Time
8 hours 33 minutes
Difficulty
Intermediate
CEU/CPE
9

Video Transcription

00:00
Hello, Siberians. Welcome to this lesson on Azure virtual network.
00:04
This is the first lesson in the hot muddy you off the Is that 500 Microsoft I just security technologist costs
00:12
quick information on what will be covering in this lesson.
00:16
We'll start out by reviewing very briefly what veteran networks are,
00:20
and I say very briefly, because the topic off veteran networks has been widely covered in other causes on the cyber, every platform
00:29
and I refer you to check out the is at once a buttery as your administrator costs by. Well, Carlson
00:36
would then proceeds to discuss some veteran network car concepts, after which will create a veteran network and the sub net on Deploy a veteran machine into a veteran network sub net. As you can see,
00:49
this will be a combination of discussion on demonstration. Let's get into this.
00:54
What is an agile veteran network on a job? Virtual network is the fundamental building block for private networks in Asia. In other what's this is the building block that we used to create on isolated networks for ourselves and organizations in the azure cloud.
01:11
It enables us to create private networks in the cloud with full control over high P addresses, DNS ever security rules and traffic flow. In other words, we have total control over this network. Similarly, toe How have total control on the network on premises?
01:32
Let's review some core concept about the azure virtual network. The first concept it starts. The veteran network is an isolated private network. What this means is that order as your customers cannot access it by default.
01:46
It's also a software defined network. And even though it has many similarities which traditional networking
01:53
they have some limitations deals with nature off the cloud.
01:57
For example, it does not support violence or layer to semantics.
02:02
It's P. R. Lee a Layup three overlay implementation.
02:07
It also does not support broadcast or multicast, which means that architecture is that relies on this. Technologies may not work in the veteran network.
02:15
What can we deploy within an agile virtual network? It's no layabout infrastructure as a service type services like veteran machines on federal mission skill set,
02:27
we can also deploy platform as a service type services like the ob services, like the agile, sequined managed incense into this virtual network
02:37
veteran, it was, can be divided into one almost submit for workload. Segmentation
02:42
on each sub net within a veteran network must have a unique I p range on the Nifty Men I p. Range off the veteran network.
02:52
Now we get into the demonstration.
02:54
What I'll be showing you is also created veteran. That's working Hajer
03:00
Andi, the veteran attack that I'll be creating. We have the I P address based off 10.1 slash 16.
03:07
It will also have a single sub net that will have an I P address based off 10.1 dot one slash trend to fall.
03:15
How then deploy a Windows virtual machine into the sub net.
03:21
So here I am in the Azure Pato.
03:23
If I go ahead and click on Creative Resource and I go on the networking
03:30
on our click on Virtual Network,
03:34
I'm prompted to specify every such groups are go ahead and create a new resource group. I'll call these network.
03:42
I found our G, and I'll click OK to that
03:46
for the name of the network, our college you case out Vinet, and I'll put it in the UK South region.
03:53
Our click next for the High P address range now be modifying this to 10.1 dot zero dot ziva's last 16.
04:02
And for the sub net Our quiet and click on add sub net.
04:08
I'll give you something at a name off UK South. Submit one and I'll give it an I p address range off 10.1 dot 1.0 slash 20 fall. One thing I want to show to you is that you can see that five i p addresses are reserved in an azure submit, which means that the lower West
04:27
sub net mask that we can have for a submit in Azure
04:30
is a slash train. Tonight I'll leave the service endpoints. No conflict from now on our violently on hard fact Lincoln Next under Security are live, does not configured our quiet and click on review and create,
04:44
and I'll click on the create option.
04:46
My virtual network has now been created. If I go, I ardently can go to resource. He can see my veteran network here on If I scroll down on I click on submit, you can see my sub nets that I created on that ad virtual network here.
04:59
So the next one without do is our reply. A Windows virtual machine into the veteran networks up nets like creative.
05:05
So what I'll do is I'll click on veteran machines hair,
05:10
and I'll click on the add option.
05:14
I'll put it in the same research group.
05:15
I'll give it a name.
05:21
The regional Buk South on our changed image Toe windows 7 2019 Data center
05:30
How live the size
05:31
for the user? Name our type in azure at mean.
05:35
Ah, now type in the complex password
05:39
for the impound. Patrols are sets that none
05:44
for the Windows seven licence are wide and select. Yes, because I do have a windows of a license on to save some costs on our click on Next on the disks,
05:53
our click on next to Go on the nets working on As you can see, it's automatically selected my veteran. That's what I created earlier on the sub net.
06:01
Now for the public I p. Address our sets. That's a nun
06:05
on for the network Interface card Network Security group Out sets. That's a nun.
06:12
How Go ahead and click on management
06:15
how the several puts diagnostics for now
06:17
are quiet and click on Advanced are click Review and creates
06:25
and I'll click on the create option. This will begin the process of creating my veteran machine in that sub net
06:31
so my virtual machine has finished creating.
06:34
So if I go ahead and click on this option, had a top here and click on Goto the recess,
06:41
I can see my virtual machine results. And if I go on the networking, it is individual network that I created on in that sub net.
06:48
Here are some supplementary materials for further studies on the topics covered in this lesson.
06:55
He has a summary of what we covered in this lesson.
06:58
We started with a discussion on veteran network overview
07:01
that would dis cost some veteran network call concept
07:04
created a virtual network on the subject is on deployed a Windows Vetra machine into our veteran network sub nets. Thanks very much for watching this video on. I'll see you in the next lesson.

Up Next

AZ-500: Microsoft Azure Security Technologies

In the AZ-500 Microsoft Azure Security Technologies training, students will learn the skills that are needed to pass the AZ-500 certification exam. All exam topics are covered as well as exam preparation strategies and hands-on practice.

Instructed By

Instructor Profile Image
David Okeyode
Cloud Security Architect
Instructor