Skip to content

Commit 1cdd6c4

Browse files
authored
Merge pull request #18269 from MicrosoftDocs/release-local-2506
Merge release-local-2506 to main for release
2 parents 7295651 + 77bf3b1 commit 1cdd6c4

File tree

54 files changed

+2339
-164
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

54 files changed

+2339
-164
lines changed

azure-local/TOC.yml

Lines changed: 105 additions & 73 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,106 @@ items:
165165
- name: Run SQL Server
166166
href: deploy/sql-server-23h2.md
167167

168+
- name: Enable
169+
items:
170+
- name: SDN enabled by Azure Arc
171+
items:
172+
- name: Overview
173+
href: concepts/sdn-overview.md
174+
- name: Enable SDN integration
175+
href: deploy/enable-sdn-integration.md
176+
- name: Create Network Security Groups
177+
href: manage/create-network-security-groups.md
178+
- name: Manage Network Security Groups
179+
href: manage/manage-network-security-groups.md
180+
- name: Troubleshoot SDN
181+
href: manage/sdn-troubleshooting.md
182+
- name: SDN FAQ
183+
href: concepts/sdn-frequently-asked-questions.yml
184+
185+
- name: SDN managed by on-premises tools
186+
items:
187+
- name: Overview
188+
items:
189+
- name: Software-defined networking overview
190+
href: concepts/software-defined-networking-23h2.md
191+
- name: Network Controller overview
192+
href: concepts/network-controller-overview.md
193+
- name: RAS Gateway overview
194+
href: concepts/gateway-overview.md
195+
- name: Load balancer overview
196+
href: concepts/software-load-balancer.md
197+
- name: Datacenter Firewall overview
198+
href: concepts/datacenter-firewall-overview.md
199+
- name: Route reflector overview
200+
href: concepts/route-reflector-overview.md
201+
- name: SDN Multisite overview
202+
href: concepts/sdn-multisite-overview.md
203+
- name: Plan
204+
items:
205+
- name: Network Controller
206+
href: concepts/plan-network-controller-deployment.md
207+
- name: SDN infrastructure
208+
href: concepts/plan-software-defined-networking-infrastructure-23h2.md
209+
- name: Deploy
210+
items:
211+
- name: Using Express scripts
212+
href: deploy/sdn-express-23h2.md
213+
- name: Using Windows Admin Center
214+
href: deploy/sdn-wizard-23h2.md
215+
- name: Manage
216+
items:
217+
- name: Update SDN infrastructure
218+
href: manage/update-sdn.md
219+
- name: Manage tenant logical networks
220+
href: manage/tenant-logical-networks.md
221+
- name: Manage tenant virtual networks
222+
href: manage/tenant-virtual-networks.md
223+
- name: Manage software load balancers
224+
href: manage/load-balancers.md
225+
- name: Manage gateway connections
226+
href: manage/gateway-connections.md
227+
- name: Manage default network access policies
228+
href: manage/manage-default-network-access-policies-virtual-machines-23h2.md
229+
- name: Configure network security groups with Windows Admin Center
230+
href: manage/use-datacenter-firewall-windows-admin-center.md
231+
- name: Configure network security groups with PowerShell
232+
href: manage/use-datacenter-firewall-powershell.md
233+
- name: Configure network security groups with tags
234+
href: manage/configure-network-security-groups-with-tags.md
235+
- name: Manage SDN Multisite
236+
href: manage/manage-sdn-multisite.md
237+
- name: Assign public IP address to a VM
238+
href: manage/assign-public-ip-to-vm.md
239+
- name: Configure load balancer for high availability ports
240+
href: manage/configure-software-load-balancer.md
241+
- name: Load balance multiple logical networks
242+
href: manage/load-balance-multiple-networks.md
243+
- name: Manage SDN security
244+
items:
245+
- name: Manage certificates for SDN
246+
href: manage/sdn-manage-certs.md
247+
- name: Update Network Controller certificates
248+
href: manage/update-network-controller-certificates.md
249+
- name: Update SDN infrastructure certificates
250+
href: manage/update-sdn-infrastructure-certificates.md
251+
- name: Secure the Network Controller
252+
href: manage/nc-security.md
253+
- name: Authenticate with Kerberos
254+
href: manage/kerberos-with-spn.md
255+
- name: SDN technical reference
256+
href: manage/sdn-technical-reference.md
257+
- name: Troubleshoot
258+
items:
259+
- name: Troubleshoot SDN deployment
260+
href: manage/troubleshoot-sdn-deployment.md
261+
- name: Collect SDN logs
262+
href: manage/sdn-log-collection.md
263+
- name: Troubleshoot common SDN issues
264+
href: manage/troubleshoot-common-sdn-issues.md
265+
- name: Troubleshoot Software Load Balancer for SDN
266+
href: manage/troubleshoot-software-load-balancer.md
267+
168268
- name: Update
169269
items:
170270
- name: About Updates
@@ -376,46 +476,6 @@ items:
376476
- name: Repair a node
377477
href: manage/repair-server.md
378478

