Skip to content

Commit 8cc9262

Browse files
authored
Merge pull request #294127 from mbender-ms/patch-609799
virtual network manager | Maintenance | February 2025
2 parents 7f0a131 + a49e506 commit 8cc9262

File tree

4 files changed

+34
-33
lines changed

4 files changed

+34
-33
lines changed

articles/virtual-network-manager/concept-ip-address-management.md

Lines changed: 13 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: azure-virtual-network-manager
77
ms.topic: how-to
8-
ms.date: 01/16/2024
8+
ms.date: 02/05/2025
99
ms.custom: references_regions
1010
#customer intent: As a network administrator, I want to learn about IP address management in Azure Virtual Network Manager so that I can manage IP addresses in my virtual networks.
1111
---
@@ -22,9 +22,9 @@ In Azure Virtual Network Manager, IP address management (IPAM) helps you central
2222

2323
- Create pools for IP address planning.
2424

25-
- Automatically assign nonoverlapped CIDRs to Azure resources.
25+
- Autoassign nonoverlapped CIDRs to Azure resources.
2626

27-
- Reserve IPs for specific needs.
27+
- Create reserved IPs for specific needs.
2828

2929
- Prevent Azure address space from overlapping on-premises and cloud environments.
3030

@@ -42,37 +42,38 @@ The IPAM feature in Azure Virtual Network Manager works through the following ke
4242

4343
### Manage IP address pools
4444

45-
IPAM allows network administrators to plan and organize IP address usage by creating pools with address spaces and respective sizes. These pools act as containers for groups of CIDRs, enabling logical grouping for specific networking purposes. You can create a structured hierarchy of pools, dividing a larger pool into smaller, more manageable pools, aiding in more granular control and organization of your network's IP address space.
45+
IPAM allows network administrators to plan and organize IP address usage by creating pools with address spaces and respective sizes. These pools act as containers for groups of CIDRs, enabling logical grouping for specific networking purposes. You can create a structured hierarchy of pools by dividing a larger pool into smaller, more manageable pools. This hierarchy provides more granular control and organization of your network's IP address space.
4646

4747
There are two types of pools in IPAM:
48-
- Root pool: The first pool created in your instance is the root pool. This represents your entire IP address range.
49-
- Child pool: A child pool is a subset of the root pool or another child pool. You can create multiple child pools within a root pool or another child pool. You can have up to seven layers of pools
48+
- **Root pool**: The first pool created in your instance is the root pool. This represents your entire IP address range.
49+
- **Child pool**: A child pool is a subset of the root pool or another child pool. You can create multiple child pools within a root pool or another child pool. You can have up to seven layers of pools
5050

5151
### Allocating IP addresses to Azure resources
5252

53-
When it comes to allocation, you can assign Azure resources with CIDRs, such as virtual networks, to a specific pool. This helps in identifying which CIDRs are currently in use. There's also the option to allocate static CIDRs to a pool, useful for occupying CIDRs that are either not currently in use within Azure or are part of Azure resources not yet supported by the IPAM service. Allocated CIDRs are released back to the pool if the associated resource is removed or deleted, ensuring efficient utilization and management of the IP space.
53+
You can allocate Azure resources, such as virtual networks, to a specific pool with CIDRs. This helps in identifying which CIDRs are currently in use. There's also the option to allocate static CIDRs to a pool, useful for occupying CIDRs that are either not currently in use within Azure or are part of Azure resources not yet supported by the IPAM service. Allocated CIDRs are released back to the pool if the associated resource is removed or deleted, ensuring efficient utilization and management of the IP space.
5454

5555
### Delegating permissions for IPAM
5656

5757
With IPAM, you can delegate permission to other users to utilize the IP address pools, ensuring controlled access and management while democratizing pool allocation. These permissions allow users to see the pools they have access to, aiding in choosing the right pool for their needs.
5858

5959
Delegating permissions also allows others to view usage statistics and lists of resources associated with the pool. Within your network manager, complete usage statistics are available including:
60-
- The total number of IPs in pool.
61-
- The percentage of allocated pool space.
60+
61+
- The total number of IPs in pool.
62+
- The percentage of allocated pool space.
6263

6364
Additionally, it shows details for pools and resources associated with pools, giving a complete overview of the IP usages and aiding in better resource management and planning.
6465

