Proposed Pull Request Change

title description author ms.author ms.service ms.topic ms.date ms.custom
QuickStart: Create and configure Azure DDoS IP Protection - Azure portal Learn how to use Azure DDoS IP Protection to mitigate an attack. AbdullahBell abell azure-ddos-protection quickstart 03/17/2025 template-quickstart
📄 Document Links
GitHub View on GitHub Microsoft Learn View on Microsoft Learn
Content Truncation Detected
The generated rewrite appears to be incomplete.
Original lines: -
Output lines: -
Ratio: -
Raw New Markdown
Generating updated version of doc...
Rendered New Markdown
Generating updated version of doc...
+0 -0
+0 -0
--- title: 'QuickStart: Create and configure Azure DDoS IP Protection - Azure portal' description: Learn how to use Azure DDoS IP Protection to mitigate an attack. author: AbdullahBell ms.author: abell ms.service: azure-ddos-protection ms.topic: quickstart ms.date: 03/17/2025 ms.custom: template-quickstart # Customer intent: "As a network administrator, I want to configure DDoS IP protection for my public IP address, so that I can safeguard my application from distributed denial-of-service attacks." --- # QuickStart: Create and configure Azure DDoS IP Protection using Azure portal Get started with Azure DDoS IP Protection by using the Azure portal. In this quickstart, you enable DDoS IP protection and link it to a public IP address. :::image type="content" source="./media/manage-ddos-ip-protection-portal/ddos-ip-protection-diagram.png" alt-text="Diagram of DDoS IP Protection protecting the Public IP address." lightbox="./media/manage-ddos-ip-protection-portal/ddos-ip-protection-diagram.png"::: ## Prerequisites - Create a [free account](https://azure.microsoft.com/pricing/purchase-options/azure-account?cid=msft_learn) before you begin. - Sign in to the [Azure portal](https://portal.azure.com). ## Enable DDoS IP Protection on a public IP address > [!IMPORTANT] > Ensure that your account is assigned to the [network contributor](../role-based-access-control/built-in-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json#network-contributor) role or to a [custom role](../role-based-access-control/custom-roles.md?toc=%2fazure%2fvirtual-network%2ftoc.json) that is assigned the appropriate actions listed in the how-to guide on [Permissions](manage-permissions.md). ### Create a public IP address 1. Select **Create a resource** in the upper left corner of the Azure portal. 1. Select **Networking**, and then select **Public IP address**. 1. Select **Create**. 1. Enter or select the following values. | Setting | Value | | --- | --- | | Subscription | Select your subscription. | | Resource group | Select **Create new**, enter **MyResourceGroup**. </br> Select **OK**. | | Region | Select your region. In this example, we selected **(US) East US**. | | Name | Enter your resource name. In this example, we selected **myStandardPublicIP**. | | IP Version | Select IPv4 or IPv6. In this example, we selected **IPv4**. | | SKU | Select **Standard**. DDoS IP Protection is enabled only on Public IP Standard SKU. | | Availability Zone | You can specify an availability zone in which to deploy your public IP address. In this example, we selected **zone-redundant**. | | Tier | Select *Global* or *Regional*. In this example, we selected **Regional**. | | IP address assignment | Locked as **Static**. | | Routing Preference | Select *Microsoft network* or *Internet*. In this example, we selected **Microsoft network**. | | Idle Timeout (minutes) | Keep a TCP or HTTP connection open without relying on clients to send keep-alive messages. In this example, we leave the default of **4**. | | DNS name label | Enter a DNS name label. In this example, we left the value blank. | 1. Select **Review + create** to review your settings and create the public IP address. ### Enable for an existing Public IP address 1. In the search box at the top of the portal, enter **public IP Address**. Select **public IP Address**. 1. Select your Public IP address. In this example, select **myStandardPublicIP**. 1. In the **Overview** pane, select the **Properties** tab, then select **DDoS protection**. :::image type="content" source="./media/manage-ddos-ip-protection-portal/ddos-protection-view-status.png" alt-text="Screenshot showing view of Public IP Properties." lightbox="./media/manage-ddos-ip-protection-portal/ddos-protection-view-status.png"::: 1. In the **Configure DDoS protection** pane, under **Protection type**, select **IP**, then select **Save**. ### Disable for a Public IP address: 1. Enter the name of the public IP address you want to disable DDoS IP Protection for in the **Search resources, services, and docs box** at the top of the portal. When the name of public IP address appears in the search results, select it. 1. Under **Properties** in the overview pane, select **DDoS Protection**. 1. Under **Protection type** select **Disable**, then select **Save**. > [!NOTE] > When changing DDoS IP protection from **Enabled** to **Disabled**, telemetry for the public IP resource will no longer be active. ## Validate and test First, check the details of your public IP address: 1. Select **All resources** on the top, left of the portal. 1. Enter *public IP address* in the **Filter** box. When **public IP address** appear in the results, select it. 1. Select your public IP Address from the list. 1. In the **Overview** pane, select the **Properties** tab in the middle of the page, then select **DDoS protection**. 1. View **Protection status** and verify your public IP is protected. :::image type="content" source="./media/manage-ddos-ip-protection-portal/ddos-protection-protected-status.png" alt-text="Screenshot of status of IP Protection in Public IP Properties." lightbox="./media/manage-ddos-ip-protection-portal/ddos-protection-protected-status.png"::: ## Clean up resources You can keep your resources for the next article. If no longer needed, delete the _MyResourceGroup_ resource group. When you delete the resource group, you also remove DDoS IP Protection and all its related resources. >[!WARNING] >This action is irreversible. 1. In the Azure portal, search for and select **Resource groups**, or select **Resource groups** from the Azure portal menu. 1. Filter or scroll down to find the _MyResourceGroup_ resource group. 1. Select the resource group, then select **Delete resource group**. 1. Type the resource group name to verify, and then select **Delete**. ## Next steps To learn how to configure metric alerts through the Azure portal, continue to the next article. > [!div class="nextstepaction"] > [Configure Azure DDoS Protection metric alerts through portal](alerts.md)
Success! Branch created successfully. Create Pull Request on GitHub
Error: