Skip to content

Commit 7a163a9

Browse files
committed
Updating tag based segmentation articles for Windows Server 2025
1 parent f758bae commit 7a163a9

File tree

2 files changed

+154
-13
lines changed

2 files changed

+154
-13
lines changed

azure-stack/hci/manage/configure-network-security-groups-with-tags.md

Lines changed: 71 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,64 @@ ms.author: sethm
55
ms.reviewer: anpaul
66
ms.topic: article
77
author: sethmanheim
8-
ms.date: 04/02/2024
8+
ms.subservice: core-os
9+
zone_pivot_groups: windows-os
10+
ms.date: 10/03/2024
911
---
1012

1113
# Configure network security groups with tags in Windows Admin Center
1214

15+
:::zone pivot="azure-stack-hci"
16+
1317
[!INCLUDE [hci-applies-to-23h2-22h2](../../includes/hci-applies-to-23h2-22h2.md)]
1418

19+
::: zone-end
20+
21+
:::zone pivot="windows-server"
22+
23+
>Applies to: Windows Server 2025 (preview)
24+
> [!IMPORTANT]
25+
> Tag based network security groups in Windows Server 2025 is in PREVIEW. This information relates to a prerelease product that may be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
26+
27+
::: zone-end
28+
1529
This article describes how to configure network security groups with network security tags in Windows Admin Center.
1630

1731
With network security tags, you can create custom user-defined tags, attach those tags to your virtual machine (VM) network interfaces, and apply network access policies (with network security groups) based on these tags.
1832

19-
<!--Refactored the following section. Please review.-->
33+
## Prerequisites
34+
35+
Complete the following prerequisites to use network security groups with tags:
36+
37+
:::zone pivot="azure-stack-hci"
38+
39+
- You have Azure Stack HCI 22H2 or later installed on your cluster. For more information, see how to [Install Azure Stack HCI](../deploy/install-azure-stack-hci.md).
40+
41+
- You have Network Controller installed. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
42+
43+
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
44+
45+
TODO: check Arc or non-Arc VMs?
46+
- You have created a VM. For more information, see how to [Create Arc virtual machines on Azure Stack HCI](create-arc-virtual-machines.md).
47+
48+
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
49+
50+
::: zone-end
51+
52+
:::zone pivot="windows-server"
53+
54+
- You have Windows Server 2025 or later. For more information, see [Get started with Windows Server](/windows-server/get-started/get-started-with-windows-server).
55+
56+
- You have Network Controller installed. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md?context=/windows-server/context/windows-server-edge-networking).
57+
58+
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
59+
60+
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
61+
62+
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
63+
64+
::: zone-end
65+
2066
## Simplify security with network security tags
2167

2268
Network security groups allow you to configure access policies based on network constructs like network prefixes and subnets. For example, if you want to restrict communication between your Web Server VMs and database VMs, you must identify corresponding network subnets and create a policy to deny communication between those subnets. However, there are some limitations with this approach:
@@ -150,11 +196,23 @@ After you create a network security group, you're ready to create network securi
150196

151197
You can apply a network security group to:
152198

199+
:::zone pivot="azure-stack-hci"
200+
153201
- [Virtual network subnet](use-datacenter-firewall-windows-admin-center.md#apply-a-network-security-group-to-a-virtual-network)
154202
- [Logical network subnet](use-datacenter-firewall-windows-admin-center.md#apply-a-network-security-group-to-a-logical-network)
155203
- [Specific network interface](use-datacenter-firewall-windows-admin-center.md#apply-a-network-security-group-to-a-network-interface)
156204
- [Network security tag](#apply-network-security-group-to-a-network-security-tag)
157205

206+
::: zone-end
207+
:::zone pivot="windows-server"
208+
209+
- [Virtual network subnet](use-datacenter-firewall-windows-admin-center.md?context=/windows-server/context/windows-server-failover-clustering#apply-a-network-security-group-to-a-virtual-network)
210+
- [Logical network subnet](use-datacenter-firewall-windows-admin-center.md?context=/windows-server/context/windows-server-failover-clustering#apply-a-network-security-group-to-a-logical-network)
211+
- [Specific network interface](use-datacenter-firewall-windows-admin-center.md?context=/windows-server/context/windows-server-failover-clustering#apply-a-network-security-group-to-a-network-interface)
212+
- [Network security tag](#apply-network-security-group-to-a-network-security-tag)
213+
214+
::: zone-end
215+
158216
### Apply network security group to a network security tag
159217

