You are on page 1of 44

Security and Policy for Cisco ACI

Customer Experience, Cisco Systems G.K.


2021/9/2
• セキュリティポリシーモデルの概要
• コントラクトとは?
• Demo
Agenda コントラクトの作成・適用
• コントラクトの簡素化
• Demo
プリファードグループとvzAny

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
コントラクトの作成
・Step1 Filterの作成

Webフィルタの作成
Tenantsタブ -> SVSProd
[Navigation]ペイン
Contracts -> Filtersを右クリック -> Create Filter
Name: Web_Filt
Entries 「+」を押下
Name: http
EtherType: IP
IP Protocol: tcp
Destination Port / Range:
From: http
To: http
Update
Entries 「+」を押下
Name: https
EtherType: IP
IP Protocol: tcp
Destination Port / Range:
From: https
To: https
Update
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

Submit
コントラクトの作成 – Cont.
・Step1 Filterの作成 – Cont.

ICMPフィルタの作成
Contracts -> Filtersを右クリック -> Create Filter
Name: ICMP_Filt
Entries 「+」を押下
Name: ping
EtherType: IP
IP Protocol: icmp
Update
Submit

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
コントラクトの作成 – Cont.
・Step2 Contractの作成

Internal_Server_Accessコントラクトの作成
[Navigation]ペイン
Contracts -> Standardを右クリック -> Create Contract
Name: Internal_Server_Access
Subjects「+」を押下
Name: Default_Sjt
※先程お話した「Apply Both Directions」と「Reverse Filter Ports」の設定がこちらで確認できる
(デフォルトは有効となっている)
Filters「+」を押下
Name: 「Web_Filt」を選択
Update -> OK

Subjects「+」を押下
Name: Test_Sjt
Filters「+」を押下
Name: 「ICMP_Filt」を選択
Update -> OK
Submit

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
コントラクトの適用
・作成したContractをEPGに紐付ける
Provide側のEPGの紐付け
[Navigation]ペイン
Application Profiles -> SVS_AP -> Application EPGs -> 10_EPG –> Contractsを右クリック ->
Add Provide Contract (サービスを提供する側)
Contract: 「Internal_Server_Access」を選択
Submit

Consume側のEPGの紐付け
[Navigation]ペイン
Application Profiles -> SVS_AP -> Application EPGs -> 40_EPG –> Contractsを右クリック ->
Add Consumed Contract (サービスを提供される側)
Contract: 「Internal_Server_Access」を選択
Submit

・紐付け確認
[Navigation] ペイン
Application Profiles -> SVS_AP -> Topologyタブ

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
40_EPGに所属しているクライアントから
10_EPGに所属しているサーバに対して
Port 80, 443, Icmpの疎通が可能となる

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
ブラックリスト方式のコントラクト
・Step0 コントラクトの紐付けを削除
[Navigation]ペイン
VLAN100_EPGとコントラクトの紐付けを削除
Application Profiles -> SVS_AP -> Application EPGs -> 10_EPG –> Contracts
Internal_Server_Accessを右クリック -> Delete -> Yes

VLAN200_EPGとコントラクトの紐付けを削除
Application Profiles -> SVS_AP -> Application EPGs -> 40_EPG –> Contracts
Internal_Server_Accessを右クリック -> Delete -> Yes

Contractが無いことを確認
Application Profiles -> SVS_AP -> Topologyタブ

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
ブラックリスト方式のコントラクト – Cont.
・Step1 All Permit Filterの作成
Contracts -> Filterを右クリック -> Create Filter
Name: Permit_Filt
Entries 「+」を押下
Name: All
EtherType: IP
IP Protocol: Unspecified
Update
Submit

・Step2 All Permit Contractの作成


Contracts -> Standardを右クリック -> Create Contract
Name: Permit_ALL
Subjects「+」を押下
Name: Permit_Sjt
Filters「+」を押下
Name: 「Permit_Filt」を選択
Update -> OK
Submit

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
ブラックリスト方式のコントラクト – Cont.
・Step3 Denyの設定
[Navigation]ペイン
Contracts -> Standard -> Permit_ALL -> Permit_Sjt
Filters: 「+」押下
Filter: 「Web_Flt」を選択
Action: Deny
Submit

