You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network/virtual-networks-faq.md
+20-22Lines changed: 20 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,10 +49,10 @@ Yes. You can deploy a [network virtual appliance for WAN optimization](https://a
49
49
50
50
You can use the following tools to create or configure a virtual network:
51
51
52
-
* Azure portal.
53
-
* PowerShell.
54
-
* Azure CLI.
55
-
* Network configuration file (`netcfg`, for classic virtual networks only). For more information, see [Configure a virtual network using a network configuration file](/previous-versions/azure/virtual-network/virtual-networks-using-network-configuration-file).
52
+
* Azure portal
53
+
* PowerShell
54
+
* Azure CLI
55
+
*[Network configuration file](/previous-versions/azure/virtual-network/virtual-networks-using-network-configuration-file) (`netcfg`, for classic virtual networks only)
56
56
57
57
### What address ranges can I use in my virtual networks?
58
58
@@ -86,7 +86,7 @@ Yes. See [Networking limits](../azure-resource-manager/management/azure-subscrip
86
86
87
87
### Are there any restrictions on using IP addresses within these subnets?
88
88
89
-
Yes. Azure reserves the first four addresses and the last IP address, for a total of five IP addresses within each subnet.
89
+
Yes. Azure reserves the first four addresses and the last address, for a total of five IP addresses within each subnet.
90
90
91
91
For example, the IP address range of 192.168.1.0/24 has the following reserved addresses:
92
92
@@ -128,8 +128,6 @@ You can use TCP, UDP, ESP, AH, and ICMP TCP/IP protocols in virtual networks.
128
128
129
129
Unicast is supported in virtual networks. Multicast, broadcast, IP-in-IP encapsulated packets, and Generic Routing Encapsulation (GRE) packets are blocked in virtual networks. You can't use Dynamic Host Configuration Protocol (DHCP) via Unicast (source port UDP/68, destination port UDP/67). UDP source port 65330 is reserved for the host.
130
130
131
-
For more information about what is and isn't supported for DHCP, see [Can I deploy a DHCP server in a virtual network?](#can-i-deploy-a-dhcp-server-in-a-virtual-network).
132
-
133
131
### Can I deploy a DHCP server in a virtual network?
134
132
135
133
Azure virtual networks provide DHCP service and DNS to VMs and client/server DHCP (source port UDP/68, destination port UDP/67) not supported in a virtual network.
@@ -169,7 +167,7 @@ Every cloud service deployed in Azure has a publicly addressable virtual IP (VIP
169
167
170
168
### Do virtual networks support IPv6?
171
169
172
-
Yes, virtual networks can be IPv4 only or dual stack (IPv4 + IPv6). For details, see [What is IPv6 for Azure Virtual Network?](./ip-services/ipv6-overview.md).
170
+
Yes. Virtual networks can be IPv4 only or dual stack (IPv4 + IPv6). For details, see [What is IPv6 for Azure Virtual Network?](./ip-services/ipv6-overview.md).
173
171
174
172
### Can a virtual network span regions?
175
173
@@ -209,7 +207,7 @@ If you change your DNS server list, you need to perform a DHCP lease renewal on
209
207
Azure-provided DNS is a multitenant DNS service from Microsoft. Azure registers all of your VMs and cloud service role instances in this service. This service provides name resolution:
210
208
211
209
* By host name for VMs and role instances in the same cloud service.
212
-
* By FQDN for VMs and role instances in the same virtual network.
210
+
* By fully qualified domain main (FQDN) for VMs and role instances in the same virtual network.
213
211
214
212
To learn more about DNS, see [Name resolution for resources in Azure virtual networks](virtual-networks-name-resolution-for-vms-and-role-instances.md).
215
213
@@ -231,7 +229,7 @@ Yes. All network adapters (NICs) attached to a VM that's deployed through the Re
231
229
232
230
### What are the types of IP addresses that I can assign to VMs?
233
231
234
-
***Private**: Assigned to each NIC within each VM. The address is assigned through the static or dynamic method. Private IP addresses are assigned from the range that you specified in the subnet settings of your virtual network.
232
+
***Private**: Assigned to each NIC within each VM, through the static or dynamic method. Private IP addresses are assigned from the range that you specified in the subnet settings of your virtual network.
235
233
236
234
Resources deployed through the classic deployment model are assigned private IP addresses, even if they're not connected to a virtual network. The behavior of the allocation method is different depending on whether you deployed a resource by using the Resource Manager or classic deployment model:
237
235
@@ -240,7 +238,7 @@ Yes. All network adapters (NICs) attached to a VM that's deployed through the Re
240
238
241
239
***Public**: Optionally assigned to NICs attached to VMs deployed through the Resource Manager deployment model. You can assign the address by using the static or dynamic allocation method.
