Skip to content

Commit 85bd11e

Browse files
committed
Acrolinx
1 parent 554c131 commit 85bd11e

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/web-application-firewall/afds/waf-front-door-best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ For more information, see [Web Application Firewall DRS rule groups and rules](w
5656

5757
### Add rate limiting
5858

59-
Front Door's rate limiting support enables you to control the number of requests allowed from each client IP address to the application during a rate limit duration. It's a good practice to add rate limiting to reduce the impact of clients accidentally or intentionally sending large amounts of traffic to your service, such as during a [*retry storm*](/azure/architecture/antipatterns/retry-storm/).
59+
Front Door's WAF enables you to control the number of requests allowed from each client's IP address over a period of time. It's a good practice to add rate limiting to reduce the impact of clients accidentally or intentionally sending large amounts of traffic to your service, such as during a [*retry storm*](/azure/architecture/antipatterns/retry-storm/).
6060

6161
For more information, see the following resources:
6262
- [Configure a Web Application Firewall rate limit rule using Azure PowerShell](waf-front-door-rate-limit-powershell.md).

0 commit comments

Comments
 (0)