AzurePortal/HybridVideo.vtt (402 lines of code) (raw):
WEBVTT - https://maestrasuite.com
0
00:00:00.880 --> 00:00:03.969
A few months ago, we changed
our public documentation to
1
00:00:03.980 --> 00:00:06.609
organize the Azure networking
services and features
2
00:00:06.620 --> 00:00:07.599
into four pillars.
3
00:00:08.000 --> 00:00:10.169
I'm here to talk to you
about the hybrid connectivity
4
00:00:10.180 --> 00:00:12.859
pillar, which is also
reflected in the Azure portal.
5
00:00:13.500 --> 00:00:15.589
When I say hybrid
connectivity, I mean getting
6
00:00:15.600 --> 00:00:19.068
from the physical world,
on-prem or from a device like
7
00:00:19.080 --> 00:00:22.599
a cell phone or a laptop,
into resources in Azure.
8
00:00:23.400 --> 00:00:26.179
First, let's look at
the Azure VPN service.
9
00:00:28.200 --> 00:00:31.289
VPN gateway is a collection
of objects in Azure working
10
00:00:31.300 --> 00:00:34.849
together to enable an IPsec
or TLS tunnel to Azure
11
00:00:34.860 --> 00:00:35.919
across the Internet.
12
00:00:36.180 --> 00:00:38.989
This is done in one of two
ways, with site-to-site
13
00:00:39.000 --> 00:00:41.409
tunnels starting at your
on-premise location with
14
00:00:41.420 --> 00:00:44.569
a physical device like a
router or firewall, or a
15
00:00:44.580 --> 00:00:46.749
point-to-site connection
from your mobile device
16
00:00:46.760 --> 00:00:49.629
like a cell phone, tablet,
laptop, or other supported
17
00:00:49.640 --> 00:00:50.959
Internet connected devices.
18
00:00:51.280 --> 00:00:53.929
For both point-to-site and
site-to-site, you start
19
00:00:53.940 --> 00:00:57.019
with a VPN gateway connected
to your Azure VNet.
20
00:00:57.720 --> 00:00:59.819
With point-to-site, a client
application or client config,
21
00:00:59.830 --> 00:00:59.919
is installed on the device
and is connected securely
22
00:00:59.930 --> 00:00:59.959
to the VPN gateway.
23
00:01:06.890 --> 00:01:10.338
For a site-to-site connection,
a local network gateway object
24
00:01:10.350 --> 00:01:13.299
is created that represents
the IP address of the on-prem
25
00:01:13.310 --> 00:01:16.519
device and then a connection
object is created to join
26
00:01:16.530 --> 00:01:19.429
the local network gateway
to the VPN gateway.
27
00:01:19.650 --> 00:01:23.209
This establishes the secure
tunnel through the Internet.
28
00:01:25.430 --> 00:01:28.149
Next, we look at the
ExpressRoute service.
29
00:01:29.820 --> 00:01:33.088
Like VPN, ExpressRoute is
about getting connectivity
30
00:01:33.100 --> 00:01:35.529
from your premise
to Microsoft, but in
31
00:01:35.540 --> 00:01:37.849
ExpressRoute's case,
doing this by not
32
00:01:37.860 --> 00:01:38.659
using the internet.
33
00:01:39.360 --> 00:01:41.368
Most customers work with
a service provider like
34
00:01:41.380 --> 00:01:44.948
AT &T or any of our over
200 ExpressRoute partners
35
00:01:44.960 --> 00:01:47.669
to provide a private,
non-internet path to
36
00:01:47.680 --> 00:01:48.499
Microsoft's network.
37
00:01:49.040 --> 00:01:51.109
Once connected with an
ExpressRoute circuit, you
38
00:01:51.120 --> 00:01:54.519
can go to Microsoft public
and Azure public services
39
00:01:54.530 --> 00:01:57.219
like SQL Server, Azure
Storage, Dynamics, or
40
00:01:57.230 --> 00:01:58.769
in some cases, M365.
41
00:01:58.930 --> 00:02:01.879
This is done using public
IP addresses over Microsoft
42
00:02:01.890 --> 00:02:04.649
Peering, the orange
lines in this diagram.
43
00:02:05.150 --> 00:02:07.558
In this scenario, you would
also use a route filter
44
00:02:07.570 --> 00:02:10.759
feature to reduce the BGP
overhead to only receive
45
00:02:10.770 --> 00:02:13.279
the specific address
ranges for the regions
46
00:02:13.290 --> 00:02:14.429
or services you need.
47
00:02:14.650 --> 00:02:17.349
However, most commonly
used is private peering.
48
00:02:17.650 --> 00:02:19.479
This is the blue box
in the lower right-hand
49
00:02:19.490 --> 00:02:20.349
corner of the diagram.
50
00:02:20.890 --> 00:02:23.839
Using an ExpressRoute gateway
on the VNet and a connection
51
00:02:23.850 --> 00:02:26.259
object between the circuit
and the gateway allows you
52
00:02:26.270 --> 00:02:29.039
to extend your corporate
on-premise private network
53
00:02:29.050 --> 00:02:32.659
into Azure and access your
Azure resources directly
54
00:02:32.670 --> 00:02:34.289
on this private data path.