6566
### Simplifying resource creation
6667

67-
When creating CIDR-supporting resources like virtual networks, CIDRs are automatically allocated from the selected pool, simplifying the resource creation process. The system ensures that the automatically allocated CIDRs don't overlap within the pool, maintaining network integrity and preventing conflicts.
68+
When you create CIDR-supporting resources like virtual networks, CIDRs are automatically allocated from the selected pool, simplifying the resource creation process. The system ensures that the automatically allocated CIDRs don't overlap within the pool, maintaining network integrity and preventing conflicts.
6869

6970
## Permission requirements for IPAM in Azure Virtual Network Manager
7071

71-
When using IPAM, the **IPAM Pool User** role alone is sufficient for delegation. During the public preview, you also need to grant **Network Manager Read** access to ensure full discoverability of IP address pools and virtual networks across the Network Manager's scope. Without this role, users with only the **IPAM Pool User** role won't see available pools and virtual networks.
72+
The **IPAM Pool User** role alone is sufficient for delegation when using IPAM. If permission issues arise, you also need to grant **Network Manager Read** access to ensure full discoverability of IP address pools and virtual networks across the Network Manager's scope. Without this role, users with only the **IPAM Pool User** role don't see available pools and virtual networks.
7273

7374
Learn more about [Azure role-based access control (Azure RBAC)](../role-based-access-control/overview.md).
7475

7576
## Next steps
7677

7778
> [!div class="nextstepaction"]
78-
> [Learn how to manage IP addresses in Azure Virtual Network Manager](./how-to-manage-ip-addresses-network-manager.md)
79+
> [Learn how to manage IP addresses in Azure Virtual Network Manager](./how-to-manage-ip-addresses-network-manager.md)

articles/virtual-network-manager/concept-security-admins.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
title: 'Security admin rules in Azure Virtual Network Manager'
3-
description: Learn about what security admin rules are in Azure Virtual Network Manager, how they work, and how traffic rules are evaluated including nonapplication of security admin rules and exceptions.
3+
description: Learn about what security admin rules in Azure Virtual Network Manager, how they work, and how traffic rules are evaluated. This includes nonapplication of security admin rules and exceptions.
44
author: mbender-ms
55
ms.author: mbender
66
ms.service: azure-virtual-network-manager
77
ms.topic: concept-article
8-
ms.date: 12/07/2023
8+
ms.date: 02/04/2025
99
---
1010

1111
# Security admin rules in Azure Virtual Network Manager
@@ -14,7 +14,7 @@ In this article, you learn about security admin rules in Azure Virtual Network M
1414

1515
## What is a security admin rule?
1616

17-
Security admin rules are global network security rules that enforce security policies defined in the rule collection on virtual networks. These rules can be used to Allow, Always Allow, or Deny traffic across virtual networks within your targeted network groups. These network groups can only consist of virtual networks within the scope of your virtual network manager instance. Security admin rules can't apply to virtual networks not managed by a virtual network manager.
17+
Security admin rules are global network security rules that enforce security policies defined in the rule collection on virtual networks. These rules can be used to *Allow*, *Always Allow*, or *Deny* traffic across virtual networks within your targeted network groups. These network groups can only consist of virtual networks within the scope of your virtual network manager instance. Security admin rules can't apply to virtual networks not managed by a virtual network manager.
1818

1919
Here are some scenarios where security admin rules can be used:
2020

@@ -29,7 +29,7 @@ Here are some scenarios where security admin rules can be used:
2929
With Azure Virtual Network Manager, you have a centralized location to manage security admin rules. Centralization allows you to define security policies at scale and apply them to multiple virtual networks at once.
3030

3131
> [!NOTE]
32-
> Currently, security admin rules do not apply to private endpoints that fall under the scope of a managed virtual network.
32+
> Currently, security admin rules don't apply to private endpoints that fall under the scope of a managed virtual network.
3333
3434
## How do security admin rules work?
3535

@@ -49,7 +49,7 @@ To enforce security policies across multiple virtual networks, you [create and d
4949

5050
Security admin rules and network security groups (NSGs) can be used to enforce network security policies in Azure. However, they have different scopes and priorities.#
5151

52-
Security admin rules are intended to be used by network admins of a central governance team, thereby delegating NSG rules to individual application or service teams to further specify security as needed. Security admin rules have a higher priority than NSGs and are evaluated before NSG rules.
52+
Security admin rules are intended to be used by network admins of a central governance team. This allows individual application or service teams to further specify security as needed with NSGs. Security admin rules have a higher priority than NSGs and are evaluated before NSG rules.
5353

