Skip to content

Commit ecd50b9

Browse files
Merge pull request #290490 from duongau/afdfreshness2
Front Door - Freshness review (Batch 2 - November 2024)
2 parents b40fed9 + 7c8b09a commit ecd50b9

File tree

7 files changed

+265
-263
lines changed

7 files changed

+265
-263
lines changed

articles/frontdoor/endpoint.md

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -6,59 +6,59 @@ services: frontdoor
66
author: duongau
77
ms.service: azure-frontdoor
88
ms.topic: conceptual
9-
ms.date: 08/09/2023
9+
ms.date: 11/13/2024
1010
ms.author: duau
1111
---
1212

1313
# Endpoints in Azure Front Door
1414

15-
In Azure Front Door, an *endpoint* is a logical grouping of one or more routes that are associated with domain names. Each endpoint is [assigned a domain name](#endpoint-domain-names) by Front Door, and you can associate your own custom domains by using routes.
15+
In Azure Front Door, an *endpoint* is a logical grouping of one or more routes associated with domain names. Each endpoint is [assigned a domain name](#endpoint-domain-names) by Front Door, and you can also associate your own custom domains using routes.
1616

1717
## How many endpoints should I create?
1818

19-
A Front Door profile can contain multiple endpoints. However, in many situations you might only need a single endpoint.
19+
A Front Door profile can contain multiple endpoints, but in many cases, a single endpoint might suffice.
2020

21-
When you're planning the endpoints to create, consider the following factors:
21+
Consider the following factors when planning your endpoints:
2222

23-
- If all of your domains use the same or similar route paths, it's probably best to combine them into a single endpoint.
24-
- If you use different routes and route paths for each domain, consider using separate endpoints, such as by having an endpoint for each custom domain.
25-
- If you need to enable or disable all of your domains together, consider using a single endpoint. An entire endpoint can be enabled or disabled together.
23+
- If all your domains use the same or similar route paths, it's likely best to combine them into a single endpoint.
24+
- If you use different routes and route paths for each domain, consider creating separate endpoints, such as one for each custom domain.
25+
- If you need to enable or disable all your domains together, consider using a single endpoint, as an entire endpoint can be enabled or disabled at once.
2626

2727
## Endpoint domain names
2828

2929
Endpoint domain names are automatically generated when you create a new endpoint. Front Door generates a unique domain name based on several components, including:
3030

3131
- The endpoint's name.
32-
- A pseudorandom hash value, which gets determined by Front Door. By using hash values as part of the domain name, Front Door helps to protect against [subdomain takeover](../security/fundamentals/subdomain-takeover.md) attacks.
33-
- The base domain name for your Front Door environment. Generally is `z01.azurefd.net`.
32+
- A pseudorandom hash value determined by Front Door, which helps protect against [subdomain takeover](../security/fundamentals/subdomain-takeover.md) attacks.
33+
- The base domain name for your Front Door environment, generally `z01.azurefd.net`.
3434

35-
For example, suppose you have created an endpoint named `myendpoint`. The endpoint domain name might be `myendpoint-mdjf2jfgjf82mnzx.z01.azurefd.net`.
35+
For example, if you create an endpoint named `myendpoint`, the endpoint domain name might be `myendpoint-mdjf2jfgjf82mnzx.z01.azurefd.net`.
3636

3737
The endpoint domain is accessible when you associate it with a route.
3838

3939
### Reuse of an endpoint domain name
4040

41-
When you delete and redeploy an endpoint, you might expect to get the same pseudorandom hash value, and therefore the same endpoint domain name. Front Door enables you to control how the pseudorandom hash values are reused on an endpoint-by-endpoint basis.
41+
When you delete and redeploy an endpoint, you might expect to get the same pseudorandom hash value and, therefore, the same endpoint domain name. Front Door allows you to control how these pseudorandom hash values are reused on an endpoint-by-endpoint basis.
4242

4343
An endpoint's domain can be reused within the same tenant, subscription, or resource group scope level. You can also choose to not allow the reuse of an endpoint domain. By default, Front Door allows reuse of the endpoint domain within the same Microsoft Entra tenant.
4444

