You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/application-gateway/application-gateway-faq.yml
+3-20Lines changed: 3 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -321,29 +321,12 @@ sections:
321
321
322
322
- question: How do I use Application Gateway v2 with only a private frontend IP address?
323
323
answer: |
324
-
Application Gateway v2 currently supports private IP frontend configuration only (no public IP) via public preview. For more information, see [Private Application Gateway deployment (preview)](application-gateway-private-deployment.md).
324
+
Application Gateway v2 now supports private IP frontend configuration only. For more information, see [Private Application Gateway deployment](application-gateway-private-deployment.md).
325
325
326
-
For current general availability support, Application Gateway v2 supports the following combinations:
326
+
Application Gateway v2 supports the following combinations:
327
327
* Private IP and public IP
328
328
* Public IP only
329
-
330
-
To restrict traffic only to private IP addresses with current functionality, follow this process:
331
-
1. Create an application gateway with both public and private frontend IP address.
332
-
1. Don't create any listeners for the public frontend IP address. Application Gateway won't listen to any traffic on the public IP address if no listeners are created for it.
333
-
1. Create and attach a [network security group](../virtual-network/network-security-groups-overview.md) for the Application Gateway subnet with the following configuration in the order of priority:
334
-
335
-
1. Allow traffic from **Source** as the service tag **GatewayManager**, **Destination** as **Any**, and the destination **Port** as **65200-65535**. This port range is required for Azure infrastructure communication. These ports are protected (locked down) by certificate authentication. External entities, including the gateway user administrators, can't initiate changes on those endpoints without appropriate certificates in place.
336
-
337
-
1. Allow traffic from **Source** as the service tag **AzureLoadBalancer** and the destination **Port** as **Any**.
338
-
339
-
1. Deny all inbound traffic from **Source** as the service tag **Internet** and the destination **Port** as **Any**. Give this rule the *least priority* in the inbound rules.
340
-
341
-
1. Keep the default rules like **AllowVNetInBound** so that the access on a private IP address isn't blocked.
342
-
343
-
1. Outbound internet connectivity can't be blocked. Otherwise, you face issues with logging and metrics.
344
-
345
-
Sample NSG configuration for private IP-only access:
346
-

329
+
* Private IP only
347
330
348
331
- question: How can I stop and start Application Gateway?
0 commit comments