Skip to content

Commit 251f09f

Browse files
authored
Merge pull request #313096 from ShawnJackson/azure-front-door-overview
[AQ] edit pass: Azure Front Door overview articles
2 parents 3974d60 + a7a83c8 commit 251f09f

4 files changed

Lines changed: 137 additions & 142 deletions

File tree

Lines changed: 36 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -1,120 +1,114 @@
11
---
22
title: Best Practices
33
titleSuffix: Azure Front Door
4-
description: Learn best practices for configuring and using Azure Front Door, including TLS security, domain management, Web Application Firewall, health probes, and traffic routing optimization.
4+
description: Learn best practices for configuring and using Azure Front Door, including TLS security, domain management, WAF, health probes, and traffic routing optimization.
55
author: johndowns
66
ms.author: jodowns
77
ms.service: azure-frontdoor
88
ms.topic: concept-article
99
ms.date: 09/25/2025
1010
---
1111

12-
# Best practices for Front Door
12+
# Best practices for Azure Front Door
1313

1414
This article summarizes best practices for using Azure Front Door.
1515

1616
## General best practices
1717

18-
### Understanding when to combine Traffic Manager and Front Door
18+
### Understand when to combine Traffic Manager and Azure Front Door
1919

20-
For most solutions, we recommend the use *either* Front Door *or* [Azure Traffic Manager](../traffic-manager/traffic-manager-overview.md), but not both. Azure Traffic Manager is a DNS-based load balancer. It sends traffic directly to your origin's endpoints. In contrast, Azure Front Door terminates connections at points of presence (PoPs) near to the client and establishes separate long-lived connections to the origins. The products work differently and are intended for different use cases.
20+
For most solutions, we recommend the use of *either* Azure Front Door *or* [Azure Traffic Manager](../traffic-manager/traffic-manager-overview.md), but not both. Traffic Manager is a DNS-based load balancer. It sends traffic directly to your origin's endpoints. In contrast, Azure Front Door terminates connections at points of presence (PoPs) near to the client and establishes separate long-lived connections to the origins. The products work differently and are intended for different use cases.
2121

22-
If you need content caching and delivery (CDN), TLS termination, advanced routing capabilities, or a web application firewall (WAF), consider using Front Door. For simple global load balancing with direct connections from your client to your endpoints, consider using Traffic Manager. For more information about selecting a load balancing option, see [Load-balancing options](/azure/architecture/guide/technology-choices/load-balancing-overview).
22+
If you need content caching and delivery, TLS termination, advanced routing capabilities, or a web application firewall (WAF), consider using Azure Front Door. For simple global load balancing with direct connections from your client to your endpoints, consider using Traffic Manager. For more information about selecting a load balancing option, see [Load-balancing options](/azure/architecture/guide/technology-choices/load-balancing-overview).
2323

24-
However, as part of a [complex architecture that requires high availability](/azure/architecture/guide/networking/global-web-applications/mission-critical-content-delivery), you can put an Azure Traffic Manager in front of an Azure Front Door. In the unlikely event that Azure Front Door is unavailable, Azure Traffic Manager can then route traffic to an alternative destination, such as Azure Application Gateway or a partner content delivery network (CDN).
24+
As part of a [complex architecture that requires high availability](/azure/architecture/guide/networking/global-web-applications/mission-critical-content-delivery), you can put Traffic Manager in front of Azure Front Door. In the unlikely event that Azure Front Door is unavailable, Traffic Manager can then route traffic to an alternative destination, such as Azure Application Gateway or a partner content delivery network (CDN).
2525

2626
> [!IMPORTANT]
27-
> Don't put Azure Traffic Manager behind Azure Front Door. Azure Traffic Managers should always be in front of Azure Front Door.
27+
> Don't put Traffic Manager behind Azure Front Door. Traffic Manager should always be in front of Azure Front Door.
2828
2929
### Restrict traffic to your origins
3030

31-
Front Door's features work best when traffic only flows through Front Door. You should configure your origin to block traffic that hasn't been sent through Front Door. For more information, see [Secure traffic to Azure Front Door origins](origin-security.md).
31+
The features of Azure Front Door work best when traffic flows only through Azure Front Door. You should configure your origin to block traffic that isn't sent through Azure Front Door. For more information, see [Secure traffic to Azure Front Door origins](origin-security.md).
3232

3333
### Use the latest API version and SDK version
3434

35-
When you work with Front Door by using APIs, ARM templates, Bicep, or Azure SDKs, it's important to use the latest available API or SDK version. API and SDK updates occur when new functionality is available, and also contain important security patches and bug fixes.
35+
When you work with Azure Front Door by using APIs, Azure Resource Manager templates, Bicep, or Azure SDKs, it's important to use the latest available API or SDK version. API and SDK updates occur when new functionality is available, and they contain important security patches and bug fixes.
3636

