Cisco ACI Initial Deployment Cookbook 1
Cisco ACI Initial Deployment Cookbook 1
CiscoSystems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 1 of 213
Contents
CONTENTS 2
INTRODUCTION 5
GOALS OF THIS DOCUMENT 5
PREREQUISITES 5
TERMINOLOGY 5
TOPOLOGY 5
HARDWARE INSTALLATION OVERVIEW 7
DETAILED PROCEDURE 8
Rack & Cable Hardware 8
APIC Connectivity 8
Switch Connectivity 9
Configure Each APIC’s Integrated Management Controller 9
Logging into the IMC Web Interface 10
Check APIC Firmware & Software 10
Check Image Type (NXOS vs. ACI) & Software Version of Your Switches 11
APIC1 Initial Setup 11
Fabric Discovery 14
Setup Remainder of APIC Cluster 18
SETTING UP DAY 1 FABRIC POLICIES 20
Out-of-Band Management IPs 20
NTP configuration 21
System Settings 23
Creating & Applying a Pod Policy 24
DNS configuration 25
Securing Management Access 26
SNMP Configuration 29
Creating Out-of-Band Filters 29
Syslog Configuration 31
Create Syslog Remote Location 31
Create Fabric Level Syslog Source 31
Creating Access Level Syslog Policy 33
Creating Tenant Level Syslog Policies 33
Upgrade & Firmware Policies 35
Adding Software Images to the APIC 35
About ACI Upgrades 37
Upgrading APIC 37
Upgrading Switch Nodes 38
Export Policies 39
Core Export Policy 39
Daily Configuration Export Policy 39
Smart Licensing 40
FABRIC CONFIGURATION 41
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 2 of 213
INTRODUCTION INTO ACCESS POLICIES 41
Switch policies 41
Interface policies 41
vPC 43
VLAN pools 43
Domains 43
Attachable Access Entity Profile 44
Tenant, APP and EPG 45
Static Bindings 46
All Together 46
Connecting One More Server 46
BLADE CHASSIS CONNECTIVITY WITH VMM 47
Connecting the First UCS Fabric Interconnect (FI-A) 49
Connecting the Cecond UCS Fabric Interconnect (FI-B) 60
Overview of Created Policies 65
BARE METAL CONNECTIVITY WITH EXISTING VMM DOMAIN 73
Connecting the Bare Metal VMM Server 74
Overview of created policies 79
BARE METAL CONNECTIVITY WITH PHYSICAL DOMAIN 84
Connecting the Bare Metal 84
Overview of created policies 89
L3OUT TO ROUTER1 94
Connecting Router1 94
Overview of created policies 99
L3OUT TO ROUTER2 – ASYMMETRIC POLICIES 104
Connecting router2 105
Overview of Created Policies 112
L3OUT TO ROUTER3 120
Connecting router3 120
Overview of Created Policies 126
TENANT CONFIGURATION132
TENANT CONFIGURATION 133
Create Tenant 133
Create VRFs 135
Create Bridge Domains (BD) 135
Create Application Profile and End Point Groups (EPGs) 139
Create the Application Profile 140
Create EPGs Under the Application Profile 141
Associate EPGs with Physical or VMM Domains 142
Associate EPGs with Physical Domains 145
Add Static Binding for EPGs in Physical Domain146
Create and Apply Contracts to EPGs 148
Create Filters 148
Create Contracts 152
Apply contracts to EPGs 155
Alternative Options for Security Policy Configuration 159
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 3 of 213
Unenforced VRF 159
vzAny 160
Contract Preferred Group 161
L3OUT 164
North-South L3out Design 164
North-South L3out Configuration 166
Create a L3Out 167
Configure a BD to advertise BD subnet 181
Configure a contract between the L3out and an EPG 184
Transit L3out Design 188
Transit L3out Configuration step 189
Create a second L3out 190
Configure Export Route Control Subnet 207
Configure a contract between the L3outs209
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 4 of 213
Introduction
This section provides an overview of the goals and prerequisites for this document.
Prerequisites
To best understand the design presented in this document, the reader must have a basic working knowledge of
Cisco ACI technology. For more information, see the Cisco ACI white papers available at Cisco.com:
https://www.cisco.com/c/en/us/solutions/data-center-virtualization/application-centric-infrastructure/white-
paper-listing.html.
Terminology
This document uses the following terms with which you must be familiar:
Topology
This document covers multiple features up to Cisco ACI Release 4.0(1h). It discusses step-by-step
configuration using the topology and IP addressing in Figure 1, Table 1 and Figure 2. The detail will be provided
in each section.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 5 of 213
Figure 1. Cisco ACI Topology
vCenter 10.48.22.68 - -
DNS 10.48.35.150 - -
server
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 6 of 213
Figure 2. Tenant topology
9000 switches. The goal of this chapter is to help you navigate the process of setting up your ACI fabric from
scratch. Greater details for the installation process can be found in Installation Guides & Getting Started Guides
found on Cisco.com
■ Nexus 9000 Switching running ACI software image (Spines & Leaf Switches)
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 7 of 213
1. Rack & Cable Hardware
2.
4. Check Image Type (NXOS vs. ACI) & software version of your switches
6. Fabric Discovery
Detailed Procedure
This section provides detailed configuration procedures.
APIC Connectivity
The first task for setting up your physical fabric devices will be racking & cabling. Depending on your rack
space, it might be preferred to spread leaf pairs across racks. Note that all Leaf switches will need to
connect to Spine switches, so you will want to locate Leaf & Spine switches in relative proximity to each
other to limit cabling requirements. The APICs will be connected to Leaf switches. When using multiple
APICs, we recommend connecting APICs to separate Leafs for redundancy purposes.
■ #3 VGA Video Port. Temporarily needed for initial setup of the IMC to configure remote management
(Virtual KVM access)
■ #4- Integrated Management Controller (IMC) for remote platform management. Similar to HP iLO, Dell
iDRAC & IBM RAS platforms. This will serve your virtual Keyboard, Video & Mouse (vKMV) services and
provide the ability mount virtual ISO (vMedia) images for manual APIC software upgrades.
■ #7- Power Supply Unit 1 & 2. These should be connected to separate power sources (ie. Blue & Red
circuits)
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 8 of 213
■ #9-Fabric Connectivity Ports. These can operate at 10G or 25G (Depending on the model of APIC) when
connected to Leaf host interfaces. We recommend connecting two fabric uplinks, each to a separate leaf
and/or VPC Leaf pairs.
Switch Connectivity
Switch connectivity is pretty straight forward. Leaf switches only connect to Spine switches and vice-versa.
This provides your fabric with a fully redundant switching fabric. In addition to the fabric network connections,
-of-band
management network, and a console connection to a Terminal server (optional, but highly recommended).
direction with your hot/cool aisle of your datacenter. Fans can be ordered with airflow in both directions so
ensure you check this prior to ordering. Switches will have two operational port types Host Interfaces &
Fabric Uplinks. Leaf switches connect to Spines using Fabric Uplinks. APICs and other host devices connect to
Leaf Host interfaces. Refer to your specific switch model documentation to determine the interface ranges &
default port modes.
configured for DHCP by default. Cisco recommends that you assign a static address for this purpose to avoid
any loss of connectivity or changes to address leases. You can modify the IMC details by connecting up a
crash cart (physical monitor, USB keyboard and mouse) to the server and powering it on. During the boot
For t Dedicated
IMC traffic over the LAN on Motherboard (LOM) port along with the APICs OS management traffic. This can
cause issues with fabric discovery if not properly configured and not recommended by Cisco. Aside from the IP
n to modify them. Once
a static address has been configured you will need to Save the settings & reboot. After a few minutes you
should then be able to reach the IMC Web Interface using the newly assigned IP along with the default IMC
credentials of admin and password. Its recommended that you change the IMC default admin password after
first use.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 9 of 213
Logging into the IMC Web Interface
Launching the KVM console will require that you have Java version 1.6 or later installed. Depending on your
client security settings, you may need to whitelist the IMC address within your local Java settings in order for
the KVM applet to load. Open the KVM console and you should be at the Setup Dialog for the APIC assuming
the server is powered on. If not powered up, you can do so from the IMC Web utility.
Note: The IMC will remain accessible assuming the appliance has at least one power source connected. This
allows independent power up/down of the APIC appliance operating system.
patches longer than non LLR versions. As of this writing, the current LLRs are versions 2.2 and 3.2. Unless you
have specific feature requirements available in later releases, you may be best suited deploying the latest LLR
as it will have a larger installation base and reduce the possibility of having to perform major software version
upgrades. Typically, a new LLR is added for each Major version (ie. 2.x, 3.x etc). Equally important to note is
that all your APICs require to run the same version when joining a cluster. This may require manually
upgrading/downgrading your APICs manually prior to joining them to the fabric. Instructions on upgrading
Cisco APIC Management, Installation, Upgrade, and
for your respective version.
Switch nodes can be running any version of ACI switch image and can be upgraded/downgraded once joined
to the fabric via firmware policy.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 10 of 213
Check Image Type (NXOS vs. ACI) & Software Version of Your Switches
For a Nexus 9000 series switch to be added to an ACI fabric, it needs to be running an ACI image. Switches
standalone Nexus 900 switches running traditional NXOS, then you may need to install the appropriate image
(For example, aci-n9000-dk9.14.0.1h.bin). For detailed instructions on converting a standalone NXOS
Cisco Nexus 9000 Series NX-OS Software Upgrade and Downgrade
Guide
Sample Nexus 9000 running NXOS mode, with n9000-dk9.7.0.3.I1.1a.bin being the NXOS image:
Sample Nexus 9000 running ACI mode, with aci-n9000-dk9.14.0.1h.bin being the NXOS image:
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 11 of 213
From here, the APIC will guide you through the initial setup dialogue. Carefully answer each question. Some of
Some of the fields are self-explanatory. Select fields are highlighted below for explanation:
■ Fabric Name: User defined, will be the logical friendly name of your fabric.
