Uploaded by youhad.news

LG-DCACIv1.11 Rev B- March 04 2023

advertisement
DCACI
Implementing Cisco Application
Centric Infrastructure Lab Guide
Version 1.11 Rev B
March 2023
ACI v5.1
VMware v6.7
This DCACI lab guide:
1. Is based on using both the Cisco ACI Simulator and the ACI Physical
Equipment.
2. No Instructor demonstrations are required.
3. This document contains extra NterOne Bonus labs on ACI
Table of Contents
Discovery Lab 0: Accessing the NterOne Lab Devices .............................................. 1

Task 1: Connect to your NterOne Lab Environment ............................................. 2
Discovery Lab 1: Validate Fabric Discovery............................................................... 7

Task 1: Configure your ACI Fabric ....................................................................... 8

Task 2: Log in to the APIC Controller from the GUI............................................ 11

Task 3: Register the ACI Fabric Switches .......................................................... 18
Discovery Lab 2: Configure NTP ............................................................................... 28

Task 0: Log in to the APIC Controller ................................................................. 29

Task 1: Configure the Date and Time Format and NTP ..................................... 30
Discovery Lab 3: Create Access Policies and vPC .................................................. 35

Task 0: Log in to the APIC Controller in the Physical Equipment ....................... 40

Task 1: Verify the NTP Time .............................................................................. 43

Task 2: Verify DNS for the APIC ........................................................................ 44

Task 3: Verify DNS for the Fabric Switches ....................................................... 46

Task 4: Verify the MP-BGP Route Reflectors..................................................... 48

Task 5: Verify the ACI Inactivity Timer ............................................................... 52

Task 6: Create Link Level Interface Policies ...................................................... 53

Task 7: Create CDP Interface Policies ............................................................... 56

Task 8: Create LLDP Interface Policies ............................................................. 59

Task 9: Verify Interface Profiles and Switch Profiles .......................................... 62

Task 10: Verify VPC Pair ................................................................................... 64

Task 11: Configure Interface Selectors for the Interface Profiles........................ 66

Task 12: Configure Interface Policy Groups ....................................................... 68

Task 13: Configure VLAN Pool, Physical Domain, and AAEP ............................ 71

Task 14: Configure Port Channel on the External Switch ................................... 77
Table of Contents
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
i

Task 15: Verify the vPC ..................................................................................... 79
Discovery Lab 4: Enable Layer 2 Connectivity in the same EPG............................. 81

Task 0: Log in to the APIC Controller ................................................................. 83

Task 1: Create a Tenant .................................................................................... 84

Task 2: Create a VRF ........................................................................................ 86

Task 3: Create a Bridge Domain ........................................................................ 88

Task 4: Create Subnets within the Bridge Domain ............................................. 90

Task 5: Create Filters ........................................................................................ 93

Task 6: Create Contracts ................................................................................... 97

Task 7: Create Application Profile .................................................................... 104
Discovery Lab 5: Integrate Cisco APIC with VMware vCenter Using VMware
VDS ............................................................................................................................ 109

Task 0: Log in to the APIC Controller and the Web based VMware
vSphere Client ................................................................................................. 111

Task 1: Create a VLAN Pool ............................................................................ 115

Task 2: Create a VMM Domain ........................................................................ 118

Task 3: Verify the APIC Connection to the vCenter Server .............................. 122

Task 4: Verify an Attachable Access Entity Profile ........................................... 124

Task 5: Add the VMM Domain to the AEP ....................................................... 125

Task 6: Create an Interface Policy Group ........................................................ 127

Task 7: Verify the Properties of your Pod Distributed Switch ........................... 129

Task 8: Verify the Interface Policy Groups ....................................................... 132

Task 9: Verify the Leaf Interface Profiles ......................................................... 133

Task 10: Verify the Leaf Profiles ...................................................................... 134

Task 11: Add ESXi Hosts to the ACI DVS ........................................................ 136

Task 12: Associate the vCenter Domain to the APP EPG ................................ 144

Task 13: Associate the vCenter Domain to the DB EPG .................................. 146

Task 14: Associate the vCenter Domain to the WEB EPG ............................... 147

Task 15: Verify the Creation of the ACI DVS Port Groups within vCenter ........ 148

Task 16: Add the App Server VM to the ACI DVS ............................................ 154

Task 17: Add the DB Server VM to the ACI DVS ............................................. 162

Task 18: Add the Web Server VM to the ACI DVS ........................................... 163

Task 19: Verify Base Connectivity in the Three VMs........................................ 164
Discovery Lab 6: Enable Inter-EPG Layer 2 Connectivity ..................................... 170

Table of Contents
Task 0: Log in to the APIC Controller and the Web based VMware
vSphere Client ................................................................................................. 172
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
ii

Task 1: Create a VLAN Pool ............................................................................ 176

Task 2: Create a Physical Domain ................................................................... 179

Task 3: Create an Attachable Access Entity Profile ......................................... 181

Task 4: Create an Interface Policy Group ........................................................ 183

Task 5: Create an Interface Profile .................................................................. 185

Task 6: Create a Switch Profile ........................................................................ 187

Task 7: Create a Bridge Domain ...................................................................... 189

Task 8: Create a Bare Metal EPG.................................................................... 192

Task 9: Create a New Contract ........................................................................ 196

Task 10: Configure Contracts between the DB EPG and the Bare Metal
EPG ................................................................................................................. 199

Task 11: Verify Connectivity to the Bare Metal Server ..................................... 203

Task 12: Verify Connectivity to the Bare Metal Server as a Layer 2
Connection ...................................................................................................... 209
Discovery Lab 7: Enable Inter-EPG Layer 3 Connectivity ..................................... 212

Task 0: Log in to the APIC Controller and the Web based VMware
vSphere Client ................................................................................................. 213

