Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 41b4957

Browse files
committedSep 18, 2019
updated 3 docs with latest updates
1 parent 7a2299d commit 41b4957

File tree

6 files changed

+34
-22
lines changed

6 files changed

+34
-22
lines changed
 

‎articles/application-gateway/application-gateway-backend-health-troubleshooting.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -100,16 +100,16 @@ can start troubleshooting the issue.
100100

101101
> [!NOTE]
102102
> The default probe request is sent in the format of
103-
<protocol>://127.0.0.1:<port>/, for example, <http://127.0.0.1/> for
103+
\<protocol\>://127.0.0.1:\<port\>/, for example, <http://127.0.0.1/> for
104104
an http probe on port 80 and considers only a response of HTTP Status
105105
codes 200-399 as healthy response. The protocol and the destination port
106106
are inherited from HTTP Settings. If you want Application Gateway to
107107
probe on a different protocol, hostname, or path and accept a different
108108
status code as healthy, configure a custom probe and associate it with
109109
the HTTP Settings.
110110

111-
### Error Messages
112-
111+
Error Messages
112+
------------------------
113113
#### Backend Server timeout
114114

115115
**Message:** Time taken by the backend to respond to application

‎articles/application-gateway/application-gateway-websocket.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ It's used in apps that benefit from fast, real-time communication, such as chat,
2222

2323
To establish a WebSocket connection, a specific HTTP-based handshake is exchanged between the client and the server. If successful, the application-layer protocol is "upgraded" from HTTP to WebSockets, using the previously established TCP connection. Once this occurs, HTTP is completely out of the picture; data can be sent or received using the WebSocket protocol by both endpoints, until the WebSocket connection is closed.
2424

25-
![addcert](./media/application-gateway-websocket/websocket.png)
25+
![websocket](./media/application-gateway-websocket/websocket.png)
2626

2727
### Listener configuration element
2828

@@ -62,7 +62,7 @@ An existing HTTP listener can be used to support WebSocket traffic. The followin
6262

6363
## BackendAddressPool, BackendHttpSetting, and Routing rule configuration
6464

65-
A BackendAddressPool is used to define a backend pool with WebSocket enabled servers. The backendHttpSetting is defined with a backend port 80 and 443. The properties for cookie-based affinity and requestTimeouts are not relevant to WebSocket traffic. There is no change required in the routing rule, 'Basic' is used to tie the appropriate listener to the corresponding backend address pool.
65+
A BackendAddressPool is used to define a backend pool with WebSocket enabled servers. The backendHttpSetting is defined with a backend port 80 and 443. The request timeout value in HTTP Settings also applies to the WebSocket session. There is no change required in the routing rule, which is used to tie the appropriate listener to the corresponding backend address pool.
6666

