0% found this document useful (0 votes)
10 views6 pages

Azure Networking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views6 pages

Azure Networking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 6

**AZURE NETWORKING (Central Topic)**

└── **1. CORE NETWORKING FOUNDATION**


├── **Virtual Network (VNet)**
│ ├── Purpose: Private network in Azure, isolation, segmentation
│ ├── Address Space: Private IP ranges (RFC 1918), CIDR notation
│ ├── Regions: Bound to a single region (can connect across regions)
│ ├── DNS Settings:
│ │ ├── Azure-provided DNS (default)
│ │ ├── Custom DNS Servers (on-prem, Azure VM, Azure Private DNS Resolver)
│ ├── Service Endpoints: Secure Azure PaaS access over VNet (e.g., Storage,
SQL)
│ ├── Private Endpoints: Network interface using private IP from VNet for
PaaS/Customer/Partner services (via Private Link)
│ └── Peering:
│ ├── Regional VNet Peering: Connect VNets in the same region
│ └── Global VNet Peering: Connect VNets in different regions
│ └── Considerations: Non-transitive, latency, cost
├── **Subnets**
│ ├── Purpose: Segment VNet into smaller networks
│ ├── Address Range: Subset of VNet's address space
│ ├── Network Security Group (NSG) Association: Apply NSG rules
│ ├── Route Table Association: Customize routing
│ ├── Service Endpoint Policies: Granular control over service endpoints
│ └── Delegation: Allow specific Azure services to inject into subnet (e.g.,
Azure NetApp Files, App Service Environment)
└── **IP Addressing**
├── **Private IP Addresses**
│ ├── Allocation: Dynamic (default), Static
│ ├── Scope: Within a VNet
│ └── Use Cases: VM NICs, Internal Load Balancers, Application Gateway
Frontend (internal)
├── **Public IP Addresses**
│ ├── Allocation: Dynamic, Static
│ ├── SKUs:
│ │ ├── Basic: Limited features, no AZ-redundancy
│ │ └── Standard: Zone-redundant/zonal, secure by default (closed to
inbound unless allowed by NSG)
│ ├── Association: VM NICs, Public Load Balancers, App Gateway, VPN
Gateway, Firewall, Bastion
│ ├── DDoS Protection: Basic (default), Standard (enhanced)
│ ├── Routing Preference: Microsoft Global Network, Internet (ISP
Network)
│ └── IPv6 Support
└── **Public IP Prefix**
└── Purpose: Reserve a contiguous range of public IP addresses

└── **2. CONNECTIVITY**


├── **Hybrid Connectivity (On-Premises to Azure)**
│ ├── **VPN Gateway**
│ │ ├── Type: Site-to-Site (S2S), Point-to-Site (P2S), VNet-to-VNet (within
Azure, alternative to peering)
│ │ ├── Protocol: IKEv1, IKEv2
│ │ ├── Tunnel Type: Policy-based, Route-based (recommended)
│ │ ├── SKUs: Basic, VpnGw1-5, VpnGw1AZ-5AZ (throughput, connections)
│ │ ├── High Availability: Active-Standby, Active-Active
│ │ └── BGP Support: For dynamic routing
│ ├── **ExpressRoute**
│ │ ├── Purpose: Private, dedicated, high-throughput connection
│ │ ├── Connection Models: CloudExchange Co-location, Point-to-Point
Ethernet, Any-to-Any (IPVPN)
│ │ ├── Peering Types:
│ │ │ ├── Azure Private Peering: Extend on-prem networks to Azure VNets
│ │ │ └── Microsoft Peering: Access Microsoft Online Services (M365,
Dynamics 365, Public PaaS)
│ │ ├── Circuits & SKUs: Local, Standard, Premium (global reach)
│ │ ├── Bandwidth Options: 50 Mbps to 100 Gbps
│ │ ├── ExpressRoute Direct: Connect directly to Microsoft's global network
at peering locations (10 Gbps, 100 Gbps)
│ │ └── ExpressRoute Global Reach: Link ExpressRoute circuits together
(e.g., connect two on-prem sites via Microsoft backbone)
│ │ └── ExpressRoute FastPath: Improves data path performance between on-
prem and VNet
│ └── **Azure Virtual WAN (vWAN)**
│ ├── Purpose: Managed hub-and-spoke architecture, simplified global
transit
│ ├── Components:
│ │ ├── Virtual Hubs: Microsoft-managed VNets in regions
│ │ ├── Hub-to-Hub Connectivity
│ │ ├── Site-to-Site VPN Gateways
│ │ ├── Point-to-Site VPN Gateways
│ │ ├── ExpressRoute Gateways
│ │ └── Azure Firewall Integration (Secured Virtual Hub)
│ ├── SKUs: Basic (S2S VPN only), Standard (ExpressRoute, P2S, Firewall)
│ └── Use Cases: Large-scale branch connectivity, inter-region transit
├── **Internet Connectivity**
│ ├── Public IP Addresses (as above)
│ ├── **NAT Gateway**
│ │ ├── Purpose: Scalable, resilient outbound-only internet connectivity
for VNets
│ │ ├── No inbound connections directly
│ │ ├── Simplifies SNAT (Source Network Address Translation)
│ │ └── Associated with Subnets
├── **Inter-VNet Connectivity**
│ ├── VNet Peering (as above)
│ └── **Azure Private Link**
│ ├── Purpose: Securely access Azure PaaS (Storage, SQL DB, Cosmos DB,
etc.) and customer/partner services
│ ├── Components:
│ │ ├── Private Endpoint: NIC in your VNet with a private IP for the
service
│ │ └── Private Link Service: Expose your own service running behind a
Standard Load Balancer
│ └── Benefits: Network isolation, no public internet exposure, avoids IP
conflicts

