DEV Community

Cover image for Configure secure access to workloads with Azure virtual networking services
Samuel
Samuel

Posted on

Configure secure access to workloads with Azure virtual networking services

Create and configure virtual networks

*Networking in the digital and telecommunication environment can be described as interconnected computing devices that exchange data and share resources, and in some cases, external objects and locations. * These networked devices use a system of rules, called communications protocols, to transmit information over physical or wireless technologies. This operation is not different in a virtual environment (e.g, Cloud); however, it is called Virtual Networking

Introduction: Purpose and Objectives

Purpose

Azure virtual networking services help organizations build secure, private cloud networks that protect workloads and ensure reliable connectivity. Their main purpose is to provide network isolation, traffic filtering, and encryption to safeguard sensitive data and applications. These measures support compliance, reduce threats, and optimize performance in hybrid and cloud-native environments. With these services, you can control network traffic, integrate with on-premises systems, and monitor for anomalies to reduce risks like DDoS attacks and data breaches.

Objectives

  • Create and configure virtual networks, subnets, and IP addressing.
  • Implement network security groups (NSGs) and Azure Firewall for traffic control.
  • Set up DNS zones and records for reliable name resolution.
  • Establish secure connectivity options like peering, VPN, or ExpressRoute.
  • Apply best practices for Zero Trust security, segmentation, and monitoring.
  • Validate configurations through hands-on deployment and testing.
  • These objectives align with Microsoft Applied Skills credentials and demonstrate your ability to secure workloads effectively.

Overview of Azure Virtual Networking Services

Azure networking services provide essential tools for secure connectivity, management, and protection of workloads. Key services include:

- Azure Virtual Network (VNet): A logically isolated network in Azure, supporting subnets, IP addressing, and integration with security features.
***- Network Security Groups (NSGs):
* Act as virtual firewalls, filtering traffic based on rules (source/destination IP, port, protocol).
- Azure Firewall: A managed, cloud-native firewall for centralized policy enforcement, FQDN filtering, and threat intelligence.
- Azure DNS: Provides public and private DNS hosting for domain resolution within VNets.
- Azure Bastion: Enables secure RDP/SSH access to VMs without public IPs.
- Private Link: Secures access to PaaS services via private endpoints.
- VPN Gateway and ExpressRoute: Facilitate encrypted or private connections to on-premises networks.
- Load Balancer and Application Gateway: Distribute traffic securely with Layer 4/7 capabilities.
- DDoS Protection: Mitigates volumetric attacks.

- Network Watcher and Azure Monitor: Provide diagnostics, logging, and insights.

These services support a Zero Trust model by granting access based on identity, device, and context, helping protect workloads from both external and internal threats.

This professional article provides a comprehensive guide to configuring secure access to workloads using Azure virtual networking services. Drawing from official Microsoft documentation, it covers objectives, purpose, key components, deployment procedures, guidelines, and detailed tutorials. The content progresses from foundational concepts to advanced configurations, ensuring secure, efficient, and scalable access to Azure resources.

Now, to show the reality of all the above explanations, I will be taking you through a few steps of a hands-on procedure to; Configure secure access to workloads with Azure virtual networking services. i will break it down into sessions of series of configurations for the deployment

Session 1

Create and configure virtual networks

Scenario
__Your organization is migrating a web-based application to Azure. Your first task is to put in place the virtual networks and subnets. You also need to securely peer the virtual networks. You identify these requirements.

Two virtual networks are required: app-vnet and hub-vnet. This simulates a hub and spoke network architecture.
The app-vnet will host the application. This virtual network requires two subnets. The frontend subnet will host the web servers. The backend subnet will host the database servers.
The hub-vnet only requires a subnet for the firewall.
The two virtual networks must be able to communicate with each other securely and privately through virtual network peering.
Both virtual networks should be in the same region._
_
Skilling tasks

  • _Create a virtual network.
  • _Create a subnet.
  • Configure vnet peering.

Create hub and spoke virtual networks and subnets

An Azure virtual network enables many types of Azure resources to securely communicate with each other, the internet, and on-premises networks. All Azure resources in a virtual network are deployed into subnets within the virtual network.

Sign in to the Azure portal - https://portal.azure.com.

Search for and select Virtual Networks.
from the Azure search button, search & select Virtual Network

Select + Create and complete the configuration of the app-vnet. This virtual network requires two subnets, frontend and backend.

Configuration properties

Click on Create

Create a new Resource group and fill-in other parameters under

on IP Address tab.

  • Edit Virtual Network IP Address space, and validate it, create Subnets, and name it. Enter Vnet name, validate the subnet IP

The Subnet can equally be created after the Virtual Network deployment as well.

Now, let us add the backend subnet according to the scenario,

Click on Add Subnet and enter the subnet name, edit the IP address column, and add.
Enter the subnet name and edit IP Address

Review all properties of the subnets and now create.
Review and create.
Click on create

Deployment successfulVirtual Network and subnets deployed successfully.

Note...
Two subnets will not have the same IP address, which will create an "overlapping" of the two subnets and cause a conflict in the subnet communication, just as the way it occurs in our normal traditional premises network IP-conflict. so, we need to ensure this does not occur.

Create the Hub-vnet virtual network configuration. This virtual network has the firewall subnet.

Configuration properties
Configuration properties

Create a NEW Virtual Network

Edit to change the Subnet purpose

Edit subnet, save and review & create.
Edit subnet, save and review & create.

Click Create. Create.

Verify your virtual networks and subnets were deployed.
hub-Vnet deployed successfully
Another Network was deployed successfully.

***Configure a peer relationship between the virtual networks


Virtual network peering enables you to seamlessly connect two or more Virtual Networks in Azure.

  • Search for and select the app-vnet virtual network.
  • In the Settings blade, select Peerings.

Click

  • Add a peering between the two virtual networks.Properties and value

Enter peering setting values
complete peering setting and click Add

Subnet peering completed successfully

================================================================

Top comments (0)