Muokkaa

Jaa


Configure Application Gateway with a frontend public IPv6 address using the Azure portal

Azure Application Gateway supports dual stack (IPv4 and IPv6) frontend connections from clients. To use IPv6 frontend connectivity, you need to create a new Application Gateway. Currently you can’t upgrade existing IPv4 only Application Gateways to dual stack (IPv4 and IPv6) Application Gateways. Also, currently backend IPv6 addresses aren't supported.

In this article, you use the Azure portal to create an IPv6 Azure Application Gateway and test it to ensure it works correctly. You assign listeners to ports, create rules, and add resources to a backend pool. For the sake of simplicity, a simple setup is used with two public frontend IP addresses (IPv4 and IPv6), a basic listener to host a single site on the application gateway, a basic request routing rule, and two virtual machines (VMs) in the backend pool.

To support IPv6 connectivity, you must create a dual stack VNet. This dual stack VNet has subnets for both IPv4 and IPv6. Azure VNets already provide dual-stack capability.

For more information about the components of an application gateway, see Application gateway components.

Overview

The Azure portal is used to create an IPv6 Azure Application Gateway. Testing is performed to verify it works correctly.

You learn how to:

You can also complete this quickstart using Azure PowerShell.

Regions and availability

The IPv6 Application Gateway is available to all public cloud regions where Application Gateway v2 SKU is supported. It's also available in Microsoft Azure operated by 21Vianet and Azure Government

Limitations

  • Only v2 SKU supports a frontend with both IPv4 and IPv6 addresses
  • IPv6 backends are currently not supported
  • IPv6 private Link is currently not supported
  • IPv6-only Application Gateway is currently not supported. Application Gateway must be dual stack (IPv6 and IPv4)
  • Application Gateway Ingress Controller (AGIC) doesn't support IPv6 configuration
  • Existing IPv4 application gateways can't be upgraded to dual stack application gateways
  • WAF custom rules with an IPv6 match condition are not currently supported

Prerequisites

An Azure account with an active subscription is required. If you don't already have an account, you can create an account for free.

Sign in to the Azure portal with your Azure account.

Create an application gateway

Create the application gateway using the tabs on the Create application gateway page.

  1. On the Azure portal menu or from the Home page, select Create a resource.
  2. Under Categories, select Networking and then select Application Gateway in the Popular Azure services list.

Basics tab

  1. On the Basics tab, enter the following values for the application gateway settings:

    • Subscription: Select your subscription. For example, _mysubscription.

    • Resource group: Select a resource group. If one doesn't exist, select Create new to create it. For example, myresourcegroupAG.

    • Application gateway name: Enter a name for the application gateway. For example, myappgw.

    • IP address type: Select Dual stack (IPv4 & IPv6).

      A screenshot of create new application gateway: Basics.

  2. Configure virtual network: For Azure to communicate between the resources that you create, a dual stack virtual network is needed. You can either create a new dual stack virtual network or choose an existing dual stack network. In this example, you create a new dual stack virtual network at the same time that you create the application gateway.

    Application Gateway instances are created in separate subnets. One dual-stack subnet and one IPv4-only are created in this example: The IPv4 and IPv6 subnets (provisioned as one dual-stack subnet) are assigned to the application gateway. The IPv4 subnet is for the backend servers.

    Note

    Virtual network service endpoint policies are currently not supported in an Application Gateway subnet. Under Configure virtual network, create a new virtual network by selecting Create new. In the Create virtual network pane, enter the following values to create the virtual network and two subnets:

    • Name: Enter a name for the virtual network. For example, myVNet.
    • Subnet name (Application Gateway subnet): The Subnets grid shows a subnet named default. Change the name of this subnet to myAGSubnet.
    • Address range - The default IPv4 address ranges for the VNet and the subnet are 10.0.0.0/16 and 10.0.0.0/24, respectively. The default IPv6 address ranges for the VNet and the subnet are ace:cab:deca::/48 and ace:cab:deca::/64, respectively. If you see different default values, you might have an existing subnet that overlaps with these ranges.

    A screenshot of create new application gateway: virtual network.

    Note

    The application gateway subnet can contain only application gateways. No other resources are allowed.

    Select OK to close the Create virtual network window and save the new virtual network and subnet settings.

