Skip to content

Commit 80b25ca

Browse files
committed
Update application-gateway-private-deployment.md
1 parent e25cb80 commit 80b25ca

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.author: greglin
1515

1616
## Introduction
1717

18-
Historically, Application Gateway v2 SKUs, and to a certain extend v1, has required public IP addressing to enable management of the service. This has required several limitations in using fine-grain controls in Network Security Groups and Route Tables. Specifically, the following challenges have been observed:
18+
Historically, Application Gateway v2 SKUs, and to a certain extent v1, have required public IP addressing to enable management of the service. This requirement has imposed several limitations in using fine-grain controls in Network Security Groups and Route Tables. Specifically, the following challenges have been observed:
1919

2020
1. All Application Gateways v2 deployments must contain public facing frontend IP configuration to enable communication to the **Gateway Manager** service tag.
2121
2. Network Security Group associations require rules to allow inbound access from GatewayManager and Outbound access to Internet.
@@ -30,7 +30,7 @@ Application Gateway v2 can now address each of these items to further eliminate
3030
4. Ability to override the default route to the internet (0.0.0.0/0)
3131
5. DNS resolution via defined resolvers on the virtual network [Learn more](../virtual-network/manage-virtual-network.md#change-dns-servers), including private link private DNS zones.
3232

33-
Each of these features can be enabled independently. For example, a public IP address can be used to allow traffic inbound from the Internet and you can define a **_Deny All_** outbound rule in the network security group configuration to prevent data exfiltration. This is a valid configuration.
33+
Each of these features can be enabled independently. For example, a public IP address can be used to allow traffic inbound from the Internet and you can define a **_Deny All_** outbound rule in the network security group configuration to prevent data exfiltration. This configuration is valid.
3434

3535
## Onboard to public preview
3636

@@ -166,7 +166,7 @@ A list of all Azure CLI references for Private Link Configuration on Application
166166

167167
## Regions and availability
168168

169-
The following regions are available for public preview. Provisioning in regions outside of the list will result in error / failure:
169+
The following regions are available for public preview. Provisioning in regions outside of the list fail and display an error.
170170
- Australia East
171171
- Australia Southeast
172172
- Brazil South
@@ -196,11 +196,11 @@ The following regions are available for public preview. Provisioning in regions
196196

197197
## Configuration of network controls
198198

199-
After registration in to the public preview, configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods (REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal). No API or command changes are introduced with this public preview.
199+
After registration into the public preview, configuration of NSG, Route Table, and private IP address frontend configuration can be performed using any methods. For example: REST API, ARM Template, Bicep deployment, Terraform, PowerShell, CLI, or Portal. No API or command changes are introduced with this public preview.
200200

201201
## Resource Changes
202202

203-
Upon provisioning of your gateway, you will notice a resource tag is automatically provisioned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
203+
Upon provisioning of your gateway, a resource tag is automatically provisioned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
204204

205205
![View the EnhancedNetworkControl tag](./media/application-gateway-private-deployment/tags.png)
206206

@@ -211,7 +211,7 @@ The resource tag is cosmetic, and serves to confirm that the gateway has been pr
211211
212212
## Outbound internet connectivity
213213

214-
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) will not be able to egress traffic destined to the internet. This will affect communication to a backend targets that are publicly accessible via the internet.
214+
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) will not be able to egress traffic destined to the internet. This affects communication to a backend targets that are publicly accessible via the internet.
215215

216216
To enable outbound connectivity from your Application Gateway to an internet facing backend target, you may utilize [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) or forward traffic to a virtual appliance that has access to the internet.
217217

@@ -264,9 +264,9 @@ Next, create the following four new inbound security rules:
264264
To create these rules:
265265
- Select **Inbound security rules**
266266
- Select **Add**
267-
- Enter the information below for each rule into the **Add inbound security rule** pane.
267+
- Enter the following information for each rule into the **Add inbound security rule** pane.
268268
- When you have entered the information, select **Add** to create the rule.
269-
- Creation of each rule will take a moment.
269+
- Creation of each rule takes a moment.
270270