242
240
243
-
All VMs and Azure Cloud Services role instances deployed through the classic deployment model exist within a cloud service, which is assigned a dynamic, public VIP address. You can optionally assign a public static IP address, called a [reserved IP address](/previous-versions/azure/virtual-network/virtual-networks-reserved-public-ip), as a VIP.
241
+
All VMs and Azure Cloud Services role instances deployed through the classic deployment model exist within a cloud service. The cloud service is assigned a dynamic, public VIP address. You can optionally assign a public static IP address, called a [reserved IP address](/previous-versions/azure/virtual-network/virtual-networks-reserved-public-ip), as a VIP.
244
242
245
243
You can assign public IP addresses to individual VMs or Cloud Services role instances deployed through the classic deployment model. These addresses are called [instance-level public IP](/previous-versions/azure/virtual-network/virtual-networks-instance-level-public-ip) addresses and can be assigned dynamically.
246
244
@@ -274,7 +272,7 @@ No. You can't statically configure a MAC address.
274
272
275
273
### Does the MAC address remain the same for my VM after it's created?
276
274
277
-
Yes, the MAC address remains the same for a VM that you deployed through both the Resource Manager and classic deployment models until you delete it.
275
+
Yes. The MAC address remains the same for a VM that you deployed through both the Resource Manager and classic deployment models until you delete it.
278
276
279
277
Previously, the MAC address was released if you stopped (deallocated) the VM. But now, the VM retains the MAC address when it's in the deallocated state. The MAC address remains assigned to the network adapter until you do one of these tasks:
280
278
@@ -291,7 +289,7 @@ Yes. All VMs and Cloud Services role instances deployed within a virtual network
291
289
292
290
Yes. You can deploy the Web Apps feature of Azure App Service inside a virtual network by using an App Service Environment. You can then:
293
291
294
-
* Connect the back end of your apps to your virtual networks with by using virtual network integration.
292
+
* Connect the back end of your apps to your virtual networks by using virtual network integration.
295
293
* Lock down inbound traffic to your app by using service endpoints.
296
294
297
295
For more information, see the following articles:
@@ -387,12 +385,12 @@ Yes. Global virtual network peering enables you to peer virtual networks in diff
387
385
388
386
### What are the constraints related to global virtual network peering and load balancers?
389
387
390
-
If the two virtual networks in two regions are peered over global virtual network peering, you can't connect to resources that are behind a Basic load balancer through the front-end IP of the load balancer. This restriction doesn't exist for a Standard load balancer.
388
+
If the two virtual networks in two regions are peered over global virtual network peering, you can't connect to resources that are behind a basic load balancer through the front-end IP of the load balancer. This restriction doesn't exist for a standard load balancer.
391
389
392
-
The following resources can use Basic load balancers, which means you can't reach them through the load balancer's front-end IP over global virtual network peering. But you can use global virtual network peering to reach the resources directly through their private virtual network IPs, if permitted.
390
+
The following resources can use basic load balancers, which means you can't reach them through a load balancer's front-end IP over global virtual network peering. But you can use global virtual network peering to reach the resources directly through their private virtual network IPs, if permitted.
393
391
394
-
* VMs behind Basic load balancers
395
-
* Virtual machine scale sets with Basic load balancers
392
+
* VMs behind basic load balancers
393
+
* Virtual machine scale sets with basic load balancers
396
394
* Azure Cache for Redis
397
395
* Azure Application Gateway v1
398
396
* Azure Service Fabric
@@ -523,7 +521,7 @@ Virtual network service endpoints help protect Azure service resources. Virtual
523
521
524
522
### Is there any cost for using virtual network service endpoints?
525
523
526
-
No, there's no additional cost for using virtual network service endpoints.
524
+
No. There's no additional cost for using virtual network service endpoints.
527
525
528
526
### Can I turn on virtual network service endpoints and set up virtual network ACLs if the virtual network and the Azure service resources belong to different subscriptions?
529
527
@@ -553,13 +551,13 @@ The service returns an HTTP 403 or HTTP 404 error.
553
551
554
552
### Are subnets of a virtual network created in different regions allowed to access an Azure service account in another region?
555
553
556
-
Yes. For most of the Azure services, virtual networks created in different regions can access Azure services in another region through the virtual network service endpoints. For example, if an Azure Cosmos DB account is in the West US or East US region, and virtual networks are in multiple regions, the virtual network can access Azure Cosmos DB.
