Limitations with Azure Virtual Network Manager

This article provides an overview of the current limitations when you're using Azure Virtual Network Manager to manage virtual networks. Understanding these limitations can help you properly deploy an Azure Virtual Network Manager instance in your environment. The article covers topics like the maximum number of virtual networks, overlapping IP spaces, and the evaluation cycle for policy compliance.

General limitations

  • Cross-tenant support is available only when virtual networks are assigned to network groups with static membership.

  • Customers with more than 15,000 Azure subscriptions can apply an Azure Virtual Network Manager policy only at the subscription and resource group scopes. You can't apply management groups over the limit of 15,000 subscriptions. In this scenario, you would need to create assignments at a lower-level management group scope that have fewer than 15,000 subscriptions.

  • You can't add virtual networks to a network group when the Azure Virtual Network Manager custom policy enforcementMode element is set to Disabled.

  • Azure Virtual Network Manager policies don't support the standard evaluation cycle for policy compliance. For more information, see Evaluation triggers.

  • The move of the subscription where the Azure Virtual Network Manager instance exists to another tenant is not supported.

Limitations for peerings and connected groups

  • A virtual network can be peered up to 1000 virtual networks using Azure Virtual Network Manager's hub and spoke topology. This means that you can peer up to 1000 spoke virtual networks to a hub virtual network.
  • By default, a connected group can have up to 250 virtual networks. This is a soft limit and can be increased up to 1000 virtual networks by submitting a request using this form.
  • By default, a virtual network can be part of up to two connected groups. For example, a virtual network:
    • Can be part of two mesh configurations.
    • Can be part of a mesh topology and a network group that has direct connectivity enabled in a hub-and-spoke topology.
    • Can be part of two network groups with direct connectivity enabled in the same or a different hub-and-spoke configuration.
    • This is a soft limit and can be adjusted by submitting a request using this form.
  • The following BareMetal Infrastructures are not supported:
  • The maximum number of private endpoints per connected group is 1000.
  • You can have virtual networks with overlapping IP spaces in the same connected group. However, communication to an overlapped IP address is dropped.
  • When a connected group’s VNet is peered with an external VNet that has overlapping CIDRs, these overlapping CIDRs become inaccessible within the connected group. Traffic from the peered VNet in the connected group to the overlapping CIDR is routed to the external VNet, while traffic from other VNets in the connected group to the overlapping CIDR is dropped.

Limitations for security admin rules

  • The maximum number of IP prefixes in all security admin rules combined is 1,000.
  • The maximum number of admin rules in one level of Azure Virtual Network Manager is 100.
  • The service tags AzurePlatformDNS, AzurePlatformIMDS, and AzurePlatformLKM are not currently supported in security admin rules.