Skip to content

Commit ec45d65

Browse files
Merge pull request #268757 from DevOpsStyle/azure-app-gateway-private-frontend-ip-note
Azure Application Gateway Private Frontend IP - information about AppGTWSubnet
2 parents d95fc11 + fd74530 commit ec45d65

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/application-gateway/application-gateway-private-deployment.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Each of these features can be configured independently. For example, a public IP
3636

3737
The functionality of the new controls of private IP frontend configuration, control over NSG rules, and control over route tables, are currently in public preview. To join the public preview, you can opt in to the experience using the Azure portal, PowerShell, CLI, or REST API.
3838

39-
When you join the preview, all new Application Gateways will provision with the ability to define any combination of the NSG, Route Table, or private IP configuration features. If you wish to opt out from the new functionality and return to the current generally available functionality of Application Gateway, you can do so by [unregistering from the preview](#unregister-from-the-preview).
39+
When you join the preview, all new Application Gateways provision with the ability to define any combination of the NSG, Route Table, or private IP configuration features. If you wish to opt out from the new functionality and return to the current generally available functionality of Application Gateway, you can do so by [unregistering from the preview](#unregister-from-the-preview).
4040

4141
For more information about preview features, see [Set up preview features in Azure subscription](../azure-resource-manager/management/preview-features.md)
4242

@@ -186,9 +186,13 @@ The resource tag is cosmetic, and serves to confirm that the gateway has been pr
186186
> [!TIP]
187187
> The **EnhancedNetworkControl** tag can be helpful when existing Application Gateways were deployed in the subscription prior to feature enablement and you would like to differentiate which gateway can utilize the new functionality.
188188
189+
## Application Gateway Subnet
190+
191+
Application Gateway Subnet is the subnet within the Virtual Network where the Application Gateway Resources will be deployed. In the Frontend Private Ip configuration, is important that this subnet can reach privately the resources that want to connect to your exposed app or site.
192+
189193
## Outbound Internet connectivity
190194

191-
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) are not able to egress traffic destined to the Internet. This configuration affects communication to backend targets that are publicly accessible via the Internet.
195+
Application Gateway deployments that contain only a private frontend IP configuration (do not have a public IP frontend configuration) aren't able to egress traffic destined to the Internet. This configuration affects communication to backend targets that are publicly accessible via the Internet.
192196

193197
To enable outbound connectivity from your Application Gateway to an Internet facing backend target, you can utilize [Virtual Network NAT](../virtual-network/nat-gateway/nat-overview.md) or forward traffic to a virtual appliance that has access to the Internet.
194198

@@ -357,7 +361,7 @@ If Application Gateway has a backend target or key vault reference to a private
357361

358362
### Network Watcher integration
359363

360-
Connection troubleshoot and NSG diagnostics will return an error when running check and diagnostic tests.
364+
Connection troubleshoots and NSG diagnostics return an error when running check and diagnostic tests.
361365

362366
### Coexisting v2 Application Gateways created prior to enablement of enhanced network control
363367

@@ -369,7 +373,7 @@ If a subnet shares Application Gateway v2 deployments that were created both pri
369373
### Unknown Backend Health status
370374

371375
If backend health is _Unknown_, you may see the following error:
372-
+ The backend health status could not be retrieved. This happens when an NSG/UDR/Firewall on the application gateway subnet is blocking traffic on ports 65503-65534 in case of v1 SKU, and ports 65200-65535 in case of the v2 SKU or if the FQDN configured in the backend pool could not be resolved to an IP address. To learn more visit - https://aka.ms/UnknownBackendHealth.
376+
+ The backend health status could not be retrieved. This happens when an NSG/UDR/Firewall on the application gateway subnet is blocking traffic on ports 65503-65534 if there is v1 SKU, and ports 65200-65535 if there is v2 SKU or if the FQDN configured in the backend pool could not be resolved to an IP address. To learn more visit - https://aka.ms/UnknownBackendHealth.
373377

374378
This error can be ignored and will be clarified in a future release.
375379

0 commit comments

Comments
 (0)