Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
azure:qnd:azure_networking [2022/08/17 19:59] – [Routing] mgupton | azure:qnd:azure_networking [2022/08/26 20:43] (current) – [Firewall] mgupton | ||
---|---|---|---|
Line 5: | Line 5: | ||
====== Routing ====== | ====== Routing ====== | ||
- | * By default a virtual network gets a route for 0.0.0.0/0 that goes to the Internet and route for each address range for the VNet that goes to the VNet (to allow inter-subnet routing by default). | + | * By [[https:// |
+ | * If the destination is for a public IP for an Azure service it is routed over the Azure private backbone, not the public Internet. [[https:// | ||
+ | |||
+ | > The system default route specifies the 0.0.0.0/0 address prefix. If you don't override Azure' | ||
* The first NIC in a VM gets a default gateway automatically, | * The first NIC in a VM gets a default gateway automatically, | ||
Line 18: | Line 21: | ||
* [[https:// | * [[https:// | ||
* The default rules in a //Network Security Group// allow intra-subnet and intra-VNet traffic. It is generally recommended to add a higher priority rule to deny this traffic and then add specific rules for certain ports and protocols to allow access as needed. | * The default rules in a //Network Security Group// allow intra-subnet and intra-VNet traffic. It is generally recommended to add a higher priority rule to deny this traffic and then add specific rules for certain ports and protocols to allow access as needed. | ||
- | * One option for network architecture is to make the default route for all subnets point to an Azure Firewall. This make the firewall the router for all intra-VNet and inter-VNet traffic. | + | * One option for network architecture is to make the default route for all subnets point to an Azure Firewall. This makes the firewall the router/ |
====== Application Gateway ====== | ====== Application Gateway ====== |