Skip to content

Commit 680dda1

Browse files
Merge pull request #268989 from greg-lindsay/appgw-upd
edit and add note
2 parents 9bd5d38 + 5f26da9 commit 680dda1

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/application-gateway/configuration-infrastructure.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application-gateway
55
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: conceptual
8-
ms.date: 07/05/2023
8+
ms.date: 03/13/2024
99
ms.author: greglin
1010
---
1111

@@ -104,7 +104,7 @@ Azure Virtual Network Manager is a management service that allows you to group,
104104
Security admin rule configuration in Azure Virtual Network Manager allows you to define security policies at scale and apply them to multiple virtual networks at once.
105105

106106
> [!NOTE]
107-
> Security admin rules of Azure Virtual Network Manager apply to Application Gateway subnets that only contain application gateways that have [Network Isolation](Application-gateway-private-deployment.md) enabled. Subnets that have any application gateway that doesn't have [Network Isolation](Application-gateway-private-deployment.md) enabled won't have security admin rules.
107+
> Security admin rules of Azure Virtual Network Manager only apply to Application Gateway subnets that contain application gateways with [Network Isolation](Application-gateway-private-deployment.md) enabled. Subnets with application gateways that have [Network Isolation](Application-gateway-private-deployment.md) disabled don't have security admin rules.
108108
109109
## Network security groups
110110

@@ -156,6 +156,9 @@ You can block all other incoming traffic by using a **Deny All** rule.
156156
|---|---|---|---|---|---|
157157
|Any|Any|Internet|Any|Any|Allow|
158158

159+
> [!NOTE]
160+
> Application Gateways that don't have [Network Isolation](application-gateway-private-deployment.md#route-table-control) enabled don't allow traffic to be sent between peered VNets when **Allow traffic to remote virtual network** is disabled.
161+
159162
## Supported user-defined routes
160163

161164
Fine-grain control over the Application Gateway subnet via route table rules is possible in public preview. For more information, see [Private Application Gateway deployment (preview)](application-gateway-private-deployment.md#route-table-control).

0 commit comments

Comments
 (0)