Skip to content

Commit 92356b0

Browse files
committed
Links: Azure - frontdoor
1 parent 23f542b commit 92356b0

7 files changed

+36
-36
lines changed

articles/frontdoor/front-door-custom-domain-https.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ Your CNAME record should be in the following format, where *Name* is your custom
151151
|-----------------|-------|-----------------------|
152152
| <www.contoso.com> | CNAME | contoso.azurefd.net |
153153

154-
For more information about CNAME records, see [Create the CNAME DNS record](https://docs.microsoft.com/azure/cdn/cdn-map-content-to-custom-domain).
154+
For more information about CNAME records, see [Create the CNAME DNS record](../cdn/cdn-map-content-to-custom-domain.md).
155155

156156
If your CNAME record is in the correct format, DigiCert automatically verifies your custom domain name and creates a dedicated certificate for your domain name. DigitCert won't send you a verification email and you won't need to approve your request. The certificate is valid for one year and will be autorenewed before it expires. Proceed to [Wait for propagation](#wait-for-propagation).
157157

@@ -275,4 +275,4 @@ In this tutorial, you learned how to:
275275
To learn how to set up a geo-filtering policy for you Front Door, continue to the next tutorial.
276276

277277
> [!div class="nextstepaction"]
278-
> [Set up a geo-filtering policy](front-door-geo-filtering.md)
278+
> [Set up a geo-filtering policy](front-door-geo-filtering.md)

articles/frontdoor/front-door-custom-domain.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,9 @@ In this tutorial, you learn how to:
3535

3636
* Before you can complete the steps in this tutorial, you must first create a Front Door. For more information, see [Quickstart: Create a Front Door](quickstart-create-front-door.md).
3737

38-
* If you do not already have a custom domain, you must first purchase one with a domain provider. For example, see [Buy a custom domain name](https://docs.microsoft.com/azure/app-service/manage-custom-dns-buy-domain).
38+
* If you do not already have a custom domain, you must first purchase one with a domain provider. For example, see [Buy a custom domain name](../app-service/manage-custom-dns-buy-domain.md).
3939

40-
* If you are using Azure to host your [DNS domains](https://docs.microsoft.com/azure/dns/dns-overview), you must delegate the domain provider's domain name system (DNS) to an Azure DNS. For more information, see [Delegate a domain to Azure DNS](https://docs.microsoft.com/azure/dns/dns-delegate-domain-azure-dns). Otherwise, if you are using a domain provider to handle your DNS domain, proceed to [Create a CNAME DNS record](#create-a-cname-dns-record).
40+
* If you are using Azure to host your [DNS domains](../dns/dns-overview.md), you must delegate the domain provider's domain name system (DNS) to an Azure DNS. For more information, see [Delegate a domain to Azure DNS](../dns/dns-delegate-domain-azure-dns.md). Otherwise, if you are using a domain provider to handle your DNS domain, proceed to [Create a CNAME DNS record](#create-a-cname-dns-record).
4141

4242

4343
## Create a CNAME DNS record
@@ -205,4 +205,4 @@ In this tutorial, you learned how to:
205205
To learn how to enable HTTPS for your custom domain, continue to the next tutorial.
206206

207207
> [!div class="nextstepaction"]
208-
> [Enable HTTPS for a custom domain](front-door-custom-domain-https.md)
208+
> [Enable HTTPS for a custom domain](front-door-custom-domain-https.md)

articles/frontdoor/front-door-faq.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ Azure Front Door is a global service and is not tied to any specific Azure regio
6666

6767
### What are the POP locations for Azure Front Door?
6868

69-
Azure Front Door has the same list of POP (Point of Presence) locations as Azure CDN from Microsoft. For the complete list of our POPs, kindly refer [Azure CDN POP locations from Microsoft](https://docs.microsoft.com/azure/cdn/cdn-pop-locations).
69+
Azure Front Door has the same list of POP (Point of Presence) locations as Azure CDN from Microsoft. For the complete list of our POPs, kindly refer [Azure CDN POP locations from Microsoft](../cdn/cdn-pop-locations.md).
7070

7171
### Is Azure Front Door a dedicated deployment for my application or is it shared across customers?
7272

@@ -86,9 +86,9 @@ To lock down your application to accept traffic only from your specific Front Do
8686

8787
- Configure IP ACLing for your backends to accept traffic from Azure Front Door's backend IP address space and Azure's infrastructure services only. Refer the IP details below for ACLing your backend:
8888

