Skip to content

Commit 2ae58dc

Browse files
authored
Merge pull request #270825 from MicrosoftDocs/release-pp-avnm-ng-snd
Release pp avnm ng snd--scheduled release at 10am of 4/02
2 parents bddcadb + 0e53bcf commit 2ae58dc

7 files changed

+208
-0
lines changed

articles/virtual-network-manager/TOC.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@
5353
href: concept-security-admins.md
5454
- name: Security admin rule enforcement
5555
href: concept-enforcement.md
56+
- name: Network groups as source and destination
57+
href: concept-security-admin-rules-network-groups.md
5658
- name: Deployments
5759
href: concept-deployments.md
5860
- name: Remove or update components
@@ -95,6 +97,10 @@
9597
href: how-to-create-mesh-network.md
9698
- name: Azure PowerShell
9799
href: how-to-create-mesh-network-powershell.md
100+
- Name: Security admin rules
101+
items:
102+
- name: Using network groups as source and destination
103+
href: how-to-create-security-admin-rule-network-groups.md
98104
- name: Cross-tenant connection support
99105
items:
100106
- name: Configure cross-tenant connection - Portal
Lines changed: 71 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,71 @@
1+
---
2+
title: 'Using network groups with security admin rules'
3+
description: Learn how a network administrator can deploy security admin rules using network groups as the source and destination in Azure Virtual Network Manager.
4+
author: mbender-ms
5+
ms.author: mbender
6+
ms.service: virtual-network-manager
7+
ms.topic: conceptual
8+
ms.date: 04/01/2024
9+
ms.custom: template-concept, engagement-fy23, references_regions
10+
#customer intent: As a network administrator, I want to deploy security admin rules in Azure Virtual Network Manager. When creating security admin rules, I want to define network groups as the source and destination of traffic.
11+
---
12+
13+
# Using network groups with security admin rules
14+
15+
In this article, you learn how to use network groups with security admin rules in Azure Virtual Network Manager (AVNM). Network groups allow you to create logical groups of virtual networks and subnets that have common attributes, such as environment, region, service type, and more. You can then specify your network groups as the source and/or destination of your security admin rules so that you can enforce the traffic among your grouped network resources. This feature streamlines the process of securing your traffic across workloads and environments, as it removes the manual step of specifying individual Classless Inter-Domain Routing (CIDR) ranges or resource IDs.
16+
17+
[!INCLUDE [virtual-network-manager-network-groups-source-destination-preview](../../includes/virtual-network-manager-network-groups-source-destination-preview.md)]
18+
19+
## Why use network groups with security admin rules?
20+
21+
Using network groups with security admin rules allows you to define the source and destination of the traffic for the security admin rule. This feature streamlines the process of securing your traffic across workloads and environments, as it removes the manual step of specifying individual CIDR ranges or resource IDs.
22+
23+
For example, you need to ensure traffic is denied between your production and nonproduction environments represented by two separate network groups. Create a security admin rule with an action type of **Deny**. Specify one of your network groups as the source. Specify the other network group as the destination. Select the direction of the traffic you want to deny. You can enforce the traffic between your grouped network resources without the need to specify individual CIDR ranges or resource IDs.
24+
25+
## How do I deploy a security admin rule using network groups?
26+
27+
Once you have access to the public preview, you can deploy a security admin rule using network groups in the Azure portal. To create a security admin role, create a security admin configuration and add a security admin rule. Finally, deploy the security admin configuration. For more information, see [Create a security admin rule using network groups](./how-to-create-security-admin-rule-network-groups.md).
28+
29+
## Supported regions
30+
31+
During the public preview, network groups with security admin rules are supported in the following regions:
32+
33+
- Supported Regions:
34+
35+
- Central US EUAP
36+
37+
- East US
38+
39+
- East US 2
40+
41+
- East US 2 EUAP
42+
43+
- South Central US
44+
45+
- West US
46+
47+
- West US 2
48+
49+
- West US Central
50+
51+
## Limitations of network groups with security admin rules
52+
53+
The following limitations apply when using network groups with security admin rules:
54+
55+
- Only supports manual aggregation of CIDRs in a network group. The CIDR range in a rule only changes upon the customer commit.
56+
57+
- Supports 100 networking resources (virtual networks or subnets) in any one network group referenced in the security admin rule.
58+
59+
- Only supports IPv4 address prefixes in the network group members.
60+
61+
- Role-based access control ownership is inferred from the `Microsoft.Network/networkManagers/securityAdminConfigurations/rulecollections/rules/write` permission only.
62+
63+
- There's no scope enforcement on the network group members when using clients other than the Azure portal.
64+
65+
- Network groups must have the same member-types. Virtual networks and subnets are supported but must be in separate network groups.
66+
67+
- Only supports aggregating members in the same tenant as the network manager.
68+
69+
- Azure Virtual Filtering Platform (VFP) programming for AVNM-managed virtual networks isn't optimized.
70+
71+
- Force-delete of any network group used as the source and/or destination in a security admin rule isn't currently supported. Usage causes an error.
Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
title: Create a security admin rule using network groups
3+
titleSuffix: Azure Virtual Network Manager
4+
description: Learn how to deploy security admin rules using network groups as the source and destination in Azure Virtual Network Manager.
5+
author: mbender-ms
6+
ms.author: mbender
7+
ms.service: virtual-network-manager
8+
ms.topic: how-to
9+
ms.date: 04/01/2024
10+
ms.custom: template-how-to
11+
#Customer intent: As a network administrator, I want to deploy security admin rules using network groups in Azure Virtual Network Manager so that I can define the source and destination of the traffic for the security admin rule.
12+
---
13+
# Create a security admin rule using network groups in Azure Virtual Network Manager
14+
