Skip to content

Azure Networking

Scope

Azure virtual networking and connectivity. Covers VNet design, NSGs/ASGs, Front Door, Application Gateway, WAF, Private Endpoints, Azure Bastion, VNet Peering, Virtual WAN, Azure Firewall, DDoS Protection, and hybrid connectivity (ExpressRoute, VPN Gateway).

Checklist

  • [Critical] Is the VNet address space planned to avoid overlaps with on-premises networks and peered VNets, with subnets sized for service delegation requirements?
  • [Critical] Are Network Security Groups (NSGs) applied at the subnet level with rules following least-privilege, using Application Security Groups (ASGs) for role-based grouping?
  • [Recommended] Is Azure Front Door configured as the global entry point for web applications, providing CDN, WAF, and global load balancing in a single service?
  • [Recommended] Is Azure Application Gateway (L7) or Azure Load Balancer (L4) deployed for internal and regional load balancing with health probes configured?
  • [Critical] Is Azure WAF (on Front Door or Application Gateway) configured with OWASP 3.2 managed rule set and custom rules for application-specific protection?
  • [Recommended] Is Azure Traffic Manager configured for DNS-based global traffic routing when Front Door is not used? (priority, weighted, performance, geographic routing)
  • [Critical] Are Private Endpoints configured for PaaS services (Azure SQL, Storage, Key Vault, Cosmos DB) to eliminate public internet exposure?
  • [Recommended] Is Azure Bastion deployed for secure RDP/SSH access to VMs without exposing management ports to the internet?
  • [Critical] Is VNet Peering or Azure Virtual WAN configured for multi-VNet connectivity with appropriate route tables and no transitive routing gaps?
  • [Recommended] Are User-Defined Routes (UDRs) configured to force traffic through Azure Firewall or NVA for inspection where required?
  • [Recommended] Is Azure DDoS Protection Standard enabled for VNets hosting public-facing workloads?
  • [Critical] Is Azure DNS Private Zones configured for name resolution of Private Endpoints and internal services?
  • [Recommended] Are NSG Flow Logs enabled and flowing to Log Analytics for network traffic analysis and threat detection?
  • [Recommended] Is ExpressRoute or VPN Gateway configured for hybrid connectivity with redundant circuits and appropriate SKU?

Why This Matters

Azure networking differs significantly from AWS in subnet delegation, NSG behavior (stateful but applied at subnet level by default), and the Front Door/Application Gateway duality. Private Endpoints are essential for securing PaaS services that are otherwise publicly accessible by default. VNet peering is non-transitive, which catches teams migrating from hub-spoke AWS Transit Gateway designs.

Common Decisions (ADR Triggers)

  • Front Door vs Application Gateway -- global L7 with built-in CDN vs regional L7 with deeper WAF integration
  • Azure Virtual WAN vs hub-spoke VNet peering -- managed routing and SD-WAN integration vs traditional hub-spoke with NVA
  • Azure Firewall vs third-party NVA -- managed service with threat intelligence vs Palo Alto, Fortinet, or Check Point
  • Private Endpoints vs Service Endpoints -- full private IP integration vs simpler but less secure VNet-scoped access
  • DDoS Protection Standard -- $2,944/mo cost vs risk exposure for public workloads
  • Hybrid connectivity -- ExpressRoute (dedicated circuit) vs VPN Gateway (encrypted over internet), coexistence model
  • DNS strategy -- Azure DNS Private Zones vs custom DNS servers, conditional forwarding for hybrid

Azure Pricing Pages

Common Cost Surprises

  1. Azure Firewall always-on cost — Azure Firewall Standard costs ~$912/mo ($1.25/hr) even with zero traffic. Premium is ~$1,277/mo. Plus $0.016/GB data processing. Many teams deploy Azure Firewall for compliance without realizing the baseline cost. Consider whether NSGs + UDRs suffice for non-regulated workloads.

  2. DDoS Protection Standard pricing — $2,944/mo flat fee, regardless of the number of attacks or traffic volume. Covers up to 100 public IPs. Essential for public-facing workloads but expensive for small deployments. One subscription-level plan covers all VNets.

  3. VNet peering cross-region costs — $0.035/GB each direction for global peering (vs $0.01/GB same-region). A multi-region architecture transferring 5 TB/mo cross-region pays ~$350/mo in peering alone.

  4. Application Gateway v2 minimum cost — even at zero traffic, Application Gateway v2 costs ~$175/mo (fixed capacity units). The WAF tier adds ~$25/mo. Autoscaling can spike costs during traffic bursts.

  5. ExpressRoute data overage — metered ExpressRoute plans charge $0.025/GB outbound after the included data. Unlimited plans cost 1.5-2x the port fee. Large data transfers can make metered plans unexpectedly expensive.

  6. Public IP address charges — Standard SKU public IPs cost $0.004/hr (~$2.88/mo) each. Basic SKU is being retired. An account with 30 public IPs pays ~$86/mo.

Reference Architectures


See Also

  • general/networking.md -- General networking patterns including segmentation and load balancing
  • providers/azure/dns.md -- Azure DNS, Traffic Manager, and Private DNS zone configuration
  • providers/azure/security.md -- NSG Flow Logs, Azure Firewall, and DDoS Protection integration
  • providers/azure/compute.md -- Azure Bastion and VM network placement