Lab6 - Understanding features of Virtual Network - Azure
Lab6 - Understanding features of Virtual Network - Azure
https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-
faq
Page 1 of 39
Cloud Computing - Azure
Subnets
Each subnet must have a unique address range, specified in CIDR format,
within the address space of the virtual network. The address range cannot
overlap with other subnets in the virtual network.
If you plan to deploy some Azure service resources into a virtual network, they
may require, or create, their own subnet, so there must be enough unallocated
space for them to do so. To determine whether an Azure service creates its
own subnet, see information for each Azure service that can be deployed into
a virtual network. For example, if you connect a virtual network to an on-
premises network using an Azure VPN Gateway, the virtual network must have
a dedicated subnet for the gateway. Learn more about gateway subnets.
Azure routes network traffic between all subnets in a virtual network, by
default. You can override Azure's default routing to prevent Azure routing
between subnets, or to route traffic between subnets through a network virtual
appliance, for example. If you require that traffic between resources in the
same virtual network flow through a network virtual appliance (NVA), deploy
the resources to different subnets. Learn more in security.
You can limit access to Azure resources such as an Azure storage account or
Azure SQL database, to specific subnets with a virtual network service
endpoint. Further, you can deny access to the resources from the internet. You
may create multiple subnets, and enable a service endpoint for some subnets,
but not others. Learn more about service endpoints, and the Azure resources
you can enable them for.
You can associate zero or one network security group to each subnet in a
virtual network. You can associate the same, or a different, network security
group to each subnet. Each network security group contains rules, which allow
or deny traffic to and from sources and destinations. Learn more
about network security groups.
Page 2 of 39
Cloud Computing - Azure
You can filter network traffic to and from Azure resources in an Azure
virtual network with a network security group. A network security
group contains security rules that allow or deny inbound network traffic
to, or outbound network traffic from, several types of Azure resources.
To learn about which Azure resources can be deployed into a virtual
network and have network security groups associated to them, see
Virtual network integration for Azure services. For each rule, you can
specify source and destination, port, and protocol.
This article explains network security group concepts, to help you use
them effectively. If you've never created a network security group, you
can complete a quick tutorial to get some experience creating one. If
you're familiar with network security groups and need to manage
them, see Manage a network security group. If you're having
communication problems and need to troubleshoot network security
groups, see Diagnose a virtual machine network traffic filter problem.
You can enable network security group flow logs to analyze network
traffic to and from resources that have an associated network security
group.
Security rules
Property
Explanation
Name
Page 3 of 39
Cloud Computing - Azure
Priority
Source or destination
Protocol
TCP, UDP, or Any, which includes TCP, UDP, and ICMP. You cannot
specify ICMP alone, so if you require ICMP, use Any.
Page 4 of 39
Cloud Computing - Azure
Direction
Port range
You can specify an individual or range of ports. For example, you could
specify 80 or 10000-10005. Specifying ranges enables you to create
fewer security rules. Augmented security rules can only be created in
network security groups created through the Resource Manager
deployment model. You cannot specify multiple ports or port ranges in
the same security rule in network security groups created through the
classic deployment model.
Action
Allow or deny
Page 5 of 39
Cloud Computing - Azure
Page 6 of 39
Cloud Computing - Azure
Associating NSGs
NSGs are used to define the rules of how traffic is filtered for
your IaaS deployments in Azure. NSGs by themselves are not
implemented until they are “associated”, with a resource in
Azure. NSGs can be associated to ARM network interfaces (NIC),
which are associated to the VMs, or subnets.
For NICs associated to VMs, the rules are applied to all traffic
to/from that Network Interface where it is associated. It is
possible to have a multi-NIC VM, and you can associate the
same or different NSG to each Network Interface. When NSGs
are applied to subnets, rules are applied to traffic to/from all
resources connect to that subnet.
Page 7 of 39
Cloud Computing - Azure
Inbound Traffic:
1. NSG applied to subnet: If a subnet NSG has a matching rule
to deny traffic, the packet is dropped.
2. NSG applied to NIC: If VM\NIC NSG has a matching rule that
denies traffic, packets are dropped at the VM\NIC, even if a
subnet NSG has a matching rule that allows traffic.
Outbound Traffic:
1. NSG applied to NIC: If a VM\NIC NSG has a matching rule that
denies traffic, packets are dropped.
2. NSG applied to subnet: If a subnet NSG has a matching rule
that denies traffic, packets are dropped, even if a VM\NIC
NSG has a matching rule that allows traffic.
Page 8 of 39
Cloud Computing - Azure
Regions:
Page 9 of 39
Cloud Computing - Azure
Resource Group:
Since the introduction of the Azure preview portal in 2014, resource groups are automatically
created for virtual machines, databases, and other assets, no matter how they are added to the
cloud fabric. Resource groups provide a way to monitor, control access, provision and manage
billing for collections of assets that are required to run an application, or used by a client or
company department. Azure Resource Manager (ARM) is the technology that works behind the
scenes so that you can administer assets using these logical containers.
Resource groups can only be managed using the preview portal or PowerShell, and as you
might expect, there are no plans to add support to the old management portal. If you haven’t yet
discovered the preview portal, click the user icon in the far top-right corner of the old portal, and
select Switch to new portal from the menu. You can log in directly to the new portal.
Page 10 of 39
Cloud Computing - Azure
Topology
Page 11 of 39
Cloud Computing - Azure
Page 12 of 39
Cloud Computing - Azure
Page 13 of 39
Cloud Computing - Azure
Page 14 of 39
Cloud Computing - Azure
While creating virtual network, it has required the virtual network name specify it as “SANS-VNET” and
specify the address space as 10.0.0.0/16, select “Subscription” as “Free Trial”.
Page 15 of 39
Cloud Computing - Azure
Page 16 of 39
Cloud Computing - Azure
In “Subnet”,
Page 17 of 39
Cloud Computing - Azure
Click “Create”.
Page 18 of 39
Cloud Computing - Azure
Page 19 of 39
Cloud Computing - Azure
In “SANS-VNET”, you are able to see the address space details 10.0.0.0/16 and “Region”
Page 20 of 39
Cloud Computing - Azure
As of now, we have only one “Subnet” named “Sans-Subnet” and it’s range is 10.0.1.0/24.
Page 21 of 39
Cloud Computing - Azure
Now we have required to launch the virtual machine with Windows Server 2008 R2 Sp1.
Page 22 of 39
Cloud Computing - Azure
Page 23 of 39
Cloud Computing - Azure
In “Save Money”
Page 24 of 39
Cloud Computing - Azure
Page 25 of 39
Cloud Computing - Azure
In “Networking”
Page 26 of 39
Cloud Computing - Azure
Page 27 of 39
Cloud Computing - Azure
Page 28 of 39
Cloud Computing - Azure
Page 29 of 39
Cloud Computing - Azure
Page 30 of 39
Cloud Computing - Azure
Page 31 of 39
Cloud Computing - Azure
Page 32 of 39
Cloud Computing - Azure
Page 33 of 39
Cloud Computing - Azure
Click “Create”.
Page 34 of 39
Cloud Computing - Azure
Page 35 of 39
Cloud Computing - Azure
Once Virtual machine deployed successfully go the Virtual machine which you have created.
Page 36 of 39
Cloud Computing - Azure
Type the public IP address of Windows Server in mstsc console and click “Connect”.
Page 37 of 39
Cloud Computing - Azure
Click “Yes”.
In Windows Server, in command prompt type “ipconfig /all” and press “Enter”.
Page 38 of 39
Cloud Computing - Azure
Page 39 of 39