15+
In Azure Virtual Network Manager, you can deploy [security admin rules](./concept-security-admins.md) using [network groups](./concept-network-groups.md). Security admin rules and network groups allow you to define the source and destination of the traffic for the security admin rule.
16+
17+
In this article, you learn how to create a security admin rule using network groups in Azure Virtual Network Manager. You use the Azure portal to create a security admin configuration, add a security admin rule, and deploy the security admin configuration.
18+
19+
[!INCLUDE [virtual-network-manager-preview](../../includes/virtual-network-manager-network-groups-source-destination-preview.md)]
20+
21+
## Prerequisites
22+
23+
To complete this article, you need the following resources:
24+
25+
- An Azure subscription. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
26+
27+
- An Azure Virtual Network Manager instance. If you don't have an instance, see [Create an Azure Virtual Network Manager instance](create-virtual-network-manager-portal.md).
28+
29+
- A network group. If you don't have a network group, see [Create a network group](create-virtual-network-manager-portal.md#create-a-network-group).
30+
31+
## Create a security admin configuration
32+
33+
To create a security admin configuration, follow these steps:
34+
35+
1. In the **Azure portal**, search for and select **Virtual Network Manager**.
36+
37+
1. Select **Network Managers** under **Virtual network manager** on the left side of the portal window.
38+
39+
1. In the **Virtual Network Manager | Network managers** window, select your network manager instance.
40+
41+
1. Select **Configuration** under **Settings** on the left side of the portal window.
42+
43+
1. In the **Configurations** window, select the **Create security admin configuration** button or **+ Create > Security admin configuration** from the drop-down menu.
44+
45+
:::image type="content" source="media/how-to-create-security-admin-rules-network-groups/create-security-admin-configuration.png" alt-text="Screenshot of creation of security admin configuration in Configurations of a network manager.":::
46+
47+
1. In the **Basics** tab of the **Create security admin configuration** windows, enter the following settings:
48+
49+
| **Setting** | **Value** |
50+
| --- | --- |
51+
| Name | Enter a name for the security admin rule. |
52+
| Description | Enter a description for the security admin rule. |
53+
54+
55+
1. Select the **Deployment Options** tab or **Next: Deployment Options >** and enter the following settings:
56+
57+
| **Setting** | **Value** |
58+
| --- | --- |
59+
| **Deployment option for NIP virtual networks** | |
60+
| Deployment option | Select **None**. |
61+
| **Option to use network group as source and destination** | |
62+
| Network group address space aggregation option | Select **Manual**. |
63+
64+
:::image type="content" source="media/how-to-create-security-admin-rules-network-groups/create-configuration-with-aggregation-options.png" alt-text="Screenshot of create a security admin configuration deployment options selecting manual aggregation option.":::
65+
66+
1. Select **Rule collections** or **Next: Rule collections >**.
67+
2. In the Rule collections tab, select **Add**.
68+
3. In the **Add a rule collection** window, enter the following settings:
69+
70+
| **Setting** | **Value** |
71+
| --- | --- |
72+
| Name | Enter a name for the rule collection. |
73+
| Target network groups | Select the network group that contains the source and destination of the traffic for the security admin rule. |
74+
75+
1. Select **Add** and enter the following settings in the **Add a rule** window:
76+
77+
| **Setting** | **Value** |
78+
| --- | --- |
79+
| Name | Enter a name for the security admin rule. |
80+
| Description | Enter a description for the security admin rule. |
81+
| Priority | Enter a priority for the security admin rule. |
82+
| Action | Select the action type for the security admin rule. |
83+
| Direction | Select the direction for the security admin rule. |
84+
| Protocol | Select the protocol for the security admin rule. |
85+
| **Source** | |
86+
| Source type | Select **Network group**. |
87+
| Source port | Enter the source port for the security admin rule. |
88+
| **Destination** | |
89+
| Destination type | Select **Network Group**. |
90+
| Network Group | Select the network group ID that you wish to use for dynamically establishing IP address ranges. |
91+
| Destination port | Enter the destination port for the security admin rule. |
92+
93+
:::image type="content" source="media/how-to-create-security-admin-rules-network-groups/create-network-group-as-source-destination-rule.png" alt-text="Screenshot of add a rule window using network groups as source and destination in rule creation.":::
94+
95+
2. Select **Add** and **Add** again to add the security admin rule to the rule collection.
96+
97+
3. Select **Review + create** and then select **Create**.
98+
99+
## Deploy the security admin configuration
100+
101+
Use the following steps to deploy the security admin configuration:
102+
103+
1. Return to the **Configurations** window and select the security admin configuration you created.
104+
105+
1. Select your security admin configuration and then select **Deploy**.
106+
107+
1. In **Deploy security admin configuration**, select the target Azure regions for security admin configuration and select **Next > Deploy**.
108+
109+
## Next step
110+
111+
> [!div class="nextstepaction"]
112+
> [View configurations applied by Azure Virtual Network Manager](how-to-view-applied-configurations.md)
113+
114+
115+
Loading
Loading
Loading
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: include file
3+
description: include file
4+
services: virtual-network-manager
5+
author: mbender
6+
ms.service: virtual-network-manager
7+
ms.topic: include
8+
ms.date: 04/01/2024
9+
ms.author: mbender-ms
10+
ms.custom: include-file
11+
---
12+
13+
> [!IMPORTANT]
14+
> The creation of security admin rules with network groups as source and destination in Azure Virtual Network Manager is in public preview. Public previews are made available to you on the condition that you agree to the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/). Some features might not be supported or might have constrained capabilities. This preview version is provided without a service level agreement, and it's not recommended for production workloads.
15+
16+
[!INCLUDE [virtual-network-manager-preview](virtual-network-manager-preview.md)]

0 commit comments

Comments
 (0)