Skip to content

Commit e810c8f

Browse files
Merge pull request #303716 from MicrosoftDocs/main
Auto Publish – main to live - 2025-08-01 11:00 UTC
2 parents 7d03c8e + fa55c10 commit e810c8f

28 files changed

+1174
-1359
lines changed

.openpublishing.redirection.json

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4034,6 +4034,36 @@
40344034
"redirect_url": "/azure/expressroute/expressroute-howto-linkvnet-cli",
40354035
"redirect_document_id": false
40364036
},
4037+
{
4038+
"source_path_from_root": "/articles/expressroute/quickstart-create-expressroute-vnet-template.md",
4039+
"redirect_url": "/azure/expressroute/expressroute-howto-circuit-resource-manager-template",
4040+
"redirect_document_id": false
4041+
},
4042+
{
4043+
"source_path_from_root": "/articles/expressroute/expressroute-howto-expressroute-direct-cli.md",
4044+
"redirect_url": "/azure/expressroute/how-to-expressroute-direct-portal",
4045+
"redirect_document_id": false
4046+
},
4047+
{
4048+
"source_path_from_root": "/articles/expressroute/expressroute-howto-erdirect.md",
4049+
"redirect_url": "/azure/expressroute/how-to-expressroute-direct-portal",
4050+
"redirect_document_id": false
4051+
},
4052+
{
4053+
"source_path_from_root": "/articles/expressroute/how-to-routefilter-cli.md",
4054+
"redirect_url": "/azure/expressroute/how-to-routefilter-portal",
4055+
"redirect_document_id": false
4056+
},
4057+
{
4058+
"source_path_from_root": "/articles/expressroute/how-to-routefilter-powershell.md",
4059+
"redirect_url": "/azure/expressroute/how-to-routefilter-portal",
4060+
"redirect_document_id": false
4061+
},
4062+
{
4063+
"source_path_from_root": "/articles/expressroute/work-remotely-support.md",
4064+
"redirect_url": "/azure/networking/working-remotely-support",
4065+
"redirect_document_id": false
4066+
},
40374067
{
40384068
"source_path_from_root": "/articles/expressroute/working-remotely-support.md",
40394069
"redirect_url": "/azure/expressroute/work-remotely-support",

articles/application-gateway/application-gateway-tls-version-retirement.md

Lines changed: 37 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: application gateway
55
author: jaesoni
66
ms.service: azure-application-gateway
77
ms.topic: concept-article
8-
ms.date: 07/29/2025
8+
ms.date: 07/31/2025
99
ms.author: mbender
1010
ms.custom:
1111
- build-2025
@@ -14,7 +14,7 @@ ms.custom:
1414

1515
# Managing your Application Gateway with TLS 1.0 and 1.1 retirement
1616

17-
Starting **31st August 2025**, Azure Application Gateway will no longer support **TLS (Transport Layer Security) versions 1.0 and 1.1**. This change aligns with the [Azure-wide retirement](https://azure.microsoft.com/updates?id=update-retirement-tls1-0-tls1-1-versions-azure-services) of these TLS versions to enhance the security. As the owner of an Application Gateway resource, you should review both the Frontend clients and Backend servers TLS connections that may be using these older versions.
17+
On **31st August 2025**, Azure Application Gateway will no longer support **TLS (Transport Layer Security) versions 1.0 and 1.1**. This change aligns with the [Azure-wide retirement](https://azure.microsoft.com/updates?id=update-retirement-tls1-0-tls1-1-versions-azure-services) of these TLS versions to enhance the security. As the owner of an Application Gateway resource, you should review both the Frontend clients and Backend servers TLS connections that can be using these older versions.
1818

1919
## Frontend TLS connections
2020

@@ -29,7 +29,7 @@ With deprecation of TLS versions 1.0 and 1.1, the **older Predefined TLS policie
2929

3030
### Predefined policies for V2 SKUs
3131

32-
The predefined policies 20150501 and 20170401 that support TLS v1.0 and 1.1 will be discontinued and can no longer be associated with an Application Gateway resource after August 2025. It's advised to transition to one of the recommended TLS policies, 20220101 or 20220101S. Alternatively, the 20170401S policy may be used if specific cipher suites are required.
32+
The predefined policies 20150501 and 20170401 that support TLS v1.0 and 1.1 will be discontinued and can no longer be associated with an Application Gateway resource after August 2025. Transition to one of the recommended TLS policies, 20220101 or 20220101S is advised. Alternatively, the 20170401S policy can be used if specific cipher suites are required.
3333

3434
![A diagram showing predefined policies for V2 SKUs.](media/application-gateway-tls-version-retirement/v2-retiring-tls-policies.png)
3535

