跳转至

3 Networking Strateg / Connectivity & Security

1 Design a Networking Strategy

Isolated Networks

Secure, private, and isolated from other virtual networks.

Default Routing

Intra-VNet traffic, and outbound Internet is routed.

Multi-Zone Deployments

Supports zone-based resources within a region.

Alt Image Text

Hub-and-Spoke Network Architecture

Common network design for sharing centralized network resources and access.

Alt Image Text

Public Accessibility for Azure Services

Many Azure services are built for public accessibility.

Alt Image Text

  1. Virtual Networking:

  2. Virtual networks in Azure are fully isolated and secure by default.

  3. Default routing is configured when creating a virtual network, providing connectivity to the public internet and between subnets within the virtual network.
  4. Virtual networks deployed in a multi-zone deployment can be accessed by resources pinned to availability zones within the same region.

  5. Hub-and-Spoke Network Architecture:

  6. Common network architecture for connecting and sharing centralized resources within a virtual network.

  7. Hub VNet contains shared resources like firewalls, ExpressRoute connectivity, VPN connections, etc.
  8. Spoke VNets can connect to the hub VNet to access shared resources without the need to configure connectivity individually for each VNet.

  9. Azure Services Accessibility:

  10. Many Azure services are built for public accessibility by default, with public endpoints.

  11. Technologies exist to restrict and control access to public endpoints and provide more private connectivity for Azure services.

Additional Exam Key Points:

  • Integrated networking services like service endpoints and private link.
  • Hybrid networks including Azure Virtual WAN and ExpressRoute.
  • Service networking considerations for deploying different services and providing them with connectivity to virtual networks.
  • Securing services with resource firewalls.
  • Various technologies for securely connecting to, integrating, and establishing hybrid connectivity for different types of services and networks.

1-2 Recapping Virtual Networks

Custom Routes

Alt Image Text

Examples of Custom Routes:

Blocking Internet Access

Using the None next hop type, we can block internet access.

Forcing Traffic via Another Address

Using various next hop types, we can force traffic elsewhere.

Configuration

Routes within a route table apply to associated subnets.

Alt Image Text

Routing Considerations

Special Scenarios and Configuration:

Automatic System Routes

System routes can be automatically generated (e.g., VNet peering).

Border Gateway Protocol (BGP)

BGP can help manage dynamic routing (e.g., ExpressRoute or VPN).

Matching Address Prefix Routes

The below precedence is used:

Custom > BGP > System

Alt Image Text

Network Security Groups (NSGs)

Traffic Filtering

Priority-based allow or deny rules are processed only until a single match is found.

Default Rules

All NSGs include a default DENY rule. There is one rule each for inbound and outbound traffic.

Assignment

Assigned to a subnet or NIC. Subnet assignments are similar to all NICs.

Alt Image Text

Shared Outbound Internet

Replaces the need for individual public IP addressing for outbound connectivity.

Public IP Addressing

Can address like a standard public IP. Also supports public IP prefixes.

Configuration

One NAT can be associated with one or more subnets within a VNet.

Alt Image Text

Alt Image Text

Alt Image Text

  1. Routing:

  2. Virtual networks have built-in connectivity between subnets and the internet, but custom routing can be used to change these pathways.

  3. Route tables can be created to alter pathways, such as blocking access to the internet or forcing traffic through a specific IP address.
  4. Network security groups and routing serve different purposes: routing controls pathways while network security groups filter traffic.
  5. Routes can be configured for various purposes like sending traffic via a virtual appliance, the internet, virtual network, or virtual network gateway.
  6. Custom routes take precedence over BGP routes, which take precedence over system routes when conflicts arise.

  7. Network Security Groups:

  8. Network security groups filter traffic with priority-based rules, where lower number rules are processed first.

  9. Default deny rules exist on both inbound and outbound sides of network security groups.
  10. Rules need to be assigned to network security groups to take effect.
  11. Network security groups at the subnet level apply to all network devices within that subnet.