45-
You can use Bicep, an Azure Resource Manager template (ARM template), the Azure CLI, or Azure PowerShell to configure the scope level of the endpoint's domain reuse behavior. You can also configure it for all Front Door endpoints in your whole organization by using Azure Policy. The Azure portal uses the scope level you define through the command line once it has been changed.
45+
You can configure the scope level of the endpoint's domain reuse behavior using Bicep, an Azure Resource Manager (ARM) template, the Azure CLI, or Azure PowerShell. Additionally, you can configure it for all Front Door endpoints in your organization using Azure Policy. The Azure portal uses the scope level you define through the command line once it has been changed.
4646

4747
The following table lists the allowable values for the endpoint's domain reuse behavior:
4848

4949
| Value | Description |
5050
|--|--|
5151
| `TenantReuse` | This is the default value. Endpoints with the same name in the same Microsoft Entra tenant receive the same domain label. |
5252
| `SubscriptionReuse` | Endpoints with the same name in the same Azure subscription receive the same domain label. |
53-
| `ResourceGroupReuse` | Endpoints with the same name in the same resource group receives the same domain label. |
53+
| `ResourceGroupReuse` | Endpoints with the same name in the same resource group receive the same domain label. |
5454
| `NoReuse` | Endpoints always receive a new domain label. |
5555

5656
> [!NOTE]
57-
> You can't modify the reuse behavior of an existing Front Door endpoint. The reuse behavior only applies to newly created endpoints.
57+
> The reuse behavior cannot be modified for an existing Front Door endpoint. It only applies to newly created endpoints.
5858
59-
The following example shows how to create a new Front Door endpoint with a reuse scope of `SubscriptionReuse`:
59+
The following examples demonstrate how to create a new Front Door endpoint with the reuse scope set to `SubscriptionReuse`:
6060

61-
# [Azure CLI](#tab/azurecli)
61+
### Azure CLI
6262

6363
```azurecli
6464
az afd endpoint create \
@@ -68,7 +68,7 @@ az afd endpoint create \
6868
--name-reuse-scope SubscriptionReuse
6969
```
7070

71-
# [Azure PowerShell](#tab/azurepowershell)
71+
### Azure PowerShell
7272

7373
```azurepowershell
7474
New-AzFrontDoorCdnEndpoint `
@@ -79,7 +79,7 @@ New-AzFrontDoorCdnEndpoint `
7979
-AutoGeneratedDomainNameLabelScope SubscriptionReuse
8080
```
8181

