Learn Live - Implement hybrid network infrastructure

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
foreign [Music] to another episode to another learn Life episode on learn TV my name is Thomas Maurer I'm here with Pierre Romo how you doing Thomas doing pretty well doing pretty well we are part of the Azure Cloud Advocates and we have the pleasure today to go one to go through one of the Microsoft learn modules today together with you uh with all our attendees so feel free to actually join our Microsoft learn module and it's going to be about hybrid networking infrastructure right Pierre yeah um when you're starting with uh Azure and you're thinking about hybrid networking you really think you really need to wrap your mind around you're basically extended the extending the capabilities of your own data center or your own uh environment so hybrid network is really really important to to know all the the basics and to know how to uh navigate that absolutely absolutely and who would we be if we would not have an awesome Microsoft learn module on Microsoft learn covering this um and this is where we actually invite you to join this um like live and you can actually open this up as well as watching us and talking about it so we have a QR code here we have a link in here uh you can actually go through that as well and even if you just want to watch us today you can learn later on go actually through that learn module uh as well um so Pierre shall we actually have a look at the learn module absolutely absolutely okay so let me perfect there we go perfect so we have the learn module here I opened it already up uh on Microsoft learn and if we actually go to the introduction part uh we want to quickly spend some time to actually uh explain um for whom this learn model is and why we would take this learn module so Pierre can you help me out here a little bit and talk a little bit about um why I would take this learn module well you want to be able to learn to take this learn module if you're not completely familiar with uh describing all of the uh parts of the Azure networking uh Solutions because there is there's multiple of them uh you want to know you want to go through this if you're wondering how you can connect your own environment or your users to your Azure environment using VPN technology uh you want to be able to uh to take this module if you're looking to create a VPN Gateway uh through using the portal or Powershell uh if you've got questions about Express routes we will go through this and explain what exactly express route is and how you it becomes um very useful for you uh and also if you have if you are in a distributed environment so if you've got multiple environments around the world and you don't want to spend the money to like basically lay your own fiber and how you can use the the Azure Wan uh to to help you uh connect all these different places and of course the culprable uh uh the thing that always breaks we it seems to on the internet uh DNS so how to find out how your DNS resolution can be set up so that all of your machines whether they're on-prem or in Cloud can resolve each other and the connectivity go on properly well no that's awesome again I think I'm very looking forward to the DNS part because I just had some like issues with that in my own network and happily was like actually to fix it so let's have a look um on what you're actually going to learn and I think Pierre covered it pretty well um on who is going to look at this especially if you are now coming from this on-premises world and you're going into the cloud World your organization is doing that and we know for a fact right that a lot of organizations are not going to be just Cloud only they're going to end up being in a hybrid State and that is going to be uh where they are and how they take advantage of it and Azure is doing actually a great job in that so if you look at the learning objectives here we're really going to go and have a look at a Azure Network topology so even if you're not familiar with the terms yet if you don't know what a v-net is or any like things like that we're going to dive in and describe these and gonna go through that as well and then as Pierre mentioned we're going to talk about how you actually Implement an Azure VPN connection because this is going to be something a lot of you gonna gonna um hit up there as well uh and then how like the actually there are different types of VPN gateways so we're gonna also have a look at that and then Pierre already said we're gonna have a look at what express route is we're going to look at what Azure virtual Wan is and we're gonna see how we're actually going to implement uh DNS resolution in a hybrid environment so we also like the learn module obviously gives us all some prerequisites right so you should be a little bit familiar with the on-premises world um we're gonna really cover a little bit about the Azure part of things um but you should really be uh familiar with uh some of the Windows Server stuff you were doing of the hybrid of networking on-prem and how automation works and how computer networks work in general right yeah and one skill that anybody who's been managing networks uh on Prem is absolutely crucial is the fact that yeah like you're you're at your IP addressing like your your your address space your subnet your subnet masks uh how you can have multiple areas and all connect together within the same address space uh these skills transfer very very well into the cloud so if you if you're a networking person and you take care of your network on-prem a half the battle is already one exactly so that that's a good point so they're definitely helpful but um don't think that it's actually the same right I've seen that with many many customers so they ended up of doing like what they had on-prem just doing the exact same thing in the cloud and that's probably not the smartest thing to do right you definitely can use your skills you already have but there is definitely some change how you should set up your environment as well well so you end up with two different uh environments with the exact same address space and then they won't route between the two of them so you have to extend that data center for yeah absolutely for example as well and also like obviously just the way we set up things is slightly different right we can do like a little bit more uh fancy things with software defined networking and stuff so let's try just dive in and again at the end we will have also a knowledge check for you so and for us as well to actually see um if we understood what what's going there so let's go into the introduction part uh this is basically the first unit of this learn module and it kind of like sets the stage a little bit on where we are and then we're just going to repeat a little bit um on what the what the learn module says and it's actually like exactly what Pierre and I just told you about it's actually making a scenario where um contoso well very well known Picture company in in Microsoft uh is actually in this on-premises world right you can see here it runs a couple of Windows Server uh 2012 or Two Hosts um and um basically they're running these stuff on on premises but they realize that they need to be more agile more flexibility and want to take advantage of the cloud and so the kind of like we are basically the lead engineers and and administrators and we're gonna actually have a look how we can actually take advantage of azure um to make our like our business more successful and one of the things obviously we need to set up and that is what we're going to look at this module is seeing how can we actually deploy stuff in Azure and have our on-prem world and how can they actually be connected to each other and talk to each other uh so that our apps can be distributed about different from different locations as well yeah I I will now I will suggest to our contoso management that we should really go to Windows Server 2022 uh because of all of the added hybrid capabilities that are built in but that's for another another episode absolutely absolutely um so let's dive in and we talk about I think this is one of the units we really want to talk about and spend some time with you here uh to describe the Azure Network topologies and a little bit explaining on what the different things we have here right uh I think this is very important to understand so we have all the base set up and we know about the different things we actually need to get to work uh as well so first up obviously the thing I want to we want to learn about is the virtual Network right what is a virtual Network and we also often refer to it as a v-net so this is where we actually have a basically a boundary of a private IP address space where we then also can create different um subnets within that v-net and automatically all these subnets within that v-net can actually talk to each other um in general and I'll just mention that they should not really overlap with your on-prem environment as well so that is actually what a subnet what a virtual network is and I want to quickly draw