You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-faq.md
+33Lines changed: 33 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,6 +117,15 @@ Yes. For details see, [Migrate Azure Application Gateway and Web Application Fir
117
117
118
118
Yes. The Application Gateway v1 SKU will continue to be supported. However, it is strongly recommended that you move to v2 to take advantage of the feature updates in that SKU. For more information, see [Autoscaling and Zone-redundant Application Gateway v2](application-gateway-autoscaling-zone-redundant.md).
119
119
120
+
### Does Application Gateway V2 support proxying requests with NTLM authentication?
121
+
122
+
No. Application Gateway V2 doesn't support proxying requests with NTLM authentication yet.
123
+
124
+
### Does Application Gateway affinity cookie support SameSite attribute?
125
+
Yes, the [Chromium browser](https://www.chromium.org/Home)[v80 update](https://chromiumdash.appspot.com/schedule) introduced a mandate on HTTP cookies without SameSite attribute to be treated as SameSite=Lax. This means that the Application Gateway affinity cookie won't be sent by the browser in a third-party context.
126
+
127
+
To support this scenario, Application Gateway injects another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. These cookies are similar, but the *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it: *SameSite=None; Secure*. These attributes maintain sticky sessions even for cross-origin requests. See the [cookie based affinity section](configuration-overview.md#cookie-based-affinity) for more information.
128
+
120
129
## Performance
121
130
122
131
### How does Application Gateway support high availability and scalability?
@@ -211,6 +220,30 @@ No.
211
220
212
221
Application Gateway v2 does not currently support IPv6. It can operate in a dual stack VNet using only IPv4, but the gateway subnet must be IPv4-only. Application Gateway v1 does not support dual stack VNets.
213
222
223
+
### How do I use Application Gateway V2 with only private frontend IP address?
224
+
225
+
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
226
+
* Private IP and Public IP
227
+
* Public IP only
228
+
229
+
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
230
+
1. Create an Application Gateway with both public and private frontend IP address
231
+
2. Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
232
+
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
233
+
234
+
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
235
+
236
+
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
237
+
238
+
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
239
+
240
+
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
241
+
242
+
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
243
+
244
+
Sample NSG configuration for private IP only access:
245
+

246
+
214
247
## Configuration - TLS
215
248
216
249
### What certificates does Application Gateway support?
0 commit comments