  12. Public IP Addresses and Network Security:

  13. With standard public IP addresses, all traffic is blocked by default unless allowed through network security groups.

  14. Network security group rules are stateful, allowing outbound traffic and its corresponding inbound replies.
  15. Even without a public IP address assigned, a virtual machine can still have internet access through other means like VPN or ExpressRoute.

  16. Virtual Network NAT:

  17. Virtual Network NAT controls outbound connectivity for multiple devices within a subnet.
  18. It eliminates the need to configure outbound connectivity on a per-VM basis.
  19. Public IP addressing for outbound connectivity can be controlled using virtual network NAT, providing shared outbound internet control.
  20. Virtual network NAT can use single IP addresses or public IP prefixes to manage outbound IP addressing for resources.

1-3 Recapping Integrated Networks

  1. VNet Peering:

  2. Allows connecting multiple VNets securely.

  3. Provides low-latency, private IP address connectivity between virtual machines in different VNets.
  4. Supports peering across different subscriptions and regions.
  5. Limitations include non-overlapping address spaces and lack of transitive routing by default.

VNet Peering

Virtual networks have default connectivity, but are otherwise totally isolated.

Alt Image Text

Alt Image Text

  • [V] Fast, low-latency private IP connectivity.
  • [V] Supports cross-subscription connectivity.
  • [V] Supports cross-region connectivity.

  • [X] Address spaces cannot overlap.

  • [X] Does not support transitive routing.

Alt Image Text

Service Endpoints

Service Endpoints:

  • Provides secure connectivity to Azure resources.
  • Configured at the subnet level for specific resource providers.
  • Utilizes the Microsoft backbone for private connectivity.
  • Does not offer private IP addressing but ensures secure pathway.

Alt Image Text

Configuring Service Endpoints

Configured per resource provider, per subnet, to provide secure connectivity,

System Routes

Optimal routes are added so that all resources within a subnet use the backbone.

Network Security

Resource firewall rules can be configured to allow/deny traffic.

Alt Image Text

Alt Image Text

Private Link:

  • Offers secure connectivity to supported Azure services.
  • Enables creation of private endpoints with private IP addresses within a subnet.
  • Allows for granular security by providing connectivity to specific resources.
  • Supports connectivity to Azure services and custom solutions in different subscriptions.
  • Provides enhanced security features compared to service endpoints, including DNS integration and private IP addressing.

Secure Network Connectivity:

Alt Image Text

Private Link Support

  • Supported Azure services
  • Customer/partner-managed services

Granular Security

Configure connectivity to specific resources (not a whole resource type)

Broad Accessibility

  • Accessibility from on premises
  • Access from peered virtual networks
  • Accessing services in other region

Implementation in Azure Portal:

  • Demonstrated VNet peering, service endpoints, and Private Link configurations in the Azure portal.
  • Showed how to set up VNet peering for secure connectivity between virtual machines in different VNets.
  • Illustrated the configuration of service endpoints to establish private backbone connectivity.
  • Walked through the process of creating private endpoints using Private Link for secure connectivity to Azure services like storage accounts.

Alt Image Text

Alt Image Text

Alt Image Text

1-4 Recapping Hybrid Networks

Virtual Private Networking

Providing private, encrypted connectivity to Azure virtual networks.

Alt Image Text

Alt Image Text

  1. Virtual Private Networking (VPN):

  2. VPNs provide private connectivity across the internet to resources in a virtual network.

  3. Site-to-site VPN connects entire networks to an Azure Virtual Network, while point-to-site VPN allows users to connect to an Azure Virtual Network.
  4. VPN encryption ensures secure and isolated connections over the public internet.
  5. VPNs support hybrid connectivity, site-to-site, point-to-site, and VNet-to-VNet connections.