this actually to you uh on my white screen here um to actually see um how that could look like so from a from drawing perspective we have a v-net here so this is an Azure v-net and we can give this an address space so let's say this is 10.10.0.0 16. so this is basically going to be our virtual Network um our v-net with that address space you can have multiple address spaces within that you can also add them later to that v-net and I'm sure we can show you that a little bit how that actually then works in the portal but then you can within that v-net oops this I didn't want to take that color I actually want to switch you can have different subnets so I can then create a subnet let's say here I do 10.10 .1.0 whatever the drawing is not perfect here um this is the first Subnet and I can have an additional subnet here for example for 10 10.2.0 24 and you can imagine we can go on and create a lot of different subnets within that so we can like make sure that we have different boundaries and between different applications or different departments as well depending on how your setup works so that is actually a pretty cool thing to do right pure yes yes absolutely so we will we will talk about v-nets later on much much more uh but I think that is very important to understand um and you can obviously have multiple virtual networks actually one important other fact I want to add once one virtual Network can only be deployed in one Azure region so if your company is working with multiple Azure regions you're going to have at least uh where you deployed Azure VMS you're gonna have at least two virtual subnets right you have one in one region and another one in the other one and the other region and then we will also talk about how you can connect these as well in just a bit that's right so Pierre you want to talk a little bit about what a network interface is because um obviously our virtual machines need to be connected somehow um to that virtual Network right yes uh well normally when you're on Prem uh your machine comes with a physical neck and you once you it's it's created by default when you install the OS you just have to make sure that it assigns the right IP address but in a virtual world especially in Azure you have to define the the Nic or the v-neck um either while you're creating the VM or you can you can create them uh separately and then Associated them with the specific uh uh virtual machine so your v-net will have uh the same as a normal uh v-net in terms of IP address subnet mask and everything else but it's assigned to a uh virtual machine so it's separate so when you're when you're looking at your resources uh within your resource Group you'll see the virtual machine then and then you also see the storage for that virtual machine but you also see the separately the uh the Nick that's associated with that so you can create one or multiple Nicks or each VM and then associate them with a subnet so that they can communicate with other VMS in your environment oh okay that's pretty cool so again as you said like these are going to be actually objects in Azure as well so I can actually take these v-nets and then put it on one VM and also put it at another VM later on or move remove and add additional remix uh as well to to those interfaces and here's a screenshot by the way also in the learn module where exactly we see that that this is the virtual Network this is how it shows up in the Azure portal you can see here uh the address space a little bit different from what I had but it's 10.0.0.0.16 um and then on the bottom you can actually see the connected devices which are actually network interfaces right so you can see here okay this is what is connected and you can also see to which subnet within that virtual Network they're actually connected so that is that is basically how we can can manage this uh as well yeah so as long as as far as the the virtual network is concerned it never connects to a VM it connects to the Nic that's associated with the VM okay you have to be careful when not careful but you have to be conscious of that uh distinction when you're managing your environment yeah no that's awesome that's awesome perfect um and again also by the way in the meantime while we're on this um I really highly encourage you uh to basically ask your questions we will see uh what's going on in the chat and we will see if we can um answer a couple of your questions um in the chat itself so the next thing we actually want to talk about and I know Pierre that you obviously know a lot about network security group or nsgs as we also call them um and as the name says they probably make our Network more secure can we can you explain a little bit what NSG does and and how it works yes so an NSG is an object or a configuration that filters traffic within your within and uh in and out of your network it's not a firewall so that is not something it will not do a packet inspection it's is strictly a a source to destination over which Port over which protocol and whether or not you allow it or or deny it so I have a quick um let me see which one I have here well this is a um an example of a more involved network security group that you would typically have uh when you're just creating VMS um and in this case uh just like uh most firewalls you have a set of rules and those rules are uh interpreted from the lowest number to the highest number so that's why we started with a hundred in this one and then 101 and 500 and 501 and so on but it's where the name that we gave that particular rule the port that it's going to be um looking at uh and the protocol the source to the destination and whether I allow it the nice thing with this is that there are there are referenceable variables in there like the internet the source is the internet so we don't have to start or do the 0.0.0.0 that you would normally do in a firewall you just say if it's coming from the Internet it's outside of azure and it's going wherever you define it then you can either allow it or or um uh deny it there's also the virtual Network so if it's from within your virtual Network on any subnet any Nic any uh VMware any service to another virtual to the same virtual subnet to always allow it if it's coming from your load balancer so they are pre-configured um yeah exactly that you can do uh to uh to do that but I've been asked many times when we did ignite when we did Microsoft ignite the tour uh that if I had nsgs or network security group do I really need a firewall nsgs are not a firewall they're they're allowing you to segregate and control the traffic within your subnet but they are not a something that will do a packet inspection that is an Azure firewall which we will talk about a little bit later okay so basically it's as it's basically a very simple allow or deny and what I think is very important and you already mentioned that I can actually assign a um Network Security Group to a Nash to a virtual neck of an Azure VM or I can as you also mentioned I can also assign it on the subnet level which obviously is much much more like handy if you have um so you don't need to like micromanagement all the rules on uh one specific uh on each of the VMS for example so I think that is that is very important and as you can see here the Microsoft learn module also has some good graph graphs here available actually explaining this as well how actually the assignment for example also for a subnet can work but then also how you can actually have it um assigned to a specific uh virtual neck off of yam yeah and each Network Security Group can be as you mentioned assigned to a subnet or an ick but it can also be assigned to both so you have to be careful when you're doing your configuration because if you assign it to both then it'll be evaluated twice which can introduce latency so it's just proper design that if you decide to do uh nsgs to subnets or nsgs to Nick be careful that you're not duplicating efforts here okay now that makes sense so yeah it's always like with these rules you want to make sure that you actually not have too many layers of it actually a very clear where a setting is right not that you at one point decide to change one setting but it only changes on the subnet level and you still have one assigned to a virtual machine uh or two virtual network adapter off the virtual machine and then still does it doesn't work and no one finds out why right so no that's a great tool and by the way also nsgs usually if you just go to the portal and you create the VM there's always an NSG basically assigned to this by default right so if if you actually want to do this you need to actually basically go and change that in in settings as well and this is also important because you want to obviously in some cases you want to have the Management Port of a VM open from the public internet depending on what you're doing but in many cases you probably don't want to do that and you probably don't even want to assign a public IP address but in some cases you have so Pierre you also mentioned Azure firewall and so that for now is a firewall right that's right that's a layer three to