Тёмный

Azure Firewall & Hub | Create Hub-Spoke Network | AZ-305 | K21Academy 

K21Academy
Подписаться 64 тыс.
Просмотров 24 тыс.
50% 1

Опубликовано:

 

21 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 75   
@K21Academy
@K21Academy 4 месяца назад
💼 Join our free class to discover our exclusive three-step framework designed to help you achieve certification and secure high-paying jobs in Azure and DevOps: bit.ly/3XchMEA
@kirangem
@kirangem Год назад
Very clear explanation, though i have no prior networking knowledge I was able to understand the entire explanation. Thanks alot!
@K21Academy
@K21Academy Год назад
Thank you. yours words inspire us to do more and serve you with the best.
@niranjanrath789
@niranjanrath789 11 месяцев назад
Very nicely explained the concept of Hub and Spoke
@K21Academy
@K21Academy 10 месяцев назад
Glad you liked it! 😊 Please do let us know what videos you'll like to see next?
@FXK23
@FXK23 2 года назад
Great content, we're about to migrate to this architecture so many thanks for explaining hub-spoke arch. !
@K21Academy
@K21Academy Год назад
Thanks, keep watching!
@sambhavpandey
@sambhavpandey 2 года назад
Very nicely explained the concept of Hub and Spoke, thank you!
@K21Academy
@K21Academy 2 года назад
Thanks, keep watching!
@gotamp24
@gotamp24 Год назад
man you're awesome! Thank you for uploading this.
@K21Academy
@K21Academy Год назад
Hey thanks! Do let us know what would you love to watch next?
@aliasadpour-o7z
@aliasadpour-o7z 7 месяцев назад
thanks for sharing real scenario ,,very much clear explanation
@K21Academy
@K21Academy 7 месяцев назад
Glad it was helpful!
@bangtanboys7171
@bangtanboys7171 7 месяцев назад
very beautiful explanation ,seeing the architecture might terrifying for begineers or fresher after your brief anyone can accomplish!
@K21Academy
@K21Academy 7 месяцев назад
Glad you liked it!
@shubhamshukla4052
@shubhamshukla4052 2 месяца назад
Thankyou soo much for the detailed explanation. This session has really cleared my doubts and helped me achieving the deployments. Once again thanks a lot sir.
@K21Academy
@K21Academy 2 месяца назад
You are most welcome
@anrainmoore754
@anrainmoore754 2 года назад
This explanation was perfect. Thank you.
@K21Academy
@K21Academy Год назад
Thanks, keep watching!
@dukeyu87
@dukeyu87 Год назад
I remember in my previous organization, not all subnets have route table associated. And the traffic still goes to the firewall. How can that be achieved?
@K21Academy
@K21Academy Год назад
In order for traffic to go through the firewall, even if not all subnets have associated route tables, you can configure the default route on the firewall to forward all traffic to the appropriate destination. By setting up the default route, any traffic that does not have a specific route defined will be sent to the firewall for further processing and inspection. This ensures that all network traffic passes through the firewall, regardless of the subnet's individual route table configuration. Hope this helps. Regards Team K21Academy
@aarif6447
@aarif6447 2 года назад
Very crisp and informative.
@K21Academy
@K21Academy Год назад
Thanks, keep watching!
@K21Academy
@K21Academy Год назад
Thanks, keep watching!
@ivangandham9105
@ivangandham9105 2 года назад
Awesome..Explanation.Really liked it.Thank you so much for these kind of stuff.
@K21Academy
@K21Academy Год назад
Thanks, keep watching!
@FernandoMartinez-fl4cm
@FernandoMartinez-fl4cm 5 месяцев назад
Amazing material thanks so much for sharing
@K21Academy
@K21Academy 5 месяцев назад
Thank you for your kind words, we appreciate your support!
@niranjannt637
@niranjannt637 Год назад
Great walkthrough!!
@K21Academy
@K21Academy Год назад
Thanks, keep watching!
@Shravan_Reddy
@Shravan_Reddy Год назад
Good explanation. Could you also show how to use firewall to intercept traffic for malicious content in a scenario where there is a traffic manager and app services as its backend pools?
@K21Academy
@K21Academy 10 месяцев назад
To give you a short overview In a scenario where there is a Traffic Manager and App Services as its backend pools, Azure Firewall can be used to intercept traffic for malicious content by deploying it in the same virtual network as the App Services. This will allow Azure Firewall to inspect all traffic going to and from the App Services, and block any traffic that is found to be malicious. We cover this practical implementation during our sessions. To know more? Join our FREE Class: bit.ly/4a9v9cq