Virtual Private Networking

VNet Peering

  • Designed for VNet-to-VNet connectivity.
  • Supports cross-subscription, cross-region, cross-Azure AD tenant.
  • Leverages Microsoft backbone for private IP address connectivity.
  • Used for private, low-latency, limitless bandwidth connectivity.

VPN

  • Designed for hybrid connectivity (site-to-site, point-to-site).
  • Supports similar Vet connectivity (cross-subscription, cross-region)
  • Requires a public IP address for the VPN termination point.
  • Used where encryption and/or transitive routing is needed.

VNet Peering vs. VPN:

  • VNet peering is designed for VNet-to-VNet interconnectivity, leveraging the Microsoft backbone for private IP address connectivity.
  • VPN connections go over the public internet, requiring public IP addresses for termination points.
  • VNet peering offers low latency and limitless bandwidth, while VPNs provide encryption and support transitive routing.

ExpressRoute

ExpressRoute can provide a more direct and secure connection to Microsoft cloud services.

Alt Image Text

ExpressRoute

  • Provides secure connectivity to virtual networks and Microsoft 365.
  • Does not traverse the public internet.
  • Does not leverage encryption by default (IPsec and MACsec).
  • Supports up to 10 Gbps (100Gbps with ExpressRoute Direct).

VPN

  • Provides secure connectivity to virtual networks only.
  • Traverses the public internet (between the point/site and Azure).
  • Traffic is encrypted by default as part of an end-to-end tunnel (IPsec).
  • Supports up to 10 Gbps.

ExpressRoute:

  • ExpressRoute provides secure connectivity between on-premises networks and Azure Virtual Networks without using the public internet.
  • It can also be used to connect to Microsoft 365 services securely.
  • ExpressRoute does not require encryption by default, supports up to 100 gigabits per second connectivity, and offers direct network connections with ExpressRoute Direct.

Virtual WAN

Alt Image Text

Azure Virtual WAN helps to automate and optimize connectivity using the hub-and-spoke network architecture.

Alt Image Text

Azure Virtual WAN:

  • Azure Virtual WAN automates and optimizes hub-and-spoke network topology, simplifying network management through software-defined networking.
  • It streamlines connectivity between spoke virtual networks, remote users, branch offices, and head offices.
  • Microsoft manages the Hub virtual network in Azure Virtual WAN on a per-region basis, simplifying global interconnectivity.
  • Azure Virtual WAN allows for a simplified deployment and management experience for various types of connectivity scenarios, including branch-to-branch, branch-to-Azure, and VNet-to-VNet connections.

1-5 Designing Networks for Azure Services

VNet-Native Services

Alt Image Text

VNet-Native Services:

  • Some services are ready to go and work with virtual networks by default.
  • Examples include virtual machines, Azure Kubernetes service, and Azure App Service environments.
  • Services like container instances can be deployed to a virtual network for private connectivity.
  • VNet Peering can be used for access across virtual networks.

Net Integration

Alt Image Text

VNet Integration for Outbound Access:

  • For services like Azure App Service that require outbound access to a virtual network, VNet integration is needed.
  • VNet integration provides access from the app to the virtual network.
  • Supported by standard and premium tiers, not free or basic tiers.

Alt Image Text

  • Provides outbound access to a VNet.
  • Supported by Standard or Premium tiers.
  • Supports function apps.

  • Doesn't support NetBIOS or SMB.

  • Does not provide inbound app access.

Alt Image Text

Hybrid Connections for On-Premises Connectivity:

  • For connectivity to on-premises resources, hybrid connections using Azure Relay service are utilized.

Resource Firewalls

Many networked Azure services provide access control through a resource firewall.

Alt Image Text

Alt Image Text

Resource Firewalls:

  • Services like Azure SQL, storage accounts, Azure App Service, and key vaults have resource firewalls to control inbound access.
  • Enabling a resource firewall creates a default deny rule, allowing only specified access.
  • Options include allowing access from public IP addresses and setting up virtual network rules.
  • Resource firewalls can be configured in the Azure portal for services like Azure App Service and storage accounts.