379-
- name: SDN
380-
items:
381-
- name: Update SDN infrastructure
382-
href: manage/update-sdn.md
383-
- name: Manage tenant logical networks
384-
href: manage/tenant-logical-networks.md
385-
- name: Manage tenant virtual networks
386-
href: manage/tenant-virtual-networks.md
387-
- name: Manage software load balancers
388-
href: manage/load-balancers.md
389-
- name: Manage gateway connections
390-
href: manage/gateway-connections.md
391-
- name: Manage default network access policies
392-
href: manage/manage-default-network-access-policies-virtual-machines-23h2.md
393-
- name: Configure network security groups with Windows Admin Center
394-
href: manage/use-datacenter-firewall-windows-admin-center.md
395-
- name: Configure network security groups with PowerShell
396-
href: manage/use-datacenter-firewall-powershell.md
397-
- name: Configure network security groups with tags
398-
href: manage/configure-network-security-groups-with-tags.md
399-
- name: Manage SDN Multisite
400-
href: manage/manage-sdn-multisite.md
401-
- name: Assign public IP address to a VM
402-
href: manage/assign-public-ip-to-vm.md
403-
- name: Configure load balancer for high availability ports
404-
href: manage/configure-software-load-balancer.md
405-
- name: Load balance multiple logical networks
406-
href: manage/load-balance-multiple-networks.md
407-
- name: Manage SDN security
408-
items:
409-
- name: Manage certificates for SDN
410-
href: manage/sdn-manage-certs.md
411-
- name: Update Network Controller certificates
412-
href: manage/update-network-controller-certificates.md
413-
- name: Update SDN infrastructure certificates
414-
href: manage/update-sdn-infrastructure-certificates.md
415-
- name: Secure the Network Controller
416-
href: manage/nc-security.md
417-
- name: Authenticate with Kerberos
418-
href: manage/kerberos-with-spn.md
419479
- name: Billing
420480
items:
421481
- name: Azure Hybrid Benefit
@@ -477,16 +537,7 @@ items:
477537
href: manage/get-support.md
478538
- name: Get remote support
479539
href: manage/get-remote-support.md
480-
- name: Troubleshoot SDN
481-
items:
482-
- name: Troubleshoot SDN deployment
483-
href: manage/troubleshoot-sdn-deployment.md
484-
- name: Collect SDN logs
485-
href: manage/sdn-log-collection.md
486-
- name: Troubleshoot common SDN issues
487-
href: manage/troubleshoot-common-sdn-issues.md
488-
- name: Troubleshoot Software Load Balancer for SDN
489-
href: manage/troubleshoot-software-load-balancer.md
540+
490541

