0% found this document useful (0 votes)
85 views

LAB 04-Implement Virtual Networking

The document describes a lab to implement virtual networking in Azure. The objectives are to: 1. Create a virtual network with two subnets and deploy two virtual machines into different subnets. 2. Configure static private and public IP addresses for the virtual machine network interfaces. 3. Create a network security group to allow RDP access to the virtual machines and assign it to their network interfaces.

Uploaded by

Sec About
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
85 views

LAB 04-Implement Virtual Networking

The document describes a lab to implement virtual networking in Azure. The objectives are to: 1. Create a virtual network with two subnets and deploy two virtual machines into different subnets. 2. Configure static private and public IP addresses for the virtual machine network interfaces. 3. Create a network security group to allow RDP access to the virtual machines and assign it to their network interfaces.

Uploaded by

Sec About
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 9

---

lab:
title: '04 - Implement Virtual Networking'
module: 'Module 04 - Virtual Networking'
---

# Lab 04 - Implement Virtual Networking

# Student lab manual

## Lab scenario

You need to explore Azure virtual networking capabilities. To start, you plan to
create a virtual network in Azure that will host a couple of Azure virtual
machines. Since you intend to implement network-based segmentation, you will deploy
them into different subnets of the virtual network. You also want to make sure that
their private and public IP addresses will not change over time. To comply with
Contoso security requirements, you need to protect public endpoints of Azure
virtual machines accessible from Internet. Finally, you need to implement DNS name
resolution for Azure virtual machines both within the virtual network and from
Internet.

## Objectives

In this lab, you will:

+ Task 1: Create and configure a virtual network


+ Task 2: Deploy virtual machines into the virtual network
+ Task 3: Configure private and public IP addresses of Azure VMs
+ Task 4: Configure network security groups
+ Task 5: Configure Azure DNS for internal name resolution
+ Task 6: Configure Azure DNS for external name resolution

## Estimated timing: 40 minutes

## Architecture diagram

![image](../media/lab04.png)

## Instructions

### Exercise 1

#### Task 1: Create and configure a virtual network

In this task, you will create a virtual network with multiple subnets by using the
Azure portal

1. Sign in to the [Azure portal](https://portal.azure.com).

1. In the Azure portal, search for and select **Virtual networks**, and, on the
**Virtual networks** blade, click **+ Add**.

1. Create a virtual network with the following settings (leave others with their
default values):

| Setting | Value |
| --- | --- |
| Subscription | the name of the Azure subscription you will be using in this
lab |
| Resource Group | the name of a **new** resource group **az104-04-rg1** |
| Name | **az104-04-vnet1** |
| Region | the name of any Azure region available in the subscription you will
use in this lab |

1. Click **Next : IP Addresses** and enter the following values

| Setting | Value |
| --- | --- |
| IPv4 address space | **10.40.0.0/20** |

1. Click **+ Add subnet** enter the following values then click **Add**

| Setting | Value |
| --- | --- |
| Subnet name | **subnet0** |
| Subnet address range | **10.40.0.0/24** |

1. Accept the defaults and click **Review and Create**. Let validation occur, and
hit **Create** again to submit your deployment.

>**Note:** Wait for the virtual network to be provisioned. This should take
less than a minute.

1. Click on **Go to resource**

1. On the **az104-04-vnet1** virtual network blade, click **Subnets** and then


click **+ Subnet**.

1. Create a subnet with the following settings (leave others with their default
values):

| Setting | Value |
| --- | --- |
| Name | **subnet1** |
| Address range (CIDR block) | **10.40.1.0/24** |
| Network security group | **None** |
| Route table | **None** |

1. Click **Save**

#### Task 2: Deploy virtual machines into the virtual network

In this task, you will deploy Azure virtual machines into different subnets of the
virtual network by using an ARM template

1. In the Azure portal, open the **Azure Cloud Shell** by clicking on the icon in
the top right of the Azure Portal.

1. If prompted to select either **Bash** or **PowerShell**, select **PowerShell**.

>**Note**: If this is the first time you are starting **Cloud Shell** and you
are presented with the **You have no storage mounted** message, select the
subscription you are using in this lab, and click **Create storage**.

1. In the toolbar of the Cloud Shell pane, click the **Upload/Download files**
icon, in the drop-down menu, click **Upload** and upload the files
**\\Allfiles\\Labs\\04\\az104-04-vms-loop-template.json** and
**\\Allfiles\\Labs\\04\\az104-04-vms-loop-parameters.json** into the Cloud Shell
home directory.

