Skip to content

Commit 239107e

Browse files
authored
Merge pull request #18397 from alkohli/sdn3
Minor formatting issues
2 parents 4b75658 + 4e3b9ce commit 239107e

File tree

2 files changed

+15
-27
lines changed

2 files changed

+15
-27
lines changed

azure-local/includes/hci-download-vhdx-2.md

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -3,26 +3,16 @@ author: alkohli
33
ms.author: alkohli
44
ms.service: azure-local
55
ms.topic: include
6-
ms.date: 05/29/2025
6+
ms.date: 07/08/2025
77
---
88

99
SDN uses a VHDX file containing either the Azure Stack HCI or Windows Server operating system (OS) as a source for creating the SDN virtual machines (VMs).
1010

1111
> [!NOTE]
1212
> The version of the OS in your VHDX must match the version used by the Azure Local Hyper-V machines. This VHDX file is used by all SDN infrastructure components.
1313
14-
[Download an English-language version of the VHDX file](https://aka.ms/PVvxVBVCVVC).
14+
Depending on the OS version, download one of the following VHDX files::
1515

16-
Currently, a non-English VHDX file isn't available for download. If you require a non-English version, [download the corresponding ISO file](../deploy/download-23h2-software.md) and convert it to VHDX using the `Convert-WindowsImage` cmdlet. You must run this script from a Windows client computer. You'll probably need to run this script as Administrator and modify the execution policy for scripts using the `Set-ExecutionPolicy` command.
16+
- OS version 25398.xxxx: [Download an English-language version of the VHDX file](https://aka.ms/PVvxVBVCVVC).
17+
- OS version 26100.xxxx: [Download an English-language version of the VHDX file](../deploy/download-23h2-software.md?view=azloc-2506&preserve-view=true#download-the-software-from-the-azure-portal).
1718

18-
The following syntax shows an example of using `Convert-WindowsImage`:
19-
20-
```powershell
21-
Install-Module -Name Convert-WindowsImage
22-
Import-Module Convert-WindowsImage
23-
24-
$wimpath = "E:\sources\install.wim"
25-
$vhdpath = "D:\temp\AzureStackHCI.vhdx"
26-
$edition=1
27-
Convert-WindowsImage -SourcePath $wimpath -Edition $edition -VHDPath $vhdpath -SizeBytes 500GB -DiskLayout UEFI
28-
```

azure-local/manage/manage-network-security-groups.md

Lines changed: 11 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ This article describes how to manage network security groups (NSGs) on your Azur
4343

4444
---
4545

46-
*## Manage network securi*ty groups and network security rules
46+
## Manage network security groups and network security rules
4747

