Skip to content

Commit 1c733b1

Browse files
Merge pull request #303989 from JackStromberg/patch-13
GA - Private AppGW
2 parents fed8f2b + ba693a0 commit 1c733b1

File tree

2 files changed

+24
-36
lines changed

2 files changed

+24
-36
lines changed

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 23 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
2-
title: Private Application Gateway deployment (preview)
2+
title: Private Application Gateway deployment
33
titleSuffix: Azure Application Gateway
44
description: Learn how to restrict access to Application Gateway
55
services: application-gateway
66
author: mbender-ms
77
ms.service: azure-application-gateway
88
ms.topic: how-to
9-
ms.date: 4/15/2025
9+
ms.date: 8/11/2025
1010
ms.author: mbender
1111
#Customer intent: As an administrator, I want to evaluate Azure Private Application Gateway
1212
# Customer intent: "As a cloud administrator, I want to configure a Private Application Gateway with enhanced network controls, so that I can improve security and restrict data egress while managing inbound and outbound traffic effectively."
1313
---
1414

15-
# Private Application Gateway deployment (preview)
15+
# Private Application Gateway deployment
1616

1717
## Introduction
1818

@@ -33,19 +33,17 @@ Application Gateway v2 can now address each of these items to further eliminate
3333

3434
Each of these features can be configured independently. For example, a public IP address can be used to allow traffic inbound from the Internet and you can define a **_Deny All_** outbound rule in the network security group configuration to prevent data exfiltration.
3535

36-
## Onboard to public preview
36+
## Onboard to the feature
3737

38-
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are currently in public preview. To join the public preview, you can opt in to the experience using the Azure portal, PowerShell, CLI, or REST API.
38+
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are generally available and supported in production. To join enable the feature, you must opt in to the experience using the Azure portal, PowerShell, CLI, or REST API.
3939

40-
When you join the preview, all new Application Gateways provision with the ability to define any combination of the NSG, Route Table, or private IP configuration features. If you wish to opt out from the new functionality and return to the current generally available functionality of Application Gateway, you can do so by [unregistering from the preview](#unregister-from-the-preview).
40+
When enrolled, all new Application Gateways provision with the ability to define any combination of the NSG, Route Table, or private IP configuration features. If you wish to opt out from the new functionality and return to the current generally available functionality of Application Gateway, you can do so by [unregistering from the feature](#unregister-the-feature).
4141

42-
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md)
43-
44-
## Register to the preview
42+
## Register the feature
4543

4644
# [Azure portal](#tab/portal)
4745

48-
Use the following steps to enroll into the public preview for the enhanced Application Gateway network controls via the Azure portal:
46+
Use the following steps to enroll into the feature for the enhanced Application Gateway network controls via the Azure portal:
4947

5048
1. Sign in to the [Azure portal](https://portal.azure.com/).
5149
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
@@ -58,9 +56,9 @@ Use the following steps to enroll into the public preview for the enhanced Appli
5856

5957
4. From the left menu, under **Settings** select **Preview features**.
6058

61-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Screenshot of the Azure preview features menu.":::
59+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Screenshot of the Azure features menu.":::
6260

63-
5. You see a list of available preview features and your current registration status.
61+
5. You see a list of available features and your current registration status.
6462

6563
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Screenshot of the Azure portal list of preview features.":::
6664

@@ -70,7 +68,7 @@ Use the following steps to enroll into the public preview for the enhanced Appli
7068

7169
# [Azure PowerShell](#tab/powershell)
7270

73-
To enroll into the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
71+
To enroll into the feature for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
7472

7573
```azurepowershell
7674
Register-AzProviderFeature -FeatureName "EnableApplicationGatewayNetworkIsolation" -ProviderNamespace "Microsoft.Network"
@@ -85,7 +83,7 @@ EnableApplicationGatewayNetworkIsolation Microsoft.Network Registered
8583

8684
# [Azure CLI](#tab/cli)
8785

88-
To enroll into the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
86+
To enroll into the feature for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
8987

9088
```azurecli
9189
az feature register --name EnableApplicationGatewayNetworkIsolation --namespace Microsoft.Network
@@ -105,13 +103,11 @@ A list of all Azure CLI references for Private Link Configuration on Application
105103
>[!Note]
106104
>Feature registration may take up to 30 minutes to transition from Registering to Registered status.
107105
108-
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md)
109-
110-
## Unregister from the preview
106+
## Unregister the feature
111107

112108
# [Azure portal](#tab/portal)
113109

114-
To opt out of the public preview for the enhanced Application Gateway network controls via Portal, use the following steps:
110+
To opt out of the feature for the enhanced Application Gateway network controls via Portal, use the following steps:
115111

116112
1. Sign in to the [Azure portal](https://portal.azure.com/).
117113
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
@@ -124,19 +120,19 @@ To opt out of the public preview for the enhanced Application Gateway network co
124120

125121
4. From the left menu, under **Settings** select **Preview features**.
126122

127-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Screenshot of the Azure preview features menu.":::
123+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Screenshot of the Azure features menu.":::
128124

129-
5. You see a list of available preview features and your current registration status.
125+
5. You see a list of available features and your current registration status.
130126

131-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Screenshot of the Azure portal list of preview features.":::
127+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Screenshot of the Azure portal list of features.":::
132128

133129
6. From **Preview features** type into the filter box **EnableApplicationGatewayNetworkIsolation**, check the feature, and click **Unregister**.
134130

