Skip to content

Commit 0c5ce32

Browse files
committed
revert and only remove one preview tag
1 parent 7f1245d commit 0c5ce32

File tree

1 file changed

+154
-17
lines changed

1 file changed

+154
-17
lines changed

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 154 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Private Application Gateway deployment
2+
title: Private Application Gateway deployment (preview)
33
titleSuffix: Azure Application Gateway
44
description: Learn how to restrict access to Application Gateway
55
services: application-gateway
@@ -11,11 +11,11 @@ ms.author: greglin
1111
#Customer intent: As an administrator, I want to evaluate Azure Private Application Gateway
1212
---
1313

14-
# Private Application Gateway deployment
14+
# Private Application Gateway deployment (preview)
1515

1616
## Introduction
1717

18-
Historically, Application Gateway v2 SKUs, and to a certain extent v1, have required public IP addressing to enable management of the service. This requirement has imposed several limitations in using fine-grain controls in Network Security Groups and Route Tables. Specifically, the following challenges have been observed:
18+
Historically, Application Gateway v2 SKUs, and to a certain extent v1, have required public IP addressing to enable management of the service. This requirement has imposed several limitations in using fine-grain controls in Network Security Groups and Route Tables. Specifically, the following challenges have been observed:
1919

2020
* All Application Gateways v2 deployments must contain public facing frontend IP configuration to enable communication to the **Gateway Manager** service tag.
2121
* Network Security Group associations require rules to allow inbound access from GatewayManager and Outbound access to Internet.
@@ -32,13 +32,148 @@ Application Gateway v2 can now address each of these items to further eliminate
3232

3333
Each of these features can be configured independently. For example, a public IP address can be used to allow traffic inbound from the Internet and you can define a **_Deny All_** outbound rule in the network security group configuration to prevent data exfiltration.
3434

35+
## Onboard to public preview
36+
37+
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are currently in public preview. To join the public preview, you can opt in to the experience using the Azure portal, PowerShell, CLI, or REST API.
38+
39+
When you join the preview, all new Application Gateways provision with the ability to define any combination of the NSG, Route Table, or private IP configuration features. If you wish to opt out from the new functionality and return to the current generally available functionality of Application Gateway, you can do so by [unregistering from the preview](#unregister-from-the-preview).
40+
41+
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md)
42+
43+
## Register to the preview
44+
45+
# [Azure Portal](#tab/portal)
46+
47+
Use the following steps to enroll into the public preview for the enhanced Application Gateway network controls via the Azure portal:
48+
49+
1. Sign in to the [Azure portal](https://portal.azure.com/).
50+
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
51+
52+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Azure portal search.":::
53+
54+
3. Select the link for your subscription's name.
55+
56+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Select Azure subscription.":::
57+
58+
4. From the left menu, under **Settings** select **Preview features**.
59+
60+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Azure preview features menu.":::
61+
62+
5. You see a list of available preview features and your current registration status.
63+
64+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Azure portal list of preview features.":::
65+
66+
6. From **Preview features** type into the filter box **EnableApplicationGatewayNetworkIsolation**, check the feature, and click **Register**.
67+
68+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Azure portal filter preview features.":::
69+
70+
# [Azure PowerShell](#tab/powershell)
71+
72+
To enroll into the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
73+
74+
```azurepowershell
75+
Register-AzProviderFeature -FeatureName "EnableApplicationGatewayNetworkIsolation" -ProviderNamespace "Microsoft.Network"
76+
```
77+
78+
To view registration status of the feature, use the Get-AzProviderFeature cmdlet.
79+
```Output
80+
FeatureName ProviderName RegistrationState
81+
----------- ------------ -----------------
82+
EnableApplicationGatewayNetworkIsolation Microsoft.Network Registered
83+
```
84+
85+
# [Azure CLI](#tab/cli)
86+
87+
To enroll into the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
88+
89+
```azurecli
90+
az feature register --name EnableApplicationGatewayNetworkIsolation --namespace Microsoft.Network
91+
```
92+
93+
To view registration status of the feature, use the Get-AzProviderFeature cmdlet.
94+
```Output
95+
Name RegistrationState
96+
---------------------------------------------------------- -------------------
97+
Microsoft.Network/EnableApplicationGatewayNetworkIsolation Registered
98+
```
99+
100+
A list of all Azure CLI references for Private Link Configuration on Application Gateway can be found here: [Azure CLI CLI - Private Link](/cli/azure/network/application-gateway/private-link)
101+
102+
---
103+
104+
>[!Note]
105+
>Feature registration may take up to 30 minutes to transition from Registering to Registered status.
106+
107+
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md)
108+
109+
## Unregister from the preview
110+
111+
# [Azure Portal](#tab/portal)
112+
113+
To opt out of the public preview for the enhanced Application Gateway network controls via Portal, use the following steps:
114+
115+
1. Sign in to the [Azure portal](https://portal.azure.com/).
116+
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
117+
118+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Azure portal search.":::
119+
120+
3. Select the link for your subscription's name.
121+
122+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Select Azure subscription.":::
123+
124+
4. From the left menu, under **Settings** select **Preview features**.
125+
126+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Azure preview features menu.":::
127+
128+
5. You see a list of available preview features and your current registration status.
129+
130+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Azure portal list of preview features.":::
131+
132+
6. From **Preview features** type into the filter box **EnableApplicationGatewayNetworkIsolation**, check the feature, and click **Unregister**.
133+
134+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Azure portal filter preview features.":::
135+
136+
# [Azure PowerShell](#tab/powershell)
137+
138+
To opt out of the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
139+
140+
```azurepowershell
141+
Unregister-AzProviderFeature -FeatureName "EnableApplicationGatewayNetworkIsolation" -ProviderNamespace "Microsoft.Network"
142+
```
143+
144+
To view registration status of the feature, use the Get-AzProviderFeature cmdlet.
145+
```Output
146+
FeatureName ProviderName RegistrationState
147+
----------- ------------ -----------------
148+
EnableApplicationGatewayNetworkIsolation Microsoft.Network Unregistered
149+
```
150+
151+
# [Azure CLI](#tab/cli)
152+
153+
To opt out of the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
154+
155+
```azurecli
156+
az feature unregister --name EnableApplicationGatewayNetworkIsolation --namespace Microsoft.Network
157+
```
158+
159+
To view registration status of the feature, use the Get-AzProviderFeature cmdlet.
160+
```Output
161+
Name RegistrationState
162+
---------------------------------------------------------- -------------------
163+
Microsoft.Network/EnableApplicationGatewayNetworkIsolation Unregistered
164+
```
165+
166+
A list of all Azure CLI references for Private Link Configuration on Application Gateway can be found here: [Azure CLI CLI - Private Link](/cli/azure/network/application-gateway/private-link)
167+
168+
---
169+
35170
## Regions and availability
36171

