Skip to content

Commit 40d0be6

Browse files
committed
syncing changes
1 parent fe25310 commit 40d0be6

File tree

2 files changed

+24
-28
lines changed

2 files changed

+24
-28
lines changed

articles/operator-nexus/howto-configure-isolation-domain.md

Lines changed: 15 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -9,16 +9,16 @@ ms.date: 04/02/2023
99
ms.custom: template-how-to
1010
---
1111

12-
# Configure L2 and L3 isolation domains by using managed network fabric services
12+
# Configure L2 and L3 isolation domains by using a managed network fabric
1313

1414
For Azure Operator Nexus instances, isolation domains enable communication between workloads hosted on the same rack (intra-rack communication) or different racks (inter-rack communication). This article describes how you can manage Layer 2 (L2) and Layer 3 (L3) isolation domains by using the Azure CLI. You can use the commands in this article to create, update, delete, and check the status of L2 and L3 isolation domains.
1515

1616
## Prerequisites
1717

1818
1. Ensure that a network fabric controller (NFC) and a network fabric have been created.
1919
1. Install the latest version of the
20-
[necessary Azure CLI extensions](./howto-install-cli-extensions.md).
21-
1. Use the following command to sign in to your Azure account and set the subscription to your Azure subscription ID. This ID should be the same subscription ID that you use across all Azure Operator Nexus resources.
20+
[Azure CLI extension for managed network fabrics](./howto-install-cli-extensions.md).
21+
1. Use the following command to sign in to your Azure account and set the subscription to your Azure subscription ID. This should be the same subscription ID that you use for all the resources in an Azure Operator Nexus instance.
2222

2323
```azurecli
2424
az login
@@ -32,7 +32,7 @@ For Azure Operator Nexus instances, isolation domains enable communication betwe
3232

3333
Registration can take up to 10 minutes. When it's finished, `RegistrationState` in the output changes to `Registered`.
3434

35-
You'll create isolation domains to enable Layer 2 and Layer 3 connectivity between workloads hosted on an Azure Operator Nexus instance.
35+
Isolation domains are used to enable Layer 2 or Layer 3 connectivity between workloads hosted across the Azure Operator Nexus instance and external networks.
3636

3737
> [!NOTE]
3838
> Azure Operator Nexus reserves VLANs up to 500 for platform use. You can't use VLANs in this range for your (tenant) workload networks. You should use VLAN values from 501 through 4095.
@@ -57,7 +57,7 @@ The following parameters are available for configuring isolation domains.
5757

5858
### Create an L2 isolation domain
5959

60-
Use the following code to create an L2 isolation domain:
60+
Use the following commands to create an L2 isolation domain:
6161

6262
```azurecli
6363
az nf l2domain create \
@@ -97,12 +97,6 @@ Expected output:
9797
}
9898
```
9999

100-
### Create an L2 isolation domain for a workload
101-
102-
```azurecli
103-
az nf l2domain create --resource-group "ResourceGroupName" --resource-name "l2HAnetwork" --location "eastus" --nf-id "/subscriptions/xxxxxx-xxxxxx-xxxx-xxxx-xxxxxx/resourceGroups/NFResourceGroupName/providers/Microsoft.ManagedNetworkFabric/networkFabrics/NFName" --vlan-id 505 --mtu 1500
104-
```
105-
106100
### Show L2 isolation domains
107101

108102
This command shows details about L2 isolation domains, including their administrative states:
@@ -177,7 +171,7 @@ Expected output:
177171

178172
### Change the administrative state of an L2 isolation domain
179173

180-
You must enable an isolation domain before pushing its configuration to the network fabric devices. Use the following command to change the administrative state of an isolation domain:
174+
You must enable an isolation domain to push the configuration to the network fabric devices. Use the following command to change the administrative state of an isolation domain:
181175

182176
```azurecli
183177
az nf l2domain update-admin-state --resource-group "ResourceGroupName" --resource-name "example-l2domain" --state Enable/Disable
@@ -222,7 +216,7 @@ az nf l2domain delete --resource-group "ResourceGroupName" --resource-name "exam
222216
Expected output:
223217

224218
```output
225-
Please use show or list command to validate that isolation domain is deleted. Deleted resources will not appear in result
219+
Please use show or list command to validate that the isolation domain is deleted. Deleted resources will not appear in the output
226220
```
227221

