Implementing ACI
Implementing ACI
Implementing ACI
+ Course Topics
+ Implementing ACI Fabric & Access Policies
+ Implementing ACI Tenant Policies
+ Implementing Contracts
+ Implementing Taboo Contracts
+ Implementing the VZAny EPG
+ Implementing Preferred Group Members
+ Implementing VRF Policy Enforcement
+ Implementing Layer 2 Out
+ Implementing Layer 3 Out
+ ACI and VMware Integration
+ Service Graphs Overview
+ Implementing Service Graphs in Unmanaged Mode
+ Implementing Service Graphs in Managed Mode
Implementing Cisco
Application Centric Infrastructure
Introduction
CCIEx4 #8593 & CCDE #2013::13
Course Overview
+ Course Topics
+ Implementing ACI Fabric & Access Policies
+ Implementing ACI Tenant Policies
+ Implementing Contracts
+ Implementing Taboo Contracts
+ Implementing the VZAny EPG
+ Implementing Preferred Group Members
+ Implementing VRF Policy Enforcement
+ Implementing Layer 2 Out
+ Implementing Layer 3 Out
+ ACI and VMware Integration
+ Service Graphs Overview
+ Implementing Service Graphs in Unmanaged Mode
+ Implementing Service Graphs in Managed Mode
Implementing Cisco
Application Centric Infrastructure
ACI Topology & Hardware Overview
What is ACI?
C220 M4
Ten0 Ten1
N9K
APIC M2 E101/1/1 E102/1/1 Spine1
N2K1 N2K2
Ten1 E1/1
Ten0 E1/2
E1/44 - 47 E1/44 - 47
E1/7 E1/7 E1/15 E1/15 E1/23 E1/32 E1/40 E1/40 E1/48 E1/48
E1/24 E1/31
E1/8 E1/8 E1/16 E1/16 E1/24 E1/31 E1/39 E1/39 E1/47 E1/47
E1/23 E1/32
N7K1 N7K2 N7K3 N7K4 N7K5 N7K6 N7K7 N7K8 N7K9 N7K10 N7K11 N7K12
Implementing Cisco
Application Centric Infrastructure
ACI Initialization & Fabric Discovery
Initializing the ACI Fabric
spine1# setup-clean-config.sh
In progress
In progress
In progress
In progress
Done
spine1# reload
This command will reload the chassis, Proceed (y/n)? [n]: y
How Fabric Discovery Works
+ System
+ Reports, e.g. “faults” and “health scores”
+ Tenants
+ Tenant is a container for policies
+ Most operations work is done here
+ VRFs, Bridge Domains, Subnets, Endpoint Groups, Contracts
+ Fabric
+ Physical connectivity, Inventory, vPCs, Port Channels, Routing, VLANs, etc.
+ Fabric Policies means uplinks from Leafs to Spines (i.e. the underlay)
+ Access Policies means downlinks from Leafs to endpoints (e.g. access ports)
Navigating the APIC GUI
+ Virtual Networking
+ VMware, Hyper-V, KVM, etc. integration
+ L4 – L7 Services
+ Plugins for firewalls, load balancers, etc.
+ Called Service Graphs
+ Admin
+ AAA, firmware, config rollback/import/export, etc.
+ Operations
+ Troubleshooting tools
+ Apps
+ Apps the APIC can run on box
+ Integrations
+ APIC integration with UCSM
Viewing the Topology from GUI
apic1# bash
admin@apic1:~> show fabric membership
clients:
serial-number node-id node-name model role ip decommissioned
supported-model
------------- ------- --------- ------------- ----- -------------- ------------- -------
SAL2024RRMD 101 leaf1 N9K-C9372PX-E leaf 10.0.184.95/32 no yes
SAL2024RRQC 102 leaf2 N9K-C9372PX-E leaf 10.0.184.93/32 no yes
SAL2022R22Y 201 spine1 N9K-C9336PQ spine 10.0.184.94/32 no yes
Connecting to Nodes from CLI
apic1# bash
admin@apic1:~> attach leaf1
# Executing command: ssh leaf1
Password:
Last login: Fri Aug 5 00:01:26 2016 from 10.0.0.1
Cisco Nexus Operating System (NX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (c) 2002-2016, Cisco Systems, Inc. All rights reserved.
