Uploaded by seanvanhandel

BRKACI-1001

#CLMEL
Your First Seven Days
Of ACI
Takuya Kishida – Technical Leader, Service
BRKACI-1001
#CLMEL
Agenda
•
Day 1: Why ACI?
•
Day 2: Infrastructure and Policies
•
Day 3: Forwarding Overview
•
Day 4: Network Centric Migrations
•
Day 5: Multi Location Deployments
•
Day 6: Troubleshooting Tools
•
Day 7: Additional Resources
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
3
Cisco Webex Teams
Questions?
Use Cisco Webex Teams (formerly Cisco Spark)
to chat with the speaker after the session
How
1 Open the Cisco Events Mobile App
2 Find your desired session in the “Session Scheduler”
3 Click “Join the Discussion”
4 Install Webex Teams or go directly to the team space
5 Enter messages/questions in the team space
cs.co/ciscolivebot#BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
4
Reference Slide Icon ➔
Acronyms/Definitions
Acronyms
Definitions
Acronyms
Definitions
ACI
Application Centric Infrastructure
SVI
Switch Virtual Interface
ACL
Access Control List
VIC
Virtual Interface Card
API
Application Programming Interface
VNID
Virtual Network Identifier
APIC
Application Policy Infrastructure Controller
VPC
Virtual Port-Channel
BD
Bridge Domain
VRF
Virtual Routing and Forwarding
COOP
Council of Oracle Protocol
VTEP
VXLAN Tunnel Endpoint
ECMP
Equal Cost Multi Pathing
VXLAN
Virtual Extensible LAN
EP
Endpoint
EPG
Endpoint Group
KVM
Keyboard, Video, and Mouse
MP-BGP
Multi Protocol BGP
pcTag
Policy Control Tag
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
5
Day 1: Why ACI?
Challenges of Traditional Network
Complicated
Topology
Core/Dist/Access
layer separation
CLI
to every Device
Harder
as we scale
Lots of copy and paste
#CLMEL
Spanning Tree for
Loop Free Topology
No default
security isolation
Static Configuration
No Automation
Coordination between Network
and Server Team
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
7
No such challenges with ACI !!
Spine1# show module
Mod Ports Module-Type
Model
Status
--- ----- ----------------------------------- --------------- -----2
32
32p 40/100G Ethernet Module
N9K-X9732C-EX
ok
Spine
Complicated
Topology
22
23
24
26
27
28
Simple
Core/Dist/Access
Topology
layer separation
SPINE/LEAF
Leaf
0
0
0
0
0
0
Fabric Module
Fabric Module
Fabric Module
Fabric Module
Supervisor Module
Supervisor Module
Spanning Tree for
Loop Free Topology
N9K-C9504-FM-E
ok
N9K-C9504-FM-E
ok
N9K-C9504-FM-E
ok
N9K-C9504-FM-E
ok
N9K-SUP-A
Active
N9K-SUP-A
Standby
No default
security isolation
Leaf4# show module
Mod
--1
CLI
to every Device
Ports
----54
Module-Type
Model
Status
---------------------------------- ------------------ -----48x10/25G+6x40/100G Switch
N9K-C93180YC-EX
ok
ACI Switches are all Nexus 9000 with
ACI-OS instead of NX-OS
Harder
as we scale
Static Configuration
No Automation
Lots of copy and paste
#CLMEL
BRKACI-1001
Coordination between Network
and Server Team
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
8
No such challenges with ACI !!
Spine
Simple
Topology
SPINE/LEAF
Leaf
CLI
to every Device
Infra
VRF
No STP
Spanning
Tree
for
ECMP
Routing
between
Loop
Free
LEAF
& Topology
SPINE
No default
security isolation
Static Configuration
No Automation
Coordination between Network
and Server Team
Harder
as we scale
Lots of copy and paste
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
9
No such challenges with ACI !!
Spine
Simple
Topology
SPINE/LEAF
Leaf
CLI
to every Device
Infra
VRF
EPG
No STP
EPG
Spanning
Tree
for
ECMP
Routing
between
Loop
Free
LEAF
& Topology
SPINE
No List
default
White
Model
security
isolation
with contracts
Static Configuration
No Automation
Coordination between Network
and Server Team
Harder
as we scale
Lots of copy and paste
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
10
No such challenges with ACI !!
Spine
Simple
Topology
SPINE/LEAF
Leaf
APIC
Cluster
APIC
APIC
Infra
VRF
EPG
No STP
EPG
Spanning
Tree
for
ECMP
Routing
between
Loop
Free
LEAF
& Topology
SPINE
No List
default
White
Model
security
isolation
with contracts
Static Configuration
No Automation
Coordination between Network
and Server Team
APIC
Centralised
CLI
Controller
Harder
to every Device
as we scale
API Access
Lots of copy and paste
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
11
No such challenges with ACI !!
Spine
Simple
Topology
SPINE/LEAF
Leaf
APIC
Cluster
APIC
APIC
Infra
VRF
EPG
No STP
EPG
ECMP Routing between
LEAF & SPINE
No List
default
White
Model
security
isolation
with contracts
REST
automation
StaticAPI
Configuration
Dynamic
Integration
No Automation
Coordination between Network
and Server Team
APIC
Centralised
Controller
API Access
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
12
No such challenges with ACI !!
Spine
Simple
Topology
SPINE/LEAF
Leaf
APIC
Cluster
APIC
APIC
Infra
VRF
EPG
No STP
EPG
ECMP Routing between
LEAF & SPINE
White List Model
with contracts
REST API automation
Dynamic Integration
Coordination
Network
Vmwarebetween
Integration
and Server
etc… Team
APIC
Centralised
Controller
API Access
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
13
R L3 Routing
ACI Overview
V VLAN
Fabric Discovery
GW
Gateway (SVI)
T Infra IP (Tunnel Endpoint: TEP)
T
T
ISIS/BGP Overlay
T
T
T
T
APIC
GW
GW
Bare Metal
T
APIC
V
T
T
T
APIC
R
T
External
L2 & L3
Network
APIC Cluster
Hypervisors
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
14
T Tunnel Endpoint (TEP)
ACI overlay network
ISIS
MP-BGP
T
T
T
T
IP reachability between TEPs
R
RR
BGP Route Reflector
RR
R
R
WAN
(L3OUT)
L3OUT Routes distribution
• APIC assigns TEP
• APIC assigns RR (Route Reflector)
• Automatically establish ISIS
• Automatically establish BGP
No manual ISIS config.
No ISIS knowledge is required.
Routes from L3OUT
VxLAN
RR
T
R
No manual config is required.
(except for RR)
#CLMEL
BRKACI-1001
VxLAN VNID
Switching / Routing Separation
• APIC assigns VNID
No manual VxLAN config.
