I would like to create an extra-paranoid hub-and-spoke DMZ setup on Azure using IaaS VMs.
I have an public internet facing front end server (i.e. an IIS web server) that I'd like to severely lockdown. However, the front end requires access to some back end servers (i.e. a database, a domain controller, etc.). I want to ensure:
This seems like a reasonable scenario, but I can't seem to achieve it on Azure. The closest I've been able to do is:
This works ok but it's not as locked down as I'd like. I really want to have defense-in-depth so that I don't have to rely on Windows/Linux firewall settings on each machine. For example, let's say that a back end server must run an application with administrator credentials (assume there are no alternatives to this). I want an extra layer of protection such that a bug (or a malicious query) on the back end server could not:
As far as I can tell, this isn't possible on Azure using the Virtual Networking because:
Am I missing something? It seems like I might be able to hack something together using multiple virtual networks and VPN them together as a bunch of /30 subnets but that seems quite awful. If I can't figure this out on Azure it seems my only reasonable alternative is to try to setup something like this on AWS using Virtual Private Cloud (VPC). Any help/guidance would be appreciated.
As of Nov 2015 it's now possible to deliver what you're asking for, albeit in IaaS v2.
Firewall-like rules, limited to address ranges, ports and protocols can be delivered via Network Security Groups (NSGs). This is documented quite well on Microsoft's site: What is a Network Security Group (NSG)?
You can now also create VMs with multiple NICs (again, IaaS v2) however be aware that you may be required to increase your VM size in order to add more than one. Again, there's a reasonable article explaining it in detail here: Create a VM with multiple NICs
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With