Skip to content

Commit c96b7a1

Browse files
Merge pull request #53952 from Rob-Barefoot/rb-networking
initial push
2 parents 5e6db00 + 9880dbc commit c96b7a1

25 files changed

Lines changed: 456 additions & 0 deletions
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-networking-services.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: "Introduction"
7+
ms.date: 03/06/2026
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
durationInMinutes: 1
14+
content: |
15+
[!include[](includes/1-introduction.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-networking-services.virtual-network
3+
title: Describe Azure virtual networking
4+
metadata:
5+
title: Describe Azure virtual networking
6+
description: "Describe Azure virtual networking"
7+
ms.date: 09/20/2024
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/2-virtual-network.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-networking-services.virtual-private-networks
3+
title: Describe Azure virtual private networks
4+
metadata:
5+
title: Describe Azure virtual private networks
6+
description: "Describe Azure virtual private networks"
7+
ms.date: 09/20/2024
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
durationInMinutes: 5
14+
content: |
15+
[!include[](includes/3-virtual-private-networks.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-networking-services.expressroute
3+
title: Describe Azure ExpressRoute
4+
metadata:
5+
title: Describe Azure ExpressRoute
6+
description: "Describe Azure ExpressRoute"
7+
ms.date: 09/20/2024
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
durationInMinutes: 4
14+
content: |
15+
[!include[](includes/4-expressroute.md)]
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-networking-services.domain-name-system
3+
title: Describe Azure DNS
4+
metadata:
5+
title: Describe Azure DNS
6+
description: "Describe Azure DNS"
7+
ms.date: 09/20/2024
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
durationInMinutes: 3
14+
content: |
15+
[!include[](includes/5-domain-name-system.md)]
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-networking-services.knowledge-check
3+
title: Module assessment
4+
metadata:
5+
title: Module assessment
6+
description: "Knowledge check"
7+
ms.date: 03/06/2026
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
module_assessment: true
14+
durationInMinutes: 4
15+
content: |
16+
[!include[](includes/6-knowledge-check.md)]
17+
quiz:
18+
title: "Check your knowledge"
19+
questions:
20+
- content: "Which Azure networking feature lets you divide a virtual network into smaller logical segments?"
21+
choices:
22+
- content: "Subnets"
23+
isCorrect: true
24+
explanation: "Subnets segment an Azure virtual network into smaller address ranges that you can use to organize and secure resources."
25+
- content: "Availability sets"
26+
isCorrect: false
27+
explanation: "Availability sets are used with virtual machines for resiliency, not for virtual network segmentation."
28+
- content: "Resource locks"
29+
isCorrect: false
30+
explanation: "Resource locks protect resources from deletion or modification, but they don't segment network address space."
31+
- content: "If a company needs private, predictable connectivity between an on-premises datacenter and Azure, which service is the best fit?"
32+
choices:
33+
- content: "Azure ExpressRoute"
34+
isCorrect: true
35+
explanation: "ExpressRoute provides private connectivity to Azure without sending traffic over the public internet."
36+
- content: "Azure Front Door"
37+
isCorrect: false
38+
explanation: "Azure Front Door is an application delivery and acceleration service, not a private on-premises connectivity service."
39+
- content: "Azure Load Balancer"
40+
isCorrect: false
41+
explanation: "Azure Load Balancer distributes traffic within Azure workloads, but it doesn't provide dedicated private connectivity from on-premises sites."
42+
- content: "Which VPN gateway type is recommended in Azure for connections between virtual networks and for multisite scenarios?"
43+
choices:
44+
- content: "Route-based VPN gateway"
45+
isCorrect: true
46+
explanation: "Route-based VPN gateways are the preferred option for virtual network-to-virtual network and multisite configurations."
47+
- content: "Policy-based VPN gateway"
48+
isCorrect: false
49+
explanation: "Policy-based gateways support specific scenarios, but route-based gateways are preferred for broader Azure connectivity patterns."
50+
- content: "Point-based VPN gateway"
51+
isCorrect: false
52+
explanation: "Point-based VPN gateway isn't an Azure gateway type."
53+
- content: "What is a primary benefit of Azure DNS?"
54+
choices:
55+
- content: "You can manage DNS records using Azure credentials and tools"
56+
isCorrect: true
57+
explanation: "Azure DNS integrates with Azure Resource Manager, so you manage DNS records with the same credentials, APIs, and tools used for other Azure resources."
58+
- content: "It provides a built-in domain registrar for all domains"
59+
isCorrect: false
60+
explanation: "Azure DNS hosts and manages DNS records, but it doesn't replace all domain registration services."
61+
- content: "It removes the need for all network security controls"
62+
isCorrect: false
63+
explanation: "Azure DNS helps with name resolution and DNS management, but network security controls are still required."
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.describe-azure-networking-services.summary
3+
title: Summary
4+
metadata:
5+
title: Summary
6+
description: "Summary"
7+
ms.date: 03/06/2026
8+
author: wwlpublish
9+
ms.author: robbarefoot
10+
ms.topic: unit
11+
ms.custom:
12+
- N/A
13+
durationInMinutes: 2
14+
content: |
15+
[!include[](includes/7-summary.md)]
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
This module introduces Azure networking services that help you connect, secure, and route traffic between resources. You explore foundational capabilities for communication within Azure, between Azure and on-premises environments, and across internet-connected clients.
2+
3+