No VxLAN knowledge is required
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
15
APIC Controller
APIC
ACI
Fabric
OOB
MGMT
A
A
S
S
APIC Controller
(UCS C220)
1)
Cisco VIC 1225 (Copper or Fiber)
A – Active
2)
3)
Two 10Gb port for connections to ACI Switches
1Gb Copper Ethernet port for CIMC
S - Standby
4)
Console Port
5)
Two 1Gb Copper Ethernet Ports for OOB MGMT
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
16
Infrastructure and Policies
Best Practice
OOB
Network
ACI Spine Switches
1 OOB MGMT per SUP
1 Console per SUP
40/100 Gb connections to Leafs
ACI Leaf Switches
1 OOB MGMT
1 Console
40/100 Gb connections to Spines
Console
Server
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
17
Infrastructure and Services
Required Addressing
1
2
1.
Infra Subnet
2.
3.
Infra VLAN
BD Multicast Range
4.
OOB Network IP’s (CIMC
included)
3
4
#CLMEL
BRKACI-1001
NOTE: Infrastructure subnet and BD
MCAST is used internally for APICs and
Switches!
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
18
Management - Required Addressing
Planning
Requirements
Notes
Fabric Name
Has to be consistent on all APICs
Fabric1
Fabric ID
Set to 1 (Default)
1
TEP Pool
Recommended a /19 network. APIC will assign IPs from this pool to
Leafs, Spines and other Fabric specific services. Avoid IP space which
APIC might have to communicate with. E.g.: vCenter or other
integrated services
10.0.0.0/16
GIPO Pool
Multicast network for flooding inside ACI. Not exposed to external
network unless using Multipod
225.0.0.0/15
Infra VLAN
VLAN will be reserved for internal ACI communication. Cannot be
deployed toward user servers
3967
APIC OOB IP
1 IP per APIC, has to be out of band. Inband can be configured later.
Switch
Management IP
1 IP per switch, can have inband, out of band or both.
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
19
Infrastructure and Services
APIC UI
APIC Management
APIC
APIC Cluster
APIC
API
CLI (ssh)
APIC
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
20
Take a first look at APIC Controller (Inventory)
APIC
ACI Fabric Nodes
1. Discover – Only S/N and Model show up first
2. Register – Configure Node ID and name
3. Provision – TEP IP is auto assigned.
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
21
Take a first look at APIC Controller (Inventory)
Topology for each pod
BRKACI-1001
#CLMEL
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
APIC
Take a first look at APIC Controller (Dashboard)
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
APIC
23
Take a first look at APIC Controller (Dashboard)
APIC
APIC Cluster Status
“Fully Fit” – All APICs are in sync
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
24
Take a first look at APIC Controller (Dashboard)
APIC
Faults
Faults are indications of mis-config or any
issues on ACI Fabric
※ This is a lab setup. Try to clear all faults whenever
a new one is raised in production.
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
25
Take a first look at APIC Controller (Dashboard)
APIC
Looks like we
had an issue!
Health Score
Health scores are based on faults and events
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
26
Day 2: Infrastructure and
Policies
Checklist
❑
❑
❑
❑
❑
CIMC
Management
NTP
AAA/RBAC
Backups
Infrastructure and Services
CIMC
• Use for APIC Hardware
Diagnostics and Remote
Access
• Use to install the APIC
Software
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
29
Infrastructure and Services
CIMC
• CIMC KVM Provides
Remote Access
• Equivalent of Console
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
30
Checklist
✓
❑
❑
❑
❑
CIMC
Management
NTP
AAA/RBAC
Backups
Infrastructure and Services
spine 1
spine 2
Switch Management
ACI Fabric
APIC
leaf 1
leaf 2
leaf 3
leaf 4
leaf 5
Leaf and Spine Access
- Console
- SSH – via APIC or Direct
- REST API
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/basic-configuration/Cisco-APIC-Basic32
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLMEL
Configuration-Guide-401/Cisco-APIC-Basic-Configuration-Guide-401_chapter_0100.html
Checklist
✓
✓
❑
❑
❑
CIMC
Management
NTP
AAA/RBAC
Backups
Infrastructure and Services
NTP & PTP
NTP
• APIC Cluster sync
(timestamp in control plane messaging)
• Certificates
• Tech Supports
• Atomic Counters!
APIC
PTP
APIC
APIC
• Gen 2 or newer (EX/FX) Spine can act
as a PTP master as well
• Allows user to measure latency
between EndPoints and leafs
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/basic-configuration/Cisco-APIC-Basic34
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLMEL
Configuration-Guide-401/Cisco-APIC-Basic-Configuration-Guide-401_chapter_0101.html
Checklist
✓
✓
✓
❑
❑
CIMC
Management
NTP
AAA/RBAC
Backups
Infrastructure and Services
AAA / RBAC
Supports various AAA solutions
Easy to check your permissions
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/basic-configuration/Cisco-APIC-Basic36
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLMEL
Configuration-Guide-401/Cisco-APIC-Basic-Configuration-Guide-401_chapter_011.html
Infrastructure and Services
AAA / RBAC
mgmt IP reachability
AAA Server
Config/Policy
Spine
Leaf
Which AAA server?
etc
APIC
Cluster
APIC
APIC
APIC
Deploy via APIC
Each node (both APIC and Switch) still needs their own
management
IP reachability to an AAA server
#CLMEL
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
37
Infrastructure and Services
AAA
“Oh no! We lost connectivity to
servers on February 12th at 3pm EST!?”
jristain@apic1:~> moquery -c aaaModLR | grep -C 12 "2017-02-13T15"
<snip>
# aaa.ModLR
id
: 8589940567
affected
: uni/tn-Joey-Tenant/BD-Joey-BD3
cause
: transition
changeSet
: arpFlood (Old: no, New: yes), unkMacUcastAct (Old: proxy, New: flood)
childAction :
clientTag
:
code
: E4206171
created
: 2017-02-13T15:06:07.249+00:00
descr
: BD Joey-BD3 modified
dn
: subj-[uni/tn-Joey-Tenant/BD-Joey-BD3]/mod-8589940567
ind
: modification
modTs
: never
rn
: mod-8589940567
sessionId
: Ld0sxAcCRfmb2Qb+W+XbUg==
severity
: info
status
:
trig
: config
txId
: 4611686018449066821
user
: remoteuser-jristain
Logs changes per user!!
