You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/app-service/environment/integrate-with-application-gateway.md
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,9 +12,9 @@ ms.author: madsd
12
12
13
13
The [App Service Environment](./overview.md) is a deployment of Azure App Service in the subnet of a customer's Azure virtual network. It can be deployed with an external or internal endpoint for app access. The deployment of the App Service Environment with an internal endpoint is called an internal load balancer (ILB) App Service Environment.
14
14
15
-
Web application firewalls help secure your web applications by inspecting inbound web traffic to block SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks. You can get a WAF device from the Azure Marketplace or you can use the [Azure Application Gateway](../../application-gateway/overview.md).
15
+
Web application firewalls help secure your web applications by inspecting inbound web traffic to block SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks. You can get a WAF device from Azure Marketplace or you can use the [Azure Application Gateway](../../application-gateway/overview.md).
16
16
17
-
The Azure Application Gateway is a virtual appliance that provides layer 7 load balancing, TLS/SSL offloading, and web application firewall (WAF) protection. It can listen on a public IP address and route traffic to your application endpoint. The following information describes how to integrate a WAF-configured application gateway with an app in an ILB App Service Environment.
17
+
The Azure Application Gateway is a virtual appliance that provides layer 7 load balancing, TLS offloading, and web application firewall (WAF) protection. It can listen on a public IP address and route traffic to your application endpoint. The following information describes how to integrate a WAF-configured application gateway with an app in an ILB App Service Environment.
18
18
19
19
The integration of the application gateway with the ILB App Service Environment is at an app level. When you configure the application gateway with your ILB App Service Environment, you're doing it for specific apps in your ILB App Service Environment.
20
20
@@ -33,8 +33,8 @@ To integrate your application gateway with your ILB App Service Environment, you
33
33
* An ILB App Service Environment.
34
34
* A private DNS zone for ILB App Service Environment.
35
35
* An app running in the ILB App Service Environment.
36
-
* A public DNS name that's used later to point to your application gateway.
37
-
* If you need to use TLS/SSL encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
36
+
* A public DNS name for your application gateway.
37
+
* If you need to use TLS encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
38
38
39
39
### ILB App Service environment
40
40
@@ -70,20 +70,20 @@ With a public domain mapped to the application gateway, you don't need to config
70
70
71
71
### A valid public certificate
72
72
73
-
For security enhancement, it's recommended to bind TLS/SSL certificate for session encryption. To bind TLS/SSL certificate to the application gateway, a valid public certificate with following information is required. With [App Service certificates](../configure-ssl-app-service-certificate.md), you can buy a TLS/SSL certificate and export it in .pfx format.
73
+
For security enhancement, bind a TLS certificate for session encryption. To bind TLS certificate to the application gateway, a valid public certificate with following information is required. With [App Service certificates](../configure-ssl-app-service-certificate.md), you can buy a TLS certificate and export it in `.pfx` format.
74
74
75
75
| Name | Value | Description|
76
76
| ----- | ------------------- |------------|
77
77
|**Common Name**|`<yourappname>.<yourdomainname>`, for example: `app.asabuludemo.com` <br/> or `*.<yourdomainname>`, for example: `*.asabuludemo.com`| A standard certificate or a [wildcard certificate](https://wikipedia.org/wiki/Wildcard_certificate) for the application gateway|
78
78
|**Subject Alternative Name**|`<yourappname>.scm.<yourdomainname>`, for example: `app.scm.asabuludemo.com` <br/>or `*.scm.<yourdomainname>`, for example: `*.scm.asabuludemo.com`|The SAN that allowing to connect to App Service kudu service. It's an optional setting, if you don't want to publish the App Service kudu service to the internet.|
79
79
80
-
The certificate file should have a private key and save in .pfx format, it will be imported to the application gateway later.
80
+
The certificate file should have a private key and save in `.pfx` format. The certificate is imported to the application gateway later.
81
81
82
82
## Create an application gateway
83
83
84
84
For the basic application gateway creation, refer to [Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal](../../web-application-firewall/ag/application-gateway-web-application-firewall-portal.md).
85
85
86
-
In this tutorial, we'll use Azure portal to create an application gateway with ILB App Service environment.