>**Note**: You might need to upload each file separately.

1. From the Cloud Shell pane, run the following to deploy two virtual machines by
using the template and parameter files you uploaded:

```powershell
$rgName = 'az104-04-rg1'

New-AzResourceGroupDeployment `
-ResourceGroupName $rgName `
-TemplateFile $HOME/az104-04-vms-loop-template.json `
-TemplateParameterFile $HOME/az104-04-vms-loop-parameters.json
```

>**Note**: This method of deploying ARM templates uses Azure PowerShell. You
can perform the same task by running the equivalent Azure CLI command **az
deployment create** (for more information, refer to [Deploy resources with Resource
Manager templates and Azure CLI](https://docs.microsoft.com/en-us/azure/azure-
resource-manager/templates/deploy-cli).

>**Note**: Wait for the deployment to complete before proceeding to the next
task. This should take about 2 minutes.

1. Close the Cloud Shell pane.

#### Task 3: Configure private and public IP addresses of Azure VMs

In this task, you will configure static assignment of public and private IP
addresses assigned to network interfaces of Azure virtual machines.

>**Note**: Private and public IP addresses are actually assigned to the network
interfaces, which, in turn are attached to Azure virtual machines, however, it is
fairly common to refer to IP addresses assigned to Azure VMs instead.

1. In the Azure portal, search for and select **Resource groups**, and, on the
**Resource groups** blade, click **az104-04-rg1**.

1. On the **az104-04-rg1** resource group blade, in the list of its resources,


click **az104-04-vnet1**.

1. On the **az104-04-vnet1** virtual network blade, review the **Connected


devices** section and verify that there are two network interfaces **az104-04-
nic0** and **az104-04-nic1** attached to the virtual network.

1. Click **az104-04-nic0** and, on the **az104-04-nic0** blade, click **IP


configurations**.

>**Note**: Verify that **ipconfig1** is currently set up with a dynamic private


IP address.

1. In the list IP configurations, click **ipconfig1**.

1. On the **ipconfig1** blade, in the **Public IP address settings** section,


select **Associate**, click **+ Create new**, specify the following settings, and
click **OK**:
| Setting | Value |
| --- | --- |
| Name | **az104-04-pip0** |
| SKU | **Standard** |

1. On the **ipconfig1** blade, set **Assignment** to **Static**, leave the default


value of **IP address** set to **10.40.0.4**.

1. Back on the **ipconfig1** blade, save the changes. Make sure to wait for the
save operation to complete before you proceed to the next step.

1. Navigate back to the **az104-04-vnet1** blade

1. Click **az104-04-nic1** and, on the **az104-04-nic1** blade, click **IP


configurations**.

>**Note**: Verify that **ipconfig1** is currently set up with a dynamic private


IP address.

1. In the list IP configurations, click **ipconfig1**.

1. On the **ipconfig1** blade, in the **Public IP address settings** section,


select **Associate**, click **+ Create new**, specify the following settings, and
click **OK**:

| Setting | Value |
| --- | --- |
| Name | **az104-04-pip1** |
| SKU | **Standard** |

1. On the **ipconfig1** blade, set **Assignment** to **Static**, leave the default


value of **IP address** set to **10.40.1.4**.

1. Back on the **ipconfig1** blade, save the changes.

1. Navigate back to the **az104-04-rg1** resource group blade, in the list of its
resources, click **az104-04-vm0**, and from the **az104-04-vm0** virtual machine
blade, note the public IP address entry.

1. Navigate back to the **az104-04-rg1** resource group blade, in the list of its
resources, click **az104-04-vm1**, and from the **az104-04-vm1** virtual machine
blade, note the public IP address entry.

>**Note**: You will need both IP addresses in the last task of this lab.

#### Task 4: Configure network security groups

In this task, you will configure network security groups in order to allow for
restricted connectivity to Azure virtual machines.

1. In the Azure portal, navigate back to the **az104-04-rg1** resource group blade,
and in the list of its resources, click **az104-04-vm0**.

1. On the **az104-04-vm0** overview blade, click **Connect**, click **RDP** in the


drop-down menu, on the **Connect with RDP** blade, click **Download RDP File**
using the Public IP address and follow the prompts to start the Remote Desktop
session.