@Shravan_Reddy
@Shravan_Reddy 10 месяцев назад
Thanks @@K21Academy Does this mean, in this specific scenario a VNET is mandatory for App service setup?
@surbhisharma7853
@surbhisharma7853 2 года назад
Great Explanation👍🏻
@K21Academy
@K21Academy 2 года назад
Thank you, keep watching!
@yaaweehoo
@yaaweehoo Год назад
Indeed!
@raviteja-qq5rh
@raviteja-qq5rh 21 день назад
@@surbhisharma7853 Nice to see u..
@theconfusedchannel6365
@theconfusedchannel6365 2 месяца назад
Nice explanation. I do agree that it's explained very clearly. Could you please add traffic going from spoke1 to spoke2 via Firewall?
@K21Academy
@K21Academy 2 месяца назад
Thank you.. If you want to check the connectivity from spoke 1 to spoke 2 you can ping spoke 1 to spoke 2 or vice versa.
@Snehdeep1000
@Snehdeep1000 2 года назад
Thanks for your knowledge
@K21Academy
@K21Academy Год назад
Thanks, keep watching!
@K21Academy
@K21Academy Год назад
Thanks, keep watching!
@ris9hi
@ris9hi Год назад
Very nice content
@K21Academy
@K21Academy Год назад
Hey! Thanks for the feedback. Do let us know what videos you'd like to see next?
@sandeepdhuri
@sandeepdhuri 10 месяцев назад
dose azure firewall support ikev2 VPN (on premise to Azure ) or need VPN gateway
@K21Academy
@K21Academy 10 месяцев назад
Yes, Azure Firewall supports IKEv2 VPN for on-premises to Azure VPN connections. However, it is important to note that the Azure Firewall VPN Gateway is still required to create the connection.
@sandeepdhuri
@sandeepdhuri 10 месяцев назад
@@K21Academy Thank you
@dwu9369
@dwu9369 24 дня назад
Hello. I have a very similar architecture like this built but the work VMs in a spoke can't access work VMs in other spokes. What's the solution other than peering the spokes together?
@K21Academy
@K21Academy 18 дней назад
To enable communication between work VMs in different spokes without directly peering the spokes together, you can implement transitive routing via the hub. Here's the solution: 1. Use the Hub as a Transit Network: - In the hub-and-spoke model, the hub VNet (which typically has the firewall or a network virtual appliance) can act as the transit point between the spokes. 2. Configure User-Defined Routes (UDRs): - In each spoke, create a route table with UDRs that direct traffic meant for other spokes through the hub. - For example, traffic from Spoke1's subnet destined for Spoke2's subnet should be routed through the hub VNet. 3. Ensure the Azure Firewall or NVA Allows Inter-Spoke Traffic: - If you're using Azure Firewall or another network virtual appliance (NVA) in the hub, ensure it's configured to allow and inspect traffic between the spokes. - You may need to create appropriate rules to permit traffic between the spokes' IP ranges. 4. Use BGP if Applicable: - If you're using Azure Virtual WAN, BGP (Border Gateway Protocol) can automatically handle transitive routing between spoke VNets via the hub. 5. Network Security Group (NSG) Rules: - Ensure the NSGs in each spoke allow inbound and outbound traffic to the other spoke’s subnet ranges. By following these steps, you can achieve transitive routing through the hub without direct peering between spokes, keeping your architecture more scalable and secure.
@dwu9369
@dwu9369 18 дней назад
@@K21Academy Thanks. I actually figured this out a few days ago using the same methods you just described.
@Cmnmanuser
@Cmnmanuser 10 часов назад
Best content 👍
@satviktripathi24
@satviktripathi24 2 года назад
May i know how internet was working prior to attaching it with firewall vnet ? I think we need nat gateway in vnet for the same
@Cloudgyan87
@Cloudgyan87 2 года назад
internet is allowed by default on Azure Vms while creating
@nabendubhattacharya4738
@nabendubhattacharya4738 2 года назад
very well explained
@K21Academy
@K21Academy 2 года назад
Thanks, keep watching!
@abhiramg7899
@abhiramg7899 Месяц назад
Hi, could you please point me to previous topics ?
@K21Academy
@K21Academy Месяц назад
Hi there you can watch these videos : ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-gwFeyu_etmg.html ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-m3QV11sDDg4.html
