Azure Virtual Network (VNet): Network Foundation for Berlin Small Business Cloud Deployments
When a small business in Berlin deploys its first Azure resources — virtual machines, databases, storage accounts — those resources need network isolation, controlled connectivity, and integration with on-premises infrastructure. Azure Virtual Network (VNet) is the foundational building block that provides all three: an isolated, customizable private network within Azure that you fully control, connected to your other infrastructure on your terms.
What a VNet Provides
An Azure VNet is logically isolated from all other Azure VNets by default — resources in your VNet cannot communicate with resources in another organization’s VNet, and Azure Internet traffic does not automatically reach resources inside your VNet unless you explicitly configure public IP addresses or load balancers.
Within a VNet, you define an address space — a private IP range in RFC 1918 space (e.g., 10.10.0.0/16) — and divide it into subnets. Each subnet serves as a logical isolation boundary: a database subnet, an application tier subnet, a gateway subnet for VPN connectivity, and a management subnet for administrative tools. Resources deployed into a subnet receive private IP addresses from that subnet’s range and can communicate with other subnets within the same VNet by default.
Subnet-Level Security with Network Security Groups
Network Security Groups (NSGs) applied to subnets enforce traffic filtering rules that control which sources can reach resources in that subnet and which destinations resources in that subnet can reach. A database subnet with an NSG that permits inbound traffic only on port 1433 from the application subnet — and denies all other inbound traffic — ensures that the database cannot be reached directly from the internet or from other subnets, even if a VM in another subnet is compromised.
This east-west segmentation — controlling traffic between subnets — is a critical defense against lateral movement in breach scenarios. A compromised web tier VM cannot reach the database tier if NSG rules explicitly block that traffic path, containing the blast radius of the initial compromise.
Hybrid Connectivity: VPN Gateway
A VNet that cannot communicate with your Berlin office network is an island. Azure VPN Gateway provides the IPsec/IKEv2 tunnel that connects your on-premises network to your Azure VNet, making Azure VMs and services appear as extensions of your local network from the perspective of routing and DNS resolution.
The VPN Gateway is deployed into a dedicated GatewaySubnet within your VNet and requires a public IP. Once the site-to-site tunnel is established, resources in Azure can reach on-premises servers by private IP and vice versa — without routing through the public internet for that traffic. For Berlin SMBs with on-premises Active Directory, file servers, or legacy applications, VPN Gateway is the prerequisite for true hybrid operation.
Eliminating Public Endpoints with Private Endpoints
Platform-as-a-service resources — Azure Storage, Azure SQL, Azure Key Vault, Azure Container Registry — are by default accessible over the public internet to anyone who authenticates. Private Endpoints assign these services a private IP address from your VNet, making them accessible only from within the VNet (or connected networks via VPN). Disabling the public endpoint entirely eliminates the attack surface: no credential stuffing, no exposure in external attack surface scans, no public DNS record resolving to a reachable endpoint.
For a Berlin SMB, deploying Private Endpoints for Key Vault and storage accounts used by production workloads is a one-time configuration that permanently removes those resources from internet exposure without impacting function for legitimate users accessing them from within the VNet or over the VPN tunnel.
North-South Traffic Inspection with Azure Firewall
Azure Firewall deployed within a VNet inspects and filters outbound traffic from Azure resources to the internet, and can be configured as the next hop for inbound traffic via User Defined Routes. For VNets where resources initiate outbound connections — downloading updates, calling external APIs, communicating with SaaS services — Azure Firewall enforces application-layer rules: allow only specific FQDNs, block all non-approved destinations, log all outbound traffic for security monitoring.
VNet Design for Berlin SMBs
A practical starting point for a Berlin small business is a single VNet (10.10.0.0/16) divided into subnets: GatewaySubnet (10.10.0.0/27) for VPN, ApplicationSubnet (10.10.1.0/24) for VMs and app services, DataSubnet (10.10.2.0/24) for databases, AzureFirewallSubnet (10.10.3.0/26) if using Azure Firewall, and AzureBastionSubnet (10.10.4.0/27) for Bastion secure VM access. NSGs on ApplicationSubnet and DataSubnet enforce segmentation. VPN Gateway in GatewaySubnet provides hybrid connectivity. Private Endpoints for Key Vault and storage provide PaaS isolation.
This VNet architecture is not a one-time configuration — it is the foundation that every subsequent Azure security control relies on. Conditional Access, Defender for Cloud recommendations, Private Endpoints, and NSG rules all assume a well-structured VNet beneath them.
Related Reading
- Azure Network Security Groups: NSGs applied to VNet subnets enforce inbound and outbound traffic rules at the network layer — a properly designed subnet structure with NSG rules blocking cross-subnet traffic except on required ports is the primary control preventing lateral movement within a VNet after a compromise.
- Azure VPN Gateway: VPN Gateway deployed in the GatewaySubnet of your VNet creates the IPsec tunnel that extends your Berlin office network into Azure — all VNet-connected resources become reachable from on-premises by private IP, enabling true hybrid operation without public endpoint exposure.
- Azure Private Endpoints: Private Endpoints assign PaaS services a private IP within your VNet, making storage, Key Vault, and SQL accessible only from within the VNet or over the VPN tunnel — disabling the public endpoint after Private Endpoint deployment eliminates the service from internet-facing attack surface entirely.
- Azure Firewall: Azure Firewall deployed in AzureFirewallSubnet inspects all north-south traffic leaving the VNet — User Defined Routes on all other subnets direct outbound internet traffic through Azure Firewall for application-layer filtering and logging before it exits the VNet boundary.
