Skip to content

Commit 3641eb4

Browse files
authored
Merge pull request #296981 from AbdullahBell/ddos-privatelink-freshness
DDoS Protection - Private Link: Semester freshness and updates
2 parents 247560b + ae84c71 commit 3641eb4

File tree

68 files changed

+143
-159
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+143
-159
lines changed

articles/ddos-protection/alerts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: ddos-protection
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: tutorial
8-
ms.date: 02/10/2025
8+
ms.date: 03/17/2025
99
ms.author: abell
1010
---
1111

articles/ddos-protection/ddos-diagnostic-alert-templates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: ddos-protection
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: tutorial
8-
ms.date: 02/10/2025
8+
ms.date: 03/17/2025
99
ms.author: abell
1010
---
1111

articles/ddos-protection/ddos-faq.yml

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ metadata:
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: faq
8-
ms.date: 01/31/2024
8+
ms.date: 03/17/2025
99
ms.author: abell
1010
title: Azure DDoS Protection frequently asked questions
1111
summary: This article answers common questions about Azure DDoS Protection.
@@ -30,7 +30,7 @@ sections:
3030
3131
Under a tenant, a single DDoS protection plan can be used across multiple subscriptions, so there's no need to create more than one DDoS protection plan.
3232
33-
When Application Gateway with WAF is deployed in a DDoS protected VNet, there are no extra charges for WAF - you pay for the Application Gateway at the [lower non-WAF rate](https://azure.microsoft.com/pricing/details/application-gateway/). This policy applies to both Application Gateway v1 and v2 SKUs.
33+
When Application Gateway with WAF is deployed in a DDoS protected virtual network, there are no extra charges for WAF - you pay for the Application Gateway at the [lower non-WAF rate](https://azure.microsoft.com/pricing/details/application-gateway/). This policy applies to both Application Gateway v1 and v2 SKUs.
3434
3535
See [Azure DDoS Protection pricing](https://azure.microsoft.com/pricing/details/ddos-protection/) for pricing and more details.
3636
@@ -57,31 +57,31 @@ sections:
5757
- question: |
5858
Are services unsafe in Azure without the service?
5959
answer: |
60-
Services running on Azure are inherently protected by the default infrastructure-level DDoS protection. However, the protection that safeguards the infrastructure has a much higher threshold than most applications have the capacity to handle, and does not provide telemetry or alerting, so while a traffic volume may be perceived as harmless by the platform, it can be devastating to the application that receives it.
60+
Services running on Azure are inherently protected by the default infrastructure-level DDoS protection. However, the protection that safeguards the infrastructure has a higher threshold than most applications have the capacity to handle, and doesn't provide telemetry or alerting, so while a traffic volume may be perceived as harmless by the platform, it can be devastating to the application that receives it.
6161
62-
By onboarding to the Azure DDoS Protection Service, the application gets dedicated monitoring to detect attacks and application specific thresholds. A service will be protected with a profile that is tuned to its expected traffic volume, providing a much tighter defense against DDoS attacks.
62+
By onboarding to the Azure DDoS Protection Service, the application gets dedicated monitoring to detect attacks and application specific thresholds. A service is protected with a profile that is tuned to its expected traffic volume, providing a tighter defense against DDoS attacks.
6363
6464
- question: |
6565
What are the supported protected resource types?
6666
answer: |
67-
Public IPs in ARM based VNETs are currently the only type of protected resource. Protected resources include public IPs attached to an IaaS VM, Load Balancer (Classic & Standard Load Balancers), Application Gateway (including WAF) cluster, Firewall, Bastion, VPN Gateway, Service Fabric or an IaaS based Network Virtual Appliance (NVA). Protection also covers public IP ranges brought to Azure via Custom IP Prefixes (BYOIPs).
67+
