[Recap] Day 2: Azure Virtual Networking [Azure Administrator] [AZ-104]

Azure Cloud

Share Post Now :

HOW TO GET HIGH PAYING JOBS IN AWS CLOUD

Even as a beginner with NO Experience Coding Language

Explore Free course Now

Table of Contents

Loading

This blog post will go through some quick tips including Q/A and related blog posts on the topics that we covered in the Azure Administration Day 2 Live Session which will help you gain a better understanding and make it easier for you to learn the Azure Administration, clear the [AZ104] Certification & get a better-paid job.

The previous week, In Day 1 session we got an overview of Cloud Concepts, Cloud Service Models, Azure Overview, Azure Region, Azure Governance & Compliance, Subscriptions and Accounts Overview, Azure Resource Manager, Azure Policy, Azure RBAC, Resource Tags, Azure Resource Lock, and also performed hands-on, where we have created Resource Groups and configured Virtual Networks, Virtual Machines, Azure Policy and many more.

And in this week’s Day 2 Live Session, we have continued with Module 2: Azure Virtual Networking and covered the Azure Virtual Networking, IP Address, Public IP, Private IP, Subnets,  Network Security Group(NSG), Basics of NSG, Route Table, Azure Security Groups(ASG), Azure Private DNS, Azure Firewall, Jump-Box, and Azure Bastion Host.

We also covered Hands-on, Lab 3, Lab 4, Lab 5, Lab 6 out of our 35+ extensive labs.

Azure Virtual Networking

Azure Virtual Networking (VNet) is the fundamental building block for your private network in Azure. VNet enables many types of Azure resources, such as Azure Virtual Machines (VM), to securely communicate with each other, the internet, and on-premises networks. Virtual Machine is no different than any other physical computer like a laptop, smartphone, or server.

Check more on Azure Virtual Network (VNet).

Azure Virtual Networking

IP Address

An Internet Protocol Address is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP Address serves two main functions: host or network interface identification and local addressing.

IP Address

Public IP and Private IP

Public IP addresses allow internet resources to communicate inbound to Azure resources. Public IP addresses enable Azure resources to communicate to internal and public-facing Azure services. The address is dedicated to the resource until it’s unassigned by you. Azure dynamically assigns an available IP address that isn’t dedicated to the resource.

Private IP addresses are used for communication within a Virtual Network, your on-premises network, and the Internet. You must assign at least one private IP address to a virtual machine. Helps a private network to connect securely to other devices within that same network.

Public IP and Private IP

Subnets

A subnet is a range of IP addresses in the virtual network. You can divide a virtual network into multiple subnets for organization and security. Each Network interface card connected in a virtual machine is connected to one subnet only.

Subnets

Q1. Can we change VM from subnet 2 to subnet 1?

Ans. We first need to understand how a Virtual Machine is integrated with a subnet. To be more specific Virtual Machines are not directly connected with a Subnet. Virtual Machines are connected with Network Interface Card and in turn, those NICs are connected to the Subnets. So, technically, it is not possible to change the Subnet of a Virtual Machine as they are really not connected with the Subnet.

So, in order to change the Subnet associated with a Network Interface Card, navigate to the NIC to which the Virtual Machine is connected by clicking on the NIC associated with the Virtual Machine.

Q2. Why would there be a need to reserve public IP?

Ans. There are a few reasons why you need a Reserved IP address

  • Easy A-Record DNS: Because you maintain the same public IP after delete and shutdown VMs, you can avoid having to reprogram DNS or other applications depending upon the IP to the newly assigned IP when you restart.
  • On-Premise Connectivity Security: You can now provide access to your Azure Services from your enterprise network, leveraging the public IP but controlling and access through your proxy/firewall on-premises. You now don’t need to worry about re-programming that each time you start and stop your VM. Check more on Public IP Address.

Azure Virtual Machine

Virtual Machine (VM) is a computing service that performs most functions of a physical computer, actually behaving like a separate computer system. A virtual machine, usually known as a guest, is created within another computing environment (i.e., Physical Datacenters) referred to as a “host.

An Azure VM gives you the flexibility of virtualization without having to buy and maintain the physical hardware that runs it. However, you still need to maintain the VM by performing tasks, such as configuring, patching, and installing the software that runs on it.

Check more on Azure Virtual Machine.

Azure Virtual Machines

Network Interface Card (NIC)

A Network Interface (NIC) is an interconnection between a Virtual Machine and the underlying software network. An Azure VM has one or more network interface cards (NICs) attached to it.

Network Interface Card (NIC) is assigned with IP address and associated with NSG rules, which is used for the communication between virtual machines or internal network or internet.

Network Interface Card

Q3: What is RDP?

Ans: Remote Desktop Protocol (RDP) was developed by Microsoft Corporation to provide users with the ability of a remote connection to servers and computers running Windows operating systems.

In fact, with this protocol users can work on a remote computer as they are working directly on it.RDP is a Microsoft proprietary protocol that enables remote connections to other computers, typically over TCP port 3389.

