You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/concept-ip-address-management.md
+13-12Lines changed: 13 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-virtual-network-manager
7
7
ms.topic: how-to
8
-
ms.date: 01/16/2024
8
+
ms.date: 02/05/2025
9
9
ms.custom: references_regions
10
10
#customer intent: As a network administrator, I want to learn about IP address management in Azure Virtual Network Manager so that I can manage IP addresses in my virtual networks.
11
11
---
@@ -22,9 +22,9 @@ In Azure Virtual Network Manager, IP address management (IPAM) helps you central
22
22
23
23
- Create pools for IP address planning.
24
24
25
-
-Automatically assign nonoverlapped CIDRs to Azure resources.
25
+
-Autoassign nonoverlapped CIDRs to Azure resources.
26
26
27
-
-Reserve IPs for specific needs.
27
+
-Create reserved IPs for specific needs.
28
28
29
29
- Prevent Azure address space from overlapping on-premises and cloud environments.
30
30
@@ -42,37 +42,38 @@ The IPAM feature in Azure Virtual Network Manager works through the following ke
42
42
43
43
### Manage IP address pools
44
44
45
-
IPAM allows network administrators to plan and organize IP address usage by creating pools with address spaces and respective sizes. These pools act as containers for groups of CIDRs, enabling logical grouping for specific networking purposes. You can create a structured hierarchy of pools, dividing a larger pool into smaller, more manageable pools, aiding in more granular control and organization of your network's IP address space.
45
+
IPAM allows network administrators to plan and organize IP address usage by creating pools with address spaces and respective sizes. These pools act as containers for groups of CIDRs, enabling logical grouping for specific networking purposes. You can create a structured hierarchy of pools by dividing a larger pool into smaller, more manageable pools. This hierarchy provides more granular control and organization of your network's IP address space.
46
46
47
47
There are two types of pools in IPAM:
48
-
- Root pool: The first pool created in your instance is the root pool. This represents your entire IP address range.
49
-
- Child pool: A child pool is a subset of the root pool or another child pool. You can create multiple child pools within a root pool or another child pool. You can have up to seven layers of pools
48
+
-**Root pool**: The first pool created in your instance is the root pool. This represents your entire IP address range.
49
+
-**Child pool**: A child pool is a subset of the root pool or another child pool. You can create multiple child pools within a root pool or another child pool. You can have up to seven layers of pools
50
50
51
51
### Allocating IP addresses to Azure resources
52
52
53
-
When it comes to allocation, you can assign Azure resources with CIDRs, such as virtual networks, to a specific pool. This helps in identifying which CIDRs are currently in use. There's also the option to allocate static CIDRs to a pool, useful for occupying CIDRs that are either not currently in use within Azure or are part of Azure resources not yet supported by the IPAM service. Allocated CIDRs are released back to the pool if the associated resource is removed or deleted, ensuring efficient utilization and management of the IP space.
53
+
You can allocate Azure resources, such as virtual networks, to a specific pool with CIDRs. This helps in identifying which CIDRs are currently in use. There's also the option to allocate static CIDRs to a pool, useful for occupying CIDRs that are either not currently in use within Azure or are part of Azure resources not yet supported by the IPAM service. Allocated CIDRs are released back to the pool if the associated resource is removed or deleted, ensuring efficient utilization and management of the IP space.
54
54
55
55
### Delegating permissions for IPAM
56
56
57
57
With IPAM, you can delegate permission to other users to utilize the IP address pools, ensuring controlled access and management while democratizing pool allocation. These permissions allow users to see the pools they have access to, aiding in choosing the right pool for their needs.
58
58
59
59
Delegating permissions also allows others to view usage statistics and lists of resources associated with the pool. Within your network manager, complete usage statistics are available including:
60
-
- The total number of IPs in pool.
61
-
- The percentage of allocated pool space.
60
+
61
+
- The total number of IPs in pool.
62
+
- The percentage of allocated pool space.
62
63
63
64
Additionally, it shows details for pools and resources associated with pools, giving a complete overview of the IP usages and aiding in better resource management and planning.
