Skip to content

Commit 021e42f

Browse files
authored
Merge pull request #1 from vhorne/v2-udr
updates to v2 udr content
2 parents 7d633e0 + e6aed2b commit 021e42f

File tree

4 files changed

+59
-56
lines changed

4 files changed

+59
-56
lines changed

articles/application-gateway/application-gateway-autoscaling-zone-redundant.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
77
ms.topic: article
8-
ms.date: 02/26/2020
8+
ms.date: 03/24/2020
99
ms.author: victorh
1010
---
1111

@@ -164,7 +164,7 @@ The following table compares the features available with each SKU.
164164
|--|--|
165165
|Authentication certificate|Not supported.<br>For more information, see [Overview of end to end SSL with Application Gateway](ssl-overview.md#end-to-end-ssl-with-the-v2-sku).|
166166
|Mixing Standard_v2 and Standard Application Gateway on the same subnet|Not supported|
167-
|User-Defined Route (UDR) on Application Gateway subnet|Supported, in preview.<br> For more information on which scenarios are and aren't supported, see [User-defined routes supported on the Application Gateway subnet](https://docs.microsoft.com/azure/application-gateway/configuration-overview#user-defined-routes-supported-on-the-application-gateway-subnet)|
167+
|User-Defined Route (UDR) on Application Gateway subnet|Supported (specific scenarios). In preview.<br> For more information about supported scenarios, see [Application Gateway configuration overview](configuration-overview.md#user-defined-routes-supported-on-the-application-gateway-subnet).|
168168
|NSG for Inbound port range| - 65200 to 65535 for Standard_v2 SKU<br>- 65503 to 65534 for Standard SKU.<br>For more information, see the [FAQ](application-gateway-faq.md#are-network-security-groups-supported-on-the-application-gateway-subnet).|
169169
|Performance logs in Azure diagnostics|Not supported.<br>Azure metrics should be used.|
170170
|Billing|Billing scheduled to start on July 1, 2019.|

articles/application-gateway/application-gateway-faq.md

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: vhorne
66
ms.service: application-gateway
77
ms.topic: article
8-
ms.date: 03/06/2020
8+
ms.date: 03/24/2020
99
ms.author: victorh
1010
---
1111

@@ -91,8 +91,9 @@ Yes. In addition to multiple instances of a given Application Gateway deployment
9191

9292
A single subnet can't support both Standard_v2 and Standard Application Gateway together.
9393

94-
### Does Application Gateway v2 support user-defined routes (UDR)?
95-
Yes, but only specific scenarios. See [User-defined routes supported on the Application Gateway subnet](https://docs.microsoft.com/azure/application-gateway/configuration-overview#user-defined-routes-supported-on-the-application-gateway-subnet) for more details on which scenarios are and aren't supported.
94+
### Does Application Gateway v2 support user-defined routes (UDR)?
95+
96+
Yes, but only specific scenarios. For more information, see [Application Gateway configuration overview](configuration-overview.md#user-defined-routes-supported-on-the-application-gateway-subnet).
9697

9798
### Does Application Gateway support x-forwarded-for headers?
9899

@@ -388,24 +389,24 @@ Yes. If your configuration matches following scenario, you won't see allowed tra
388389

389390
### How do I use Application Gateway V2 with only private frontend IP address?
390391

391-
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
392+
Application Gateway V2 currently doesn't support only private IP mode. It supports the following combinations
392393
* Private IP and Public IP
393394
* Public IP only
394395

395396
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
396397
1. Create an Application Gateway with both public and private frontend IP address
397-
2. Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
398+
2. Don't create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
398399
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
399400

400401
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
401402

402-
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
403+
b. Allow traffic from Source as **AzureLoadBalancer** service tag and destination port as **Any**
403404

404-
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
405+
c. Deny all inbound traffic from Source as **Internet** service tag and destination port as **Any**. Give this rule the *least priority* in the inbound rules
405406

406-
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
407+
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address isn't blocked
407408

408-
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
409+
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, and so on.
409410

410411
Sample NSG configuration for private IP only access:
411412
![Application Gateway V2 NSG Configuration for private IP access only](./media/application-gateway-faq/appgw-privip-nsg.png)

0 commit comments

Comments
 (0)