You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-configure-acls-for-ssh-management-on-access-vpn.md
+33-36Lines changed: 33 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: "Azure Operator Nexus: How to Configure Network Access Control Lists (ACLs) for SSH Access on Management VPN."
2
+
title: "Azure Operator Nexus: Configure Network Access Control Lists (ACLs) for SSH Access on Management VPN."
3
3
description: Instructions on setting up network access control lists (ACLs) to control SSH access on a management VPN.
4
4
ms.service: azure-operator-nexus
5
5
ms.custom: template-how-to
@@ -9,19 +9,19 @@ author: sushantjrao
9
9
ms.author: sushrao
10
10
---
11
11
12
-
# How-To Guide: Creating ACLs on an NNI
12
+
# Create ACLs on an NNI
13
13
14
-
ACLs (Permit & Deny) at an NNI Level are designed to protect SSH access on the Management VPN. Network Access Control Lists can be applied before provisioning the Network Fabric. It's important to note that this limitation is temporary and will be removed in future releases.
14
+
In Azure Operator Nexus, access control lists (ACLs) for `Permit` and `Deny` actions at a network-to-network interconnect (NNI) level help protect Secure Shell (SSH) access on the management virtual private netowrk (VPN). At this time, you can apply network ACLs only before you provision the network fabric.
15
15
16
-
Ingress and Egress ACLs are created prior to the creation of NNI resources and are referenced into the NNI payload. When NNI resources are created, they also create referenced ingress and egress ACLs. This activity needs to be performed before provisioning the Network Fabric.
16
+
Ingress and egress ACLs are created prior to the creation of NNI resources and are referenced into the NNI payload. When NNI resources are created, they also create referenced ingress and egress ACLs. This activity needs to be performed before provisioning the network fabric.
17
17
18
-
## Steps to Create an ACL on an NNI:
18
+
These are the high-level steps for creating an ACL on an NNI:
19
19
20
-
1. Create NNI Ingress and Egress ACLs
21
-
2. Update ARM Resource Reference in Management NNI
22
-
3. Create NNI and Provision Network Fabric
20
+
1. Create NNI Ingress and egress ACLs
21
+
2. Update Azure Resource Manager resource reference in a management NNI
@@ -43,20 +43,19 @@ Ingress and Egress ACLs are created prior to the creation of NNI resources and a
43
43
| actions | Action to be taken based on match condition. | Example: permit |
44
44
| configuration-type | Configuration type can be inline or by using a file. However, AON supports only inline today. | Example: inline |
45
45
46
-
47
46
There are some further restrictions that you should be aware of:
48
47
49
48
-**Inline ports and inline VLANs** are a static way of defining the ports or VLANs using `azcli`.
50
49
-**PortGroupNames and VLANGroupNames** are dynamic ways of defining ports and VLANs.
51
50
-**Inline ports and the PortGroupNames** together aren't allowed.
52
51
-**Inline VLANs and the VLANGroupNames** together aren't allowed.
53
52
-**IpGroupNames and IpPrefixValues** together aren't allowed.
54
-
-**Egress ACLs** won’t support IP options, IP length, fragment, ether-type, DSCP marking, or TTL values.
53
+
-**Egress ACLs** won't support IP options, IP length, fragment, ether-type, DSCP marking, or TTL values.
55
54
-**Ingress ACLs** won't support following options: etherType.
56
55
57
-
## Creating Ingress ACL
56
+
## Create an ingress ACL
58
57
59
-
To create an Ingress ACL, you can use the following Azure CLI command:
58
+
To create an ingress ACL, you can use the following Azure CLI command:
60
59
61
60
```bash
62
61
az networkfabric acl create
@@ -70,7 +69,7 @@ az networkfabric acl create
70
69
71
70
```
72
71
73
-
### Expected Output:
72
+
### Expected output
74
73
75
74
```json
76
75
{
@@ -136,11 +135,11 @@ az networkfabric acl create
136
135
}
137
136
```
138
137
139
-
This command creates an Ingress ACL with the specified configurations and outputs the expected result. Adjust the parameters as needed for your use case.
138
+
This command creates an ingress ACL with the specified configurations and outputs the expected result. Adjust the parameters as needed for your use case.
