This article answers common questions about Azure DDoS Protection.
What is a Distributed Denial of Service (DDoS) attack?
Distributed denial of service, or DDoS, is a type of attack where an attacker sends more requests to an application than the application is capable of handling. The resulting effect is resources being depleted, affecting the application’s availability and ability to service its customers. Over the past few years, the industry has seen a sharp increase in attacks, with attacks becoming more sophisticated and larger in magnitude. DDoS attacks can be targeted at any endpoint that is publicly reachable through the Internet.
What is Azure DDoS Protection service?
Azure DDoS Protection, combined with application design best practices, provides enhanced DDoS mitigation features to defend against DDoS attacks. It's automatically tuned to help protect your specific Azure resources in a virtual network. Protection is simple to enable on any new or existing virtual network, and it requires no application or resource changes. See Azure DDoS Protection overview for more details.
How does pricing work?
DDoS protection plans have a fixed monthly charge that covers up to 100 public IP addresses. Protection for additional resources is available.
Under a tenant, a single DDoS protection plan can be used across multiple subscriptions, so there's no need to create more than one DDoS protection plan.
When Application Gateway with WAF is deployed in a DDoS protected VNet, there are no extra charges for WAF - you pay for the Application Gateway at the lower non-WAF rate. This policy applies to both Application Gateway v1 and v2 SKUs.
See Azure DDoS Protection pricing for pricing and more details.
Is the service zone resilient?
Yes. Azure DDoS Protection is zone-resilient by default.
How do I configure the service to be zone-resilient?
No customer configuration is necessary to enable zone-resiliency. Zone-resiliency for Azure DDoS Protection resources is available by default and managed by the service itself.
What about protection at the service layer (layer 7)?
Customers can use Azure DDoS Protection service in combination with a Web Application Firewall (WAF) to for protection both at the network layer (Layer 3 and 4, offered by Azure DDoS Protection) and at the application layer (Layer 7, offered by a WAF). WAF offerings include Azure Application Gateway WAF SKU and third-party web application firewall offerings available in the Azure Marketplace.
Are services unsafe in Azure without the service?
Services running on Azure are inherently protected by the default infrastructure-level DDoS protection. However, the protection that safeguards the infrastructure has a much higher threshold than most applications have the capacity to handle, and does not provide telemetry or alerting, so while a traffic volume may be perceived as harmless by the platform, it can be devastating to the application that receives it.
By onboarding to the Azure DDoS Protection Service, the application gets dedicated monitoring to detect attacks and application specific thresholds. A service will be protected with a profile that is tuned to its expected traffic volume, providing a much tighter defense against DDoS attacks.
What are the supported protected resource types?
Public IPs in ARM based VNETs are currently the only type of protected resource. Protected resources include public IPs attached to an IaaS VM, Load Balancer (Classic & Standard Load Balancers), Application Gateway (including WAF) cluster, Firewall, Bastion, VPN Gateway, Service Fabric or an IaaS based Network Virtual Appliance (NVA). Protection also covers public IP ranges brought to Azure via Custom IP Prefixes (BYOIPs).
PaaS services (multitenant) are not supported now, aside from Azure API Management (Premium tier only) connected to a virtual network (VNet) in the external mode. Public IP addresses created from a public IP address prefix are not supported. See Azure DDoS Protection reference architectures for more details.
Are Classic/RDFE protected resources supported?
Only ARM based protected resources are supported in preview. VMs in Classic/RDFE deployments are not supported. Support is not currently planned for Classic/RDFE resources. See Azure DDoS Protection reference architectures for more details.
Can I protect my PaaS resources using DDoS Protection?
Public IPs attached to multi-tenant, single VIP PaaS services are not supported presently. Examples of unsupported resources include Storage VIPs, Event Hubs VIPs and App/Cloud Services applications. See Azure DDoS Protection reference architectures for more details.
Can I protect my on-premises resources using DDoS Protection?
You need to have the public endpoints of your service associated to a VNet in Azure to be enabled for DDoS protection. Example designs include:
- Web sites (IaaS) in Azure and backend databases in on-premises datacenter.
- Application Gateway in Azure (DDoS protection enabled on App Gateway/WAF) and websites in on-premises datacenters.
See Azure DDoS Protection reference architectures for more details.
Can I register a domain outside of Azure and associate that to a protected resource like VM or ELB?
For the Public IP scenarios, DDoS Protection service will support any application regardless of where the associated domain is registered or hosted as long as the associated Public IP is hosted on Azure.
Can I manually configure the DDoS policy applied to the VNets/Public IPs?
No, unfortunately policy customization is not available at this moment.
Can I allowlist/blocklist specific IP addresses?
No, unfortunately manual configuration is not available at this moment.
How can I test DDoS Protection?
How long does it take for the metrics to load on portal?
The metrics should be visible on portal within 5 minutes. If your resource is under attack, other metrics will start showing up on portal within 5-7 minutes.
Does the service store customer data?
No, Azure DDoS protection does not store customer data.
Is a single VM deployment behind public IP supported?
Scenarios in which a single VM is running behind a public IP are not supported. DDoS mitigation may not initiate instantaneously when DDoS attack is detected. As a result, a single VM deployment that can’t scale out will go down in such cases.