Isolate application tiers (web, app, data) within a VNet, preventing direct communication between non-adjacent tiers.
→Use a separate subnet for each tier and apply Network Security Groups (NSGs) to each subnet to control traffic flow.
Why: NSGs allow fine-grained, stateful filtering based on source/destination IP ranges (subnets), ports, and protocols, enabling network micro-segmentation.
Connect two VNets in different Azure regions privately over the Microsoft backbone network.
→Configure Global VNet Peering between the two VNets.
Why: Global Peering is simpler, lower-latency, and higher-bandwidth than a VNet-to-VNet VPN connection. Traffic remains on the private Microsoft network.
VNet-A is peered to Hub-VNet, and Spoke-VNet is also peered to Hub-VNet. VMs in VNet-A cannot reach VMs in Spoke-VNet.
→The cause is that VNet peering is non-transitive. To enable communication, peer VNet-A and Spoke-VNet directly or use an NVA in the Hub.
Why: Peering does not create a daisy-chain. Each VNet must be directly connected to communicate, unless routing through a Network Virtual Appliance is configured.
Establish a persistent, encrypted IPsec tunnel from an on-premises network to an Azure VNet over the public internet.
→Deploy an Azure VPN Gateway in the VNet and configure a Site-to-Site (S2S) connection.
Why: This is the standard, secure, and reliable solution for hybrid connectivity between a single on-premises site and an Azure VNet.
An Azure Load Balancer continues to send traffic to an unhealthy backend VM, causing application timeouts.
→Configure a health probe on the load balancer that accurately checks the health of the application on the backend VMs.
Why: The load balancer relies entirely on health probes to detect unhealthy instances. Without a correctly configured probe, it cannot remove failed VMs from the traffic rotation.
Route HTTP/S traffic to different backend server pools based on the URL path (e.g., /images/* vs /api/*).
→Use Azure Application Gateway with path-based routing rules.
Why: Application Gateway is a Layer 7 load balancer that inspects HTTP requests and can make routing decisions based on URL paths. A standard Azure Load Balancer is Layer 4 and cannot.
VMs in a VNet with a custom DNS server cannot resolve hostnames in an Azure Private DNS Zone.
→Configure the custom DNS server to conditionally forward queries for the private zone to the Azure-provided DNS resolver IP (168.63.129.16).
Why: When a custom DNS server is used, it bypasses Azure's internal DNS. The custom server must be taught how to resolve Azure-specific zones by forwarding requests to Azure DNS.
Force all internet-bound traffic from spoke VNets to be inspected by a central Azure Firewall in the hub VNet.
→Apply a Route Table with a User-Defined Route (UDR) to the spoke subnets. The UDR is a default route (0.0.0.0/0) pointing to the firewall's private IP.
Why: A UDR overrides Azure's default system route to the internet, allowing you to control and centralize egress traffic flow for security inspection.
Provide secure RDP/SSH access to VMs that have no public IP addresses, without configuring a VPN.
→Deploy Azure Bastion into a dedicated subnet (AzureBastionSubnet) in the VNet.
Why: Bastion provides a managed jump box service, allowing secure administrative access via the Azure portal over TLS, eliminating public IP exposure on VMs.
Ensure traffic between a VM and a PaaS service (e.g., Azure SQL) stays on the private network and the PaaS service is not publicly accessible.
→Create a private endpoint for the PaaS service in the VM's VNet and disable public network access on the PaaS service.
Why: A private endpoint gives the PaaS service a private IP within your VNet, while disabling public access ensures it's only reachable via that private IP.
Route global users to the nearest regional application endpoint to ensure the lowest possible latency.
→Use Azure Traffic Manager with the "Performance" routing method.
Why: The Performance routing method uses DNS to direct clients to the endpoint with the lowest network latency from their location.