layer seven um firewall so it does do an impact an inspection of the packets uh you can specify ports uh but it will still look at the packet more uh deeply uh at the network level not just at the application Level and allow or uh deny that configuration and it is very important when you're designing your environments with firewalls in mind you can not only inspect and control traffic uh in and out from the internet but also uh I used to I refer to it as like not only East-West but also north south so what's coming from on-prem to the cloud and what's going from the cloud to on-prem okay yeah absolutely I mean this this graphic shows it pretty pretty well one thing I also want to mention by the way is if you set this up and I think that's also part of learn module and we'll talk about that and just um the HFI also gets a static public IP address for v-net resources so what often is a problem if if you're for example a company um writings are workloads right and then you have different VMS running in Azure and they connect actually to the internet um they like come with a public IP address at one point as a source to something right and with the Azure fire were in place we can actually go and say hey this is the public IP address and all the VMS who are actually doing outbound traffic they go out with that IP address in in mind right yeah just just like on-prem it does not Network address translation and you can have uh full control of that and on top of that you can put load balancers in a front door and other services uh to manage traffic uh once it's outside or coming from the outside of your network as well but today we're just going to talk about firewalls I I think one thing we need to mention when we look at this graph by the way which is not really something we talk about but they see here that we have two like uh spoke networks or v-nets and then we have a centralized Hub where the Azure firewall is deployed and that is actually what we call a hub and spoke topology Network topology so if we go back to quickly on my whiteboard I just want to quickly like explain this to you why we would actually do that so again black we have for the v-nets so obviously we would create a v-net let's say this is we net one and we have some applications in that right and so we have some servers and and all the stuff in that v-net and we have for example also our on-premises environment and since I'm a very good drawer this is this is our on-prem environment um very beautiful here uh and usually we would actually then connect here and we will talk about vpns in just a bit but we would connect the VPN connection here now think about it we're not just having one v-net right we probably have multiple v-nets so we will have v-net two we will have v-net uh free so what would happen is that we would need to create multiples of these connections to our on-prem environment and that it actually can get very complex to actually manage that so one of the things we're doing and it's not just for the Azure firewall but also for other things is we actually connect it connect we call these these v-nets now one two and three those are the spokes right um so we create a hub v-net and what we do here is we do a v-net peering uh with these spoke networks um to this to the Hub Network look let's call that top and this one is spoke um and then we can just have the connection the VPN basically here yep uh to our on-prem Network and we can actually do the things in the spokes Network whatever we want uh we can actually control that nicely and manage that nicely but yeah it simplifies the whole network architecture a lot yeah and you mentioned uh peering uh because we haven't really covered that yet uh peering virtual Network appearing uh in Azure is a method uh where we can actually connect to two networks or two virtual networks that may be in the same region or multiple regions uh together without having to deploy uh virtual gateways in each of them so it's just a simplified way of connecting those virtual networks uh and and it allows you to do that Hub and spoke but you still have to figure out where are you going to put your firewall uh to control the traffic so if you were going to control the traffic uh in that situation you may want to have the the firewall in your Hub Network or in front of your Hub Network yeah I think this is a very important part by the way which um like just if you get started your organization sets up networking think about deploying a hub and spoke Network architecture right go and read about this I think this is going to be very crucial to how you do the setup of your environment um uh not necessarily depending on all the other things you're doing but um you will thank me later if you have that and we will talk about this uh a little bit later as well because there are other Technologies like the Azure virtual van which is also part of that learn module uh which can help us setting this up as well it's like peering on steroids exactly and that's a that's a nice way of putting it and then we already mentioned um that we somehow obviously need now to connect the cloud world together with the on-prem world right and this can be done using Azure VPN and then for that we're going to deploy a VPN Gateway uh we will talk about that in just a bit um but then there is also a other option um called express route right yes so express route or express route depending on which part of the world you live in um is really an mpls segment provided by a partner so a Telco that terminates in both the endpoints are both uh one in Azure in one of our data centers or one of our Edge uh endpoint and the other one is in your data center so it becomes a very secure very robust uh mpls segment that connects your environment to our environment uh encrypted and robust so for you to use yeah no that's awesome and again we're gonna have a look at that in also just a bit and it also I just want to say it's not just a VPN replacement there's also some cool stuff if you're using public uh services in Azure um or also in Office 365 for example uh as well and then last but not least uh we have virtual well not not even last there's something more but one of the last things we're going to talk about is the Azure virtual van which again we're going to talk about much much more later and I already mentioned that this is kind of or you mentioned it put it very nicely Pierre uh basically appearing on steroids right yeah so if you have uh well we talked about our spoke networks earlier or spoke v-nets uh you could have those uh around the world and have them either connected by appearing but you could also use the a virtual when to allow for not only your v-nets to talk to each other but your let's say you have a user that's in North America connecting connecting to a uh point to site VPN which we will cover uh in more detail a little later and then going through the uh Azure uh virtual wan to connect to the uh London office for example okay yeah leveraging the the the power of the Azure backbone for your benefits without having to pay multiple uh providers to give you that that same functionality yeah no awesome again this is this is like uh there covers a lot of different technology and then really if you get about series about it um you can really combine the the things we're going to talk about like expert VPN uh rooting Azure 50 and all that in the Azure Azure virtual van and then last thing like I want to talk about is the Azure subnet extension right we get a lot of questions from customer um like how can I use the same Subnet in Azure um and also on-prem right and yeah like for a long very long time we did not have an answer for that and usually we also don't recommend it to actually set that up for a long stable environment you actually should not have overlapping IP address spaces now I know that in some cases you probably during a migration process you actually need to have this in place right you probably cannot move everything and they're still dependencies on IP addresses or you don't have working DNS so uh then there it makes absolutely a lot of sense and we have something called the Azure subnet extension uh which we have here which allows you basically to extend um your on-premises subnet to the Azure one as well uh over an express route or VPN connection so while you're in for example a migration state or anything um you can actually do this uh to set this up yeah this is most useful when you have uh workloads where you cannot change the IP address but you you still need to be able to to connect that or migrate parts of it but it is as you mentioned a a stop Gap measure you should not be looking at Azure subnet extension for a long term as a solution it's basically to to allow you to give you the time that you need in order for you to do the rest of the migration of all these workloads and that way you can like reassign those IP address once they've been moved off of that on-prem subnet okay oh perfect so let's go into the next unit of this learn module uh which actually talk which actually writes about the Azure VPN options and there is a lot to cover