Skip to content

Commit dbaa6e9

Browse files
committed
acrolinx issues
1 parent fe03d04 commit dbaa6e9

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Each of these features can be enabled independently. For example, a public IP ad
3434

3535
## Onboard to public preview
3636

37-
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are currently in public preview. To join the public preview, you can opt-in to the experience using Azure PowerShell, Azure CLI, or REST API.
37+
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are currently in public preview. To join the public preview, you can opt in to the experience using Azure PowerShell, Azure CLI, or REST API.
3838

3939
When you join the preview, all new gateways will begin to provision with the ability to enable any combination of the NSG, Route Table, or private IP configuration features. If you wish to offboard from the new functionality and return to the current generally available functionality of Application Gateway, you may do so by [unregistering from the preview](#unregister-from-the-preview).
4040

@@ -107,7 +107,7 @@ For more information about preview features, see [Set up preview features in Azu
107107

108108
# [Azure Portal](#tab/portal)
109109

110-
To opt-out of the public preview for the enhanced Application Gateway network controls via Portal, use the following steps:
110+
To opt out of the public preview for the enhanced Application Gateway network controls via Portal, use the following steps:
111111

112112
1. Sign in to the [Azure portal](https://portal.azure.com/).
113113
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
@@ -132,7 +132,7 @@ To opt-out of the public preview for the enhanced Application Gateway network co
132132

133133
# [Azure PowerShell](#tab/powershell)
134134

135-
To opt-out of the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
135+
To opt out of the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
136136

137137
```azurepowershell
138138
Unregister-AzProviderFeature -FeatureName "EnableApplicationGatewayNetworkIsolation" -ProviderNamespace "Microsoft.Network"
@@ -147,7 +147,7 @@ EnableApplicationGatewayNetworkIsolation Microsoft.Network Unregistered
147147

148148
# [Azure CLI](#tab/cli)
149149

150-
To opt-out of the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
150+
To opt out of the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
151151

152152
```azurecli
153153
az feature unregister --name EnableApplicationGatewayNetworkIsolation --namespace Microsoft.Network
@@ -200,28 +200,28 @@ After registration into the public preview, configuration of NSG, Route Table, a
200200

201201
## Resource Changes
202202

203-
Upon provisioning of your gateway, a resource tag is automatically provisioned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
203+
After provisioning of your gateway, a resource tag is automatically assigned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
204204

205205
![View the EnhancedNetworkControl tag](./media/application-gateway-private-deployment/tags.png)
206206

207-
The resource tag is cosmetic, and serves to confirm that the gateway has been provisioned with the capabilities to configure any combination of the private only gateway features. Modification or deletion of the tag or value does not change any functional workings of the gateway.
207+
The resource tag is cosmetic, and serves to confirm that the gateway has been provisioned with the capabilities to configure any combination of the private only gateway features. Modification or deletion of the tag or value doesn't change any functional workings of the gateway.
208208

209209
> [!TIP]
210210
> The **EnhancedNetworkControl** tag can be helpful when existing Application Gateways were deployed in the subscription prior to feature enablement and you would like to differentiate which gateway can utilize the new functionality.
211211
212212
## Outbound internet connectivity
213213

214-
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) will not be able to egress traffic destined to the internet. This affects communication to a backend targets that are publicly accessible via the internet.
214+
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) will not be able to egress traffic destined to the internet. This affects communication to backend targets that are publicly accessible via the internet.
215215

216216
To enable outbound connectivity from your Application Gateway to an internet facing backend target, you may utilize [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) or forward traffic to a virtual appliance that has access to the internet.
217217

218218
Virtual Network NAT offers control over what IP address or prefix should be used as well as configurable idle-timeout. To configure, create a new NAT Gateway with a public IP address or public prefix and associate it with the subnet containing Application Gateway.
219219

220-
If a virtual appliance is required for internet egress, see the [route table control](#route-table-control) section in this document for more information.
220+
If a virtual appliance is required for internet egress, see the [route table control](#route-table-control) section in this document.
221221

222222
Common scenarios where public IP usage is required:
223223
- Communication to key vault without use of private endpoints or service endpoints
224-
- Outbound communication is not required for pfx files uploaded to Application Gateway directly
224+
- Outbound communication isn't required for pfx files uploaded to Application Gateway directly
225225
- Communication to backend targets via internet
226226
- Communication to internet facing CRL or OCSP endpoints
227227

