Skip to content

Commit 5a87387

Browse files
Merge pull request #271054 from mbender-ms/avnm-ng-src-dest-v2
virtual network manager - New Article - Network Groups as Source and Destination
2 parents 8c90a0f + 09716be commit 5a87387

File tree

6 files changed

+182
-3
lines changed

6 files changed

+182
-3
lines changed

articles/virtual-network-manager/TOC.yml

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@
5353
href: concept-security-admins.md
5454
- name: Security admin rule enforcement
5555
href: concept-enforcement.md
56+
- name: Network groups as source and destination
57+
href: concept-security-admin-rules-network-group.md
5658
- name: Deployments
5759
href: concept-deployments.md
5860
- name: Remove or update components
@@ -71,8 +73,10 @@
7173
href: resource-manager-template-samples.md
7274
- name: How-to guides
7375
items:
74-
- name: Secure network traffic
76+
- name: Secure network traffic with security admin rules
7577
items:
78+
- name: Using network groups as source and destination
79+
href: how-to-create-security-admin-rule-network-group.md
7680
- name: Block network traffic - Portal
7781
href: how-to-block-network-traffic-portal.md
7882
- name: Block network traffic -PowerShell
@@ -93,8 +97,6 @@
9397
href: how-to-create-mesh-network.md
9498
- name: Azure PowerShell
9599
href: how-to-create-mesh-network-powershell.md
96-
- Name: Security admin rules
97-
items:
98100
- name: Cross-tenant connection support
99101
items:
100102
- name: Configure cross-tenant connection - Portal
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
title: 'Using network groups with security admin rules'
3+
titleSuffix: Azure Virtual Network Manager
4+
description: Learn how a network administrator can deploy security admin rules using network groups as the source and destination in Azure Virtual Network Manager.
5+
author: mbender-ms
6+
ms.author: mbender
7+
ms.service: virtual-network-manager
8+
ms.topic: conceptual
9+
ms.date: 04/15/2024
10+
ms.custom: template-concept, engagement-fy23, references_regions
11+
#customer intent: As a network administrator, I want to deploy security admin rules in Azure Virtual Network Manager. When creating security admin rules, I want to define network groups as the source and destination of traffic.
12+
---
13+
14+
# Using network groups with security admin rules
15+
16+
In this article, you learn how to use network groups with security admin rules in Azure Virtual Network Manager (AVNM). Network groups allow you to create logical groups of virtual networks and subnets that have common attributes, such as environment, region, service type, and more. You can then specify your network groups as the source and/or destination of your security admin rules so that you can enforce the traffic among your grouped network resources. This feature streamlines the process of securing your traffic across workloads and environments, as it removes the manual step of specifying individual Classless Inter-Domain Routing (CIDR) ranges or resource IDs.
17+
18+
[!INCLUDE [virtual-network-manager-network-groups-source-destination-preview](../../includes/virtual-network-manager-network-groups-source-destination-preview.md)]
19+
20+
## Why use network groups with security admin rules?
21+
22+
Using network groups with security admin rules allows you to define the source and destination of the traffic for the security admin rule. This feature streamlines the process of securing your traffic across workloads and environments by aggregating the CIDR ranges of the network groups to your virtual network manager instance. Aggregation to a virtual network manager removes the manual step of specifying individual CIDR ranges or resource IDs.
23+
24+
For example, you need to ensure traffic is denied between your production and nonproduction environments represented by two separate network groups. Create a security admin rule with an action type of
25+
**Deny**.
26+
Specify one network group as the target for your rule collection, these virtual networks will receive the configured rules. Then select the direction of the traffic you want to deny and use the other network group as the corresponding source / destination. You can enforce the traffic between your grouped network resources without the need to specify individual CIDR ranges or resource IDs.
27+
28+
## How do I deploy a security admin rule using network groups?
29+
30+
From the Azure portal, you can [deploy a security admin rule using network groups](./how-to-create-security-admin-rule-network-groups.md) in the Azure portal. To create a security admin rule, create a security admin configuration and add a security admin rule that utilizes network groups as source and destination. This is done by electing to use *Manual* for the **Network group address space aggregation option** setting in the configuration. Once elected, the virtual network manager instance will aggregate the CIDR ranges of the network groups referenced as the source and destination of the security admin rules in the configuration.