82-
# [Bicep](#tab/bicep)
82+
### Bicep
8383

8484
```bicep
8585
resource endpoint 'Microsoft.Cdn/profiles/afdEndpoints@2021-06-01' = {

articles/frontdoor/front-door-ddos.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -1,57 +1,57 @@
11
---
22
title: DDoS protection on Azure Front Door
3-
description: This page provides information about how Azure Front Door helps to protect against DDoS attacks.
3+
description: Learn how Azure Front Door provides robust protection against DDoS attacks, ensuring the security and performance of your web applications.
44
services: frontdoor
55
author: duongau
66
ms.service: azure-frontdoor
77
ms.topic: conceptual
8-
ms.date: 10/23/2023
8+
ms.date: 11/13/2024
99
ms.author: duau
1010
---
1111

12-
# DDoS protection on Front Door
12+
# DDoS Protection on Azure Front Door
1313

14-
Azure Front Door is a Content Delivery Network (CDN) that can help you protect your origins from HTTP(S) DDoS attacks by distributing the traffic across its 192 edge POPs worldwide. These POPs uses our large private WAN to deliver your web applications and services faster and more securely to your end users. Azure Front Door also includes layer 3, 4, and 7 DDoS protection and a web application firewall (WAF) to help protect your applications from common exploits and vulnerabilities.
14+
Azure Front Door is a Content Delivery Network (CDN) that helps protect your origins from HTTP(S) DDoS attacks by distributing traffic across its 192 edge Points of Presence (POPs) worldwide. These POPs use Azure's large private WAN to deliver your web applications and services faster and more securely to your end users. Azure Front Door includes layer 3, 4, and 7 DDoS protection and a Web Application Firewall (WAF) to safeguard your applications from common exploits and vulnerabilities.
1515

16-
## Infrastructure DDoS protection
16+
## Infrastructure DDoS Protection
1717

18-
Azure Front Door benefits from the [default Azure infrastructure DDoS protection](../ddos-protection/ddos-protection-overview.md). This protection monitors and mitigates network layer attacks in real time by using the global scale and capacity of Front Door’s network. This protection has a proven track record in safeguarding Microsoft’s enterprise and consumer services from large-scale attacks.
18+
Azure Front Door benefits from the [default Azure infrastructure DDoS protection](../ddos-protection/ddos-protection-overview.md). This protection monitors and mitigates network layer attacks in real-time using the global scale and capacity of Azure Front Door’s network. It has a proven track record of safeguarding Microsoft’s enterprise and consumer services from large-scale attacks.
1919

20-
## Protocol blocking
20+
## Protocol Blocking
2121

22-
Azure Front Door supports only the HTTP and HTTPS protocols, and requires a valid `Host`` header for each request. This behavior helps to prevent some common DDoS attack types such as volumetric attacks that use various protocols and ports, DNS amplification attacks, and TCP poisoning attacks.
22+
Azure Front Door supports only HTTP and HTTPS protocols and requires a valid `Host` header for each request. This behavior helps prevent common DDoS attack types such as volumetric attacks using various protocols and ports, DNS amplification attacks, and TCP poisoning attacks.
2323

24-
## Capacity absorption
24+
## Capacity Absorption
2525

26-
Azure Front Door is a large-scale, globally distributed service. It serves many customers, including Microsoft’s own cloud products that handle hundreds of thousands of requests per second. Front Door is situated at the edge of Azure’s network, where it can intercept and geographically isolate large volume attacks. Therefore, Front Door can prevent malicious traffic from reaching beyond the edge of the Azure network.
26+
Azure Front Door is a large-scale, globally distributed service that serves many customers, including Microsoft’s own cloud products, which handle hundreds of thousands of requests per second. Positioned at the edge of Azure’s network, Azure Front Door can intercept and geographically isolate large volume attacks, preventing malicious traffic from reaching beyond the edge of the Azure network.
2727

2828
## Caching
2929

30-
You can use [Front Door’s caching capabilities](./front-door-caching.md) to protect your backends from large traffic volumes generated by an attack. Front Door edge nodes return cached resources and avoid forwarding them to your backend. Even short cache expiry times (seconds or minutes) on dynamic responses can significantly reduce the load on your backend services. For more information about caching concepts and patterns, see [Caching considerations](/azure/architecture/best-practices/caching) and [Cache-aside pattern](/azure/architecture/patterns/cache-aside).
30+
You can use Azure Front Door [caching capabilities](./front-door-caching.md) to protect your backends from large traffic volumes generated by an attack. Azure Front Door edge nodes return cached resources, avoiding forwarding them to your backend. Even short cache expiry times (seconds or minutes) on dynamic responses can significantly reduce the load on your backend services. For more information about caching concepts and patterns, see [Caching considerations](/azure/architecture/best-practices/caching) and [Cache-aside pattern](/azure/architecture/patterns/cache-aside).
