Activity Overview: In this graded activity, students will provision a virtual network, virtual machines, ACL/firewall rules, and their prerequisite components in Azure Cloud Platform. Students will then generate back up templates and connect to their compute resources remotely.
Activity Outcomes: After completing this activity will be able to
- Demonstrate configuration of cloud-based virtual network functions
- Demonstrate configuration of cloud-based ACL and firewall rules
- Demonstrate the creation of backup/templates in Azure
- Demonstrate remote connectivity to compute resources in the cloud
Deliverable: Upload all requested screenshots below, as a .pdf export from the editor of your choosing.
Naming convention: “lastnamefirstinitial_Assignment#.pdf” e.g: “smithp_A1.1.pdf”
Be sure to include your name, student number, and course (CNW-2511) at the top of your document.
Provisioning Resources in Azure
Microsoft Azure Cloud Platform offers the ability to provision many cloud-based resources, including virtual appliances (VM’s and Containers), and virtual network functions (VNF). The process to create and configure these resources is reliable and quick within a cloud platform, so the reliance on our knowledge of theory and how these resources work together becomes paramount.
Follow this link to log in to the Azure Portal. Virtual Machines (and many other billed resources), must be disabled/deleted via the Azure dashboard to prevent continuous billing. Shutting down a VM within the OS will not disable them.
After you have completed this activity, you will delete all created resources, then verify with screenshots.
Do not create any resources unless you are specifically requested to. This runs a very high risk of your student account credits ($200 cap) being spent in their entirety, at which point you will no longer be able to access any of the resources required for this course, and future courses.
In this lab, you will be provisioning:
- One (1) Virtual Network
- Two (2) virtual NIC’s
- One (1) static public IP (VIP – standard SKU)
- One (1) firewall
- One (1) network security group
- One (1) private address spaces with two (2) subnets
- Two (2) Virtual Machines
Whenever you see “LNFI” input your last name and first initial (ex: smithp)
As you progress through this activity, your instructor will request that you capture a screenshot periodically (on Mac OS: “command+shift+3” to capture the whole screen, or “command+shift+4” then drag the cursor over the area you would like to capture). These screenshots are part of your required deliverable and will be graded.
Please attend or view Live Lecture (Week 2 Part 1) when available for the latest walkthrough. It is important to understand Cloud Service Provider (CSP) platforms change frequently, so the available recording here may look differently than what you see. You are welcome to use your best judgement to navigate any differences, or wait until the Live Lecture recording becomes available for further elaboration.

Diagram of Activity Outcome
Lab Steps and Configuration Requirements
- Resource Group
- Name: LNFI-MMYYYY
- Region: ANY REGION THAT ALLOWS YOU TO CREATE VM’S, I use “East” as a naming example here
- Public IP
- SKU: Standard (Static)
- Name: cnw-region-PIP-LNFI
- DNS name label: cnwLNFI
- Resource Group: Use the one created above
- Availability Zone: Zone-redundant
- Virtual Network
- Name: cnw-east-LNFI “east” or whatever region you are using
- Address Space: 10.0.1.0 /24
- Subnet: 10.0.1.64 /26
- Name: cnw-east-compute-LFNI
- Firewall: Enabled
- Name: cnw-east-fw-LNFI
- Firewall Subnet Address Space: 10.0.1.0 /26
- Public IP Address: Use Existing (the PIP created above)
- Network Interface 1
- Name: cnw-east-client01
- Virtual Network: Same as above
- Subnet: cnw-east-compute…
- Static address assignment
- Private IP Address: 10.0.1.80
- Network Security Group: None
- Resource Group: Same as above
- Network Interface 2 (same as above unless noted below)
- Name: cnw-east-websrv
- Private IP Address: 10.0.1.70
- Network Security Group
- Name: cnw-east-compute
- Resource Group: Same as above
- Configure Network Security Group – Apply to Subnet:
- Virtual Network: Network created above
- Subnet: cnw-east-compute…
- Configure inbound rule for NSG (to allow Remote Desktop Connections)
- Add Inbound Security Rule:
- Source: IP Addresses
- Source IP: Public IP on your end (use the link above to identify it)
- Source Port Ranges: * (* means ALL)
- Destination: Service Tag
- Destination: VirtualNetwork
- Destination Port Ranges: 3389
- Protocol: Any
- Action: Allow
- Priority: 100
- Name: RDP_in_allow
- Description: in your own words
- Add Inbound Security Rule:
- Firewall Rules > Add NAT Rule Collection
- “cnw-east-compute-LFNI” Priority 100
- Rule 1:
- Name: RDP-allow-websrv
- Protocol: TCP, UDP
- Source Address: (your public IP)
- Destination Address: (Azure Public IP)
- Destination Port: 33890
- Translated Address: 10.0.1.70
- Translated Port: 3389
- Rule 2 (same as above unless otherwise noted):
- Name: RDP-allow-client01
- Destination Port: 33891
- Translated Address: 10.0.1.80
- Rule 1:
- “cnw-east-compute-LFNI” Priority 100
- Virtual Machine 1 (These will auto-generate a new NIC which you will remove and replace with the earlier NIC’s you’ve created)
- Name: cnw-client01
- Region: East US
- User Name: LNFI
- Password: Fullsail11!!
