|
1 | 1 | ---
|
2 |
| -title: Private Application Gateway deployment (preview) |
| 2 | +title: Private Application Gateway deployment |
3 | 3 | titleSuffix: Azure Application Gateway
|
4 | 4 | description: Learn how to restrict access to Application Gateway
|
5 | 5 | services: application-gateway
|
6 | 6 | author: greg-lindsay
|
7 | 7 | ms.service: application-gateway
|
8 | 8 | ms.topic: how-to
|
9 |
| -ms.date: 05/22/2023 |
| 9 | +ms.date: 07/18/2024 |
10 | 10 | ms.author: greglin
|
11 | 11 | #Customer intent: As an administrator, I want to evaluate Azure Private Application Gateway
|
12 | 12 | ---
|
13 | 13 |
|
14 |
| -# Private Application Gateway deployment (preview) |
| 14 | +# Private Application Gateway deployment |
15 | 15 |
|
16 | 16 | ## Introduction
|
17 | 17 |
|
18 | 18 | Historically, Application Gateway v2 SKUs, and to a certain extent v1, have required public IP addressing to enable management of the service. This requirement has imposed several limitations in using fine-grain controls in Network Security Groups and Route Tables. Specifically, the following challenges have been observed:
|
19 | 19 |
|
20 |
| -1. All Application Gateways v2 deployments must contain public facing frontend IP configuration to enable communication to the **Gateway Manager** service tag. |
21 |
| -2. Network Security Group associations require rules to allow inbound access from GatewayManager and Outbound access to Internet. |
22 |
| -3. When introducing a default route (0.0.0.0/0) to forward traffic anywhere other than the Internet, metrics, monitoring, and updates of the gateway result in a failed status. |
| 20 | +* All Application Gateways v2 deployments must contain public facing frontend IP configuration to enable communication to the **Gateway Manager** service tag. |
| 21 | +* Network Security Group associations require rules to allow inbound access from GatewayManager and Outbound access to Internet. |
| 22 | +* When introducing a default route (0.0.0.0/0) to forward traffic anywhere other than the Internet, metrics, monitoring, and updates of the gateway result in a failed status. |
23 | 23 |
|
24 | 24 | Application Gateway v2 can now address each of these items to further eliminate risk of data exfiltration and control privacy of communication from within the virtual network. These changes include the following capabilities:
|
25 | 25 |
|
26 |
| -1. Private IP address only frontend IP configuration |
| 26 | +* Private IP address only frontend IP configuration |
27 | 27 | - No public IP address resource required
|
28 |
| -2. Elimination of inbound traffic from GatewayManager service tag via Network Security Group |
29 |
| -3. Ability to define a **Deny All** outbound Network Security Group (NSG) rule to restrict egress traffic to the Internet |
30 |
| -4. Ability to override the default route to the Internet (0.0.0.0/0) |
31 |
| -5. DNS resolution via defined resolvers on the virtual network [Learn more](../virtual-network/manage-virtual-network.yml#change-dns-servers), including private link private DNS zones. |
| 28 | +* Elimination of inbound traffic from GatewayManager service tag via Network Security Group |
| 29 | +* Ability to define a **Deny All** outbound Network Security Group (NSG) rule to restrict egress traffic to the Internet |
| 30 | +* Ability to override the default route to the Internet (0.0.0.0/0) |
| 31 | +* DNS resolution via defined resolvers on the virtual network [Learn more](../virtual-network/manage-virtual-network.yml#change-dns-servers), including private link private DNS zones. |
32 | 32 |
|
33 | 33 | Each of these features can be configured independently. For example, a public IP address can be used to allow traffic inbound from the Internet and you can define a **_Deny All_** outbound rule in the network security group configuration to prevent data exfiltration.
