Skip to content

Commit 5bd2156

Browse files
committed
updated fabric
1 parent 0681de8 commit 5bd2156

6 files changed

+20
-20
lines changed

articles/operator-nexus/concepts-access-control-lists.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ The action property of an ACL statement can have one of the following types:
5757

5858
Additionally to add an additional layer of control plane protection for enhancing network security, users can also configure and modify control plane traffic policies on supported devices via APIs.
5959

60-
• A Traffic Policy (TP) solution for securing the fabric device Control Plane (packets destined to or originating from the fabric device) of the supported devices in AON.
60+
• A Traffic Policy (TP) solution for securing the Fabric device Control Plane (packets destined to or originating from the Fabric device) of the supported devices in AON.
6161

6262
• The device control plane (which includes Policing/Rate Limiting) can be implemented as Traffic Policies based on source/destination IP, source/destination ports, and protocols.
6363
• API supports create, update, and delete the TP entries/rules/Policing/Rate Limiting.
@@ -66,7 +66,7 @@ To implement the functionality for Control Plane ACL - Traffic Policy:
6666

6767
• For existing deployments, users must create a CPTP ACL resource, associate it with the Network Fabric (NF), and perform a patch operation.
6868

69-
• For new deployments, users should create the CPTP ACL resource either during fabric creation or after the fabric has been provisioned, followed by patching it to the NF resource. Since the CPTP ACL resource is not created by default, users must manually create it before attaching it to the NF.
69+
• For new deployments, users should create the CPTP ACL resource either during Fabric creation or after the Fabric has been provisioned, followed by patching it to the NF resource. Since the CPTP ACL resource is not created by default, users must manually create it before attaching it to the NF.
7070

7171
## Next steps:
7272

articles/operator-nexus/concepts-isolation-domain.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,13 @@ An Isolation Domain resource enables the creation of layer-2 and layer-3 network
1919

2020
- **Layer-3 isolation domain with Internal Networks** - provides workloads the ability to connect across a layer 3 (IP) network.
2121

22-
- **Layer-3 isolation domain with External Network** - provides workloads the ability to connect across a layer 3 network, and provides connectivity to the operator's network outside of the Operator Nexus network fabric.
22+
- **Layer-3 isolation domain with External Network** - provides workloads the ability to connect across a layer 3 network, and provides connectivity to the operator's network outside of the Operator Nexus Network Fabric.
2323

2424
An isolation domain offers:
2525

2626
- Unified network capabilities with full integration with your compute resources, enabling connectivity between your Operator Nexus platform workloads.
2727

28-
- Northbound connectivity with customer routers using BGP peering sessions between the Operator Nexus network fabric and the operator's external network.
28+
- Northbound connectivity with customer routers using BGP peering sessions between the Operator Nexus Network Fabric and the operator's external network.
2929

3030
- Southbound connectivity with telco workloads using internal networks.
3131

@@ -47,16 +47,16 @@ The L2VRF feature in Nexus enhances the flexibility and scalability of network c
4747

4848
- **Extended VLAN Support:** The Layer 2 Isolation Domain (ISD) ARM resource now supports a new read-write property called extendedVlan, which defaults to false. When this property is set, the CEs are configured to trunk through the VLAN ID of the L2 ISD to the PE.
4949

50-
- **Dynamic Configuration:** The extendedVlan property can be dynamically toggled, and changes apply at the point of the next fabric commit.
50+
- **Dynamic Configuration:** The extendedVlan property can be dynamically toggled, and changes apply at the point of the next Fabric commit.
5151

5252
- **Traffic Agnosticism:** Nexus is agnostic to the traffic running over this network and does not run any hosts or services on it. Address management, security, and services (DNS, DHCP, NTP, etc.) are user responsibilities.
5353

5454
## Layer 3 Isolation Domains
5555

56-
A layer 3 isolation domain provides workloads with the ability to exchange layer-3 routing information through the Operator Nexus network fabric and with external networks.
56+
A layer 3 isolation domain provides workloads with the ability to exchange layer-3 routing information through the Operator Nexus Network Fabric and with external networks.
5757

5858
Layer-3 isolation domains can provide two types of network:
5959

60-
- **Internal Network** - a Layer 3 Isolation Domain Internal Network enables east-west layer 3 communication between workloads on the Operator Nexus Network fabric. An internal network is a complete solution for layer-3 inter and intra-rack communication for compute workloads. Each workload can connect to multiple internal networks.
60+
- **Internal Network** - a Layer 3 Isolation Domain Internal Network enables east-west layer 3 communication between workloads on the Operator Nexus Network Fabric. An internal network is a complete solution for layer-3 inter and intra-rack communication for compute workloads. Each workload can connect to multiple internal networks.
6161

62-
- **External Network** - a Layer 3 Isolation Domain External Network enables workloads to communicate with external services via the operator network. An external network creates a communication channel between Operator Nexus workloads and services hosted outside of the Operator Nexus network fabric. Each Layer 3 isolation domain supports one external network.
62+
- **External Network** - a Layer 3 Isolation Domain External Network enables workloads to communicate with external services via the operator network. An external network creates a communication channel between Operator Nexus workloads and services hosted outside of the Operator Nexus Network Fabric. Each Layer 3 isolation domain supports one external network.

