Skip to content

Commit 829aa0c

Browse files
committed
Acrolinx
1 parent 1cf1df6 commit 829aa0c

File tree

3 files changed

+22
-22
lines changed

3 files changed

+22
-22
lines changed

articles/app-service/environment/integrate-with-application-gateway.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -12,9 +12,9 @@ ms.author: madsd
1212

1313
The [App Service Environment](./overview.md) is a deployment of Azure App Service in the subnet of a customer's Azure virtual network. It can be deployed with an external or internal endpoint for app access. The deployment of the App Service Environment with an internal endpoint is called an internal load balancer (ILB) App Service Environment.
1414

15-
Web application firewalls help secure your web applications by inspecting inbound web traffic to block SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks. You can get a WAF device from the Azure Marketplace or you can use the [Azure Application Gateway](../../application-gateway/overview.md).
15+
Web application firewalls help secure your web applications by inspecting inbound web traffic to block SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks. You can get a WAF device from Azure Marketplace or you can use the [Azure Application Gateway](../../application-gateway/overview.md).
1616

17-
The Azure Application Gateway is a virtual appliance that provides layer 7 load balancing, TLS/SSL offloading, and web application firewall (WAF) protection. It can listen on a public IP address and route traffic to your application endpoint. The following information describes how to integrate a WAF-configured application gateway with an app in an ILB App Service Environment.
17+
The Azure Application Gateway is a virtual appliance that provides layer 7 load balancing, TLS offloading, and web application firewall (WAF) protection. It can listen on a public IP address and route traffic to your application endpoint. The following information describes how to integrate a WAF-configured application gateway with an app in an ILB App Service Environment.
1818

1919
The integration of the application gateway with the ILB App Service Environment is at an app level. When you configure the application gateway with your ILB App Service Environment, you're doing it for specific apps in your ILB App Service Environment.
2020

@@ -33,8 +33,8 @@ To integrate your application gateway with your ILB App Service Environment, you
3333
* An ILB App Service Environment.
3434
* A private DNS zone for ILB App Service Environment.
3535
* An app running in the ILB App Service Environment.
36-
* A public DNS name that's used later to point to your application gateway.
37-
* If you need to use TLS/SSL encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
36+
* A public DNS name for your application gateway.
37+
* If you need to use TLS encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
3838

3939
### ILB App Service environment
4040

@@ -70,20 +70,20 @@ With a public domain mapped to the application gateway, you don't need to config
7070

7171
### A valid public certificate
7272

73-
For security enhancement, it's recommended to bind TLS/SSL certificate for session encryption. To bind TLS/SSL certificate to the application gateway, a valid public certificate with following information is required. With [App Service certificates](../configure-ssl-app-service-certificate.md), you can buy a TLS/SSL certificate and export it in .pfx format.
73+
For security enhancement, bind a TLS certificate for session encryption. To bind TLS certificate to the application gateway, a valid public certificate with following information is required. With [App Service certificates](../configure-ssl-app-service-certificate.md), you can buy a TLS certificate and export it in `.pfx` format.
7474

7575
| Name | Value | Description|
7676
| ----- | ------------------- |------------|
7777
| **Common Name** |`<yourappname>.<yourdomainname>`, for example: `app.asabuludemo.com` <br/> or `*.<yourdomainname>`, for example: `*.asabuludemo.com` | A standard certificate or a [wildcard certificate](https://wikipedia.org/wiki/Wildcard_certificate) for the application gateway|
7878
| **Subject Alternative Name** | `<yourappname>.scm.<yourdomainname>`, for example: `app.scm.asabuludemo.com` <br/>or `*.scm.<yourdomainname>`, for example: `*.scm.asabuludemo.com` |The SAN that allowing to connect to App Service kudu service. It's an optional setting, if you don't want to publish the App Service kudu service to the internet.|
7979

80-
The certificate file should have a private key and save in .pfx format, it will be imported to the application gateway later.
80+
The certificate file should have a private key and save in `.pfx` format. The certificate is imported to the application gateway later.
8181

8282
## Create an application gateway
8383

8484
For the basic application gateway creation, refer to [Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal](../../web-application-firewall/ag/application-gateway-web-application-firewall-portal.md).
8585

86-
In this tutorial, we'll use Azure portal to create an application gateway with ILB App Service environment.
86+
In this tutorial, we use Azure portal to create an application gateway with ILB App Service environment.
8787