64
65
65
66
### Simplifying resource creation
66
67
67
-
When creating CIDR-supporting resources like virtual networks, CIDRs are automatically allocated from the selected pool, simplifying the resource creation process. The system ensures that the automatically allocated CIDRs don't overlap within the pool, maintaining network integrity and preventing conflicts.
68
+
When you create CIDR-supporting resources like virtual networks, CIDRs are automatically allocated from the selected pool, simplifying the resource creation process. The system ensures that the automatically allocated CIDRs don't overlap within the pool, maintaining network integrity and preventing conflicts.
68
69
69
70
## Permission requirements for IPAM in Azure Virtual Network Manager
70
71
71
-
When using IPAM, the **IPAM Pool User** role alone is sufficient for delegation. During the public preview, you also need to grant **Network Manager Read** access to ensure full discoverability of IP address pools and virtual networks across the Network Manager's scope. Without this role, users with only the **IPAM Pool User** role won't see available pools and virtual networks.
72
+
The **IPAM Pool User** role alone is sufficient for delegation when using IPAM. If permission issues arise, you also need to grant **Network Manager Read** access to ensure full discoverability of IP address pools and virtual networks across the Network Manager's scope. Without this role, users with only the **IPAM Pool User** role don't see available pools and virtual networks.
72
73
73
74
Learn more about [Azure role-based access control (Azure RBAC)](../role-based-access-control/overview.md).
74
75
75
76
## Next steps
76
77
77
78
> [!div class="nextstepaction"]
78
-
> [Learn how to manage IP addresses in Azure Virtual Network Manager](./how-to-manage-ip-addresses-network-manager.md)
79
+
> [Learn how to manage IP addresses in Azure Virtual Network Manager](./how-to-manage-ip-addresses-network-manager.md)
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/concept-security-admins.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
2
title: 'Security admin rules in Azure Virtual Network Manager'
3
-
description: Learn about what security admin rules are in Azure Virtual Network Manager, how they work, and how traffic rules are evaluated including nonapplication of security admin rules and exceptions.
3
+
description: Learn about what security admin rules in Azure Virtual Network Manager, how they work, and how traffic rules are evaluated. This includes nonapplication of security admin rules and exceptions.
4
4
author: mbender-ms
5
5
ms.author: mbender
6
6
ms.service: azure-virtual-network-manager
7
7
ms.topic: concept-article
8
-
ms.date: 12/07/2023
8
+
ms.date: 02/04/2025
9
9
---
10
10
11
11
# Security admin rules in Azure Virtual Network Manager
@@ -14,7 +14,7 @@ In this article, you learn about security admin rules in Azure Virtual Network M
14
14
15
15
## What is a security admin rule?
16
16
17
-
Security admin rules are global network security rules that enforce security policies defined in the rule collection on virtual networks. These rules can be used to Allow, Always Allow, or Deny traffic across virtual networks within your targeted network groups. These network groups can only consist of virtual networks within the scope of your virtual network manager instance. Security admin rules can't apply to virtual networks not managed by a virtual network manager.
17
+
Security admin rules are global network security rules that enforce security policies defined in the rule collection on virtual networks. These rules can be used to *Allow*, *Always Allow*, or *Deny* traffic across virtual networks within your targeted network groups. These network groups can only consist of virtual networks within the scope of your virtual network manager instance. Security admin rules can't apply to virtual networks not managed by a virtual network manager.
18
18
19
19
Here are some scenarios where security admin rules can be used:
20
20
@@ -29,7 +29,7 @@ Here are some scenarios where security admin rules can be used:
29
29
With Azure Virtual Network Manager, you have a centralized location to manage security admin rules. Centralization allows you to define security policies at scale and apply them to multiple virtual networks at once.
30
30
31
31
> [!NOTE]
32
-
> Currently, security admin rules do not apply to private endpoints that fall under the scope of a managed virtual network.
32
+
> Currently, security admin rules don't apply to private endpoints that fall under the scope of a managed virtual network.
33
33
34
34
## How do security admin rules work?
35
35
@@ -49,7 +49,7 @@ To enforce security policies across multiple virtual networks, you [create and d
49
49
50
50
Security admin rules and network security groups (NSGs) can be used to enforce network security policies in Azure. However, they have different scopes and priorities.#
51
51
52
-
Security admin rules are intended to be used by network admins of a central governance team, thereby delegating NSG rules to individual application or service teams to further specify security as needed. Security admin rules have a higher priority than NSGs and are evaluated before NSG rules.
