Skip to content

Commit 122d397

Browse files
authored
Merge pull request #110433 from TimShererWithAquent/us1679050dp
Change SSL to TLS per 1679050 (1 of 2)
2 parents 31eb71f + ebd3505 commit 122d397

15 files changed

+132
-132
lines changed

articles/application-gateway/application-gateway-autoscaling-zone-redundant.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ The new v2 SKU includes the following enhancements:
2121
Zone redundancy is available only where Azure Zones are available. In other regions, all other features are supported. For more information, see [What are Availability Zones in Azure?](../availability-zones/az-overview.md#services-support-by-region)
2222
- **Static VIP**: Application Gateway v2 SKU supports the static VIP type exclusively. This ensures that the VIP associated with the application gateway doesn't change for the lifecycle of the deployment, even after a restart. There isn't a static VIP in v1, so you must use the application gateway URL instead of the IP address for domain name routing to App Services via the application gateway.
2323
- **Header Rewrite**: Application Gateway allows you to add, remove, or update HTTP request and response headers with v2 SKU. For more information, see [Rewrite HTTP headers with Application Gateway](rewrite-http-headers.md)
24-
- **Key Vault Integration**: Application Gateway v2 supports integration with Key Vault for server certificates that are attached to HTTPS enabled listeners. For more information, see [SSL termination with Key Vault certificates](key-vault-certs.md).
24+
- **Key Vault Integration**: Application Gateway v2 supports integration with Key Vault for server certificates that are attached to HTTPS enabled listeners. For more information, see [TLS termination with Key Vault certificates](key-vault-certs.md).
2525
- **Azure Kubernetes Service Ingress Controller**: The Application Gateway v2 Ingress Controller allows the Azure Application Gateway to be used as the ingress for an Azure Kubernetes Service (AKS) known as AKS Cluster. For more information, see [What is Application Gateway Ingress Controller?](ingress-controller-overview.md).
26-
- **Performance enhancements**: The v2 SKU offers up to 5X better SSL offload performance as compared to the Standard/WAF SKU.
26+
- **Performance enhancements**: The v2 SKU offers up to 5X better TLS offload performance as compared to the Standard/WAF SKU.
2727
- **Faster deployment and update time** The v2 SKU provides faster deployment and update time as compared to Standard/WAF SKU. This also includes WAF configuration changes.
2828

2929
![](./media/application-gateway-autoscaling-zone-redundant/application-gateway-autoscaling-zone-redundant.png)
@@ -72,7 +72,7 @@ Total price = $148.8 + $297.6 = $446.4
7272

7373
**Example 2**
7474

75-
An Application Gateway standard_v2 is provisioned for a month, with zero minimum instances, and during this time it receives 25 new SSL connections/sec, average of 8.88-Mbps data transfer. Assuming connections are short lived, your price would be:
75+
An Application Gateway standard_v2 is provisioned for a month, with zero minimum instances, and during this time it receives 25 new TLS connections/sec, average of 8.88-Mbps data transfer. Assuming connections are short lived, your price would be:
7676

7777
Fixed price = 744(hours) * $0.20 = $148.8
7878

@@ -100,7 +100,7 @@ In this case, you're billed for the entirety of the five instances even though t
100100

101101
**Example 4**
102102

103-
An Application Gateway standard_v2 is provisioned for a month, with a minimum of five instances, but this time there is an average of 125-mbps data transfer, and 25 SSL connections per second. Assuming that there is no traffic and connections are short lived, your price would be:
103+
An Application Gateway standard_v2 is provisioned for a month, with a minimum of five instances, but this time there is an average of 125-mbps data transfer, and 25 TLS connections per second. Assuming that there is no traffic and connections are short lived, your price would be:
104104

105105
Fixed price = 744(hours) * $0.20 = $148.8
106106

@@ -112,7 +112,7 @@ In this case, you are billed for the full five instances, plus seven Capacity Un
112112

113113
**Example 5**
114114

115-
An Application Gateway WAF_v2 is provisioned for a month. During this time, it receives 25 new SSL connections/sec, average of 8.88-Mbps data transfer and does 80 request per second. Assuming connections are short lived, and that compute unit calculation for the application supports 10 RPS per compute unit, your price would be:
115+
An Application Gateway WAF_v2 is provisioned for a month. During this time, it receives 25 new TLS connections/sec, average of 8.88-Mbps data transfer and does 80 request per second. Assuming connections are short lived, and that compute unit calculation for the application supports 10 RPS per compute unit, your price would be:
116116

