You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-faq.md
+25Lines changed: 25 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -376,6 +376,31 @@ Yes. If your configuration matches following scenario, you won't see allowed tra
376
376
- You have an NSG on the application gateway subnet
377
377
- You've enabled NSG flow logs on that NSG
378
378
379
+
### How do I use Application Gateway V2 with only private frontend IP address?
380
+
381
+
Application Gateway V2 currently does not support only private IP mode. It supports the following combinations
382
+
1. Private IP and Public IP
383
+
2. Public IP only
384
+
385
+
But if you'd like to use Application Gateway V2 with only private IP, you can follow the process below:
386
+
1. Create an Application Gateway with both public and private frontend IP address
387
+
2. Do not create any listeners for the public frontend IP address. Application Gateway will not listen to any traffic on the public IP address if no listeners are created for it.
388
+
3. Create and attach a [Network Security Group](https://docs.microsoft.com/azure/virtual-network/security-overview) for the Application Gateway subnet with the following configuration in the order of priority:
389
+
390
+
a. Allow traffic from Source as **GatewayManager** service tag and Destination as **Any** and Destination port as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the Gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place
391
+
392
+
b. Allow traffic from Source as **AzureLoadBalancer** service tag and Destination and destination port as **Any**
393
+
394
+
c. Deny all inbound traffic from Source as **Internet** service tag and Destination and destination port as **Any**. Give this rule the *least priority* in the inbound rules
395
+
396
+
d. Keep the default rules like allowing VirtualNetwork inbound so that the access on private IP address is not blocked
397
+
398
+
e. Outbound internet connectivity can't be blocked. Otherwise, you will face issues with logging, metrics, etc.
399
+
400
+
Sample NSG configuration for private IP only access:
401
+

402
+
403
+
379
404
## Next steps
380
405
381
406
To learn more about Application Gateway, see [What is Azure Application Gateway?](overview.md).
Copy file name to clipboardExpand all lines: articles/application-gateway/configuration-overview.md
+7-7Lines changed: 7 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -42,9 +42,9 @@ We recommend that you use a subnet size of at least /28. This size gives you 11
42
42
43
43
#### Network security groups on the Application Gateway subnet
44
44
45
-
Network security groups (NSGs) are supported on Application Gateway. But there are several restrictions:
45
+
Network security groups (NSGs) are supported on Application Gateway. But there are some restrictions:
46
46
47
-
- You must allow incoming Internet traffic on TCP ports 65503-65534 for the Application Gateway v1 SKU, and TCP ports 65200-65535 for the v2 SKU with the destination subnet as *Any*. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by Azure certificates. External entities, including the customers of those gateways, can't initiate changes on those endpoints without appropriate certificates in place.
47
+
- You must allow incoming Internet traffic on TCP ports 65503-65534 for the Application Gateway v1 SKU, and TCP ports 65200-65535 for the v2 SKU with the destination subnet as **Any** and source as **GatewayManager** service tag. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by Azure certificates. External entities, including the customers of those gateways, can't initiate changes on those endpoints without appropriate certificates in place.
48
48
49
49
- Outbound internet connectivity can't be blocked. Default outbound rules in the NSG allow internet connectivity. We recommend that you:
50
50
@@ -53,12 +53,12 @@ Network security groups (NSGs) are supported on Application Gateway. But there a
53
53
54
54
- Traffic from the **AzureLoadBalancer** tag must be allowed.
55
55
56
-
#####Allow Application Gateway access to a few source IPs
56
+
#### Allow Application Gateway access to a few source IPs
57
57
58
58
For this scenario, use NSGs on the Application Gateway subnet. Put the following restrictions on the subnet in this order of priority:
59
59
60
-
1. Allow incoming traffic from a source IP or IP range and the destination as either the entire Application Gateway subnet, or to the specific configured private front-end IP. The NSG doesn't work on a public IP.
61
-
2. Allow incoming requests from all sources to ports 65503-65534 for the Application Gateway v1 SKU, and ports 65200-65535 for v2 SKU for [back-end health communication](https://docs.microsoft.com/azure/application-gateway/application-gateway-diagnostics). This port range is required for Azure infrastructure communication. These ports are protected (locked down) by Azure certificates. Without appropriate certificates in place, external entities can't initiate changes on those endpoints.
60
+
1. Allow incoming traffic from a source IP or IP range with the destination as the entire Application Gateway subnet address range and destination port as your inbound access port, for example, port 80 for HTTP access.
61
+
2. Allow incoming requests from source as **GatewayManager** service tag and destination as **Any** and destination ports as 65503-65534 for the Application Gateway v1 SKU, and ports 65200-65535 for v2 SKU for [back-end health communication](https://docs.microsoft.com/azure/application-gateway/application-gateway-diagnostics). This port range is required for Azure infrastructure communication. These ports are protected (locked down) by Azure certificates. Without appropriate certificates in place, external entities can't initiate changes on those endpoints.
62
62
3. Allow incoming Azure Load Balancer probes (*AzureLoadBalancer* tag) and inbound virtual network traffic (*VirtualNetwork* tag) on the [network security group](https://docs.microsoft.com/azure/virtual-network/security-overview).
63
63
4. Block all other incoming traffic by using a deny-all rule.
64
64
5. Allow outbound traffic to the internet for all destinations.
@@ -70,10 +70,10 @@ For the v1 SKU, user-defined routes (UDRs) are supported on the Application Gate
70
70
For the v2 SKU, UDRs are not supported on the Application Gateway subnet. For more information, see [Azure Application Gateway v2 SKU](application-gateway-autoscaling-zone-redundant.md#differences-with-v1-sku).
71
71
72
72
> [!NOTE]
73
-
> UDRs are not supported for the v2 SKU. If you require UDRs you should continue to deploy v1 SKU.
73
+
> UDRs are not supported for the v2 SKU as of now.
74
74
75
75
> [!NOTE]
76
-
> Using UDRs on the Application Gateway subnet causes the health status in the [back-end health view](https://docs.microsoft.com/azure/application-gateway/application-gateway-diagnostics#back-end-health) to appear as "Unknown." It also causes generation of Application Gateway logs and metrics to fail. We recommend that you don't use UDRs on the Application Gateway subnet so that you can view the back-end health, logs, and metrics.
76
+
> Using UDRs on the Application Gateway subnet might cause the health status in the [back-end health view](https://docs.microsoft.com/azure/application-gateway/application-gateway-diagnostics#back-end-health) to appear as "Unknown." It also might cause generation of Application Gateway logs and metrics to fail. We recommend that you don't use UDRs on the Application Gateway subnet so that you can view the back-end health, logs, and metrics.
0 commit comments