31+
32+
Finally, deploy the security admin configuration and the rules apply to the network group resources. With the *Manual* aggregation option, the CIDR ranges in the network group are aggregated only when you deploy the security admin configuration. This allows you to commit the CIDR ranges on your schedule.
33+
34+
If you change the resources in your network group or a network group's CIDR range changes, you need to redeploy the security configuration after the changes are made. After deployment, the new CIDR ranges will be applied across your network to all new and existing network group resources.
35+
36+
## Supported regions
37+
38+
During the public preview, network groups with security admin rules are supported in all regions where Azure Virtual Network Manager is available.
39+
40+
## Limitations of network groups with security admin rules
41+
42+
The following limitations apply when using network groups with security admin rules:
43+
44+
- Only supports manual aggregation of CIDRs in a network group. The CIDR range in a rule only changes upon the customer commit. This means The CIDR range within a rule remains unchanged until the customer commits.
45+
46+
- Supports 100 networking resources (virtual networks or subnets) in any one network group referenced in the security admin rule.
47+
48+
- CIDR ranges for network groups members can be either Ipv4 or Ipv6 CIDRs, but not both in the same group. If Ipv4 and Ipv6 ranges are present in the same group, your virtual network manager only uses the IPv4 ranges.
49+
50+
- Role-based access control ownership is inferred from the `Microsoft.Network/networkManagers/securityAdminConfigurations/rulecollections/rules/write` permission only.
51+
52+
- Network groups must have the same member-types. Virtual networks and subnets are supported but must be in separate network groups.
53+
54+
- Force-delete of any network group used as the source and/or destination in a security admin rule isn't currently supported. Usage causes an error.
55+
56+
## Next steps
57+
58+
> [!div class="nextstepaction"]
59+
> [Create a security admin rule using network groups](./how-to-create-security-admin-rule-network-groups.md)
Lines changed: 118 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,118 @@
1+
---
2+
title: Create a security admin rule using network groups
3+
titleSuffix: Azure Virtual Network Manager
4+
description: Learn how to deploy security admin rules using network groups as the source and destination in Azure Virtual Network Manager.
5+
author: mbender-ms
6+
ms.author: mbender
7+
ms.service: virtual-network-manager
8+
ms.topic: how-to
9+
ms.date: 04/17/2024
10+
ms.custom: template-how-to, references_regions
11+
#Customer intent: As a network administrator, I want to deploy security admin rules using network groups in Azure Virtual Network Manager so that I can define the source and destination of the traffic for the security admin rule.
12+
---
13+
# Create a security admin rule using network groups in Azure Virtual Network Manager
14+
15+
In this article, you learn how to create a security admin rule using network groups in Azure Virtual Network Manager. You use the Azure portal to create a security admin configuration, add a security admin rule, and deploy the security admin configuration.
16+
17+
In Azure Virtual Network Manager, you can deploy [security admin rules](./concept-security-admins.md) using [network groups](./concept-network-groups.md). Security admin rules and network groups allow you to define the source and destination of the traffic for the security admin rule.
18+
19+
[!INCLUDE [virtual-network-manager-preview](../../includes/virtual-network-manager-network-groups-source-destination-preview.md)]
20+
21+
## Prerequisites
22+
23+
To complete this article, you need the following resources:
24+
25+
- An Azure subscription. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/) before you begin.
26+
27+
- An Azure Virtual Network Manager instance. If you don't have an instance, see [Create an Azure Virtual Network Manager instance](create-virtual-network-manager-portal.md).
28+
29+
- A network group. If you don't have a network group, see [Create a network group](create-virtual-network-manager-portal.md#create-a-network-group).
30+
31+
## Create a security admin configuration
32+
33+
To create a security admin configuration, follow these steps:
34+
35+
1. In the **Azure portal**, search for and select **Virtual Network Manager**.
36+
37+
