Skip to the content.

Azure Networking

This is not an exhaustive documentation of all the existing Azure Services. These are summarized notes for the Azure Certifications.
To see the complete documentation, please go to: Azure documentation

Virtual Networks

In Azure, the equivalent of a local area network is called an Azure Virtual Network or VNet.

Azure Virtual Networks are foundational to Azure resource deployment, providing enhanced scalability, availability, and isolation.

Network Communication

Resources within the same subnet can communicate via default routes created by Azure.

Name Resolution in vNets

While IP addresses are crucial, referring to resources by name is often more practical. Azure provides several options for name resolution:

Back to the top

Key Concepts

Address Space

Subnets

Regions

Subscriptions

Back to the top

Best Practices for Virtual Networks

Address Space Overlap

Subnet Planning

Fewer Larger Virtual Networks

Utilize Network Security Groups (NSGs)

For more information: Learn more about Network Security Groups.

Back to the top

Internet Communication

Communication Between Azure Resources

Deployment in the same vNet

Resources like VMs, Scale Sets, and App Service Environments deployed to the same virtual network can communicate with each other.

Service Endpoints

Enables secure and direct connectivity from the virtual network to the Azure resources using a secure and optimized route over the Azure backbone network.

For more information: Service Endpoints Overview

A private link can be used to privately access specific service instances from virtual network or on-prem.

For more information: Private Link Overview

vNet Peering

Connect two virtual networks, enabling communication between Azure resources.

For more information: vNet Peering

Back to the top

Communication with On-Prem Networks

Point-to-Site VPN

Connect a single computer to the virtual network.

For more information: Point-to-Site VPNs

Site-to-Site VPN

Connect entire on-prem network to Azure virtual network.

For more information: Site-to-Site VPNs

Azure ExpressRoute

Private connection between on-prem network and Azure.

For more information: Azure ExpressRoute

Back to the top

Filtering and Routing

Traffic filtering in production virtual networks can be done through network security groups (NSGs) and application security groups (ASGs).

Security Groups

As mentioned, there are two types of security groups:

Network Virtual Appliances (NVA)

An NVA is a virtual machine performing specific network tasks

Route Tables

Default Routing Azure handles routing by default between subnets, vNets, on-prem networks, and the internet. To enable custom routes, use route tables and BGP routes.

Route Tables Custom tables that allows you to define custom routes for subnets.

BGP Routes Propagates on-prem BGP routes to Azure virtual networks, through the use of:

For more information: BGP Routes

Back to the top

vNet Peering

In scenarios requiring seamless connectivity between distinct Azure virtual networks, a solution that you can use is Virtual Network Peering, or vNet Peering.

Key Features

Types of Peering

  1. Virtual Network Peering
    • Connects virtual networks within the same Azure region.
  2. Global Virtual Network Peering
    • Links virtual networks deployed in different Azure regions.

Whether opting for local or global peering, both choices offer low-latency, high-bandwidth connectivity. This connectivity spans across virtual networks in diverse Azure subscriptions, Azure Active Directory tenants, and Azure regions.

Back to the top

VPN Gateway

A VPN Gateway is a specialized virtual network gateway used for encrypted network traffic over the public internet, and can be used to connect:

Note that only one VPN gateway can be defined per virtual network. However, a VPN gateway can support multiple connections to it.

How it works Azure deploys at least two hidden VMs in a specified gateway subnet.

Gateway Types The type of VPN gateway is specified during deployment:

After Deployment Once the VPN Gateway is deployed, you can create an IPSec or IKE VPN tunnel between the newly deployed vNet gateway and any one of a number of other gateways.

For more information: Azure VPN Gateway Documentation

Back to the top

Point-to-Site VPNs

A Point-to-Site (P2S) VPN gateway connection is a secure means to link a single client computer to an Azure virtual network, often favored by remote workers seeking access to Azure resources. This connection type is initiated directly from the client computer.

Protocols

When creating a P2S VPN, you have the flexibility to select from various protocols:

Authentication Methods

Users initiating a P2S VPN connection to Azure must undergo authentication which can done through various methods:

Gateway SKUs Supporting P2S VPNs

Refer to the table below for Azure gateway SKUs supporting Point-to-Site VPNs:

Gateway SKU P2S VPN Support
Standard Yes
HighPerformance Yes
VpnGw1 Yes
VpnGw2 Yes
VpnGw3 Yes

For more information: official documentation.

Back to the top

Site-to-Site VPNs

When bridging on-premises networks to Azure virtual networks, the go-to solution is often a Site-to-Site VPN gateway.

Creating the Connection

  1. Azure Virtual Network Setup:
    • Begin by crafting the Azure virtual network that will connect to your on-prem network.
  2. Gateway Subnet and VPN Gateway Creation:
    • Establish a gateway subnet within your virtual network.
    • Next, create the VPN gateway.
    • While the gateway subnet takes only minutes, deploying the VPN gateway may take up to 45 minutes.
  3. Local Network Gateway Setup:
    • Once the VPN gateway is in place, set up the local network gateway, symbolizing the on-premises endpoint of the impending VPN connection.
  4. Configuration of On-Prem VPN Device:
    • Customize the on-premises VPN device configuration.
    • Note: The process may vary based on your specific device.
  5. Azure VPN Connection Deployment:
    • With both VPN and local network gateways ready, deploy the VPN connection in Azure.
    • This step establishes the site-to-site link between the Azure VPN gateway (representing the Azure side) and the local network gateway (representing the on-prem endpoint).
  6. Verification of Connection:
    • After provisioning the VPN connection, thorough verification is crucial to ensure a seamless and secure link between on-premises and Azure networks.

Back to the top

Routing Options for VPNs

There are two types of routing:

If you don’t want your connection to go over the internet or you need more bandwidth, then you can set up a direct connection using Azure ExpressRoute.

ExpressRoute

Microsoft ExpressRoute is a powerful solution for extending on-premises networks into Azure, providing a private connection facilitated by third-party connectivity providers.

Unlike traditional site-to-site connections that traverse the public internet, ExpressRoute ensures enhanced security, reliability, and speed.

Connectivity Options

Ways to Connect to ExpressRoute

There are four ways to connect to Azure using ExpressRoute. It all comes down to where you have your IT infrastructure.

Additional Features

Key Benefits

Bandwidth Options

Choose from a range of ExpressRoute circuit bandwidths:

Scalability Bonus: Increase bandwidth without tearing down existing connections.

Billing Models

  1. Unlimited Data Billing:
    • Monthly fee offering unlimited inbound and outbound transfer.
  2. Metered Data Billing:
    • Monthly fee with free inbound data transfer; outbound data transfer charged on a per-GB basis.

ExpressRoute Premium Add-On

For more information: ExpressRoute FAQ

Back to the top

Private Endpoints

In the Azure ecosystem, not all resources, such as Azure SQL Database instances and Azure Storage containers, can be directly placed within a virtual network.

As a solution we’ll need to us a private endpoint which provides a secure and indirect way to integrate these external resources into a virtual network.

Benefits of Private Endpoints

Sample Scenario:

In the example above, we have virtual machine (VM) running an application needs to store data in an Azure SQL Database instance named DB1.

Here’s a step-by-step process:

Microsoft has extended the utility of private endpoints by allowing the setup of custom Private Link services. This empowers organizations to establish private connections for their own applications, enhancing the versatility of private endpoints.

Peered VNets and On-Premises Environments

Whether your VNet is peered to another VNet or connected to an on-premises environment, resources in these networks can securely access external Azure resources through private endpoints.

Back to the top

Resources