0% found this document useful (0 votes)
263 views14 pages

Azure Networking

This document provides an overview of Azure networking capabilities including: 1) Connectivity between Azure resources via virtual networks 2) Internet connectivity for Azure resources 3) On-premises connectivity options like VPN and ExpressRoute 4) Load balancing and traffic management using DNS, application, and network load balancing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
263 views14 pages

Azure Networking

This document provides an overview of Azure networking capabilities including: 1) Connectivity between Azure resources via virtual networks 2) Internet connectivity for Azure resources 3) On-premises connectivity options like VPN and ExpressRoute 4) Load balancing and traffic management using DNS, application, and network load balancing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Azure networking

Table of Contents
Connectivity between Azure resources...................................................................11
Internet connectivity...............................................................................................12
On-premises connectivity........................................................................................13
Load balancing and traffic direction........................................................................15
4.1. DNS load balancing........................................................................................15
 Geographic..................................................................................................15
 Performance...............................................................................................15
 Priority........................................................................................................15
 Weighted round-robin................................................................................15
4.2. Application load balancing............................................................................16
4.3. Network load balancing................................................................................17
Security....................................................................................................................19
Routing....................................................................................................................19
Manageability..........................................................................................................20
Deployment and configuration tools......................................................................21
9. Pricing..................................................................................................................22
10/4/2022

Introduction

Azure provides a variety of networking capabilities that can be used together or


separately. Click any of the following key capabilities to learn more about them:

1. Connectivity between Azure resources: Connect Azure resources together in a


secure, private virtual network in the cloud.
2. Internet connectivity: Communicate to and from Azure resources over the Internet.
3. On-premises connectivity: Connect an on-premises network to Azure resources
through a virtual private network (VPN) over the Internet, or through a dedicated
connection to Azure.
4. Load balancing and traffic direction: Load balance traffic to servers in the same
location and direct traffic to servers in different locations.
5. Security: Filter network traffic between network subnets or individual virtual
machines (VM).
6. Routing: Use default routing or fully control routing between your Azure and on-
premises resources.
7. Manageability: Monitor and manage your Azure networking resources.
8. Deployment and configuration tools: Use a web-based portal or cross-platform
command-line tools to deploy and configure network resources.

10
10/4/2022

Connectivity between Azure resources


Azure resources such as Virtual Machines, Cloud Services, Virtual Machines Scale Sets,
and Azure App Service Environments can communicate privately with each other
through an Azure Virtual Network (VNet). A VNet is a logical isolation of the Azure cloud
dedicated to your subscription. You can implement multiple VNets within each Azure
subscription and Azure region. Each VNet is isolated from other VNets. For each VNet
you can:

 Specify a custom private IP address space using public and private (RFC 1918)
addresses. Azure assigns resources connected to the VNet a private IP address
from the address space you assign.
 Segment the VNet into one or more subnets and allocate a portion of the VNet
address space to each subnet.
 Use Azure-provided name resolution or specify your own DNS server for use by
resources connected to a VNet.

To learn more about the Azure Virtual Network service, read the Virtual network
overview article. You can connect VNets to each other, enabling resources connected to
either VNet to communicate with each other across VNets. You can use either or both of
the following options to connect VNets to each other:

 Peering: Enables resources connected to different Azure VNets within the same


Azure region to communicate with each other. The bandwidth and latency across
the VNets is the same as if the resources were connected to the same VNet. To
learn more about peering, read the Virtual network peering overview article.
 VPN Gateway: Enables resources connected to different Azure VNets within
different Azure regions to communicate with each other. Traffic between VNets
flows through an Azure VPN Gateway. Bandwidth between VNets is limited to the
bandwidth of the gateway. To learn more about connecting VNets with a VPN
Gateway, read the Configure a VNet-to-VNet connection across regions article.