Task 1: Examine Cisco ACI Layer 3 Networking .............................................. 217
Discovery Lab 8: Configure External Layer 2 Connection ..................................... 224

Task 0: Log in to the APIC Controller and the Web based VMware
vSphere Client ................................................................................................. 225

Task 1: Verify an Attachable Access Entity Profile ........................................... 229

Task 2: Verify an Interface Policy Group .......................................................... 230

Task 3: Verify an Interface Profile .................................................................... 231

Task 4: Verify a Switch Profile ......................................................................... 232

Task 5: Create a VLAN Pool for the External Bridged Domain ......................... 234

Task 6: Create an External Bridged Domain (Layer 2 Domain) ........................ 237

Task 7: Create an External Bridged Network ................................................... 239

Task 8: Configure Contracts between the Web EPG and the External
Bridged Network .............................................................................................. 242

Task 9: Verify That the Web EPG Can Communicate with the External
Bridged Domain ............................................................................................... 245
Discovery Lab 9: Configure External Layer 3 (L3Out) Connection ....................... 249

Task 0: Log in to the APIC Controller and the Web based VMware
vSphere Client ................................................................................................. 251

Task 1: Verify an Attachable Access Entity Profile used for L3Out ................... 255

Task 2: Verify a Leaf Access Port .................................................................... 256
Table of Contents
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
iii

Task 3: Verify an Interface Profile .................................................................... 257

Task 4: Verify a Leaf Profile ............................................................................. 258

Task 5: Create a VLAN Pool for the External Routed Domain ......................... 260

Task 6: Create an External Routed Domain (Layer 3 Domain)......................... 263

Task 7: Configure an OSPF Interface Policy .................................................... 265

Task 8: Create an External Routed Network .................................................... 267

Task 9: Verify that the Leaf is Learning OSPF Routes ..................................... 272

Task 10: Configure Contracts between the Web EPG and the External
Routed Network ............................................................................................... 277

Task 11: Associate the External Routed Network to the Bridge Domain .......... 279

Task 12: Advertise Subnets to the External Routed Network ........................... 281
NTERONE ACI BONUS LABS ............................................................................................... 286
Discovery Lab 10: Monitoring and Diagnosing ACI ............................................... 287

Task 0: Log in to the APIC Controller ............................................................... 288

Task 1: Configuring Syslog Monitoring............................................................. 289

Task 2: View Faults Using the Cisco APIC GUI ............................................... 295

Task 3: View Events Using the Cisco APIC GUI .............................................. 299

Task 4: Using the API Inspector....................................................................... 300
Discovery Lab 11: Use Visore to Explore an ACI Tenant ...................................... 305

Task 0: Log in to the APIC Controller ............................................................... 306

Task 1: Use the Managed Object Browser (Visore) ......................................... 307
Discovery Lab 12: Configure Tenant Span ............................................................. 310

Task 0: Log in to the APIC Controller ............................................................... 311

Task 1: Using the Operations Tab in APIC ...................................................... 312

Task 2: Configure SPAN .................................................................................. 316
Discovery Lab 13: Configure RBAC using Local and Radius Users ................... 328

Task 0: Log in to the APIC Controller ............................................................... 329

Task 1: Verify the RADIUS Provider ................................................................ 330

Task 2: Create a Security Domain and Map It to Your Tenant ......................... 332

Task 3: Configure Local Users and Roles for your Tenant Security
Domain ............................................................................................................ 334

Task 4: Verify the Configuration of the Local User Accounts............................ 340

Task 5: Create a RADIUS Security Domain and Map It to your Tenant............ 347

Task 6: Create a RADIUS User Accounts ........................................................ 352

Task 7: Verify the Configuration of the RADIUS User Accounts ....................... 354
Table of Contents
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
iv
Discovery Lab 14: Configure the APIC Using the ACI Cobra SDK (Python) ......... 358

Task 0: Log in to the APIC Controller ............................................................... 359

Task 1: Enable HTTP Access for the APIs to use TCP port 80 ........................ 360

Task 2: Review an Existing Python Script ........................................................ 362

Task 3: Use a Python Script to Create a Tenant .............................................. 365
Discovery Lab 15: Configure the APIC Using the Cisco APIC REST to
Python Adapter (ARYA) ............................................................................................ 370

Task 0: Log in to the APIC Controller ............................................................... 371

Task 1: Save an Object as an XML File ........................................................... 372

Task 2: Use ARYA to Create a Python Script .................................................. 375

Task 3: Configure the APIC Using the Modified Python Script ......................... 380
Table of Contents
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
v
Discovery Lab 0: Accessing the
NterOne Lab Devices
The purpose of this lab exercise is to make you familiar with the NterOne lab environment and how to
successfully connect to the various devices that you will use during this class.
Discovery Lab 0
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
1
Task 1: Connect to your NterOne Lab Environment
Activity Procedure
Follow the steps in this Task in order to log in to a Student Server.
Step 1
Log in to your personal/work computer where you are at now.
Step 2
Verify that your computer is able to access the Internet. A simple test to verify
this would be to use a browser to access www.nterone.com.
Note
Ideally disconnect from any VPN you may have open. Your lab performance will be better without
any VPN connection.
Step 3
From your computer where you are physically at now, open your web browser
and go this web site as assigned by your instructor.

