DEV Community

Avesh
Avesh

Posted on

AZ-104: Configure and Manage Virtual Networks for Azure Administrators

Image description
AZ-104 is the certification exam for Microsoft Azure administrators. One of the key skills required for this exam is the ability to configure and manage virtual networks (VNet) in Azure. Virtual networks are crucial for creating a secure and efficient infrastructure in Azure, enabling administrators to control traffic, connect services, and manage network resources.

This article provides a detailed overview of configuring and managing virtual networks (VNets) in Azure to help you succeed in the AZ-104 exam.

Table of Contents:

  1. What is a Virtual Network (VNet)?
  2. Creating and Configuring a Virtual Network
  3. Subnets
  4. Network Security Groups (NSGs)
  5. Azure Virtual Network Peering
  6. VNet-to-VNet and Site-to-Site VPNs
  7. ExpressRoute
  8. Load Balancing in Azure
  9. Azure DNS
  10. Best Practices and Exam Tips

1. What is a Virtual Network (VNet)?

A Virtual Network (VNet) in Azure is a logical isolation of the Azure cloud dedicated to your subscription. It enables Azure resources, like Virtual Machines (VMs), to securely communicate with each other, the internet, or on-premises networks.

Key Features:

  • Full control over the IP address space.
  • Subnets to divide the VNet.
  • Network Security Groups (NSGs) for traffic filtering.
  • VNet peering to connect VNets.
  • Connectivity options for on-premises networks (VPN, ExpressRoute).

Benefits of VNets:

  • Isolation: Each VNet is isolated from other VNets unless you explicitly connect them.
  • Security: You can apply network security measures such as firewalls, NSGs, and Azure DDoS Protection.
  • Flexibility: VNets allow for custom IP addressing, subnets, and segmentation.

2. Creating and Configuring a Virtual Network

To create and configure a Virtual Network in Azure, follow these steps:

  1. Create a Virtual Network:

    • Go to the Azure Portal.
    • Search for Virtual Networks in the search bar.
    • Click on Create and select the resource group, name, and region for your VNet.
    • Define the Address space (e.g., 10.0.0.0/16) which specifies the range of IP addresses your VNet will use.
  2. Configuring Subnets:

    • Within your VNet, create one or more subnets (smaller ranges of IPs) to divide your network logically.
    • Each subnet can host resources like VMs, Azure Kubernetes Service (AKS), or databases.
  3. Configuring Security:

    • After creating your VNet and subnets, you can associate Network Security Groups (NSGs) with your subnets to control inbound and outbound traffic.

3. Subnets

A subnet is a segment of the VNet where resources are deployed. Each subnet has its own range of IP addresses, which is part of the overall VNet address space.

Key Concepts:

  • IP Addressing: Each subnet uses a portion of the VNet’s IP address range (e.g., 10.0.1.0/24).
  • Subnet Segmentation: Segments resources within the VNet to isolate them based on functionality (e.g., front-end and back-end services).
  • Subnet Security: Each subnet can have its own Network Security Groups (NSGs) for traffic filtering.

4. Network Security Groups (NSGs)

Network Security Groups (NSGs) are used to control network traffic to and from Azure resources within a VNet. NSGs contain a list of security rules that allow or deny inbound or outbound traffic based on IP addresses, ports, and protocols.

Key Features:

  • Inbound and Outbound Rules: NSGs control traffic in both directions.
  • Prioritization: Rules are applied based on priority (lowest number wins).
  • Stateful Filtering: If inbound traffic is allowed, the corresponding outbound traffic is automatically allowed.

Example Scenario:

  • You have a subnet that hosts a web application. You can configure NSGs to allow inbound HTTP (port 80) and HTTPS (port 443) traffic, while blocking all other traffic.

5. Azure Virtual Network Peering

VNet Peering allows you to connect two VNets, enabling traffic to flow between them as if they are on the same network. This connection is private and uses Microsoft’s backbone network.

Key Benefits:

  • Low Latency: Communication between peered VNets is high-speed with minimal latency.
  • Cross-Region Peering: VNets in different regions can be peered, allowing global connectivity.
  • No Overlapping IPs: Ensure that VNets being peered do not have overlapping IP ranges.