@@ -102,11 +102,44 @@ To determine whether clients connecting to your Application Gateway resource are
102102
You can also check the [Application Gateway Access logs](monitor-application-gateway-reference.md#access-log-category) to view this information in log format.
103103

104104
> [!NOTE]
105-
> The metrics and logs for the V1 SKUs do not provide client TLS protocol information.
105+
> The metrics and logs for the V1 SKUs don't provide client TLS protocol information.
106106
107107
### Error information
108108
Once support for TLS versions 1.0 and 1.1 is discontinued, clients may encounter errors such as `curl: (35) error:0A000410:SSL routines::sslv3 alert handshake failure`. Depending on the browser being used, various messages indicating TLS handshake failures may be displayed.
109109

110+
## FAQs
111+
112+
### What does a default TLS policy mean?
113+
A default TLS policy for Application Gateway is a packaged set of supported TLS versions and cipher suites. This allows customers to begin using secured traffic by only configuring HTTPS or TLS listeners and backend settings, without any extra configuration for TLS version or ciphers. Application Gateway uses one of its predefined policies as the default.
114+
115+
### How will the default TLS policies be impacted after legacy TLS versions 1.0 and 1.1 retirement?
116+
Until September 2025, V2 SKUs utilize two [default TLS policies](application-gateway-ssl-policy-overview.md#default-tls-policy) based on the API version specified during resource deployment. Deployments using API version **2023-02-01 or later** apply `AppGwSslPolicy20220101` by default, while earlier API versions use `AppGwSslPolicy20150501`. With the deprecation of TLS 1.0 and 1.1, the older `AppGwSslPolicy20150501` policy, will be discontinued. So, `AppGwSslPolicy20220101` will become the default policy for all V2 gateways.
117+
118+
The default policy for the V1 SKU will remain unchanged since `AppGwSslPolicy20220101` won't be introduced for this retiring SKU.
119+
120+
> [!NOTE]
121+
> A default TLS policy is applied only when the "Default" option is selected in the Portal or when no TLS policy is specified within the resource configuration by means such as REST, PowerShell, or AzCLI.
122+
>
123+
> Accordingly, using a default policy in configuration isn't same as explicitly selecting `AppGwSslPolicy20150501` policy, even if `AppGwSslPolicy20150501` is the default policy for your API version.
124+
125+
### Which TLS policies in Application Gateway are getting deprecated?
126+
The predefined policies `AppGwSslPolicy20150501` and `AppGwSslPolicy20170401` that support TLS versions 1.0 and 1.1 will be removed from the Azure Resource Manager configuration. Similarly, the Custom policy will stop supporting TLS versions 1.0 and 1.1 along with their associated cipher suites. This applies to both V1 and V2 SKUs.
127+
128+
### Will Application Gateway product team automatically update the configuration to a supported TLS policy?
129+
Application Gateway won't modify any resource having customer-defined TLS configurations. Only the default TLS policy for gateways that have not explicitly set a TLS policy or lack any TLS-related settings (such as HTTPS or TLS listeners) will be automatically updated to use `AppGwSslPolicy20220101`.
130+
131+
### Will my gateway go in a Failed state?
132+
If you have chosen any deprecating TLS policy in the configuration of your gateway and don’t update it to a supported policy by August 2025, your gateway will enter a Failed state when performing a configuration update.
133+
134+
A nonfunctional TLS configuration, such a SSLProfile not linked to any listener, won't have any impact on the control plane of the gateway.
135+
136+
### How is the release for this change planned?
137+
Given the scale of our fleet, after 30 August 2025, the deprecation of TLS versions will be implemented separately for the Data and Control Planes (in that order). Any region-specific details won't be available; therefore, we strongly advise you to take all necessary actions before this retirement date.
138+
139+
### Is there any potential impact if I haven’t selected any TLS policy and my gateway uses only HTTP/TCP configurations?
140+
If your gateway doesn't use any TLS configuration—either through SSLPolicy, SSLProfile, HTTPS, or TLS Listeners—there will be no impact after August 2025.
141+
142+
110143

111144
## Next steps
112145

articles/cdn/classic-cdn-retirement-faq.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ Azure Front Door introduced two new tiers named Standard and Premium on March 29
1919

2020
In our ongoing efforts to provide the best product experience and streamline our portfolio of products and tiers, we're announcing the retirement of the Azure CDN Standard from Microsoft (classic) tier. This retirement will affect the public cloud and the Azure Government regions of Arizona and Texas, effective September 30, 2027. We strongly recommend all users of Azure CDN Standard from Microsoft (classic) to transition to Azure Front Door Standard and Premium.
2121