5454
NSGs, on the other hand, are used to filter network traffic to and from individual subnets or network interfaces. They're intended to be used by individual application or service teams to further specify security as needed. NSGs have a lower priority than security admin rules and are evaluated after security admin rules.
5555

@@ -69,7 +69,7 @@ If you create an *Always Allow* or *Deny* rule, traffic evaluation is terminated
6969
By using security admin rules and NSGs together, you can enforce network security policies at both the global and individual levels, ensuring that your virtual networks are secure and compliant with your organization's security policies.
7070

7171
> [!IMPORTANT]
72-
> When security admin rules are deployed, the eventual consistency model is used. This means that security admin rules will be eventually applied to the resources contained in a virtual network after a short delay.  Resources that are added to a virtual network that already has security admin rules applied on it will eventually receive those same security admin rules with a delay as well.
72+
> When security admin rules are deployed, the eventual consistency model is used. This means that security admin rules will be eventually applied to the resources contained in a virtual network after a short delay. Resources that are added to a virtual network that have security admin rules applied on it will eventually receive those same security admin rules with a delay as well.
7373
7474
## Benefits of security admin rules
7575

@@ -128,8 +128,8 @@ When a virtual network contains these services, the security admin rules skip th
128128
You can create a security configuration with *Allow* rules only and deploy it to your virtual networks with [Azure PowerShell](/powershell/module/az.network/new-aznetworkmanagersecurityadminconfiguration#example-1) and [Azure CLI](/cli/azure/network/manager/security-admin-config#az-network-manager-security-admin-config-create-examples).
129129

130130
> [!NOTE]
131-
> When multiple Azure Virtual Network Manager instances apply different settings in the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` class to the same virtual network, the setting of the network manager instance with the highest scope will be used.
132-
> Let's say you have two virtual network managers. The first network manager is scoped to the root management group and has a security configuration with set to *AllowRulesOnly* in the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` class. The second virtual network manager is scoped to a subscription under the root management group and uses the default field of *None* in its security configuration. When both configurations apply security admin rules to the same virtual network, the *AllowRulesOnly* setting will be applied to the virtual network.
131+
> When multiple Azure Virtual Network Manager instances apply different settings in the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` class to the same virtual network, the setting of the network manager instance with the highest scope is used.
132+
> Let's say you have two virtual network managers. The first network manager is scoped to the root management group and has a security configuration with set to *AllowRulesOnly* in the `securityConfiguration.properties.applyOnNetworkIntentPolicyBasedServices` class. The second virtual network manager is scoped to a subscription under the root management group and uses the default field of *None* in its security configuration. When both configurations apply security admin rules to the same virtual network, the *AllowRulesOnly* setting is applied to the virtual network.
133133
134134
### Nonapplication of security admin rules at subnet level
135135

@@ -146,7 +146,7 @@ Similarly, some services don't apply security admin rules at the subnet level wh
146146
In this case, security admin rules don't affect the resources in the subnet with these services. However, other subnets within the same virtual network have security admin rules applied to them.
147147

148148
> [!NOTE]
149-
> If you want to apply security admin rules on subnets containing an Azure Application Gateway, ensure each subnet only contains gateways that have been provisioned with [network isolation](../application-gateway/application-gateway-private-deployment.md) enabled. If a subnet contains an Azure Application Gateway without network isolation, security admin rules won't be applied to this subnet.
149+
> If you want to apply security admin rules on subnets containing an Azure Application Gateway, ensure each subnet only contains gateways that are provisioned with [network isolation](../application-gateway/application-gateway-private-deployment.md) enabled. If a subnet contains an Azure Application Gateway without network isolation, security admin rules aren't applied to this subnet.
150150
151151
## Security admin fields
152152

@@ -188,7 +188,7 @@ Protocols currently supported with security admin rules are:
188188
#### Source and destination types
189189

190190
* **IP addresses**: You can provide IPv4 or IPv6 addresses or blocks of address in CIDR notation. To list multiple IP address, separate each IP address with a comma.
191-
* **Service Tag**: You can define specific service tags based on regions or a whole service. See the public documentation on [available service tags](../virtual-network/service-tags-overview.md#available-service-tags) for the list of supported tags. Out of this list, security admin rules currently do not support the AzurePlatformDNS, AzurePlatformIMDS, and AzurePlatformLKM service tags.
191+
* **Service Tag**: You can define specific service tags based on regions or a whole service. See the public documentation on [available service tags](../virtual-network/service-tags-overview.md#available-service-tags) for the list of supported tags. Out of this list, security admin rules currently don't support the AzurePlatformDNS, AzurePlatformIMDS, and AzurePlatformLKM service tags.
192192

