You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> Tag based network security groups in Windows Server 2025 is in PREVIEW. This information relates to a prerelease product that may be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
26
+
27
+
::: zone-end
28
+
15
29
This article describes how to configure network security groups with network security tags in Windows Admin Center.
16
30
17
31
With network security tags, you can create custom user-defined tags, attach those tags to your virtual machine (VM) network interfaces, and apply network access policies (with network security groups) based on these tags.
18
32
19
-
<!--Refactored the following section. Please review.-->
33
+
## Prerequisites
34
+
35
+
Complete the following prerequisites to use network security groups with tags:
36
+
37
+
:::zone pivot="azure-stack-hci"
38
+
39
+
- You have Azure Stack HCI 22H2 or later installed on your cluster. For more information, see how to [Install Azure Stack HCI](../deploy/install-azure-stack-hci.md).
40
+
41
+
- You have Network Controller installed. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
42
+
43
+
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
44
+
45
+
TODO: check Arc or non-Arc VMs?
46
+
- You have created a VM. For more information, see how to [Create Arc virtual machines on Azure Stack HCI](create-arc-virtual-machines.md).
47
+
48
+
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
49
+
50
+
::: zone-end
51
+
52
+
:::zone pivot="windows-server"
53
+
54
+
- You have Windows Server 2025 or later. For more information, see [Get started with Windows Server](/windows-server/get-started/get-started-with-windows-server).
55
+
56
+
- You have Network Controller installed. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md?context=/windows-server/context/windows-server-edge-networking).
57
+
58
+
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
59
+
60
+
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
61
+
62
+
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
63
+
64
+
::: zone-end
65
+
20
66
## Simplify security with network security tags
21
67
22
68
Network security groups allow you to configure access policies based on network constructs like network prefixes and subnets. For example, if you want to restrict communication between your Web Server VMs and database VMs, you must identify corresponding network subnets and create a policy to deny communication between those subnets. However, there are some limitations with this approach:
@@ -150,11 +196,23 @@ After you create a network security group, you're ready to create network securi
### Apply network security group to a network security tag
159
217
160
218
When you apply a network security group to a network security tag, the network security group rules apply to all VM network interfaces that are associated with that network security tag.
@@ -179,6 +237,17 @@ To apply a network security group to a network security tag via Windows Admin Ce
179
237
180
238
For related information, see also:
181
239
240
+
:::zone pivot="azure-stack-hci"
241
+
182
242
-[What is Datacenter Firewall?](../concepts/datacenter-firewall-overview.md)
183
243
-[Configure network security groups with Windows Admin Center](use-datacenter-firewall-windows-admin-center.md)
184
244
-[Configure network security groups with PowerShell](use-datacenter-firewall-powershell.md)
245
+
246
+
::: zone-end
247
+
:::zone pivot="windows-server"
248
+
249
+
-[What is Datacenter Firewall?](../concepts/datacenter-firewall-overview.md?context=/windows-server/context/windows-server-failover-clustering)
250
+
-[Configure network security groups with Windows Admin Center](use-datacenter-firewall-windows-admin-center.md?context=/windows-server/context/windows-server-failover-clustering)
251
+
-[Configure network security groups with PowerShell](use-datacenter-firewall-powershell.md?context=/windows-server/context/windows-server-failover-clustering)
This article describes how to enable default network access policies and assign these to virtual machines (VMs) running on Azure Stack HCI.
19
+
::: zone-end
20
+
21
+
:::zone pivot="windows-server"
22
+
23
+
>Applies to: Windows Server 2025 (preview)
24
+
> [!IMPORTANT]
25
+
> Network access policies in Windows Server 2025 is in PREVIEW. This information relates to a prerelease product that may be substantially modified before it's released. Microsoft makes no warranties, expressed or implied, with respect to the information provided here.
26
+
27
+
::: zone-end
28
+
29
+
This article describes how to enable default network access policies and assign these to virtual machines (VMs).
16
30
17
-
Default network policies can be used to protect virtual machines running on your Azure Stack HCI from external unauthorized attacks. These policies block all inbound access to virtual machines on Azure Stack HCI (except the specified management ports you want enabled) while allowing all outbound access. Use these policies to ensure that your workload VMs have access to only required assets, thereby making it difficult for the threats to spread laterally.
31
+
Default network policies can be used to protect virtual machines running from external unauthorized attacks. These policies block all inbound access to virtual machines (except the specified management ports you want enabled) while allowing all outbound access. Use these policies to ensure that your workload VMs have access to only required assets, thereby making it difficult for the threats to spread laterally.
18
32
19
33
> [!NOTE]
20
34
> In this release, you can enable and assign default network policies through the Windows Admin Center.
21
35
22
-
## Enable default network access policies
36
+
## Prerequisites
37
+
38
+
Complete the following prerequisites to use network access policies:
39
+
40
+
:::zone pivot="azure-stack-hci"
41
+
42
+
- You have Azure Stack HCI 23H2 or later installed on your cluster. For more information, see how to [Install Azure Stack HCI](../deploy/install-azure-stack-hci.md).