4848
# [Azure CLI](#tab/azurecli)
4949

@@ -140,7 +140,7 @@ Follow these steps to show details of a network security group:
140140
az stack-hci-vm network nsg show -g $resource_group --name $nsgname
141141
```
142142
143-
2. The command outputs the details of a specified network security group (NSG).
143+
1. The command outputs the details of a specified network security group (NSG).
144144
145145
- In this example, the NSG has no network interface attached.
146146
@@ -233,7 +233,7 @@ Follow these steps to delete a network security group:
233233
$nsgname = "examplensg"
234234
```
235235
236-
2. Run the following command to delete a network security group (NSG) on your Azure Local instance.
236+
1. Run the following command to delete a network security group (NSG) on your Azure Local instance.
237237
238238
```azurecli
239239
az stack-hci-vm network nsg delete -g $resource_group --name $nsgname --yes
@@ -257,7 +257,7 @@ In this example, we create a network interface with an existing network security
257257
$nicname="examplenic"
258258
```
259259
260-
2. Run the following command to create a network interface (NIC) on your Azure Local instance.
260+
1. Run the following command to create a network interface (NIC) on your Azure Local instance.
261261
262262
```azurecli
263263
az stack-hci-vm network nic create --resource-group $resource_group --custom-location $customLocationId --location $location --subnet-id $lnetname --ip-address $ipaddress --name $nicname --network-security-group $nsgname
@@ -469,6 +469,7 @@ In this example, we associate a static logical network with an existing network
469469
You can dissociate a network security group from a logical network. This dissociation allows you to remove the network security rules applied to the logical network.
470470
471471
Follow these steps to dissociate a network security group from logical network:
472+
472473
1. Set the following parameters in your Azure CLI session. Make sure to pass the NSG name as an empty string encased in double quotes followed by single quotes ('""').
473474
474475
```azurecli
@@ -478,6 +479,7 @@ Follow these steps to dissociate a network security group from logical network:
478479
$nsgname = '""'
479480
$lnetname="static-lnet3"
480481
```
482+
481483
2. To dissociate a network security group from a logical network, run the following command:
482484
483485
```azurecli
@@ -575,7 +577,8 @@ Follow these steps to dissociate a network security group from logical network:
575577
"tags": {},
576578
"type": "microsoft.azurestackhci/logicalnetworks"
577579
}
578-
```
580+
```
581+
579582
</details>
580583
581584
## Dissociate network security group from network interface
@@ -594,7 +597,7 @@ Follow these steps to dissociate a network security group from a network interfa
594597
$nicname ="examplenic"
595598
```
596599
597-
2. To dissociate a network security group from a network interface, run the following command:
600+
1. To dissociate a network security group from a network interface, run the following command:
598601
599602
```azurecli
600603
az stack-hci-vm network nic update -g $resource_group --name $nicname --network-security-group '""'
@@ -676,8 +679,7 @@ This section describes the manage operations supported for network security rule
676679
$nsgname = "examplensg"
677680
```
678681
679-
2. Run this command to show details of a network security rule:
680-
682+
1. Run this command to show details of a network security rule:
681683
682684
```azurecli
683685
az stack-hci-vm network nsg rule show -g $resource_group -n $securityrulename --nsg-name $nsgname
@@ -733,7 +735,6 @@ This section describes the manage operations supported for network security rule
733735
734736
### Update a network security rule
735737
736-
737738
1. Set the following parameters in your Azure CLI session.
738739
739740
```azurecli
@@ -967,7 +968,7 @@ To dissociate a network security group from a network interface, follow these st
967968
968969
1. Go to **Azure Local resource page > Resources > Network interfaces**.
969970
970-
:::image type="content" source="./media/manage-network-security-groups/associate-network-security-group-network-interface-1.png" alt-text="Screenshot of selecting network interface to dissociate from the network security group." lightbox="./media/manage-network-security-groups/associate-network-security-group-network-interface-1.png":::
971+
:::image type="content" source="./media/manage-network-security-groups/associate-network-security-group-network-interface-1.png" alt-text="Screenshot of selecting network interface to dissociate from the network security group." lightbox="./media/manage-network-security-groups/associate-network-security-group-network-interface-1.png":::
971972
972973
1. In the right pane, from the list of network interfaces, select an interface that has a network security group attached to it.
973974
1. Go to **Settings > Network security groups**.
@@ -982,7 +983,6 @@ To dissociate a network security group from a network interface, follow these st
982983
The operation takes a few minutes to complete. You can see the status of the operation in the **Notifications** pane.
983984
After the network security group is dissociated from the network interface, the page refreshes to indicate the dissociation.
984985
985-
986986
## List network security rules in a network security group
987987
988988
To list network security rules in a network security group, follow these steps:
@@ -1004,12 +1004,10 @@ To update a network security rule, follow these steps:
10041004
10051005
---
10061006
1007-
10081007
## Next steps
10091008
10101009
- [Troubleshoot SDN enabled by Arc](../index.yml).
10111010
1012-
10131011
::: moniker-end
10141012
10151013
::: moniker range="<=azloc-2505"

0 commit comments

Comments
 (0)