└── **3. APPLICATION DELIVERY & LOAD BALANCING**


├── **Azure Load Balancer**
│ ├── Layer: 4 (TCP/UDP)
│ ├── Scope: Regional
│ ├── Types: Public, Internal
│ ├── SKUs: Basic, Standard (AZ-aware, more features)
│ ├── Features: Health probes, Port forwarding, Outbound rules, HA Ports
│ └── Use Cases: Distribute traffic to VMs, scale sets
├── **Azure Application Gateway**
│ ├── Layer: 7 (HTTP/HTTPS)
│ ├── Scope: Regional
│ ├── Features:
│ │ ├── SSL/TLS Termination
│ │ ├── Web Application Firewall (WAF) Integration (OWASP rules, custom
rules)
│ │ ├── URL-based Routing
│ │ ├── Path-based Routing
│ │ ├── Multiple Site Hosting
│ │ ├── Session Affinity (Cookie-based)
│ │ ├── Connection Draining
│ │ ├── Autoscaling
│ │ ├── Rewrite HTTP headers and URL
│ │ └── End-to-End TLS Encryption
│ ├── SKUs: Standard v1, WAF v1, Standard v2, WAF v2 (v2 recommended for
autoscaling, AZ, performance)
│ └── Use Cases: HTTP/S load balancing for web apps, APIs
├── **Azure Front Door**
│ ├── Layer: 7 (HTTP/HTTPS)
│ ├── Scope: Global (anycast-based)
│ ├── Features:
│ │ ├── Global load balancing with fast failover
│ │ ├── SSL/TLS Termination (bring your own cert or Azure-managed)
│ │ ├── Web Application Firewall (WAF) Integration (centralized)
│ │ ├── URL-based Routing, Path-based Routing
│ │ ├── Session Affinity
│ │ ├── Caching
│ │ ├── URL Rewrite/Redirect
│ │ ├── Custom Domains & HTTPS
│ │ └── End-to-End TLS
│ ├── SKUs: Standard, Premium (adds Security, Private Link to origins)
│ └── Use Cases: Global web application delivery, acceleration, HA, security
├── **Azure Traffic Manager**
│ ├── Layer: DNS-based load balancing
│ ├── Scope: Global
│ ├── Routing Methods:
│ │ ├── Priority: Failover
│ │ ├── Weighted: Distribute traffic by weight
│ │ ├── Performance: Route to lowest latency endpoint
│ │ ├── Geographic: Route based on user's geographic location
│ │ ├── Multivalue: Return multiple IP addresses
│ │ └── Subnet: Route based on user's source IP subnet
│ ├── Features: Endpoint monitoring, Nested profiles
│ └── Use Cases: Direct traffic to optimal endpoints (Azure or external)
based on DNS
└── **Cross-region Load Balancer**
├── Layer: 4 (TCP/UDP)
├── Scope: Global
├── Purpose: Global distribution for L4 traffic with low latency and high
availability
├── Requirements: Standard Public IP, backend pools can be regional LBs or
public IPs
└── Use Cases: Globally distributed L4 applications

