Safeguard Your Azure Route Server with Azure DDoS Protection
Ankit Ranjan (DevOps Engineer)
Actively Seeking Azure DevOps/Cloud Role | DevOps Engineer | Automating & Reducing Developer Toil | Modernising IAC like Jam on the Bread | Microsoft Certified: Azure Admin Associate | Certified Terraform Associate |
This guide walks you through securing your Azure Route Server by integrating it with Azure DDoS Protection in a virtual network. Azure DDoS Protection shields your publicly accessible route server from Distributed Denial of Service (DDoS) attacks. In this tutorial, you will learn to:
Step-by-Step Guide: Setting Up DDoS Protection and Azure Route Server
Create a DDoS Protection Plan
In this section, you will create a DDoS protection plan to associate with a virtual network later in the process.
Create an Azure Route Server
Next, you can deploy an Azure Route Server along with the required virtual network and public IP address.
Enable DDoS Protection
Enable Azure DDoS Network Protection for the virtual network associated with the Route Server.
Set Up Peering with a Network Virtual Appliance (NVA)
Establish BGP peering with your NVA.
Configure the NVA
To complete the configuration, obtain the Route Server's Peer IPs and ASN.
Deploying Azure Firewall with DDoS Protection: A Step-by-Step Guide
This will help you deploy an Azure Firewall within a DDoS-protected virtual network to safeguard against large-scale DDoS attacks. Azure DDoS Protection enhances security by offering adaptive tuning, attack alert notifications, and monitoring capabilities. The deployment involves a simple virtual network (VNet) with two subnets:
For production environments, consider using a hub-and-spoke architecture where the firewall resides in its own VNet, and workload servers are in peered VNets.
In this example, we will:
Set up the Network
First, create a resource group to contain the resources needed to deploy the firewall. Then create a VNet, subnets, and a test server.
Create a Resource Group
Create a DDoS Protection Plan
领英推荐
Create a Virtual Network (VNet)
Create a Virtual Machine (VM)
Deploy the Firewall and Configure Policies
Deploy Azure Firewall
Set a Default Route
Next hop address: Firewall private IP.
Once the deployment is complete, click Go to resource.
? On the Firewall-route page:
Go to Routes and click Add:
?Configure Application Rule
This rule allows outbound access to www.google.com:
Configure a Network Rule
This rule allows outbound access to two IP addresses on port 53 for DNS traffic:
Configure a DNAT Rule
This rule enables Remote Desktop Protocol (RDP) access to the Srv-Work virtual machine through the firewall:
Update the DNS Settings for the Srv-Work Network Interface
To configure the server's primary and secondary DNS addresses for testing purposes (not a general Azure Firewall requirement):
Test the Firewall
Follow these steps to confirm the firewall is functioning as expected:
Verification of Firewall Rules