Skip to content

Commit 2e2cb03

Browse files
author
Jill Grant
authored
Merge pull request #292685 from madsd/appgwupdate
Update App Gw articles
2 parents 9846b69 + ad065ea commit 2e2cb03

File tree

3 files changed

+76
-105
lines changed

3 files changed

+76
-105
lines changed

articles/app-service/environment/integrate-with-application-gateway.md

Lines changed: 40 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -5,63 +5,63 @@ author: madsd
55

66
ms.assetid: a6a74f17-bb57-40dd-8113-a20b50ba3050
77
ms.topic: article
8-
ms.date: 10/12/2021
8+
ms.date: 01/07/2025
99
ms.author: madsd
1010
---
1111
# Integrate your ILB App Service Environment with the Azure Application Gateway
1212

13-
The [App Service Environment][AppServiceEnvironmentoverview] is a deployment of Azure App Service in the subnet of a customer's Azure virtual network. It can be deployed with an external or internal endpoint for app access. The deployment of the App Service environment with an internal endpoint is called an internal load balancer (ILB) App Service environment (ASE).
13+
The [App Service Environment](./overview.md) is a deployment of Azure App Service in the subnet of a customer's Azure virtual network. It can be deployed with an external or internal endpoint for app access. The deployment of the App Service Environment with an internal endpoint is called an internal load balancer (ILB) App Service Environment.
1414

15-
Web application firewalls help secure your web applications by inspecting inbound web traffic to block SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks. You can get a WAF device from the Azure Marketplace or you can use the [Azure Application Gateway][appgw].
15+
Web application firewalls help secure your web applications by inspecting inbound web traffic to block SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks. You can get a WAF device from Azure Marketplace or you can use the [Azure Application Gateway](../../application-gateway/overview.md).
1616

17-
The Azure Application Gateway is a virtual appliance that provides layer 7 load balancing, TLS/SSL offloading, and web application firewall (WAF) protection. It can listen on a public IP address and route traffic to your application endpoint. The following information describes how to integrate a WAF-configured application gateway with an app in an ILB App Service environment.
17+
The Azure Application Gateway is a virtual appliance that provides layer 7 load balancing, TLS offloading, and web application firewall (WAF) protection. It can listen on a public IP address and route traffic to your application endpoint. The following information describes how to integrate a WAF-configured application gateway with an app in an ILB App Service Environment.
1818

19-
The integration of the application gateway with the ILB App Service environment is at an app level. When you configure the application gateway with your ILB App Service environment, you're doing it for specific apps in your ILB App Service environment. This technique enables hosting secure multitenant applications in a single ILB App Service environment.
19+
The integration of the application gateway with the ILB App Service Environment is at an app level. When you configure the application gateway with your ILB App Service Environment, you're doing it for specific apps in your ILB App Service Environment.
2020

2121
:::image type="content" source="./media/integrate-with-application-gateway/appgw-highlevel.png" alt-text="Screenshot of High level integration diagram":::
2222

2323
In this walkthrough, you will:
2424

2525
* Create an Azure Application Gateway.
26-
* Configure the application gateway to point to an app in your ILB App Service environment.
26+
* Configure the application gateway to point to an app in your ILB App Service Environment.
2727
* Edit the public DNS host name that points to your application gateway.
2828

2929
## Prerequisites
3030

31-
To integrate your application gateway with your ILB App Service environment, you need:
31+
To integrate your application gateway with your ILB App Service Environment, you need:
3232

33-
* An ILB App Service environment.
34-
* A private DNS zone for ILB App Service environment.
35-
* An app running in the ILB App Service environment.
36-
* A public DNS name that's used later to point to your application gateway.
37-
* If you need to use TLS/SSL encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
33+
* An ILB App Service Environment.
34+
* A private DNS zone for ILB App Service Environment.
35+
* An app running in the ILB App Service Environment.
36+
* A public DNS name for your application gateway.
37+
* If you need to use TLS encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
3838

39-
### ILB App Service environment
39+
### ILB App Service Environment
4040

41-
For details on how to create an ILB App Service environment, see [Create an ASE in the Azure portal][creation] and [Create an ASE with ARM template][createfromtemplate].
41+
For details on how to create an ILB App Service Environment, see [Create an App Service Environment in the Azure portal](./creation.md) and [Create an App Service Environment with Azure Resource Manager template](./create-from-template.md).
4242

43-
* After ILB ASE is created, the default domain is `<YourAseName>.appserviceenvironment.net`.
43+
* After ILB App Service Environment is created, the default domain is `<YourAseName>.appserviceenvironment.net`.
4444

45-
:::image type="content" source="./media/integrate-with-application-gateway/ilb-ase.png" alt-text="Screenshot of ILB ASE Overview":::
45+
:::image type="content" source="./media/integrate-with-application-gateway/ilb-ase.png" alt-text="Screenshot of ILB App Service Environment Overview.":::
4646