117117
Fixed price = 744(hours) * $0.36 = $267.84
118118

@@ -147,8 +147,8 @@ The following table compares the features available with each SKU.
147147
| Traffic redirection | ✓ | ✓ |
148148
| Web Application Firewall (WAF) | ✓ | ✓ |
149149
| WAF custom rules | | ✓ |
150-
| Secure Sockets Layer (SSL) termination | ✓ | ✓ |
151-
| End-to-end SSL encryption | ✓ | ✓ |
150+
| Transport Layer Security (TLS)/Secure Sockets Layer (SSL) termination | ✓ | ✓ |
151+
| End-to-end TLS encryption | ✓ | ✓ |
152152
| Session affinity | ✓ | ✓ |
153153
| Custom error pages | ✓ | ✓ |
154154
| WebSocket support | ✓ | ✓ |
@@ -162,7 +162,7 @@ The following table compares the features available with each SKU.
162162

163163
|Difference|Details|
164164
|--|--|
165-
|Authentication certificate|Not supported.<br>For more information, see [Overview of end to end SSL with Application Gateway](ssl-overview.md#end-to-end-ssl-with-the-v2-sku).|
165+
|Authentication certificate|Not supported.<br>For more information, see [Overview of end to end TLS with Application Gateway](ssl-overview.md#end-to-end-tls-with-the-v2-sku).|
166166
|Mixing Standard_v2 and Standard Application Gateway on the same subnet|Not supported|
167167
|User-Defined Route (UDR) on Application Gateway subnet|Supported (specific scenarios). In preview.<br> For more information about supported scenarios, see [Application Gateway configuration overview](configuration-overview.md#user-defined-routes-supported-on-the-application-gateway-subnet).|
168168
|NSG for Inbound port range| - 65200 to 65535 for Standard_v2 SKU<br>- 65503 to 65534 for Standard SKU.<br>For more information, see the [FAQ](application-gateway-faq.md#are-network-security-groups-supported-on-the-application-gateway-subnet).|

articles/application-gateway/application-gateway-configure-ssl-policy-powershell.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
2-
title: Configure SSL policy using PowerShell
2+
title: Configure TLS policy using PowerShell
33
titleSuffix: Azure Application Gateway
4-
description: This article provides instructions to configure SSL Policy on Azure Application Gateway
4+
description: This article provides instructions to configure TLS Policy on Azure Application Gateway
55
services: application-gateway
66
author: vhorne
77
ms.service: application-gateway
@@ -10,13 +10,13 @@ ms.date: 11/14/2019
1010
ms.author: victorh
1111
---
1212

13-
# Configure SSL policy versions and cipher suites on Application Gateway
13+
# Configure TLS policy versions and cipher suites on Application Gateway
1414

15-
Learn how to configure SSL policy versions and cipher suites on Application Gateway. You can select from a list of predefined policies that contain different configurations of SSL policy versions and enabled cipher suites. You also have the ability to define a [custom SSL policy](#configure-a-custom-ssl-policy) based on your requirements.
15+
Learn how to configure TLS/SSL policy versions and cipher suites on Application Gateway. You can select from a list of predefined policies that contain different configurations of TLS policy versions and enabled cipher suites. You also have the ability to define a [custom TLS policy](#configure-a-custom-tls-policy) based on your requirements.
1616

1717
[!INCLUDE [updated-for-az](../../includes/updated-for-az.md)]
1818

19-
## Get available SSL options
19+
## Get available TLS options
2020

2121
The `Get-AzApplicationGatewayAvailableSslOptions` cmdlet provides a listing of available pre-defined policies, available cipher suites, and protocol versions that can be configured. The following example shows an example output from running the cmdlet.
2222

@@ -66,9 +66,9 @@ AvailableProtocols:
6666
TLSv1_2
6767
```
6868

69-
## List pre-defined SSL Policies
69+
## List pre-defined TLS Policies
7070

71-
Application gateway comes with three pre-defined policies that can be used. The `Get-AzApplicationGatewaySslPredefinedPolicy` cmdlet retrieves these policies. Each policy has different protocol versions and cipher suites enabled. These pre-defined policies can be used to quickly configure an SSL policy on your application gateway. By default **AppGwSslPolicy20150501** is selected if no specific SSL policy is defined.
71+
Application gateway comes with three pre-defined policies that can be used. The `Get-AzApplicationGatewaySslPredefinedPolicy` cmdlet retrieves these policies. Each policy has different protocol versions and cipher suites enabled. These pre-defined policies can be used to quickly configure a TLS policy on your application gateway. By default **AppGwSslPolicy20150501** is selected if no specific TLS policy is defined.
7272

7373
The following output is an example of running `Get-AzApplicationGatewaySslPredefinedPolicy`.
7474

@@ -101,37 +101,37 @@ CipherSuites:
101101
...
102102
```
103103

104-
## Configure a custom SSL policy
104+
## Configure a custom TLS policy
105105

