You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## Create internal networks for User Plane Functions (N3, N6) and Access and Mobility Management Function (N2) interfaces
135
+
## Create internal networks for User Plane Function (N3, N6) and Access and Mobility Management Function (N2) interfaces
136
136
137
137
When you're creating User Plane Function (UPF) internal networks, dual stack IPv4/IPv6 is supported. You don't need to configure the Border Gateway Protocol (BGP) fabric-side Autonomous System Number (ASN) because ASN is included in network fabric resource creation. Use the following commands to create these internal networks.
az networkcloud trunkednetwork show -n $trunkName -g $rgCompute --subscription $subscriptionId
298
297
```
299
298
300
-
301
299
## Configure the Cloud Services Network proxy and allowlisted domains
302
300
303
301
A Cloud Services Network proxy (CSN proxy) is used to access Azure and internet destinations. You must explicitly add these domains to an allowlist in the CSN configuration for a NAKS cluster to access Azure services and for Arc integration.
@@ -306,31 +304,31 @@ A Cloud Services Network proxy (CSN proxy) is used to access Azure and internet
306
304
307
305
Add the following egress points for Network Function Manager (NFM) based deployment support (HybridNetwork Resource Provider (RP), CustomLocation RP reachability, ACR, Arc):
308
306
309
-
.azurecr.io / port 80
310
-
.azurecr.io / port 443
311
-
.mecdevice.azure.com / port 443
312
-
eastus-prod.mecdevice.azure.com / port 443
313
-
.microsoftmetrics.com / port 443
314
-
crprivatemobilenetwork.azurecr.io / port 443
315
-
.guestconfiguration.azure.com / port 443
316
-
.kubernetesconfiguration.azure.com / port 443
317
-
eastus.obo.arc.azure.com / port 8084
318
-
.windows.net / port 80
319
-
.windows.net / port 443
320
-
.k8connecthelm.azureedge.net / port 80
321
-
.k8connecthelm.azureedge.net / port 443
322
-
.k8sconnectcsp.azureedge.net / port 80
323
-
.k8sconnectcsp.azureedge.net / port 443
324
-
.arc.azure.net / port 80
325
-
.arc.azure.net / port 443
307
+
-.azurecr.io / port 80
308
+
-.azurecr.io / port 443
309
+
-.mecdevice.azure.com / port 443
310
+
-eastus-prod.mecdevice.azure.com / port 443
311
+
-.microsoftmetrics.com / port 443
312
+
-crprivatemobilenetwork.azurecr.io / port 443
313
+
-.guestconfiguration.azure.com / port 443
314
+
-.kubernetesconfiguration.azure.com / port 443
315
+
-eastus.obo.arc.azure.com / port 8084
316
+
-.windows.net / port 80
317
+
-.windows.net / port 443
318
+
-.k8connecthelm.azureedge.net / port 80
319
+
-.k8connecthelm.azureedge.net / port 443
320
+
-.k8sconnectcsp.azureedge.net / port 80
321
+
-.k8sconnectcsp.azureedge.net / port 443
322
+
-.arc.azure.net / port 80
323
+
-.arc.azure.net / port 443
326
324
327
325
328
326
### Python Cloud Services Networks endpoints
329
327
330
328
For python packages installation (part of the fed-kube_addons pod-node_config command list used for NAKS), add the following endpoints:
331
329
332
-
pypi.org / port 443
333
-
files.pythonhosted.org / port 443
330
+
-pypi.org / port 443
331
+
-files.pythonhosted.org / port 443
334
332
335
333
> [!NOTE]
336
334
> Additional Azure Detat Explorer (ADX) endpoints may need to be included in the allowlist if there is a requirement to inject data into ADX.
@@ -339,27 +337,27 @@ files.pythonhosted.org / port 443
339
337
340
338
Use the following destination to run containers that have their endpoints stored in public container registries or to install more packages for the auxiliary virtual machines:
341
339
342
-
.ghcr.io / port 80
343
-
.ghcr.io / port 443
344
-
.k8s.gcr.io / port 80
345
-
.k8s.gcr.io / port 443
346
-
.k8s.io / port 80
347
-
.k8s.io / port 443
348
-
.docker.io / port 80
349
-
.docker.io / port 443
350
-
.docker.com / port 80
351
-
.docker.com / port 443
352
-
.pkg.dev / port 80
353
-
.pkg.dev / port 443
354
-
.ubuntu.com / port 80
355
-
.ubuntu.com / port 443
340
+
-.ghcr.io / port 80
341
+
-.ghcr.io / port 443
342
+
-.k8s.gcr.io / port 80
343
+
-.k8s.gcr.io / port 443
344
+
-.k8s.io / port 80
345
+
-.k8s.io / port 443
346
+
-.docker.io / port 80
347
+
-.docker.io / port 443
348
+
-.docker.com / port 80
349
+
-.docker.com / port 443
350
+
-.pkg.dev / port 80
351
+
-.pkg.dev / port 443
352
+
-.ubuntu.com / port 80
353
+
-.ubuntu.com / port 443
356
354
357
355
## Create Cloud Services Networks
358
356
359
357
You must create a separate CSN instance for each NAKS cluster when you deploy Azure Operator 5G Core Preview on the Nexus platform.
360
358
361
359
> [!NOTE]
362
-
> Adjust the `additional-egress-endpoints` list based on the description and lists provided in the previouss sections.
360
+
> Adjust the `additional-egress-endpoints` list based on the description and lists provided in the previous sections.
363
361
364
362
```azurecli
365
363
export subscriptionId="<SUBSCRIPTION-ID>"
@@ -494,7 +492,7 @@ Azure Operator 5G Core is a telecommunications workload that enables you to offe
494
492
### Edge NFVI functions (running on Azure Operator Nexus)
495
493
496
494
> [!NOTE]
497
-
> The Edge NFVI related services may be updated occasionally. Refer to the specific service's documentation for additional information.
495
+
> The Edge NFVI related services may be updated occasionally. For more information about these services, see the specific service's documentation.
498
496
499
497
-**Azure Operator Nexus** - Azure Operator Nexus is a carrier-grade, next-generation hybrid cloud platform for telecommunication operators. Azure Operator Nexus is purpose-built for operators' network-intensive workloads and mission-critical applications.
500
498
@@ -508,9 +506,6 @@ Azure Operator 5G Core is a telecommunications workload that enables you to offe
508
506
509
507
-**Azure Key Vault** - Provides a secure and centralized store for managing encryption keys and secrets for Azure Operator 5G Core across Azure and on-premises environments.
510
508
511
-
> [!NOTE]
512
-
> Microsoft may update these Edge NFVI related services.
513
-
514
509
## Related content
515
510
516
511
- Learn about the [Deployment order](concept-deployment-order.md).
0 commit comments