  3. Select Next: Frontends.

Frontends tab

  1. On the Frontends tab, verify Frontend IP address type is set to Public.

    Important

    For the Application Gateway v2 SKU, there must be a Public frontend IP configuration. A private IPv6 frontend IP configuration (Only ILB mode) is currently not supported for the IPv6 Application Gateway.

  2. Select Add new for the Public IP address, enter a name for the public IP address, and select OK. For example, myAGPublicIPAddress.

    A screenshot of create new application gateway: frontends.

    Note

    IPv6 Application Gateway supports up to 4 frontend IP addresses: two IPv4 addresses (Public and Private) and two IPv6 addresses (Public and Private)

  3. Select Next: Backends.

Backends tab

The backend pool is used to route requests to the backend servers that serve the request. Backend pools can be composed of NICs, Virtual Machine Scale Sets, public IP addresses, internal IP addresses, fully qualified domain names (FQDN), and multitenant backends like Azure App Service. In this example, you create an empty backend pool with your application gateway and then add backend targets to the backend pool.

  1. On the Backends tab, select Add a backend pool.

  2. In the Add a backend pool pane, enter the following values to create an empty backend pool:

    • Name: Enter a name for the backend pool. For example, myBackendPool.
    • Add backend pool without targets: Select Yes to create a backend pool with no targets. Backend targets are added after creating the application gateway.
  3. Select Add to save the backend pool configuration and return to the Backends tab.

    A screenshot of create new application gateway: backends.

  4. On the Backends tab, select Next: Configuration.

Configuration tab

On the Configuration tab, the frontend and backend pool are connected with a routing rule.

  1. Under Routing rules, select Add a routing rule.

  2. In the Add a routing rule pane, enter the following values:

    • Rule name: Enter a name for the rule. For example, myRoutingRule.
    • Priority: Enter a value between 1 and 20000, where 1 represents highest priority and 20000 represents lowest. For example, enter a priority of 100.
  3. A routing rule requires a listener. On the Listener tab, enter the following values:

    • Listener name: Enter a name for the listener. For example, myListener.

    • Frontend IP: Select Public IPv6.

      Accept the default values for the other settings on the Listener tab and then select the Backend targets tab.

    A screenshot of create new application gateway: listener.

  4. On the Backend targets tab, select your backend pool for the Backend target. For example, myBackendPool.

  5. For the Backend setting, select Add new. The backend setting determines the behavior of the routing rule. In the Add backend setting pane, enter a backend settings name. For example, myBackendSetting.

  6. Accept the default values for other settings and then select Add.

    A screenshot of create new application gateway: backend setting.

  7. In the Add a routing rule pane, select Add to save the routing rule and return to the Configuration tab.

    A screenshot of create new application gateway: routing rule.

  8. Select Next: Tags, select Next: Review + create, and then select Create. Deployment of the application gateway takes a few minutes.

Assign a DNS name to the frontend IPv6 address

A DNS name makes testing easier for the IPv6 application gateway. You can assign a public DNS name using your own domain and registrar, or you can create a name in azure.com. To assign a name in azure.com:

  1. From the Azure portal Home page, search for Public IP addresses.

  2. Select MyAGPublicIPv6Address.

  3. Under Settings, select Configuration.

  4. Under DNS name label (optional), enter a name. For example, myipv6appgw.

  5. Select Save.

  6. Copy the FQDN to a text editor for access later. In the following example, the FQDN is myipv6appgw.westcentralus.cloudapp.azure.com.

    A screenshot of assigning a DNS name.

Add a backend subnet

A backend IPv4 subnet is required for the backend targets. The backend subnet is IPv4-only.

  1. On the portal Home page, search for Virtual Networks and select the MyVNet virtual network.

  2. Next to Address space, select 10.0.0.0/16.

  3. Under Settings, select Subnets.

  4. Select + Subnet to add a new subnet.

  5. Under Name, enter MyBackendSubnet.

  6. The default address space is 10.0.1.0/24. Select Save to accept this and all other default settings.

    Create backend subnet

Add backend targets

Next, a backend target is added to test the application gateway:

  1. One VM is created: myVM and used as a backend target. You can also use existing virtual machines if they're available.
  2. IIS is installed on the virtual machine to verify that the application gateway was created successfully.
  3. The backend server (VM) is added to the backend pool.

