You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For more information about CNAME records, see [Create the CNAME DNS record](https://docs.microsoft.com/azure/cdn/cdn-map-content-to-custom-domain).
154
+
For more information about CNAME records, see [Create the CNAME DNS record](../cdn/cdn-map-content-to-custom-domain.md).
155
155
156
156
If your CNAME record is in the correct format, DigiCert automatically verifies your custom domain name and creates a dedicated certificate for your domain name. DigitCert won't send you a verification email and you won't need to approve your request. The certificate is valid for one year and will be autorenewed before it expires. Proceed to [Wait for propagation](#wait-for-propagation).
157
157
@@ -275,4 +275,4 @@ In this tutorial, you learned how to:
275
275
To learn how to set up a geo-filtering policy for you Front Door, continue to the next tutorial.
276
276
277
277
> [!div class="nextstepaction"]
278
-
> [Set up a geo-filtering policy](front-door-geo-filtering.md)
278
+
> [Set up a geo-filtering policy](front-door-geo-filtering.md)
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-custom-domain.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,9 +35,9 @@ In this tutorial, you learn how to:
35
35
36
36
* Before you can complete the steps in this tutorial, you must first create a Front Door. For more information, see [Quickstart: Create a Front Door](quickstart-create-front-door.md).
37
37
38
-
* If you do not already have a custom domain, you must first purchase one with a domain provider. For example, see [Buy a custom domain name](https://docs.microsoft.com/azure/app-service/manage-custom-dns-buy-domain).
38
+
* If you do not already have a custom domain, you must first purchase one with a domain provider. For example, see [Buy a custom domain name](../app-service/manage-custom-dns-buy-domain.md).
39
39
40
-
* If you are using Azure to host your [DNS domains](https://docs.microsoft.com/azure/dns/dns-overview), you must delegate the domain provider's domain name system (DNS) to an Azure DNS. For more information, see [Delegate a domain to Azure DNS](https://docs.microsoft.com/azure/dns/dns-delegate-domain-azure-dns). Otherwise, if you are using a domain provider to handle your DNS domain, proceed to [Create a CNAME DNS record](#create-a-cname-dns-record).
40
+
* If you are using Azure to host your [DNS domains](../dns/dns-overview.md), you must delegate the domain provider's domain name system (DNS) to an Azure DNS. For more information, see [Delegate a domain to Azure DNS](../dns/dns-delegate-domain-azure-dns.md). Otherwise, if you are using a domain provider to handle your DNS domain, proceed to [Create a CNAME DNS record](#create-a-cname-dns-record).
41
41
42
42
43
43
## Create a CNAME DNS record
@@ -205,4 +205,4 @@ In this tutorial, you learned how to:
205
205
To learn how to enable HTTPS for your custom domain, continue to the next tutorial.
206
206
207
207
> [!div class="nextstepaction"]
208
-
> [Enable HTTPS for a custom domain](front-door-custom-domain-https.md)
208
+
> [Enable HTTPS for a custom domain](front-door-custom-domain-https.md)
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-faq.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ Azure Front Door is a global service and is not tied to any specific Azure regio
66
66
67
67
### What are the POP locations for Azure Front Door?
68
68
69
-
Azure Front Door has the same list of POP (Point of Presence) locations as Azure CDN from Microsoft. For the complete list of our POPs, kindly refer [Azure CDN POP locations from Microsoft](https://docs.microsoft.com/azure/cdn/cdn-pop-locations).
69
+
Azure Front Door has the same list of POP (Point of Presence) locations as Azure CDN from Microsoft. For the complete list of our POPs, kindly refer [Azure CDN POP locations from Microsoft](../cdn/cdn-pop-locations.md).
70
70
71
71
### Is Azure Front Door a dedicated deployment for my application or is it shared across customers?
72
72
@@ -86,9 +86,9 @@ To lock down your application to accept traffic only from your specific Front Do
86
86
87
87
- Configure IP ACLing for your backends to accept traffic from Azure Front Door's backend IP address space and Azure's infrastructure services only. Refer the IP details below for ACLing your backend:
88
88
89
-
- Refer *AzureFrontDoor.Backend* section in [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519) for Front Door's IPv4 backend IP address range or you can also use the service tag *AzureFrontDoor.Backend* in your [network security groups](https://docs.microsoft.com/azure/virtual-network/security-overview#security-rules).
