Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Designing and Implementing Microsoft Azure Networking Solutions

You're reading from   Designing and Implementing Microsoft Azure Networking Solutions Exam Ref AZ-700 preparation guide

Arrow left icon
Product type Paperback
Published in Aug 2023
Publisher Packt
ISBN-13 9781803242033
Length 524 pages
Edition 1st Edition
Tools
Concepts
Arrow right icon
Author (1):
Arrow left icon
David Okeyode David Okeyode
Author Profile Icon David Okeyode
David Okeyode
Arrow right icon
View More author details
Toc

Table of Contents (17) Chapters Close

Preface 1. Part 1: Design and Implement Core Networking Infrastructure in Azure
2. Chapter 1: Azure Networking Fundamentals FREE CHAPTER 3. Chapter 2: Designing and Implementing Name Resolution 4. Chapter 3: Design, Implement, and Manage VNet Routing 5. Chapter 4: Design and Implement Cross-VNet Connectivity 6. Part 2: Design, Implement, and Manage Hybrid Networking
7. Chapter 5: Design and Implement Hybrid Network Connectivity with VPN Gateway 8. Chapter 6: Designing and Implementing Hybrid Network Connectivity with the ExpressRoute Gateway 9. Chapter 7: Design and Implement Hybrid Network Connectivity with Virtual WAN 10. Chapter 8: Designing and Implementing Network Security 11. Part 3: Design and Implement Traffic Management and Network Monitoring
12. Chapter 9: Designing and Implementing Application Delivery Services 13. Chapter 10: Designing and Implementing Platform Service Connectivity 14. Chapter 11: Monitoring Networks in Azure 15. Index 16. Other Books You May Enjoy

Implementing DDoS protection

A DDoS attack is a collection of attack types aimed at disrupting the availability of a target by overwhelming it with malicious traffic. They are usually targeted at virtual network workloads that are accessible via the internet.

The Azure DDoS Protection service helps protect internet-facing virtual network workloads from these attacks by identifying and blocking the malicious attempts to overwhelm our network before they can reach our resources. This service uses the scale and elasticity of Microsoft’s global network to stop the attack at the edge of the Azure network (see Figure 8.1). There are three main types of DDoS attacks:

  • Volumetric DDoS attacks such as amplification floods and UDP floods, which overload the network bandwidth capabilities of a target to make it inaccessible. This is the equivalent of what happens in a traffic jam – when vehicles cannot move forward because there is too much traffic. Mitigating this category...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime