You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/integrate-with-application-gateway.md
+40-50Lines changed: 40 additions & 50 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,63 +5,63 @@ author: madsd
5
5
6
6
ms.assetid: a6a74f17-bb57-40dd-8113-a20b50ba3050
7
7
ms.topic: article
8
-
ms.date: 10/12/2021
8
+
ms.date: 01/07/2025
9
9
ms.author: madsd
10
10
---
11
11
# Integrate your ILB App Service Environment with the Azure Application Gateway
12
12
13
-
The [App Service Environment][AppServiceEnvironmentoverview] is a deployment of Azure App Service in the subnet of a customer's Azure virtual network. It can be deployed with an external or internal endpoint for app access. The deployment of the App Service environment with an internal endpoint is called an internal load balancer (ILB) App Service environment (ASE).
13
+
The [App Service Environment](./overview.md) is a deployment of Azure App Service in the subnet of a customer's Azure virtual network. It can be deployed with an external or internal endpoint for app access. The deployment of the App Service Environment with an internal endpoint is called an internal load balancer (ILB) App Service Environment.
14
14
15
-
Web application firewalls help secure your web applications by inspecting inbound web traffic to block SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks. You can get a WAF device from the Azure Marketplace or you can use the [Azure Application Gateway][appgw].
15
+
Web application firewalls help secure your web applications by inspecting inbound web traffic to block SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks. You can get a WAF device from Azure Marketplace or you can use the [Azure Application Gateway](../../application-gateway/overview.md).
16
16
17
-
The Azure Application Gateway is a virtual appliance that provides layer 7 load balancing, TLS/SSL offloading, and web application firewall (WAF) protection. It can listen on a public IP address and route traffic to your application endpoint. The following information describes how to integrate a WAF-configured application gateway with an app in an ILB App Service environment.
17
+
The Azure Application Gateway is a virtual appliance that provides layer 7 load balancing, TLS offloading, and web application firewall (WAF) protection. It can listen on a public IP address and route traffic to your application endpoint. The following information describes how to integrate a WAF-configured application gateway with an app in an ILB App Service Environment.
18
18
19
-
The integration of the application gateway with the ILB App Service environment is at an app level. When you configure the application gateway with your ILB App Service environment, you're doing it for specific apps in your ILB App Service environment. This technique enables hosting secure multitenant applications in a single ILB App Service environment.
19
+
The integration of the application gateway with the ILB App Service Environment is at an app level. When you configure the application gateway with your ILB App Service Environment, you're doing it for specific apps in your ILB App Service Environment.
20
20
21
21
:::image type="content" source="./media/integrate-with-application-gateway/appgw-highlevel.png" alt-text="Screenshot of High level integration diagram":::
22
22
23
23
In this walkthrough, you will:
24
24
25
25
* Create an Azure Application Gateway.
26
-
* Configure the application gateway to point to an app in your ILB App Service environment.
26
+
* Configure the application gateway to point to an app in your ILB App Service Environment.
27
27
* Edit the public DNS host name that points to your application gateway.
28
28
29
29
## Prerequisites
30
30
31
-
To integrate your application gateway with your ILB App Service environment, you need:
31
+
To integrate your application gateway with your ILB App Service Environment, you need:
32
32
33
-
* An ILB App Service environment.
34
-
* A private DNS zone for ILB App Service environment.
35
-
* An app running in the ILB App Service environment.
36
-
* A public DNS name that's used later to point to your application gateway.
37
-
* If you need to use TLS/SSL encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
33
+
* An ILB App Service Environment.
34
+
* A private DNS zone for ILB App Service Environment.
35
+
* An app running in the ILB App Service Environment.
36
+
* A public DNS name for your application gateway.
37
+
* If you need to use TLS encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
38
38
39
-
### ILB App Service environment
39
+
### ILB App Service Environment
40
40
41
-
For details on how to create an ILB App Service environment, see [Create an ASE in the Azure portal][creation] and [Create an ASE with ARM template][createfromtemplate].
41
+
For details on how to create an ILB App Service Environment, see [Create an App Service Environment in the Azure portal](./creation.md) and [Create an App Service Environment with Azure Resource Manager template](./create-from-template.md).
42
42
43
-
* After ILB ASE is created, the default domain is `<YourAseName>.appserviceenvironment.net`.
43
+
* After ILB App Service Environment is created, the default domain is `<YourAseName>.appserviceenvironment.net`.
44
44
45
-
:::image type="content" source="./media/integrate-with-application-gateway/ilb-ase.png" alt-text="Screenshot of ILB ASE Overview":::
45
+
:::image type="content" source="./media/integrate-with-application-gateway/ilb-ase.png" alt-text="Screenshot of ILB App Service Environment Overview.":::
46
46
47
-
* An internal load balancer is provisioned for inbound access. You can check the Inbound address in the IP addresses under ASE Settings. You can create a private DNS zone mapped to this IP address later.
