Skip to Content

Microsoft AZ-700: How to Create a Rate Limiting Rule for Azure Front Door to Restrict Requests by Geographic Location?

Learn how to secure your Azure Front Door instance by creating a rate limiting rule that prevents hosts in specific regions like Japan from making more than a set number of requests per minute. Follow this step-by-step guide to configure WAF policy rules in the Azure portal.

Question

Username and password

Use the following login credentials as needed:

Use the following login credentials as needed.

To enter your username, place your cursor in the Sign in box and click on the username below.

To enter your password, place your cursor in the Enter password box and click on the password below.

Azure Username: [email protected]

Azure Password: xxxxxxxxxx

If the Azure portal does not load successfully in the browser, press CTRL-K to reload the portal in a new browser tab.

The following information is for technical support purposes only:

Lab Instance: 12345678

You are planning security for Azure Front Door.

You need to create a rule that can be applied to Front Door hosts. The rule must prevent hosts in Japan from making more than 50 requests per minute. You do NOT need to associate the rule to a Front Door instance to complete this task.

To complete this task, sign in to the Azure portal.

Answer

Configure a Web Application Firewall rate-limit rule

The Azure Web Application Firewall rate-limit rule for Azure Front Door controls the number of requests allowed from a particular source IP address to the application during a rate-limit duration.

Stage 1: Create a policy

First create a basic WAF policy

Step 1: On the upper left side of the portal, select Create a resource. Search for WAF, select Web Application Firewall, then select Create.

Step 2: On Create a WAF policy page, Basic tab, enter

Step 3: Select Review + create, then select Create.

Stage 2; Create a rate-limit rule

Step 1: Select Custom rules > Add custom rule.

Step 2: Enter the information required to create a rate-limit rule:

Custom rule name: Enter the name of the custom rule, such as rateLimitRule.
Rule type: Select Rate limit.
Priority: Enter the priority of the rule, such as 1.
Rate limit duration: Select 1 minute.
Rate limit threshold (requests): Enter 50

Step 3: In Conditions, enter the information required to specify a match condition to identify requests. For Match type, select Geo location, for Value select JP (for Japan).

Match type: Geo Location.
Operation: Selecr is.
Match values: JP

Note: To create a geo-filtering custom rule in the Azure portal, select Geo location as the Match Type, and then select the country/region or countries/regions you want to allow/block from your application.

Step 4: For Action, select Block.

Rate-limit rules onlt support Log and Block actions. Allow isn’t supported.

Step 5: Select Add.

Step 6: Select Save.

The Azure Web Application Firewall rate-limit rule for Azure Front Door controls the number of requests allowed from a particular source IP address to the application during a rate-limit duration.

Microsoft AZ-700 certification exam assessment practice question and answer (Q&A) dump including multiple choice questions (MCQ) and objective type questions, with detail explanation and reference available free, helpful to pass the Microsoft AZ-700 exam and earn Microsoft AZ-700 certification.