Skip to content

Commit d09083a

Browse files
committed
edit pass: network-fabric-articles
1 parent 64b0816 commit d09083a

6 files changed

+172
-191
lines changed

articles/operator-nexus/howto-append-custom-suffix-to-interface-descriptions.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ AR-CE2(Fab3-AR-CE2):Et1/1 to CR1-TOR1(Fab3-CP1-TOR1)-Port23
136136

137137
## Network interface updates
138138

139-
Updates were made to the network interface of the network device to standardize the interface description. Also, these updates now link the interface to the Azure Resource Manager (ARM) resource ID of the connected interface for better management and tracking.
139+
Updates were made to the network interface of the network device to standardize the interface description. Also, these updates now link the interface to the Azure Resource Manager resource ID of the connected interface for better management and tracking.
140140

141141
### Standardized interface descriptions
142142

@@ -148,7 +148,7 @@ Interface descriptions follow a consistent format of the source device to the de
148148

149149
### connectedTo property
150150

151-
The `connectedTo` property returns the ARM resource ID of the connected interface, where available.
151+
The `connectedTo` property returns the Azure Resource Manager resource ID of the connected interface, where available.
152152

153153
### Comparison of old and new values
154154

@@ -161,11 +161,11 @@ The `connectedTo` property returns the ARM resource ID of the connected interfac
161161

162162
All the preceding features are available for the following interface types:
163163

164-
- Agg Rack CE
165-
- Agg Rack Management
166-
- Comp Rack TOR
167-
- Comp Rack Management
168-
- Network Packet Broker device
164+
- Agg Rack customer edge
165+
- Agg Rack management
166+
- Comp Rack top of rack
167+
- Comp Rack management
168+
- Network packet broker device
169169

170170
> [!NOTE]
171-
> For devices that Azure Operator Nexus Network Fabric doesn't manage, such as personal electronics or storage devices, the `connectedTo` property continues to reflect the value as a `string` with no active link.
171+
> For devices that Azure Operator Nexus Network Fabric doesn't manage, such as provider edge or storage devices, the `connectedTo` property continues to reflect the value as `string` with no active link.
Lines changed: 20 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Azure Operator Nexus - Applying ACLs to Network-to-Network Interconnects (NNI)
3-
description: Learn how to apply Access Control Lists (ACLs) to network-to-network interconnects (NNI) within Azure Nexus Network Fabric.
2+
title: 'Azure Operator Nexus: Apply ACLs to Network-to-Network Interconnects'
3+
description: Learn how to apply access control lists (ACLs) to network-to-network interconnects (NNIs) within Azure Operator Nexus Network Fabric.
44
author: sushantjrao
55
ms.author: sushrao
66
ms.service: azure-operator-nexus
@@ -9,69 +9,68 @@ ms.date: 04/23/2024
99
ms.custom: template-how-to, devx-track-azurecli
1010
---
1111

12-
# Access Control List (ACL) Management for NNI
12+
# Access control list (ACL) management for NNI
1313

14-
In Azure Nexus Network Fabric, maintaining network security is paramount for ensuring a robust and secure infrastructure. Access Control Lists (ACLs) are crucial tools for enforcing network security policies. This guide leads you through the process of applying ACLs to network-to-network interconnects (NNI) within the Nexus Network Fabric.
14+
In Azure Operator Nexus Network Fabric, maintaining network security is paramount for ensuring a robust and secure infrastructure. Access control lists (ACLs) are crucial tools for enforcing network security policies. This article leads you through the process of applying ACLs to network-to-network interconnects (NNIs) within Azure Operator Nexus Network Fabric.
1515

16-
## Applying Access Control Lists (ACLs) to NNI in Azure Fabric
16+
## Apply ACLs to NNIs in Azure Operator Nexus Network Fabric
1717

18-
To maintain network security and regulate traffic flow within your Azure Fabric network, applying Access Control Lists (ACLs) to network-to-network interconnects (NNI) is essential. This guide delineates the steps for effectively applying ACLs to NNIs.
18+
To maintain network security and regulate traffic flow within your Azure Operator Nexus Network Fabric network, applying ACLs to NNIs is essential. This article delineates the steps for effectively applying ACLs to NNIs.
1919

20-
#### Applying ACLs to NNI
20+
#### Apply ACLs to NNIs
2121

22-
Before applying ACLs to NNIs, utilize the following commands to view ACL details.
22+
Before you apply ACLs to NNIs, use the following commands to view ACL details.
2323

24-
#### Viewing ACL details
24+
#### View ACL details
2525

26-
To view the specifics of a particular ACL, execute the following command:
26+
To view the specifics of a particular ACL, run the following command:
2727

2828
```azurecli
2929
az networkfabric acl show --name "<acl-ingress-name>" --resource-group "<resource-group-name>"
3030
```
3131

3232
This command furnishes detailed information regarding the ACL's configuration, administrative state, default action, and matching conditions.
3333

34-
#### Listing ACLs in a resource group
34+
#### List ACLs in a resource group
3535

