Slide 1

Slide 1 text

- Azure Networking vNext - How to build modern connectivity for IaaS, PaaS and SaaS Eric Berg – Microsoft MVP Vice President @ CGI

Slide 2

Slide 2 text

Eric Berg Vice President Expert @ CGI Cloud, Datacenter and Management Azure, AWS, GCP info@ericberg.de @ericberg_de | @GeekZeugs www.ericberg.de | www.geekzeugs.de

Slide 3

Slide 3 text

Agenda Networking Overview Networking Recap Connectivity Integration DNS Build it Q&A

Slide 4

Slide 4 text

Networking Overview

Slide 5

Slide 5 text

Azure Datacenter Infrastructure Azure Backup Site Recovery Azure Monitor Azure Policy Azure Blueprints Log Analytics Azure Migrate Databox Family Compute Storage Networking Linux Virtual Machine Compute/Containers Web/Mobile DevOps/Developer Container Instance Functions Service Fabric Integration IoT Data Services Service Bus Event Grid Logic Apps API Management Management Platform as a Services (PaaS) Security Infrastructure as a Services (IaaS) Disk Storage Managed Disks Virtual Machine Scale Sets Express Route Load Balancer Azure Firewall Virtual WAN Network Watcher Virtual Network VPN Gateway Media Services Content Delivery Network Media/CDN Cognitive Services IoT Hub Stream Analytics Role- based access control Azure Digital Twins Time Series Insights IoT Central IoT Edge Bot Services SQL Data Warehouse Azure Databricks Apache Spark AI Machine Learning Studio Machine Learning Service Azure Search Analytics Data Lake Storage Gen2 Mobile Apps Web Apps Logic Apps API Apps Notification Hubs SignalR Service Application Insights Lab Services Azure DevOps SDK SQL Database Data Factory Database for MySQL Cosmos DB Database for PostgreSQL Database for MariaDB Database Migration Service Azure Cache for Redis Azure AD Key Vault Security Center DDoS Protection Multi-Factor Authentication Azure ATP Azure AD for Domain Services Azure AD B2C Cost Management Video Indexer Content Protection Kubernetes Service SQL Data Warehouse Table Storage

Slide 6

Slide 6 text

60+Azure regions 165k+ miles of fiber + subsea cables 185+edge sites 500+network partners 20k+peering connections Region Edge Network

Slide 7

Slide 7 text

Connecting Azure regions to the global network Edge ExpressRoute Internet peers Enterprise peering P R I V A T E Internet peering P U B L I C Microsoft Wide Area Network Regional Gateways Availability Zone D C D C D C Availability Zone D C D C D C Availability Zone D C D C D C Azure Region

Slide 8

Slide 8 text

Microsoft Global Network (WAN) The Azure Network Edge Traffic to and between DCs WAN core routers Azure ExpressRoute Azure Front Door, CDN, WAF Azure Network Edge Internet and private network

Slide 9

Slide 9 text

Networking Recap

Slide 10

Slide 10 text

Virtual Network Isolated, logical network that provides connectivity for Azure Resources User-defined address space (can be one or more IP ranges, not necessarily RFC1918) • Connectivity for VMs in the same VNET • Connectivity to external networks/on-prem DC’s • Internet connectivity Name: VNet1 Address space: 10.57.0.0/16, 10.66.0.0/24 Internet

Slide 11

Slide 11 text

Subnet Provides full layer-3 semantics and partial layer- 2 semantics (DHCP , ARP , no broadcast / multicast) Subnets can span only one range of contigous IP addresses VMs can be deployed only to subnets (not VNETs) Name: VNet1 Address space: 10.57.0.0/16, 10.66.0.0/24 Subnet1 10.57.1.0/24 Subnet2 10.66.0.0/24

Slide 12

Slide 12 text

Network Interface Virtual NIC that connects a VM to a Subnet One private IP address (private == included in the subnet’s IP range, not necessarily RFC1918) Private IP address always assigned via Azure DHCP Virtual machine IpConfiguration