3131

3232
## Web Application Firewall (WAF)
3333

34-
You can use [Front Door's Web Application Firewall (WAF)](../web-application-firewall/afds/afds-overview.md) to mitigate many different types of attacks:
34+
You can use [Azure Web Application Firewall (WAF)](../web-application-firewall/afds/afds-overview.md) to mitigate various types of attacks:
3535

36-
* The managed rule set protects your application from many common attacks. For more information, see [Managed rules](../web-application-firewall/afds/waf-front-door-drs.md).
37-
* You can block or redirect traffic from outside or inside a specific geographic region to a static webpage. For more information, see [Geo-filtering](../web-application-firewall/afds/waf-front-door-geo-filtering.md).
38-
* You can block IP addresses and ranges that you identify as malicious. For more information, see [IP restrictions](../web-application-firewall/afds/waf-front-door-configure-ip-restriction.md).
39-
* You can apply rate limiting to prevent IP addresses from calling your service too frequently. For more information, see [Rate limiting](../web-application-firewall/afds/waf-front-door-rate-limit.md).
40-
* You can create [custom WAF rules](../web-application-firewall/afds/waf-front-door-custom-rules.md) to automatically block and rate limit HTTP or HTTPS attacks that have known signatures.
41-
* The bot protection managed rule set protects your application from known bad bots. For more information, see [Configuring bot protection](../web-application-firewall/afds/waf-front-door-policy-configure-bot-protection.md).
36+
- The managed rule set protects your application from many common attacks. For more information, see [Managed rules](../web-application-firewall/afds/waf-front-door-drs.md).
37+
- Block or redirect traffic from specific geographic regions to a static webpage. For more information, see [Geo-filtering](../web-application-firewall/afds/waf-front-door-geo-filtering.md).
38+
- Block IP addresses and ranges identified as malicious. For more information, see [IP restrictions](../web-application-firewall/afds/waf-front-door-configure-ip-restriction.md).
39+
- Apply rate limiting to prevent IP addresses from calling your service too frequently. For more information, see [Rate limiting](../web-application-firewall/afds/waf-front-door-rate-limit.md).
40+
- Create [custom WAF rules](../web-application-firewall/afds/waf-front-door-custom-rules.md) to automatically block and rate limit HTTP or HTTPS attacks with known signatures.
41+
- The bot protection managed rule set protects your application from known bad bots. For more information, see [Configuring bot protection](../web-application-firewall/afds/waf-front-door-policy-configure-bot-protection.md).
4242

43-
Refer to [Application DDoS protection](../web-application-firewall/shared/application-ddos-protection.md) for guidance on how to use Azure WAF to protect against DDoS attacks.
43+
Refer to [Application DDoS protection](../web-application-firewall/shared/application-ddos-protection.md) for guidance on using Azure WAF to protect against DDoS attacks.
4444

45-
## Protect virtual network origins
45+
## Protect Virtual Network Origins
4646

47-
To protect your public IPs from DDoS attacks, enable [Azure DDoS Protection](../ddos-protection/ddos-protection-overview.md) on the origin virtual network. DDoS Protection customers receive extra benefits such as cost protection, SLA guarantee, and access to experts from the DDoS Rapid Response Team for immediate assistance during an attack.
47+
Enable [Azure DDoS Protection](../ddos-protection/ddos-protection-overview.md) on your origin virtual network to safeguard your public IPs from DDoS attacks. This service offers more benefits such as cost protection, an SLA guarantee, and access to the DDoS Rapid Response Team for expert assistance during an attack.
4848

4949
## Private Link
5050

51-
Enhance the security of your Azure-hosted origins by restricting their access to Azure Front Door through [Azure Private Link](private-link.md). This feature enables a private network connection between Azure Front Door and your application servers, eliminating the need to expose your origins to the public internet.
51+
Enhance the security of your Azure-hosted origins by using [Azure Private Link](private-link.md) to restrict access to Azure Front Door. This feature establishes a private network connection between Azure Front Door and your application servers, eliminating the need to expose your origins to the public internet.
5252

5353
## Next steps
5454

55-
- Learn how to set up a [WAF policy for Azure Front Door](front-door-waf.md).
56-
- Learn how to [create an Azure Front Door profile](quickstart-create-front-door.md).
57-
- Learn [how Azure Front Door works](front-door-routing-architecture.md).
55+
- Set up a [WAF policy for Azure Front Door](front-door-waf.md).
56+
- Create an [Azure Front Door profile](quickstart-create-front-door.md).
57+
- Understand [how Azure Front Door works](front-door-routing-architecture.md).

0 commit comments

Comments
 (0)