This design protects your network from Distributed Denial of Service (DDoS) attacks.
Topology: The DDoS Protection Plan is a global resource attached to the Hub VNet. By peering, all Spoke VNets are also protected.
+--------------+ +--------------------------+ +--------------+
| Attacker | | HUB VNet | | SPOKE VNet |
| (Botnet) | | (Protected) | | (Protected) |
| | | | | |
+------+-------+ +------------+-------------+ +------+-------+
| | |
v | (Peering) |
+------+-------+ v v
| Azure Edge | +------------+-------------+ +------+-------+
| (Scrubbing) |---------->| VPN Gateway |<--------->| Public IP |
| | | | | (Load Bal) |
+--------------+ +--------------------------+ +--------------+
PRIMARY REGION (East US)
+-----------------------------------------------------------------------+
| DDoS Protection Plan: ddos-plan-corp |
| (Global Resource) |
+-----------------------------------|-----------------------------------+
|
v
+-----------------------------------|-----------------------------------+
| HUB VNet: vnet-hub (10.0.0.0/16) | |
| [x] DDoS Protection: Enabled | |
| (Linked to ddos-plan-corp) | |
+-----------------------------------|-----------------------------------+
|
v
+-----------------------------------|-----------------------------------+
| SPOKE VNet: vnet-spoke | |
| [x] DDoS Protection: Enabled | |
| (Linked to ddos-plan-corp) | |
+-----------------------------------|-----------------------------------+
|
| (Global Coverage)
v
+-----------------------------------------------------------------------+
| SECONDARY REGION (West US) - DR Site |
| |
| +-----------------------+ |
| | DR HUB VNet | |
| | [x] DDoS Enabled | |
| +-----------------------+ |
+-----------------------------------------------------------------------+
1. Attack: Botnet sends 100 Gbps UDP flood to your Public IP.
2. Detection: Azure Edge detects anomaly (Volume > Threshold).
3. Diversion: Traffic diverted to Scrubbing Tunnel.
4. Filtering: Malicious packets dropped. Legitimate user packets kept.
5. Forwarding: Clean traffic delivered to your VNet.
6. Result: App stays online.
1. Search: "DDoS protection plans" -> + Create.
2. Resource Group: Create rg-ddos-protection.
3. Name: ddos-plan-corp.
4. Region: East US (The plan is regional but can protect VNets globally).
5. Create.
1. Go to vnet-hub (or create a new VNet to test).
2. Settings -> DDoS protection.
3. Enable: Check the box.
4. DDoS protection plan: Select ddos-plan-corp.
5. Save.
* *Note: This incurs the monthly fee immediately.*
1. Go to vnet-spoke.
2. Settings -> DDoS protection.
3. Enable: Check the box.
4. DDoS protection plan: Select ddos-plan-corp.
5. Save.
1. Go to Monitor -> Alerts -> + Create -> Alert rule.
2. Scope: Select the Public IP Address of your Hub Gateway or Firewall.
3. Signal: Search for Under DDoS attack or not.
4. Logic:
* Operator: Greater than.
* Threshold: 0 (1 means under attack).
5. Actions:
* Create Action Group ag-security-team.
* Notification: Email security@contoso.com.
6. Details:
* Severity: 0 - Critical.
* Alert rule name: Alert-DDoS-Attack.
7. Create.