<snip>
http://www.opensource.org/licenses/gpl-2.0.php and
http://www.opensource.org/licenses/lgpl-2.1.php
leaf1#
Verifying Underlay Routing from CLI
+ The Cisco ACI Policy Model Guide defines how APICs store an object
hierarchy called the Management Information Model (MIM)
+ The MIM forms a hierarchical Management Information Tree (MIT) called
the Policy Universe
+ Policy Universe contains all the objects that we can modify through CLI, GUI,
or APIs
The ACI Policy Universe Object Hierarchy Visualized
The ACI Policy Universe
+ APIC controllers
+ An APIC cluster is typically 3 controllers providing management and monitoring of
the ACI fabric
+ Tenants
+ Container for policies that allows for access control and configuration fault
isolation
+ Fabric policies
+ Fabric policies apply at switch or pod level to control protocols running on the Leaf
to Spine Fabric ports, such as NTP, IS-IS, BGP, and DNS
+ Access policies
+ Access policies apply to the southbound facing Leaf ports, and control protocols
such as CDP, LLDP, & LACP. Access policies also control what type of device
connects to the leaf, such as a server, switch, router, or appliance
The ACI Policy Universe
+ Virtual networking
+ ACI integrations with hypervisor or container environments, referred to as
VMM domains
+ Layer 4 to Layer 7 Services
+ APIC can push configurations to services such as firewalls and load
balancers and selectively steer traffic L4–L7 appliances, referred to as a
Service Graph
+ Authentication, authorization, and accounting (AAA)
+ AAA for user privileges, Role Based Access Control (RBAC), and security
domains allow for multitenancy in ACI
Tenant Object Hierarchy Visualized
Tenant Objects
+ Outside Network
+ Connection to a router or legacy switch
+ Application Profile
+ Container for Endpoint Groups (EPGs)
+ Endpoint Group
+ Logical construct where policy enforcement occurs
+ Objects within the same EPG can talk to each other by default
+ Objects in different EPGs cannot talk to each other by default
+ Typically defines the application
+ E.g. EPG “WEB_SERVERS”
Tenant Objects
+ Bridge Domain
+ The Layer 2 forwarding construct
+ Behaves effectively like a VLAN, but technically not a VLAN
+ Think of a bridge domain as a broadcast domain
+ Subnet
+ Subnet is the distributed Anycast Layer 3 gateway
+ I.e. the default gateway for your servers
+ Subnet exists on all Leafs that its Bridge Domain and an EPG are deployed
+ VRF
+ Virtual Routing and Forwarding Instance
+ Same as in regular NX-OS and IOS
+ Previously called a Private Network
+ By default, no communication between VRFs
Tenant Objects
+ Contract
+ A Contract is the traffic policy between EPGs
+ E.g. allow access from EPG WEB_CLIENTS to EPG WEB_SERVERS at
TCP Port 80 and 443
+ Contracts have Providers and Consumers
+ Provider offers the service
+ E.g. the web server
+ Consumer uses the service
+ E.g. the web client
+ Provider/Consumer effectively defines the traffic flow direction of the policy
+ Subject
+ Subject is the container for Filters, like an ACL
+ Filter
+ An Access List entry
Access Policies Object Hierarchy Visualized
+ Domain
+ The link between Tenant Policies and Access Policies
+ Binds an EPG to access or virtual networking policies
+ Consumes a single VLAN pool
+ Controls what type of device connects to the Leaf ports
+ Physical/Baremetal Domain
+ Any device unmanaged by APIC
+ External Bridge Domain
+ Connection to a non-ACI Switch
+ Also known as L2out
+ External Routed Domain
+ Connection to a Router
+ Also known as L3out
+ Fibre Channel Domain
+ FCoE devices
+ Virtual Machine Manager (VMM) domain
+ A hypervisor that APIC has plugins for
+ E.g. integration with VMWare DVS
Access Policy Objects
+ VLAN Pool
+ Controls which VLAN encapsulations a Tenant can use
+ VLANs can be static or dynamic
+ Dynamic VLANs are automatically assigned using VMM integration
+ Attachable Access Entity Profile (AAEP)
+ Controls which Leaf ports a Tenant can apply policies on
+ Each Leaf interface belongs to one AAEP
+ Each AAEP may contain multiple domains
Access Policy Objects
+ Interface Profile
+ Container for Interface Selectors
+ Interface Selector
+ Port or range of ports on the leaf
+ E.g. 1/1-2
+ Calls the Interface Policy Group
+ Interface Policy Group
+ Calls the AAEP and the Interface Policies
+ Interface Policies
+ Controls protocols running on the Leaf ports
+ E.g. CDP, LLDP, LACP, MCP
Access Policy Objects
+ Switch Profile
+ Container for Switch Selectors
+ Calls the Interface Profile
+ Switch Selector
+ Calls the Node ID of the Switch
+ Calls the Switch Policy Group for that Node ID
+ Switch Policy Group
+ Container for Switch Policies
+ Switch Policies
+ Policies that apply Switch wide
+ E.g. BFD Timers, CoPP, Netflow timers, etc.
