Professional Documents
Culture Documents
Brkaci 1001
Brkaci 1001
#CLUS
Agenda
• Day 1: Why ACI?
• Day 2: Infrastructure and Policies
• Day 3: Forwarding Overview
• Day 4: Network Centric Migrations
• Day 5: Multi Location Deployments
• Day 6: Troubleshooting Tools
• Day 7: Additional Resources
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Live Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Acronyms/Definitions Reference Slide Icon
EP Endpoint
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Day 1: Why ACI?
Why ACI?
Challenges of Today
Management
• CLI to every Device
• Manual Configuration – Takes Time
Core
• Coordination between Network and
Server Team
• Harder as we scale!
Dist
Functionality
• Static Configuration
• Allow all Traffic by Default
• Spanning Tree to Prevent Loops
Access
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Why ACI?
ACI Overview Application Centric Infrastructure
Software Defined Networking built on Nexus 9000
Control Plane is Decoupled From the Data Plane
Spines
Spine1# show module
Mod Ports Module-Type Model Status
--- ----- ----------------------------------- --------------- ------
2 32 32p 40/100G Ethernet Module N9K-X9732C-EX ok
22 0 Fabric Module N9K-C9504-FM-E ok
23 0 Fabric Module N9K-C9504-FM-E ok
24 0 Fabric Module N9K-C9504-FM-E ok
26 0 Fabric Module N9K-C9504-FM-E ok
27 0 Supervisor Module N9K-SUP-A Active
Leafs 28 0 Supervisor Module N9K-SUP-A Standby
APIC Cluster
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
What is ACI?
ACI Overview
Management
• Fabric is managed by APIC
Spines • All configuration exposed via API
• Switches join fabric in a few clicks!
Functionality
Leafs
• No spanning Tree – ECMP Routing
• Dynamic Configuration
• Whitelist Model (customizable)
APIC Cluster
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
R L3 Routing
Why ACI? V VLAN
Functionality GW Gateway (SVI)
T VXLAN Tunnel Endpoint
(TEP)
T T
ISIS/BGP Overlay
T T T T T T
APIC
GW
GW V
APIC R
APIC External
L2 & L3
Bare Metal Network
APIC Cluster Hypervisors
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Why ACI?
Functionality
VXLAN VNIDs are used to separate layer 2 switching as well as layer 3 routing
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Why ACI?
Management Overview
• Controller status
shows state of the
APIC Cluster.
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Why ACI?
Management Overview
• Faults are
classified based
on severity of the
error
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Why ACI?
Management Overview
Looks like we
had an issue!
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Why ACI?
Management Overview
• Fabric Inventory
and Topology are
centrally
managed.
Clicking on
Objects will drill
down further
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Day 2:
Infrastructure and
Policies
Infrastructure and Policies
APIC Components APIC
ACI MGMT
A S A S
UCS C220
Console
Server
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Infrastructure and Services
CIMC
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Infrastructure and Services
CIMC
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Infrastructure and Services
Required Addressing
1. Infra Subnet
2. Infra VLAN
3. BD Multicast Range
1 4. OOB Network IP’s
(CIMC included)
2
3
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Management - Required Addressing
Planning
Requirements Notes
Infra VLAN VLAN will be reserved for internal ACI communication. Cannot 3967
be deployed toward user servers
APIC OOB IP 1 IP per APIC, has to be out of band. Inband can be configured
later.
Switch 1 IP per switch, can have inband, out of band or both.
Management IP
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Checklist
CIMC
Management
NTP
AAA
Backups
Infrastructure and Services
APIC UI
APIC Management
apic 1
API
APIC Cluster
CLI (ssh)
apic 2
apic 3
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Infrastructure and Services spine 1 spine 2
Switch Management
ACI Fabric
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Checklist
CIMC
Management
NTP
AAA
Backups
Infrastructure and Services
AAA
Allows users to
authenticate with certain
privilege levels
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Infrastructure and Services
AAA jristain@apic1:~> moquery -c aaaModLR | grep -C 12 "2017-02-13T15"
<snip>
# aaa.ModLR
“Oh no! We lost connectivity to id
affected
: 8589940567
: uni/tn-Joey-Tenant/BD-Joey-BD3
servers on February 12th at 3pm cause : transition
EST!?”
