Consider an Azure Application Gateway configured with path-based routing rules. What happens when a client sends an HTTP request to a URL path that matches one of the defined routing rules?
Think about how path-based routing directs traffic to specific backend pools.
Azure Application Gateway uses path-based routing rules to forward HTTP requests to the backend pool that matches the URL path. It does not reject, broadcast, or redirect the request in this scenario.
Azure Application Gateway has Web Application Firewall (WAF) enabled. A client sends a request containing a SQL injection attack pattern. What is the expected behavior?
Consider the purpose of WAF in protecting web applications.
When WAF is enabled, it inspects incoming requests for attack patterns like SQL injection and blocks malicious requests before they reach backend servers.
You want to configure Azure Application Gateway to decrypt incoming SSL traffic and then re-encrypt it before sending to backend servers. Which configuration achieves this?
Think about how SSL termination and re-encryption work together.
SSL termination decrypts traffic at the gateway, and re-encryption requires HTTPS listeners and backend HTTPS settings with certificates to encrypt traffic again to backend servers.
Your web application is experiencing increased traffic. How should you scale Azure Application Gateway to maintain performance?
Consider how Application Gateway scales to handle more requests.
Scaling Application Gateway involves increasing instance count and enabling autoscaling to automatically adjust capacity based on traffic.
Azure Application Gateway supports 'Cookie-based affinity'. What does enabling this feature do?
Think about how session persistence works in load balancing.
Cookie-based affinity uses a cookie to keep a client session tied to the same backend server, ensuring session persistence.