Category: Networking
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-exercise-restrict-network-access-to-paas-resources-with-virtual-network-service-endpoints-using-the-azure-portal/
Reading Time: 2 minutes
Notes from MS Learn AZ-700 Module 6: Design and implement network security – Unit 4: Integrate Private Endpoint with Domain Name Service
Private DNS zones typically hosted in same subscription where hub VNet deployed. Central hosting practice is recommended for cross-premises DNS resolution. Most cases – only networking and identity admins have permissions to manage DNS records
- Azure Private Endpoint DNS Configuration
- Below diagram show typical high-level architecture for enterprise env with central DNS.
- Name resolution for Private Link resources done via Azure Private DNS
- (Image taken from MS Learn)
- Highlights of diagram
- On-prem DNS servers have conditional forwarders configured for each Private Endpoint
- DNS servers in hub VNet use Azure DNS resolver as forwarder
- All VNets have DNS forwarders configured as primary/secondary DNS servers
- DNS records follow lifecycle of Private Endpoint
- Significance of IP Addr 168.63.129.16
- VIP (public) that facilitates communication channel to Azure platform resources
- Enables VM Agent to communicate with Azure platform to signal that it is in a “Ready” state
- Enables communication with DNS virtual server providing filtered name resolution – Filtering ensures customers can resolve only hostnames to their resources
- Enables health probes from load balancer to determine health state of VMs
- Enables VMs to obtain dynamic IP addr from DHCP service in Azure
- Enables heartbeat messages for PaaS role
- DNS Configuration Scenarios
- FQDN of services resolves automatically to public IP. To resolve to private IP of Private Endpoint, change the DNS config
- DNS is critical component to make app work correctly by successful resolution of Private Endpoint IP
- Based on prefs follow these scenarios (taken from MS Learn site)
- On-prem workloads using DNS forwarder
- For on-prem workloads to resolve FQDN of Private Endpoint use DNS forwarder to resolve Azure service public DNS zone
- A DNS forwarder is VM running on VNet linked to Private DNS Zone
- Query must be originated from VNet to Azure DNS
- Proxy options include
- Windows DNS
- Linux DNS
- Azure FW
- Diagram below illustrates DNS resolution sequence from on-prem
- Configuration uses DNS forwarder in Azure
- Resolution made by private DNS zone linked to VNet
- (Image taken from MS Learn)
- Configuration needs
- On-prem network
- VNet connected to on-prem
- DNS forwarder in Azure
- Private DNS zones privatelink.database.windows.net with A record
- Private Endpoint info (FQDN record name with private IP)
- Virtual Network and On-prem workloads using Azure DNS Private Resolver
- When using DNS Private Resolver – you don’t need DNS forwarder VM.
- Azure DNS is able to resolve on-prem domain names
- Below diagram uses DNS Private Resolver in hub-spoke topo
- Best practice: Azure landing zone design pattern recommends using this type of topo
- Hybrid net connection established using Azure ExpressRoute and FW
- Provides secure hybrid network
- DNS Private Resolver is deployed in hub network
- (Image taken from MS Learn)
- Reference Links taken from MS Learn
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-integrate-private-endpoint-with-domain-name-service/
Reading Time: 2 minutes
Notes from MS Learn AZ-700 Module 6: Design and implement network security – Unit 3: Define Private Link Service and Private Endpoint
- What is Azure Private Link
- Azure Private Link enables access to Azure PaaS Services and Azure hosted customer-owned/partner services over Private Endpoint in VNet
- Private Link is designed to remove public part of connection
- Provides secure access to Azure Services achieved by replacing resource public endpoint with a private NIC
- Key considerations for this architecture
- Azure resource becomes part of your VNet
- Connection to resource uses Microsoft Azure backbone instead of public INET
- Can configure Azure resource to no longer expose its public IP
- What is Azure Private Endpoint
- Key technology behind Private Link
- NIC that enables a private/secure connection between VNet and Azure service
- NIC that replaces resources public endpoint
- Provides secure access to Azure services
- Replaces resource public endpoint with private NIC
- How is Azure Private Endpoint different from service endpoint
- Grants network access to specific resource behind given service providing granular segmentation
- Traffic can reach service resource from on-prem without using public endpoints
- Service endpoint remains publicly routable
- Private endpoint is private IP in address space of VNet where configured
- What is Azure Private Link Service
- Gives private access from Azure VNet to PaaS services and MS Partner services in Azure. What is org has its own Azure services. Is it possible to offer those customer a private connection to orgs services
- Yes with Private Link Service
- Lets you offer Private Link connections to custom Azure services
- Consumers of custom service can access them privately without going over INET from their own VNets
- Private Link service is reference to own service powered by Private Link
- Service is running behind Azure standard load balancer can be enable for Private Link access
- Customers can create private endpoint inside their VNet and map to this service
- Private Link service receives connections from multiple private endpoints.
