Skip to content

Commit c06e65c

Browse files
authored
Merge pull request #215105 from greg-lindsay/appgw-1
Author and terminology update, all App GW docs
2 parents 44e40bd + 6d65d96 commit c06e65c

File tree

88 files changed

+377
-372
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

88 files changed

+377
-372
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29163,6 +29163,11 @@
2916329163
"source_path_from_root": "/articles/virtual-machines/windows/using-visual-studio-vm.md",
2916429164
"redirect_url": "/visualstudio/install/using-visual-studio-vm",
2916529165
"redirect_document_id": false
29166+
},
29167+
{
29168+
"source_path_from_root": "/articles/application-gateway/configuration-front-end-ip.md",
29169+
"redirect_url": "/azure/application-gateway/configuration-frontend-ip",
29170+
"redirect_document_id": false
2916629171
}
2916729172

2916829173
]

articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -215,7 +215,7 @@ To create a custom probe, follow [these steps](./application-gateway-create-prob
215215
### HTTP response body mismatch
216216

217217
**Message:** Body of the backend's HTTP response did not match the
218-
probe setting. Received response body does not contain {string}.
218+
probe setting. Received response body doesn't contain {string}.
219219

220220
**Cause:** When you create a custom probe, you can mark a backend server as Healthy by matching a string from the response body. For example, you can configure Application Gateway to accept "unauthorized" as a string to match. If the backend server response for the probe request contains the string **unauthorized**, it will be marked as Healthy. Otherwise, it will be marked as Unhealthy with this message.
221221

@@ -255,7 +255,7 @@ For more information about how to extract and upload Trusted Root Certificates i
255255

256256
### Trusted root certificate mismatch
257257

258-
**Message:** The root certificate of the server certificate used by the backend does not match the trusted root certificate added to the application gateway. Ensure that you add the correct root certificate to whitelist the backend.
258+
**Message:** The root certificate of the server certificate used by the backend doesn't match the trusted root certificate added to the application gateway. Ensure that you add the correct root certificate to whitelist the backend.
259259

260260
**Cause:** End-to-end SSL with Application Gateway v2 requires the backend server's certificate to be verified in order to deem the server Healthy. For a TLS/SSL certificate to be trusted, the backend server certificate must be issued by a CA that's included in the trusted store of Application Gateway. If the certificate wasn't issued by a trusted CA (for example, a self-signed certificate was used), users should upload the issuer's certificate to Application Gateway.
261261

@@ -297,7 +297,7 @@ If the output doesn't show the complete chain of the certificate being returned,
297297

298298
### Backend certificate invalid common name (CN)
299299

300-
**Message:** The Common Name (CN) of the backend certificate does not match the host header of the probe.
300+
**Message:** The Common Name (CN) of the backend certificate doesn't match the host header of the probe.
301301

302302
**Cause:** Application Gateway checks whether the host name specified in the backend HTTP settings matches that of the CN presented by the backend server’s TLS/SSL certificate. This verification is Standard_v2 and WAF_v2 SKU (V2) behavior. The Standard and WAF SKU (v1) Server Name Indication (SNI) is set as the FQDN in the backend pool address. For more information on SNI behavior and differences between v1 and v2 SKU, see [Overview of TLS termination and end to end TLS with Application Gateway](ssl-overview.md).
303303

@@ -389,7 +389,7 @@ This behavior can occur for one or more of the following reasons:
389389

390390
3. Default route advertised by the ExpressRoute/VPN connection to the virtual network over BGP:
391391

392-
a. If you have an ExpressRoute/VPN connection to the virtual network over BGP, and if you are advertising a default route, you must make sure that the packet is routed back to the internet destination without modifying it. You can verify by using the **Connection Troubleshoot** option in the Application Gateway portal.
392+
a. If you have an ExpressRoute/VPN connection to the virtual network over BGP, and if you're advertising a default route, you must make sure that the packet is routed back to the internet destination without modifying it. You can verify by using the **Connection Troubleshoot** option in the Application Gateway portal.
393393
b. Choose the destination manually as any internet-routable IP address like 1.1.1.1. Set the destination port as anything, and verify the connectivity.
394394
c. If the next hop is virtual network gateway, there might be a default route advertised over ExpressRoute or VPN.
395395

articles/application-gateway/application-gateway-components.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Application gateway components
33
description: This article provides information about the various components in an application gateway
44
services: application-gateway
5-
author: surajmb
5+
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: conceptual
88
ms.date: 08/21/2020
9-
ms.author: surmb
9+
ms.author: greglin
1010
---
1111

1212
# Application gateway components
@@ -23,7 +23,7 @@ A frontend IP address is the IP address associated with an application gateway.
2323

2424
The Azure Application Gateway V2 SKU can be configured to support either both static internal IP address and static public IP address, or only static public IP address. It cannot be configured to support only static internal IP address.
2525

