Lab11 - Understanding FrontEnd and BackEnd Subnets - Azure
Lab11 - Understanding FrontEnd and BackEnd Subnets - Azure
Virtual networks
A virtual network is a virtual, isolated portion of the Azure public network. Each virtual
network is dedicated to your subscription. Things to consider when deciding whether to
create one virtual network, or multiple virtual networks in a subscription:
Do any organizational security requirements exist for isolating traffic into separate
virtual networks? You can choose to connect virtual networks or not. If you
connect virtual networks, you can implement a network virtual appliance, such as a
firewall, to control the flow of traffic between the virtual networks. For more
information, see security and connectivity.
Do any organizational requirements exist for isolating virtual networks into
separate subscriptions or regions?
A network interface enables a VM to communicate with other resources. Each
network interface has one or more private IP addresses assigned to it. How many
network interfaces and private IP addresses do you require in a virtual network?
There are limitsto the number of network interfaces and private IP addresses that
you can have within a virtual network.
Do you want to connect the virtual network to another virtual network or on-
premises network? You may choose to connect some virtual networks to each
other or on-premises networks, but not others. For more information,
see connectivity. Each virtual network that you connect to another virtual network,
or on-premises network, must have a unique address space. Each virtual network
has one or more public or private address ranges assigned to its address space. An
address range is specified in classless internet domain routing (CIDR) format, such
as 10.0.0.0/16. Learn more about address ranges for virtual networks.
Do you have any organizational administration requirements for resources in
different virtual networks? If so, you might separate resources into separate virtual
network to simplify permission assignment to individuals in your organization or to
assign different policies to different virtual networks.
Page 1 of 95
Cloud Computing - Azure
When you deploy some Azure service resources into a virtual network, they create
their own virtual network. To determine whether an Azure service creates its own
virtual network, see information for each Azure service that can be deployed into a
virtual network.
Subnets
A virtual network can be segmented into one or more subnets up to the limits. Things to
consider when deciding whether to create one subnet, or multiple virtual networks in a
subscription:
Each subnet must have a unique address range, specified in CIDR format, within
the address space of the virtual network. The address range cannot overlap with
other subnets in the virtual network.
If you plan to deploy some Azure service resources into a virtual network, they may
require, or create, their own subnet, so there must be enough unallocated space
for them to do so. To determine whether an Azure service creates its own subnet,
see information for each Azure service that can be deployed into a virtual network.
For example, if you connect a virtual network to an on-premises network using an
Azure VPN Gateway, the virtual network must have a dedicated subnet for the
gateway. Learn more about gateway subnets.
Azure routes network traffic between all subnets in a virtual network, by default.
You can override Azure's default routing to prevent Azure routing between
subnets, or to route traffic between subnets through a network virtual appliance,
for example. If you require that traffic between resources in the same virtual
network flow through a network virtual appliance (NVA), deploy the resources to
different subnets. Learn more in security.
You can limit access to Azure resources such as an Azure storage account or Azure
SQL database, to specific subnets with a virtual network service endpoint. Further,
you can deny access to the resources from the internet. You may create multiple
subnets, and enable a service endpoint for some subnets, but not others. Learn
more about service endpoints, and the Azure resources you can enable them for.
You can associate zero or one network security group to each subnet in a virtual
network. You can associate the same, or a different, network security group to each
subnet. Each network security group contains rules, which allow or deny traffic to
and from sources and destinations. Learn more about network security groups.
Page 2 of 95
Cloud Computing - Azure
Topology
Page 3 of 95
Cloud Computing - Azure
Page 4 of 95
Cloud Computing - Azure
Page 5 of 95
Cloud Computing - Azure
Page 6 of 95
Cloud Computing - Azure
Page 7 of 95
Cloud Computing - Azure
Click “Add”.
Page 8 of 95
Cloud Computing - Azure
Page 9 of 95
Cloud Computing - Azure
Click “Create”.
