azure-landing-zones-ARM

Navigation Menu

D. Network Topology and Connectivity

This section will examine key design considerations and recommendations surrounding networking and connectivity to/from Azure, as well as within Azure.

1. Planning for IP Addressing

It is vital that enterprise customers plan for IP addressing in Azure to ensure there is no overlapping IP address space across considered on-premises locations and Azure regions.

Design Considerations

Design Recommendations

2. Configure DNS and name resolution for on-premises and Azure resources

DNS is a critical design topic in the overall Enterprise Scale architecture, and while some customers may want to use their existing investments in DNS, others may see cloud adoption as an opportunity to modernize their internal DNS infrastructure and leverage native Azure capabilities.

Design Considerations

Design Recommendations

3. Define an Azure Networking Topology

Network topology is a critical foundational element of the Enterprise Scale architecture as it ultimately defines how applications can communicate with one another. This section will therefore explore relevant technologies and topology approaches for enterprise Azure deployments,focusing on two core approaches:

A. Azure Virtual WAN Based Networking Topology B. Traditional Azure Networking Topology

An Azure networking topology based-on Azure Virtual WAN is the preferred Enterprise Scale approach for large scale multi-region deployments where the customer needs to interconnect all their global locations on both Azure and on-premises. An Azure Virtual WAN based network topology should also be used whenever the customer intends to leverage SD-WAN deployments fully integrated with Azure. Azure Virtual WAN is used to meet these large-scale interconnectivity requirements, but at the same time it will also reduce overall network complexity and help to modernize the customers network since Virtual WAN is a networking service managed by Microsoft.

However, a traditional Azure networking topology should be used for customers that either 1) only intend to deploy resources in a few Azure regions, 2) have no need for a global interconnected network, 3) have a low number of remote/branch locations per region (less than 30), and/or 4)require full control and granularity for manually configuring their Azure network. This will enable these customers to build a secure network foundation in Azure.

A. Azure Virtual WAN (Microsoft Managed) Based Network Topology

[Network Topology and Connectivity] Figure 6 – Azure Virtual WAN based network topology

Design Considerations

[Network Topology and Connectivity] Figure 7 – Global transit network with Azure Virtual WAN

Design Recommendations

[Example Network Topology] Figure 8 – Example Network Topology

B. Traditional Azure Networking (Customer Managed) Topology

While Azure VWAN offers a wide range of powerful capabilities, there are some cases where a traditional Azure networking approach may preferential, such as:

[Network Topology and Connectivity] Figure 9 – Customer managed Azure network topology

Design Considerations

Design Recommendations

Network Topology and Connectivity Figure 10 – Hub and spoke network topology

Network Topology and Connectivity Figure 11 – Multiple VNets connected with multiple ExpressRoute circuits

Network Topology and Connectivity

4. Connectivity to Azure

This section will expand on the network topology to consider recommended models for connecting on-premises locations to Azure.

Design Considerations

Design Recommendations

5. Connectivity to Azure PaaS Services

Building on the previous connectivity sections, this section will explore recommended connectivity approaches when leveraging Azure PaaS services.

Design Considerations

Design Recommendations

6. Planning for Inbound and Outbound Internet Connectivity

This section describes recommended connectivity models for inbound and outbound connectivity to and from the public Internet.

Design Considerations

Design Recommendations

7. Planning for Application Delivery

This section explores key recommendations to deliver internal and external facing applications in a secure, highly scalable and highly available manner.

Design Considerations

Design Recommendations

8. Planning for “Landing Zone” Network Segmentation

This section explores key recommendations to deliver highly secure internal network segmentation within a “Landing Zone” to drive a network Zero Trust implementation.

Design Considerations

Design Recommendations

9. Define Network Encryption Requirements

This section explores key recommendations to achieve network encryption between on-premises and Azure as well as across Azure regions.

Design Considerations

Design Recommendations

[Encryption Flows] Figure 8 – Encryption Flows

10. Planning for Traffic Inspection

In many industries customers require that traffic in Azure, particularly inbound and outbound internet traffic, is mirrored to a network packet collector for deep inspection and analysis. This section therefore explores key considerations and recommended approaches for mirroring or tapping traffic within Azure Virtual Networks.

Design Considerations

Azure Virtual Network TAP (VTAP) is in preview, but your must reach to azurevnettap@microsoft.com for availability details. -Network Watcher packet captures in Network Watcher is GA, but captures are limited to a maximum period of 5 hours.

Design Recommendations