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
38
Checklist
✓
✓
✓
✓
❑
CIMC
Management
NTP
AAA/RBAC
Backups
Infrastructure and Services
Backups – Configuration Export
• The current fabric configuration/policy in JSON/XML
• Best practice for DISASTER RECOVERY
The backup has
Enabled -> Encrypted password
Disabled -> No password
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/basic-configuration/Cisco-APIC-Basic40
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
#CLMEL
Configuration-Guide-401/Cisco-APIC-Basic-Configuration-Guide-401_chapter_0100.html
Infrastructure and Services
Backups - Snapshots
Creates a Config Backup that is stored on the APIC by default
Run on a Per Fabric or Tenant Basis
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
41
Infrastructure and Services
Backups - Snapshots
• Rollback feature allows config
rollback between 2 snapshots
• Can also compare differences
between a previous SS
Object
Changed To
Changed From
Changed From
Changed To
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
42
Infrastructure and Services
CIMC, NTP, AAA, and Backup Planning
Requirements
Notes
CIMC IP per
APIC
Unique IP address used for IP KVM built into APIC. Must
use dedicated port
NTP Server
NTP Server which all nodes inside fabric will use
User
Management
TACAS/ RBAC or RADIUS Server for accounting. Custom
local user account can be used too
Scheduled
backup
Multicast network for flooding inside ACI. Not exposed
to external network unless using Multipod
Backup Server
Server outside of ACI Fabric running FTP, SFTP or SCP
Server
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
43
Checklist
✓
✓
✓
✓
✓
CIMC
Management
NTP
AAA/RBAC
Backups
Fabric and Tenant Policies
Tenant and Fabric Policies
• Fabric Policy – Physical Concept
•
•
•
port-channel
I/F speed
LLDP/CDP etc
• Tenant Policy – Network Logical Concept
•
•
•
VLAN trunk
EPG/BD/VRF
Contract etc
#CLMEL
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
Fabric and Tenant Policies
Access Policies
S10
S20
vPC Domain
vPC Domain
L1
Server
L3
L2
L4
Server
Nexus 7000
vPC Port-Channel
vPC Port-Channel
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
47
Fabric and Tenant Policies
Access Policies
Access policies refer to the configuration that is applied for physical and virtual (hypervisors/VMs)
devices attached to the fabric.
Broken into a few major areas:
Global Policy
Switch Policy
Interface Policy
•
•
Pools
Domains
•
•
Policies
Policy Groups
•
Policies
•
Policy Groups
•
Attachable Access Entity Profiles
•
Profiles
•
Profiles
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
48
Fabric and Tenant Policies
vPC Domain Policy
• No Peer-Link
• No Peer-Keepalive
• Uses Fabric Links for
Communication
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
49
Fabric and Tenant Policies
Access Policies
S10
S20
101-102 vPC
103-104 vPC
L1
Server
L3
L2
L4
Server
vPC Port-Channel
Nexus 7000
vPC Port-Channel
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
50
Fabric and Tenant Policies
Port-Channels
Legacy NXOS Config
Nexus7710# show run int po 10
interface port-channel10
switchport mode trunk
vpc 10
Nexus7710# show run interface Ethernet1/10
interface Ethernet1/10
speed 10000
lldp transmit
lldp receive
channel-group 10 mode active
Unspecified fields use
default values
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
51
Fabric and Tenant Policies
Access Policies
S10
S20
101-102 vPC
103-104 vPC
L1
Server
L3
L2
L4
Server
BareMetal-vPC
Nexus 7000
N7000-vPC
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
52
AEP
The AEP is used to associate a domain to one or more interface policy groups. In
most deployments it is recommended to use a single AEP if VMM integration is
not being used. If the ACI Fabric will be integrated with n VMM domains, use 1 +
n to determine how many AEPs are needed
The Domain is used to specify what type of path (vlan) can be deployed on a
interface. If a AEP does not contain a “External Routed Domain”, the interface
can not be used to deploy a L3Out.
In Most deployments a single VLAN pool can be used with 1 Physical Domain and
1 External Routed Domain.
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
53
Relationship View
Access Policies Workflow Example
Switch Profile
Leaf-101
vPC-101-102
Interface Profile
Leaf-101
vPC-101-102
P1-5_WinAD
P6-7-N7K-vPC
Interface Selector
Interface Block
Interface Policy Group
Interface Policies
1/6-7
1/1-5
1/6-7
Win2016Serv
CDP_On
LLDP_Off
#CLMEL
N7K-vPC
BPDU_Guard
BRKACI-1001
LACP
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
54
Management - Required Addressing
Planning
Requirements
Notes
Example
AEP
1 AEP for all Policy groups. Map all domains to this Policy group
Prod_AEP
Domain
1 Physical Domain, 1 External Routed Domain
phys
L3Out
VLAN Pool
1 VLAN pool for all statically deployed vlans. 1 VLAN pool for
Dynamically deployed VLANs. These pools should not overlap.
Static_VLANs
VMM_Domain
Switch Profile
1 Profile per switch for Orphan Ports, 1 Profile per vPC Domain
(Containing both switches)
vPC-101-102, Leaf101, Leaf102
Interface Profile
Create a 1 to 1 mapping to switch Profile
vPC-101-102, Leaf101, Leaf102
Interface Selector
Name after Server, Include Port ID.
P11-N7710-vPC
Policy Group
1 Policy Group per Port-Channel/ vPC. Policy Groups can be reused for
access ports. Assign AEP to Policy Group
N7710-vPC
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
55
Global Policy
Pools (Vlan / VXLAN)
A resource pool of encapsulations that can be
allocated within the fabric.
Domains (Physical / VMM / External Bridged / External Routed)
Administrative domain which selects a vlan/vxlan pool for allocation of
encaps within the domain
Attachable Access Entity Profiles (AEP)
Selects one or more domains and is referenced/applied by
interface policy groups.
#CLMEL
Pool1
Pool2
DomPhy1
DomL2Ext1
AEP
TenantA
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
56
Global Policy - Attachable Entity Profiles
Configuration:
•
Create a VLAN/VXLAN pool with a range of
encapsulations
•
Create a domain (physical, l2/l3 external, or
VMM) and associate pool
•
Associate domain to AEP
•
Associate interface policy group to AEP
switch/interface selectors will apply the config
through the interface policy group assign to
specific ports
What have we accomplished?
•
1
Pool1
Pool2
Pool3
Pool4
DomPhy1
DomVm1
DomL2
DomL3
AEP
Statics
AEP
VMs
2
3
4
1
2
3
AEP
External
4
1
2
3
4
1
2
3
4
Specified what domains and corresponding
pools are allowed per interface in the fabric!
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
57
Access Policies
SWITCH POLICY
Policies define protocol / feature configurations
Policy Groups select which policies should be applied
Profiles associate policy groups to switches or interfaces, through the
use of selectors
Switch Policy Types:
Interface Policy Types:
VPC Domain
Link-level
Storm Control
Spanning-tree (MST)
BFD
CDP
LLDP
Data plane policing
MCP
Fibre-channel SAN / Node
Port-channel / LAG
L2 (Vlan local / global)
Port-channel member
Spanning-tree
Firewall
#CLMEL
BRKACI-1001
INTERFACE POLICY
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
58
Interface Policy Groups
Used to specify which interface policies to be applied to a particular interface type.
It also associates an AEP (which defines which domains are allowed on the interface).
Types:
VPC Domain 1
Access port (EP1)
Access Bundle Groups
•
Virtual Port-channel (EP2)
•
Port-channel (EP3)
EP1
EP2
EP3
Note: Separate policy groups should be created for each port-channel (standard or VPC) that you need to
configure. All interfaces on leaf that are associated with a particular access bundle group reside in same channel.