47
+
* An internal load balancer is provisioned for inbound access. You can check the Inbound address in the IP addresses under App Service Environment Settings. You can create a private DNS zone mapped to this IP address later.
48
48
49
-
:::image type="content" source="./media/integrate-with-application-gateway/ip-addresses.png" alt-text="Screenshot of getting the inbound address from ILB ASE IP addresses settings.":::
49
+
:::image type="content" source="./media/integrate-with-application-gateway/ip-addresses.png" alt-text="Screenshot of getting the inbound address from ILB App Service Environment IP addresses settings.":::
50
50
51
51
### A private DNS zone
52
52
53
-
You need a [private DNS zone][privatednszone] for internal name resolution. Create it using the ASE name using the record sets shown in the following table (for instructions, see [Quickstart - Create an Azure private DNS zone using the Azure portal][createprivatednszone]).
53
+
You need a [private DNS zone](../../dns/private-dns-overview.md) for internal name resolution. Create it using the App Service Environment name using the record sets shown in the following table (for instructions, see [Quickstart - Create an Azure private DNS zone using the Azure portal](../../dns/private-dns-getstarted-portal.md)).
54
54
55
55
| Name | Type | Value |
56
56
| ----- | ---- | ------------------- |
57
-
| * | A |ASE inbound address |
58
-
| @ | A |ASE inbound address |
59
-
| @ | SOA |ASE DNS name |
60
-
|*.scm | A |ASE inbound address |
57
+
| * | A |App Service Environment inbound address |
58
+
| @ | A |App Service Environment inbound address |
59
+
| @ | SOA |App Service Environment DNS name |
60
+
|*.scm | A |App Service Environment inbound address |
61
61
62
-
### App Service on ILB ASE
62
+
### App Service on ILB App Service Environment
63
63
64
-
You need to create an App Service plan and an app in your ILB ASE. When creating the app in the portal, select your ILB ASE as the **Region**.
64
+
You need to create an App Service plan and an app in your ILB App Service Environment. When creating the app in the portal, select your ILB App Service Environment as the **Region**.
65
65
66
66
### A public DNS name to the application gateway
67
67
@@ -70,20 +70,20 @@ With a public domain mapped to the application gateway, you don't need to config
70
70
71
71
### A valid public certificate
72
72
73
-
For security enhancement, it's recommended to bind TLS/SSL certificate for session encryption. To bind TLS/SSL certificate to the application gateway, a valid public certificate with following information is required. With [App Service certificates](../configure-ssl-app-service-certificate.md), you can buy a TLS/SSL certificate and export it in .pfx format.
73
+
For security enhancement, bind a TLS certificate for session encryption. To bind TLS certificate to the application gateway, a valid public certificate with following information is required. With [App Service certificates](../configure-ssl-app-service-certificate.md), you can buy a TLS certificate and export it in `.pfx` format.
74
74
75
75
| Name | Value | Description|
76
76
| ----- | ------------------- |------------|
77
77
|**Common Name**|`<yourappname>.<yourdomainname>`, for example: `app.asabuludemo.com` <br/> or `*.<yourdomainname>`, for example: `*.asabuludemo.com`| A standard certificate or a [wildcard certificate](https://wikipedia.org/wiki/Wildcard_certificate) for the application gateway|
78
78
|**Subject Alternative Name**|`<yourappname>.scm.<yourdomainname>`, for example: `app.scm.asabuludemo.com` <br/>or `*.scm.<yourdomainname>`, for example: `*.scm.asabuludemo.com`|The SAN that allowing to connect to App Service kudu service. It's an optional setting, if you don't want to publish the App Service kudu service to the internet.|
79
79
80
-
The certificate file should have a private key and save in .pfx format, it will be imported to the application gateway later.
80
+
The certificate file should have a private key and save in `.pfx` format. The certificate is imported to the application gateway later.
81
81
82
82
## Create an application gateway
83
83
84
-
For the basic application gateway creation, refer to [Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal][Tutorial: Create an applicationgateway with a Web Application Firewall using the Azure portal].
84
+
For the basic application gateway creation, refer to [Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal](../../web-application-firewall/ag/application-gateway-web-application-firewall-portal.md).
85
85
86
-
In this tutorial, we'll use Azure portal to create an application gateway with ILB App Service environment.
86
+
In this tutorial, we use Azure portal to create an application gateway with ILB App Service Environment.
87
87
88
88
In the Azure portal, select **New** > **Network** > **Application Gateway** to create an application gateway.
