Muutke küpsiste eelistusi

Microsoft Azure Networking: The Definitive Guide [Pehme köide]

  • Formaat: Paperback / softback, 240 pages, kõrgus x laius x paksus: 230x186x16 mm, kaal: 440 g
  • Sari: IT Best Practices - Microsoft Press
  • Ilmumisaeg: 05-Aug-2022
  • Kirjastus: Addison Wesley
  • ISBN-10: 0137569890
  • ISBN-13: 9780137569892
Teised raamatud teemal:
  • Formaat: Paperback / softback, 240 pages, kõrgus x laius x paksus: 230x186x16 mm, kaal: 440 g
  • Sari: IT Best Practices - Microsoft Press
  • Ilmumisaeg: 05-Aug-2022
  • Kirjastus: Addison Wesley
  • ISBN-10: 0137569890
  • ISBN-13: 9780137569892
Teised raamatud teemal:

Proven best practices for success with every Azure networking service


For cloud environments to operate and scale optimally, their networking services must be designed, deployed, and managed well. Now, there’s a complete, best-practice guide to doing just that. Writing for everyone involved in delivering Azure workloads and services, leading cloud consultant Avinash Valiramani provides a deep dive and practical field advice for Azure Virtual Networks, Azure VPN Gateways, Azure Load Balancing, Azure Traffic Manager, Azure Firewall, Azure DNS, Azure Bastion, Azure Front Door and more. Whatever your role in delivering efficient, scalable networking services, this guide will help you make the most of your Azure investment.


Leading Azure consultant Avinash Valiramani shows how to:

  • Use Azure Virtual Networks to establish a backbone for hosting other Azure resources
  • Provide HTTP/HTTPS load-balancing and routing for web servers and apps through Azure Application Gateway
  • Connect on-premises and other public networks to Azure for secure communications using the Azure VPN Gateway service
  • Provide secure load balancing to apps from internal and public networks using Azure Load Balancer services
  • Integrate Azure Firewall to centrally protect Azure resources across multiple subscriptions
  • Access globally scaled, fully-managed DNS services with 100% SLA from the closest Azure DNS servers
  • Provide optimal network routing to the closest application endpoint for public-facing applications with Azure Traffic Manager
  • Use Microsoft’s global edge network along with Azure Front Door to speed up access, harden security and enhance scalability for consuming-facing and internal web applications


Also look for these Definitive Guides to Azure success:

  • Microsoft Azure Compute: The Definitive Guide
  • Microsoft Azure Monitoring and Management: The Definitive Guide
  • Microsoft Azure Storage: The Definitive Guide

About the author xiii
Acknowledgments xv
Introduction to Azure networking services xvii
Chapter 1 Azure virtual networks
1(14)
Overview
1(1)
Azure virtual networks features
1(1)
Design concepts and deployment considerations
2(10)
Address space
2(1)
Subnets
2(1)
VNET peering
2(1)
Routing
3(3)
Network security groups (NSGs)
6(1)
Availability zones support
6(1)
VNET network address translation (NAT)
7(1)
Integrations for enhanced security
7(1)
Service tags
7(1)
Disaster recovery planning
8(1)
VNET walkthrough
8(4)
Best practices
12(3)
Chapter 2 Azure Application Gateway
15(20)
Overview
15(1)
Azure Application Gateway features
16(2)
Design concepts and deployment considerations
18(15)
Front-end IP addresses
19(1)
Back-end pools
20(1)
Listeners
20(1)
Request routing rules
21(1)
HTTP settings
22(1)
Health probes
23(1)
Sizing and scaling
23(1)
TLS policy
23(1)
Application gateway walkthrough
24(9)
Best practices
33(2)
Chapter 3 Azure VPN gateway
35(20)
Overview
35(1)
Azure VPN gateway features
35(1)
Design concepts and deployment considerations
36(18)
VPN types
37(1)
Gateway SKUs
37(1)
Connection types
37(1)
Gateway subnet
38(1)
Border Gateway Protocol (BGP)
38(1)
Local network gateways
38(1)
VPN gateway redundancy
39(1)
Deployment models
39(15)
Best practices
54(1)
Chapter 4 Azure Load Balancer
55(22)
Overview
55(1)
Azure Load Balancer features
56(1)
Design concepts and deployment considerations
56(6)
Front-end IP address
57(1)
Back-end pool
57(1)
Health probes
57(1)
Load-balancing rules
58(2)
Load-balancing algorithms
60(1)
Availability zones
61(1)
Azure Load Balancer walkthrough
62(12)
Best practices
74(3)
Chapter 5 Azure Firewall
77(26)
Overview
77(1)
Azure Firewall features
78(1)
Design concepts and deployment considerations
79(21)
Support for availability zones
79(1)
Inbound DNAT
79(1)
Outbound SNAT
79(1)
Traffic filtering
80(1)
Groupings
81(2)
Forced tunneling
83(1)
Threat intelligence
83(1)
Azure Firewall Manager
83(1)
Classic rules versus firewall policies
84(1)
Firewall rule processing
84(2)
DNS proxy
86(1)
Active FTP support
86(1)
Azure Monitor logging
86(1)
Azure Firewall deployment walkthrough
87(13)
Best practices
100(3)
Chapter 6 Azure DNS
103(20)
Overview
103(2)
Azure DNS features
103(1)
Azure DNS limitations
104(1)
Design and configuration considerations
105(14)
Types of DNS zones
105(4)
Linking with Azure virtual networks
109(2)
Auto registration
111(2)
Alias record sets
113(3)
Reverse DNS lookup
116(3)
Zone delegation
119(1)
Best practices
119(4)
Chapter 7 Azure Traffic Manager
123(22)
Overview
123(1)
Traffic Manager features
123(1)
Design concepts and deployment considerations
124(17)
Traffic Manager endpoints
124(2)
Nested Traffic Manager profiles
126(1)
Traffic routing methods
127(6)
Endpoint monitoring
133(1)
Traffic Manager walkthrough
134(7)
Best practices
141(4)
Chapter 8 Azure Front Door
145(22)
Overview
145(1)
Key features
145(1)
Design concepts and deployment considerations
146(7)
Back ends
147(1)
Back-end pools
147(1)
Health probes
148(1)
Load balancing
148(1)
Traffic routing
148(1)
URL rewrite
149(1)
URL redirect
149(2)
Wildcard domains
151(1)
Rules Engine
151(1)
Caching
151(2)
Network and security
153(12)
Azure DDoS Protection Basic
153(1)
Protection against unwanted protocols
153(1)
Handling large volumes of traffic
153(1)
WAF security features
154(1)
Front Door service walkthrough
154(11)
Best practices
165(2)
Chapter 9 Azure Bastion
167(16)
Overview
167(2)
Azure Bastion features
167(1)
Azure Bastion limitations
168(1)
Design concepts and deployment considerations
169(10)
Architecture
169(2)
SKUs
171(1)
High-availability hosts
171(1)
Virtual network peering
171(1)
Disaster recovery
171(1)
Service requirements
172(7)
Best practices
179(4)
Chapter 10 Azure Private Link
183(18)
Overview
183(1)
Azure Private Link features
183(1)
Design concepts and deployment considerations
184(16)
Private endpoints
184(8)
Azure Private Link service
192(8)
Best practices
200(1)
Index 201