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
59
Port-Channel Policies
Classical vPC Domain configuration
ACI Port-Channel Policies
Required configuration of domain, peer-link, and
peer-keepalive link on both devices in domain
Specify mode, minimum / maximum links, and related
protocol options (relating to LACP)
interface Ethernet1/5-6
lacp port-priority 32768
lacp rate normal
channel-group 10 mode on
interface Ethernet1/10-11
lacp port-priority 32768
lacp rate fast
channel-group 20 mode active
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
60
Access Policy Example
General Configuration (reused for many interfaces):
AEP
CiscoLive
1)
2)
Configure a physical domain and vlan pool
Create an AEP and associate physical domain
3)
Create switch/interfaces profiles for leaf (LEAF101)
•
4)
Pool1
DomPhy1
Switch Profile
very easy to apply configurations if you create a
switch/interface profile for each leaf and one for each VPC
domain pair
Configure Interface policies (LACP / LLDP)
LEAF101
Leaf_101
Interface Profile
LACP Active
LEAF101
Policies
LLDP Rx / Tx enabled
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
61
Creating Physical Domain / AEP / Vlan Pool
In dropdown:
Click Create Attachable Entity Profile
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
62
Creating Physical Domain / AEP / Vlan Pool
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
63
Creating Physical Domain / AEP / Vlan Pool
Click + to add vlan range
In dropdown:
Click Create VLAN Pool
Specify start and
end vlans in range
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
64
Create Interface Profile for each leaf / VPC domain
Enter name and submit
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
65
Create Switch Profile for each leaf / VPC domain
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
66
Create Switch Profile for each leaf / VPC domain
Enter name
Click + to add selector
Select the Interface Profile
created for this leaf earlier
Enter a name and choose
appropriate leaf or leafs (for
vpc pair)
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
67
Create common protocol configurations
Example demonstrates a common lacp port-channel policy
Use a descriptive name
Select the protocol
Configure options/knobs
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
68
Access Policy Example
Interface specific (each time you add a new interface):
1)
2)
Create policy group for device (VPC / PC / Access)
Within the policy group, select the desired policies / AEP
3)
Associate interfaces to policy group via desired leaf profile
•
•
AEP
CiscoLive
Pool1
DomPhy1
Switch Profile
use specific leaf profile if access or PC
use VPC leaf profile if policy group is VPC
LEAF101
Leaf_101
Interface Profile
LACP Active
PC_Server_1
LEAF101
Policies
Policy Groups
blk_1/1-2
LLDP Rx / Tx enabled
Access_Servers
blk_1/47-48
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
69
Create policy groups
Note:
A separate policy group
should be created for
each PC/VPC that you
will deploy
Descriptive name
Associate your desired
interface policies (otherwise
default)
Associate your AEP to select
which domains this interface can
deploy
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
70
Create interface selectors / associate policy group
Click + to add selector
Choose interface profile to
add selectors
Use a descriptive name
Specify interface/range
Associate the policy group to
deploy on interfaces
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
71
Example policy scheme
Switch Profile
Leaf101
Leaf101_102
Interface Profile
Leaf101
Leaf101_102
Interface Selector
Interface Block
linux
windows
n7k_pc10
1/20-25
1/30-35
1/10-11
asa_cl1_pc1
1/45-48
n7k1_pc10
n7k2_pc10
1/10
1/20
1/1-4
Interface Policy Group
linux-access
windows-access
#CLMEL
asa_vpc_ccl
BRKACI-1001
asa_vpc_data
n7k_vpc10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
72
vPC Protection Group Policy
vPC Domain 1
vPC Domain 2
vPC Domain 1
Classical vPC Domain configuration
ACI vPC Domain configuration
Required configuration of domain, peer-link, and
peer-keepalive link on both devices in domain
Specify the Domain ID and the two Leaf switch IDs that
form the domain pair
vpc domain 1
peer-keepalive destination 172.168.1.2 /
source 172.168.1.1 vrf vpc-keepalive
peer-gateway
ip arp synchronize
VPC Protection Group
Name: vPC-Domain100
ID: 100
Switch1: 101
Switch2: 102
interface port-channel 20
vpc peer-link
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
73
VPC Protection Group (example configuration)
GUI sequence:
Tabs:
Fabric -> Access Policies
Navigation Tree:
Switch Policies -> Policies ->
VPC Domain -> Default
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
74
Fabric and Tenant Policies
Tenant Policies
Static Binding
VMM Integration
WAN Connectivity
ACI Fabric
ACI Fabric
ACI Fabric
Extend VLAN to legacy Net
Extend VLAN to legacy Net
Legacy
Extend VLAN to legacy Net
WAN
baremetal
server
Hypervisor Cluster
baremetal
server
baremetal
server
endpoints behind
legacy network
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
75
Fabric and Tenant Policies
Tenant Policies (Static Binding)
S10
Extend VLAN to legacy Net
Server
L1
S20
L3
L2
L4
Allow Layer 2
Connectivity to 7K
Server
Nexus 7000
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
76
Fabric and Tenant Policies
Tenant Policies – Key concepts
Tenants are a Logical Grouping containing Policies.
Resources in the Common Tenant can be used in User Tenants
VRFs are used to separate routing tables inside the ACI Fabric.
1 or more VRFs can be used.
Bridge Domains define your Broadcast/ Flood domain
Unique VXLAN VNID is used per Bridge Domain
Configure ARP Optimization and L2 Unknown Unicast Proxy
Subnet (SVI) can be defined under the BD and is mapped to a single VRF
Bridge Domain
Tenant
VRF
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
77
Fabric and Tenant Policies
Tenant Policies – Key concepts one EPG to another
EPGs defines a collation of policy assigned to a group of devices
Contracts, QoS, SPAN requirements
L4-L7 policies (PBR, Load balancing, Firewalls)
EPG is most commonly determined by ingress VLAN & Port
Contracts are a collection of filters which allow traffic to pass between EPGs
Contacts are similar to access-lists. Consumer is Source, Provider is Destination
Filters contain a list of protocols and ports
EPG
ICMP
Bridge
Domain
Contract
VRF
Tenant
EPG
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
78
Fabric and Tenant Policies
Tenant View
EPGs
Bridge Domains
VRFs
Contracts
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
79
Fabric and Tenant Policies
Deploying a VRF
Change the VRF from a WhiteList model to an “Allow All”
Model
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
80
Fabric and Tenant Policies
Deploying a Bridge Domain
Associate Bridge Domain to VRF
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
81
Fabric and Tenant Policies
N7710# configure terminal
Deploying an EndPoint Group
N7710(config-if)# switchport trunk allowed vlan add 100
N7710(config)# interface port-channel 1
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
82
Fabric and Tenant Policies
Tenant Policies
S10
Extend VLAN to legacy
Net
L1
S20
L3
L2
L4
Allow Layer 2
Connectivity to 7K
L2 Path
Server
Server
Nexus 7000
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
83
Fabric and Tenant Policies
Planning
Requirements
Notes
Example
Tenant
1 Tenant can be used company. Tenants can also separate functions of a business.
NOTE: Shorter names are easier when using CLI
Prod/Dev
VRF
1 or more VRFs per Tenant
PROD-MAIN
DEV-TEST,DEV-PROD
Bridge Domain
Recommended to have 1 BD per Legacy VLAN. For Network Centric Migrations, 1 BD
should be used for each EPG.