Slide 13

Slide 13 text

Switching/Routing in Azure VNETs A VNET provides a switching/routing functionality that allows VMs to talk to each other Name: VNet2 Address space: 10.57.0.0/16 Subnet1 10.57.1.0/24 Subnet2 10.57.2.0/25 Switch/Routing (Azure SDN stack) Please note that, in an Azure VNet, packets can flow between two different subnets without explicitly traversing any layer-3 device. Azure’s network virtualization stack effectively works as a layer-3 switch

Slide 14

Slide 14 text

Connectivity

Slide 15

Slide 15 text

Connecting to Azure Cloud Customer Characteristics Site-to-site VPN connectivity • High throughput, secure cross- premises connectivity • BGP, active-active for high availability & transit routing Remote access point- to-site connectivity • Remote Access to VNet/On-prem • Connect from anywhere • Mac, Linux, Windows • Radius/AD authentication ExpressRoute private connectivity • Private connectivity to Microsoft services • Mission critical workloads Internet Connectivity • Internet facing with public IP addresses in Azure • VPN connectivity with virtual appliances (Marketplace) Site-to-site VPN connectivity • High throughput, secure cross- premises connectivity • BGP, active-active for high availability & transit routing Site-to-site VPN connectivity • High throughput, secure cross- premises connectivity • BGP, active-active for high availability & transit routing

Slide 16

Slide 16 text

Connecting in Azure 16 Cloud Cloud Characteristics VNet-to-VNet via Gateways • Transitive routing via BGP and VPN gateways • Secure connectivity via IPsec/IKE across Azure WAN links VNet Peering • Same-/cross-region direct, private VM-to-VM connectivity • NSG & UDR across VNets • GatewayTransit for hub-and-spoke VNet-to-VNet via ExpressRoute circuit • Traverse (“hairpin”) through ExpressRoute circuit & gateways • Traffic is not encrypted

Slide 17

Slide 17 text

Cross premises connectivity overview 17 S2S tunnels P2S tunnels ExpressRoute Virtual Network Internet Private WAN Frontend Mid-tier Backend Microsoft

Slide 18

Slide 18 text

Azure Virtual WAN

Slide 19

Slide 19 text

NextGen Cloud Networking

Slide 20

Slide 20 text

Azure Portal Remote Protocol (RDP, SSH) TLS 443, Internet AzureBastionSubnet Port: 3389/22 “AzureBastionSubnet” Target VM Subnet(s) Private IP Azure VM Azure VM Azure VM Customer’s Virtual Network TLS Azure Bastion Azure Bastion Secure and seamless RDP and SSH access to your virtual machines RDP/SSH to your workload using HTML5 standards-based web-browser, directly in Azure Portal Resources can be accessed without public IP addresses Supported Azure resources include VMs, VM Scale Sets, Dev-Test Labs

Slide 21

Slide 21 text

Azure Datacenter Infrastructure Azure Backup Site Recovery Azure Monitor Azure Policy Azure Blueprints Log Analytics Azure Migrate Databox Family Compute Storage Networking Linux Virtual Machine Compute/Containers Web/Mobile DevOps/Developer Container Instance Functions Service Fabric Integration IoT Data Services Service Bus Event Grid Logic Apps API Management Management Platform as a Services (PaaS) Security Infrastructure as a Services (IaaS) Disk Storage Managed Disks Virtual Machine Scale Sets Express Route Load Balancer Azure Firewall Virtual WAN Network Watcher Virtual Network VPN Gateway Media Services Content Delivery Network Media/CDN Cognitive Services IoT Hub Stream Analytics Role- based access control Azure Digital Twins Time Series Insights IoT Central IoT Edge Bot Services SQL Data Warehouse Azure Databricks Apache Spark AI Machine Learning Studio Machine Learning Service Azure Search Analytics Data Lake Storage Gen2 Mobile Apps Web Apps Logic Apps API Apps Notification Hubs SignalR Service Application Insights Lab Services Azure DevOps SDK SQL Database Data Factory Database for MySQL Cosmos DB Database for PostgreSQL Database for MariaDB Database Migration Service Azure Cache for Redis Azure AD Key Vault Security Center DDoS Protection Multi-Factor Authentication Azure ATP Azure AD for Domain Services Azure AD B2C Cost Management Video Indexer Content Protection Kubernetes Service SQL Data Warehouse Table Storage

