You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-private-deployment.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ Each of these features can be enabled independently. For example, a public IP ad
34
34
35
35
## Onboard to public preview
36
36
37
-
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are currently in public preview. To join the public preview, you can opt-in to the experience using Azure PowerShell, Azure CLI, or REST API.
37
+
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are currently in public preview. To join the public preview, you can optin to the experience using Azure PowerShell, Azure CLI, or REST API.
38
38
39
39
When you join the preview, all new gateways will begin to provision with the ability to enable any combination of the NSG, Route Table, or private IP configuration features. If you wish to offboard from the new functionality and return to the current generally available functionality of Application Gateway, you may do so by [unregistering from the preview](#unregister-from-the-preview).
40
40
@@ -107,7 +107,7 @@ For more information about preview features, see [Set up preview features in Azu
107
107
108
108
# [Azure Portal](#tab/portal)
109
109
110
-
To opt-out of the public preview for the enhanced Application Gateway network controls via Portal, use the following steps:
110
+
To optout of the public preview for the enhanced Application Gateway network controls via Portal, use the following steps:
111
111
112
112
1. Sign in to the [Azure portal](https://portal.azure.com/).
113
113
2. In the search box, enter _subscriptions_ and select **Subscriptions**.
@@ -132,7 +132,7 @@ To opt-out of the public preview for the enhanced Application Gateway network co
132
132
133
133
# [Azure PowerShell](#tab/powershell)
134
134
135
-
To opt-out of the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
135
+
To optout of the public preview for the enhanced Application Gateway network controls via Azure PowerShell, the following commands can be referenced:
To opt-out of the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
150
+
To optout of the public preview for the enhanced Application Gateway network controls via Azure CLI, the following commands can be referenced:
151
151
152
152
```azurecli
153
153
az feature unregister --name EnableApplicationGatewayNetworkIsolation --namespace Microsoft.Network
@@ -200,28 +200,28 @@ After registration into the public preview, configuration of NSG, Route Table, a
200
200
201
201
## Resource Changes
202
202
203
-
Upon provisioning of your gateway, a resource tag is automatically provisioned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
203
+
After provisioning of your gateway, a resource tag is automatically assigned with the name of **EnhancedNetworkControl** and value of **True**. See the following example:
204
204
205
205

206
206
207
-
The resource tag is cosmetic, and serves to confirm that the gateway has been provisioned with the capabilities to configure any combination of the private only gateway features. Modification or deletion of the tag or value does not change any functional workings of the gateway.
207
+
The resource tag is cosmetic, and serves to confirm that the gateway has been provisioned with the capabilities to configure any combination of the private only gateway features. Modification or deletion of the tag or value doesn't change any functional workings of the gateway.
208
208
209
209
> [!TIP]
210
210
> The **EnhancedNetworkControl** tag can be helpful when existing Application Gateways were deployed in the subscription prior to feature enablement and you would like to differentiate which gateway can utilize the new functionality.
211
211
212
212
## Outbound internet connectivity
213
213
214
-
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) will not be able to egress traffic destined to the internet. This affects communication to a backend targets that are publicly accessible via the internet.
214
+
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) will not be able to egress traffic destined to the internet. This affects communication to backend targets that are publicly accessible via the internet.
215
215
216
216
To enable outbound connectivity from your Application Gateway to an internet facing backend target, you may utilize [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) or forward traffic to a virtual appliance that has access to the internet.
217
217
218
218
Virtual Network NAT offers control over what IP address or prefix should be used as well as configurable idle-timeout. To configure, create a new NAT Gateway with a public IP address or public prefix and associate it with the subnet containing Application Gateway.
219
219
220
-
If a virtual appliance is required for internet egress, see the [route table control](#route-table-control) section in this document for more information.
220
+
If a virtual appliance is required for internet egress, see the [route table control](#route-table-control) section in this document.
221
221
222
222
Common scenarios where public IP usage is required:
223
223
- Communication to key vault without use of private endpoints or service endpoints
224
-
- Outbound communication is not required for pfx files uploaded to Application Gateway directly
224
+
- Outbound communication isn't required for pfx files uploaded to Application Gateway directly
225
225
- Communication to backend targets via internet
226
226
- Communication to internet facing CRL or OCSP endpoints
227
227
@@ -265,7 +265,7 @@ To create these rules:
265
265
- Select **Inbound security rules**
266
266
- Select **Add**
267
267
- Enter the following information for each rule into the **Add inbound security rule** pane.