3737
### Configure logs
3838

39-
Front Door tracks extensive telemetry about every request. When you enable caching, your origin servers might not receive every request, so it's important that you use the Front Door logs to understand how your solution is running and responding to your clients. For more information about the metrics and logs that Azure Front Door records, see [Monitor metrics and logs in Azure Front Door](front-door-diagnostics.md) and [WAF logs](../web-application-firewall/afds/waf-front-door-monitor.md#waf-logs).
39+
Azure Front Door tracks extensive performance data for every request. When you enable caching, your origin servers might not receive every request. It's important that you use the Azure Front Door logs to understand how your solution is running and responding to your clients. For more information about the metrics and logs that Azure Front Door records, see [Monitor metrics and logs in Azure Front Door](front-door-diagnostics.md) and [WAF logs](../web-application-firewall/afds/waf-front-door-monitor.md#waf-logs).
4040

41-
To configure logging for your own application, see [Configure Azure Front Door logs](./standard-premium/how-to-logs.md)
41+
To configure logging for your own application, see [Configure Azure Front Door logs](./standard-premium/how-to-logs.md).
4242

4343
## TLS best practices
4444

4545
### Use end-to-end TLS
4646

47-
Front Door terminates TCP and TLS connections from clients. It then establishes new connections from each point of presence (PoP) to the origin. It's a good practice to secure each of these connections with TLS, even for origins that are hosted in Azure. This approach ensures that your data is always encrypted during transit.
47+
Azure Front Door terminates TCP and TLS connections from clients. It then establishes new connections from each PoP to the origin. It's a good practice to secure each of these connections with TLS, even for origins that are hosted in Azure. This approach keeps your data encrypted during transit.
4848

4949
For more information, see [End-to-end TLS with Azure Front Door](end-to-end-tls.md).
5050

51-
### Use HTTP to HTTPS redirection
51+
### Use HTTP-to-HTTPS redirection
5252

53-
It's a good practice for clients to use HTTPS to connect to your service. However, sometimes you need to accept HTTP requests to allow for older clients or clients who might not understand the best practice.
53+
It's a good practice for clients to use HTTPS to connect to your service. However, sometimes you need to accept HTTP requests to allow for older clients or clients that might not follow the best practice.
5454

55-
You can configure Front Door to automatically redirect HTTP requests to use the HTTPS protocol. You should enable the *Redirect all traffic to use HTTPS* setting on your route.
55+
You can configure Azure Front Door to automatically redirect HTTP requests to use the HTTPS protocol. You should enable the **Redirect all traffic to use HTTPS** setting on your route.
5656

5757
### Use managed TLS certificates
5858

59-
When Front Door manages your TLS certificates, it reduces your operational costs, and helps you to avoid costly outages caused by forgetting to renew a certificate. Front Door automatically issues and rotates the managed TLS certificates.
59+
When Azure Front Door manages your TLS certificates, it reduces your operational costs and helps you avoid costly outages caused by forgetting to renew a certificate. Azure Front Door automatically issues and rotates the managed TLS certificates.
6060

6161
For more information, see [Configure HTTPS on an Azure Front Door custom domain using the Azure portal](standard-premium/how-to-configure-https-custom-domain.md).
6262

63-
### Use 'Latest' version for customer-managed certificates
63+
### Use the latest version for customer-managed certificates
6464

65-
If you decide to use your own TLS certificates, then consider setting the Key Vault certificate version to 'Latest'. By using 'Latest', you avoid having to reconfigure Front Door to use new versions of your certificate and waiting for the certificate to be deployed throughout Front Door's environments.
65+
If you decide to use your own TLS certificates, consider setting the Azure Key Vault certificate version to **Latest**. By using **Latest**, you avoid having to reconfigure Azure Front Door to use new versions of your certificate and waiting for the certificate to be deployed throughout Azure Front Door environments.
6666

6767
For more information, see [Select the certificate for Azure Front Door to deploy](standard-premium/how-to-configure-https-custom-domain.md#select-the-certificate-for-azure-front-door-to-deploy).
6868

69-
## Domain name best practices
69+
## Domain best practices
7070

7171
### Adopt custom domains
7272

73-
Adopt custom domains for your Front Door endpoints to ensure better availability and flexibility while managing your domains and traffic. Don't hardcode AFD provided domains (like *.azurefd.z01.net) in your clients/codebases/firewall. Use custom domains for such scenarios.
73+
Adopt custom domains for your Azure Front Door endpoints to ensure better availability and flexibility while managing your domains and traffic. Don't hardcode Azure Front Door-provided domains (like `*.azurefd.z01.net`) in your clients, codebases, or firewall. Use custom domains for such scenarios.
7474

75-
### Use the same domain name on Front Door and your origin
75+
### Use the same domain name on Azure Front Door and your origin
7676

77-
Front Door can rewrite the `Host` header of incoming requests. This feature can be helpful when you manage a set of customer-facing custom domain names that route to a single origin. This feature can also help when you want to avoid configuring custom domain names in Front Door and at your origin. However, when you rewrite the `Host` header, request cookies and URL redirections might break. In particular, when you use platforms like Azure App Service, features like [session affinity](../app-service/configure-common.md#configure-general-settings) and [authentication and authorization](../app-service/overview-authentication-authorization.md) might not work correctly.
77+
Azure Front Door can rewrite the `Host` header of incoming requests. This feature can be helpful when you manage a set of customer-facing custom domain names that route to a single origin. This feature can also help when you want to avoid configuring custom domain names in Azure Front Door and at your origin.
7878