Slide 22

Slide 22 text

Azure Datacenter Infrastructure Azure Backup Site Recovery Azure Monitor Azure Policy Azure Blueprints Log Analytics Azure Migrate Databox Family Compute Storage Networking Linux Virtual Machine Compute/Containers Web/Mobile DevOps/Developer Container Instance Functions Service Fabric Integration IoT Data Services Service Bus Event Grid Logic Apps API Management Management Platform as a Services (PaaS) Security Infrastructure as a Services (IaaS) Disk Storage Managed Disks Virtual Machine Scale Sets Express Route Load Balancer Azure Firewall Virtual WAN Network Watcher Virtual Network VPN Gateway Media Services Content Delivery Network Media/CDN Cognitive Services IoT Hub Stream Analytics Role- based access control Azure Digital Twins Time Series Insights IoT Central IoT Edge Bot Services SQL Data Warehouse Azure Databricks Apache Spark AI Machine Learning Studio Machine Learning Service Azure Search Analytics Data Lake Storage Gen2 Mobile Apps Web Apps Logic Apps API Apps Notification Hubs SignalR Service Application Insights Lab Services Azure DevOps SDK SQL Database Data Factory Database for MySQL Cosmos DB Database for PostgreSQL Database for MariaDB Database Migration Service Azure Cache for Redis Azure AD Key Vault Security Center DDoS Protection Multi-Factor Authentication Azure ATP Azure AD for Domain Services Azure AD B2C Cost Management Video Indexer Content Protection Kubernetes Service SQL Data Warehouse Table Storage

Slide 23

Slide 23 text

Azure Datacenter Infrastructure Azure Backup Site Recovery Azure Monitor Azure Policy Azure Blueprints Log Analytics Azure Migrate Databox Family Compute Storage Networking Linux Virtual Machine Compute/Containers Web/Mobile DevOps/Developer Container Instance Functions Service Fabric Integration IoT Data Services Service Bus Event Grid Logic Apps API Management Management Platform as a Services (PaaS) Security Infrastructure as a Services (IaaS) Disk Storage Managed Disks Virtual Machine Scale Sets Express Route Load Balancer Azure Firewall Virtual WAN Network Watcher Virtual Network VPN Gateway Media Services Content Delivery Network Media/CDN Cognitive Services IoT Hub Stream Analytics Role- based access control Azure Digital Twins Time Series Insights IoT Central IoT Edge Bot Services SQL Data Warehouse Azure Databricks Apache Spark AI Machine Learning Studio Machine Learning Service Azure Search Analytics Data Lake Storage Gen2 Mobile Apps Web Apps Logic Apps API Apps Notification Hubs SignalR Service Application Insights Lab Services Azure DevOps SDK SQL Database Data Factory Database for MySQL Cosmos DB Database for PostgreSQL Database for MariaDB Database Migration Service Azure Cache for Redis Azure AD Key Vault Security Center DDoS Protection Multi-Factor Authentication Azure ATP Azure AD for Domain Services Azure AD B2C Cost Management Video Indexer Content Protection Kubernetes Service SQL Data Warehouse Table Storage

Slide 24

Slide 24 text

Azure Load Balancer

Slide 25

Slide 25 text

Azure Load Balancer Allows you to scale your applications and create high availability and resiliency for your services and applications Public • A public Load Balancer maps the public IP address and port number of incoming traffic to the private IP address and port number of the VM and vice versa. Internal • An internal Load Balancer directs traffic only to resources that are inside a virtual network or that use a VPN to access Azure infrastructure.