271271
| Rule # | Source | Source service tag | Source port ranges | Destination | Service | Dest port ranges | Protocol | Action | Priority | Name |
272272
| ------ | ----------- | ------------------ | ------------------ | ----------- | ------- | ---------------- | -------- | ------ | -------- | ---------------- |
@@ -300,9 +300,9 @@ These rules are assigned a priority of 400, 401, and 4096, respectively.
300300
To create these rules:
301301
- Select **Outbound security rules**
302302
- Select **Add**
303-
- Enter the information below for each rule into the **Add outbound security rule** pane.
303+
- Enter the following information for each rule into the **Add outbound security rule** pane.
304304
- When you have entered the information, select **Add** to create the rule.
305-
- Creation of each rule will take a moment.
305+
- Creation of each rule takes a moment.
306306

307307
Rule 1:
308308
- Source: IP Addresses
@@ -356,19 +356,19 @@ Result:
356356
[ ![View the NSG overview](./media/application-gateway-private-deployment/nsg-overview.png) ](./media/application-gateway-private-deployment/nsg-overview.png#lightbox)
357357

358358
> [!IMPORTANT]
359-
> Be careful when defining **DenyAll** rules as you may inadvertently deny inbound traffic from clients to which you intend to allow access. You might also inadvertently deny outbound traffic to the backend target, causing backend health to fail and produce 5XX responses.
359+
> Be careful when you define **DenyAll** rules, as you may inadvertently deny inbound traffic from clients to which you intend to allow access. You might also inadvertently deny outbound traffic to the backend target, causing backend health to fail and produce 5XX responses.
360360
361361
## Route Table Control
362362

363363
In the current offering of Application Gateway, association of a route table with a rule (or creation of rule) defined as 0.0.0.0/0 with a next hop as virtual appliance is unsupported to ensure proper management of Application Gateway.
364364

365-
After registration of the public preview feature, the ability to forward traffic to a virtual appliance is now possible via definition of a route table rule defining 0.0.0.0/0 with a next hop to Virtual Appliance.
365+
After registration of the public preview feature, the ability to forward traffic to a virtual appliance is now possible via definition of a route table rule that defines 0.0.0.0/0 with a next hop to Virtual Appliance.
366366

367367
Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising will not affect Application Gateway health, and will be honored for traffic flow. This scenario can be applicable when using VPN, ExpressRoute, Route Server, or Virtual WAN.
368368

369369
### Example scenario
370370

371-
In the following example, we will create a route table and associate it to the Application Gateway subnet to ensure outbound Internet access from the subnet will egress from a virtual appliance. At a high level, the following design is summarized in Figure 1 below:
371+
In the following example, we will create a route table and associate it to the Application Gateway subnet to ensure outbound Internet access from the subnet will egress from a virtual appliance. At a high level, the following design is summarized in Figure 1:
372372
- The Application Gateway is in spoke virtual network
373373
- There is a network virtual appliance (a virtual machine) in the hub network
374374
- A route table with a default route (0.0.0.0/0) to the virtual pppliance is associated to Application Gateway subnet
@@ -405,7 +405,7 @@ While in public preview, the following limitations are known.
405405

406406
If a subnet shares Application Gateway v2 deployments that were created prior and post enablement of the enhanced network control functionality, Network Security Group (NSG) and Route Table functionality will be limited to prior gateway deployment. Application gateways provisioned prior to enablement of the new functionality should either reprovision the existing gateways or provision newly created gateways to a new subnet to take advantage of the enahanced network security group and route table features.
407407

408-
If a gateway deployed prior to enablement of the new functionality exists in the subnet, you may see errors such as "For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'." when adding route table entries or "Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group <NSG-Name> blocks outgoing internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This is not permitted for Application Gateways that have fast update enabled or have V2 Sku." when adding network security group rules to the subnet.
408+
If a gateway deployed prior to enablement of the new functionality exists in the subnet, you may see errors such as "For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'." when adding route table entries or "Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group \<takes\> blocks outgoing internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This is not permitted for Application Gateways that have fast update enabled or have V2 Sku." when adding network security group rules to the subnet.
409409

410410
[Private link configuration](private-link.md) support for tunneling traffic through private endpoints to Application Gateway is unsupported with private only gateway.
411411

0 commit comments

Comments
 (0)