## Learning objectives
4+
5+
After completing this module, you'll be able to:
6+
7+
- Describe Azure virtual networking, including subnets and endpoints.
8+
- Describe connectivity options with Azure VPN Gateway.
9+
- Describe when to use Azure ExpressRoute.
10+
- Describe Azure DNS capabilities.
11+
- Configure basic network access for an Azure resource.
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
Azure virtual networks and virtual subnets enable Azure resources, such as VMs, web apps, and databases, to communicate with each other, with users on the internet, and with your on-premises client computers. You can think of an Azure network as an extension of your on-premises network with resources that link other Azure resources.
2+
3+
Azure virtual networks provide the following key networking capabilities:
4+
5+
- Isolation and segmentation
6+
- Internet communications
7+
- Communicate between Azure resources
8+
- Communicate with on-premises resources
9+
- Route network traffic
10+
- Filter network traffic
11+
- Connect virtual networks
12+
13+
Azure virtual networking supports both public and private endpoints to enable communication between external or internal resources with other internal resources.
14+
15+
- Public endpoints have a public IP address and can be accessed from anywhere in the world.
16+
- Private endpoints exist within a virtual network and have a private IP address from within the address space of that virtual network.
17+
18+
## Isolation and segmentation
19+
20+
Azure Virtual Network lets you create multiple isolated virtual networks. When you set up a virtual network, you define a private IP address space by using either public or private IP address ranges. The IP range only exists within the virtual network and isn't internet routable. You can divide that IP address space into subnets and allocate part of the defined address space to each named subnet.
21+
22+
For name resolution, you can use the name resolution service built into Azure. You also can configure the virtual network to use either an internal or an external DNS server.
23+
24+
## Internet communications
25+
26+
You can enable incoming connections from the internet by assigning a public IP address to an Azure resource, or putting the resource behind a public load balancer.
27+
28+
## Communicate between Azure resources
29+
30+
Azure resources can communicate securely with each other in one of two ways:
31+
32+
- Virtual networks can connect not only VMs but other Azure resources, such as the App Service Environment for Power Apps, Azure Kubernetes Service, and Azure virtual machine scale sets.
33+
- Service endpoints can connect to other Azure resource types, such as Azure SQL databases and storage accounts. This approach lets you link multiple Azure resources to virtual networks to improve security and provide optimal routing between resources.
34+
35+
## Communicate with on-premises resources
36+
37+
Azure virtual networks let you link resources together in your on-premises environment and within your Azure subscription. In effect, you can create a network that spans both your local and cloud environments. There are three ways to achieve this connectivity:
38+
39+
- Point-to-site virtual private network connections are from a computer outside your environment back into your private network. In this case, the client computer initiates an encrypted VPN connection to connect to the Azure virtual network.
40+
- Site-to-site virtual private networks link your on-premises VPN device or gateway to the Azure VPN gateway in a virtual network. In effect, the devices in Azure can appear as being on the local network. The connection is encrypted and works over the internet.
41+
- Azure ExpressRoute provides a dedicated private connectivity to Azure that doesn't travel over the internet. ExpressRoute is useful for environments where you need greater bandwidth and even higher levels of security.
42+
43+
## Route network traffic
44+
45+
By default, Azure routes traffic between subnets on any connected virtual networks, on-premises networks, and the internet. You also can control routing and override those settings, as follows:
46+
47+
- Route tables let you define rules about how traffic should be directed. You can create custom route tables that control how packets are routed between subnets.
48+
- Border Gateway Protocol (BGP) works with Azure VPN gateways, Azure Route Server, or Azure ExpressRoute to propagate on-premises BGP routes to Azure virtual networks.
49+
- User-defined routes (UDR) let you control the routing tables between subnets within a virtual network or between virtual networks, giving you greater control over network traffic flow.
50+
51+
## Filter network traffic
52+
53+
Azure virtual networks let you filter traffic between subnets by using the following approaches:
54+
55+
- Network security groups are Azure resources that can contain multiple inbound and outbound security rules. You can define these rules to allow or block traffic, based on factors such as source and destination IP address, port, and protocol.
56+
- Network virtual appliances are specialized VMs that can be compared to a hardened network appliance. A network virtual appliance carries out a particular network function, such as running a firewall or performing wide area network (WAN) optimization.
57+
58+
:::image type="content" source="../media/virtual-network-filter-stack.png" alt-text="Diagram showing an inbound packet flowing through NSG security rules and then through a network virtual appliance before reaching the target VM.":::
59+
60+
## Connect virtual networks
61+
62+
You can link virtual networks together by using virtual network peering. Peering allows two virtual networks to connect directly to each other. Network traffic between peered networks is private, and travels on the Microsoft backbone network, never entering the public internet. Peering enables resources in each virtual network to communicate with each other. These virtual networks can be in separate regions, which lets you create a global interconnected network through Azure.