|
34 | 34 |
|
35 |
| -## Onboard to public preview |
36 |
| - |
37 |
| -The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are currently in public preview. To join the public preview, you can opt in to the experience using the Azure portal, PowerShell, CLI, or REST API. |
38 |
| - |
39 |
| -When you join the preview, all new Application Gateways provision with the ability to define any combination of the NSG, Route Table, or private IP configuration features. If you wish to opt out from the new functionality and return to the current generally available functionality of Application Gateway, you can do so by [unregistering from the preview](#unregister-from-the-preview). |
40 |
| - |
41 |
| -For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md) |
42 |
| - |
43 |
| -## Register to the preview |
44 |
| - |
45 |
| -# [Azure Portal](#tab/portal) |
46 |
| - |
47 |
| -Use the following steps to enroll into the public preview for the enhanced Application Gateway network controls via the Azure portal: |
48 |
| - |
49 |
| -1. Sign in to the [Azure portal](https://portal.azure.com/). |
50 |
| -2. In the search box, enter _subscriptions_ and select **Subscriptions**. |
51 |
| - |
52 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Azure portal search."::: |
53 |
| - |
54 |
| -3. Select the link for your subscription's name. |
55 |
| - |
56 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Select Azure subscription."::: |
57 |
| - |
58 |
| -4. From the left menu, under **Settings** select **Preview features**. |
59 |
| - |
60 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Azure preview features menu."::: |
61 |
| - |
62 |
| -5. You see a list of available preview features and your current registration status. |
63 |
| - |
64 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Azure portal list of preview features."::: |
65 |
| - |
66 |
| -6. From **Preview features** type into the filter box **EnableApplicationGatewayNetworkIsolation**, check the feature, and click **Register**. |
67 |
| - |
68 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Azure portal filter preview features."::: |
69 |
| - |
70 |
| -# [Azure PowerShell](#tab/powershell) |
71 |
| - |
72 |
| -To enroll into the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced: |
73 |
| - |
74 |
| -```azurepowershell |
75 |
| -Register-AzProviderFeature -FeatureName "EnableApplicationGatewayNetworkIsolation" -ProviderNamespace "Microsoft.Network" |
76 |
| -``` |
77 |
| - |
78 |
| -To view registration status of the feature, use the Get-AzProviderFeature cmdlet. |
79 |
| -```Output |
80 |
| -FeatureName ProviderName RegistrationState |
81 |
| ------------ ------------ ----------------- |
82 |
| -EnableApplicationGatewayNetworkIsolation Microsoft.Network Registered |
83 |
| -``` |
84 |
| - |
85 |
| -# [Azure CLI](#tab/cli) |
86 |
| - |
87 |
| -To enroll into the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced: |
88 |
| - |
89 |
| -```azurecli |
90 |
| -az feature register --name EnableApplicationGatewayNetworkIsolation --namespace Microsoft.Network |
91 |
| -``` |
92 |
| - |
93 |
| -To view registration status of the feature, use the Get-AzProviderFeature cmdlet. |
94 |
| -```Output |
95 |
| -Name RegistrationState |
96 |
| ----------------------------------------------------------- ------------------- |
97 |
| -Microsoft.Network/EnableApplicationGatewayNetworkIsolation Registered |
98 |
| -``` |
99 |
| - |
100 |
| -A list of all Azure CLI references for Private Link Configuration on Application Gateway can be found here: [Azure CLI CLI - Private Link](/cli/azure/network/application-gateway/private-link) |
101 |
| - |
102 |
| ---- |
103 |
| - |
104 |
| ->[!Note] |
105 |
| ->Feature registration may take up to 30 minutes to transition from Registering to Registered status. |
106 |
| -
|
107 |
| -For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md) |
108 |
| - |
109 |
| -## Unregister from the preview |
110 |
| - |
111 |
| -# [Azure Portal](#tab/portal) |
112 |
| - |
113 |
| -To opt out of the public preview for the enhanced Application Gateway network controls via Portal, use the following steps: |
114 |
| - |
115 |
| -1. Sign in to the [Azure portal](https://portal.azure.com/). |
116 |
| -2. In the search box, enter _subscriptions_ and select **Subscriptions**. |
117 |
| - |
118 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Azure portal search."::: |
119 |
| - |
120 |
| -3. Select the link for your subscription's name. |
121 |
| - |
122 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Select Azure subscription."::: |
123 |
| - |
124 |
| -4. From the left menu, under **Settings** select **Preview features**. |
125 |
| - |
