Skip to content

Commit 11f60ce

Browse files
authored
Merge pull request #125965 from brandonhuntL7/patch-1
Update waf-front-door-rate-limit.md
2 parents 875b07f + 0dc381c commit 11f60ce

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/web-application-firewall/afds/waf-front-door-rate-limit.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ ms.date: 07/29/2024
1212

1313
Rate limiting enables you to detect and block abnormally high levels of traffic from any socket IP address. By using Azure Web Application Firewall in Azure Front Door, you can mitigate some types of denial-of-service attacks. Rate limiting also protects you against clients that were accidentally misconfigured to send large volumes of requests in a short time period.
1414

15-
The socket IP address is the address of the client that initiated the TCP connection to Azure Front Door. Typically, the socket IP address is the IP address of the user, but it might also be the IP address of a proxy server or another device that sits between the user and Azure Front Door If you have multiple clients that access Azure Front Door from different socket IP addresses, they each have their own rate limits applied.
15+
The socket IP address is the address of the client that initiated the TCP connection to Azure Front Door. Typically, the socket IP address is the IP address of the user, but it might also be the IP address of a proxy server or another device that sits between the user and Azure Front Door. If you have multiple clients that access Azure Front Door from different socket IP addresses, they each have their own rate limits applied.
1616

1717
## Configure a rate limit policy
1818

0 commit comments

Comments
 (0)