160218
When you apply a network security group to a network security tag, the network security group rules apply to all VM network interfaces that are associated with that network security tag.
@@ -179,6 +237,17 @@ To apply a network security group to a network security tag via Windows Admin Ce
179237

180238
For related information, see also:
181239

240+
:::zone pivot="azure-stack-hci"
241+
182242
- [What is Datacenter Firewall?](../concepts/datacenter-firewall-overview.md)
183243
- [Configure network security groups with Windows Admin Center](use-datacenter-firewall-windows-admin-center.md)
184244
- [Configure network security groups with PowerShell](use-datacenter-firewall-powershell.md)
245+
246+
::: zone-end
247+
:::zone pivot="windows-server"
248+
249+
- [What is Datacenter Firewall?](../concepts/datacenter-firewall-overview.md?context=/windows-server/context/windows-server-failover-clustering)
250+
- [Configure network security groups with Windows Admin Center](use-datacenter-firewall-windows-admin-center.md?context=/windows-server/context/windows-server-failover-clustering)
251+
- [Configure network security groups with PowerShell](use-datacenter-firewall-powershell.md?context=/windows-server/context/windows-server-failover-clustering)
252+
253+
::: zone-end

azure-stack/hci/manage/manage-default-network-access-policies-virtual-machines-23h2.md

Lines changed: 83 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,23 +5,66 @@ ms.author: alkohli
55
ms.reviewer: anpaul
66
ms.topic: article
77
author: alkohli
8-
ms.date: 05/22/2024
8+
ms.subservice: core-os
9+
zone_pivot_groups: windows-os
10+
ms.date: 10/03/2024
911
---
1012

1113
# Use default network access policies on virtual machines on Azure Stack HCI, version 23H2
1214

15+
:::zone pivot="azure-stack-hci"
16+
1317
[!INCLUDE [applies-to](../../includes/hci-applies-to-23h2.md)]
1418

15-
This article describes how to enable default network access policies and assign these to virtual machines (VMs) running on Azure Stack HCI.
19+
::: zone-end
20+
21+
:::zone pivot="windows-server"
22+
23+
>Applies to: Windows Server 2025 (preview)
24+
> [!IMPORTANT]
25+
> Network access policies in Windows Server 2025 is in PREVIEW. This information relates to a prerelease product that may be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
26+
27+
::: zone-end
28+
29+
This article describes how to enable default network access policies and assign these to virtual machines (VMs).
1630

17-
Default network policies can be used to protect virtual machines running on your Azure Stack HCI from external unauthorized attacks. These policies block all inbound access to virtual machines on Azure Stack HCI (except the specified management ports you want enabled) while allowing all outbound access. Use these policies to ensure that your workload VMs have access to only required assets, thereby making it difficult for the threats to spread laterally.
31+
Default network policies can be used to protect virtual machines running from external unauthorized attacks. These policies block all inbound access to virtual machines (except the specified management ports you want enabled) while allowing all outbound access. Use these policies to ensure that your workload VMs have access to only required assets, thereby making it difficult for the threats to spread laterally.
1832

1933
> [!NOTE]
2034
> In this release, you can enable and assign default network policies through the Windows Admin Center.
2135
22-
## Enable default network access policies
36+
## Prerequisites
37+
38+
Complete the following prerequisites to use network access policies:
39+
40+
:::zone pivot="azure-stack-hci"
41+
42+
- You have Azure Stack HCI 23H2 or later installed on your cluster. For more information, see how to [Install Azure Stack HCI](../deploy/install-azure-stack-hci.md).
43+
44+
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
45+
46+
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
47+
48+
TODO: check Arc or non-Arc VMs?
49+
- You have created a VM. For more information, see how to [Create Arc virtual machines on Azure Stack HCI](create-arc-virtual-machines.md).
50+
51+
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
52+
53+
::: zone-end
54+
55+
:::zone pivot="windows-server"
56+
57+
- You have Windows Server 2025 or later. For more information, see [Get started with Windows Server](/windows-server/get-started/get-started-with-windows-server).
58+
59+
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md?context=/windows-server/context/windows-server-edge-networking).
60+
61+
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
62+
63+
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
2364

24-
To enable default network access policies, you need to install Network Controller (NC). Network Controller enforces the default network policies and is deployed in the virtual machines. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
65+
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
66+
67+
::: zone-end
2568

2669
## Assign default network policies to a VM
2770

@@ -42,10 +85,21 @@ Depending on the type of network you want to attach your VM to, steps may be dif
4285