26-
The V1 SKU can be configured to support static or dynamic internal IP address and dynamic public IP address. The dynamic IP address of Application Gateway does not change on a running gateway. It can change only when you stop or start the Gateway. It does not change on system failures, updates, Azure host updates etc.
26+
The V1 SKU can be configured to support static or dynamic internal IP address and dynamic public IP address. The dynamic IP address of Application Gateway doesn't change on a running gateway. It can change only when you stop or start the Gateway. It doesn't change on system failures, updates, Azure host updates etc.
2727

2828
The DNS name associated with an application gateway doesn't change over the lifecycle of the gateway. As a result, you should use a CNAME alias and point it to the DNS address of the application gateway.
2929

@@ -79,7 +79,7 @@ After you create a listener, you associate it with a request routing rule. This
7979

8080
## Request routing rules
8181

82-
A request routing rule is a key component of an application gateway because it determines how to route traffic on the listener. The rule binds the listener, the back-end server pool, and the backend HTTP settings.
82+
A request routing rule is a key component of an application gateway because it determines how to route traffic on the listener. The rule binds the listener, the backend server pool, and the backend HTTP settings.
8383

8484
When a listener accepts a request, the request routing rule forwards the request to the backend or redirects it elsewhere. If the request is forwarded to the backend, the request routing rule defines which backend server pool to forward it to. The request routing rule also determines if the headers in the request are to be rewritten. One listener can be attached to one rule.
8585

@@ -144,7 +144,7 @@ You can create different backend pools for different types of requests. For exam
144144

145145
By default, an application gateway monitors the health of all resources in its backend pool and automatically removes unhealthy ones. It then monitors unhealthy instances and adds them back to the healthy backend pool when they become available and respond to health probes.
146146

147-
In addition to using default health probe monitoring, you can also customize the health probe to suit your application's requirements. Custom probes allow more granular control over the health monitoring. When using custom probes, you can configure a custom hostname, URL path, probe interval, and how many failed responses to accept before marking the back-end pool instance as unhealthy, custom status codes and response body match, etc. We recommend that you configure custom probes to monitor the health of each backend pool.
147+
In addition to using default health probe monitoring, you can also customize the health probe to suit your application's requirements. Custom probes allow more granular control over the health monitoring. When using custom probes, you can configure a custom hostname, URL path, probe interval, and how many failed responses to accept before marking the backend pool instance as unhealthy, custom status codes and response body match, etc. We recommend that you configure custom probes to monitor the health of each backend pool.
148148

149149
For more information, see [Monitor the health of your application gateway](../application-gateway/application-gateway-probe-overview.md).
150150

articles/application-gateway/application-gateway-configure-listener-specific-ssl-policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,11 @@
22
title: Configure listener-specific SSL policies on Azure Application Gateway through portal
33
description: Learn how to configure listener-specific SSL policies on Application Gateway through portal
44
services: application-gateway
5-
author: mscatyao
5+
author: greg-lindsay
66
ms.service: application-gateway
77
ms.topic: how-to
88
ms.date: 02/18/2022
9-
ms.author: caya
9+
ms.author: greglin
1010
---
1111

1212
# Configure listener-specific SSL policies on Application Gateway through portal
@@ -32,7 +32,7 @@ Before you proceed, here are some important points related to listener-specific
3232
- You don't have to configure client authentication on an SSL profile to associate it to a listener. You can have only client authentication or listener-specific SSL policy configured, or both configured in your SSL profile.
3333
- Using a new Predefined or Customv2 policy enhances SSL security and performance for the entire gateway (SSL Policy and SSL Profile). Therefore, you cannot have different listeners on both old as well as new SSL (predefined or custom) policies.
3434

35-
Consider this example, you are currently using SSL Policy and SSL Profile with "older" policies/ciphers. To use a "new" Predefined or Customv2 policy for any one of them will also require you to upgrade the other configuration. You may use the new predefined policies, or customv2 policy, or combination of these across the gateway.
35+
Consider this example, you're currently using SSL Policy and SSL Profile with "older" policies/ciphers. To use a "new" Predefined or Customv2 policy for any one of them will also require you to upgrade the other configuration. You may use the new predefined policies, or customv2 policy, or combination of these across the gateway.
3636

3737
To set up a listener-specific SSL policy, you'll need to first go to the **SSL settings** tab in the Portal and create a new SSL profile. When you create an SSL profile, you'll see two tabs: **Client Authentication** and **SSL Policy**. The **SSL Policy** tab is to configure a listener-specific SSL policy. The **Client Authentication** tab is where to upload a client certificate(s) for mutual authentication - for more information, check out [Configuring a mutual authentication](./mutual-authentication-portal.md).
3838

