From magic-powers
Use when designing Azure VNet architecture, configuring NSGs, selecting load balancers, planning hybrid connectivity (VPN/ExpressRoute), implementing Private Link, or studying for Azure Network Engineer Associate (AZ-700) or AZ-305.
npx claudepluginhub kienbui1995/magic-powers --plugin magic-powersThis skill uses the workspace's default tool permissions.
- Designing VNet architecture, subnet segmentation, and address planning for Azure deployments
Generates design tokens/docs from CSS/Tailwind/styled-components codebases, audits visual consistency across 10 dimensions, detects AI slop in UI.
Records polished WebM UI demo videos of web apps using Playwright with cursor overlay, natural pacing, and three-phase scripting. Activates for demo, walkthrough, screen recording, or tutorial requests.
Delivers idiomatic Kotlin patterns for null safety, immutability, sealed classes, coroutines, Flows, extensions, DSL builders, and Gradle DSL. Use when writing, reviewing, refactoring, or designing Kotlin code.
| Subnet | Purpose | Example |
|---|---|---|
AppSubnet | Application tier (web/API servers, VMs, App Service Env) | 10.0.1.0/24 |
DataSubnet | Database tier (SQL MI, Redis, Cosmos Private Endpoint) | 10.0.2.0/24 |
MgmtSubnet | Bastion, Jump server, monitoring | 10.0.3.0/24 |
GatewaySubnet | VPN Gateway / ExpressRoute Gateway (reserved name) | 10.0.255.0/27 |
GatewaySubnet for gateway; AzureBastionSubnet for Bastion; AzureFirewallSubnet for Firewall| Feature | NSG | Azure Firewall |
|---|---|---|
| Layer | L4 (TCP/UDP) | L4 + L7 (FQDN, HTTP/S, TLS inspection) |
| Scope | Subnet or NIC level | Centralized (hub VNet) |
| FQDN filtering | No | Yes (application rules) |
| Threat intelligence | No | Yes (IDPS) |
| Cost | Free | Hourly + data processing charge |
| Best for | Subnet/NIC traffic control | Centralized outbound filtering, east-west |
Allow/Deny on Inbound/OutboundWebServers, DBServers); use in NSG rules instead of IP addresses| Service | Layer | Scope | SSL Termination | WAF | Best For |
|---|---|---|---|---|---|
| Azure Load Balancer | L4 | Regional | No | No | TCP/UDP, internal or public regional LB |
| Application Gateway | L7 | Regional | Yes | Yes | HTTP/HTTPS, URL routing, SSL offload |
| Azure Front Door | L7 | Global | Yes | Yes | Global HTTP/HTTPS, CDN, multi-region routing |
| Traffic Manager | DNS | Global | No (DNS only) | No | DNS-based global routing (any protocol) |
Basic, Standard v2, WAF v2 tiers; path-based routing (/api/* → backend pool 1)| Option | Description | Transitive |
|---|---|---|
| VNet Peering | Low-latency VNet-to-VNet; same or cross-region | No |
| VPN Gateway | IPsec site-to-site or point-to-site over internet | No (per VNet) |
| ExpressRoute | Private dedicated circuit via telco; no internet path | Via Global Reach |
| Private Endpoint | Private IP in VNet for Azure PaaS (Storage, SQL, Key Vault) | Yes (via Peering) |
| Service Endpoint | Network-level restriction to Azure PaaS; no private IP | No |
| Virtual WAN | Managed hub-and-spoke; transitive routing built-in | Yes |
| Feature | VPN Gateway | ExpressRoute |
|---|---|---|
| Path | Encrypted over public internet | Private, dedicated circuit via telco partner |
| Max bandwidth | Up to 10 Gbps (VpnGw5AZ) | 50 Mbps – 100 Gbps |
| Latency | Variable (internet-dependent) | Predictable, low latency |
| SLA | 99.95% (Active-Active) | 99.95% (Standard), 99.99% with redundancy |
| Cost | Lower | Higher (circuit + gateway) |
| Best for | < 1 Gbps, cost-sensitive, backup path | > 1 Gbps, latency-sensitive, compliance |
AzureBastionSubnet (/26 or larger); connects to VMs in same or peered VNetBasic (standard RDP/SSH), Standard (native client, file transfer, tunneling)privatelink.* zones); traffic stays in VNet; stronger than Service Endpoint