From 84b98fd575a8d91a30d07459b7f9b0858430778b Mon Sep 17 00:00:00 2001 From: Chetan Goenka <74602294+cgoenka1@users.noreply.github.com> Date: Wed, 20 Aug 2025 17:47:06 +0530 Subject: [PATCH 1/3] Update vhubs-and-vnets.md --- articles/firewall-manager/vhubs-and-vnets.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/articles/firewall-manager/vhubs-and-vnets.md b/articles/firewall-manager/vhubs-and-vnets.md index eb290c0fe2dee..5db26f752f5da 100644 --- a/articles/firewall-manager/vhubs-and-vnets.md +++ b/articles/firewall-manager/vhubs-and-vnets.md @@ -39,7 +39,7 @@ The following table compares these two architecture options and can help you dec |**Multiple security provider support**|Supported with manually configured forced tunneling to third-party firewalls|Automated support for two security providers: Azure Firewall for private traffic filtering and third-party for Internet filtering| |**Web Application Firewall on Application Gateway** |Supported in Virtual Network|Currently supported in spoke network| |**Network Virtual Appliance**|Supported in Virtual Network|Currently supported in spoke network| -|**Azure DDoS Protection support**|Yes|No| +|**Azure DDoS Protection support**|Yes|Yes(With Customer Provided IP)| ## Next steps From 420b4d3320e57a2d19d84b171a54650e8be7b128 Mon Sep 17 00:00:00 2001 From: Chetan Goenka <74602294+cgoenka1@users.noreply.github.com> Date: Thu, 16 Oct 2025 08:55:57 +0530 Subject: [PATCH 2/3] Update vhubs-and-vnets.md --- articles/firewall-manager/vhubs-and-vnets.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/articles/firewall-manager/vhubs-and-vnets.md b/articles/firewall-manager/vhubs-and-vnets.md index 5db26f752f5da..54a95b3d43f7a 100644 --- a/articles/firewall-manager/vhubs-and-vnets.md +++ b/articles/firewall-manager/vhubs-and-vnets.md @@ -39,7 +39,7 @@ The following table compares these two architecture options and can help you dec |**Multiple security provider support**|Supported with manually configured forced tunneling to third-party firewalls|Automated support for two security providers: Azure Firewall for private traffic filtering and third-party for Internet filtering| |**Web Application Firewall on Application Gateway** |Supported in Virtual Network|Currently supported in spoke network| |**Network Virtual Appliance**|Supported in Virtual Network|Currently supported in spoke network| -|**Azure DDoS Protection support**|Yes|Yes(With Customer Provided IP)| +|**Azure DDoS Protection support**|Yes|Yes (With Customer Provided IP)| ## Next steps From 56666e0ded792b16c9d324024b80312c2b2ddbb2 Mon Sep 17 00:00:00 2001 From: Kristine Toliver Date: Mon, 17 Nov 2025 07:41:00 -0800 Subject: [PATCH 3/3] Clarify Azure DDoS Protection support details Updated the description for Azure DDoS Protection support to include details about customer-provided public IP address. --- articles/firewall-manager/vhubs-and-vnets.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/articles/firewall-manager/vhubs-and-vnets.md b/articles/firewall-manager/vhubs-and-vnets.md index 54a95b3d43f7a..c4e17482c4f92 100644 --- a/articles/firewall-manager/vhubs-and-vnets.md +++ b/articles/firewall-manager/vhubs-and-vnets.md @@ -39,7 +39,7 @@ The following table compares these two architecture options and can help you dec |**Multiple security provider support**|Supported with manually configured forced tunneling to third-party firewalls|Automated support for two security providers: Azure Firewall for private traffic filtering and third-party for Internet filtering| |**Web Application Firewall on Application Gateway** |Supported in Virtual Network|Currently supported in spoke network| |**Network Virtual Appliance**|Supported in Virtual Network|Currently supported in spoke network| -|**Azure DDoS Protection support**|Yes|Yes (With Customer Provided IP)| +|**Azure DDoS Protection support**|Yes|Yes (with a [customer-provided public IP address](../firewall/secured-hub-customer-public-ip.md))| ## Next steps