└── **4. NETWORK SECURITY**


├── **Network Security Groups (NSGs)**
│ ├── Function: Stateful packet filtering (allow/deny)
│ ├── Rules: Inbound/Outbound, Priority, Source/Destination IP/CIDR, Port,
Protocol (TCP, UDP, ICMP, Any)
│ ├── Association: NICs, Subnets
│ ├── Default Rules: Allow VNet internal, Allow Azure LB, Deny All Inbound
(from internet), Allow All Outbound
│ └── Application Security Groups (ASGs): Group VMs by application workload
for NSG rules
├── **Azure Firewall**
│ ├── Type: Managed, cloud-native, stateful firewall service
│ ├── Features:
│ │ ├── Application Rules (FQDN filtering)
│ │ ├── Network Rules (Source/Dest IP, Port, Protocol)
│ │ ├── NAT Rules (DNAT for inbound, SNAT for outbound)
│ │ ├── Threat Intelligence-based filtering
│ │ ├── Centralized management (via Azure Firewall Manager)
│ │ ├── Forced Tunneling
│ │ └── Availability Zones support
│ ├── SKUs:
│ │ ├── Standard: L3-L7 filtering, Threat Intel
│ │ └── Premium: Adds TLS Inspection, IDPS, URL filtering, Web categories
│ └── Deployment: In VNet (often dedicated "AzureFirewallSubnet") or Secured
Virtual Hub (vWAN)
├── **Azure Web Application Firewall (WAF)**
│ ├── Protection: Against common web exploits (OWASP Top 10, SQLi, XSS)
│ ├── Integration:
│ │ ├── Application Gateway
│ │ ├── Azure Front Door
│ │ ├── Azure CDN (Microsoft Standard SKU)
│ ├── Modes: Detection, Prevention
│ ├── Rules: Managed rule sets, Custom rules, Rate limiting, Geo-filtering,
Bot protection
├── **Azure DDoS Protection**
│ ├── Basic: Free, integrated with Azure platform (protects Azure
infrastructure)
│ ├── Standard:
│ │ ├── Enhanced mitigation for VNet resources (via Public IP)
│ │ ├── Adaptive tuning, Attack analytics, Metrics, Alerting
│ │ ├── Cost protection, SLA
│ │ └── Protects against volumetric, protocol, and application layer
attacks
├── **Azure Bastion**
│ ├── Purpose: Secure RDP/SSH access to VMs in a VNet without exposing Public
IPs on VMs
│ ├── Deployment: Deployed into a VNet (dedicated "AzureBastionSubnet")
│ ├── Access: Via Azure Portal over HTTPS/TLS
│ └── SKUs: Basic, Standard (more features like native client support)
├── **Network Virtual Appliances (NVAs)**
│ ├── Source: Azure Marketplace (Palo Alto, Cisco, Fortinet, etc.) or custom-
built
│ ├── Function: Firewall, WAN optimizer, custom routing, IDS/IPS
│ ├── Deployment: Typically in a Hub VNet, traffic routed via User Defined
Routes (UDRs)
└── **User Defined Routes (UDRs) / Route Tables**
├── Purpose: Override Azure's default system routes
├── Association: Subnets
├── Next Hop Types: Virtual Appliance, Virtual Network Gateway, Internet,
VNet Peering, None
└── Use Cases: Force tunneling, routing traffic through an NVA

└── **5. DNS & NAME RESOLUTION**


├── **Azure DNS (Public)**
│ ├── Purpose: Hosting public DNS domains
│ ├── Record Types: A, AAAA, CNAME, MX, NS, PTR, SOA, SRV, TXT
│ ├── Alias Records: Point to Azure resources (Public IP, Traffic Manager,
Front Door, etc.)
│ └── Anycast network for global availability and performance
├── **Azure Private DNS**
│ ├── Purpose: DNS resolution within and between VNets without custom DNS
server
│ ├── Zones: Private zones linked to VNets
│ ├── Automatic Registration: VMs in linked VNets can auto-register DNS
records
│ ├── Split-Horizon DNS: Same DNS zone name for public and private (different
records)
│ └── Conditional Forwarding: To on-prem DNS or other DNS servers
├── **Azure Private DNS Resolver**
│ ├── Purpose: Enables querying Azure Private DNS zones from on-premises and
vice-versa without deploying VM-based DNS servers.
│ ├── Components: Inbound Endpoints, Outbound Endpoints, DNS Forwarding
Rulesets
├── **VNet DNS Resolution Options**
├── Azure-provided DNS (default)
├── Custom DNS Servers (VMs in Azure, on-prem, Azure Private DNS Resolver)
└── Private DNS Zones linked to VNet

