Network¶
- has a name and address-space in CIDR notation
- can have more than 1 VNET
- Load balancer, generic network load balancer is Layer 4 within a region
- CDN
- DNS
- Public IP:
- Basic: dynamic or static, Open by default, no AZ, IPv6
- Standard: only static, no Inbound by default, Zone redundant, No IPv6
- ROT: SSL attached to IP require static IP
| Feature | Peering | VNet-to-VNet |
|---|---|---|
| Encryption | None | IPSec/IKE |
| Span | Region, subscription if same tenant | Geo, Region |
| VPN Gateway | Not needed | Required |
| Span subscription | Yes | Only using Powershell |
DNS¶
- Azure provided DNS
- No config, HA, cannot change suffix
- Bring your own DNS
- allows hybrid on-prem and Azure VM
- reverse lookup of internal IP
- authenticate to Domain Controller
- Turn off Scavenging to prevent accidental removal of DNS record
- Azure DNS
- HA, must bring your own domain
- No DNSSEC
- Private DNS domains (preview)
- name resolution within Azure spanning VNets, Regions and Subscriptions
- Supports Split Horizon (Private and Public DNS zones share a name)
Network Security Group NSG¶
- Apply or Deny rules, inbound or outbound
- Can be applied to subnet or NIC
- Default Inbound: AllowVNetInbound > AllowAzueLoadBalancerInBound > DenyAllInBound
- Default Outbound: AllowVNetOutbound > AllowInternetOutBound > DenyAllOutBound
- Rule: Source Port/Range, Destination Port/Range, Protocol, Action, Priority
- Rules are processed with increasing number (low number => high priority)
- First matched rule is taken, if none match, default is deny
- A VM can be affected by subnet level and then VM level NSGs
- Firewall offering is a newer version of NSG(?)
Traffic Manager¶
- Primary goal is to reduce latency when users are distribute globally
- Allows an endpoint to be available globally but applications and data can be in multiple regions
- Traffic manager uses DNS that is closest to the User do direct traffic
- Unlike load balancer,
- not restricted to one region
- works at DNS level to redirect traffic to preferred endpoint
Peering¶
- From VNET-to-VNET
- Global VNet peering can span regions or subscriptions as long as the same tenant
- Can be either one-way or both directions
- Chaining forwarded traffic (transitively extending network)
- VNet-to-VNet connections: Peering or site-to-site VPN Tunnel
- Both inbound an outbound networking is traffic is charged (~ 2 cents/GB intra-region, can be 10x for across region)
VPN¶
- VPN: connect on-site network to Azure. Requires Virtual Network Gateway VNG in Azure
- site-to-site: requires dedicated hardware
- point-to-site: device to site, VPN software
- ExpressRoute allows site-to-site connectivity between Azure and on-prem using private network
- requires dedicated hardware at ISP
- Virtual Network Gateway resides in a special subnet called Gateway Subnet
- ExpressRoute Direct is provisioned by Microsoft
- Connect to one of the edge locations that Microsoft has
- higher speeds (10gps, 100gbps): achieved through combining 1 or more virtual circuits
- VNG SKUs: offer predetermined bandwidth, certain number of P2S and S2S tunnels
- VPN allows either {site,point}-to-site connectivity between Azure and on-prem using IPSec VPN, consists of
- Virtual Network Gateway on Azure and has a public IP address
- Local Network Gateway on-prem, also has an IP address
- Unlike, peering, VNG incurs a fixed cost, but has no inbound charge for inter-virtual network data transfer
- Microsoft Peering connect to public cloud services (like Office 365) over internet
- Azure Private Peering connect to Azure services such as VM over private network
- Virtual WAN
- connect branch offices through Azure
Network Security Group¶
- Can be applied to virtual network subnet or individual NIC
-
1 NSGs can be applied, ROT: apply common NSG to subnet, more specific to NIC
- all network packets are processed as:
- find the next matching rule in all NSGs sorted by priority
- if none found, drop the package
- if matched rule is deny rule, drop the package
- else-if matched rule is allow rule allow the package
- Use firewall along with NSGs
- Application Security Group ASG
- Newer version of NSG(?)
- limited to the region they created in (resource must belong to the same region)
Load balancer¶
- Load Balancer: Layer 4 (transport)
- Inbound NAT rules allow sending traffic to specific backend servers based on the input ports
- App Gateway: Layer 7 (application)
- Azure Application Gateway is a load-balancer that comes bundled with Web Application Firewall WAF
- protects web applications that use HTTP/S
Application Gateway¶
- OSI Layer 7, load balancer for Web Applications (if all network traffic is HTTP/HTTPS/WebSocket)
- SSL/TLS termination (can manage certificates and pass un-encrypted traffic to backend)
- URL-based routing, rewrite HTTP headers
- Auto-scaling and zone redundancy
- Cookie based affinity (Session affinity)
- components:
- Front-end IPs: one or more public IPs allowed
- Backend pools: one or more of VM, VM Scale Set, Application Services or IP
- Listeners: listens for traffic on specific frontend IP+port and specific protocol (HTTP or HTTPS)
- Rules: tie front-end IP (aka HTTP Settings) and listener to backend pool
- Health probes: periodically probe backend server, set unhealthy if consecutively timeouts out
- Web Application Firewall WAF is optional Tier that can
- provide detailed monitoring and logging
- take action based on incoming Request's header, cookie, or any attribute
- enforce selected or all OWASP rules (an OSS Web Application Security community)
Azure Active Directory Azure AD¶
- A subscription can have multiple AAD
- Editions: Free, Premium P1, Premium P2 (Basic is obsolete)
- User types: Standard or External (Guest)
- Group types:
- Security(can assign permissions to) or
- Office 365 (more like distribution list, cannot assign permissions)
- Group membership types: dynamically (based on an AAD attribute) or assigned (explicit)
- Devices: belonging to AAD users. Types:
- Registered: devices authenticate when need to use resources; mainly personal devices
- Joined: devices have some local access based on authentication; mainly company-owned devices
- Hybrid Joined: devices that have joined on-prem
- Device management InTune
- Features: custom domains, enterprise applications
- MFA: Disabled, Enabled or Enforced (non web-app will require a password)
- AD Joins
- access review
AD Connect¶
- runs on-prem and syncs Domain Controller logins to Azure AD.
- Sign-on methods:
- Password Hash Synchronization - PHS: Sync on-prem password to AAD and optional write-back, sync AAD to on-prem. AAD stores password hash only
- Pass-Through Authentication - PTA: Auth performed by on-prem, optional write-back, ROT: Use HA
- Federation: AD FS: Trust relationship between on-prem and AAD using Web Application Proxy server and SSL
- on-prem auth, sign-on from either on-prem or cloud, but trust makes it transparent
- Can select OUs, App, Attributes, Users to sync