Skip to content

Commit 7270a57

Browse files
Merge pull request #219226 from Miskatonic-Electronic/patch-24
Update waf-front-door-rate-limit-configure.md
2 parents 79418cc + 1f9455c commit 7270a57

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/web-application-firewall/afds/waf-front-door-rate-limit-configure.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ zone_pivot_groups: web-application-firewall-configuration
1313

1414
# Configure a Web Application Firewall rate limit rule
1515

16-
The Azure Web Application Firewall (WAF) rate limit rule for Azure Front Door controls the number of requests allowed from a particular client IP address to the application during a rate limit duration. For more information about rate limiting, see [What is rate limiting for Azure Front Door Service?](waf-front-door-rate-limit.md).
16+
The Azure Web Application Firewall (WAF) rate limit rule for Azure Front Door controls the number of requests allowed from a particular socket IP address to the application during a rate limit duration. For more information about rate limiting, see [What is rate limiting for Azure Front Door Service?](waf-front-door-rate-limit.md).
1717

1818
This article shows how to configure a WAF rate limit rule on Azure Front Door Standard and Premium tiers.
1919

@@ -23,7 +23,7 @@ This article shows how to configure a WAF rate limit rule on Azure Front Door St
2323

2424
Suppose you're responsible for a public website. You've just added a page with information about a promotion your organization is running. You're concerned that, if clients visit that page too often, some of your backend services might not scale quickly and the application might have performance issues.
2525

26-
You decide to create a rate limiting rule that restricts each client IP address to a maximum of 1000 requests per minute. You'll only apply this rule to requests that contain `*/promo*` in the request URL.
26+
You decide to create a rate limiting rule that restricts each socket IP address to a maximum of 1000 requests per minute. You'll only apply this rule to requests that contain `*/promo*` in the request URL.
2727

2828
> [!TIP]
2929
> If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -230,7 +230,7 @@ $promoRateLimitRule = New-AzFrontDoorWafCustomRuleObject `
230230
-Priority 1
231231
```
232232

233-
When any client IP address sends more than 1000 requests within one minute, the WAF blocks subsequent requests until the next minute starts.
233+
When any socket IP address sends more than 1000 requests within one minute, the WAF blocks subsequent requests until the next minute starts.
234234

235235
## Create a WAF policy
236236

@@ -372,7 +372,7 @@ az network front-door waf-policy rule create \
372372
--defer
373373
```
374374

375-
When any client IP address sends more than 1000 requests within one minute, the WAF blocks subsequent requests until the next minute starts.
375+
When any socket IP address sends more than 1000 requests within one minute, the WAF blocks subsequent requests until the next minute starts.
376376

377377
## Add a match condition
378378

0 commit comments

Comments
 (0)