37-
The Private Application Gateway is available to all public cloud regions [where Application Gateway v2 sku is supported](./overview-v2.md#unsupported-regions).
172+
The Private Application Gateway preview is available to all public cloud regions [where Application Gateway v2 sku is supported](./overview-v2.md#unsupported-regions).
38173

39174
## Configuration of network controls
40175

41-
Configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal. No API or command changes are introduced with this feature.
176+
After registration into the public preview, configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal. No API or command changes are introduced with this public preview.
42177

43178
## Resource Changes
44179

@@ -57,7 +192,7 @@ Application Gateway Subnet is the subnet within the Virtual Network where the Ap
57192

58193
## Outbound Internet connectivity
59194

60-
Application Gateway deployments that contain only a private frontend IP configuration (don't have a public IP frontend configuration) aren't able to egress traffic destined to the Internet. This configuration affects communication to backend targets that are publicly accessible via the Internet.
195+
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) aren't able to egress traffic destined to the Internet. This configuration affects communication to backend targets that are publicly accessible via the Internet.
61196

62197
To enable outbound connectivity from your Application Gateway to an Internet facing backend target, you can utilize [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) or forward traffic to a virtual appliance that has access to the Internet.
63198

@@ -73,14 +208,14 @@ Common scenarios where public IP usage is required:
73208

74209
## Network Security Group Control
75210

76-
Network security groups associated to an Application Gateway subnet no longer require inbound rules for GatewayManager, and they don't require outbound access to the Internet. The only required rule is **Allow inbound from AzureLoadBalancer** to ensure health probes can reach the gateway.
211+
Network security groups associated to an Application Gateway subnet no longer require inbound rules for GatewayManager, and they don't require outbound access to the Internet. The only required rule is **Allow inbound from AzureLoadBalancer** to ensure health probes can reach the gateway.
77212

78-
The following configuration is an example of the most restrictive set of inbound rules, denying all traffic but Azure health probes. In addition to the defined rules, explicit rules are defined to allow client traffic to reach the listener of the gateway.
213+
The following configuration is an example of the most restrictive set of inbound rules, denying all traffic but Azure health probes. In addition to the defined rules, explicit rules are defined to allow client traffic to reach the listener of the gateway.
79214

