You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/introduction-to-azure-virtual-networks/includes/10-configure-internet-access-azure-virtual-nat.md
+15-9Lines changed: 15 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,29 @@
1
1
2
+
[Azure NAT Gateway](/azure/nat-gateway/nat-overview) is a fully managed Network Address Translation (NAT) service that provides secure, scalable outbound connectivity from a subnet to the internet. NAT Gateway is the recommended method for outbound connectivity in Azure.
2
3
4
+
### NAT Gateway SKUs
3
5
6
+
Azure NAT gateway is available in two SKUs.
4
7
5
-
Globally, IPv4 address ranges are in short supply, and can be an expensive way to grant access to Internet resources. [Azure Network Address Translation (NAT)](/azure/nat-gateway/nat-overview) lets internal resources on a private network to share routable IPv4 addresses. Rather than purchasing an IPv4 address for each resource that requires internet access, you can use a NAT service to map outgoing requests from internal resources to an external IP address.
The following diagram shows outbound traffic flow from Subnet 1 through the NAT gateway to be mapped to a Public IP address or a Public IP prefix.
8
18
9
19
:::image type="content" source="../media/nat-flow-map-e4870a4e.png" alt-text="Diagram with NAT service providing internet connectivity for internal resources.":::
10
20
11
21
After NAT is configured, all UDP and TCP outbound flows from any virtual machine instance will use NAT for internet connectivity. No further configuration is necessary, and you don’t need to create any user-defined routes. NAT takes precedence over other outbound scenarios and replaces the default Internet destination of a subnet.
12
22
13
-
NAT scales automatically to support dynamic workloads. NAT can support up to 16 public IP addresses. By using port network address translation (PNAT or PAT), NAT provides up to 64,000 concurrent flows for UDP and TCP. NAT is compatible with the following standard SKU resources:
14
-
15
-
- Load balancer
16
-
- Public IP address
17
-
- Public IP prefix
23
+
NAT scales automatically to support dynamic workloads. NAT can support up to 16 public IP addresses. By using port network address translation (PNAT or PAT), NAT provides up to 64,000 concurrent flows for UDP and TCP.
18
24
19
-
##Limitations of NAT
25
+
### Considerations for NAT Gateway
20
26
21
-
- Only the IPv4 address family is supported. NAT doesn't interact with IPv6 address family.
27
+
- Standard NAT gateway supports IPv4 only.
28
+
- StandardV2 NAT gateway supports both IPv4 and IPv6 public IP addresses and prefixes.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/introduction-to-azure-virtual-networks/includes/2-explore-azure-virtual-networks.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,11 +11,11 @@ This video reviews the basics of IP addressing and subnetting.
11
11
12
12
Azure VNets enable resources in Azure to securely communicate with each other, the internet, and on-premises networks.
13
13
14
-
-**Communication with the internet.**All resources in a VNet can communicate outbound to the internet, by default. You can communicate inbound to a resource by assigning a public IP address or a public Load Balancer. You can also use public IP or public Load Balancer to manage your outbound connections.
15
-
-**Communication between Azure resources.** There are three key mechanisms through which Azure resource can communicate: VNets, VNet service endpoints, and VNet peering. Virtual Networks can connect not only virtual machines (VMs), but other Azure Resources, such as the App Service Environment, Azure Kubernetes Service, and Azure Virtual Machine Scale Sets. You can use service endpoints to connect to other Azure resource types, such as Azure SQL databases and storage accounts. When you create a VNet, your services and VMs within your VNet can communicate directly and securely with each other in the cloud.
16
-
-**Communication between on-premises resources.**Securely extend your data center. You can connect your on-premises computers and networks to a virtual network using any of the following options: Point-to-site virtual private network (VPN), Site-to-site VPN, Azure ExpressRoute.
14
+
-**Communication with the internet.**Resources in a VNet can communicate outbound to the internet using a NAT gateway, public IP address, or public load balancer.
15
+
-**Communication between Azure resources.** There are four key mechanisms through which Azure resource can communicate: VNets, VNet service endpoints, VNet private endpoints and VNet peering.
16
+
-**Communication between on-premises resources.** You can connect your on-premises computers and networks to a virtual network using any of the following options: Point-to-site virtual private network (VPN), Site-to-site VPN, and Azure ExpressRoute.
17
17
-**Filtering network traffic.** You can filter network traffic between subnets using any combination of network security groups and network virtual appliances.