86
+
In this tutorial, we use Azure portal to create an application gateway with ILB App Service environment.
87
87
88
88
In the Azure portal, select **New** > **Network** > **Application Gateway** to create an application gateway.
89
89
@@ -120,25 +120,25 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
120
120
| Rule name | For example: `http-routingrule`| Routing name |
121
121
| Listener name | For example: `http-listener`| Listener name |
122
122
| Frontend IP | Public | For internet access, set to Public |
123
-
| Protocol | HTTP | Don't use TLS/SSL encryption |
123
+
| Protocol | HTTP | Don't use TLS encryption |
124
124
| Port | 80 | Default HTTP Port |
125
-
| Listener type |Multi site| Allow to listen multi-sites on the application gateway |
125
+
| Listener type |Multisite| Allow to listen multi-sites on the application gateway |
126
126
| Host type | Multiple/Wildcard | Set to multiple or wildcard website name if listener type is set to multi-sites. |
127
127
| Host name | For example: `app.asabuludemo.com`| Set to a routable domain name for App Service |
128
128
129
129
:::image type="content" source="./media/integrate-with-application-gateway/http-routing-rule.png" alt-text="Screenshot of HTTP Listener of the application gateway Routing Rule.":::
130
130
131
-
* To connect to the application gateway with TLS/SSL encryption, you can create a listener with following settings,
131
+
* To connect to the application gateway with TLS encryption, you can create a listener with following settings,
| Rule name | For example: `https-routingrule`| Routing name |
136
136
| Listener name | For example: `https-listener`| Listener name |
137
137
| Frontend IP | Public | For internet access, set to Public |
138
-
| Protocol | HTTPS | Use TLS/SSL encryption |
138
+
| Protocol | HTTPS | Use TLS encryption |
139
139
| Port | 443 | Default HTTPS Port |
140
140
| Https Settings | Upload a certificate | Upload a certificate contains the CN and the private key with .pfx format. |
141
-
| Listener type |Multi site| Allow to listen multi-sites on the application gateway |
141
+
| Listener type |Multisite| Allow to listen multi-sites on the application gateway |
142
142
| Host type | Multiple/Wildcard | Set to multiple or wildcard website name if listener type is set to multi-sites. |
143
143
| Host name | For example: `app.asabuludemo.com`| Set to a routable domain name for App Service |
144
144
@@ -148,15 +148,15 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
148
148
149
149
:::image type="content" source="./media/integrate-with-application-gateway/add-new-http-setting.png" alt-text="Screenshot of adding new link to add an H T T P setting.":::
| HTTP setting name | For example: `https-setting`| HTTP setting name |
156
-
| Backend protocol | HTTPS | Use TLS/SSL encryption |
156
+
| Backend protocol | HTTPS | Use TLS encryption |
157
157
| Backend port | 443 | Default HTTPS Port |
158
-
| Use well known CA certificate | Yes | The default domain name of ILB App Service Environment is `.appserviceenvironment.net`, the certificate of this domain is issued by a public trusted root authority. In the Trusted root certificate setting, you can set to use **well known CA trusted root certificate**. |
159
-
| Override with new host name | Yes | The host name header will be overwrote on connecting to the app on ILB App Service Environment |
158
+
| Use well known CA certificate | Yes | The default domain name of ILB App Service Environment is `.appserviceenvironment.net`. The certificate of this domain is issued by a public trusted root authority. In the Trusted root certificate setting, you can set to use **well known CA trusted root certificate**. |
159
+
| Override with new host name | Yes | The host name header is overwritten on connecting to the app on ILB App Service Environment |
160
160
| Host name override | Pick host name from backend target | When setting backend pool to App Service, you can pick host from backend target |
161
161
| Create custom probes | No | Use default health probe|
162
162
@@ -165,7 +165,7 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
165
165
166
166
## Configure an application gateway integration with ILB App Service Environment
167
167
168
-
To access ILB App Service Environment from the application gateway, you need to check if a virtual network link to private DNS zone. If there's no virtual network linked to your application gateway's VNet, add a virtual network link with following steps.
168
+
To access ILB App Service Environment from the application gateway, you need to check if a virtual network link to private DNS zone. If there's no virtual network linked to your application gateway's virtual network, add a virtual network link with following steps.