here as well right um the VPN actually stands for virtual private Network and as we mentioned it allows us to connect over a private connect well not private but over the internet and an encrypted tunnel basically um to your in in this case to your Azure environment or from your on-prem to Yash environment the other way around um to actually make this secure you probably have used VPN for your company for a very long time to actually connect to your company or your company to connect to other places um so there are multiple options here and one thing is actually the VPN Gateway we actually need to deploy right yes so the vpl Gateway pretty much is it first of all it's the same virtual Gateway that you deploy uh for all of those uh Gateway design whether or not for site to site point to site multi-site or v-net to v-net and but v-net v-net as we mentioned a little earlier can be achieved with other Technologies such as Azure Wan or v-net peering but the VPN does give you uh encryption in between which the other just transfer the uh the the the packets back and forth yeah no I remember to win it was especially a thing when there was no v-net peering in the past which was pretty handy in that way to connect different subnets together but so we talked a little bit about that and you meant listed these so can you explain a little bit like what is a side-to-site VPN connection what does that mean so site to site is a uh a tunnel over the Internet uh that is basically terminated uh one in the uh virtual Network Gateway that you've created that you create inside of your v-net your virtual Network and the other one at your uh on-prem on-prem so for example I personally hear it's not on right now but I do have a VPN site to site from my home office to my test subscription a couple of things that you actually require is uh you actually require a uh static IP you can't it Dynamic IP will only work until the IP changes so depending on your internet provider that may be often or never uh but it is encrypted using ipsec to support your cross premises and hybrid configuration so once this is on and your DNS is set up properly uh you can from any machine on-prem if uh if you're not filtering that traffic you can connect uh to any of those machines on the other side of the tunnel so it makes it instead of having everybody doing a point to site to uh from uh your branch offices to your um Azure virtual Network through your resources that are there you set up one site to site VPN and everybody tunnels through it okay so that is actually what like what we could have look at here like the 10.0.0.0.24 um connecting through that tunnel and speaking like or talking to machines in uh 10.10.0.0.60 16 um over the Internet basically but in that encrypted uh tunnel and you were speaking about if you look at their uh we have a VPN uh whip on the Azure Gateway site where it says on the right side where it says VPN Gateway that is actually the one deployed in Azure it's like one three one dot 1.1.1 there's a public IP address and then you also mentioned the other static IP address we need uh on your site on the on-premises side basically uh which is here the 33.2.1.5 um so again just to to highlight that in the graphic as well and a multi-site the next the next item is the multi-site uh which is exactly the same uh except that you have Branch one and Branch two uh so or in the in this graphic your HQ and your on-prem local site number two uh connecting over separate tunnel to the same uh VPN Gateway endpoint uh in your in Azure so it's exactly the same as just one more connection so the setup the setup is the same the configuration is the same you just create a separate connection and I forgot this Dimension earlier uh that the one of the nice things with that is that you control the keys so the case for the encryption are yours so you can set up your own key so you can manage how you um change those keys on a regular basis or whatever your compliance requirements are in terms of Key Management okay that's good and we also know when we talk about VPN gateways you can only have one VPN Gateway uh per virtual Network and we have different sizes of VPN gateways uh well that statement is not 100 true because we can have two if it's h a right we can set it up high available but you basically get one VPN gate where you can actually use and then we have different sizes uh there um depending on how much bandwidth you for example need right yeah bandwidth and latency will play a role so you have to make sure that you escape size them properly however this being a pay as you go or a paid Service uh you can update your size so if you realize that at one point you were you did not pick a SKU that was large enough to support your your environment then you can actually upsize it and and take advantage of that perfect and then last but not least the point to side VPN and that is actually a pretty uh easy thing for to set up um and it basically allows you to like deploy a VPN client on Machines of people so like for example here on my windows 11 machine I have a VPN client set up uh and I'm connected to my virtual Network or to the VPN Gateway um or the Azure VPN Gateway in Azure and then it creates this point to site uh SSB tunnel for example um we open up we all also support openssl as well but in Windows world we use sstp uh for that also very often um so uh then it allows me to like wherever I am like I'm like for example not working from home I don't need to have a Gateway with a static IP address or anything I just start my VPN client and I can connect to the network into the network too that's right so in the in the good old days before the age of the human malware when we would work from airports and Starbucks and hotels uh we could securely connect to our resources in Azure using the point to sites yeah no I have I also have a couple of customers who set this up for example as kind of like a disaster recovery space if they think about for example they have their uh headquarter and the headquarter goes down for some reason that the employees at least could connect still to the Azure Resources with some notebooks from working from home or at other places so they can quickly go back to work in case of a disaster right which is depending on the company it's very very important as well and if you don't have multiple sites in place as well and then you mentioned we meant to be net which actually allows us to connect like different uh virtual networks together using these gateways so if you have two virtual networks in Azure you can connect them using the v-net Gateway again I would still say that the probably other options like for example um to use v-net peering which is today probably in many cases the the better approach uh to do and the more efficient approach especially uh but still you could do v-net uh gateways um uh as well yeah and then last but not least so this is this is like important and now you know that there's a lot of customers are interested in this so we now actually could actually start working right uh but we also have something called express route and you were very nicely describing that uh just before that a little bit sorry say I was reading the comments in the in the chat we are very interactive here so again just quick reminder ask your questions in the chat we will try to answer all of these um as well uh we were just talking about that okay so we we actually could use VPN we could use side to side VPN um for example to connect our on-premises environment to the Azure uh world but um there are obviously some constraints right sometimes I have troubles with like latency or like a VPN it's still encrypted but it still goes over the public um internet right it's still a connectors goes over the public internet uh again there's some latency and some bandwidth concerns with that as well so with express route Pierre we can actually address these yeah we can address these because you uh this is a dedicated uh mpls segment as I mentioned uh from your network to our network uh that is completely encrypted that is very robust uh and it's provided by your uh Telco or the the express route partner in your region so different different countries will have different partners uh but also the partner actually has to have redundancy in their connection uh Hardware so the all of the network that manages that connection uh is redundant and and built on high availability with a high availability model it's more expensive uh but in some cases like I know I've had some customers in the past whereby compliance uh requirements because they were a financial or Healthcare or whatnot uh needed they couldn't we're not allowed to go over public internet even in an encrypted tunnel so express route uh fit that bill yeah no it's absolutely true and it still uses that the VPN Gateway obviously to set this up as well um uh and again I there's many reasons as you just spent compliance is one but then there's also for example latency and also like like traffic wise right we have different offerings there um where like outgoing traffic for example to the on-prem world is