Discovery Lab 0
https://my.labtyme.com/#/
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
2
Step 4
Enter the Username and Password needed to connect to the Student Server.
Note
Ask your instructor for the login credentials.
Username:
Password:
Step 5
Discovery Lab 0
Under All Connections, open the tab ACI-Simulator. Note the two virtual
machines available for these next few labs for your assigned pod:

AdminPC

APIC
Note
The ACI-Simulator will be used for the first two DCACI labs. Later labs will use the ACI-Physical
equipment.
Step 6
Right-click on the APIC object and select Open link in new tab.
Note
While you can just left click on a link to go directly into the selected virtual machine, opening in a
new tab will allow you to switch back and forth between the virtual machine with greater ease in this
lab environment.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
3
Discovery Lab 0
Note
FYI: If you happen to directly left-click on one of the VMs, you will only see that VM in your browser.
As needed, you can click the back button in your browser to return to the main Labtyme portal.
Step 7
From the Labtyme portal, right-click on the AdminPC object and select Open
link in new tab.
Step 8
Click on the AdminPC tab in your browser.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
4
Step 9
Note
Discovery Lab 0
Log in as needed to Windows on the AdminPC as:

username: admin

Password: 1234QWer
You may be logged into this Windows AdminPC automatically. You don’t have to log in again
manually if so.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
5
Discovery Lab 0
Note
The most commonly used applications, such as Chrome, will have a shortcut to them on the
Desktop. Other applications may also be found using the Start menu.
Step 10
The process to connect to your lab environment is complete. Keep these two
tabs open as you will refer back to them often in later labs.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
6
Discovery Lab 1:
Validate Fabric Discovery
Overview
This activity will guide you through this process, and then familiarize you with the fabric topology portion
of the APIC GUI.
Upon completing this guided lab, you will be able to:

Configure a new APIC.

Log in to the APIC.

Register Nexus 9000 switches to the primary APIC controller.

Explore the management interface on the APIC controller.
Lab Devices
During this class you will be using the ACI Lab environment. This DCACI ACI lab uses the Cisco ACI
Simulator that contains the following equipment all provisioned virtually:

One (1) Cisco Application Policy Infrastructure Controller (APIC).

One (1) Cisco Nexus C9000 Switch running in ACI mode (Spine switch).

Two (2) Cisco Nexus C9000 Switches running in ACI mode (Leaf switches).
Discovery Lab 1
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
7
Task 1: Configure your ACI Fabric
In this task you will configure the ACI APIC from the very beginning. This lab is based on the Cisco
APIC Simulator. You will see the questions asked on a very initial ACI APIC configuration.
Note
This lab must be performed on the ACI-Simulator as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Discovery Lab 1
Step 1
Click on your web browser connection to the APIC. Your screen will initially
appear all black. Left mouse click on the black screen and press enter a few
times to “wake it up.”
Note
You may have answered a few of the initial questions accidentally by clicking on the screen. This is
OK initially.
Step 2
Press ctrl-d to start the APIC installation again from the very beginning.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
8
Discovery Lab 1
Step 3
Enter the fabric name: ACI Fabric1
Note
When an entry shows up in [brackets] as the default being the same as you are required to enter,
you can just click enter on the question. Do not do this for all entries as some entries must be
changed in this lab environment per the following steps.
Step 4
Enter the fabric ID: 1
Step 5
Enter the number of active controllers in the fabric: 3
Step 6
Enter the POD ID: 1
Step 7
Is this a standby controller: NO
Step 8
Enter the controller ID: 1
Step 9
Enter the controller name: apic1
Step 10
Enter address pool for TEP addresses: 10.0.0.0/16
Step 11
Enter the VLAN ID for infra network: 4
Step 12
Enter address pool for BD multicast addresses: 225.0.0.0/15
Step 13
Enable IPv6 for Out of Band Mgmt Interface: N
Step 14
Enter the IPv4 address: 192.168.51.12/24
Note
This is the IP address to access the APIC for all ACI management. Be sure to NOT use the default
IP address provided by the simulator or you will not have access in this lab environment to the
APIC from the AdminPC.
Step 15
Enter the IPv4 address of the default gateway: 192.168.51.1
Step 16
Enter the interface speed/duplex mode: auto
Step 17
Enable strong passwords: N
Step 18
password for admin: 1234QWer
Step 19
When you are prompted to edit the configuration, you can do so if you doubt any
of your prior configurations. If you do not need to make any changes, enter: n
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
9
Note
The APIC will accept your configuration and reboot. This will take several minutes. When the APIC
reboots it will ask you to login. If you enter in the credentials right away, the login will fail as the
APIC is still starting services in the background. Give the APIC at least 5 minutes.
Step 20
Login to the APIC in the console with the credentials:
Note
Discovery Lab 1

Apic login: admin

Password: 1234QWer
You can keep the browser tab to the APIC CLI open as you will refer back to it in later lab steps.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
10
Task 2: Log in to the APIC Controller from the GUI
In this task, you will log in to the APIC controller using the graphical user interface (GUI) from the
AdminPC. Be sure you allow at least 5 minutes for the APIC to be installed, reboot and services
started from the last task before you start this task.
Activity Procedure
Complete the following steps:
Step 1
Click in the browser tab to your Windows 10 AdminPC.
Step 2
From your AdminPC desktop, start the Chrome browser.
Step 3
Navigate to the following URL of your newly installed Cisco APIC:
https://192.168.51.12
Discovery Lab 1
Note
Http is disabled on any newly configured APIC. Be sure to connect with https.
Step 4
Click Advanced if you are prompted about your browser connection.
Step 5
Click to Proceed to 192.168.51.12 (unsafe).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
11
Discovery Lab 1
Note
You are seeing these security warnings in your browser because in this ACI lab environment there
is no Public Key Infrastructure (PKI) with a Certificate Authority (CA) to manage the digital
certificates between your browser and the APIC.
Step 6
Login to the APIC using the following credentials:

User ID: admin

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
12
Step 7
Discovery Lab 1
At this point you should see the APIC dashboard. Select Do not show on login.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
13
Discovery Lab 1
Step 8
Click Begin First Time Setup.
Step 9
Click Close.
Step 10
Note the layout of the Cisco ACI GUI interface. The top portion is referred to as
the Menu bar.
Step 11
Once a tab is selected from the Menu bar, a Submenu bar will appear below the
Menu bar. Click on Tenants. Note how the Submenu changes.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
14
Discovery Lab 1
Note
The Navigation pane displays on the left side of the APIC GUI, below the Submenu bar. This pane
provides centralized navigation to all elements of the submenu category. When you choose a
component in the Navigation pane, the object displays in the Work pane that displays on the right
side of the APIC GUI. This pane displays details about the component selected in the Navigation
pane.
Step 12
In the far upper right, click on Manage my profile.
Note
The upper right-hand corner of the APC GUI indicates the user account with which you logged in to
the APIC GUI.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
15
Step 13
Select Settings from the drop-down menu.
Step 14
The Application Settings window will appear. These settings affect how the
APIC GUI responds as you use it. Enter the values in the following table.
Field
Discovery Lab 1
Value
Remember Tree Selection
Checked
Preserve Tree Divider Position
Checked
Disable Notification on Success
Checked
Disable Deployment Warning at Login
Unchecked
Show all UI Sections
Checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
16
Step 15
Discovery Lab 1
Click the OK button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
17
Task 3: Register the ACI Fabric Switches
This task is only done once per ACI fabric. In this task, you will register the Nexus 9000 Switches to the
fabric managed by APIC-1.
Activity Procedure
Complete the following steps:
Discovery Lab 1
Step 1
From your AdminPC, login to the APIC as needed.
Step 2
In the Menu bar, click Fabric.
Step 3
In the Submenu bar, click Inventory.
Step 4
Click Fabric Membership and select the tab Registered Nodes. Note that
initially there are no Spines or Leaves registered to this new APIC.
Step 5
Click on the tab Node Pending Registration in the Navigation pane to expand
the view and notice the single switch entry under the Fabric Membership folder.
This is the leaf switch that the APIC is first connected to, which is not yet
registered. Right-click on the leaf and click Register.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
18
Discovery Lab 1
Note
The APICs and the ACI switches use Link Layer Discovery Protocol (LLDP) to discover connected
devices. Devices that are discovered are not automatically added to the fabric; an ACI admin must
determine which devices should be added to the fabric and then manually register them.
Note
Unregistered switches are assigned the Node ID of 0. By default, switches detected by the fabric
are not added to the fabric automatically, they must be added manually.
Note
The APIC is connected to two leaf switches; these leaf switches will be registered as Leaf-1 and
Leaf-2 in the next few steps
Step 6
Add the entries for the first Leaf.

Node ID: 101

Node Name: Leaf-1
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
19
Discovery Lab 1
Note
The Node ID has to be greater than 100 because the APIC reserves the node IDs 1 through 100 for
future APICs that may be added to the fabric.
Step 7
Click the Register button.
Step 8
The APIC will now begin discovering the fabric along with other APICs. Wait 30
to 60 seconds for the APIC GUI to see other spine switches in the fabric. You
should see an additional switch appear in the Nodes Pending Registration tab.
This switch will be the spine switch in the ACI Rack.
Note
Observe that the Leaf switch now has a private (RFC 1918) IP address assigned. This DHCP
address range is configured on the APIC when first installed and managed by the APIC for
infrastructure communication across the ACI fabric.
Note
The fabric will discover another switch. Notice under the ROLE that these are spine switches with
their Node ID set to 0.
Step 9
After a minute or so, look under the Nodes Pending Registration for the spine
to appear. Right-click on the spine when it appears and select Register.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
20
Step 10
Step 11
Discovery Lab 1
Add the entries for the Spine. There is only one spine that will appear in this
APIC simulator.

Node ID: 102

Node Name: Spine-1
Click Register.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
21
Step 12
After a minute or so, look under the Nodes Pending Registration for the last
leaf to appear.
Step 13
Register the next leaf with following entries:
Step 14
Discovery Lab 1

Node ID: 103

Node Name: Leaf-2
Verify that the spine and two leaf switches register with the correct node id with
the Status Active under the Registered Nodes tab.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
22
Discovery Lab 1
Note
You may have to highlight a switch, right-click and click Commission to ensure all switches
become Active. Do so as needed.
Step 15
In the Navigation pane, click the Topology folder and the Topology tab. You
should see the complete ACI fabric, which now includes one spine switch, two
leaf switches, and one APIC.
Note
In a production network, you can have more spines, APICs and many more leaves than shown
here.
Step 16
Double-click on Spine-1. Note the connections to the two leaves.
Step 17
Click the X in the upper right to close the window when you are done.
Step 18
Navigate to Fabric > Inventory > Pod 1 > Leaf-1 and choose the General tab.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
23
Discovery Lab 1
Step 19
Note the various pieces of information such as the Model type, serial number of
the switch, the management address not yet assigned and other chassis
information.
Step 20
Click on the Interface tab.
Step 21
Hover your mouse over each interface and note all information that appears on
the pop-up window.
Step 22
Navigate to Fabric > Inventory > Pod 1 > Leaf-1 > Interfaces > Physical
Interfaces.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
24
Discovery Lab 1
Step 23
Note all the information on each of the Leaf-1 interfaces.
Step 24
From your AdminPC desktop, start a PuTTY session.
Step 25
Log in to APIC-1 using the following information:

