Skip to content

Commit bd4e047

Browse files
committed
formatting
1 parent b3c098e commit bd4e047

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/application-gateway/application-gateway-faq.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -289,11 +289,12 @@ sections:
289289
290290
1. Register the **‘AllowApplicationGatewayEnableFIPS’** feature to enroll the subscription for FIPS mode configuration.
291291
292-
To register using Azure CLI, open a Cloud Shell prompt and enter the following:
292+
To register using Azure PowerShell, open a Cloud Shell prompt and enter the following:
293293
294294
```azurepowershell-interactive
295295
Register-AzProviderFeature -FeatureName AllowApplicationGatewayEnableFIPS -ProviderNamespace Microsoft.Network
296296
```
297+
297298
To register using the **Azure portal**:
298299
299300
- Sign in to the Azure portal and search for **Preview features**.
@@ -309,6 +310,7 @@ sections:
309310
# Update the application gateway
310311
Set-AzApplicationGateway -ApplicationGateway $appgw
311312
```
313+
312314
Changing FIPS mode doesn't affect the overall availability of cipher suites on V1 gateways. However, when using [elliptic curve cryptography](/windows/win32/secauthn/tls-elliptic-curves-in-windows-10-1607-and-later) for ciphers, with FIPS mode disabled you can use curve25519, NistP256, and NistP384 whereas with FIPS mode enabled only NistP256 and NistP384 are allowed and curve25519 is disabled. Since curve25519 becomes unavailable in FIPS mode, make sure your clients support NistP256 or NistP384 for secure communication before enabling FIPS.
313315
314316
- question: How do I use Application Gateway v2 with only a private frontend IP address?

0 commit comments

Comments
 (0)