Azure Networking and Connectivity Flashcards

1
Q

What is an Endpoint?

A

A private endpoint is a network interface that uses a private IP address from your virtual network. This network interface connects you privately and securely to a service that’s powered by Azure Private Link. By enabling a private endpoint, you’re bringing the service into your virtual network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Azure Virtual Network?

A

Azure Virtual Network (VNet) is the fundamental building block for your private network in Azure. VNet enables many types of Azure resources, such as Azure Virtual Machines (VM), to securely communicate with each other, the internet, and on-premises networks. VNet is similar to a traditional network that you’d operate in your own data center, but brings with it additional benefits of Azure’s infrastructure such as scale, availability, and isolation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why use an Azure Virtual network?

A

Azure virtual network enables Azure resources to securely communicate with each other, the internet, and on-premises networks. Key scenarios that you can accomplish with a virtual network include - communication of Azure resources with the internet, communication between Azure resources, communication with on-premises resources, filtering network traffic, routing network traffic, and integration with Azure services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

VNet Peering

A

Through VNet Peering: You can connect virtual networks to each other, enabling resources in either virtual network to communicate with each other, using virtual network peering. The virtual networks you connect can be in the same, or different, Azure regions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does peer to peer mean?

A

A peer-to-peer (P2P) network is created when two or more PCs are connected and share resources without going through a separate server computer.

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer network of nodes.[1]

Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts.[2] Peers are both suppliers and consumers of resources, in contrast to the traditional client–server model in which the consumption and supply of resources is divided.[3]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Deploying services within a virtual network provides which capabilities?

A
  • Resources within the virtual network can communicate with each other privately, through private IP addresses. Example, directly transferring data between HDInsight and SQL Server running on a virtual machine, in the virtual network.
  • On-premises resources can access resources in a virtual network using private IP addresses over a Site-to-Site VPN (VPN Gateway) or ExpressRoute.
  • Virtual networks can be peered to enable resources in the virtual networks to communicate with each other, using private IP addresses.
  • Service instances in a virtual network are typically fully managed by the Azure service. This includes monitoring the health of the resources and scaling with load.
  • Service instances are deployed into a subnet in a virtual network. Inbound and outbound network access for the subnet must be opened through network security groups, per guidance provided by the service.
  • Certain services also impose restrictions on the subnet they are deployed in, limiting the application of policies, routes or combining VMs and service resources within the same subnet. Check with each service on the specific restrictions as they may change over time. Examples of such services are Azure NetApp Files, Dedicated HSM, Azure Container Instances, App Service.
  • Optionally, services might require a delegated subnet as an explicit identifier that a subnet can host a particular service. By delegating, services get explicit permissions to create service-specific resources in the delegated subnet.
  • See an example of a REST API response on a virtual network with a delegated subnet. A comprehensive list of services that are using the delegated subnet model can be obtained via the Available Delegations API.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Network security groups?

A

You can use an Azure network security group to filter network traffic between Azure resources in an Azure virtual network. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. For each rule, you can specify source and destination, port, and protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How network security groups filter network traffic

A

You can use an Azure network security group to filter network traffic to and from Azure resources in an Azure virtual network. A network security group contains security rules that allow or deny inbound network traffic to, or outbound network traffic from, several types of Azure resources. For each rule, you can specify source and destination, port, and protocol.

Inbound traffic
For inbound traffic, Azure processes the rules in a network security group associated to a subnet first, if there’s one, and then the rules in a network security group associated to the network interface, if there’s one. This includes intra-subnet traffic as well.

VM1: The security rules in NSG1 are processed, since it’s associated to Subnet1 and VM1 is in Subnet1. Unless you’ve created a rule that allows port 80 inbound, the traffic is denied by the DenyAllInbound default security rule, and never evaluated by NSG2, since NSG2 is associated to the network interface. If NSG1 has a security rule that allows port 80, the traffic is then processed by NSG2. To allow port 80 to the virtual machine, both NSG1 and NSG2 must have a rule that allows port 80 from the internet.
VM2: The rules in NSG1 are processed because VM2 is also in Subnet1. Since VM2 doesn’t have a network security group associated to its network interface, it receives all traffic allowed through NSG1 or is denied all traffic denied by NSG1. Traffic is either allowed or denied to all resources in the same subnet when a network security group is associated to a subnet.
VM3: Since there’s no network security group associated to Subnet2, traffic is allowed into the subnet and processed by NSG2, because NSG2 is associated to the network interface attached to VM3.
VM4: Traffic is allowed to VM4, because a network security group isn’t associated to Subnet3, or the network interface in the virtual machine. All network traffic is allowed through a subnet and network interface if they don’t have a network security group associated to them.
Outbound traffic
For outbound traffic, Azure processes the rules in a network security group associated to a network interface first, if there’s one, and then the rules in a network security group associated to the subnet, if there’s one. This includes intra-subnet traffic as well.