IP address: 192.168.51.12

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Note
You may want to make your PuTTY window wide on your screen to increase visibility.
Step 26
Run the acidiag -h command to view the available ACI diagnostics options.
Note
If you follow the command with | more you can read the output one page at a time.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
25
Discovery Lab 1
Note
The acidiag command is a useful troubleshooting command that allows you to gather information
about the entire ACI fabric from the APIC command line.
Step 27
View the fabric node vector using the acidaig fnvread command.
Step 28
Go to the configuration mode on the APIC and display the entire fabric running
configuration.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
26
Discovery Lab 1
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
27
Discovery Lab 2:
Configure NTP
Overview
The Network Time Protocol (NTP) synchronizes the time of day among a set of distributed time servers
and clients. NTP uses the User Datagram Protocol (UDP) as its transport protocol. All NTP
communications use Coordinated Universal Time (UTC).
NTP uses a stratum to describe the distance between a network device and an authoritative time
source. A stratum 1 time server is directly attached to an authoritative time source (such as a radio or
atomic clock or a GPS time source). A stratum 2 NTP server receives its time through NTP from a
stratum 1 time server.
An NTP server usually receives its time from an authoritative time source, such as a radio clock or an
atomic clock attached to a time server, and then distributes this time across the network. NTP is
extremely efficient; no more than one packet per minute is necessary to synchronize two machines to
within a millisecond of each other.
In this scenario, you will use NTP to synchronize the APIC and the fabric to an NTP server in the lab
environment. NTP will start working after out-of-band management IP addresses are configured on the
fabric switches.
These NTP settings are applied only once per ACI fabric.
Discovery Lab 2
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
28
Task 0: Log in to the APIC Controller
In this task, you will log in to the APIC controller using the graphical user interface (GUI).
Activity Procedure
Note
This lab must be performed on the ACI-Simulator as shown in the Labtyme portal.
Complete the following steps:
Step 1
Verify that you are currently logged in to your AdminPC within the ACISimulator.
Step 2
From your AdminPC desktop, start the Chrome browser as needed.
Step 3
Navigate to https://192.168.51.12.
Step 4
Log in to the APIC using the following credentials:
Step 5
Discovery Lab 2

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
At this point you should see the APIC dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
29
Task 1: Configure the Date and Time Format and
NTP
In this task, the Instructor will configure the date and time format of the clock and the NTP server used
by the fabric. This task is performed only once per ACI fabric.
Activity Procedure
Complete the following steps:
Discovery Lab 2
Step 1
In the Menu bar, click System.
Step 2
In the Submenu bar, click System Settings.
Step 3
Navigate to Date and Time.
Step 4
In the Work pane, in the Time Zone drop-down list, select America/New_York.
Step 5
Click the Submit button at the bottom of the Work pane. A Policy Usage
Warning will appear indicating the other objects that will be affected by the
changes.
Step 6
Click the Submit Changes button.
Step 7
In the Menu bar, click Fabric.
Step 8
In the Submenu bar, click Fabric Policies.
Step 9
Navigate to Policies > Pod > Date and Time.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
30
Step 10
Discovery Lab 2
In the Navigation pane, right-click the Date and Time folder and select Create
Date and Time Policy from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
31
Step 11
The Create Date and Time Policy wizard will appear. In STEP 1 > Identity, in
the Name file, type DATE-TIME-POLICY.
Step 12
Click the Next button.
Step 13
In STEP 2 > NTP Servers, click the plus sign + to create a new entry and enter
the values in the following table.
Field
Discovery Lab 2
Value
Name
192.168.51.11
Preferred
Checked
Management EPG
default (Out-of-Band)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
32
Discovery Lab 2
Step 14
Click the OK button to complete the Create Providers wizard.
Step 15
Click the Finish button to complete the Create Date and Time Policy wizard.
Step 16
In the Navigation pane, expand the Fabric > Fabric Policies > Pods > Policy
Groups folder.
Step 17
Right-click Policy Groups and select Create Pod Policy Group.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
33
Step 18
Enter the values in the following table.
Field
Discovery Lab 2
Value
Name
POD-POLICY-GROUP
Date Time Policy
DATE-TIME-POLICY
Step 19
Click the Submit button at the bottom of the Work pane.
Step 20
You may see a Warning message will appear indicating the other objects that
will be affected by the changes. Click Yes if applicable.
Step 21
Click the Submit Changes button if needed.
Note
The APIC simulator does not provide a way to verify the time on the switches. In later labs, you will
use the Physical racks which are pre-configured with the same settings you just configured here.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
34
Discovery Lab 3:
Create Access Policies and vPC
Lab Devices and Pods
For this lab and all following DCACI labs you will be using the ACI-Physical Equipment.
The NterOne ACI Lab Rack contains the following equipment:

One (1) Cisco Application Policy Infrastructure Controller (APIC).

One (1) Cisco Nexus C9000 Switch running in ACI mode (Spine switch).

Two (2) Cisco Nexus C9000 Switches running in ACI mode (Leaf switches).

Cisco UCS C200 C-Series Servers running VMware ESXi.

One (1) vCenter.
You will have access to all of these devices; however, you will be assigned a single Pod within the UCS
Lab Rack:

A Pod is a portion of the ACI Lab Rack that is configured by one or two students.

Pod Number is used to uniquely identify each Pod. The Pod Number (“##”) is a value between
11 and 26.

You will be assigned to a Pod for a given lab exercise, possibly with another student depending
on the class size.

