You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-stack/hci/manage/configure-network-security-groups-with-tags.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.topic: article
7
7
author: sethmanheim
8
8
ms.subservice: core-os
9
9
zone_pivot_groups: windows-os
10
-
ms.date: 10/03/2024
10
+
ms.date: 10/10/2024
11
11
---
12
12
13
13
# Configure network security groups with tags in Windows Admin Center
@@ -40,11 +40,11 @@ Complete the following prerequisites to use network security groups with tags:
40
40
41
41
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
42
42
43
-
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
43
+
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
44
44
45
-
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
45
+
- You have a VM to apply a network security group to. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
46
46
47
-
-FIXME: You have permissions to manage network. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
47
+
- You have administrator permissions or equivalent to the cluster nodes and network controller.
48
48
49
49
::: zone-end
50
50
@@ -54,11 +54,11 @@ Complete the following prerequisites to use network security groups with tags:
54
54
55
55
- You have Network Controller installed. For more information, see how to [Deploy an SDN infrastructure using SDN Express](../manage/sdn-express?context=/windows-server/context/windows-server-edge-networking).
56
56
57
-
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
57
+
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
58
58
59
-
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
59
+
- You have a VM to apply a network security group to. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
60
60
61
-
-FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
61
+
- You have administrator permissions or equivalent to the cluster nodes and network controller.
62
62
63
63
::: zone-end
64
64
@@ -70,9 +70,9 @@ Network security groups allow you to configure access policies based on network
70
70
71
71
- When building policies for applications, you might want to reuse them across different scenarios. For example, if your production web app can only be reached over port 80 from the internet, and can't be reached by other apps in production or other environments, you'd have a similar policy for any new app. However, with network segmentation, recreating policies becomes necessary due to unique network elements for each app.
72
72
73
-
- If you decommission an old application and provision a new one within the same network segment, policy adjustments are required.
73
+
- If you decommission an old application and deploy a new one within the same network segment, policy adjustments are required.
74
74
75
-
With the network security tags feature, you no longer need to track the network segments where your applications are hosted. This simplifies policy management and avoids the complexities associated with network constructs. Let's reconsider the example with Web Server and database VMs: Tag the corresponding VMs with "Web" and "Database" network security tags, then create a rule to restrict communication between "Web" and "Database" tags.
75
+
With network security tags, you no longer need to track the network segments where your applications are hosted. Network security tags simplify policy management and avoids the complexities associated with network constructs. Let's reconsider the example with Web Server and database VMs: Tag the corresponding VMs with "Web" and "Database" network security tags, then create a rule to restrict communication between "Web" and "Database" tags.
76
76
77
77
## Create network security tag based network security groups
78
78
@@ -176,7 +176,7 @@ After you create a network security group, you're ready to create network securi
176
176
| ----- | ----------- |
177
177
|**Name**| Name of the rule. |
178
178
|**Priority**| Priority of the rule. Acceptable values are **101** to **65000**. A lower value denotes a higher priority. |
179
-
|**Types**| Type of the rule. This can be **Inbound** or **Outbound**. |
179
+
|**Types**| Type of the rule. This rule type can be **Inbound** or **Outbound**. |
180
180
|**Protocol**| Protocol to match either an incoming or outgoing packet. Acceptable values are **All**, **TCP** and **UDP**. |
181
181
|**Source**| Select **Network Security Tag**.<br><br>**Note:** You can either select an address prefix or a network security tag but not both. |
182
182
|**Source Security Tag Type**| (Optional) Select a type for the tag. |
@@ -203,6 +203,7 @@ You can apply a network security group to:
Copy file name to clipboardExpand all lines: azure-stack/hci/manage/manage-default-network-access-policies-virtual-machines-23h2.md
+19-18Lines changed: 19 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.topic: article
7
7
author: alkohli
8
8
ms.subservice: core-os
9
9
zone_pivot_groups: windows-os
10
-
ms.date: 10/03/2024
10
+
ms.date: 10/10/2024
11
11
---
12
12
13
13
# Use default network access policies on virtual machines on Azure Stack HCI, version 23H2
@@ -26,9 +26,9 @@ ms.date: 10/03/2024
26
26
27
27
::: zone-end
28
28
29
-
This article describes how to enable default network access policies and assign these to virtual machines (VMs).
29
+
This article describes how to enable default network access policies and assign them to virtual machines (VMs).
30
30
31
-
Default network policies can be used to protect virtual machines running from external unauthorized attacks. These policies block all inbound access to virtual machines (except the specified management ports you want enabled) while allowing all outbound access. Use these policies to ensure that your workload VMs have access to only required assets, thereby making it difficult for the threats to spread laterally.
31
+
Default network policies can be used to protect virtual machines running from external unauthorized attacks. These policies block all inbound access to virtual machines (except the specified management ports you want enabled) while allowing all outbound access. Use these policies to ensure that your workload VMs have access to only required assets, making it difficult for the threats to spread laterally.
32
32
33
33
> [!NOTE]
34
34
> In this release, you can enable and assign default network policies through the Windows Admin Center.
@@ -43,11 +43,11 @@ Complete the following prerequisites to use network access policies:
43
43
44
44
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
45
45
46
-
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
46
+
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
47
47
48
-
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
48
+
- You have a VM to apply policies to. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
49
49
50
-
-FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
50
+
- You have administrator permissions or equivalent to the cluster nodes and network controller.