Slide 26

Slide 26 text

Public Load Balancer A public Load Balancer maps the public IP address and port number of incoming traffic to the private IP address and port number of the VM Automatic reconfiguration • Instantly reconfigures itself as you scale instance up or down Outbound connections (SNAT) • All outbound flows from private IP addresses inside your virtual network to public IP addresses on the internet can be translated to a frontend IP address of the Load Balancer Default Distribution Mode • Azure Load Balancer distributes traffic evenly amongst multiple VM instance

Slide 27

Slide 27 text

Internal Load Balancer An internal Load Balancer directs traffic only to resources inside a virtual network or that use a VPN to access Azure infrastructure Within a virtual network Cross-premises virtual network Multi-tier applications Line-of-business applications

Slide 28

Slide 28 text

Routing Preference Routing via Microsoft-Network Routing via Internet

Slide 29

Slide 29 text

Cross-Region Load Balancer Challenge with Load Balancers • Bound to a VNET • Bound to a region • Global Deployments have different Frontend IPs • Manual changes required in case of a disaster Cross-Region Load Balancer • Load Balancer of Load Balancers • Backends are regional public LBs • No private / internal LBs, no UDP

Slide 30

Slide 30 text

Gateway Load Balancer Gateway Load Balancer allow to easily deploy, scale, and manage NVAs Benefits • integrate NVA transparently • Easy add or remove - scaling • Improve NVA availability • Chain applications across regions and subscriptions

Slide 31

Slide 31 text

DEMO – LOAD BALANCERS

Slide 32

Slide 32 text

Azure Traffic Manager (TM) Azure Front Door (AFD)

Slide 33

Slide 33 text

Azure Traffic Manager Azure Traffic Manager is a DNS-based traffic load balancer that enables you to distribute traffic optimally to services across global Azure regions • Global DNS load balancing • Automatic failover when an endpoint goes down • Combine with hybrid applications Supports external, non-Azure endpoints so that it can be used with hybrid cloud and on-premises deployments • Distribute traffic for complex deployments Use nested Traffic Manager profiles for sophisticated, flexible rules for complex deployments

Slide 34

Slide 34 text

Azure Front Door Azure Front Door Service provides a scalable and secure entry point for fast delivery of your global web applications • SSL offload and application acceleration • Global HTTP load balancing with instant failover • Application Firewall and DDoS protection • Centralized traffic orchestration view

Slide 35

Slide 35 text

Single region apps Network Edge POP Azure region www.contoso.com Global Network /* /search/* Accelerate Multi-region apps Network Edge POP Azure region 1 www.contoso.com Global Network Accelerate Azure region 2 Fail over Azure Front Door Single or multi-region app and API acceleration Improve HTTP performance and reduce page load times Load balancing at the Edge and fast- failover Build always-on application experiences that fail-fast (safely) Integrated SSL, WAF and DDoS Protect and scale your application to global users, devices, traffic and attacks

Slide 36

Slide 36 text

Traffic Manager or Front Door?

Slide 37

Slide 37 text

Traffic Manager or Front Door?

Slide 38

Slide 38 text

What to use?

Slide 39

Slide 39 text

DEMO – LOAD BALANCING

Slide 40

Slide 40 text

OK … … but that’s only outside networks

Slide 41

Slide 41 text

Service Endpoints and Private Link

Slide 42

Slide 42 text

PaaS Services and Networking PaaS Services are designed to be accessed via public endpoints Two main challenges • Access “internal” data sources from PaaS (e.g. present SAP data in Azure WebApp) • Access PaaS Services from “internal” Systems (e.g. use Azure SQL DB with an app running in a VM with no Internet access) Ways to integrate PaaS into networks

