Azure Core-Distribution-Access Network
About This Architecture
Azure Core-Distribution-Access (CDA) network architecture implements a three-tier security perimeter using VNet (10.0.0.0/8) with DDoS Protection, Azure Firewall, Application Gateway WAF v2, and Front Door protecting web, app, and database subnets. Traffic flows from Internet through Traffic Manager and CDN to Application Gateway, then to Web Servers (10.0.2.0/24) and App Servers (10.0.3.0/24), with Azure SQL and PostgreSQL in isolated DB Subnet (10.0.4.0/24). Network Security Groups enforce least-privilege rules per layer: NSG-Web allows 80/443, NSG-App allows 8080, NSG-DB allows 1433/5432, while Azure Bastion, Key Vault, Azure Monitor, and Sentinel provide secure management and observability. This architecture demonstrates defense-in-depth with multiple security controls, granular subnet isolation, and comprehensive logging for enterprise compliance. Fork and customize this diagram on Diagrams.so to match your subscription structure, IP ranges, and regional requirements.
People also ask
How do I design a secure multi-tier Azure network with DDoS protection, firewalls, and NSG rules for web, app, and database layers?
This diagram shows a Core-Distribution-Access architecture using Azure VNet (10.0.0.0/8) with DDoS Protection and Azure Firewall at the edge, Application Gateway WAF v2 in the DMZ, and isolated subnets for web (10.0.2.0/24), app (10.0.3.0/24), and database (10.0.4.0/24) tiers. Each subnet has NSGs enforcing least-privilege rules: web allows 80/443, app allows 8080, database allows 1433/5432. Azure
- Domain:
- Cloud Azure
- Audience:
- Azure solutions architects designing enterprise network topologies with security and scalability
Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.