■ # of Controllers in fabric: Set this to the # of APICs you plan to configure. This can be
increased/decreased later.
■ Pod ID:
a single Pod installed, this will be always be 1. If you are located additional APICs across multiple Pods,
■ Standby Controller: Beyond your active controllers (typically 3) you can designate additional APICs as
standby. In the event you have an APIC failure, you can promote a standby to assume the identity of the
failed APIC.
■ APIC-X: A special-use APIC model use for telemetry and other heavy ACI App purposes. For your initial
setup this typically would not be applicable. Note: In future release this feature may be referenced
.
■ TEP Pool: This will be a subnet of addresses used for Internal fabric communication. This subnet will NOT
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 12 of 213
recommendation is to assign an unused subnet of size between and /16 and /21 subnet. The size of the
subnet used will impact the scale of your Pod. Most customer allocate an unused /16 and move on. This
value can NOT be changed once configured. Having to modify this value requires a wipe of the fabric.
■ Infra VLAN: This is another important item. This is the VLAN ID for all fabric connectivity. This VLAN ID
should be allocated solely to ACI, and not used by any other legacy device in your network. Though this
VLAN is used for fabric communication, there are certain instances where this VLAN ID may need to be
extended outside of the fabric such as the deployment of the Cisco AVS/AVE. Due to this, we also
your networks. Cisco recommends a VLAN smaller than VLAN 3915 as being a safe option as it is not a
reserved VLAN on Cisco DC platforms as of today. This value can NOT be changed once configured.
Having to modify this value requires a wipe of the fabric.
■ BD Multicast Pool (GIPO): Used for internal connectivity. We recommend leaving this as the default or
assigning a unique range not used elsewhere in your infrastructure. This value can NOT be changed once
configured. Having to modify this value requires a wipe of the fabric.
Once the Setup Dialogue has been completed, it will allow you to review your entries before submitting. If you
he
configuration allow the APIC 4-5 mins to fully bring all services online and initialize the REST login services
before attempting to login though a web browser.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 13 of 213
Fabric Discovery
With our first APIC fully configured, now we will login to the GUI and complete the discovery process for our
switch nodes.
1. When logging in for the first time, you may have to accept the Cert warnings and/or add your APIC to the
exception list.
2. Go ahead and login with the admin account and password you assigned during the setup procedure.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 14 of 213
Figure 10. APIC Login Screen
3.
UI easier. You can access UI settings from the top right menu. These settings will be maintained as long
as the cookie for this URL managed by your browser exists.
■ Remember Tree Selection: Maintains the folder expansion & location when navigating back & forth
between tabs in the APIC UI
■ Default Page Size for Tables: Default is 10 items, but you can increase this to avoid having to click
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 15 of 213
5. Fabric tab > Inventory
sub-tab > Fabric Membership folder.
From this view you are presented with a view of your registered fabric nodes. Click on the Nodes Pending
Registration tab in the work pane and we should see our first Leaf switch waiting discovery. Note this
would be one of the Leaf switches where the APIC is directly connected to.
To register our first node, click on the first row, then from the Actions menu (Tool Icon) select Register.
6. The Register wizard will pop up and require some details to be entered including the Node ID you wish to
assign, and the Node Name (hostname).
Hostnames can be modified, but the Node ID will remain assigned until the switch is decommissioned and
remove from the APIC. This information is provided to the APIC via LLDP TLVs. If a switch was previously
registered to another fabric without being erase, it would never appear as an unregistered node
switches to be assigned Node IDs from 100+, and Spine switches to be assigned IDs from 200+. To
accommodate your own numbering convention or larger fabrics you can implement your own scheme. RL
-connected Leaf
switches. Rack Name is an optional field.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 16 of 213
7. Once the registration details have been submitted, the entry for this leaf will move from the Nodes Pending
Registration tab to the Registered Nodes tab under Fabric Membership. The node will take 3-4 mins to
complete the discovery which includes the bootstrap process and bringing the
During the process you will notice a TEP (Tunnel Endpoint) address gets assigned. This will be pulled from
available address in your Infra TEP Pool (ie. 10.0.0.0/16).
8. After the first Leaf has been discovered and move to an Active state, it will then discovery every Spine
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 17 of 213
9. Since each Leaf Switch connect to every Spine switch, once the first Spine completes the discovery
process, you should see all remaining Leaf switch pending registration. Go ahead with Registering all
remaining nodes and wait for all switches to transition to an Active state.
10. With all the switches online & active, our next step is to finish the APIC cluster configuration for the
remaining nodes. Navigate to System > Controllers sub menu > Controllers Folder > apic1 > Clusters as
Seen by this Node folder.
From here you will see your single APIC along with other important details such as the Target Cluster Size
and Current Cluster Size e
APICs to setup.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 18 of 213
ected as they
will be inherited from APIC1 once you join the cluster.
Allow APIC2 to fully boot and bring its service online. You can confirm everything was successfully configure as
soon as you see the entry for APIC2 in the Active Controllers view. During this time, it will also begin syncing
-5 mins for this process to complete. During this time you may see the State of
the APICs transition back & forth between Fully Fit and Data Layer Synchronization in Progress. Continue
through the same process for APIC3, ensuring you assign the correct controller ID.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 19 of 213
Figure 22. APIC Cluster Discovery Completed (Fully Fit)
This concludes the entire fabric discovery process. All your switches & controllers will now be in sync and
under a single pane of management. Your ACI fabric can be managed from any APIC IP. All APICs are active
and maintain a consistent operational view of your fabric.
■ NTP
■ DNS
■ SNMP
■ Syslog
■ Firmware Policies
1. Navigate to Tenants > mgmt > Node Management Addresses > Static Node Management Addresses.
2. Right click on the Static Node Management Addresses folder and select Create Static Node Management
Addresses. A window will appear and you will start by defining a range of Nodes. If the address block you
intend to assign to your nodes is sequential, it simplifies the config. You will enter the range of nodes that
corresponds to the sequential range of addresses you plan on assigning. For example, if you had only 2
sequential addresses, you could create the first block for your first two nodes. Additional nodes can be
added indecently if your address blocks are non-sequential. Next put a check on the Out-Of-Band
Addresses box. For the Management EPG, leave it as default. For the OOB IPv4 Address, enter the
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 20 of 213
starting IP & subnet mask. Ex. 10.48.22.77/24. This will increment this address by 1 for each Node in the
range. Lastly enter the Gateway IP and click submit. If you need to add additional blocks for a different IP
or node range, you can repeat the steps accordingl
each of your APICs. This will be required latter on for external services such as SNMP.
NTP Configuration
Time synchronization plays a critical role in the ACI fabric. From validating certificates, to keeping log files
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 21 of 213
Note: Simply creating an NTP policy does not apply it to your fabric. You will also need to assign this policy to a
1.
2. A new window will pop up and ask for various information. Provide a name for your policy and set the
State to Enabled. an
enable the Server option. For downstream endpoints they can use the Management Interface IP of nodes
as an NTP Server source. When done, click Next to define the NTP Sources.
Note: Using a Bridge Domain SVI (Subnet IP) as an NTP Source for downstream clients is not
recommended. When a Leaf switch is enabled as NTP server, it will respond on any Interface. Issues can
arise when attempting to use the SVI address of a Leaf, rather than the management IP.
3. Next you will define one or more NTP providers. This will be the upstream device the nodes will poll for
Time synchronization. You can optionally assign one of the sources as Preferred, which will force the
switches to always to attempt time sync with this source first, then re-try against alternate sources. We
recommend at least 2 different NTP sources to ensure availability. Leave all the default options and click
OK.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 22 of 213
Figure 27. Configuring NTP Providers
4. The last step for Time configuration is to set the Display Format and/or Time Zone for your fabric. Navigate
to Fabric > Fabric Policies > Pod > Date and Time > default.
5. Configure the Display time to be either local time or UTC and assign the appropriate Time Zone where your
APICs are located.
System Settings
the same UI panel. Navigate to System > System Settings sub menu. Below includes a list of settings that are
recommended to be changed with a brief explanation. Understand that these suggestions are suited for most
customers but can be modified pending specific needs. Some of the options below may have you wondering -
fact, so respective of not changing default behaviors, sometimes the optimal settings need to be changed
manually.
■ APIC Connectivity Preference: Change to ooband. This option select which Management EPG profile
should be used by default if both oob & inband management is configured. Out-of-band is far simpler to
understand and fine for most use cases.
■ Global AES Passphrase Encryption Settings: Assign Passphrase and Enable (two steps). This is used to
export secure fields when generating a Config Export task for your configuration. Without this enabled, all
secure fields including passwords and certificates are omitted from your Config Export, requiring you to
have to manually re-apply them upon config import. This makes your import/export tasks fast & secure.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 23 of 213
■ Fabric Wide Settings: Enable Force Subnet Check and Enforce Domain Validation.
Enabling the subnet check applies to Gen2 or later switches. This feature limits the local learning of
endpoint MAC & IPs to only those belonging to a Bridge Domain defined subnet. This feature Is
explained in greater detail in the ACI Endpoint Learning Whitepaper.
Enforcing Domain Validation restricts EPG VLAN usage by ensuring that the respective Domain & VLAN
Pool are bound to the EPG. This prevents accidental or malicious programming of EPGs to use VLAN
IDs they may not be permitted to use. Tenant Admins (responsible for Application level policies)
typically have different permissions than the Infrastructure Admin (responsible for networking &
external connectivity) in ACI and with this separation of roles you can have one user role responsible
for allowing certain VLAN Ranges per Domains using RBAC & Security Domains. Then this limits your
Tenant admins access to only specific Domains and in-
EPGs via Static Path Bindings etc.