@The24hrStruggle
@The24hrStruggle 2 года назад
hmm don't understand why you would route traffic from a different geo-region to another geo-region fw? you would said the traffic over the vNET peering to the speak to the other regions surely?
@praveenkumarp1357
@praveenkumarp1357 2 года назад
He was Deployed the HUB ( Firewall ) Subnet on a different region and all other two Spoke subnets was deployed on other two different regions. Inorder to communicate the Spoke Subnets to Firewall subnets we have to enable the Regional VNET Peering , then only Spoke Subnets on Different regions can communicate with Firewall Subnets. In Azure , Azure Firewall Deployment Under each VNETS is not a logical solution as it is bit Costly. That is the reason why he was created a Single firewall under firewall Subnet on Different region and routed all the Spoke Subnet Traffic towards to Firewall Subnet and attached the Spoke subnets on Routing tables. Which means any traffic that is originating from the Spokes subnet to any destinations will be routed to Azure Firewall and based on the Firewall rules ( Network/Application rules) the services will be allow/deny by firewall.
@ismashkhy
@ismashkhy 2 года назад
@@praveenkumarp1357 Azure VPN gateway is the major Trap, when you start creating your network and depending to it you need the VPN gateway as the core, and you realize later on the cost it incur that your whole mesh network is dependent to it you cannot just turn it off. that is why others are switching to SDNetworking, trashing the azure vpn gateway out of the scene. I maybe wrong about this, I would be happy someone could shed some light into this.
@rizwanmohammad07
@rizwanmohammad07 Год назад
Do we require NSG rule allowed for internet to achieve this
@K21Academy
@K21Academy Год назад
No, you do not need to configure Network Security Group (NSG) rules to allow internet access. When VM-work does not have a public IP and the traffic is passing through Azure Firewall, it means that the access to VM-work is restricted to internal network traffic only. In this setup, VM-work is not directly accessible from the internet, and its inbound traffic is controlled by the Azure Firewall. So if you setup NSG rules then also it will not show any response to it. Hope this helps! Regards Team K21Academy
@hammadrana2279
@hammadrana2279 11 месяцев назад
Great 👍
@K21Academy
@K21Academy 10 месяцев назад
Thank you! Cheers!
@romjohnawacay6390
@romjohnawacay6390 Год назад
Great thank you ❤
@K21Academy
@K21Academy Год назад
Hey, thanks to you too! Do let us know what videos you'd like to watch next?
@romjohnawacay6390
@romjohnawacay6390 Год назад
​@@K21Academy im looking for azure application gateway with multiple listners and backend pool
@K21Academy
@K21Academy Год назад
Thanks for the suggestion. Stay tuned!
@lucifermusic3010
@lucifermusic3010 2 года назад
Valuable content 👏👏
@K21Academy
@K21Academy 2 года назад
Thank you, keep watching!
@muralidharanr3392
@muralidharanr3392 10 месяцев назад
I see, you created two VM's with public IP's for each vnet. I think one VM with public IP is enough.. You can take any one work(spoke) machine using RDP from public IP machine. from that work(spoke) machine the second work machine can be taken for RDP.. just cost saving for public IP.. Another options is to enable bastion- can be in production environment (mid to big size).. Please comment on your views..
@K21Academy
@K21Academy 8 месяцев назад
We are using the hub as a firewall. This Firewall is common for 2 machines that are acting as 2 work machines in different machines. So if we are connecting one with public IP to other with private, then only one will be working at a time either. then there is no use of creating 2 separate work machines.
@dharmendrachauhan5020
@dharmendrachauhan5020 2 года назад
Awesome
@K21Academy
@K21Academy 2 года назад
Thanks, keep watching.
@Vinn.V
@Vinn.V 10 дней назад
👏🤗
Далее
#kikakim
00:17
Просмотров 7 млн
Create Database on Oracle Cloud | K21Academy
42:53
Просмотров 10 тыс.
What is Azure Express Route - Step by Step Demo
22:36
Azure Firewall Deep Dive
1:24:35
Просмотров 116 тыс.
Azure Virtual Network Manager Deep Dive
1:02:56
Просмотров 27 тыс.
What is Azure Firewall Basic and How to Deploy it
17:44