You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/filter-network-traffic-network-security-group-using-azure-portal/7-knowledge-check.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ quiz:
25
25
- content: "Provides storage for Azure resources"
26
26
isCorrect: false
27
27
explanation: "Incorrect. A network security group doesn't provide storage for Azure resources."
28
-
- content: "Enables the automation and validation of the creation and teardown of environments to help deliver secure and stable application hosting platforms"
28
+
- content: "Enables the automation of filtering inbound and outbound network traffic for Azure resources"
29
29
isCorrect: true
30
30
explanation: "Correct. A network security group is used to filter inbound and outbound network traffic to and from Azure resources in an Azure virtual network, helping to deliver secure and stable application hosting platforms."
31
31
- content: "What happens to network traffic that doesn't match any NSG rules?"
@@ -50,7 +50,7 @@ quiz:
50
50
- content: "By automatically applying antivirus software to all virtual machines within a group"
51
51
isCorrect: false
52
52
explanation: "Incorrect because ASGs don't deal with antivirus software; their purpose is to simplify network security management by grouping VMs for security rule application."
53
-
- content: "A network administrator is planning to minimize the number of security rules and changes needed. They are considering using service tags or application security groups, rather than individual IP addresses or ranges of IP addresses. What should they ensure about the network interfaces in both application security groups?"
53
+
- content: "A network administrator is planning to minimize the number of security rules and changes needed. They're considering using service tags or application security groups, rather than individual IP addresses or ranges of IP addresses. What should they ensure about the network interfaces in both application security groups?"
54
54
choices:
55
55
- content: "They must exist in different virtual networks"
Network security is a critical aspect of maintaining a secure and reliable infrastructure. Azure provides a powerful tool called Network Security Group (NSG) that allows organizations to filter network traffic and enforce access controls in their cloud environments. In this training module, we will explore how to utilize Azure NSG to enhance network security and protect your resources.
1
+
Network security is fundamental to protecting cloud resources from unauthorized access and threats. Azure Network Security Groups (NSGs) provide a critical layer of defense by filtering network traffic to and from Azure resources within a virtual network. NSGs act as distributed firewalls, allowing you to control traffic flow using security rules based on source, destination, port, and protocol.
2
+
3
+
In modern cloud environments, implementing defense-in-depth strategies requires multiple layers of security controls. NSGs are one essential component of this approach, working alongside other Azure security services to create comprehensive network protection.
2
4
3
5
## Scenario
4
6
5
-
Imagine your work as a cloud architect for a growing e-commerce company. The company has recently migrated its infrastructure to Microsoft Azure and wants to ensure that network traffic to their resources is secure and restricted to authorized sources. As the responsible architect, you need to implement effective network security measures using Azure NSG.
7
+
You work as a cloud architect for a growing e-commerce company that migrated its infrastructure to Microsoft Azure. The company operates a multi-tier application with web servers, application logic servers, and database servers. Your task is to implement network security controls to ensure that:
6
8
7
-
## Learning Objectives
9
+
- Web servers only accept HTTPS traffic from the internet
10
+
- Application servers only accept traffic from web servers
11
+
- Database servers only accept traffic from application servers
12
+
- All unauthorized traffic is blocked and logged for security analysis
8
13
9
-
By the end of this training module, participants will:
14
+
You use Azure Network Security Groups to implement these access controls and establish secure network segmentation.
10
15
11
-
- Understand the purpose and benefits of using Azure NSG to filter network traffic.
12
-
- Learn how to create and configure NSGs to enforce access controls for Azure resources.
13
-
- Gain insights into how NSGs can be used to allow or deny specific types of traffic based on source, destination, and port.
14
-
- Understand how to prioritize NSG rules and leverage Azure NSG flow logs for monitoring and troubleshooting.
15
-
- Recognize the role of NSGs in implementing network security best practices in Azure.
16
+
## Learning Objectives
16
17
17
-
## Goals
18
+
By the end of this module, you'll be able to:
18
19
19
-
- Enable participants to effectively utilize Azure NSG to filter network traffic and enforce access controls.
20
-
- Improve participants' understanding of network security concepts in Azure.
21
-
- Provide participants with hands-on experience in creating and configuring NSGs.
22
-
- Empower participants to implement network security best practices and restrict unauthorized access to Azure resources.
23
-
- Enhance participants' ability to monitor and troubleshoot network traffic using NSG flow logs.
