Skip to content

Commit 5fa36d2

Browse files
committed
cross-links
1 parent 41a61d6 commit 5fa36d2

File tree

4 files changed

+9
-15
lines changed

4 files changed

+9
-15
lines changed

articles/api-management/TOC.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -151,8 +151,6 @@
151151
href: private-endpoint.md
152152
- name: Retrieve IP addresses
153153
href: api-management-howto-ip-addresses.md
154-
- name: Defend against DDoS attacks
155-
href: protect-with-ddos-protection.md
156154
- name: Configuration management
157155
items:
158156
- name: Landing zone accelerator
@@ -281,6 +279,8 @@
281279
href: api-management-howto-ca-certificates.md
282280
- name: Manage protocols and ciphers
283281
href: api-management-howto-manage-protocols-ciphers.md
282+
- name: Defend against DDoS attacks
283+
href: protect-with-ddos-protection.md
284284
- name: Mitigate OWASP API threats
285285
href: mitigate-owasp-api-threats.md
286286
displayName: OWASP top 10, vulnerability, vulnerabilities

articles/api-management/mitigate-owasp-api-threats.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ More information about this threat: [API4:2019 Lack of resources and rate limiti
121121

122122
* Limit the number of parallel backend connections with the [limit concurrency](api-management-advanced-policies.md#LimitConcurrency) policy.
123123

124-
* While API Management can protect backend services from DDoS attacks, it may be vulnerable to those attacks itself. Deploy a bot protection service in front of API Management (for example, [Azure Application Gateway](api-management-howto-integrate-internal-vnet-appgateway.md), [Azure Front Door](../frontdoor/front-door-overview.md), or [Azure DDoS Protection Service](../ddos-protection/ddos-protection-overview.md)) to better protect against DDoS attacks. When using a WAF with Azure Application Gateway or Azure Front Door, consider using [Microsoft_BotManagerRuleSet_1.0](../web-application-firewall/afds/afds-overview.md#bot-protection-rule-set).
124+
* While API Management can protect backend services from DDoS attacks, it may be vulnerable to those attacks itself. Deploy a bot protection service in front of API Management (for example, [Azure Application Gateway](api-management-howto-integrate-internal-vnet-appgateway.md), [Azure Front Door](front-door-api-management.md), or [Azure DDoS Protection](protect-with-ddos-protection.md)) to better protect against DDoS attacks. When using a WAF with Azure Application Gateway or Azure Front Door, consider using [Microsoft_BotManagerRuleSet_1.0](../web-application-firewall/afds/afds-overview.md#bot-protection-rule-set).
125125

126126
## Broken function level authorization
127127

@@ -237,7 +237,7 @@ More information about this threat: [API8:2019 Injection](https://github.com/OWA
237237

238238
### Recommendations
239239

240-
* [Modern Web Application Firewall (WAF) policies](https://github.com/SpiderLabs/ModSecurity) cover many common injection vulnerabilities. While API Management doesn’t have a built-in WAF component, deploying a WAF upstream (in front) of the API Management instance is strongly recommended. For example, use [Azure Application Gateway](/azure/architecture/reference-architectures/apis/protect-apis) or [Azure Front Door](../frontdoor/front-door-overview.md).
240+
* [Modern Web Application Firewall (WAF) policies](https://github.com/SpiderLabs/ModSecurity) cover many common injection vulnerabilities. While API Management doesn’t have a built-in WAF component, deploying a WAF upstream (in front) of the API Management instance is strongly recommended. For example, use [Azure Application Gateway](/azure/architecture/reference-architectures/apis/protect-apis) or [Azure Front Door](front-door-api-management.md).
241241

242242
> [!IMPORTANT]
243243
> Ensure that a bad actor can't bypass the gateway hosting the WAF and connect directly to the API Management gateway or backend API itself. Possible mitigations include: [network ACLs](../virtual-network/network-security-groups-overview.md), using API Management policy to [restrict inbound traffic by client IP](api-management-access-restriction-policies.md#RestrictCallerIPs), removing public access where not required, and [client certificate authentication](api-management-howto-mutual-certificates-for-clients.md) (also known as mutual TLS or mTLS).