- Private endpoint connects to 1 Private Link services
- Private Endpoint Properties
- Considerations
- Unique name with resource group
- Subnet to deploy/allocate private IP addresses from VNet
- Private Link resource to connect using resource ID/Alias from list of available types – A unique network identifier is generated for all traffic sent to resource
- The subresource to connect – each private link resource type has diff options to select based on pref
- Automatic or manual connection approval method – based on Azure role-based access control (RBAC) Private Endpoint can be approved automatically.
- For manual method of above, owner of resource approves connections
- Only Private Endpoints in approved state used to send traffic
- Additional Considerations
- Clients initiate net connections. Only established in single direction
- Private Endpoint has read-only NIC. Interface assigned dynamically from subnet that maps to Private Link resource – remains unchanged for lifecycle of Private Endpoint
- Must be deployed in same region and subscription of VNet
- Private Link can be deployed in diff region than VNet of Private Endpoint
- Multiple Private Endpoints can be created using same Private Link
- Multiple Private Endpoints can be created on same or diff subnets within same VNet
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-define-private-link-service-and-private-endpoint/
Reading Time: 3 minutes
Notes from MS Learn AZ-700 Module 7: Explain Virtual Network Service Endpoints
Think your org migrates existing ERP app with DB server to Azure VMs. Now, you consider Azure platform as a service in Azure for cost/admin requirements. Storage services hold large file assets. These engineering diagrams have proprietary info and must remain secure from unauthorized access. Must be only accessible from specific systems
- What is a virtual network service endpoint
- VNet service endpoint provides secure and direct connectivity to Azure services. Service endpoints allow you to secure critical Azure service resources to only your VNets. Service Endpoints enables private IP addrs in the VNet to reach the endpoint of an Azure service without needing a public IP
- By default, Azure services are designed for DIA. All Azure resources have public Ips including PaaS services such as Azure SQL and Storage. Since explosed to INET potential for anyone to access Azure services
- Service endpoints can connect certain PaaS services directly to private address space in Azure
- Service endpoints use private space to access PaaS services directly
- Adding service endpoints doesn’t remove public endpoint but provides a redirect of traffic
- Preparing to Implement Service Endpoints
- Two required steps
- Turn off public access to service
- Add Service Endpoint to VNet
- When enabling Service Endpoint traffic flow is restricted and Azure VMs are enabled directly from private addr space
- Devices cannot access service from public network
- VM vNIC Service Endpoint becomes Next Hop Type
- Example route table before enabling Service Endpoint (Table below from MS Learn)
- Example route table after adding 2 Service Endpoints to VNet (Table below from MS Learn)
- All traffic for service now routed to VNet Service Endpoint and remains inside Azure
- Create Service Endpoints
- Planning to move sensitive diagram into Azure Storage. File must only be accessible from computers inside corp network. You want to create a VNet Service Endpoint for Azure Storage to secure connectivity to storage accounts
- Steps
- Enable service endpoint on a subnet
- Use network rules to restrict access to Azure Storage
- Create a virtual network service endpoint for Azure Storage
- Verify access is denied appropriately
- Configure service tags
- Service tag represents group of IP prefixes from a given Azure service. MS manages prefixes encompassed by service tag automatically updating addrees minimizing complexity of frequent updates to network security rules
- You can use service tags to define network access controls on network security groups or FW
- Use service tags in place of specific IP’s when creating security rules
- Specifying service tag name (e.g. API Management) in appropriate SRC/DST of rule allows or denies traffic for service
- As of March 2021 Service Tags can be used in place of IP ranges in user defined routes. Currently in Public Preview