Slide 43

Slide 43 text

PaaS Services and Networking

Slide 44

Slide 44 text

Private PaaS SERVICE ENDPOINT PRIVATE LINK – PRIVATE ENDPOINT • VNet to PaaS service via the Microsoft backbone • Destination is still a public IP address. NSG opened to Service Tags • Need to pass NVA/Firewall for exfiltration protection • VNet Paas via the Microsoft backbone • PaaS resource mapped to Private IP Address. NSGs restricted to VNet space • Built-in data exfiltration protection Virtual Network (10.0.0.0/16) Rule Destination Access stg STORAGE Allow vnet VNET Allow internet INTERNET Deny Virtual Network (10.0.0.0/16) Rule Destination Access vnet VNET Allow internet INTERNET Deny

Slide 45

Slide 45 text

Data Exfiltration Protection • Private Endpoint maps specific PaaS resource to an IP address, not the entire service • Access only to mapped PaaS resource • Data exfiltration protection is in-built Private Endpoint 10.0.0.1 Mapped Account Un-Mapped Accounts Deny Internet Private Link

Slide 46

Slide 46 text

Secure connectivity from on-premises Storage SQL Good Better Best Storage SQL Storage SQL On-premises On-premises On-premises • Traffic traverses the Internet • Secured using ACLs on Public Ips • Corporate firewall open to Azure Public IPs • Traffic stays within Microsoft and partner network • MS Peering draws Microsoft Public IP traffic • Corporate Firewall open to Azure Public IPs • Traffic is fully private traversing the Microsoft network • No exposure of public IPs on either side • Corporate Firewall open only to private Internet Internet Inter MS Peering Internet Interne MS Peering PUBLIC IP ACL Public Internet Microsoft Network PUBLIC IP ACL Private Peering Private Link

Slide 47

Slide 47 text

Azure Private Link Private access from Virtual Network resources, peered networks and on-premise networks In-built Data Exfiltration Protection Predictable private IP addresses for PaaS resources Unified experience across PaaS, Customer Owned and marketplace Services Private Link for Azure Storage, SQL DB and customer own service Azure PaaS and marketplace services ER Private Peering ER Gateway Private endpoint 10.0.0.5 Deny Internet On-premises Virtual Network (10.0.0.0/16) Private Link Storage SQL DW SQL Marketplace

Slide 48

Slide 48 text

There is even more …

Slide 49

Slide 49 text

Your Own Private Link Service • Create or Convert your existing services into Private Link Service • VNet-VNet Connectivity without worrying about overlapping IP Space • No regional, tenant, subscription or RBAC restrictions • Easily Scale and manage your service Private Link Service

Slide 50

Slide 50 text

Create Private Link Service • Application running behind Standard Load Balancer can be converted into Private Link service with one click of a button/one API call • Private Link Service tied to Frontend IP configuration of Standard Load Balancer • Frontend IP Configuration can be either Public or Private Subnet (10.0.1.0/24) Application VMs Standard Load Balancer Private Link Service Virtual Network (10.0.0.0/16)

Slide 51

Slide 51 text

Consume Private Link Service • Create a Private Endpoint in your VNet linking to Private Link Service. • Multiple consumers can connect to same service. No RBAC restrictions. Subnet (10.0.1.0/24) Application VMs Virtual Network (10.0.0.0/16) Private Endpoint 10.0.1.5

Slide 52

Slide 52 text

Approval Workflow Service Provider Service Consumer Subnet Application VMs Standard ILB Create your application behind a standard Load Balancer. 1 2 Create a Private Link Service attached to SLB FE IP. 3 Share the private link service ID (Alias/ARM URI) with consumers. You can either do it offline or advertise publicly. Create a Private endpoint in any subnet by specifying a private Link service URI/Alias. 4 5 Configure your DNS record for easy access using the private IP address (CA). 6 Act on the request – Accept/Reject It. Connection Succeeded/Rejected. 7 . . .azure.privatelinkservice

Slide 53

Slide 53 text

Complete Picture Subnet (10.0.1.0/24) Standard Load Balancer Private Link Service Virtual Network (10.0.0.0/16) Subnet (10.0.1.0/24) VMs Virtual Network (10.0.0.0/16) Private Endpoint 10.0.1.5 Service Provider Service Consumer Application VMs Private Link Microsoft Network Deny Internet Deny Internet

Slide 54

Slide 54 text

DNS for PaaS?!