@@ -75,7 +75,7 @@ Now that we've created an SSL profile with a listener-specific SSL policy, we ne
7575
![Associate SSL profile to new listener](./media/mutual-authentication-portal/mutual-authentication-listener-portal.png)
7676

7777
### Limitations
78-
There is a limitation right now on Application Gateway where different listeners using the same port cannot have SSL policies (predefined or custom) with different TLS protocol versions. Choosing the same TLS version for different listeners will work for configuring cipher suite preference for each listener. However, to use different TLS protocol versions for separate listeners, you will need to use distinct ports for each.
78+
There is a limitation right now on Application Gateway that different listeners using the same port cannot have SSL policies (predefined or custom) with different TLS protocol versions. Choosing the same TLS version for different listeners will work for configuring cipher suite preference for each listener. However, to use different TLS protocol versions for separate listeners, you will need to use distinct ports for each.
7979

8080
## Next steps
8181

articles/application-gateway/application-gateway-configure-ssl-policy-powershell.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,8 +134,8 @@ Set-AzApplicationGateway -ApplicationGateway $gw
134134
```
135135

136136
> [!IMPORTANT]
137-
> - If you are using a custom SSL policy in Application Gateway v1 SKU (Standard or WAF), make sure that you add the mandatory cipher "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" to the list. This cipher is required to enable metrics and logging in the Application Gateway v1 SKU. This is not mandatory for Application Gateway v2 SKU (Standard_v2 or WAF_v2).
138-
> - Cipher suites "TLS_AES_128_GCM_SHA256" and "TLS_AES_256_GCM_SHA384" with TLSv1.3 are not customizable and included by default when setting a CustomV2 policy with a minimum TLS version of 1.2 or 1.3. These two cipher suites will not appear in the Get Details output, with an exception of Portal.
137+
> - If you're using a custom SSL policy in Application Gateway v1 SKU (Standard or WAF), make sure that you add the mandatory cipher "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256" to the list. This cipher is required to enable metrics and logging in the Application Gateway v1 SKU. This is not mandatory for Application Gateway v2 SKU (Standard_v2 or WAF_v2).
138+
> - Cipher suites "TLS_AES_128_GCM_SHA256" and "TLS_AES_256_GCM_SHA384" with TLSv1.3 are not customizable and included by default when setting a CustomV2 policy with a minimum TLS version of 1.2 or 1.3. These two cipher suites won't appear in the Get Details output, with an exception of Portal.
139139
140140
To set minimum protocol version to 1.3, you must use the following command:
141141

articles/application-gateway/application-gateway-create-probe-classic-ps.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ To create an application gateway:
3333

3434
### Create an application gateway resource with a custom probe
3535

36-
To create the gateway, use the `New-AzureApplicationGateway` cmdlet, replacing the values with your own. Billing for the gateway does not start at this point. Billing begins in a later step, when the gateway is successfully started.
36+
To create the gateway, use the `New-AzureApplicationGateway` cmdlet, replacing the values with your own. Billing for the gateway doesn't start at this point. Billing begins in a later step, when the gateway is successfully started.
3737

3838
The following example creates an application gateway by using a virtual network called "testvnet1" and a subnet called "subnet-1".
3939

@@ -126,7 +126,7 @@ Copy the following text to Notepad.
126126

127127
Edit the values between the parentheses for the configuration items. Save the file with extension .xml.
128128

129-
The following example shows how to use a configuration file to set up the application gateway to load balance HTTP traffic on public port 80 and send network traffic to back-end port 80 between two IP addresses by using a custom probe.
129+
The following example shows how to use a configuration file to set up the application gateway to load balance HTTP traffic on public port 80 and send network traffic to backend port 80 between two IP addresses by using a custom probe.
130130

131131
> [!IMPORTANT]
132132
> The protocol item Http or Https is case-sensitive.
@@ -142,9 +142,9 @@ The configuration parameters are:
142142
| **Host** and **Path** | Complete URL path that is invoked by the application gateway to determine the health of the instance. For example, if you have a website http:\//contoso.com/, then the custom probe can be configured for "http:\//contoso.com/path/custompath.htm" for probe checks to have a successful HTTP response.|
143143
| **Interval** | Configures the probe interval checks in seconds.|
144144
| **Timeout** | Defines the probe time-out for an HTTP response check.|
145-
| **UnhealthyThreshold** | The number of failed HTTP responses needed to flag the back-end instance as *unhealthy*.|
145+
| **UnhealthyThreshold** | The number of failed HTTP responses needed to flag the backend instance as *unhealthy*.|
146146

147-
The probe name is referenced in the \<BackendHttpSettings\> configuration to assign which back-end pool uses custom probe settings.
147+
The probe name is referenced in the \<BackendHttpSettings\> configuration to assign which backend pool uses custom probe settings.
148148

149149
## Add a custom probe to an existing application gateway
150150

0 commit comments

Comments
 (0)