Use advanced networking (virtual network injection) to connect to your virtual network in Azure Lab Services
Note
This article references features available since the August 2022 Update, when lab plans replaced lab accounts. For more information, see What's New in the August 2022 Update.
This article provides information about connecting a lab plan to your virtual network.
Some organizations have advanced network requirements and configurations that they want to apply to labs. For example, network requirements can include a network traffic control, ports management, access to resources in an internal network, etc. Certain on-premises networks are connected to Azure Virtual Network either through ExpressRoute or Virtual Network Gateway. These services must be set up outside of Azure Lab Services. To learn more about connecting an on-premises network to Azure using ExpressRoute, see ExpressRoute overview. For on-premises connectivity using a Virtual Network Gateway, the gateway, specified virtual network, network security group, and the lab plan all must be in the same region.
In the Azure Lab Services August 2022 Update, customers may take control of the network for the labs using virtual network (VNet) injection. You can now tell Lab Services which virtual network to use, and we'll inject the necessary resources into your network. With VNet injection, you can connect to on premise resources such as licensing servers and use user defined routes (UDRs). VNet injection replaces the peering to your virtual network, as was done in previous versions.
Important
Advanced networking (VNet injection) must be configured when creating a lab plan. It can't be added later.
Note
If your school needs to perform content filtering, such as for compliance with the Children's Internet Protection Act (CIPA), you will need to use 3rd party software. For more information, read guidance on content filtering with Lab Services.
Prerequisites
Before you configure advanced networking for your lab plan, complete the following tasks:
- Create a virtual network. The virtual network must be in the same region as the lab plan.
- Create a subnet for the virtual network.
- Delegate the subnet to Microsoft.LabServices/labplans.
- Create a network security group (NSG).
- Create an inbound rule to allow traffic from SSH and RDP ports.
- Associate the NSG to the delegated subnet.
Now that the prerequisites have been completed, you can use advanced networking to connect your virtual network during lab plan creation.
Delegate the virtual network subnet for use with a lab plan
After you create a subnet for your virtual network, you must delegate the subnet for use with Azure Lab Services.
Only one lab plan at a time can be delegated for use with one subnet.
Create a virtual network and subnet.
Open the Subnets page for your virtual network.
Select the subnet you wish to delegate to Lab Services and open the property window for that subnet.
For the Delegate subnet to a service property, select Microsoft.LabServices/labplans. Select Save.
Verify the lab plan service appears in the Delegated to column.
Associate delegated subnet with NSG
Warning
An NSG with inbound rules for RDP and/or SSH is required to allow access to the template and lab VMs.
For connectivity to lab VMs, it's required to associate an NSG with the subnet delegated to Lab Services. We'll create an NSG, add an inbound rule to allow both SSH and RDP traffic, and then associate the NSG with the delegated subnet.
- Create a network security group (NSG), if not done already.
- Create an inbound security rule allowing RDP and SSH traffic.
Select Inbound security rules on the left menu.
Select + Add from the top menu bar. Fill in the details for adding the inbound security rule as follows:
- For Source, select Any.
- For Source port ranges, select *.
- For Destination, select IP Addresses.
- For Destination IP addresses/CIDR ranges, select subnet range previously created subnet.
- For Service, select Custom.
- For Destination port ranges, enter 22, 3389. Port 22 is for Secure Shell protocol (SSH). Port 3389 is for Remote Desktop Protocol (RDP).
- For Protocol, select Any.
- For Action, select Allow.
- For Priority, select 1000. Priority must be higher than other Deny rules for RDP and/or SSH.
- For Name, enter AllowRdpSshForLabs.
- Select Add.
Wait for the rule to be created.
Select Refresh on the menu bar. Our new rule will now show in the list of rules.
- Associate the NSG with the delegated subnet.
Connect the virtual network during lab plan creation
Sign in to the Azure portal.
Select Create a resource in the upper left-hand corner of the Azure portal.
Search for lab plan. (Lab plan can also be found under the DevOps category.)
Enter required information on the Basics tab of the Create a lab plan page. For more information, see Tutorial: Create a lab plan with Azure Lab Services.
From the Basics tab of the Create a lab plan page, select Next: Networking at the bottom of the page.
Select Enable advanced networking.
For Virtual network, select an existing virtual network for the lab network. For a virtual network to appear in this list, it must be in the same region as the lab plan.
Specify an existing subnet for VMs in the lab. For subnet requirements, see Delegate the virtual network subnet for use with a lab plan.
Once you have a lab plan configured with advanced networking, all labs created with this lab plan use the specified subnet.
Known issues
- Deleting your virtual network or subnet will cause the lab to stop working
- Changing the DNS label on the public IP will cause the Connect button for lab VMs to stop working.
- Azure Firewall isn't currently supported.
Next steps
See the following articles:
- As an admin, attach a compute gallery to a lab plan.
- As an admin, configure automatic shutdown settings for a lab plan.
- As an admin, add lab creators to a lab plan.
Feedback
Indsend og få vist feedback om