Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Logically Segment Subnets #62

Open
abokov opened this issue Jul 2, 2021 · 0 comments
Open

Logically Segment Subnets #62

abokov opened this issue Jul 2, 2021 · 0 comments

Comments

@abokov
Copy link
Owner

abokov commented Jul 2, 2021

Segment the larger address space into subnets using Classless Inter-Domain Routing (CIDR) based subnetting principles to create your subnets. Routing between subnets will happen automatically and you do not need to manually configure routing tables. To create network access controls between subnets, you?ll need to put Network Security Group (NSG) between the subnets.

Best Practices

  • Use a Network SecurityGroup to protect against unsolicited traffic into Azure subnets. Network security groups are simple, packet inspection devices that use the 5-tuple approach (source IP, source port, destination IP, destination port, and layer 4 protocol) to create allow/deny rules for network traffic. You allow or deny traffic to and from a single IP address, to and from multiple IP addresses, or to and from entire subnets.
  • When you use network security groups for network access control between subnets, ensure you put resources that belong to the same security zone or role in their own subnets.
  • Simplify network security group rule management by defining ApplicationSecurityGroups.
@abokov abokov added this to the Security Domain milestone Jul 2, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant