Designing and implementing Azure networking capabilities is a critical part of your cloud solution. You’ll need to make networking design decisions to properly support your workloads and services.

Start here: Azure Networking


Primary networking technology, like the VPC in AWS.

Internet access is on by default.

Cloud services can go in to the VNET as well.

Can connect VNET’s to each other, or connect them to on premise.

Can bring own DNS, or use Azure DNS.

Subnets can communicate with each other by default. When i create subnet-a and subnet-b, then stick a vm in each, they will be able to freely communicate by default.

azure sn defaults

Basics with Powershell:

#Resource Group
$rg = "Test-NET-RG"

$location = "WestUS"

#VNET Name
$VNETName = "SL-VNET-PShell"

#Address Space
$VNETAddressSpace = ""

$webSN = New-AzVirtualNetworkSubnetConfig -Name "Duff-Web" -AddressPrefix ""
$appSN = New-AzVirtualNetworkSubnetConfig -Name "Duff-App" -AddressPrefix ""
$dbSN  = New-AzVirtualNetworkSubnetConfig -Name "Duff-Data" -AddressPrefix ""

#Create Resource Group
New-AzResourceGroup -Name $rg -Location $location

#Go ahead and create the VNET & Subnets
$virtualNetwork = New-AzVirtualNetwork -Name $VNETName -ResourceGroupName $rg `
    -Location $location -AddressPrefix $VNETAddressSpace -Subnet $webSN,$appSN


#Add one more subnet separately
$subnetConfig = Add-AzVirtualNetworkSubnetConfig `
  -Name "ExtraSubnet" `
  -AddressPrefix "" `
  -VirtualNetwork $virtualNetwork

#Write changes
$virtualNetwork | Set-AzVirtualNetwork

Routes in VNet

Local VNET - Route for local addresses. On-Prem - Route to connect to on-prem resources where VNet Gateway will be next hop. Internet - Route for all traffic to Internet. Internet Gateway is the next hop.

Then, we add user defined routes on top.

NSGs: Network Security Groups

Traffic filtering.

Can be associated with a subnet or a network interface card (but not the virtual machine itself; just the vNIC)

The direction of the flow dictates the ordering when traversing multiple NSG’s. For example, if there is a NSG on the subnet and a NSG on the vNIC, the vNIC rules will apply first outbound - if we block 80 on the vNIC it would never hit the NSG on the subnet.

In each NSG though, lower rule numbers have priority (10 is a high priority rule, 400 is lower).

A flow record is created for existing connections. Communication is allowed or denied based on the connection state of the flow record. The flow record allows a network security group to be stateful

Existing connections might not be interrupted when you remove a security rule that enabled the flow. Traffic flows are interrupted when connections are stopped and no traffic is flowing in either direction, for at least a few minutes.


There’s a diagram function that makes your configuration easy to understand, and changes easier to follow. I deployed two subnets inside a /23 and a machine in each. The diagram below the output azure gives me and helps to figure out how all the pieces fit together - from vNIC to external IP and the NSG’s.

vnet diagram

Blog Logo

Chad Duffey



Chad Duffey

Blue Team -> Exploit Development & things in-between

Back to Overview