140
139
141
-
## Creating Egress ACL
140
+
## Create an egress ACL
142
141
143
-
To create an Egress ACL, you can utilize the following Azure CLI command:
142
+
To create an egress ACL, you can use the following Azure CLI command:
144
143
145
144
```bash
146
145
az networkfabric acl create
@@ -154,7 +153,7 @@ az networkfabric acl create
154
153
155
154
```
156
155
157
-
### Expected Output:
156
+
### Expected output
158
157
159
158
```json
160
159
{
@@ -200,16 +199,16 @@ az networkfabric acl create
200
199
}
201
200
```
202
201
203
-
This command creates an Egress ACL with the specified configurations and outputs the expected result. Adjust the parameters as needed for your use case.
202
+
This command creates an egress ACL with the specified configurations and outputs the expected result. Adjust the parameters as needed for your use case.
204
203
205
-
## Updating ARM Reference
204
+
## Update the Resource Manager reference
206
205
207
206
This step enables the creation of ACLs (ingress and egress if reference is provided) during the creation of the NNI resource. Post creation of NNI and before fabric provisioning, re-put can be done on NNI.
208
207
209
208
-`ingressAclId`: Reference ID for ingress ACL
210
209
-`egressAclId`: Reference ID for egress ACL
211
210
212
-
To get ARM resource ID, navigate to the resource group of the subscription used.
211
+
To get Resource Manager resource ID, navigate to the resource group of the subscription used.
This command updates the ARM reference for the NNI resource, associating it with the provided ingress and egress ACLs. Adjust the parameters as needed for your use case.
227
+
This command updates the Resource Manager reference for the NNI resource, associating it with the provided ingress and egress ACLs. Adjust the parameters as needed for your use case.
229
228
230
-
## Show ACL
229
+
## Show ACL details
231
230
232
-
To display the details of an Access Control List (ACL), use the following command:
231
+
To display the details of an ACL, use the following command:
233
232
234
233
```bash
235
234
az networkfabric acl show --resource-group "example-rg" --resource-name "example-acl"
236
235
```
237
236
238
237
This command will retrieve and display information about the specified ACL.
239
238
240
-
## List ACL
239
+
## List ACLs
241
240
242
-
To list all Access Control Lists (ACLs) within a resource group, execute the following command:
241
+
To list all ACLs within a resource group, use the following command:
243
242
244
243
```bash
245
244
az networkfabric acl list --resource-group "ResourceGroupName"
246
245
```
247
246
248
247
This command will list all ACLs present in the specified resource group.
249
248
250
-
## Create ACL on Isolation Domain External Network
249
+
## Create an ACL on isolation domain external network
251
250
252
251
Steps to be performed to create an ACL on an NNI:
253
252
254
253
1. Create an isolation domain external network ingress and egress ACLs.
255
254
2. Update Arm Resource Reference for External Network.
256
255
257
-
## Create ISD External Network Egress ACL
256
+
## Create an ISD external network egress ACL
258
257
259
-
To create an Egress Access Control List (ACL) for an Isolation Domain External Network, use the following command:
258
+
To create an egress ACL for an Isolation Domain External Network, use the following command:
This command creates an Egress ACL for the specified Isolation Domain External Network with the provided configuration.
271
+
This command creates an egress ACL for the specified Isolation Domain External Network with the provided configuration.
273
272
274
-
### Expected Output
273
+
### Expected output
275
274
276
275
Upon successful execution, the command will return information about the created ACL in the following format:
277
276
@@ -339,9 +338,9 @@ Upon successful execution, the command will return information about the created
339
338
340
339
This output provides details of the created ACL, including its configuration, state, and other relevant information. Adjust the parameters as required for your use case.
341
340
342
-
## Create ISD External Network Ingress ACL
341
+
## Create ISD External Network ingress ACL
343
342
344
-
To create an Ingress Access Control List (ACL) for an Isolation Domain External Network, use the following command:
343
+
To create an ingress ACL for an Isolation Domain External Network, use the following command:
This command creates an Ingress ACL for the specified Isolation Domain External Network with the provided configuration.
356
+
This command creates an ingress ACL for the specified Isolation Domain External Network with the provided configuration.
358
357
359
358
### Expected Output
360
359
@@ -423,5 +422,3 @@ Upon successful execution, the command will return information about the created
423
422
```
424
423
425
424
This output provides details of the created ACL, including its configuration, state, and other relevant information. Adjust the parameters as required for your use case.
0 commit comments