You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/concepts-access-control-lists.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ ACLs can be either static or dynamic. Static ACLs are processed in order, beginn
31
31
32
32
ACLs can be applied to Network to Network interconnect (NNI) or External Network resources. An NNI is a child resource of a Network Fabric. ACLs can be created and linked to an NNI before the Network Fabric is provisioned. ACLs can be updated or deleted after the Network Fabric is deprovisioned.
33
33
34
-
This table summarises the resources that can be associated with an ACL:
34
+
This table summarizes the resources that can be associated with an ACL:
35
35
36
36
37
37
| Resource Name | Supported | Default |
@@ -40,7 +40,7 @@ This table summarises the resources that can be associated with an ACL:
40
40
| Isolation Domain | Yes on External Network with optionA | NA |
41
41
| Network to network interconnect(NNI) | Yes | NA |
42
42
43
-
## Traffic Policy
43
+
## Traffic policy
44
44
45
45
A traffic policy is a set of rules that control the flow of packets in and out of a network interface. This section explains the match criteria and actions available for distinct types of network resources.
Copy file name to clipboardExpand all lines: articles/operator-nexus/reference-acl-configuration.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,7 +28,7 @@ A traffic policy MATCHING CONFIGURATION defines the conditions and parameters fo
28
28
29
29
-**dscp**: the differentiated services code point (DSCP) value in the IP header.
30
30
31
-
## Example Match Conditions
31
+
## Example match conditions
32
32
33
33
-**Match on source and destination IP prefixes**: You can use the source prefix and destination prefix conditions to match on the IP addresses of a packet. For example, `source prefix 10.0.0.0/24` matches any packet with a source IP address in the range of 10.0.0.0 to 10.0.0.255. You can also use the longest prefix option to match the most specific prefix. For example, `destination longest-prefix 10.0.0.0/24 10.0.0.128/25` will match any packet with a destination IP address in the range of 10.0.0.128 to 10.0.0.255, but not 10.0.0.0. to 10.0.0.127.
Copy file name to clipboardExpand all lines: articles/operator-nexus/reference-acl-examples.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,9 @@ ms.date: 02/09/2024
10
10
11
11
# Access Control List Creation and Configuration Examples
12
12
13
-
## Overview of the ACL Create Flow
13
+
This article gives examples of how to create and update Access Control Lists (ACLS).
14
+
15
+
## Overview of the ACL create flow
14
16
15
17
Creating an Access Control List (ACL) associated with a Network-to-Network Interconnect (NNI) involves these steps:
16
18
@@ -22,7 +24,7 @@ Creating an Access Control List (ACL) associated with a Network-to-Network Inter
22
24
23
25
- Provision the Network Fabric resource using the `az networkfabric fabric provision` command. This generates the base configuration and the dynamic match configuration for the ACLs and sends them to the devices.
24
26
25
-
## Overview of the ACL Update Flow
27
+
## Overview of the ACL update flow
26
28
27
29
- Create ingress and egress ACL resources using `az networkfabric acl create` as described in the previous section.
28
30
@@ -42,7 +44,7 @@ This example shows you how to create an NNI with two ACLs - one for ingress and
42
44
43
45
The ACLs must be applied before provisioning the Network Fabric. This limitation is temporary and will be removed in future release. The ingress and egress ACLs are created before the NNI resource and referenced when the NNI is created, which also triggers the creation of the ACLs. This configuration must be done before provisioning the network fabric.
### Access Control List on an Isolation Domain External Network
73
+
### Access Control List on an isolation domain external network
72
74
73
75
Use the `az networkfabric acl create` command to create ingress and egress ACLs for the external network. In the example, we specify the resource group, name, location, network fabric ID, external network ID, and other parameters. You can also specify the match conditions and actions for the ACL rules using the `--match` and `--action` parameters.
0 commit comments