Module 4
Module 4
Azure Administrator
Contents
Module 4 Virtual Networking
In this module, you will learn about basic virtual networking concepts like virtual
networks and subnetting, IP addressing, Azure DNS, network security groups,
and Azure Firewall.
4
AZ-900
Contents
Module 04 – Virtual Networking
● Virtual Networks
● IP Addressing
● Network Security groups
● Azure Firewall
● Azure DNS
● Lab 04 - Implement Virtual Networking
5
AZ-900
Virtual Networks
Azure Networking Components
Once the resources are moved to Azure, they require the same networking
functionality as an on-premises deployment, and in specific scenarios require
some level of network isolation.
Azure has many networking components.
Virtual Networks
Azure Networking Components
Virtual Networks
An Azure Virtual Network (VNet) is a representation of your own network in the
cloud.
You can use VNets to provision and manage virtual private networks (VPNs) in
Azure, link the VNets with other VNets in Azure, or with your on-premises IT
infrastructure to create hybrid or cross-premises solutions.
You also have control of DNS server settings for VNets, and segmentation of the
VNet into subnets.
Virtual Networks
Virtual Networks
Virtual networks can be used in many ways.
● Create a dedicated private cloud-only VNet.
● Securely extend your data center With Vnets.
● Enable hybrid cloud scenarios.
Subnets
A virtual network can be segmented into one or more subnets.
Subnets provide logical divisions within your network.
Subnets can help improve security, increase performance, and make it easier to
manage the network.
Each subnet contains a range of IP addresses that fall within the virtual network
address space.
Each subnet must have a unique address range, specified in CIDR format.
The address range cannot overlap with other subnets in the virtual network in
the same subscription.
Subnets
Considerations
● Service requirements. Each service directly deployed into virtual network has
specific requirements for routing and the types of traffic that must be allowed
into and out of subnets.
A service may require, or create, their own subnet,
For example, if you connect a virtual network to an on-premises network using
an Azure VPN Gateway, the virtual network must have a dedicated subnet for the
gateway.
Considerations
● Virtual appliances. Azure routes network traffic between all subnets in a
virtual network, by default.
You can override Azure's default routing to prevent Azure routing between
subnets.
Or to route traffic between subnets through a network virtual appliance.
So, if you require that traffic between resources in the same virtual network flow
through a network virtual appliance (NVA), deploy the resources to different
subnets
Considerations
● Service endpoints. You can limit access to Azure resources such as an Azure
storage account or Azure SQL database, to specific subnets with a virtual network
service endpoint.
you can deny access to the resources from the internet.
You may create multiple subnets, and enable a service endpoint for some
subnets, but not others.
Considerations
● Network security groups. You can associate zero or one network security
group to each subnet in a virtual network.
You can associate the same, or a different, network security group to each
subnet.
Each network security group contains rules, which allow or deny traffic to and
from sources and destinations.
Azure reserves the first three IP addresses and the last IP address in each subnet
address range.
IP Addressing
You can assign IP addresses to Azure resources to communicate with other Azure
resources, your on-premises network, and the Internet.
There are two types of IP addresses you can use in Azure.
Virtual networks can contain both public and private IP address spaces.
IP Addressing
1. Private IP addresses: Used for communication within an Azure virtual network
(VNet), and your on-premises network, when you use a VPN gateway or
ExpressRoute circuit to extend your network to Azure.
2. Public IP addresses: Used for communication with the Internet, including Azure
public-facing services.
Public IP Addresses
A public IP address resource can be associated with virtual machine network
interfaces, internet-facing load balancers, VPN gateways, and application
gateways.
*Static IP addresses only available on certain SKUs.
Address SKUs
When you create a public IP address you are given a SKU choice of either Basic or
Standard.
Your SKU choice affects the IP assignment method, security, available resources,
and redundancy.
Private IP Addresses
A private IP address resource can be associated with virtual machine network
interfaces, internal load balancers, and application gateways.
Private IP Addresses
● Dynamic. Azure assigns the next available unassigned or unreserved IP
address in the subnet's address range.