11
10/4/2022

Internet connectivity
All Azure resources connected to a VNet have outbound connectivity to the Internet by
default. The private IP address of the resource is source network address translated
(SNAT) to a public IP address by the Azure infrastructure. To learn more about outbound
Internet connectivity, read the Understanding outbound connections in Azure article.

To communicate inbound to Azure resources from the Internet, or to communicate


outbound to the Internet without SNAT, a resource must be assigned a public IP
address. To learn more about public IP addresses, read the Public IP addresses article.

12
10/4/2022

On-premises connectivity
You can access resources in your VNet securely over either a VPN connection, or a direct
private connection. To send network traffic between your Azure virtual network and
your on-premises network, you must create a virtual network gateway. You configure
settings for the gateway to create the type of connection that you want, either VPN or
ExpressRoute.

You can connect your on-premises network to a VNet using any combination of the
following options:

3.1. Point-to-site (VPN over SSTP)

The following picture shows separate point to site connections between multiple
computers and a VNet:

This connection is established between a single computer and a VNet. This connection
type is great if you're just getting started with Azure, or for developers, because it
requires little or no changes to your existing network. It's also convenient when you are
connecting from a remote location such as a conference or home. Point-to-site
connections are often coupled with a site-to-site connection through the same virtual
network gateway. The connection uses the SSTP protocol to provide encrypted

13
10/4/2022

communication over the Internet between the computer and the VNet. The latency for a
point-to-site VPN is unpredictable, since the traffic traverses the Internet.

3.2. Site-to-site (IPsec/IKE VPN tunnel)

This connection is established between your on-premises VPN device and an Azure VPN
Gateway. This connection type enables any on-premises resource that you authorize to
access the VNet. The connection is an IPSec/IKE VPN that provides encrypted
communication over the Internet between your on-premises device and the Azure VPN
gateway. You can connect multiple on-premises sites to the same VPN gateway. The on-
premises VPN device at each site must have an externally-facing public IP address that is
not behind a NAT. The latency for a site-to-site connection is unpredictable, since the
traffic traverses the Internet.

3.3. ExpressRoute (dedicated private connection)

14
10/4/2022

This type of connection is established between your network and Azure, through an
ExpressRoute partner. This connection is private. Traffic does not traverse the Internet.
The latency for an ExpressRoute connection is predictable, since traffic doesn't traverse
the Internet. ExpressRoute can be combined with a site-to-site connection.

To learn more about all the previous connection options, read the Connection topology
diagrams article.

Load balancing and traffic direction


Microsoft Azure provides multiple services for managing how network traffic is
distributed and load balanced. You can use any of the following capabilities separately
or together:

4.1. DNS load balancing

The Azure Traffic Manager service provides global DNS load balancing. Traffic Manager
responds to clients with the IP address of a healthy endpoint, based on one of the
following routing methods:1

 Geographic: Clients are directed to specific endpoints (Azure, external or nested)


based on which geographic location their DNS query originates from. This method
enables scenarios where knowing a client's geographic region, and routing them
based on it, is important. Examples include complying with data sovereignty
mandates, localization of content & user experience, and measuring traffic from
different regions.
 Performance: The IP address returned to the client is the "closest" to the client. The
'closest' endpoint is not necessarily closest as measured by geographic distance.
Instead, this method determines the closest endpoint by measuring network
latency. Traffic Manager maintains an Internet latency table to track the round-trip
time between IP address ranges and each Azure datacenter.
 Priority: Traffic is directed to the primary (highest-priority) endpoint. If the primary
endpoint is not available, Traffic Manager routes the traffic to the second endpoint.
If both the primary and secondary endpoints are not available, the traffic goes to
the third, and so on. Availability of the endpoint is based on the configured status
(enabled or disabled) and the ongoing endpoint monitoring.
 Weighted round-robin: For each request, Traffic Manager randomly chooses an
available endpoint. The probability of choosing an endpoint is based on the

15
10/4/2022

weights assigned to all available endpoints. Using the same weight across all
endpoints results in an even traffic distribution. Using higher or lower weights on
specific endpoints causes those endpoints to be returned more or less frequently
in the DNS responses.