89-
- Refer *AzureFrontDoor.Backend* section in [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519) for Front Door's IPv4 backend IP address range or you can also use the service tag *AzureFrontDoor.Backend* in your [network security groups](https://docs.microsoft.com/azure/virtual-network/security-overview#security-rules).
89+
- Refer *AzureFrontDoor.Backend* section in [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519) for Front Door's IPv4 backend IP address range or you can also use the service tag *AzureFrontDoor.Backend* in your [network security groups](../virtual-network/network-security-groups-overview.md#security-rules).
9090
- Front Door's **IPv6** backend IP space while covered in the service tag, is not listed in the Azure IP ranges JSON file. If you are looking for explicit IPv6 address range, it is currently limited to `2a01:111:2050::/44`
91-
- Azure's [basic infrastructure services](https://docs.microsoft.com/azure/virtual-network/security-overview#azure-platform-considerations) through virtualized host IP addresses: `168.63.129.16` and `169.254.169.254`
91+
- Azure's [basic infrastructure services](../virtual-network/network-security-groups-overview.md#azure-platform-considerations) through virtualized host IP addresses: `168.63.129.16` and `169.254.169.254`
9292

9393
> [!WARNING]
9494
> Front Door's backend IP space may change later, however, we will ensure that before that happens, that we would have integrated with [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519). We recommend that you subscribe to [Azure IP Ranges and Service Tags](https://www.microsoft.com/download/details.aspx?id=56519) for any changes or updates.
@@ -151,7 +151,7 @@ Azure Front Door (AFD) requires a public IP or publicly resolvable DNS name to r
151151

152152
### What are the various timeouts and limits for Azure Front Door?
153153

154-
Learn about all the documented [timeouts and limits for Azure Front Door](https://docs.microsoft.com/azure/azure-resource-manager/management/azure-subscription-service-limits#azure-front-door-service-limits).
154+
Learn about all the documented [timeouts and limits for Azure Front Door](../azure-resource-manager/management/azure-subscription-service-limits.md#azure-front-door-service-limits).
155155

156156
### How long does it take for a rule to take effect after being added to the Front Door Rules Engine?
157157

@@ -174,7 +174,7 @@ Front Door supports TLS versions 1.0, 1.1 and 1.2. TLS 1.3 is not yet supported.
174174
### What certificates are supported on Azure Front Door?
175175

176176
To enable the HTTPS protocol for securely delivering content on a Front Door custom domain, you can choose to use a certificate that is managed by Azure Front Door or use your own certificate.
177-
The Front Door managed option provisions a standard TLS/SSL certificate via Digicert and stored in Front Door's Key Vault. If you choose to use your own certificate, then you can onboard a certificate from a supported CA and can be a standard TLS, extended validation certificate, or even a wildcard certificate. Self-signed certificates are not supported. Learn [how to enable HTTPS for a custom domain](https://aka.ms/FrontDoorCustomDomainHTTPS).
177+
The Front Door managed option provisions a standard TLS/SSL certificate via Digicert and stored in Front Door's Key Vault. If you choose to use your own certificate, then you can onboard a certificate from a supported CA and can be a standard TLS, extended validation certificate, or even a wildcard certificate. Self-signed certificates are not supported. Learn [how to enable HTTPS for a custom domain](./front-door-custom-domain-https.md).
178178

179179
### Does Front Door support autorotation of certificates?
180180

@@ -215,7 +215,7 @@ When using custom domains with TLS1.0/1.1 enabled the following cipher suites ar
215215

216216
### Can I configure TLS policy to control TLS Protocol versions?
217217

218-
You can configure a minimum TLS version in Azure Front Door in the custom domain HTTPS settings via Azure portal or the [Azure REST API](https://docs.microsoft.com/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2.
218+
You can configure a minimum TLS version in Azure Front Door in the custom domain HTTPS settings via Azure portal or the [Azure REST API](/rest/api/frontdoorservice/frontdoor/frontdoors/createorupdate#minimumtlsversion). Currently, you can choose between 1.0 and 1.2.
219219

220220
### Can I configure Front Door to only support specific cipher suites?
221221

@@ -242,7 +242,7 @@ For having successful HTTPS connections to your backend whether for health probe
242242

243243
1. **Certificate subject name mismatch**: For HTTPS connections, Front Door expects that your backend presents certificate from a valid CA with subject name(s) matching the backend hostname. As an example, if your backend hostname is set to `myapp-centralus.contosonews.net` and the certificate that your backend presents during the TLS handshake neither has `myapp-centralus.contosonews.net` nor `*myapp-centralus*.contosonews.net` in the subject name, the Front Door will refuse the connection and result in an error.
244244
1. **Solution**: While it is not recommended from a compliance standpoint, you can workaround this error by disabling certificate subject name check for your Front Door. This is present under Settings in Azure portal and under BackendPoolsSettings in the API.
245-
2. **Backend hosting certificate from invalid CA**: Only certificates from [valid CAs](/azure/frontdoor/front-door-troubleshoot-allowed-ca) can be used at the backend with Front Door. Certificates from internal CAs or self-signed certificates are not allowed.
245+
2. **Backend hosting certificate from invalid CA**: Only certificates from [valid CAs](./front-door-troubleshoot-allowed-ca.md) can be used at the backend with Front Door. Certificates from internal CAs or self-signed certificates are not allowed.
246246

