Azure Virtual Networks

Clear InfoSec
4 min readJul 19, 2019

--

“First, our focus on security is on the infrastructure itself. So, it is all about how you protect the network, the device, and the application that is riding on the server” — John W. Thomson.

Azure Virtual Networks — Azure Security Center

As we connect virtual machines using virtual networks which are created in Hyper-V, we do the same in Azure too as a Cloud-Only VNet and create a Cross-Premises VNet by connecting with on-premises network. But azure Virtual Networks (VNets) are not just virtually connected they are also secure by providing network isolation from each VNet. Totally VNets are controlled by you like setting policies, DNS, routing tables, IP address blocks etc., through making private connections by ExpressRoute or VPN gateways which are secured.

Securely connecting VNet

Point-to-site virtual private network (VPN): In this a private and secure connection is established through a VPN between a VNet and individual computer on your network using Secure Socket Tunneling Protocol (SSTP) for encryption

Site-to-site VPN: In this the connection is securely established between Azure VPN Gateway and your VPN using IPSec/IKE for encryption.

On-premise connectivity without Internet traverse

There may be time when you don’t want to send the data through internet. That’s when Azure ExpressRoute comes into play. In Azure ExpressRoute, the traffic can’t be traversed through internet because it is a private connection established between Azure and your network via an ExpressRoute

Internal name resolution vs External name resolution

Internal name resolution

It works in on-premises or both networks which are used for services present in VNet. When creating a VNet a DNS server is created by default or you can put your own DNS server. The default DNS server is managed by fabric manager, so it is not configurable. Therefore, name resolution is secured. The chosen DNS server is provided by Azure partner so it can be a dedicated or an Active Directory integrated.

External name resolution

It works outside the VNet and On-premises networks by people and devices. External DNS servers can be hosted on On-premises networks either with their own or from a service provider. Both provides the expertise in networking and global presence, but service provider gives very high availability

Built-in protection for Attacks

Despite of the complexity of DDoS attacks, Azure provides a built-in protection to protect all cloud services. All Azure datacenters are deployed with the public IP’s that come under this protection

How the traffic filtering, routing and monitoring done for security in Virtual networks?

Traffic filtering

Generally inbound and outbound traffic filtering is done using source, destination IP addresses and port. The subnets traffic is filtered using either or both options mentioned below:

Network security groups (NSG): It is a stateful packet filtering firewall. These allow the traffic whether to permit or deny based on rules to access Virtual Machines in your VNet. The rules for outbound and inbound traffic by default is set to deny.

Network virtual appliances (NVA): It is a software that strengthens security, network functions and runs on VM which performs a network traffic functions and WAN optimization.

Forced Tunneling: A mechanism that doesn’t allow the services get connected to devices through internet and traffic is routed using BGP or custom route from virtual machines to on-premises.

Routing

The routing can be customized, controlled and make sure that traffic that enters or leaves VNet from devices are done through a specific location

Azure Front Door: It can monitor, manage the routing of web traffic and used for high performance and availability.

Azure Traffic Manager: It manages the traffic by directing the requests from clients to the suitable end points through endpoints health and traffic routing method. So, it acts like a load balancer based on DNS that make the traffic to be distributed to the services in any location.

Monitoring and threat detection

Azure has many tools to detect, monitor, prevent, collect and review the network traffic.

Azure Network Watcher is used to diagnose, troubleshoot the network, monitor performance and assist in identifying and to resolving the security issues.

Virtual Network TAP will make the analytics tool or a network packet collector to collect the network traffic of virtual machine. This can able to aggregate the traffic from different subscriptions

Azure Security Center gives the visibility to the customers and security of the resources are controlled by it.

So, by going through this post we can say that Virtual Networks are not just virtually connected, their scope is beyond it and can be configured and managed according to the requirements.

References:

--

--

Clear InfoSec
Clear InfoSec

Written by Clear InfoSec

Clear InfoSec is the subsidiary of Ana-Data Consulting Inc. that provides Information Security Services to help organizations improve their security posture.

No responses yet