Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
- Latest
- 2025-01-01
- 2024-10-01
- 2024-07-01
- 2024-05-01
- 2024-03-01
- 2024-01-01
- 2023-11-01
- 2023-09-01
- 2023-06-01
- 2023-05-01
- 2023-04-01
- 2023-02-01
- 2022-11-01
- 2022-09-01
- 2022-07-01
- 2022-05-01
- 2022-01-01
- 2021-08-01
- 2021-05-01
- 2021-03-01
- 2021-02-01
- 2020-11-01
- 2020-08-01
- 2020-07-01
- 2020-06-01
- 2020-05-01
- 2020-04-01
- 2020-03-01
- 2019-12-01
- 2019-11-01
- 2019-09-01
- 2019-08-01
- 2019-07-01
- 2019-06-01
- 2019-04-01
- 2019-02-01
- 2018-12-01
- 2018-11-01
- 2018-10-01
- 2018-08-01
- 2018-07-01
- 2018-06-01
- 2018-04-01
Bicep resource definition
The virtualWans resource type can be deployed with operations that target:
For a list of changed properties in each API version, see change log.
Resource format
To create a Microsoft.Network/virtualWans resource, add the following Bicep to your template.
resource symbolicname 'Microsoft.Network/virtualWans@2025-01-01' = {
  scope: resourceSymbolicName or scope
  ___location: 'string'
  name: 'string'
  properties: {
    allowBranchToBranchTraffic: bool
    allowVnetToVnetTraffic: bool
    disableVpnEncryption: bool
    type: 'string'
  }
  tags: {
    {customized property}: 'string'
  }
}
Property Values
Microsoft.Network/virtualWans
| Name | Description | Value | 
|---|---|---|
| ___location | Resource ___location. | string | 
| name | The resource name | string (required) | 
| properties | Properties of the virtual WAN. | VirtualWanProperties | 
| scope | Use when creating a resource at a scope that is different than the deployment scope. | Set this property to the symbolic name of a resource to apply the extension resource. | 
| tags | Resource tags | Dictionary of tag names and values. See Tags in templates | 
ResourceTags
| Name | Description | Value | 
|---|
VirtualWanProperties
| Name | Description | Value | 
|---|---|---|
| allowBranchToBranchTraffic | True if branch to branch traffic is allowed. | bool | 
| allowVnetToVnetTraffic | True if Vnet to Vnet traffic is allowed. | bool | 
| disableVpnEncryption | Vpn encryption to be disabled or not. | bool | 
| type | The type of the VirtualWAN. | string | 
Usage Examples
Azure Verified Modules
The following Azure Verified Modules can be used to deploy this resource type.
| Module | Description | 
|---|---|
| Virtual WAN | AVM Resource Module for Virtual WAN | 
Azure Quickstart Samples
The following Azure Quickstart templates contain Bicep samples for deploying this resource type.
| Bicep File | Description | 
|---|---|
| Creates Virtual WAN resources | This template allows you to create virtual WAN resources including Virtual WAN, Virtual Hub, VPN Gateway, VPN Site and a VPN Connecton. | 
| Secured virtual hubs | This template creates a secured virtual hub using Azure Firewall to secure your cloud network traffic destined to the Internet. | 
ARM template resource definition
The virtualWans resource type can be deployed with operations that target:
For a list of changed properties in each API version, see change log.
Resource format
To create a Microsoft.Network/virtualWans resource, add the following JSON to your template.
{
  "type": "Microsoft.Network/virtualWans",
  "apiVersion": "2025-01-01",
  "name": "string",
  "___location": "string",
  "properties": {
    "allowBranchToBranchTraffic": "bool",
    "allowVnetToVnetTraffic": "bool",
    "disableVpnEncryption": "bool",
    "type": "string"
  },
  "tags": {
    "{customized property}": "string"
  }
}
Property Values
Microsoft.Network/virtualWans
| Name | Description | Value | 
|---|---|---|
| apiVersion | The api version | '2025-01-01' | 
| ___location | Resource ___location. | string | 
| name | The resource name | string (required) | 
| properties | Properties of the virtual WAN. | VirtualWanProperties | 
| tags | Resource tags | Dictionary of tag names and values. See Tags in templates | 
| type | The resource type | 'Microsoft.Network/virtualWans' | 
ResourceTags
| Name | Description | Value | 
|---|
VirtualWanProperties
| Name | Description | Value | 
|---|---|---|
| allowBranchToBranchTraffic | True if branch to branch traffic is allowed. | bool | 
| allowVnetToVnetTraffic | True if Vnet to Vnet traffic is allowed. | bool | 
| disableVpnEncryption | Vpn encryption to be disabled or not. | bool | 
| type | The type of the VirtualWAN. | string | 
Usage Examples
Azure Quickstart Templates
The following Azure Quickstart templates deploy this resource type.
