Skip to content

Commit 251031f

Browse files
authored
Merge pull request #107086 from surajmb/patch-18
Added NTLM FAQ and rearranged two FAQs
2 parents 56b986d + 612dedd commit 251031f

File tree

1 file changed

+33
-0
lines changed

1 file changed

+33
-0
lines changed

articles/application-gateway/application-gateway-faq.md

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -117,6 +117,15 @@ Yes. For details see, [Migrate Azure Application Gateway and Web Application Fir
117117

118118
Yes. The Application Gateway v1 SKU will continue to be supported. However, it is strongly recommended that you move to v2 to take advantage of the feature updates in that SKU. For more information, see [Autoscaling and Zone-redundant Application Gateway v2](application-gateway-autoscaling-zone-redundant.md).
119119

120+
### Does Application Gateway V2 support proxying requests with NTLM authentication?
121+
122+
No. Application Gateway V2 doesn't support proxying requests with NTLM authentication yet.
123+
124+
### Does Application Gateway affinity cookie support SameSite attribute?
125+
Yes, the [Chromium browser](https://www.chromium.org/Home) [v80 update](https://chromiumdash.appspot.com/schedule) introduced a mandate on HTTP cookies without SameSite attribute to be treated as SameSite=Lax. This means that the Application Gateway affinity cookie won't be sent by the browser in a third-party context.
126+
127+
To support this scenario, Application Gateway injects another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. These cookies are similar, but the *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it: *SameSite=None; Secure*. These attributes maintain sticky sessions even for cross-origin requests. See the [cookie based affinity section](configuration-overview.md#cookie-based-affinity) for more information.
128+
120129
## Performance
121130

122131
### How does Application Gateway support high availability and scalability?
@@ -211,6 +220,30 @@ No.
211220

212221
Application Gateway v2 does not currently support IPv6. It can operate in a dual stack VNet using only IPv4, but the gateway subnet must be IPv4-only. Application Gateway v1 does not support dual stack VNets.
213222

223+
### How do I use Application Gateway V2 with only private frontend IP address?
224+
225+
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
226+
* Private IP and Public IP
227+
* Public IP only
228+
229+
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
230+
1. Create an Application Gateway with both public and private frontend IP address
231+
2. Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
232+
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
233+
234+
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
235+
236+
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
237+
238+
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
239+
240+
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
241+
242+
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
243+
244+
Sample NSG configuration for private IP only access:
245+
![Application Gateway V2 NSG Configuration for private IP access only](./media/application-gateway-faq/appgw-privip-nsg.png)
246+
214247
## Configuration - TLS
215248

216249
### What certificates does Application Gateway support?

0 commit comments

Comments
 (0)