Chapter 7 - Virtual Networking
Chapter 7.2 - Creating Virtual Networks

AZ-104 Certification Notes

Chapter 7.2 - Creating Virtual Networks

Designing a Network

  • Determine IP CIDR
    • Select a Classless Inter-Domain Routing (CIDR) notation that allows for growth and integration
  • Subnetting Requirements
    • Determine how to segment the solution to meet your needs, such as segmenting for n-tiers
  • Connectivity Needs
    • Determine what type of connectivity is needed: Internet, resource to resource, resource to service, etc

Virtual Network (VNet) Features

  • Subnetting
    • Azure VNet uses subnets to segment address spaces. Reserved IP addresses are x.x.x.0-3 and x.x.x.255
  • Private Networking
    • Azure VNet supports DHCP for private IP addressing for resources
  • Public Networking
    • Azure VNet supports public IP addressing (IPv4 and IPv6) so that resource can have public connectivity
  • Peering
    • Azure VNet supports peering between Azure VNets
  • Network Gateway
    • Azure VNet uses gateway subnets to make VPN connects
  • Monitoring
    • Azure VNet makes monitoring easy. View logs, monitoring connectivity, and view a topology of the virtual network

Key Takeaways

  • Default Connectivity
    • By default, intra-network traffic and outbound internet traffic is allowed
  • Address Restrictions
    • Use of private addresses using RFC 1918 provide best results. The smallest VNet/subnet size allowed is /29 and the largest is /8
  • Reserved IPs
    • Azure reserved IPs are x.x.x.0-3 and x.x.x.255
  • DNS and DHCP
    • Azure-provided DNS or custom DNS. For VNets, DHCP is built-in
  • Network Integration
    • VNets are built for integration with one another, hybrid connectivity using VPNs, and ExpressRoute
  • Supported Protocols
    • VNets support TCP, UDP, and ICMP protocols