36-
To list all ACLs within a resource group, use the command:
36+
To list all ACLs within a resource group, use the following command:
3737

3838
```azurecli
3939
az networkfabric acl list --resource-group "<resource-group-name>"
4040
```
4141

4242
This command presents a comprehensive list of ACLs along with their configuration states and other pertinent details.
4343

44-
#### Applying Ingress ACL to NNI
44+
#### Apply an ingress ACL to an NNI
4545

4646
```azurecli
4747
az networkfabric nni update --resource-group "<resource-group-name>" --resource-name "<nni-name>" --fabric "<fabric-name>" --ingress-acl-id "<ingress-acl-resource-id>"
4848
```
4949

5050
| Parameter | Description |
5151
|-------------------|--------------------------------------------------|
52-
| --ingress-acl-id | Apply the ACL as ingress by specifying its resource ID. |
52+
| `--ingress-acl-id` | Apply the ACL as ingress by specifying its resource ID. |
5353

54-
#### Applying Egress ACL to NNI
54+
#### Apply an egress ACL to an NNI
5555

5656
```azurecli
5757
az networkfabric nni update --resource-group "example-rg" --resource-name "<nni-name>" --fabric "<fabric-name>" --egress-acl-id "<egress-acl-resource-id>"
5858
```
5959

6060
| Parameter | Description |
6161
|------------------|------------------------------------------------|
62-
| --egress-acl-id | Apply the ACL as egress by specifying its resource ID. |
62+
|`--egress-acl-id` | Apply the ACL as egress by specifying its resource ID. |
6363

64-
#### Applying Ingress and Egress ACLs to NNI:
64+
#### Apply ingress and egress ACLs to NNIs
6565

6666
```azurecli
6767
az networkfabric nni update --resource-group "example-rg" --resource-name "<nni-name>" --fabric "<fabric-name>" --ingress-acl-id "<ingress-acl-resource-id>" --egress-acl-id ""<egress-acl-resource-id>""
6868
```
6969

7070
| Parameter | Description |
7171
|-------------------|----------------------------------------------------------------------------------------------------------------|
72-
| --ingress-acl-id, --egress-acl-id | To apply both ingress and egress ACLs simultaneously, create two new ACLs and include their respective resource IDs. |
72+
| `--ingress-acl-id`, `--egress-acl-id` | To apply both ingress and egress ACLs simultaneously, create two new ACLs and include their respective resource IDs. |
7373

74+
## Related content
7475

75-
## Next steps
76-
77-
[Updating ACL on NNI or External Network](howto-update-access-control-list-for-network-to-network-interconnects.md)
76+
[Update ACLs on NNIs or an external network](howto-update-access-control-list-for-network-to-network-interconnects.md)

articles/operator-nexus/howto-configure-bgp-prefix-limit-on-customer-edge-devices.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ ms.custom: template-how-to, devx-track-azurecli
1111

1212
# BGP prefix limiting overview
1313

14-
Border Gateway Protocol (BGP) prefix limiting is an essential overload protection mechanism for customer edge (CE) devices. It helps prevent the Nexus fabric from being overwhelmed when a Nexus tenant advertises an excessive number of BGP routes into a Nexus virtual routing and forwarding (VRF) instance. This feature helps to ensure network stability and security by controlling the number of prefixes received from BGP peers.
14+
Border Gateway Protocol (BGP) prefix limiting is an essential overload protection mechanism for customer edge (CE) devices. It helps prevent the Nexus fabric from being overwhelmed when a Nexus tenant advertises an excessive number of BGP routes into a Nexus virtual routing and forwarding (VRF) instance. This feature helps to ensure network stability and security by controlling the number of prefixes that are received from BGP peers.
1515

1616
## Configuration of BGP prefix limits
1717

@@ -43,7 +43,7 @@ To configure the BGP prefix limit on CE devices for Azure Operator Nexus, follow
4343
Configure the BGP prefix limits by using the parameters `maximumRoutes` and `threshold`:
4444

4545
- `maximumRoutes`: This parameter defines the maximum number of BGP prefixes that the router accepts from a BGP peer.
46-
- `threshold`: This parameter defines the warning threshold as a percentage of the `maximumRoutes`. When the number of prefixes exceeds this threshold, a warning is generated.
46+
- `threshold`: This parameter defines the warning threshold as a percentage of the `maximumRoutes` parameter. When the number of prefixes exceeds this threshold, a warning is generated.
4747

4848
#### Step 2: Configure on the CE device
4949

@@ -61,7 +61,7 @@ This configuration automatically restarts the session after a defined idle time
6161
}
6262
```
6363

64-
- **Explanation**:
64+
- Explanation:
6565

6666
- `maximumRoutes`: The limit for the BGP session is 5,000 routes.
6767
- `threshold`: A warning is triggered when the prefix count reaches 80% (4,000 routes).
@@ -80,7 +80,7 @@ This configuration shuts down the session when the maximum prefix limit is reach
8080
}
8181
```
8282

