You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-configure-isolation-domain.md
+15-21Lines changed: 15 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,16 +9,16 @@ ms.date: 04/02/2023
9
9
ms.custom: template-how-to
10
10
---
11
11
12
-
# Configure L2 and L3 isolation domains by using managed network fabric services
12
+
# Configure L2 and L3 isolation domains by using a managed network fabric
13
13
14
14
For Azure Operator Nexus instances, isolation domains enable communication between workloads hosted on the same rack (intra-rack communication) or different racks (inter-rack communication). This article describes how you can manage Layer 2 (L2) and Layer 3 (L3) isolation domains by using the Azure CLI. You can use the commands in this article to create, update, delete, and check the status of L2 and L3 isolation domains.
15
15
16
16
## Prerequisites
17
17
18
18
1. Ensure that a network fabric controller (NFC) and a network fabric have been created.
1. Use the following command to sign in to your Azure account and set the subscription to your Azure subscription ID. This ID should be the same subscription ID that you use across all Azure Operator Nexus resources.
20
+
[Azure CLI extension for managed network fabrics](./howto-install-cli-extensions.md).
21
+
1. Use the following command to sign in to your Azure account and set the subscription to your Azure subscription ID. This should be the same subscription ID that you use for all the resources in an Azure Operator Nexus instance.
22
22
23
23
```azurecli
24
24
az login
@@ -32,7 +32,7 @@ For Azure Operator Nexus instances, isolation domains enable communication betwe
32
32
33
33
Registration can take up to 10 minutes. When it's finished, `RegistrationState` in the output changes to `Registered`.
34
34
35
-
You'll create isolation domains to enable Layer 2 and Layer 3 connectivity between workloads hosted on an Azure Operator Nexus instance.
35
+
Isolation domains are used to enable Layer 2 or Layer 3 connectivity between workloads hosted across the Azure Operator Nexus instance and external networks.
36
36
37
37
> [!NOTE]
38
38
> Azure Operator Nexus reserves VLANs up to 500 for platform use. You can't use VLANs in this range for your (tenant) workload networks. You should use VLAN values from 501 through 4095.
@@ -57,7 +57,7 @@ The following parameters are available for configuring isolation domains.
57
57
58
58
### Create an L2 isolation domain
59
59
60
-
Use the following code to create an L2 isolation domain:
60
+
Use the following commands to create an L2 isolation domain:
This command shows details about L2 isolation domains, including their administrative states:
@@ -177,7 +171,7 @@ Expected output:
177
171
178
172
### Change the administrative state of an L2 isolation domain
179
173
180
-
You must enable an isolation domain before pushing its configuration to the network fabric devices. Use the following command to change the administrative state of an isolation domain:
174
+
You must enable an isolation domain to push the configuration to the network fabric devices. Use the following command to change the administrative state of an isolation domain:
181
175
182
176
```azurecli
183
177
az nf l2domain update-admin-state --resource-group "ResourceGroupName" --resource-name "example-l2domain" --state Enable/Disable
Please use show or list command to validate that isolation domain is deleted. Deleted resources will not appear in result
219
+
Please use show or list command to validate that the isolation domain is deleted. Deleted resources will not appear in the output
226
220
```
227
221
228
222
## Configure L3 isolation domains
@@ -281,7 +275,7 @@ az nf l3domain create
281
275
```
282
276
283
277
> [!NOTE]
284
-
> For MPLS Option 10B connectivity to external networks via private endpoint devices, you can specify Option B parameters while creating an isolation domain.
278
+
> For MPLS Option B connectivity to external networks via private endpoint devices, you can specify Option B parameters while creating an isolation domain.
285
279
286
280
Expected output:
287
281
@@ -491,7 +485,7 @@ The following parameters are optional for creating internal networks.
491
485
|Parameter|Description|Example|Required|
492
486
|---|---|---|---|
493
487
|`connectedIPv4Subnets`|IPv4 subnet that the Azure Kubernetes Service hybrid (HAKS) cluster's workloads use.|`10.0.0.0/24`||
494
-
|`connectedIPv6Subnets`|IPv6 subnet that the HAKS cluster's workloads use.|`10:101:1::1/64`||
488
+
|`connectedIPv6Subnets`|IPv6 subnet that the HAKS cluster's workloads use.|`df8:f53b:82e4::53/127`||
495
489
|`staticRouteConfiguration`|IPv4 prefix of the static route.|`10.0.0.0/24`|
You need to create an internal network before you enable an L3 isolation domain. This command creates an internal network with BGP configuration and a specified peering address:
@@ -754,9 +748,9 @@ The commands for creating an external network by using Azure CLI include the fol
754
748
|`peeringOption`|Peering that uses either Option A or Option B. Possible values are `OptionA` and `OptionB`. |`OptionB`| True|
755
749
|`optionBProperties`| Configuration of Option B properties. To specify, use `exportRouteTargets` or `importRouteTargets`.|`"exportRouteTargets": ["1234:1234"]}}`||
756
750
|`optionAProperties`| Configuration of Option A properties. |||
757
-
|`external`|Optional parameter to input MPLS Option 10B connectivity to external networks via private endpoint devices. By using this option, you can input import and export route targets as shown in the example.|||
751
+
|`external`|Optional parameter to input MPLS Option B connectivity to external networks via private endpoint devices. By using this option, you can input import and export route targets as shown in the example.|||
758
752
759
-
For Option A, you need to create an external network before you enable the L3 isolation domain. An external network is dependent on an internal network, so an external network can't be enabled without an internal one. The `vlan-id` value should be from `501` to `4095`.
753
+
For Option A, you need to create an external network before you enable the L3 isolation domain. An external network is dependent on an internal network, so an external network can't be enabled without an internal network. The `vlan-id` value should be from `501` to `4095`.
760
754
761
755
### Create an external network by using Option B
762
756
@@ -871,7 +865,7 @@ az nf externalnetwork create
871
865
--secondary-ipv6-prefix "10:101:3::0/127"
872
866
```
873
867
874
-
The primary and secondary IPv6 supported in this release is /127.
868
+
The supported primary and secondary IPv6 prefix size is /127.
0 commit comments