8888
In the Azure portal, select **New** > **Network** > **Application Gateway** to create an application gateway.
8989

@@ -120,25 +120,25 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
120120
| Rule name | For example: `http-routingrule` | Routing name |
121121
| Listener name | For example: `http-listener` | Listener name |
122122
| Frontend IP | Public | For internet access, set to Public |
123-
| Protocol | HTTP | Don't use TLS/SSL encryption |
123+
| Protocol | HTTP | Don't use TLS encryption |
124124
| Port | 80 | Default HTTP Port |
125-
| Listener type | Multi site | Allow to listen multi-sites on the application gateway |
125+
| Listener type | Multisite | Allow to listen multi-sites on the application gateway |
126126
| Host type | Multiple/Wildcard | Set to multiple or wildcard website name if listener type is set to multi-sites. |
127127
| Host name | For example: `app.asabuludemo.com` | Set to a routable domain name for App Service |
128128
129129
:::image type="content" source="./media/integrate-with-application-gateway/http-routing-rule.png" alt-text="Screenshot of HTTP Listener of the application gateway Routing Rule.":::
130130

131-
* To connect to the application gateway with TLS/SSL encryption, you can create a listener with following settings,
131+
* To connect to the application gateway with TLS encryption, you can create a listener with following settings,
132132

133133
| Parameter | Value | Description |
134134
| -------------- | --------------------------------- | ------------------------------------------------------------ |
135135
| Rule name | For example: `https-routingrule` | Routing name |
136136
| Listener name | For example: `https-listener` | Listener name |
137137
| Frontend IP | Public | For internet access, set to Public |
138-
| Protocol | HTTPS | Use TLS/SSL encryption |
138+
| Protocol | HTTPS | Use TLS encryption |
139139
| Port | 443 | Default HTTPS Port |
140140
| Https Settings | Upload a certificate | Upload a certificate contains the CN and the private key with .pfx format. |
141-
| Listener type | Multi site | Allow to listen multi-sites on the application gateway |
141+
| Listener type | Multisite | Allow to listen multi-sites on the application gateway |
142142
| Host type | Multiple/Wildcard | Set to multiple or wildcard website name if listener type is set to multi-sites. |
143143
| Host name | For example: `app.asabuludemo.com` | Set to a routable domain name for App Service |
144144
@@ -148,15 +148,15 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
148148

149149
:::image type="content" source="./media/integrate-with-application-gateway/add-new-http-setting.png" alt-text="Screenshot of adding new link to add an H T T P setting.":::
150150

151-
* HTTP settings listed as below:
151+
* HTTP settings listed in the following table:
152152

153153
| Parameter | Value | Description |
154154
| ----------------------------- | ------------------------------------------------------------ | ------------------------------------------------------------ |
155155
| HTTP setting name | For example: `https-setting` | HTTP setting name |
156-
| Backend protocol | HTTPS | Use TLS/SSL encryption |
156+
| Backend protocol | HTTPS | Use TLS encryption |
157157
| Backend port | 443 | Default HTTPS Port |
158-
| Use well known CA certificate | Yes | The default domain name of ILB App Service Environment is `.appserviceenvironment.net`, the certificate of this domain is issued by a public trusted root authority. In the Trusted root certificate setting, you can set to use **well known CA trusted root certificate**. |
159-
| Override with new host name | Yes | The host name header will be overwrote on connecting to the app on ILB App Service Environment |
158+
| Use well known CA certificate | Yes | The default domain name of ILB App Service Environment is `.appserviceenvironment.net`. The certificate of this domain is issued by a public trusted root authority. In the Trusted root certificate setting, you can set to use **well known CA trusted root certificate**. |
159+
| Override with new host name | Yes | The host name header is overwritten on connecting to the app on ILB App Service Environment |
160160
| Host name override | Pick host name from backend target | When setting backend pool to App Service, you can pick host from backend target |
161161
| Create custom probes | No | Use default health probe|
162162
@@ -165,7 +165,7 @@ In the Azure portal, select **New** > **Network** > **Application Gateway** to c
165165

166166
## Configure an application gateway integration with ILB App Service Environment
167167

168-
To access ILB App Service Environment from the application gateway, you need to check if a virtual network link to private DNS zone. If there's no virtual network linked to your application gateway's VNet, add a virtual network link with following steps.
168+
To access ILB App Service Environment from the application gateway, you need to check if a virtual network link to private DNS zone. If there's no virtual network linked to your application gateway's virtual network, add a virtual network link with following steps.
169169