20
+
- Create and configure network security groups to filter network traffic in Azure virtual networks
21
+
- Define security rules based on source, destination, port, and protocol to allow or deny specific traffic
22
+
- Understand how NSGs evaluate inbound and outbound traffic using priority-based rules
23
+
- Implement application security groups to simplify security management for multi-tier applications
24
+
- Apply network security best practices using NSGs to protect Azure resources
25
+
- Monitor and troubleshoot network traffic using NSG diagnostic capabilities
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/filter-network-traffic-network-security-group-using-azure-portal/includes/2-create-resource-group-azure-portal.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,8 @@
1
-
A **Resource Group** is a container that holds related resources for an Azure solution. The resource group can include all the resources for the solution, or only those resources that you want to manage as a group. You decide how you want to allocate resources to resource groups based on what makes the most sense for your organization. Generally, add resources that share the same lifecycle to the same resource group so you can easily deploy, update, and delete them as a group.
1
+
Before creating network security resources, you need a resource group to organize and manage them. A **resource group** is a container that holds related resources for an Azure solution. The resource group can include all the resources for the solution, or only those resources that you want to manage as a group.
2
2
3
-
The **Resource Group stores metadata about the resources**. Therefore, when you specify a location for the resource group, you are specifying where that metadata is stored. For compliance reasons, you may need to ensure that your data is stored in a particular region.
3
+
Generally, add resources that share the same lifecycle to the same resource group so you can easily deploy, update, and delete them as a group. In this module, you create a resource group to contain your virtual network, subnets, and network security groups.
4
+
5
+
**Resource groups store metadata about the resources**. When you specify a location for the resource group, you're specifying where that metadata is stored. For compliance reasons, you need to ensure that your data is stored in a particular region.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/filter-network-traffic-network-security-group-using-azure-portal/includes/3-create-virtual-networking-infrastructure.md
+19-49Lines changed: 19 additions & 49 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,62 +18,32 @@ Key scenarios that you can accomplish with a virtual network include:<br>
18
18
- Routing network traffic
19
19
- Integration with Azure services.
20
20
21
-
Based on the principle of “never trust, always verify,” Zero Trust helps secure corporate resources by eliminating unknown and unmanaged devices and limiting lateral movement. Implementing a true Zero Trust model requires that all components—user identity, device, network, and applications—be validated and proven trustworthy. Zero Trust verifies identity and device health prior to granting access to corporate resources. When access is granted, applying the principle of least privilege limits user access to only those resources that are explicitly authorized for each user, thus reducing the risk of lateral movement within the environment. In an ideal Zero Trust environment, the following four elements are necessary:
21
+
Based on the principle of “never trust, always verify,” Zero Trust helps secure corporate resources by eliminating unknown and unmanaged devices and limiting lateral movement. Implementing a true Zero Trust model requires that all components—user identity, device, network, and applications—be validated and proven trustworthy. Zero Trust verifies identity and device health before granting access to corporate resources. When access is granted, applying the principle of least privilege limits user access to only those resources that are explicitly authorized for each user. Least privilege reduces the risk of lateral movement within the environment. In an ideal Zero Trust environment, the following four elements are necessary:
22
22
23
-
- Strong identity authentication everywhere (user verification via authentication)
24
-
- Devices are enrolled in device management, and their health is validated
25
-
- Least-privilege user rights (access is limited to only what is needed)
26
-
- The health of services is verified (future goal)
23
+
- Strong identity authentication everywhere (user verification via authentication)
24
+
- Devices are enrolled in device management, and their health is validated
25
+
- Least-privilege user rights (access is limited to only what is needed)
26
+
- The health of services is verified (future goal)
27
27
28
-
## Communicate with the internet<br>
28
+
## Network communication behavior
29
29
30
-
All resources in a virtual network can communicate outbound to the internet, by default. You can communicate inbound to a resource by assigning a public IP address or a public load balancer. You can also use public IP, Network Address Translation (NAT) gateway, or public load balancer to manage your outbound connections.
30
+
By default, Azure virtual networks allow:
31
31
32
-
> [!NOTE]
33
-
> When using only an internal Standard Load Balancer, outbound connectivity is not available until you define how you want outbound connections to work with an instance-level public IP or a public load balancer.<br>
32
+
- All outbound traffic to the internet
33
+
- All traffic between resources in the same virtual network
34
+
- Traffic between peered virtual networks
34
35
35
-
## Communicate between Azure resources<br>
36
+
Network security groups override these defaults by explicitly allowing or denying traffic based on your security requirements. When you create NSG rules, you define exactly which traffic is permitted, implementing a defense-in-depth security strategy.
