πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-700 Domain 2
Domain 2 β€” Module 5 of 6 83%
12 of 26 overall

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)

AZ-700 Study Guide

Domain 1: Core Networking Infrastructure

  • Virtual Networks: Your Cloud Foundation Free
  • IP Addressing: Public, Private & Prefixes Free
  • Name Resolution: Azure DNS Free
  • Routing: UDRs, Route Server & NAT Gateway Free
  • VNet Peering and Connectivity
  • Network Monitoring and Diagnostics
  • DDoS Protection and Security Posture

Domain 2: Connectivity Services

  • Site-to-Site VPN: Connecting On-Premises
  • Point-to-Site VPN: Remote Access
  • ExpressRoute Fundamentals
  • ExpressRoute: Advanced Features
  • Azure Virtual WAN
  • Choosing Your Hybrid Connection

Domain 3: Application Delivery Services

  • Azure Load Balancer: Layer 4
  • Traffic Manager: DNS-Based Routing
  • Application Gateway: Layer 7
  • Azure Front Door: Global Delivery
  • Choosing the Right Load Balancer

Domain 4: Private Access to Azure Services

  • Private Link and Private Endpoints
  • Private Endpoint DNS
  • Service Endpoints: When and How

Domain 5: Network Security Services

  • NSGs and Application Security Groups
  • Flow Logs, IP Flow Verify & Network Manager Security
  • Azure Firewall: SKUs and Deployment
  • Azure Firewall Manager and Policies
  • Web Application Firewall (WAF)
Domain 2: Connectivity Services Premium ⏱ ~13 min read

Azure Virtual WAN

Simplify global networking with Azure Virtual WAN β€” hub deployment, gateway scaling, custom routing, routing intent, and NVA integration.

Azure Virtual WAN

Virtual WAN (VWAN) is Microsoft’s managed networking service that brings together VPN, ExpressRoute, and VNet connectivity into a single operational model. Instead of building your own hub-and-spoke, Azure manages the hubs.

🎬 Video coming soon

Azure Virtual WAN Architecture

Azure Virtual WAN Architecture

~13:00
β˜• Simple explanation

Virtual WAN is Microsoft building the hub for you. In a traditional hub-spoke, you deploy VPN Gateway, ExpressRoute Gateway, Firewall, and routing. With Virtual WAN, Microsoft manages the hub. You tell Azure what gateways you need, connect your VNets and branches, and Microsoft handles routing, scaling, and redundancy.

Azure Virtual WAN is a managed hub-and-spoke networking service. It consolidates VPN, ExpressRoute, P2S, firewall, and routing into managed virtual hubs. Architecture: Virtual WAN resource (container) containing virtual hubs (per region) with connections (VNets, VPN sites, ER circuits) and gateways (VPN, ER, P2S).

Virtual WAN SKUs

Virtual WAN Basic vs Standard
FeatureBasicStandard
Site-to-Site VPNYesYes
Point-to-Site VPNNoYes
ExpressRouteNoYes
VNet-to-VNet (through hub)NoYes
Inter-hub connectivityNoYes (automatic)
Azure Firewall in hubNoYes
NVA in hubNoYes
Routing intentNoYes
CostLowerHigher (more features)

Exam Tip: Basic VWAN only supports Site-to-Site VPN. For anything else (P2S, ExpressRoute, transit routing, firewall in hub), you need Standard SKU. You can upgrade Basic to Standard but cannot downgrade.

Elena’s Global Architecture

☁️ Elena’s scenario: Skyline Logistics has offices in 15 countries across 3 regions. Instead of manually building hub-and-spoke in each region, she deploys a Standard VWAN with 3 regional hubs:

                    β”Œβ”€β”€β”€ Hub: Australia East ───┐
                    β”‚   S2S GW    ER GW         β”‚
                    β”‚   P2S GW    FW             β”‚
                    β”‚   VNet connections          β”‚
                    β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                β”‚ (automatic)
β”Œβ”€β”€β”€ Hub: West Europe ──┐      β”‚      β”Œβ”€β”€β”€ Hub: East US ──────┐
β”‚   S2S GW    ER GW     β”‚β”€β”€β”€β”€β”€β”€β”˜β”€β”€β”€β”€β”€β”€β”‚   S2S GW    ER GW     β”‚
β”‚   P2S GW    FW        β”‚            β”‚   P2S GW    FW         β”‚
β”‚   VNet connections     β”‚            β”‚   VNet connections      β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜            β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Key benefit: Inter-hub connectivity is automatic. Elena doesn’t create peering between hubs β€” VWAN handles it. Traffic between hubs routes over Microsoft’s backbone.

