Skip to content

Commit cf1f81d

Browse files
authored
Update and rename howto-create-access-control-list-for-nni.md to howto-create-access-control-list-for-network-to-network-interconnects.md
fixed the issues as requested by the last PR review
1 parent f0abbc6 commit cf1f81d

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

articles/operator-nexus/howto-create-access-control-list-for-nni.md renamed to articles/operator-nexus/howto-create-access-control-list-for-network-to-network-interconnects.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -21,17 +21,17 @@ To create an ACL and define its properties, you can utilize the `az networkfabri
2121

2222
1. **Set subscription (if necessary):**
2323

24-
If you have multiple subscriptions and need to set one as the default, you can do so with:
24+
If you have multiple subscriptions and need to set one as the default, you can do so with:
2525

26-
```bash
27-
az account set --subscription <subscription-id>
28-
```
26+
```bash
27+
az account set --subscription <subscription-id>
28+
```
2929

3030
2. **Create ACL:**
3131

32-
```bash
32+
```bash
3333
az networkfabric acl create --resource-group "<resource-group>" --location "<location>" --resource-name "<acl-name>" --annotation "<annotation>" --configuration-type "<configuration-type>" --default-action "<default-action>" --match-configurations "[{matchConfigurationName:<match-config-name>,sequenceNumber:<sequence-number>,ipAddressType:<IPv4/IPv6>,matchConditions:[{ipCondition:{type:<SourceIP/DestinationIP>,prefixType:<Prefix/Exact>,ipPrefixValues:['<ip-prefix1>', '<ip-prefix2>', ...]}}],actions:[{type:<Action>}]}]"
34-
```
34+
```
3535

3636
| Parameter | Description |
3737
|----------------------|----------------------------------------------------------------------|
@@ -70,12 +70,12 @@ The table below provides guidance on the usage of parameters when creating ACLs:
7070
| configuration-type | Configuration type (inline or file) | Example: inline |
7171

7272
> [!NOTE]
73-
> Inline ports and inline VLANs are statically defined using azcli.<br>
74-
> PortGroupNames and VlanGroupNames are dynamically defined.<br>
75-
> Combining inline ports with portGroupNames is not allowed, similarly for inline VLANs and VLANGroupNames.<br>
76-
> IPGroupNames and IpPrefixValues cannot be combined.<br>
77-
> Egress ACLs do not support certain options like IP options, IP length, fragment, ether-type, DSCP marking, and TTL values.<br>
78-
> Ingress ACLs do not support the following options: etherType.<br>
73+
> - Inline ports and inline VLANs are statically defined using azcli.<br>
74+
> - PortGroupNames and VlanGroupNames are dynamically defined.<br>
75+
> - Combining inline ports with portGroupNames is not allowed, similarly for inline VLANs and VLANGroupNames.<br>
76+
> - IPGroupNames and IpPrefixValues cannot be combined.<br>
77+
> - Egress ACLs do not support certain options like IP options, IP length, fragment, ether-type, DSCP marking, and TTL values.<br>
78+
> - Ingress ACLs do not support the following options: etherType.<br>
7979
8080
### Example payload for ACL creation
8181

0 commit comments

Comments
 (0)