Lab21 - Understanding VNET Peering between Two VNets in same Region - Azure
Lab21 - Understanding VNET Peering between Two VNets in same Region - Azure
Virtual network peering enables you to seamlessly connect two Azure virtual networks.
Once peered, the virtual networks appear as one, for connectivity purposes. The traffic
between virtual machines in the peered virtual networks is routed through the Microsoft
backbone infrastructure, much like traffic is routed between virtual machines in the
same virtual network, through private IP addresses only. Azure supports:
The benefits of using virtual network peering, whether local or global, include:
Network traffic between peered virtual networks is private. Traffic between the
virtual networks is kept on the Microsoft backbone network. No public Internet,
gateways, or encryption is required in the communication between the virtual
networks.
A low-latency, high-bandwidth connection between resources in different virtual
networks.
The ability for resources in one virtual network to communicate with resources in a
different virtual network, once the virtual networks are peered.
The ability to transfer data across Azure subscriptions, deployment models, and
across Azure regions.
The ability to peer virtual networks created through the Azure Resource Manager
or to peer one virtual network created through Resource Manager to a virtual
network created through the classic deployment model. To learn more about
Azure deployment models, see Understand Azure deployment models.
No downtime to resources in either virtual network when creating the peering, or
after the peering is created.
Page 1 of 99
Cloud Computing - Azure
Connectivity
After virtual networks are peered, resources in either virtual network can directly
connect with resources in the peered virtual network.
The network latency between virtual machines in peered virtual networks in the same
region is the same as the latency within a single virtual network. The network
throughput is based on the bandwidth that's allowed for the virtual machine,
proportionate to its size. There isn't any additional restriction on bandwidth within the
peering.
The traffic between virtual machines in peered virtual networks is routed directly
through the Microsoft backbone infrastructure, not through a gateway or over the
public Internet.
Network security groups can be applied in either virtual network to block access to
other virtual networks or subnets, if desired. When configuring virtual network peering,
you can either open or close the network security group rules between the virtual
networks. If you open full connectivity between peered virtual networks (which is the
default option), you can apply network security groups to specific subnets or virtual
machines to block or deny specific access.
Page 2 of 99
Cloud Computing - Azure
Topology:
Page 3 of 99
Cloud Computing - Azure
Page 4 of 99
Cloud Computing - Azure
Click “Add”.
Page 5 of 99
Cloud Computing - Azure
Page 6 of 99
Cloud Computing - Azure
Click “Create”.
Page 7 of 99
Cloud Computing - Azure
Page 8 of 99
Cloud Computing - Azure
Click “Add”.
Page 9 of 99
Cloud Computing - Azure
Page 10 of 99
Cloud Computing - Azure
Click “Create”.
Page 11 of 99
Cloud Computing - Azure
Click “Add”.
Page 12 of 99
Cloud Computing - Azure
Page 13 of 99
Cloud Computing - Azure
Click “Create”.
Page 14 of 99
Cloud Computing - Azure
Page 15 of 99
Cloud Computing - Azure
Page 16 of 99
Cloud Computing - Azure
In “Virtual machines”,
Click “Add”.
Page 17 of 99
Cloud Computing - Azure
Page 18 of 99
Cloud Computing - Azure
In “Administrator Account”,
Page 19 of 99
Cloud Computing - Azure
In “Save Money”,
Page 20 of 99
Cloud Computing - Azure
In “Disks”,
Page 21 of 99
Cloud Computing - Azure
In “Networking”,
Page 22 of 99
Cloud Computing - Azure
Page 23 of 99
Cloud Computing - Azure
In “Management”,
Page 24 of 99
Cloud Computing - Azure
In “Guest config”,
Page 25 of 99
Cloud Computing - Azure
In “Tags”,
Page 26 of 99
Cloud Computing - Azure
Click “Create”.
Page 27 of 99
Cloud Computing - Azure
Page 28 of 99
Cloud Computing - Azure
Page 29 of 99
Cloud Computing - Azure
Page 30 of 99
Cloud Computing - Azure
In “Administrator Account”,
Page 31 of 99
Cloud Computing - Azure
Page 32 of 99
Cloud Computing - Azure
In “Disks”
Page 33 of 99
Cloud Computing - Azure
In “Networking”,
Page 34 of 99
Cloud Computing - Azure
Page 35 of 99
Cloud Computing - Azure
In “Management”,
Page 36 of 99
Cloud Computing - Azure
In “Guest config”,
Page 37 of 99
Cloud Computing - Azure
In “Tags”,
Page 38 of 99
Cloud Computing - Azure
Click “Create”.
Page 39 of 99
Cloud Computing - Azure
Page 40 of 99
Cloud Computing - Azure
In “All resources”,
Page 41 of 99
Cloud Computing - Azure
Click “Subnets”.