43
+
44
+
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
45
+
46
+
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
47
+
48
+
TODO: check Arc or non-Arc VMs?
49
+
- You have created a VM. For more information, see how to [Create Arc virtual machines on Azure Stack HCI](create-arc-virtual-machines.md).
50
+
51
+
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
52
+
53
+
::: zone-end
54
+
55
+
:::zone pivot="windows-server"
56
+
57
+
- You have Windows Server 2025 or later. For more information, see [Get started with Windows Server](/windows-server/get-started/get-started-with-windows-server).
58
+
59
+
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md?context=/windows-server/context/windows-server-edge-networking).
60
+
61
+
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
62
+
63
+
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
23
64
24
-
To enable default network access policies, you need to install Network Controller (NC). Network Controller enforces the default network policies and is deployed in the virtual machines. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
65
+
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
66
+
67
+
::: zone-end
25
68
26
69
## Assign default network policies to a VM
27
70
@@ -42,10 +85,21 @@ Depending on the type of network you want to attach your VM to, steps may be dif
42
85
43
86
After you have created a logical network in Windows Admin Center, you can create a VM in Windows Admin Center and attach it to the logical network. As part of VM creation, select the **Isolation Mode** as **Logical Network**, select the appropriate **Logical Subnet** under the Logical Network, and provide an IP address for the VM.
44
87
88
+
:::zone pivot="azure-stack-hci"
89
+
45
90
> [!NOTE]
46
91
> Unlike in 22H2, you can no longer connect a VM directly to a VLAN using Windows Admin Center. Instead, you must create a logical network representing the VLAN, create a logical network subnet with the VLAN, and then attach the VM to the logical network subnet.
47
92
48
-
Here's an example that explains how you can attach your VM directly to a VLAN with Azure Stack HCI 22H2 when Network Controller is installed. In this example, we demonstrate how to connect your VM to VLAN 5:
93
+
::: zone-end
94
+
95
+
:::zone pivot="windows-server"
96
+
97
+
> [!NOTE]
98
+
> You must create a logical network representing the VLAN, create a logical network subnet with the VLAN, and then attach the VM to the logical network subnet.
99
+
100
+
::: zone-end
101
+
102
+
Here's an example that explains how you can attach your VM directly to a VLAN when Network Controller is installed. In this example, we demonstrate how to connect your VM to VLAN 5:
49
103
50
104
1. Create a logical network with any name. Ensure that Network Virtualization is disabled.
51
105
@@ -79,15 +133,15 @@ You have three options:
79
133
80
134
## VMs created outside of Windows Admin Center
81
135
82
-
If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShell cmdlet) to create VMs on your Azure Stack HCI, and you have enabled default network access policies, you might encounter these two issues:
136
+
If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShell cmdlet) to create VMs, and you have enabled default network access policies, you might encounter these two issues:
83
137
84
138
- The VMs may not have network connectivity. This happens since the VM is being managed by a Hyper-V switch extension called Virtual Filtering Platform (VFP) and by default, the Hyper-V port connected to the VM is in blocked state.
85
139
86
140
To unblock the port, run the following commands from a PowerShell session on a Hyper-V host where the VM is located:
87
141
88
142
1. Run PowerShell as an administrator.
89
143
1. Download and install the [SdnDiagnostics](https://www.powershellgallery.com/packages/SdnDiagnostics) module. Run the following command:
90
-
144
+
91
145
```azurepowershell
92
146
Install-Module -Name SdnDiagnostics
93
147
```
@@ -107,17 +161,26 @@ If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShe
107
161
```
108
162
109
163
Ensure that VFP port profile information is returned for the adapter. If not, then proceed with associating a port profile.
- The VM doesn't have default network policies applied. Since this VM was created outside Windows Admin Center, the default policies for the VM aren't applied, and the **Network Settings** for the VM doesn't display correctly. To rectify this issue, follow these steps:
118
172
173
+
:::zone pivot="azure-stack-hci"
174
+
175
+
In Windows Admin Center, [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering). Create a subnet under the logical network and provide no VLAN ID or subnet prefix. Then, attach a VM to the logical network using the following steps:
176
+
177
+
::: zone-end
178
+
:::zone pivot="windows-server"
179
+
119
180
In Windows Admin Center, [Create a logical network](./tenant-logical-networks.md). Create a subnet under the logical network and provide no VLAN ID or subnet prefix. Then, attach a VM to the logical network using the following steps:
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/enable-policies-other-vms-1.png" alt-text="Screenshot showing how to enable default network to VLAN." lightbox="./media/manage-default-network-access-policies-virtual-machines/enable-policies-other-vms-1.png":::
@@ -126,4 +189,13 @@ If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShe
126
189
127
190
Learn more about:
128
191
129
-
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md)
192
+
:::zone pivot="azure-stack-hci"
193
+
194
+
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md)
195
+
196
+
::: zone-end
197
+
:::zone pivot="windows-server"
198
+
199
+
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md?context=/windows-server/context/windows-server-failover-clustering)
0 commit comments