You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Azure Operator Nexus's Network Packet Broker is a specialized offering from Microsoft Azure tailored for telecommunication service providers. With Azure Operator Nexus's Network Packet Broker, telecom operators can efficiently capture, aggregate, filter, and monitor traffic across their infrastructure (AON), allowing for deep packet inspection, traffic analysis, and enhanced network monitoring. This is particularly crucial in the telecommunications industry, where maintaining high-quality service, ensuring security, and complying with regulatory requirements are paramount. By leveraging this solution, operators can achieve better visibility into their network traffic, troubleshoot issues more effectively, and ultimately deliver improved services to their customers while maintaining the highest standards of network security and performance.
13
+
Azure Operator Nexus's Network Packet Broker is a specialized offering from Microsoft Azure tailored for telecommunication service providers. With Azure Operator Nexus's Network Packet Broker, telecom operators can efficiently capture, aggregate, filter, and monitor traffic across their infrastructure (AON), allowing for deep packet inspection, traffic analysis, and enhanced network monitoring. This is crucial in the telecommunications industry, where maintaining high-quality service, ensuring security, and complying with regulatory requirements are paramount. By applying this solution, operators can achieve better visibility into their network traffic, troubleshoot issues more effectively, and ultimately deliver improved services to their customers while maintaining the highest standards of network security and performance.
14
14
15
-
The NPB has been designed and modeled as a separate toplevel Azure Resource Manager (ARM) resource under Microsoft.managednetworkfabric. Operators can Create, Read, Update and Delete Network TAP, Network TAP rule and Neighbor Group functions. Each network packet broker will have multiple resources such as Network TAP, Neighbor Group, & Network TAP Rules to manage, filter and forward designated traffic.
15
+
The Network Packet Broker (NPB) is designed and modeled as a separate top-level Azure Resource Manager (ARM) resource under Microsoft.managednetworkfabric. Operators can Create, Read, Update and Delete Network TAP, Network TAP rule and Neighbor Group functions. Each network packet broker has multiple resources such as Network TAP, Neighbor Group, & Network TAP Rules to manage, filter and forward designated traffic.
16
16
17
17
## Steps to Enable Network Packet Broker
18
18
19
19
**Prerequisites**
20
20
21
21
- NPB devices are correctly racked, stacked, and provisioned. For Procedure on how to provision the network fabric, see [Network Fabric Provisioning](./howto-configure-network-fabric.md).
22
22
- Respective vProbes should be set up with dedicated IPs
23
-
- For internal vProbes, Layer 3 Isolation domains with internal networks should be created. Required connected subnets should be configured, in addition to it, the extension flag should be set to NPB (in internal networks). For Procedure on how to create internal and external networks on an Isolation Domain and set extension flag for NPB, see [Isolation Domains](./howto-configure-isolation-domain.md).
23
+
- For internal vProbes, Layer 3 Isolation domains with internal networks should be created. Required connected subnets should be configured, in addition, the extension flag should be set to NPB (in internal networks). For Procedure on how to create internal and external networks on an Isolation Domain and set extension flag for NPB, see [Isolation Domains](./howto-configure-isolation-domain.md).
24
24
- For the Network to Network Inter-connect (NNI) use case, NNI should be created as type `NPB`. Appropriate layer 2 and layer 3 properties should be defined during the creation of NNI. For Procedure on how to create the network to network interconnect (NNI), see [Network Fabric Provisioning](./howto-configure-network-fabric.md).
25
25
26
26
**Steps**
@@ -29,7 +29,7 @@ The NPB has been designed and modeled as a separate top level Azure Resource Man
29
29
1. Create a Network TAP resource referencing the Tap rules and Neighbor Groups.
30
30
1. Enable the Network TAP resource.
31
31
### NPB
32
-
This resource would be auto-created by NNF during bootstrap.
32
+
NNF would auto-create this resource during bootstrap..
33
33
### Show NPB
34
34
This command shows the details of NPB logical resource.
35
35
```azurecli
@@ -77,9 +77,9 @@ NetworkTapRule resource provides ability for providing filtering and forwarding
77
77
| Parameter | Description | Example | Required |
78
78
|-----------|-------------|---------|----------|
79
79
| resource-group | Use an appropriate resource group name specifically for your NetworkTapRule | ResourceGroupName |True |
80
-
| resource-name | Resource Name of the Network Tap | InternetTAPrule1 |True |
81
-
| location | AzON Azure Region used during NFC Creation | eastus |True |
82
-
| configuration-type | Input method to configure Network Tap Rule. | Inline or File|True |
80
+
| resource-name | Resource Names of the Network Tap | InternetTAPrule1 |True |
81
+
| location | AzON Azure Region used during Network Fabric Controller (NFC) Creation | eastus |True |
82
+
| configuration-type | Input methods to configure Network Tap Rule. | Inline or File|True |
83
83
| match-configurations |List of match configurations.|||
84
84
| match-configurations/matchconfigurationName|Name of Match configuration block |||
85
85
| match-configurations/sequenceNumber|Sequence number of Match configuration |||
@@ -353,7 +353,7 @@ Neighbor Group resource has the ability to group destinations for forwarding the
353
353
| Parameter | Description | Example | Required |
354
354
|-----------|-------------|---------|----------|
355
355
| resource-group | Use an appropriate resource group name specifically for your NeighborGroup | ResourceGroupName |True |
356
-
| resource-name | Resource Name of the NeighborGroup | example-Neighbor |True |
356
+
| resource-name | Resource Names of the NeighborGroup | example-Neighbor |True |
357
357
| location | AzON Azure Region used during NFC Creation | eastus |True |
358
358
| destination |List of Ipv4 or Ipv6 destinations to forward traffic | 10.10.10.10|True |
359
359
### Create Neighbor group
@@ -448,6 +448,24 @@ Network TAP allows Operators to define destinations and encapsulation mechanism
448
448
| destination/type| type of destination.IsolationDomain or NNI |||
449
449
| destination/IsolationDomainProperties| Details of Isolation domain. Encapsulation, Neighbor group IDs | Azure Resource Manager (ARM) ID of internal network or NNI |False|
450
450
| destinationTapRuleId| ARMID of the Tap rule, which needs to be applied ||True |
451
+
452
+
> [!NOTE]
453
+
> Network Tap rules and Neighbor Groups must be created prior to refrencing them in Network Tap
454
+
455
+
### NetworkTAP device programming naming conventions/ best practices:
456
+
457
+
It's essential to ensure that the configurations and values within these fieldset names (vlanGroupNames, ipGroupNames, PortGroupNames) are correctly defined and do not conflict with each other.
458
+
459
+
-**Recommendations:**
460
+
461
+
-**Unique Field-Set Names:** The field-set names across NetworkTAPRules must be unique if the field-set contents are distinct.
462
+
463
+
-**Unique Resource Names:** The NetworkTAP and NetworkTAPRule resource names must be unique across resource groups within the Fabric.
464
+
465
+
-**Regional Resource Creation:** The NetworkTAP and NetworkTAPRule resources must be created within the Region and associated with the respective Fabric within the Region.
466
+
467
+
-**Destination Name Modification:** The destination name is unique for a defined network tap rule destination configuration. Destination name can't be modified once the network tap configuration is pushed to the device.
0 commit comments