52
+
Security admin rules are intended to be used by network admins of a central governance team. This allows individual application or service teams to further specify security as needed with NSGs. Security admin rules have a higher priority than NSGs and are evaluated before NSG rules.
53
53
54
54
NSGs, on the other hand, are used to filter network traffic to and from individual subnets or network interfaces. They're intended to be used by individual application or service teams to further specify security as needed. NSGs have a lower priority than security admin rules and are evaluated after security admin rules.
55
55
@@ -69,7 +69,7 @@ If you create an *Always Allow* or *Deny* rule, traffic evaluation is terminated
69
69
By using security admin rules and NSGs together, you can enforce network security policies at both the global and individual levels, ensuring that your virtual networks are secure and compliant with your organization's security policies.
70
70
71
71
> [!IMPORTANT]
72
-
> When security admin rules are deployed, the eventual consistency model is used. This means that security admin rules will be eventually applied to the resources contained in a virtual network after a short delay.Resources that are added to a virtual network that already has security admin rules applied on it will eventually receive those same security admin rules with a delay as well.
72
+
> When security admin rules are deployed, the eventual consistency model is used. This means that security admin rules will be eventually applied to the resources contained in a virtual network after a short delay.Resources that are added to a virtual network that have security admin rules applied on it will eventually receive those same security admin rules with a delay as well.
73
73
74
74
## Benefits of security admin rules
75
75
@@ -128,8 +128,8 @@ When a virtual network contains these services, the security admin rules skip th
128
128
You can create a security configuration with *Allow* rules only and deploy it to your virtual networks with [Azure PowerShell](/powershell/module/az.network/new-aznetworkmanagersecurityadminconfiguration#example-1) and [Azure CLI](/cli/azure/network/manager/security-admin-config#az-network-manager-security-admin-config-create-examples).
129
129
130
130
> [!NOTE]
131
-
> When multiple Azure Virtual Network Manager instances apply different settings in the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` class to the same virtual network, the setting of the network manager instance with the highest scope will be used.
132
-
> Let's say you have two virtual network managers. The first network manager is scoped to the root management group and has a security configuration with set to *AllowRulesOnly* in the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` class. The second virtual network manager is scoped to a subscription under the root management group and uses the default field of *None* in its security configuration. When both configurations apply security admin rules to the same virtual network, the *AllowRulesOnly* setting will be applied to the virtual network.
131
+
> When multiple Azure Virtual Network Manager instances apply different settings in the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` class to the same virtual network, the setting of the network manager instance with the highest scope is used.
132
+
> Let's say you have two virtual network managers. The first network manager is scoped to the root management group and has a security configuration with set to *AllowRulesOnly* in the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` class. The second virtual network manager is scoped to a subscription under the root management group and uses the default field of *None* in its security configuration. When both configurations apply security admin rules to the same virtual network, the *AllowRulesOnly* setting is applied to the virtual network.
133
133
134
134
### Nonapplication of security admin rules at subnet level
135
135
@@ -146,7 +146,7 @@ Similarly, some services don't apply security admin rules at the subnet level wh
146
146
In this case, security admin rules don't affect the resources in the subnet with these services. However, other subnets within the same virtual network have security admin rules applied to them.
147
147
148
148
> [!NOTE]
149
-
> If you want to apply security admin rules on subnets containing an Azure Application Gateway, ensure each subnet only contains gateways that have been provisioned with [network isolation](../application-gateway/application-gateway-private-deployment.md) enabled. If a subnet contains an Azure Application Gateway without network isolation, security admin rules won't be applied to this subnet.
149
+
> If you want to apply security admin rules on subnets containing an Azure Application Gateway, ensure each subnet only contains gateways that are provisioned with [network isolation](../application-gateway/application-gateway-private-deployment.md) enabled. If a subnet contains an Azure Application Gateway without network isolation, security admin rules aren't applied to this subnet.
150
150
151
151
## Security admin fields
152
152
@@ -188,7 +188,7 @@ Protocols currently supported with security admin rules are:
188
188
#### Source and destination types
189
189
190
190
***IP addresses**: You can provide IPv4 or IPv6 addresses or blocks of address in CIDR notation. To list multiple IP address, separate each IP address with a comma.