Page 42 of 99
Cloud Computing - Azure
Page 43 of 99
Cloud Computing - Azure
Page 44 of 99
Cloud Computing - Azure
Page 45 of 99
Cloud Computing - Azure
Page 46 of 99
Cloud Computing - Azure
Click “Ok”.
Page 47 of 99
Cloud Computing - Azure
Page 48 of 99
Cloud Computing - Azure
Page 49 of 99
Cloud Computing - Azure
Page 50 of 99
Cloud Computing - Azure
Click “Add”.
Page 51 of 99
Cloud Computing - Azure
Page 52 of 99
Cloud Computing - Azure
Click “Add”.
Page 53 of 99
Cloud Computing - Azure
Page 54 of 99
Cloud Computing - Azure
Page 55 of 99
Cloud Computing - Azure
Page 56 of 99
Cloud Computing - Azure
Click “Subnets”.
Page 57 of 99
Cloud Computing - Azure
Page 58 of 99
Cloud Computing - Azure
Page 59 of 99
Cloud Computing - Azure
Page 60 of 99
Cloud Computing - Azure
Page 61 of 99
Cloud Computing - Azure
Click “Ok”.
Page 62 of 99
Cloud Computing - Azure
We are able see that “SANS-CCNA-PubSubnet” has been successfully associated with “CCNAVM-Azure-
nsg” network security group.
Page 63 of 99
Cloud Computing - Azure
Page 64 of 99
Cloud Computing - Azure
Click “Add”.
Page 65 of 99
Cloud Computing - Azure
Page 66 of 99
Cloud Computing - Azure
Click “Add”.
Page 67 of 99
Cloud Computing - Azure
You are able to see that inbound rule has been created for “CCNAVM-Azure-nsg” successfully.
Page 68 of 99
Cloud Computing - Azure
Click Virtual machine named “MCSEVM-Azure” which belongs to “SANS-MCSE” Virtual network as well
as “SANS-MCSE-PubSubnet”.
Page 69 of 99
Cloud Computing - Azure
In “MCSEVM-Azure”
Click on “Networking”,
Kindly note the Public and Private IP address of the Virtual machine.
Page 70 of 99
Cloud Computing - Azure
From your local machine, type “mstsc” in run box, and press “Enter”.
Click “Connect”.
Page 71 of 99
Cloud Computing - Azure
Click “Ok”.
Page 72 of 99
Cloud Computing - Azure
Click “Yes”.
Page 73 of 99
Cloud Computing - Azure
Page 74 of 99
Cloud Computing - Azure
Page 75 of 99
Cloud Computing - Azure
Page 76 of 99
Cloud Computing - Azure
Click “Ok”.
Page 77 of 99
Cloud Computing - Azure
In “All resources”.
Page 78 of 99
Cloud Computing - Azure
Click “Networking”.
Kindly note the Public and Private IP address of the Virtual machine of Ubuntu.
Page 79 of 99
Cloud Computing - Azure
But Ubuntu machine which you are trying to connect is belongs to “SANS-CCNA-PubSubnet” of “SANS-
CCNA” virtual network.
That is the reason, two different virtual networks are will not communicate with each other by
default.
Page 80 of 99
Cloud Computing - Azure
Page 81 of 99
Cloud Computing - Azure
Page 82 of 99
Cloud Computing - Azure
Click on “Peerings”.
Page 83 of 99
Cloud Computing - Azure
Click “Add”.
Page 84 of 99
Cloud Computing - Azure
Page 85 of 99
Cloud Computing - Azure
Click “Ok”.
Page 86 of 99
Cloud Computing - Azure
By default you are not able to view “Peering” details, click on any other option like “Options”.
Page 87 of 99
Cloud Computing - Azure
Click “Peerings”.
Page 88 of 99
Cloud Computing - Azure
In “Peerings”,
You are able to see that you have successfully added peering in “SANS-MCSE” virtual network.
Page 89 of 99
Cloud Computing - Azure
Page 90 of 99
Cloud Computing - Azure
In “Virtual networks”,
Page 91 of 99
Cloud Computing - Azure
Click “Peerings”.
Page 92 of 99
Cloud Computing - Azure
Page 93 of 99
Cloud Computing - Azure
Select “Virtual network” as “SANS-MCSE” (which you have required to configure VNET peering).
Page 94 of 99
Cloud Computing - Azure
Click “Ok”.
Page 95 of 99
Cloud Computing - Azure
Click “Overview”.
Page 96 of 99
Cloud Computing - Azure
Page 97 of 99
Cloud Computing - Azure
Page 98 of 99
Cloud Computing - Azure
In Windows 2008 R2 server, try to ping 172.16.1.4 (Ubuntu IP) of “SANS-CCNA” virtual network from
10.0.1.4 of “SANS-MCSE” virtual network.
Now we can able to access the resources between two different Virtual networks (VNET’s) from same
region.
Page 99 of 99