You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/fundamentals/network-overview.md
+12-13Lines changed: 12 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,12 +7,12 @@ author: TerryLanfear
7
7
manager: rkarlin
8
8
9
9
ms.assetid: bedf411a-0781-47b9-9742-d524cf3dbfc1
10
-
ms.service: information-protection
11
-
ms.subservice: aiplabels
10
+
ms.service: security
11
+
ms.subservice: security-fundamentals
12
12
ms.topic: article
13
13
ms.tgt_pltfrm: na
14
14
ms.workload: na
15
-
ms.date: 01/06/2022
15
+
ms.date: 03/31/2023
16
16
ms.author: terrylan
17
17
#Customer intent: As an IT Pro or decision maker, I am looking for information on the network security controls available in Azure.
18
18
@@ -96,9 +96,9 @@ The ability to control routing behavior on your virtual networks is critical. If
96
96
97
97
Azure networking supports the ability to customize the routing behavior for network traffic on your virtual networks. This enables you to alter the default routing table entries in your virtual network. Control of routing behavior helps you make sure that all traffic from a certain device or group of devices enters or leaves your virtual network through a specific location.
98
98
99
-
For example, you might have a virtual network security appliance on your virtual network. You want to make sure that all traffic to and from your virtual network goes through that virtual security appliance. You can do this by configuring [User Defined Routes](../../virtual-network/virtual-networks-udr-overview.md) (UDRs) in Azure.
99
+
For example, you might have a virtual network security appliance on your virtual network. You want to make sure that all traffic to and from your virtual network goes through that virtual security appliance. You can do this by configuring [User Defined Routes](../../virtual-network/virtual-networks-udr-overview.md#custom-routes) (UDRs) in Azure.
100
100
101
-
[Forced tunneling](https://www.petri.com/azure-forced-tunneling) is a mechanism you can use to ensure that your services are not allowed to initiate a connection to devices on the internet. Note that this is different from accepting incoming connections and then responding to them. Front-end web servers need to respond to requests from internet hosts, and so internet-sourced traffic is allowed inbound to these web servers and the web servers are allowed to respond.
101
+
[Forced tunneling](../../vpn-gateway/vpn-gateway-about-forced-tunneling.md) is a mechanism you can use to ensure that your services are not allowed to initiate a connection to devices on the internet. Note that this is different from accepting incoming connections and then responding to them. Front-end web servers need to respond to requests from internet hosts, and so internet-sourced traffic is allowed inbound to these web servers and the web servers are allowed to respond.
102
102
103
103
What you don't want to allow is a front-end web server to initiate an outbound request. Such requests might represent a security risk because these connections can be used to download malware. Even if you do want these front-end servers to initiate outbound requests to the internet, you might want to force them to go through your on-premises web proxies. This enables you to take advantage of URL filtering and logging.
104
104
@@ -127,7 +127,7 @@ You can access these enhanced network security features by using an Azure partne
127
127
128
128
## Azure Firewall
129
129
130
-
[Azure Firewall](../../firewall/overview.md) is a cloud-native and intelligent network firewall security service that provides threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. It provides both east-west and north-south traffic inspection.
130
+
Azure Firewall is a cloud-native and intelligent network firewall security service that provides threat protection for your cloud workloads running in Azure. It's a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. It provides both east-west and north-south traffic inspection.
131
131
132
132
Azure Firewall is offered in two SKUs: Standard and Premium. [Azure Firewall Standard](../../firewall/features.md) provides L3-L7 filtering and threat intelligence feeds directly from Microsoft Cyber Security. [Azure Firewall Premium](../../firewall/premium-features.md) provides advanced capabilities include signature-based IDPS to allow rapid detection of attacks by looking for specific patterns.
133
133
@@ -164,9 +164,9 @@ Learn more:
164
164
165
165
### Connect your on-premises network to a virtual network with a VPN
166
166
167
-
You might want to connect your entire corporate network, or portions of it, to a virtual network. This is common in hybrid IT scenarios, where organizations [extend their on-premises datacenter into Azure](https://gallery.technet.microsoft.com/Datacenter-extension-687b1d84). In many cases, organizations host parts of a service in Azure, and parts on-premises. For example,they might do so when a solution includes front-end web servers in Azure and back-end databases on-premises. These types of "cross-premises" connections also make management of Azure located resources more secure, and enable scenarios such as extending Active Directory domain controllers into Azure.
167
+
You might want to connect your entire corporate network, or portions of it, to a virtual network. This is common in hybrid IT scenarios, where organizations extend their on-premises datacenter into Azure. In many cases, organizations host parts of a service in Azure, and parts on-premises. For example,they might do so when a solution includes front-end web servers in Azure and back-end databases on-premises. These types of "cross-premises" connections also make management of Azure located resources more secure, and enable scenarios such as extending Active Directory domain controllers into Azure.