articles/api-management/protect-with-ddos-protection.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This article shows how to defend your Azure API Management instance against dist
1717

1818
## Supported configurations
1919

20-
Enabling Azure DDoS Protection for API Management is available only for instances deployed (injected) in a VNet in [external mode](api-management-using-with-vnet.md).
20+
Enabling Azure DDoS Protection for API Management is currently available only for instances deployed (injected) in a VNet in [external mode](api-management-using-with-vnet.md).
2121

2222
Currently, Azure DDoS Protection can't be enabled for the following API Management configurations:
2323

@@ -40,20 +40,20 @@ Currently, Azure DDoS Protection can't be enabled for the following API Manageme
4040
4141
## Enable DDoS Protection
4242

43-
Depending on the DDoS Protection plan you use, you enable DDoS protection either on the virtual network used for your API Management instance, or the IP address resource configured for your virtual network.
43+
Depending on the DDoS Protection plan you use, enable DDoS protection on the virtual network used for your API Management instance, or the IP address resource configured for your virtual network.
4444

4545
### Enable DDoS Protection on the virtual network used for your API Management instance
4646

4747
1. In the [Azure portal](https://portal.azure.com), navigate to the VNet where your API Management is injected.
4848
1. In the left menu, under **Settings**, select **DDoS protection**.
49-
1. Select **Enable**, and then select your Azure DDoS Protection plan.
49+
1. Select **Enable**, and then select your **DDoS protection plan**.
5050
1. Select **Save**.
5151

5252
:::image type="content" source="media/protect-with-ddos-protection/enable-ddos-protection.png" alt-text="Screenshot of enabling a DDoS Protection plan on a VNet in the Azure portal.":::
5353

5454
### Enable DDoS protection on the API Management public IP address
5555

56-
To enable DDoS protection on the IP address, see [Enable DDoS IP Protection for a public IP address](../ddos-protection/manage-ddos-protection-powershell-ip.md#disable-ddos-ip-protection-for-an-existing-public-ip-address).
56+
If your plan uses the IP DDoS Protection SKU, see [Enable DDoS IP Protection for a public IP address](../ddos-protection/manage-ddos-protection-powershell-ip.md#disable-ddos-ip-protection-for-an-existing-public-ip-address).
5757

5858
## Next steps
5959

articles/api-management/virtual-network-concepts.md

Lines changed: 1 addition & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -181,23 +181,17 @@ For more information, see [Integrate API Management in an internal virtual netwo
181181

182182
Learn more about:
183183

184-
* [Connecting a virtual network to backend using VPN Gateway](../vpn-gateway/design.md#s2smulti)
185-
* [Connecting a virtual network from different deployment models](../vpn-gateway/vpn-gateway-connect-different-deployment-models-powershell.md)
186-
* [Virtual network frequently asked questions](../virtual-network/virtual-networks-faq.md)
187-
188184
Virtual network configuration with API Management:
189185
* [Connect to an external virtual network using Azure API Management](./api-management-using-with-vnet.md).
190186
* [Connect to an internal virtual network using Azure API Management](./api-management-using-with-internal-vnet.md).
191187
* [Connect privately to API Management using a private endpoint](private-endpoint.md)
192-
188+
* [Defend your Azure API Management instance against DDoS attacks](protect-with-ddos-protection.md)
193189

194190
Related articles:
195191

196192
* [Connecting a Virtual Network to backend using Vpn Gateway](../vpn-gateway/design.md#s2smulti)
197193
* [Connecting a Virtual Network from different deployment models](../vpn-gateway/vpn-gateway-connect-different-deployment-models-powershell.md)
198-
* [How to use the API Inspector to trace calls in Azure API Management](api-management-howto-api-inspector.md)
199194
* [Virtual Network Frequently asked Questions](../virtual-network/virtual-networks-faq.md)
200-
* [Service tags](../virtual-network/network-security-groups-overview.md#service-tags)
201195

202196

203197

0 commit comments

Comments
 (0)