80215
[ ![View the inbound security group rules](./media/application-gateway-private-deployment/inbound-rules.png) ](./media/application-gateway-private-deployment/inbound-rules.png#lightbox)
81216

82217
> [!Note]
83-
> Application Gateway will display an alert asking to ensure the `Allow LoadBalanceRule` is specified if a `DenyAll` rule inadvertently restricts access to health probes.
218+
> Application Gateway will display an alert asking to ensure the **Allow LoadBalanceRule** is specified if a **DenyAll** rule inadvertently restricts access to health probes.
84219
85220
### Example scenario
86221

@@ -146,7 +281,7 @@ These rules are assigned a priority of 400, 401, and 4096, respectively.
146281
To create these rules:
147282
- Select **Outbound security rules**
148283
- Select **Add**
149-
- Enter the following information for each rule into the `Add outbound` security rule** pane.
284+
- Enter the following information for each rule into the **Add outbound security rule** pane.
150285
- When you've entered the information, select **Add** to create the rule.
151286
- Creation of each rule takes a moment.
152287

@@ -175,15 +310,17 @@ Result:
175310
176311
## Route Table Control
177312

178-
The ability to forward traffic to a virtual appliance is now possible via definition of a route table rule that defines 0.0.0.0/0 with a next hop to Virtual Appliance.
313+
In the current offering of Application Gateway, association of a route table with a rule (or creation of rule) defined as 0.0.0.0/0 with a next hop as virtual appliance is unsupported to ensure proper management of Application Gateway.
314+
315+
After registration of the public preview feature, the ability to forward traffic to a virtual appliance is now possible via definition of a route table rule that defines 0.0.0.0/0 with a next hop to Virtual Appliance.
179316

180-
Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising doesn't affect Application Gateway health, and is honored for traffic flow. This scenario can be applicable when using VPN, ExpressRoute, Route Server, or Virtual WAN.
317+
Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising does not affect Application Gateway health, and is honored for traffic flow. This scenario can be applicable when using VPN, ExpressRoute, Route Server, or Virtual WAN.
181318

182319
### Example scenario
183320

184-
In the following example, we create a route table and associate it to the Application Gateway subnet to ensure outbound Internet access from the subnet will egress from a virtual appliance. At a high level, the following design is summarized in Figure 1:
321+
In the following example, we create a route table and associate it to the Application Gateway subnet to ensure outbound Internet access from the subnet will egress from a virtual appliance. At a high level, the following design is summarized in Figure 1:
185322
- The Application Gateway is in spoke virtual network
186-
- There's a network virtual appliance (a virtual machine) in the hub network
323+
- There is a network virtual appliance (a virtual machine) in the hub network
187324
- A route table with a default route (0.0.0.0/0) to the virtual appliance is associated to Application Gateway subnet
188325

189326
![Diagram for example route table](./media/application-gateway-private-deployment/route-table-diagram.png)
@@ -208,7 +345,7 @@ To create a route table and associate it to the Application Gateway subnet:
208345

209346
## Limitations / Known Issues
210347

211-
The following limitations are known.
348+
While in public preview, the following limitations are known.
212349

213350
### Private link configuration
214351

@@ -239,8 +376,8 @@ If a subnet shares Application Gateway v2 deployments that were created both pri
239376

240377
### Unknown Backend Health status
241378

242-
If backend health is _Unknown_, you might see the following error:
243-
+ The backend health status could not be retrieved. This happens when an NSG/UDR/Firewall on the application gateway subnet is blocking traffic on ports 65503-65534 (v1 SKU) and ports 65200-65535 (v2 SKU). This error can also occur if the FQDN configured in the backend pool could not be resolved to an IP address. To learn more visit - https://aka.ms/UnknownBackendHealth.
379+
If backend health is _Unknown_, you may see the following error:
380+
+ The backend health status could not be retrieved. This happens when an NSG/UDR/Firewall on the application gateway subnet is blocking traffic on ports 65503-65534 if there is v1 SKU, and ports 65200-65535 if there is v2 SKU or if the FQDN configured in the backend pool could not be resolved to an IP address. To learn more visit - https://aka.ms/UnknownBackendHealth.
244381

245382
This error can be ignored and will be clarified in a future release.
246383

0 commit comments

Comments
 (0)