During the lab exercises you will be asked to configure the devices in your Pod. Do not
configure any devices outside your assigned Pod unless specifically instructed to do so.
Discovery Lab 3
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
35
Letter Variables
The Lab Guide for your class uses letter variables (similar to algebra) to represent digits within a
command or command output. Usually, whenever you see one of the capital letters in the following
table you should replace that letter with the correct value; the Lab Guide should also point out when a
letter variable is being used. The variables will be displayed with a font color of red.
For example, if you are currently assigned to Pod 23, and if you are instructed to configure an IP
address of 192.168.1.##, the IP address that you should use would be 192.168.1.23. The following
table lists all of the letter variables that are commonly used in the Lab Guide.
Letter Variable
Possible Values
Description
R
3, 4, 5 or 6
Your ACI Rack Number
##
11 through 26
Your Pod Number
@
A, B, C, or D
Your vCenter Server
@@
A1, A2, B1, B2, C1, C2, D1, or D2
Your ESXi Host
You must know the value of each of these variables before you start each lab exercise based on your
pod assignment from your instructor. If you do not use the correct values you may not be able to
complete the lab exercise and you may also cause another student’s lab devices to malfunction.
Be sure to open and use the Resource Guide document from your Instructor.
Overview
Fabric access policies enable communication of systems that are attached to the Cisco ACI fabric. In
this lab exercise, you will configure an access policy.
You build a fabric access policy with multiple configuration elements: pools, physical domains,
attachable access entity profiles, interface policies, interface policy groups, interface selectors, interface
profiles, and switch profiles. This approach provides scalability and modularity of the configuration. The
configuration elements are:

Pool: Defines a range of identifiers, such as VLANs.

Physical/external/VMM domain: References a pool. You can think of it as a resource
container.

Attachable access entity profile (AAEP): References a domain, and therefore specifies the
resource pool that is activated on an interface.

Interface policy: Defines a protocol or interface properties that are applied to interfaces.

Interface policy group: Gathers multiple interface policies into one set and binds them to an
AAEP.

Interface selector: Identifies one or more interfaces (interface blocks) and associates them with
an interface policy group.

Interface profile: Groups one or more interface selectors, effectively specifying the policies
consumed by the interface blocks.

Switch profile: Chooses one or more leaf switches and associates them with an interface
profile, effectively specifying the policies consumed by the interface blocks on a given switch.
Discovery Lab 3
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
36
The following figure illustrates the relationships between the configuration elements.
Cisco APIC allows scalable configurations by making the policies reusable. As the configuration grows,
a single switch profile can reference multiple interface profiles, each containing several interface
selectors. Similarly, an interface policy group may include several interface policies and a single AAEP
can point to multiple domains, each with its own resource pool. The following figure shows the
relationships:
Note
There are multiple ways of configuring elements in the Cisco APIC GUI: using configuration
wizards, configuring components individually, or choosing a different configuration order. This
lab exercise aims to present the required building blocks, and not necessarily achieve the goal
in the quickest way possible.
Cisco APIC allows scalable configurations by making the policies reusable. As the configuration grows,
a single switch profile can reference multiple interface profiles, each containing several interface
selectors. Similarly, an interface policy group may include several interface policies and a single AAEP
can point to multiple domains, each with its own resource pool.
Discovery Lab 3
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
37
Visual Objective
The figure illustrates what you will accomplish in this activity.
Job Aids
Device Access Racks = R
Device
Management IP
Other IP Addresses
Credentials
apic1
192.168.R0.1
---
admin/1234QWer
leaf-1
192.168.R0.101
—
admin/1234QWer
leaf-2
192.168.R0.103
—
admin/1234QWer
Spine-1
192.168.R0.102
—
admin/1234QWer
vCenter A
192.168.R0.51
—
root@vsphere.local /1234QWer
ESXi
VMs
Discovery Lab 3
esxi-a1.dc.local
esxi-a2.dc.local
root/1234QWer
WEB (10.##.3.1), APP (10.##.1.1),
DB (10.##.2.1)
| © 2023 Cisco Systems, Inc.
N/A (auto-login)
DCACI Lab Guide
38
Access Policies Configured in the Activity
Type of Policy
Policy Name
Function
CDP interface policy
Enable_CDP
Enable Cisco Discovery Protocol.
LLDP interface policy
Disable_LLDP
Disable LLDP.
Port channel policy
Static_Channel
Enable Port Channeling using mode On.
VPC interface policy group
Leaf101..102:1:03_VPCIPG
Gathers interface policies into a group. This policy
group will be applied to interface eth1/3 on both
leaves, e.g., with IDs 101 and 102.
Interface selector
1:03
Selects the interface eth1/3 as a member of the leaf
interface profile and binds an interface policy group to
the interface.
Leaf interface profile
L101..102_VPCIntProf
Groups interface selectors. This profile will be
associated with both leaves, which will act as vPC pair.
Leaf profile
L101..102_VPCLeafProf
Binds a leaf interface profile to the leaf switches that
form a vPC pair.
VPC protection group
L101..102_ProtectionGroup
Selects leaf switches for the vPC.
Command List
The table describes the Cisco APIC and Nexus switch CLI commands that are used in this activity.
Refer to this list for configuration command assistance during the lab activities.
Command
Description
show cdp neighbor
Display Cisco Discovery Protocol neighbors (Nexus ACI).
show hardware
Display the hardware platform details (Nexus ACI).
show lldp neighbor
Display LLDP neighbors (Nexus ACI).
show version
Display the switch software version (Nexus ACI).
In this lab you will create a virtual port channel (vPC) for your assigned pod between Leaf-1 and Leaf-2
to an external Cisco IOS switch.
Discovery Lab 3
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
39
Task 0: Log in to the APIC Controller in the
Physical Equipment
In this task, you will log in to the APIC controller using the graphical user interface (GUI)
Discovery Lab 3
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Note
Each student will perform all steps in this task.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
40
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
In your Labtyme web portal, fully open the Physical Equipment entries under
All Connections.
Step 2
Your instructor will assign you either the user student or student2. Verify you
have the correct user.
Warning
Be very sure you don’t use the wrong user. Note also that these Physical Equipment virtual
machines are different from the ACI-Simulator virtual machines.
Step 3
Right-click your assigned user (student or student2) and select Open link in new
tab.
Step 4
From your Student Server desktop, start the Chrome browser.
Step 5
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Note
The APIC IP addresses here and in all following DCACI labs are different and will not connect to
the APIC Simulator that you used in prior labs.
Note
You may be warned by Chrome that the connection is not private.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
41
Note
Do not worry if you see any message like this about your connection not being private in these
labs. Click Proceed… and “agree” with all browser security requests.
Step 6
Log in to the APIC using the following credentials:
Step 7
Discovery Lab 3

