Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| azure:az-104_2024:azure_networking [2024/10/04 19:21] – removed - external edit (Unknown date) 127.0.0.1 | azure:az-104_2024:azure_networking [2024/10/17 15:31] (current) – [Azure DNS] mmuze | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== Azure Networking ====== | ||
| + | ====== Access Control ====== | ||
| + | * <color :# | ||
| + | |||
| + | ====== IP Addresses ====== | ||
| + | * When a VM is not running the public IP of the machine is not available. | ||
| + | |||
| + | ====== Azure DNS ====== | ||
| + | * [[azure: | ||
| + | |||
| + | ====== Internet Connectivity ====== | ||
| + | * [[https:// | ||
| + | |||
| + | ====== VPC Peering ====== | ||
| + | * //Gateway transit// [[https:// | ||
| + | * The transit option can be used with all VPN Gateway SKUs except the Basic SKU. | ||
| + | * You can disable the automatic route propagation from the VPN gateway. Create a routing table with the " | ||
| + | |||
| + | ====== Load Balancing ====== | ||
| + | * [[https:// | ||
| + | |||
| + | * Traffic Manager | ||
| + | * Front Door | ||
| + | * (Network) Load Balancer | ||
| + | * Application Gateways support autoscaling of the gateways themselves, whereas layer 4 load-balancers do not | ||
| + | |||
| + | ====== Virtual Private Network ====== | ||
| + | * Setting up a S2S VPN from on-prem to an Azure VNet requires a //Virtual Network Gateway (VNG)// and a //Local Network Gateway (LNG)//. The VNG represents the Azure/VNet side of the connection, and the LNG represents the on-prem side. | ||
| + | * If you make a change to the topology of your network, VPN client packages must be downloaded and installed again for the changes to be applied. | ||
| + | * Enabling gateway transit on a VNet is necessary if peered VNets need to use the gateway to get a (on-prem) network. | ||
| + | |||
| + | ===== Service Endpoints ===== | ||
| + | * Virtual Network (VNet) service endpoint provides secure and direct connectivity to Azure services over an optimized route over the Azure backbone network. Endpoints allow you to secure your critical Azure service resources to only your virtual networks. Service Endpoints enables private IP addresses in the VNet to reach the endpoint of an Azure service without needing a public IP address on the VNet. | ||
| + | * [[https:// | ||
| + | |||
| + | ===== Private Endpoints ===== | ||
| + | |||
| + | ===== §§§ ===== | ||
| + | * Service Endpoints use public IP addresses, while Private Endpoints use private IP addresses. | ||
| + | * Service Endpoints keep PaaS resources outside your VNet, whereas Private Endpoints bring them directly into your VNet. | ||
| + | * Service Endpoints provide access control through IP restrictions, | ||
| + | |||
| + | ===== Azure Monitor Private Link ===== | ||
| + | * [[https:// | ||
| + | * An Azure Monitor private link connects a private endpoint to a set of Azure Monitor resources to define the boundaries of your monitoring network. That set is called an <color :# | ||
| + | |||
| + | |||
| + | ====== Gateways ====== | ||
| + | * There are multiple types of virtual network gateways (VNGs). In general, VNGs enable connectivity between different networks. | ||
| + | * Azure VPN Gateway is a service that can be used to send encrypted traffic between an Azure virtual network and on-premises locations over the public Internet. | ||
| + | |||