491542
- name: Migrate
492543
items:
@@ -553,28 +604,9 @@ items:
553604
items:
554605
- name: Network ATC overview
555606
href: concepts/network-atc-overview.md?pivots=azure-local
556-
- name: SDN
557-
items:
558-
- name: SDN technical reference
559-
href: manage/sdn-technical-reference.md
560-
- name: SDN overview
561-
href: concepts/software-defined-networking-23h2.md
562-
- name: Plan an SDN infrastructure
563-
href: concepts/plan-software-defined-networking-infrastructure-23h2.md
564-
- name: Network Controller overview
565-
href: concepts/network-controller-overview.md
566-
- name: Plan Network Controller
567-
href: concepts/plan-network-controller-deployment.md
568-
- name: Software Load Balancer overview
569-
href: concepts/software-load-balancer.md
570-
- name: Datacenter Firewall overview
571-
href: concepts/datacenter-firewall-overview.md
572-
- name: RAS Gateway overview
573-
href: concepts/gateway-overview.md
574-
- name: Route Reflector overview
575-
href: concepts/route-reflector-overview.md
576-
- name: SDN Multisite overview
577-
href: concepts/sdn-multisite-overview.md
607+
608+
609+
578610
- name: Reference
579611
items:
580612
- name: For Azure Local VM management
@@ -647,4 +679,4 @@ items:
647679
href: https://azure.com/hci
648680
- name: Pricing
649681
href: https://azure.microsoft.com/products/local/#Pricing
650-
682+
59.6 KB
Loading
109 KB
Loading
197 KB
Loading
155 KB
Loading
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
### YamlMime:FAQ
2+
metadata:
3+
title: Frequently Asked Questions (FAQ) for Software-Defined Networking (SDN) on Azure Local
4+
description: This FAQ provides information about SDN enabled by Azure Arc on Azure Local.
5+
ms.topic: faq
6+
author: alkohli
7+
ms.author: alkohli
8+
ms.service: azure-local
9+
ms.date: 07/02/2025
10+
title: FAQ - SDN enabled by Azure Arc on Azure Local
11+
summary: This FAQ provides information about Software-Defined Networking (SDN) enabled by Azure Arc on your Azure Local VMs. This feature is available in Azure Local version 2506 and later.
12+
13+
sections:
14+
- name: Ignored
15+
questions:
16+
- question: Which version of Azure Local supports SDN enabled by Azure Arc?
17+
answer: |
18+
SDN enabled by Azure Arc is available in Azure Local version 2506 running OS version 26100.xxxx and later.
19+
20+
- question: Will I have downtime for my Azure Local VMs when I enable Network Controller via the PowerShell cmdlet?
21+
answer: |
22+
Yes. When you enable Network Controller, Azure Local VMs use a null port profile to set up network connectivity. Because this process affects all VMs, you experience brief downtime until configuration finishes.
23+
24+
Because this operation is disruptive, plan a maintenance window if you're running in a production environment.
25+
26+
- question: Why am I experiencing network connectivity issues for my unmanaged VMs on Azure Local after I enabled SDN enabled by Azure Arc?
27+
answer: |
28+
You can experience network connectivity issues if you enable Network Controller and create unmanaged VMs outside Azure interfaces like Azure CLI, Azure portal, Azure PowerShell, and Azure Resource Manager APIs. To fix these issues, see how to [unblock and configure the null port profile for unmanaged VMs]().
29+
30+
- question: Why can't I connect to my Azure Local VMs, if I associate an NSG with the VM network interface or its logical network?
31+
answer: |
32+
If you set up an empty NSG with no security rules on your VM's network interface or the logical network, Azure Local blocks all inbound traffic by default and allows all outbound traffic. Add specific inbound network security rules to let traffic into the VM.
33+
34+
- question: Can I modify Azure Local VM resources such as VMs, virtual switches, and network interfaces directly using Network Controller APIs, Windows Admin Center, or SDN Express PowerShell scripts for my Azure Local VMs?
35+
answer: |
36+
No. Don't do this, as it's unsupported and can cause your resources to enter bad or unrecoverable states.
37+
38+
- question: Can I configure static network interfaces after the Azure Local VM is provisioned on an Azure Local instance with SDN enabled by Azure Arc?
39+
answer: |
40+
No. You can't add a secondary network interface to a VM after provisioning. This setup causes both interfaces to act as the default gateway, which leads to asymmetric networking, packet loss, and unpredictable networking. Set up all needed static network interfaces during VM provisioning when using SDN enabled by Azure Arc.
41+
- question: Why am I seeing unexpected traffic drop or blocks for my Azure Local VMs?
42+
answer: |
43+
If logical networks and VM network interfaces on your Azure Local VMs have NSGs with conflicting allow or deny rules, you can see unexpected traffic drops or blocks.
44+
45+
When an inbound packet arrives, Azure Local checks the logical network NSG first, then the network interface NSG. For outbound traffic, Azure Local checks the network interface NSG first, then the logical network NSG. If the first NSG has a **Deny** rule and the next has an **Allow** rule, Azure Local drops the packet.
46+

0 commit comments

Comments
 (0)