Skip to content

Commit f58af3c

Browse files
Merge pull request #280852 from greg-lindsay/appgw-freshness
replace pull 279457
2 parents 155a3bc + 01cc39d commit f58af3c

File tree

2 files changed

+26
-23
lines changed

2 files changed

+26
-23
lines changed

articles/application-gateway/application-gateway-faq.yml

Lines changed: 24 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ metadata:
66
author: greg-lindsay
77
ms.service: application-gateway
88
ms.topic: faq
9-
ms.date: 06/27/2024
9+
ms.date: 07/15/2024
1010
ms.author: greglin
1111
ms.custom: references_regions, devx-track-azurepowershell
1212
title: Frequently asked questions about Application Gateway
@@ -284,31 +284,33 @@ sections:
284284
Application Gateway v1 SKUs can run in a FIPS 140-2 approved mode of operation, which is commonly referred to as "FIPS mode." FIPS mode calls a FIPS 140-2 validated cryptographic module that ensures FIPS-compliant algorithms for encryption, hashing, and signing when enabled. To ensure FIPS mode is enabled, the `FIPSMode` setting must be configured via PowerShell, Azure Resource Manager template, or REST API after the subscription has been enrolled to enable configuration of `FIPSmode`.
285285
286286
**Note:** As part of the FedRAMP compliance, US Government mandates that systems operate in a [FIPS-approved mode](/azure/compliance/offerings/offering-fips-140-2) after August 2024.
287-
**Steps to enable FIPS Mode in V1 SKU**
288287
289-
* Register the **‘AllowApplicationGatewayEnableFIPS’** feature to enroll the subscription for FIPS mode configuration.
288+
**Steps to enable FIPS Mode in V1 SKU**:
290289
291-
```azurepowershell-interactive
292-
Register-AzProviderFeature -FeatureName AllowApplicationGatewayEnableFIPS -ProviderNamespace Microsoft.Network
293-
```
294-
Use the following steps to enroll for FIPS Mode in Application Gateway V1 using the **Azure portal**
295-
1. Sign in to the Azure portal.
296-
1. In the search box, enter subscriptions and select **Subscriptions**.
297-
1. Select the link for your subscription's name.
298-
1. From the left menu, under **Settings** select **Preview features**.
299-
1. You see a list of available features and your current registration status.
300-
1. From Preview features type into the filter box **AllowApplicationGatewayEnableFIPS**, select the feature, and then select Register.
290+
**Step 1**: Register the **‘AllowApplicationGatewayEnableFIPS’** feature to enroll the subscription for FIPS mode configuration.
291+
292+
To register using Azure PowerShell, open a Cloud Shell prompt and enter the following:
293+
294+
```azurepowershell-interactive
295+
Register-AzProviderFeature -FeatureName AllowApplicationGatewayEnableFIPS -ProviderNamespace Microsoft.Network
296+
```
297+
298+
To register using the **Azure portal**:
301299
302-
* Once **step 1** is complete, the **enableFips** property needs to be set to True through PowerShell, Azure Resource Manager template, or REST API.
300+
- Sign in to the Azure portal and search for **Preview features**.
301+
- Enter **AllowApplicationGatewayEnableFIPS** into the filter box. Select **Application Gateway V1 Allow FIPS Mode**, and then select **Register**.
303302
304-
```azurepowershell-interactive
305-
# Get the application gateway
306-
$appgw = Get-AzApplicationGateway -Name <ApplicationGatewayName> -ResourceGroupName <ResourceGroupName>
307-
# Set the EnableFips property
308-
$appgw.EnableFips = $true
309-
# Update the application gateway
310-
Set-AzApplicationGateway -ApplicationGateway $appgw
311-
```
303+
**Step 2**: Set the **enableFips** property to **True** using PowerShell, Azure Resource Manager template, or REST API.
304+
305+
```azurepowershell-interactive
306+
# Get the application gateway
307+
$appgw = Get-AzApplicationGateway -Name <ApplicationGatewayName> -ResourceGroupName <ResourceGroupName>
308+
# Set the EnableFips property
309+
$appgw.EnableFips = $true
310+
# Update the application gateway
311+
Set-AzApplicationGateway -ApplicationGateway $appgw
312+
```
313+
312314
Changing FIPS mode doesn't affect the overall availability of cipher suites on V1 gateways. However, when using [elliptic curve cryptography](/windows/win32/secauthn/tls-elliptic-curves-in-windows-10-1607-and-later) for ciphers, with FIPS mode disabled you can use curve25519, NistP256, and NistP384 whereas with FIPS mode enabled only NistP256 and NistP384 are allowed and curve25519 is disabled. Since curve25519 becomes unavailable in FIPS mode, make sure your clients support NistP256 or NistP384 for secure communication before enabling FIPS.
313315
314316
- question: How do I use Application Gateway v2 with only a private frontend IP address?

articles/application-gateway/migrate-v1-v2.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: greg-lindsay
66
ms.service: application-gateway
77
ms.custom: devx-track-azurepowershell
88
ms.topic: how-to
9-
ms.date: 02/26/2024
9+
ms.date: 07/15/2024
1010
ms.author: greglin
1111
---
1212

@@ -33,6 +33,7 @@ This article primarily helps with the configuration migration. Client traffic mi
3333
* If you're running PowerShell locally, you also need to run `Connect-AzAccount` to create a connection with Azure.
3434
* Ensure that there's no existing Application gateway with the provided AppGW V2 Name and Resource group name in V1 subscription. This rewrites the existing resources.
3535
* If a public IP address is provided, ensure that it's in a succeeded state. If not provided and AppGWResourceGroupName is provided ensure that public IP resource with name AppGWV2Name-IP doesn’t exist in a resource group with the name AppGWResourceGroupName in the V1 subscription.
36+
* For the V1 SKU, authentication certificates are required to set up TLS connections with backend servers. The V2 SKU requires uploading [trusted root certificates](./certificates-for-backend-authentication.md) for the same purpose. While V1 allows the use of self-signed certificates as authentication certificates, V2 mandates [generating and uploading a self-signed Root certificate](./self-signed-certificates.md) if self-signed certificates are used in the backend.
3637
* Ensure that no other operation is planned on the V1 gateway or any associated resources during migration.
3738

3839
[!INCLUDE [cloud-shell-try-it.md](~/reusable-content/ce-skilling/azure/includes/cloud-shell-try-it.md)]

0 commit comments

Comments
 (0)