Skip to content

Commit 587cbed

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/azure-docs-pr into service-tag-patch
2 parents 9a5d1f2 + ffe2d63 commit 587cbed

File tree

6 files changed

+97
-9
lines changed

6 files changed

+97
-9
lines changed

articles/operator-nexus/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,8 @@
2020
href: concepts-network-fabric.md
2121
- name: Network Fabric Controller
2222
href: concepts-network-fabric-controller.md
23+
- name: Network Fabric Services
24+
href: concepts-network-fabric-services.md
2325
- name: Nexus Kubernetes
2426
href: concepts-nexus-kubernetes-cluster.md
2527
- name: Observability

articles/operator-nexus/concepts-network-fabric-controller.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -191,3 +191,7 @@ Similar to the creation process, deleting an NFC usually takes between 45 and 60
191191
**What steps should be taken if the NFC fails to initialize on the first attempt?**
192192

193193
If the NFC does not provision successfully on the first try, the recommended course of action is to clean up and recreate the NFC. This is due to the lack of support for updating the NFC during intermediate failures.
194+
195+
## Next steps
196+
197+
- [Network Fabric Services](concepts-network-fabric-services.md)
Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: Azure Operator Nexus Network Fabric Services
3+
description: Overview of Network Fabric Services for Azure Operator Nexus.
4+
author: lnyswonger
5+
ms.author: lnyswonger
6+
ms.reviewer: jdasari
7+
ms.date: 12/21/2023
8+
ms.service: azure-operator-nexus
9+
ms.topic: conceptual
10+
---
11+
12+
# Network Fabric Services overview
13+
The Network Fabric Controller (NFC) serves as the host for Nexus Network Fabric (NNF) services, illustrated in the diagram below. These services enable secure internet access for on-premises applications and services. Communication between on-premises applications and NNF services is facilitated through a specialized Express Route service (VPN). This setup allows on-premises services to connect to the NNF services via Express Route at one end, and access internet-based services at the other end.
14+
15+
:::image type="content" source="media/network-fabric-controller-architecture.png" alt-text="A flowchart for creating a Network Fabric Controller in Azure, detailing the progression from user request to the associated Azure resources.":::
16+
17+
18+
## Enhanced Security with Nexus Network Fabric Proxy Management
19+
The Nexus Network Fabric employs a robust, cloud-native proxy designed to protect the Nexus infrastructure and its associated workloads. This proxy is primarily focused on preventing data exfiltration attacks and maintaining a controlled allowlist of URLs for NNF instance connections. In combination with the under-cloud proxy, the NNF proxy delivers comprehensive security for workload networks. There are two distinct aspects of this system: the Infrastructure Management Proxy, which handles all infrastructure traffic, and the Workload Management Proxy, dedicated to facilitating communication between workloads and public or Azure endpoints.
20+
21+
## Optimized Time Synchronization with Managed Network Time Protocol (NTP)
22+
The Network Time Protocol (NTP) is an essential network protocol that aligns the time settings of computer systems over packet-switched networks. In the Azure Operator Nexus instance, NTP is instrumental in ensuring the consistent time settings across all compute nodes and network devices. This level of synchronization is critical for the Network Functions (NFs) operating within the infrastructure. It significantly contributes to the effectiveness of telemetry and security measures, maintaining the integrity and coordination of the system.
23+
24+
## Nexus Network Fabric Resources
25+
The following are key resources for Nexus Network Fabric.
26+
27+
### InternetGateways
28+
*InternetGateways* is a critical resource in network architecture, acting as the connecting bridge between a virtual network and the Internet. It enables virtual machines and other entities within a virtual network to communicate seamlessly with external services. These services range from websites and APIs to various cloud services, making InternetGateways a versatile and essential component.
29+
30+
#### Properties
31+
32+
| Property | Description |
33+
|------------------|------------------------------------------------------------------------------------------------------|
34+
| Name | Serves as the unique identifier for the Internet Gateway. |
35+
| Location | Specifies the Azure region where the Internet Gateway is deployed, ensuring regional compliance and optimization. |
36+
| Subnets | Defines the subnets linked with the Internet Gateway, determining the network segments it services. |
37+
| Public IP Address| Assigns a public IP address to the gateway, enabling external network interactions. |
38+
| Routes | Outlines the routing rules and configurations for managing traffic through the gateway. |
39+
40+
41+
#### Use cases
42+
43+
* **Internet Access:** Facilitates Internet connectivity for virtual network resources, crucial for updates, downloads, and accessing external services.
44+
* **Hybrid Connectivity:** Ideal for hybrid scenarios, allowing secure connections between on-premises networks and Azure resources.
45+
* **Load Balancing:** Enhances network performance and availability by evenly distributing traffic across multiple gateways.
46+
* **Security Enforcement:** Enables the implementation of robust security policies, such as outbound traffic restrictions and encryption mandates.
47+
48+
### InternetGatewayRules
49+
*InternetGatewayRules* represents a set of rules associated with an Internet Gateway in the Managed Network Fabric. These rules establish guidelines for either permitting or restricting traffic as it moves through the Internet Gateway, providing a framework for network traffic management.
50+
51+
#### Properties
52+
53+
| Property | Description |
54+
|------------------------------|--------------------------------------------------------------------------------------|
55+
| Name | Acts as the unique identifier for each rule. |
56+
| Priority | Sets the evaluation order of the rules, with higher priority rules taking precedence.|
57+
| Action | Determines the action (e.g., allow, deny) for traffic that matches the rule criteria.|
58+
| Source IP Address Range | Identifies the originating IP address range applicable to the rule. |
59+
| Destination IP Address Range | Defines the targeted IP address range for the rule. |
60+
| Protocol | Specifies the network protocol (e.g., TCP, UDP) relevant to the rule. |
61+
| Port Range | Details the port range for the rule, if applicable. |
62+
63+
64+
#### Use cases
65+
66+
* **Traffic Filtering:** InternetGatewayRules enable organizations to control both incoming and outgoing network traffic based on specific criteria. For example, they can block certain IP ranges or allow only particular protocols.
67+
68+
* **Enforcing Security Policies:** These rules are instrumental in implementing security measures, such as restricting traffic to enhance network security. An organization might block known malicious IP ranges or limit traffic to specific ports for certain services.
69+
70+
* **Compliance Assurance:** The rules can also be utilized to comply with regulatory standards by limiting types of traffic, thereby aiding in data privacy and access control.
71+
72+
* **Traffic Load Balancing:** InternetGatewayRules can distribute network traffic across multiple gateways to optimize resource utilization. This includes prioritizing or throttling traffic based on business needs.
73+
74+
## FAQs
75+
76+
**Is Support Available for HTTP Endpoints?**
77+
78+
Azure's default configuration supports only HTTPS endpoints to ensure secure communication. HTTP endpoints are not supported as part of this security measure. By prioritizing HTTPS, Azure maintains high standards of data integrity and privacy.
79+
80+
**How Can I Safeguard Against Data Exfiltration?**
81+
82+
To strengthen security against data exfiltration, Azure supports the allowance of specific Fully Qualified Domain Names (FQDNs) on the proxy. This additional security measure ensures that your network can only be accessed by approved traffic, greatly minimizing the potential for unauthorized data movement.

