My previous blog described Azure Front Door and how it can benefit your business. In this blog, I will be deploying an example of Azure Front Door with a Web Application Firewall and how you can set up a lab to see how it works for your environment.

For my example on the web applications I created, I used Microsoft’s documentation below with Visual Studio 2022, but you can use the following tools.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Deployment Environment

Quickstart: Deploy an ASP.NET web app – Azure App Service | Microsoft Learn

Go ahead and open up your Azure portal, search for Front Door and CDN Profiles, and then click Create Front Door and CDN profiles.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Profiles

In my example, I will use Azure Front Door and then Quick create, but if you click Explore other offerings, you will see different ways to deploy Azure Front Door, including Azure Front Door (classic). Once you are ready, click Continue to create a Front Door.

Setting Up and Configuring Azure Front Door

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Choose Between Azure or Other
Deploying Azure Front Door with a Web Application Firewall using Custom Rules Choose Other Offerings

Go ahead and fill out the required fields below. In my example, I am using the Premium tier as we focus on security in this demo. Also, you can create an Azure Front Door. I then created a new WAF policy below. Once you are finished filling out this information, go ahead and click Review + Create.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Create Front Door Profile

In my example, I have already created a couple of web applications for the Origin type, so I will use App services in this demo. You can create an Azure Front Door for the following origin types.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Origin Types

Once your deployment is complete, click Go to Resource, and you can confirm if your endpoint is running by copying the hostname and pasting it into a new tab.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Endpoints
Deploying Azure Front Door with a Web Application Firewall using Custom Rules Confirm Endpoint

I then clicked on the endpoint name and came to the Front Door manager, where I could edit the routes, security rules, and other settings.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Front Door Manager

When I drill into the default origin group, you can see that the web application I assigned shows you how to edit the Health probes. Typically, when configuring the Health probes settings for the Probe method, I will use GET, and for the interval, I will do 5 seconds.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Update Origin Group

To add load balancing for your web application, you must add the second origin to the newly created Azure Front Door. In my example, my web application resided in Central US and UK South.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Add Second Origin
Deploying Azure Front Door with a Web Application Firewall using Custom Rules Update Origin

If I go to my first Web Application and stop it and then go back to my Azure Front Door

Running: The first web application shows the location of US Central.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Location

Stopped:

Deploying Azure Front Door with a Web Application Firewall using Custom Rules App Stopped
Deploying Azure Front Door with a Web Application Firewall using Custom Rules Error 403

I then went ahead and copy and pasted my front door endpoint link below and got the secondary web application in UK South.

Cdnfrontdoorxtivia-drgvagbah0ashxdu.z01.azurefd.net

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Copy and Paste front Door Endpoint

I will now show you some of the various routings you can do with Azure Front Door. However, before doing anything, I will create a new Origin group. I will do this for the US Central web application.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Add An Origin Group
Deploying Azure Front Door with a Web Application Firewall using Custom Rules Add an Origin

Once you click update and it finishes loading, you will see Unassociated for routes on your new origin group.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Unassociated

I will then return to the Front Door manager and add the new route.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Add New Route

In my example, for the patterns to match, I put Privacy as a page in my Central US web application. This newly created route I did will make sure that we are always redirected to the Central US web application.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Add a Route
Deploying Azure Front Door with a Web Application Firewall using Custom Rules Privacy Page
Deploying Azure Front Door with a Web Application Firewall using Custom Rules Redirected

I return to Visual Studio and ensure my US Central web application privacy page shows the correct information.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Privacy Page Correct Information

I then need to restart my US Central web application.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Restart US Central Web Application

I then go back to my web browser and copy and paste the endpoint hostname. You can see my UK South web application is shown.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules UK Web Application

Once I click on Privacy, you can see that I am redirected to the Privacy page of the US Central web application.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Privacy Page US Central

Anytime someone clicks on the Privacy page, they will be redirected to the US Central web application, and this is how you can set up routing in Azure Front Door. In my next section, I will go over the Web Application Firewall in Security Policies to help secure your web applications.

Setting Up the Web Application Firewall

Go ahead and click on Security Policies in the left-hand menu and see my Web application firewall policy called waffrontdoorxtivia. This was initially created at the beginning when we were configuring the Azure Front Door.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Security Policies

Right now, my Front Door WAF policy is in detection mode, and we will want to switch this to prevention mode by clicking the switch to prevention mode button.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Switch to Prevention Mode

Now that we have our WAF policy in prevention mode, I will go into the Policy settings and create a policy where if a response code of 403 error was to pop up; it will appear as a bad request to the user.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Policy Settings 403 Bad Request

The screenshot example I have provided below is the default managed rules Microsoft has configured. There are many settings that you can change or create custom rules.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Default Managed Rules

Since we have already added the web application firewall to our Azure Front Door, I will show you an example of the WAF. If I go back to my Front Door endpoint and add /?/<script>asdasd</script> at the end of the link, I get the following results. This can help you stop cross-scripting attacks.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Examples of WAF

Another example is if you do /?/../../ I get the following results, which show that the WAF we have put in place is working as it should.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules WAF Working

In the next example, I will show you how to add Custom Rules to your Front Door WAF policy.

Creating Custom Rules For Your Web Application Firewall

Go back to your Front Door WAF policy and click on Custom rules. Once you are in there, click on Add custom rule.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Add Custom Rules

In this example, I will create a custom rule restricting users’ ability to refresh the page more than two times in a 1-minute duration.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Edit Custom Rule
Deploying Azure Front Door with a Web Application Firewall using Custom Rules Custom Rule

When I go back to my Front Door endpoint, it loads correctly.

https://cdnfrontdoorxtivia-drgvagbah0ashxdu.z01.azurefd.net

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Endpoint Loads Correctly

If I refresh a few times, I get a bad request message.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Bad Request Message

In this second example, I can even restrict traffic based on geo-location.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Add Custom Rule

I am in the United States, and if I go back to my endpoint, I get an instant error message for my US Central web application.

https://cdnfrontdoorxtivia-drgvagbah0ashxdu.z01.azurefd.net

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Instant Error Message

If I disable the Geo-location rule I created, I can load my Front Door endpoint just fine.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Disabled Geo Location

I am now able to load my Front Door endpoint just fine.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules Front Door Endpoint Loading

You can even create a custom rule for the specific IP address range if you need.

Deploying Azure Front Door with a Web Application Firewall using Custom Rules IP Address Range Custom Rule

We have created a basic Azure Front Door with a Web Application Firewall using custom rules. By using Azure Front Door, you are taking advantage of using Microsoft’s dedicated private global network from the Edge point of presence (PoP) to the application. With the added security of the Web Application Firewall, you will be able to ensure your applications are secure and globally scalable.

If you have any questions, please get in touch with us at XTIVIA!

Share This