Skip to content

Commit cec94ed

Browse files
author
Michael Bender
committed
Updates based on Jackson's feedback
1 parent c747a2c commit cec94ed

File tree

2 files changed

+7
-5
lines changed

2 files changed

+7
-5
lines changed

articles/virtual-network-manager/concept-security-admin-rules-network-group.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: mbender-ms
55
ms.author: mbender
66
ms.service: virtual-network-manager
77
ms.topic: conceptual
8-
ms.date: 04/01/2024
8+
ms.date: 04/15/2024
99
ms.custom: template-concept, engagement-fy23, references_regions
1010
#customer intent: As a network administrator, I want to deploy security admin rules in Azure Virtual Network Manager. When creating security admin rules, I want to define network groups as the source and destination of traffic.
1111
---
@@ -24,7 +24,9 @@ For example, you need to ensure traffic is denied between your production and no
2424

2525
## How do I deploy a security admin rule using network groups?
2626

27-
Once you have access to the public preview, you can deploy a security admin rule using network groups in the Azure portal. To create a security admin role, create a security admin configuration and add a security admin rule. Finally, deploy the security admin configuration. For more information, see [Create a security admin rule using network groups](./how-to-create-security-admin-rule-network-groups.md).
27+
From the Azure portal, you can [deploy a security admin rule using network groups](./how-to-create-security-admin-rule-network-groups.md) in the Azure portal. To create a security admin rule, create a security admin configuration and add a security admin rule that utilizes network groups as source and destination. Finally, deploy the security admin configuration and the rules apply to the network group resources.
28+
29+
If you change the resources in your network group or a network group's CIDR range changes, you need to redeploy the configuration after the changes are made. After deployment, the new CIDR ranges will be applied across your network to all new and existing network group resources.
2830

2931
## Supported regions
3032

@@ -57,13 +59,13 @@ The following limitations apply when using network groups with security admin ru
5759
- Supports 100 networking resources (virtual networks or subnets) in any one network group referenced in the security admin rule.
5860

5961
- Only supports IPv4 address prefixes in the network group members.
62+
63+
- Dual-stack network groups aren't supported. If both IPv4 and IPv6 ranges are present, Azure Virtual Network Manager (AVNM) only uses the IPv4 ranges.
6064

6165
- Role-based access control ownership is inferred from the `Microsoft.Network/networkManagers/securityAdminConfigurations/rulecollections/rules/write` permission only.
6266

6367
- Network groups must have the same member-types. Virtual networks and subnets are supported but must be in separate network groups.
6468

65-
- Only supports aggregating members in the same tenant as the network manager.
66-
6769
- Force-delete of any network group used as the source and/or destination in a security admin rule isn't currently supported. Usage causes an error.
6870

6971
## Next steps

articles/virtual-network-manager/how-to-create-security-admin-rule-network-group.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: mbender-ms
66
ms.author: mbender
77
ms.service: virtual-network-manager
88
ms.topic: how-to
9-
ms.date: 04/01/2024
9+
ms.date: 04/15/2024
1010
ms.custom: template-how-to
1111
#Customer intent: As a network administrator, I want to deploy security admin rules using network groups in Azure Virtual Network Manager so that I can define the source and destination of the traffic for the security admin rule.
1212
---

0 commit comments

Comments
 (0)