4386
After you have created a logical network in Windows Admin Center, you can create a VM in Windows Admin Center and attach it to the logical network. As part of VM creation, select the **Isolation Mode** as **Logical Network**, select the appropriate **Logical Subnet** under the Logical Network, and provide an IP address for the VM.
4487

88+
:::zone pivot="azure-stack-hci"
89+
4590
> [!NOTE]
4691
> Unlike in 22H2, you can no longer connect a VM directly to a VLAN using Windows Admin Center. Instead, you must create a logical network representing the VLAN, create a logical network subnet with the VLAN, and then attach the VM to the logical network subnet.
4792
48-
Here's an example that explains how you can attach your VM directly to a VLAN with Azure Stack HCI 22H2 when Network Controller is installed. In this example, we demonstrate how to connect your VM to VLAN 5:
93+
::: zone-end
94+
95+
:::zone pivot="windows-server"
96+
97+
> [!NOTE]
98+
> You must create a logical network representing the VLAN, create a logical network subnet with the VLAN, and then attach the VM to the logical network subnet.
99+
100+
::: zone-end
101+
102+
Here's an example that explains how you can attach your VM directly to a VLAN when Network Controller is installed. In this example, we demonstrate how to connect your VM to VLAN 5:
49103

50104
1. Create a logical network with any name. Ensure that Network Virtualization is disabled.
51105

@@ -79,15 +133,15 @@ You have three options:
79133

80134
## VMs created outside of Windows Admin Center
81135

82-
If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShell cmdlet) to create VMs on your Azure Stack HCI, and you have enabled default network access policies, you might encounter these two issues:
136+
If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShell cmdlet) to create VMs, and you have enabled default network access policies, you might encounter these two issues:
83137

84138
- The VMs may not have network connectivity. This happens since the VM is being managed by a Hyper-V switch extension called Virtual Filtering Platform (VFP) and by default, the Hyper-V port connected to the VM is in blocked state.
85139

86140
To unblock the port, run the following commands from a PowerShell session on a Hyper-V host where the VM is located:
87141

88142
1. Run PowerShell as an administrator.
89143
1. Download and install the [SdnDiagnostics](https://www.powershellgallery.com/packages/SdnDiagnostics) module. Run the following command:
90-
144+
91145
```azurepowershell
92146
Install-Module -Name SdnDiagnostics
93147
```
@@ -107,17 +161,26 @@ If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShe
107161
```
108162
109163
Ensure that VFP port profile information is returned for the adapter. If not, then proceed with associating a port profile.
110-
164+
111165
1. Specify the ports to be unblocked on the VM.
112-
166+
113167
```azurepowershell
114168
Set-SdnVMNetworkAdapterPortProfile -VMName <VMName> -MacAddress <MACAddress> -ProfileId ([guid]::Empty) -ProfileData 2
115169
```
116170
117171
- The VM doesn't have default network policies applied. Since this VM was created outside Windows Admin Center, the default policies for the VM aren't applied, and the **Network Settings** for the VM doesn't display correctly. To rectify this issue, follow these steps:
118172
173+
:::zone pivot="azure-stack-hci"
174+
175+
In Windows Admin Center, [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering). Create a subnet under the logical network and provide no VLAN ID or subnet prefix. Then, attach a VM to the logical network using the following steps:
176+
177+
::: zone-end
178+
:::zone pivot="windows-server"
179+
119180
In Windows Admin Center, [Create a logical network](./tenant-logical-networks.md). Create a subnet under the logical network and provide no VLAN ID or subnet prefix. Then, attach a VM to the logical network using the following steps:
120181
182+
::: zone-end
183+
121184
[!INCLUDE [hci-display-correct-default-network-policies-windows](../../includes/hci-display-correct-default-network-policies-windows.md)]
122185
123186
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/enable-policies-other-vms-1.png" alt-text="Screenshot showing how to enable default network to VLAN." lightbox="./media/manage-default-network-access-policies-virtual-machines/enable-policies-other-vms-1.png":::
@@ -126,4 +189,13 @@ If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShe
126189
127190
Learn more about:
128191
129-
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md)
192+
:::zone pivot="azure-stack-hci"
193+
194+
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md)
195+
196+
::: zone-end
197+
:::zone pivot="windows-server"
198+
199+
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md?context=/windows-server/context/windows-server-failover-clustering)
200+
201+
::: zone-end

0 commit comments

Comments
 (0)