79-
Before you rewrite the `Host` header of your requests, carefully consider whether your application is going to work correctly.
79+
However, when you rewrite the `Host` header, request cookies and URL redirections might break. In particular, when you use platforms like Azure App Service, features like [session affinity](../app-service/configure-common.md#configure-general-settings) and [authentication and authorization](../app-service/overview-authentication-authorization.md) might not work correctly.
8080

81-
For more information, see [Preserve the original HTTP host name between a reverse proxy and its back-end web application](/azure/architecture/best-practices/host-name-preservation).
81+
Before you rewrite the `Host` header of your requests, carefully consider whether your application will work correctly. For more information, see [Preserve the original HTTP host name between a reverse proxy and its back-end web application](/azure/architecture/best-practices/host-name-preservation).
8282

83-
## Web application firewall (WAF)
83+
## WAF best practices
8484

85-
### Enable the WAF
85+
For internet-facing applications, we recommend that you enable the Azure Front Door WAF and configure it to use managed rules. Using a WAF and Microsoft-managed rules helps protect your application from a wide range of attacks. For more information, see [Web Application Firewall (WAF) on Azure Front Door](web-application-firewall.md).
8686

87-
For internet-facing applications, we recommend you enable the Front Door web application firewall (WAF) and configure it to use managed rules. When you use a WAF and Microsoft-managed rules, your application is protected from a wide range of attacks.
87+
The WAF for Azure Front Door has its own set of best practices for its configuration and use. For more information, see [Best practices for Web Application Firewall in Azure Front Door](../web-application-firewall/afds/waf-front-door-best-practices.md).
8888

89-
For more information, see [Web Application Firewall (WAF) on Azure Front Door](web-application-firewall.md).
89+
## Best practices for health probes
9090

91-
### Follow WAF best practices
91+
### Disable health probes when there's only one origin in an origin group
9292

93-
The WAF for Front Door has its own set of best practices for its configuration and use. For more information, see [Best practices for Web Application Firewall on Azure Front Door](../web-application-firewall/afds/waf-front-door-best-practices.md).
93+
Health probes in Azure Front Door can detect situations where an origin is unavailable or unhealthy. You can configure Azure Front Door to send traffic to another origin in the origin group when a health probe detects a problem with an origin.
9494

95-
## Health probe best practices
96-
97-
### Disable health probes when there’s only one origin in an origin group
98-
99-
Front Door's health probes are designed to detect situations where an origin is unavailable or unhealthy. When a health probe detects a problem with an origin, Front Door can be configured to send traffic to another origin in the origin group.
100-
101-
If you only have a single origin, Front Door always routes traffic to that origin even if its health probe reports an unhealthy status. The status of the health probe doesn't do anything to change Front Door's behavior. In this scenario, health probes don't provide a benefit and you should disable them to reduce the traffic on your origin.
95+
If you have only a single origin, Azure Front Door always routes traffic to that origin even if its health probe reports an unhealthy status. The status of the health probe doesn't do anything to change the behavior of Azure Front Door. In this scenario, health probes don't provide a benefit and you should disable them to reduce the traffic on your origin.
10296

10397
For more information, see [Health probes](health-probes.md).
10498

105-
### Select good health probe endpoints
99+
### Select good endpoints
106100

107-
Consider the location where you tell Front Door's health probe to monitor. It's usually a good idea to monitor a webpage or location that you specifically design for health monitoring. Your application logic can consider the status of all of the critical components required to serve production traffic including application servers, databases, and caches. That way, if any component fails, Front Door can route your traffic to another instance of your service.
101+
Consider the location where you want an Azure Front Door health probe to do its monitoring. It's usually a good idea to monitor a webpage or location that you specifically design for health monitoring. Your application logic can consider the status of all of the critical components required to serve production traffic, including application servers, databases, and caches. That way, if any component fails, Azure Front Door can route your traffic to another instance of your service.
108102

109-
For more information, see the [Health Endpoint Monitoring pattern](/azure/architecture/patterns/health-endpoint-monitoring)
103+
For more information, see [Health Endpoint Monitoring pattern](/azure/architecture/patterns/health-endpoint-monitoring).
110104

111105
### Use HEAD health probes
112106

113-
Health probes can use either the GET or HEAD HTTP method. It's a good practice to use the HEAD method for health probes, which reduces the amount of traffic load on your origins.
107+
Health probes can use either the `GET` or `HEAD` HTTP method. It's a good practice to use the `HEAD` method for health probes, because it reduces the amount of traffic load on your origins.
114108

115109
For more information, see [Supported HTTP methods for health probes](health-probes.md#supported-http-methods-for-health-probes).
116110

117111
## Next step
118112

119113
> [!div class="nextstepaction"]
120-
> [Create an Front Door profile](create-front-door-portal.md)
114+
> [Create an Azure Front Door profile](create-front-door-portal.md)

0 commit comments

Comments
 (0)