Page 10 of 95
Cloud Computing - Azure
Page 11 of 95
Cloud Computing - Azure
Page 12 of 95
Cloud Computing - Azure
In “Subnets”
Page 13 of 95
Cloud Computing - Azure
Page 14 of 95
Cloud Computing - Azure
Click “Ok”.
Page 15 of 95
Cloud Computing - Azure
In “Subnets”.
Page 16 of 95
Cloud Computing - Azure
Page 17 of 95
Cloud Computing - Azure
In “Virtual machines”,
Click “Add”.
Page 18 of 95
Cloud Computing - Azure
Page 19 of 95
Cloud Computing - Azure
In “Administrator Account”
Page 20 of 95
Cloud Computing - Azure
In “Save Money”.
Page 21 of 95
Cloud Computing - Azure
In “Disks”,
Page 22 of 95
Cloud Computing - Azure
In “Networking”
Ensure that “FrontEnd-Subnet” subnet is selected, because this subnet only will be accessible from
public network.
Page 23 of 95
Cloud Computing - Azure
In “Management”
Page 24 of 95
Cloud Computing - Azure
In “Guest config”.
Page 25 of 95
Cloud Computing - Azure
In “Tags”.
Page 26 of 95
Cloud Computing - Azure
Click “Create”.
Page 27 of 95
Cloud Computing - Azure
Page 28 of 95
Cloud Computing - Azure
Click “Add” to create new virtual machine in BackEnd-Subnet which is not publicly available.
Page 29 of 95
Cloud Computing - Azure
Page 30 of 95
Cloud Computing - Azure
Page 31 of 95
Cloud Computing - Azure
Page 32 of 95
Cloud Computing - Azure
In “Networking”,
In “Subnet” as “BackEnd-Subnet” because this subnet would not be accessible from public network.
Page 33 of 95
Cloud Computing - Azure
Page 34 of 95
Cloud Computing - Azure
In “Management”.
Page 35 of 95
Cloud Computing - Azure
In “Guest config”
Page 36 of 95
Cloud Computing - Azure
In “Tags”.
Page 37 of 95
Cloud Computing - Azure
Click “Create”.
Page 38 of 95
Cloud Computing - Azure
In “Networking”.
Page 39 of 95
Cloud Computing - Azure
Click “Add”.
Page 40 of 95
Cloud Computing - Azure
Name “FrontEnd-NSG”.
Page 41 of 95
Cloud Computing - Azure
Click “Create”.
Page 42 of 95
Cloud Computing - Azure
In “Network security groups” click “Refresh” to view the newly created “Network Security Group”
Page 43 of 95
Cloud Computing - Azure
You are able to see three rules created by default. In “Inbound security rules” all inbound rule
has been denied due to “DenyAllInbound” from outside.
Click “Add”.
Page 44 of 95
Cloud Computing - Azure
In “Source” as “Any”.
In “Destination” as “Any”.
In “Destination port ranges” as “3389” (To Allow RDP port to access the server through remotely).
“Action” as “Allow”.
Page 45 of 95
Cloud Computing - Azure
Click “Add”.
Page 46 of 95
Cloud Computing - Azure
In “FrontEnd-NSG”,
Click “Subnets”.
Page 47 of 95
Cloud Computing - Azure
In “FrontEnd-NSG – Subnets”.
Click “Associate”.
Page 48 of 95
Cloud Computing - Azure
Page 49 of 95
Cloud Computing - Azure
Click on “SANS-VNET” to select the Virtual network for the Network Security Group.
Page 50 of 95
Cloud Computing - Azure
You have required to click on “FrontEnd-Subnet”, because we have required to access the Virtual
machines through public from this subnet 10.0.1.0/24.
Page 51 of 95
Cloud Computing - Azure
Click ”Ok”.
Page 52 of 95
Cloud Computing - Azure
Page 53 of 95
Cloud Computing - Azure
Page 54 of 95
Cloud Computing - Azure
Click “Add”.
