You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-signalr/signalr-howto-configure-application-firewall.md
+49-2Lines changed: 49 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ The Application Firewall provides sophisticated control over client connections
17
17
18
18
## What Does the Application Firewall Do?
19
19
20
-
The Application Firewall consists of various rule lists. Currently, there is a rule list called *Client Connection Count Rules*. Future updates will support more rule lists to control aspects like connection lifetime and message throughput.
20
+
The Application Firewall consists of various rule lists. Currently, there are two rule lists called *Client Connection Count Rules* and *Client Traffic Control Rules*. Future updates will support more rule lists to control aspects such as connection lifetime.
21
21
22
22
This guideline is divided into three parts:
23
23
1. Introduction to different application firewall rules.
@@ -56,7 +56,18 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
56
56
> [!WARNING]
57
57
> ***Avoid using too aggressive maxCount**. Client connections may close without completing the TCP handshake. SignalR service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
58
58
59
+
## Client Traffic Control Rules
60
+
Client Traffic Control Rules restrict the inbound throughput of client connections. When a client attempts to send a message, the rules are checked **sequentially**. Within each *aggregation window*, the message size will be aggregated to check against *max inbound message*. If any rule is violated, the connection is disconnected.
59
61
62
+
#### TrafficThrottleByUserIdRule
63
+
This rule limits the inbound throughput of a user.
64
+
65
+
#### TrafficThrottleByJwtSignatureRule
66
+
This rule limits the inbound throughput of each token.
67
+
68
+
#### TrafficThrottleByJwtCustomClaimRule
69
+
This rule limits the inbound throughput of the same claim.
70
+
60
71
61
72
## Set up Application Firewall
62
73
@@ -73,7 +84,7 @@ Use Visual Studio Code or your favorite editor to create a file with the followi
Copy file name to clipboardExpand all lines: articles/azure-web-pubsub/howto-configure-application-firewall.md
+42-16Lines changed: 42 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,12 +12,12 @@ ms.author: biqian
12
12
13
13
The Application Firewall provides sophisticated control over client connections in a distributed system. Before diving into its functionality and setup, let's clarify what the Application Firewall does not do:
14
14
15
-
1. It does not replace authentication. The firewall operates behind the client connection authentication layer.
16
-
2. It is not related to network layer access control.
15
+
1. It doesn't replace authentication. The firewall operates behind the client connection authentication layer.
16
+
2. It isn't related to network layer access control.
17
17
18
18
## What Does the Application Firewall Do?
19
19
20
-
The Application Firewall consists of various rule lists. Currently, there is a rule list called *Client Connection Count Rules*. Future updates will support more rule lists to control aspects like connection lifetime and message throughput.
20
+
The Application Firewall consists of various rule lists. Currently, there are two rule lists called *Client Connection Count Rules* and *Client Traffic Control Rules*. Future updates will support more rule lists to control aspects such as connection lifetime.
21
21
22
22
This guideline is divided into three parts:
23
23
1. Introduction to different application firewall rules.
@@ -48,6 +48,14 @@ Client Connection Count Rules restrict concurrent client connections. When a cli
48
48
> ***Avoid using too aggressive maxCount**. Client connections may close without completing the TCP handshake. SignalR service can't detect those "half-closed" connections immediately. The connection is taken as active until the heartbeat failure. Therefore, aggressive throttling strategies might unexpectedly throttle clients. A smoother approach is to **leave some buffer** for the connection count, for example: double the *maxCount*.
49
49
50
50
51
+
## Client Traffic Control Rules
52
+
Client Traffic Control Rules restrict the inbound throughput of client connections. When a client attempts to send a message, the rules are checked **sequentially**. Within each *aggregation window*, the message size will be aggregated to check against *max inbound message*. If any rule is violated, the connection is disconnected.
53
+
54
+
#### TrafficThrottleByUserIdRule
55
+
This rule limits the inbound throughput of a user.
56
+
57
+
#### TrafficThrottleByJwtSignatureRule
58
+
This rule limits the inbound throughput of each token.
51
59
52
60
## Set up Application Firewall
53
61
@@ -64,22 +72,40 @@ Use Visual Studio Code or your favorite editor to create a file with the followi
64
72
@description('The name for your Web PubSub service')
0 commit comments