63+
64+
:::image type="content" source="../media/virtual-network-peering-backbone.png" alt-text="Diagram of two peered Azure virtual networks in separate regions connected over the Microsoft private backbone network.":::
65+
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
A virtual private network (VPN) uses an encrypted tunnel within another network. VPNs are typically deployed to connect two or more trusted private networks to one another over an untrusted network (typically the public internet). Traffic is encrypted while traveling over the untrusted network to prevent eavesdropping or other attacks. VPNs can enable networks to safely and securely share sensitive information.
2+
3+
## VPN gateways
4+
5+
A VPN gateway is a type of virtual network gateway. Azure VPN Gateway instances are deployed in a dedicated subnet of the virtual network and enable the following connectivity:
6+
7+
:::image type="content" source="../media/connectivity-models.png" alt-text="Diagram comparing point-to-site, site-to-site, and network-to-network VPN connectivity models, all encrypted through private tunnels.":::
8+
9+
- Connect on-premises datacenters to virtual networks through a site-to-site connection.
10+
- Connect individual devices to virtual networks through a point-to-site connection.
11+
- Connect virtual networks to other virtual networks through a network-to-network connection.
12+
13+
All data transfer is encrypted inside a private tunnel as it crosses the internet. You can deploy only one VPN gateway in each virtual network. However, you can use one gateway to connect to multiple locations, which includes other virtual networks or on-premises datacenters.
14+
15+
When setting up a VPN gateway, you must specify the type of VPN - either policy-based or route-based. The primary distinction between these two types is how they determine which traffic needs encryption. In Azure, regardless of the VPN type, the method of authentication employed is a preshared key.
16+
17+
- Policy-based VPN gateways specify statically the IP address of packets that should be encrypted through each tunnel. This type of device evaluates every data packet against those sets of IP addresses to choose the tunnel through which that packet is sent.
18+
- In route-based gateways, IPSec tunnels are modeled as a network interface or virtual tunnel interface. IP routing (either static routes or dynamic routing protocols) decides which one of these tunnel interfaces to use when sending each packet. Route-based VPNs are the preferred connection method for on-premises devices. They're more resilient to topology changes such as the creation of new subnets.
19+
20+
Use a route-based VPN gateway if you need any of the following types of connectivity:
21+
22+
- Connections between virtual networks
23+
- Point-to-site connections
24+
- Multisite connections
25+
- Coexistence with an Azure ExpressRoute gateway
26+
27+
## High-availability scenarios
28+
29+
If you're configuring a VPN to keep your information safe, you also want to make sure it's a highly available and fault-tolerant VPN configuration. There are a few ways to maximize the resiliency of your VPN gateway.
30+
31+
### Active/standby
32+
33+
:::image type="content" source="../media/active-standby.png" alt-text="Diagram showing an active-standby VPN gateway pair where the standby instance takes over during failover.":::
34+
35+
By default, VPN gateways are deployed as two instances in an active/standby configuration, even if you only see one VPN gateway resource in Azure. When planned maintenance or unplanned disruption affects the active instance, the standby instance automatically assumes responsibility for connections without any user intervention. Connections are interrupted during this failover, but they're typically restored within a few seconds for planned maintenance and within 90 seconds for unplanned disruptions.
36+
37+
### Active/active
38+
39+
:::image type="content" source="../media/active-active.png" alt-text="Diagram showing an active-active VPN gateway configuration with BGP routing and dual tunnels.":::
40+
41+
With the introduction of support for the BGP routing protocol, you can also deploy VPN gateways in an active/active configuration. In this configuration, you assign a unique public IP address to each instance. You then create separate tunnels from the on-premises device to each IP address. You can extend the high availability by deploying an additional VPN device on-premises.
42+
43+
### ExpressRoute failover
44+
45+
Another high-availability option is to configure a VPN gateway as a secure failover path for ExpressRoute connections. ExpressRoute circuits have resiliency built in. However, they aren't immune to physical problems that affect the cables delivering connectivity or outages that affect the complete ExpressRoute location. In high-availability scenarios, where there's risk associated with an outage of an ExpressRoute circuit, you can also provision a VPN gateway that uses the internet as an alternative method of connectivity. In this way, you can ensure there's always a connection to the virtual networks.
46+
47+
### Zone-redundant gateways
48+
49+
:::image type="content" source="../media/zone-redundant.png" alt-text="Diagram showing a zone-redundant VPN gateway deployed across availability zones.":::
50+
51+
In regions that support availability zones, VPN gateways and ExpressRoute gateways can be deployed in a zone-redundant configuration. This configuration brings resiliency, scalability, and higher availability to virtual network gateways. Deploying gateways in Azure availability zones physically and logically separates gateways within a region while protecting your on-premises network connectivity to Azure from zone-level failures. These gateways require different gateway stock keeping units (SKUs) and use Standard public IP addresses instead of Basic public IP addresses.
52+

0 commit comments

Comments
 (0)