168
168
169
-
One way to accomplish this is to use a [site-to-site VPN](https://www.techopedia.com/definition/30747/site-to-site-vpn). The difference between a site-to-site VPN and a point-to-site VPN is that the latter connects a single device to a virtual network. A site-to-site VPN connects an entire network (such as your on-premises network) to a virtual network. Site-to-site VPNs to a virtual network use the highly secure IPsec tunnel mode VPN protocol.
169
+
One way to accomplish this is to use a site-to-site VPN. The difference between a site-to-site VPN and a point-to-site VPN is that the latter connects a single device to a virtual network. A site-to-site VPN connects an entire network (such as your on-premises network) to a virtual network. Site-to-site VPNs to a virtual network use the highly secure IPsec tunnel mode VPN protocol.
170
170
171
171
Learn more:
172
172
@@ -194,7 +194,7 @@ It is possible to use many virtual networks for your deployments. There are vari
194
194
195
195
One option is for services on one virtual network to connect to services on another virtual network, by "looping back" through the internet. The connection starts on one virtual network, goes through the internet, and then comes back to the destination virtual network. This option exposes the connection to the security issues inherent in any internet-based communication.
196
196
197
-
A better option might be to create a site-to-site VPN that connects between two virtual networks. This method uses the same [IPSec tunnel mode](/previous-versions/windows/it-pro/windows-server-2003/cc786385(v=ws.10)) protocol as the cross-premises site-to-site VPN connection mentioned above.
197
+
A better option might be to create a site-to-site VPN that connects between two virtual networks. This method uses the same IPSec tunnel mode protocol as the cross-premises site-to-site VPN connection mentioned above.
198
198
199
199
The advantage of this approach is that the VPN connection is established over the Azure network fabric, instead of connecting over the internet. This provides you an extra layer of security, compared to site-to-site VPNs that connect over the internet.
200
200
@@ -244,7 +244,6 @@ You can gain the benefits of network level load balancing in Azure by using Azur
244
244
245
245
Learn more:
246
246
247
-
*[Internet-facing load balancer between multiple virtual machines or services](../../load-balancer/load-balancer-overview.md)
@@ -292,7 +291,7 @@ Azure provides you with a highly available and high-performing external DNS solu
292
291
Learn more:
293
292
294
293
*[Azure DNS overview](../../dns/dns-overview.md)
295
-
*[Azure DNS private zones](../../dns/private-dns-overview.md) allows you to configure private DNS names for Azure resources rather than the automatically assigned names without the need to add a custom DNS solution.
294
+
*[Azure DNS private zones](../../dns/private-dns-privatednszone.md) allows you to configure private DNS names for Azure resources rather than the automatically assigned names without the need to add a custom DNS solution.
296
295
297
296
## Perimeter network architecture
298
297
@@ -302,7 +301,7 @@ You can design perimeter networks in a number of different ways. The decision to
302
301
303
302
Learn more:
304
303
305
-
*[Microsoft Cloud Services and Network Security](network-best-practices.md)
304
+
*[Perimeter networks for security zones](network-best-practices.md#deploy-perimeter-networks-for-security-zones)
306
305
307
306
## Azure DDoS protection
308
307
@@ -392,7 +391,7 @@ Logging at a network level is a key function for any network security scenario.
392
391
* Event logs. These logs provide information about what NSG rules were applied.
393
392
* Counter logs. These logs let you know how many times each NSG rule was applied to deny or allow traffic.
394
393
395
-
You can also use [Microsoft Power BI](https://powerbi.microsoft.com/what-is-power-bi/), a powerful data visualization tool, to view and analyze these logs.
394
+
You can also use Microsoft Power BI, a powerful data visualization tool, to view and analyze these logs.
396
395
Learn more:
397
396
398
397
*[Azure Monitor logs for Network Security Groups (NSGs)](../../virtual-network/virtual-network-nsg-manage-log.md)
@@ -79,4 +79,4 @@ To learn about recommendations and core concepts for deploying secure email, doc
79
79
80
80
## Next steps
81
81
82
-
- To learn how to enhance your security solutions by integrating with Microsoft products, see Integrate with [Microsoft's Zero Trust solutions](/security/zero-trust/integrate/overview)
82
+
- To learn how to enhance your security solutions by integrating with Microsoft products, see [Integrate with Microsoft's Zero Trust solutions](/security/zero-trust/integrate/overview)
0 commit comments