135-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Screenshot of the Azure portal filter preview features.":::
131+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Screenshot of the Azure portal filter features.":::
136132

137133
# [Azure PowerShell](#tab/powershell)
138134

139-
To opt out of the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
135+
To opt out of the feature for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
140136

141137
```azurepowershell
142138
Unregister-AzProviderFeature -FeatureName "EnableApplicationGatewayNetworkIsolation" -ProviderNamespace "Microsoft.Network"
@@ -151,7 +147,7 @@ EnableApplicationGatewayNetworkIsolation Microsoft.Network Unregistered
151147

152148
# [Azure CLI](#tab/cli)
153149

154-
To opt out of the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
150+
To opt out of the feature for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
155151

156152
```azurecli
157153
az feature unregister --name EnableApplicationGatewayNetworkIsolation --namespace Microsoft.Network
@@ -170,7 +166,7 @@ A list of all Azure CLI references for Private Link Configuration on Application
170166

171167
## Configuration of network controls
172168

173-
After registration into the public preview, configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal. No API or command changes are introduced with this public preview.
169+
After registering the feature, configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal.
174170

175171
## Resource Changes
176172

@@ -313,7 +309,7 @@ Result:
313309

314310
In the current offering of Application Gateway, association of a route table with a rule (or creation of rule) defined as 0.0.0.0/0 with a next hop as virtual appliance is unsupported to ensure proper management of Application Gateway.
315311

316-
After registration of the public preview feature, the ability to forward traffic to a virtual appliance is now possible via definition of a route table rule that defines 0.0.0.0/0 with a next hop to Virtual Appliance.
312+
After registration of the feature, the ability to forward traffic to a virtual appliance is now possible via definition of a route table rule that defines 0.0.0.0/0 with a next hop to Virtual Appliance.
317313

318314
Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising does not affect Application Gateway health, and is honored for traffic flow. This scenario can be applicable when using VPN, ExpressRoute, Route Server, or Virtual WAN.
319315

@@ -346,7 +342,7 @@ To create a route table and associate it to the Application Gateway subnet:
346342

347343
## Limitations / Known Issues
348344

349-
While in public preview, the following limitations are known.
345+
The following limitations apply:
350346

351347
### Private link configuration
352348

@@ -375,13 +371,6 @@ If a subnet shares Application Gateway v2 deployments that were created both pri
375371
- If a gateway deployed prior to enablement of the new functionality exists in the subnet, you might see errors such as: `For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'` when adding route table entries.
376372
- When adding network security group rules to the subnet, you might see: `Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group \<NSG-name\> blocks outgoing Internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This isn't permitted for Application Gateways that have fast update enabled or have V2 Sku.`
377373

378-
### Unknown Backend Health status
379-
380-
If backend health is _Unknown_, you may see the following error:
381-
+ The backend health status could not be retrieved. This happens when an NSG/UDR/Firewall on the application gateway subnet is blocking traffic on ports 65503-65534 if there is v1 SKU, and ports 65200-65535 if there is v2 SKU or if the FQDN configured in the backend pool could not be resolved to an IP address. To learn more visit - https://aka.ms/UnknownBackendHealth.
382-
383-
This error can be ignored and will be clarified in a future release.
384-
385374
## Next steps
386375

387376
- See [Azure security baseline for Application Gateway](/security/benchmark/azure/baselines/application-gateway-security-baseline) for more security best practices.

articles/application-gateway/overview-v2.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,10 +118,9 @@ This section describes features and limitations of the v2 SKU that differ from t
118118
|--|--|
119119
|Mixing Standard_v2 and Standard Application Gateway on the same subnet|Not supported|
120120
|User-Defined Route (UDR) on Application Gateway subnet|For information about supported scenarios, see [Application Gateway configuration overview](configuration-infrastructure.md#supported-user-defined-routes).|
121-
|NSG for Inbound port range| - 65200 to 65535 for Standard_v2 SKU<br>- 65503 to 65534 for Standard SKU.<br>Not required for v2 SKUs in public preview [Learn more](application-gateway-private-deployment.md).<br>For more information, see the [FAQ](application-gateway-faq.yml#are-network-security-groups-supported-on-the-application-gateway-subnet).|
121+
|NSG for Inbound port range| - 65200 to 65535 for Standard_v2 SKU<br>- 65503 to 65534 for Standard SKU.<br>Not required for v2 SKUs in private deployment [Learn more](application-gateway-private-deployment.md).<br>For more information, see the [FAQ](application-gateway-faq.yml#are-network-security-groups-supported-on-the-application-gateway-subnet).|
122122
|Performance logs in Azure diagnostics|Not supported.<br>Azure metrics should be used.|
123123
|FIPS mode|Currently not supported.|
124-
|Private frontend configuration only mode|Currently in public preview [Learn more](application-gateway-private-deployment.md).|
125124
|Path based rule encoding |Not supported.<br> V2 decodes paths before routing. For example, V2 treats `/abc%2Fdef` the same as `/abc/def`. |
126125
|Chunked file transfer |In the Standard_V2 configuration, turn off request buffering to support chunked file transfer. <br> In WAF_V2, turning off request buffering isn't possible because it has to look at the entire request to detect and block any threats. Therefore, the suggested alternative is to create a path rule for the affected URL and attach a disabled WAF policy to that path rule.|
127126
|Cookie Affinity |Current V2 doesn't support appending the domain in session affinity Set-Cookie, which means that the cookie can't be used by client for the subdomains.|

0 commit comments

Comments
 (0)