106-
When configuring a custom SSL policy, you pass the following parameters: PolicyType, MinProtocolVersion, CipherSuite, and ApplicationGateway. If you attempt to pass other parameters, you get an error when creating or updating the Application Gateway.
106+
When configuring a custom TLS policy, you pass the following parameters: PolicyType, MinProtocolVersion, CipherSuite, and ApplicationGateway. If you attempt to pass other parameters, you get an error when creating or updating the Application Gateway.
107107

108-
The following example sets a custom SSL policy on an application gateway. It sets the minimum protocol version to `TLSv1_1` and enables the following cipher suites:
108+
The following example sets a custom TLS policy on an application gateway. It sets the minimum protocol version to `TLSv1_1` and enables the following cipher suites:
109109

110110
* TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
111111
* TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
112112

113113
> [!IMPORTANT]
114-
> TLS_RSA_WITH_AES_256_CBC_SHA256 must be selected when configuring a custom SSL policy. Application gateway uses this cipher suite for backend management. You can use this in combination with any other suites, but this one must be selected as well.
114+
> TLS_RSA_WITH_AES_256_CBC_SHA256 must be selected when configuring a custom TLS policy. Application gateway uses this cipher suite for backend management. You can use this in combination with any other suites, but this one must be selected as well.
115115
116116
```powershell
117117
# get an application gateway resource
118118
$gw = Get-AzApplicationGateway -Name AdatumAppGateway -ResourceGroup AdatumAppGatewayRG
119119
120-
# set the SSL policy on the application gateway
120+
# set the TLS policy on the application gateway
121121
Set-AzApplicationGatewaySslPolicy -ApplicationGateway $gw -PolicyType Custom -MinProtocolVersion TLSv1_1 -CipherSuite "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "TLS_RSA_WITH_AES_128_GCM_SHA256"
122122
123-
# validate the SSL policy locally
123+
# validate the TLS policy locally
124124
Get-AzApplicationGatewaySslPolicy -ApplicationGateway $gw
125125
126-
# update the gateway with validated SSL policy
126+
# update the gateway with validated TLS policy
127127
Set-AzApplicationGateway -ApplicationGateway $gw
128128
```
129129

130-
## Create an application gateway with a pre-defined SSL policy
130+
## Create an application gateway with a pre-defined TLS policy
131131

132-
When configuring a Predefined SSL policy, you pass the following parameters: PolicyType, PolicyName, and ApplicationGateway. If you attempt to pass other parameters, you get an error when creating or updating the Application Gateway.
132+
When configuring a Predefined TLS policy, you pass the following parameters: PolicyType, PolicyName, and ApplicationGateway. If you attempt to pass other parameters, you get an error when creating or updating the Application Gateway.
133133

134-
The following example creates a new application gateway with a pre-defined SSL policy.
134+
The following example creates a new application gateway with a pre-defined TLS policy.
135135

136136
```powershell
137137
# Create a resource group
@@ -158,10 +158,10 @@ $pool = New-AzApplicationGatewayBackendAddressPool -Name pool01 -BackendIPAddres
158158
# Define the backend http settings to be used.
159159
$poolSetting = New-AzApplicationGatewayBackendHttpSettings -Name poolsetting01 -Port 80 -Protocol Http -CookieBasedAffinity Enabled
160160
161-
# Create a new port for SSL
161+
# Create a new port for TLS
162162
$fp = New-AzApplicationGatewayFrontendPort -Name frontendport01 -Port 443
163163
164-
# Upload an existing pfx certificate for SSL offload
164+
# Upload an existing pfx certificate for TLS offload
165165
$password = ConvertTo-SecureString -String "P@ssw0rd" -AsPlainText -Force
166166
$cert = New-AzApplicationGatewaySslCertificate -Name cert01 -CertificateFile C:\folder\contoso.pfx -Password $password
167167
@@ -177,16 +177,16 @@ $rule = New-AzApplicationGatewayRequestRoutingRule -Name rule01 -RuleType Basic
177177
# Define the size of the application gateway
178178
$sku = New-AzApplicationGatewaySku -Name Standard_Small -Tier Standard -Capacity 2
179179
180-
# Configure the SSL policy to use a different pre-defined policy
180+
# Configure the TLS policy to use a different pre-defined policy
181181
$policy = New-AzApplicationGatewaySslPolicy -PolicyType Predefined -PolicyName AppGwSslPolicy20170401S
182182
183183
# Create the application gateway.
184184
$appgw = New-AzApplicationGateway -Name appgwtest -ResourceGroupName $rg.ResourceGroupName -Location "East US" -BackendAddressPools $pool -BackendHttpSettingsCollection $poolSetting -FrontendIpConfigurations $fipconfig -GatewayIpConfigurations $gipconfig -FrontendPorts $fp -HttpListeners $listener -RequestRoutingRules $rule -Sku $sku -SslCertificates $cert -SslPolicy $policy
185185
```
186186

