Skip to content

Commit 354603c

Browse files
Fixed H2/H3 Headings
1 parent 0e5a76b commit 354603c

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/frontdoor/front-door-waf.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Many web applications have experienced rapid increase of traffic in recent weeks
1919

2020
We will be using Azure CLI to set up the WAF in this tutorial, but all these steps are also fully supported in Azure portal, Azure PowerShell, Azure ARM, and Azure REST APIs.
2121

22-
### Prerequisites
22+
## Prerequisites
2323

2424
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2525

@@ -35,7 +35,7 @@ az extension add --name front-door
3535

3636
Note: For more details of the commands listed below, refer to the [Azure CLI reference for Front Door](https://docs.microsoft.com/cli/azure/ext/front-door/?view=azure-cli-latest).
3737

38-
### Step 1: Create an Azure Front Door (AFD) resource
38+
## Step 1: Create an Azure Front Door (AFD) resource
3939

4040

4141
```azurecli-interactive
@@ -52,7 +52,7 @@ az network front-door create --backend-address <> --accepted-protocols <> --nam
5252

5353
In the response you get from successfully executing this command, look for the key "hostName" and note down its value to be used in a later step. The hostName is the DNS name of the AFD resource you had created
5454

55-
### Step 2: Create an Azure WAF profile to use with Azure Front Door resources
55+
## Step 2: Create an Azure WAF profile to use with Azure Front Door resources
5656

5757
```azurecli-interactive
5858
az network front-door waf-policy create --name <> --resource-group <> --disabled false --mode Prevention
@@ -70,7 +70,7 @@ In the response you get from successfully executing this command, look for the k
7070

7171
/subscriptions/**subscription id**/resourcegroups/**resource group name**/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/**WAF policy name**
7272

73-
### Step 3: Add managed rulesets to this WAF policy
73+
## Step 3: Add managed rulesets to this WAF policy
7474

7575
In a WAF policy, you can add managed rulesets that are a set of rules built and managed by Microsoft and gives out of the box protection against entire classes of threats. In this example, we are adding two such rulesets (1) Default ruleset that protects against common web threats and (2) Bot protection ruleset, which protects against malicious bots
7676

@@ -90,7 +90,7 @@ az network front-door waf-policy managed-rules add --policy-name <> --resource-g
9090

9191
--resource-group The resource group you had placed this WAF resource in.
9292

93-
### Step 4: Associate the WAF policy with the AFD resource
93+
## Step 4: Associate the WAF policy with the AFD resource
9494

9595
In this step, we will be associating the WAF policy we have built with the AFD resource that is in front of your web application.
9696

@@ -108,7 +108,7 @@ Note: the above example is for the case where you are not using a custom domain,
108108

109109
If you are not using any custom domains to access your web applications, you can skip step #5. In that case, you will be providing to your end users the hostname you obtained in step #1 to navigate to your web application
110110

111-
### Step 5: Configure custom domain for your web application
111+
## Step 5: Configure custom domain for your web application
112112

113113
Initially the custom domain name of your web application (the one that customers use to refer to your application, for example, www.contoso.com) was pointing towards the place where you had it running before AFD was introduced. After this change of architecture adding AFD+WAF to front the application, the DNS entry corresponding to that custom domain should now point to this AFD resource. This can be done by remapping this entry in your DNS server to the AFD hostname you had noted in step #1.
114114

@@ -120,6 +120,6 @@ In addition, you also need to update your AFD configuration to [add this custom
120120

121121
Finally, if you are using a custom domain to reach your web application and want to enable the HTTPS protocol, you need to have the [certificates for your custom domain setup in AFD](https://docs.microsoft.com/azure/frontdoor/front-door-custom-domain-https).
122122

123-
### Step 6: Lock down your web application
123+
## Step 6: Lock down your web application
124124

125125
One optional best practice to follow is to ensure that only AFD edges can communicate with your web application. This action will ensure that no one can bypass the AFD protections and access your applications directly. You can accomplish this lock down by visiting the [FAQ section of AFD](https://docs.microsoft.com/azure/frontdoor/front-door-faq) and referring to the question regarding locking down backends for access only by AFD.

0 commit comments

Comments
 (0)