changeSet : arpFlood (Old: no, New: yes), unkMacUcastAct (Old: proxy, New: flood)
childAction :
clientTag :
code : E4206171
created : 2017-02-13T15:06:07.249+00:00
descr : BD Joey-BD3 modified
dn : subj-[uni/tn-Joey-Tenant/BD-Joey-BD3]/mod-8589940567
ind : modification
modTs : never
rn : mod-8589940567
sessionId : Ld0sxAcCRfmb2Qb+W+XbUg==
severity : info
status :
trig : config
txId : 4611686018449066821
user : remoteuser-jristain
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Checklist
CIMC
Management
NTP
AAA
Backups
Infrastructure and Services
Backups – Configuration Export
• JSON/XML export of the current fabric
configuration
• Can set on a scheduler
• Exports to a Remote Location
(FTP/SCP/SFTP) - DISASTER RECOVERY
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Infrastructure and Services
Backups - Snapshots
Creates a Config Backup that is stored on the APIC by default
Run on a Per Fabric or Tenant Basis
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Infrastructure and Services
Backups - Snapshots
snapshots
• Can also compare
differences between a Changed To
Changed From
Changed To
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Infrastructure and Services
CIMC, NTP, AAA, and Backup Planning
Requirements Notes
CIMC IP per Unique IP address used for IP KVM built into APIC.
APIC Must use dedicated port
NTP Server NTP Server which all nodes inside fabric will use
User TACAS/ RBAC or RADIUS Server for accounting.
Management Custom local user account can be used too
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Checklist
CIMC
Management
NTP
AAA
Backups
Fabric and Tenant
Policies
Fabric and Tenant Policies
Access Policies S10 S20
vPC Policy
vPC Policy
L1 L2 L3 L4
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Fabric and Tenant Policies
vPC Domain Policy
• No Peer-Link
• No Peer-
Keepalive
• Uses Fabric
Links for
Communication
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Fabric and Tenant Policies
Access Policies S10 S20 103-104 vPC
101-102 vPC
L1 L2 L3 L4
interface port-channel10
switchport mode trunk
vpc 10
interface Ethernet1/10
speed 10000
lldp transmit
lldp receive
channel-group 10 mode active
101-102 vPC
L1 L2 L3 L4
Server BareMetal01-vPC
Server Nexus 7000
N7710-vPC
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
AEP
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Relationship View
Access Policies Workflow Example
Switch Profile Leaf-101 vPC-101-102
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Management - Required Addressing
Planning
Requirements Notes Example
AEP 1 AEP for all Policy groups. Map all domains to this Policy group Prod_AEP
Switch Profile 1 Profile per switch for Orphan Ports, 1 Profile per vPC Domain vPC-101-102, Leaf101,
(Containing both switches) Leaf102
Interface Profile Create a 1 to 1 mapping to switch Profile vPC-101-102, Leaf101,
Leaf102
Policy Group 1 Policy Group per Port-Channel/ vPC. Policy Groups can be N7710-vPC
reused for access ports. Assign AEP to Policy Group
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Access Policies
What is the goal? What are we trying to accomplish?
1) Provide consistent configurations across the whole 3) Define what policies are allowed to be deployed on
fabric. leafs/ports
2) A simplified and well organized configuration, where 4) Restrict Resource deployment in a multi-tenant
policy is defined once and re-used. environment.
Bare Metal
Hypervisors
Pool 1 Pool 2
L2 L3
External External
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Access Policies
Access policies refer to the configuration that is applied for physical and virtual
(hypervisors/VMs) devices attached to the fabric.
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Access Policies SWITCH POLICY
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
vPC Protection Group Policy
vPC Domain 1
vPC Domain 1 vPC Domain 2
Classical vPC Domain configuration ACI vPC Domain configuration
Required configuration of domain, peer-link, and Specify the Domain ID and the two Leaf switch IDs
peer-keepalive link on both devices in domain that form the domain pair
vpc domain 1
peer-keepalive destination 172.168.1.2 / VPC Protection Group
source 172.168.1.1 vrf vpc-keepalive
peer-gateway
ip arp synchronize
Name: vPC-Domain100
ID: 100
interface port-channel 20 Switch1: 101
vpc peer-link
Switch2: 102
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Interface Policies
Used to define a particular policy for a given interface level function. The intention of
Interface Policies is that they are defined once and re-used among interfaces that need
like policies.