For example, Azure assigns 10.0.0.10 to a new resource, if addresses 10.0.0.4-
10.0.0.9 are already assigned to other resources. Dynamic is the default
allocation method.
Private IP Addresses
● Static. You select and assign any unassigned or unreserved IP address in the
subnet's address range.
For example, if a subnet's address range is 10.0.0.0/16 and addresses 10.0.0.4-
10.0.0.9 are already assigned to other resources, you can assign any address
between 10.0.0.10 - 10.0.255.254.
Subnets
You can assign NSGs to subnets and create protected screened subnets (also
called a DMZ).
These NSGs can restrict traffic flow to all the machines that reside within that
subnet.
Network Interfaces
You can assign NSGs to a NIC so that all the traffic that flows through that
NIC is controlled by NSG rules.
Each network interface that exists in a subnet can have zero, or one,
associated network security groups.
NSG Rules
Security rules in network security groups enable you to filter the type of
network traffic that can flow in and out of virtual network subnets and
network interfaces.
Azure creates several default security rules within each network security
group.
You can add more rules by specifying Name, Priority, Port, Protocol (Any, TCP,
UDP), Source (Any, IP Addresses, Service tag), Destination (Any, IP Addresses,
Virtual Network), and Action (Allow or Deny).
NSG Rules
You cannot delete the default rules, but you can add other rules with a higher
priority.
Azure creates the default rules in each network security group that you create.
You cannot remove the default rules, but you can override them by creating rules
with higher priorities.
Inbound rules
There are three default inbound security rules.
The rules deny all inbound traffic except from the virtual network and Azure load
balancers.
Outbound rules
There are three default outbound security rules.
The rules only allow outbound traffic to the Internet and the virtual network.
Azure Firewall
Azure Firewall is a managed, cloud-based network security service that protects your
Azure Virtual Network resources.
It's a fully stateful firewall as a service with built-in high availability and unrestricted
cloud scalability.
You can centrally create, enforce, and log application and network connectivity
policies across subscriptions and virtual networks.
Azure Firewall
Azure Firewall uses a static public IP address for your virtual network resources
allowing outside firewalls to identify traffic originating from your virtual network.
Firewall Rules
There are three kinds of rules that you can configure in the Azure Firewall.
Remember, by default, Azure Firewall blocks all traffic, unless you enable it.
NAT Rules
You can configure Azure Firewall Destination Network Address Translation (DNAT) to
translate and filter inbound traffic to your subnets.
Each rule in the NAT rule collection is used to translate your firewall public IP and
port to a private IP and port.
Application Rules
Application rules define fully qualified domain names (FQDNs) that can be accessed
from a subnet.
Rule Processing
When a packet is being inspected to determine if it is allowed or not the rules are
processed in this order:
1. Network Rules
2. Application Rules (network and application)
The rules are terminating. Once a positive match is found, allowing the traffic
through, no more rules are checked.
Azure DNS
By default, when you create an Azure subscription an Azure AD domain is
created for you.
This instance of the domain has initial domain name in the form
domainname.onmicrosoft.com.
Considerations
● The name of the zone must be unique within the resource group, and the
zone must not exist already.
● The same zone name can be reused in a different resource group or a
different Azure subscription.
● Where multiple zones share the same name, each instance is assigned
different name server addresses.
● Only one set of addresses can be configured with the domain name
registrar.
Child Domains
If you want to set up a separate child zone, you can delegate a sub-domain in
Azure DNS.
For example, after configuring contoso.com in Azure DNS, you could
configure a separate child zone for partners.contoso.com.
The parent and child zones can be in the same or different resource group.
Module 04 Lab
Lab 04 - Implement Virtual Networking
Objectives
In this lab, you will:
● Task 1: Create and configure a virtual network.
● Task 2: Deploy virtual machines into the virtual network.
● Task 3: Configure private and public IP addresses of Azure VMs.
● Task 4: Configure network security groups.
● Task 5: Configure Azure DNS for internal name resolution.
● Task 6: Configure Azure DNS for external name resolution.
Thanks!
Any questions?
You can find me at:
[email protected]
+93 784670845
76