articles/operator-nexus/howto-append-custom-suffix-to-interface-descriptions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ az networkfabric interface update --additional-description "example-description"
6161

6262
### 3. Commit the configuration
6363

64-
After updating the description, apply the changes to the fabric:
64+
After updating the description, apply the changes to the Fabric:
6565

6666
```Azure CLI
6767
az networkfabric fabric commit-configuration --resource-group "example-rg" --resource-name "example-fabric"
@@ -108,7 +108,7 @@ az networkfabric interface update --additional-description "example-description"
108108

109109
### 3. Commit the configuration
110110

111-
After removing the suffix, apply the changes to the fabric:
111+
After removing the suffix, apply the changes to the Fabric:
112112

113113
```Azure CLI
114114
az networkfabric fabric commit-configuration --resource-group "example-rg" --resource-name "example-fabric"
@@ -138,4 +138,4 @@ This feature is available for the following interface types:
138138
- **NPB Device**
139139

140140
> [!Note]
141-
> **Existing deployments** will retain their **current descriptions** until fabric instances are **migrated to Release 8.0**. After migration, users must update descriptions via the **API**.
141+
> **Existing deployments** will retain their **current descriptions** until Fabric instances are **migrated to Release 8.0**. After migration, users must update descriptions via the **API**.

articles/operator-nexus/howto-configure-bring-your-own-storage-network-fabric.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -96,9 +96,9 @@ Use the `--storage-account-configuration` parameter to define the storage locati
9696
}
9797
```
9898

99-
## Create a new fabric instance
99+
## Create a new Fabric instance
100100

101-
Use the following command to create a new fabric instance with BYO storage:
101+
Use the following command to create a new Fabric instance with BYO storage:
102102

103103
```azurecli
104104
az networkfabric fabric create --resource-name <fabricname> \
@@ -108,9 +108,9 @@ az networkfabric fabric create --resource-name <fabricname> \
108108
--mi-user-assigned "/subscriptions/<uamisubscriptionid>/resourceGroups/<uamiresourcegroupname>/providers/Microsoft.ManagedIdentity/userAssignedIdentities/<uaminame>"
109109
```
110110

111-
## Update an existing fabric instance
111+
## Update an existing Fabric instance
112112

113-
For existing deployments, update the fabric with the required parameters:
113+
For existing deployments, update the Fabric with the required parameters:
114114

115115
```azurecli
116116
az networkfabric fabric update --resource-name <fabricname> \

articles/operator-nexus/howto-reboot-network-device.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ az networkfabric device reboot --network-device-name <DeviceName> --resource-gro
7272

7373
#### Considerations
7474

75-
- The **fabric** is still placed in **maintenance mode**, but the **device itself is not**.
75+
- The **Fabric** is still placed in **maintenance mode**, but the **device itself is not**.
7676

7777
- **Blocked operations during the reboot:**
7878

@@ -107,14 +107,14 @@ For devices running **Arista EOS**, the reboot process is triggered via the **gN
107107

108108
### Key difference in ungraceful reboot
109109

110-
- In an **ungraceful reboot**, the **device itself is not placed in maintenance mode**, but the **fabric still enters maintenance mode**.
110+
- In an **ungraceful reboot**, the **device itself is not placed in maintenance mode**, but the **Fabric still enters maintenance mode**.
111111

112112
## Summary of key differences
113113

114114
| **Feature** | **Graceful Reboot Without ZTP** | **Ungraceful Reboot Without ZTP** |
115115
|-------------|--------------------------------|----------------------------------|
116116
| **Puts device in maintenance mode?** | ✅ Yes | ❌ No |
117-
| **Puts fabric in maintenance mode?** | ✅ Yes | ✅ Yes |
117+
| **Puts Fabric in maintenance mode?** | ✅ Yes | ✅ Yes |
118118
| **Uses last known good configuration?** | ✅ Yes | ✅ Yes |
119119
| **Blocks configuration updates, upgrades, and replacement flows?** | ✅ Yes | ✅ Yes |
120120
| **Persists runRW configuration?** | ✅ Yes | ✅ Yes |

articles/operator-nexus/howto-set-up-break-glass-access-using-in-band-management.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: template-how-to
1111

1212
# Break-Glass access using In-Band management
1313

14-
In the Nexus Network Fabric (NNF), there is an out-of-band management network where most fabric devices are connected to management switches via management ports (Ma1). The only exceptions are the Terminal Server and Aggregation Management Switches.
14+
In the Nexus Network Fabric (NNF), there is an out-of-band management network where most Fabric devices are connected to management switches via management ports (Ma1). The only exceptions are the Terminal Server and Aggregation Management Switches.
1515
To address the potential single point of failure posed by the management switch, Microsoft team has provided the Redundant In-band Management Break Glass Access feature.
1616

1717
> [!Note]
@@ -189,4 +189,4 @@ ipv6 prefix-list trusted_sources_v6
189189
```
190190

191191
> [!Note]
192-
> For Greenfield deployments, provide a list of trusted IP prefixes or use default resources created by the system. <br> For Brownfield deployments, ensure configurations are in place during upgrades and use PATCH operations to update the network fabric.
192+
> For new deployments, provide a list of trusted IP prefixes or use default resources created by the system. <br> For existing deployments, ensure configurations are in place during upgrades and use PATCH operations to update the network Fabric.

0 commit comments

Comments
 (0)