usually with a cost there's also some like express route setups I think which will cover that as well in the pricing part so um like for a lot of companies are doing serious work with Azure um they're definitely going to have a look at the um express route option and you can still have both in place right so for example what I see customers here and it's very sure nicely shown in this graphic we have actually express route in place um this setup but then they have for example also VPN connections uh for other locations or as a fallback for example for a failover scenario where for example at one point even though it's a redundant connection and it should nothing happen right there can always be something so they could actually set up a additional European Gateway as kind of like a fallback as well yeah absolutely so you are definitely the expert to talk about when it comes to implementing VPN gateways so I know that this is something a lot of people get confused by there there's a selection you can do by policy based or route-based configurations right okay my rule of thumb avoid policy base as much as you can uh go with a route base uh policy base means that you have to define a static IP it's basically based on the static IP mapping so if you something changes in your infrastructure you'll have to update that that mapping uh in your policy to say from this to this now allow through the firewall and create that connection route base uh is kind of like the default and it uh it's a lot simpler to use and manage and deploy uh and it's uh I I think at some point um it is basically the preferred way of doing it so uh route base is uh or if you're on Prem and oh there's a note right there so if you create a new subnet then your v-net then you have to go and update your um Gateway and updating a Gateway is in some cases is not as easy as changing and finger configuration in some cases you almost have to uh tear it down and recreate it so you have to be careful and know ahead of time uh if you're picking policy base why you want to do this yeah and so there's also many constraints obviously if you take body base you could for example not do like work like connectors between virtual networks you cannot do the point to site uh connection you cannot do multi-side connections uh or co-existent with access route so you actually for these you need to have the root based VPN connection in place right yeah absolutely so then the module goes actually into a little bit of how this actually works and I know you probably have a demo for us to show instead of us going through this because again every one of you you can actually go out and read this as well um is it already time for the demo yeah let's let's run the video uh and I for everybody uh this is a recorded video and it's also linked in the um in the learning path I created that a little while ago and it's because creating the virtual uh the the VPN Gateway can take up to 25 30 minutes uh so it's really hard to demo in when we're looking at an hour an hour and 15 minute kind of session uh because it would take really half the time so let's run this video so basically when to create this you need to uh be able to create the virtual Network ahead of time I'm trying to make sure that it's running yeah so now we create the virtual network uh we pick a resource Group so we'll give it a name so contoso Resource Group and I want to give an a name to my virtual Network and if you're connect creating a virtual Network without the Gateway that's exactly the same thing so you give it an address space so I'm going to take the default I'm actually going to remove right now the subnets and I'm going to create my own uh when you are looking at creating a VPN Gateway one of the things that you will require is that uh you're gonna need a subnet specifically called Gateway subnet and the videos have been taken a little time so let's go forward and once you have your virtual Network created did it jump ahead no it's creating it's creating it now so diversal is upnet is actually Iota virtual network is actually very fast to create like this is all software defined it's the Gateway which take a longer uh time as well that's right so once the the subnet is create the the virtual machine no virtual Network and subnets are created now we have to create the virtual Network Gateway now you give it a name uh region is typically exactly the same place at this point you do have the options to do a VPN or to use your express route link if you have one then you select your type which is Route base or policy base in this case we're going to pick route base we give them a name and a skew and the SKU as I mentioned before is uh the different skus will have different capabilities in terms of throughputs and uh latency okay now we give it a subnet IP address range then create and public IP address as we mentioned we need a static IP address uh then if the active active mode is as you mentioned earlier if you're deploying multiple gateways in an aha configuration and that's it then you hit the create button and it goes away and then it starts creating that uh the VPN Gateway and this will take um 25 to 30 minutes as I mentioned in this particular video I sped up the video considerably uh to make sure that it would actually finish on time for us to go through it properly so now that it's uh finished creating so imagine that we've been waiting and staring at the screen for 30 minutes you can go into that virtual Network and in your virtual Network you will see that we now have a VPN Gateway with all of the proper configuration and the proper IP address which you're going to need once you uh set up your client and so your whether it's a point to site or site to site the other end of the um virtual tunnel you're going to need that IP address but you have to create that first so through the portal very easy you can also create it uh using Azure CLI if you're a Powershell user you can configure it with a Powershell it takes about the same time to deploy but it's a little quicker to uh uh actually because you have a script so if you're running the same uh virtual Network Gateway in multiple v-nets you can run that script and then run it again and then run it again everything you can do in Azure you can do in multiple different ways perfect no thank you and again this is also very interesting especially also you could use um arm templates or bicep obviously as well because it's all Arm based right if you want to watch the video again it's also part of the learning module um so you can actually on this unit 4 is actually going through uh exactly that video and you even have some nice commentary of peer uh going through that so you're gonna listen to that again you can do that that one's a little bit more scripted though that's nice um yeah so let's talk a little bit about the express route stuff and we talked a lot already like what it is um but what you actually um like let's let's repeat quickly like what it is and why we would actually do that um but again um it all comes down to have that private fast uh connection which doesn't go over the public um uh connectivity right and then we have a couple of actually implementation options right there's no not just a one-to-one option or like it's not just one thing it actually can't cover multiple things here yeah so your uh your express route um basically it becomes the connection between your environment and if you go down a little bit through the graphic it's easier to uh when we talk about the graphic to explain it uh you have your environment so the the bottom part uh on the right side of your screen the blue uh virtual Network that's the that's your is that's your uh virtual Network that you have whether or not you've got a ton of peered Network in there or just the one doesn't matter uh uh all of these will go through the Microsoft Edge then connect through the uh connections either primary or secondary connection to the partner's Edge and the partners like for us in Canada would be uh one of the telcos and then they provide the last mile to connect to your own environment so it's encrypted from your environment all the way to our environment very secure very robust now we are in the middle you can see that that says express route circuit so once you define you have your your you've talked to your partner they've established the the express route tunnel then on your uh in your Azure environment you have to create the express route gateway then it's connected to it and then you have to create your circuits and your circuits is basically what routes the um it's not so much the traffic but the the type of application or the type of traffic that it goes so if you're going from a virtual machine in Azure to a either a physical or virtual machine on-prem it would use the secondary in this particular case it would use the secondary uh connection actually it's both connections but yeah or what they call them is um the circuits there's two circuits there's one that is a Microsoft peering circuit and then the other one that is a private peering circuit yeah so we have the private peering