191
-
***Service Tag**: You can define specific service tags based on regions or a whole service. See the public documentation on [available service tags](../virtual-network/service-tags-overview.md#available-service-tags) for the list of supported tags. Out of this list, security admin rules currently do not support the AzurePlatformDNS, AzurePlatformIMDS, and AzurePlatformLKM service tags.
191
+
***Service Tag**: You can define specific service tags based on regions or a whole service. See the public documentation on [available service tags](../virtual-network/service-tags-overview.md#available-service-tags) for the list of supported tags. Out of this list, security admin rules currently don't support the AzurePlatformDNS, AzurePlatformIMDS, and AzurePlatformLKM service tags.
192
192
193
193
#### Source and destination ports
194
194
@@ -208,4 +208,4 @@ You can define specific common ports to block from the source or to the destinat
208
208
209
209
## Next steps
210
210
> [!div class="nextstepaction"]
211
-
> Learn how to block network traffic with a [Security admin configuration](how-to-block-network-traffic-portal.md).
211
+
> Learn how to block network traffic with a [Security admin configuration](how-to-block-network-traffic-portal.md).
@@ -38,13 +38,13 @@ In this article, you learn how to:
38
38
## Prerequisites
39
39
40
40
-[Install and configure Terraform](/azure/developer/terraform/quickstart-configure)
41
-
- To modify dynamic network groups, you must be [granted access via Azure RBAC role](concept-network-groups.md#network-groups-and-azure-policy) assignment only. Classic Admin/legacy authorization is not supported
41
+
- To modify dynamic network groups, you must be [granted access via Azure RBAC role](concept-network-groups.md#network-groups-and-azure-policy) assignment only. Classic Admin/legacy authorization isn't supported
42
42
43
43
:::zone pivot="sub"
44
44
45
45
## Implement the Terraform code
46
46
47
-
This code sample will implement Azure Virtual Network Manager at the subscription scope.
47
+
This code sample implements Azure Virtual Network Manager at the subscription scope.
48
48
49
49
> [!NOTE]
50
50
> The sample code for this article is located in the [Azure Terraform GitHub repo](https://github.com/Azure/terraform/tree/master/quickstart/101-virtual-network-manager-create-mesh). You can view the log file containing the [test results from current and previous versions of Terraform](https://github.com/Azure/terraform/tree/master/quickstart/101-virtual-network-manager-create-mesh/TestRecord.md).
@@ -131,7 +131,7 @@ This code sample will implement Azure Virtual Network Manager at the management
131
131
terraform output virtual_network_names
132
132
```
133
133
134
-
1. For each virtual network name printed in the previous step, run [az network manager list-effective-connectivity-config](/cli/azure/network/manager#az-network-manager-list-effective-connectivity-config) to print the effective (applied) configurations. Replace the `<virtual_network_name>` placeholder with the vnet name.
134
+
1. For each virtual network name printed in the previous step, run [az network manager list-effective-connectivity-config](/cli/azure/network/manager#az-network-manager-list-effective-connectivity-config) to print the effective (applied) configurations. Replace the `<virtual_network_name>` placeholder with the virtual network name.
135
135
136
136
```azurecli
137
137
az network manager list-effective-connectivity-config \
@@ -153,7 +153,7 @@ This code sample will implement Azure Virtual Network Manager at the management
153
153
Get-AzResourceGroup -Name $resource_group_name
154
154
```
155
155
156
-
1. For each virtual network name printed in the previous step, run [Get-AzNetworkManagerEffectiveConnectivityConfiguration](/powershell/module/az.network/get-aznetworkmanagereffectiveconnectivityconfiguration) to print the effective (applied) configurations. Replace the `<virtual_network_name>` placeholder with the vnet name.
156
+
1. For each virtual network name printed in the previous step, run [Get-AzNetworkManagerEffectiveConnectivityConfiguration](/powershell/module/az.network/get-aznetworkmanagereffectiveconnectivityconfiguration) to print the effective (applied) configurations. Replace the `<virtual_network_name>` placeholder with the virtual network name.
0 commit comments