BGP Route Reflector: The ACI fabric route reflectors use multiprotocol BGP (MP-BGP) to distribute
external routes within the fabric. To enable route reflectors in the ACI fabric, the fabric selects the
spine switches that will be the route reflectors and provide the autonomous system (AS) number. Once
route reflectors are enabled in the ACI fabric you can configure connectivity to external routers. Assign
an Autonomous System Number (ASN) to your fabric and configure up to eight Spines as Route
Reflectors. In a multipod environment it would be recommended to spread them across Pods.
Note: Simply creating a Route Reflector policy does not apply it to your fabric. You will also need to assign this
Fabric Pod Policy. You can use the default policy or create a new one. The Pod Policy group is collection of
policies previously created and applied to one or more Pods in your fabric. This granularity allows you to apply
1. Native to Fabric > Fabric Policies sub menu > Pods > Policy Groups folder
2. Right click on the Policy Groups folder and select Create Pod Policy Group
3.
polices, you can leav
policy name.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 24 of 213
Note: In our example we configured
to show the two valid ways to configure various Pod
Policies.
4. Navigate to Fabric > Fabric Policies sub menu > Pods > Profiles > Pod Profile > default. With the default
Pod Selector selected in the navigation pane, change the Fabric Policy Group to the one created in the
previous step.
DNS Configuration
To allow your APIC to resolve hostname to external resources, such as Virtual Machine Managers (VMMs),
1. Navigate to Fabric > Fabric Policies sub menu > Policies > Global > DNS Profiles > default
2. In the work pane, click the + sign to add one or more DNS providers. You can assign a Preferred provider if
you wish.
3. In the DNS Domains, you can click the + sign to assign a domain suffix that should be used by your APIC
when resolving DNS hostnames.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 25 of 213
Figure 32. Configuring a DNS Profile
both HTTPS & SSH. Telnet is disabled by default and Cisco recommends using only SSH for Management CLI
more secure protocol. a best practice to configure your Management Contracts on Day 1 to
enforce a complete whitelist model against access to your management interfaces. The next procedure will
walk you through configuring
4. Under Entries, click the + sign and add a filter entry with the following values (all other columns can be left
blank):
a. Name: allow-ssh
b. EtherType: IP
c. IP Protocol: TCP
5. Click Submit. Next step will be creating the Contract & attach the newly created Filter.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 26 of 213
Figure 33. Creating SSH Filter for Management Access
8. Right Click on the Out-of-Band Contracts folder and select Create Out-Of-Band Contracts
10. Click the + sign to add a subject. Provide a name for the Contract Subject. Ex. allow-management
11. Click the + sign, select each filter then click Update to add both filter chains previously created. Ex. allow-
ssh & allow-https
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 27 of 213
Figure 35. Creating Contract Subject
12.
attach these rules.
13. Navigate to Tenants > mgmt > External Management Network Instance Profile
14. Right-click on the folder and select Create External Management Network Instance Profile or select an
existing Profile.
15.
16. Under Consumed Out-of-Band Contracts click the + sign and add your previously created allow-
management contract then click Update
17. Under the Subnets, enter the target Subnet you wish to restrict accessing the APIC then click Update. In
our example we are using a 0.0.0.0/0 entry to allow unrestricted access.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 28 of 213
Figure 36.Adding Contracts to External Management Network Profile
SNMP Configuration
SNMP monitoring is an important aspect of ensuring your ACI administrators are quickly made aware of any
potential
standard. Assuming you have a SNMP monitoring system already setup, this section will guide you through
setting up the ACI portion of SNMP monitoring. Configuring SNMP requires that you have already configured
your Static Management Node Addresses and have In-band or Out-of-Band network connections to your
switches. SNMP is configured through two different Scopes; Global & VRF Context. We will start with the
Global scope configuration as the VRF Context requires your User tenant to be created.
Global Scope configuration will allow you to monitor the physical status of the fabric including Interfaces,
Interface States, Interface Stats and environmental information.
1. Navigate to Fabric > Fabric Policies sub menu > Policies > Pod > SNMP folder
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 29 of 213
3. In the pop-up, provide a name. Ex. allow-snmp
4. Under Entries, click the + sign and add a filter entry with the following values (all other columns can be left
blank):
a. Name: allow-snmp
b. EtherType: IP
c. IP Protocol UDP
5. Click Submit. Next step will be creating the Contract & attach the newly created Filter.
6. Navigate to Tenants > mgmt > Contracts > Out-Of-Band Contracts > allow-management
8. Click the + sign to add a filter chain and select the previously created SNMP filter. Ex. allow-snmp
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 30 of 213
Figure 38. Add SNMP Filter to Management Contract
Syslog Configuration
Another useful tool for monitor the fabric is the popular Syslog policy to aggregating faults and alerts. Syslog
configuration is comprised of first defining one or more Syslog Destination targets, then defining Syslog policies
within various locations within the UI to accommodate Fabric, Access Policy and Tenant level syslog messages.
Enable all these syslog sources will ensure the greatest amount of details are captured but will increase the
amount of data & storage requirements depending on the logging level you set.
1. Navigate to Admin > External Data Collectors > Monitoring Destinations > Syslog
2. From the Actions Menu select Create Syslog Monitoring Destination Group
5.
b. If necessary, modify any additional details as you wish such as severity & port number
d. Click OK.
7. Click Finish
The fabric Syslog policy will export alerts for monitoring details including physical ports, switch components
(fans, memory, PSUs etc) and linecards
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 31 of 213
1. Navigate to Fabric > Fabric Policies sub menu > Policies > Monitoring > Common Policy > Callhome/Smart
Callhome/SNMP/Syslog/TACACs.
d. Set the Dest Group to the Syslog Destination Group previously created.
e. Click Submit
3. Navigate to Fabric > Fabric Policies sub menu > Policies > Monitoring > default > Callhome/Smart
Callhome/SNMP/Syslog/TACACs.
5.
d. Set the Dest Group to the Syslog Destination Group previously created.
e. Click Submit
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 32 of 213
Figure 40. Creating Fabric default Syslog Source
The Acess Syslog policy will export alerts for monitoring details including VLAN Pools, Domains, Interface Policy
Groups, and Interface & Switch Selectors Policies.
1. Navigate to Fabric > Access Policies sub menu > Policies > Monitoring > default > Callhome/Smart
Callhome/SNMP/Syslog/TACACs.
3.
d. Set the Dest Group to the Syslog Destination Group previously created.
e. Click Submit
Tenant level syslogging will include all tenant related polices include Application Profiles, EPGs, Bridge
domains, VRFs, external networking etc. To simplify the syslog configuration across multiple tenants you can
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 33 of 213
leverage Common Tenant syslog configuration and share that across other tenants. This would provide a
consistent level of logging for all tenants. Alternately if you wanted to have varied levels of logging/severities
for different Tenants, you could create the respective Syslog policy within each tenant. For our purposes we
will deploy a single consistent syslog policy using the Common Tenant.
1. Navigate to Tenants > common > Policies > Mentoring > > default > Callhome/Smart
Callhome/SNMP/Syslog/TACACs.
3. dd a Syslog Source
d. Set the Dest Group to the Syslog Destination Group previously created.
e. Click Submit
5. Set the Monitoring Policy drop down box to be the default policy from the common tenant.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 34 of 213
Figure 43. Assigning default common Tenant syslog Policy to a Tenant
version you plan on running on your fabric today. In our example we deployed the APIC with 4.0(1h), and
3. From here you can select a Local Upload via your browser from your workstation, or you can use a Remote
location. Remote locations can be HTTP or SCP sources. Select the appropriate option.
4. Enter the appropriate details and click submit. If the details are valid, the download status should progress.
5. Repeat the process for the corresponding second image (switch or APIC).
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 35 of 213
Figure 44. Uploading APIC FW to APIC via HTTP
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 36 of 213
Figure 46. Viewing Software Images Within APIC Repository
When performing ACI fabric upgrades, there are typically two categories of upgrades. One task for the
controllers and one or more subsequent tasks for the switch nodes. The controller upgrade task completely
automated. Once initiated, each controller node will upgrade serially. This ensures that the next controller
standby controllers will also be upgrade at this time. Once all controllers have been upgraded, the switches will
be next. A common practice is to group nodes by odd or even nodes IDs. Typically switch nodes are grouped
together in redundant pairs by function such as Border Leafs, Compute Leafs, Service Leafs etc. Assuming all
functional node pairs contain at least one odd & one even node, the impact will be minimal. This does assume
that most if not all workloads are dual connected to Leaf nodes with an Odd & Even ID. The odd/even group
upgrades are simply a guideline. You may wish to further divide your switch upgrade groups based on physical
pods, remote leafs, and Virtual Leafs (vLeafs). For each additional group comes with less risk in the event any
issues manifest with switches running the new software version, but this will have an impact on the overall
upgrade window duration. A standard upgrade for a Leaf switch is typically 15-30mins, but this can often vary
based on the underlying software activities required. Depending on whether the upgrade is a major or minor
version change, additional components may be upgraded during this time, for example Erasable Programmable
Logic Devices (EPLDs), SSD firmware and other switch components. Switches upgraded within the same
Upgrade Group will be upgrade simultaneously, except for VPC Peer switches. VPC Peer Switches will always
be upgraded serially regardless of the upgrade group membership to prevent unexpected network outages.
When considering on upgrading, always review the Release Notes & Firmware Management Guide for the new
version to confirm the upgrade path, compatibility and known caveats. An Upgrade Matrix tool is available to
help you determine the correct upgrade path:
https://www.cisco.com/c/dam/en/us/td/docs/Website/datacenter/apicmatrix/index.html
We strongly recommends that you connect, configure & test console access to all controllers and switches
prior to attempting any upgrade. In the event a controller or switch upgrade encounter issues, this may be
the only method to access the device to troubleshooting and/or recover.