Remote Desktop

Also, Check Our blog post on Azure Front Door. Click here

Secure Shell (SSH)

SSH is a protocol, which stands for Secure Shell or Secure Socket Shell. The secure shell is useful for security while connecting to a remote server. The ssh command uses an ssh protocol, which is a secure protocol, as the data transfer between the client and the host takes place in encrypted form. It transfers the input through the client to the host and returns the output transferred by the host. It executes through TCP/IP port 22.

To establish an SSH connection, we need two primary components; a client and a host, which can be a server, domain name, IP address, and more. Also, we require an ssh client to connect with another computer or server. The client uses the specified host information to establish the connection; if the provided credential is verified, it will establish an encrypted connection.

Secure Shell

Q4: SSH is used only for Linux VM?

Ans: No, it is used for another operating system as well Linux, macOS, Solaris, etc.,

  • It is a protocol used to securely connect to a remote server/system.
  • It is secure in the sense that it transfers the data in encrypted form between the host and the client.
  • It transfers inputs from the client to the host and relays back the output.

Server and User Authentication

Q5: Please explain when SSH might be used?

Ans: SSH is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports;

  • It can transfer files using the associated SSH file transfer (SFTP) or secure copy (SCP) protocols.
  • It uses the client-server model.
  • The standard TCP port for SSH is 22.
  • It is generally used to access Unix-like operating systems, but it can also be used on Microsoft Windows.

SSH Client Connectivity

Check Out: Our blog post on Microsoft Azure Administrator Learning Path. Click here

Network Security Groups (NSGs)

Network Security Group consists of a set of access control rules that describe traffic filters. These can be associated with a virtual machine or a subnet in the same region. The rules defined in the Network Security Group act as filters.

Use to permit or deny traffic (inbound or outbound), via rules, to a subnet or network interface. Any Azure virtual network can be placed into a security group where different inbound and outbound rules can be configured to allow or deny certain types of traffic. For each rule, you can specify source and destination, port, and protocol.

Check more on Network Security Group (NSG)

Network Security Groups

Application Security Groups(ASGs)

Application Security Groups help to manage the security of Virtual Machines by grouping them according to the applications that run on them. It is a feature that allows the application-centric use of Network Security Groups. Access is always granted based on workloads.

Check more on Application Security Groups.

Application Security Groups

Q6: What are the difference between Network Security Groups and Application Security groups?

Ans: The differences are explained below:

Network Security Groups

Normally when you deploy a network security group (NSG) it is either assigned to a NIC or a subnet (preferred). If you deploy that NSG to a subnet then the rules apply to all of the NICs, or virtual machines, in that subnet. This is OK when you’re deploying a new system where you can easily place virtual machines into subnets, and treat each subnet as its own security zone.

But in the real world, things aren’t always that clean, and you might need something that allows a more dynamic or flexible means of assigning rules to some machines in a subnet.

Application Security Groups

ASGs are used within an NSG to apply a network security rule to a specific workload or group of VMs — defined by ASG worked as being the “network object” & explicit IP addresses are added to this object. This provides the capability to group VMs into associated groups or workloads, simplifying the NSG rule definition process.

Another great use of this is for scalability, creating the virtual machine and assigning the newly created virtual machine to its ASG will provide it with all the NSG rules in place for that specific ASG — zero distribution to your service!

Application Security Groups

Azure Firewalls

Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. Controlling outbound network access is an important part of an overall network security plan.

For example, you may want to limit access to websites. Or you may want to limit the outbound IP Addresses and ports that can be accessed.

One way you can control outbound network access from an Azure subnet is with Azure Firewall.

Check more on Azure Firewalls.

Azure Firewall

Q7: What are some Azure Firewall concepts?

Ans: Azure Firewall supports rules and rule collections. A rule collection is a set of rules that share the same order and priority. Rule collections are executed in order of their priority. Network rule collections are a higher priority than application rule collections, and all rules are terminating.

There are three types of rule collections:

  • Application rules: Configure fully qualified domain names (FQDNs) that can be accessed from a subnet.
  • Network rules: Configure rules that contain source addresses, protocols, destination ports, and destination addresses.
  • NAT rules: Configure DNAT rules to allow incoming Internet connections.

Q8: What is the difference between Network Security Groups (NSGs) and Azure Firewall?

Ans: The Azure Firewall service complements network security group functionality. Together, they provide better “defense-in-depth” network security. Network security groups provide distributed network layer traffic filtering to limit traffic to resources within virtual networks in each subscription.

Azure Firewall is a fully stateful, centralized network firewall as-a-service, which provides network- and application-level protection across different subscriptions and virtual networks.

Route Tables

Routing is the process of selecting a path along which the data can be transferred from the source to the destination. Routing is performed by a special device known as a router.

“Destination IP field of the packet is checked against information stored in router”. The place where routing information is stored is called a routing table. The routing table contains routing entries, that is a list of destinations (often called: list of network prefixes or routes).

Check more on Route Tables

Q9: What are the different types of Routing?

Ans: There are two different types of routing in azure: System routes and User Defined Routes.

