Show Menu
Cheatography

Virtual Networks MS Azure AZ-700 Cheat Sheet (DRAFT) by

Cheat Sheet for MS Azure AZ-700

This is a draft cheat sheet. It is a work in progress and is not finished yet.

VNet

VNet Commun­ication Ways
VNets
 
VNet Service Points
 
VNet Peering
VNet Connect On-Pre­mises
P2S VPN
 
S2S VPN
 
Azure Express Route
Routing Network Traffic
UDR or BGP

Subnetting

smallest allowed
/29
largest allowed
/2
IPv6
must be /64

VNet Addressing

RFC1918
Private
224.0.0.0/4
Multicast
255.25­5.2­55.2­55/32
Broadcast
127.0.0.1/8
Loopback
169.25­4.0.0/16
Link-Local
168.63.12­9.16/32
Internal DNS
4 IP addresses reserved
.1 Gateway, .2 .3 Azure DNS, .255 Broadcast

On-Pre­mises DNS with Azure VNets

VNet can connect to external DNS
Forwar­ding:
Forwarding
specifies another DNS server (SOA for zone)
Condit­ional forwarding
specify DNS server for specific zone

Child Domains

delegate subdomain to Azure DNS
same process as standard delegation
NS records must be created in parent zone rather than registrar
parent and child zones can be in different RG
Record Set
collection of records in a zone, same name 'n type
 
cannot contain identical records
 
empty records possible
 
CNAME can contain one record at most

Delegate DNS Domains

Azure DNS name servers assigned from a pool
NS records to be updated in parent domain to point to Azure DNS name server
always use all 4 Azure name server names

SKU public ip addresses

Public IP Address
Standard
Basic
Allocation method
Static
IPv4: Sta/Dyn IPv6: Dyn
Idle Timeout
4-30 min (4 default) inboud, 4 min outbound
4-30 min (4 default) inbound, 4 min outbound
Security
Allow traffic w NSG, Secure by default
Open by default, NSG optional
Availa­bility Zones
supp: non-zonal, zonal, zone-r­edu­ndant (3 zones only)
Not supported
Routing preference
supported for granular traffic control
Not supported
Global Tier
Support via cross-­region LB
Not supported

VNet Peering Types

Regional VNet-P­eering
connect in same region
Global VNet-P­ering
connect in different regions, all regions possible

VNet Default Routes

Address prefixes
Next hop type
Unique to the virtual network
Virtual network
0.0.0.0/0
Internet
10.0.0.0/8
None (dropped)
192.16­8.0.0/16
None (dropped)
100.64.0.0/10
None (dropped)

VNet Original Default Routes

Source
Address Prefix
Next hop type
Subnet within virtual network that route is added to
Default
unique to virutal network
VNet peering
All
Virtual network gateway
on-prem prefixes adv via BGP
Virtual network gateway
All
Default
Multiple
Virtua­lNe­two­rkS­erv­ice­End­point
only subnet service endpoint is enabled for
 

Regions and Subscr­iptions

Resource can only be in same region subscr­iption as VNet it's created in
VNets in different regions, subscr­iption can be connected
Subscr­iptions have a VNet limit

DNS - public consid­era­tions

zone name must be unique in RG, zone must not exist already
zone name can be reused in RG and different subscr­iptions
different name server addresses when same zone name used multiple times
root/p­arent domain registered at registrar, points to Azure NS
child domains in Azure DNS registered

DNS - public

use Azure DNS (uses anycast)
DNS entries created manually in zones (A/AAA­A/C­NAME)
no custom DNS needed, DNS zone must be created, each DNS entry created in that zone

Private DNS Services

3 methods
Azure DNS Private Zones
 
Azure-­pro­vided name resolution
 
Name resolution with own DNS server
Access recursive resolvers
via 169.63.129.16

Azure provided DNS

created with VNet
Azure default internal DNS zone
.inter­nal.cl­oud­app.net
resource name gets registered
Limits
no resolution across VNets
 
resource name
 
no manual creation

Azure Private DNS Zone

capabi­lities
configure name for DNS zone
 
manual record creation
 
resolve across zones and VNets
 
provide PTR, MX, SOA, servic­e/text records
Regist­ration
VNet link to one private Zone
Resolution
VNet can link to 1000 pvirate DNS zones

Public IP Adresses - Static­/Dy­namic

Available Resources
VM NICs
 
VM Scale Sets
 
Public LB
 
Virtual Network Gateways
 
NAT Gateways
 
Applic­ation Gateways
 
Azure Firewall
 
Bastion Host
 
Route Server
Each region has own pool of public ip addresses

Availa­bility Zones - Service Categr­ories

Zonal Services
resources pinned to specific zone
 
VMs, Managed Disks, Standard IP Addresses
Zone-R­edu­ndant Services
resources replic­ate­d/d­ist­ributed across zones autom.
Non-re­gional Services
Services always available from Azure Geos
 
resilient to zone and region­-wide outages

VNet Gatewa­ytr­ansit and Connec­tivity

VPN Gateway as transit point
Remote gateway to access other resources
VNet can have only one gateway
Subnet­zga­teway capabi­lities
S2S VPN
 
VNet-t­o-VNet
 
P2S VPN
VNets can use a gateway, only one needed
Service chaining
VNet connect to NVA (network virtual appliance)
 
VNet can be in different subscr­iption
 
UDRs will be created