Upgrading APIC
Assuming you’ve uploaded the respective Software images to the APIC, you can now initiate the upgrade
process.
5. [Optional] Ignore Compatibility Check. This will allow you to perform an upgrade that might not follow a
supported upgrade path, which could potentially cause disruptions. For pre-Prod/Lab this is safe to
enable.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 37 of 213
6. Click Submit.
Allow the controller process to complete which could take anywhere between 30mins > 1hr+ depending on
the number of controllers in the cluster.
Once all controllers have been successfully upgraded, and the cluster shows “fully fit”, you can proceed with
upgrading the switches. The procedure below assumes you intend on performing the upgrade immediately.
Alternately, you can schedule the upgrade to start during a scheduled date/time.
3. Select the group type (Switch or vPod). Always perform the Switch upgrade prior to upgrading vPods
4. Odd_Nodes
8. Check the Switch nodes that correspond to your group. Ex. 101, 103, 201
9. Click Submit
Based on your Start Time option, the upgrade will immediately begin. You can remain on this screen to
monitor progress. During the process the switches will download the appropriate software image from the
APIC, perform the software upgrade, then reload with the new image. During this time, you may see the
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 38 of 213
Switches disappear from the Fabric Inventory. Barring no issues, each switch will reappear once the upgrade
has been completed. Be patient as some switches may take slightly longer than others.
Export Policies
Export policies encompass a wide range of options which include Configuration Backup and troubleshooting
logs. Some of these policies can and should be setup during your deployment phase. A few common polices
to configure include a Weekly (or even daily) configuration backup task, and a Core Export policy. Both of these
options will come in handy if/when needed. The next section will walk you through setting up a few of these
recommended policies.
1. Navigate to Admin > Import/Export sub-tab > Export Policies > Remote Locations folder
8. Click Submit
Now with the Remote Location created, you will be able to use/reference it with subsequent export policies.
Note: The remote location path & credentials will not be validated until an Export police attempts to send data
to it.
TAC for analysis. Configuring a Core Export policies ensures a copy of this is maintained in the event of a
device failure. Along with the Core Export you can optionally include a techsupport bundle when the failure
occurs this prevents any log roll over if an issue occurs and goes unnoticed for an extended period of time.
1. Navigate to Admin > Import/Export > Export Policies > Core > default
2. In the work pane, change the collection type to be Core and TechSupport.
export task.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 39 of 213
1. Navigate to Admin > Import/Export > Export Policies > Configuration
5. From the Scheduler drop down box, select Create Trigger Scheduler
b)
e) Click Ok
f) Click Submit
7. Click Submit
Note: The Global AES Encryption Setting should be already enabled. If not, please refer to earlier in this guide
to assign an AES Passphrase and enabling Encryption. Configuring a Configuration Export Policy without this
enabled will remove all Secure Fields & Passwords from your Exported file, making the Import process more
involved requiring having to manually re-assign the passwords for VMM domains, Remote Locations and other
policies.
Smart Licensing
Smart Licensing for Cisco Product provides customers with a single pane of glass to manage all their software
subscriptions & licenses for purchased & entitled products. Smart Licensing within ACI is currently not
enforced. Though Cisco highly encourages the use of Smart Licensing, failing to register your fabric with the
Cisco Smart Software Manager (CSSM) has no impact on functionality. Registering your fabric with CSSM
requires that the APIC has reachability to tools.cisco.com and DNS properly configured. There is a great
Technote that fully explains the Registration & licensing process for ACI, so it will not be covered further in this
guide. Please see the following link for details on configuration Smart Licensing for ACI:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/3-
x/smart_licensing/b_Smart_Licensing.html
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 40 of 213
Fabric Configuration
This section describes the fabric configuration.
do not configure a VLAN directly on a port but use policies which will allow us to scale configuration and apply
similar behavior to a group of objects such as switches or ports.
these adapters are configured in an LACP port-channel. The server is connected on port 1/9 on ACI leafs 101
-
being able to provide Web services in the network. In order todo so we will use an external VLAN 1501 which
will allow us to extend the EPG out of the ACI fabric. For more information regarding Tenant / APP / EPG
Switch policies
The first thing we need to do is create a policy in ACI which defines which switches need to be used. For this
In most ACI deployments we recommend configuring 1 switch profile per switch, and 1 switch profile per vPC
domain using a naming scheme which indicates the nodes which are part of the profile.
The wizard deploys a naming scheme which can easily be followed. The name scheme consists of
Switch{node-id}_Profile. As an example "Switch101_Profile" will be for a switch profile containing node-101
and Switch101-102_Profile for a switch profile containing switches 101-102 which are part of a vPC domain.
Interface Policies
Once we have defined which switches need the configuration we can define the ports on these switches which
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 41 of 213
Figure 49. Interface policies
Interface profiles can be used in many different ways. Similar to switch profiles, a single interface profile can be
created per physical switch along with an interface profile for each vPC domain. These policies should have a 1
to 1 mapping to their matching switch profile. Following this logic, the fabric access policies are greatly
simplified, and easy for other users to follow.
The default naming schemes employed by the wizard can also be used here. It consists of the switch profile
name + ifselector to indicate this profile is used to select interfaces. An example would be
Switch101_Profile_ifselector. This Interface profile would be used to configure non vPC interfaces on switch
101 and it would map directly to the Switch101_Profile switch profile.
we have now with a simple link associated both switches with port Eth1/9.
At this point in time we have linked ports to switches but we did not define the characteristics of these ports. In
order todo so we need to
case because we need to create an LACP port-
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 42 of 213
Figure 52. Switch and interface profiles combined step2
vPC
As we are creating an LACP port-channel over 2 switches, we need to define a VPC between Leaf 101 and
Leaf 102. In order todo so we create the following objects linked to the leaves.
VLAN pools
When considering the size of your vlan pool ranges, keep in mind that most deployments only need a single
VLAN pool and one additional pool when using VMM integration. If you plan on bringing VLANs from your
legacy network into ACI, define the range of legacy VLANs as your static VLAN pool.
As an example, lets assume VLANs 1-2000 are used in our legacy environment. Create one Static VLAN pool
which contains VLANs 1-2000. This will allow you to trunk ACI Bridge Domains & EPGs towards your legacy
fabric. If you plan on deploying VMM, a second dynamic pool can be created using a range of free VLAN IDs.
When deploying VLANs on a switch, ACI will encapsulate Spanning-tree BPDUs with a unique VXLAN ID which
is based on the pool the VLAN came from. Due to this, it is important to use the same VLAN pool whenever
connecting devices which require STP communication with other bridges.
VLAN VXLAN IDs are also used to allow vPC switches to synchronize vPC learned mac and IP addresses. Due
to this, the simplest design for VLAN pools is to use a single pool for static deployments and creating a second
one for dynamic deployments.
Domains
.e. where that pool
will be applied. A domain could be physical, virtual or external (either bridged or routed). In our example I will
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 43 of 213
use a physical domain as I need to connect a bare metal server into the fabric. I will link this domain to my
giving access to the required vlan(s).
For most deployments, a single physical domain is sufficient for static path deployments and a single routed
domain to allow the creation of L3Outs. Both of these can map to the same static VLAN pool. If the fabric is
deployed in a multi-tenancy environments or more granular control is required to restrict which users can
deploy specific EPGs & VLANs on a port, a more strategic deployment needs to be considered. Domains also
provide the ability to restrict user access with Security Domains using Roles Based Access Control (RBAC).
Interfaces on Switches together which share similar policy requirements. This means that you can further on in
the fabric refer to one AEP which is representing a group of interfaces on specific switches.
In most deployments, a single AEP should be used for static paths and one additional AEP per VMM domain.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 44 of 213
The most important consideration is that VLANs can be deployed on interfaces through the AEP. This can be
done by mapping EPGs to an AEP directly or by configuring a VMM domain for pre-provision. Both these
configurations make the associated interface a Trunk port .
Due to this, it is important to create a separate AEP for L3Out when using routed ports or routed sub-interfaces.
If SVIs are used in the L3Out, it is not necessary to create an additional AEP.
The next step is to link the EPG to the domain, hence, making the link between the logical object representing
our workload (the EPG) and the physical switches / interfaces.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 45 of 213
Static Bindings
The last step because we
and it will allow us to connect the bare metal server into the EPG.
All Together
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 46 of 213
r port-channel /
In the case we would have been using individual links, we could re-
previously created also for the extra server.
■ VMM Domain
Also keeps in mind that UCS FI connectivity in combination with VMware has the following characteristics:
■ From UCS FI towards the ACI leaf switches we will run a port-channel. We will create 1 for each FI
■ -channel as we are
connecting to 2 individual switches, this means we cannot use a load-balancing algorithm that uses IP-
hashing. Make sure to use a loa
switch dependent and which will hence support this topology.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 47 of 213
See also the below diagram:
Our connectivity diagram for this UCS Fabric Interconnect looks like the following:
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 48 of 213
Connecting the First UCS Fabric Interconnect (FI-A)
The first step we will do is launch the wizard to create the access policies involved.
1. You can do this by navigating to Fabric > Access Policies > Quick Start
2. This will bring us to the following screen where we will first create a VPC pair on leaf switches 101 and
102.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 49 of 213
3. Fill in the fields as per the below screen
4.
first leaf in our VPC port-
After saving you can see the VPC appearing on the left in the wizard showing that you have correctly
created this.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 50 of 213
5.
6. Next we will start the wizard again and on the left select the VPC pair where we need to create the UCS FI-
A connectivity.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 51 of 213
7. After doing this we click on the + sign on the top right to start the wizard.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 52 of 213
9.
10.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 53 of 213
11. After this we will create a CDP policy.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 54 of 213
13.
14. In
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 55 of 213
15.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 56 of 213
Figure 78. Connecting FI-A
17.
18. Now as a last step we will fill in the required vSwitch configuration.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 57 of 213
19.
20.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 58 of 213
21.
22. You will now notice if you relaunch the wizard all the configuration has been created:
Make
on the right.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 59 of 213
23. In order to match the above configuration make sure to to add in UCM the following config:
■ VLAN 1001- ough a vNIC template (make sure to use the vnic
■ Enable LLDP in the Network Control Policy used in your vNIC template
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 60 of 213
1. In order todo so we will start the wizard again under Fabric > Access Policies.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 61 of 213
3.
appears:
4.
choose ucs-FI-
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 62 of 213
5. Notice we are reusing the earlier created CDPoff, LLDPon and LACPactive policies and we move to the
Domain section.
6. In the domain section we choose the existing VMM Domain named ACI_VDS and choose again
Pinning-Physical-NIC-
Then c again.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 63 of 213
7.
8. Although from the ACI perspective everything has been created, in VMware we still need to add the servers
to the created vSwitch
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 64 of 213
9.
that the connectivity towards the leaves is active.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 65 of 213
Figure 94. Connecting FI: Policy overview
This means we now have a VMM domain that is fully equipped with access policies which can be linked to
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 66 of 213
Figure 96. Connecting FI: Switch Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 67 of 213
Figure 98. Connecting FI: Access port selectors
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 68 of 213
Figure 99. Connecting FI: VPC Interface Policy Group
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 69 of 213
Figure 100. Connecting FI: CDP Interface Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 70 of 213
Figure 102. Connecting FI: Port Channel Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 71 of 213
Figure 104. Connecting FI: VLAN Pool
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 72 of 213
Bare Metal Connectivity with Existing VMM Domain
The following sections describe bare metal connectivity with VMM domains.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 73 of 213
Connecting the Bare Metal VMM Server
In this section we will connect server2 to the fabric and prepare it for VMM workload. The connectivity is as per
the below diagram.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 74 of 213
1. We will first launch the Access Policy wizard to configure this connectivity by going to Fabric > Access
Policies > Quick Start
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 75 of 213
3. to use Individual links and make a
4. As in previous section we select CDPoff and LLDPon policy and leave all other policies to the defaults.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 76 of 213
5.
to fill in the VMM VLAN Pool as this is automatically pickedup.
ed Fabric
-Physical-NIC-
balancing algorithm here. We will also enable LLDP to enable dynamic VMM learning. After having
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 77 of 213
6.
7. And
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 78 of 213
Overview of created policies
So, what happened when we have been executing this wizard? The following image shows all policies that have
been created or linked to (already existing).
later on w
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 79 of 213
Figure 116. Bare metal with VMM: Interface Profile
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 80 of 213
Figure 118. Bare metal with VMM: Access Port Policy Group
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 81 of 213
Figure 119. Bare metal with VMM: CDP Interface Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 82 of 213
Figure 121. Bare metal with VMM: Attachable Access Entity Profile
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 83 of 213
Figure 123. Bare metal with VMM: VMM Domain
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 84 of 213
Figure 124. Bare metal with physical domain: connectivity
1. We will first launch the Access Policy wizard to configure this connectivity by going to Fabric > Access
Policies > Quick Start
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 85 of 213
2. The following screen will appear. S on the right.
3.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 86 of 213
4. Select the existing CDP, LLDP and Port Channel
5.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 87 of 213
6.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 88 of 213
Overview of created policies
So, what happened when we have been executing this wizard? The following image shows all policies that have
been created or linked to (already existing).
This means we now have a Physical domain that is fully equipped with access policies which can be linked to
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 89 of 213
Figure 134. Bare metal with physical domain: Interface Profile
Figure 135. Bare metal with physical domain: Access port selectors
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 90 of 213
Figure 136. Bare metal with physical domain: VPC Interface Policy Group
Figure 137. Bare metal with physical domain: CDP Interface Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 91 of 213
Figure 138. Bare metal with physical domain: LLDP Interface Policy
Figure 139. Bare metal with physical domain: Port Channel Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 92 of 213
Figure 140. Bare metal with physical domain: Attachable Access Entity Profile
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 93 of 213
Figure 142. Bare metal with physical domain: Physical Domain
L3out to Router1
The following sections describe connecting Router1 to the fabric.
Connecting Router1
In this section we will connect router1 to the fabric which will be later on used as part of our L3out1 domain.
This domain will also include router2 which we will configure in the next section. The connectivity diagram is as
follows:
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 94 of 213
Figure 143. Router1 connectivity
Notice we will connect router1 with 2 individual links and notice the symmetry which will allow us to use one
with 2 leaves.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 95 of 213
2. On
3.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 96 of 213
4.
5.
Depending on the next part of the configuration in the tenant section we will need a VLAN or not, being,
depending on if we will use a routed interface or SVI. As per our diagram we will use sub-
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 97 of 213
Figure 148. Router1: Step 5
6.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 98 of 213
7. And finally, we
chapter of this document. The following is an overview of the created or re-used policies in detail.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 99 of 213
Figure 152. Router1: Switch Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 100 of 213
Figure 154. Router1: Access port selectors
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 101 of 213
Figure 156. Router1: CDP Interface Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 102 of 213
Figure 157. Router1: LLDP Interface Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 103 of 213
Figure 159. Router1: VLAN Pool
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 104 of 213
Connecting router2
In this section we will connect router2 to the fabric which will be later on used as part of our L3out1 domain. In
the previous section we already created -use that
for this connectivity. The connectivity diagram is as follows:
Notice we will connect router2 with 2 individual links and notice this router is asymmetric connected to leaf103
and leaf104. This means we have some more work when creating the policies through the wizard as we will
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 105 of 213
2. S
3.
Notice we are only selecting Leaf 103 because do to the asymmetric routing in place we have to use a
continue.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 106 of 213
4. Next, we will link to the CDP and LLDP policies and continue to the Domain section.
5. n which is called
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 107 of 213
6.
7. And cl
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 108 of 213
8.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 109 of 213
10. Make sure to select the CDPoff and LLDPon policy and continue to the Domain section.
11.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 110 of 213
12.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 111 of 213
Overview of Created Policies
So, what happened when we have been executing this wizard? The following image shows all policies that have
been created or linked to (already existing).
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 112 of 213
Figure 177. Router 2: Interface Profile
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 113 of 213
Router 2: Access port selectors
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 114 of 213
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 115 of 213
Figure 178. Router 2: Access Port Policy Group
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 116 of 213
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 117 of 213
Figure 179. Router 2: CDP Interface Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 118 of 213
Figure 181. Router 2: Attachable Access Entity Profile
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 119 of 213
Figure 183. Router 2: External Router Domains
L3out to Router3
The following sections describe conneting Router3.
Connecting router3
In this section we will connect router3 to the fabric which will be later on used as part of our L3out2 domain.
This router will be connected with an LACP port-channel into the fabric, this means we also need to create for
leaf 105 and leaf 106 a VPC pair. The connectivity diagram is as follows:
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 120 of 213
Notice we will connect router3 with 2 individual links and notice the symmetry which will allow us to use one
2. The first thing we will do is create a VPC policy for switch 105 and 106.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 121 of 213
3.
4.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 122 of 213
5.
6.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 123 of 213
7.
section.
8.
not, being, depending on if we will use a routed interface or SVI. As per our diagram we will use routed
interfaces but we will create anyway already a VLAN pool if ever we need to create a subinterface or SVI in
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 124 of 213
9. again.
10.
Router3: Step 10
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 125 of 213
Overview of Created Policies
So, what happened when we have been executing this wizard? The following image shows all policies that have
been created or linked to (already existing).
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 126 of 213
Figure 196. Router3: Switch Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 127 of 213
Figure 198. Router3: Access port selectors
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 128 of 213
Figure 200. Router3: CDP Interface Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 129 of 213
Figure 202. Router3: Port Channel Policy
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 130 of 213
Figure 204. Router3: VLAN Pool
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 131 of 213
Tenant Configuration
This section describes step-by-step configuration of ACI tenant network with detailed examples. The logical
construct of a typical ACI tenant network consists of tenants, VRFs, bridge domains (BD), endpoint groups
(EPG), L3outs, L4-7 services insertions, as well as contracts that are applied between EPGs for white-list-
based communication policy control.
VRF
BD
Bridge Domain (BD) Bridge Domain (BD)
Contracts
Mirroring the logical construct, the ACI tenant network configuration intuitively includes the following steps:
■ Create and configure an Application Profile with end point groups (EPGs). Each EPG is associated with a BD
in the overlay network construct.
■ Create contracts and apply contracts between EPGs to enable white-list-based communication between
EPGs.
This document uses the 3-tier application shown in the following figure as an example to illustrate the tenant
configuration steps.
Contract
Transit
L3Out2 Contract Contract Contract
External-Web Web-App App-DB
Tenant: Prod
VRF1
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 132 of 213
The example uses the following network design that represents a typical practice, but some other design
options are discussed as alternatives throughout this session. Their configuration steps are shown as well
where it is needed.
■ Three EGPs named EPG-Web, EPG-App and EPG-DB, each in the bridge domain that has the
corresponding name
■ A contract named External-Web to allow the communication between the L3out external EPG and the
internal EPG-Web
■ A contract named Web-App to allow the communication between EPG-Web and EPG-App
■ A contract named App-DB to allow the communication between EPG-App and EPG-DB
The rest of this session details step-by-step configuration of the tenant network for the 3-tired application
example.
Tenant Configuration
The following sections describe tenant configuration.
Create Tenant
You can create a tenant in the APIC GUI by using the Tenant Quick
Start menu r Tenant/All Tenants.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 133 of 213
Figure 208. Creating tenant using tenant quick start wizard
With either of the two methods, you see a pop-up window to create a new tenant and VRF (optional for this
step), as shown below.
Figure 210.
You need to provide the name of the tenant, and the name of the VRF if choosing to create a VRF in this step.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 134 of 213
Figure 211.