89
+
- Refer *AzureFrontDoor.Backend* section in [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519) for Front Door's IPv4 backend IP address range or you can also use the service tag *AzureFrontDoor.Backend* in your [network security groups](../virtual-network/network-security-groups-overview.md#security-rules).
90
90
- Front Door's **IPv6** backend IP space while covered in the service tag, is not listed in the Azure IP ranges JSON file. If you are looking for explicit IPv6 address range, it is currently limited to `2a01:111:2050::/44`
91
-
- Azure's [basic infrastructure services](https://docs.microsoft.com/azure/virtual-network/security-overview#azure-platform-considerations) through virtualized host IP addresses: `168.63.129.16` and `169.254.169.254`
91
+
- Azure's [basic infrastructure services](../virtual-network/network-security-groups-overview.md#azure-platform-considerations) through virtualized host IP addresses: `168.63.129.16` and `169.254.169.254`
92
92
93
93
> [!WARNING]
94
94
> Front Door's backend IP space may change later, however, we will ensure that before that happens, that we would have integrated with [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519). We recommend that you subscribe to [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519) for any changes or updates.
@@ -151,7 +151,7 @@ Azure Front Door (AFD) requires a public IP or publicly resolvable DNS name to r
151
151
152
152
### What are the various timeouts and limits for Azure Front Door?
153
153
154
-
Learn about all the documented [timeouts and limits for Azure Front Door](https://docs.microsoft.com/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-front-door-service-limits).
154
+
Learn about all the documented [timeouts and limits for Azure Front Door](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-front-door-service-limits).
155
155
156
156
### How long does it take for a rule to take effect after being added to the Front Door Rules Engine?
157
157
@@ -174,7 +174,7 @@ Front Door supports TLS versions 1.0, 1.1 and 1.2. TLS 1.3 is not yet supported.
174
174
### What certificates are supported on Azure Front Door?
175
175
176
176
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you can choose to use a certificate that is managed by Azure Front Door or use your own certificate.
177
-
The Front Door managed option provisions a standard TLS/SSL certificate via Digicert and stored in Front Door's Key Vault. If you choose to use your own certificate, then you can onboard a certificate from a supported CA and can be a standard TLS, extended validation certificate, or even a wildcard certificate. Self-signed certificates are not supported. Learn [how to enable HTTPS for a custom domain](https://aka.ms/FrontDoorCustomDomainHTTPS).
177
+
The Front Door managed option provisions a standard TLS/SSL certificate via Digicert and stored in Front Door's Key Vault. If you choose to use your own certificate, then you can onboard a certificate from a supported CA and can be a standard TLS, extended validation certificate, or even a wildcard certificate. Self-signed certificates are not supported. Learn [how to enable HTTPS for a custom domain](./front-door-custom-domain-https.md).
178
178
179
179
### Does Front Door support autorotation of certificates?
180
180
@@ -215,7 +215,7 @@ When using custom domains with TLS1.0/1.1 enabled the following cipher suites ar
215
215
216
216
### Can I configure TLS policy to control TLS Protocol versions?
217
217
218
-
You can configure a minimum TLS version in Azure Front Door in the custom domain HTTPS settings via Azure portal or the [Azure REST API](https://docs.microsoft.com/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2.
218
+
You can configure a minimum TLS version in Azure Front Door in the custom domain HTTPS settings via Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2.
219
219
220
220
### Can I configure Front Door to only support specific cipher suites?
221
221
@@ -242,7 +242,7 @@ For having successful HTTPS connections to your backend whether for health probe
242
242
243
243
1.**Certificate subject name mismatch**: For HTTPS connections, Front Door expects that your backend presents certificate from a valid CA with subject name(s) matching the backend hostname. As an example, if your backend hostname is set to `myapp-centralus.contosonews.net` and the certificate that your backend presents during the TLS handshake neither has `myapp-centralus.contosonews.net` nor `*myapp-centralus*.contosonews.net` in the subject name, the Front Door will refuse the connection and result in an error.
244
244
1.**Solution**: While it is not recommended from a compliance standpoint, you can workaround this error by disabling certificate subject name check for your Front Door. This is present under Settings in Azure portal and under BackendPoolsSettings in the API.
245
-
2.**Backend hosting certificate from invalid CA**: Only certificates from [valid CAs](/azure/frontdoor/front-door-troubleshoot-allowed-ca) can be used at the backend with Front Door. Certificates from internal CAs or self-signed certificates are not allowed.