Examples:
VPC Domain 1
• LLDP On/Off
• CDP On/Off
• Port-Channel
• LACP
• Mode On
EP1 EP2 EP3
• Storm Control
• MACsec
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Interface Policy Groups
Used to specify which interface policies to be applied to a particular interface type.
It also associates an AEP (which defines which domains are allowed on the interface).
Types:
VPC Domain 1
Access port (EP1)
Access Bundle Groups
• Virtual Port-channel (EP2)
• Port-channel (EP3)
Note: Separate policy groups should be created for each port-channel (standard or VPC) that you
need to configure. All interfaces on leaf that are associated with a particular access bundle group
reside in same channel.
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Global Policy
Pools (Vlan / VXLAN) Pool1 Pool2
A resource pool of encapsulations that can
be allocated within the fabric.
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Global Policy - Attachable Entity Profiles
Configuration:
• Create a VLAN/VXLAN pool with a range
of encapsulations Pool1 Pool2 Pool3 Pool4
• Create a domain (physical, l2/l3 external, DomPhy1 DomVm1 DomL2 DomL3
or VMM) and associate pool
• Associate domain to AEP AEP AEP AEP
• Associate interface policy group to AEP Statics VMs External
switch/interface selectors will apply the
config through the interface policy group
assign to specific ports
1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4
What have we accomplished?
• Specified what domains and
corresponding pools are allowed per
interface in the fabric!
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Port-Channel Policies
Classical vPC Domain configuration ACI Port-Channel Policies
Required configuration of domain, peer-link, and Specify mode, minimum / maximum links, and
peer-keepalive link on both devices in domain related protocol options (relating to LACP)
interface Ethernet1/5-6
lacp port-priority 32768
lacp rate normal
channel-group 10 mode on
interface Ethernet1/10-11
lacp port-priority 32768
lacp rate fast
channel-group 20 mode active
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Access Policy Example
General Configuration (reused for many interfaces): AEP Pool1
1) Configure a physical domain and vlan pool CiscoLive
DomPhy1
2) Create an AEP and associate physical domain
3) Create switch/interfaces profiles for leaf (LEAF101) Switch Profile
• very easy to apply configurations if you create a
switch/interface profile for each leaf and one for each LEAF101
VPC domain pair
Leaf_101
4) Configure Interface policies (LACP / LLDP)
Interface Profile
LACP Active LEAF101
Policies
LLDP Rx / Tx enabled
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Creating Physical Domain / AEP / Vlan Pool
In dropdown:
Click Create Attachable Entity Profile
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Creating Physical Domain / AEP / Vlan Pool
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Creating Physical Domain / AEP / Vlan Pool
In dropdown:
Click Create VLAN Pool
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Create Interface Profile for each leaf / VPC
domain
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Create Switch Profile for each leaf / VPC domain
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Create Switch Profile for each leaf / VPC domain
Enter name
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Create common protocol configurations
Example demonstrates a common lacp port-channel policy
Configure
options/knobs
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Access Policy Example
Interface specific (each time you add a new interface): AEP Pool1
1) Create policy group for device (VPC / PC / Access) CiscoLive
DomPhy1
2) Within the policy group, select the desired policies / AEP
3) Associate interfaces to policy group via desired leaf Switch Profile
profile
• use specific leaf profile if access or PC LEAF101
• use VPC leaf profile if policy group is VPC Leaf_101
Interface Profile
LACP Active PC_Server_1 LEAF101
Policies Policy Groups blk_1/1-2
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Create policy groups
Note:
A separate policy
Descriptive name group should be
created for each
PC/VPC that you will
deploy
Associate your desired
interface policies
(otherwise default)
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Create interface selectors / associate policy
group
Specify interface/range
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Example policy scheme
Switch Profile Leaf101 Leaf101_102
1/1-4
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
VPC Protection Group (example configuration)
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Fabric and Tenant Policies
Tenant Policies S10 S20
Server
Server Nexus 7000
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Fabric and Tenant Policies
Tenant Policies – Key concepts
Tenants are a Logical Grouping containing Policies. Resources in the
Common Tenant can be used in User Tenants
VRFs are used to separate routing tables inside the ACI Fabric. 1 or more VRFs
can be used.
