You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/concepts-access-control-lists.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ The action property of an ACL statement can have one of the following types:
57
57
58
58
Additionally to add an additional layer of control plane protection for enhancing network security, users can also configure and modify control plane traffic policies on supported devices via APIs.
59
59
60
-
• A Traffic Policy (TP) solution for securing the fabric device Control Plane (packets destined to or originating from the fabric device) of the supported devices in AON.
60
+
• A Traffic Policy (TP) solution for securing the Fabric device Control Plane (packets destined to or originating from the Fabric device) of the supported devices in AON.
61
61
62
62
• The device control plane (which includes Policing/Rate Limiting) can be implemented as Traffic Policies based on source/destination IP, source/destination ports, and protocols.
63
63
• API supports create, update, and delete the TP entries/rules/Policing/Rate Limiting.
@@ -66,7 +66,7 @@ To implement the functionality for Control Plane ACL - Traffic Policy:
66
66
67
67
• For existing deployments, users must create a CPTP ACL resource, associate it with the Network Fabric (NF), and perform a patch operation.
68
68
69
-
• For new deployments, users should create the CPTP ACL resource either during fabric creation or after the fabric has been provisioned, followed by patching it to the NF resource. Since the CPTP ACL resource is not created by default, users must manually create it before attaching it to the NF.
69
+
• For new deployments, users should create the CPTP ACL resource either during Fabric creation or after the Fabric has been provisioned, followed by patching it to the NF resource. Since the CPTP ACL resource is not created by default, users must manually create it before attaching it to the NF.
Copy file name to clipboardExpand all lines: articles/operator-nexus/concepts-isolation-domain.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,13 +19,13 @@ An Isolation Domain resource enables the creation of layer-2 and layer-3 network
19
19
20
20
-**Layer-3 isolation domain with Internal Networks** - provides workloads the ability to connect across a layer 3 (IP) network.
21
21
22
-
-**Layer-3 isolation domain with External Network** - provides workloads the ability to connect across a layer 3 network, and provides connectivity to the operator's network outside of the Operator Nexus network fabric.
22
+
-**Layer-3 isolation domain with External Network** - provides workloads the ability to connect across a layer 3 network, and provides connectivity to the operator's network outside of the Operator Nexus Network Fabric.
23
23
24
24
An isolation domain offers:
25
25
26
26
- Unified network capabilities with full integration with your compute resources, enabling connectivity between your Operator Nexus platform workloads.
27
27
28
-
- Northbound connectivity with customer routers using BGP peering sessions between the Operator Nexus network fabric and the operator's external network.
28
+
- Northbound connectivity with customer routers using BGP peering sessions between the Operator Nexus Network Fabric and the operator's external network.
29
29
30
30
- Southbound connectivity with telco workloads using internal networks.
31
31
@@ -47,16 +47,16 @@ The L2VRF feature in Nexus enhances the flexibility and scalability of network c
47
47
48
48
-**Extended VLAN Support:** The Layer 2 Isolation Domain (ISD) ARM resource now supports a new read-write property called extendedVlan, which defaults to false. When this property is set, the CEs are configured to trunk through the VLAN ID of the L2 ISD to the PE.
49
49
50
-
-**Dynamic Configuration:** The extendedVlan property can be dynamically toggled, and changes apply at the point of the next fabric commit.
50
+
-**Dynamic Configuration:** The extendedVlan property can be dynamically toggled, and changes apply at the point of the next Fabric commit.
51
51
52
52
-**Traffic Agnosticism:** Nexus is agnostic to the traffic running over this network and does not run any hosts or services on it. Address management, security, and services (DNS, DHCP, NTP, etc.) are user responsibilities.
53
53
54
54
## Layer 3 Isolation Domains
55
55
56
-
A layer 3 isolation domain provides workloads with the ability to exchange layer-3 routing information through the Operator Nexus network fabric and with external networks.
56
+
A layer 3 isolation domain provides workloads with the ability to exchange layer-3 routing information through the Operator Nexus Network Fabric and with external networks.
57
57
58
58
Layer-3 isolation domains can provide two types of network:
59
59
60
-
-**Internal Network** - a Layer 3 Isolation Domain Internal Network enables east-west layer 3 communication between workloads on the Operator Nexus Network fabric. An internal network is a complete solution for layer-3 inter and intra-rack communication for compute workloads. Each workload can connect to multiple internal networks.
60
+
-**Internal Network** - a Layer 3 Isolation Domain Internal Network enables east-west layer 3 communication between workloads on the Operator Nexus Network Fabric. An internal network is a complete solution for layer-3 inter and intra-rack communication for compute workloads. Each workload can connect to multiple internal networks.
61
61
62
-
-**External Network** - a Layer 3 Isolation Domain External Network enables workloads to communicate with external services via the operator network. An external network creates a communication channel between Operator Nexus workloads and services hosted outside of the Operator Nexus network fabric. Each Layer 3 isolation domain supports one external network.
62
+
-**External Network** - a Layer 3 Isolation Domain External Network enables workloads to communicate with external services via the operator network. An external network creates a communication channel between Operator Nexus workloads and services hosted outside of the Operator Nexus Network Fabric. Each Layer 3 isolation domain supports one external network.
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-append-custom-suffix-to-interface-descriptions.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ az networkfabric interface update --additional-description "example-description"
61
61
62
62
### 3. Commit the configuration
63
63
64
-
After updating the description, apply the changes to the fabric:
64
+
After updating the description, apply the changes to the Fabric:
65
65
66
66
```Azure CLI
67
67
az networkfabric fabric commit-configuration --resource-group "example-rg" --resource-name "example-fabric"
@@ -108,7 +108,7 @@ az networkfabric interface update --additional-description "example-description"
108
108
109
109
### 3. Commit the configuration
110
110
111
-
After removing the suffix, apply the changes to the fabric:
111
+
After removing the suffix, apply the changes to the Fabric:
112
112
113
113
```Azure CLI
114
114
az networkfabric fabric commit-configuration --resource-group "example-rg" --resource-name "example-fabric"
@@ -138,4 +138,4 @@ This feature is available for the following interface types:
138
138
-**NPB Device**
139
139
140
140
> [!Note]
141
-
> **Existing deployments** will retain their **current descriptions** until fabric instances are **migrated to Release 8.0**. After migration, users must update descriptions via the **API**.
141
+
> **Existing deployments** will retain their **current descriptions** until Fabric instances are **migrated to Release 8.0**. After migration, users must update descriptions via the **API**.
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-set-up-break-glass-access-using-in-band-management.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.custom: template-how-to
11
11
12
12
# Break-Glass access using In-Band management
13
13
14
-
In the Nexus Network Fabric (NNF), there is an out-of-band management network where most fabric devices are connected to management switches via management ports (Ma1). The only exceptions are the Terminal Server and Aggregation Management Switches.
14
+
In the Nexus Network Fabric (NNF), there is an out-of-band management network where most Fabric devices are connected to management switches via management ports (Ma1). The only exceptions are the Terminal Server and Aggregation Management Switches.
15
15
To address the potential single point of failure posed by the management switch, Microsoft team has provided the Redundant In-band Management Break Glass Access feature.
> For Greenfield deployments, provide a list of trusted IP prefixes or use default resources created by the system. <br> For Brownfield deployments, ensure configurations are in place during upgrades and use PATCH operations to update the network fabric.
192
+
> For new deployments, provide a list of trusted IP prefixes or use default resources created by the system. <br> For existing deployments, ensure configurations are in place during upgrades and use PATCH operations to update the network Fabric.
0 commit comments