18
-
-**Routing network traffic.** Azure routes traffic between subnets, connected virtual networks, on-premises networks, and the Internet, by default. You can implement route tables or border gateway protocol (BGP) routes to override the default routes Azure creates.
18
+
-**Routing network traffic.** Azure routes traffic between subnets, connected virtual networks, and on-premises networks. You can implement route tables or border gateway protocol (BGP) routes to override the default routes Azure creates.
19
19
20
20
## Design considerations for Azure Virtual Networks
21
21
@@ -61,4 +61,4 @@ When planning to implement virtual networks, you need to consider:
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/introduction-to-azure-virtual-networks/includes/3-configure-public-ip-services.md
+13-17Lines changed: 13 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,3 @@
1
-
2
-
3
-
4
-
5
1
Public networks like the Internet communicate by using public IP addresses. Private networks like your Azure Virtual Network use private IP addresses, which aren't routable on public networks. To support a network that exists both in Azure and on-premises, you must configure IP addressing for both types of networks.
6
2
7
3
Public IP addresses enable Internet resources to communicate with Azure resources and enable Azure resources to communicate outbound with Internet and public-facing Azure services. A public IP address in Azure is dedicated to a specific resource. A resource without a public IP assigned can communicate outbound through network address translation services, where Azure dynamically assigns an available IP address that isn't dedicated to the resource.
@@ -31,16 +27,16 @@ Public IP addresses are created with an IPv4 or IPv6 address, which can be eithe
31
27
## Choose the appropriate SKU for a public IP address
32
28
33
29
> [!IMPORTANT]
34
-
>
35
-
> On September 30, 2025, Basic SKU public IPs will be retired. If you are currently using Basic SKU public IPs, make sure to upgrade to Standard SKU public IPs prior to the retirement date. For guidance on upgrading, visit [Upgrading a basic public IP address to Standard SKU](/azure/virtual-network/ip-services/public-ip-basic-upgrade-guidance).
36
-
37
-
| Public IP address |**Standard**|**Basic**|
38
-
| --- | --- |--- |
39
-
| Allocation method | Static | For IPv4: Dynamic or Static; For IPv6: Dynamic. |
40
-
| Idle time-out | Have an adjustable inbound originated flow idle time out of 4-30 minutes, with a default of 4 minutes, and fixed outbound originated flow idle time out of 4 minutes. |Have an adjustable inbound originated flow idle time out of 4-30 minutes, with a default of 4 minutes, and fixed outbound originated flow idle time out of 4 minutes. |
41
-
|Security | Secure by default model and be closed to inbound traffic when used as a frontend. Allow traffic with network security group (NSG) is required (for example, on the NIC of a virtual machine with a Standard SKU Public IP attached). |Open by default. Network security groups are recommended but optional for restricting inbound or outbound traffic|
42
-
|Availability zones | Supported. Standard IPs can be nonzonal, zonal, or zone-redundant. Zone redundant IPs can only be created in regions where there are three availability zones.| Not supported.|
43
-
|Routing preference | Supported to enable more granular control of how traffic is routed between Azure and the Internet.|Not supported.|
44
-
|Global tier | Supported via cross-region load balancers.|Not supported.|
45
-
46
-
Choose the best response for each question.
30
+
>On September 30, 2025, Basic SKU public IPs were retired. If you're currently using Basic SKU public IPs, upgrade to Standard SKU public IPs as soon as possible. Basic IPs remain operational post-retirement but are unsupported and not covered by SLA guarantees. For guidance on upgrading, visit [Upgrading a basic public IP address to Standard SKU](/azure/virtual-network/ip-services/public-ip-basic-upgrade-guidance).
31
+
32
+
33
+
| Public IP address |**Standard SKU**|
34
+
| --- | --- |
35
+
| Allocation method | Static |
36
+
| Idle time-out | Have an adjustable inbound originated flow idle time out of 4-30 minutes, with a default of 4 minutes, and fixed outbound originated flow idle time out of 4 minutes. |
37
+
|Security | Secure by default model and be closed to inbound traffic when used as a frontend. Allow traffic with network security group (NSG) is required (for example, on the NIC of a virtual machine with a Standard SKU Public IP attached).