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Fabric and Tenant Policies
Tenant Policies – Key concepts one EPG to another
EPGs defines a collation of policy assigned to a group of devices
Contracts, QoS, SPAN requirements
L4-L7 policies (PBR, Load balancing, Firewalls)
EPG is most commonly determined by ingress VLAN & Port
Contracts are a collection of filters which allow traffic to pass between EPGs
Contacts are similar to access-lists. Consumer is Source, Provider is Destination
Filters contain a list of protocols and ports
EPG
Bridge VRF
ICMP Contract
Domain Tenant
EPG
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Fabric and Tenant Policies
Tenant View
EPGs
Bridge Domains
VRFs
Contracts
BRKACI-1001
#CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Fabric and Tenant Policies
Deploying a VRF
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Fabric and Tenant Policies
Deploying a Bridge Domain
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
N7710# configure terminal
Fabric and Tenant Policies Enter configuration commands, one per line.
N7710(config)# interface port-channel 1
End with CNTL/Z.
Deploying an EndPoint Group N7710(config-if)# switchport trunk allowed vlan add 100
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Fabric and Tenant Policies
Tenant Policies
S10 S20
L2 Path
Server
Server Nexus 7000
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Fabric and Tenant Policies
Planning
Requirements Notes Example
Tenant 1 Tenant can be used company. Tenants can also separate functions of a Prod/Dev
business. NOTE: Shorter names are easier when using CLI
VRF 1 or more VRFs per Tenant PROD-MAIN
DEV-TEST,DEV-PROD
Bridge Domain Recommended to have 1 BD per Legacy VLAN. For Network Centric VLAN_100,VLAN_101
Migrations, 1 BD should be used for each EPG. BD_vMotion
Application Profile Logical Container for EPGs. 1 AP is sufficient in most installations. NOTE: Prod-AP
This is strictly a management entity. No policies are defined on this object.
EndPoint Group Ports/VLANs (static path bindings) are added to EPGs to define what VLAN_100
Endpoints get defined in what EPGs. QOS/Contracts, etc are added to VLAN_101
EPGs. For Network Centric Migrations, 1 EPG should be used for each vMotion
Legacy VLAN.
Contracts Contracts can be re-used across multiple EPGs. If we compare this to an Web
ACL, the Consumer is the Source, and the Provider is the Destination.
Filters Add Required Ports and Protocols to allow communication. Only what is SRC: Any, DST:80
specified in the filter contract will be allowed between EPGs providing SRC: Any, DST:443
and consuming that contract.
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Fabric and Tenant Policies
Tenant Policies S10 S20
VMM enabled EPGs
Static Path
L1 L2 L3 L4
Hypervisor Cluster
Nexus 7000
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Cisco ACI Hypervisor Integration
Application Network Profile
5 EPG EPGAP
EPG DB
WEB P
APIC L/B
F/W
Create Application Policy
APIC Admin
ACI
9
Fabric
Push Policy (Lazy)
1
6
Cisco APIC and Learn location of ESX
4
VMware vCenter Initial Automatically Map Host through LLDP
Handshake EPG To Port Groups
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Fabric and Tenant Policies
Layer 3 Connectivity
S10 S20
Layer 3 Access To
Core L1 L2 L3 L4 Provide External
Access to Server
ACI Layer 2
Server Layer 3
Core
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Basic Connectivity node-103
RID: #
node-104
RID: #
IP: A IP: B
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Fabric and Tenant Policies
Creating a Layer 3 Out
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Fabric and Tenant Policies
Route Reflectors
Server
0.0.0.0/0
10.0.0.0/24
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Fabric and Tenant Policies
Route Reflectors S10 S20
L1 L2 L3 L4
192.168.160.64 192.168.160.65
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Fabric and Tenant Policies
Planning
BGP Route Use an AS Number not already in your environment. The AS number is 65000
Reflector only exposed to the external network when peering BGP with devices.
Private AS number can be used. NOTE: CHANGING THE AS NUMBER
IS DISRUPTIVE!
External Routed This is your Layer 3 Object. It contains the entire Layer 3 path L3out-To-Core
Network configuration.