245
+
2.**Backend hosting certificate from invalid CA**: Only certificates from [valid CAs](./front-door-troubleshoot-allowed-ca.md) can be used at the backend with Front Door. Certificates from internal CAs or self-signed certificates are not allowed.
246
246
247
247
### Can I use client/mutual authentication with Azure Front Door?
248
248
@@ -269,4 +269,4 @@ Yes, Azure Front Door does support alerts. Alerts are configured on metrics.
269
269
## Next steps
270
270
271
271
- Learn how to [create a Front Door](quickstart-create-front-door.md).
272
-
- Learn [how Front Door works](front-door-routing-architecture.md).
272
+
- Learn [how Front Door works](front-door-routing-architecture.md).
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-overview.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,11 @@ Front Door works at Layer 7 (HTTP/HTTPS layer) using anycast protocol with split
28
28
>[!NOTE]
29
29
> Azure provides a suite of fully managed load-balancing solutions for your scenarios.
30
30
> * If you are looking to do DNS based global routing and do **not** have requirements for Transport Layer Security (TLS) protocol termination ("SSL offload"), per-HTTP/HTTPS request or application-layer processing, review [Traffic Manager](../traffic-manager/traffic-manager-overview.md).
31
-
> * If you want to load balance between your servers in a region at the application layer, review [Application Gateway](../application-gateway/application-gateway-introduction.md)
31
+
> * If you want to load balance between your servers in a region at the application layer, review [Application Gateway](../application-gateway/overview.md)
32
32
> * To do network layer load balancing, review [Load Balancer](../load-balancer/load-balancer-overview.md).
33
33
>
34
34
> Your end-to-end scenarios may benefit from combining these solutions as needed.
35
-
> For an Azure load-balancing options comparison, see [Overview of load-balancing options in Azure](https://docs.microsoft.com/azure/architecture/guide/technology-choices/load-balancing-overview).
35
+
> For an Azure load-balancing options comparison, see [Overview of load-balancing options in Azure](/azure/architecture/guide/technology-choices/load-balancing-overview).
36
36
37
37
## Why use Azure Front Door?
38
38
@@ -73,4 +73,4 @@ Subscribe to the RSS feed and view the latest Azure Front Door feature updates o
73
73
## Next steps
74
74
75
75
- Learn how to [create a Front Door](quickstart-create-front-door.md).
76
-
- Learn [how Front Door works](front-door-routing-architecture.md).
76
+
- Learn [how Front Door works](front-door-routing-architecture.md).
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-tutorial-rules-engine.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ In this tutorial, you learn how to:
54
54
55
55
## Configure Rules Engine in Azure CLI
56
56
57
-
1. If you haven't already, install [Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli?view=azure-cli-latest&preserve-view=true). Add “front-door” extension:- az extension add --name front-door. Then, login and switch to your subscription az account set --subscription <name_or_Id>.
57
+
1. If you haven't already, install [Azure CLI](/cli/azure/install-azure-cli?preserve-view=true&view=azure-cli-latest). Add “front-door” extension:- az extension add --name front-door. Then, login and switch to your subscription az account set --subscription <name_or_Id>.
58
58
59
59
1. Start by creating a Rules Engine - this example shows one rule with one header-based action and one match condition.
60
60
@@ -92,7 +92,7 @@ In this tutorial, you learn how to:
92
92
az network front-door routing-rule update -g {rg} -f {front_door} -n {routing_rule_name} --remove rulesEngine # case sensitive word ‘rulesEngine’
93
93
```
94
94
95
-
For more information, a full list of AFD Rules Engine commands can be found [here](https://docs.microsoft.com/cli/azure/ext/front-door/network/front-door/rules-engine?view=azure-cli-latest&preserve-view=true).
95
+
For more information, a full list of AFD Rules Engine commands can be found [here](/cli/azure/ext/front-door/network/front-door/rules-engine?preserve-view=true&view=azure-cli-latest).
96
96
97
97
## Clean up resources
98
98
@@ -120,4 +120,4 @@ In this tutorial, you learned how to:
120
120
To learn how to add security headers with Rule Engine, continue to the next tutorial.
121
121
122
122
> [!div class="nextstepaction"]
123
-
> [Security headers with Rules Engine](front-door-security-headers.md)
123
+
> [Security headers with Rules Engine](front-door-security-headers.md)
0 commit comments