- Use service tags to achieve network isolation and protect Azure resources from general Internet while accessing Azure services that have public endpoints
- Create In/Out network security group rules for deny to/from INET and allow to/from AzureCloud or other specific Azure services
- Available service tags
- Follow this MS Table for all service tags available for use in NSG rules. Columns define whether tag
- Is suitable for rules that cover in/outbound traffic
- Supports regional scope
- Is usable in FW rules
- By default, service tags are for entire cloud
- Some tags also allow more granular control via restricting IP ranges to specific region
- Service tags of Azure services denote prefixes from specific cloud being used
- If implementing VNet service endpoint Azure adds route to VNet subnet. Prefixes in route are same as prefixes for corresponding service tag
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-explain-virtual-network-service-endpoints/
Reading Time: < 1 minute
Notes from MS Learn AZ-700 Module 6: Design and implement network security – Unit 11: Design and Implement Network Security Module Resources
Resources are links taken from MS Learns summary page for this module
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-design-and-implement-network-security-module-resources/
Reading Time: 2 minutes
Notes from MS Learn AZ-700 Module 6: Design and implement network security – Unit 10: Implement a Web Application Firewall on Azure Front Door
Web Application Firewall (WAF) provides centralized protection of web apps from common exploits and vulnerabilities. SQL injection and Cross-site scripting are common.
Attack prevention is challenging. Can require lots of maintenance/patching/monitoring of many layers to the app. Centralized WAF aids in this. Also gives app admins better assurance to protection.
WAF can react to security threats faster by central patching instead of individual web app patching
- Web Application Firewall Policy Modes
- Two common modes
- Detection
- Default WAF policy mode
- Doesn’t block requests but logs
- Prevention
- Matching requests blocked & logged
- Web App. Firewall default rule set rule groups and rules
- Azure Front Door WAF protects web apps from common vulns and exploits. Azure-managed rule sets provide easy deployment against common sec threats. Azure rule set updated as required to protect against new signatures
- Managed Rules
- Azure managed Default Rule Set includes common categories
- Cross-site scripting
- Java attacks
- Local file inclusion
- PHP injection attacks
- Remote command execution
- Remote file inclusion
- Session fixation
- SQL injection protection
- Protocol attackers
- Enabled by default
- Disable individual rule by checkbox in front of rule and selecting Disable at top of page
- Change action types by checkbox and select Change action at top of page
- Custom Rules
- WAF with Front Door allows access to web apps on defined conditions
- Custom WAF rule consists of
- Priority
- Rule type
- Match conditions
- And action
- Two types of customer rules
- Match Rule
- Determines access based on matching conditions
- Rate Limit Rule
- Access based on matching conditions and rates of inbound requests
- When creating WAF policy, create custom rule selecting. Add Custom Rule under the Custom Rules section
- Create a Web Application Firewall Policy on Azure Front Door
- Key steps for basic WAF Policy and apply to Front Door
- Create WAF policy
- Create a basic WAF policy with managed Default Rule Set (DRS)
- Associate WAF policy with Front Door profile
- Done during WAF policy creation
- Can also be done on previously created WAF policy
- In association specify Front Door profile and domain to apply to
- Configure WAF policy settings and rules
- Optional step, can configure policy settings such as Mode (prevention/Detection and configure managed and custom rules
- Detailed steps in MS Learn page Tutorial: Create a Web Application Firewall policy on Azure Front Door using the Azure portal
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-implement-a-web-application-firewall-on-azure-front-door/
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-exercise-secure-your-virtual-hub-using-azure-firewall-manager/
Reading Time: 3 minutes
Notes from MS Learn AZ-700 Module 6: Design and implement network security – Unit 8: Secure Your Networks with Azure Firewall Manager
Azure FW Manager is a security management that provides central policy/route management for cloud-based sec perimeters.