The following picture shows a request for a web application directed to a Web App
endpoint. Endpoints can also be other Azure services such as VMs and Cloud Services.

The client connects directly to that endpoint. Azure Traffic Manager detects when an
endpoint is unhealthy and then redirects clients to a different, healthy endpoint. To learn
more about Traffic Manager, read the Azure Traffic Manager overview article.

4.2. Application load balancing

The Azure Application Gateway service provides application delivery controller (ADC) as
a service. Application Gateway offers various Layer 7 (HTTP/HTTPS) load-balancing
capabilities for your applications, including a web application firewall to protect your
web applications from vulnerabilities and exploits. Application Gateway also allows you

16
10/4/2022

to optimize web farm productivity by offloading CPU-intensive SSL termination to the


application gateway.

Other Layer 7 routing capabilities include round-robin distribution of incoming traffic,


cookie-based session affinity, URL path-based routing, and the ability to host multiple
websites behind a single application gateway. Application Gateway can be configured as
an Internet-facing gateway, an internal-only gateway, or a combination of both.
Application Gateway is fully Azure managed, scalable, and highly available. It provides a
rich set of diagnostics and logging capabilities for better manageability. To learn more
about Application Gateway, read the Application Gateway overview article.

The following picture shows URL path-based routing with Application Gateway:

4.3. Network load balancing

The Azure Load Balancer provides high-performance, low-latency Layer 4 load-


balancing for all UDP and TCP protocols. It manages inbound and outbound

17
10/4/2022

connections. You can configure public and internal load-balanced endpoints. You can
define rules to map inbound connections to back-end pool destinations by using TCP
and HTTP health-probing options to manage service availability. To learn more about
Load Balancer, read the Load Balancer overview article.

The following picture shows an Internet-facing multi-tier application that utilizes both
external and internal load balancers:

18
10/4/2022

Security
You can filter traffic to and from Azure resources using the following options:

 Network: You can implement Azure network security groups (NSGs) to filter


inbound and outbound traffic to Azure resources. Each NSG contains one or more
inbound and outbound rules. Each rule specifies the source IP addresses,
destination IP addresses, port, and protocol that traffic is filtered with. NSGs can be
applied to individual subnets and individual VMs. To learn more about NSGs, read
the Network security groups overview article.
 Application: By using an Application Gateway with web application firewall you
can protect your web applications from vulnerabilities and exploits. Common
examples are SQL injection attacks, cross site scripting, and malformed headers.
Application gateway filters out this traffic and stops it from reaching your web
servers. You are able to configure what rules you want enabled. The ability to
configure SSL negotiation policies is provided to allow certain policies to be
disabled. To learn more about the web application firewall, read the Web
application firewall article.

If you need network capability Azure doesn't provide, or want to use network
applications you use on-premises, you can implement the products in VMs and connect
them to your VNet. The Azure Marketplace contains several different VMs pre-
configured with network applications you may currently use. These pre-configured VMs
are typically referred to as network virtual appliances (NVA). NVAs are available with
applications such as firewall and WAN optimization.

Routing
Azure creates default route tables that enable resources connected to any subnet in any
VNet to communicate with each other. You can implement either or both of the
following types of routes to override the default routes Azure creates:

 User-defined: You can create custom route tables with routes that control where
traffic is routed to for each subnet. To learn more about user-defined routes, read
the User-defined routes article.
 Border gateway protocol (BGP): If you connect your VNet to your on-premises
network using an Azure VPN Gateway or ExpressRoute connection, you can
propagate BGP routes to your VNets. BGP is the standard routing protocol

19
10/4/2022

commonly used in the Internet to exchange routing and reachability information


between two or more networks. When used in the context of Azure Virtual
Networks, BGP enables the Azure VPN Gateways and your on-premises VPN
devices, called BGP peers or neighbors, to exchange "routes" that inform both
gateways on the availability and reachability for those prefixes to go through the
gateways or routers involved. BGP can also enable transit routing among multiple
networks by propagating routes a BGP gateway learns from one BGP peer to all
other BGP peers. To learn more about BGP, see the BGP with Azure VPN Gateways
overview article.

