Windows Azure: Virtual Networking

This post is part of a continuing series on Windows Azure. For an introduction, please see last week’s article. This article will focus on virtual networking in Azure. This is the first step in creating your virtual cloud environment. By using Azure virtual networks, you can also connect your virtual machines and resources in Azure to your on premise network. This is done with an IPSec connection, which we will go over later in this article.

Network Setup

To create your first virtual network, select “Networks” in the portal. Give your network a name, and select a location. This location refers to the datacenter where your network will be housed.


The next screen defines DNS servers and VPN connections. If you are connecting this network to your on premise network, both of these options are important. You will need to insert the IP address of your on premise DNS server in the IP address space. This is a required step for attaching your Azure environment to your onsite environment. For VPN, we will be using site-to-site connectivity, which connects your cloud environment to your onsite environment. I will not go into much detail on this, because every VPN device is different. For a list of support devices and their settings, see this site. After the VPN setup is complete, you will be given a public IP address to use to configure your VPN device to allow the traffic.

With VPN in place, you can also begin using services like System Center 2012 Virtual Machine Manager and System Center 2012 App Controller to begin migrating onsite Hyper-V virtual machines to Azure.


The next screen allows you to define your IP address range. Establish this range as needed for your organization.


When you have completed the wizard, Azure will build the network for you.

After you have set up your network, you can begin to create virtual machines and resources. If you connect your cloud network to your on premise network using the secure VPN, you can begin to take advantage of Azure AD, SQL Server, and web hosting.

Traffic Manager

Another feature of networking with Azure is Traffic Manager. This applies policies to incoming traffic by looking at DNS queries. It will send users to best data center based on their location. It allows for quicker response time and higher performance.

Traffic Manager acts a type of load balancer. It has three methods. The first is performance, which routes traffic based on the closest available service. The second is round-robin, which distributes traffic equally across all services. Third is failover, which directs traffic to a different location if the primary location fails. These methods make applications perform at a high level and also make them redundant.

The one thing to remember when setting up Azure Virtual Networking and Traffic Manager is latency. If your application as a web server, application server, and SQL instance, these three pieces need to be kept together to ensure performance. You do not want one piece in the cloud and one piece onsite, because the latency will be increased and performance will drop.


All content provided on this blog is for information purposes only. Windows Management Experts, Inc makes no representation as to accuracy or completeness of any information on this site. Windows Management Experts, Inc will not be liable for any errors or omission in this information nor for the availability of this information. It is highly recommended that you consult one of our technical consultants, should you need any further assistant.



Contact Us

On Key

More Posts

WME Cybersecurity Briefings No. 014
Cyber Security

WME Security Briefing 14 June 2024

LightSpy Spyware’s macOS Variant Detected with Advanced Surveillance Capabilities Overview Findings reveal a previously undocumented macOS variant of the LightSpy spyware. It was initially thought to target only iOS users. This spyware utilizes a plugin-based system

Read More »
WME Cybersecurity Briefings No. 013
Cyber Security

WME Security Briefing 10 June 2024

CISA Urges Patching of Actively Exploited Linux Kernel Vulnerability Overview CISA just issued an urgent advisory concerning a newly discovered security flaw in the Linux kernel. The flaw is being actively exploited to affect the netfilter component of

Read More »
3 Things to Consider Before You Enable Copilot for Microsoft 365
Microsoft Copilot

3 Things to Consider Before You Enable Copilot for Microsoft 365

In today’s digital landscape, any productivity tool that streamlines workflow and boosts performance is a pleasant addition. With its AI-powered productivity-enhancing capabilities, Microsoft Copilot has emerged as a game-changer for employees, particularly for organizations using Microsoft

Read More »
WME Cybersecurity Briefings No. 012
Cyber Security

WME Security Briefing 03 June 2024

Moroccan Cybercrime Group Exploits Gift Card Systems for Major Financial Gains Overview: Storm-0539, also called Atlas Lion, is a Moroccan cybercrime group that executes advanced email and SMS phishing attacks. They are committing fraud by utilizing

Read More »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.