Notes from MS Learn AZ-700 Module 1: Introduction to Azure Virtual Networks – Unit 3: Configure Public IP Services
To allow public networks such as the internet to communicate with Azure resources you must use a public IP in use along with the private Azure IP.
A public IP in Azure is dedicated to a specific resource. Resources without public IP’s can communicate outbound through NAT with a non-dedicated IP
Azure Resource Manager is where a Public IP has it’s own properties. Example resources that can be assigned a Public IP:
VM Interfaces
VM Scale Sets
Public Load Balancers
VPN Gateways
NAT Gateways
App Gateways
Azure FW
Bastion Hosts
Route Servers
Public IP’s can be either IPv4 or IPv6 of different types:
Dynamic Public IP
Assigned automatically for example when VM created or started
Released automatically for example when VM stopped or deleted
Default allocation method within region
Static Public IP
Assigned and doesn’t change
Set allocation method to static
Released only when resource deleted or Allocation method changed to dynamic
SKU Table: Taken from MS Learn
Public IP address
Standard
Basic
Allocation method
Static
For IPv4: Dynamic or Static; For IPv6: Dynamic.
Idle Timeout
Have an adjustable inbound originated flow idle timeout of 4-30 minutes, with a default of 4 minutes, and fixed outbound originated flow idle timeout of 4 minutes.
Have an adjustable inbound originated flow idle timeout of 4-30 minutes, with a default of 4 minutes, and fixed outbound originated flow idle timeout of 4 minutes.
Security
Secure by default model and be closed to inbound traffic when used as a frontend. Allow traffic with network security group (NSG) is required (for example, on the NIC of a virtual machine with a Standard SKU Public IP attached).
Open by default. Network security groups are recommended but optional for restricting inbound or outbound traffic
Availability zones
Supported. Standard IPs can be nonzonal, zonal, or zone-redundant. Zone redundant IPs can only be created in regions where there are three availability zones.
Not supported.
Routing preference
Supported to enable more granular control of how traffic is routed between Azure and the Internet.
Not supported.
Global tier
Supported via cross-region load balancers.
Not supported.
Create a Public IP Address Prefix:
Public IP Prefixes are assigned from a pool in an Azure Region
Specify name and prefix size
IPv4 or IPv6
In Availability Zones: create as zone-redundant or associate with specific availability zone
After prefix is created you can create public IP addresses
Custom IP Address Prefix (BYOIP)
Used the same was as Azure owned public IP address prefixes
Can be associated with Azure resources, interact with internal/private Ips and VNets, as well as reach external destinations outbound from Azure WAN
Notes from MS Learn AZ-700 Module 1: Introduction to Azure Virtual Networks – Unit 2: Explore Azure Virtual Networks
Overview:
Azure Virtual Networks = VNets
Mimic on-premises networks with Azure infrastructure benefits such as scale, availability, and isolation
VNets have their own CIDR and can be linked to other Vnets and on-prem networks as long as they don’t overlap.
Vnets offer control of DNS server settings and segmentation in to subnets
Capabilities:
Communication with internet by default outbound
Inbound requires assigning a public IP or public Load Balancer which can also be used for outbound connections
Communication between Azure resources
VNets
VNet service endpoints
VNet peering
Can connect not just to VM’s but also Azure resources such as:
App Service. Environment
Azure Kubernetes Service
Azure Virtual Machine Scale Sets
Service Endpoints can connect to Azure resource types such as:
Azure SQL database
Azure storage accounts
Communication between on-prem resources
Extend using Point-to-site VPN
Azure ExpressRoute
Filter network traffic
Network security groups
Network virtual appliances
Routing network traffic
Azure routes between subnets, connected virtual networks, on-prem networks, and internet by default.
Create route tables or BGP routes to override the default Azure created routes
VNET Design Conderations:
Create multiple virtual networks per region per subscription. Multiple subnets within each VNet
Virtual Networks:
Use RFC 1918 rages
10.0.0.0-10.255.255.255 (10/8)
172.16.0.0-172.31.255.255 (172.16/12)
192.168.0.0-192.168.255.255 (192.168/16)
Additional Ranges
224.0.0.0/4 (Multicast)
255.255.255.255/32 (Broadcast)
127.0.0.0/8 (Loopback)
169.254.0.0/16 (Link-local)
168.63.129.16/32 (Internal DNS)
Azure assigns resources IP’s from address space provisioned. Azure reserves the first 4 and last IP.
x.x.x.0-x.x.x.3 as well as the last address is the subnet
When planning consider:
No overlapping address space with other networks
Is security isolation required
Need to mitigate IP limitations
Connections between Azure VNets and On-prem
Isolation requirements for admin purposes
Use of Azure services that create their own VNets
Subnets
Range of IP addresses in a VNet. You can segment VNet into difference size subnets within subscription limit.
Smallest supported is /29 and largest is /2.
For IPv6 must be exactly /64
Considerations:
Each subnet must have unique address range in CIDR format
Certain Azure services require their own subnet
Can be used for traffic management
Can limit access to Azure resources to specific subnets with virtual network service endpoint. Can create multiple subnets and enable service endpoint for some subnets and not others.
Azure resource types have a scope that defines level resource must be unique
Management group
Subscription
Resource group
Resource
Regions and Subscriptions:
Resource can only be created in a VNet that exists in the same region and subscription as the resource
You can connect VNets that exist in different subscriptions and regions
Deploy as many VNets as needed up to subscription limit
Azure Availability Zones
Enables you to define unique physical locations with in a region. Zone is made up of one or more datacenters with independent power, cooling, networking.
Consider availability zones when designing Azure network and plan for services that support them.
Availability Zone categories:
Zonal services = Resources pinned to a specific zone
Zone-redundant services = Resources replicated/distributed across zones automatically.
Azure replicated across three zones for failure resiliency
Nonregional services = Service available from geographies is resilient to zone-wide outages