Alt Image Text

Design a Networking Strategy

Client Requirements:

  • GOVGoods wants the solution migrated to a cloud-based scalable service, preferably platform as a service.
  • They require staging functionality to test updates before production deployment.
  • Connectivity must be maintained for on-premises manufacturing hardware without using the public internet.

Proposed Solution:

  • Host the application on Azure App Service to minimize administrative overhead and utilize deployment slots for staging.
  • Use ExpressRoute with private peering to connect on-premises environment to Azure.
  • Implement PrivateLink to provide secure connectivity for on-premises manufacturing devices to the Azure App Service.

Azure App Service for Hosting

Leverage staging slots for C/CD requirements.

ExpressRoute for Private Connectivity

Leverage private peering to a Vet within the GOVGoods subscription.

Azure Private Link for Inbound Access to the App

Associate the private endpoint with the GOVGoods VNet.

Technologies Used:

  • Azure App Service for hosting the application.
  • ExpressRoute with private peering for secure connectivity.
  • PrivateLink for connecting on-premises manufacturing hardware to the Azure App Service.

2 Design Connectivity and Security

Modern scaling Solutions

A more modern approach is to scale in and out based on demand.

Alt Image Text

  1. Traditional vs. Cloud Model:

  2. Traditional solutions involved hosting everything on a single server, with the risk of the entire solution going offline if the server fails.

  3. Cloud solutions involve scaling out by adding duplicate copies of servers or services for high availability.

  4. Scaling In and Scaling Out:

  5. Scaling in involves adding more resources to a single server.

  6. Scaling out involves adding duplicate copies of servers or services to distribute traffic and ensure high availability.

  7. Load Balancers:

  8. Load balancers provide a single entry point for applications and distribute traffic among healthy instances of servers.

  9. They help in maintaining high availability and managing connectivity to multiple server instances.

  10. Splitting Solutions into Tiers:

  11. Cloud solutions allow splitting the solution into different tiers, such as web frontend and data backend, and scaling them independently based on demand.

  12. Global Scalability:

  13. To achieve global scalability, multiple copies of the solution are deployed across different regions.

  14. Global traffic routing and load balancing are essential to manage connectivity and distribute traffic effectively.

  15. Microsoft Products for Connectivity and Security:

  16. Microsoft offers products to help with load balancing, controlling connectivity to regional and global services, and enhancing security for cloud solutions.

2-1 Recapping Azure Global Infrastructure

Azure regions

Alt Image Text

Region

  • Low-latency connected data
  • centers hosting services

Cross-Region Replication

Region pairs with replication

Geography

Geographic, data, and compliance boundary

Availability Zones

Availability Zone

Physically separate location within a region.

Zonal Services

Some services can be pinned to a specific availability zone.

Zone-Redundant Services

Some services are replicated across availability zones.

Alt Image Text

Alt Image Text

Availability Sets

Availability Set

Group duplicate VMs together to avoid common outages.

Fault Domain Hardware that shares common sources of failure.

Update Domain

Platform services updated/restarted by Microsoft.

Alt Image Text

Alt Image Text

Here is a summary of the key points for the AZ-305 exam based on the provided article:

  1. Azure Load Balancer:

    • Used for providing public connectivity to web applications deployed to backend resources.
    • Distributes traffic to healthy backend resources based on configured health probes.
    • Enables outbound public internet connectivity using public IP or IP prefix.
  2. Azure Application Gateway:

    • Similar to Azure Load Balancer but specifically designed for web application solutions.
    • Layer 7 aware, can route based on host name and path-based routing.
    • Can load balance across multiple components in different backend pools.
  3. Traffic Manager:

    • Designed for globally distributed solutions.
    • Ensures users are routed to the closest backend resources based on routing methods.
    • Uses DNS for routing, confirms resource health, and responds with a DNS response to guide users directly to backend resources.
  4. General Load Balancing Concepts:

    • Load balancers like Azure Load Balancer and Application Gateway are region-specific.
    • Load balancers distribute traffic to backend resources based on health and routing rules.
  5. Exam Topics:

    • Understand the differences between Azure Load Balancer, Application Gateway, and Traffic Manager.
    • Know how each service functions and their use cases in load balancing applications.
    • Be familiar with configuring and managing these load balancing services in Azure Portal.

