Skip to content

Commit baaf8e3

Browse files
Removing limitations
Removing limitations
1 parent 9194ae0 commit baaf8e3

File tree

1 file changed

+12
-17
lines changed

1 file changed

+12
-17
lines changed

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 12 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -370,34 +370,29 @@ While in public preview, the following limitations are known.
370370

371371
[Private link configuration](private-link.md) support for tunneling traffic through private endpoints to Application Gateway is unsupported with private only gateway.
372372

373-
### Coexisting v2 Application Gateways created prior to enablement of enhanced network control
374-
375-
If a subnet shares Application Gateway v2 deployments that were created both prior to and after enablement of the enhanced network control functionality, Network Security Group (NSG) and Route Table functionality is limited to the prior gateway deployment. Application gateways provisioned prior to enablement of the new functionality must either be reprovisioned, or newly created gateways must use a different subnet to enable enhanced network security group and route table features.
376-
377-
- If a gateway deployed prior to enablement of the new functionality exists in the subnet, you might see errors such as: `For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'` when adding route table entries.
378-
- When adding network security group rules to the subnet, you might see: `Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group \<NSG-name\> blocks outgoing Internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This isn't permitted for Application Gateways that have fast update enabled or have V2 Sku.`
379-
380-
[Private link configuration](private-link.md) support for tunneling traffic through private endpoints to Application Gateway is unsupported with private only gateway.
381-
382-
### Private Endpoint Network Policy is unsupported
373+
### Private IP frontend configuration only with AGIC
383374

384-
[Private endpoint network policy](../private-link/disable-private-endpoint-network-policy.md) applied to subnets containing Private Endpoints is unsupported for this preview. If enabled, traffic from Application Gateway to Private Endpoints might be dropped, resulting in unhealthy backend health. If the subnet is enabled for private endpoint network policy, you will need to provision a new subnet with private endpoint network policy disabled. Changed Enabled to Disabled on an existing subnet will still result in private endpoints dropping traffic.
375+
AGIC v1.7 must be used to introduce support for private frontend IP only.
385376

386377
### Private Endpoint connectivity via Global VNet Peering
387378

388379
If Application Gateway has a backend target or key vault reference to a private endpoint located in a VNet that is accessible via global VNet peering, traffic is dropped, resulting in an unhealthy status.
389380

390-
### Private IP frontend configuration only with AGIC
381+
### Coexisting v2 Application Gateways created prior to enablement of enhanced network control
382+
383+
If a subnet shares Application Gateway v2 deployments that were created both prior to and after enablement of the enhanced network control functionality, Network Security Group (NSG) and Route Table functionality is limited to the prior gateway deployment. Application gateways provisioned prior to enablement of the new functionality must either be reprovisioned, or newly created gateways must use a different subnet to enable enhanced network security group and route table features.
391384

392-
AGIC doesn't currently support private IP frontend only deployments.
385+
- If a gateway deployed prior to enablement of the new functionality exists in the subnet, you might see errors such as: `For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'` when adding route table entries.
386+
- When adding network security group rules to the subnet, you might see: `Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group \<NSG-name\> blocks outgoing Internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This isn't permitted for Application Gateways that have fast update enabled or have V2 Sku.`
393387

394-
### Backend Health status typo
388+
[Private link configuration](private-link.md) support for tunneling traffic through private endpoints to Application Gateway is unsupported with private only gateway.
395389

396-
If backend health is unknown due to DNS resolution or other reason, the error message will erroneously state that you need an NSG and to eliminate route tables. The message to require NSG rules or eliminate the user-defined route (UDR) is incorrect and can be ignored. This issue will be fixed in a future release.
390+
### Unknown Backend Health status
397391

398-
### Tags in Route Table Rules
392+
If backend health is _Unknown_, you may see the following error:
393+
+ The backend health status could not be retrieved. This happens when an NSG/UDR/Firewall on the application gateway subnet is blocking traffic on ports 65503-65534 in case of v1 SKU, and ports 65200-65535 in case of the v2 SKU or if the FQDN configured in the backend pool could not be resolved to an IP address. To learn more visit - https://aka.ms/UnknownBackendHealth.
399394

400-
If a tag is defined via Route Table, this might lead to provisioning failure of Application Gateway.
395+
This error can be ignored and will be clarified in a future release.
401396

402397
## Next steps
403398

0 commit comments

Comments
 (0)