55
00:02:34.450 --> 00:02:36.389
Again, not using the Internet.
56
00:02:37.350 --> 00:02:39.439
ExpressRoute enables you to
connect multiple ExpressRoute
57
00:02:39.450 --> 00:02:41.969
gateways in the same or
different regions back
58
00:02:41.980 --> 00:02:42.739
to the same circuit.
59
00:02:42.920 --> 00:02:45.249
For our largest premium
ExpressRoute circuit,
60
00:02:45.260 --> 00:02:48.189
that could be up to 100
ExpressRoute gateways in any
61
00:02:48.200 --> 00:02:51.279
region in the world back to
the same ExpressRoute circuit.
62
00:02:51.840 --> 00:02:54.849
There's also an ExpressRoute
direct port option, which
63
00:02:54.860 --> 00:02:57.259
would replace the partner
edge in the diagram.
64
00:02:57.800 --> 00:03:01.409
This allows you to connect
your edge router directly to
65
00:03:01.420 --> 00:03:05.229
the Microsoft routers in a
facility for direct connection
66
00:03:05.240 --> 00:03:06.599
to the Microsoft network.
67
00:03:07.340 --> 00:03:10.429
Also, for monitoring, we
offer the ExpressRoute
68
00:03:10.440 --> 00:03:11.279
Traffic Collector.
69
00:03:11.720 --> 00:03:14.169
This feature can provide
detailed flow data on your
70
00:03:14.180 --> 00:03:16.549
circuits to be able to
identify things like top
71
00:03:16.560 --> 00:03:19.639
talkers or other traffic-based
metrics and queries.
72
00:03:21.720 --> 00:03:23.809
The final service I'll
cover in the hybrid
73
00:03:23.820 --> 00:03:26.639
connectivity pillar is
our virtual WAN service.
74
00:03:28.970 --> 00:03:33.419
As the diagram shows, Virtual
WAN, also called vWAN, brings
75
00:03:33.430 --> 00:03:36.979
together all of the features
of ExpressRoute and VPN,
76
00:03:36.990 --> 00:03:39.539
and then extends them for
any-to-any connectivity
77
00:03:39.550 --> 00:03:41.789
into and across Azure.
78
00:03:42.150 --> 00:03:44.879
If you're familiar with a
hub-and-spoke architecture,
79
00:03:44.890 --> 00:03:47.999
a Virtual WAN implements this
in a concise, single-object
80
00:03:48.010 --> 00:03:50.499
structure to implement the
hub-and-spoke scaffolding
81
00:03:50.510 --> 00:03:52.629
much faster than you
could build yourself.
82
00:03:52.840 --> 00:03:56.569
If you use a vWAN-aware
SDN hardware device on
83
00:03:56.580 --> 00:03:59.579
your premise, you get
large-scale VPN automation.
84
00:04:00.080 --> 00:04:02.489
Just log into your on-prem
device with your Azure
85
00:04:02.500 --> 00:04:05.589
credentials, and it can
auto-configure the device and
86
00:04:05.600 --> 00:04:08.819
establish the IPsec connection
back to your vWAN hub.
87
00:04:09.320 --> 00:04:11.629
This is great if you
have many branch offices
88
00:04:11.640 --> 00:04:14.929
or retail outlets that
need VPN connections to
89
00:04:14.940 --> 00:04:15.939
your Azure workloads.
90
00:04:16.279 --> 00:04:20.069
vWAN also integrates with
Azure Firewall, but not just
91
00:04:20.079 --> 00:04:23.689
Azure's firewall, but also
to other popular firewalls
92
00:04:23.700 --> 00:04:26.449
from the marketplace to turn
your regular vWAN hub into
93
00:04:26.460 --> 00:04:28.299
what we call a secure hub.
94
00:04:28.660 --> 00:04:31.409
This allows you to use the
firewall of your choice and
95
00:04:31.420 --> 00:04:34.459
your unique security policies
to make your WAN secure.
96
00:04:35.320 --> 00:04:37.749
vWAN introduces many other
routing features like route
97
00:04:37.760 --> 00:04:40.849
maps, routing intent, and
others to manage the flows
98
00:04:40.860 --> 00:04:42.339
across the virtual WAN.
99
00:04:43.000 --> 00:04:47.009
All of this together allows
you to enable, secure, and
100
00:04:47.020 --> 00:04:50.489
control your network traffic,
making the Microsoft backbone
101
00:04:50.500 --> 00:04:52.859
and Azure your corporate WAN.
102
00:04:54.800 --> 00:04:57.169
Hopefully this provides
some insight into the
103
00:04:57.180 --> 00:05:00.349
three main services in our
hybrid connectivity pillar,
104
00:05:00.360 --> 00:05:03.379
Azure VPN, ExpressRoute,
and Virtual WAN.