You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
➡️ **[Buy me a coffee!](https://buymeacoffee.com/tuxerrante)**
16
-
➡️ **[Sponsor me on GitHub!](https://github.com/sponsors/tuxerrante)**
16
+
➡️ **[Sponsor me on GitHub!](https://github.com/sponsors/tuxerrante)**
17
+
⬇️ [**Or read my book!**](https://www.amazon.it/Guida-pratica-Pensiero-Critico-Bussola/dp/B0F267MWNP)
17
18
18
-
I've been dedicated to creating free content for years, pouring countless hours into research, writing, and editing.
19
-
Your support would mean the world to me and help me continue producing high-quality content. By sponsoring my work, you're not just helping me, but also validating the value of the information I provide.
19
+
I've been dedicated to creating free content for years, pouring countless hours into research, writing, and editing.
20
+
Your support would mean the world to me and help me continue producing high-quality content. By sponsoring my work, you're not just helping me, but also validating the value of the information I provide.
Copy file name to clipboardExpand all lines: docs/software-engineering/Azure/AZ-500.md
+51-4Lines changed: 51 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -493,6 +493,10 @@ When you create a route table and associate it to a subnet, the table's routes a
493
493
494
494
Dedicated physical connection to an Azure tenant
495
495
496
+
Dot1Q VLAN
497
+
QinQ
498
+
499
+
496
500
### VPN
497
501
498
502
IpSec/K encrypted connection.
@@ -524,28 +528,70 @@ L4 (TCP/UDP), REGIONAL
524
528
525
529
can be internal or external (get assigned a Public IP)
526
530
527
-
## APP GATEWAY
531
+
## APPLICATION GATEWAY
528
532
529
533
L7, REGIONAL: redirection, rewrite, https,
530
-
531
534
Can have on top a WAF ([OWASP threats](https://learn.microsoft.com/en-gb/azure/web-application-firewall/ag/application-gateway-crs-rulegroups-rules?tabs=drs21#owasp-crs-32))
532
535
536
+
1. Connection comes from the internet
537
+
2. App GW **frontend public IP** is reached trough the DNS
538
+
3.**HTTP/HTTPS Listener**: The gateway listens for incoming HTTP or HTTPS traffic. This listener is configured to handle specific types of requests.
539
+
4.**Rule**: Based on the listener's configuration, rules are applied to direct traffic. These rules determine how requests are routed to the backend.
540
+
5.**Backend Pool**: The destination for the traffic. This pool can include:
-**Virtual Machine Scale Sets (VMSS)**: Groups of identical VMs that can automatically scale.
543
+
-**App Services**: Managed services for hosting web applications.
544
+
6.**Encryption**: The diagram highlights that traffic between the application servers and the application gateway is encrypted, ensuring secure communication.
545
+
1. **AES-256 (Advanced Encryption Standard)**: This is a symmetric encryption algorithm widely used for its high level of security and efficiency.
546
+
2. **RSA-4096**: This is an asymmetric encryption algorithm used for secure data transmission. It uses a pair of keys (public and private) and is known for its robustness, especially with a 4096-bit key
547
+
3. **TLS 1.3 (Transport Layer Security)**: This protocol provides secure communication over a computer network. TLS 1.3 is the latest version and offers improved security and performance over its predecessors
548
+
549
+
A traditional load balancer directs traffic based on where it's coming from and where it's supposed to go, much like how a post office sorts mail based on the address on the envelope. However, Azure Application Gateway besides knowing where the traffic comes from and where it's going, it can also direct traffic based on what's being asked for in the request (APIs).
550
+
- back end health check
551
+
- autoscaling
552
+
- session affinity
553
+
- WAF
554
+
533
555
## AZ [FRONT DOOR](https://learn.microsoft.com/en-us/azure/frontdoor/front-door-overview)
534
556
535
557
L7, GLOBAL
536
558
537
559
Uses [anycast](https://en.wikipedia.org/wiki/Anycast) to manage the connection as close as possible to the client ( the lowest number of [BGP](https://en.wikipedia.org/wiki/Border_gateway_protocol) network hops) with hundreds of PoPs (point of presence) CDN connected through a high speed WAN.
538
560
561
+
**Key Features**:
562
+
563
+
1.**Global Load Balancing**: Routes traffic to the closest and healthiest backend based on latency, ensuring optimal performance for users worldwide
564
+
2.**Content Delivery Network (CDN)**: Provides caching and acceleration for static and dynamic content, reducing load times
565
+
3.**Web Application Firewall (WAF)**: Offers built-in protection against common web threats like SQL injection and cross-site scripting
566
+
4.**SSL Offloading**: Terminates SSL/TLS connections at the edge, reducing the load on backend servers
567
+
5.**Multi-Region Failover**: Ensures high availability by automatically routing traffic to another region if the primary region fails
568
+
539
569
## NSG – Network Security Group (L4)
540
570
541
-
Allows us to groups network resources through tags instead of caring of IPs
571
+
Allows us to group network resources through tags instead of caring of IPs.
542
572
543
-
SUBNET specifics
573
+
SUBNET or NIC specific.
574
+
575
+
**Network Security Groups (NSGs)** can be applied to a single VM, subnet, or network adapter. **only one NSG** can be associated with each of these resources.
544
576
545
577
- Service endpoint: identifies an internal subnet to be allowed to call other internal services by allowing it in the target service firewall
546
578
- Private endpoint: identifies a specific service instance inside a private subnet. Requires also a DNS configuration in order to be found by other internal services.
579
+
- Through a resource manager deployment model they can be assigned at NIC level, such that the same VM would have different security rules assigned to its network interfaces.
580
+
- Limit of 100 NSG per region. Max 200 rules per NSG. This limits can be increased by raising a support ticket.
It lets you focus on the business logic instead of networking details like IP addresses, allowing you to group virtual machines and define network security policies based on those groups (eg: AKS nodepool).
589
+
All network interfaces assigned to an ASG should be in the same VNET.
Virtual Network service endpoint provides secure and direct connectivity to Azure services over an optimized route over the Azure backbone network.
594
+
Useful to identify internal resources that would have a non unique private IP while communicating through private VNets. Also it doesn't require a NAT Gateway.
549
595
550
596
-----
551
597
@@ -663,6 +709,7 @@ flowchart TD
663
709
***Allocated dynamically** or statically from the VNet’s address space.
664
710
* IPs are associated with NICs via Azure Resource Manager (ARM) configurations, not manually or directly by the admin.
665
711
For load balancers, IPs are assigned to frontend configurations, not directly to the NIC.
712
+
* Azure reserves the first four and last IPs in each subnet (e.g., .0, .1, .2, .3, and .255 in a /24).
666
713
667
714
668
715
**🔎 Tip**: Private IPs are the default addressing method inside Azure VNets. Public IPs are required only for external communication.
0 commit comments