Skip to content

Commit 4d6344b

Browse files
committed
edit pass: howto-configure-acls-for-ssh-management-on-access-vpn
1 parent 19d8975 commit 4d6344b

File tree

1 file changed

+33
-36
lines changed

1 file changed

+33
-36
lines changed

articles/operator-nexus/howto-configure-acls-for-ssh-management-on-access-vpn.md

Lines changed: 33 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: "Azure Operator Nexus: How to Configure Network Access Control Lists (ACLs) for SSH Access on Management VPN."
2+
title: "Azure Operator Nexus: Configure Network Access Control Lists (ACLs) for SSH Access on Management VPN."
33
description: Instructions on setting up network access control lists (ACLs) to control SSH access on a management VPN.
44
ms.service: azure-operator-nexus
55
ms.custom: template-how-to
@@ -9,19 +9,19 @@ author: sushantjrao
99
ms.author: sushrao
1010
---
1111

12-
# How-To Guide: Creating ACLs on an NNI
12+
# Create ACLs on an NNI
1313

14-
ACLs (Permit & Deny) at an NNI Level are designed to protect SSH access on the Management VPN. Network Access Control Lists can be applied before provisioning the Network Fabric. It's important to note that this limitation is temporary and will be removed in future releases.
14+
In Azure Operator Nexus, access control lists (ACLs) for `Permit` and `Deny` actions at a network-to-network interconnect (NNI) level help protect Secure Shell (SSH) access on the management virtual private netowrk (VPN). At this time, you can apply network ACLs only before you provision the network fabric.
1515

16-
Ingress and Egress ACLs are created prior to the creation of NNI resources and are referenced into the NNI payload. When NNI resources are created, they also create referenced ingress and egress ACLs. This activity needs to be performed before provisioning the Network Fabric.
16+
Ingress and egress ACLs are created prior to the creation of NNI resources and are referenced into the NNI payload. When NNI resources are created, they also create referenced ingress and egress ACLs. This activity needs to be performed before provisioning the network fabric.
1717

18-
## Steps to Create an ACL on an NNI:
18+
These are the high-level steps for creating an ACL on an NNI:
1919

20-
1. Create NNI Ingress and Egress ACLs
21-
2. Update ARM Resource Reference in Management NNI
22-
3. Create NNI and Provision Network Fabric
20+
1. Create NNI Ingress and egress ACLs
21+
2. Update Azure Resource Manager resource reference in a management NNI
22+
3. Create an NNI and provision the network fabric
2323

24-
## Parameter Usage Guidance:
24+
## Parameter usage guidance
2525

2626
| Parameter | Description | Example or Range |
2727
|----------------------|--------------------------------------------------------------|--------------------------------|
@@ -43,20 +43,19 @@ Ingress and Egress ACLs are created prior to the creation of NNI resources and a
4343
| actions | Action to be taken based on match condition. | Example: permit |
4444
| configuration-type | Configuration type can be inline or by using a file. However, AON supports only inline today. | Example: inline |
4545

46-
4746
There are some further restrictions that you should be aware of:
4847

4948
- **Inline ports and inline VLANs** are a static way of defining the ports or VLANs using `azcli`.
5049
- **PortGroupNames and VLANGroupNames** are dynamic ways of defining ports and VLANs.
5150
- **Inline ports and the PortGroupNames** together aren't allowed.
5251
- **Inline VLANs and the VLANGroupNames** together aren't allowed.
5352
- **IpGroupNames and IpPrefixValues** together aren't allowed.
54-
- **Egress ACLs** wont support IP options, IP length, fragment, ether-type, DSCP marking, or TTL values.
53+
- **Egress ACLs** won't support IP options, IP length, fragment, ether-type, DSCP marking, or TTL values.
5554
- **Ingress ACLs** won't support following options: etherType.
5655

57-
## Creating Ingress ACL
56+
## Create an ingress ACL
5857

59-
To create an Ingress ACL, you can use the following Azure CLI command:
58+
To create an ingress ACL, you can use the following Azure CLI command:
6059

6160
```bash
6261
az networkfabric acl create
@@ -70,7 +69,7 @@ az networkfabric acl create
7069

7170
```
7271

73-
### Expected Output:
72+
### Expected output
7473

7574
```json
7675
{
@@ -136,11 +135,11 @@ az networkfabric acl create
136135
}
137136
```
138137

139-
This command creates an Ingress ACL with the specified configurations and outputs the expected result. Adjust the parameters as needed for your use case.
138+
This command creates an ingress ACL with the specified configurations and outputs the expected result. Adjust the parameters as needed for your use case.
140139

141-
## Creating Egress ACL
140+
## Create an egress ACL
142141

143-
To create an Egress ACL, you can utilize the following Azure CLI command:
142+
To create an egress ACL, you can use the following Azure CLI command:
144143

145144
```bash
146145
az networkfabric acl create
@@ -154,7 +153,7 @@ az networkfabric acl create
154153

155154
```
156155

157-
### Expected Output:
156+
### Expected output
158157

159158
```json
160159
{
@@ -200,16 +199,16 @@ az networkfabric acl create
200199
}
201200
```
202201

203-
This command creates an Egress ACL with the specified configurations and outputs the expected result. Adjust the parameters as needed for your use case.
202+
This command creates an egress ACL with the specified configurations and outputs the expected result. Adjust the parameters as needed for your use case.
204203

205-
## Updating ARM Reference
204+
## Update the Resource Manager reference
206205

