Skip to content

Commit 7555423

Browse files
Merge pull request #241711 from AbdullahBell/ddos-architecture-update
DDoS Protection: Update: Azure DDoS Protection reference architectures
2 parents dbcc20f + 19f4973 commit 7555423

File tree

1 file changed

+26
-5
lines changed

1 file changed

+26
-5
lines changed

articles/ddos-protection/ddos-protection-reference-architectures.md

Lines changed: 26 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: AbdullahBell
66
ms.service: ddos-protection
77
ms.topic: conceptual
88
ms.workload: infrastructure-services
9-
ms.date: 10/12/2022
9+
ms.date: 06/15/2023
1010
ms.author: abell
1111
ms.custom: fasttrack-edit, ignite-2022
1212
---
@@ -15,12 +15,33 @@ ms.custom: fasttrack-edit, ignite-2022
1515

1616
Azure DDoS Protection is designed [for services that are deployed in a virtual network](../virtual-network/virtual-network-for-azure-services.md). The following reference architectures are arranged by scenarios, with architecture patterns grouped together.
1717

18-
> [!NOTE]
19-
> Protected resources include public IPs attached to an IaaS VM (except for single VM running behind a public IP), Load Balancer (Classic & Standard Load Balancers), Application Gateway (including WAF) cluster, Firewall, Bastion, VPN Gateway, Service Fabric, IaaS based Network Virtual Appliance (NVA) or Azure API Management (Premium tier only), connected to a virtual network (VNet) in the external mode. Protection also covers public IP ranges brought to Azure via Custom IP Prefixes (BYOIPs). PaaS services (multi-tenant), which includes Azure App Service Environment for Power Apps, Azure API Management in deployment modes other than those supported above, or Azure Virtual WAN are not supported at present.
18+
## Protected Resources
19+
20+
Supported resources include:
21+
* Public IPs attached to:
22+
* An IaaS virtual machine.
23+
* Application Gateway (including WAF) cluster.
24+
* Azure API Management (Premium tier only).
25+
* Bastion.
26+
* Connected to a virtual network (VNet) in the external mode.
27+
* Firewall.
28+
* IaaS based Network Virtual Appliance (NVA).
29+
* Load Balancer (Classic & Standard Load Balancers).
30+
* Service Fabric.
31+
* VPN Gateway.
32+
* Protection also covers public IP ranges brought to Azure via Custom IP Prefixes (BYOIPs).
33+
34+
35+
Unsupported resources include:
36+
37+
* Azure Virtual WAN.
38+
* Azure API Management in deployment modes other than the supported modes.
39+
* PaaS services (multi-tenant) including Azure App Service Environment for Power Apps.
40+
* Protected resources that include public IPs created from public IP address prefix.
41+
2042

2143
> [!NOTE]
22-
> * Protected resources that include public IPs created from public IP address prefix are not supported at present.
23-
> * For web workloads, we highly recommend utilizing [**Azure DDoS protection**](../ddos-protection/ddos-protection-overview.md) and a [**web application firewall**](../web-application-firewall/overview.md) to safeguard against emerging DDoS attacks. Another option is to deploy [**Azure Front Door**](../frontdoor/web-application-firewall.md) along with a web application firewall. Azure Front Door offers platform-level [**protection against network-level DDoS attacks**](../frontdoor/front-door-ddos.md).
44+
> For web workloads, we highly recommend utilizing [**Azure DDoS protection**](../ddos-protection/ddos-protection-overview.md) and a [**web application firewall**](../web-application-firewall/overview.md) to safeguard against emerging DDoS attacks. Another option is to deploy [**Azure Front Door**](../frontdoor/web-application-firewall.md) along with a web application firewall. Azure Front Door offers platform-level [**protection against network-level DDoS attacks**](../frontdoor/front-door-ddos.md).
2445
2546
## Virtual machine (Windows/Linux) workloads
2647

0 commit comments

Comments
 (0)