554
+
Yes. For most of the Azure services, virtual networks created in different regions can access Azure services in another region through the virtual network service endpoints. For example, if an Azure Cosmos DB account is in the West US or East US region, and virtual networks are in multiple regions, the virtual networks can access Azure Cosmos DB.
557
555
558
556
Azure Storage and Azure SQL are exceptions and are regional in nature. Both the virtual network and the Azure service need to be in the same region.
559
557
560
558
### Can an Azure service have both a virtual network ACL and an IP firewall?
561
559
562
-
Yes, a virtual network ACL and an IP firewall can coexist. The features complement each other to help ensure isolation and security.
560
+
Yes. A virtual network ACL and an IP firewall can coexist. The features complement each other to help ensure isolation and security.
563
561
564
562
### What happens if you delete a virtual network or subnet that has service endpoints turned on for Azure services?
565
563
@@ -573,7 +571,7 @@ The deletion of an Azure service account is an independent operation. It's suppo
573
571
574
572
### What happens to the source IP address of a resource (like a VM in a subnet) that has virtual network service endpoints turned on?
575
573
576
-
When you turn on virtual network service endpoints, the source IP addresses of the resources in your virtual network's subnet switch from using public IPv4 addresses to the Azure virtual network's private IP addresses for traffic to Azure services. This switch can cause specific IP firewalls that are set to a public IPv4 address earlier on the Azure services to fail.
574
+
When you turn on virtual network service endpoints, the source IP addresses of the resources in your virtual network's subnet switch from using public IPv4 addresses to using the Azure virtual network's private IP addresses for traffic to Azure services. This switch can cause specific IP firewalls that are set to a public IPv4 address earlier on the Azure services to fail.
577
575
578
576
### Does the service endpoint route always take precedence?
579
577
@@ -583,7 +581,7 @@ For more information about how Azure selects a route, see [Virtual network traff
583
581
584
582
### Do service endpoints work with ICMP?
585
583
586
-
No, ICMP traffic that's sourced from a subnet with service endpoints enabled won't take the service tunnel path to the desired endpoint. Service endpoints handle only TCP traffic. If you want to test latency or connectivity to an endpoint via service endpoints, tools like ping and tracert won't show the true path that the resources within the subnet will take.
584
+
No. ICMP traffic that's sourced from a subnet with service endpoints enabled won't take the service tunnel path to the desired endpoint. Service endpoints handle only TCP traffic. If you want to test latency or connectivity to an endpoint via service endpoints, tools like ping and tracert won't show the true path that the resources within the subnet will take.
587
585
588
586
### How do NSGs on a subnet work with service endpoints?
Copy file name to clipboardExpand all lines: articles/virtual-network/virtual-networks-overview.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,21 +19,21 @@ A virtual network is similar to a traditional network that you'd operate in your
19
19
20
20
Key scenarios that you can accomplish with a virtual network include:
21
21
22
-
- Communication of Azure resources with the internet
22
+
- Communication of Azure resources with the internet.
23
23
24
-
- Communication between Azure resources
24
+
- Communication between Azure resources.
25
25
26
-
- Communication with on-premises resources
26
+
- Communication with on-premises resources.
27
27
28
-
- Filtering of network traffic
28
+
- Filtering of network traffic.
29
29
30
-
- Routing of network traffic
30
+
- Routing of network traffic.
31
31
32
-
- Integration with Azure services
32
+
- Integration with Azure services.
33
33
34
34
### Communicate with the internet
35
35
36
-
All resources in a virtual network can communicate outbound with the internet, by default. You can also use a [public IP address](./ip-services/virtual-network-public-ip-address.md), [NAT gateway](../nat-gateway/nat-overview.md), or a [public load balancer](../load-balancer/load-balancer-overview.md) to manage your [outbound connections](../load-balancer/load-balancer-outbound-connections.md). You can communicate inbound with a resource by assigning a public IP address or a public load balancer.
36
+
All resources in a virtual network can communicate outbound with the internet, by default. You can also use a [public IP address](./ip-services/virtual-network-public-ip-address.md), [NAT gateway](../nat-gateway/nat-overview.md), or [public load balancer](../load-balancer/load-balancer-overview.md) to manage your [outbound connections](../load-balancer/load-balancer-outbound-connections.md). You can communicate inbound with a resource by assigning a public IP address or a public load balancer.
37
37
38
38
When you're using only an [internal standard load balancer](../load-balancer/load-balancer-overview.md), outbound connectivity is not available until you define how you want outbound connections to work with an instance-level public IP address or a public load balancer.
0 commit comments