22+
> [!IMPORTANT]
23+
> - Starting August 15, 2025, Azure CDN from Microsoft (classic) will no longer support new domain onboarding or profile creation. Migrate to [AFD Standard and Premium](/azure/cdn/migrate-tier?toc=%2Fazure%2Ffrontdoor%2Ftoc.json) to create new domains or profiles and avoid service disruption. [Learn more](https://azure.microsoft.com/updates?id=498522)
24+
> - Starting August 15, 2025, Azure CDN from Microsoft (classic) will no longer support Managed certificates. To avoid service disruption, either [switch to Bring Your Own Certificate (BYOC)](/azure/cdn/cdn-custom-ssl?toc=%2Fazure%2Ffrontdoor%2Ftoc.json&tabs=option-1-default-enable-https-with-a-cdn-managed-certificate) or migrate to [AFD Standard and Premium](/azure/cdn/migrate-tier?toc=%2Fazure%2Ffrontdoor%2Ftoc.json) by this date. Existing managed certificates will be auto renewed before August 15, 2025, and remain valid until April 14, 2026. [Learn more](https://azure.microsoft.com/updates?id=498522)
25+
2226
## Frequently asked questions
2327

2428
### When is the retirement for Azure CDN Standard from Microsoft (classic)?
@@ -76,7 +80,7 @@ Currently, Azure CDN Standard from Microsoft (classic) retirement affects the pu
7680

7781
### Can I make updates to Azure CDN Standard from Microsoft (classic) resources?
7882

79-
You can still update your existing Azure CDN Standard from Microsoft (classic) resources using the Azure portal, Terraform, and all command line tools until September 30, 2027. However, you won't be able to create new Azure CDN Standard from Microsoft (classic) resources starting October 1, 2025. We strongly recommend you migrate to Azure Front Door Standard or Premium tier as soon as possible.
83+
You can still update your existing Azure CDN Standard from Microsoft (classic) resources using the Azure portal, Terraform, and all command line tools until September 30, 2027. Starting August 15, 2025, Azure CDN from Microsoft (classic) will no longer support new resource creation or new domain onboarding or Managed certificates. We strongly recommend you migrate to Azure Front Door Standard or Premium tier as soon as possible.
8084

8185
### Can I roll back to Azure CDN Standard from Microsoft (classic) after migration?
8286

articles/expressroute/TOC.yml

Lines changed: 5 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,8 @@
4040
href: howto-circuit-cli.md
4141
- name: Create an ExpressRoute circuit - Bicep
4242
href: quickstart-create-expressroute-vnet-bicep.md
43-
displayName: ARM, Resource Manager, Template
4443
- name: Create an ExpressRoute circuit - ARM template
45-
href: quickstart-create-expressroute-vnet-template.md
46-
displayName: Resource Manager
44+
href: expressroute-howto-circuit-resource-manager-template.md
4745
- name: Create an ExpressRoute circuit - Terraform
4846
href: quickstart-create-expressroute-vnet-terraform.md
4947
- name: Configure
@@ -93,13 +91,7 @@
9391
- name: Routing Microsoft 365 traffic over ExpressRoute
9492
href: /microsoft-365/enterprise/azure-expressroute?toc=/azure/expressroute/TOC.json
9593
- name: Configure route filters for Microsoft peering
96-
items:
97-
- name: Azure portal
98-
href: how-to-routefilter-portal.md
99-
- name: Azure PowerShell
100-
href: how-to-routefilter-powershell.md
101-
- name: Azure CLI
102-
href: how-to-routefilter-cli.md
94+
href: how-to-routefilter-portal.md
10395
- name: QoS requirements
10496
href: expressroute-qos.md
10597
- name: Routing Microsoft PSTN traffic over ExpressRoute
@@ -157,13 +149,7 @@
157149
- name: Overview
158150
href: expressroute-erdirect-about.md
159151
- name: Configure ExpressRoute Direct
160-
items:
161-
- name: Azure portal
162-
href: how-to-expressroute-direct-portal.md
163-
- name: Azure PowerShell
164-
href: expressroute-howto-erdirect.md
165-
- name: Azure CLI
166-
href: expressroute-howto-expressroute-direct-cli.md
152+
href: how-to-expressroute-direct-portal.md
167153
- name: Configure MACsec for ExpressRoute Direct ports
168154
href: expressroute-howto-macsec.md
169155
- name: Rate limit for ExpressRoute Direct circuit
@@ -284,12 +270,8 @@
284270
href: planned-maintenance.md
285271
- name: Configure controlled gateway maintenance
286272
href: customer-controlled-gateway-maintenance.md
287-
- name: Work remotely
288-
items:
289-
- name: Support for working remotely
290-
href: ../networking/working-remotely-support.md?toc=/azure/expressroute/toc.json
291-
- name: Hybrid connectivity for remote users
292-
href: work-remotely-support.md
273+
- name: Support for working remotely
274+
href: ../networking/working-remotely-support.md?toc=/azure/expressroute/toc.json
293275
- name: Troubleshoot
294276
items:
295277
- name: Troubleshoot gateway migration

articles/expressroute/expressroute-howto-circuit-resource-manager-template.md

Lines changed: 6 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -6,27 +6,19 @@ author: duongau
66