89
89
@@ -120,25 +120,25 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
120
120
| Rule name | For example: `http-routingrule`| Routing name |
121
121
| Listener name | For example: `http-listener`| Listener name |
122
122
| Frontend IP | Public | For internet access, set to Public |
123
-
| Protocol | HTTP | Don't use TLS/SSL encryption |
123
+
| Protocol | HTTP | Don't use TLS encryption |
124
124
| Port | 80 | Default HTTP Port |
125
-
| Listener type |Multi site| Allow to listen multi-sites on the application gateway |
125
+
| Listener type |Multisite| Allow to listen multi-sites on the application gateway |
126
126
| Host type | Multiple/Wildcard | Set to multiple or wildcard website name if listener type is set to multi-sites. |
127
127
| Host name | For example: `app.asabuludemo.com`| Set to a routable domain name for App Service |
128
128
129
129
:::image type="content" source="./media/integrate-with-application-gateway/http-routing-rule.png" alt-text="Screenshot of HTTP Listener of the application gateway Routing Rule.":::
130
130
131
-
* To connect to the application gateway with TLS/SSL encryption, you can create a listener with following settings,
131
+
* To connect to the application gateway with TLS encryption, you can create a listener with following settings:
| Rule name | For example: `https-routingrule`| Routing name |
136
136
| Listener name | For example: `https-listener`| Listener name |
137
137
| Frontend IP | Public | For internet access, set to Public |
138
-
| Protocol | HTTPS | Use TLS/SSL encryption |
138
+
| Protocol | HTTPS | Use TLS encryption |
139
139
| Port | 443 | Default HTTPS Port |
140
140
| Https Settings | Upload a certificate | Upload a certificate contains the CN and the private key with .pfx format. |
141
-
| Listener type |Multi site| Allow to listen multi-sites on the application gateway |
141
+
| Listener type |Multisite| Allow to listen multi-sites on the application gateway |
142
142
| Host type | Multiple/Wildcard | Set to multiple or wildcard website name if listener type is set to multi-sites. |
143
143
| Host name | For example: `app.asabuludemo.com`| Set to a routable domain name for App Service |
144
144
@@ -148,24 +148,24 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
148
148
149
149
:::image type="content" source="./media/integrate-with-application-gateway/add-new-http-setting.png" alt-text="Screenshot of adding new link to add an H T T P setting.":::
| HTTP setting name | For example: `https-setting`| HTTP setting name |
156
-
| Backend protocol | HTTPS | Use TLS/SSL encryption |
156
+
| Backend protocol | HTTPS | Use TLS encryption |
157
157
| Backend port | 443 | Default HTTPS Port |
158
-
| Use well known CA certificate | Yes | The default domain name of ILB ASE is `.appserviceenvironment.net`, the certificate of this domain is issued by a public trusted root authority. In the Trusted root certificate setting, you can set to use **well known CA trusted root certificate**. |
159
-
| Override with new host name | Yes | The host name header will be overwrote on connecting to the app on ILB ASE|
158
+
| Use well known CA certificate | Yes | The default domain name of ILB App Service Environment is `.appserviceenvironment.net`. The certificate of this domain is issued by a public trusted root authority. In the Trusted root certificate setting, you can set to use **well known CA trusted root certificate**. |
159
+
| Override with new host name | Yes | The host name header is overwritten on connecting to the app on ILB App Service Environment|
160
160
| Host name override | Pick host name from backend target | When setting backend pool to App Service, you can pick host from backend target |
161
161
| Create custom probes | No | Use default health probe|
162
162
163
163
:::image type="content" source="./media/integrate-with-application-gateway/https-setting.png" alt-text="Screenshot of **Add an H T T P setting** dialog.":::
164
164
165
165
166
-
## Configure an application gateway integration with ILB ASE
166
+
## Configure an application gateway integration with ILB App Service Environment
167
167
168
-
To access ILB ASE from the application gateway, you need to check if a virtual network link to private DNS zone. If there's no virtual network linked to your application gateway's VNet, add a virtual network link with following steps.
168
+
To access ILB App Service Environment from the application gateway, you need to check if a virtual network link to private DNS zone. If there's no virtual network linked to your application gateway's virtual network, add a virtual network link with following steps.
169
169
170
170
### Configure virtual network links with a private DNS zone
171
171
@@ -202,13 +202,3 @@ You need to configure a proper DNS mapping when access to the application gatewa
202
202
* On a machine access from internet, test the web access from a browser.
203
203
204
204
:::image type="content" source="./media/integrate-with-application-gateway/access-web.png" alt-text="Screenshot of opening a browser, access to the web.":::
[Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal]: ../../web-application-firewall/ag/application-gateway-web-application-firewall-portal.md
0 commit comments