126 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Azure preview features menu."::: |
127 |
| - |
128 |
| -5. You see a list of available preview features and your current registration status. |
129 |
| - |
130 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Azure portal list of preview features."::: |
131 |
| - |
132 |
| -6. From **Preview features** type into the filter box **EnableApplicationGatewayNetworkIsolation**, check the feature, and click **Unregister**. |
133 |
| - |
134 |
| - :::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Azure portal filter preview features."::: |
135 |
| - |
136 |
| -# [Azure PowerShell](#tab/powershell) |
137 |
| - |
138 |
| -To opt out of the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced: |
139 |
| - |
140 |
| -```azurepowershell |
141 |
| -Unregister-AzProviderFeature -FeatureName "EnableApplicationGatewayNetworkIsolation" -ProviderNamespace "Microsoft.Network" |
142 |
| -``` |
143 |
| - |
144 |
| -To view registration status of the feature, use the Get-AzProviderFeature cmdlet. |
145 |
| -```Output |
146 |
| -FeatureName ProviderName RegistrationState |
147 |
| ------------ ------------ ----------------- |
148 |
| -EnableApplicationGatewayNetworkIsolation Microsoft.Network Unregistered |
149 |
| -``` |
150 |
| - |
151 |
| -# [Azure CLI](#tab/cli) |
152 |
| - |
153 |
| -To opt out of the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced: |
154 |
| - |
155 |
| -```azurecli |
156 |
| -az feature unregister --name EnableApplicationGatewayNetworkIsolation --namespace Microsoft.Network |
157 |
| -``` |
158 |
| - |
159 |
| -To view registration status of the feature, use the Get-AzProviderFeature cmdlet. |
160 |
| -```Output |
161 |
| -Name RegistrationState |
162 |
| ----------------------------------------------------------- ------------------- |
163 |
| -Microsoft.Network/EnableApplicationGatewayNetworkIsolation Unregistered |
164 |
| -``` |
165 |
| - |
166 |
| -A list of all Azure CLI references for Private Link Configuration on Application Gateway can be found here: [Azure CLI CLI - Private Link](/cli/azure/network/application-gateway/private-link) |
167 |
| - |
168 |
| ---- |
169 |
| - |
170 | 35 | ## Regions and availability
|
171 | 36 |
|
172 |
| -The Private Application Gateway preview is available to all public cloud regions [where Application Gateway v2 sku is supported](./overview-v2.md#unsupported-regions). |
| 37 | +The Private Application Gateway is available to all public cloud regions [where Application Gateway v2 sku is supported](./overview-v2.md#unsupported-regions). |
173 | 38 |
|
174 | 39 | ## Configuration of network controls
|
175 | 40 |
|
176 |
| -After registration into the public preview, configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal. No API or command changes are introduced with this public preview. |
| 41 | +Configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal. No API or command changes are introduced with this feature. |
177 | 42 |
|
178 | 43 | ## Resource Changes
|
179 | 44 |
|
@@ -310,9 +175,7 @@ Result:
|
310 | 175 |
|
311 | 176 | ## Route Table Control
|
312 | 177 |
|
313 |
| -In the current offering of Application Gateway, association of a route table with a rule (or creation of rule) defined as 0.0.0.0/0 with a next hop as virtual appliance is unsupported to ensure proper management of Application Gateway. |
314 |
| - |
315 |
| -After registration of the public preview feature, the ability to forward traffic to a virtual appliance is now possible via definition of a route table rule that defines 0.0.0.0/0 with a next hop to Virtual Appliance. |
| 178 | +The ability to forward traffic to a virtual appliance is now possible via definition of a route table rule that defines 0.0.0.0/0 with a next hop to Virtual Appliance. |
316 | 179 |
|
317 | 180 | Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising does not affect Application Gateway health, and is honored for traffic flow. This scenario can be applicable when using VPN, ExpressRoute, Route Server, or Virtual WAN.
|
318 | 181 |
|
@@ -345,9 +208,9 @@ To create a route table and associate it to the Application Gateway subnet:
|
345 | 208 |
|
346 | 209 | ## Limitations / Known Issues
|
347 | 210 |
|
348 |
| -While in public preview, the following limitations are known. |
| 211 | +The following limitations are known. |
349 | 212 |
|
350 |
| -### Private link configuration (preview) |
| 213 | +### Private link configuration |
351 | 214 |
|
352 | 215 | [Private link configuration](private-link.md) support for tunneling traffic through private endpoints to Application Gateway is unsupported with private only gateway.
|
353 | 216 |
|
|
0 commit comments