%20dual%20stack)%20to%20fulfill%20their%20regulatory%20requirements.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1667283%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EApplication%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EInfrastructure%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntegration%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

IPv6 is the most recent version of the Internet Protocol (IP) and the Internet Engineering Task Force (IETF) standard is already more than 20 years old, but for most of us is it still not something we have to deal with on a day-to-day basis. This is slowly changing as some areas of the world are running out of IPv4 addresses and local governments start to make IPv6 support mandatory for some verticals. This results in urgent requests by some of our customers to provide their webservices via IPv4 and IPv6 (so called dual stack) to fulfill their regulatory requirements.

 

The Internet Society published an article already back in June 2013 (see “Making Content Available Over IPv6”) on what potential implementations could look like. Their article is covering native IPv6, proxy servers and Network Address Translation (NAT). Even though the article is already a few years old, the different options are still valid.

 

So how does this apply to Azure? Azure supports IPv6 and has done for quite some time now for most of its the foundational network and compute services. This enables native implementations using IPv4 and IPv6 by leveraging Azure’s dual stack capabilities.

 

For example, in scenarios where applications are mainly based on Virtual Machines (VMs) and other Infrastructure-as-a-Service (IaaS) services with full IPv6 support, we are able to use native IPv4 and IPv6 end-to-end. This avoids any complications caused by translations and it provides the most information to the server and the application. But it also means that every device along the path between the client and the server must handle IPv6 traffic.

 

The following diagram depicts a simple dual stack (IPv4/IPv6) deployment in Azure:

 

ipv6_image_1.png

 

The native end-to-end implementation is most interesting for scenarios and use cases where direct server-to-server or client-to-server communication is required. This is not the case for most webservices and applications as they are typically already exposed through, or shielded behind a Firewall, a Web Application Firewall (WAF) or a reverse proxy.

 

Other more complex deployments and applications often times contain a set of 3rd-party applications or Platform-as-a-Service (PaaS) services like Azure Application Gateway (AppGw), Azure Kubernetes Services (AKS), Azure SQL databases and others that do not necessarily support native IPv6 today. And there might be also other backend services and solutions, in some cases hosted on IaaS VMs that are also not capable of speaking IPv6. This is where NAT/NAT64 or an IPv6 proxy solution comes to play. These solutions allow us to transition from IPv6 to IPv4 and vice versa.

 

Besides the technical motivation and need to translate from IPv6 to IPv4 are there also other considerations especially around education, the costs of major application changes and modernization as well as the complexity of an application architecture why customers consider using a gateway to offer services via IPv4/IPv6 while still leveraging IPv4-only infrastructure in the background.

A very typical deployment today, for example using a WAF, looks like this:

 

ipv6_image_2.png

 

The difference between the first and the second drawing in this post is that the latter has a front-end subnet that contains for example a 3rd-Party Network Virtual Appliance (NVA) that accepts IPv4 and IPv6 traffic and translates it into IPv4-only traffic in the backend.

 

This allows customers to expose existing applications via IPv4 and IPv6, making them accessible to their end-users natively via both IP versions without the need to re-architect their application workloads and to overcome limitations in some Azure services and 3rd-Party services that do not support IPv6 today.

 

Here is a closer look on how a typical architecture could look like:

 

ipv6_image_3.png

 

The Azure Virtual Network is enabled for IPv6 and has address prefixes for IPv4 and IPv6 (these prefixes are examples only). The “Front-end subnet” is enabled for IPv6 as well and contains a pair of NVAs. These NVAs are deployed into an Azure Availability Set, to increase their availability, and exposed through an Azure Load Balancer (ALB). The first ALB (on the left) has a public IPv4 and a public IPv6 address.

 

The NVAs (for example a WAF) in the Front-end subnet accept IPv4 and IPv6 traffic and can offer, depending on the ISV solution and SKU a broad set of functionality and translate the inbound traffic into IPv4 to access the application that is running in our “Application subnet”. The application is again exposed (internally; no public IP addresses) via IPv4 only through an internal ALB and only accessible from the NVAs in the front-end subnet.

 

This results in an architecture that provides services via IPv4 and IPv6 to end-users while the backend application is still using IPv4-only. The benefit of this approach is the reduced complexity, the application teams do not need to know and take care of IPv6, on one hand and on the other hand a reduced attach surface as between the front-end and the application subnet we’re only using the well-known and fully supported IPv4 protocol.

 

Instead of using a 3rd-party NVA, Azure offers similar, managed capabilities using the Azure Front Door (AFD) service. AFD is a global Azure service that “enables you to define, manage and monitor global routing for web traffic by optimizing for best performance and quick global failover for high availability” (see “What is Azure Front Door?”). AFD works at Layer 7 (OSI model) or HTTP/HTTPS layer and uses the anycast protocol and allows you to route client requests to the fastest and most available application backend. An application backend can be any Internet-facing service hosted inside or outside of Azure.

 

AFD’s capabilities include proxying IPv6 client requests and traffic to an IPv4-only backend as shown below:

 

ipv6_image_4.png

 

The main architectural difference between the NVA-based approach we have described in the beginning of this post and the use of AFD service is, that the NVAs are customer-managed, work at Layer 4 (OSI model) and can be deployed into the same Azure Virtual Network as the application in a way where the NVA has a private and a public interface. The application is then only accessible through the NVAs which allows filtering of all ingress (and egress) traffic. Whereas AFD is a global PaaS service in Azure, living outside of a specific Azure Region and works at Layer 7 (HTTP/HTTPS). The application backend is an Internet-facing service hosted inside or outside of Azure and can be locked down to accept traffic only from your specific Front Door.

 

While we are in this post explaining these two solutions as different options to make IPv4-only applications and services hosted in Azure available to users via IPv4 and IPv6, it is in general and especially in more complex environments not either a WAF/NVA solution or Azure Front Door. It can be a combination of both where NVAs are used within a regional deployment while AFD is used to route the traffic to one or more regional deployments  in different Azure regions (or other Internet-facing locations).

 

What’s next? Take a closer look into Azure Front Door service and its documentation to learn more about its capabilities to decide if either native end-to-end IPv4/IPv6 dual stack, a 3rd-party NVA-based solution or Azure Front Door services fulfils your needs to support IPv6 with your web application.