Skip to content

Commit f1ac51c

Browse files
committed
Updated
1 parent 2ed6948 commit f1ac51c

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

azure-local/concepts/sdn-overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.topic: conceptual
77
ms.service: azure-local
8-
ms.date: 06/17/2025
8+
ms.date: 06/24/2025
99
---
1010

1111
# Software Defined Networking enabled by Azure Arc on Azure Local (Preview)
@@ -35,7 +35,7 @@ You can also manage SDN with on-premises tools like Windows Admin Center or SDN
3535

3636
|Management method |Consideration |
3737
|---------|---------|
38-
|SDN enabled by Azure Arc | Enable SDN by running this PowerShell command `Add-EceFeature`. <br><br>If your Network controller Azure Local was deployed using on-premises tools, you must not attempt to run this method. <br><br>The only VMs that are in scope for using NSGs with this feature are Azure Local VMs. These Azure Local VMs were deployed from Azure client interfaces (Azure CLI, Azure portal, Azure Resource Manager). <br><br>Do not use an Azure Local VM in conjunction with an NSG that is managed and applied from on-premises tools. |
38+
|SDN enabled by Azure Arc | Enable SDN by running this PowerShell command `Add-EceFeature`. <br><br>If Network controller on your Azure Local was deployed using on-premises tools, you must not attempt to run this method. <br><br>The only VMs that are in scope for using NSGs with this feature are Azure Local VMs. These Azure Local VMs were deployed from Azure client interfaces (Azure CLI, Azure portal, Azure Resource Manager). <br><br>Do not use an Azure Local VM in conjunction with an NSG that is managed and applied from on-premises tools. |
3939
|SDN managed by on-premises tools | Enable SDN using on-premises tools like Windows Admin Center or SDN Express scripts. <br><br>If Network Controller on your Azure Local was deployed using PowerShell command `Add-EceFeature`, you must not attempt to run SDN managed by on-premises tools. <br><br>The only VMs that are in scope for NSG management using this feature are unmanaged VMs that were deployed from local tools such as Windows Admin Center, Hyper-V Manager, System Center Virtual Machine Manager and Failover Cluster Manager. To manage NSGs on unmanaged VMs, you can only use Windows Admin Center, and SDN Express scripts. |
4040

4141
## Comparison summary of SDN management

azure-local/deploy/enable-sdn-integration.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: alkohli
55
ms.author: alkohli
66
ms.reviewer: alkohli
77
ms.topic: how-to
8-
ms.date: 06/17/2025
8+
ms.date: 06/24/2025
99
---
1010

1111
# Enable SDN integration on Azure Local using PowerShell (Preview)
@@ -48,8 +48,8 @@ Here's an architecture diagram of Network Controller in a 2-node Azure Local ins
4848

4949
> [!IMPORTANT]
5050
> - SDN enabled by Arc is a preview feature. Once you enable SDN, you can't roll back or disable.
51-
> - If you are already running Network controller on your Azure Local cluster that was deployed using on-premises tools you MUST NOT attempt to run this method.
52-
> - The only VMs that are in scope for using NSGs with this feature are Azure Local VMs. These are VMs that were deployed from Azure client interfaces (Azure CLI, Azure Portal, ARM). DO NOT use an Azure Local VM in conjunction with an NSG that is managed and applied from on-premises tools!
51+
> - If you are already running Network controller on your Azure Local cluster that was deployed using on-premises tools, you must not attempt to run this method.
52+
> - The only VMs that are in scope for using NSGs with this feature are Azure Local VMs. These are the VMs that were deployed from Azure client interfaces (Azure CLI, Azure portal, Azure Resource Manager). Do not use an Azure Local VM in conjunction with an NSG that is managed and applied from on-premises tools.
5353
5454

5555
For your existing Azure Local instances:

azure-local/manage/create-network-security-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to create network security groups, network security rules
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 06/18/2025
7+
ms.date: 06/24/2025
88
ms.service: azure-local
99
---
1010

@@ -51,7 +51,7 @@ The diagram shows a network setup with two logical networks:
5151
In this example, the NSG controls traffic flow between logical networks A and B, and between VM Web and VM SQL. You can apply the NSG to each logical network or network interface to enforce specific security rules. For example, logical network B might allow only traffic over SQL port 1433 from logical network A.
5252

5353
> [!NOTE]
54-
> - The only VMs that are in scope for using NSGs with this feature are Azure Local VMs. These are VMs that were deployed from Azure client interfaces (Azure CLI, Azure Portal, ARM). DO NOT use an Azure Local VM in conjunction with an NSG that is managed and applied from on-premises tools!
54+
> - The only VMs that are in scope for using NSGs with this feature are Azure Local VMs. These are VMs that were deployed from Azure client interfaces (Azure CLI, Azure portal, Azure Resource Manager). Do not use an Azure Local VM in conjunction with an NSG that is managed and applied from on-premises tools.
5555
5656
## Prerequisites
5757

azure-local/manage/manage-network-security-groups.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to manage network security groups and network security ru
44
author: alkohli
55
ms.author: alkohli
66
ms.topic: how-to
7-
ms.date: 06/09/2025
7+
ms.date: 06/24/2025
88
ms.service: azure-local
99
---
1010

@@ -14,7 +14,7 @@ ms.service: azure-local
1414

1515
This article describes how to manage network security groups (NSGs) on your Azure Local virtual machines (VMs) enabled by Azure Arc. Once you create network security groups on your Azure Local VMs, you can then list, show details, associate, dissociate, update, and delete these resources.
1616

17-
*The only VMs that are in scope for using NSGs with this feature are Azure Local VMs. These are VMs that were deployed from Azure client interfaces (Azure CLI, Azure Portal, ARM). Do not use an Azure Local VM in conjunction with an NSG that is managed and applied from on-premises tools!*
17+
*The only VMs that are in scope for using NSGs with this feature are Azure Local VMs. These are VMs that were deployed from Azure client interfaces (Azure CLI, Azure portal, Azure Resource Manager). Do not use an Azure Local VM in conjunction with an NSG that is managed and applied from on-premises tools.*
1818

1919
[!INCLUDE [important](../includes/hci-preview.md)]
2020

0 commit comments

Comments
 (0)