Manageability
Azure provides the following tools to monitor and manage networking:

 Activity logs: All Azure resources have activity logs which provide information
about operations taken place, status of operations and who initiated the operation.
To learn more about activity logs, read the Activity logs overview article.
 Diagnostic logs: Periodic and spontaneous events are created by network
resources and logged in Azure storage accounts, sent to an Azure Event Hub, or
sent to Azure Log Analytics. Diagnostic logs provide insight to the health of a
resource. Diagnostic logs are provided for Load Balancer (Internet-facing), Network
Security Groups, routes, and Application Gateway. To learn more about diagnostic
logs, read the Diagnostic logs overview article.
 Metrics: Metrics are performance measurements and counters collected over a
period of time on resources. Metrics can be used to trigger alerts based on
thresholds. Currently metrics are available on Application Gateway. To learn more
about metrics, read the Metrics overview article.
 Troubleshooting: Troubleshooting information is accessible directly in the Azure
portal. The information helps diagnose common problems with ExpressRoute, VPN
Gateway, Application Gateway, Network Security Logs, Routes, DNS, Load Balancer,
and Traffic Manager.
 Role-based access control (RBAC): Control who can create and manage
networking resources with role-based access control (RBAC). Learn more about
RBAC by reading the Get started with RBAC article.
 Packet capture: The Azure Network Watcher service provides the ability to run a
packet capture on a VM through an extension within the VM. This capability is
available for Linux and Windows VMs. To learn more about packet capture, read
the Packet capture overview article.
 Verify IP flows: Network Watcher allows you to verify IP flows between an Azure
VM and a remote resource to determine whether packets are allowed or denied.

20
10/4/2022

This capability provides administrators the ability to quickly diagnose connectivity


issues. To learn more about how to verify IP flows, read the IP flow verify
overview article.
 Troubleshoot VPN connectivity: The VPN troubleshooter capability of Network
Watcher provides the ability to query a connection or gateway and verify the
health of the resources. To learn more about troubleshooting VPN connections,
read the VPN connectivity troubleshooting overview article.
 View network topology: View a graphical representation of the network
resources in a VNet with Network Watcher. To learn more about viewing network
topology, read the Topology overview article.

Deployment and configuration tools


You can deploy and configure Azure networking resources with any of the following
tools:

 Azure portal: A graphical user interface that runs in a browser. Open the Azure
portal.
 Azure PowerShell: Command-line tools for managing Azure from Windows
computers. Learn more about Azure PowerShell by reading the Azure PowerShell
overview article.
 Azure command-line interface (CLI): Command-line tools for managing Azure
from Linux, macOS, or Windows computers. Learn more about the Azure CLI by
reading the Azure CLI overview article.
 Azure Resource Manager templates: A file (in JSON format) that defines the
infrastructure and configuration of an Azure solution. By using a template, you can
repeatedly deploy your solution throughout its lifecycle and have confidence your
resources are deployed in a consistent state. To learn more about authoring
templates, read the Best practices for creating templates article. Templates can be
deployed with the Azure portal, CLI, or PowerShell. To get started with templates
right away, deploy one of the many pre-configured templates in the Azure
Quickstart Templates library.

21
10/4/2022

9. Pricing
Some of the Azure networking services have a charge, while others are free. View
the Virtual network, VPN Gateway, Application Gateway, Load Balancer, Network
Watcher, DNS, Traffic Manager and ExpressRoute pricing pages for more information.

22

You might also like