You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-ilb-arm.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ This article walks you through the steps to configure a Standard v1 Application
35
35
## Create an application gateway
36
36
37
37
The difference between using Azure Classic and Azure Resource Manager is the order in which you create the application gateway and the items that need to be configured.
38
-
With Resource Manager, all items that make an application gateway is configured individually and then put together to create the application gateway resource.
38
+
With Resource Manager, all items that make an application gateway are configured individually and then put together to create the application gateway resource.
39
39
40
40
Here are the steps that are needed to create an application gateway:
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-troubleshooting-502.md
+26-26Lines changed: 26 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,32 +41,32 @@ Similarly, the presence of a custom DNS in the VNet could also cause issues. An
41
41
42
42
Validate NSG, UDR, and DNS configuration by going through the following steps:
43
43
44
-
* Check NSGs associated with the application gateway subnet. Ensure that communication to backend isn't blocked.
45
-
* Check UDR associated with the application gateway subnet. Ensure that the UDR isn't directing traffic away from the backend subnet. For example, check for routing to network virtual appliances or default routes being advertised to the application gateway subnet via ExpressRoute/VPN.
If present, ensure that the DNS server can resolve the backend pool member's FQDN correctly.
44
+
1. Check NSGs associated with the application gateway subnet. Ensure that communication to backend isn't blocked.
45
+
2. Check UDR associated with the application gateway subnet. Ensure that the UDR isn't directing traffic away from the backend subnet. For example, check for routing to network virtual appliances or default routes being advertised to the application gateway subnet via ExpressRoute/VPN.
Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-infrastructure.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ Application Gateway (Standard or WAF) SKU can support up to 32 instances (32 ins
32
32
33
33
Application Gateway (Standard_v2 or WAF_v2 SKU) can support up to 125 instances (125 instance IP addresses + 1 private frontend IP configuration + 5 Azure reserved). A minimum subnet size of /24 is recommended.
34
34
35
-
To determine the available capacity of a subnet that has existing Application Gateways provisioned, take the size of the subnet and subtract the five reserved IP addresses of the subnet reserved by the platform. Next, take each gateway and subtract the the max-instance count. For each gateway that has a private frontend IP configuration, subtract one additional IP address per gateway as well.
35
+
To determine the available capacity of a subnet that has existing Application Gateways provisioned, take the size of the subnet and subtract the five reserved IP addresses of the subnet reserved by the platform. Next, take each gateway and subtract the max-instance count. For each gateway that has a private frontend IP configuration, subtract one additional IP address per gateway as well.
36
36
37
37
For example, here's how to calculate the available addressing for a subnet with three gateways of varying sizes:
38
38
- Gateway 1: Maximum of 10 instances; utilizes a private frontend IP configuration
Copy file name to clipboardExpand all lines: articles/application-gateway/ssl-overview.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -115,8 +115,8 @@ The following tables outline the differences in SNI between the v1 and v2 SKU in
115
115
116
116
### Frontend TLS connection (client to application gateway)
117
117
118
-
---
119
-
Scenario | v1 | v2 |
118
+
119
+
|Scenario | v1 | v2 |
120
120
| --- | --- | --- |
121
121
| If the client specifies SNI header and all the multi-site listeners are enabled with "Require SNI" flag | Returns the appropriate certificate and if the site doesn't exist (according to the server_name), then the connection is reset. | Returns appropriate certificate if available, otherwise, returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners|
122
122
| If the client doesn't specify a SNI header and if all the multi-site headers are enabled with "Require SNI" | Resets the connection | Returns the certificate of the first HTTPS listener according to the order specified by the request routing rules associated with the HTTPS listeners
@@ -126,8 +126,8 @@ Scenario | v1 | v2 |
126
126
127
127
#### For probe traffic
128
128
129
-
---
130
-
Scenario | v1 | v2 |
129
+
130
+
|Scenario | v1 | v2 |
131
131
| --- | --- | --- |
132
132
| SNI (server_name) header during the TLS handshake as FQDN | Set as FQDN from the backend pool. As per [RFC 6066](https://tools.ietf.org/html/rfc6066), literal IPv4 and IPv6 addresses aren't permitted in SNI hostname. <br> **Note:** FQDN in the backend pool should DNS resolve to backend server’s IP address (public or private) | SNI header (server_name) is set as the hostname from the custom probe attached to the HTTP settings (if configured), otherwise from the hostname mentioned in the HTTP settings, otherwise from the FQDN mentioned in the backend pool. The order of precedence is custom probe > HTTP settings > backend pool. <br> **Note:** If the hostnames configured in HTTP settings and custom probe are different, then according to the precedence, SNI will be set as the hostname from the custom probe.
133
133
| If the backend pool address is an IP address (v1) or if custom probe hostname is configured as IP address (v2) | SNI (server_name) won’t be set. <br> **Note:** In this case, the backend server should be able to return a default/fallback certificate and this should be allow-listed in HTTP settings under authentication certificate. If there’s no default/fallback certificate configured in the backend server and SNI is expected, the server might reset the connection and will lead to probe failures | In the order of precedence mentioned previously, if they have IP address as hostname, then SNI won't be set as per [RFC 6066](https://tools.ietf.org/html/rfc6066). <br> **Note:** SNI also won't be set in v2 probes if no custom probe is configured and no hostname is set on HTTP settings or backend pool |
@@ -137,8 +137,8 @@ Scenario | v1 | v2 |
137
137
138
138
#### For live traffic
139
139
140
-
---
141
-
Scenario | v1 | v2 |
140
+
141
+
|Scenario | v1 | v2 |
142
142
| --- | --- | --- |
143
143
| SNI (server_name) header during the TLS handshake as FQDN | Set as FQDN from the backend pool. As per [RFC 6066](https://tools.ietf.org/html/rfc6066), literal IPv4 and IPv6 addresses aren't permitted in SNI hostname. <br> **Note:** FQDN in the backend pool should DNS resolve to backend server’s IP address (public or private) | SNI header (server_name) is set as the hostname from the HTTP settings, otherwise, if *PickHostnameFromBackendAddress* option is chosen or if no hostname is mentioned, then it will be set as the FQDN in the backend pool configuration
144
144
| If the backend pool address is an IP address or hostname isn't set in HTTP settings | SNI won't be set as per [RFC 6066](https://tools.ietf.org/html/rfc6066) if the backend pool entry isn't an FQDN | SNI will be set as the hostname from the input FQDN from the client and the backend certificate's CN has to match with this hostname.
0 commit comments