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
42
Task 1: Verify the NTP Time
In this task, you will verify the NTP time configured in the APIC. The necessary date and time settings
for the fabric have been pre-configured in this lab exactly like you did manually in the prior lab.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
You can view the date and time for the fabric at the bottom right of the APIC GUI.
It may take several seconds for the correct time to be displayed.
Step 2
Open a PuTTY session to Leaf-1. Log in as needed with the credentials:

Username: admin

Password: 1234QWer
Step 3
To verify that NTP is functioning properly on the switch enter the show ntp peerstatus command. You should see that there is a single peer, and the peer is
selected for synchronization. This output is for rack 4.
Step 4
Use the show clock command to verify that the clock on the switch is set
correctly.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
43
Task 2: Verify DNS for the APIC
In this task you will verify the APIC to use DNS for name resolution. This task is configured only once
per ACI fabric. The APIC DNS settings have been pre-configured in this ACI Fabric.
Activity Procedure
Complete the following steps:
Step 1
Return to the APIC GUI running in your Chrome browser.
Step 2
In the Menu bar, click Fabric.
Step 3
In the Submenu bar, click Fabric Policies.
Step 4
In the Navigation pane, expand Policies > Global > DNS Profiles > default.
Step 5
In the DNS Providers subsection, note the pre-configured IP of 192.168.R0.40
(replace “R” with your ACI Rack Number).
Step 6
Under the DNS Domain field, note the Name field as dc.local.
Step 7
Open a new PuTTY session to the APIC.
Step 8
Discovery Lab 3

IP: 192.168.R0.1

Username: admin

Password: 1234QWer
To verify that DNS name resolution is functioning properly enter the ping leaf1.dc.local command. After a few seconds press <Ctrl>+<C> to stop the ping.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
44
Discovery Lab 3
Step 9
Enter the ping leaf-1 command; make sure not to include the domain. After a
few seconds press <Ctrl>+<C> to stop the ping.
Note
The APIC used the IP address of 192.168.R0.101 for leaf-1.dc.local, and it used a 172.19..x.x
address for leaf-1. The IP address 192.168.R0.101 is the out-of-band address, while the
172.19.x.x address is the infrastructure address assigned to leaf-1 when it was connected to the
fabric.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
45
Task 3: Verify DNS for the Fabric Switches
In this task, you will verify the fabric switches to use DNS for name resolution. This task is only
configured once per ACI fabric.
Activity Procedure
Complete the following steps:
Step 1
In the Navigation pane, expand Fabric > Fabric Policies > Policies > Global >
DNS Profiles.
Step 2
Select the pre-configured DNS-PROFILE folder.
Note the pre-configured DNS Provider of 192.168.R0.40 and DNS Domain of
dc.local. (Replace “R” with your ACI Rack Number.)
Discovery Lab 3
Step 3
In the Menu bar, click Tenants and ALL TENANTS.
Step 4
In the Submenu bar, double-click mgmt.
Step 5
In the Navigation pane, expand the tenant mgmt > Networking > VRFs > oob.
Click on the Policy tab.
Step 6
Near the bottom of the Work pane, note the pre-configured entry of DNS Labels
as DNS-PROFILE.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
46
Discovery Lab 3
Step 7
Return to the PuTTY window containing your session to Leaf-1. Log in as
needed.
Step 8
To verify that DNS name resolution is functioning properly enter the ping leaf2.dc.local command. After a few seconds press <Ctrl>+<C> to stop the ping.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
47
Task 4: Verify the MP-BGP Route Reflectors
In this task, you will verify the MP-BGP Route Reflectors.
Internal to the ACI fabric, MP-BGP is implemented between leaf and spine switches to propagate
external routes within the ACI fabric; all the leaf and spine switches are in one single BGP AS. The
border leaf uses MP-BGP to advertise the external routes to the spine switches, which act as BGP
route reflectors to avoid the full mesh requirements of BGP. Routes are only propagated by spines to
leaf switches where the Private Networks are instantiated.
Note
Private Networks are only instantiated on a leaf when an EPG for that Private Network has
endpoints connected off the leaf.
MP-BGP is not enabled by default in ACI fabric. You will verify the BGP policy, specifying the BGP AS
number and specific spine nodes as BGP route reflectors. Once configured, the APIC will automatically
configure iBGP peering between leaf and spine and specify leaf switches as route reflector clients.
APIC also automatically generates the required configuration for route redistribution on the border leaf.
This task is configured only once per ACI fabric.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
In the Menu bar, click System.
Step 2
In the Submenu bar, click System Settings.
Step 3
In the Navigation pane, select BGP Route Reflector.
Step 4
In the Work pane, note the pre-configured Autonomous System Number of
100.
Note
The iBGP ASN must match the external router configuration if iBGP will be configured between the
ACI Fabric and an external network. If using static routes, OSPF, or EIGRP between the ACI Fabric
and an external network, the iBGP ASN value can be any valid value.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
48
Discovery Lab 3
Step 5
In the Route Reflector Nodes subsection, note the entry of Spine-1.
Note
This configuration applies to the entire fabric and is not enforced per Tenant. BGP will be
automatically enabled on any leaf switch which has an external Layer 3 network attached, as well
as any leaf switch where the Private Network associated with the Layer 3 external network are
instantiated (leaves which do not have the Private Network associated preserve the hardware
resources by not running BGP or not storing the routes).
Note
Once the border leaf forms a neighbor relationship, it will propagate Tenant routes to the external
router. Users have control of which Tenant subnets to advertise to external routers.
Note
When specifying subnets under the bridge domain for a given Tenant, the user has the choice to
specify the scope (private, public, or shared) of a subnet.
Note
For security and separation, MP-BGP maintains separate BGP routing tables for each ACI Private
Network.
Step 6
Navigate to Fabric > Fabric Policies > Pods > Policy Group. Select the preconfigured RR-POD-POLICY-GROUP and verify the BGP Route Reflector
policy is set at default.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
49
Discovery Lab 3
Step 7
Navigate to Fabric > Fabric Policies > Pods > Profiles. Select the preconfigured Profile of POD-PROFILE.
Step 8
Note the Pod Selector with the name Pod with a Type of ALL and the Policy
Group of RR-POD-POLICY-GROUP.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
50
Step 9
To verify that the BGP route reflectors are functioning, navigate to Fabric >
Inventory > Pod1 > Spine-1 > Protocols > BGP > BGP for VRF-overlay-1 >
Sessions.
Step 10
Verify that you see two Established BGP sessions, one to each leaf switch.
Step 11
From your Student Server desktop, start a PuTTY session with Spine-1.
Step 12
Log in to Spine-1 using the following information:
Step 13
Discovery Lab 3