@@ -265,7 +265,7 @@ To create these rules:
265265
- Select **Inbound security rules**
266266
- Select **Add**
267267
- Enter the following information for each rule into the **Add inbound security rule** pane.
268-
- When you have entered the information, select **Add** to create the rule.
268+
- When you've entered the information, select **Add** to create the rule.
269269
- Creation of each rule takes a moment.
270270

271271
| Rule # | Source | Source service tag | Source port ranges | Destination | Service | Dest port ranges | Protocol | Action | Priority | Name |
@@ -301,7 +301,7 @@ To create these rules:
301301
- Select **Outbound security rules**
302302
- Select **Add**
303303
- Enter the following information for each rule into the **Add outbound security rule** pane.
304-
- When you have entered the information, select **Add** to create the rule.
304+
- When you've entered the information, select **Add** to create the rule.
305305
- Creation of each rule takes a moment.
306306

307307
| Rule # | Source | Source IP addresses/CIDR ranges | Source port ranges | Destination | Destination IP addresses/CIDR ranges | Service | Dest port ranges | Protocol | Action | Priority | Name |
@@ -340,7 +340,7 @@ Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising will not
340340
In the following example, we will create a route table and associate it to the Application Gateway subnet to ensure outbound Internet access from the subnet will egress from a virtual appliance. At a high level, the following design is summarized in Figure 1:
341341
- The Application Gateway is in spoke virtual network
342342
- There is a network virtual appliance (a virtual machine) in the hub network
343-
- A route table with a default route (0.0.0.0/0) to the virtual pppliance is associated to Application Gateway subnet
343+
- A route table with a default route (0.0.0.0/0) to the virtual appliance is associated to Application Gateway subnet
344344

345345
![Diagram for example route table](./media/application-gateway-private-deployment/route-table-diagram.png)
346346

@@ -372,9 +372,9 @@ While in public preview, the following limitations are known.
372372

373373
### Coexisting v2 Application Gateways created prior to enablement of enhanced network control
374374

375-
If a subnet shares Application Gateway v2 deployments that were created prior and post enablement of the enhanced network control functionality, Network Security Group (NSG) and Route Table functionality will be limited to prior gateway deployment. Application gateways provisioned prior to enablement of the new functionality should either reprovision the existing gateways or provision newly created gateways to a new subnet to take advantage of the enahanced network security group and route table features.
375+
If a subnet shares Application Gateway v2 deployments that were created prior and post enablement of the enhanced network control functionality, Network Security Group (NSG) and Route Table functionality will be limited to prior gateway deployment. Application gateways provisioned prior to enablement of the new functionality should either reprovision the existing gateways or provision newly created gateways to a new subnet to take advantage of the enhanced network security group and route table features.
376376

377-
If a gateway deployed prior to enablement of the new functionality exists in the subnet, you may see errors such as "For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'." when adding route table entries or "Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group \<takes\> blocks outgoing internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This is not permitted for Application Gateways that have fast update enabled or have V2 Sku." when adding network security group rules to the subnet.
377+
If a gateway deployed prior to enablement of the new functionality exists in the subnet, you may see errors such as "For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'." when adding route table entries or "Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group \<takes\> blocks outgoing internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This isn't permitted for Application Gateways that have fast update enabled or have V2 Sku." when adding network security group rules to the subnet.
378378

379379
[Private link configuration](private-link.md) support for tunneling traffic through private endpoints to Application Gateway is unsupported with private only gateway.
380380

@@ -384,11 +384,11 @@ If a gateway deployed prior to enablement of the new functionality exists in the
384384

385385
### Private Endpoint connectivity via Global VNet Peering
386386

387-
If Application Gateway has a backend target or key vault reference to a private endpoint located in a vnet that is accessible via global vnet peering, traffic will be dropped and result in unhealthy status.
387+
If Application Gateway has a backend target or key vault reference to a private endpoint located in a VNet that is accessible via global VNet peering, traffic is dropped, resulting in an unhealthy status.
388388

389389
### Private IP frontend configuration only with AGIC
390390

391-
AGIC does not currently support private IP frontend only deployments.
391+
AGIC doesn't currently support private IP frontend only deployments.
392392

393393
### Backend Health status typo
394394

0 commit comments

Comments
 (0)