VLAN_100,VLAN_101
BD_vMotion
Application Profile
Logical Container for EPGs. 1 AP is sufficient in most installations. NOTE: This is
strictly a management entity. No policies are defined on this object.
Prod-AP
EndPoint Group
Ports/VLANs (static path bindings) are added to EPGs to define what Endpoints get
defined in what EPGs. QOS/Contracts, etc are added to EPGs. For Network Centric
Migrations, 1 EPG should be used for each Legacy VLAN.
VLAN_100
VLAN_101
vMotion
Contracts
Contracts can be re-used across multiple EPGs. If we compare this to an ACL, the
Consumer is the Source, and the Provider is the Destination.
Web
Filters
Add Required Ports and Protocols to allow communication. Only what is specified in
the filter → contract will be allowed between EPGs providing and consuming that
contract.
SRC: Any, DST:80
SRC: Any, DST:443
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
84
Fabric and Tenant Policies
Tenant Policies (VMM Integration)
S10
S20
VMM enabled EPGs
L1
L2
L3
L4
• Tenant + Virtual Networking Tab
Hypervisor Cluster
#CLMEL
BRKACI-1001
Server
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
85
Cisco ACI Hypervisor Integration (vmware example)
Red - Manual Operation
Create VMM Domain
APIC
vCenter A
VMM Domain
1
6
Associate EPGs to the
VMM Domain
End Point Group
(EPG)
EPG
WEB
EPG
APP
EPG
DB
APIC Admin
9
Push Policy
ACI Fabric
2
Cisco APIC and
VMware vCenter
Initial Handshake
7
Automatically Map EPGs
To Port Groups
Learn location of ESXi Host
through LLDP
5
Attach vmware ESXi
to VDS
4
3
HYPERVISOR (ESXi)
Create DVS
HYPERVISOR (ESXi)
VIRTUAL DISTRIBUTED SWITCH
8
VI/Server Admin
vmware
vCenter
10
WEB PORT GROUP
APP PORT GROUP
DB PORT GROUP
Web
App
DB
Create Port Groups
Instantiate VMs,
Assign to Port Groups
BRKACI-1001
#CLMEL
Web
DB
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
86
Fabric and Tenant Policies
Layer 3 (WAN) Connectivity
S10
S20
Layer 3 Access To Core
L1
L3
L2
L4
ACI
Server
WAN/Core
#CLMEL
BRKACI-1001
Provide External
Access to Server
Layer 2
Layer 3
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
87
Basic Connectivity
node-103
RID: #
node-104
RID: #
IP: A
IP: B
Layer3 Out: L3Out-1
VRF: VRF-V1
Layer-3 Domain: DomL3
vlan-x
Logical Node Profile: node-103-104
node: node-103
Router-ID: #
node: node-104
Router-ID: #
L3Out-1
VRF-V1
Logical Interface Profile: ipv4-lif
path: topology/pod-1/…vpcX
type: ext-svi, encap: vlan-x
IP-A, IP-B, MTU, MAC
Create the L3Out
• Associate VRF and L3 Domain
• Create Logical Node Profile and associate fabric nodes to
the L3Out.
• Create Logical Interface Profile
• Specify Path attributes containing physical interface,
encapsulation, and IPs
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
88
Fabric and Tenant Policies
Creating a Layer 3 Out
•
External Routed Networks allow us to
peer with external routers
•
Dynamic Protocols
•
#CLMEL
BRKACI-1001
•
EIGRP
•
OSPF
•
BGP
Static Routing
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
89
Fabric and Tenant Policies
Route Reflectors
• Fabric nodes communicate
using MP-BGP.
• BGP advertises routes from
Border Leaf to Compute Leafs.
• Runs in overlay-1 VRF
L1
L2
L3
L4
ACI
Server
0.0.0.0/0
10.0.0.0/24
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
90
Fabric and Tenant Policies
Route Reflectors
L1
S10
S20
L3
L2
L4
TEP 192.168.160.64 192.168.160.65
leaf3# show ip route vrf A:A
0.0.0.0/0, ubest/mbest: 1/0
*via 192.168.160.64%overlay-1,
*via 192.168.160.65%overlay-1,
10.0.0.0/24, ubest/mbest: 1/0
*via 192.168.160.64%overlay-1,
*via 192.168.160.65%overlay-1,
[200/1], 03w21d, bgp-90002, internal, tag 90002
[200/1], 03w21d, bgp-90002, internal, tag 90002
[200/1], 03w21d, bgp-90002, internal, tag 90002
[200/1], 03w21d, bgp-90002, internal, tag 90002
RR Config
• BGP AS number
• Pick 2 spines / pod
Routing Table points to two boarder leaves with ECMP
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
91
Fabric and Tenant Policies
Planning
Requirements
Notes
Example
BGP Route Reflector
Use an AS Number not already in your environment. The AS number is only
exposed to the external network when peering BGP with devices. Private AS
number can be used. NOTE: CHANGING THE AS NUMBER IS DISRUPTIVE!
65000
External Routed
Network
This is your Layer 3 Object. It contains the entire Layer 3 path configuration.
L3out-To-Core
Node Profile
Defines which nodes are part of the Layer 3 out Domain. Here is where you
define your Router ID’s and Static Routes.
Leaf101, Leaf102
Leaf101-102
Logical Interface
Profile
Defines which interfaces are used for peering. Support Types are Routed
Interfaces, Routes Sub-Interfaces, and SVIs. This is also where you define the
IP/MTU/VLAN is SVI or Sub-Interface.
Port10
vPC-To-Core
Networks (External
EPG)
This is where you define the external subnets you want to apply policy to. You
do this by listing the subnets and applying contracts. NOTE: multiple all 0’s
subnets should not be configured in the same VRF.
Ext_EPG → 0.0.0.0/0 subnet
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
92
Fabric and Tenant Policies
Layer 3 Connectivity
S10
S20
Layer 3 Access To Core
L1
L3
L2
L4
ACI
Server
Provide External
Access to Server
Layer 2
Layer 3
WAN/Core
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
93
Agenda
•
Day 1: Why ACI?
•
Day 2: Infrastructure and Policies
•
Day 3: Forwarding Overview
•
Day 4: Network Centric Migrations
•
Day 5: Multi Location Deployments
•
Day 6: Troubleshooting Tools
•
Day 7: Additional Resources
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
94
Day 3: Forwarding
Overview
What is an Endpoint?
Traditional Endpoint
L2 – MAC Table
- MAC Address
- VLAN
- Interface
Eth1/1
10
L3 – ARP Table
- IP / MAC
- Interface
- VRF
10
000a.000a.000a
dynamic
0
00:00:01 000a.000a.000a
000b.000b.000b
192.168.2.100/24
N5K# show mac address-table | grep 000b
Eth1/1
N5K# show ip arp vrf default | grep 000a
192.168.1.1
20
000a.000a.000a
192.168.1.100/24
N5K# show mac address-table | grep 000a
•
Eth1/2
•
20
000b.000b.000b
dynamic
0
Eth1/2
N5K# show ip arp vrf default | grep 000b
Vlan10
192.168.2.1
#CLMEL
BRKACI-1001
00:00:01 000b.000b.000b
Vlan20
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
96
What is an Endpoint?
