You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure DDoS Protection is designed [for services that are deployed in a virtual network](../virtual-network/virtual-network-for-azure-services.md). The following reference architectures are arranged by scenarios, with architecture patterns grouped together.
17
17
18
-
> [!NOTE]
19
-
> Protected resources include public IPs attached to an IaaS VM (except for single VM running behind a public IP), Load Balancer (Classic & Standard Load Balancers), Application Gateway (including WAF) cluster, Firewall, Bastion, VPN Gateway, Service Fabric, IaaS based Network Virtual Appliance (NVA) or Azure API Management (Premium tier only), connected to a virtual network (VNet) in the external mode. Protection also covers public IP ranges brought to Azure via Custom IP Prefixes (BYOIPs). PaaS services (multi-tenant), which includes Azure App Service Environment for Power Apps, Azure API Management in deployment modes other than those supported above, or Azure Virtual WAN are not supported at present.
18
+
## Protected Resources
19
+
20
+
Supported resources include:
21
+
* Public IPs attached to:
22
+
* An IaaS virtual machine.
23
+
* Application Gateway (including WAF) cluster.
24
+
* Azure API Management (Premium tier only).
25
+
* Bastion.
26
+
* Connected to a virtual network (VNet) in the external mode.
27
+
* Firewall.
28
+
* IaaS based Network Virtual Appliance (NVA).
29
+
* Load Balancer (Classic & Standard Load Balancers).
30
+
* Service Fabric.
31
+
* VPN Gateway.
32
+
* Protection also covers public IP ranges brought to Azure via Custom IP Prefixes (BYOIPs).
33
+
34
+
35
+
Unsupported resources include:
36
+
37
+
* Azure Virtual WAN.
38
+
* Azure API Management in deployment modes other than the supported modes.
39
+
* PaaS services (multi-tenant) including Azure App Service Environment for Power Apps.
40
+
* Protected resources that include public IPs created from public IP address prefix.
41
+
20
42
21
43
> [!NOTE]
22
-
> * Protected resources that include public IPs created from public IP address prefix are not supported at present.
23
-
> * For web workloads, we highly recommend utilizing [**Azure DDoS protection**](../ddos-protection/ddos-protection-overview.md) and a [**web application firewall**](../web-application-firewall/overview.md) to safeguard against emerging DDoS attacks. Another option is to deploy [**Azure Front Door**](../frontdoor/web-application-firewall.md) along with a web application firewall. Azure Front Door offers platform-level [**protection against network-level DDoS attacks**](../frontdoor/front-door-ddos.md).
44
+
> For web workloads, we highly recommend utilizing [**Azure DDoS protection**](../ddos-protection/ddos-protection-overview.md) and a [**web application firewall**](../web-application-firewall/overview.md) to safeguard against emerging DDoS attacks. Another option is to deploy [**Azure Front Door**](../frontdoor/web-application-firewall.md) along with a web application firewall. Azure Front Door offers platform-level [**protection against network-level DDoS attacks**](../frontdoor/front-door-ddos.md).
0 commit comments