187-
## Update an existing application gateway with a pre-defined SSL policy
187+
## Update an existing application gateway with a pre-defined TLS policy
188188

189-
To set a custom SSL policy, pass the following parameters: **PolicyType**, **MinProtocolVersion**, **CipherSuite**, and **ApplicationGateway**. To set a Predefined SSL policy, pass the following parameters: **PolicyType**, **PolicyName**, and **ApplicationGateway**. If you attempt to pass other parameters, you get an error when creating or updating the Application Gateway.
189+
To set a custom TLS policy, pass the following parameters: **PolicyType**, **MinProtocolVersion**, **CipherSuite**, and **ApplicationGateway**. To set a Predefined TLS policy, pass the following parameters: **PolicyType**, **PolicyName**, and **ApplicationGateway**. If you attempt to pass other parameters, you get an error when creating or updating the Application Gateway.
190190

191191
In the following example, there are code samples for both Custom Policy and Predefined Policy. Uncomment the policy you want to use.
192192

@@ -199,14 +199,14 @@ $AppGw = get-Azapplicationgateway -Name $AppGWname -ResourceGroupName $RG
199199
200200
# Choose either custom policy or predefined policy and uncomment the one you want to use.
201201
202-
# SSL Custom Policy
202+
# TLS Custom Policy
203203
# Set-AzApplicationGatewaySslPolicy -PolicyType Custom -MinProtocolVersion TLSv1_2 -CipherSuite "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256", "TLS_RSA_WITH_AES_128_CBC_SHA256" -ApplicationGateway $AppGw
204204
205-
# SSL Predefined Policy
205+
# TLS Predefined Policy
206206
# Set-AzApplicationGatewaySslPolicy -PolicyType Predefined -PolicyName "AppGwSslPolicy20170401S" -ApplicationGateway $AppGW
207207
208208
# Update AppGW
209-
# The SSL policy options are not validated or updated on the Application Gateway until this cmdlet is executed.
209+
# The TLS policy options are not validated or updated on the Application Gateway until this cmdlet is executed.
210210
$SetGW = Set-AzApplicationGateway -ApplicationGateway $AppGW
211211
```
212212

articles/application-gateway/application-gateway-create-gateway-cli-nodejs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.author: victorh
1111
---
1212
# Create an application gateway by using the Azure CLI
1313

14-
Azure Application Gateway is a layer-7 load balancer. It provides failover, performance-routing HTTP requests between different servers, whether they are on the cloud or on-premises. Application gateway has the following application delivery features: HTTP load balancing, cookie-based session affinity, and Secure Sockets Layer (SSL) offload, custom health probes, and support for multi-site.
14+
Azure Application Gateway is a layer-7 load balancer. It provides failover, performance-routing HTTP requests between different servers, whether they are on the cloud or on-premises. Application gateway has the following application delivery features: HTTP load balancing, cookie-based session affinity, and Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL), offload, custom health probes, and support for multi-site.
1515

1616
## Prerequisite: Install the Azure CLI
1717

@@ -132,7 +132,7 @@ If you already have your web application defined with the backend pool in the pr
132132

133133
Learn how to create custom health probes by visiting [Create a custom health probe](application-gateway-create-probe-portal.md)
134134

135-
Learn how to configure SSL Offloading and take the costly SSL decryption off your web servers by visiting [Configure SSL Offload](application-gateway-ssl-arm.md)
135+
Learn how to configure TLS Offloading and take the costly TLS decryption off your web servers by visiting [Configure TLS Offload](application-gateway-ssl-arm.md)
136136

137137
<!--Image references-->
138138

articles/application-gateway/application-gateway-create-probe-classic-ps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ Set-AzureApplicationGatewayConfig -Name "<application gateway name>" -Configfile
195195

196196
## Next steps
197197

198-
If you want to configure Secure Sockets Layer (SSL) offload, see [Configure an application gateway for SSL offload](application-gateway-ssl.md).
198+
If you want to configure Transport Layer Security (TLS), previously known as Secure Sockets Layer (SSL) offload, see [Configure an application gateway for TLS offload](application-gateway-ssl.md).
199199

200200
If you want to configure an application gateway to use with an internal load balancer, see [Create an application gateway with an internal load balancer (ILB)](application-gateway-ilb.md).
201201

articles/application-gateway/application-gateway-create-probe-ps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -192,5 +192,5 @@ DnsSettings : {
192192

193193
## Next steps
194194

195-
Learn to configure SSL offloading by visiting: [Configure SSL Offload](application-gateway-ssl-arm.md)
195+
Learn to configure TLS offloading by visiting: [Configure TLS Offload](application-gateway-ssl-arm.md)
196196

0 commit comments

Comments
 (0)