Skip to content

Commit 9c18807

Browse files
committed
minor update.
1 parent 88a3788 commit 9c18807

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

articles/ddos-protection/inline-protection-glb.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -66,19 +66,19 @@ For detailed deployment instructions, see [Protect your public load balancer wit
6666

6767
To ensure effective DDoS protection using Gateway Load Balancer and partner NVAs, follow these best practices.
6868

69-
- **Scale NVAs appropriately to handle peak traffic volumes.**
69+
- **Scale NVAs appropriately to handle peak traffic volumes:**
7070

7171
Ensure that your NVAs are sized and configured to accommodate the highest expected levels of traffic. Under-provisioned NVAs can become a bottleneck, reducing the effectiveness of DDoS mitigation and potentially impacting application performance. Use Azure monitoring tools to track traffic patterns and adjust scaling as needed. for more information, see [Azure Monitor](/azure/azure-monitor/fundamentals/overview) and [Network Watcher](/azure/network-watcher/network-watcher-monitoring-overview).
7272

73-
- **Deploy NVAs in a high-availability configuration to avoid single points of failure.**
73+
- **Deploy NVAs in a high-availability configuration to avoid single points of failure:**
7474

7575
Configure multiple NVAs in an active-active or active-passive configuration to ensure continuous protection, even if one appliance fails or requires maintenance. Use Azure Load Balancer health probes to monitor NVA health and automatically reroute traffic if an instance becomes unavailable. For more information, see [Azure Load Balancer health probes](../load-balancer/load-balancer-custom-probe-overview.md).
7676

77-
- **Regularly monitor and tune NVAs to maintain optimal performance.**
77+
- **Regularly monitor and tune NVAs to maintain optimal performance:**
7878

7979
Continuously monitor the performance and health of your NVAs using Azure Monitor, Network Watcher, and NVA-specific dashboards. Review logs and alerts for unusual activity or performance degradation. Update NVA software and signatures regularly to protect against the latest threats and vulnerabilities.
8080

81-
- **Test your DDoS protection setup to validate end-to-end traffic flow and mitigation.**
81+
- **Test your DDoS protection setup to validate end-to-end traffic flow and mitigation:**
8282

8383
Periodically simulate DDoS attack scenarios and perform failover tests to ensure your protection setup is working as intended. Validate that traffic flows through the NVAs as expected and that mitigation actions are triggered appropriately. Document your test results and update your configuration or runbooks as needed to address any issues. For more information, see [testing DDoS protection](../ddos-protection/test-through-simulations.md).
8484

0 commit comments

Comments
 (0)