Create VRFs
In this example, we use only one VRF that is created in the previous step of creating the tenant Prod. If needed,
more VRFs can be created in the tenant space under Networking > VRFs by right clicking
panel to bring up the pop- -down menu in the
right panel to start creating a new VRF.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 135 of 213
1. -
drop down menu in the right panel to se .
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 136 of 213
2. In the window that opens, provide the BD information, such as the name of the BD and the VRF that it
belongs to. The following figure -
button in the window. It will proceed to the next step of BD configuration, the Layer3 Configurations, as
shown below. In this example, you can use the default settings for the BD-Web.
Note: Depending on specific network scenarios, some of the settings may need to be changed, for
example, ARP flooding may need to be enabled, or Endpoint Dataplane Learning may need to be disabled.
But the discussion of how to choose the settings for these configurable features are not in the scope of
these documentation. For more information on these features and the best practices of their settings for
specific network scenarios, users can refer to the documents in the references of this document.
Figure 216. -
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 137 of 213
4. Provide the subnet information.
Figure 218. -
5. OK
to the BD Layer 3 configuration window, with the subnet being added to the list.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 138 of 213
6. The next step in creating and configuring the BD is the Advanced/Troubleshooting. It is optional to
configure any of the features listed in this step. In our example, the default settings are used. Clicking the
In our example, the same steps of creating BDs are repeated to create the other two BDs, BD-App and BD-
DB. At the end of this step, the tenant Prod has three BDs in its VRF1:
Figure 221. Three bridge domains created for the Three-tier application
If you are migrating from a current traditional VLAN-based network to ACI fabric, and desire to continue using
the VLAN model, you can map each VLAN to an EPG that then is associated to a unique BD on the ACI fabric.
Our example uses this approach. It provides the an easy migrate path from the current VLAN-based network to
ACI fabric. On the other hand, to take the most advantage of the flexibility provided by ACI network construct,
multiple EPGs can be in the same BD so that their policy enforcement boundaries are separate by EPGs while
sharing the same IP subnet in the BD. This can enable higher network agility, for example, it allows easy re-
purposing of endpoints among the EPGs without the need of reconfiguring their IP addresses and gateway
routes.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 139 of 213
Create the Application Profile
1.
profiles or use the drop down menu in the right panel to start creating a new application profile.
2. Either of the two methods brings a pop-up window for you to define the application profile. You need to
creation step. In this
Figure 224.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 140 of 213
Create EPGs Under the Application Profile
EPGs can be created on the ACI UI at Tenant > Application Profiles > a specific Application.
1. Right clicking on the application profile name under Application Profiles brings up a drop-down menu, you
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 141 of 213
2. Either of the two methods brings out a pop-up window for EPG configuration. In the window, you need to
provide the name of the EPG and the BD you want it to belong to. In this example, we created EPG-Web in
BD-Web n the tenant Prod.
Figure 227. -
3. The same steps are repeated to create the other two EPGs, EPG-App and EPG-DB. EPG-App is in BD-App
while EPG-DB is in BD-
Figure 228.
ACI EPGs need to be associated with physical domains and/or VMM domains so that endpoints can be either
statically binded to EPGs when they are connected to the ACI leaf switch ports, or dynamically classified to
EPGs through ACI and VMM integration. Via physical domain association, an EPG can have static bindings to
leaf ports that have bare metal servers or virtual machines connected to. For virtualized endpoints, ACI provides
seamless integration with Virtual Machine Managers (VMM) to automate the virtual network provisioning in the
VMM domain. In our example, we use VMM domain from EPG-Web and EPG-App, and both VMM domain and
physical domain for EPG-DB.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 142 of 213
1. Associate EPGs with VMM Domains
A VMM domain can be associated with an EPG on the APIC UI under through Tenant > Application Profile >
EPG > Domain. Y
-up menu. Alternatively, you can go to the work panel of the EPG and
-down menu under Policy > General.
2. With either of the two methods, you get a pop-up window to configure the VMM domain association. In the
pop-up window you need to choose the desired VMM domain (in our example, it is ACI_VDS) and the
settings, such as deployment and resolution immediacy, and VLAN mode.
There are two VLAN modes, dynamic and static. If EPG classification can be decoupled from the VLAN ID
assignment, you can use the dynamic VLAN mode to allow ACI to pick a VLAN ID from the VLAN pool of
the VMM domain. ACI will then provision a port-group on the VMM vswitch using the same VLAN ID. The
dynamic VLAN mode provides the most flexibility and simplicity of VLAN ID management. In our example,
we use dynamic VLAN mode. After clicking on the submit button, EPG-Web now is associated with VMM
domain ACI_VDS. Repeat the same steps to associate EPG-App and and EPG-DB with the VMM domain
ACI_VDS.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 143 of 213
Figure 231. Adding VMM domain association
3. In case that you need to statically assign a specific VLAN ID to an EPG, you can use the static VLAN mode
when associating a VMM domain with the EPG. In the static VLAN mode, you can specify the VLAN ID you
want to be used for this EPG. This VLAN ID needs to be in the VLAN pool of the VMM domain. Figure 232 in
below shows an example of creating VMM domain association with the static VLAN mode and using VLAN
100 for the EPG.
Figure 232. Adding VMM domain association with static VLAN mode
With a VMWare vCenter VMM domain, once an EGP is associated with the VMM domain, a corresponding
port-group will be created on the vCenter VDS and ready to be used for virtual machine deployments.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 144 of 213
4. At this stage, if we examine the networking configuration on the vCenter, you can see that on the VDS
created via the ACI VMM integration, three port-groups are created correspondingly for the three EPGs.
Physical domains are added to an EPG at Tenant > Application Profile > Application EPG > Domains (VMs and
Bare Metals).
1.
in the pop-up menu.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 145 of 213
2. You then get a pop-up window to select a physical domain. T
selected. Clicking on the Submit button completes the association of this physical domain with EPG-DB.
Leaf switch ports in the physical domain can be associated with EPGs through static binding.
1. To add static binding to the EPG, you can go to Tenant > Application Profiles > Application EPGs > Static
Ports, then r -
-up window to select the port, PC or VPC.
In the window, you need to choose the path type, the path and the VLAN used for this path. In our example,
we added VPC Server1_PolGrp as the path using VLAN 1501 for encap. Note that this VLAN ID needs to be
in the VLAN pool associated with Server1_PolGrp through its AEP. Then click on the Submit button, this
path binding is created.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 146 of 213
2. You can see the path is added to EPG-DB.
An alternative way to add static bindings to an EPG is to add the EPG to the Attachable Access Entity Profile
(AEP) that has all the ports that you want to add to the EPG. This method is more convenient to add a large
number of static ports to an EPG.
1. Navigate to Fabric > Access Policies > Policies > Global > Attachable Access Entity Profile, in the work
p
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 147 of 213
2. It will trigger the prompts for you to specify the EPGs you want to add to this AEP, including the tenant,
application profile, EPG and Encap
complete the process of adding the EPG to the AEP. You will see the EPG being added and listed in the
AEP.
3. Effectively, the EPG is associated with all the ports in the AEP with the specified VLAN encap.
With its white-list model, by default ACI only allows communication between EPGs that is explicitly permitted
with contracts. Therefore, the natural next step after creating EPGs is to create and apply contracts.
Create Filters
A contract can consist of 1 or more subjects that each contains 1 or more filters. Filters are used to classify
traffic based on its Layer 2 to Layer 4 attributes.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 148 of 213
1. Start with creating filters. Navigate
-down menu in the right view panel.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 149 of 213
2. In the pop-up window to create filter, you need to provide a name for the filter, then add entries. Each entry
defines a type of L2-4 traffic with the attributes such as Ethernet type, IP protocol, source port range,
destination port range, etc. In this example -permit-
Ethernet traffic.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 150 of 213
3. For simplification purpose, we use this permit-all filter for our contracts throughout our example. In
production environments, contracts with filters to allow specific traffic types are often used.
Figure 245. Example of creating a filter to permit all traffic (finished view)
The following figures provides more example filters to match ICMP, HTTPS, or SSH traffic.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 151 of 213
Figure 248. Example contract filter to permit SSH traffic
Create Contracts
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 152 of 213
2. With either of the two methods, you get a pop-up window shown below to provide the name and the scope
of the contract, as well as the option to add subjects. We then create the contract Web-App with VRF
scope as it is a contract to control the communication between two EPGs in a same VRF.
3. A sub-
.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 153 of 213
4. In this window, you need to add filters to the subject. In this example, we use the filter fltr-permit-all in VRF
Prod to create subject sbjct-permit-all in the contract Web-App.
5. Once you provide the needed input for the filter, including the filter name, description, action and priority,
After all the needed filters are added, you
configuration and return to the contract window.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 154 of 213
6. After adding all needed subjects, you can submit the contract configuration by
button. It will close out the contract creation window as well.
7. Follow the same steps, we create the contract App-DB as well. The contracts show up under Tenant >
Contracts> Standard.
The next step now is to apply the contract between the EPGs. When a contract is used to allow communication
between two EPGs, one of the EPG is a provider of the contract whereas the other is the consumer of the
contract. Therefore, when applying a contract to an EPG, you need to specify if the contract is provided or
consumed by this EPG.
Table 4. IP Addressing
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 155 of 213
App-DB EPG-DB EPG-App
1. To add a provided contract to an EPG, you go to Tenant > Application Profile > Application EPG ->
-
down menu in the right panel to choos
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 156 of 213
2. Either of the methods gives you the pop-up window to choose a contract. The following example adds the
contract Web-App as a provided contract to EPG-App.
3. Choose the contract Web-App, then click on Submit. It finishes the process of adding the contract Web-
App as a provided contract to EPG-App.