Azure FW Manager simplifies centrally defining network and app level rules for filtering across multiple Azure FWs. Span different Azure regions and subscriptions in hub/spoke architectures for governance and protection
If managing multiple FWs it can be difficult to keep them in sync. Central IT needs a way to define base FW policies and enforce across multiple biz units. Also, DevOps want to create local derived FW policies implemented across orgs. Azure FW Manager can help solve these
- FW Manager can provide sec mgmt for 2 network arch types
- Secured Virtual Hub
- Given to any Azure Virtual WAN Hub associated with security and routing policies
- Azure Virtual WAN Hub is MS managed resource to easily create hub/spoke archs
- Hub Virtual Network
- Given to any standard Azure VNet with associated security policies
- Standard VNet is a resource created and managed yourself
- Can peer spoke VNets that contain workload servers/services
- Also manage FWs in standalone VNets that arenn’t peered to a spoke
- Azure FW Manager features
- Key Features
- Central Azure FW deployment and config
- Centrally deploy/configure multiple FW instances even if they span regions and subscriptions
- Hierarchical policies (global/local)
- Use Azure FW Manager to centrally manage FW policies across multiple secure virtual hubs
- Central IT teams can write global firewall policies to enforce org FW policy across teams
- Local authored FW polocies allow DevOps self-service model
- Integrated with third-party security-as-a-service for advanced security
- In addition to Azure FW third party providers can integrate providing extra protection for VNet and branch Inet connections
- Only available with secured virtual hub deployments
- Centralized route management
- Easily route traffic to secured hub for filtering/logging without need for User Defined Routes on spoke VNets
- Available only with secured virtual hub deployments
- Region availability
- Use Azure FW Policies across regions
- DDoS protection plan
- Associate VNets with a DDoS protection plan within FW Manager
- Manage Web App Firewall policies
- Centrally create/associate WAF policies for app delivery platforms including Front Door and App Gateway
- Azure Firewall Manager Policies
- FW policy is Azure resource that contains
- NAT
- Network rule collections
- App rule collections
- Threat Intelligence settings
- Global resource that can be used over multiple FW instances in Secured Virtual Hubs and Hub VNets
- New policies can be created from scratch or inherited
- Inheritance allows DevOps to create local FW policies on top of org mandated base policy
- Work across regions and subscriptions
- Create FW Policy and associations using FW Manager
- Can also create/manage policy using
- REST API
- Templates
- Azure PowerShell
- Azure CLI
- Once created, can associate with FW in a Virtual. WAN Hub making it a Secured Virtual Hub
- And/Or associate with FW in a standard VNet making it a Hub Virtual Network
- Deploying Azure FW Manager for Hub Virtual Networks
- Recommended Process
- Create FW Policy
- Create new
- Derived base policy and customize a local policy
- Import rules from existing FW (Ensure to remove NAT rules from policies applied across multiple FWs)
- Create hub & spoke architecture
- Create Hub Virtual Network using FW Manager and peering spoke VNets to it
- Or create VNet and add VNet connections/peering spoke VNet to peering
- Select security providers and associate FW Policy
- Currently, only Azure FW supported provider
- Create a Hub VNet or convert existing VNet to Hub Virtual Network
- Is possible to convert multiple VNets
- Configured User Defined Route
- For routing traffic to Hub VNet FW
- Deploying Azure FW Manager for Secured Virtual Hubs
- Recommended Process
- Create hub/spoke architecture
- Create Secured Virtual Hub using FW Manager and add VNet connections
- Or create Virtual WAN Hub and add VNet connections
- Select security providers
- Create a Secured Virtual Hub
- Or convert existing Virtual WAN Hub to Secure Virtual Hub
- Create FW policy and associate it with hub
- Only applicable if using Azure FW
- Third-party security-as-a-service policies are configured via partners management
- Configure route settings to route to Secured Virtual Hub
- Route to secured hub for filtering/logging without User Defined Routes on spoke VNets using Secured Virtual Hub Route Setting page
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-secure-your-networks-with-azure-firewall-manager/
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-exercise-deploy-and-configure-azure-firewall-using-the-azure-portal/
Reading Time: 3 minutes
Notes from MS Learn AZ-700 Module 6: Design and implement network security – Unit 6: Design and Implement Azure Firewall
Azure. FW is managed, cloud based security service protecting VNet resources. Fully stateful FWaaS with build-in HA and unrestricted cloud scalability.