| Template | Description | 
|---|---|
| Azure Virtual WAN (vWAN) Multi-Hub Deployment | This template allows you to create an Azure Virtual WAN (vWAN) multi-hub deployment including all gateways and VNET connections. | 
| Azure vWAN Multi-Hub Deployment with Custom Routing Tables | This template allows you to create an Azure Virtual WAN (vWAN) multi-hub deployment, including all gateways and VNET connections, and demonstrate the usage of Route Tables for custom routing. | 
| Creates Virtual WAN resources | This template allows you to create virtual WAN resources including Virtual WAN, Virtual Hub, VPN Gateway, VPN Site and a VPN Connecton. | 
| Secured virtual hubs | This template creates a secured virtual hub using Azure Firewall to secure your cloud network traffic destined to the Internet. | 
| vWAN P2S deployment with multi address pool and user groups | This template deploys Azure Virtual WAN (vWAN) with a P2S configured with multiple address pool and user groups | 
Terraform (AzAPI provider) resource definition
The virtualWans resource type can be deployed with operations that target:
For a list of changed properties in each API version, see change log.
Resource format
To create a Microsoft.Network/virtualWans resource, add the following Terraform to your template.
resource "azapi_resource" "symbolicname" {
  type = "Microsoft.Network/virtualWans@2025-01-01"
  name = "string"
  parent_id = "string"
  ___location = "string"
  tags = {
    {customized property} = "string"
  }
  body = {
    properties = {
      allowBranchToBranchTraffic = bool
      allowVnetToVnetTraffic = bool
      disableVpnEncryption = bool
      type = "string"
    }
  }
}
Property Values
Microsoft.Network/virtualWans
| Name | Description | Value | 
|---|---|---|
| ___location | Resource ___location. | string | 
| name | The resource name | string (required) | 
| parent_id | The ID of the resource to apply this extension resource to. | string (required) | 
| properties | Properties of the virtual WAN. | VirtualWanProperties | 
| tags | Resource tags | Dictionary of tag names and values. | 
| type | The resource type | "Microsoft.Network/virtualWans@2025-01-01" | 
ResourceTags
| Name | Description | Value | 
|---|
VirtualWanProperties
| Name | Description | Value | 
|---|---|---|
| allowBranchToBranchTraffic | True if branch to branch traffic is allowed. | bool | 
| allowVnetToVnetTraffic | True if Vnet to Vnet traffic is allowed. | bool | 
| disableVpnEncryption | Vpn encryption to be disabled or not. | bool | 
| type | The type of the VirtualWAN. | string | 
Usage Examples
Terraform Samples
A basic example of deploying Virtual WAN.
terraform {
  required_providers {
    azapi = {
      source = "Azure/azapi"
    }
  }
}
provider "azapi" {
  skip_provider_registration = false
}
variable "resource_name" {
  type    = string
  default = "acctest0001"
}
variable "___location" {
  type    = string
  default = "westeurope"
}
resource "azapi_resource" "resourceGroup" {
  type     = "Microsoft.Resources/resourceGroups@2020-06-01"
  name     = var.resource_name
  ___location = var.___location
}
resource "azapi_resource" "virtualWan" {
  type      = "Microsoft.Network/virtualWans@2022-07-01"
  parent_id = azapi_resource.resourceGroup.id
  name      = var.resource_name
  ___location  = var.___location
  body = {
    properties = {
      allowBranchToBranchTraffic     = true
      disableVpnEncryption           = false
      office365LocalBreakoutCategory = "None"
      type                           = "Standard"
    }
  }
  schema_validation_enabled = false
  response_export_values    = ["*"]
}