Filters: 「+」押下
Filter: 「ICMP_Flt」を選択
Action: Deny
Submit

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
ブラックリスト方式のコントラクト – Cont.
・Step4 作成したContractをEPGに紐付ける
Provided側のEPGの紐付け
[Navigation]ペイン
Application Profiles -> SVS_AP -> Application EPGs -> 10_EPG –> Contractsを右クリック ->
Add Provide Contract (サービスを提供する側)
Contract: 「Permit_ALL」を選択
Submit

Consumed側のEPGの紐付け
[Navigation]ペイン
Application Profiles -> SVS_AP -> Application EPGs -> 40_EPG –> Contractsを右クリック ->
Add Consumed Contract (サービスを提供される側)
Contract: 「Permit_ALL」を選択
Submit

・Step5 紐付け確認
[Navigation]ペイン
Application Profiles -> SVS_AP -> Topologyタブ

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
40_EPGに所属しているクライアントから
10_EPGに所属しているサーバに対して
Port 80, 443, Icmpの疎通が不可となる

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
ブラックリスト方式のコントラクト – Cont.
・Step1 All Permit Filterの作成
Contracts -> Filterを右クリック -> Create Filter
Name: Permit_Filt
Entries 「+」を押下
Name: All
EtherType: IP
IP Protocol: Unspecified
Update
Submit

・Step2 All Permit Contractの作成


Contracts -> Standardを右クリック -> Create Contract
Name: Permit_ALL
Subjects「+」を押下
Name: Permit_Sjt
Filters「+」を押下
Name: 「Permit_Flt」を選択
Update -> OK
Submit

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Preferred Groupの設定
・Step1 VRF単位のPreferred Groupの有効化

Tenantタブ -> SVSProd


[Navigation]ペイン
Networking -> VRFs -> SVSProd_VRF

[Work}ペイン
Policyタブ
Preferred Group: 「Enabled」を選択

Submit -> Submit Changes

© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Preferred Groupの設定 – Cont.
・Step2 EPGごとのPreferred Groupの有効化
10_EPGの設定
[Navigation]ペイン
Application Profiles -> SVS_AP -> Application EPGs -> 10_EPG
[Work]ペイン
Policyタブ -> Generalタブ
Preferred Group Member: Include
Submit -> Submit Changes

20_EPGの設定
[Navigation]ペイン
Application Profiles -> SVS_AP -> Application EPGs -> 20_EPG
[Work]ペイン
Policyタブ -> Generalタブ
Preferred Group Member: 「Include」を選択
Submit -> Submit Changes

30_EPGの設定
[Navigation]ペイン
Application Profiles -> SVS_AP -> Application EPGs -> 30_EPG
[Work]ペイン
Policyタブ -> Generalタブ
© 2021Preferred Group
Cisco and/or its affiliates. Member:
All rights Include
reserved. Cisco Confidential 35

Submit -> Submit Changes


Preferred Groupを有効にした全ての
EPG間はAll Permitとなっている
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
vzAnyの設定
設定項目は「vzAny」という名前ではなく、「EPG Collection for VRF」という設定項目

[Navigation]ペイン
Networking -> VRFs -> SVSProd_VRF -> EPG Collection for VRF
Provided Contracts, Consumed Contractsの2つの設定があるが、今回はサービスを提供する側としてvzAnyを設定する
Provided Contractsの「+」を押下
Name: 「Internal_Server_Access」を選択
Update

Consume側の設定は40_EPGに対して実施
[Navigation]ペイン
Application Profiles -> SVS_AP -> Application EPGs -> 40_EPG –> Contractsを右クリック ->
Add Consumed Contract
Contract: 「Internal_Server_Access」を選択
Submit

Topologyを確認
[Navigation]ペイン
Application Profiles -> SVS_AP
[Work]ペイン
Topologyタブ
Topology上はVRFに含まれるすべてのもの(AnyEPG)がContract(Internal_Server_Access)として40_EPGに対して
©提供されている状態が設定された
2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
vzAny設定後に40_EPGに所属しているクライアントから
10, 20, 30_EPGに所属している全てのサーバへのPort
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80, 443, ICMPの通信が許可となっている 41
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
© 2021 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43

You might also like