207206
This step enables the creation of ACLs (ingress and egress if reference is provided) during the creation of the NNI resource. Post creation of NNI and before fabric provisioning, re-put can be done on NNI.
208207

209208
- `ingressAclId`: Reference ID for ingress ACL
210209
- `egressAclId`: Reference ID for egress ACL
211210

212-
To get ARM resource ID, navigate to the resource group of the subscription used.
211+
To get Resource Manager resource ID, navigate to the resource group of the subscription used.
213212

214213
```bash
215214
az networkfabric nni create
@@ -225,38 +224,38 @@ az networkfabric nni create
225224
--egress-acl-id "/subscriptions/xxxxx-xxxx-xxxx-xxxx-xxxxx/resourceGroups/example-rg/providers/Microsoft.ManagedNetworkFabric/accesscontrollists/example-Ipv4egressACL"
226225
```
227226

228-
This command updates the ARM reference for the NNI resource, associating it with the provided ingress and egress ACLs. Adjust the parameters as needed for your use case.
227+
This command updates the Resource Manager reference for the NNI resource, associating it with the provided ingress and egress ACLs. Adjust the parameters as needed for your use case.
229228

230-
## Show ACL
229+
## Show ACL details
231230

232-
To display the details of an Access Control List (ACL), use the following command:
231+
To display the details of an ACL, use the following command:
233232

234233
```bash
235234
az networkfabric acl show --resource-group "example-rg" --resource-name "example-acl"
236235
```
237236

238237
This command will retrieve and display information about the specified ACL.
239238

240-
## List ACL
239+
## List ACLs
241240

242-
To list all Access Control Lists (ACLs) within a resource group, execute the following command:
241+
To list all ACLs within a resource group, use the following command:
243242

244243
```bash
245244
az networkfabric acl list --resource-group "ResourceGroupName"
246245
```
247246

248247
This command will list all ACLs present in the specified resource group.
249248

250-
## Create ACL on Isolation Domain External Network
249+
## Create an ACL on isolation domain external network
251250

252251
Steps to be performed to create an ACL on an NNI:
253252

254253
1. Create an isolation domain external network ingress and egress ACLs.
255254
2. Update Arm Resource Reference for External Network.
256255

257-
## Create ISD External Network Egress ACL
256+
## Create an ISD external network egress ACL
258257

259-
To create an Egress Access Control List (ACL) for an Isolation Domain External Network, use the following command:
258+
To create an egress ACL for an Isolation Domain External Network, use the following command:
260259

261260
```bash
262261
az networkfabric acl create
@@ -269,9 +268,9 @@ az networkfabric acl create
269268
--match-configurations "[{matchConfigurationName:'L3ISD_EXT_OPTA_EGRESS_ACL_IPV4_CE_PE',sequenceNumber:1110,ipAddressType:IPv4,matchConditions:[{ipCondition:{type:SourceIP,prefixType:Prefix,ipPrefixValues:['10.18.0.124/30','10.18.0.128/30','10.18.30.16/30','10.18.30.20/30']}},{ipCondition:{type:DestinationIP,prefixType:Prefix,ipPrefixValues:['10.18.0.124/30','10.18.0.128/30','10.18.30.16/30','10.18.30.20/30']}}],actions:[{type:Count}]}]"
270269
```
271270

272-
This command creates an Egress ACL for the specified Isolation Domain External Network with the provided configuration.
271+
This command creates an egress ACL for the specified Isolation Domain External Network with the provided configuration.
273272

274-
### Expected Output
273+
### Expected output
275274

276275
Upon successful execution, the command will return information about the created ACL in the following format:
277276

@@ -339,9 +338,9 @@ Upon successful execution, the command will return information about the created
339338

340339
This output provides details of the created ACL, including its configuration, state, and other relevant information. Adjust the parameters as required for your use case.
341340

342-
## Create ISD External Network Ingress ACL
341+
## Create ISD External Network ingress ACL
343342

344-
To create an Ingress Access Control List (ACL) for an Isolation Domain External Network, use the following command:
343+
To create an ingress ACL for an Isolation Domain External Network, use the following command:
345344

346345
```bash
347346
az networkfabric acl create
@@ -354,7 +353,7 @@ az networkfabric acl create
354353
--match-configurations "[{matchConfigurationName:'L3ISD_EXT_OPTA_INGRESS_ACL_IPV4_CE_PE',sequenceNumber:1110,ipAddressType:IPv4,matchConditions:[{ipCondition:{type:SourceIP,prefixType:Prefix,ipPrefixValues:['10.18.0.124/30','10.18.0.128/30','10.18.30.16/30','10.18.30.20/30']}},{ipCondition:{type:DestinationIP,prefixType:Prefix,ipPrefixValues:['10.18.0.124/30','10.18.0.128/30','10.18.30.16/30','10.18.30.20/30']}}],actions:[{type:Count}]}]"
355354
```
356355

357-
This command creates an Ingress ACL for the specified Isolation Domain External Network with the provided configuration.
356+
This command creates an ingress ACL for the specified Isolation Domain External Network with the provided configuration.
358357

359358
### Expected Output
360359

@@ -423,5 +422,3 @@ Upon successful execution, the command will return information about the created
423422
```
424423

425424
This output provides details of the created ACL, including its configuration, state, and other relevant information. Adjust the parameters as required for your use case.
426-
427-

0 commit comments

Comments
 (0)