Public IPs in ARM based VNETs are currently the only type of protected resource. Protected resources include public IPs attached to an IaaS VM, Load Balancer (Classic & Standard Load Balancers), Application Gateway (including WAF) cluster, Firewall, Bastion, VPN Gateway, Service Fabric, or an IaaS based Network Virtual Appliance (NVA). Protection also covers public IP ranges brought to Azure via Custom IP Prefixes (BYOIPs).
6868
6969
To learn about limitations, see [Azure DDoS Protection reference architectures](ddos-protection-reference-architectures.md).
7070
7171
- question: |
7272
Are Classic/RDFE protected resources supported?
7373
answer: |
74-
Only ARM based protected resources are supported in preview. VMs in Classic/RDFE deployments are not supported. Support is not currently planned for Classic/RDFE resources. For more information, see [Azure DDoS Protection reference architectures](ddos-protection-reference-architectures.md).
74+
Only ARM based protected resources are supported in preview. VMs in Classic/RDFE deployments aren't supported. Support isn't currently planned for Classic/RDFE resources. For more information, see [Azure DDoS Protection reference architectures](ddos-protection-reference-architectures.md).
7575
7676
- question: |
7777
Can I protect my PaaS resources using DDoS Protection?
7878
answer: |
79-
Public IPs attached to multi-tenant, single VIP PaaS services are not supported presently. Examples of unsupported resources include Storage VIPs, Event Hubs VIPs and App/Cloud Services applications. For more information, see [Azure DDoS Protection reference architectures](ddos-protection-reference-architectures.md).
79+
Public IPs attached to multi-tenant, single VIP PaaS services aren't supported presently. Examples of unsupported resources include Storage VIPs, Event Hubs VIPs, and App/Cloud Services applications. For more information, see [Azure DDoS Protection reference architectures](ddos-protection-reference-architectures.md).
8080
8181
- question: |
8282
Can I protect my on-premises resources using DDoS Protection?
8383
answer: |
84-
You need to have the public endpoints of your service associated to a VNet in Azure to be enabled for DDoS protection. Example designs include:
84+
You need to have the public endpoints of your service associated to a virtual network in Azure to be enabled for DDoS protection. Example designs include:
8585
- Web sites (IaaS) in Azure and backend databases in on-premises datacenter.
8686
- Application Gateway in Azure (DDoS protection enabled on App Gateway/WAF) and websites in on-premises datacenters.
8787
@@ -90,17 +90,17 @@ sections:
9090
- question: |
9191
Can I register a domain outside of Azure and associate that to a protected resource like VM or ELB?
9292
answer: |
93-
For the Public IP scenarios, DDoS Protection service will support any application regardless of where the associated domain is registered or hosted as long as the associated Public IP is hosted on Azure.
93+
For the Public IP scenarios, DDoS Protection service supports any application regardless of where the associated domain is registered or hosted as long as the associated Public IP is hosted on Azure.
9494
9595
- question: |
9696
Can I manually configure the DDoS policy applied to the VNets/Public IPs?
9797
answer: |
98-
No, unfortunately policy customization is not available at this moment.
98+
No, unfortunately policy customization isn't available at this moment.
9999
100100
- question: |
101101
Can I allowlist/blocklist specific IP addresses?
102102
answer: |
103-
No, unfortunately manual configuration is not available at this moment.
103+
No, unfortunately manual configuration isn't available at this moment.
104104
105105
- question: |
106106
How can I test DDoS Protection?
@@ -110,12 +110,12 @@ sections:
110110
- question: |
111111
How long does it take for the metrics to load on portal?
112112
answer: |
113-
The metrics should be visible on portal within 5 minutes. If your resource is under attack, other metrics will start showing up on portal within 5-7 minutes.
113+
The metrics should be visible on portal within 5 minutes. If your resource is under attack, other metrics start showing up on portal within 5-7 minutes.
114114
115115
- question: |
116116
Does the service store customer data?
117117
answer: |
118-
No, Azure DDoS protection does not store customer data.
118+
No, Azure DDoS protection doesn't store customer data.
119119
120120
- question: |
121121
Is a single VM deployment behind public IP supported?