Node Profile Defines which nodes are part of the Layer 3 out Domain. Here is Leaf101, Leaf102
where you define your Router ID’s and Static Routes. Leaf101-102
Logical Interface Defines which interfaces are used for peering. Support Types are Port10
Profile Routed Interfaces, Routes Sub-Interfaces, and SVIs. This is also vPC-To-Core
where you define the IP/MTU/VLAN is SVI or Sub-Interface.
Networks (External This is where you define the external subnets you want to apply policy Ext_EPG 0.0.0.0/0 subnet
EPG) to. You do this by listing the subnets and applying contracts. NOTE:
multiple all 0’s subnets should not be configured in the same VRF.
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Fabric and Tenant Policies
Layer 3 Connectivity
S10 S20
Layer 3 Access To
Core L1 L2 L3 L4 Provide External
Access to Server
ACI Layer 2
Server Layer 3
Core
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Day 3: Forwarding
Overview
What is an Endpoint?
Traditional Endpoint
L3 – ARP Table
- IP / MAC
000a.000a.000a 000b.000b.000b
- Interface
192.168.1.100/24 192.168.2.100/24
- VRF
N5K# show ip arp vrf default | grep 000a N5K# show ip arp vrf default | grep 000b
192.168.1.1 00:00:01 000a.000a.000a Vlan10 192.168.2.1 00:00:01 000b.000b.000b Vlan20
N5K# show mac address-table | grep 000a N5K# show mac address-table | grep 000b
10 000a.000a.000a dynamic 0 Eth1/1 20 000b.000b.000b dynamic 0 Eth1/2
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
What is an Endpoint?
Eth1/1 Eth1/2
ACI Endpoint 10 20
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
What is an Endpoint?
Eth1/1 Eth1/2
ACI Endpoint 10 20
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Endpoint Learning - ARP
ACI Leafs learn via ARP!
Eth1/1 Eth1/2
Hdr/Opcode Hdr/Opcode
Frame Unicast Routing? EP Contents
Sender MAC 000a.000a.000a
ARP No MAC (Sender MAC)
Sender IP 192.168.1.100
ARP Yes MAC (Sender MAC),
Target MAC 0000.0000.0000 IP (Sender-IP)
Target IP 192.168.1.101
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Endpoint Learning– Routed Packets
Routed Packet triggers an EP Learn
Eth1/1 Eth1/2
000a.000a.000a 000b.000b.000b
DMAC BD MAC 192.168.1.100/24 192.168.2.100/24
EPG1 EPG2
SMAC 000a.000a.000a
802.1Q 10
Frame Unicast Routing EP Contents
SIP 192.168.1.100 IPV4/6 Yes MAC (L2 SRC MAC),
IP (SRC IP)
DIP 192.168.2.100
Protocol 1
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Proxy Routing
3 EP synced to
• Leafs report EP’s to spine other Spines
once Learnt EP published
to Spine
S10 S20
• Spines maintain a database 2
of all Endpoints Learnt in the
Fabric, and on what Leaf(s)
they exist.
• Used for “Hardware Proxy” EP L1 L2 L3 L4
BD Mode. learnt
on Leaf
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
ARP Optimization – Unicast Routing
EP1 ARP’s for EP2
• ACI can Unicast ARP to avoid
unnecessary Flood traffic. S10 S20
Requires Unicast Routing on 3 Spine knows Target
BD IP is on L3, Unicast
2 L1 doesn’t to L3
know Target
IP Send to L3 learns EP1 from
Spine! L1
L1 L2 L3 L4
BD1 BD1
ARP
1 Received
on L1 4 L3 sends
ARP to EP2
000a.000a.000a 000b.000b.000b
192.168.1.100/24 192.168.1.101/24
EP1 - EPG1 EP2 - EPG1
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
ARP Flooding
EP1 ARP’s for EP2
• Behavior is the same as
Traditional Switches S10 S20 ARP is flooded
3 to all leafs that
• ARP is flooded using BD
Multicast Group to all Leafs have the BD
that have the BD 2 Flooded
ARP is
in
BD, copy to
Spine
ARP L1 L2 L3 L4
1 Received
on L1 BD1 BD1 BD1
L2 sends
4 ARP out
ports in BD
L3 sends
ARP to EP2
000a.000a.000a 000b.000b.000b
192.168.1.100/24 192.168.1.101/24
EP1 - EPG1 EP2 - EPG1
BD1 BD1
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Anycast Gateway
S10 S20
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Known Unicast – Layer 2
EP1 pings EP2
S10 S20 3 Packet is sent
Outer Outer L1 looks at the from L1 directly
DMAC and to L3 through
SIP L1 spines
2 knows it exists
DIP L3 on L3 in EPG1
VXLAN BD1
L1 L2 L3 L4
Inner Inner
BD1 BD1
SIP 192.168.1.100
BD1 BD2
ICMP
1 L3 sends
EPG1
Received 5 ICMP to EP2
EPG2 on BD GW 3
ICMP ICMP
000a.000a.000a 000b.000b.000b
192.168.1.100/24 192.168.2.100/24
EP1 - EPG1 EP2 – EPG2
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Agenda
• Day 1: Why ACI?
