You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/how-to-enable-private-link-application-gateway.md
+20-10Lines changed: 20 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,7 +26,14 @@ This article guides you through the steps to configure an Azure Front Door Premi
26
26
27
27
## Enable private connectivity to Azure Application Gateway
28
28
29
-
Follow the instructions in [Configure Azure Application Gateway Private Link](../application-gateway/private-link-configure.md), but don't complete the final step of creating a private endpoint.
29
+
1. Follow the instructions in [Configure Azure Application Gateway Private Link](../application-gateway/private-link-configure.md), but don't complete the final step of creating a private endpoint.
30
+
1. Go to your Application Gateway's Overview tab, note down the Resource group name and Subscription ID
31
+
1. From the Overview tab, navigate to the Application Gateway's virtual network
32
+
:::image type="content" source="media/private-link/application-gateway-overview-vnet.png" alt-text="Screenshot of the overview tab of application gateway.":::
33
+
1. Under Settings, select 'Connected devices'
34
+
1. Note down the name of the device with type as 'Private link service'.
35
+
:::image type="content" source="media/private-link/connected-devices.png" alt-text="Screenshot of the Connected Devices tab within the Application gateway virtual network.":::
36
+
1. Construct the resource ID of the private link service using the values from previous steps. The format is "subscriptions/{subscription-id}/resourceGroups/{resource-group-name}/providers/Microsoft.Network/privateLinkServices/{Private-link-service-name}. This resource ID will be used while configuring the Front Door origin.
30
37
31
38
## Create an origin group and add the application gateway as an origin
32
39
@@ -40,18 +47,20 @@ Follow the instructions in [Configure Azure Application Gateway Private Link](..
40
47
| Setting | Value |
41
48
| ------- | ----- |
42
49
| Name | Enter a name to identify this origin. |
43
-
| Origin Type |Application Gateway|
44
-
| Host name |Select the host from the dropdown that you want as an origin.|
45
-
| Origin host header |Will be autopopulated with the IP of the chosen Application Gateway|
50
+
| Origin Type |Custom|
51
+
| Host name |Enter the hostname of the listener of your Application Gateway|
52
+
| Origin host header |Enter the hostname of the listener of your Application Gateway|
46
53
| HTTP port | 80 (default) |
47
54
| HTTPS port | 443 (default) |
48
55
| Priority | Assign different priorities to origins for primary, secondary, and backup purposes. |
49
56
| Weight | 1000 (default). Use weights to distribute traffic among different origins. |
57
+
| Private link | Enable private link service |
58
+
| Select a private link | By ID or alias |
59
+
| ID/alias | Enter the private link service resource ID obtained while configuring the Application Gateway. |
50
60
| Region | Select the region that matches or is closest to your origin. |
51
-
| Target sub resource | Name of the Azure Application Gateway frontend IP configuration. |
52
61
| Request message | Enter a custom message to display while approving the Private Endpoint. |
53
62
54
-
:::image type="content" source="media/private-link/application-gateway-private-link.png" alt-text="Screenshot of origin dettings for configuring Application Gateway as a private origin.":::
63
+
:::image type="content" source="media/private-link/application-gateway-private-link.png" alt-text="Screenshot of origin settings for configuring Application Gateway as a private origin.":::
55
64
56
65
1. Select **Add** to save your origin settings
57
66
1. Select **Add** to save the origin group settings.
@@ -137,10 +146,10 @@ Follow the instructions in [Configure Azure Application Gateway Private Link](..
@@ -236,8 +245,8 @@ Follow the steps in [Configure Azure Application Gateway Private Link](../applic
236
245
--origin-group-name myOriginGroup \
237
246
--origin-name myAppGatewayOrigin \
238
247
--profile-name myFrontDoorProfile \
239
-
--host-name 10.0.0.4 \
240
-
--origin-host-header 10.0.0.4 \
248
+
--host-name www.contoso.com \
249
+
--origin-host-header www.contoso.com \
241
250
--http-port 80 \
242
251
--https-port 443 \
243
252
--priority 1 \
@@ -292,6 +301,7 @@ Your Azure Front Door profile is now fully functional after completing the final
292
301
The following are common mistakes when configuring an Azure Application Gateway origin with Azure Private Link enabled:
293
302
294
303
1. Configuring Azure Front Door origin before configuring Azure Private Link on the Azure Application Gateway.
304
+
1. Configuring the origin with origin type as 'Application Gateway' instead of 'Custom'. When you choose the origin type as 'Application Gateway', the origin hostname is autopopulated with the IP address of the Application Gateway. This can lead to 'CertificateNameValidation' error. This issue can be avoided in public origins by disabling certificate subject name validation. But for private link enabled origins, certificate subject name validation is mandatory.
295
305
296
306
1. Adding the Azure Application Gateway origin with Azure Private Link to an existing origin group that contains public origins. Azure Front Door doesn't allow mixing public and private origins in the same origin group.
0 commit comments