Build secure, isolated networks in Azure with subnets, IP addressing, Network Security Groups, and VNet peering. Learn to connect Azure resources securely and efficiently.
After completing this session, you'll be ready for Quiz 13 and able to:
Azure Virtual Network (VNet) is like creating your own private network in the cloud. Think of it as your own private section of the internet where only your resources can communicate with each other, isolated from everyone else's resources.
Like an office building with separate floors, rooms, and security systems
Like your company's private floor in the cloud "building" with controlled access
Other companies can't access your floor, just like other customers can't access your VNet!
Your private network space in Azure cloud
Exists within a specific Azure region
Enables Azure resources to securely communicate
Control who can access your resources
Group related resources together
Connect to on-premises or other VNets
10.0.0.0/8
10.0.0.0 - 10.255.255.255
16.7 million addresses
Large organizations
172.16.0.0/12
172.16.0.0 - 172.31.255.255
1 million addresses
Medium organizations
192.168.0.0/16
192.168.0.0 - 192.168.255.255
65,536 addresses
Small networks
💡 Quiz Tip: Azure VNets can ONLY use RFC 1918 private IP address ranges!
Remember: Public IPs are accessible from the internet, Private IPs are only within Azure!
Subnets are like dividing your house (VNet) into different rooms for different purposes - kitchen, bedroom, office, etc.
Divide VNet into smaller networks
Different security rules per subnet
Group similar resources together
Front-end web servers (public access)
Application servers (internal only)
Database servers (highly restricted)
4 total addresses
2 usable (Azure reserves 5)
Minimum size!
16 total addresses
11 usable
Small subnet
256 total addresses
251 usable
Common choice
65,536 total addresses
65,531 usable
Very large subnet
⚠️ Azure reserves 5 IP addresses in each subnet!
(Network, Gateway, DNS x2, Broadcast)
Network Security Groups (NSGs) are like security guards at your building entrance. They check every piece of network traffic and decide whether to allow or deny it based on your security rules.
Like a guard checking IDs at building entrance
Contains allow/deny rules with priorities
Controls inbound and outbound traffic
Lower numbers = higher priority
IP addresses, subnets, or service tags
TCP/UDP ports (80, 443, 22, etc.)
Allow or Deny traffic
Applies to ALL resources in the subnet
Applies to specific VM's network card
Deny all traffic except explicitly allowed
Priority: 100
Source: Internet
Destination: Web Subnet
Port: 80, 443
Action: Allow
Priority: 200
Source: Admin IPs
Destination: Any
Port: 22
Action: Allow
Priority: 4096
Source: Any
Destination: Any
Port: Any
Action: Deny
🧠 Quiz Tip: Lower priority numbers are processed first (100 comes before 200)!
Private connection between VNets
Connect VNets across regions
Uses Azure backbone network
Direct, private, high-performance connection
Encrypted tunnel, for on-premises connections
Peering = Azure to Azure, VPN = Azure to on-premises
Key Difference: Service Endpoints = service-level, Private Link = private IP access!
Automatic DNS for VNet resources
Managed DNS hosting for external domains
Use your own DNS servers if needed
Distributes traffic based on IP and port
Internal for private, external for internet traffic
Monitors backend server health
Let's create a Virtual Network with multiple subnets and configure Network Security Groups. This lab will help you understand VNet concepts practically and prepare for Quiz 13.
Set up your private network in Azure
Divide VNet into logical segments
Add security rules to control traffic
Validate your VNet setup
Important: Delete resources to avoid charges
Here are example questions similar to what you'll see in Quiz 13. Make sure you understand these networking concepts!
"What is an Azure Virtual Network (VNet)?"
"How many IP addresses does Azure reserve in each subnet?"
📝 Quiz 13 Topics: VNets, IP addressing, subnets, NSGs, VNet peering, service endpoints, Azure DNS, load balancer basics
Take Quiz 13 NowYou now understand how to build secure, isolated networks in Azure using Virtual Networks, subnets, and Network Security Groups. You know the difference between public and private IPs, how to connect VNets, and the basics of Azure networking services.
Perfect! You've mastered Azure Virtual Networks and IP addressing concepts. Now test your knowledge with Quiz 13, which covers all the VNet, subnet, and network security topics from this session.