πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-700 Domain 1
Domain 1 β€” Module 1 of 7 14%
1 of 26 overall

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)
Domain 1: Core Networking Infrastructure Free ⏱ ~14 min read

Virtual Networks: Your Cloud Foundation

Learn how Azure Virtual Networks provide isolated network environments, plan address spaces, configure subnets for services, and understand the naming rules that trip up exam candidates.

Virtual Networks: Your Cloud Foundation

Every Azure network starts with a Virtual Network (VNet). Before you deploy a single VM, gateway, or firewall, you need to understand how VNets carve out your private space in Azure. This module is the foundation for everything that follows.

🎬 Video coming soon

Virtual Networks and Subnets Deep Dive

Virtual Networks and Subnets Deep Dive

~14:00

What Is a Virtual Network?

β˜• Simple explanation

Think of Azure as a massive skyscraper. A Virtual Network is your private floor in that building. You control who comes in, who goes out, and how the rooms (subnets) are arranged. Other tenants can’t wander onto your floor, and your devices can talk to each other freely within it β€” but talking to the outside world or other floors requires explicit configuration.

An Azure Virtual Network (VNet) is a logical isolation of the Azure cloud dedicated to your subscription. It enables Azure resources to securely communicate with each other, the internet, and on-premises networks. Each VNet is scoped to a single region and a single subscription, though you can connect VNets across regions and subscriptions using peering. VNets use private RFC 1918 address spaces and support both IPv4 and dual-stack (IPv4 + IPv6).

Key VNet facts for the exam:

  • A VNet is scoped to a single Azure region β€” it cannot span regions
  • A VNet belongs to a single subscription β€” but can peer across subscriptions and tenants
  • You can assign multiple address spaces to one VNet
  • Address spaces must not overlap with other VNets you plan to peer or connect
  • Azure reserves 5 IP addresses in every subnet (first four and last)

Address Space Planning with Ravi

🏒 Ravi Sharma at Pinnacle Financial is migrating from two data centres to Azure. He needs a hub-and-spoke network for 5,000 staff across multiple business units. Here’s his plan:

VNetPurposeAddress SpaceRegion
Hub VNetShared services, gateways, firewall10.10.0.0/16Australia East
Spoke 1 β€” FinanceFinance workloads10.20.0.0/16Australia East
Spoke 2 β€” HRHR workloads10.30.0.0/16Australia East

Each /16 gives Ravi 65,536 addresses per VNet β€” plenty of room for subnetting.

Why non-overlapping matters: If Ravi used 10.10.0.0/16 for both hub and spoke, VNet peering would fail. Azure cannot route traffic between two networks that claim the same address range. Plan this before you deploy β€” changing a VNet address space later requires downtime and resource redeployment.

ℹ️ CIDR Notation Refresher

CIDR (Classless Inter-Domain Routing) uses a prefix length to define how many addresses a range contains.

CIDRAddressesTypical Use
/1665,536Large VNet
/204,096Medium VNet or large subnet
/24256Standard workload subnet
/2664Bastion or Firewall subnet
/2732Gateway or small service subnet
/298Smallest allowed (3 usable after Azure reserves 5)

The 5 reserved addresses in every subnet:

  • x.x.x.0 β€” Network address
  • x.x.x.1 β€” Default gateway
  • x.x.x.2, x.x.x.3 β€” Azure DNS mapping
  • x.x.x.255 (last address) β€” Reserved by Azure

So a /29 (8 addresses) minus 5 reserved = 3 usable IPs.

Special-Purpose Subnets

This is a high-value exam topic. Azure requires specific subnet names and minimum sizes for certain services. Get the names wrong, and the service won’t deploy.

Subnet NameRequired ForMinimum SizeNaming Rule
GatewaySubnetVPN Gateway, ExpressRoute Gateway/27 recommendedMust be named exactly GatewaySubnet
AzureBastionSubnetAzure Bastion/26 minimumMust be named exactly AzureBastionSubnet
AzureFirewallSubnetAzure Firewall (data)/26 minimumMust be named exactly AzureFirewallSubnet
AzureFirewallManagementSubnetAzure Firewall (management)/26 minimumMust be named exactly AzureFirewallManagementSubnet
RouteServerSubnetAzure Route Server/27 minimumMust be named exactly RouteServerSubnet
(any name)Application Gateway/24 recommendedDedicated subnet required, but you choose the name

Exam Tip: The exam loves testing exact subnet names. GatewaySubnet is case-sensitive and cannot be changed. Both VPN Gateway and ExpressRoute Gateway share the same GatewaySubnet β€” you don’t create two. Application Gateway needs a dedicated subnet but the name is your choice.