Using the GUI Show Usage
+ How objects are bound together is the biggest ACI learning curve
+ The GUI allows you to trace an object to see what other objects its
calling, and which objects are calling it
+ Most GUI screens support this as the Show Usage option at the bottom
of the window
Using the GUI Debug View
+ Object names can be found using the debug view on the APIC GUI
+ Help and Tools > Show Debug Info
Using the API Inspector
+ Visore is a tool built into APIC for browsing the object tree
+ Access at https://APIC-IP/visore.html
Implementing Cisco
Application Centric Infrastructure
Implementing ACI Fabric & Access Policies
What are Fabric Policies?
+ Fabric Policies affect Fabric Ports, which are the Leaf to Spine links
+ Fabric > Fabric Policies
+ Examples of Fabric Policies
+ NTP
+ IS-IS Timers
+ BGP Route Reflection
+ SNMP
What are Access Policies?
+ Browse to Fabric > Access Policies > Quick Start > Configure an
Interface, PC, and VPC
+ Disadvantage of the Wizard is the naming conventions
+ Can’t rename an object once it’s created
+ Good for building a skeleton config of objects to know the
interconnections
Implementing Cisco
Application Centric Infrastructure
Implementing ACI Tenant Policies
Review of Tenant Objects
+ Application Profile
+ Endpoint Group
+ Bridge Domain
+ Subnet
+ VRF
+ Contract
+ Subject
+ Filter
Tenant Object Hierarchy Visualized
Creating Tenant Objects
+ Taboo Contracts are a special type of contract that can be used to deny
traffic otherwise permitted by another contract
+ Example:
+ Regular contract says permit any, taboo says deny Telnet
+ Result is Telnet is denied and all other traffic is permitted
+ Taboo Contracts are processed before regular contracts
+ Taboo Contracts apply inbound to an EPG
+ I.e. not between two EPGs, but from Any to EPG
Implementing Cisco
Application Centric Infrastructure
Implementing the VZAny EPG
Implementing the VZAny EPG
+ The ACI RIB, or Routing Table, is the next lookup after the
Endpoint Table
+ The routing table is still locally significant to each Leaf or Spine
+ Subnets are only deployed to a Leaf when an EPG in that Bridge
Domain is provisioned
+ Could be static or dynamic, more on this later…
+ Border Leafs are the devices that receive routes from outside
layer 3 networks, and propagate them to the rest of the fabric
+ How do we propagate routes? MP-BGP
+ Specifically VPNv4 and VPNv6 BGP like an MPLS VPN, but the
encapsulation is VXLAN instead of MPLS
Multiprotocol BGP (MP-BGP) and ACI
+ Pod Policy is configured as Fabric > Fabric Policies > Pods > Policy
Groups > Create Pod Policy Group
+ Edit the BGP Route Reflector Policy Default to specify the BGP
options
+ BGP ASN
+ Which Spines run as BGP RRs
+ Verifications from the CLI:
+ show bgp vpnv4 unicast summary vrf all
+ show bgp vpnv4 unicast vrf all
Implementing Cisco
Application Centric Infrastructure
Implementing Layer 3 Out with EIGRP
Implementing Cisco
Application Centric Infrastructure
Implementing Layer 3 Out with OSPF
Implementing Cisco
Application Centric Infrastructure
Implementing Layer 3 Out with BGP
Implementing Cisco
Application Centric Infrastructure
ACI and VMware Integration
APIC and VMM Integration
+ APIC pushes the EPG to the vCenter server as a port group and
chooses a VLAN number from the dynamic pool
+ Virtual Machine joins the port group through vCenter
+ vCenter reports to APIC where the VM lives through CDP/LLDP
+ APIC deploys the EPG to the Leaf port attached to the Hypervisor
+ Depends on the Resolution and Deployment Immediacy setting
Resolution vs. Deployment Immediacy