You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/networking/fundamentals/networking-overview.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,14 +40,14 @@ You can filter network traffic to and from Azure resources in an Azure virtual n
40
40
41
41
[Virtual Network (VNet) service endpoints](../../virtual-network/virtual-network-service-endpoints-overview.md) extend your virtual network private address space and the identity of your virtual network to the Azure services, over a direct connection. Endpoints allow you to secure your critical Azure service resources to only your virtual networks. Traffic from your virtual network to the Azure service always remains on the Microsoft Azure backbone network.
42
42
43
-
:::image type="content" source="./media/networking-overview/vnet-service-endpoints-overview.png" alt-text="Virtual network service endpoints":::
43
+
:::image type="content" source="./media/networking-overview/vnet-service-endpoints-overview.png" alt-text="Diagram of virtual network service endpoints.":::
44
44
45
45
### <aname="privatelink"></a>Azure Private Link
46
46
47
47
[Azure Private Link](../../private-link/private-link-overview.md) enables you to access Azure PaaS Services (for example, Azure Storage and SQL Database) and Azure hosted customer-owned/partner services over a private endpoint in your virtual network.
48
48
Traffic between your virtual network and the service travels through the Microsoft backbone network. Exposing your service to the public internet is no longer necessary. You can create your own private link service in your virtual network and deliver it to your customers.
:::image type="content" source="./media/networking-overview/private-endpoint.png" alt-text="Screenshot of private endpoint overview.":::
51
51
52
52
### <aname="dns"></a>Azure DNS
53
53
@@ -79,15 +79,15 @@ Using Azure DNS, you can host and resolve public domains, manage DNS resolution
79
79
Virtual Network NAT(network address translation) simplifies outbound-only Internet connectivity for virtual networks. When configured on a subnet, all outbound connectivity uses your specified static public IP addresses. Outbound connectivity is possible without load balancer or public IP addresses directly attached to virtual machines.
80
80
For more information, see [What is Azure NAT gateway](../../virtual-network/nat-gateway/nat-overview.md)?
:::image type="content" source="./media/networking-overview/flow-map.png" alt-text="Diagram of virtual network NAT gateway.":::
83
83
84
84
### <aname="trafficmanager"></a>Traffic Manager
85
85
86
86
[Azure Traffic Manager](../../traffic-manager/traffic-manager-routing-methods.md) is a DNS-based traffic load balancer that enables you to distribute traffic optimally to services across global Azure regions, while providing high availability and responsiveness. Traffic Manager provides a range of traffic-routing methods to distribute traffic such as priority, weighted, performance, geographic, multi-value, or subnet.
87
87
88
88
The following diagram shows endpoint priority-based routing with Traffic Manager:
[Azure Application Gateway](../../application-gateway/overview.md) is a web traffic load balancer that enables you to manage traffic to your web applications. It's an Application Delivery Controller (ADC) as a service, offering various layer 7 load-balancing capabilities for your applications.
119
119
120
120
The following diagram shows url path-based routing with Application Gateway.
:::image type="content" source="./media/networking-overview/figure1-720.png" alt-text="Image of Application Gateway example.":::
123
123
124
124
### <aname="frontdoor"></a>Azure Front Door
125
125
@@ -147,7 +147,7 @@ The following diagram illustrates multiple site-to-site VPN connections to the s
147
147
148
148
[ExpressRoute](../../expressroute/expressroute-introduction.md) enables you to extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. This connection is private. Traffic doesn't go over the internet. With ExpressRoute, you can establish connections to Microsoft cloud services, such as Microsoft Azure, Microsoft 365, and Dynamics 365.
:::image type="content" source="./media/networking-overview/expressroute-connection-overview.png" alt-text="Screenshot of Azure ExpressRoute." border="false":::
151
151
152
152
### <aname="virtualwan"></a>Virtual WAN
153
153
@@ -183,15 +183,15 @@ This section describes networking services in Azure that protects and monitor yo
183
183
184
184
[Azure Firewall](../../firewall/overview.md) is a managed, cloud-based network security service that protects your Azure Virtual Network resources. Using Azure Firewall, you can centrally create, enforce, and log application and network connectivity policies across subscriptions and virtual networks. Azure Firewall uses a static public IP address for your virtual network resources allowing outside firewalls to identify traffic originating from your virtual network.
:::image type="content" source="./media/networking-overview/firewall-threat.png" alt-text="Diagram of Firewall overview.":::
187
187
188
188
### <aname="waf"></a>Web Application Firewall
189
189
190
190
[Azure Web Application Firewall](../../web-application-firewall/overview.md) (WAF) provides protection to your web applications from common web exploits and vulnerabilities such as SQL injection, and cross site scripting. Azure WAF provides out of box protection from OWASP top 10 vulnerabilities via managed rules. Additionally customers can also configure custom rules, which are customer managed rules to provide extra protection based on source IP range, and request attributes such as headers, cookies, form data fields, or query string parameters.
191
191
192
192
Customers can choose to deploy [Azure WAF with Application Gateway](../../web-application-firewall/ag/ag-overview.md), which provides regional protection to entities in public and private address space. Customers can also choose to deploy [Azure WAF with Front Door](../../web-application-firewall/afds/afds-overview.md) which provides protection at the network edge to public endpoints.
0 commit comments