You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/virtual-network-manager/concept-connectivity-configuration.md
+8-7Lines changed: 8 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,7 +40,7 @@ By default, the mesh topology defined in your connectivity configuration is a re
40
40
41
41
## Behind the scenes: connected group
42
42
43
-
When you create a mesh topology or enable direct connectivity in a hub-and-spoke topology, a new connectivity construct exclusive to Azure Virtual Network Manager is created called a *connected group*. Virtual networks in a connected group can communicate with each other just like manually connected virtual networks. When you observe the effective routes for a network interface, you'll see a next hop type of *ConnectedGroup*. Virtual networks connected together in a connected group don't have a peering configuration listed under *Peerings* for the virtual network. This connected group is what enables Azure Virtual Network Manager to support a higher scale of virtual network connectivity than traditional virtual network peerings.
43
+
When you create a mesh topology or enable direct connectivity in a hub-and-spoke topology, a new connectivity construct exclusive to Azure Virtual Network Manager is created. This construct is called a *connected group*. Virtual networks in a connected group can communicate with each other just like manually connected virtual networks. When you observe the effective routes for a network interface, you'll see a next hop type of *ConnectedGroup*. Virtual networks connected together in a connected group don't have a peering configuration listed under *Peerings* for the virtual network. This connected group is what enables Azure Virtual Network Manager to support a higher scale of virtual network connectivity than traditional virtual network peerings.
44
44
45
45
> [!NOTE]
46
46
> A virtual network can be part of up to two connected groups, meaning it can be part of up to two mesh topologies.
@@ -53,7 +53,7 @@ Azure Virtual Network Manager's high-scale connected group feature empowers you
53
53
54
54
#### Prepare each virtual network in the connected group
55
55
56
-
1. Review [Increase Private Endpoint virtual network limits](../private-link/increase-private-endpoint-vnet-limits.md) for detailed guidance on raising these limits. Enabling or disabling this feature initiates a one-time connection reset. It's recommended to perform these changes during a maintenance window.
56
+
1. Review [Increase Private Endpoint virtual network limits](../private-link/increase-private-endpoint-vnet-limits.md) for detailed guidance on raising these limits. Enabling or disabling this feature initiates a one-time connection reset. We recommend performing these changes during a maintenance window.
57
57
58
58
2. Register the feature flag of `Microsoft.Network/EnableMaxPrivateEndpointsVia64kPath` for each subscription containing an Azure Virtual Network Manager instance and virtual networks in your connected group.
59
59
@@ -68,9 +68,9 @@ In this step, you configure the connectivity configuration's mesh topology setti
68
68
69
69
1. In your mesh connectivity configuration, locate and select the checkbox for **Enable private endpoints high scale**. This option activates the high-scale feature for your connected group.
70
70
71
-
1. Verify every virtual network in your connected group (i.e. your entire mesh) is configured with high-scale private endpoints. The Azure portal validates the settings across the entire group. If a virtual network without the high-scale configuration is added later, it can't communicate with private endpoints in other virtual networks.
71
+
1. Verify every virtual network in your entire mesh (connected group) is configured with high-scale private endpoints. The Azure portal validates the settings across the entire group. If a virtual network without the high-scale configuration is added later, it can't communicate with private endpoints in other virtual networks.
72
72
73
-
1. After verifying all virtual networks are properly configured, deploy the connectivity configuration. This finalizes the setup of your high-scale connected group.
73
+
1. After verifying all virtual networks are properly configured, deploy the connectivity configuration. This step finalizes the setup of your high-scale connected group.
74
74
75
75
## Hub-and-spoke topology
76
76
@@ -120,9 +120,10 @@ You can review the current topology of a connectivity configuration by selecting
120
120
121
121
## Next steps
122
122
123
-
-[Learn how to create a hub-and-spoke connectivity configuration](./how-to-create-hub-and-spoke.md) to manage your network topologies.
124
-
-[Create a secured hub-and-spoke topology in this tutorial](./tutorial-create-secured-hub-and-spoke.md).
125
-
-[Learn how to deploy a hub-and-spoke topology with Azure Firewall](./how-to-deploy-hub-spoke-topology-with-azure-firewall.md).
123
+
-[Learn how to create a mesh connectivity configuration](how-to-create-mesh-network.md).
124
+
-[Learn how to create a hub-and-spoke connectivity configuration](how-to-create-hub-and-spoke.md).
125
+
-[Create a secured hub-and-spoke topology in this tutorial](tutorial-create-secured-hub-and-spoke.md).
126
+
-[Learn how to deploy a hub-and-spoke topology with Azure Firewall](how-to-deploy-hub-spoke-topology-with-azure-firewall.md).
126
127
-[Understand configuration deployments](concept-deployments.md) to effectively manage your network settings.
127
128
-[Block unwanted network traffic](how-to-block-network-traffic-portal.md) using security admin configurations.
128
129
-[Deploy Azure Virtual Network Manager using Terraform](create-virtual-network-manager-terraform.md) to quickly set up your environment.
* Identify the virtual networks you want to use in the hub-and-spoke configuration or create new [virtual networks](../virtual-network/quick-create-portal.md).
