Skip to content

Commit c35502a

Browse files
Various markups identified in review.
1 parent 2cffdbe commit c35502a

File tree

4 files changed

+27
-16
lines changed

4 files changed

+27
-16
lines changed

articles/operator-nexus/TOC.yml

Lines changed: 17 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,12 @@
2222
href: concepts-network-fabric-controller.md
2323
- name: Network Fabric Services
2424
href: concepts-network-fabric-services.md
25+
- name: Access Control Lists
26+
href: concepts-access-control-lists.md
2527
- name: Nexus Kubernetes
2628
href: concepts-nexus-kubernetes-cluster.md
2729
- name: Observability
28-
href: concepts-observability.md
30+
href: concepts-observability.md
2931
- name: Security
3032
href: concepts-security.md
3133
- name: Control Plane Resiliency
@@ -55,7 +57,7 @@
5557
- name: Use Bicep file
5658
href: quickstarts-virtual-machine-deployment-bicep.md
5759
- name: Use Azure PowerShell
58-
href: quickstarts-virtual-machine-deployment-ps.md
60+
href: quickstarts-virtual-machine-deployment-ps.md
5961
- name: How-To Guides
6062
items:
6163
- name: Operator Nexus Instance Deployment and Upgrade
@@ -93,12 +95,12 @@
9395
- name: Network Fabric
9496
expanded: false
9597
items:
96-
- name: Isolation Domain
97-
href: howto-configure-isolation-domain.md
98-
- name: Network Fabric Route Policy
99-
href: how-to-route-policy.md
100-
- name: Network Packet Broker
101-
href: howto-configure-network-packet-broker.md
98+
- name: Isolation Domain
99+
href: howto-configure-isolation-domain.md
100+
- name: Network Fabric Route Policy
101+
href: how-to-route-policy.md
102+
- name: Network Packet Broker
103+
href: howto-configure-network-packet-broker.md
102104
- name: Nexus Kubernetes cluster
103105
expanded: false
104106
items:
@@ -211,3 +213,10 @@
211213
href: reference-near-edge-storage.md
212214
- name: Limits & quotas
213215
href: reference-limits-and-quotas.md
216+
- name: Access Control Lists
217+
expanded: false
218+
items:
219+
- name: Access Control List configuration
220+
href: reference-acl-configuration.md
221+
- name: Access Control List configuration examples
222+
href: reference-acl-examples.md

articles/operator-nexus/concepts-access-control-lists.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ ACLs can be either static or dynamic. Static ACLs are processed in order, beginn
3131

3232
ACLs can be applied to Network to Network interconnect (NNI) or External Network resources. An NNI is a child resource of a Network Fabric. ACLs can be created and linked to an NNI before the Network Fabric is provisioned. ACLs can be updated or deleted after the Network Fabric is deprovisioned.
3333

34-
This table summarises the resources that can be associated with an ACL:
34+
This table summarizes the resources that can be associated with an ACL:
3535

3636

3737
| Resource Name | Supported | Default |
@@ -40,7 +40,7 @@ This table summarises the resources that can be associated with an ACL:
4040
| Isolation Domain | Yes on External Network with optionA | NA |
4141
| Network to network interconnect(NNI) | Yes | NA |
4242

43-
## Traffic Policy
43+
## Traffic policy
4444

4545
A traffic policy is a set of rules that control the flow of packets in and out of a network interface. This section explains the match criteria and actions available for distinct types of network resources.
4646

articles/operator-nexus/reference-acl-configuration.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ A traffic policy MATCHING CONFIGURATION defines the conditions and parameters fo
2828

2929
- **dscp**: the differentiated services code point (DSCP) value in the IP header.
3030

31-
## Example Match Conditions
31+
## Example match conditions
3232

3333
- **Match on source and destination IP prefixes**: You can use the source prefix and destination prefix conditions to match on the IP addresses of a packet. For example, `source prefix 10.0.0.0/24` matches any packet with a source IP address in the range of 10.0.0.0 to 10.0.0.255. You can also use the longest prefix option to match the most specific prefix. For example, `destination longest-prefix 10.0.0.0/24 10.0.0.128/25` will match any packet with a destination IP address in the range of 10.0.0.128 to 10.0.0.255, but not 10.0.0.0. to 10.0.0.127.
3434

articles/operator-nexus/reference-acl-examples.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,9 @@ ms.date: 02/09/2024
1010

1111
# Access Control List Creation and Configuration Examples
1212

13-
## Overview of the ACL Create Flow
13+
This article gives examples of how to create and update Access Control Lists (ACLS).
14+
15+
## Overview of the ACL create flow
1416

1517
Creating an Access Control List (ACL) associated with a Network-to-Network Interconnect (NNI) involves these steps:
1618

@@ -22,7 +24,7 @@ Creating an Access Control List (ACL) associated with a Network-to-Network Inter
2224

2325
- Provision the Network Fabric resource using the `az networkfabric fabric provision` command. This generates the base configuration and the dynamic match configuration for the ACLs and sends them to the devices.
2426

25-
## Overview of the ACL Update Flow
27+
## Overview of the ACL update flow
2628

2729
- Create ingress and egress ACL resources using `az networkfabric acl create` as described in the previous section.
2830

@@ -42,7 +44,7 @@ This example shows you how to create an NNI with two ACLs - one for ingress and
4244

4345
The ACLs must be applied before provisioning the Network Fabric. This limitation is temporary and will be removed in future release. The ingress and egress ACLs are created before the NNI resource and referenced when the NNI is created, which also triggers the creation of the ACLs. This configuration must be done before provisioning the network fabric.
4446

45-
#### Create Ingress ACL: Example Command
47+
#### Create ingress ACL: example command
4648

4749
```azurecli
4850
az networkfabric acl create \
@@ -55,7 +57,7 @@ az networkfabric acl create \
5557
--match-configurations "[{matchConfigurationName:'example-match',sequenceNumber:123,ipAddressType:IPv4,matchConditions:[{etherTypes:['0x1'],fragments:['0xff00-0xffff'],ipLengths:['4094-9214'],ttlValues:[23],dscpMarkings:[32],portCondition:{flags:[established],portType:SourcePort,layer4Protocol:TCP,ports:['1-20']},protocolTypes:[TCP],vlanMatchCondition:{vlans:['20-30'],innerVlans:[30]},ipCondition:{type:SourceIP,prefixType:Prefix,ipPrefixValues:['10.20.20.20/12']}}],actions:[{type:Count,counterName:'example-counter'}]}]"
5658
```
5759

58-
#### Create Egress ACL: Example Command
60+
#### Create egress ACL: example command
5961

6062
```azurecli
6163
az networkfabric acl create \
@@ -68,7 +70,7 @@ az networkfabric acl create \
6870
--dynamic-match-configurations "[{ipGroups:[{name:'example-ipGroup',ipAddressType:IPv4,ipPrefixes:['10.20.3.1/20']}],vlanGroups:[{name:'example-vlanGroup',vlans:['20-30']}],portGroups:[{name:'example-portGroup',ports:['100-200']}]}]"
6971
```
7072

71-
### Access Control List on an Isolation Domain External Network
73+
### Access Control List on an isolation domain external network
7274

7375
Use the `az networkfabric acl create` command to create ingress and egress ACLs for the external network. In the example, we specify the resource group, name, location, network fabric ID, external network ID, and other parameters. You can also specify the match conditions and actions for the ACL rules using the `--match` and `--action` parameters.
7476

0 commit comments

Comments
 (0)