You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/configure-application-gateway-with-private-frontend-ip.md
+6-42Lines changed: 6 additions & 42 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: application-gateway
6
6
author: mbender-ms
7
7
ms.service: azure-application-gateway
8
8
ms.topic: how-to
9
-
ms.date: 07/11/2025
9
+
ms.date: 02/26/2026
10
10
ms.author: mbender
11
11
ms.custom: sfi-image-nochange
12
12
# Customer intent: "As a network administrator, I want to configure an internal load balancer with a private frontend IP for my application gateway, so that I can manage and optimize traffic for internal applications without exposing them to the Internet."
@@ -84,36 +84,6 @@ In this example, you create a new virtual network. You can create a virtual netw
84
84
28. Select **Next: Review + create**.
85
85
29. Review the settings on the summary page, and then select **Create** to create the network resources and the application gateway. It may take several minutes to create the application gateway. Wait until the deployment finishes successfully before moving on to the next section.
86
86
87
-
## Deploy Azure Bastion
88
-
89
-
Azure Bastion uses your browser to connect to VMs in your virtual network over remote desktop protocol (RDP) by using their private IP addresses. The VMs don't need public IP addresses, client software, or special configuration. For more information about Azure Bastion, see [Azure Bastion](/azure/bastion/bastion-overview).
1. In the search box at the top of the portal, enter **Bastion**. Select **Bastions** in the search results.
95
-
96
-
1. Select **+ Create**.
97
-
98
-
1. In the **Basics** tab of **Create a Bastion**, enter, or select the following information:
99
-
100
-
| Setting | Value |
101
-
|---|---|
102
-
|**Project details**||
103
-
| Subscription | Select your subscription. |
104
-
| Resource group | Select **myResourceGroupAG**. |
105
-
|**Instance details**||
106
-
| Name | Enter **bastion**. |
107
-
| Region | Select **Central US**. |
108
-
| Tier | Select **Developer**. |
109
-
|**Configure virtual networks**||
110
-
| Virtual network | Select **myVNet**. |
111
-
| Subnet | The **AzureBastionSubnet** is created automatically with an address space of **/26** or larger. |
112
-
113
-
1. Select **Review + create**.
114
-
115
-
1. Select **Create**.
116
-
117
87
## Add backend pool
118
88
119
89
The backend pool is used to route requests to the backend servers that serve the request. The backend can be composed of NICs, virtual machine scale sets, public IP addresses, internal IP addresses, fully qualified domain names (FQDN), and multitenant backends like Azure App Service. In this example, you use virtual machines as the target backend. You can either use existing virtual machines or create new ones. In this example, you create two virtual machines that Azure uses as backend servers for the application gateway.
@@ -146,6 +116,9 @@ To do this:
146
116
1. Select **Review + create**.
147
117
1. Review the settings on the summary page, and then select **Create**. It may take several minutes to create the VM. Wait until the deployment finishes successfully before moving on to the next section.
148
118
119
+
> [!NOTE]
120
+
> The default rules of the network security group block all inbound access from the internet, including RDP. To connect to the virtual machine, use Azure Bastion. For more information, see [Quickstart: Deploy Azure Bastion with default settings](../bastion/quickstart-host-portal.md).
121
+
149
122
### Install IIS
150
123
151
124
1. Open the Cloud Shell and ensure that it's set to **PowerShell**.
@@ -178,24 +151,15 @@ To do this:
178
151
179
152
## Create a client virtual machine
180
153
181
-
The client virtual machine is used to connect to the application gateway backend pool using Azure Bastion.
154
+
The client virtual machine is used to connect to the application gateway backend pool.
182
155
183
156
- Create a third virtual machine using the previous steps. Use myVM3 for the virtual machine name.
184
157
185
158
## Test the application gateway
186
159
187
160
1. On the myAppGateway page, select **Frontend IP Configurations** to note the frontend private IP address.
188
161

189
-
190
-
1. In the search box at the top of the portal, enter **Virtual machine**. Select **Virtual machines** in the search results.
191
-
192
-
1. Select **myVM3**.
193
-
194
-
1. Select **Connect** then **Connect via Bastion** in the **Overview** section.
195
-
196
-
1. Enter the username and password for the virtual machine. Select **Connect**.
197
-
198
-
1. Once connected to myVM3, open a web browser. Enter the private IP address of the application gateway in the address bar to access the backend pool.
162
+
2. Copy the private IP address, and then paste it into the browser address bar on myVM3 to access the application gateway backend pool.
0 commit comments