Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit 60c68e7

Browse files
committedMar 10, 2019
updating image and minor changes
1 parent e39e87c commit 60c68e7

File tree

2 files changed

+13
-11
lines changed

2 files changed

+13
-11
lines changed
 

‎articles/application-gateway/configuration-overview.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -16,18 +16,20 @@ Application gateway comprises of several components that can be configured in di
1616

1717
![application-gateway-components](.\media\configuration-overview\configuration-overview1.png)
1818

19+
The example image above illustrates configuration of an application with 3 listeners. First two are multi-site listeners for http://acme.com/* and http://fabrikam.com/*, respectively. Both are listening on port 80. The third listener is a basic listener with end to end SSL termination.
20+
1921
## Prerequisites
2022

2123
### Azure virtual network and dedicated subnet
2224

23-
Application gateway is a dedicated deployment in your virtual network. You require an virtual network with a dedicated subnet for application gateway. You can have multiple instances of a given application gateway deployment in this subnet. You can also deploy other application gateways in the subnet but you cannot deploy any other resource in the application gateway subnet.
25+
Application gateway is a dedicated deployment in your virtual network. Within your virtual network, a dedicated subnet is required for your application gateway. You can have multiple instances of a given application gateway deployment in this subnet. You can also deploy other application gateways in the subnet but you cannot deploy any other resource in the application gateway subnet.
2426

2527
> [!NOTE]
2628
> Mixing Standard_v2 and Standard Application Gateway on the same subnet is not supported.
2729
2830
#### Size of the subnet
2931

30-
Application Gateway consumes one private IP address per instance, plus another private IP address if a private frontend IP configuration is configured. Also, Azure reserves the first four and last IP address in each subnet for internal usage. For example, if an application gateway is set to three instances and no private frontend IP, then a /29 subnet size or greater is needed. In this case, the application gateway uses three IP addresses. If you have three instances and an IP address for the private frontend IP configuration, then a /28 subnet size or greater is needed as four IP addresses are required.
32+
In case of v1 SKU, application Gateway consumes one private IP address per instance, plus another private IP address if a private frontend IP configuration is configured. Also, Azure reserves the first four and last IP address in each subnet for internal usage. For example, if an application gateway is set to three instances and no private frontend IP, then a /29 subnet size or greater is needed. In this case, the application gateway uses three IP addresses. If you have three instances and an IP address for the private frontend IP configuration, then a /28 subnet size or greater is needed as four IP addresses are required.
3133

3234
#### Network Security Groups supported on the Application Gateway subnet
3335

@@ -39,23 +41,23 @@ Network Security Groups (NSGs) are supported on the Application Gateway subnet w
3941

4042
- Traffic from the AzureLoadBalancer tag must be allowed.
4143

42-
##### Whitelist Application Gateway access to a few source IPs
44+
##### Whitelist Application Gateway access to a few source IPs
4345

44-
This scenario can be done using NSGs on the application gateway subnet. The following restrictions should be put on the subnet in the listed order of priority:
46+
This scenario can be done using NSGs on the application gateway subnet. The following restrictions should be put on the subnet in the listed order of priority:
4547

46-
1. Allow incoming traffic from source IP/IP range.
47-
2. Allow incoming requests from all sources to ports 65503-65534 for [backend health communication](https://docs.microsoft.com/en-us/azure/application-gateway/application-gateway-diagnostics). This port range is required for Azure infrastructure communication. They are protected (locked down) by Azure certificates. Without proper certificates, external entities, including the customers of those gateways, will not be able to initiate any changes on those endpoints.
48-
3. Allow incoming Azure Load Balancer probes (AzureLoadBalancer tag) and inbound virtual network traffic (VirtualNetwork tag) on the [NSG](https://docs.microsoft.com/en-us/azure/virtual-network/security-overview).
49-
4. Block all other incoming traffic with a Deny all rule.
50-
5. Allow outbound traffic to the internet for all destinations.
48+
1. Allow incoming traffic from source IP/IP range.
49+
2. Allow incoming requests from all sources to ports 65503-65534 for [backend health communication](https://docs.microsoft.com/en-us/azure/application-gateway/application-gateway-diagnostics). This port range is required for Azure infrastructure communication. They are protected (locked down) by Azure certificates. Without proper certificates, external entities, including the customers of those gateways, will not be able to initiate any changes on those endpoints.
50+
3. Allow incoming Azure Load Balancer probes (AzureLoadBalancer tag) and inbound virtual network traffic (VirtualNetwork tag) on the [NSG](https://docs.microsoft.com/en-us/azure/virtual-network/security-overview).
51+
4. Block all other incoming traffic with a Deny all rule.
52+
5. Allow outbound traffic to the internet for all destinations.
5153

5254
#### User-defined routes supported on the Application Gateway subnet
5355

54-
User-defined routes (UDRs) are supported on the application gateway subnet, as long as they do not alter the end-to-end request/response communication.
56+
In case of v1 SKU, User-defined routes (UDRs) are supported on the application gateway subnet, as long as they do not alter the end-to-end request/response communication.
5557

5658
For example, you can set up a UDR in the application gateway subnet to point to a firewall appliance for packet inspection, but you must ensure that the packet can reach its intended destination post inspection. Failure to do so might result in incorrect health probe or traffic routing behavior. This includes learned routes or default 0.0.0.0/0 routes propagated by ExpressRoute or VPN Gateways in the virtual network.
5759

58-
UDRs on the application gateway subnet are not supported on the v2 SKU. For more information, see [Autoscaling and Zone-redundant Application Gateway (Public Preview)](https://docs.microsoft.com/azure/application-gateway/application-gateway-autoscaling-zone-redundant#known-issues-and-limitations).
60+
In case of v2 SKU, UDRs on the application gateway subnet are not supported. For more information, see [Autoscaling and Zone-redundant Application Gateway (Public Preview)](https://docs.microsoft.com/azure/application-gateway/application-gateway-autoscaling-zone-redundant#known-issues-and-limitations).
5961

6062
## Frontend IP
6163

Loading

0 commit comments

Comments
 (0)
Please sign in to comment.