21
21
22
22
## <aname="group"></a> Create a network group
@@ -34,7 +34,7 @@ Azure Virtual Network Manager provides you with two methods for adding membershi
34
34
35
35
### Manually adding virtual networks
36
36
37
-
To manually add the desired virtual networks to your network group for use in your connectivity configuration, follow the steps below:
37
+
To manually add the desired virtual networks to your network group for use in your connectivity configuration, follow these steps:
38
38
39
39
1. From the list of network groups, select your network group and select **Add virtual networks** under *Manually add members* on the network group page.
40
40
@@ -46,6 +46,8 @@ To manually add the desired virtual networks to your network group for use in yo
46
46
47
47
This section guides you through creating a hub-and-spoke configuration with the network group you created in the previous section.
48
48
49
+
1. Select **Configurations** under *Settings*, then select **+ Create**.
50
+
49
51
1. Select **Connectivity configuration** from the drop-down menu to begin creating a connectivity configuration.
50
52
51
53
1. On the **Basics** page, enter the following information, and select **Next: Topology >**.
@@ -59,7 +61,7 @@ This section guides you through creating a hub-and-spoke configuration with the
59
61
60
62
1. Select the **Delete existing peerings** checkbox if you want to remove all previously created virtual network peerings between virtual networks in the network groups included in this configuration. Then select **Select a hub**.
61
63
62
-
1. On the **Select a hub** pane, select the virtual network that will be the hub virtual network and select **Select**.
64
+
1. On the **Select a hub** pane, select the virtual network intended as the hub virtual network and select **Select**.
63
65
64
66
1. Select **+ Add network groups**.
65
67
@@ -78,6 +80,7 @@ This section guides you through creating a hub-and-spoke configuration with the
78
80
To have this configuration take effect in your environment, you need to deploy the configuration to the regions in which your selected virtual networks reside.
79
81
80
82
1. Select **Deployments** under *Settings*, then select **Deploy a configuration**.
83
+
81
84
1. On the **Deploy a configuration** page, select the following settings:
82
85
83
86
| Setting | Value |
@@ -87,22 +90,24 @@ To have this configuration take effect in your environment, you need to deploy t
87
90
| Target regions | Select all the regions that apply to virtual networks you select for the configuration. You might choose to select a subset of regions at a time if you want to gradually roll out this configuration. |
88
91
89
92
1. Select **Next** and then select **Deploy** to complete the deployment.
90
-
1. The deployment displays in the list for the selected region. The deployment of the configuration can take a few minutes to complete.
93
+
94
+
1. The deployment displays in the list for the selected region. The deployment of the configuration can take a few minutes to complete. Select the **Refresh** button to check on the status of the deployment.
91
95
92
96
:::image type="content" source="./media/how-to-create-hub-and-spoke/deployment-succeeded.png" alt-text="Screenshot of configuration deployment in progress status.":::
93
97
94
98
> [!NOTE]
95
-
> If you're currently using virtual network peerings created outside of Azure Virtual Network Manager and want to manage your topology and connectivity with Azure Virtual Network Manager, you can migrate without any downtime to your network. Azure Virtual Network Manager instances are fully compatible with pre-existing hub-and-spoke topology deployments using manual peerings. When you deploy a connectivity configuration, the connectivity established is additive by default. This means that you aren't required to delete any existing peered connections between the hub and spoke virtual networks while you verify the connectivity configuration is establishing connectivity as desired.
99
+
> If you're currently using virtual network peerings created outside of Azure Virtual Network Manager and want to manage your topology and connectivity with Azure Virtual Network Manager, you can migrate without any downtime to your network. Azure Virtual Network Manager instances are fully compatible with preexisting hub-and-spoke topology deployments using manual peerings. When you deploy a connectivity configuration, the connectivity established is additive by default. This means that you aren't required to delete any existing peered connections between the hub and spoke virtual networks while you verify the connectivity configuration is establishing connectivity as desired.
96
100
97
101
## Confirm configuration deployment
98
102
99
-
1. See [view applied configuration](how-to-view-applied-configurations.md).
103
+
1. See [view applied configurations](how-to-view-applied-configurations.md).
100
104
101
105
1. To test *direct connectivity* between spoke virtual networks, deploy a virtual machine into each spoke virtual network. Then initiate an ICMP request from one virtual machine to the other.
102
106
103
107
## Next steps
104
108
105
-
-[Create a secured hub-and-spoke topology in this tutorial](./tutorial-create-secured-hub-and-spoke.md).
106
-
-[Learn how to deploy a hub-and-spoke topology with Azure Firewall](./how-to-deploy-hub-spoke-topology-with-azure-firewall.md).
109
+
-[Create a secured hub-and-spoke topology in this tutorial](tutorial-create-secured-hub-and-spoke.md).
110
+
-[Learn how to deploy a hub-and-spoke topology with Azure Firewall](how-to-deploy-hub-spoke-topology-with-azure-firewall.md).
111
+
-[Learn how to create a mesh connectivity configuration](how-to-create-mesh-network.md).
107
112
- Learn about [Security admin rules](concept-security-admins.md)
108
113
- Learn how to block network traffic with a [Security admin configuration](how-to-block-network-traffic-portal.md).
0 commit comments