articles/virtual-wan/about-virtual-hub-routing.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: cherylmc
66

77
ms.service: virtual-wan
88
ms.topic: conceptual
9-
ms.date: 06/30/2023
9+
ms.date: 01/09/2024
1010
ms.author: cherylmc
1111
ms.custom: fasttrack-edit
1212
---
@@ -23,11 +23,11 @@ The following sections describe the key concepts in virtual hub routing.
2323

2424
### <a name="hub-route"></a>Hub route table
2525

26-
A virtual hub route table can contain one or more routes. A route includes its name, a label, a destination type, a list of destination prefixes, and next hop information for a packet to be routed. A **Connection** typically will have a routing configuration that associates or propagates to a route table.
26+
A virtual hub route table can contain one or more routes. A route includes its name, a label, a destination type, a list of destination prefixes, and next hop information for a packet to be routed. A **Connection** typically has a routing configuration that associates or propagates to a route table.
2727

2828
### <a name= "hub-route"></a> Hub routing intent and policies
2929

30-
Routing Intent and Routing policies allow you to configure your Virtual WAN hub to send Internet-bound and Private (Point-to-site, Site-to-site, ExpressRoute, Network Virtual Appliances inside the Virtual WAN Hub and Virtual Network) Traffic via an Azure Firewall, Next-Generation Firewall NVA or software-as-a-service solution deployed in the Virtual WAN hub. There are two types of Routing Policies: Internet Traffic and Private Traffic Routing Policies. Each Virtual WAN Hub may have at most one Internet Traffic Routing Policy and one Private Traffic Routing Policy, each with a Next Hop resource.
30+
Routing Intent and Routing policies allow you to configure your Virtual WAN hub to send Internet-bound and Private (Point-to-site, Site-to-site, ExpressRoute, Network Virtual Appliances inside the Virtual WAN Hub and Virtual Network) Traffic via an Azure Firewall, Next-Generation Firewall NVA or software-as-a-service solution deployed in the Virtual WAN hub. There are two types of Routing Policies: Internet Traffic and Private Traffic Routing Policies. Each Virtual WAN Hub can have, at most, one Internet Traffic Routing Policy and one Private Traffic Routing Policy, each with a Next Hop resource.
3131

3232

3333
While Private Traffic includes both branch and Virtual Network address prefixes, Routing Policies considers them as one entity within the Routing Intent concepts.
@@ -51,7 +51,7 @@ You can set up the routing configuration for a virtual network connection during
5151