268
-
- When you have entered the information, select **Add** to create the rule.
268
+
- When you've entered the information, select **Add** to create the rule.
269
269
- Creation of each rule takes a moment.
270
270
271
271
| Rule # | Source | Source service tag | Source port ranges | Destination | Service | Dest port ranges | Protocol | Action | Priority | Name |
@@ -301,7 +301,7 @@ To create these rules:
301
301
- Select **Outbound security rules**
302
302
- Select **Add**
303
303
- Enter the following information for each rule into the **Add outbound security rule** pane.
304
-
- When you have entered the information, select **Add** to create the rule.
304
+
- When you've entered the information, select **Add** to create the rule.
305
305
- Creation of each rule takes a moment.
306
306
307
307
| Rule # | Source | Source IP addresses/CIDR ranges | Source port ranges | Destination | Destination IP addresses/CIDR ranges | Service | Dest port ranges | Protocol | Action | Priority | Name |
@@ -340,7 +340,7 @@ Forced Tunneling or learning of 0.0.0.0/0 route through BGP advertising will not
340
340
In the following example, we will create a route table and associate it to the Application Gateway subnet to ensure outbound Internet access from the subnet will egress from a virtual appliance. At a high level, the following design is summarized in Figure 1:
341
341
- The Application Gateway is in spoke virtual network
342
342
- There is a network virtual appliance (a virtual machine) in the hub network
343
-
- A route table with a default route (0.0.0.0/0) to the virtual pppliance is associated to Application Gateway subnet
343
+
- A route table with a default route (0.0.0.0/0) to the virtual appliance is associated to Application Gateway subnet
344
344
345
345

346
346
@@ -372,9 +372,9 @@ While in public preview, the following limitations are known.
372
372
373
373
### Coexisting v2 Application Gateways created prior to enablement of enhanced network control
374
374
375
-
If a subnet shares Application Gateway v2 deployments that were created prior and post enablement of the enhanced network control functionality, Network Security Group (NSG) and Route Table functionality will be limited to prior gateway deployment. Application gateways provisioned prior to enablement of the new functionality should either reprovision the existing gateways or provision newly created gateways to a new subnet to take advantage of the enahanced network security group and route table features.
375
+
If a subnet shares Application Gateway v2 deployments that were created prior and post enablement of the enhanced network control functionality, Network Security Group (NSG) and Route Table functionality will be limited to prior gateway deployment. Application gateways provisioned prior to enablement of the new functionality should either reprovision the existing gateways or provision newly created gateways to a new subnet to take advantage of the enhanced network security group and route table features.
376
376
377
-
If a gateway deployed prior to enablement of the new functionality exists in the subnet, you may see errors such as "For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'." when adding route table entries or "Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group \<takes\> blocks outgoing internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This is not permitted for Application Gateways that have fast update enabled or have V2 Sku." when adding network security group rules to the subnet.
377
+
If a gateway deployed prior to enablement of the new functionality exists in the subnet, you may see errors such as "For routes associated to subnet containing Application Gateway V2, please ensure '0.0.0.0/0' uses Next Hop Type as 'Internet'." when adding route table entries or "Failed to create security rule 'DenyAnyCustomAnyOutbound'. Error: Network security group \<takes\> blocks outgoing internet traffic on subnet \<AppGWSubnetId\>, associated with Application Gateway \<AppGWResourceId\>. This isn't permitted for Application Gateways that have fast update enabled or have V2 Sku." when adding network security group rules to the subnet.
378
378
379
379
[Private link configuration](private-link.md) support for tunneling traffic through private endpoints to Application Gateway is unsupported with private only gateway.
380
380
@@ -384,11 +384,11 @@ If a gateway deployed prior to enablement of the new functionality exists in the
384
384
385
385
### Private Endpoint connectivity via Global VNet Peering
386
386
387
-
If Application Gateway has a backend target or key vault reference to a private endpoint located in a vnet that is accessible via global vnet peering, traffic will be dropped and result in unhealthy status.
387
+
If Application Gateway has a backend target or key vault reference to a private endpoint located in a VNet that is accessible via global VNet peering, traffic is dropped, resulting in an unhealthy status.
388
388
389
389
### Private IP frontend configuration only with AGIC
390
390
391
-
AGIC does not currently support private IP frontend only deployments.
391
+
AGIC doesn't currently support private IP frontend only deployments.
0 commit comments