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Day 4:
Network Centric
Migrations
Physical Layer
S10 S20
L1 L3 L4
L2
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Checklist
Physical Layer
Layer 2
Layer 3
Network Centric Design
L2 Migration Recommendations BD_VLAN100
ARP Flooding
=
Each Legacy VLAN has a unique EPG
Legacy VLAN
100
What have we Accomplished?
Each Legacy VLAN maps to a unique Bridge Domain
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Conceptual View
Legacy ACI
VRF CiscoLive
SVI/VLAN:100
192.168.100.1
SVI/VLAN:101 L1 L3 L4
192.168.101.1
SVI/VLAN:102
192.168.102.1 L2
L2 Extension
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Verification
APIC GUI shows connected Endpoints (MAC and or IP) per EPG and Path
E.g.: 5C:83:8F:69:BB:C9 (N7K) connected via Nodes-101-102/N7710-vPC
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
Checklist
Physical Layer
Layer 2
Layer 3
Network Centric Design
L3 Migration Requirements
Configure “Layer 3 Out” to create a routed connection to legacy network
Routed Interface
Routed subinterface Subnet
EPG
Switched Virtual Interface (SVI) Bride Domain VLAN_100
L3 Extension
SVI/VLAN:100
192.168.100.1
SVI/VLAN:101 L1 L3 L4
192.168.101.1
SVI/VLAN:102
192.168.102.1 L2
L2 Extension
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Verification
APIC GUI now shows IP information since UC Routing is enabled on BD
E.g.: 192.168.102.11 connected via Nodes-101-102/BareMetal02-vPC
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Verification
GUI
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Verification
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Common Pitfalls
Old Gateway still Active!
S10 S20
L3 Extension
SVI/VLAN:100 SVI/VLAN:100
192.168.100.1 192.168.100.1
SVI/VLAN:101 L1 L3 L4 SVI/VLAN:101
192.168.101.1 192.168.101.1
SVI/VLAN:102 SVI/VLAN:102
192.168.102.1 L2 192.168.102.1
L2 Extension
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Common Pitfalls
Windows Dynamic Load Balancing S10 S20
Problem:
Traffic is Sourced with the same IP but
from both NIC’s using different MACs
ACI Fabric sees frequent IP Move L1 L2 L3 L4
between MAC’s when Routing is
Enabled!
Solution:
1) Use “Hyper-V Port” to force single
MAC to IP Communication
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Checklist
Physical Layer
Layer 2
Layer 3
Day 5: Multi-
Location
Deployment
Options
Stretched Fabric IS-IS
L1 L2 L3 L4 L5 L6 L7 L8 L9 L10
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 119
Stretched Fabric
Advantages
• All one Fabric
• No Additional Routed Infrastructure
• Simple Provisioning – If cabling is in
place S10 S20 S11 S21
Limitations
• Single APIC Failure Domain L1 L2 L3 L4 L5 L6 L7 L8 L9 L10
Across Sites
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 120
IPN MTU Requirements: 9150 Bytes
Multipod IS-IS
IPv4 Multicast
IPN IPN OSPF
Network
L1 L2 L3 L4 L7 L8 L9 L10
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 121
Multipod
Advantages
• All one Fabric
• Policy Stretched across sites IPN IPN
• Separate Control Plane Instances
per site S10 S20 S11 S21
Limitations L1 L2 L3 L4 L7 L8 L9 L10
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 122
IPN MTU Requirements: 9150 Bytes
Remote Leaf
IS-IS
IPV4 “Inter-site” OSPF
ISN Network ISN
Primary Site Remote Office/ DC
L1 L2 L3 L4
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 123
Remote Leaf
Advantages
• All one Fabric
• Easy Addition of small site to ISN ISN
existing APIC
• Spines not required in Remote Site. S10 S20 RL1 RL2
Limitations
• All traffic goes to “main” site before APIC APIC APIC
other sites.