77
ms.service: azure-expressroute
88
ms.topic: how-to
9-
ms.date: 11/13/2019
10-
ms.author: duau
9+
ms.date: 07/10/2025
10+
ms.author: duau
1111
ms.custom: devx-track-azurepowershell, devx-track-arm-template
1212
---
1313

1414
# Create an ExpressRoute circuit by using Azure Resource Manager template
1515

16-
> [!div class="op_single_selector"]
17-
> * [Azure portal](expressroute-howto-circuit-portal-resource-manager.md)
18-
> * [PowerShell](expressroute-howto-circuit-arm.md)
19-
> * [Azure CLI](howto-circuit-cli.md)
20-
> * [Azure Resource Manager template](expressroute-howto-circuit-resource-manager-template.md)
21-
> * [PowerShell (classic)](expressroute-howto-circuit-classic.md)
22-
>
23-
2416
Learn how to create an ExpressRoute circuit by deploying an Azure Resource Manager template by using Azure PowerShell. For more information on developing Resource Manager templates, see [Resource Manager documentation](../azure-resource-manager/index.yml) and the [template reference](/azure/templates/microsoft.network/expressroutecircuits).
2517

2618
## Before you begin
2719

2820
* Review the [prerequisites](expressroute-prerequisites.md) and [workflows](expressroute-workflows.md) before you begin configuration.
29-
* Ensure that you have permissions to create new networking resources. Contact your account administrator if you do not have the right permissions.
21+
* Ensure that you have permissions to create new networking resources. Contact your account administrator if you don't have the right permissions.
3022

3123
## <a name="create"></a>Create and provision an ExpressRoute circuit
3224

@@ -59,10 +51,10 @@ To create an ExpressRoute Circuit by deploying a template:
5951
6052
* **SKU tier** determines whether an ExpressRoute circuit is [Local](expressroute-faqs.md#expressroute-local), Standard, or [Premium](expressroute-faqs.md#expressroute-premium). You can specify *Local*, *Standard, or *Premium*.
6153
* **SKU family** determines the billing type. You can specify *Metereddata* for a metered data plan and *Unlimiteddata* for an unlimited data plan. You can change the billing type from *Metereddata* to *Unlimiteddata*, but you can't change the type from *Unlimiteddata* to *Metereddata*. A *Local* circuit is *Unlimiteddata* only.
62-
* **Peering Location** is the physical location where you are peering with Microsoft.
54+
* **Peering Location** is the physical location where you're peering with Microsoft.
6355
6456
> [!IMPORTANT]
65-
> The Peering Location indicates the [physical location](expressroute-locations.md) where you are peering with Microsoft. This is **not** linked to "Location" property, which refers to the geography where the Azure Network Resource Provider is located. While they are not related, it is a good practice to choose a Network Resource Provider geographically close to the Peering Location of the circuit.
57+
> The Peering Location indicates the [physical location](expressroute-locations.md) where you're peering with Microsoft. This Peering Location is **not** linked to "Location" property, which refers to the geography where the Azure Network Resource Provider is located. While they aren't related, it's a good practice to choose a Network Resource Provider geographically close to the Peering Location of the circuit.
6658
6759
The resource group name is the service bus namespace name with **rg** appended.
6860
@@ -83,7 +75,7 @@ You can delete your ExpressRoute circuit by selecting the **delete** icon. Note
8375
8476
* You must unlink all virtual networks from the ExpressRoute circuit. If this operation fails, check whether any virtual networks are linked to the circuit.
8577
* If the ExpressRoute circuit service provider provisioning state is **Provisioning** or **Provisioned** you must work with your service provider to deprovision the circuit on their side. We continue to reserve resources and bill you until the service provider completes deprovisioning the circuit and notifies us.
86-
* If the service provider has deprovisioned the circuit (the service provider provisioning state is set to **Not provisioned**), you can delete the circuit. This stops billing for the circuit.
78+
* Once the service provider provisioning state is set to **Not provisioned**, you can delete the circuit. Once the circuit is deleted, its billing will also stop.
8779
8880
You can delete your ExpressRoute circuit by running the following PowerShell command:
8981

0 commit comments

Comments
 (0)