SIMULATION
Task 7
You plan to deploy 100 virtual machines to subnet4-1. The virtual machines will NOT be assigned a public IP address. The virtual machines will call the same API. which is hosted by a third party. The virtual machines will make more than 10,000 calls per minute to the API.
You need to minimize the risk of SNAT port exhaustion. The solution must minimize administrative effort.
Correct : A
To minimize the risk of SNAT port exhaustion for your 100 virtual machines in subnet4-1, while ensuring minimal administrative effort, you can use anAzure NAT Gateway. This service provides scalable and resilient outbound connectivity for virtual networks, dynamically allocating SNAT ports to avoid exhaustion.
Step-by-Step Solution
Step 1: Create a NAT Gateway
Navigate to the Azure Portal.
Search for ''NAT gateways''and select it.
Click on ''Create''.
Enter the following details:
Subscription: Select your subscription.
Resource Group: Select an existing resource group or create a new one.
Name: Enter a name for the NAT gateway (e.g.,NATGateway-Subnet4-1).
Region: Select the region where your virtual network is located.
Click on ''Next: Outbound IP''.
Step 2: Configure Outbound IP Addresses
Choose whether to use existing public IP addresses or create new ones.
If creating new ones, click on''Add new''and configure the new public IP addresses.
Click on ''Next: Subnet''.
Step 3: Associate the NAT Gateway with Subnet4-1
Click on ''Associate subnet''.
Select the virtual networkthat contains subnet4-1.
Select subnet4-1from the list of subnets.
Click on ''OK''.
Step 4: Review and Create
Review your settingsto ensure everything is correct.
Click on ''Review + create''and then''Create''.
Explanation
By following these steps, you can ensure that your 100 virtual machines in subnet4-1 can make the necessary API calls without running into SNAT port exhaustion, all while minimizing administrative effort.
Start a Discussions
SIMULATION
Task 8
You plan to deploy an appliance to subnet3-2- The appliance will perform packet inspection and will have an IP address of 10.3.2.100.
You need to ensure that all traffic to the internet from subnet3-1 is forwarded to the appliance for inspection.
Correct : A
To ensure that all traffic to the internet from subnet3-1 is forwarded to the appliance in subnet3-2 for packet inspection, you can useUser-Defined Routes (UDRs)to direct the traffic. Here's how you can do it:
Step-by-Step Solution
Step 1: Create a Route Table
Navigate to the Azure Portal.
Search for ''Route tables''and select it.
Click on ''Create''.
Enter the following details:
Subscription: Select your subscription.
Resource Group: Select an existing resource group or create a new one.
Name: Enter a name for the route table (e.g.,RouteTable-Subnet3-1).
Region: Select the region where your virtual network is located.
Click on ''Review + create''and then''Create''.
Step 2: Add a Route to the Route Table
Navigate to the newly created route table.
Select ''Routes''from the left-hand menu.
Click on ''Add''to create a new route.
Enter the following details:
Route name: Enter a name for the route (e.g.,RouteToAppliance).
Address prefix: Enter0.0.0.0/0to route all internet traffic.
Next hop type: SelectVirtual appliance.
Next hop address: Enter the IP address of the appliance (10.3.2.100).
Click on ''OK''to add the route.
Step 3: Associate the Route Table with Subnet3-1
Navigate to the route table.
Select ''Subnets''from the left-hand menu.
Click on ''Associate''.
Select the virtual networkthat contains subnet3-1.
Select subnet3-1from the list of subnets.
Click on ''OK''.
Explanation
Route Table Association: Associating the route table with subnet3-1 ensures that all traffic from this subnet follows the defined routes.
By following these steps, you can ensure that all internet-bound traffic from subnet3-1 is forwarded to the appliance in subnet3-2 for inspection, thereby enhancing your network security.
Start a Discussions
SIMULATION
Task 9
You plan to use VNET4 for an Azure API Management implementation.
You need to configure a policy that can be used by an Azure application gateway to protect against known web attack vectors. The policy must only allow requests that originate from IP addresses in Canad
a. You do NOT need to create the application gateway to complete this task.
Correct : A
To configure a policy in Azure API Management that can be used by an Azure Application Gateway to protect against known web attack vectors and only allow requests from IP addresses in Canada, follow these steps:
Step-by-Step Solution
Step 1: Create or Access Your API Management Instance
Navigate to the Azure Portal.
Search for ''API Management services''and select your API Management instance.
Step 2: Configure the Policy
In the API Management instance, go to the''APIs''section.
Select the APIyou want to apply the policy to.
Go to the ''Design'' tab.
Select ''All operations''if you want to apply the policy to all operations, or select a specific operation.
Step 3: Add the Inbound Policy
In the Inbound processing section, click on''+ Add policy''.
Select ''IP filter''from the list of policies.
Add the IP address ranges for Canada. You can find the IP ranges for Canada from a reliable source or use a service that provides this information.