169
169
170
170
### Configure virtual network links with a private DNS zone
Copy file name to clipboardExpand all lines: articles/app-service/overview-app-gateway-integration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,7 +64,7 @@ To isolate traffic to an individual web app, you need to use IP-based access res
64
64
65
65
## Considerations for an external App Service Environment
66
66
67
-
An external App Service Environment has a public-facing load balancer like multi-tenant App Service apps. Service endpoints don't work for an App Service Environment. With App Service Environment you can use IP-based access restrictions by using the public IP address of the application gateway. To create an external App Service Environment by using the Azure portal, you can follow [this quickstart](./environment/creation.md).
67
+
An external App Service Environment has a public-facing load balancer like multitenant App Service apps. Service endpoints don't work for an App Service Environment. With App Service Environment you can use IP-based access restrictions by using the public IP address of the application gateway. To create an external App Service Environment by using the Azure portal, you can follow [this quickstart](./environment/creation.md).
> Private endpoint is available for Windows and Linux apps, containerized or not, hosted on these App Service plans: **Basic**, **Standard**, **PremiumV2**, **PremiumV3**, **IsolatedV2**, **Functions Premium** (sometimes referred to as the Elastic Premium plan).
17
+
> Private endpoint is available for Windows and Linux apps, containerized or not, hosted on these App Service plans: **Basic**, **Standard**, **PremiumV2**, **PremiumV3**, **IsolatedV2**, **Functions Premium** (sometimes referred to as the Elastic Premium plan).
18
18
19
19
You can use private endpoint for your App Service apps to allow clients located in your private network to securely access the app over Azure Private Link. The private endpoint uses an IP address from your Azure virtual network address space. Network traffic between a client on your private network and the app traverses over the virtual network and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet.
20
20
@@ -36,7 +36,7 @@ The subnet where you plug the private endpoint can have other resources in it, y
36
36
You can also deploy the private endpoint in a different region than your app.
37
37
38
38
> [!NOTE]
39
-
> The virtual network integration feature cannot use the same subnet as private endpoint, this is a limitation of the virtual network integration feature.
39
+
> The virtual network integration feature can't use the same subnet as private endpoint.
40
40
41
41
From a security perspective:
42
42
@@ -90,7 +90,7 @@ After this DNS configuration, you can reach your app privately with the default
90
90
If you need to use a custom DNS name, you must add the custom name in your app and you must validate the custom name like any custom name, using public DNS resolution.
91
91
For more information, see [custom DNS validation](./app-service-web-tutorial-custom-domain.md).
92
92
93
-
For the Kudu console, or Kudu REST API (deployment with Azure DevOps Services self-hosted agents for example) you must create two records pointing to the private endpoint IP in your Azure DNS private zone or your custom DNS server. The first is for your app, the second is for the SCM of your app.
93
+
For the Kudu console, or Kudu REST API (deployment with Azure DevOps Services self-hosted agents for example) you must create two records pointing to the private endpoint IP in your Azure DNS private zone or your custom DNS server. The first is for your app and the second is for the SCM of your app.
94
94
95
95
| Name | Type | Value |
96
96
|-----|-----|-----|
@@ -122,7 +122,7 @@ For pricing details, see [Azure Private Link pricing](https://azure.microsoft.co
122
122
* You can connect up to 100 private endpoints to a particular app.
123
123
* Remote Debugging functionality isn't available through the private endpoint. The recommendation is to deploy the code to a slot and remote debug it there.
124
124
* FTP access is provided through the inbound public IP address. Private endpoint doesn't support FTP access to the app.
125
-
* IP-Based SSL isn't supported with private endpoints.
125
+
* IP-Based TLS isn't supported with private endpoints.
126
126
* Apps that you configure with private endpoints can't receive public traffic coming from subnets with `Microsoft.Web` service endpoint enabled and can't use [service endpoint-based access restriction rules](./overview-access-restrictions.md#access-restriction-rules-based-on-service-endpoints).
127
127
* Private endpoint naming must follow the rules defined for resources of type `Microsoft.Network/privateEndpoints`. Naming rules can be found [here](../azure-resource-manager/management/resource-name-rules.md#microsoftnetwork).
0 commit comments