You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-nexus/howto-append-custom-suffix-to-interface-descriptions.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -136,7 +136,7 @@ AR-CE2(Fab3-AR-CE2):Et1/1 to CR1-TOR1(Fab3-CP1-TOR1)-Port23
136
136
137
137
## Network interface updates
138
138
139
-
Updates were made to the network interface of the network device to standardize the interface description. Also, these updates now link the interface to the Azure Resource Manager (ARM) resource ID of the connected interface for better management and tracking.
139
+
Updates were made to the network interface of the network device to standardize the interface description. Also, these updates now link the interface to the Azure Resource Manager resource ID of the connected interface for better management and tracking.
140
140
141
141
### Standardized interface descriptions
142
142
@@ -148,7 +148,7 @@ Interface descriptions follow a consistent format of the source device to the de
148
148
149
149
### connectedTo property
150
150
151
-
The `connectedTo` property returns the ARM resource ID of the connected interface, where available.
151
+
The `connectedTo` property returns the Azure Resource Manager resource ID of the connected interface, where available.
152
152
153
153
### Comparison of old and new values
154
154
@@ -161,11 +161,11 @@ The `connectedTo` property returns the ARM resource ID of the connected interfac
161
161
162
162
All the preceding features are available for the following interface types:
163
163
164
-
- Agg Rack CE
165
-
- Agg Rack Management
166
-
- Comp Rack TOR
167
-
- Comp Rack Management
168
-
- Network Packet Broker device
164
+
- Agg Rack customer edge
165
+
- Agg Rack management
166
+
- Comp Rack top of rack
167
+
- Comp Rack management
168
+
- Network packet broker device
169
169
170
170
> [!NOTE]
171
-
> For devices that Azure Operator Nexus Network Fabric doesn't manage, such as personal electronics or storage devices, the `connectedTo` property continues to reflect the value as a`string` with no active link.
171
+
> For devices that Azure Operator Nexus Network Fabric doesn't manage, such as provider edge or storage devices, the `connectedTo` property continues to reflect the value as `string` with no active link.
description: Learn how to apply Access Control Lists (ACLs) to network-to-network interconnects (NNI) within Azure Nexus Network Fabric.
2
+
title: 'Azure Operator Nexus: Apply ACLs to Network-to-Network Interconnects'
3
+
description: Learn how to apply access control lists (ACLs) to network-to-network interconnects (NNIs) within Azure Operator Nexus Network Fabric.
4
4
author: sushantjrao
5
5
ms.author: sushrao
6
6
ms.service: azure-operator-nexus
@@ -9,69 +9,68 @@ ms.date: 04/23/2024
9
9
ms.custom: template-how-to, devx-track-azurecli
10
10
---
11
11
12
-
# Access Control List (ACL) Management for NNI
12
+
# Access control list (ACL) management for NNI
13
13
14
-
In Azure Nexus Network Fabric, maintaining network security is paramount for ensuring a robust and secure infrastructure. Access Control Lists (ACLs) are crucial tools for enforcing network security policies. This guide leads you through the process of applying ACLs to network-to-network interconnects (NNI) within the Nexus Network Fabric.
14
+
In Azure Operator Nexus Network Fabric, maintaining network security is paramount for ensuring a robust and secure infrastructure. Access control lists (ACLs) are crucial tools for enforcing network security policies. This article leads you through the process of applying ACLs to network-to-network interconnects (NNIs) within Azure Operator Nexus Network Fabric.
15
15
16
-
## Applying Access Control Lists (ACLs) to NNI in Azure Fabric
16
+
## Apply ACLs to NNIs in Azure Operator Nexus Network Fabric
17
17
18
-
To maintain network security and regulate traffic flow within your Azure Fabric network, applying Access Control Lists (ACLs) to network-to-network interconnects (NNI) is essential. This guide delineates the steps for effectively applying ACLs to NNIs.
18
+
To maintain network security and regulate traffic flow within your Azure Operator Nexus Network Fabric network, applying ACLs to NNIs is essential. This article delineates the steps for effectively applying ACLs to NNIs.
