You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/frontdoor/front-door-faq.yml
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ sections:
45
45
46
46
- You want to balance the traffic not only globally, but also within your VNET. Front Door can only do path-based load balancing at the global level, but Application Gateway can do it within your VNET.
47
47
- You need Connection Draining, which Front Door doesn't support. Application Gateway can enable Connection Draining for your VMs or containers.
48
-
- You want to offload all the TLS/SSL processing and use only HTTP requests in your VNET. Application Gateway behind Front Door can achieve this set up.
48
+
- You want to offload all the TLS/SSL processing and use only HTTP requests in your VNET. Application Gateway behind Front Door can achieve this setup.
49
49
- You want to use session affinity at both the regional and the server level. Front Door can send the traffic from a user session to the same backend in a region, but Application Gateway can send it to the same server in the backend.
50
50
51
51
- question: |
@@ -89,7 +89,7 @@ sections:
89
89
Azure Front Door isn't limited to any Azure region, but operates globally. The only location you have to choose when you create a Front Door is the location of the resource group, which determines where the resource group's metadata get stored. The Front Door profile is a global resource and its configuration is distributed to all edge locations worldwide.
90
90
91
91
- question: |
92
-
What are the locations of the Azure Front Door POPs (point-of-presences)?
92
+
What are the locations of the Azure Front Door POPs (points-of-presences)?
93
93
answer: |
94
94
For the complete list of points of presence (POPs) that provide global load balancing and content delivery for Azure Front Door, see [Azure Front Door POP locations](edge-locations-by-region.md). This list is updated regularly as new POPs are added or removed. You can also use the Azure Resource Manager API to query the current list of POPs programmatically.
95
95
@@ -111,7 +111,7 @@ sections:
111
111
- question: |
112
112
What are the steps to restrict the access to my backend to only Azure Front Door?
113
113
answer: |
114
-
To ensure optimal performance of Front Door's features, you should only allow traffic that comes from Azure Front Door to reach your origin. As a result, unauthorized or malicious requests encounter the security and routing policies of Front Door and be denied access. To learn how to secure your origin, see [Secure traffic to Azure Front Door origins](origin-security.md).
114
+
To ensure optimal performance of Front Door's features, you should only allow traffic that comes from Azure Front Door to reach your origin. As a result, unauthorized or malicious requests encounter the security and routing policies of Front Door and are denied access. To learn how to secure your origin, see [Secure traffic to Azure Front Door origins](origin-security.md).
115
115
116
116
- question: |
117
117
Does the anycast IP of my Front Door remain the same throughout its lifetime?
@@ -180,7 +180,7 @@ sections:
180
180
- question: |
181
181
Is it possible to configure Azure Front Door behind another Front Door profile or the other way around?
182
182
answer: |
183
-
The fact that both profiles would use the same Azure edge sites to handle incoming requests causes this limitation that prevents you from nesting one Azure Front Door profile behind another. This set up would cause routing conflicts and performance issues. Therefore, you should ensure that your Azure Front Door profiles are independent and not chained together, if you need to use multiple profiles for your applications.
183
+
The fact that both profiles would use the same Azure edge sites to handle incoming requests causes this limitation that prevents you from nesting one Azure Front Door profile behind another. This setup would cause routing conflicts and performance issues. Therefore, you should ensure that your Azure Front Door profiles are independent and not chained together, if you need to use multiple profiles for your applications.
184
184
185
185
- question: |
186
186
What are the network service tags that Front Door supports?
@@ -243,7 +243,7 @@ sections:
243
243
We recommend that you review your existing Azure Front Door and Azure CDN Standard from Microsoft (classic) resources and ensure that they don't rely on domain fronting behavior. If you have any questions or concerns, contact our support team.
244
244
245
245
When Front Door blocks a request due to a mismatch:
246
-
- The client receives an HTTP `421 Misdirected Request`` error code response.
246
+
- The client receives an HTTP `421 Misdirected Request` error code response.
247
247
- Azure Front Door logs the block in the diagnostic logs under the **Error Info** property with the value **SSLMismatchedSNI**.
248
248
249
249
For more information about domain fronting, see [Securing our approach to domain fronting within Azure](https://www.microsoft.com/security/blog/2021/03/26/securing-our-approach-to-domain-fronting-within-azure/).
@@ -290,5 +290,5 @@ additionalContent: |
290
290
291
291
## Next steps
292
292
293
-
- Learn how to [create an Front Door](quickstart-create-front-door.md) profile.
293
+
- Learn how to [create an Azure Front Door](quickstart-create-front-door.md) profile.
294
294
- Learn about the [Azure Front Door architecture](front-door-routing-architecture.md).
0 commit comments