Here is an example of the XML configuration for the policy:
<inbound>
<ip-filter action='allow'>
<!-- Add other Canadian IP ranges as needed -->
</ip-filter>
<ip-filter action='deny'>
</ip-filter>
</inbound>
Save the policyto apply the changes.
Explanation
IP Filter Policy: This policy allows you to filter incoming requests based on their IP addresses. By specifying the IP ranges for Canada, you ensure that only requests originating from these IPs are allowed.
Inbound Processing: Applying the policy in the inbound section ensures that the requests are filtered before they reach your API.
Start a Discussions
SIMULATION
Task 10
You plan to deploy several virtual machines to subnet1-2.
You need to prevent all Azure hosts outside of subnetl-2 from connecting to TCP port 5585 on hosts on subnet1-2. The solution must minimize administrative effort.
Correct : A
To prevent all Azure hosts outside of subnet1-2 from connecting to TCP port 5585 on hosts within subnet1-2, you can use aNetwork Security Group (NSG). This solution is straightforward and minimizes administrative effort.
Step-by-Step Solution
Step 1: Create a Network Security Group (NSG)
Navigate to the Azure Portal.
Search for ''Network security groups''and select it.
Click on ''Create''.
Enter the following details:
Subscription: Select your subscription.
Resource Group: Select an existing resource group or create a new one.
Name: Enter a name for the NSG (e.g.,NSG-Subnet1-2).
Region: Select the region where your virtual network is located.
Click on ''Review + create''and then''Create''.
Step 2: Create an Inbound Security Rule
Navigate to the newly created NSG.
Select ''Inbound security rules''from the left-hand menu.
Click on ''Add''to create a new rule.
Enter the following details:
Source: SelectService Tag.
Source Service Tag: SelectVirtualNetwork.
Source port ranges: Leave as*.
Destination: SelectIP Addresses.
Destination IP addresses/CIDR ranges: Enter the IP range of subnet1-2 (e.g.,10.1.2.0/24).
Destination port ranges: Enter5585.
Protocol: SelectTCP.
Action: SelectDeny.
Priority: Enter a priority value (e.g.,100).
Name: Enter a name for the rule (e.g.,Deny-TCP-5585).
Click on ''Add''to create the rule.
Step 3: Associate the NSG with Subnet1-2
Navigate to the virtual networkthat contains subnet1-2.
Select ''Subnets''from the left-hand menu.
Select subnet1-2from the list of subnets.
Click on ''Network security group''.
Select the NSGyou created (NSG-Subnet1-2).
Click on ''Save''.
Explanation
Inbound Security Rule: By creating a rule that denies traffic on TCP port 5585 from any source outside of subnet1-2, you ensure that only hosts within subnet1-2 can connect to this port.
Association with Subnet: Associating the NSG with subnet1-2 ensures that the security rules are applied to all resources within this subnet.
By following these steps, you can effectively prevent all Azure hosts outside of subnet1-2 from connecting to TCP port 5585 on hosts within subnet1-2, while minimizing administrative effort.
Start a Discussions
SIMULATION
Task 11
You need to ensure that only hosts on VNET1 can access the slcnage42150372 storage account. The solution must ensure that access occurs over the Azure backbone network.
Correct : A
To ensure that only hosts on VNET1 can access theslcnage42150372storage account and that access occurs over the Azure backbone network, you can useAzure Private Endpoints. This method secures the connection by assigning a private IP address from your virtual network to the storage account, ensuring that traffic does not traverse the public internet.
Step-by-Step Solution
Step 1: Create a Private Endpoint for the Storage Account
Navigate to the Azure Portal.
Search for ''Storage accounts''and select theslcnage42150372storage account.
In the storage account blade, select''Networking''under the ''Security + networking'' section.
Under ''Private endpoint connections'', click on''Add private endpoint''.
Enter the following details:
Name: Enter a name for the private endpoint (e.g.,PrivateEndpoint-VNET1).
Region: Select the same region as your virtual network (VNET1).
Click on ''Next: Resource''.
Step 2: Configure the Resource
Select ''Target sub-resource'': Choose the storage service you want to connect to (e.g.,blob,file,queue,table).
Click on ''Next: Virtual network''.
Step 3: Select the Virtual Network and Subnet
Select the virtual network: Choose VNET1.
Select the subnet: Choose the appropriate subnet within VNET1.
Click on ''Next: Configuration''.
Step 4: Configure DNS Integration (Optional)
Configure DNS settingsif needed to ensure proper name resolution within your virtual network.
Click on ''Next: Tags'', add any tags if necessary, and then click on''Review + create''.
Review your settingsand click on''Create''.
Step 5: Restrict Public Network Access
Navigate back to the storage account.
Select ''Networking''under the ''Security + networking'' section.
Under ''Firewalls and virtual networks'', select''Selected networks''.
Ensure that only VNET1 is listedunder the virtual networks section.
Click on ''Save''.
Explanation
By following these steps, you can ensure that only hosts on VNET1 can access theslcnage42150372storage account, and that all access occurs over the secure Azure backbone network.
Start a Discussions