You have two Azure VNets in the same region. You create a VNet peering between them. What is the expected behavior regarding traffic flow?
Think about how Azure handles peered VNets in the same region.
VNet peering connects VNets privately through Azure's backbone network, allowing direct traffic without going over the internet or requiring VPN gateways.
You want to connect two VNets in different Azure regions using VPN gateways. Which configuration step is mandatory?
Consider how VNets in different regions connect securely.
To connect VNets in different regions, you must deploy VPN gateways in each VNet and create a VPN connection between them. VNet peering does not support cross-region connections without gateways.
After peering two VNets, which security control must you configure to restrict traffic between them?
Think about how to control traffic flow inside a VNet or between VNets.
NSGs control inbound and outbound traffic at subnet or NIC level, allowing you to restrict traffic between peered VNets. VPN Gateway policies and service endpoints do not control peering traffic.
You attempt to peer two VNets that have overlapping IP address spaces. What will happen?
Consider Azure's validation rules for VNet peering.
Azure does not allow peering between VNets with overlapping IP address spaces. The peering creation will fail to prevent routing conflicts.
You have multiple VNets across different regions that need to communicate securely and with low latency. Which architecture is best?
Think about scalable and performant multi-region connectivity solutions.
Azure Virtual WAN provides a managed hub-and-spoke architecture that optimizes connectivity between multiple VNets across regions with better performance and simplified management compared to individual VPN tunnels or peering.