Hub Deployment

When creating a hub, you specify:

  1. Region β€” one hub per region (you can have multiple hubs in different regions)
  2. Address prefix β€” hub’s internal address space (e.g., 10.100.0.0/24). Azure manages subnets within it.
  3. Gateways β€” deploy S2S VPN, P2S VPN, and/or ExpressRoute gateways as needed
  4. Scale units β€” determine gateway throughput

Gateway scale units:

Gateway TypeScale UnitsThroughput
S2S VPN1 unit500 Mbps
S2S VPN2 units1 Gbps
S2S VPN20 units10 Gbps
P2S VPN1 unit500 Mbps
P2S VPNMultipleScales linearly
ExpressRoute1 unit2 Gbps
ExpressRoute5 units10 Gbps

Scale units can be increased without downtime. You pay for the gateway capacity whether used or not.

Hub Routing

VWAN hubs use route tables to control traffic flow. The default route table handles most scenarios automatically:

Default behavior:

  • All VNet connections, VPN connections, and ER connections associate with and propagate to the default route table
  • All connected VNets can reach all VPN sites and vice versa
  • All hubs exchange routes automatically (transit)

Custom route tables let you isolate traffic:

  • Create separate route tables for different groups of connections
  • Associate connections with specific route tables (controls which routes they receive)
  • Propagate connections to specific route tables (controls who learns about them)
  • Static routes for specific destinations (e.g., force traffic to firewall)

Routing intent simplifies security routing:

When you deploy Azure Firewall or an NVA in a VWAN hub and enable routing intent, all traffic (internet and/or private) is automatically routed through the security appliance.

Routing Intent PolicyWhat It Does
Internet trafficAll VNet-to-internet traffic routes through the hub’s firewall
Private trafficAll VNet-to-VNet and VNet-to-branch traffic routes through the hub’s firewall
BothAll traffic goes through the firewall β€” zero-trust approach

πŸ”’ Aisha’s extension: If Sentinel Banking used VWAN, she’d enable routing intent for both internet and private traffic, forcing everything through Azure Firewall in each hub. No manual UDRs needed.

NVA in Hub

ℹ️ Network Virtual Appliances in VWAN Hubs

Standard VWAN supports deploying select NVAs directly in the hub:

Supported NVA types:

  • SD-WAN appliances: Barracuda, Cisco Viptela/Meraki, VMware SD-WAN β€” these replace the built-in S2S VPN gateway with the vendor’s SD-WAN gateway
  • Next-gen firewalls: Checkpoint, Fortinet β€” deployed alongside or instead of Azure Firewall for inspection

How it works:

  1. Deploy the NVA from Azure Marketplace into the VWAN hub
  2. Configure the NVA through its own management portal
  3. Configure routing to send traffic through the NVA

When to use:

  • Your organisation standardises on a specific SD-WAN vendor
  • Compliance requires a specific firewall vendor
  • You need features Azure Firewall doesn’t provide (vendor-specific inspection engines)

Limitation: NVA deployment is controlled by VWAN and the NVA partner β€” you don’t get full IaaS control like deploying an NVA in a regular VNet.

Key Takeaways

  • Basic VWAN: S2S VPN only. Standard: everything (P2S, ER, transit, firewall)
  • Inter-hub connectivity is automatic in Standard VWAN
  • Scale units determine gateway throughput β€” increase without downtime
  • Routing intent forces all traffic through the hub’s firewall automatically
  • NVAs can be deployed in the hub for SD-WAN or third-party firewalls

Test Your Knowledge

Question

What's the key difference between Basic and Standard Virtual WAN?

Click or press Enter to reveal answer

Answer

Basic only supports Site-to-Site VPN. Standard supports everything: P2S VPN, ExpressRoute, VNet-to-VNet transit, inter-hub connectivity, Azure Firewall in hub, NVAs, and routing intent.

Click to flip back

Question

How does inter-hub connectivity work in Virtual WAN?

Click or press Enter to reveal answer

Answer

It's automatic. When you deploy multiple hubs in a Standard VWAN, they connect over Microsoft's backbone without any manual peering configuration. Routes propagate between hubs automatically.

Click to flip back

Question

What does routing intent do in Virtual WAN?

Click or press Enter to reveal answer

Answer

Routing intent automatically routes all traffic (internet and/or private) through the hub's security appliance (Azure Firewall or NVA). Eliminates the need for manual UDRs and custom route tables.

Click to flip back

Question

Can you deploy third-party firewalls in a VWAN hub?

Click or press Enter to reveal answer

Answer

Yes, with Standard SKU. Select NVA partners (Checkpoint, Fortinet, Barracuda, Cisco) can deploy next-gen firewalls or SD-WAN appliances directly in the VWAN hub from Azure Marketplace.

Click to flip back


Knowledge Check

Elena needs P2S VPN, ExpressRoute, and inter-hub transit in her Virtual WAN. Which SKU must she use?

Knowledge Check

Aisha wants all VNet-to-VNet and VNet-to-internet traffic in her VWAN to go through Azure Firewall. What's the simplest approach?


Next up: Choosing Your Hybrid Connection β€” Compare all connectivity options and learn which to choose for each scenario.

← Previous

ExpressRoute: Advanced Features

Next β†’

Choosing Your Hybrid Connection

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.