Skip to content

Commit 8db6136

Browse files
committed
minor fix
1 parent 829aa0c commit 8db6136

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed

articles/app-service/environment/integrate-with-application-gateway.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ To integrate your application gateway with your ILB App Service Environment, you
3636
* A public DNS name for your application gateway.
3737
* If you need to use TLS encryption to the application gateway, a valid public certificate that's used to bind to your application gateway is required.
3838

39-
### ILB App Service environment
39+
### ILB App Service Environment
4040

4141
For details on how to create an ILB App Service Environment, see [Create an App Service Environment in the Azure portal](./creation.md) and [Create an App Service Environment with Azure Resource Manager template](./create-from-template.md).
4242

@@ -83,7 +83,7 @@ The certificate file should have a private key and save in `.pfx` format. The ce
8383

8484
For the basic application gateway creation, refer to [Tutorial: Create an application gateway with a Web Application Firewall using the Azure portal](../../web-application-firewall/ag/application-gateway-web-application-firewall-portal.md).
8585

86-
In this tutorial, we use Azure portal to create an application gateway with ILB App Service environment.
86+
In this tutorial, we use Azure portal to create an application gateway with ILB App Service Environment.
8787

8888
In the Azure portal, select **New** > **Network** > **Application Gateway** to create an application gateway.
8989

articles/app-service/overview-app-gateway-integration.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -66,6 +66,8 @@ To isolate traffic to an individual web app, you need to use IP-based access res
6666

6767
An external App Service Environment has a public-facing load balancer like multitenant App Service apps. Service endpoints don't work for an App Service Environment. With App Service Environment you can use IP-based access restrictions by using the public IP address of the application gateway. To create an external App Service Environment by using the Azure portal, you can follow [this quickstart](./environment/creation.md).
6868

69+
You can also [add private endpoints to apps hosted on an external App Service Environment](./environment/configure-network-settings.md#allow-new-private-endpoint-connections).
70+
6971
## Considerations for a Kudu/SCM site
7072

7173
The SCM site, also known as Kudu, is an admin site that exists for every web app. It isn't possible to use reverse proxy for the SCM site. You most likely also want to lock it down to individual IP addresses or a specific subnet.

0 commit comments

Comments
 (0)