- Azure Firewall Features
- Built-in HA
- HA so no extra load balancers required or configuration needed
- Unrestricted cloud scalability
- Azure FW can scale out as much as needed. No need to budget for peak traffic
- App FQDN filtering rules
- Limit outbound HTTP/S or Azure SQL traffic to specific list of FQDNs including wildcard
- Doesn’t require TLS term
- Net traffic filtering rules
- Centrally create allow/deny rules by
- Source/Dest IP
- Port
- Protocol
- Azure FW is fully stateful
- Rules enforced and logged across multiple subscriptions and VNets
- FQDN tags
- Make it easy to allow well-known Azure service traffic through FW
- Create an app rule and include Windows Update tag for example
- Service tags
- Represents group of IP address prefixes minimizing complexity for rule creation
- Cannot create personal service tag or specify which IP addrs included in tag
- MS manages prefixes by tag and auto updates as addrs change
- Threat intelligence
- Threat intelligence-based filtering (IDPS) possible to alert and deny traffic from/to known malicious IP/Domains
- IP addrs/domains sources from MS Threat Intelligence feed
- TLS inspection
- FW can decrypt outbound traffic, process, reqncrypt and send to DST
- Outbound SNAT support
- All outbound VNet traffic Ips translate to Azure FW public IP (Source Network Address Translatioin (SNAT))
- Identify and allow traffic originating from VNet to remote Inet DSTs
- Inbound DNAT support
- Inbound Inet traffic to FW public IP translated (Destination Network Addr Translation) filtered to. Private IP on VNet
- Multiple public IP addrs
- Associate multiple (up to 250) with FW for specific DNAT/SNAT scenarios
- Azure Monitor Logging
- All events integrated to Azure Monitor
- Allows archival of logs to storage account
- Stream events to Event Hubs
- Send to Azure Monitor Logs
- Forced tunneling
- Configure Azure FW to route all Inet bound traffic to a next hop instead of direct to Inet
- Example to send to on-prem FW or NVA to process
- Web categories
- Allow or deny user access to web site categories
- Categories included in Azure FW Standard
- Categories more fine-tuned in Premium Preview
- Standard matches FQDN, in Prekmium match on entire URL for HTTP or HTTP/S
- Certs
- Azure FW is PCI, SOC, ISO, and ICSA Labs compliant
- Rule processing in Azure Firewall
- In Azure FW, Possible to configure NAT rules, network rules, app rules. FW denies all traffic by default until manual rules configured to allow
- Rule processing with classic rules
- Rule collections are processed according to type in priority order
- Lower numbers to higher from 100 – 65000
- A rule collection name is only letters, numbers, underscores, period and hyphens
- Must being with a letter or number
- Must end with letter,number,underscore
- Max name – 80 chars
- Increments of 100 for priority allowing additional rules in between later
- Rule processing with Firewall Policy
- FW Policy, rules organized inside Rule Collections contained in Rule Collectioin Groups
- Rule Collection types
- Define multiple types in single group
- Can define zero+ rules in a collection
- Rules in collection MUST be SAME type
- FW Policy – rules processed on Rule Collection Group Priority
- Number between 100 (highest) and 65000 (lowest)
- Highest rule in group processed first
- Application rules always processed after network rules which are always processed after DNAT rules
- Deploying and configuring Azure FW
- Consideration Factors
- FW centrally create,enforce,log app/network connectivity policies across subscriptions and VNets
- FW uses static, public IP for VNet resources
- FW fully integrated with. Azure Monitor for log/analytics
- Steps for deployment
- Create resource group
- Create VNet and subnets
- Create workload VM in subnet
- Deploy FW and Policy to VNet
- Create default outbound route
- Configure app rule
- Configure network rule
- Configure DNAT rule
- Test
Permanent link to this article: https://www.packetpilot.com/microsoft-az-700-design-and-implement-azure-firewall/
Load more