83-
- **Explanation**:
83+
- Explanation:
8484

8585
- `maximumRoutes`: The limit for the BGP session is 5,000 routes.
8686
- `threshold`: A warning is triggered when the prefix count reaches 80% (4,000 routes).
@@ -98,7 +98,7 @@ This configuration drops extra routes if the prefix limit is exceeded without ma
9898
}
9999
```
100100

101-
- **Explanation**:
101+
- Explanation:
102102

103103
- `maximumRoutes`: The limit for the BGP session is 5,000 routes.
104104
- After the limit is reached, the CE device drops any extra prefixes received from the BGP peer.
@@ -117,7 +117,7 @@ This configuration generates a warning after the prefix count reaches a certain
117117
}
118118
```
119119

120-
- **Explanation**:
120+
- Explanation:
121121

122122
- `maximumRoutes`: The limit for the BGP session is 8,000 routes.
123123
- `threshold`: A warning is generated when the prefix count reaches 75% (6,000 routes).
@@ -127,25 +127,25 @@ This configuration generates a warning after the prefix count reaches a certain
127127

128128
You can use Azure CLI commands to apply the BGP prefix limits to the external network configuration for Nexus.
129129

130-
- **With automatic restart**:
130+
- With automatic restart:
131131

132132
```bash
133133
az networkfabric externalnetwork create --resource-group <resource-group> --fabric-name <fabric-name> --network-name <network-name> --prefix-limits '{"maximumRoutes": 5000, "threshold": 80, "idleTimeExpiry": 100}'
134134
```
135135

136-
- **Without automatic restart**:
136+
- Without automatic restart:
137137

138138
```bash
139139
az networkfabric externalnetwork create --resource-group <resource-group> --fabric-name <fabric-name> --network-name <network-name> --prefix-limits '{"maximumRoutes": 5000, "threshold": 80}'
140140
```
141141

142-
- **Hard-limit drop BGP sessions**:
142+
- Hard-limit drop BGP sessions:
143143

144144
```bash
145145
az networkfabric externalnetwork create --resource-group <resource-group> --fabric-name <fabric-name> --network-name <network-name> --prefix-limits '{"maximumRoutes": 5000}'
146146
```
147147

148-
- **Hard-limit warning only**:
148+
- Hard-limit warning only:
149149

150150
```bash
151151
az networkfabric externalnetwork create --resource-group <resource-group> --fabric-name <fabric-name> --network-name <network-name> --prefix-limits '{"maximumRoutes": 8000, "threshold": 75, "warning-only": true}'
@@ -163,21 +163,21 @@ Look for the session states and the number of prefixes advertised by each peer.
163163

164164
### Considerations
165165

166-
- **Threshold and maximum limits**: Ensure that you set appropriate thresholds to avoid unnecessary session terminations while still protecting the network from overload.
167-
- **Automatic versus manual restart**: Depending on your network operations, choose between automatic and manual restart options. Automatic restart is useful for minimizing manual intervention. Manual restart might give network administrators more control over recovery.
166+
- **Threshold and maximum limits:** Ensure that you set appropriate thresholds to avoid unnecessary session terminations while still protecting the network from overload.
167+
- **Automatic versus manual restart:** Depending on your network operations, choose between automatic and manual restart options. Automatic restart is useful for minimizing manual intervention. Manual restart might give network administrators more control over recovery.
168168

169169
## Handle BGP prefix limits for different networks
170170

171171
### Internal network
172172

173-
The platform supports Layer 3 Isolation Domain (`L3IsolationDomain`) for tenant workloads. It performs device programming on Nexus instances and Arista devices with peer groups for both IPv4 and IPv6 address families.
173+
The platform supports layer 3 isolation domain (`L3IsolationDomain`) for tenant workloads. It performs device programming on Nexus instances and Arista devices with peer groups for both IPv4 and IPv6 address families.
174174

175-
### External network option B (PE)
175+
### External network option B (provider edge)
176176

177-
For external network configuration, only the **hard-limit warning-only** option is supported. Nexus supports this configuration via the Azure Resource Manager API under `NNI optionBlayer3Configuration` with the `maximumRoutes` parameter.
177+
For external network configuration, only the hard-limit `warning-only` option is supported. Nexus supports this configuration via the Azure Resource Manager API under `NNI optionBlayer3Configuration` with the `maximumRoutes` parameter.
178178

179179
### Network-to-network interface option A
180180

181-
For network-to-network interface option A, only a single peer group is allowed. IPv4 over IPv6 and vice versa aren't supported. Warning-only mode is available for handling prefix limits.
181+
For network-to-network interface option A, only a single peer group is allowed. IPv4 over IPv6 and vice versa aren't supported. The `warning-only` mode is available for handling prefix limits.
182182

183183
By following the steps in this article, you can configure BGP prefix limits effectively to protect your network from overload. You can help to ensure that BGP sessions are properly managed for both internal and external networks.

0 commit comments

Comments
 (0)