2.4 Azure Virtual WAN
📘Microsoft Azure Networking Solutions (AZ-700)
Overview
Azure Virtual WAN is a networking service that helps you connect branches, on-premises sites, and users to Azure securely and efficiently. It’s designed for large-scale networks with many locations, and it simplifies network management and connectivity.
Think of it as a central hub in Azure where all your network connections converge, managed centrally.
Key features:
- Centralized connectivity management – Manage multiple connections in one place.
- Global reach – Connect users and offices worldwide.
- Built-in routing – Automatically routes traffic between branches, hubs, and VNets.
- Optimized performance – Uses Microsoft backbone for faster and more reliable connectivity.
Key Components of Virtual WAN Architecture
When designing a Virtual WAN, you need to understand its components:
- Virtual WAN (VWAN) resource
- This is the top-level Azure resource.
- Acts as the container for hubs, connections, and routing policies.
- Hubs
- Each hub is an Azure region deployment within your VWAN.
- Provides VPN, ExpressRoute, and SD-WAN connectivity.
- Can host firewalls, routing policies, and other network appliances.
- Types of hubs:
- Standard Hub – For general connectivity.
- Secure Hub – With Azure Firewall integration for security policies.
- Virtual Hub
- A regional instance of the hub.
- Connects VNets, branch offices, and users in that region.
- Each hub has its own IP address range and routing table.
- Connections
- Ways to connect to the hub:
- Site-to-Site VPN – Connect on-premises networks.
- Point-to-Site VPN – Connect individual users.
- ExpressRoute – For high-speed private connections to Azure.
- VNet peering – Connect Azure VNets to the hub.
- Each connection uses the hub as a central routing point.
- Ways to connect to the hub:
- Routing and Security
- Virtual WAN provides automated routing between hubs and connections.
- You can enforce security with Azure Firewall, NVA (Network Virtual Appliance), or security policies.
Design Considerations for Virtual WAN
When designing Virtual WAN, you must decide:
1. Hub Placement
- Place hubs in regions where most traffic originates.
- Consider latency, performance, and regional compliance requirements.
- Multiple hubs can be connected for cross-region routing.
2. Connection Types
- Branch offices – Typically use Site-to-Site VPN or SD-WAN integration.
- Data centers – Prefer ExpressRoute for speed and reliability.
- Remote users – Use Point-to-Site VPN for secure access.
- VNets in Azure – Use hub-and-spoke model to connect to the virtual hub.
3. Routing Strategy
- Hub-to-Hub – Traffic between hubs flows through Microsoft backbone.
- Hub-to-Spoke (VNet) – Use VWAN routing to simplify VNet connectivity.
- Forced tunneling – Direct traffic from branches through a firewall for inspection.
4. Security Design
- Azure Firewall can be deployed in a secure hub.
- Routing policies can force branch traffic through firewalls.
- Network Security Groups (NSGs) still apply in VNets connected to the hub.
5. High Availability
- Use multiple hubs for redundancy in different regions.
- Each hub supports active-active VPN connections.
- ExpressRoute can have redundant circuits for reliability.
6. Monitoring and Management
- Virtual WAN integrates with Azure Monitor and Network Watcher.
- You can see connection status, performance, and routing details.
- Helps in troubleshooting network issues across all branches and VNets.
Virtual WAN Design Patterns
For the AZ-700 exam, you need to know common patterns:
- Hub-and-Spoke
- One or more hubs in regions.
- VNets connect to hubs (spokes).
- Traffic between VNets flows through the hub.
- Branch-to-Hub-to-VNet
- Branch offices connect via VPN or SD-WAN to the hub.
- Hub routes traffic to VNets.
- Multi-Region Hubs
- Hubs in different Azure regions.
- Traffic between regions uses Microsoft backbone.
- Supports disaster recovery and load balancing.
- Secure Hub
- Hub with Azure Firewall.
- Forces traffic through firewall for inspection before reaching VNets or on-premises.
Best Practices for Exam
- Use one hub per region unless you have high traffic requirements.
- Use hub-and-spoke model for simplicity.
- Enable built-in routing instead of managing individual route tables.
- Integrate Azure Firewall for centralized security.
- Design for redundancy with multiple hubs and ExpressRoute/VPN circuits.
- Monitor connections using Azure Monitor.
Summary for the Exam
When asked about designing a Virtual WAN architecture, remember these points:
- Virtual WAN = central hub for all connectivity (branches, VNets, users).
- Components: Virtual WAN resource → Hubs → Connections → Routing/Security.
- Design considerations: hub placement, connection types, routing, security, availability.
- Patterns: hub-and-spoke, branch-to-hub, multi-region hubs, secure hub.
- Best practices: centralized routing, Azure Firewall, monitoring, redundancy.