1. Note that the connection attempt fails.


>**Note**: This is expected, because public IP addresses of the Standard SKU,
by default, require that the network interfaces to which they are assigned are
protected by a network security group. In order to allow Remote Desktop
connections, you will create a network security group explicitly allowing inbound
RDP traffic from Internet and assign it to network interfaces of both virtual
machines.

1. In the Azure portal, search for and select **Network security groups**, and, on
the **Network security groups** blade, click **+ Add**.

1. Create a network security group with the following settings (leave others with
their default values):

| Setting | Value |
| --- | --- |
| Subscription | the name of the Azure subscription you are using in this lab |
| Resource Group | **az104-04-rg1** |
| Name | **az104-04-nsg01** |
| Region | the name of the Azure region where you deployed all other resources
in this lab |

1. Click **Review and Create**. Let validation occur, and hit **Create** to submit
your deployment.

>**Note**: Wait for the deployment to complete. This should take about 2
minutes.

1. On the deployment blade, click **Go to resource** to open the **az104-04-nsg01**


network security group blade.

1. On the **az104-04-nsg01** network security group blade, in the **Settings**


section, click **Inbound security rules**.

1. Add an inbound rule with the following settings (leave others with their default
values):

| Setting | Value |
| --- | --- |
| Source | **Any** |
| Source port ranges | * |
| Destination | **Any** |
| Service | **RDP** |
| Action | **Allow** |
| Priority | **300** |
| Name | **AllowRDPInBound** |

1. On the **az104-04-nsg01** network security group blade, in the **Settings**


section, click **Network interfaces** and then click **+ Associate**.

1. Associate the **az104-04-nsg01** network security group with the **az104-04-


nic0** and **az104-04-nic1** network interfaces.

>**Note**: It may take up to 5 minutes for the rules from the newly created
Network Security Group to be applied to the Network Interface Card.

1. Navigate back to the **az104-04-vm0** virtual machine blade.

>**Note**: In the subsequent steps, you will verify that you can successfully
connect to the target virtual machine and sign in by using the **Student** username
and **Pa55w.rd1234** password.

1. On the **az104-04-vm0** blade, click **Connect**, click **RDP**, on the


**Connect with RDP** blade, click **Download RDP File** using the Public IP address
and follow the prompts to start the Remote Desktop session.

>**Note**: This step refers to connecting via Remote Desktop from a Windows
computer. On a Mac, you can use Remote Desktop Client from the Mac App Store and on
Linux computers you can use an open source RDP client software.

>**Note**: You can ignore any warning prompts when connecting to the target
virtual machines.

1. When prompted, sign in by using the **Student** username and **Pa55w.rd1234**


password.

>**Note**: Leave the Remote Desktop session open. You will need it in the next
task.

#### Task 5: Configure Azure DNS for internal name resolution

In this task, you will configure DNS name resolution within a virtual network by
using Azure private DNS zones.

1. In the Azure portal, search for and select **Private DNS zones** and, on the
**Private DNS zones** blade, click **+ Add**.

1. Create a private DNS zone with the following settings (leave others with their
default values):

| Setting | Value |
| --- | --- |
| Subscription | the name of the Azure subscription you are using in this lab |
| Resource Group | **az104-04-rg1** |
| Name | **contoso.org** |

1. Click Review and Create. Let validation occur, and hit Create again to submit
your deployment.

>**Note**: Wait for the private DNS zone to be created. This should take about
2 minutes.

1. Click **Go to resource** to open the **contoso.org** DNS private zone blade.

1. On the **contoso.org** private DNS zone blade, in the **Settings** section,


click **Virtual network links**

1. Click **+ Add** to create a virtual network link with the following settings
(leave others with their default values):

| Setting | Value |
| --- | --- |
| Link name | **az104-04-vnet1-link** |
| Subscription | the name of the Azure subscription you are using in this lab |
| Virtual network | **az104-04-vnet1** |
| Enable auto registration | enabled |

1. Click **OK**.
>**Note:** Wait for the virtual network link to be created. This should take
less than 1 minute.

1. On the **contoso.org** private DNS zone blade, in the sidebar, click


**Overview**

1. Verify that the DNS records for **az104-04-vm0** and **az104-04-vm1** appear in
the list of record sets as **Auto registered**.

>**Note:** You might need to wait a few minutes and refresh the page if the
record sets are not listed.

