This design implements Azure Front Door as the global entry point for a multi-region application.
Topology: Front Door sits at the Edge (outside VNets). It routes traffic to App Gateways (Design 18) located in Spoke VNets in East US and West US.
INTERNET
|
v
+--------------------+
| Azure Front Door |
| (Global WAF) |
+---------+----------+
|
/------------------+------------------\
| |
v v
+------------------+ +------------------+
| Region A: East US| | Region B: West US|
| (Active) | | (Active) |
+------------------+ +------------------+
| HUB VNet | | HUB VNet |
+------------------+ +------------------+
| |
+------------------+ +------------------+
| SPOKE VNet | | SPOKE VNet |
| [App Gateway] | | [App Gateway] |
+------------------+ +------------------+
PRIMARY REGION (East US)
+-----------------------------------------------------------------------+
| HUB VNet: vnet-hub-east |
| [VPN Gateway] |
+---------------|-------------------------------------------------------+
| (Peering)
+---------------|-------------------------------------------------------+
| SPOKE VNet: vnet-spoke-east |
| +-----------------------+ |
| | Subnet: AppGw | |
| | [App Gateway] | <----(Traffic from Front Door) |
| | (Public IP) | |
| +-----------|-----------+ |
| | |
| v |
| +-----------------------+ |
| | Subnet: Backend | |
| | [Web App / VM] | |
| +-----------------------+ |
+-----------------------------------------------------------------------+
SECONDARY REGION (West US)
+-----------------------------------------------------------------------+
| HUB VNet: vnet-hub-west |
+---------------|-------------------------------------------------------+
| (Peering)
+---------------|-------------------------------------------------------+
| SPOKE VNet: vnet-spoke-west |
| +-----------------------+ |
| | [App Gateway] | |
| +-----------|-----------+ |
| | |
| v |
| +-----------------------+ |
| | [Web App / VM] | |
| +-----------------------+ |
+-----------------------------------------------------------------------+
AzureFrontDoor.Backend).X-Azure-FDID header to prevent bypassing Front Door.1. User: www.contoso.com.
2. Edge: Request hits nearest Edge POP (e.g., London).
3. Front Door: Checks WAF. Determines fastest backend (East US).
4. Backbone: Traffic travels on MS Backbone to East US.
5. App Gateway: Receives request. Checks X-Azure-FDID.
6. Backend: Forwards to VM.
1. East US: Deploy an App Gateway (Standard_v2) with a Public IP.
* Public IP: pip-appgw-east (e.g., 1.2.3.4).
* Backend: A simple VM or Web App.
2. West US: Deploy a second App Gateway.
* Public IP: pip-appgw-west (e.g., 5.6.7.8).
* Backend: A simple VM or Web App.
1. Search: "Front Door and CDN profiles" -> + Create.
2. Select: Azure Front Door -> Quick create.
3. Basics:
* Resource Group: rg-global-frontdoor.
* Name: fd-global-corp-[uniqueid].
* Tier: Premium (Required for Private Link, but Standard is fine for Public IP backends). Select Standard for this lab.
* Endpoint Name: contoso-app.
* Origin Type: Public IP address.
* Origin Host Name: Select pip-appgw-east.
4. Create. (Takes 5 mins).
1. Go to Front Door Manager -> Origin groups -> default-origin-group.
2. + Add an origin.
3. Origin Type: Public IP address.
4. Host Name: Select pip-appgw-west.
5. Priority: 1. Weight: 1000.
6. Add.
7. Update.
* *Now Front Door balances between East and West.*
1. Go to East US App Gateway -> NSG (Network Security Group of the Subnet).
2. Inbound Security Rules -> + Add.
3. Allow Front Door:
* Source: Service Tag.
* Source tag: AzureFrontDoor.Backend.
* Destination: Any.
* Service: HTTPS (443).
* Action: Allow.
* Priority: 100.
4. Deny All Internet:
* Source: Any.
* Destination: Any.
* Service: HTTPS (443).
* Action: Deny.
* Priority: 200.
5. Repeat for West US NSG.
1. Browser: Go to https://contoso-app-[uniqueid].z01.azurefd.net.
* It should load the app.
2. Direct Access: Go to https://1.2.3.4 (App Gateway IP).
* It should Timeout or fail (Blocked by NSG).