azure:qnd:azure_networking

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
azure:qnd:azure_networking [2022/08/26 20:38] – [Routing] mguptonazure:qnd:azure_networking [2022/08/26 20:43] (current) – [Firewall] mgupton
Line 21: Line 21:
   * [[https://docs.microsoft.com/en-us/azure/firewall/protect-windows-virtual-desktop]]   * [[https://docs.microsoft.com/en-us/azure/firewall/protect-windows-virtual-desktop]]
   * The default rules in a //Network Security Group// allow intra-subnet and intra-VNet traffic. It is generally recommended to add a higher priority rule to deny this traffic and then add specific rules for certain ports and protocols to allow access as needed.   * The default rules in a //Network Security Group// allow intra-subnet and intra-VNet traffic. It is generally recommended to add a higher priority rule to deny this traffic and then add specific rules for certain ports and protocols to allow access as needed.
-  * One option for network architecture is to make the default route for all subnets point to an Azure Firewall. This makes the firewall the router/firewall for all intra-VNet and inter-VNet traffic.+  * One option for network architecture is to make the default route for all subnets point to an Azure Firewall. This makes the firewall the router/firewall for all intra-VNet and inter-VNet traffic. This can be accomplished by using the VNet supernet as the prefix for the route. This implements a form of micro-segmentation.
  
 ====== Application Gateway ====== ====== Application Gateway ======
  • azure/qnd/azure_networking.1661546317.txt.gz
  • Last modified: 2022/08/26 20:38
  • by mgupton