Skip to main content

Command Palette

Search for a command to run...

AZ - 700 Lab 1

Updated
10 min read
A

I’m Amir Rouhanipoor, an IT Consultant specializing in Azure and cloud solutions. I help organizations streamline their IT and drive growth through secure, efficient cloud technologies.

S

Security-focused Cloud & Automation Engineer with a Master’s in Computer Science and 6+ years of experience automating and supporting enterprise IT environments across multi-site corporate and operational infrastructures. Proficient in Python scripting, Azure infrastructure, Windows Server, and identity management. Skilled in integrating third-party platforms, securing configurations, and streamlining operations. Currently pursuing the Cybersecurity Architect Expert certification with a strong focus on cloud security and automation.

You need to create three virtual networks:

1. CoreServicesVnet

  • Region: East US

  • Purpose: Main network (web services, databases, shared services like DC/DNS).

  • Connectivity: Needs VPN connection to on-premises.

  • Address Space: Large (because of expected growth).

  • Address Space: 10.20.0.0/16

  • Subnets:

    • GatewaySubnet → 10.20.0.0/27

    • SharedServicesSubnet → 10.20.10.0/24

    • DatabaseSubnet → 10.20.20.0/24

    • PublicWebServiceSubnet → 10.20.30.0/24

2. ManufacturingVnet

  • Region: West Europe

  • Purpose: Manufacturing operations, lots of connected devices (IoT).

  • Connectivity: No mention of VPN, but must support many devices.

  • Address Space: Medium to Large, scalable.

  • Address Space: 10.30.0.0/16

  • Subnets:

    • ManufacturingSystemSubnet → 10.30.10.0/24

    • SensorSubnet1 → 10.30.20.0/24

    • SensorSubnet2 → 10.30.21.0/24

    • SensorSubnet3 → 10.30.22.0/24

3. ResearchVnet

  • Region: Southeast Asia

  • Purpose: Research & Development (small, stable).

  • Connectivity: No VPN mentioned.

  • Address Space: Small

  • Address Space: 10.40.0.0/16

  • Subnet:

    • ResearchSystemSubnet → 10.40.0.0/24

Click on the image above for more info

You will create the following resources:

Virtual NetworkRegionAddress SpaceSubnets
CoreServicesVnetEast US10.20.0.0/16GatewaySubnet (10.20.0.0/27), SharedServicesSubnet (10.20.10.0/24), DatabaseSubnet (10.20.20.0/24), PublicWebServiceSubnet (10.20.30.0/24)
ManufacturingVnetWest Europe10.30.0.0/16ManufacturingSystemSubnet (10.30.10.0/24), SensorSubnet1 (10.30.20.0/24), SensorSubnet2 (10.30.21.0/24), SensorSubnet3 (10.30.22.0/24)
ResearchVnetSoutheast Asia10.40.0.0/16ResearchSystemSubnet (10.40.0.0/24)

These virtual networks and subnets are designed to support current resources and future growth.

In this exercise, you will:

  • Task 1: Create the Contoso resource group.

  • Task 2: Create CoreServicesVnet and its subnets.

  • Task 3: Create ManufacturingVnet and its subnets.

  • Task 4: Create ResearchVnet and its subnet.

  • Task 5: Verify the VNets and Subnets are created.

Lab Instructions: Create Resource Group, Virtual Networks, and Subnets

Task 1: Create the Contoso Resource Group

  1. Go to the Azure portal.

  2. On the home page, under Azure services, select Resource groups.

  3. Select + Create.

  4. Configure as follows:

    • Resource group: ContosoResourceGroup

    • Region: (US) East US

    • Tags: No changes needed

  5. Click Review + create, then Create.

  6. Verify that ContosoResourceGroup appears in the Resource Groups list.

Task 2: Create the CoreServicesVnet Virtual Network and Subnets

  1. From the Azure portal, search for Virtual Networks in the Global Search bar and select it.

  2. Select + Create.

  3. Configure as follows:

    • Resource Group: ContosoResourceGroup

    • Name: CoreServicesVnet

    • Region: (US) East US

    • IPv4 address space: 10.20.0.0/16

      (Remove or overwrite the default address space)

Azure portal home page Global Search bar results for virtual network.