1. Switch to the Remote Desktop session to **az104-04-vm0**, right-click the


**Start** button and, in the right-click menu, click **Windows PowerShell
(Admin)**.

1. In the Windows PowerShell console window, run the following to test internal
name resolution in the newly created private DNS zone:

```powershell
nslookup az104-04-vm0.contoso.org
nslookup az104-04-vm1.contoso.org
```

1. Verify that the output of the command includes the private IP address of
**az104-04-vm1** (**10.40.1.4**).

#### Task 6: Configure Azure DNS for external name resolution

In this task, you will configure external DNS name resolution by using Azure public
DNS zones.

1. In the web browser on the **SEA-DEV** lab system, open a new tab and navigate to
<https://www.godaddy.com/domains/domain-name-search>.

1. Use the domain name search to identify a domain name which is not in use.

1. In the Azure portal, search for and select **DNS zones** and, on the **DNS
zones** blade, click **+ Add**.

1. Create a DNS zone with the following settings (leave others with their default
values):

| Setting | Value |
| --- | --- |
| Subscription | the name of the Azure subscription you are using in this lab |
| Resource Group | **az104-04-rg1** |
| Name | the DNS domain name you identified earlier in this task |

1. Click Review and Create. Let validation occur, and hit Create again to submit
your deployment.

>**Note**: Wait for the DNS zone to be created. This should take about 2
minutes.

1. Click **Go to resource** to open the blade of the newly created DNS zone.

1. On the DNS zone blade, click **+ Record set**.


1. Add a record set with the following settings (leave others with their default
values):

| Setting | Value |
| --- | --- |
| Name | **az104-04-vm0** |
| Type | **A** |
| Alias record set | **No** |
| TTL | **1** |
| TTL unit | **Hours** |
| IP address | the public IP address of **az104-04-vm0** which you identified
in the third exercise of this lab |

1. Click **OK**

1. On the DNS zone blade, click **+ Record set**.

1. Add a record set with the following settings (leave others with their default
values):

| Setting | Value |
| --- | --- |
| Name | **az104-04-vm1** |
| Type | **A** |
| Alias record set | **No** |
| TTL | **1** |
| TTL unit | **Hours** |
| IP address | the public IP address of **az104-04-vm1** which you identified
in the third exercise of this lab |

1. Click **OK**

1. On the DNS zone blade, note the name of the **Name server 1** entry.

1. In the Azure portal, open the **PowerShell** session in **Cloud Shell** by


clicking on the icon in the top right of the Azure Portal.

1. From the Cloud Shell pane, run the following to test external name resolution of
the **az104-04-vm0** DNS record set in the the newly created DNS zone (replace the
placeholder `[Name server 1]` with the name of **Name server 1** you noted earlier
in this task and the `[domain name]` placeholder with the name of the DNS domain
you created earlier in this task):

```powershell
nslookup az104-04-vm0.[domain name] [Name server 1]
```

1. Verify that the output of the command includes the public IP address of **az104-
04-vm0**.

1. From the Cloud Shell pane, run the following to test external name resolution of
the **az104-04-vm1** DNS record set in the the newly created DNS zone (replace the
placeholder `[Name server 1]` with the name of **Name server 1** you noted earlier
in this task and the `[domain name]` placeholder with the name of the DNS domain
you created earlier in this task):

```powershell
nslookup az104-04-vm1.[domain name] [Name server 1]
```

1. Verify that the output of the command includes the public IP address of **az104-
04-vm1**.

#### Clean up resources

>**Note**: Remember to remove any newly created Azure resources that you no
longer use. Removing unused resources ensures you will not see unexpected charges.

1. In the Azure portal, open the **PowerShell** session within the **Cloud Shell**
pane.

1. List all resource groups created throughout the labs of this module by running
the following command:

```powershell
Get-AzResourceGroup -Name 'az104-04*'
```

1. Delete all resource groups you created throughout the labs of this module by
running the following command:

```powershell
Get-AzResourceGroup -Name 'az104-04*' | Remove-AzResourceGroup -Force -AsJob
```

>**Note**: The command executes asynchronously (as determined by the -AsJob


parameter), so while you will be able to run another PowerShell command immediately
afterwards within the same PowerShell session, it will take a few minutes before
the resource groups are actually removed.

#### Review

In this lab, you have:

+ Created and configured a virtual network


+ Deployed virtual machines into the virtual network
+ Configured private and public IP addresses of Azure VMs
+ Configured network security groups
+ Configured Azure DNS for internal name resolution
+ Configured Azure DNS for external name resolution

You might also like