These key points should help you prepare for the AZ-305 exam focusing on load balancing technologies in Azure.

Designing Highly Available Connectivity

Azure Load Balancer

Distributing Layer 4 connectivity to resources within a region.

Alt Image Text

Layer 7 application-aware load balancing

Alt Image Text

1.Azure Load Balancer:

  • Distributes Layer 4 connectivity to resources within a single region.
  • Uses TCP and UDP protocols.
  • Can be internal (private within a virtual network) or public for outbound internet connectivity.
  • Balances connectivity across redundant backend resources within a region.

2.Azure Application Gateway (App Gateway):

  • Layer 7 aware load balancer for web application solutions.
  • Capable of routing based on hostnames and paths.
  • Can load balance across multiple backend pools for different components of a solution.
  • Used for distributing load across web applications hosted in different regions.

3.Traffic Manager:

  • For globally distributed solutions, unlike region-specific load balancing.
  • Requires backend resources to be publicly accessible.
  • Routes users based on routing methods such as proximity, priority, or network location.
  • Uses DNS for routing and responds with a DNS response to guide users to backend resources directly.

Traffic Manager

Azure Front Door Service Overview:

  • Azure Front Door is a global load balancer designed specifically for web applications,
  • offering web functionality, caching, and acceleration capabilities.
  • It leverages Microsoft's global network to provide faster access to web applications across the globe.
  • Functions as a global application gateway, enabling web application acceleration and delivery worldwide.

Key Features and Configuration:

  • Uses origin groups similar to backend pools in Application Gateway for defining backend endpoints.
  • Supports various backend endpoints, built-in health probes, and load balancing.
  • Allows path-based routing for directing traffic to specific backend endpoints based on URL paths.
  • Offers Layer 7 functionality for advanced routing capabilities.
  • Provides options for configuring caching, security features like web application firewall, and custom routing rules.
  • Supports load balancing and Layer 7 capabilities for routing traffic efficiently.

Azure Front Door vs. Azure Traffic Manager:

  • Azure Traffic Manager is more similar to a global load balancer supporting various protocols, while Azure Front Door is tailored for web applications, HTTP, and HTTPS.
  • Traffic Manager uses DNS for routing user requests directly to endpoints, while Front Door accelerates web traffic through Microsoft's endpoint network.
  • Traffic Manager routes traffic directly to endpoints, whereas Front Door proxies traffic at the Microsoft edge, enhancing performance and load balancing.
  • Both services offer routing methodologies based on proximity, priority, or weighted lists, but Front Door additionally supports session affinity routing.
  • Front Door provides advanced Layer 7 features like rate-limiting, IP-based ACLs, and integration with web application firewall for enhanced security and performance.
  • Front Door can be more expensive due to its additional Layer 7 capabilities compared to Traffic Manager.

Distributing traffic to resources across Azure regions using DNS.

Alt Image Text

Alt Image Text

Alt Image Text

Alt Image Text

Alt Image Text

Traffic Manager vs. Front Door

Traffic Manager

  • Supports several protocols.
  • Routes traffic by responding to DNS queries based on routing method.
  • Traffic is routed directly.
  • Routing: performance, priority, weighted, geo, and multi-value
  • Simply routes to healthy endpoints (pricing is accordingly simple).

Front Door

  • Supports HTTP/S.
  • Accelerates web traffic through Microsoft's edge network.
  • Traffic is proxied at the edge.
  • Routing: latency, priority, weighted, and session affinity
  • Adds Layer 7 features, rate-limiting, and IP-based ACLs.