5252
### <a name="association"></a>Association
5353

54-
Each connection is associated to one route table. Associating a connection to a route table allows the traffic (from that connection) to be sent to the destination indicated as routes in the route table. The routing configuration of the connection will show the associated route table. Multiple connections can be associated to the same route table. All VPN, ExpressRoute, and User VPN connections are associated to the same (default) route table.
54+
Each connection is associated to one route table. Associating a connection to a route table allows the traffic (from that connection) to be sent to the destination indicated as routes in the route table. The routing configuration of the connection shows the associated route table. Multiple connections can be associated to the same route table. All VPN, ExpressRoute, and User VPN connections are associated to the same (default) route table.
5555

5656
By default, all connections are associated to a **Default route table** in a virtual hub. Each virtual hub has its own Default route table, which can be edited to add a static route(s). Routes added statically take precedence over dynamically learned routes for the same prefixes.
5757

@@ -96,10 +96,10 @@ Consider the following when configuring Virtual WAN routing:
9696
* All branch connections (Point-to-site, Site-to-site, and ExpressRoute) need to be associated to the Default route table. That way, all branches will learn the same prefixes.
9797
* All branch connections need to propagate their routes to the same set of route tables. For example, if you decide that branches should propagate to the Default route table, this configuration should be consistent across all branches. As a result, all connections associated to the Default route table will be able to reach all of the branches.
9898
* When you use Azure Firewall in multiple regions, all spoke virtual networks must be associated to the same route table. For example, having a subset of the VNets going through the Azure Firewall while other VNets bypass the Azure Firewall in the same virtual hub isn't possible.
99-
* You may specify multiple next hop IP addresses on a single Virtual Network connection. However, Virtual Network Connection doesn't support ‘multiple/unique’ next hop IP to the ‘same’ network virtual appliance in a SPOKE Virtual Network 'if' one of the routes with next hop IP is indicated to be public IP address or 0.0.0.0/0 (internet)
99+
* You can specify multiple next hop IP addresses on a single Virtual Network connection. However, Virtual Network Connection doesn't support ‘multiple/unique’ next hop IP to the ‘same’ network virtual appliance in a SPOKE Virtual Network 'if' one of the routes with next hop IP is indicated to be public IP address or 0.0.0.0/0 (internet)
100100
* All information pertaining to 0.0.0.0/0 route is confined to a local hub's route table. This route doesn't propagate across hubs.
101101
* You can only use Virtual WAN to program routes in a spoke if the prefix is shorter (less specific) than the virtual network prefix. For example, in the diagram above the spoke VNET1 has the prefix 10.1.0.0/16: in this case, Virtual WAN wouldn't be able to inject a route that matches the virtual network prefix (10.1.0.0/16) or any of the subnets (10.1.0.0/24, 10.1.1.0/24). In other words, Virtual WAN can't attract traffic between two subnets that are in the same virtual network.
102-
* While true that 2 hubs on the same virtual WAN will announce routes to each other (as long as the propagation is enabled to the same labels) this only applies to dynamic routing. Once you define a static route, this is not the case.
102+
* While it's true that 2 hubs on the same virtual WAN will announce routes to each other (as long as the propagation is enabled to the same labels), this only applies to dynamic routing. Once you define a static route, this isn't the case.
103103

104104
## Next steps
105105

articles/virtual-wan/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.topic: landing-page
1111
author: cherylmc
1212
ms.author: cherylmc
13-
ms.date: 05/01/2023
13+
ms.date: 01/09/2024
1414
ms.custom: e2e-hybrid
1515

1616
# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | whats-new

articles/virtual-wan/virtual-wan-about.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: cherylmc
55

66
ms.service: virtual-wan
77
ms.topic: overview
8-
ms.date: 06/30/2023
8+
ms.date: 01/09/2024
99
ms.author: cherylmc
1010
# Customer intent: As someone with a networking background, I want to understand what Virtual WAN is and if it is the right choice for my Azure network.
1111
---
@@ -24,7 +24,7 @@ Azure Virtual WAN is a networking service that brings many networking, security,
2424

2525
You don't have to have all of these use cases to start using Virtual WAN. You can get started with just one use case, and then adjust your network as it evolves.
2626

27-
The Virtual WAN architecture is a hub and spoke architecture with scale and performance built in for branches (VPN/SD-WAN devices), users (Azure VPN/OpenVPN/IKEv2 clients), ExpressRoute circuits, and virtual networks. It enables a [global transit network architecture](virtual-wan-global-transit-network-architecture.md), where the cloud hosted network 'hub' enables transitive connectivity between endpoints that may be distributed across different types of 'spokes'.
27+
The Virtual WAN architecture is a hub and spoke architecture with scale and performance built in for branches (VPN/SD-WAN devices), users (Azure VPN/OpenVPN/IKEv2 clients), ExpressRoute circuits, and virtual networks. It enables a [global transit network architecture](virtual-wan-global-transit-network-architecture.md), where the cloud hosted network 'hub' enables transitive connectivity between endpoints that might be distributed across different types of 'spokes'.
2828

2929
Azure regions serve as hubs that you can choose to connect to. All hubs are connected in full mesh in a Standard Virtual WAN making it easy for the user to use the Microsoft backbone for any-to-any (any spoke) connectivity.
3030

0 commit comments

Comments
 (0)