Skip to content

Commit 6e42a0e

Browse files
committed
Updated to address PR build warnings and errors.
1 parent 14251a7 commit 6e42a0e

12 files changed

+36
-15
lines changed

azure-local/concepts/software-defined-networking-23h2.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: AnirbanPaul
55
ms.author: anpaul
66
ms.topic: conceptual
77
ms.service: azure-local
8-
ms.date: 01/29/2025
8+
ms.date: 05/28/2025
99
---
1010

1111
# Software Defined Networking (SDN) in Azure Local
@@ -29,7 +29,7 @@ Deploying Network Controller enables the following functionalities:
2929
- Attach virtual appliances to your virtual networks.
3030
- Configure Quality of Service (QoS) policies for VMs attached to virtual networks or traditional VLAN-based networks.
3131

32-
You have the option to [deploy SDN Network Controller using SDN Express](../manage/sdn-express.md) PowerShell scripts, or [deploy SDN Network Controller using Windows Admin Center](../deploy/sdn-wizard-23h2.md) after creating a system.
32+
You have the option to deploy an SDN Network Controller using SDN Express PowerShell scripts, or [deploy SDN Network Controller using Windows Admin Center](../deploy/sdn-wizard-23h2.md) after creating a system.
3333

3434
## Software Load Balancing
3535

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
author: alkohli
3+
ms.author: alkohli
4+
ms.service: azure-local
5+
ms.topic: include
6+
ms.date: 01/24/2025
7+
ms.reviewer: alkohli
8+
---
9+
10+
> [!IMPORTANT]
11+
> Azure Stack HCI is now part of Azure Local. However, older versions of Azure Stack HCI, for example 22H2 will continue to reference Azure Stack HCI and won't reflect the name change. [Learn more](https://aka.ms/azloc-promo).
Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
---
2+
author: alkohli
3+
ms.author: alkohli
4+
ms.service: azure-local
5+
ms.topic: include
6+
ms.date: 01/08/2025
7+
ms.reviewer: alkohli
8+
---
9+
10+
> Applies to: Azure Stack HCI, version 22H2

azure-local/manage/configure-network-security-groups-with-tags.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: article
77
author: alkohli
88
ms.subservice:
99
zone_pivot_groups: windows-os
10-
ms.date: 01/28/2025
10+
ms.date: 05/28/2025
1111
---
1212

1313
# Configure network security groups with tags in Windows Admin Center
@@ -50,7 +50,7 @@ Complete the following prerequisites to use network security groups with tags:
5050

5151
- You have Windows Server 2025 or later. For more information, see [Get started with Windows Server](/windows-server/get-started/get-started-with-windows-server).
5252

53-
- You have a Network Controller installed. For more information, see how to [Deploy an SDN infrastructure using SDN Express](sdn-express.md?context=/windows-server/context/windows-server-edge-networking).
53+
- You have a Network Controller installed. For more information, see how to Deploy an SDN infrastructure using SDN Express.
5454

5555
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
5656

azure-local/manage/manage-default-network-access-policies-virtual-machines-23h2.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: article
77
author: alkohli
88
ms.service: azure-local
99
zone_pivot_groups: windows-os
10-
ms.date: 01/28/2025
10+
ms.date: 05/28/2025
1111
---
1212

1313
# Use default network access policies on virtual machines on Azure Local
@@ -106,27 +106,27 @@ Here's an example that explains how you can attach your VM directly to a VLAN wh
106106

107107
1. When creating a VM, attach it to the logical network and logical network subnet created earlier. For more information, see how to [Create a logical network](./tenant-logical-networks.md).
108108

109-
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/attach-vm-logical-network-1.png" alt-text="Screenshot showing how to attach VM directly to VLAN." lightbox="./media/manage-default-network-access-policies-virtual-machines/attach-vm-logical-network-1.png":::
109+
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines-23h2/attach-vm-logical-network-1.png" alt-text="Screenshot showing how to attach VM directly to VLAN." lightbox="./media/manage-default-network-access-policies-virtual-machines-23h2/attach-vm-logical-network-1.png":::
110110

111111
### Apply default network policies
112112

113113
When you create a VM through Windows Admin Center, you see a **Security level** setting.
114114

115-
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/security-level-2.png" alt-text="Screenshot showing the three security level options for VMs in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/security-level-2.png":::
115+
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines-23h2/security-level-2.png" alt-text="Screenshot showing the three security level options for VMs in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines-23h2/security-level-2.png":::
116116

117117
You have three options:
118118

119119
- **No protection** - Choose this option if you don't want to enforce any network access policies to your VM. When this option is selected, all ports on your VM are exposed to external networks posing a security risk. This option isn't recommended.
120120

121-
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/no-protection-1.png" alt-text="Screenshot showing the No protection option selected for VMs in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/no-protection-1.png":::
121+
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines-23h2/no-protection-1.png" alt-text="Screenshot showing the No protection option selected for VMs in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines-23h2/no-protection-1.png":::
122122

123123
- **Open some ports** - Choose this option to go with default policies. The default policies block all inbound access and allow all outbound access. You can optionally enable inbound access to one or more well defined ports, for example, HTTP, HTTPS, SSH, or RDP as per your requirements.
124124