1. Select **Network Managers** under **Virtual network manager** on the left side of the portal window.
38+
39+
1. In the **Virtual Network Manager | Network managers** window, select your network manager instance.
40+
41+
1. Select **Configuration** under **Settings** on the left side of the portal window.
42+
43+
1. In the **Configurations** window, select the **Create security admin configuration** button or **+ Create > Security admin configuration** from the drop-down menu.
44+
45+
:::image type="content" source="media/how-to-create-security-admin-rules-network-groups/create-security-admin-configuration.png" alt-text="Screenshot of creation of security admin configuration in Configurations of a network manager.":::
46+
47+
1. In the **Basics** tab of the **Create security admin configuration** windows, enter the following settings:
48+
49+
| **Setting** | **Value** |
50+
| --- | --- |
51+
| Name | Enter a name for the security admin rule. |
52+
| Description | Enter a description for the security admin rule. |
53+
54+
55+
1. Select the **Deployment Options** tab or **Next: Deployment Options >** and enter the following settings:
56+
57+
| **Setting** | **Value** |
58+
| --- | --- |
59+
| **Deployment option for NIP virtual networks** | |
60+
| Deployment option | Select **None**. |
61+
| **Option to use network group as source and destination** | |
62+
| Network group address space aggregation option | Select **Manual**. |
63+
64+
:::image type="content" source="media/how-to-create-security-admin-rules-network-groups/create-configuration-with-aggregation-options.png" alt-text="Screenshot of create a security admin configuration deployment options selecting manual aggregation option.":::
65+
66+
> [!NOTE]
67+
> The **Network group address space aggregation option** setting allows you to reference network groups in your security admin rules. Once elected, the virtual network manager instance will aggregate the CIDR ranges of the network groups referenced as the source and destination of the security admin rules in the configuration. With the manual aggregation option, the CIDR ranges in the network group are aggregated only when you deploy the security admin configuration. This allows you to commit the CIDR ranges on your schedule.
68+
69+
2. Select **Rule collections** or **Next: Rule collections >**.
70+
3. In the Rule collections tab, select **Add**.
71+
4. In the **Add a rule collection** window, enter the following settings:
72+
73+
| **Setting** | **Value** |
74+
| --- | --- |
75+
| Name | Enter a name for the rule collection. |
76+
| Target network groups | Select the network group that contains the source and destination of the traffic for the security admin rule. |
77+
78+
5. Select **Add** and enter the following settings in the **Add a rule** window:
79+
80+
| **Setting** | **Value** |
81+
| --- | --- |
82+
| Name | Enter a name for the security admin rule. |
83+
| Description | Enter a description for the security admin rule. |
84+
| Priority | Enter a priority for the security admin rule. |
85+
| Action | Select the action type for the security admin rule. |
86+
| Direction | Select the direction for the security admin rule. |
87+
| Protocol | Select the protocol for the security admin rule. |
88+
| **Source** | |
89+
| Source type | Select **Network group**. |
90+
| Source port | Enter the source port for the security admin rule. |
91+
| **Destination** | |
92+
| Destination type | Select **Network Group**. |
93+
| Network Group | Select the network group ID that you wish to use for dynamically establishing IP address ranges. |
94+
| Destination port | Enter the destination port for the security admin rule. |
95+
96+
:::image type="content" source="media/how-to-create-security-admin-rules-network-groups/create-network-group-as-source-destination-rule.png" alt-text="Screenshot of add a rule window using network groups as source and destination in rule creation.":::
97+
98+
6. Select **Add** and **Add** again to add the security admin rule to the rule collection.
99+
100+
7. Select **Review + create** and then select **Create**.
101+
102+
## Deploy the security admin configuration
103+
104+
Use the following steps to deploy the security admin configuration:
105+
106+
1. Return to the **Configurations** window and select the security admin configuration you created.
107+
108+
1. Select your security admin configuration and then select **Deploy**.
109+
110+
1. In **Deploy security admin configuration**, select the target Azure regions for security admin configuration and select **Next > Deploy**.
111+
112+
## Next step
113+
114+
> [!div class="nextstepaction"]
115+
> [View configurations applied by Azure Virtual Network Manager](how-to-view-applied-configurations.md)
116+
117+
118+
Loading
Loading
Loading

0 commit comments

Comments
 (0)