which actually is kind of like a replacement for the VPN right it's actually absolutely it's kind of like again we can use it with both but it's actually helping us to have like these private address space so only like virtual machines running in Azure and on-prem you can communicate over this as you probably used to from using a VPN but then the other cool thing is now we have this express route in place right we're using this private connection we set up these different connections by the way this this private uh when we see therapy circuits we have two connections this is done for redundancy reasons um but then you can see here the red line which is actually the Microsoft peering so what that allows us to do is actually when we like have these public IP addresses of Office 365 Dynamics 365 or even for Azure Public Services um we can actually still Leverage that private connectivity that that we have with express route so we can still get the benefits of the latency of having that private connection even though those are using public IP addresses um we can still use that actually doing a peering uh with Microsoft and again this is also a lot of benefit we see like a lot of Microsoft 365 or Office 365 customers are actually using this um uh as well so their Workforce connecting from uh on premises environments can leverage that as well yeah because I'll give you an example is uh one of my colleagues who looks after a bank in Canada here in Canada it's one of their requirements that uh they uh they deny a split tunneling so everything has to go through uh their express route so if they have their Office 365 or any other SAS so uh Dynamics 365 or other public services that we have on in Azure it all goes through the express routes but just over a different circuit or a different peering uh circuit yeah yeah perfect uh I see that also by the way it's not necessarily related to um uh what we're just talking about but I see where the question um from uh YouTube I think uh James is asking um uh coming from AWS is there a way we can actually set up Windows server and SSH using terraform so I guess he wants to like to set up a virtual machine in Azure running Windows server and then set up ssh in that and the answer is simply yes you can absolutely uh do that um you can use terraform to deploy the VM and then also to do some stuff on Windows Server as well however I will uh play uh not Devil's Advocate but I will say considering that we're today we're talking about hybrid networking in Azure uh when you're connecting to those machines uh you have to create the virtual network uh ahead of time you can't just have a machine without a virtual network uh once it's on a virtual Network if you want to SSH into that machine you have two uh two options one you can give that machine a public IP address which can be dangerous because now it's exposed to the internet or you can use a feature in Azure networking which what we call Asian Bastion host where you connect to the portal you select that that resource and then it opens basically a SSH or a RDP connection to that server through a browser so there's no actual uh end-to-end connection to that server it's a lot more secure and you don't have to expose your servers to the internet yeah it's 70 but it's kind of like a jump post as a service a secure version of a tempos as a service uh which like if you if you were into that look at that Sebastian so let's go a little bit forward again in the um uh in the learn module again we still have again explaining the different options we have and we just want to highlight these again uh there's also obviously side to side VPN uh again which we can leverage or then point to site VPN which is actually pretty easy to to set it to set it up uh but then there's also obvious scenarios um if we look at this uh why we would actually use um uh express route and we talked a lot about the benefits already if you look at here uh it's actually like a layer free connection uh it has built-in redundancy um together with your express route provider as well and then um you can use it as connection to the Azure services but then also uh um actually um like for the Public Services as well as kind of like a VPN replacement with the private appearing as well and then one cool thing by the way we should mention here is also the Azure Global the express route Global reach and that allows us um to connect different on-premises environments over Azure right this is actually allows us to connect these things together yeah and that's basically leveraging the the Azure one so you're connecting your Express routes within whatever geography or your branch offices are and then you connect them together using the Azure Wan so your traffic is always secure it's always on uh never goes over public internet excuse me and it's always uh well managed and redundant so this is pretty cool by the way just to also mentioned that um if you have multiple Company locations and they all need to be connected somehow so together right together with Azure maybe maybe not even together with Azure but maybe you just need to be connected between each other you can actually leverage the Microsoft backbone or the Microsoft network uh doing that so you can like have it very easy entry and we're going to show that when it comes to Azure virtual one uh as well so there are some prerequisites we obviously need to uh verify when you set up a express route circuit you obviously need to have an Azure subscription and a connectivity partner uh to do that um and then if you obviously you want to use it with Office 365 you also need to have and obviously a free 65 connection and then from the networking side I was a b2p is required for these scenarios as well and you need to set up the necessary IP addresses for that specific setup yep and the rest of this uh the rest of this unit uh within the learning module I basically just walks you through all of the steps that we talked about so how do you create your your once it's your configured the express routes how do you create your circuits and how do you uh which uh type of peering configuration you want to put and we've already talked about both of those so the rest of this unit is basically walking you through this and showing you what it would look like because we can't simulate this in a sandbox for you to try it because we need to have a partner to actually lay some cable for you yeah even though I have a 10 gig connection at home unfortunately I can't show you this life and I just want a little bit flex a little bit here with my internet speed so yeah yeah yeah yeah yeah we hear it everywhere about the 10 gigs So speaking of 10 gig um let's have a look at Azure virtual van we really like are really psyched about it uh as as we talked about it as we could hear us from the beginning I think the first thing we want to really talk about is this and it really brings down a lot of different things together and makes our life especially in this hybrid scenarios obviously uh way easier right yes so we can do a couple of things here we can obviously make this like again like a result virtual uh when um we have a couple of functionalities we we can actually support so we can actually have Branch connectivity side to side VPN connectivity point to sight VPN connectee for remote users we can have express route connections we can have inter-cloud connectivity um between for example uh v-nets as well uh VPN express route into connectivity uh between those locations um routing Azure firewall encryption for private connectivity so there's a bunch of awesome stuff uh we can actually bring together uh with the Azure virtual van architecture and I think this year covers it pretty well so here we have like if you look at at the top part the top part is all virtual networks or v-nets uh in Azure right so these are all like think about this kind of like the spoke uh networks we have there and then in the middle you see the virtual Wan which is basically our Hub where everything comes together and then on the bottom of the screen now you can actually see the different uh possibilities we have there to different locations so for example like our HQ our headquarter or the contoso headquarter is actually connected using Express because they have a ton of different people there they need to have a low latency that they have a good experience they need a lot of bandwidth there as well and then we have for example certain bandwidth um uh Branch offices where we actually can connect using VPN devices now the cool thing is also this onboarding like if you have a lot of these Branch offices also this onboarding process can be automated right so you can then bring them and they like as soon as you plug them in basically they connect up to the virtual van uh as well and then we also have so many remote users which I already mentioned by using a point to site VPN um and they can also work together and now we're coming all together to this virtual van uh Hub as I called um we can actually now connect through all of the different things together right we can also leverage now now for example