  1. Add subnets:

    • GatewaySubnet

      • Subnet purpose: Virtual Network Gateway

      • Subnet address range: 10.20.0.0/27

    • SharedServicesSubnet

      • Subnet address range: 10.20.10.0/24
    • DatabaseSubnet

      • Subnet address range: 10.20.20.0/24
    • PublicWebServiceSubnet

      • Subnet address range: 10.20.30.0/24
  2. After adding subnets, select Review + create.

  3. Verify validation passes, then select Create.

Task 3: Create the “ManufacturingVnet” Virtual Network and Subnets

  1. Repeat steps 1–6.

  2. Configure as follows:

    • Resource Group: ContosoResourceGroup

    • Name: ManufacturingVnet

    • Region: (Europe) West Europe

    • IPv4 address space: 10.30.0.0/16

  3. Add subnets:

    • ManufacturingSystemSubnet: 10.30.10.0/24

    • SensorSubnet1: 10.30.20.0/24

    • SensorSubnet2: 10.30.21.0/24

    • SensorSubnet3: 10.30.22.0/24

  4. Review, validate, and create.

Task 4: Create the “ResearchVnet” Virtual Network and Subnet

  1. Repeat steps 1–6.

  2. Configure as follows:

    • Resource Group: ContosoResourceGroup

    • Name: ResearchVnet

    • Region: Southeast Asia

    • IPv4 address space: 10.40.0.0/16

  3. Add subnet:

    • ResearchSystemSubnet: 10.40.0.0/24
  4. Review, validate, and create.

Task 5: Verify the Creation of VNets and Subnets

List of subnets in CoreServicesVnet.

  1. In the Azure portal home page, select All resources.

  2. Verify the following VNets exist:

    • CoreServicesVnet

    • ManufacturingVnet

    • ResearchVnet

  3. For each VNet:

    • Select the VNet.

    • Under Settings, select Subnets.

    • Confirm all subnets and IP address ranges are correct.

Key Takeaways

  • Azure Virtual Network is the building block for your private network in Azure.

  • Ensure non-overlapping address spaces between networks.

  • Subnets allow resource segmentation and future expansion planning.

  • Always reserve extra IP space for future subnet growth.


M01 - Unit 6 Configure DNS settings in Azure

Exercise Scenario

In this unit, you will configure DNS name resolution for Contoso Ltd. You will create a private DNS zone named contoso.com, link VNets for registration and resolution, create two VMs, and test the configuration.

Tasks:

  • Task 1: Create a private DNS Zone

  • Task 2: Link VNets for auto registration

  • Task 3: Create Virtual Machines to test the configuration

  • Task 4: Verify records in the DNS zone

Click on the picture below for more info:

Diagram of DNS architecture.

Task 1: Create a Private DNS Zone

Azure Portal home page with DNS search.

  1. Go to the Azure Portal.

  2. In the search bar, enter DNS and select Private DNS zones.

  3. Select + Create and fill in:

    • Resource Group: ContosoResourceGroup

    • Name: contoso.com

  4. Select Review + create, then Create.

  1. In contoso.com, under DNS Management, select Virtual network links+ Add.

  2. Add the following links:

    • CoreServicesVnetLink

      • Virtual Network: CoreServicesVnet

      • Auto registration: Enabled

    • ManufacturingVnetLink

      • Virtual Network: ManufacturingVnet

      • Auto registration: Enabled

    • ResearchVnetLink

      • Virtual Network: ResearchVnet

      • Auto registration: Enabled

  3. After each, select Refresh and verify the links and auto-registration are enabled.

contoso.com | Virtual links with + Add highlighted.