247247
### Can I use client/mutual authentication with Azure Front Door?
248248

@@ -269,4 +269,4 @@ Yes, Azure Front Door does support alerts. Alerts are configured on metrics.
269269
## Next steps
270270

271271
- Learn how to [create a Front Door](quickstart-create-front-door.md).
272-
- Learn [how Front Door works](front-door-routing-architecture.md).
272+
- Learn [how Front Door works](front-door-routing-architecture.md).

articles/frontdoor/front-door-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@ Front Door works at Layer 7 (HTTP/HTTPS layer) using anycast protocol with split
2828
>[!NOTE]
2929
> Azure provides a suite of fully managed load-balancing solutions for your scenarios.
3030
> * If you are looking to do DNS based global routing and do **not** have requirements for Transport Layer Security (TLS) protocol termination ("SSL offload"), per-HTTP/HTTPS request or application-layer processing, review [Traffic Manager](../traffic-manager/traffic-manager-overview.md).
31-
> * If you want to load balance between your servers in a region at the application layer, review [Application Gateway](../application-gateway/application-gateway-introduction.md)
31+
> * If you want to load balance between your servers in a region at the application layer, review [Application Gateway](../application-gateway/overview.md)
3232
> * To do network layer load balancing, review [Load Balancer](../load-balancer/load-balancer-overview.md).
3333
>
3434
> Your end-to-end scenarios may benefit from combining these solutions as needed.
35-
> For an Azure load-balancing options comparison, see [Overview of load-balancing options in Azure](https://docs.microsoft.com/azure/architecture/guide/technology-choices/load-balancing-overview).
35+
> For an Azure load-balancing options comparison, see [Overview of load-balancing options in Azure](/azure/architecture/guide/technology-choices/load-balancing-overview).
3636
3737
## Why use Azure Front Door?
3838

@@ -73,4 +73,4 @@ Subscribe to the RSS feed and view the latest Azure Front Door feature updates o
7373
## Next steps
7474

7575
- Learn how to [create a Front Door](quickstart-create-front-door.md).
76-
- Learn [how Front Door works](front-door-routing-architecture.md).
76+
- Learn [how Front Door works](front-door-routing-architecture.md).

articles/frontdoor/front-door-tutorial-rules-engine.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ In this tutorial, you learn how to:
5454

5555
## Configure Rules Engine in Azure CLI
5656

57-
1. If you haven't already, install [Azure CLI](https://docs.microsoft.com/cli/azure/install-azure-cli?view=azure-cli-latest&preserve-view=true). Add “front-door” extension:- az extension add --name front-door. Then, login and switch to your subscription az account set --subscription <name_or_Id>.
57+
1. If you haven't already, install [Azure CLI](/cli/azure/install-azure-cli?preserve-view=true&view=azure-cli-latest). Add “front-door” extension:- az extension add --name front-door. Then, login and switch to your subscription az account set --subscription <name_or_Id>.
5858

5959
1. Start by creating a Rules Engine - this example shows one rule with one header-based action and one match condition.
6060

@@ -92,7 +92,7 @@ In this tutorial, you learn how to:
9292
az network front-door routing-rule update -g {rg} -f {front_door} -n {routing_rule_name} --remove rulesEngine # case sensitive word ‘rulesEngine’
9393
```
9494
95-
For more information, a full list of AFD Rules Engine commands can be found [here](https://docs.microsoft.com/cli/azure/ext/front-door/network/front-door/rules-engine?view=azure-cli-latest&preserve-view=true).
95+
For more information, a full list of AFD Rules Engine commands can be found [here](/cli/azure/ext/front-door/network/front-door/rules-engine?preserve-view=true&view=azure-cli-latest).
9696
9797
## Clean up resources
9898
@@ -120,4 +120,4 @@ In this tutorial, you learned how to:
120120
To learn how to add security headers with Rule Engine, continue to the next tutorial.
121121
122122
> [!div class="nextstepaction"]
123-
> [Security headers with Rules Engine](front-door-security-headers.md)
123+
> [Security headers with Rules Engine](front-door-security-headers.md)

0 commit comments

Comments
 (0)