like you can connect from one branch office to the other branch office using that virtual uh when connection uh obviously we can also secure that and make sure that some connections are not possible we can set this all up in the way we want it well you can you can I I just unmuted myself a second ago with somebody rang the doorbell upstairs and all of the dogs in the house went nuts so if I went silent yeah you know why the beauty of working from home connected to our resources through uh hybrid Services anyway uh as you were mentioning the the connecting all of this if they're using express route to VPN uh point to side VPN it's great but as we mentioned at the beginning using NSG and using firewall you have to be uh conscious of how you're going to manage the traffic going across uh between your subnets between on-prem and the cloud and between the internet and all of that because at this point if you've implemented it the way uh Thomas was just showing it you can actually have you basically have one point of entry and then everything is interconnected so you got to make sure that your firewalls are set up and your network security group are also set up now but again this is pretty awesome um and then obviously we have different types there obviously as we have different tiers or different types as we call them so we have the basic and the standard tier available so if you for example just want to start and you only use a side to side VPN uh the basic tier should have you covered and then if you want to use more of it we have the standard tier which and also includes other available configurations such as Express root or point to side or v-net Arena through the virtual uh Hub and you heard me mention a couple of different things here um so here we have a description of all the components um which are actually uh used in that so we have the virtual when which is actually the virtual map of your Azure network with the multiple resources linked together within the virtual Hub and the virtual Hub is actually where um we have these things coming together where we have the service endpoint uh connectivity and I'm the Hub virtual Network um uses the Hub v-net connection connect to the hub to your v-net right so that is that is how you set this up and you can also this is by the way in preview a hub to HUB connection so if you have multiple hubs you can interconnect them using virtual van uh you have a hub root table and that is what also enables us to basically say what is rooted where um when it comes to that uh configuration and then you have sites which sites represent actually the the different sites you have so for example if you have on-prem VPN devices you can actually like they are basically named as different sites there so you can easily manage them as well okay so by having that actually the learn module goes now through how you would set this up so first what you need to do is actually set up uh the virtual van then create a hub and then create a site again which probably refer like which not probably but refers to the on-premises locations and then you go actually and connect that site to the hub right uh and then um that is actually then variously linked together and so then you would go out and actually connect the VPN um from that side to the hub then we can connect a v-net to the same Hub and then we basically just go download the configuration file and and go through that and the learn module here really goes through uh this configuration how to set up the virtual when it's actually pretty simple from a deployment perspective right when you actually like the setup in in general is super easy to do but what you need to actually do is actually have some planning obviously you want to know what you want to connect together um what restriction you want to build in um what what should be able to talk to each other what should not be able to talk to each other so that is more a planning effort than actually like going through the portal and deploying this and again as Pierre will point out to me in just a bit I can also use the CLI I can use Powershell I can use bicep I can use Arm templates to deploy this and automate that process and by the way we also have reference architectures for this so if there's a lot of things you now need to think of check out the cloud adoption framework there we have reference architectures with Azure Landing zones to go through this so I highly recommend uh that you check this out so I will not bore you by just going through all this um again to create all these connections and what you should do let's talk about uh DNS in our hybrid environment DNS the the all-famous DNS um DNS is very important as you know uh mostly because in a lot of cases it is a very big uh point of failure um and point of attack as well so you really have to start looking at how you're creating it or how you're configuring it so that all of your machines all of your services whether they're on-prem or in Cloud can actually effectively connect and be able to find each other okay yeah I think there's no this is this by the way also important like if you don't want to end up where you have scenarios where you need to extend to network right like like where you actually communicate like where we've hard-coded IP addresses and stuff like that and unfortunately there are still some applications or some configurations out there which have these these stuff in place so you definitely want to make sure that you have DNS in place and DNS by the way for for those who are listening and we're probably new to that it stands for domain name service um and this actually does like kind of like translation of IP address to name right so that for those who haven't really worked with that before so Pierre how do we actually set this up and how do we make sure that we can for example Leverage The Azure DNS um in our on-prem environment or in our hybrid environment I should say okay so there are multiple ways of of addressing this particular problem uh number one is if you're only deploying within a single subnet or a single v-net and you're not really concerned about connecting to your on-prem environment uh anything within a uh virtual network will automatically use a built-in DNS service so when your machine boots and connects to the virtual Network it gets an IP address even though in uh in Azure you have the the option of avastatic or Pub or or um Dynamic address they're all dynamic the only difference is when you select static it creates a reservation and the reservation time is the mathematical equivalent to the largest hexadecimal they could fit in that field and I believe it translates to something like 136 years give or take a few months uh so all everything is always uh dynamic but when you have all your machines within your your subnet or your virtual network uh they will use the built-in DNS to resolve each other the problem comes when you have multiple subnets or multiple v-nets that need to resolve uh or if you have on-prem that need to resolve machines in the cloud and machines in the cloud needing to resolve machines on-prem at that point you have other options uh one of the ones that has been used a lot uh for a long time is um sticking a uh domain controller with active directory uh DNS Zone integrated DNS Zone uh into your virtual Network and then configuring your virtual network to use that DNS instead of the built-in DNS in your virtual environment now there are other ways of doing that where you can actually set up the internal DNS as a resolver to your original DNS so that it will look at your standard DNS server like in your uh Graphics here where from a client the DNS query will go to the DNS server and then we'll forward that to the DNS in uh other v-nets so this is this is a a bit more modern than the drop ADC into it but you can do it either way or in my case uh let me show you uh one of my machines here uh I actually delegate my own domain to an Azure Zone and I manage it in here so I have went to my registrar and I say okay so I've been provided the uh the the name servers uh in my uh domain registration and now I'm managing all of my record sets and child zones within Azure itself so you can have a almost like a um a combination of different technologies that will serve different purposes it all depends on what your uh original or your your end goal is uh if you're going to reserve how you're going to do your your resolving if you're going to have everything in one zone or are you going to have uh zones and child zones and resolvers uh that's all possible within uh our uh DNS environment so all right the difference that the problem is is that when you're looking at limitations and consideration when you're looking at Azure DNS uh you can only link to a specific VM to one DNS zone so you can't have multiple uh Nicks uh looking at multiple zones and that graph actually shows it really well where if you've set up your forwarders properly uh then you don't have to because it will then uh take a bit of time uh then because the the first DNS will have to get to the second uh Zone and then get the authoritative