articles/ddos-protection/ddos-pricing-guide.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: ddos-protection
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: concept-article
8-
ms.date: 07/17/2024
8+
ms.date: 03/17/2025
99
ms.author: abell
1010
---
1111

articles/ddos-protection/ddos-protection-features.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: ddos-protection
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: concept-article
8-
ms.date: 07/17/2024
8+
ms.date: 03/17/2025
99
ms.author: abell
1010
---
1111
# Azure DDoS Protection features

articles/ddos-protection/ddos-protection-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: ddos-protection
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: overview
8-
ms.date: 04/26/2024
8+
ms.date: 03/17/2025
99
ms.author: abell
1010
ms.custom: references_regions
1111
---

articles/ddos-protection/ddos-protection-partner-onboarding.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: "Understand partnering opportunities enabled by Azure DDoS Protecti
44
ms.service: azure-ddos-protection
55
author: AbdullahBell
66
ms.topic: how-to
7-
ms.date: 11/06/2023
7+
ms.date: 03/17/2025
88
ms.author: abell
99
---
1010

@@ -53,7 +53,7 @@ The following are key benefits you can derive by integrating with the Azure DDoS
5353
- Partners' protected applications are backed by a DDoS SLA guarantee and cost protection in the event of DDoS attacks.
5454

5555
## Technical integration overview
56-
Azure DDoS Protection partnering opportunities are made available via Azure portal, APIs, and CLI/PS.
56+
Azure DDoS Protection partnering opportunities are made available via Azure portal, APIs, CLI, and PowerShell.
5757

5858
### Integrate with DDoS Protection
5959
The following steps are required for partners to configure integration with Azure DDoS Protection:

articles/ddos-protection/ddos-protection-reference-architectures.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: ddos-protection
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: concept-article
8-
ms.date: 11/20/2024
8+
ms.date: 03/17/2025
99
ms.author: abell
1010
ms.custom: fasttrack-edit, linux-related-content
1111
---
@@ -35,7 +35,7 @@ Unsupported resources include:
3535

3636
* Azure Virtual WAN.
3737
* Azure API Management in deployment modes other than the supported modes.
38-
* PaaS services (multi-tenant) including Azure App Service Environment for Power Apps.
38+
* PaaS services (multitenant) including Azure App Service Environment for Power Apps.
3939
* NAT Gateway.
4040

4141
[!INCLUDE [ddos-waf-recommendation](../../includes/ddos-waf-recommendation.md)]
@@ -79,7 +79,7 @@ There are many ways to implement an N-tier architecture. The following diagrams
7979
In this architecture diagram DDoS IP Protection is enabled on the public IP address.
8080

8181
> [!NOTE]
82-
> Scenarios in which a single VM is running behind a public IP is not recommended. DDoS mitigation may not initiate instantaneously when a DDoS attack is detected. As a result a single VM deployment that can’t scale out will go down in such cases.
82+
> Scenarios in which a single VM is running behind a public IP isn't recommended. DDoS mitigation may not initiate instantaneously when a DDoS attack is detected. As a result a single VM deployment that can’t scale out will go down in such cases.
8383
8484
### PaaS web application
8585

@@ -125,7 +125,7 @@ documentation.
125125

126126
This reference architecture details a hub-and-spoke topology with Azure Firewall inside the hub as a DMZ for scenarios that require central control over security aspects. Azure Firewall is a managed firewall as a service and is placed in its own subnet. Azure Bastion is deployed and placed in its own subnet.
127127