Scenario:

  • You have multiple VNets for different teams or environments (e.g., development and production), and you want them to communicate securely. VNet peering enables seamless connectivity.

6. VNet-to-VNet and Site-to-Site VPNs

VNet-to-VNet VPN allows VNets to connect across different Azure regions or subscriptions via a secure IPsec VPN tunnel.

Site-to-Site VPN enables on-premises networks to connect securely to Azure VNets, creating a hybrid cloud environment.

Key Features:

  • Encryption: Secure tunnels using the IPsec protocol.
  • Gateway Subnets: A dedicated subnet (gateway subnet) is required for creating VPN gateways.
  • Azure VPN Gateway: Acts as the endpoint for VPN connections.

Example:

  • A company has an on-premises data center and an Azure VNet. By configuring a Site-to-Site VPN, they can securely extend their network to Azure, allowing for hybrid workloads.

7. ExpressRoute

ExpressRoute provides a private, dedicated connection between your on-premises infrastructure and Azure, bypassing the public internet. It is ideal for mission-critical workloads that require high performance and reliability.

Key Benefits:

  • High Throughput: Offers greater bandwidth (up to 100 Gbps).
  • Low Latency: Provides a more consistent and lower-latency connection.
  • Security: No data travels over the public internet, enhancing security.

Example:

  • A financial institution uses ExpressRoute to securely connect its data centers to Azure for hosting sensitive data and applications.

8. Load Balancing in Azure

Azure offers several options for distributing traffic across multiple resources, ensuring high availability and scalability.

Types of Load Balancers:

  • Azure Load Balancer: Distributes inbound traffic to VMs across availability zones or regions.
  • Application Gateway: A Layer 7 load balancer that supports SSL termination, URL-based routing, and Web Application Firewall (WAF).
  • Traffic Manager: Uses DNS to route traffic to the best-performing endpoint based on latency, geographic location, or failover.

Example:

  • A web application hosted on multiple VMs can use the Azure Load Balancer to distribute traffic and ensure availability, while Application Gateway handles SSL termination and WAF for enhanced security.

9. Azure DNS

Azure DNS allows you to host your domain names in Azure and manage DNS records for your services.

Key Features:

  • Private DNS Zones: Allows DNS resolution within a VNet without exposing DNS records to the public internet.
  • Public DNS Zones: Manage DNS for publicly accessible resources (e.g., websites).
  • Integration with Azure Resources: DNS zones are natively integrated with Azure VNets and other Azure services.

Scenario:

  • You host an internal application that requires DNS resolution within your Azure environment. A Private DNS Zone enables secure name resolution without exposing it externally.

10. Best Practices and Exam Tips

  • Plan IP Addressing Carefully: Ensure that your VNets and subnets have well-planned, non-overlapping IP address spaces.
  • Use Network Security Groups (NSGs): Apply NSGs to subnets or individual resources to enforce security and traffic filtering.
  • Monitor Traffic with Network Watcher: Utilize Azure Network Watcher to monitor, diagnose, and view logs for your VNets.
  • VNet Peering: Use VNet peering for efficient cross-VNet communication and avoid performance bottlenecks.
  • Leverage ExpressRoute for Critical Workloads: Use ExpressRoute for workloads that require high security and bandwidth.

Exam Tips:

  • Be familiar with creating, configuring, and managing VNets in the Azure portal, CLI, and PowerShell.
  • Understand key concepts like NSGs, peering, and VPNs, and know how to implement them.
  • Practice subnetting and designing network architectures.
  • Review different VPN configurations (VNet-to-VNet, Site-to-Site) and their use cases.

Conclusion

Configuring and managing virtual networks is a fundamental skill for Azure administrators, and mastering this topic is essential for passing the AZ-104 certification exam. VNets form the backbone of network infrastructure in Azure, enabling secure communication, resource management, and connectivity to on-premises environments. By understanding how to create, configure, and manage VNets, you’ll be well-prepared for real-world tasks and the AZ-104 exam.

Top comments (0)