36
37
37
-
Azure resources communicate securely with each other in one of the following ways:
38
+
## Filtering network traffic
38
39
39
-
-**Through a virtual network**: You can deploy VMs, and other types of Azure resources to a virtual network. Examples of resources include Azure App Service Environments, the Azure Kubernetes Service (AKS), and Azure Virtual Machine Scale Sets.<br>
40
-
-**Through a virtual network service endpoint**: Extend your virtual network private address space and the identity of your virtual network to Azure service resources. Examples of resources include Azure Storage accounts and Azure Structured Query Language (SQL) Database, over a direct connection. Service endpoints allow you to secure your critical Azure service resources to only a virtual network.<br>
41
-
-**Through virtual network peering**: You can connect virtual networks to each other, enabling resources in either virtual network to communicate with each other, using virtual network peering. The virtual networks you connect can be in the same, or different, Azure regions.<br>
40
+
Network security groups (NSGs) are the primary tool for filtering network traffic within virtual networks. Understanding how NSG's work with virtual networks is essential:
42
41
43
-
## Communicate with on-premises resources<br>
42
+
-**Network security groups**: Contain multiple inbound and outbound security rules that filter traffic to and from resources by source and destination IP address, port, and protocol
43
+
-**Subnet-level protection**: Apply NSGs to subnets to control all traffic entering or leaving that subnet
44
+
-**Network interface-level protection**: Apply NSGs to individual network interfaces for granular control
45
+
-**Network virtual appliances**: Deploy specialized virtual machines (VMs) that perform advanced network functions such as firewalls or WAN optimization
44
46
45
-
You can connect your on-premises computers and networks to a virtual network using any of the following options:
47
+
## Virtual networks and availability zones
46
48
47
-
-**Point-to-site virtual private network (VPN)**: Established between a virtual network and a single computer in your network. Each computer that wants to establish connectivity with a virtual network must configure its connection. This connection type is great if you're just getting started with Azure, or for developers, because it requires little or no changes to your existing network. The communication between your computer and a virtual network is sent through an encrypted tunnel over the internet.<br>
48
-
-**Site-to-site VPN**: Established between your on-premises VPN device and an Azure VPN Gateway that is deployed in a virtual network. This connection type enables any on-premises resource that you authorize to access a virtual network. The communication between your on-premises VPN device and an Azure VPN gateway is sent through an encrypted tunnel over the internet.<br>
49
-
-**Azure ExpressRoute**: Established between your network and Azure, through an ExpressRoute partner. This connection is private. Traffic doesn't go over the internet.<br>
50
-
51
-
## Filter network traffic<br>
52
-
53
-
You can filter network traffic between subnets using either or both of the following options:
54
-
55
-
-**Network security groups**: Network security groups and application security groups can contain **multiple inbound and outbound security rules**. These rules enable you to **filter traffic to and from resources by source and destination IP address**, **port**, and **protocol**.<br>
56
-
-**Network virtual appliances**: A network virtual appliance is a VM that performs a network function, such as a **firewall**, **Wide-Area Network (WAN) optimization**, or **other network function**.<br>
57
-
58
-
## Route network traffic<br>
59
-
60
-
Azure routes traffic between subnets, connected virtual networks, on-premises networks, and the Internet, by default. You can implement either or both of the following options to override the default routes Azure creates:
61
-
62
-
-**Route tables**: You can create custom route tables with routes that control where traffic is routed to for each subnet.<br>
63
-
-**Border gateway protocol (BGP) routes**: If you connect your virtual network to your on-premises network using an Azure VPN Gateway or ExpressRoute connection, you can propagate your on-premises Border Gateway Protocol (BGP) routes to your virtual networks.<br>
64
-
65
-
## Virtual network integration for Azure services<br>
66
-
67
-
Integrating Azure services to an Azure virtual network enables private access to the service from virtual machines or compute resources in the virtual network. You can integrate Azure services in your virtual network with the following options:
68
-
69
-
- Deploying dedicated instances of the service into a virtual network. The services can then be privately accessed within the virtual network and from on-premises networks.<br>
70
-
- Using Private Link to access privately a specific instance of the service from your virtual network and from on-premises networks.<br>
71
-
- You can also access the service using public endpoints by extending a virtual network to the service, through service endpoints. Service endpoints allow service resources to be secured to the virtual network.<br>
72
-
73
-
## Azure Virtual Network limits<br>
74
-
75
-
There are certain limits around the number of Azure resources you can deploy. Most Azure networking limits are at the maximum values. However, you can increase certain networking limits as specified on the virtual network limits page.
76
-
77
-
## Virtual networks and availability zones<br>
78
-
79
-
Virtual networks and subnets span all availability zones in a region. You don't need to divide them by availability zones to accommodate zonal resources. For example, if you configure a zonal VM, you don't have to take into consideration the virtual network when selecting the availability zone for the VM. The same is true for other zonal resources.
49
+
Virtual networks and subnets span all availability zones in a region. When you deploy resources across availability zones for high availability, the same network security rules apply consistently, simplifying security management while maintaining resilience.
0 commit comments