You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-autoscaling-zone-redundant.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: vhorne
6
6
ms.service: application-gateway
7
7
ms.topic: article
8
-
ms.date: 02/26/2020
8
+
ms.date: 03/24/2020
9
9
ms.author: victorh
10
10
---
11
11
@@ -164,7 +164,7 @@ The following table compares the features available with each SKU.
164
164
|--|--|
165
165
|Authentication certificate|Not supported.<br>For more information, see [Overview of end to end SSL with Application Gateway](ssl-overview.md#end-to-end-ssl-with-the-v2-sku).|
166
166
|Mixing Standard_v2 and Standard Application Gateway on the same subnet|Not supported|
167
-
|User-Defined Route (UDR) on Application Gateway subnet|Supported, in preview.<br> For more information on which scenarios are and aren't supported, see [User-defined routes supported on the Application Gateway subnet](https://docs.microsoft.com/azure/application-gateway/configuration-overview#user-defined-routes-supported-on-the-application-gateway-subnet)|
167
+
|User-Defined Route (UDR) on Application Gateway subnet|Supported (specific scenarios). In preview.<br> For more information about supported scenarios, see [Application Gateway configuration overview](configuration-overview.md#user-defined-routes-supported-on-the-application-gateway-subnet).|
168
168
|NSG for Inbound port range| - 65200 to 65535 for Standard_v2 SKU<br>- 65503 to 65534 for Standard SKU.<br>For more information, see the [FAQ](application-gateway-faq.md#are-network-security-groups-supported-on-the-application-gateway-subnet).|
169
169
|Performance logs in Azure diagnostics|Not supported.<br>Azure metrics should be used.|
170
170
|Billing|Billing scheduled to start on July 1, 2019.|
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-faq.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ services: application-gateway
5
5
author: vhorne
6
6
ms.service: application-gateway
7
7
ms.topic: article
8
-
ms.date: 03/06/2020
8
+
ms.date: 03/24/2020
9
9
ms.author: victorh
10
10
---
11
11
@@ -91,8 +91,9 @@ Yes. In addition to multiple instances of a given Application Gateway deployment
91
91
92
92
A single subnet can't support both Standard_v2 and Standard Application Gateway together.
93
93
94
-
### Does Application Gateway v2 support user-defined routes (UDR)?
95
-
Yes, but only specific scenarios. See [User-defined routes supported on the Application Gateway subnet](https://docs.microsoft.com/azure/application-gateway/configuration-overview#user-defined-routes-supported-on-the-application-gateway-subnet) for more details on which scenarios are and aren't supported.
94
+
### Does Application Gateway v2 support user-defined routes (UDR)?
95
+
96
+
Yes, but only specific scenarios. For more information, see [Application Gateway configuration overview](configuration-overview.md#user-defined-routes-supported-on-the-application-gateway-subnet).
96
97
97
98
### Does Application Gateway support x-forwarded-for headers?
98
99
@@ -388,24 +389,24 @@ Yes. If your configuration matches following scenario, you won't see allowed tra
388
389
389
390
### How do I use Application Gateway V2 with only private frontend IP address?
390
391
391
-
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
392
+
Application Gateway V2 currently doesn't support only private IP mode. It supports the following combinations
392
393
* Private IP and Public IP
393
394
* Public IP only
394
395
395
396
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
396
397
1. Create an Application Gateway with both public and private frontend IP address
397
-
2.Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
398
+
2.Don't create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
398
399
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
399
400
400
401
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
401
402
402
-
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
403
+
b. Allow traffic from Source as **AzureLoadBalancer** service tag and destination port as **Any**
403
404
404
-
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
405
+
c. Deny all inbound traffic from Source as **Internet** service tag and destination port as **Any**. Give this rule the *least priority* in the inbound rules
405
406
406
-
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
407
+
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address isn't blocked
407
408
408
-
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
409
+
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, and so on.
409
410
410
411
Sample NSG configuration for private IP only access:
411
412

0 commit comments