Page 55 of 95
Cloud Computing - Azure
Page 56 of 95
Cloud Computing - Azure
Click ”Create”.
Page 57 of 95
Cloud Computing - Azure
In “Network security groups” click “Refresh” to view newly created network security groups.
Click on “BackEnd-NSG”.
Page 58 of 95
Cloud Computing - Azure
In “BackEnd-NSG”.
Page 59 of 95
Cloud Computing - Azure
Click “Add”.
Page 60 of 95
Cloud Computing - Azure
Select the “Source” as “IP address” and type the Subnet / IP address (10.0.1.0/24) as Source IP address
where you are going to connect SSH.
Select “Destination” as “IP address” and type the Subnet / IP address (10.0.2.0/24) as Destination IP
address which you have required to access.
Protocol “TCP”.
Click “Allow”.
Name as “AllowSSH”.
Page 61 of 95
Cloud Computing - Azure
Page 62 of 95
Cloud Computing - Azure
You are able to see that inbound rule with priority “100” has been created for “BackEnd-Subnet”.
Page 63 of 95
Cloud Computing - Azure
Click “Subnets”.
Page 64 of 95
Cloud Computing - Azure
Page 65 of 95
Cloud Computing - Azure
While “Associate subnet” click on “Choose a virtual network” to select “Virtual Network”.
Page 66 of 95
Cloud Computing - Azure
Click on “SANS-VNET”.
Page 67 of 95
Cloud Computing - Azure
Page 68 of 95
Cloud Computing - Azure
Click “Ok”.
Page 69 of 95
Cloud Computing - Azure
In “BackEnd-NSG – Subnets”.
You are able to see that “BackEnd-Subnet” has been associated with “BackEnd-NSG” network security
group.
Page 70 of 95
Cloud Computing - Azure
Page 71 of 95
Cloud Computing - Azure
Click on ”WindowsVM-Azure”.
Page 72 of 95
Cloud Computing - Azure
Kindly note the public IP address of Windows Virtual machine which belongs to Front End network
(Publicly accessible).
Page 73 of 95
Cloud Computing - Azure
Type “mstsc” in your local machine, and type the Public IP address of the Windows Server 2008 R2.
Click “Connect”.
Page 74 of 95
Cloud Computing - Azure
Type username as “sansbound” and password which you have provided in Azure portal while create
Windows virtual machine.
Click “Ok”.
Page 75 of 95
Cloud Computing - Azure
Click “Yes”.
Page 76 of 95
Cloud Computing - Azure
You have successfully logged on to “Windows 2008 R2 Server”, in command prompt type “ipconfig” and
press “Enter”.
Page 77 of 95
Cloud Computing - Azure
Page 78 of 95
Cloud Computing - Azure
Page 79 of 95
Cloud Computing - Azure
In “UbuntuVM-Azure”.
Click on “Networking”.
Page 80 of 95
Cloud Computing - Azure
In “Networking” you are able to view the Private IP address of Ubuntu as 10.0.2.4
Page 81 of 95
Cloud Computing - Azure
Page 82 of 95
Cloud Computing - Azure
Page 83 of 95
Cloud Computing - Azure
You have required to set the configuration as “Off“ to Administrators and Users.
Click ”Ok”.
Page 84 of 95
Cloud Computing - Azure
You have required to download “Putty.exe” for access the Ubuntu through SSH.
Page 85 of 95
Cloud Computing - Azure
Click “Next”.
Page 86 of 95
Cloud Computing - Azure
Click “Install”.
Page 87 of 95
Cloud Computing - Azure
Click “Finish”.
Page 88 of 95
Cloud Computing - Azure
Page 89 of 95
Cloud Computing - Azure
Page 90 of 95
Cloud Computing - Azure
Click “Yes”.
Page 91 of 95
Cloud Computing - Azure
Page 92 of 95
Cloud Computing - Azure
Page 93 of 95
Cloud Computing - Azure
Page 94 of 95
Cloud Computing - Azure
Page 95 of 95