47-
* An internal load balancer is provisioned for inbound access. You can check the Inbound address in the IP addresses under ASE Settings. You can create a private DNS zone mapped to this IP address later.
47+
* An internal load balancer is provisioned for inbound access. You can check the Inbound address in the IP addresses under App Service Environment Settings. You can create a private DNS zone mapped to this IP address later.
4848

49-
:::image type="content" source="./media/integrate-with-application-gateway/ip-addresses.png" alt-text="Screenshot of getting the inbound address from ILB ASE IP addresses settings.":::
49+
:::image type="content" source="./media/integrate-with-application-gateway/ip-addresses.png" alt-text="Screenshot of getting the inbound address from ILB App Service Environment IP addresses settings.":::
5050

5151
### A private DNS zone
5252

53-
You need a [private DNS zone][privatednszone] for internal name resolution. Create it using the ASE name using the record sets shown in the following table (for instructions, see [Quickstart - Create an Azure private DNS zone using the Azure portal][createprivatednszone]).
53+
You need a [private DNS zone](../../dns/private-dns-overview.md) for internal name resolution. Create it using the App Service Environment name using the record sets shown in the following table (for instructions, see [Quickstart - Create an Azure private DNS zone using the Azure portal](../../dns/private-dns-getstarted-portal.md)).
5454

5555
| Name | Type | Value |
5656
| ----- | ---- | ------------------- |
57-
| * | A | ASE inbound address |
58-
| @ | A | ASE inbound address |
59-
| @ | SOA | ASE DNS name |
60-
| *.scm | A | ASE inbound address |
57+
| * | A | App Service Environment inbound address |
58+
| @ | A | App Service Environment inbound address |
59+
| @ | SOA | App Service Environment DNS name |
60+
| *.scm | A | App Service Environment inbound address |
6161

62-
### App Service on ILB ASE
62+
### App Service on ILB App Service Environment
6363

64-
You need to create an App Service plan and an app in your ILB ASE. When creating the app in the portal, select your ILB ASE as the **Region**.
64+
You need to create an App Service plan and an app in your ILB App Service Environment. When creating the app in the portal, select your ILB App Service Environment as the **Region**.
6565

6666
### A public DNS name to the application gateway
6767

@@ -70,20 +70,20 @@ With a public domain mapped to the application gateway, you don't need to config
7070

7171
### A valid public certificate
7272

73-
For security enhancement, it's recommended to bind TLS/SSL certificate for session encryption. To bind TLS/SSL certificate to the application gateway, a valid public certificate with following information is required. With [App Service certificates](../configure-ssl-app-service-certificate.md), you can buy a TLS/SSL certificate and export it in .pfx format.
73+
For security enhancement, bind a TLS certificate for session encryption. To bind TLS certificate to the application gateway, a valid public certificate with following information is required. With [App Service certificates](../configure-ssl-app-service-certificate.md), you can buy a TLS certificate and export it in `.pfx` format.
7474

7575
| Name | Value | Description|
7676
| ----- | ------------------- |------------|
7777
| **Common Name** |`<yourappname>.<yourdomainname>`, for example: `app.asabuludemo.com` <br/> or `*.<yourdomainname>`, for example: `*.asabuludemo.com` | A standard certificate or a [wildcard certificate](https://wikipedia.org/wiki/Wildcard_certificate) for the application gateway|
7878
| **Subject Alternative Name** | `<yourappname>.scm.<yourdomainname>`, for example: `app.scm.asabuludemo.com` <br/>or `*.scm.<yourdomainname>`, for example: `*.scm.asabuludemo.com` |The SAN that allowing to connect to App Service kudu service. It's an optional setting, if you don't want to publish the App Service kudu service to the internet.|
7979

80-
The certificate file should have a private key and save in .pfx format, it will be imported to the application gateway later.
80+
The certificate file should have a private key and save in `.pfx` format. The certificate is imported to the application gateway later.
8181

8282
## Create an application gateway
8383

84-
For the basic application gateway creation, refer to [Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal][Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal].
84+
For the basic application gateway creation, refer to [Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal](../../web-application-firewall/ag/application-gateway-web-application-firewall-portal.md).
8585

86-
In this tutorial, we'll use Azure portal to create an application gateway with ILB App Service environment.
86+
In this tutorial, we use Azure portal to create an application gateway with ILB App Service Environment.
8787

8888
In the Azure portal, select **New** > **Network** > **Application Gateway** to create an application gateway.
8989

@@ -120,25 +120,25 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
120120
| Rule name | For example: `http-routingrule` | Routing name |
121121
| Listener name | For example: `http-listener` | Listener name |
122122
| Frontend IP | Public | For internet access, set to Public |
123-
| Protocol | HTTP | Don't use TLS/SSL encryption |
123+
| Protocol | HTTP | Don't use TLS encryption |
124124
| Port | 80 | Default HTTP Port |
125-
| Listener type | Multi site | Allow to listen multi-sites on the application gateway |
125+
| Listener type | Multisite | Allow to listen multi-sites on the application gateway |
126126
| Host type | Multiple/Wildcard | Set to multiple or wildcard website name if listener type is set to multi-sites. |
127127
| Host name | For example: `app.asabuludemo.com` | Set to a routable domain name for App Service |
128128
129129
:::image type="content" source="./media/integrate-with-application-gateway/http-routing-rule.png" alt-text="Screenshot of HTTP Listener of the application gateway Routing Rule.":::
130130

