AZ-305 Network Solutions
Azure Recommendations to Design Network Solutions
Below are the recommended Azure solutions to design network solutions as aligned with the AZ-305 exam objectives.
Azure Network Solutions Design Recommendations (AZ-305)
1. Recommend a Connectivity Solution for Azure-to-Internet
Azure NAT Gateway is the preferred solution for outbound internet connectivity:
- Key Features:
Azure Firewall for secure outbound traffic:
- Governs non-HTTP/S traffic, integrates with Azure Monitor for logging, and supports threat intelligence-based filtering31.
Best Practices:
- Use NAT Gateway for high-volume outbound traffic (e.g., batch processing).
- Combine with Azure Firewall for advanced security (e.g., FQDN filtering, IDPS)31.
2. Recommend a Connectivity Solution for Azure-to-On-Premises
ExpressRoute for private, high-throughput connections:
- Benefits:
VPN Gateway for cost-sensitive or backup scenarios:
- Site-to-site VPN over public internet (max 1.25 Gbps). Use with Virtual WAN for automated branch connectivity785.
Hybrid Architectures:
- ExpressRoute + VPN Failover: Ensure continuity during ExpressRoute outages5.
- Azure Virtual WAN: Centralizes VPN, ExpressRoute, and SD-WAN connections into a hub-spoke model78.
Best Practices:
- Terminate ExpressRoute inside on-premises firewalls for centralized security4.
- Use Azure Arc for unified management of hybrid servers76.
3. Recommend a Solution to Optimize Network Performance
Accelerated Networking:
- Reduces VM CPU overhead by offloading packet processing to SmartNICs (FPGA). Ideal for latency-sensitive apps (e.g., HPC, real-time analytics)9.
Azure Front Door/CDN:
- Global HTTP load balancing with caching and Anycast routing for 50% lower latency vs. Traffic Manager101112.
Proximity Placement Groups:
Best Practices:
- Enable TCP/IP tuning (e.g., increasing RWIN size) for high-throughput VMs139.
- Use Zonal Redundancy (Availability Zones) for critical workloads2.
4. Recommend a Solution to Optimize Network Security
Layered Security Approach:
- Network Security Groups (NSGs): Basic Layer 3/4 filtering for subnets/VMs (e.g., allow/deny by IP/port)32.
- Azure Firewall: Stateful Layer 7 inspection with threat intelligence, IDPS, and FQDN filtering31.
- Web Application Firewall (WAF): Protects web apps from OWASP Top 10 vulnerabilities (integrated with Front Door/App Gateway)1012.
DDoS Protection:
- Standard Tier: Auto-mitigates volumetric attacks (e.g., SYN floods) with cost guarantees during attacks14.
Best Practices:
- Apply Zero Trust principles: Micro-segment subnets, enforce least-privilege NSG rules43.
- Use Azure Policy to enforce NSG rules and firewall configurations across subscriptions1.
5. Recommend a Load-Balancing and Routing Solution
Azure Load Balancer (Layer 4):
- Distributes TCP/UDP traffic across VMs with ultra-low latency. Use for non-HTTP workloads (e.g., databases)10122.
Application Gateway (Layer 7):
Azure Front Door:
- Global HTTP load balancer with DDoS protection, caching, and Anycast routing. Ideal for multi-region web apps101112.
Traffic Manager (DNS-Based):
- Directs users to the closest healthy endpoint via DNS. Use for non-latency-sensitive global apps1112.
Routing:
- User-Defined Routes (UDRs): Override default system routes (e.g., direct traffic through NVAs)16.
- Service Tags: Simplify UDRs by grouping IP ranges (e.g.,
Storage
orAzureCloud
)16.
Best Practices:
- Chain Application Gateway (frontend) with Internal Load Balancer (backend) for multi-tier apps15.
- Use Azure Monitor to track load balancer metrics (e.g., SNAT port usage, health probes)2.
Summary Table
Requirement | Azure Recommendation | Key Tools/Features |
---|---|---|
Azure-to-Internet | NAT Gateway (SNAT) + Azure Firewall (security) | Scalable SNAT, FQDN filtering, threat intelligence |
Azure-to-On-Premises | ExpressRoute (primary) + VPN Gateway (failover) | 100 Gbps private link, SLA-backed uptime |
Network Performance | Accelerated Networking + Front Door/CDN | SmartNIC offloading, global caching, Anycast |
Network Security | NSGs + Azure Firewall + DDoS Protection Standard | Layer 7 inspection, Zero Trust, volumetric attack mitigation |
Load-Balancing/Routing | Load Balancer (L4) + Application Gateway (L7) + Front Door (global) | SSL offloading, WAF, UDRs with service tags |
By aligning with these recommendations, you ensure a secure, high-performance, and resilient network architecture in Azure, meeting AZ-305 exam objectives and Microsoft best practices.
Summarised with Perplexity.
Footnotes
- https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/azure-best-practices/plan-for-inbound-and-outbound-internet-connectivity ↩ ↩2 ↩3 ↩4 ↩5
- https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-overview ↩ ↩2 ↩3 ↩4 ↩5
- https://www.knowledgehut.com/blog/cloud-computing/azure-firewall-vs-nsg ↩ ↩2 ↩3 ↩4 ↩5
- https://learn.microsoft.com/en-us/azure/security/fundamentals/network-best-practices ↩ ↩2 ↩3
- https://learn.microsoft.com/en-us/azure/architecture/reference-architectures/hybrid-networking/expressroute-vpn-failover ↩ ↩2 ↩3
- https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/scenarios/azure-vmware/on-premises-connectivity ↩ ↩2
- https://learn.microsoft.com/en-us/azure/networking/fundamentals/networking-overview ↩ ↩2 ↩3
- https://www.megaport.com/blog/comparing-ways-to-connect-to-microsoft-azure/ ↩ ↩2
- https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-tcpip-performance-tuning ↩ ↩2 ↩3
- https://learn.microsoft.com/en-us/azure/architecture/guide/technology-choices/load-balancing-overview ↩ ↩2 ↩3 ↩4 ↩5
- https://stackoverflow.com/questions/67022265/it-is-azure-traffic-manager-or-azure-front-door-in-front-for-multi-region-system ↩ ↩2 ↩3
- https://azure.microsoft.com/en-us/solutions/load-balancing-with-azure ↩ ↩2 ↩3 ↩4 ↩5 ↩6
- https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-optimize-network-bandwidth ↩ ↩2
- https://k21academy.com/microsoft-security/overview-of-azure-ddos-protection/ ↩
- https://learn.microsoft.com/en-us/answers/questions/1121824/app-gateway-load-balancer-when-to-use-them-togethe ↩ ↩2
- https://learn.microsoft.com/en-us/azure/virtual-network/virtual-networks-udr-overview ↩ ↩2