125-
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/ports-to-open-1.png" alt-text="Screenshot showing the ports that can be opened on VMs specified during VM creation in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/ports-to-open-1.png":::
125+
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines-23h2/ports-to-open-1.png" alt-text="Screenshot showing the ports that can be opened on VMs specified during VM creation in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines-23h2/ports-to-open-1.png":::
126126

127127
- **Use existing NSG** - Choose this option to apply custom policies. You specify a Network Security Group (NSG) that you've already created.
128128

129-
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/use-existing-nsg-1.png" alt-text="Screenshot showing the existing network security group selected during VM creation in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/use-existing-nsg-1.png":::
129+
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines-23h2/use-existing-nsg-1.png" alt-text="Screenshot showing the existing network security group selected during VM creation in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines-23h2/use-existing-nsg-1.png":::
130130

131131
## VMs created outside of Windows Admin Center
132132

@@ -173,7 +173,7 @@ You might encounter issues when you create VMs outside of Windows Admin Center a
173173
174174
[!INCLUDE [hci-display-correct-default-network-policies-windows](../includes/hci-display-correct-default-network-policies-windows.md)]
175175
176-
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/enable-policies-other-vms-1.png" alt-text="Screenshot showing how to enable default network to VLAN." lightbox="./media/manage-default-network-access-policies-virtual-machines/enable-policies-other-vms-1.png":::
176+
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines-23h2/enable-policies-other-vms-1.png" alt-text="Screenshot showing how to enable default network to VLAN." lightbox="./media/manage-default-network-access-policies-virtual-machines-23h2/enable-policies-other-vms-1.png":::
177177
178178
::: zone-end
179179
@@ -185,7 +185,7 @@ You might encounter issues when you create VMs outside of Windows Admin Center a
185185
186186
[!INCLUDE [hci-display-correct-default-network-policies-windows](../includes/hci-display-correct-default-network-policies-windows.md)]
187187
188-
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/enable-policies-other-vms-1.png" alt-text="Screenshot showing how to enable default network to VLAN." lightbox="./media/manage-default-network-access-policies-virtual-machines/enable-policies-other-vms-1.png":::
188+
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines-23h2/enable-policies-other-vms-1.png" alt-text="Screenshot showing how to enable default network to VLAN." lightbox="./media/manage-default-network-access-policies-virtual-machines-2/enable-policies-other-vms-1.png":::
189189
190190
::: zone-end
191191

azure-local/manage/manage-sdn-multisite.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.author: alkohli
66
ms.topic: how-to
77
ms.subservice:
88
zone_pivot_groups: windows-os
9-
ms.date: 01/28/2025
9+
ms.date: 05/28/2025
1010
---
1111

1212
# Manage SDN Multisite for Azure Local and Windows Server
@@ -49,7 +49,7 @@ Before you can enable SDN Multisite, ensure the following prerequisites are met:
4949

5050
- There must be an underlying [physical network connectivity](../concepts/plan-software-defined-networking-infrastructure.md#physical-and-logical-network-configuration) between the sites. Additionally, the provider network name must be the same on both sites.
5151

52-
- SDN must be installed on both sites separately, using [Windows Admin Center](../deploy/sdn-wizard.md) or [SDN Express scripts](./sdn-express.md). Separate sites are required so that the SDN components, such as Network Controller VMs, Software Load Balancer Multiplexor VMs, and SDN Gateway VMs are unique to each site.
52+
- SDN must be installed on both sites separately, using [Windows Admin Center](../deploy/sdn-wizard.md) or SDN Express scripts. Separate sites are required so that the SDN components, such as Network Controller VMs, Software Load Balancer Multiplexor VMs, and SDN Gateway VMs are unique to each site.
5353

5454
::: zone-end
5555

@@ -59,7 +59,7 @@ Before you can enable SDN Multisite, ensure the following prerequisites are met:
5959

6060
- There must be an underlying [physical network connectivity](../concepts/plan-software-defined-networking-infrastructure.md?pivots=windows-server&context=/windows-server/context/windows-server-edge-networking#physical-and-logical-network-configuration) between the sites. Additionally, the provider network name must be the same on both sites.
6161

62-
- SDN must be installed on both sites separately, using [Windows Admin Center](../deploy/sdn-wizard.md?pivots=windows-server&context=/windows-server/context/windows-server-edge-networking) or [SDN Express scripts](./sdn-express.md?pivots=windows-server&context=/windows-server/context/windows-server-edge-networking). Separate sites are required so that the SDN components, such as Network Controller VMs, Software Load Balancer Multiplexor VMs, and SDN Gateway VMs are unique to each site.
62+
- SDN must be installed on both sites separately, using [Windows Admin Center](../deploy/sdn-wizard.md?pivots=windows-server&context=/windows-server/context/windows-server-edge-networking) or SDN Express scripts. Separate sites are required so that the SDN components, such as Network Controller VMs, Software Load Balancer Multiplexor VMs, and SDN Gateway VMs are unique to each site.
6363

6464
::: zone-end
6565

Loading
Loading
1.29 MB
Loading
1.22 MB
Loading

0 commit comments

Comments
 (0)