Azure Networking Overview
Azure Networking Overview
Microsoft
Global Svalbard
Network
Greenland
United States
Sweden
Norway Russia
Canada United
Kingdom
Poland Ukraine Kazakistan
France Russia
Australia
• 33,000 miles of lit fiber South
Africa
Owned Capacity Data Argentina
center
• SDN Managed (SWAN, OLS) Leased Capacity
Moving to Owned Edge Site
vNIC vNIC
ASM / ARM
Azure SDN Virtual ACLs, Routes, Meters
VSwitch
Basis of all NW virtualization Network
in our datacenters Virtual Network Pa-Ca
Load Balancing
Decoupled Load
SDN allows compute to Balancer SmartNIC Host
evolve and converge to a
single allocator
infrastructure
networks, optionally
connect to on premise and network Build scalable and
datacenters. NSG, User performance to your highly-available web
applications front ends in Azure
services
Defined Routes, & IP
addresses.
Virtual Network
P2S tunnels
Internet
Backend Mid-tier Frontend
S2S tunnels
Private
WAN
ExpressRoute
MICROSOFT CONFIDENTIAL – INTERNAL ONLY
S2S VPN
VPN Gateways
SKU Workload Throughput* S2S/V2V SLA
VpnGw1 Production 650 Mbps Max. 30 99.95%
VpnGw2 Production 1 Gbps Max. 30 99.95%
VpnGw3 Production 1.25 Gbps Max. 30 99.95%
Basic Dev/Test 100 Mbps Max. 10 99.9%
Type • Features
Route-based – router (IKEv2) BGP, transit routing, forced tunneling
Policy-based – firewall (IKEv1) Gateway transit (VNet peering)
SKUs Active-active
Mainly differentiate on throughputs
Custom policy – IPsec/IKE
Same feature sets (except Basic)
Secure VPN transit
BGP for redundant paths and dynamic routing
Automatic shortest path selection and failover
Transit over Microsoft global network
Secure connectivity using Internet only for “last mile”
ASN
VNet 3 Full mesh
65030
Central US Redundant paths
P
BG
BG
P
ASN 65040 ASN 65050
VNet1
East US Azure On Premises
VPN VPN 1
ASN 65010
10.11.0.0/16
On Premises
10.11.0.0/16
Site 5
ASN65050
10.51.0.0/16
Azure On Premises
VPN 2 VPN 2 10.52.0.0/16
Configurable IPsec/IKE policy
Compliance & security requirements
Per connection IPsec/IKE policy
On Premises Site 2
Encryption, integrity, DH/PFS groups, SA lifetime 10.2.0.0/16
On Premises
Site-3
VPN download device scripts
VNet On-Premises Network
Azure
VPN device
configuration
scripts
P2S VPN for Remote Access
P2S for macOS/Linux & AD authentication
VNet On-Premises Network
Azure
P2S VPN
• P2S VPN for mobile users &
AD/DS AD/DS developers to connect from
anywhere
• Now supporting macOS and
S2S VPN Tunnel
Windows
Headquarters
S2S VPN • AD/Radius authentication for
enterprise grade identity
AD solution
P2S VPN
Auth
macOS, Linux/Android,
Windows 10/Server 2016
From Internet
Large scale, multi-platform P2S VPN
• Roadmap – 8x P2S VPN connections
SKU P2S – IKEv2* P2S – SSTP S2S/V2V Throughput
VpnGw3 1,000 128 Max. 30 1.25Gbps
VpnGw2 500 128 Max. 30 1.00Gbps
VpnGw1 250 128 Max. 30 650Mbps
Basic N/A 128 Max. 10 100Mbps
ExpressRoute Circuit
Dublin Amsterdam 2
Montreal
Seattle Amsterdam
Toronto Newport, Wales
Silicon Valley 2 London Seoul
Denver Quebec City Paris Busan
Chicago London 2
Silicon Valley New York City Marseille
Las Vegas Washington DC Tokyo
Dallas Washington DC 2
Osaka
Los Angeles Atlanta
Miami
San Antonio
Hong Kong
Chennai
Mumbai Kuala Lumpur
Singapore 2
Singapore
Johannesburg
On Premises
Site-2
VNet1
10.1.0.0/16
Azure
VPN On Premises Site 3
10.3.0.0/16
On Premises
Site-3
Azure routing 102
BGP (Border Gateway Protocol) & gateway routes
Dynamic routing – allows gateways to exchange routes dynamically, and propagate to all other
connected gateways
Can be overridden by static (manual) routes
VPN & ExpressRoute gateway will “inject” routes to the entire virtual network
Can be disabled by Routing Table option
“Disable BGP route propagation” on individual subnets BGP
Azure VPN On Premises Site 2