└── **6. MONITORING & DIAGNOSTICS**


├── **Azure Monitor**
│ ├── Metrics: Platform metrics for network resources
│ ├── Logs:
│ │ ├── Activity Logs: Control plane actions
│ │ └── Diagnostic Logs: Data plane (e.g., NSG Flow Logs, Firewall Logs) -
send to Log Analytics, Storage, Event Hubs
│ ├── Alerts: Based on metrics or log queries
│ └── Insights: (e.g., Network Insights for topology, health)
├── **Network Watcher**
│ ├── Tools:
│ │ ├── Topology: Visualize network resources and relationships
│ │ ├── IP Flow Verify: Test if traffic is allowed/denied by NSGs
│ │ ├── Next Hop: Determine next hop for traffic from a VM
│ │ ├── Connection Troubleshoot: Test connectivity between source and
destination
│ │ ├── Packet Capture: Capture traffic to/from a VM
│ │ ├── VPN Troubleshoot: Diagnose VPN Gateway issues
│ │ ├── Connection Monitor: End-to-end connection monitoring (latency,
reachability)
│ │ └── NSG Flow Logs:
│ │ ├── Records IP traffic flowing through an NSG
│ │ ├── Storage: Stored in Azure Storage Account
│ │ ├── Analysis: With Traffic Analytics (via Log Analytics) or
external tools
│ │ └── Versions: v1, v2
├── **Azure Service Health**
│ ├── Purpose: Information about Azure service incidents, planned
maintenance, health advisories
└── **Traffic Analytics**
├── Source: NSG Flow Logs
├── Platform: Log Analytics
├── Insights: Traffic flows, malicious IPs, open ports, top talkers,
network topology

└── **7. GLOBAL & EDGE NETWORKING**


├── **Azure Front Door** (as above - key global service)
├── **Azure CDN (Content Delivery Network)**
│ ├── Purpose: Cache static content closer to users globally
│ ├── Providers: Microsoft Standard, Akamai Standard, Verizon
Standard/Premium
│ ├── Features: Caching rules, Compression, Geo-filtering, Custom domains,
HTTPS
│ └── Integration with Storage, Web Apps, etc.
├── **Azure Traffic Manager** (as above - DNS-based global routing)
├── **ExpressRoute Global Reach** (as above - interconnect ER circuits)
├── **Cross-Region Load Balancer** (as above - global L4 LB)
└── **Azure Orbital (Ground Station as a Service)**
└── Niche: Communicate with and control satellites

└── **8. SPECIALIZED & EMERGING NETWORKING**


├── **Azure Route Server**
│ ├── Purpose: Simplify dynamic routing between NVAs and VNets (BGP peering
with NVAs)
│ └── No data path processing itself, just control plane
├── **Azure Container Networking**
│ ├── Azure CNI (Container Network Interface) for AKS
│ │ ├── Pods get IP addresses from VNet subnet
│ │ └── Advanced control, direct VNet integration
│ ├── Kubenet (for AKS)
│ │ ├── Simpler, uses NAT for pod communication to VNet
│ └── Service Meshes (e.g., Istio, Linkerd - often deployed on AKS)
├── **Azure VMware Solution (AVS) Networking**
│ ├── Integration with Azure VNets
│ ├── NSX-T Data Center for software-defined networking within AVS private
cloud
│ └── ExpressRoute connectivity to on-prem and Azure
├── **Azure Virtual Desktop (AVD) Networking**
├── Session Host VNet integration
├── RDP Shortpath (Managed Networks / Public Networks)
├── Private Link for AVD service objects
Use code with caution.
Key Considerations / Cross-Cutting Concepts:
Hub-and-Spoke Topology: Common design pattern for managing connectivity and
services centrally.
Security Best Practices: Defense in depth, least privilege, NSGs, Azure Firewall,
WAF, Private Link.
High Availability & Disaster Recovery: Redundancy across Availability Zones,
Regions, using load balancers, Traffic Manager, Front Door.
Cost Management: Choosing appropriate SKUs, monitoring traffic, optimizing data
transfer.
Automation: Infrastructure as Code (ARM Templates, Bicep, Terraform) for deploying
and managing network resources.
Governance: Azure Policy for enforcing network standards.
This detailed breakdown should give you a solid foundation for creating a
comprehensive visual mind map!

You might also like