38
+
|Availability zones | Supported. Standard IPs can be nonzonal, zonal, or zone-redundant. Zone redundant IPs can only be created in regions where there are three availability zones.|
39
+
|Routing preference | Supported to enable more granular control of how traffic is routed between Azure and the Internet.|
40
+
|Global tier | Supported via cross-region load balancers.|
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/introduction-to-azure-virtual-networks/includes/7-enable-cross-virtual-network-connectivity-peering.md
+7-19Lines changed: 7 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,10 +11,13 @@ Network traffic between peered virtual networks is private. The virtual networks
11
11
12
12
Virtual network peering enables you to seamlessly connect two Azure virtual networks. Once peered, the virtual networks appear as one, for connectivity purposes. There are two types of VNet peering.
13
13
14
+
:::image type="content" source="../media/global-vnet-peering-2368962c.png" alt-text="Diagram with VNet1 in Region 1, and VNet2 and VNet3 in Region 2. VNet2 and VNet3 are connected with regional VNet peering. VNet1 and VNet2 are connected with a global VNet peering.":::
15
+
14
16
-**Regional VNet peering** connects Azure virtual networks in the same region.
15
-
-**Global VNet peering** connects Azure virtual networks in different regions. The peered virtual networks can exist in any Azure public cloud region or China cloud regions, but not in Government cloud regions. You can only peer virtual networks in the same region in Azure Government cloud regions.
17
+
-**Global VNet peering** connects Azure virtual networks in different regions.
16
18
17
-
:::image type="content" source="../media/global-vnet-peering-2368962c.png" alt-text="Diagram with VNet1 in Region 1, and VNet2 and VNet3 in Region 2. VNet2 and VNet3 are connected with regional VNet peering. VNet1 and VNet2 are connected with a global VNet peering.":::
19
+
> [!TIP]
20
+
> Azure also supports [subnet peering](/azure/virtual-network/how-to-configure-subnet-peering), a more granular peering option. Subnet peering lets you select specific subnets to peer across virtual networks rather than peering entire address spaces.
18
21
19
22
### Benefits of virtual network peering
20
23
@@ -24,28 +27,13 @@ The benefits of using virtual network peering, whether local or global, include:
24
27
- The ability to apply network security groups in either virtual network to block access to other virtual networks or subnets.
25
28
- The ability to transfer data between virtual networks across Azure subscriptions, Microsoft Entra tenants, deployment models, and Azure regions.
26
29
- The ability to peer virtual networks created through the Azure Resource Manager.
27
-
- The ability to peer a virtual network created through Resource Manager to one created through the classic deployment model.
28
30
- No downtime to resources in either virtual network is required when creating the peering, or after the peering is created.
29
31
30
-
31
-
32
-
## Configure VNet Peering
33
-
34
-
Here are the steps to configure VNet peering. Notice you need two virtual networks. To test the peering, you need a virtual machine in each network. Initially, the VMs won't be able to communicate, but after peering the communication works.
35
-
36
-
1. Create two virtual networks.
37
-
2.**Peer the virtual networks**.
38
-
3. Create virtual machines in each virtual network.
39
-
4. Test the communication between the virtual machines.
40
-
41
-
> [!NOTE]
42
-
> When you add a peering on one virtual network, the second virtual network configuration is automatically added.
43
-
44
32
### Gateway Transit and Connectivity
45
33
46
34
You can configure a VPN gateway in the peered virtual network as a [gateway transit](/azure/vpn-gateway/vpn-gateway-peering-gateway-transit) point. In this case, a peered virtual network uses the remote gateway to gain access to other resources. A virtual network can have only one gateway. Gateway transit is supported for both VNet Peering and Global VNet Peering.
47
35
48
-
Gateway Transit allows the virtual network to communicate to resources outside the peering. For example, the subnet gateway could:
36
+
For example, the subnet gateway could:
49
37
50
38
- Use a site-to-site VPN to connect to an on-premises network.
51
39
- Use a VNet-to-VNet connection to another virtual network.
@@ -59,4 +47,4 @@ In these scenarios, gateway transit allows peered virtual networks to share the
59
47
> Network security groups can be applied in either virtual network to block access to other virtual networks or subnets.
Copy file name to clipboardExpand all lines: learn-pr/wwl-azure/introduction-to-azure-virtual-networks/index.yml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ metadata:
5
5
prefetch-feature-rollout: true
6
6
title: Introduction to Azure Virtual Networks
7
7
description: "In this module, you learn how to design and implement Azure networking services. You learn about virtual networks, public and private IPs, DNS, virtual network peering, routing, and Azure Virtual NAT."
0 commit comments