19
19
20
-
#### Applying ACLs to NNI
20
+
#### Apply ACLs to NNIs
21
21
22
-
Before applying ACLs to NNIs, utilize the following commands to view ACL details.
22
+
Before you apply ACLs to NNIs, use the following commands to view ACL details.
23
23
24
-
#### Viewing ACL details
24
+
#### View ACL details
25
25
26
-
To view the specifics of a particular ACL, execute the following command:
26
+
To view the specifics of a particular ACL, run the following command:
27
27
28
28
```azurecli
29
29
az networkfabric acl show --name "<acl-ingress-name>" --resource-group "<resource-group-name>"
30
30
```
31
31
32
32
This command furnishes detailed information regarding the ACL's configuration, administrative state, default action, and matching conditions.
33
33
34
-
#### Listing ACLs in a resource group
34
+
#### List ACLs in a resource group
35
35
36
-
To list all ACLs within a resource group, use the command:
36
+
To list all ACLs within a resource group, use the following command:
37
37
38
38
```azurecli
39
39
az networkfabric acl list --resource-group "<resource-group-name>"
40
40
```
41
41
42
42
This command presents a comprehensive list of ACLs along with their configuration states and other pertinent details.
43
43
44
-
#### Applying Ingress ACL to NNI
44
+
#### Apply an ingress ACL to an NNI
45
45
46
46
```azurecli
47
47
az networkfabric nni update --resource-group "<resource-group-name>" --resource-name "<nni-name>" --fabric "<fabric-name>" --ingress-acl-id "<ingress-acl-resource-id>"
| --ingress-acl-id, --egress-acl-id | To apply both ingress and egress ACLs simultaneously, create two new ACLs and include their respective resource IDs. |
72
+
|`--ingress-acl-id`, `--egress-acl-id`| To apply both ingress and egress ACLs simultaneously, create two new ACLs and include their respective resource IDs. |
73
73
74
+
## Related content
74
75
75
-
## Next steps
76
-
77
-
[Updating ACL on NNI or External Network](howto-update-access-control-list-for-network-to-network-interconnects.md)
76
+
[Update ACLs on NNIs or an external network](howto-update-access-control-list-for-network-to-network-interconnects.md)
Border Gateway Protocol (BGP) prefix limiting is an essential overload protection mechanism for customer edge (CE) devices. It helps prevent the Nexus fabric from being overwhelmed when a Nexus tenant advertises an excessive number of BGP routes into a Nexus virtual routing and forwarding (VRF) instance. This feature helps to ensure network stability and security by controlling the number of prefixes received from BGP peers.
14
+
Border Gateway Protocol (BGP) prefix limiting is an essential overload protection mechanism for customer edge (CE) devices. It helps prevent the Nexus fabric from being overwhelmed when a Nexus tenant advertises an excessive number of BGP routes into a Nexus virtual routing and forwarding (VRF) instance. This feature helps to ensure network stability and security by controlling the number of prefixes that are received from BGP peers.
15
15
16
16
## Configuration of BGP prefix limits
17
17
@@ -43,7 +43,7 @@ To configure the BGP prefix limit on CE devices for Azure Operator Nexus, follow
43
43
Configure the BGP prefix limits by using the parameters `maximumRoutes` and `threshold`:
44
44
45
45
-`maximumRoutes`: This parameter defines the maximum number of BGP prefixes that the router accepts from a BGP peer.
46
-
-`threshold`: This parameter defines the warning threshold as a percentage of the `maximumRoutes`. When the number of prefixes exceeds this threshold, a warning is generated.
46
+
-`threshold`: This parameter defines the warning threshold as a percentage of the `maximumRoutes` parameter. When the number of prefixes exceeds this threshold, a warning is generated.
47
47
48
48
#### Step 2: Configure on the CE device
49
49
@@ -61,7 +61,7 @@ This configuration automatically restarts the session after a defined idle time
61
61
}
62
62
```
63
63
64
-
-**Explanation**:
64
+
- Explanation:
65
65
66
66
-`maximumRoutes`: The limit for the BGP session is 5,000 routes.
