Skip to content

Commit 81daabb

Browse files
committed
made changes to faq since private only is GA now
1 parent a3f2613 commit 81daabb

1 file changed

Lines changed: 3 additions & 20 deletions

File tree

articles/application-gateway/application-gateway-faq.yml

Lines changed: 3 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -321,29 +321,12 @@ sections:
321321
322322
- question: How do I use Application Gateway v2 with only a private frontend IP address?
323323
answer: |
324-
Application Gateway v2 currently supports private IP frontend configuration only (no public IP) via public preview. For more information, see [Private Application Gateway deployment (preview)](application-gateway-private-deployment.md).
324+
Application Gateway v2 now supports private IP frontend configuration only. For more information, see [Private Application Gateway deployment](application-gateway-private-deployment.md).
325325
326-
For current general availability support, Application Gateway v2 supports the following combinations:
326+
Application Gateway v2 supports the following combinations:
327327
* Private IP and public IP
328328
* Public IP only
329-
330-
To restrict traffic only to private IP addresses with current functionality, follow this process:
331-
1. Create an application gateway with both public and private frontend IP address.
332-
1. Don't create any listeners for the public frontend IP address. Application Gateway won't listen to any traffic on the public IP address if no listeners are created for it.
333-
1. Create and attach a [network security group](../virtual-network/network-security-groups-overview.md) for the Application Gateway subnet with the following configuration in the order of priority:
334-
335-
1. Allow traffic from **Source** as the service tag **GatewayManager**, **Destination** as **Any**, and the destination **Port** as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place.
336-
337-
1. Allow traffic from **Source** as the service tag **AzureLoadBalancer** and the destination **Port** as **Any**.
338-
339-
1. Deny all inbound traffic from **Source** as the service tag **Internet** and the destination **Port** as **Any**. Give this rule the *least priority* in the inbound rules.
340-
341-
1. Keep the default rules like **AllowVNetInBound** so that the access on a private IP address isn't blocked.
342-
343-
1. Outbound internet connectivity can't be blocked. Otherwise, you face issues with logging and metrics.
344-
345-
Sample NSG configuration for private IP-only access:
346-
![Application Gateway v2 NSG configuration for private IP access only](./media/application-gateway-faq/appgw-privip-nsg.png)
329+
* Private IP only
347330
348331
- question: How can I stop and start Application Gateway?
349332
answer: |

0 commit comments

Comments
 (0)