Eth1/1
ACI Endpoint
-
MAC or MAC/IP → IP is /32 or /128
Route
VLAN → EPG (pcTag)
Interface
VRF
Flags → Local, vPC, static, etc.
Eth1/2
10
20
APIC
000a.000a.000a
192.168.1.100/24
EPG1
000b.000b.000b
192.168.2.100/24
EPG2
apic1# show endpoints ip 192.168.1.100
Dynamic Endpoints:
Tenant
: CL
Application : CL
AEPg
: EPG1
End Point MAC
----------------00:0A:00:0A:00:0A
IP Address
---------------------------------------192.168.1.100
Node
---------101 102
#CLMEL
Interface
-----------------------------eth1/1
BRKACI-1001
Encap
--------------vlan-10
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
97
What is an Endpoint?
Eth1/1
ACI Endpoint
-
MAC or MAC/IP → IP is /32 or /128
Route
VLAN → EPG (pcTag)
Interface
VRF
Flags → Local, vPC, static, etc.
10
000a.000a.000a
192.168.1.100/24
EPG1
Eth1/2
20
000b.000b.000b
192.168.2.100/24
EPG2
Leaf1# show endpoint mac 000a.000a.000a detail
Legend:
s - arp
O - peer-attached
a - local-aged
S - static
V - vpc-attached
p - peer-aged
M - span
L - local
B - bounce
H - vtep
+-----------------------------------+---------------+-----------------+--------------+-------------+----------------+
VLAN/
Encap
MAC Address
MAC Info/
Interface
Endpoint Group
Domain
VLAN
IP Address
IP Info
Info
+-----------------------------------+---------------+-----------------+--------------+-------------+----------------+
16
vlan-10
000a.000a.000a
L
eth1/1
CL:CL:EPG1
CL:17
vlan-10
192.168.1.100
L
eth1/1
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
98
Endpoint Learning - ARP
ACI Leafs learn via ARP!
Eth1/1
ARP Request
Eth1/2
Who has 192.168.1.101??
DMAC
FFFF.FFFF.FFFF
SMAC
000a.000a.000a
Eth: 0x0806
Eth: 0x0806
Hdr/Opcode
Hdr/Opcode
Sender MAC
000a.000a.000a
Sender IP
192.168.1.100
Target MAC
0000.0000.0000
Target IP
192.168.1.101
000a.000a.000a
192.168.1.100/24
EPG1
000b.000b.000b
192.168.1.101/24
EPG1
Frame
Unicast Routing?
EP Contents
ARP
No
MAC (Sender MAC)
ARP
Yes
MAC (Sender MAC), IP
(Sender-IP)
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
99
Endpoint Learning– Routed Frames
Routed Frame triggers an EP Learn
Eth1/1
000a.000a.000a
192.168.1.100/24
EPG1
Eth1/2
000b.000b.000b
192.168.2.100/24
EPG2
DMAC
BD MAC
SMAC
000a.000a.000a
802.1Q
10
Frame
Unicast Routing
EP Contents
SIP
192.168.1.100
IPV4/6
Yes
DIP
MAC (L2 SRC MAC), IP
(SRC IP)
192.168.2.100
Protocol
1
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
100
Pervasive Gateway
S10
•
To work as a default gateway for
endpoints
•
Gateway IP is programmed on all leafs
that need it
•
Deterministic Traffic Flow to Gateway
L1
L2
•
Consistent Latency across all Devices
Towards Gateway
BD1
BD1
EP1 –EPG1
BD1
#CLMEL
S20
L3
BD1
L4
BD2
EP2 - EPG1
BD1
BRKACI-1001
BD2
EP3 – EPG2
BD2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
101
Proxy Routing
•
•
•
Leafs report EP’s to spine
once Learnt
Spines maintain a database
of all Endpoints Learnt in the
Fabric, and on what Leaf(s)
they exist.
Used for “Hardware Proxy” ✓
BD Mode.
3
✓
EP published
to Spine
S10
S20
✓
EP synced to
other Spines
2
L1
EP
learnt
on Leaf
L3
L2
L4
1
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
102
ARP Flooding
EP1 ARP’s for EP2
•
•
Behavior is the same as
Traditional Switches
ARP is flooded using BD
Multicast Group to all Leafs
that have the BD
S10
S20
3
✓
ARP is flooded
to all leafs that
have the BD
ARP is
2 ✓ Flooded
in
BD, copy to
Spine
1
✓
ARP
Received
on L1
L1
L2
L3
BD1
BD1
BD1
L4
✓
L2 sends
ARP out
ports in BD
✓
L3 sends
ARP to EP2
4
000b.000b.000b
192.168.1.101/24
EP2 - EPG1
BD1
000a.000a.000a
192.168.1.100/24
EP1 - EPG1
BD1
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
103
ARP Optimization – Unicast Routing
EP1 ARP’s for EP2
•
ACI can Unicast ARP to avoid
unnecessary Flood traffic. →
Requires Unicast Routing on
BD
S10
S20
3
✓
Spine knows Target
IP is on L3, Unicast
to L3
✓
L3 learns EP1 from
L1
2 ✓ L1 doesn’t
know Target
IP → Send to
Spine!
L1
1
✓
ARP
Received
on L1
L2
L3
L4
BD1
BD1
4
000a.000a.000a
192.168.1.100/24
EP1 - EPG1
#CLMEL
✓
L3 sends
ARP to EP2
000b.000b.000b
192.168.1.101/24
EP2 - EPG1
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
104
Known Unicast – Layer 2
EP1 pings EP2
Outer
Outer
SIP
L1
DIP
L3
VXLAN
BD1
S10
✓
2
from L1 directly
to L3 through
spines
L1 looks at the
DMAC and
knows it exists
on L3 in EPG1
L1
Inner
3 ✓ Packet is sent
S20
L2
L3
L4
Inner
BD1
BD1
DMAC
BBBB
SMAC
AAAA
SIP
192.168.1.100
DIP
192.168.1.101
Protocol
ICMP
1
✓
ICMP
Received
on L1
4 ✓ L3 sends
ICMP to EP2
000a.000a.000a
192.168.1.100/24
EP1 - EPG1
#CLMEL
BRKACI-1001
000b.000b.000b
192.168.1.101/24
EP2 - EPG1
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
105
Known Unicast – Layer 3
EP1 pings EP2
S10
S20
4
2 ✓ L1 looks at the
DST IP and
knows it exists
on L3 in EPG2
Subnet under BD acts as GW
If traffic is destined to the GW
MAC, we do an IP Lookup in the
VRF
EPG1
EPG2
✓
Packet is sent
from L1
directly to L3
through spines
X
L1
1
✓
ICMP
Received
on BD GW
L3
L2
BD1
L4
BD2
5
3
ICMP
✓
L3 sends
ICMP to EP2
ICMP
000a.000a.000a
192.168.1.100/24
EP1 - EPG1
#CLMEL
BRKACI-1001
000b.000b.000b
192.168.2.100/24
EP2 – EPG2
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
106
Day 4:
Network Centric Migrations
Physical Layer
S10
L1
S20
L3
L4
L2
vPC to allow L2 VLANs
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
108
Checklist
✓ Physical Layer ☺
❑ Layer 2
❑ Layer 3
Network Centric Design
L2 Migration Recommendations
BD_VLAN100
+
Each Legacy VLAN requires a unique Bridge Domain
Settings: Unicast Routing Disabled
Unknown L2 Flooding
ARP Flooding
EPG
VLAN_100
=
Each Legacy VLAN has a unique EPG
Legacy VLAN
100
What have we Accomplished?
