Skip to content

Commit 62ab7ba

Browse files
committed
updating FAQ for virtual networks
1 parent f60a9ea commit 62ab7ba

File tree

1 file changed

+55
-2
lines changed

1 file changed

+55
-2
lines changed

articles/ai-foundry/agents/faq.yml

Lines changed: 55 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,10 @@ metadata:
88
ms.service: azure-ai-foundry
99
ms.subservice: azure-ai-foundry-agent-service
1010
ms.topic: faq
11-
ms.date: 10/09/2025
11+
ms.date: 10/20/2025
1212
ms.author: aahi
1313
author: aahill
14+
ms.custom: references_regions
1415
title: Azure AI Foundry Agent Service frequently asked questions
1516
summary: |
1617
If you can't find answers to your questions in this document, and still need help check the [Azure AI services support options guide](../../ai-services/cognitive-services-support-options.md). Azure AI Foundry Agent Service is part of Azure AI services.
@@ -55,4 +56,56 @@ sections:
5556
- question: |
5657
Is there any additional pricing or quota for using Foundry Agent Service?
5758
answer: |
58-
No. All [quotas](quotas-limits.md) apply to using models with Foundry Agent Service.
59+
No. All [quotas](quotas-limits.md) apply to using models with Foundry Agent Service.
60+
- name: Virtual networking
61+
questions:
62+
- question: |
63+
What does 'bring your own virtual network' mean?
64+
answer: |
65+
Virtual networks secure the inbound and outbound access of your Azure resources, preventing bad actors from accessing your resources. Network isolation is achieved through virtual network integrations in Azure. This is a fundamental requirement for security in enterprises. To learn more about virtual network isolation, see [Virtual network integration of Azure services for network isolation](/azure/virtual-network/vnet-integration-for-azure-services) and [What is Azure Virtual Network?](/azure/virtual-network/virtual-networks-overview)
66+
- question: |
67+
Why is subnet delegation needed?
68+
answer: |
69+
Both the Agent client and its' compute run on Azure Container Apps (ACA). When you run the Agent client and its compute on Azure Container Apps (ACA) inside an existing virtual network, you must supply a dedicated subnet delegated to `Microsoft.App/environments`.
70+
1. Delegation pins them to the right subnet. It tells Azure exactly where to “inject” the Agent client so ACA can create its network interfaces there.
71+
2. ACA then applies the needed plumbing - IP addresses, routing, NSGs, and service-managed identity wiring, is configured automatically.
72+
3. Without the delegation, ACA refuses to deploy, so neither the Agent client nor the compute layer could join your VNet, breaking isolation and compliance requirements.
73+
In short, delegating the subnet is the prerequisite that lets ACA, and therefore your Agent runtime, live inside your private network with the correct security and routing policies in place and in your control.
74+
- question: |
75+
What regions are supported for Class A?
76+
answer: |
77+
Supported regions: West US, East US, East US 2, Japan East, France Central, UAE North, South Central US, Italy North, Germany West Central, Brazil South, South Africa North, Australia East, Sweden Central, Canada East, West Europe, Spain Central, UK South
78+
- question: |
79+
What class range is supported? Public or Private Class A, B, C Subnets?
80+
answer: |
81+
Only private class A, B, and C ranges are supported. No public class ranges are supported.
82+
- question: |
83+
What is the minimum size for the agent subnet? How many IPs should we use initially and how many IPs should be used for each Agent?
84+
answer: |
85+
The recommended subnet size is /24 (256 address) and is what we default to in our templates. The minimum subnet size is /27 (32 addresses). The reason why /24 is recommended is because of the runtime impact in the event of a container update, listed in the ACA documentation. For more information, see [Configuring virtual networks Azure Container Apps environments](/azure/container-apps/custom-virtual-networks?tabs=workload-profiles-env#subnet).
86+
87+
We set an IP range per Azure AI Foundry account. Each project gets an IP from the range. There is not IP address set per Agent, but per project. This means there is no limit to the number of agents to create within your project. The user is not limited by the minimum address space of the subnet to create any number of agents.
88+
- question: |
89+
What is the minimum and recommended virtual network address range for the Agent service?
90+
answer: |
91+
As long as there is address space for Agent subnet and private endpoints, then virtual network address range can be anything.
92+
- question: |
93+
Can I use peered VNETs? Can I have an AI search in one virtual network, CosmosDB in another virtual network, Foundry and Agents in another virtual network?
94+
answer: |
95+
Yes this is feasibly possible since the virtual network is in the your subscription, and you should be able to peer with any virtual network. But data transfer is quite costly so it is not recommended to do this. The requirement is all resources must be in the same region as the Foundry resource.
96+
- question: |
97+
Do I need to whitelist any FQDNs if I am using an Azure firewall?
98+
answer: |
99+
Yes, allowlist the Fully Qualified Domain Names (FQDNs) listed **Managed Identity in the [Use Azure Firewall with Azure Container Apps](/azure/container-apps/use-azure-firewall) article or add the service tag `AzureActiveDirectory`. Verify no TLS inspection happens in the firewall that could be adding a self-signed certificate. During failures, inspect if there is any traffic landing on the firewall and what traffic is being blocked by the firewall.
100+
- question:
101+
Can the virtual network be re-used by multiple Azure AI Foundry resources?
102+
answer: |
103+
Yes, a virtual network can be re-used by multiple Foundry resources, but the Agent runtime subnet is per Foundry account.
104+
- question: |
105+
Does the virtual network need to be in the same resource group as Foundry?
106+
answer: |
107+
No, the same resource group is not needed, but the same region is required.
108+
- question: |
109+
What additional configuration is needed if I want to add tools to my agents?
110+
answer: |
111+
The template provides support for the built-in tools: Code Interpreter, File Search, Azure AI Search, Cosmos DB (all tools that use the Bring-Your-Own (BYO) resource connections). To configure tools that require the creation of a new connection, you must create a private endpoint from your `peSubnet`` and create a private link from the Azure Resource.

0 commit comments

Comments
 (0)