  • System routes subnets can communicate to other subnets present within the same virtual network.
  • Azure Route Tables, or User Defined Routing, allow you to create network routes so that your Firewall VM can handle the traffic both between your subnets and to the Internet. For the network interfaces to be allowed to receive and forward traffic, IP forwarding must be enabled.

Azure automatically routes traffic between Azure subnets, virtual networks, and on-premises networks. If you want to change any of Azure’s default routing, you do so by creating a routing table. If you’re new to routing in virtual networks, you can learn more about it in virtual network traffic routing.

Check more on Virtual Network Traffic Routing.

Virtual Network Traffic Routing

Domain Name Server(DNS)

DNS is a service that translates the domain name into IP addresses. This allows the users of networks to utilize user-friendly names when looking for other hosts instead of remembering the IP addresses. The domain name used here is alphabetic and can be easily remembered.

For example, www.example.com is a domain name of a site. And with the help of DNS, it will get translated into its IP address 198.105.232.4.

A DNS system has its own network. If one DNS server does not know how to translate a particular domain name, it will ask another server, then another server, and so on, until they find out the correct IP address. A DNS server holds a list of all IP addresses along with their domain names, which can be retrieved when required.

Domain Name Server

Q10: What is an Azure Private DNS server?

Ans: Azure Private DNS provides a reliable and secure DNS service for your virtual network. Azure Private DNS manages and resolves domain names in the virtual network without the need to configure a custom DNS solution.

By using private DNS zones, you can use your own custom domain name instead of the Azure-provided names during deployment. Using a custom domain name helps you tailor your virtual network architecture to best suit your organization’s needs.

Check more on Azure Private DNS Server.

Azure Private DNS

Jump Box or Jump Host or Jump Server

A jump server, jump host, or jump box is a system on a network used to access and manage devices in a separate security zone. Used to securely access instances in the private subnets.

Jump Host

Q11: What is the advantage of a jump box VM?

Ans: Jump box prevents all Azure VM’s to expose to the public. We can do monitoring and logging on a single box. We can easily turn the ON/OFF remote desktop connectivity feature. By using the network security group, we can restrict the IP addresses to communicate with the Jump box.

Azure Bastion Host

Azure Bastion is a fully platform-managed PaaS service that provides RDP/SSH over TLS(Transport Layer Security) i.e. port 443 to all the VMs in the network.

Azure Bastion is a managed Jump Box. It means that we can configure our Jump Box according to our needs. Remember, you cannot interact with it directly, but you can configure it. It supports both RDP (Remote Desktop Protocol) & SSH connections, and you can also play with its NSG (Network Security Group) to make your connection even more secure.

Azure Bastion Host

Q12: Bastion service is not free, correct?

Ans: Yes, it’s not a free service. It’s charged by the hour and for the amount of outbound data transfers involved, as described on Microsoft’s pricing page.

Q13: Can I deploy multiple Azure resources in my Azure Bastion subnet?

Ans: No. The Azure Bastion subnet (AzureBastionSubnet) is reserved only for the deployment of your Azure Bastion resource.

Azure Bastion deployment is per virtual network, not per subscription/account or virtual machine. Once you provision an Azure Bastion service in your virtual network, the RDP/SSH experience is available to all your VMs in the same virtual network.

Quiz Time (Sample Exam Questions)!

With our Microsoft Azure Administrator training program, we cover 150+ sample exam questions to help you prepare for the certification AZ-104.

Check out one of the questions and see if you can crack this…

Ques: Your company plans to migrate all its network resources to Azure. You need to start the planning process by exploring Azure. What should you create first?

A. Subscription

B. Resource group

C. Virtual network

D. Management group

The right answer will be revealed in my next week’s email.

Here is the answer to the question shared last week (Scroll down at the end of this post for the question).

Ques: I have some private servers on my premises, also I have distributed some of my workloads on the public cloud, what is this architecture called?

A. Virtual Private Network

B. Private Cloud

C. Virtual Private Cloud

D. Hybrid Cloud

Answer: D

Explanation: This type of architecture would be a hybrid cloud. Because we are using both, the public cloud, and on the premises servers. To make this hybrid architecture easy to use, wouldn’t it be better if your private and public cloud were all on the same network (virtually). This is established by including your public cloud servers in a virtual private cloud and connecting the virtual cloud with your on-premise servers using a VPN (Virtual Private Network). 

Related/References

Next Task For You

Begin your journey toward Mastering Azure Cloud and landing high-paying jobs. Just click on the register now button on the below image to register for a Free Class on Mastering Azure Cloud: How to Build In-Demand Skills and Land High-Paying Jobs. This class will help you understand better, so you can choose the right career path and get a higher paying job.

azure cloud job free class

Picture of mike

mike

I started my IT career in 2000 as an Oracle DBA/Apps DBA. The first few years were tough (<$100/month), with very little growth. In 2004, I moved to the UK. After working really hard, I landed a job that paid me £2700 per month. In February 2005, I saw a job that was £450 per day, which was nearly 4 times of my then salary.