Skip to content

Commit 7c990f7

Browse files
authored
Merge pull request #285833 from RussellR-MSFT/patch-3
ANPTA: Changing some public IPs to allowed ones and updating alt tags.
2 parents bc67982 + 060bd5c commit 7c990f7

File tree

5 files changed

+24
-24
lines changed

5 files changed

+24
-24
lines changed

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -49,23 +49,23 @@ Use the following steps to enroll into the public preview for the enhanced Appli
4949
1. Sign in to the [Azure portal](https://portal.azure.com/).
5050
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
5151

52-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Azure portal search.":::
52+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Screenshot of Azure portal search.":::
5353

5454
3. Select the link for your subscription's name.
5555

56-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Select Azure subscription.":::
56+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Screenshot of selecting the Azure subscription.":::
5757

5858
4. From the left menu, under **Settings** select **Preview features**.
5959

60-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Azure preview features menu.":::
60+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Screenshot of the Azure preview features menu.":::
6161

6262
5. You see a list of available preview features and your current registration status.
6363

64-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Azure portal list of preview features.":::
64+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Screenshot of the Azure portal list of preview features.":::
6565

6666
6. From **Preview features** type into the filter box **EnableApplicationGatewayNetworkIsolation**, check the feature, and click **Register**.
6767

68-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Azure portal filter preview features.":::
68+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Screenshot of the Azure portal filter preview features.":::
6969

7070
# [Azure PowerShell](#tab/powershell)
7171

@@ -115,23 +115,23 @@ To opt out of the public preview for the enhanced Application Gateway network co
115115
1. Sign in to the [Azure portal](https://portal.azure.com/).
116116
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
117117

118-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Azure portal search.":::
118+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/search.png" alt-text="Screenshot of Azure portal search.":::
119119

120120
3. Select the link for your subscription's name.
121121

122-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Select Azure subscription.":::
122+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/subscriptions.png" alt-text="Screenshot of selecting Azure subscription.":::
123123

124124
4. From the left menu, under **Settings** select **Preview features**.
125125

126-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Azure preview features menu.":::
126+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-menu.png" alt-text="Screenshot of the Azure preview features menu.":::
127127

128128
5. You see a list of available preview features and your current registration status.
129129

130-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Azure portal list of preview features.":::
130+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/preview-features-list.png" alt-text="Screenshot of the Azure portal list of preview features.":::
131131

132132
6. From **Preview features** type into the filter box **EnableApplicationGatewayNetworkIsolation**, check the feature, and click **Unregister**.
133133

134-
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Azure portal filter preview features.":::
134+
:::image type="content" source="../azure-resource-manager/management/media/preview-features/filter.png" alt-text="Screenshot of the Azure portal filter preview features.":::
135135

136136
# [Azure PowerShell](#tab/powershell)
137137

@@ -179,7 +179,7 @@ After registration into the public preview, configuration of NSG, Route Table, a
179179

180180
After your gateway is provisioned, a resource tag is automatically assigned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
181181

182-
![View the EnhancedNetworkControl tag](./media/application-gateway-private-deployment/tags.png)
182+
![Screenshot of the EnhancedNetworkControl tag.](./media/application-gateway-private-deployment/tags.png)
183183

184184
The resource tag is cosmetic, and serves to confirm that the gateway has been provisioned with the capabilities to configure any combination of the private only gateway features. Modification or deletion of the tag or value doesn't change any functional workings of the gateway.
185185

@@ -212,7 +212,7 @@ Network security groups associated to an Application Gateway subnet no longer re
212212

213213
The following configuration is an example of the most restrictive set of inbound rules, denying all traffic but Azure health probes. In addition to the defined rules, explicit rules are defined to allow client traffic to reach the listener of the gateway.
214214

215-
[ ![View the inbound security group rules](./media/application-gateway-private-deployment/inbound-rules.png) ](./media/application-gateway-private-deployment/inbound-rules.png#lightbox)
215+
[ ![Screenshot of the inbound security group rules.](./media/application-gateway-private-deployment/inbound-rules.png) ](./media/application-gateway-private-deployment/inbound-rules.png#lightbox)
216216

217217
> [!Note]
218218
> Application Gateway will display an alert asking to ensure the **Allow LoadBalanceRule** is specified if a **DenyAll** rule inadvertently restricts access to health probes.
@@ -233,7 +233,7 @@ First, [create a network security group](../virtual-network/tutorial-filter-netw
233233

234234
Three inbound [default rules](../virtual-network/network-security-groups-overview.md#default-security-rules) are already provisioned in the security group. See the following example:
235235

236-
[ ![View default security group rules](./media/application-gateway-private-deployment/default-rules.png) ](./media/application-gateway-private-deployment/default-rules.png#lightbox)
236+
[ ![Screenshot of the default security group rules.](./media/application-gateway-private-deployment/default-rules.png) ](./media/application-gateway-private-deployment/default-rules.png#lightbox)
237237

238238
Next, create the following four new inbound security rules:
239239

@@ -259,15 +259,15 @@ To create these rules:
259259

260260
Select **Refresh** to review all rules when provisioning is complete.
261261

262-
[ ![View example inbound security group rules](./media/application-gateway-private-deployment/inbound-example.png) ](./media/application-gateway-private-deployment/inbound-example.png#lightbox)
262+
[ ![Screenshot of example inbound security group rules.](./media/application-gateway-private-deployment/inbound-example.png) ](./media/application-gateway-private-deployment/inbound-example.png#lightbox)
263263

264264
#### Outbound rules
265265

266266
Three default outbound rules with priority 65000, 65001, and 65500 are already provisioned.
267267

268268
Create the following three new outbound security rules:
269269

270-
- Allow TCP 443 from 10.10.4.0/24 to backend target 20.62.8.49
270+
- Allow TCP 443 from 10.10.4.0/24 to backend target 203.0.113.1
271271
- Allow TCP 80 from source 10.10.4.0/24 to destination 10.13.0.4
272272
- DenyAll traffic rule
273273