Ravi’s Hub VNet Layout

Here’s how Ravi’s hub VNet subnets are arranged within 10.10.0.0/16:

10.10.0.0/16 β€” Hub VNet
β”œβ”€β”€ GatewaySubnet          10.10.0.0/27    (VPN + ER gateways)
β”œβ”€β”€ AzureFirewallSubnet    10.10.1.0/26    (Azure Firewall)
β”œβ”€β”€ AzureBastionSubnet     10.10.2.0/26    (Bastion)
β”œβ”€β”€ RouteServerSubnet      10.10.3.0/27    (Route Server)
β”œβ”€β”€ SharedServices         10.10.10.0/24   (DNS, AD DS, tooling)
└── Management             10.10.11.0/24   (Jump boxes, monitoring)

Notice how the special-purpose subnets are small (just meeting minimum requirements) while workload subnets get a full /24. This is a common and recommended pattern.

Shared vs Dedicated Subnets

ℹ️ When Can Resources Share a Subnet?

Shared subnets β€” Most Azure resources (VMs, NICs, private endpoints, internal load balancers) can coexist in the same subnet. There’s no technical restriction on mixing them.

Dedicated subnets β€” Some services require their own subnet with no other resources:

  • Azure Firewall (AzureFirewallSubnet)
  • Azure Bastion (AzureBastionSubnet)
  • VPN/ER Gateways (GatewaySubnet)
  • Route Server (RouteServerSubnet)
  • Application Gateway (needs a dedicated subnet)
  • Azure Container Instances (when using subnet delegation)
  • Azure SQL Managed Instance (delegated subnet)

Best practice: Even when sharing is allowed, use separate subnets per workload tier (web, app, data) so you can apply different NSG rules and route tables to each.

Shared vs Dedicated Subnets
AspectShared SubnetsDedicated Subnets
When requiredDefault for most resources β€” no restrictionRequired by specific Azure services
ExamplesVMs, NICs, private endpoints, internal load balancersGatewaySubnet, AzureBastionSubnet, AzureFirewallSubnet, Application Gateway
NamingAny name you chooseMust use exact names (GatewaySubnet, AzureBastionSubnet, etc.)
Other resources allowedYes β€” multiple resource types can coexistNo β€” only the designated service can deploy here
FlexibilityApply any NSG and route tableSome services restrict NSG or route table association
Best practiceSeparate subnets per workload tier for NSG granularitySize to minimum requirement and leave room for growth

Creating a VNet β€” The Basics

When creating a VNet, you specify:

  1. Subscription and resource group β€” where it lives for billing and management
  2. Name β€” descriptive (e.g., vnet-hub-aue-001)
  3. Region β€” cannot be changed after creation
  4. Address space β€” one or more CIDR ranges (can be added later)
  5. Subnets β€” at least one to start (can be added later)
  6. DNS servers β€” default Azure-provided, or custom (covered in Module 3)
  7. DDoS protection β€” optional (covered in Module 7)
  8. Tags β€” for cost management and organisation

You can add or remove address spaces after creation, but only if no resources conflict with the change. Adding subnets is non-disruptive. Removing or resizing subnets requires removing all resources in them first.

Key Takeaways

  • VNets are region-scoped and subscription-scoped
  • Plan non-overlapping address spaces before deployment
  • Azure reserves 5 IPs per subnet β€” /29 gives only 3 usable
  • Special subnets have exact naming requirements (GatewaySubnet, AzureBastionSubnet, etc.)
  • Both VPN and ExpressRoute gateways share one GatewaySubnet

Test Your Knowledge

Question

How many IP addresses does Azure reserve in every subnet?

Click or press Enter to reveal answer

Answer

5 addresses β€” the network address, default gateway, two DNS-mapping addresses, and the last address in the subnet (reserved by Azure).

Click to flip back

Question

What must the gateway subnet be named for VPN and ExpressRoute?

Click or press Enter to reveal answer

Answer

GatewaySubnet β€” exactly, case-sensitive. Both VPN Gateway and ExpressRoute Gateway share this single subnet.

Click to flip back

Question

What is the minimum subnet size for Azure Bastion?

Click or press Enter to reveal answer

Answer

/26 (64 addresses). The subnet must be named exactly AzureBastionSubnet.

Click to flip back

Question

Can a VNet span multiple Azure regions?

Click or press Enter to reveal answer

Answer

No. A VNet is scoped to a single region. To connect VNets across regions, use VNet peering (global peering) or VPN/ExpressRoute.

Click to flip back


Knowledge Check

Ravi needs both a VPN Gateway and an ExpressRoute Gateway in his hub VNet. How many gateway subnets does he need?

Knowledge Check

Sam creates a /29 subnet. How many VMs can he deploy in it?

Knowledge Check

Which subnet name is required for Azure Firewall?


Next up: IP Addressing: Public, Private and Prefixes β€” Learn how Azure assigns IP addresses and when to use prefixes for consistent outbound IPs.

Next β†’

IP Addressing: Public, Private & Prefixes

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.