4. Next, apply the contract Web-App as a consumed contract to EPG-Web. Following the same work flow as
adding a provided contract, add a consumed contract to an EPG. In the example captured in the figures,
the contract Web-App is added as a consumed contract to EPG-Web.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 157 of 213
Figure 262. Adding a consumed contract to EPG-Web
Repeat the same steps to add the contract App-DB as a provided contract to EPG-DB and a consumed
contract to EPG-App.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 158 of 213
5. Now, you have an application network profile for the three-tier App1 deployed with the topology shown in
the following figure.
With this network profile, the communication between EPG-Web and EPG-App is enforced by the contract
Web-App, whereas the communication between EPG-App and EPG-DB is enforced by the contract App-DB.
■ Unenforced VRF
■ vzAny
■ Preferred Group
Unenforced VRF
By default, security policies are enforced among EPGs in a VRF, but this enforcement can be disabled for the
entire VRF. When it is disabled for a VRF, all EPGs within this VRF can communicate with one another without
the requirements of contracts. We disable policy control enforcement for VRF1. It is done under Tenant > VRF,
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 159 of 213
Figure 265. Disabling policy control enforcement in VRF1
vzAny
EPGs associated with a given VRF instance, including the Layer 3 external EPG (L3out EPG). This concept is
useful when a configuration has contract rules that need to be applied across all the EPGs in the same VRF.
vzAny is a per-VRF object. You can apply a contract to vzAny of a VRF by adding it as a provided contract or a
consumed contract to the vzAny. When a contract is applied to the vzAny, all the EPGs in the VRF assume the
configured role of the contract in terms of policy enforcement based on the contract. To add contracts to the
vzAny, you go to Tenant > Networking > VRF > EPG Collection for VRF, under Policy > General in the right
panel, you can add provided contracts or consumed contracts. In our example, we make the VRF1 vzAny as
both the provider and the consumer of our permit-all contract, which effectively allows open communication
among all our EPGs in VRF1.
vzAny is also an effective tool to reduce TCAM resource consumption for a design that has a set of common
policies applied to all the EPGs in a VRF. For example, you add a set of management tools to our example, and
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 160 of 213
put them in a new EPG named EPG-Mgmt. Yu need all the tools to communicate with all the three EPGs in our
example, so you create a contract named Contract-Mgmt, and you want to make the three application EPGs as
the providers of the contract, and the EPG-Mgmt as the consumer. Without using vzAny, you need apply the
contract configuration to all the EPGs, and the contract rules will be programmed three times in a leaf switch
TCAM table. Now consider using vzAny in VRF1. You can make the VRF1 vzAny as the provider of Contract-
mgmt while EPG-Mgmt as the consumer. It automatically make all the EPGs in VRF1 as the provider of
Contract-mgmt. You get the same communication policy relationship, but the contract rules are only
programmed once in the leaf TCAM table. The TCAM consumption is reduced to 1/3 of what is needed without
vzAny. The figure below shows the comparison of with and without using vzAny. In production, the number of
EPGs in a VRF can be much greater than 3. To apply this kind of common contract to all the EPGs by using
vzAny, you reduce the TCAM utilization to 1/N where N is the number of EPGs in the VRF. Figure 267 shows the
comparison between applying contracts to individual EPGs and using vzAny.
Contract Contract
Management Management
EPG-Mgmt EPG-Mgmt
For more details about vzAny, please refer to the following document:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/kb/b_KB_Use_vzAny_to_Automatica
llyApplyCommunicationRules_toEPGs.html
Note: When using vzAny with shared services contracts, vzAny is supported only as a shared services
consumer, not as a shared services provider.
The contract preferred group feature enables simpler control of communication between EPGs in a VRF. If most
of the EPGs in the VRF should have open communication, but a few should only have limited communication
with the other EPGs, you can configure a combination of a contract preferred group and contracts with filters to
control inter-EPG communication precisely.
When contract preferred group is enabled for a VRF, each EPG in the VRF is either included or excluded in the
preferred group. EPGs that are included in the preferred group can freely communicate with one another
without contracts. EPGs that are excluded from the preferred group EPGs require contracts to communicate
with one another and require contracts to communicate with any EPGs that are in the preferred group (the
default behavior of ACI policy model). The following figure shows the contract requirement rules for preferred
group.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 161 of 213
Figure 268. Contract enforcement rules for preferred group
VRF
Open Communication
within Preferred Group. Preferred Group
EPG-VLAN10, EPG- L3Out
VLAN20, EPG-VLAN30
and External EPG can all EPG EPG EPG External
VLAN10 VLAN20 VLAN30 EPG
talk to each other in this
example
1.
It is done at Tenant > Networking > VRF > EPG Collection for VRF. Under Policy > General in the right panel,
It is done under Tenant > Application Profile > Application EPG. Under Policy > General in the right panel for
We
add EPG-Web and EPG-App into the preferred group, while leaving EPG-DB excluded from the preferred
group.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 162 of 213
Figure 270. Adding EPG-Web into the preferred group
With this configuration, EPG-Web and EPG-App can talk with each other without any contract whereas EPG-DB
is still under white-list-based contract control. In order to allow EPG-App to talk to EPG-DB, you still need to
apply a contract between them. Figure 272 depicts the communication relationship among the three EPGs with
the preferred group configuration in this example.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 163 of 213
Figure 272. Communication relationship among the three EPGs in App1
VRF1
Preferred Group
Open
EPG Communication
EPG
Web App
No need for
contract
Contract
App-DB
EPG
DB
L3out
Cisco ACI refers to external Layer 3 connectivity as a L3out, which allows you to use standard Layer 3
technologies to connect to external network. These can be Layer 3 connections to an existing network, WAN
routers, firewalls, mainframes, or any other Layer 3 device. This section describes design and step-by-step
configuration example of L3out. This document focuses on two common design use cases:
■ North-South L3out Design: Contract between L3out EPG and regular EPG for North-South traffic. This to
connect ACI fabric to external network
■ Transit L3out Design: Contract between L3out EPGs. This is to use ACI fabric as a transit network.
■ Design overview
■ Configuration steps
In this section, you are going to add L3outs and contracts for the L3outs to the tenant design in previous
section. If you use unenforced, preferred group or vzAny contract, you might not need a contract.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 164 of 213
Figure 273. Contract External-Web between L3Out1 and EPG-Web
In addition to contract design, a connectivity to external network should be taken into consideration. The
following choices are available for external connectivity:
■ Use a pair of leaf nodes as both the computing and VRF-lite L3Out border leaf nodes (or border leaf for
short). These leaf nodes are used to connect endpoints and to connect to WAN or campus routers.
■ Use a dedicated pair of border leaf nodes. In this case, no servers connect to the leaf. Connections are only
to WAN or campus routers.
■
document)
Then, the following interface options are available for a connectivity between border leaf and external device
■ Routed interface: This is common when each router physical interface is dedicated to a VRF.
■ Routed sub-interface: This is common when router physical interfaces are shared by multiple tenants or
VRFs.
■ SVI (Switch Virtual Interface): This is common to connect service devices, for example Firewall and Load-
balancer, via port-channel or vPC and to share service device physical interfaces.
ACI supports Layer 3 connections using static routing (IPv4 and IPv6) or the following dynamic routing
protocols:
The following figure illustrates what is going to be covered in this document: Use of pairs of border leaf nodes
and routed sub-interface connectivity to external router by using OSPF network type point-to-point. From
border leaf nodes, ACI fabric advertises the subnet of EPG-Web (BD-Web: 192.168.21.0/24) to external. From
external routers via border leaf nodes, ACI fabric learns 0.0.0.0/0 external network. 0.0.0.0/0 is used for
L3Out1 external EPG classification.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 165 of 213
■ Routed sub-interface
■ OSPFv2 (IPv4)
Note: L3out is used to configure interfaces, protocols and protocol parameters necessary to provide IP
connectivity to external routing devices. Part of the L3Out configuration involves also defining an external
network (also known as an external EPG) for the purpose of access-list filtering. The external network is used to
define which subnets are potentially accessible through the L3out connection. In above figure, 0.0.0.0/0 is used
for L3Out1 external EPG classification, which means the networks 0.0.0.0/0, all possible routes, is accessible
through an L3Out connection. If you want to let only particular external network subnet access to an EPG in ACI
fabric, more specific subnet configuration for L3out external EPG is required. For example, if you have
10.0.0.0/24 as L3Out1 external EPG classification, only 10.0.0.0/24 external network is accessible from EPG-
Web through L3out connection.
1. Create a L3Out
The rest of this section detailes the steps for the L3Out1 configuration.
The following table and figure show the IP addressing used in this document.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 166 of 213
Table 5. IP Addressing
Create a L3Out
You are going to create L3Out1 with routed sub-interface and OSPFv2.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 167 of 213
1. Navigate to Tenant > Networking > External Routed Networks > Create Routed Outside
2. In the Create Routed Outside wizard, select VRF and Routing Protocol.
■ Name: L3Out1
■ VRF: VRF1
■ Check OSPF
■ Add Node and Interfaces Protocol Profiles by clicking + icon on the bottom.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 168 of 213
Figure 277. Select VRF and Routing Protocol
■ Name: L3Out1-NP
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 169 of 213
4. Select Node pop-up appears. Then, add Node Leaf101 and repeat same steps for Leaf102, 103 and 104.
■ Name: Leaf101(Node-101)
■ Name: Leaf102(Node-102)
■ Name: Leaf103(Node-103)
■ Name: Leaf104(Node-104)
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 170 of 213
5. Verify Nodes are added and add OSPF Interfaces Profiles by clicking + icon.
■ Name: L3Out1-IP
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 171 of 213
7. Then, create OSPF Interface policy. Select Create OSPF Interface Policy from the OSPF Policy pull-down
menu.
