Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Implementing Azure Solutions

You're reading from   Implementing Azure Solutions Eliminate the pain point of implementation

Arrow left icon
Product type Paperback
Published in May 2017
Publisher Packt
ISBN-13 9781786467850
Length 518 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (3):
Arrow left icon
Jan-Henrik Damaschke Jan-Henrik Damaschke
Author Profile Icon Jan-Henrik Damaschke
Jan-Henrik Damaschke
Florian Klaffenbach Florian Klaffenbach
Author Profile Icon Florian Klaffenbach
Florian Klaffenbach
Oliver Michalski Oliver Michalski
Author Profile Icon Oliver Michalski
Oliver Michalski
Arrow right icon
View More author details
Toc

Table of Contents (11) Chapters Close

Preface 1. Getting Started with Azure Implementation FREE CHAPTER 2. Azure Resource Manager and Tools 3. Deploying and Synchronizing Azure Active Directory 4. Implementing Azure Networks 5. Implementing and Securing Azure Storage Accounts 6. Planning and Deploying Virtual Machines in Azure 7. Implementing Azure Cloud Services 8. Implementing Azure Container Service 9. Implementing Azure Security 10. Skill Wrap Up and Migration Scenario

Azure network security


Azure network security is based on classic network security. Just because the hardware underneath is managed and the whole networking is virtualized doesn't mean that all classic network security principles are invalid.

Network security groups

A very basic feature when it comes to network security in Azure is the network security groups. It would be too much to call them firewalls, but they fulfill basic firewall activity. They are best compared to access lists on a Layer 3 network switch. They consist of inbound and outbound network security rules. These rules control the network traffic flow and can be given several parameters at creation.

Priority

The Priority of a rule defines the order in which the rules are applied to traffic. The rules are processed in order, what means that a lower number means a higher priority.

Source

There are a few different setting for source traffic. The source traffic needs to be categorized first. An important setting is the Tag categorization...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime