Azure Application Gateway – Demo

Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications based on the OSI layer 7. In Azure, there is another load balancer that operates on Layer 4 (TCP/UDP). With the Application Gateway, traffic can be distributed based on HTTP and HTTPS. It can be configured as public-facing, internal, or a combination of both, and can only assign a static IP address to the application gateway. A separate, empty subnet is required to install the application gateway components.

Application Gateway Components

This Application Gateway consists of five main components essential for its functioning.

  • Front-end IP addresses = For Public access
  • Back end pools = To traffic redirection
  • Listeners = listener helps to define the protocol, port, FQDM, and source IP address that is allowed to communicate with the back-end pool
  • Routing rules = Routing rule defines how traffic received by the application gateway should be route to backend pool.
  • HTTP settings = HTTP settings define the back-end servers’ port number, protocol, encryption settings, and other details.
  • Health probes = Monitoring the health of back-end pool instances is a critical function. This help to get idea to which backend pool is healthy and usable for request routings.

Scenario

In this setup, I have configured three backend pools as shown in the diagram below.

Application gateway

Traffic Routing Logic:

  • Video Traffic: If the URL contains the keyword “Videos,” the traffic is routed to the Video Backend Pool.
  • Software Traffic: If the URL contains the keyword “Software,” the traffic is routed to the Software Backend Pool.
  • Default Traffic: If the URL does not contain either “Videos” or “Software,” the traffic is routed to the Default Backend Pool.

This approach ensures that traffic is efficiently directed based on the URL’s content, optimizing resource usage and improving user experience.

1. Create 3 Web App’s for Demo

Application Gateway

I Created 3 web apps for host default, Video and Software website.

Change Index.html file on Default Web App
Change Index.html file on Video Web App
Change Index.html file on Software Web App

2. Create Virtual Network

Create VNet
VNet Create Done
Note :  We can create a virtual network while setting up an application gateway.

3. Create Application Gateway

3. Create Application Gateway
Add Public IPV4 Address
Add backend pools
Backend pools added
Add routing rools
Add Backend Settings
Add Path
All Basic Configuration Done (Frontend, Routing rules, Backend Pools)

Now Testing

If the URL contains the keyword “Videos”

Traffic redirecting to the Videos Web app

If the URL contains the keyword “Software”

Traffic redirecting to the Videos Software app

If the URL does not contain either “Videos” or “Software”

Traffic redirecting to the Default app
Application Gateway have 2 type of routings. 
1. Path Base Routing 
2. Multiple-site routing
Note : In this demo, we demonstrated how to configured path-based routing.

WAF (Web application Firewall)

In this Application Gateway we can simply shift to the WAF mode. Using this WAF feature we can get extra Security features to our web applications Based on the Open Web Application Security Project (OWASP).

Ex : SQL-injection, Cross-site scripting, Command injection, HTTP request smuggling, HTTP response splitting, Remote file inclusion, Bots, crawlers, and scanners, and HTTP protocol violations and anomalies.

We are currently using Standard V2, but we can easily switch to WAF.

Changing to WAF

Changing to WAF

Author

  • Cloud Engineer | DevOps & Cloud Enthusiast | BEng (Hons) in Computer Networking | 7x Azure Certified | Azure Solution Architect Expert | Azure DevOps Engineer Expert | GitHub Foundation | CCNA | ✍️ Tech Blogger

    View all posts

Leave a Reply

Your email address will not be published. Required fields are marked *