Skip to content

Commit d542740

Browse files
committed
Fixed blocking issues from PR review
1 parent a6e9d7a commit d542740

File tree

3 files changed

+7
-18
lines changed

3 files changed

+7
-18
lines changed
Binary file not shown.

azure-local/concepts/sdn-overview.md

Lines changed: 5 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,13 @@ SDN offers a centralized way to configure and manage networks and network servic
2222

2323
You can manage SDN on Azure Local in two ways: with Arc or with on-premises tools.
2424

25-
**SDN enabled by Arc** is in Preview and available for Azure Local 2506 with OS version 26100.xxxx or later.
25+
- **SDN enabled by Arc**: This feature is in Preview and is available for Azure Local 2506 with OS version 26100.xxxx or later.
2626

27-
In this method, the Network Controller runs as a Failover Cluster service instead of on a virtual machine (VM). When you enable SDN, the Network Controller integrates with the Azure Arc control plane, so you can manage both existing and new logical networks.
27+
In this method, the Network Controller runs as a Failover Cluster service instead of on a virtual machine (VM). When you enable SDN, the Network Controller integrates with the Azure Arc control plane, so you can manage both existing and new logical networks.
2828

29-
With SDN enabled by Azure Arc, you create and apply network security groups (NSGs) to logical networks and Azure Local VM network interfaces (NICs).
29+
With SDN enabled by Azure Arc, you create and apply network security groups (NSGs) to logical networks and Azure Local VM network interfaces (NICs).
3030

31-
You can also manage SDN with on-premises tools like Windows Admin Center or SDN Express scripts. This approach is available for Windows Server and Azure Local 2311.2 or later. This method uses three main SDN components, and you choose which to deploy: Network Controller, Software Load Balancer (SLB), and Gateway. For more information, see [SDN managed by on-premises tools](../concepts/software-defined-networking-23h2.md).
31+
- **SDN managed by on-premises tools**: You can also manage SDN with on-premises tools like Windows Admin Center or SDN Express scripts. This approach is available for Windows Server and Azure Local 2311.2 or later. This method uses three main SDN components, and you choose which to deploy: Network Controller, Software Load Balancer (SLB), and Gateway. For more information, see [SDN managed by on-premises tools](../concepts/software-defined-networking-23h2.md).
3232

3333
## Important considerations
3434

@@ -107,23 +107,13 @@ Before you deploy Azure Local and enable SDN, review these supported networking
107107
- The second compute intent is only for VMs and workloads traffic.
108108
- The third storage intent is only for storage traffic.
109109

110-
<!--## Choose SDN type based on your requirements
111-
112-
Starting release 2504, you have two ways to enable SDN.
113-
114-
- Use SDN enabled by Arc if workloads only require logical networks based on VLAN isolation and network security groups to secure access.​
115-
- Use SDN managed by on-prem tools if workloads require virtual networks for isolation, and load balancers or gateways.
116-
117-
Use the following detailed decision matrix to select the SDN type based on your requirements:
118-
119-
:::image type="content" source="./media/sdn-overview/sdn-type-decision-matrix.png" alt-text="Screenshot of SDN decision matrix." lightbox="./media/sdn-overview/sdn-type-decision-matrix.png":::-->
120110

121111

122112
## Next steps
123113

124114
For related information, see:
125115

126-
- [Enable SDN via action plan](../deploy/enable-sdn-integration.md)
116+
- [Enable SDN integration](../deploy/enable-sdn-integration.md)
127117
- [Deploy SDN infrastructure using SDN Express PowerShell scripts](../deploy/sdn-express-23h2.md)
128118

129119
::: moniker-end

azure-local/manage/manage-network-security-groups.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Manage network security groups and network security rules on Azure Local VMs (Preview)
3-
description: Learn how to manage network security groups and network security rules for Azure Local virtual machines(Preview).
3+
description: Learn how to manage network security groups and network security rules for Azure Local virtual machines (Preview).
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
@@ -683,7 +683,6 @@ This section describes the manage operations supported for network security rule
683683
az stack-hci-vm network nsg rule show -g $resource_group -n $securityrulename --nsg-name $nsgname
684684
```
685685
686-
<br></br>
687686
<details>
688687
<summary>Expand this section to see an example output.</summary>
689688
@@ -931,7 +930,7 @@ To dissociate a network security group from a logical network, follow these step
931930
1. Go to **Settings > Network security groups**.
932931
1. In the right-pane, from the top command bar, select **Dissociate network security group**.
933932
934-
:::image type="content" source="./media/manage-network-security-groups/dissociate-network-security-group-logical-network-2.png" alt-text="Screenshot of selecting Dissociate network security group for the specified logical network" lightbox="./media/manage-network-security-groups/dissociate-network-security-group-logical-network-2.png":::
933+
:::image type="content" source="./media/manage-network-security-groups/dissociate-network-security-group-logical-network-2.png" alt-text="Screenshot of selecting Dissociate network security group for the specified logical network." lightbox="./media/manage-network-security-groups/dissociate-network-security-group-logical-network-2.png":::
935934
936935
1. Confirm the dissociation.
937936

0 commit comments

Comments
 (0)