Skip to content

Commit 20fbe77

Browse files
Adding outbound internet connectivity scenarios
Adding outbound internet connectivity scenarios
1 parent 5b188fb commit 20fbe77

File tree

1 file changed

+10
-0
lines changed

1 file changed

+10
-0
lines changed

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -209,6 +209,16 @@ The resource tag is cosmetic, and serves to confirm that the gateway has been pr
209209
> [!TIP]
210210
> The **EnhancedNetworkControl** tag can be helpful when existing Application Gateways were deployed in the subscription prior to feature enablement and you would like to differentiate which gateway can utilize the new functionality.
211211
212+
## Outbound internet connectivity
213+
214+
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) will not be able to egress traffic destined to the internet. This will affect communication to a backend targets that are publicly accessible via the internet.
215+
216+
To enable outbound connectivity from your Application Gateway to an internet facing backend target, you may utilize [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) or forward traffic to a virtual appliance that has access to the internet.
217+
218+
Virtual Network NAT offers control over what IP address or prefix should be used as well as configurable idle-timeout. To configure, create a new NAT Gateway with a public IP address or public prefix and associate it with the subnet containing Application Gateway.
219+
220+
If a virtual appliance is required for internet egress, see the [route table control](#route-table-control) section in this document for more information.
221+
212222
## Network Security Group Control
213223

214224
Network security groups associated to an Application Gateway subnet no longer require inbound rules for GatewayManager, and they don't require outbound access to the Internet. The only required rule is **Allow inbound from AzureLoadBalancer** to ensure health probes can reach the gateway.

0 commit comments

Comments
 (0)