User Defined Routing (Custom Routes)
Is a feature that allows users to have fine-grained control over the traffic flowing through their virtual networks or subnets.
Implementation
Rule Processing
-Longest Prefix Match: Choose the rule where the address prefix is the most specific (/32)
Limitations
-VNets include default/system routes
-Route precedence: Custom > Border Gateway Protocol (BGP) > Default
-Routes can be advertised to a route table
VNet Peering
It’s the ability to create private connectivity between VNet’s that are isolated, without having to go over the internet.
-High bandwidth
-Low latency
-Not encrypted traffic, unless your VNet peers are going across data centers (MACsec), then the traffic is not going to be encrypted
Implementation
1. VNet Peerings: Two peers are created - one for each direction in the peering
2. Routes: System routes are automatically updated to allow connectivity
3. Options: Peers can support traffic forwarding and gateway/route-server access
-Allow on-premises through the hub VNet, as long as, you tick the allow box on that allow gateway access
Considerations
-Peering work across regions/subscriptions/tenants
-Peering is unsupported for overlapping IP ranges
-Transitive routing is not possible by default
Service Endpoints
Help us to get access to Microsoft publicly accessible solutions without the need of a public IP
-Uses the Microsoft Backbone, which means we can keep all traffic private.
-Still uses the Public Endpoints
Implementation
1. Subnet: Service Endpoints are configured on a per-subnet level
2. Service Endpoint: Enabled for a specific Resource Provider for the given subnet
3. Routes: When configured, a system route is automatically generated
Private Link
It enables customers to securely access services hosted on these cloud platforms privately, without exposing them to the public internet.
-Extension of resources into your VNet and give them a private IP
-On-premises resources connected via VPN or a VNet that is peered, they can access the private endpoint as well
Private Endpoints
Private Link Service
Provides private connectivity from a virtual network to Azure platform as a service (PaaS), customer-owned, or Microsoft partner services
-If you’ve got a partner that buils a solution within Azure, they put a standard Azuer Load Balancer in front, then you can go and configure exactly the same sort of private endpoint.
Resource Firewalls
Security mechanisms used to control incoming and outgoing network traffic to and from resources.
-Works at the public endpoint level, not for private endpoints
Implementation
VPN Gateway
Is a managed networking service that allows organizations to establish secure connections between their on-premises networks or client devices and Azure virtual networks.
-It enables secure communication over the public internet by creating a virtual private network (VPN) tunnel (encrypted). (Using private IPs)
Implementation
Site-to-Site (S2S) Configuration
Allows organizations to establish encrypted connections between their on-premises networks and Azure virtual networks.
Point-to-Site (P2S) Configuration
Enables individual client devices (such as laptops or mobile devices) to securely connect to Azure virtual networks over the internet.
-P2S does support more than one user
ExpressRoute
Is a dedicated private connection service offered by Microsoft Azure that provides high-performance, low-latency, and secure connectivity between on-premises networks and Azure data centers, as well as other Microsoft cloud services like Microsoft 365 and Dynamics 365.
-Not only does it avoid the public internet, but it also provides you with private access to a range of Microsoft Public services
-We are using a “Partner” provider. Also called “Partner Edge” that supports ExpressRoute
-Allows us to have private connectivity from on-premises into either Microsoft VNet or Microsoft Peering
Implementation
Pricing/Feature - Considerations
-Can co-exist with VPN (not Basic VPN SKU), it can help you to failover
-Can support FastPath (Ultra/ERGw3Az SKU), for better performance and low latency connectivity
-Standard supports up to 10 VNets that can be connected to your circuit, if you need more use “Premium”
-Premium supports cross-geography & greater limits
Virtual WAN
Is a networking service that aims to simplify connectivity and manage traffic routing between various Azure resources and on-premises locations.
-Help out with the idea of any-to-any network connectivity with shared resources and allowing site-to-site, point-to-site, expressroute and hub to spoke, all sorts of connectivity, all through a nice centralized management interface
-It provides a unified platform for connecting branch offices, remote users, and Azure-based resources through a centrally managed network architecture.
Implementation
First, you need to deploy a Virtual WAN. The partent container for managing all the different networks connections that you want to establish. This is also where you set the Pricing Tier.
Azure DNS
Is a cloud-based Domain Name System (DNS) service. It allows users to host and manage their DNS domains and records in Azure’s global network of DNS servers.
-Offers high availability, scalability, and performance for domain name resolution, enabling organizations to efficiently manage their DNS infrastructure.
Public Zones
-Access for public resources
Private Zones
-Access for private resources
Considerations
-DNS zones has to have at least 2 labels (.com/.io)
-If you have “Automatic Registration” turned on, not only will you get an A record, you’ll also get a pointer records (ip to domain name - reverse lookup) as well.
-With private zones, it doesn’t matter if you have a public IP address attached to your VMs. That public IP will not be used within private zones.