Skip to content

Commit 43b92fe

Browse files
authored
Added NTLM FAQ and rearranged two FAQs
Added NTLM FAQ and rearranged two FAQs
1 parent 99bedd8 commit 43b92fe

File tree

1 file changed

+33
-28
lines changed

1 file changed

+33
-28
lines changed

articles/application-gateway/application-gateway-faq.md

Lines changed: 33 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -105,6 +105,15 @@ Most deployments that use the v2 SKU take around 6 minutes to provision. However
105105

106106
No. Application Gateway doesn't support email protocols such as SMTP, IMAP, and POP3.
107107

108+
### Does Application Gateway support proxying requests with NTLM authentication?
109+
110+
No. Application Gateway doesn't support proxying requests with NTLM authentication yet.
111+
112+
### Does Application Gateway affinity cookie support SameSite attribute?
113+
Yes, the [Chromium browser](https://www.chromium.org/Home) [v80 update](https://chromiumdash.appspot.com/schedule) introduced a mandate on HTTP cookies without SameSite attribute to be treated as SameSite=Lax. This means that the Application Gateway affinity cookie won't be sent by the browser in a third-party context.
114+
115+
To support this scenario, Application Gateway injects another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. These cookies are similar, but the *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it: *SameSite=None; Secure*. These attributes maintain sticky sessions even for cross-origin requests. See the [cookie based affinity section](configuration-overview.md#cookie-based-affinity) for more information.
116+
108117
## Performance
109118

110119
### How does Application Gateway support high availability and scalability?
@@ -203,6 +212,30 @@ Yes. For details see, [Migrate Azure Application Gateway and Web Application Fir
203212

204213
Application Gateway v2 does not currently support IPv6. It can operate in a dual stack VNet using only IPv4, but the gateway subnet must be IPv4-only. Application Gateway v1 does not support dual stack VNets.
205214

215+
### How do I use Application Gateway V2 with only private frontend IP address?
216+
217+
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
218+
* Private IP and Public IP
219+
* Public IP only
220+
221+
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
222+
1. Create an Application Gateway with both public and private frontend IP address
223+
2. Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
224+
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
225+
226+
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
227+
228+
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
229+
230+
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
231+
232+
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
233+
234+
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
235+
236+
Sample NSG configuration for private IP only access:
237+
![Application Gateway V2 NSG Configuration for private IP access only](./media/application-gateway-faq/appgw-privip-nsg.png)
238+
206239
## Configuration - SSL
207240

208241
### What certificates does Application Gateway support?
@@ -383,34 +416,6 @@ Yes. If your configuration matches following scenario, you won't see allowed tra
383416
- You have an NSG on the application gateway subnet
384417
- You've enabled NSG flow logs on that NSG
385418

386-
### How do I use Application Gateway V2 with only private frontend IP address?
387-
388-
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
389-
* Private IP and Public IP
390-
* Public IP only
391-
392-
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
393-
1. Create an Application Gateway with both public and private frontend IP address
394-
2. Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
395-
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
396-
397-
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
398-
399-
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
400-
401-
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
402-
403-
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
404-
405-
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
406-
407-
Sample NSG configuration for private IP only access:
408-
![Application Gateway V2 NSG Configuration for private IP access only](./media/application-gateway-faq/appgw-privip-nsg.png)
409-
410-
### Does Application Gateway affinity cookie support SameSite attribute?
411-
Yes, the [Chromium browser](https://www.chromium.org/Home) [v80 update](https://chromiumdash.appspot.com/schedule) introduced a mandate on HTTP cookies without SameSite attribute to be treated as SameSite=Lax. This means that the Application Gateway affinity cookie won't be sent by the browser in a third-party context.
412-
To support this scenario, Application Gateway injects another cookie called *ApplicationGatewayAffinityCORS* in addition to the existing *ApplicationGatewayAffinity* cookie. These cookies are similar, but the *ApplicationGatewayAffinityCORS* cookie has two more attributes added to it: *SameSite=None; Secure*. These attributes maintain sticky sessions even for cross-origin requests. See the [cookie based affinity section](configuration-overview.md#cookie-based-affinity) for more information.
413-
414419
## Next steps
415420

416421
To learn more about Application Gateway, see [What is Azure Application Gateway?](overview.md).

0 commit comments

Comments
 (0)