Note

Only one virtual machine is deployed here as backend target because we are only testing connectivity. You can add multiple virtual machines if you also wish to test load balancing.

Create a virtual machine

Application Gateway can route traffic to any type of virtual machine used in the backend pool. A Windows Server 2019 Datacenter virtual machine is used in this example.

  1. On the Azure portal menu or from the Home page, select Create a resource.
  2. Select Windows Server 2019 Datacenter in the Popular list. The Create a virtual machine page appears.
  3. Enter the following values on the Basics tab:
    • Resource group: Select myResourceGroupAG.
    • Virtual machine name: Enter myVM.
    • Region: Select the same region where you created the application gateway.
    • Username: Enter a name for the administrator user name.
    • Password: Enter a password.
    • Public inbound ports: None.
  4. Accept the other defaults and then select Next: Disks.
  5. Accept the Disks tab defaults and then select Next: Networking.
  6. Next to Virtual network, verify that myVNet is selected.
  7. Next to Subnet, verify that myBackendSubnet is selected.
  8. Next to Public IP, select None.
  9. Select Next: Management, Next: Monitoring, and then next to Boot diagnostics select Disable.
  10. Select Review + create.
  11. On the Review + create tab, review the settings, correct any validation errors, and then select Create.
  12. Wait for the virtual machine creation to complete before continuing.

Install IIS for testing

In this example, you install IIS on the virtual machines to verify Azure created the application gateway successfully.

  1. Open Azure PowerShell.

    Select Cloud Shell from the top navigation bar of the Azure portal and then select PowerShell from the drop-down list.

  2. Run the following command to install IIS on the virtual machine. Change the Location parameter if necessary:

    Set-AzVMExtension `
      -ResourceGroupName myResourceGroupAG `
      -ExtensionName IIS `
      -VMName myVM `
      -Publisher Microsoft.Compute `
      -ExtensionType CustomScriptExtension `
      -TypeHandlerVersion 1.4 `
      -SettingString '{"commandToExecute":"powershell Add-WindowsFeature Web-Server; powershell Add-Content -Path \"C:\\inetpub\\wwwroot\\Default.htm\" -Value $($env:computername)"}' `
      -Location WestCentralUS
    

    See the following example:

    A screenshot of installing a custom extension.

Add backend servers to backend pool

  1. On the Azure portal menu, select Application gateways or search for and select *Application gateways. Then select myAppGateway.

  2. Under Settings, select Backend pools and then select myBackendPool.

  3. Under Backend targets, Target type, select Virtual machine from the drop-down list.

  4. Under Target, select the myVM network interface from the drop-down list.

    Add a backend server

  5. Select Save.

  6. Wait for the deployment to complete before proceeding to the next step. Deployment takes a few minutes.

Test the application gateway

IIS isn't required to create the application gateway. It's installed here to verify that you're able to successfully connect to the IPv6 interface of the application gateway.

Previously, we assigned the DNS name myipv6appgw.westcentralus.cloudapp.azure.com to the public IPv6 address of the application gateway. To test this connection:

  1. Paste the DNS name into the address bar of your browser to connect to it.

  2. Check the response. A valid response of myVM verifies that the application gateway was successfully created and can successfully connect with the backend.

    Test the IPv6 connection

    Important

    If the connection to the DNS name or IPv6 address fails, it might be because you can't browse IPv6 addresses from your device. To check if this is your problem, also test the IPv4 address of the application gateway. If the IPv4 address connects successfully, then it's likely you don't have a public IPv6 address assigned to your device. If this is the case, you can try testing the connection with a dual-stack VM.

Clean up resources

When you no longer need the resources that you created with the application gateway, delete the resource group. When you delete the resource group, you also remove the application gateway and all the related resources.

To delete the resource group:

  1. On the Azure portal menu, select Resource groups or search for and select Resource groups.
  2. On the Resource groups page, search for myResourceGroupAG in the list, then select it.
  3. On the Resource group page, select Delete resource group.
  4. Enter myResourceGroupAG under TYPE THE RESOURCE GROUP NAME and then select Delete

Next steps