Skip to content

Commit ae22bcc

Browse files
committed
Acrolinx and prerequisite edits
1 parent 469053f commit ae22bcc

File tree

2 files changed

+30
-28
lines changed

2 files changed

+30
-28
lines changed

azure-stack/hci/manage/configure-network-security-groups-with-tags.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: article
77
author: sethmanheim
88
ms.subservice: core-os
99
zone_pivot_groups: windows-os
10-
ms.date: 10/03/2024
10+
ms.date: 10/10/2024
1111
---
1212

1313
# Configure network security groups with tags in Windows Admin Center
@@ -40,11 +40,11 @@ Complete the following prerequisites to use network security groups with tags:
4040

4141
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
4242

43-
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
43+
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
4444

45-
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
45+
- You have a VM to apply a network security group to. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
4646

47-
- FIXME: You have permissions to manage network. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
47+
- You have administrator permissions or equivalent to the cluster nodes and network controller.
4848

4949
::: zone-end
5050

@@ -54,11 +54,11 @@ Complete the following prerequisites to use network security groups with tags:
5454

5555
- You have Network Controller installed. For more information, see how to [Deploy an SDN infrastructure using SDN Express](../manage/sdn-express?context=/windows-server/context/windows-server-edge-networking).
5656

57-
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
57+
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
5858

59-
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
59+
- You have a VM to apply a network security group to. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
6060

61-
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
61+
- You have administrator permissions or equivalent to the cluster nodes and network controller.
6262

6363
::: zone-end
6464

@@ -70,9 +70,9 @@ Network security groups allow you to configure access policies based on network
7070

7171
- When building policies for applications, you might want to reuse them across different scenarios. For example, if your production web app can only be reached over port 80 from the internet, and can't be reached by other apps in production or other environments, you'd have a similar policy for any new app. However, with network segmentation, recreating policies becomes necessary due to unique network elements for each app.
7272

73-
- If you decommission an old application and provision a new one within the same network segment, policy adjustments are required.
73+
- If you decommission an old application and deploy a new one within the same network segment, policy adjustments are required.
7474

75-
With the network security tags feature, you no longer need to track the network segments where your applications are hosted. This simplifies policy management and avoids the complexities associated with network constructs. Let's reconsider the example with Web Server and database VMs: Tag the corresponding VMs with "Web" and "Database" network security tags, then create a rule to restrict communication between "Web" and "Database" tags.
75+
With network security tags, you no longer need to track the network segments where your applications are hosted. Network security tags simplify policy management and avoids the complexities associated with network constructs. Let's reconsider the example with Web Server and database VMs: Tag the corresponding VMs with "Web" and "Database" network security tags, then create a rule to restrict communication between "Web" and "Database" tags.
7676

7777
## Create network security tag based network security groups
7878

@@ -176,7 +176,7 @@ After you create a network security group, you're ready to create network securi
176176
| ----- | ----------- |
177177
| **Name** | Name of the rule. |
178178
| **Priority** | Priority of the rule. Acceptable values are **101** to **65000**. A lower value denotes a higher priority. |
179-
| **Types** | Type of the rule. This can be **Inbound** or **Outbound**. |
179+
| **Types** | Type of the rule. This rule type can be **Inbound** or **Outbound**. |
180180
| **Protocol** | Protocol to match either an incoming or outgoing packet. Acceptable values are **All****TCP** and **UDP**. |
181181
| **Source** | Select **Network Security Tag**.<br><br>**Note:** You can either select an address prefix or a network security tag but not both. |
182182
| **Source Security Tag Type** | (Optional) Select a type for the tag. |
@@ -203,6 +203,7 @@ You can apply a network security group to:
203203
- [Network security tag](#apply-network-security-group-to-a-network-security-tag)
204204

205205
::: zone-end
206+
206207
:::zone pivot="windows-server"
207208

208209
- [Virtual network subnet](use-datacenter-firewall-windows-admin-center.md?context=/windows-server/context/windows-server-failover-clustering#apply-a-network-security-group-to-a-virtual-network)

azure-stack/hci/manage/manage-default-network-access-policies-virtual-machines-23h2.md

Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.topic: article
77
author: alkohli
88
ms.subservice: core-os
99
zone_pivot_groups: windows-os
10-
ms.date: 10/03/2024
10+
ms.date: 10/10/2024
1111
---
1212

1313
# Use default network access policies on virtual machines on Azure Stack HCI, version 23H2
@@ -26,9 +26,9 @@ ms.date: 10/03/2024
2626
2727
::: zone-end
2828

29-
This article describes how to enable default network access policies and assign these to virtual machines (VMs).
29+
This article describes how to enable default network access policies and assign them to virtual machines (VMs).
3030

31-
Default network policies can be used to protect virtual machines running from external unauthorized attacks. These policies block all inbound access to virtual machines (except the specified management ports you want enabled) while allowing all outbound access. Use these policies to ensure that your workload VMs have access to only required assets, thereby making it difficult for the threats to spread laterally.
31+
Default network policies can be used to protect virtual machines running from external unauthorized attacks. These policies block all inbound access to virtual machines (except the specified management ports you want enabled) while allowing all outbound access. Use these policies to ensure that your workload VMs have access to only required assets, making it difficult for the threats to spread laterally.
3232

3333
> [!NOTE]
3434
> In this release, you can enable and assign default network policies through the Windows Admin Center.
@@ -43,11 +43,11 @@ Complete the following prerequisites to use network access policies:
4343

4444
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md).
4545

46-
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
46+
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md) or [Create a virtual network](./tenant-virtual-networks.md).
4747

48-
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
48+
- You have a VM to apply policies to. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
4949

50-
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
50+
- You have administrator permissions or equivalent to the cluster nodes and network controller.
5151

5252
::: zone-end
5353

@@ -57,26 +57,26 @@ Complete the following prerequisites to use network access policies:
5757

5858
- You have Network Controller installed. Network Controller enforces the default network policies. For more information, see how to [Install Network Controller](../deploy/sdn-wizard-23h2.md?context=/windows-server/context/windows-server-edge-networking).
5959

60-
- You have created a logical network or a virtual network. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
60+
- You have a logical network or a virtual network to use. For more information, see how to [Create a logical network](./tenant-logical-networks.md?context=/windows-server/context/windows-server-failover-clustering) or [Create a virtual network](./tenant-virtual-networks.md?context=/windows-server/context/windows-server-failover-clustering).
6161

62-
- You have created a VM. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
62+
- You have a VM to apply policies to. For more information, see how to [Manage VMs with Windows Admin Center](vm.md?context=/windows-server/context/windows-server-failover-clustering#create-a-new-vm).
6363

64-
- FIXME: You have permissions to manage network access policies. For more information, see how to [Assign permissions to manage network access policies](./assign-permissions.md).
64+
- You have administrator permissions or equivalent to the cluster nodes and network controller.
6565

6666
::: zone-end
6767

6868
## Assign default network policies to a VM
6969

7070
You can attach default policies to a VM in two ways:
7171

72-
- During VM creation. You'll need to attach the VM to a logical network (traditional VLAN network) or an SDN virtual network.
72+
- During VM creation. You need to attach the VM to a logical network (traditional VLAN network) or an SDN virtual network.
7373
- Post VM creation.
7474

7575
### Create and attach networks
7676

77-
Depending on the type of network you want to attach your VM to, steps may be different.
77+
Depending on the type of network you want to attach your VM to, steps might be different.
7878

79-
- **Attach VMs to a physical network**: Create one or more logical networks to represent those physical networks. A logical network is just a representation of the physical network(s) available to your Azure Stack HCI. For more information, see how to [Create a logical network](./tenant-logical-networks.md).
79+
- **Attach VMs to a physical network**: Create one or more logical networks to represent those physical networks. A logical network is just a representation of one or more physical networks available to your Azure Stack HCI. For more information, see how to [Create a logical network](./tenant-logical-networks.md).
8080