Each Legacy VLAN maps to a unique Bridge Domain
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
110
Conceptual View
Legacy
ACI
VRF CiscoLive
BD_VLAN100
EPG
VLAN_100
VLAN100
VLAN101
BD_VLAN101
EPG
VLAN_101
BD_VLAN102
EPG
VLAN_102
VLAN102
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
111
Conceptual View
S10
S20
SVI/VLAN:100
192.168.100.1
L1
SVI/VLAN:101
192.168.101.1
SVI/VLAN:102
192.168.102.1
L3
L4
L2
L2 Extension
VLAN100
VLAN101
BD_100
BD_101
BD_102
EPG 100
EPG 101
EPG 102
VLAN102
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
112
Spanning-tree in ACI
•
ACI Fabric does not run Spanning-tree
•
BPDUs are flooded in ‘EPG VNID’ (use same VLAN pool for all ports deploying legacy VLANs)
•
ACI Fabric does snoop BPDUs and will flush Endpoints (Mac & IP) when TCNs are received
•
Learning is disabled when excessive BPDUs are received
•
External Spanning-tree devices should be configured with “spanning-tree linktype shared”
•
Use “show mcp internal info vlan encap_vlan” to see TCNs
Leaf101# show mcp internal info vlan 100
------------------------------------------------PI VLAN: 13 Up
Encap VLAN: 100
PVRSTP TC Count: 11
RSTP TC Count: 0
Last TC flush at Mon May 1 19:32:22 2017
on Tunnel13
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
113
Verification
APIC GUI shows connected Endpoints (MAC and or IP) per EPG and Path
E.g.: 5C:83:8F:69:BB:C9 (N7K) connected via Nodes-101-102/N7710-vPC
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
114
Checklist
✓ Physical Layer ☺
✓ Layer 2
❑ Layer 3
Network Centric Design
L3 Migration Requirements
Configure “Layer 3 Out” to create a routed connection to legacy network
Routed Interface
Routed subinterface
Subnet
Switched Virtual Interface (SVI)
Bride Domain
Bridge Domain with “Unicast Routing” enabled
Subnet defined on BD
L3Out associated with BD
EPG
VLAN_100
L3Out
EPG has contract to L3Out Network
Dynamic Routing
OSPF/ EIGRP/ BGP/ Static
Routing Protocol
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
116
Conceptual View
S10
S20
L3 Extension
SVI/VLAN:100
192.168.100.1
L1
SVI/VLAN:101
192.168.101.1
SVI/VLAN:102
192.168.102.1
L3
L4
L2
L2 Extension
VLAN100
VLAN101
BD_100
BD_101
BD_102
EPG 100
EPG 101
EPG 102
VLAN102
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
117
L3 Migration Considerations
1)
Disable External GW!
2)
Bridge Domain Settings
Unicast routing Enabled – Minor Service Impact
L2 Unknown Unicast H/W Proxy – Service Impact
ARP Flooding Optimized - In conjunction with L2 Unknown
Unicast
Limit IP learning to Subnet
Off Subnet Learns are cleared
Learning is disabled for 2 minutes
3) Global Settings
Enforce Subnet Check - adds prefix check to all BD’s
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
118
Verification
APIC GUI now shows IP information since UC Routing is enabled on BD
E.g.: 192.168.102.11 connected via Nodes-101-102/BareMetal02-vPC
Recommended Content! – ACI Endpoint Learning White Paper
https://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/white-paper-c11-739989.html
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
119
Verification
GUI
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
120
Verification
Leaf101# show ip
OSPF Process ID
Total number of
Neighbor ID
192.168.255.255
SSH
ospf neighbors vrf CiscoLive:VRF1
default VRF CiscoLive:VRF1
neighbors: 1
Pri State
Up Time Address
1 FULL/BDR
02:27:05 192.168.255.2
Interface
Eth1/13
Leaf101# show ip route vrf CiscoLive:VRF1 10.0.0.0/8
IP Route Table for VRF "CiscoLive:VRF1"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%<string>' in via output denotes VRF <string>
10.0.0.0/8, ubest/mbest: 1/0
*via 192.168.255.2, eth1/13, [110/5], 01:45:34, ospf-default
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
121
Checklist
✓ Physical Layer ☺
✓ Layer 2
✓ Layer 3
Common Pitfalls
Old Gateway still Active!
S10
S20
L3 Extension
SVI/VLAN:100
192.168.100.1
L1
SVI/VLAN:101
192.168.101.1
SVI/VLAN:102
192.168.102.1
L3
L4
SVI/VLAN:100
192.168.100.1
SVI/VLAN:101
192.168.101.1
SVI/VLAN:102
192.168.102.1
L2
L2 Extension
VLAN100
VLAN101
BD_100
BD_101
BD_102
EPG 100
EPG 101
EPG 102
VLAN102
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
123
Common Pitfalls
S10
Windows Dynamic Load Balancing
S20
Problem:
Traffic is Sourced with the same IP but from
both NIC’s using different MACs
ACI Fabric sees frequent IP Move between
MAC’s when Routing is Enabled!
L1
L3
L2
L4
Solution:
Use “Hyper-V Port” to force single MAC to
IP Communication
NIC1: MAC A
NIC1: MAC A
NIC2: MAC B
IP: 192.168.100.11
IP: 192.168.100.10
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
124
Day 5: Multi-Location
Deployment Options
Stretched Fabric
S10
S20
L2
L3
L1
APIC
APIC
L4
IS-IS
L5
L6
APIC
S11
S21
L8
L9
L7
L10
APIC
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
126
Stretched Fabric
Advantages
•
•
•
All one Fabric
No Additional Routed Infrastructure
Simple Provisioning – If cabling is in
place
S10
S20
L2
L3
S11
S21
L8
L9
Limitations
•
•
•
Single APIC Failure Domain
L1 Connectivity between Transit Leafs
and spines (dark fiber)
Same Control Plane Instance Across
Sites
L1
L4
APIC
APIC
#CLUS
BRKACI-1001
L5
L6
L7
L10
APIC
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
127
IPN MTU Requirements: 9150 Bytes
Multipod
IPN
S10
S20
L2
L3
L1
APIC
APIC
IPv4 Multicast
Network
IS-IS
OSPF
IPN
L7
L4
APIC
S11
S21
L8
L9
L10
APIC
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
128
Multipod
Advantages
•
•
•
•
All one Fabric
Policy Stretched across sites
Separate Control Plane Instances per
site
Increases Leaf Scale to 400
Limitations
•
•
•
•
Single APIC Failure Domain
Need dedicated Routing Devices as
Inter-Pod Network (IPN) Routers.
