You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-faq.md
+33-28Lines changed: 33 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -105,6 +105,15 @@ Most deployments that use the v2 SKU take around 6 minutes to provision. However
105
105
106
106
No. Application Gateway doesn't support email protocols such as SMTP, IMAP, and POP3.
107
107
108
+
### Does Application Gateway support proxying requests with NTLM authentication?
109
+
110
+
No. Application Gateway doesn't support proxying requests with NTLM authentication yet.
111
+
112
+
### Does Application Gateway affinity cookie support SameSite attribute?
113
+
Yes, the [Chromium browser](https://www.chromium.org/Home)[v80 update](https://chromiumdash.appspot.com/schedule) introduced a mandate on HTTP cookies without SameSite attribute to be treated as SameSite=Lax. This means that the Application Gateway affinity cookie won't be sent by the browser in a third-party context.
114
+
115
+
To support this scenario, Application Gateway injects another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. These cookies are similar, but the *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it: *SameSite=None; Secure*. These attributes maintain sticky sessions even for cross-origin requests. See the [cookie based affinity section](configuration-overview.md#cookie-based-affinity) for more information.
116
+
108
117
## Performance
109
118
110
119
### How does Application Gateway support high availability and scalability?
@@ -203,6 +212,30 @@ Yes. For details see, [Migrate Azure Application Gateway and Web Application Fir
203
212
204
213
Application Gateway v2 does not currently support IPv6. It can operate in a dual stack VNet using only IPv4, but the gateway subnet must be IPv4-only. Application Gateway v1 does not support dual stack VNets.
205
214
215
+
### How do I use Application Gateway V2 with only private frontend IP address?
216
+
217
+
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
218
+
* Private IP and Public IP
219
+
* Public IP only
220
+
221
+
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
222
+
1. Create an Application Gateway with both public and private frontend IP address
223
+
2. Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
224
+
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
225
+
226
+
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
227
+
228
+
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
229
+
230
+
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
231
+
232
+
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
233
+
234
+
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
235
+
236
+
Sample NSG configuration for private IP only access:
237
+

238
+
206
239
## Configuration - SSL
207
240
208
241
### What certificates does Application Gateway support?
@@ -383,34 +416,6 @@ Yes. If your configuration matches following scenario, you won't see allowed tra
383
416
- You have an NSG on the application gateway subnet
384
417
- You've enabled NSG flow logs on that NSG
385
418
386
-
### How do I use Application Gateway V2 with only private frontend IP address?
387
-
388
-
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
389
-
* Private IP and Public IP
390
-
* Public IP only
391
-
392
-
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
393
-
1. Create an Application Gateway with both public and private frontend IP address
394
-
2. Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
395
-
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
396
-
397
-
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
398
-
399
-
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
400
-
401
-
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
402
-
403
-
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
404
-
405
-
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
406
-
407
-
Sample NSG configuration for private IP only access:
408
-

409
-
410
-
### Does Application Gateway affinity cookie support SameSite attribute?
411
-
Yes, the [Chromium browser](https://www.chromium.org/Home)[v80 update](https://chromiumdash.appspot.com/schedule) introduced a mandate on HTTP cookies without SameSite attribute to be treated as SameSite=Lax. This means that the Application Gateway affinity cookie won't be sent by the browser in a third-party context.
412
-
To support this scenario, Application Gateway injects another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. These cookies are similar, but the *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it: *SameSite=None; Secure*. These attributes maintain sticky sessions even for cross-origin requests. See the [cookie based affinity section](configuration-overview.md#cookie-based-affinity) for more information.
413
-
414
419
## Next steps
415
420
416
421
To learn more about Application Gateway, see [What is Azure Application Gateway?](overview.md).
0 commit comments