67
67
-`threshold`: A warning is triggered when the prefix count reaches 80% (4,000 routes).
@@ -80,7 +80,7 @@ This configuration shuts down the session when the maximum prefix limit is reach
80
80
}
81
81
```
82
82
83
-
-**Explanation**:
83
+
- Explanation:
84
84
85
85
-`maximumRoutes`: The limit for the BGP session is 5,000 routes.
86
86
-`threshold`: A warning is triggered when the prefix count reaches 80% (4,000 routes).
@@ -98,7 +98,7 @@ This configuration drops extra routes if the prefix limit is exceeded without ma
98
98
}
99
99
```
100
100
101
-
-**Explanation**:
101
+
- Explanation:
102
102
103
103
-`maximumRoutes`: The limit for the BGP session is 5,000 routes.
104
104
- After the limit is reached, the CE device drops any extra prefixes received from the BGP peer.
@@ -117,7 +117,7 @@ This configuration generates a warning after the prefix count reaches a certain
117
117
}
118
118
```
119
119
120
-
-**Explanation**:
120
+
- Explanation:
121
121
122
122
-`maximumRoutes`: The limit for the BGP session is 8,000 routes.
123
123
-`threshold`: A warning is generated when the prefix count reaches 75% (6,000 routes).
@@ -127,25 +127,25 @@ This configuration generates a warning after the prefix count reaches a certain
127
127
128
128
You can use Azure CLI commands to apply the BGP prefix limits to the external network configuration for Nexus.
@@ -163,21 +163,21 @@ Look for the session states and the number of prefixes advertised by each peer.
163
163
164
164
### Considerations
165
165
166
-
-**Threshold and maximum limits**: Ensure that you set appropriate thresholds to avoid unnecessary session terminations while still protecting the network from overload.
167
-
-**Automatic versus manual restart**: Depending on your network operations, choose between automatic and manual restart options. Automatic restart is useful for minimizing manual intervention. Manual restart might give network administrators more control over recovery.
166
+
-**Threshold and maximum limits:** Ensure that you set appropriate thresholds to avoid unnecessary session terminations while still protecting the network from overload.
167
+
-**Automatic versus manual restart:** Depending on your network operations, choose between automatic and manual restart options. Automatic restart is useful for minimizing manual intervention. Manual restart might give network administrators more control over recovery.
168
168
169
169
## Handle BGP prefix limits for different networks
170
170
171
171
### Internal network
172
172
173
-
The platform supports Layer 3 Isolation Domain (`L3IsolationDomain`) for tenant workloads. It performs device programming on Nexus instances and Arista devices with peer groups for both IPv4 and IPv6 address families.
173
+
The platform supports layer 3 isolation domain (`L3IsolationDomain`) for tenant workloads. It performs device programming on Nexus instances and Arista devices with peer groups for both IPv4 and IPv6 address families.
174
174
175
-
### External network option B (PE)
175
+
### External network option B (provider edge)
176
176
177
-
For external network configuration, only the **hard-limit warning-only** option is supported. Nexus supports this configuration via the Azure Resource Manager API under `NNI optionBlayer3Configuration` with the `maximumRoutes` parameter.
177
+
For external network configuration, only the hard-limit `warning-only` option is supported. Nexus supports this configuration via the Azure Resource Manager API under `NNI optionBlayer3Configuration` with the `maximumRoutes` parameter.
178
178
179
179
### Network-to-network interface option A
180
180
181
-
For network-to-network interface option A, only a single peer group is allowed. IPv4 over IPv6 and vice versa aren't supported. Warning-only mode is available for handling prefix limits.
181
+
For network-to-network interface option A, only a single peer group is allowed. IPv4 over IPv6 and vice versa aren't supported. The `warning-only` mode is available for handling prefix limits.
182
182
183
183
By following the steps in this article, you can configure BGP prefix limits effectively to protect your network from overload. You can help to ensure that BGP sessions are properly managed for both internal and external networks.
0 commit comments