• 10.1/16 10.2.0.0/16
• 10.3/16
On Premises
Site-2
VNet1
10.1.0.0/16
Azure
VPN BGP On Premises Site 3
Azure VPN 10.3.0.0/16
• 10.1/16
• 10.2/16
On Premises
Site-3
Azure routing 103
UDR – User-Defined Routes
Manual/static routes added to a subnet
Overrides BGP/dynamic routes and system default in tie breaker
Longest prefix match still wins (e.g., 10.100.0.0/24)
Routes for the same destination AND prefix
( ) Dynamic 10.100.0.0/16 Azure VPN gateway
(√) UDR 10.100.0.0/16 Virtual appliance BGP
Azure VPN On Premises Site 2
• 10.1/16 10.2.0.0/16
• 10.3/16
On Premises
Site-2
VNet1
10.1.0.0/16
Azure
VPN BGP On Premises Site 3
Azure VPN 10.3.0.0/16
• 10.1/16
• 10.2/16
On Premises
Site-3
Azure routing 104
System routes – “Effective routes”
System default – (1) Intra-VNet direct; (2) Default route Internet
VNet injected routes into UDR
VNet peering Adding peered VNet prefixes (e.g.,10.20.0.0/16) VNet peering
Service endpoints Adding public IP address(es) for a service (e.g., Azure storage) Service Endpoint
On Premises Site 2
10.2.0.0/16
On Premises
Site-2
VNet2 VNet1
10.2.0.0/16 VNet peering 10.1.0.0/16
Azure
Service VPN On Premises Site 3
Endpoint 10.3.0.0/16
W=100 W=100
ExpressRoute
ExpressRoute
select the path from Microsoft AS-path prepending are
to you applied, path is selected based
on the former
DNS
Traffic Manager Public CNAMEs
Global
• SSL termination
• SSL Policy (protocol version and cipher)
• End to end SSL
• Web Application Firewall
contoso.com/video/*
• Access, performance, backend health logs
• Monitor metrics & alerts: Total request, Failed requests,
Healthy/Unhealthy host counts, Response status contoso.com/images/*
distribution (2xx, 3xx, 4xx, 5xx), Throughput
• Custom health probes (HTTP, HTTPS)
Load Balancer
Layer 4, per flow F
3 key scenarios
• All TCP & UDP applications
• Inbound & outbound
• Flow-based Load Balancing with Health Probing
• Inbound NAT rules (port forwarding)
• Availability Zones support
• HA Ports load balancing
• 2 SKUs: Standard & Basic
High performance
• Part of the Azure SDN stack, not a VM
• Low latency
• High throughput
• Outbound bandwidth only limited by VM in pool
Traffic
Manager
Load Balancer Application Gateway / WAF
Load Balancer
DB DB DB DB
DB DB DB DB
REGION A REGION B
VNet
Secure by default
VM Scale Set
• Use NSG to explicit whitelist traffic you want to permit
Zone 1 Zone 2 Zone 3
Standard LB & AZs: Zone-redundant by default
Zone-redundant data path
(regional anycast, public & internal, inbound & out)
AZ’s & Inbound and outbound flows
Load Balancer
Zone-redundant default (single IP)* Standard
Optional: Zonal guarantee option
Standard LB
Ports 1-65535
TCP & UDP
Active-active
Or active-passive
Scale out
internal
User- Standard LB
Defined
Route Public IPs
Internet
with HA Ports
load-balancing rule
VM deployment pool
Assurance:
“Can my app frontend be
reached?”
Fault isolation:
“Is it Azure or is it me?
From the
Internet Attacker Azure Backbone VNet
Azure DDoS
Protection
Within the
VNet
Platform managed,
Within Azure Valid
scalable and highly
SQL L7 LB request
injection available
Protecting your Simplified Security Group Management
application
Network Security Service Tags Application Security
Groups (NSG) Groups (ASG)
IP based network ACL Named monikers for Azure Named monikers for custom
Attach: Subnet and NICs service IPs grouping of VMs
SQL, Storage, Traffic Manager Natural expression of
supported application security
From the
Internet
WebServers
Within the
AppServers
VNet
Within Azure
DatabaseServers
Protecting your Securing PaaS Services
application
Internet Internet
From the
Internet
VNet Service
Endpoint
Within the
VNet
Within Azure
PaaS
services
Compute - VNet
Connectivity
Connectivity
Global VNet Peering
Within Azure
Scenarios