8181
- **Attach VMs to a SDN virtual network**: Create a virtual network before you create the VM. For more information, see how to [Create a virtual network](./tenant-virtual-networks.md).
8282

@@ -112,29 +112,29 @@ Here's an example that explains how you can attach your VM directly to a VLAN wh
112112

113113
### Apply default network policies
114114

115-
When you create a VM through Windows Admin Center, you'll see a **Security level** setting.
115+
When you create a VM through Windows Admin Center, you see a **Security level** setting.
116116

117117
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/security-level-2.png" alt-text="Screenshot showing the three security level options for VMs in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/security-level-2.png":::
118118

119119
You have three options:
120120

121-
- **No protection** - Choose this option if you don't want to enforce any network access policies to your VM. When this option is selected, all ports on your VM are exposed to external networks thereby posing a security risk. This option isn't recommended.
121+
- **No protection** - Choose this option if you don't want to enforce any network access policies to your VM. When this option is selected, all ports on your VM are exposed to external networks posing a security risk. This option isn't recommended.
122122

123123
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/no-protection-1.png" alt-text="Screenshot showing the No protection option selected for VMs in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/no-protection-1.png":::
124124

125125
- **Open some ports** - Choose this option to go with default policies. The default policies block all inbound access and allow all outbound access. You can optionally enable inbound access to one or more well defined ports, for example, HTTP, HTTPS, SSH, or RDP as per your requirements.
126126

127127
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/ports-to-open-1.png" alt-text="Screenshot showing the ports that can be opened on VMs specified during VM creation in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/ports-to-open-1.png":::
128128

129-
- **Use existing NSG** - Choose this option to apply custom policies. You'll specify a Network Security Group (NSG) that you've already created.
129+
- **Use existing NSG** - Choose this option to apply custom policies. You specify a Network Security Group (NSG) that you've already created.
130130

131131
:::image type="content" source="./media/manage-default-network-access-policies-virtual-machines/use-existing-nsg-1.png" alt-text="Screenshot showing the existing network security group selected during VM creation in Windows Admin Center." lightbox="./media/manage-default-network-access-policies-virtual-machines/use-existing-nsg-1.png":::
132132

133133
## VMs created outside of Windows Admin Center
134134

135-
If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShell cmdlet) to create VMs, and you have enabled default network access policies, you might encounter these two issues:
135+
You might encounter issues when you create VMs outside of Windows Admin Center and you have enabled default network access policies. For example, you've enabled default network access policies and created VMs using Hyper-V UI or New-VM PowerShell cmdlet.
136136

137-
- The VMs may not have network connectivity. This happens since the VM is being managed by a Hyper-V switch extension called Virtual Filtering Platform (VFP) and by default, the Hyper-V port connected to the VM is in blocked state.
137+
- The VMs might not have network connectivity. Since the VM is being managed by a Hyper-V switch extension called Virtual Filtering Platform (VFP) and by default, the Hyper-V port connected to the VM is in blocked state.
138138

139139
To unblock the port, run the following commands from a PowerShell session on a Hyper-V host where the VM is located:
140140

@@ -145,7 +145,7 @@ If you're using alternate mechanisms (for example, Hyper-V UI or New-VM PowerShe
145145
Install-Module -Name SdnDiagnostics
146146
```
147147
148-
Alternatively, if already installed then use the following:
148+
Alternatively, if already installed then use the following command:
149149
150150
```azurepowershell
151151
Update-Module -Name SdnDiagnostics
@@ -200,6 +200,7 @@ Learn more about:
200200
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md)
201201
202202
::: zone-end
203+
203204
:::zone pivot="windows-server"
204205
205206
- [Configure network security groups with tags](../concepts/datacenter-firewall-overview.md?context=/windows-server/context/windows-server-failover-clustering)

0 commit comments

Comments
 (0)