131-
* To connect to the application gateway with TLS/SSL encryption, you can create a listener with following settings,
131+
* To connect to the application gateway with TLS encryption, you can create a listener with following settings:
132132

133133
| Parameter | Value | Description |
134134
| -------------- | --------------------------------- | ------------------------------------------------------------ |
135135
| Rule name | For example: `https-routingrule` | Routing name |
136136
| Listener name | For example: `https-listener` | Listener name |
137137
| Frontend IP | Public | For internet access, set to Public |
138-
| Protocol | HTTPS | Use TLS/SSL encryption |
138+
| Protocol | HTTPS | Use TLS encryption |
139139
| Port | 443 | Default HTTPS Port |
140140
| Https Settings | Upload a certificate | Upload a certificate contains the CN and the private key with .pfx format. |
141-
| Listener type | Multi site | Allow to listen multi-sites on the application gateway |
141+
| Listener type | Multisite | Allow to listen multi-sites on the application gateway |
142142
| Host type | Multiple/Wildcard | Set to multiple or wildcard website name if listener type is set to multi-sites. |
143143
| Host name | For example: `app.asabuludemo.com` | Set to a routable domain name for App Service |
144144
@@ -148,24 +148,24 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
148148

149149
:::image type="content" source="./media/integrate-with-application-gateway/add-new-http-setting.png" alt-text="Screenshot of adding new link to add an H T T P setting.":::
150150

151-
* HTTP settings listed as below:
151+
* HTTP settings listed in the following table:
152152

153153
| Parameter | Value | Description |
154154
| ----------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
155155
| HTTP setting name | For example: `https-setting` | HTTP setting name |
156-
| Backend protocol | HTTPS | Use TLS/SSL encryption |
156+
| Backend protocol | HTTPS | Use TLS encryption |
157157
| Backend port | 443 | Default HTTPS Port |
158-
| Use well known CA certificate | Yes | The default domain name of ILB ASE is `.appserviceenvironment.net`, the certificate of this domain is issued by a public trusted root authority. In the Trusted root certificate setting, you can set to use **well known CA trusted root certificate**. |
159-
| Override with new host name | Yes | The host name header will be overwrote on connecting to the app on ILB ASE |
158+
| Use well known CA certificate | Yes | The default domain name of ILB App Service Environment is `.appserviceenvironment.net`. The certificate of this domain is issued by a public trusted root authority. In the Trusted root certificate setting, you can set to use **well known CA trusted root certificate**. |
159+
| Override with new host name | Yes | The host name header is overwritten on connecting to the app on ILB App Service Environment |
160160
| Host name override | Pick host name from backend target | When setting backend pool to App Service, you can pick host from backend target |
161161
| Create custom probes | No | Use default health probe|
162162
163163
:::image type="content" source="./media/integrate-with-application-gateway/https-setting.png" alt-text="Screenshot of **Add an H T T P setting** dialog.":::
164164

165165

166-
## Configure an application gateway integration with ILB ASE
166+
## Configure an application gateway integration with ILB App Service Environment
167167

168-
To access ILB ASE from the application gateway, you need to check if a virtual network link to private DNS zone. If there's no virtual network linked to your application gateway's VNet, add a virtual network link with following steps.
168+
To access ILB App Service Environment from the application gateway, you need to check if a virtual network link to private DNS zone. If there's no virtual network linked to your application gateway's virtual network, add a virtual network link with following steps.
169169

170170
### Configure virtual network links with a private DNS zone
171171

@@ -202,13 +202,3 @@ You need to configure a proper DNS mapping when access to the application gatewa
202202
* On a machine access from internet, test the web access from a browser.
203203

204204
:::image type="content" source="./media/integrate-with-application-gateway/access-web.png" alt-text="Screenshot of opening a browser, access to the web.":::
205-
206-
<!--LINKS-->
207-
[appgw]: ../../application-gateway/overview.md
208-
[custom-domain]: ../app-service-web-tutorial-custom-domain.md
209-
[creation]: ./creation.md
210-
[createfromtemplate]: ./create-from-template.md
211-
[createprivatednszone]: ../../dns/private-dns-getstarted-portal.md
212-
[AppServiceEnvironmentoverview]: ./overview.md
213-
[privatednszone]: ../../dns/private-dns-overview.md
214-
[Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal]: ../../web-application-firewall/ag/application-gateway-web-application-firewall-portal.md

0 commit comments

Comments
 (0)