Slide 55

Slide 55 text

What about DNS? Public DNS is “no longer working” when using Azure Private Endpoints! E.g. Storage Account: https://demostordus2021.blob.core.windows.net https://demostordus2021pep.blob.core.windows.net

Slide 56

Slide 56 text

Azure Private DNS Create Private DNS zones for your services (can be done at creation !!! ATTENTION)

Slide 57

Slide 57 text

DEMO – Private Link / Endpoint

Slide 58

Slide 58 text

Azure Private DNS at Scale Consider Enterprise CAF Solution • Prepare central private DNS zones • Deny creation of Private DNS zones in spokes via policy • Create Azure Policy to “DeployIfNotExisits” a DNS Zone Group to Private Endpoints Solution will take care of everything BUT • bound to one tenant, as policy resides in one tenant • Only one DNS Zone supported per policy

Slide 59

Slide 59 text

How are things built?

Slide 60

Slide 60 text

WestUS WestEurope

Slide 61

Slide 61 text

WestUS WestEurope RG01 RG03 RG02 RGHUB

Slide 62

Slide 62 text

WestUS WestEurope ER RG01 RG03 RG02 RGHUB HUB-VNET01 VPN

Slide 63

Slide 63 text

WEB01 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 VPN

Slide 64

Slide 64 text

WEB01 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER VNET- Peering RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 Global VNET-Peering VPN VPN

Slide 65

Slide 65 text

WEB01 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER VNET- Peering RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 Global VNET-Peering VPN VPN Azure Firewall Firewall Manager NVA01

Slide 66

Slide 66 text

WEB01 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER VNET- Peering RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 Global VNET-Peering VPN VPN Azure Firewall Firewall Manager Bastion NVA01

Slide 67

Slide 67 text

WEB01 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER VNET- Peering RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 Global VNET-Peering VPN VPN Azure Firewall Firewall Manager Bastion NVA01 Private Endpoint STORAGES

Slide 68

Slide 68 text

WEB01 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER VNET- Peering RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 Global VNET-Peering Azure DNS VPN VPN Azure Firewall Firewall Manager Bastion CDN NVA01 Private Endpoint STORAGES

Slide 69

Slide 69 text

WEB01 + 04 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER VNET- Peering RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 Global VNET-Peering Azure DNS VPN VPN Azure Firewall Firewall Manager Bastion Load Balancer CDN Web Application Firewall NVA01 Private Endpoint STORAGES

Slide 70

Slide 70 text

WEB01 + 04 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER VNET- Peering RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 Global VNET-Peering Azure DNS VPN VPN Azure Firewall Firewall Manager Bastion Load Balancer Traffic Manager Azure Front Door CDN Web Application Firewall NVA01 Private Endpoint STORAGES

Slide 71

Slide 71 text

WEB01 + 04 NICs WEB02 WEB02-NIC WEB03 WEB03-NIC WestUS WestEurope ER VNET- Peering RG01 RG03 RG02 RGHUB HUB-VNET01 VNET01 VNET02 VNET03 Global VNET-Peering Azure DNS VPN VPN Azure Firewall Firewall Manager Bastion Load Balancer Traffic Manager Azure Front Door CDN Web Application Firewall DDoS Protection Virtual WAN Network Watcher NVA01 Private Endpoint STORAGES

Slide 72

Slide 72 text

No content

Slide 73

Slide 73 text

No content

Slide 74

Slide 74 text

Want to dive deeper?! Azure PaaS, but as private as possible… Stephan Graber – 14:25 Azure Virtual Network Manager: The future of network management? Marcel Zehner – 15:40