- Availability Options: None
- Image: Windows 10 Enterprise, 22h2, any generation – Note that any version of Windows 10 should be okay if those aren’t listed for you
- Size: Standard D2s_v3
- Disks: Standard SSD, Use Managed Disks
- Network: cnw-east-compute
- Public IP: NO
- NIC Security Group: None
- Management: All options OFF, Security: Basic
- Advanced: All options OFF
- Virtual Machine 2 (These will auto-generate a new NIC which you will remove and replace with the earlier NIC’s you’ve created)
- Name: cnw-websrv
- Region: East US
- Username and Password: same as above
- Availability Options: None
- Image: Windows Server 2019, 2022, or 2025 (2025 may or may not work, but any version of these OS’ should be okay, see the walkthrough for more detail)
- Size: Standard D2s v3
- Disks: Standard SSD, Use Managed Disks
- Network: cnw-east-compute
- Public IP: NO
- NIC Security Group: None
- Management: All options OFF, Security: Basic
- Advanced: All options OFF
Final Configurations and Testing
- Go to the Virtual Machine overview and select “STOP” at the top of the list, this will turn the VM’s off. (may take a couple of minutes)
- Go to each of the VM’s overview and select “Networking”
- Attach the NIC you’ve previously created for the VM you are configuring.
- Once the new NIC is attached, detach the auto-generated one.
- Go to Network Interfaces in the sidebar, and delete both of the auto-generated NIC’s
- Go to Virtual Networks in the sidebar, select your virtual network
- Select DNS Servers, change to “Custom”
- Input two DNS Servers: 10.0.1.70 and 8.8.8.8
- Be sure to save your changes
- Go to Virtual Machine overview and select “START” for both VM’s. (this may take a couple of minutes)
- Download the Microsoft Remote Desktop client applicable for your computer
- Select “+” to add a new RDP connection
- Connection Name: CNW-websrv
- PC Name: x.x.x.x:33890 (x.x.x.x = your Azure public IP)
- No gateway configured
- User name and password: As configured for each VM above
- Close out the configuration window, and double click to connect to your server
- Repeat this procress for your client machine
- Connection Name: CNW-client01
- PC Name: x.x.x.x:33891 (x.x.x.x = same IP as above)
- Close out the window and connect to your client
PLEASE NOTE: If you have verified that your NSG and ingress access rules are configured correctly, but still cannot RDP into your VM’s, please just note that RDP was not able to connect and any troubleshooting steps you took, in place of the RDP screenshots. Sometimes, depending on the network a student is using, RDP is unable to traverse the home network or hot-spots.
Required Screenshots
The following screenshots should show the configurations identified in lab, for each component (PLEASE NUMBER AND LABEL YOUR SCREENSHOTS):
- Resource Groups – Resource Group “LNFI-MMYYYY” Properties Page (showing all provisioned resources for this activity)
- Public IP’s – Public IP “cnw-east-PIP-LNFI” Overview Page
- Virtual Networks – Virtual Network “cnw-east-LNFI” Overview Page
- Subnets Page – showing the two configured subnets
- Diagram Page – showing 2 VM’s, 2 NIC’s, 1 NSG, 2 Subnets
- Network Interfaces – List of both NIC’s created (conforming to lab requirements)
- Net Security Groups – NSG “cnw-east-compute” Overview Page
- Firewalls – “cnw-east-fw-LNFI” > Rules > NAT Rule list for “cnw-east-compute-LNFI” showing the two RDP inbound rule configurations
- Virtual Machines:
- Overview page for CNW-CLIENT01
- Overview page for CNW-WEBSRV
- While connect to each VM via RDP:
- “ipconfig /all” on CNW-WEBSRV
- “ipconfig /all” on CNW-CLIENT01
- PLEASE NOTE: If you have verified that your NSG and ingress access rules are configured correctly, but still cannot RDP into your VM’s, please just note that RDP was not able to connect and any troubleshooting steps you took, in place of the RDP screenshots. Sometimes, depending on the network a student is using, RDP is unable to traverse the home network or hot-spots.
- All Resources Page showing all resources deleted (not on the list)
There should be 13 individual screenshots.
Requirements:

Leave a Reply
You must be logged in to post a comment.