You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-private-deployment.md
+12-12Lines changed: 12 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ ms.author: greglin
15
15
16
16
## Introduction
17
17
18
-
Historically, Application Gateway v2 SKUs, and to a certain extent v1, have required public IP addressing to enable management of the service. This requirement has imposed several limitations in using fine-grain controls in Network Security Groups and Route Tables. Specifically, the following challenges have been observed:
18
+
Historically, Application Gateway v2 SKUs, and to a certain extent v1, have required public IP addressing to enable management of the service. This requirement has imposed several limitations in using fine-grain controls in Network Security Groups and Route Tables. Specifically, the following challenges have been observed:
19
19
20
20
* All Application Gateways v2 deployments must contain public facing frontend IP configuration to enable communication to the **Gateway Manager** service tag.
21
21
* Network Security Group associations require rules to allow inbound access from GatewayManager and Outbound access to Internet.
@@ -38,7 +38,7 @@ The Private Application Gateway is available to all public cloud regions [where
38
38
39
39
## Configuration of network controls
40
40
41
-
Configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal. No API or command changes are introduced with this feature.
41
+
Configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal. No API or command changes are introduced with this feature.
42
42
43
43
## Resource Changes
44
44
@@ -57,7 +57,7 @@ Application Gateway Subnet is the subnet within the Virtual Network where the Ap
57
57
58
58
## Outbound Internet connectivity
59
59
60
-
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) aren't able to egress traffic destined to the Internet. This configuration affects communication to backend targets that are publicly accessible via the Internet.
60
+
Application Gateway deployments that contain only a private frontend IP configuration (don't have a public IP frontend configuration) aren't able to egress traffic destined to the Internet. This configuration affects communication to backend targets that are publicly accessible via the Internet.
61
61
62
62
To enable outbound connectivity from your Application Gateway to an Internet facing backend target, you can utilize [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) or forward traffic to a virtual appliance that has access to the Internet.
63
63
@@ -73,14 +73,14 @@ Common scenarios where public IP usage is required:
73
73
74
74
## Network Security Group Control
75
75
76
-
Network security groups associated to an Application Gateway subnet no longer require inbound rules for GatewayManager, and they don't require outbound access to the Internet. The only required rule is **Allow inbound from AzureLoadBalancer** to ensure health probes can reach the gateway.
76
+
Network security groups associated to an Application Gateway subnet no longer require inbound rules for GatewayManager, and they don't require outbound access to the Internet. The only required rule is **Allow inbound from AzureLoadBalancer** to ensure health probes can reach the gateway.
77
77
78
-
The following configuration is an example of the most restrictive set of inbound rules, denying all traffic but Azure health probes. In addition to the defined rules, explicit rules are defined to allow client traffic to reach the listener of the gateway.
78
+
The following configuration is an example of the most restrictive set of inbound rules, denying all traffic but Azure health probes. In addition to the defined rules, explicit rules are defined to allow client traffic to reach the listener of the gateway.
79
79
80
80
[](./media/application-gateway-private-deployment/inbound-rules.png#lightbox)
81
81
82
82
> [!Note]
83
-
> Application Gateway will display an alert asking to ensure the **Allow LoadBalanceRule** is specified if a **DenyAll** rule inadvertently restricts access to health probes.
83
+
> Application Gateway will display an alert asking to ensure the `Allow LoadBalanceRule` is specified if a `DenyAll` rule inadvertently restricts access to health probes.
84
84
85
85
### Example scenario
86
86
@@ -146,7 +146,7 @@ These rules are assigned a priority of 400, 401, and 4096, respectively.
146
146
To create these rules:
147
147
- Select **Outbound security rules**
148
148
- Select **Add**
149
-
- Enter the following information for each rule into the **Add outbound security rule** pane.
149
+
- Enter the following information for each rule into the `Add outbound` security rule** pane.
150
150
- When you've entered the information, select **Add** to create the rule.
151
151
- Creation of each rule takes a moment.
152
152
@@ -177,13 +177,13 @@ Result:
177
177
178
178
The ability to forward traffic to a virtual appliance is now possible via definition of a route table rule that defines 0.0.0.0/0 with a next hop to Virtual Appliance.
179
179
180
-
Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising does not affect Application Gateway health, and is honored for traffic flow. This scenario can be applicable when using VPN, ExpressRoute, Route Server, or Virtual WAN.
180
+
Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising doesn't affect Application Gateway health, and is honored for traffic flow. This scenario can be applicable when using VPN, ExpressRoute, Route Server, or Virtual WAN.
181
181
182
182
### Example scenario
183
183
184
-
In the following example, we create a route table and associate it to the Application Gateway subnet to ensure outbound Internet access from the subnet will egress from a virtual appliance. At a high level, the following design is summarized in Figure 1:
184
+
In the following example, we create a route table and associate it to the Application Gateway subnet to ensure outbound Internet access from the subnet will egress from a virtual appliance. At a high level, the following design is summarized in Figure 1:
185
185
- The Application Gateway is in spoke virtual network
186
-
- There is a network virtual appliance (a virtual machine) in the hub network
186
+
- There's a network virtual appliance (a virtual machine) in the hub network
187
187
- A route table with a default route (0.0.0.0/0) to the virtual appliance is associated to Application Gateway subnet
188
188
189
189

@@ -239,8 +239,8 @@ If a subnet shares Application Gateway v2 deployments that were created both pri
239
239
240
240
### Unknown Backend Health status
241
241
242
-
If backend health is _Unknown_, you may see the following error:
243
-
+ The backend health status could not be retrieved. This happens when an NSG/UDR/Firewall on the application gateway subnet is blocking traffic on ports 65503-65534 if there is v1 SKU, and ports 65200-65535 if there is v2 SKU or if the FQDN configured in the backend pool could not be resolved to an IP address. To learn more visit - https://aka.ms/UnknownBackendHealth.
242
+
If backend health is _Unknown_, you might see the following error:
243
+
+ The backend health status could not be retrieved. This happens when an NSG/UDR/Firewall on the application gateway subnet is blocking traffic on ports 65503-65534 (v1 SKU) and ports 65200-65535 (v2 SKU). This error can also occur if the FQDN configured in the backend pool could not be resolved to an IP address. To learn more visit - https://aka.ms/UnknownBackendHealth.
244
244
245
245
This error can be ignored and will be clarified in a future release.
0 commit comments