228222
## Configure L3 isolation domains
@@ -281,7 +275,7 @@ az nf l3domain create
281275
```
282276

283277
> [!NOTE]
284-
> For MPLS Option 10B connectivity to external networks via private endpoint devices, you can specify Option B parameters while creating an isolation domain.
278+
> For MPLS Option B connectivity to external networks via private endpoint devices, you can specify Option B parameters while creating an isolation domain.
285279
286280
Expected output:
287281

@@ -491,7 +485,7 @@ The following parameters are optional for creating internal networks.
491485
|Parameter|Description|Example|Required|
492486
|---|---|---|---|
493487
|`connectedIPv4Subnets` |IPv4 subnet that the Azure Kubernetes Service hybrid (HAKS) cluster's workloads use.|`10.0.0.0/24`||
494-
|`connectedIPv6Subnets` |IPv6 subnet that the HAKS cluster's workloads use.|`10:101:1::1/64`||
488+
|`connectedIPv6Subnets` |IPv6 subnet that the HAKS cluster's workloads use.|`df8:f53b:82e4::53/127`||
495489
|`staticRouteConfiguration` |IPv4 prefix of the static route.|`10.0.0.0/24`|
496490
|`bgpConfiguration`|IPv4 next-hop address.|`10.0.0.0/24`| |
497491
|`defaultRouteOriginate` | `True`/`False` parameter that enables the default route to be originated when you're advertising routes via BGP. | `True` | |
@@ -501,7 +495,7 @@ The following parameters are optional for creating internal networks.
501495
|`ipv4ListenRangePrefixes`| BGP IPv4 listen range; maximum range allowed in /28.| `10.1.0.0/26` | |
502496
|`ipv6ListenRangePrefixes`| BGP IPv6 listen range; maximum range allowed in /127.| `3FFE:FFFF:0:CD30::/126`| |
503497
|`ipv4NeighborAddress`| IPv4 neighbor address.|`10.0.0.11`| |
504-
|`ipv6NeighborAddress`| IPv6 neighbor address.|`10:101:1::11`| |
498+
|`ipv6NeighborAddress`| IPv6 neighbor address.|`df8:f53b:82e4::53/127`| |
505499

506500
You need to create an internal network before you enable an L3 isolation domain. This command creates an internal network with BGP configuration and a specified peering address:
507501

@@ -684,7 +678,7 @@ az nf internalnetwork create
684678
--location "eastus"
685679
--vlan-id 1090
686680
--connected-ipv6-subnets '[{"prefix":"10:101:1::0/64", "gateway":"10:101:1::1"}]'
687-
--mtu 1500 --bgp-configuration '{"defaultRouteOriginate":true,"peerASN": 65020,"ipv6NeighborAddress":[{"address": "10:101:1::11"}]}'
681+
--mtu 1500 --bgp-configuration '{"defaultRouteOriginate":true,"peerASN": 65020,"ipv6NeighborAddress":[{"address": "df8:f53b:82e4::53/127"}]}'
688682
```
689683

690684
Expected output:
@@ -707,7 +701,7 @@ Expected output:
707701
"ipv6ListenRangePrefixes": null,
708702
"ipv6NeighborAddress": [
709703
{
710-
"address": "10:101:1::11",
704+
"address": "df8:f53b:82e4::53/127",
711705
"operationalState": "Disabled"
712706
}
713707
],
@@ -754,9 +748,9 @@ The commands for creating an external network by using Azure CLI include the fol
754748
|`peeringOption` |Peering that uses either Option A or Option B. Possible values are `OptionA` and `OptionB`. |`OptionB`| True|
755749
|`optionBProperties` | Configuration of Option B properties. To specify, use `exportRouteTargets` or `importRouteTargets`.|`"exportRouteTargets": ["1234:1234"]}}`||
756750
|`optionAProperties` | Configuration of Option A properties. |||
757-
|`external`|Optional parameter to input MPLS Option 10B connectivity to external networks via private endpoint devices. By using this option, you can input import and export route targets as shown in the example.| ||
751+
|`external`|Optional parameter to input MPLS Option B connectivity to external networks via private endpoint devices. By using this option, you can input import and export route targets as shown in the example.| ||
758752

759-
For Option A, you need to create an external network before you enable the L3 isolation domain. An external network is dependent on an internal network, so an external network can't be enabled without an internal one. The `vlan-id` value should be from `501` to `4095`.
753+
For Option A, you need to create an external network before you enable the L3 isolation domain. An external network is dependent on an internal network, so an external network can't be enabled without an internal network. The `vlan-id` value should be from `501` to `4095`.
760754

761755
### Create an external network by using Option B
762756

@@ -871,7 +865,7 @@ az nf externalnetwork create
871865
--secondary-ipv6-prefix "10:101:3::0/127"
872866
```
873867

874-
The primary and secondary IPv6 supported in this release is /127.
868+
The supported primary and secondary IPv6 prefix size is /127.
875869

876870
Expected output:
877871

articles/operator-nexus/howto-configure-network-fabric.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,11 @@ This article describes how to create a network fabric for Azure Operator Nexus b
2222
* Azure ExpressRoute connectivity between NFC and Azure Operator Nexus instances.
2323
* A terminal server [installed and configured](./howto-platform-prerequisites.md#set-up-terminal-server) with a username and password.
2424
* Provider edge (PE) devices preconfigured with necessary VLANs, route targets, and IP addresses.
25-
* Supported SKUs from Network Fabric Adapter (NFA) Release 1.5 and beyond for fabric:
26-
* M4-A400-A100-C16-aa for up to four compute racks
27-
* M8-A400-A100-C16-aa for up to eight compute racks
25+
26+
Supported SKUs for network fabric instances are:
27+
28+
* M4-A400-A100-C16-aa for up to four compute racks
29+
* M8-A400-A100-C16-aa for up to eight compute racks
2830

2931
## Steps to provision a fabric and racks
3032

@@ -255,7 +257,7 @@ Expected output:
255257
256258
```
257259

258-
### List or get network fabrics
260+
### List all network fabrics in a resource group
259261

260262
```azurecli
261263
az nf fabric list --resource-group "NFResourceGroup"
@@ -563,12 +565,12 @@ For example, `AggrRack` consists of:
563565
* `CE02`
564566
* `TOR17`
565567
* `TOR18`
566-
* `Mgmnt Switch01`
567-
* `Mgmnt Switch02` (and so on, for other switches)
568+
* `MgmtSwitch01`
569+
* `MgmtSwitch02` (and so on, for other switches)
568570

569571
## List or get network fabric devices
570572

571-
Run the following command to list network fabric devices:
573+
Run the following command to list network fabric devices in a resource group:
572574

573575
```azurecli
574576
az nf device list --resource-group "NFResourceGroup"

0 commit comments

Comments
 (0)