Task 3: Create Virtual Machines to Test

  1. In the Azure portal, open the Cloud Shell (top-right icon). Select PowerShell.

  2. Upload files azuredeploy.json and azuredeploy.parameters.json from F:\Allfiles\Exercises\M01.

  3. Run the following command:

     powershellCopyEdit$RGName = "ContosoResourceGroup"
     New-AzResourceGroupDeployment -ResourceGroupName $RGName -TemplateFile azuredeploy.json -TemplateParameterFile azuredeploy.parameters.json
    
  4. After deployment, verify two VMs are created in Virtual Machines.

Task 4: Verify Records in DNS Zone

  1. In Private DNS zones, open contoso.com.

  2. Verify host (A) records for both VMs are listed.

  3. Note their names and IP addresses.

Contoso.com DNS zone showing auto-registered host A records.

Connect to Test VMs via RDP

  1. In Virtual Machines, select TestVM1Connect > RDPDownload the RDP file.

  2. Repeat for TestVM2.

  3. Connect to the VMs and on both VMs:

    • Accept Privacy settings if prompted.

    • Select Yes if asked about Network discoverability (may not appear on Windows Server).

Test Name Resolution

On TestVM1:

  1. Open Command Prompt.

  2. Run: ipconfig /all (Verify IP matches what you noted earlier.)

  3. Run: ping TestVM2.contoso.com (Ping may timeout because of Windows Firewall.)

  4. Alternatively, run: nslookup TestVM2.contoso.com (Verify successful name resolution.)

Extend Your Learning with Copilot

Use copilot.microsoft.com to explore:

  • Differences between Azure DNS and Azure Private DNS.
FeatureAzure DNS (Public)Azure Private DNS
VisibilityPublic — resolvable over the internetPrivate — resolvable only within your Azure VNets
Use caseHost internet-facing domain names (e.g. websites)Internal name resolution for Azure resources
Example domainwww.contoso.comvm1.contoso.local or vm1.contoso.com (private use)
Who can query it?Any device on the internetOnly VMs within linked virtual networks
Typical usageWebsites, APIs, mail serversInternal VM-to-VM communication
Linked VNets required?NoYes (must link VNets to the private zone)
Zone typesOnly publicPrivate (with optional auto-registration)
  • Purpose of auto-registration in Azure Private DNS.

    • No need for manual DNS record management.

    • Ensures DNS is always up to date — even if VMs restart or their IPs change.

    • Great for dynamic environments where VMs are created and deleted often.

Key Takeaways

  • Azure DNS hosts DNS domains for public and private use.

  • Public zones resolve domains over the internet.

  • Private DNS zones manage DNS inside Azure VNETs.

  • DNS zones are collections of DNS records mapping domain names to information.

2- link subnet

M01 - Unit 8: Connect Two Azure Virtual Networks Using Global Virtual Network Peering

Exercise Scenario

In this lab, you will configure connectivity between CoreServicesVnet and ManufacturingVnet by setting up global VNet peering.

Tasks:

  • Task 1: Create a Virtual Machine to test the configuration

  • Task 2: Connect to Test VMs using RDP

  • Task 3: Test the connection between the VMs

  • Task 4: Create VNet peerings between CoreServicesVnet and ManufacturingVnet

  • Task 5: Test the connection again

Task 1: Create a Virtual Machine (ManufacturingVM)

  1. Open Azure Portal → Click Cloud Shell → Choose PowerShell.

  2. Select No Storage Account required if prompted, then Apply.

  3. Upload these files to Cloud Shell:

    • ManufacturingVMazuredeploy.json

    • ManufacturingVMazuredeploy.parameters.json

  4. Deploy the VM:

     $RGName = "ContosoResourceGroup"
     New-AzResourceGroupDeployment -ResourceGroupName $RGName -TemplateFile ManufacturingVMazuredeploy.json -TemplateParameterFile ManufacturingVMazuredeploy.parameters.json
    
  5. After deployment, verify that ManufacturingVM is created.

Task 2: Connect to the Test VMs Using RDP

  1. Go to Virtual Machines → Select ManufacturingVMConnect > RDPDownload RDP File.

  2. Save and connect (Repeat for TestVM1.)

  3. On both VMs:

    • Accept privacy settings.