• 140ms Latency Restriction
• Port Count
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 124
IPN MTU Requirements: 9150 Bytes
Multi-Site IS-IS
IPV4 “Inter-site” OSPF
IPN Network IPN
L1 L2 L3 L4 L1 L2 L3 L4
ACI
Multi-Site
ACI
Controller
Multi-Site
ACI
Controller
Multi-Site
Controller
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 125
Multi-Site
ACI
Multi-Site
ACI
Controller
Limitations
Multi-Site
ACI
Controller
Multi-Site
Controller
• 500ms – 1s latency for OOB APIC APIC APIC APIC APIC APIC
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 126
Day 6:
Troubleshooting
Tools
Faults
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 128
EP Tracker
“We had a
problem at
14:21!!!”
Attach/Detach events
are logged for each EP
IP Was Moving???
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 129
Atomic Counters
S10
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 130
Atomic Counters
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 131
Atomic Counters
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 132
S10
SPAN
EP Learnt
• ACI allows for SPAN of Entire EPG L1 L2
• ERSPAN Destination must be an IP EP ERSPAN
Learnt in ACI 10.10.10.10
• EP Can run Wireshark or Tshark Leaf101# show monitor session all
session 1
---------------
description : Span session 1
type : erspan
version : 2
oper version : 1
EPG 100 state : up (active)
erspan-id : 1
SPAN Source SPAN granularity :
Destination
vrf-name : CiscoLive:VRF1
acl-name :
ip-ttl : 64
EPG ERSPAN ip-dscp
specified
: ip-dscp not
destination-ip : 10.10.10.10/32
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 133
Troubleshooting Wizard - Faults
Shows Faults
in the Path
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 134
Troubleshooting Wizard – Drop Stats
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 135
Troubleshooting Wizard - Contracts
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 136
Troubleshooting Wizard – Atomic Counters
No Drops!
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 137
Troubleshooting Wizard – SPAN
Ability to SPAN to APIC or other devices
attached to the Fabric
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 138
Capacity Dashboard
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 139
App Center
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 140
Network Insights - Resources
Time Window allows for filtering
of data
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 141
Network Insights - Resources
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 142
Network Insights - Resources
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 143
Network Insights - Resources
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 144
Network Insights - Resources
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 145
Network Insights - Resources
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 146
ELAM Assistant App
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 147
ELAM Assistant App Provides Detailed Information
about the packet that was
triggered
Packet is
Dropped
No Contract!
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 148
Enhanced Endpoint Tracker Provides Historical Data of All
Endpoints, including # of moves
Troubleshooting Endpoint Moves
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 149
Enhanced Endpoint Tracker
Troubleshooting Endpoint Moves
Provides Exact Location of
Endpoint
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 150
Enhanced Endpoint Tracker
Troubleshooting Off Subnet Endpoints Any Endpoint which is off subnet is
flagged. Unexpected for Network
Centric Deployment!
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 151
Enhanced Endpoint Tracker
Troubleshooting Off Subnet Endpoints
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 152
Day 7: Additional
Resources
Support Forums
https://supportforums.cisco.com/t5/application-centric/bd-p/12206936-discussions-aci
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 154
Facebook Group
Great Community
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 155
Solutions Support
One TAC team to support all
aspects of ACI
Engineers are familiar with 3rd
party products like VMWare
Case does not get handed off
when it is a Switching vs. Routing
issue.
ACI Team takes ownership
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 156
Complete your
online session • Please complete your session survey
evaluation after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live water bottle.
• All surveys can be taken in the Cisco Live
Mobile App or by logging in to the Session
Catalog on ciscolive.cisco.com/us.
Cisco Live sessions will be available for viewing
on demand after the event at ciscolive.cisco.com.
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 157
Continue your education
Demos in the
Walk-in labs
Cisco campus
#CLUS BRKACI-1001 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 158
Thank you
#CLUS
#CLUS