128-
There are two spokes that are connected to the hub using VNet peering and there's no spoke-to-spoke connectivity. If you require spoke-to-spoke connectivity, then you need to create routes to forward traffic from one spoke to the firewall, which can then route it to the other spoke. All the Public IPs that are inside the hub are protected by DDoS Protection. In this scenario, the firewall in the hub helps control the ingress traffic from the internet, while the firewall's public IP is being protected. Azure DDoS Protection also protects the public IP of the bastion.
128+
There are two spokes that are connected to the hub using virtual network peering and there's no spoke-to-spoke connectivity. If you require spoke-to-spoke connectivity, then you need to create routes to forward traffic from one spoke to the firewall, which can then route it to the other spoke. All the Public IPs that are inside the hub are protected by DDoS Protection. In this scenario, the firewall in the hub helps control the ingress traffic from the internet, while the firewall's public IP is being protected. Azure DDoS Protection also protects the public IP of the bastion.
129129

130130
DDoS Protection is designed for services that are deployed in a virtual network. For more information, see [Deploy dedicated Azure service into virtual networks](../virtual-network/virtual-network-for-azure-services.md#services-that-can-be-deployed-into-a-virtual-network).
131131

articles/ddos-protection/ddos-protection-sku-comparison.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: AbdullahBell
55
ms.author: Abell
66
ms.service: azure-ddos-protection
77
ms.topic: concept-article
8-
ms.date: 11/20/2024
8+
ms.date: 03/17/2025
99
ms.custom: template-concept
1010
---
1111

@@ -42,13 +42,13 @@ The following table shows features and corresponding tiers.
4242
| Price | Per protected IP | Per 100 protected IP addresses |
4343

4444
> [!NOTE]
45-
> At no additional cost, Azure DDoS infrastructure protection protects every Azure service that uses public IPv4 and IPv6 addresses. This DDoS protection service helps to protect all Azure services, including platform as a service (PaaS) services such as Azure DNS. For more information on supported PaaS services, see [DDoS Protection reference architectures](ddos-protection-reference-architectures.md). Azure DDoS infrastructure protection requires no user configuration or application changes. Azure provides continuous protection against DDoS attacks. DDoS protection does not store customer data.
45+
> At no additional cost, Azure DDoS infrastructure protection protects every Azure service that uses public IPv4 and IPv6 addresses. This DDoS protection service helps to protect all Azure services, including platform as a service (PaaS) services such as Azure DNS. For more information on supported PaaS services, see [DDoS Protection reference architectures](ddos-protection-reference-architectures.md). Azure DDoS infrastructure protection requires no user configuration or application changes. Azure provides continuous protection against DDoS attacks. DDoS protection doesn't store customer data.
4646
4747
## Limitations
4848

4949
DDoS Network Protection and DDoS IP Protection have the following limitations:
5050

51-
- PaaS services (multi-tenant), which includes Azure App Service Environment for Power Apps, Azure API Management in deployment modes other than APIM with virtual network integration, and Azure Virtual WAN aren't currently supported. For more information, see [Azure DDoS Protection APIM in VNET Integration](https://techcommunity.microsoft.com/t5/azure-network-security-blog/azure-ddos-standard-protection-now-supports-apim-in-vnet/ba-p/3641671)
51+
- PaaS services (multitenant), which includes Azure App Service Environment for Power Apps, Azure API Management in deployment modes other than APIM with virtual network integration, and Azure Virtual WAN aren't currently supported. For more information, see [Azure DDoS Protection APIM in VNET Integration](https://techcommunity.microsoft.com/t5/azure-network-security-blog/azure-ddos-standard-protection-now-supports-apim-in-vnet/ba-p/3641671)
5252
- Protecting a public IP resource attached to a NAT Gateway isn't supported.
5353
- Virtual machines in Classic/RDFE deployments aren't supported.
5454
- VPN gateway or Virtual network gateway is protected by a DDoS policy. Adaptive tuning isn't supported at this stage.

articles/ddos-protection/ddos-rapid-response.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ services: ddos-protection
55
author: AbdullahBell
66
ms.service: azure-ddos-protection
77
ms.topic: how-to
8-
ms.date: 07/17/2024
8+
ms.date: 03/17/2025
99
ms.author: abell
1010
---
1111
# Azure DDoS Rapid Response

0 commit comments

Comments
 (0)