Azure Hub-and-Spoke Network Segmentation
About This Architecture
Azure hub-and-spoke network segmentation with DMZ, distribution, and access layers protecting workloads across multiple subnets. Traffic flows from Internet through Azure Firewall and DDoS Protection to Application Gateway with WAF, then to internal load balancers routing to app and web servers. Network Security Groups enforce least-privilege rules at each tier: web tier allows 80/443, app tier allows 8080 from web only, database tier allows 1433 from app servers only, and dev tier restricts SSH/RDP to Bastion. Management and security layer includes Azure Bastion, Monitor, Key Vault, Sentinel, and Log Analytics for centralized access control and threat detection. Fork this diagram to customize subnets, NSG rules, or add spoke VNets for multi-region deployments. This architecture demonstrates Azure best practices for zero-trust networking, compliance, and operational visibility.
People also ask
How do I design a secure hub-and-spoke network in Azure with proper segmentation and NSG rules?
This diagram shows a production-grade Azure hub-and-spoke topology with a central hub containing Azure Firewall, DDoS Protection, and VPN Gateway, connected to access layer spokes with web, app, dev, and database subnets. Each subnet has NSGs enforcing least-privilege rules: web tier allows HTTP/HTTPS, app tier allows traffic only from web servers, database tier allows SQL only from app servers, a
- Domain:
- Cloud Azure
- Audience:
- Azure solutions architects designing secure, scalable hub-and-spoke network topologies
Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.