8. Create OSPF Interface Policy pop-up appears. Select Point-to-point and submit.
■ Name: Point-to-point
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 172 of 213
9. Verify Point-to-point is selected and click Next.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 173 of 213
11. Select Routed Sub-interface pop-up appears. Select Leaf101 interface and repeat same steps for Leaf102,
103 and 104 interfaces.
■ Node: Leaf101
Path: eth1/33
o Encap: 1202
■ Node: Leaf102
Path: eth1/33
o Encap: 1202
■ Node: Leaf103
Path: eth1/5
o Encap: 1202
■ Node: Leaf104
Path: eth1/1
o Encap: 1202
Note: The default MTU configuration is inherit that means 9000 bytes. You may need to change it based on
MTU of your external router interface.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 174 of 213
12. Verify Routed Sub-interfaces are added and click OK.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 175 of 213
14. Verify Node Profile is added and click Next.
■ Name: L3Out1
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 176 of 213
Figure 291. Create External EPG Network
17. Create Subnet pop-up appears. Specify 0.0.0.0/0 that means all external route in this VRF is classified to
the L3Out1 EPG.
■ IP Address: 0.0.0.0/0
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 177 of 213
18. Verify External EPG Network is added and click Finish.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 178 of 213
19. Once you click Finish, you can see External EPG L3Out1 under the L3Out1.
Now Border leaf nodes have OSPF interfaces. If external routers are also configured accordingly, border leaf
nodes have OSPF neighbor established and external routes learned from external routers.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 179 of 213
Hello timer due in 00:00:10
No authentication
to
external, contract and BD subnet scope need to be configured accordingly.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 180 of 213
Router1# show ip route ospf vrf Prod:VRF1
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 181 of 213
20. The location is at Tenant > Networking > Bridge Domains > Bridge Domain > Subnets > Subnet
In addition to this, Associated L3 Outs need to be specified. So that ACI fabric administrator can manage
which external network the subnet is advertised.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 182 of 213
21. From Tenant > Networking > Bridge Domains > Policy > L3 Configurations, add Associated L3 Out by
clicking + icon and select L3Out1.
Then, border leaf starts advertising BD-Web subnet 192.168.21.0/24 to external router of L3Out1. Now you can
see 192.168.21.0/24 on external routers.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 183 of 213
10.1.1.4/32, ubest/mbest: 1/0
Finally, you are going to create a contract External-Web for between External EPG L3Out1 and EPG-Web.
Otherwise external traff -Web as the traffic is not permitted by ACI contract
even though routes are there. If you use network centric tenant that has vzAny contract, you may skip this step.
1. Navigate to Tenant > Contracts. Then, Create Contract pop-up appears. In this example, we are going to
reuse a filter that was created in previous section.
■ Name: External-Web
Filter: ftr-permit-all
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 184 of 213
Figure 297. Create contract
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 185 of 213
2. Verify subject is added and click Submit.
3. Then, configure contract for EPG-Web as provider and for External EPG L3Out1 as consumer.
For EPG-Web, the location is at Tenant > Application Profiles > APP1 > Application EPGs > EPG-Web >
Contracts. Then, Add Provided Contract pop-up appears.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 186 of 213
4. For External EPG L3Out1, the location is at Tenant > Networking> External Routed Networks > L3Out1 >
Networks > L3Out1 > Policy > Contracts > Consumed Contracts.
5. Once a contract between EPGs are configured, endpoint in EPG-Web can communicate with IP in L3Out1.
For example, external client 172.16.10.1 can ping to 192.168.21.11 in EPG-Web.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 187 of 213
Figure 303. Ping from external client to an endpoint in EPG-Web
By default, Cisco ACI will not advertise routes learned from one L3out to another L3out. The Cisco ACI does not
allow transit by default. Transit routing is controlled by creating export route control policies for a L3Out. It
means you need to specify which route learned from a L3out should be exported to which L3out.
The following figure illustrates the example covered in this document where we use a dedicated pair of border
leaf nodes and SVI on vPC with static route for external router for L3Out2. From L3Out1 border leaf nodes, ACI
fabric advertises the subnet 172.16.20.0/24 from L3Out2 to external.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 188 of 213
■ Dedicated pair of border leaf nodes for L3Out2
Note: Not all transit routing combinations are currently supported in ACI. For information about the currently
supported transit routing combinations, see the Cisco APIC and Transit Routing document at the following URL:
http://www.cisco.com/c/en/us/support/cloud-systems-management/application-policy-infrastructure-
controller-apic/tsd-products-support-series-home.html
The rest part of this session detailed the steps for a configuration of a contract between L3Out1 and
L3Out2.
The following table and figure show the IP addressing that we are going to use in configuration steps.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 189 of 213
Table 6. IP addressing
External router IP (Interface vlan 1222) 172.16.22.1 (next hop for static
route)
Similar to L3Out1 configuration, you are going to create L3Out2 with SVI on vPC interface and static route
configuration.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 190 of 213
1. Navigate to Tenant > Networking > External Routed Networks > Create Routed Outside
2. Create Routed Outside wizard appears. Select VRF and Routing Protocol. In this example, External Routed
Domain needs to be specified as we are going to use SVI on vPC interface.
■ Name: L3Out2
■ VRF: VRF1
■ Add Node and Interfaces Protocol Profiles by clicking + icon on the bottom.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 191 of 213
Figure 308. Select VRF and External Routed Domain
■ Name: L3Out2-NP
4. Select Node pop-up appears. Add Node Leaf105 and add its static route. Then, repeat same steps for
Leaf106.
■ Name: Leaf105(Node-105)
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 192 of 213
Prefix: 172.16.20.0/24
Preference: 1
■ Name: Leaf6(Node-106)
Prefix: 172.16.20.0/24
Preference: 1
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 193 of 213
5. Create Static Route pop-up appears.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 194 of 213
6. Verify Nodes are added and add Interfaces Profiles by clicking + icon.
7. Create Interface Profile wizard appears. In this example, you are going to skip protocol profile setting by
unchecking Config Protocol Profiles.
■ Name: L3Out2-IP
■ Select SVI
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 195 of 213
■ Add SVI Interfaces by clicking + icon.
9. Select SVI pop-up appears. You are going to configure vPC interface between Leaf5 and Leaf6.
■ Path: Router3_PolGrp
Note: Secondary IP address is common IP for both Side A and Side B, which is the floating IP for the vPC
pair leaf nodes. External router uses the secondary IP as next-hop IP toward the ACI fabric.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 196 of 213
10. Verify SVI is added and click OK.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 197 of 213
11. Verify Interface Profile is added and click OK.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 198 of 213
13. Create External EPG Network by clicking + icon.
14. Create External EPG Network pop-up appears. Create Subnet by clicking + icon.
■ Name: L3Out2
■ IP Address: 172.16.20.0/24
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 199 of 213
Create External EPG Network for L3Out2
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 200 of 213
17. Verify External EPG Network L3Out2 is added and click Finish.
18. Once you click Finish, you can see External EPG L3Out2 under the L3Out2.
Border leaf nodes (Leaf105 and Leaf106) have SVI interfaces and the static route created.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 201 of 213
vlan16, Interface status: protocol-up/link-up/admin-up, iod: 97, mode:
external
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 202 of 213
10.1.1.2/32, ubest/mbest: 1/0
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 203 of 213
*via 10.0.224.70%overlay-1, [200/8], 00:02:10, bgp-65551, internal,
tag 65551
Other leaf nodes (Leaf101, 102, 103 and 104) learn external route 172.16.20.0/24 via BGP in ACI fabric.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 204 of 213
10.1.1.3/32, ubest/mbest: 1/0
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 205 of 213
*via 10.0.224.68%overlay-1, [200/0], 00:03:43, bgp-65551, internal,
tag 65551
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 206 of 213
*via 172.16.21.1, Eth1/1.1202, [110/20], 00:41:54, ospf-1, type-2
To advertise transit route, Export Route control subnet needs to be configured. You are going to configure
Export Route control subnet in L3Out1 EPG to advertise 172.16.20.0/24.
1. From Tenant > Networking > External Routed Networks > L3Out1 > Networks > L3Out1, add Subnet by
clicking + icon.
■ IP Address: 172.16.20.0/24
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 207 of 213
Figure 325. Add Export Route Control Subnet in L3Out1 EPG
Border leaf nodes 101, 102, 103 and 104 start advertising transit route 172.16.20.0/24. Thus, external Router1
and 2 learn 172.16.20.0/24.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 208 of 213
'[x/y]' denotes [preference/metric]
Note:
you need to advertise a transit route to L3Out2, you need to add Export Route Control Subnet in L3Out2 EPG
too.
Then, you are going to create a contract External for between External EPG L3Out1 and External EPG L3Out2.
In this example, we are going to reuse a filter that was created in previous section.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 209 of 213
■ Name: Transit
■ Add subject by clicking + icon. Then, Create Contract Subject pop-up appears.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 210 of 213
Figure 328. Create contract subject
3. Then, configure contract for External EPG L3Out1 as consumer and for External EPG L3Out2 as provider.
For External EPG L3Out1, the location is at Tenant > Networking> External Routed Networks > L3Out1 >
Networks > L3Out1 > Policy > Contracts > Consumed Contracts.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 211 of 213
Figure 330. Configure contract for External EPG L3Out1
For External EPG L3Out2, the location is at Tenant > Networking> External Routed Networks > L3Out2 >
Networks > L3Out2 > Policy > Contracts > Provided Contracts.
Once a contract between L3Out EPGs are configured, IP in L3Out1 can communicate with IP in L3Out2. An
external client 172.16.10.1 behind L3Out1 can ping to an external client 172.16.20.1 behind L3Out2.
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 212 of 213
Figure 332. External connectivity
Figure 333. Ping from an external client behind L3Out1 can ping to an external client behind L3Out2
Cisco Systems. All printed copies and duplicate soft copies are considered uncontrolled
and the original online version should be referred to for the latest version.
Page 213 of 213