Hi Nikita Krivets ,
Thanks for reaching out to Microsoft Q&A forum.
Based on your query stated above, you are using Azure Network Policy Manager for both Windows and Linux. Both platforms support ingress and egress policies, but the lack of certain features in Windows can lead to discrepancies.
In Linux : Azure NPM uses Linux Iptables to enforce network policies. This allows for a rich set of features, including complex rule definitions for both ingress and egress traffic.
In Windows : Azure Network Policy Manager(NPM) for Windows uses Host Network Service (HNS) ACL Policies. But, the limitations of HNS is as it does not support using CIDR blocks with exceptions (e.g., specifying a range of IPs while excluding certain addresses).
In Windows, below are the limitations of Azure NPM:
https://learn.microsoft.com/en-us/azure/aks/use-network-policies
To enforce egress network policy for Windows Server 2022 pods:
Define egress policies by using pod selectors instead of relying on CIDR ranges, particularly for Windows Server 2022 pods in Azure Kubernetes Service (AKS) with Azure Network Policy Manager (NPM) and HNS ACLs.
https://kubernetes.io/docs/concepts/services-networking/network-policies/
If the information is helpful, please consider by clicking the "Upvote".
If you have any further queries, please let us know we are glad to help you.