@@ -276,7 +276,7 @@ These rules are assigned a priority of 400, 401, and 4096, respectively.
276276
> [!NOTE]
277277
> - 10.10.4.0/24 is the Application Gateway subnet address space.
278278
> - 10.13.0.4 is a virtual machine in a peered VNet.
279-
> - 20.63.8.49 is a backend target VM.
279+
> - 203.0.113.1 is a backend target VM.
280280
281281
To create these rules:
282282
- Select **Outbound security rules**
@@ -287,23 +287,23 @@ To create these rules:
287287

288288
| Rule # | Source | Source IP addresses/CIDR ranges | Source port ranges | Destination | Destination IP addresses/CIDR ranges | Service | Dest port ranges | Protocol | Action | Priority | Name |
289289
| ------ | ------------ | ------------------------------- | ------------------ | ------------ | ------------------------------------ | ------- | ---------------- | -------- | ------ | -------- | -------------------- |
290-
| 1 | IP Addresses | 10.10.4.0/24 | * | IP Addresses | 20.63.8.49 | HTTPS | 443 | TCP | Allow | 400 | AllowToBackendTarget |
290+
| 1 | IP Addresses | 10.10.4.0/24 | * | IP Addresses | 203.0.113.1 | HTTPS | 443 | TCP | Allow | 400 | AllowToBackendTarget |
291291
| 2 | IP Addresses | 10.10.4.0/24 | * | IP Addresses | 10.13.0.4 | HTTP | 80 | TCP | Allow | 401 | AllowToPeeredVnetVM |
292292
| 3 | Any | | * | Any | | Custom | * | Any | Deny | 4096 | DenyAll |
293293

294294
Select **Refresh** to review all rules when provisioning is complete.
295295

296-
[ ![View example outbound security group rules](./media/application-gateway-private-deployment/outbound-example.png) ](./media/application-gateway-private-deployment/outbound-example.png#lightbox)
296+
:::image type="content" source="./media/application-gateway-private-deployment/outbound-example.png" alt-text="Screenshot of outbound security rules for application gateway." lightbox="./media/application-gateway-private-deployment/outbound-example-expanded.png":::
297297

298298
#### Associate NSG to the subnet
299299

300300
The last step is to [associate the network security group to the subnet](../virtual-network/tutorial-filter-network-traffic.md#associate-network-security-group-to-subnet) that contains your Application Gateway.
301301

302-
![Associate NSG to subnet](./media/application-gateway-private-deployment/nsg-subnet.png)
302+
![Screenshot of associate NSG to subnet.](./media/application-gateway-private-deployment/nsg-subnet.png)
303303

304304
Result:
305305

306-
[ ![View the NSG overview](./media/application-gateway-private-deployment/nsg-overview.png) ](./media/application-gateway-private-deployment/nsg-overview.png#lightbox)
306+
:::image type="content" source="./media/application-gateway-private-deployment/nsg-overview.png" alt-text="Screenshot of the NSG overview." lightbox="./media/application-gateway-private-deployment/nsg-overview-expanded.png":::
307307

308308
> [!IMPORTANT]
309309
> Be careful when you define **DenyAll** rules, as you might inadvertently deny inbound traffic from clients to which you intend to allow access. You might also inadvertently deny outbound traffic to the backend target, causing backend health to fail and produce 5XX responses.
@@ -323,23 +323,23 @@ In the following example, we create a route table and associate it to the Applic
323323
- There is a network virtual appliance (a virtual machine) in the hub network
324324
- A route table with a default route (0.0.0.0/0) to the virtual appliance is associated to Application Gateway subnet
325325

326-
![Diagram for example route table](./media/application-gateway-private-deployment/route-table-diagram.png)
326+
![Diagram for example route table.](./media/application-gateway-private-deployment/route-table-diagram.png)
327327

328328
**Figure 1**: Internet access egress through virtual appliance
329329

330330
To create a route table and associate it to the Application Gateway subnet:
331331

332332
1. [Create a route table](../virtual-network/manage-route-table.yml#create-a-route-table):
333333

334-
![View the newly created route table](./media/application-gateway-private-deployment/route-table-create.png)
334+
![Screenshot of the newly created route table.](./media/application-gateway-private-deployment/route-table-create.png)
335335

336336
2. Select **Routes** and create the next hop rule for 0.0.0.0/0 and configure the destination to be the IP address of your VM:
337337

338-
[ ![View of adding default route to network virtual applicance](./media/application-gateway-private-deployment/default-route-nva.png) ](./media/application-gateway-private-deployment/default-route-nva.png#lightbox)
338+
[ ![Screenshot of adding default route to network virtual applicance.](./media/application-gateway-private-deployment/default-route-nva.png) ](./media/application-gateway-private-deployment/default-route-nva.png#lightbox)
339339

340340
3. Select **Subnets** and associate the route table to the Application Gateway subnet:
341341

342-
[ ![View of associating the route to the AppGW subnet](./media/application-gateway-private-deployment/associate-route-to-subnet.png) ](./media/application-gateway-private-deployment/associate-route-to-subnet.png#lightbox)
342+
[ ![Screenshot of associating the route to the AppGW subnet.](./media/application-gateway-private-deployment/associate-route-to-subnet.png) ](./media/application-gateway-private-deployment/associate-route-to-subnet.png#lightbox)
343343

344344
4. Validate that traffic is passing through the virtual appliance.
345345

111 KB
Loading
-175 KB
Loading
76.3 KB
Loading
-110 KB
Loading

0 commit comments

Comments
 (0)