193193
#### Source and destination ports
194194

@@ -208,4 +208,4 @@ You can define specific common ports to block from the source or to the destinat
208208

209209
## Next steps
210210
> [!div class="nextstepaction"]
211-
> Learn how to block network traffic with a [Security admin configuration](how-to-block-network-traffic-portal.md).
211+
> Learn how to block network traffic with a [Security admin configuration](how-to-block-network-traffic-portal.md).

articles/virtual-network-manager/create-virtual-network-manager-terraform.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.topic: quickstart
66
ms.custom: devx-track-terraform
77
author: mbender-ms
88
ms.author: mbender
9-
ms.date: 06/07/2023
9+
ms.date: 02/05/2025
1010
content_well_notification:
1111
- AI-contribution
1212
zone_pivot_groups: azure-virtual-network-manager-quickstart-options
@@ -38,13 +38,13 @@ In this article, you learn how to:
3838
## Prerequisites
3939

4040
- [Install and configure Terraform](/azure/developer/terraform/quickstart-configure)
41-
- To modify dynamic network groups, you must be [granted access via Azure RBAC role](concept-network-groups.md#network-groups-and-azure-policy) assignment only. Classic Admin/legacy authorization is not supported
41+
- To modify dynamic network groups, you must be [granted access via Azure RBAC role](concept-network-groups.md#network-groups-and-azure-policy) assignment only. Classic Admin/legacy authorization isn't supported
4242

4343
:::zone pivot="sub"
4444

4545
## Implement the Terraform code
4646

47-
This code sample will implement Azure Virtual Network Manager at the subscription scope.
47+
This code sample implements Azure Virtual Network Manager at the subscription scope.
4848

4949
> [!NOTE]
5050
> The sample code for this article is located in the [Azure Terraform GitHub repo](https://github.com/Azure/terraform/tree/master/quickstart/101-virtual-network-manager-create-mesh). You can view the log file containing the [test results from current and previous versions of Terraform](https://github.com/Azure/terraform/tree/master/quickstart/101-virtual-network-manager-create-mesh/TestRecord.md).
@@ -131,7 +131,7 @@ This code sample will implement Azure Virtual Network Manager at the management
131131
terraform output virtual_network_names
132132
```
133133
134-
1. For each virtual network name printed in the previous step, run [az network manager list-effective-connectivity-config](/cli/azure/network/manager#az-network-manager-list-effective-connectivity-config) to print the effective (applied) configurations. Replace the `<virtual_network_name>` placeholder with the vnet name.
134+
1. For each virtual network name printed in the previous step, run [az network manager list-effective-connectivity-config](/cli/azure/network/manager#az-network-manager-list-effective-connectivity-config) to print the effective (applied) configurations. Replace the `<virtual_network_name>` placeholder with the virtual network name.
135135

136136
```azurecli
137137
az network manager list-effective-connectivity-config \
@@ -153,7 +153,7 @@ This code sample will implement Azure Virtual Network Manager at the management
153153
Get-AzResourceGroup -Name $resource_group_name
154154
```
155155

156-
1. For each virtual network name printed in the previous step, run [Get-AzNetworkManagerEffectiveConnectivityConfiguration](/powershell/module/az.network/get-aznetworkmanagereffectiveconnectivityconfiguration) to print the effective (applied) configurations. Replace the `<virtual_network_name>` placeholder with the vnet name.
156+
1. For each virtual network name printed in the previous step, run [Get-AzNetworkManagerEffectiveConnectivityConfiguration](/powershell/module/az.network/get-aznetworkmanagereffectiveconnectivityconfiguration) to print the effective (applied) configurations. Replace the `<virtual_network_name>` placeholder with the virtual network name.
157157

158158
```azurepowershell
159159
Get-AzNetworkManagerEffectiveConnectivityConfiguration
@@ -173,4 +173,4 @@ This code sample will implement Azure Virtual Network Manager at the management
173173
## Next steps
174174

175175
> [!div class="nextstepaction"]
176-
> [Block network traffic with Azure Virtual Network Manager](how-to-block-network-traffic-portal.md)
176+
> [Block network traffic with Azure Virtual Network Manager](how-to-block-network-traffic-portal.md)

0 commit comments

Comments
 (0)