51
51
52
52
::: zone-end
53
53
@@ -57,26 +57,26 @@ Complete the following prerequisites to use network access policies:
57
57
58
58
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md?context=/windows-server/context/windows-server-edge-networking).
59
59
60
-
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
60
+
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
61
61
62
-
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
62
+
- You have a VM to apply policies to. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
63
63
64
-
-FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
64
+
- You have administrator permissions or equivalent to the cluster nodes and network controller.
65
65
66
66
::: zone-end
67
67
68
68
## Assign default network policies to a VM
69
69
70
70
You can attach default policies to a VM in two ways:
71
71
72
-
- During VM creation. You'll need to attach the VM to a logical network (traditional VLAN network) or an SDN virtual network.
72
+
- During VM creation. You need to attach the VM to a logical network (traditional VLAN network) or an SDN virtual network.
73
73
- Post VM creation.
74
74
75
75
### Create and attach networks
76
76
77
-
Depending on the type of network you want to attach your VM to, steps may be different.
77
+
Depending on the type of network you want to attach your VM to, steps might be different.
78
78
79
-
-**Attach VMs to a physical network**: Create one or more logical networks to represent those physical networks. A logical network is just a representation of the physical network(s) available to your Azure Stack HCI. For more information, see how to [Create a logical network](./tenant-logical-networks.md).
79
+
-**Attach VMs to a physical network**: Create one or more logical networks to represent those physical networks. A logical network is just a representation of one or more physical networks available to your Azure Stack HCI. For more information, see how to [Create a logical network](./tenant-logical-networks.md).
80
80
81
81
-**Attach VMs to a SDN virtual network**: Create a virtual network before you create the VM. For more information, see how to [Create a virtual network](./tenant-virtual-networks.md).
82
82
@@ -112,29 +112,29 @@ Here's an example that explains how you can attach your VM directly to a VLAN wh
112
112
113
113
### Apply default network policies
114
114
115
-
When you create a VM through Windows Admin Center, you'll see a **Security level** setting.
115
+
When you create a VM through Windows Admin Center, you see a **Security level** setting.
116
116
117
117
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/security-level-2.png" alt-text="Screenshot showing the three security level options for VMs in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/security-level-2.png":::
118
118
119
119
You have three options:
120
120
121
-
-**No protection** - Choose this option if you don't want to enforce any network access policies to your VM. When this option is selected, all ports on your VM are exposed to external networks thereby posing a security risk. This option isn't recommended.
121
+
-**No protection** - Choose this option if you don't want to enforce any network access policies to your VM. When this option is selected, all ports on your VM are exposed to external networks posing a security risk. This option isn't recommended.
122
122
123
123
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/no-protection-1.png" alt-text="Screenshot showing the No protection option selected for VMs in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/no-protection-1.png":::
124
124
125
125
-**Open some ports** - Choose this option to go with default policies. The default policies block all inbound access and allow all outbound access. You can optionally enable inbound access to one or more well defined ports, for example, HTTP, HTTPS, SSH, or RDP as per your requirements.
126
126
127
127
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/ports-to-open-1.png" alt-text="Screenshot showing the ports that can be opened on VMs specified during VM creation in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/ports-to-open-1.png":::
128
128
129
-
-**Use existing NSG** - Choose this option to apply custom policies. You'll specify a Network Security Group (NSG) that you've already created.
129
+
-**Use existing NSG** - Choose this option to apply custom policies. You specify a Network Security Group (NSG) that you've already created.
130
130
131
131
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/use-existing-nsg-1.png" alt-text="Screenshot showing the existing network security group selected during VM creation in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/use-existing-nsg-1.png":::
132
132
133
133
## VMs created outside of Windows Admin Center
134
134
135
-
If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShell cmdlet) to create VMs, and you have enabled default network access policies, you might encounter these two issues:
135
+
You might encounter issues when you create VMs outside of Windows Admin Center and you have enabled default network access policies. For example, you've enabled default network access policies and created VMs using Hyper-V UI or New-VM PowerShell cmdlet.
136
136
137
-
- The VMs may not have network connectivity. This happens since the VM is being managed by a Hyper-V switch extension called Virtual Filtering Platform (VFP) and by default, the Hyper-V port connected to the VM is in blocked state.
137
+
- The VMs might not have network connectivity. Since the VM is being managed by a Hyper-V switch extension called Virtual Filtering Platform (VFP) and by default, the Hyper-V port connected to the VM is in blocked state.
138
138
139
139
To unblock the port, run the following commands from a PowerShell session on a Hyper-V host where the VM is located:
140
140
@@ -145,7 +145,7 @@ If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShe
145
145
Install-Module -Name SdnDiagnostics
146
146
```
147
147
148
-
Alternatively, if already installed then use the following:
148
+
Alternatively, if already installed then use the following command:
149
149
150
150
```azurepowershell
151
151
Update-Module -Name SdnDiagnostics
@@ -200,6 +200,7 @@ Learn more about:
200
200
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md)
201
201
202
202
::: zone-end
203
+
203
204
:::zone pivot="windows-server"
204
205
205
206
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md?context=/windows-server/context/windows-server-failover-clustering)
0 commit comments