170170
### Configure virtual network links with a private DNS zone
171171

articles/app-service/overview-app-gateway-integration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ To isolate traffic to an individual web app, you need to use IP-based access res
6464

6565
## Considerations for an external App Service Environment
6666

67-
An external App Service Environment has a public-facing load balancer like multi-tenant App Service apps. Service endpoints don't work for an App Service Environment. With App Service Environment you can use IP-based access restrictions by using the public IP address of the application gateway. To create an external App Service Environment by using the Azure portal, you can follow [this quickstart](./environment/creation.md).
67+
An external App Service Environment has a public-facing load balancer like multitenant App Service apps. Service endpoints don't work for an App Service Environment. With App Service Environment you can use IP-based access restrictions by using the public IP address of the application gateway. To create an external App Service Environment by using the Azure portal, you can follow [this quickstart](./environment/creation.md).
6868

6969
## Considerations for a Kudu/SCM site
7070

articles/app-service/overview-private-endpoint.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom: msangapu
1414
[!INCLUDE [regionalization-note](./includes/regionalization-note.md)]
1515

1616
> [!IMPORTANT]
17-
> Private endpoint is available for Windows and Linux apps, containerized or not, hosted on these App Service plans : **Basic**, **Standard**, **PremiumV2**, **PremiumV3**, **IsolatedV2**, **Functions Premium** (sometimes referred to as the Elastic Premium plan).
17+
> Private endpoint is available for Windows and Linux apps, containerized or not, hosted on these App Service plans: **Basic**, **Standard**, **PremiumV2**, **PremiumV3**, **IsolatedV2**, **Functions Premium** (sometimes referred to as the Elastic Premium plan).
1818
1919
You can use private endpoint for your App Service apps to allow clients located in your private network to securely access the app over Azure Private Link. The private endpoint uses an IP address from your Azure virtual network address space. Network traffic between a client on your private network and the app traverses over the virtual network and a Private Link on the Microsoft backbone network, eliminating exposure from the public Internet.
2020

@@ -36,7 +36,7 @@ The subnet where you plug the private endpoint can have other resources in it, y
3636
You can also deploy the private endpoint in a different region than your app.
3737

3838
> [!NOTE]
39-
> The virtual network integration feature cannot use the same subnet as private endpoint, this is a limitation of the virtual network integration feature.
39+
> The virtual network integration feature can't use the same subnet as private endpoint.
4040
4141
From a security perspective:
4242

@@ -90,7 +90,7 @@ After this DNS configuration, you can reach your app privately with the default
9090
If you need to use a custom DNS name, you must add the custom name in your app and you must validate the custom name like any custom name, using public DNS resolution.
9191
For more information, see [custom DNS validation](./app-service-web-tutorial-custom-domain.md).
9292

93-
For the Kudu console, or Kudu REST API (deployment with Azure DevOps Services self-hosted agents for example) you must create two records pointing to the private endpoint IP in your Azure DNS private zone or your custom DNS server. The first is for your app, the second is for the SCM of your app.
93+
For the Kudu console, or Kudu REST API (deployment with Azure DevOps Services self-hosted agents for example) you must create two records pointing to the private endpoint IP in your Azure DNS private zone or your custom DNS server. The first is for your app and the second is for the SCM of your app.
9494

9595
| Name | Type | Value |
9696
|-----|-----|-----|
@@ -122,7 +122,7 @@ For pricing details, see [Azure Private Link pricing](https://azure.microsoft.co
122122
* You can connect up to 100 private endpoints to a particular app.
123123
* Remote Debugging functionality isn't available through the private endpoint. The recommendation is to deploy the code to a slot and remote debug it there.
124124
* FTP access is provided through the inbound public IP address. Private endpoint doesn't support FTP access to the app.
125-
* IP-Based SSL isn't supported with private endpoints.
125+
* IP-Based TLS isn't supported with private endpoints.
126126
* Apps that you configure with private endpoints can't receive public traffic coming from subnets with `Microsoft.Web` service endpoint enabled and can't use [service endpoint-based access restriction rules](./overview-access-restrictions.md#access-restriction-rules-based-on-service-endpoints).
127127
* Private endpoint naming must follow the rules defined for resources of type `Microsoft.Network/privateEndpoints`. Naming rules can be found [here](../azure-resource-manager/management/resource-name-rules.md#microsoftnetwork).
128128

0 commit comments

Comments
 (0)