Skip to content

Commit 4a21de1

Browse files
authored
Update application-gateway-tls-version-retirement.md
1 parent 7a3fabb commit 4a21de1

File tree

1 file changed

+31
-25
lines changed

1 file changed

+31
-25
lines changed

articles/application-gateway/application-gateway-tls-version-retirement.md

Lines changed: 31 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -21,45 +21,51 @@ With deprecation of TLS versions 1.0 and 1.1, the **older Predefined TLS policie
2121

2222
The predefined policies 20150501 and 20170401 that support TLS v1.0 and 1.1 will be discontinued and can no longer be associated with an Application Gateway resource after August 2025. It is advised to transition to one of the recommended TLS policies, 20220101 or 20220101S. Alternatively, the 20170401S policy may be used if specific cipher suites are required.
2323

24-
![A diagram showing predefined policies that will be removed.](media/application-gateway-tls-version-retire/retiring-tls-policies.png)
24+
![A diagram showing predefined policies for V2 SKUs.](media/application-gateway-tls-version-retire/v2-retiring-tls-policies.png)
2525

2626
### Custom policies for V2 SKUs
2727

2828
Azure Application Gateway V2 SKU offers two types of custom policies: Custom and CustomV2. The retirement of these TLS versions will affect only the “Custom” policy. The newer “CustomV2” policy comes with TLS v1.3. Beyond August 2025, the older Custom policy will support only TLS v1.2 and the following cipher suites will NOT be supported.
2929

30-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
31-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
32-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
33-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
34-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
35-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
36-
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
37-
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
38-
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
39-
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
40-
TLS_RSA_WITH_3DES_EDE_CBC_SHA
41-
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
30+
| Unsupported cipher suites |
31+
| ---------- |
32+
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
33+
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
34+
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
35+
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
36+
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA |
37+
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA |
38+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
39+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
40+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA |
41+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA |
42+
| TLS_RSA_WITH_3DES_EDE_CBC_SHA |
43+
| TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA |
4244

4345
### Predefined policies for V1 SKUs
4446

4547
The V1 SKU will only support the 20170401S policy after the older policies with TLS versions 1.0 and 1.1 are discontinued. The newer 20220101 or 20220101S policies will not be available for the soon-to-be-retired V1 SKU.
4648

49+
![A diagram showing predefined policies for V1 SKUs.](media/application-gateway-tls-version-retire/v1-retiring-tls-policies.png)
50+
4751
### Custom policies for V1 SKUs
4852

4953
Application Gateway V1 SKU only supports the older “Custom” policy. Beyond August 2025, this older Custom policy will support only TLS v1.2 and the following cipher suites will NOT be supported.
5054

51-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
52-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
53-
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
54-
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
55-
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
56-
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
57-
TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
58-
TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
59-
TLS_DHE_DSS_WITH_AES_256_CBC_SHA
60-
TLS_DHE_DSS_WITH_AES_128_CBC_SHA
61-
TLS_RSA_WITH_3DES_EDE_CBC_SHA
62-
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
55+
| Unsupported cipher suites |
56+
| ---------- |
57+
| TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 |
58+
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 |
59+
| TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 |
60+
| TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 |
61+
| TLS_DHE_RSA_WITH_AES_256_CBC_SHA |
62+
| TLS_DHE_RSA_WITH_AES_128_CBC_SHA |
63+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 |
64+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 |
65+
| TLS_DHE_DSS_WITH_AES_256_CBC_SHA |
66+
| TLS_DHE_DSS_WITH_AES_128_CBC_SHA |
67+
| TLS_RSA_WITH_3DES_EDE_CBC_SHA |
68+
| TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA |
6369

6470
## Backend TLS connections
6571

0 commit comments

Comments
 (0)