    • Select Yes for network discoverability (if prompted).

  4. On TestVM1, open PowerShell, run: ipconfig, note the IPv4 address.

Task 3: Test Initial Connection Between VMs

  1. On ManufacturingVM, open PowerShell.

  2. Test connectivity to TestVM1's IP (example 10.20.20.4):

     Test-NetConnection 10.20.20.4 -Port 3389
    
    • Connection should fail (no peering yet). ( VMs are in two different VNets: TestVM1 is in CoreServicesVnet & ManufacturingVM is in ManufacturingVnet)

Task 4: Create VNet Peerings

  1. In Azure Portal, go to Virtual Networks → Select CoreServicesVnetPeerings+ Add.

  2. Configure:

    • Peering link name: CoreServicesVnet-to-ManufacturingVnet

    • Virtual Network: ManufacturingVnet

    • Enable:

      • Allow CoreServicesVnet to access ManufacturingVnet

      • Allow forwarded traffic

  3. In ManufacturingVnet, create reverse peering:

    • Peering link name: ManufacturingVnet-to-CoreServicesVnet

    • Enable:

      • Allow ManufacturingVnet to access CoreServicesVnet

      • Allow forwarded traffic

  4. Verify both peerings show Connected.

  • Now the connection should succeed (TCP test succeeded: true).


Task 5: Test Connection Again

  1. On ManufacturingVM, run:

     Test-NetConnection 10.20.20.4 -Port 3389
    

Clean Up Resources

  1. In Cloud Shell (PowerShell), run:

     Remove-AzResourceGroup -Name 'ContosoResourceGroup' -Force -AsJob
    
    • Resources will delete asynchronously.

Extend Your Learning with Copilot

Try these prompts:

  • What are the most common errors when configuring Azure virtual network peering?

    • Overlapping IP Ranges: VNets have overlapping address spaces — peering fails.

    • One-Way Peering Only: Peering is not set up in both directions.

    • “Allow Traffic” Not Enabled: Required traffic settings are missing during peering setup.

    • NSGs Blocking Traffic: Network Security Groups block communication even after peering.

    • Gateway Transit Misconfigured: Incorrect gateway settings when sharing VPN or ExpressRoute.

    • Missing Permissions Across Subscriptions: Insufficient rights to peer VNets in different subscriptions.

    • Global Peering Blocked by Policy: Policies prevent cross-region VNet peering.

  • If I peer VNet1 with VNet2 and VNet2 with VNet3, is VNet1 automatically peered with VNet3?

    • No, VNet1 is not automatically peered with VNet3. Azure VNet peering is not transitive.
  • Can firewalls and gateways affect Azure VNet peering?

    • Yes — firewalls and gateways can affect Azure VNet peering communication.

How firewalls affect peering:

  • NSGs (Network Security Groups) or Azure Firewall can block traffic between peered VNets.

  • Even if peering is correctly set up, if:

    • NSGs block inbound or outbound traffic, or

    • Azure Firewall doesn’t allow the route,

      VMs won’t be able to communicate.

How gateways affect peering:

  • Peering doesn’t automatically share VPN or ExpressRoute gateways.

  • To share a gateway:

    • In Hub VNet, enable “Allow gateway transit”.

    • In Spoke VNet, enable “Use remote gateway”.

  • Missing either setting = gateway traffic fails.

Key Takeaways

  • Azure VNet peering allows seamless communication between VNets.

  • Global peering connects VNets across different Azure regions.

  • Traffic between peered VNets uses Microsoft’s private backbone (not public internet).

  • You can resize VNet address spaces without downtime when VNets are peered.

51 views