answer for you in Azure we don't really uh provide a recursive DNS service uh we have an authoritative DNS service um so you can't just have uh you can't just create a resolver service so when I've created my wiredconnect.com DNS Zone it is authoritative okay okay note about that is pretty cool again so we get kind of like uh DNS as a service if you will um where we don't need to manage necessarily all the DNS um servers if we don't have them but as you as you also pointed out it's still absolutely okay also to bring your Azure active directory um uh sorry your active directory um domain controllers to run them in Azure as well to have like this set up as well in some cases right but then you have this little bit more modern approach where you can use Azure DNS to do design resolving as well that's right okay so let's move on the next part is actually doing the knowledge check so what we're going to do here is I we have prepared a couple of questions and you're also very welcome to also participate in these um questions so I will go through the question and Pierre if you want to go through the answers then um we can we can do that like this so an administrator at contoso wants to be able to communicate able Communications between a number of azure VMS he is planning to create and deploy which of the following solution represents the simplest way for these VMS to be able to communicate with one another so a the administrator should connect the network interfaces of each VM to the same v-net B the administrator should connect the network into faces of each VM to different v-nets and see the administrator must configure a subnet extension to enable communication between the VMS so in this question I really think like this is like kind of like a tricky one in the words like it tries to basically make you think too far um and so uh be careful here what your choice is again we give your a little bit of time here but I think I mentioned this or you mentioned it it depends I think we both mentioned it how that actually works when you deploy a v-net and you have different for example subnets Within These v-nets by default um they can actually talk to each other and with that I already gave the answer for that specific question um and it's a Well if we want to be nitpicky with that is uh answer B the administrator should connect the ver the network interfaces to each VM to different v-nets but if these v-nets are appeared then it will still connect correct correct absolutely if they're appeared but um in the easiest way we'll go with with that the easiest way absolutely I'm always fan of the easiest way so let's go to the next one and this is an administrator wants to deploy an Azure VPN but is uncertain of the type required she wants to enable Communications from users back to Azure resources what type of VPN should she implement so again I feel this is a very tricky one so what are your options here well there's a the options are you should Implement a site-to-site VPN solution you uh she should Implement a point to site VPN solution or she should Implement a multi-site VPN solution so there's a key word in your question that needs to be uh highlighted to answer get the answer yeah absolutely absolutely I mean and you could argue that like in theory I think you could basically Implement all of them um in theory but the simplest solution would be the simplest solution would be that's correct so we are talking here especially because there's the word from users back to Azure So in theory if you users are all on the same place where in your like headquarter you could also obviously set up a side to side VPN and then connect correct but the easiest solution especially if you're uncertain and you only want to have a couple of users connecting to Azure resources then point to site can be the answer for that yes uh also promise you I'm not a big fan of that question I just need to point that out so um this one is also by the way tricky for especially people who are new because we talked a lot about different peerings uh in this in this talk and this one is very I want to I do the question again this time it's pretty easy what is Microsoft peering and I really I really want to say it again Microsoft peering not v-net peering not subnet peering Microsoft peering so a question a or answer a it provides a direct connection from your on-premises network to an Azure Data Center B it enables you to connect your on-premises network to Microsoft 365 services and dynamic 365 or C it provides a connection between your on-premises network and an express route provider and the answer would be so I give some couple of seconds here for the people to like also answer the question on learn TV um but obviously a Microsoft peering allows you to actually connect your on-premises network to Microsoft 365 services and dynamic 365 as well we should also include Azure Services as well because some of the public Azure Services would be also addressed by using that Microsoft period yes so all of the majority of our SAS offerings exactly exactly everything which is not like necessarily with is VMS or where you have private IP addresses in place where we actually connect to SAS offerings um uh with public ADP addresses you can leverage that and again there's some really good benefits of doing that especially when it comes to latency bandwidth and all that good stuff and as you also pointed out I think you said like compliance and regulations uh regulatory requirements as well right they can be yes so uh let's go into the summary quickly and actually see what we talked about today so we went through actually and talked a little bit about the Azure networking topologies right so from different um talked about the different pieces we talked about v-net subnets VPN gateways express route and so on so we had a lot of different uh explanations there and how they work together I want to one stress one thing enough again as Pia mentioned your skills which you have from on-prem absolute valid they can still be used in the cloud however it's a rethinking of how to do things right don't just take do the exact same way as you do it in the in in your on-premises environment uh rethink how you actually um would do it in the cloud world right and then we have implement we talked about implementing Azure VPN um how you can actually connect that virtual private Network we talked about and Pierre very nicely explained when to use or how to use a root based VPN Gateway in the Azure portal again if you want to watch the video it's in the learn module as well we talked how to implement and why you would actually Implement Azure express route uh we talked about implementing Azure virtual when and how that that works and what the benefits are of that and then last but not least part of the line module we actually implemented DNS resolution in a hybrid environment perfect anything to add here do we did I forget something no we actually we covered pretty much everything that we set out to cover uh of course uh you are more than welcome to run through this and even just bookmark that one if you uh at some point have different or you're thinking about something because there's a lot of information at the bottom of each unit where to learn more and it will take you straight to the documentation absolutely and then I also quickly want to highlight don't miss the next one um on December 2nd uh it's about implementing a hybrid file server infrastructure um and so you will learn how you can actually like use that and deploy hybrid file servers in your environment and so very interesting one I'm pretty sure I'm gonna watch that one um it's going to be again live on learn TV um and on YouTube and on YouTube and on twitched and on Twitter on all the socials so with that I also want to quickly say thank you for everyone watching uh we're quickly going to have a look at uh if there are any questions so this is basically your last chance to get your questions in uh if you don't if we don't have any questions um uh in that in that space or you don't have enough time to actually ask your question please feel free to follow up with us uh on social media uh ping us there uh Pierre and I and many others are happy to actually help there um so really thank you for everyone joining here today yeah we have our little uh Twitter handles here DMS are open if you have questions we are not troubleshooting people though but we will help you with uh the vision and what you're trying to plan to absolutely and with that I want to say thank you to the Microsoft learn TV team as well as to you Pierre it was a pleasure to work to you with you uh tonight for me uh I think morning or afternoon for you so late afternoon yeah absolutely fun and thank you again for everyone joining I hope we see you in another one as well cheers [Music] thank you
Info
Channel: Microsoft Developer
Views: 11,170
Rating: undefined out of 5
Keywords: windows server, hybrid, azure, Azure ExpressRoute
Id: OyCEKKjCRKk
Channel Id: undefined
Length: 82min 54sec (4974 seconds)
Published: Tue Nov 30 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.