VM1: The security rules in NSG2 are processed. Unless you create a security rule that denies port 80 outbound to the internet, the traffic is allowed by the AllowInternetOutbound default security rule in both NSG1 and NSG2. If NSG2 has a security rule that denies port 80, the traffic is denied, and never evaluated by NSG1. To deny port 80 from the virtual machine, either, or both of the network security groups must have a rule that denies port 80 to the internet.
VM2: All traffic is sent through the network interface to the subnet, since the network interface attached to VM2 doesn’t have a network security group associated to it. The rules in NSG1 are processed.
VM3: If NSG2 has a security rule that denies port 80, the traffic is denied. If not, the traffic is allowed by the AllowInternetOutbound default security rule in NSG2, since a network security group isn’t associated to Subnet2.
VM4: All network traffic is allowed from VM4, because a network security group isn’t associated to the network interface attached to the virtual machine, or to Subnet3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Intra-Subnet traffic

A

It’s important to note that security rules in an NSG associated to a subnet can affect connectivity between VMs within it. By default, virtual machines in the same subnet can communicate based on a default NSG rule allowing intra-subnet traffic. If a rule is added to *NSG1 that denies all inbound and outbound traffic, VM1 and VM2 will no longer be able to communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can we connect from ADF to an On-Premises network? WHat components are required?

A
  • Azure subscription. If you don’t have an Azure subscription, create a free account before you begin.
  • Virtual Network. If you don’t have a Virtual Network, create one following Create Virtual Network.
  • Virtual network to on-premises network. Create a connection between virtual network and on-premises network either using ExpressRoute or VPN.
  • Data Factory with Managed VNet enabled. If you don’t have a Data Factory or Managed VNet is not enabled, create one following Create Data Factory with Managed VNet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can we connect from Databricks to an On-Premises network? What components are required?

A

You can use the JDBC drivers

Create the JDBC URL and Properties

Firstly, you need to create a JDBC URL that will contain information associated with either your Local SQL Server deployment or the SQL Database on Azure or any other Cloud platform. You further need to add other details such as Port Number, User, and Password.

However, unless your database is accessible to the internet it will be unable to connect.

To resolve this you need to vnet attach your databricks workspace to a vnet that has VPN or ExpressRoute connectivity to your onprem site (and correct routing in place). This is currently a preview feature that you will need to contact Microsoft to get enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does 10.1.1.0/24 mean?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does 10.1.0.0/16 mean?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which 2 initual IPs numbers can tou not use in azure?

A

0, 1, 2, 3 & 255

0 networking
1 2 3 Azure
255 broadcast id

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 1 types of security in Vnet config level ?

A

DDoS protection
Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is there a limit for amount of vnets?

A

Yes soft(50) and hard(500)

17
Q

Is security guaranteed In Azure?

A

No. It’s a shared responsability

18
Q

What is Vnet perimeter security?

A

It’s DDoS and Firewall protection for any vnet

19
Q

What is Firewall in perimeter security

A

It’s basically a FaaS or a ACL access control list which can allow or deny IPs or range of IP or Sub domain names
Example:
*.fb.com

It is very expensive service

20
Q

How can I create 2 255 ip range subnets inside 1 Vnet?

Can I use the 255 ips?

A

Using cidr notation I can specify 10.1.0.0/24 which would give me 251 ips (4 reserved)
And another one
10.2.0.0/24

No you can only use 251 ips

21
Q

What does cidr mean

A

Classless inter domain routing

22
Q

Can we connect to private ip addresses from public internet?

A

No. They’re only visible from inside Azure

23
Q

What are the 2 types of IPs

A

Dynamic and Static

24
Q

Explain 10.0.0.0/24 and 10.1.0.0/16

A
25
Q

What scenarios NIC and where do they fit in Azure network?

A

Network interface card
Inside every vnet or/and subnets and they can be attached to any machine so that these can be reached

26
Q

Can I create public ip address and private Ip?

A

Public yes. It can be a dynamic or static one

Private yes but at the moment of nic creation or inside azure network for specific resource

27
Q

What is a route table? What is it used for?

A

It’s a map of connections and defines how a vm inside a network or subnet can talk to another in a private network, on premises network or another vnet
After a rout table has been created it must be associated to a subnet or vnet

28
Q

Explain a routing rule

A

Any machine in a range of ips for example 192.168.0.0/16 will go to Next hop type “Virtual network gateway” and this gateway will have the definition or destination for then

29
Q

What is NSG

A

Network security group is like a firewall at network level and acts setting rules and filter definitions at network level

Allows or deny inbound (ingress) or outbound (egress) traffic.

For each night rule you can specify source, destination, port and protocol

Firewall can be setup at vnet level

30
Q

For each nsg rule you can specify…

A

For each nsg rule you can specify source, destination, port and protocol

31
Q

After you config a nsg what do you do?

A

You attach it to a Vnet/subnet or directly to a vm(network interface card)

32
Q

What’s a Service Endpoint?

A

Improved security for your Azure service resources: VNet private address spaces can overlap. You can’t use overlapping spaces to uniquely identify traffic that originates from your VNet. Service endpoints provide the ability to secure Azure service resources to your virtual network by extending VNet identity to the service. Once you enable service endpoints in your virtual network, you can add a virtual network rule to secure the Azure service resources to your virtual network. The rule addition provides improved security by fully removing public internet access to resources and allowing traffic only from your virtual network.

A vnet service endpoint policy allows you to filter egress virtual network traffic to Azure Storage accounts over service endpoints, and allow data exfiltration to only specific Azure Storage accounts. Endpoint policies provide granular access control for virtual network traffic to Azure Storage when connecting over service endpoint.