6767
```json
6868
"requestRoutingRules": [{

‎articles/application-gateway/end-to-end-ssl-portal.md

Lines changed: 29 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,13 @@ ms.custom: mvc
1414
This article shows you how to use the Azure portal to configure end-to-end SSL encryption with an application gateway v1 SKU.
1515

1616
> [!NOTE]
17-
> Application Gateway v2 SKU requires trusted root certificates for enabling end-to-end configuration. Portal support for adding trusted root certificates is not available yet. Therefore, in case of v2 SKU see [configure end-to-end SSL using PowerShell](https://docs.microsoft.com/azure/application-gateway/application-gateway-end-to-end-ssl-powershell).
17+
> Application Gateway v2 SKU requires trusted root certificates for enabling end-to-end configuration.
1818
1919
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2020

2121
## Before you begin
2222

23-
To configure end-to-end SSL with an application gateway, a certificate is required for the gateway and certificates are required for the back-end servers. The gateway certificate is used to derive a symmetric key as per SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. For end-to-end SSL encryption, the back end must be whitelisted with the application gateway. To do this, upload the public certificate of the back-end servers, also known as authentication certificates, to the application gateway. Adding the certificate ensures that the application gateway only communicates with known back-end instances. This further secures the end-to-end communication.
23+
To configure end-to-end SSL with an Application Gateway, a certificate is required for the gateway and certificates are required for the back-end servers. The gateway certificate is used to derive a symmetric key as per SSL protocol specification. The symmetric key is then used to encrypt and decrypt the traffic sent to the gateway. For end-to-end SSL encryption, the right back-end servers must be allowed in the application gateway. To do this, upload the public certificate of the back-end servers, also known as Authentication Certificates (v1) or Trusted Root Certificates (v2), to the Application Gateway. Adding the certificate ensures that the Application Gateway only communicates with known back-end instances. This further secures the end-to-end communication.
2424

2525
To learn more, see [SSL termination and end-to-end SSL](https://docs.microsoft.com/azure/application-gateway/ssl-overview).
2626

@@ -32,32 +32,39 @@ To create a new application gateway with end-to-end SSL encryption, you'll need
3232

3333
Refer to this article to understand how to [enable SSL termination while creating a new application gateway](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal).
3434

35-
### Whitelist certificates for backend servers
35+
### Add authentication/root certificate of back-end servers
3636

3737
1. Select **All resources**, and then select **myAppGateway**.
3838

3939
2. Select **HTTP settings** from the left menu. Azure automatically created a default HTTP setting, **appGatewayBackendHttpSettings**, when you created the application gateway.
4040

4141
3. Select **appGatewayBackendHttpSettings**.
4242

43-
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates** will appear.
43+
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** will appear.
4444

45-
5. Under **Backend authentication certificates**, choose **Create new**.
45+
5. Choose **Create new**.
4646

47-
6. Enter suitable **Name**.
47+
6. Enter a suitable **Name**.
4848

49-
7. Upload the certificate using the **Upload CER certificate** box.![addcert](./media/end-to-end-ssl-portal/addcert.png)
49+
7. Select the certificate file using the **Upload CER certificate** box.
5050

51-
> [!NOTE]
52-
> The certificate provided in this step should be the public key of the .pfx certificate present on the back end. Export the certificate (not the root certificate) installed on the back-end server in Claim, Evidence, and Reasoning (CER) format and use it in this step. This step whitelists the back end with the application gateway.
51+
For Standard and WAF (v1) Application Gateways, you should upload the public key of your backend server certificate in .cer format.
52+
53+
![addcert](./media/end-to-end-ssl-portal/addcert.png)
54+
55+
For Standard_v2 and WAF_v2 Application Gateways, you should upload the **root certificate** of the backend server certificate in .cer format. If the backend certificate is issued by a well-known CA, you can check the "Use Well Known CA certificate" box and there is no need to upload a certificate.
56+
57+
![addtrustedrootcert](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
58+
59+
![rootcert](./media/end-to-end-ssl-portal/trustedrootcert.png)
5360

5461
8. Select **Save**.
5562

5663
## Enable end-to-end SSL for existing application gateway
5764

5865
To configure an existing application gateway with end-to-end SSL encryption, you'll need to first enable SSL termination in the listener. This will enable SSL encryption for the communication between the client and application gateway. Then, you'll need to whitelist certificates for backend servers in the HTTP settings to enable SSL encryption for the communication between the application gateway and backend servers, accomplishing end-to-end SSL encryption.
5966

60-
You'll need to use a listener with HTTPS protocol and certificate for enabling SSL termination. You can't change the protocol of an existing listener. So, you can either choose to use an existing listener with HTTPS protocol and certificate, or create a new listener. In case you choose the former, you can ignore the below mentioned steps to **Enable SSL termination in existing application gateway** and directly move to **Whitelist certificates for backend servers** section. If you choose the latter, use these steps.
67+
You'll need to use a listener with HTTPS protocol and certificate for enabling SSL termination. So, you can either choose to use an existing listener with HTTPS protocol and certificate, or create a new listener. In case you choose the former, you can ignore the below mentioned steps to **Enable SSL termination in existing application gateway** and directly move to **Add authentication/trusted root certificates for back-end servers** section. If you choose the latter, use these steps.
6168

6269
### Enable SSL termination in existing application gateway
6370

@@ -72,30 +79,35 @@ You'll need to use a listener with HTTPS protocol and certificate for enabling S
7279
5. Upload the PFX certificate that you intend to use for SSL termination between the client and application gateway.
7380

7481
> [!NOTE]
75-
> For testing purposes, you can use a self-signed certificate. You should not use self-signed certificate for production workloads. Learn how to [create a self-signed certificate](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal#create-a-self-signed-certificate).
82+
> For testing purposes, you can use a self-signed certificate. but not advised for production workloads as they are harder to manage and not completely secure. Learn how to [create a self-signed certificate](https://docs.microsoft.com/azure/application-gateway/create-ssl-portal#create-a-self-signed-certificate).
7683
7784
6. Add other required settings for the **Listener** as per your requirement.
7885

7986
7. Select **OK** to save.
8087

81-
### Whitelist certificates for backend servers
88+
### Add authentication/trusted root certificates of back-end servers
8289

8390
1. Select **All resources**, and then select **myAppGateway**.
8491

8592
2. Select **HTTP settings** from the left menu. You can either whitelist certificates in an existing backend HTTP setting or create a new HTTP setting. In the below step, we will whitelist certificate for the default HTTP setting, **appGatewayBackendHttpSettings**.
8693

8794
3. Select **appGatewayBackendHttpSettings**.
8895

89-
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates** will appear.
96+
4. Under **Protocol**, select **HTTPS**. A pane for **Backend authentication certificates or Trusted root certificates** will appear.
9097

91-
5. Under **Backend authentication certificates**, choose **Create new**.
98+
5. Choose **Create new**.
9299

93100
6. Enter suitable **Name**.
94101

95-
7. Upload the certificate using the **Upload CER certificate** box.![addcert](./media/end-to-end-ssl-portal/addcert.png)
102+
7. Select the certificate file using the **Upload CER certificate** box.
96103

97-
> [!NOTE]
98-
> The certificate provided in this step should be the public key of the .pfx certificate present on the back end. Export the certificate (not the root certificate) installed on the back-end server in Claim, Evidence, and Reasoning (CER) format and use it in this step. This step whitelists the back end with the application gateway.
104+
For Standard and WAF (v1) Application Gateways, you should upload the public key of your backend server certificate in .cer format.
105+
106+
![addcert](./media/end-to-end-ssl-portal/addcert.png)
107+
108+
For Standard_v2 and WAF_v2 Application Gateways, you should upload the **root certificate** of the backend server certificate in .cer format. If the backend certificate is issued by a well-known CA, you can check the "Use Well Known CA certificate" box and there is no need to upload a certificate.
109+
110+
![addtrustedrootcert](./media/end-to-end-ssl-portal/trustedrootcert-portal.png)
99111

100112
8. Select **Save**.
101113

Loading
Loading
Loading

0 commit comments

Comments
 (0)
Please sign in to comment.