Requires PIM BI-Dir to route BUM traffic
between sites.
50ms max latency between pods
IPN
S10
S20
L2
L3
L1
APIC
#CLUS
L4
APIC
BRKACI-1001
IPN
L7
S11
S21
L8
L9
L10
APIC
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
129
IPN MTU Requirements: 9150 Bytes
Remote Leaf
ISN
IPV4 “Inter-site”
Network
IS-IS
OSPF
ISN
Remote Office/ DC
Primary Site
S10
S20
L2
L3
L1
APIC
APIC
RL1
RL2
L4
APIC
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
130
Remote Leaf
Advantages
•
•
•
•
All one Fabric
Easy Addition of small site to existing
APIC
Spines not required in Remote Site.
Connects to existing routing
infrastructure
• No Multicast required
ISN
L1
S10
S20
L2
L3
ISN
RL1
RL2
L4
Limitations
•
•
•
All traffic goes to “main” site before
other sites.
140ms Latency Restriction
Port Count
APIC
APIC
#CLUS
APIC
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
131
IPN MTU Requirements: 9150 Bytes
Multi-Site
ISN
S10
S20
L2
L3
L1
IPV4 “Inter-site”
Network
IS-IS
OSPF
ISN
S10
S20
L2
L3
L1
L4
L4
ACI
Multi-Site
ACI
Controller
Multi-Site
ACI
Controller
Multi-Site
Controller
APIC
APIC
APIC
APIC
#CLUS
BRKACI-1001
APIC
APIC
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
132
Multi-Site
Advantages
•
•
•
ISN
Two Independent Fabrics (APIC Clusters)
Policy is synchronized using Multi-Site Controller
Connects to existing routing infrastructure
• No Multicast required
L1
S10
S20
L2
L3
•
500ms – 1s latency for OOB
MSC → APIC connectivity
Not all Site Specific Config can be done from
MSC
L1
L4
Limitations
•
ISN
S10
S20
L2
L3
L4
ACI
Multi-Site
ACI
Controller
Multi-Site
ACI
Controller
Multi-Site
Controller
APIC
#CLUS
APIC
APIC
BRKACI-1001
APIC
APIC
APIC
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
133
Day 6:
Troubleshooting Tools
Faults
Available in 2.2(2e)!
☺
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
135
EP Tracker
“We had a
problem at
14:21!!!”
Attach/Detach events
are logged for each EP
IP Was Moving???
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
136
Atomic Counters
S10
Used to measure packet loss in Overlay
Logs packet count between EP’s on different Leafs
Specific Filter can be set
Requires NTP!
Leaf
Direction
Filter
Packet Count
L1
Tx
ICMP
500
L2
Rx
ICMP
500
Rx
Tx
L1
L2
192.168.101.10
192.168.102.11
Ping –c 500 192.168.102.11 –c 500
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
137
Atomic Counters
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
138
Atomic Counters
NO Packet Loss In Overlay
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
139
S10
SPAN
•
•
•
ACI allows for SPAN of EPG
ERSPAN Destination must be an IP EP
Learnt in ACI
EP Can run Wireshark or Tshark
L1
L2
ERSPAN
10.10.10.10
EPG 100
SPAN Source
SPAN Destination
EPG
ERSPAN
Port
ERPSAN/Local
Port
EP Learnt
#CLUS
BRKACI-1001
Leaf101# show monitor session all
session 1
--------------description
: Span session 1
type
: erspan
version
: 2
oper version
: 1
state
: up (active)
erspan-id
: 1
granularity
:
vrf-name
: CiscoLive:VRF1
acl-name
:
ip-ttl
: 64
ip-dscp
: ip-dscp not
specified
destination-ip
: 10.10.10.10/32
origin-ip
: 1.1.1.1
mode
: access
source VLANs
:
rx
: 100
tx
: 100
both
: 100
filter VLANs
: filter not specified
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
140
Troubleshooting Wizard - Faults
Shows Faults
in the Path
Builds Topology of Flow
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
141
Troubleshooting Wizard – Drop Stats
Shows Drops on Every Hop. Green
Arrows portray no Drops
NOTE: Some Drops are expected.
Look for Drops like “Buffer” and “Error”!
Recommended Content! – Understanding Drop Faults in ACI
http://www.cisco.com/c/en/us/support/docs/cloud-systems-management/application-policyinfrastructure-controller-apic/210539-Explanations-of-Packet-Drop-Faults-in-AC.html
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
142
Troubleshooting Wizard - Contracts
Shows Contracts for Flows
Implicit Deny
#CLMEL
Allow SSH
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
143
Troubleshooting Wizard – Atomic Counters
No Drops!
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
144
Troubleshooting Wizard – SPAN
Ability to SPAN to APIC or other devices
attached to the Fabric
User can select which ports to SPAN
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
145
Capacity Dashboard
Contract TCAM is Full!
Capacity Dashboard panel displays your usage by range and percentage.
Use this to plan your fabric Scale.
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
146
App Center
Enhanced Endpoint Tracker
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
147
Enhanced Endpoint Tracker
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
148
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
149
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
150
App Center
Elam Assistant
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
151
ELAM Assistant
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
152
ELAM Assistant
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
153
Day 7: Additional
Resources
Support Forums
TAC Engineers are Subscribed
Easy Portal to Post Non Impacting
Questions or Concerns
Has Documentation written by CSE’s
and Technical Leaders
https://supportforums.cisco.com/t5/application-centric/bd-p/12206936-discussions-aci
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
155
Facebook Group
Many Customers and Cisco Employees
Great Real World Deployment Advice
Great way to meet others working
with ACI
Great Community ☺
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
156
Solutions Support
One TAC team to support all aspects of
ACI
Engineers are familiar with 3rd party
products like VMWare
Case does not get handed off when it
is a Switching vs. Routing issue.
ACI Team takes ownership
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
157
JumpStart
Program designed by TAC
Two 3-hour WebEx session with TAC
Talk to your Cisco Account team to get
scheduled for your JumpStart!
#CLUS
BRKACI-1001
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public
158
Continue
your
education
Demos in
the Cisco
campus
Walk-in
self-paced
labs
#CLMEL
BRKACI-1001
Meet the
engineer
1:1
meetings
Related
sessions
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
159
Complete your online session evaluation
Give us your feedback to be entered into a
Daily Survey Drawing.
Complete your session surveys through the
Cisco Live mobile app or on
www.CiscoLive.com/us.
Don’t forget: Cisco Live sessions will be available for viewing on
demand after the event at www.CiscoLive.com/Online.
#CLMEL
BRKACI-1001
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public
160
Thank you
#CLMEL
#CLMEL