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Verify that the BGP sessions to the leaf switches are established by entering the
show bgp sessions vrf overlay-1 command.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
51
Task 5: Verify the ACI Inactivity Timer
In this task, you will verify the ACI inactivity timer. The purpose of this is to make it easier during your
labs so you won’t be logged out as often during inactivity.
Note
In a production environment, changing any inactivity timers to a long duration would not be
suggested for security purposes.
This task is configured only once per ACI fabric.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
In the Menu bar, click Admin.
Step 2
In the Submenu bar, click AAA > Security.
Step 3
Under the Management Settings tab, note the Web Session Idle Timeout(s)
has the maximum number of 9999.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
52
Task 6: Create Link Level Interface Policies
In this task, you will create two Link Level Interface Policies:

A Link Level Policy for leaf switch interfaces that will be configured for a speed of 1 Gbps.

A Link Level Policy for leaf switch interfaces that will be configured for a speed of 10 Gbps.
Note
Each student will perform all steps in this task.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
In the Menu bar, click Fabric.
Step 2
In the Submenu bar, click Access Policies.
Step 3
Navigate to Policies > Interface > Link Level.
Step 4
Right-click the Link Level folder and then select Create Link Level Policy from
the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
53
Step 5
The Create Link Level Policy wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
Field
Discovery Lab 3
Value
Name
POD##-1G-LINK-LEVEL-POLICY
(replace “##” with your assigned 2-digit Pod Number)
Auto Negotiation
off
Speed
1 Gbps
Step 6
Click the Submit button to complete the Create Link Level Policy wizard.
Step 7
Right-click the Link Level folder again POD and then select Create Link Level
Policy from the context menu to create another policy.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
54
Step 8
The Create Link Level Policy wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
Field
Step 9
Discovery Lab 3
Value
Name
POD##-10G-LINK-LEVEL-POLICY
(replace “##” with your assigned 2-digit Pod Number)
Auto Negotiation
off
Speed
10 Gbps
Click the Submit button to complete the Create Link Level Policy wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
55
Task 7: Create CDP Interface Policies
The Cisco Discovery Protocol is by default disabled on Cisco ACI interfaces. You will create an
interface policy that enables Cisco Discovery Protocol, disables LLDP, and configures a port channel
policy. These policies will be needed to establish connectivity between the hypervisor and the Cisco
ACI leaves.
In this task, you will create two CDP Interface Policies:

A CDP Interface Policy for leaf switch interfaces that will be configured to enable CDP.

A CDP Interface Policy for leaf switch interfaces that will be configured to disable CDP.
Note
Each student will perform all steps in this task.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
Navigate to Fabric > Access Policies > Policies > Interface > CDP Interface.
Step 2
Right-click the CDP Interface folder and then select Create CDP Interface
Policy from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
56
Step 3
The Create CDP Interface Policy wizard will appear. Enter the values in the
following table.
Field
Value
Name
POD##-ENABLE-CDP-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
Admin State
Enabled
Step 4
Click the Submit button to complete the Create CDP Interface Policy wizard.
Step 5
Right-click the CDP Interface folder again and then select Create CDP Interface
Policy from the context menu.
Step 6
The Create CDP Interface Policy wizard will appear. Enter the values in the
following table.
Field
Discovery Lab 3
Value
Name
POD##-DISABLE-CDP-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
Admin State
Disabled
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
57
Step 7
Discovery Lab 3
Click the Submit button to complete the Create CDP Interface Policy wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
58
Task 8: Create LLDP Interface Policies
In this task, you will create two LLDP Interface Policies:

An LLDP Interface Policy for leaf switch interfaces that will be configured to enable LLDP.

An LLDP Interface Policy for leaf switch interfaces that will be configured to disable LLDP.
Note
Each student will perform all steps in this task.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
Navigate to Fabric > Access Policies > Policies > Interface > LLDP Interface.
Step 2
Right-click the LLDP Interface folder and then select Create LLDP Interface
Policy from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
59
Step 3
The Create LLDP Interface Policy wizard will appear. Enter the values in the
following table.
Field
Value
Name
POD##-ENABLE-LLDP-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
Receive State
Enabled
Transmit State
Enabled
Step 4
Click the Submit button to complete the Create LLDP Interface Policy wizard.
Step 5
Right-click the LLDP Interface folder again and then select Create LLDP
Interface Policy from the context menu.
Step 6
The Create LLDP Interface Policy wizard will appear. Enter the values in the
following table.
Field
Discovery Lab 3
Value
Name
POD##-DISABLE-LLDP-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
Receive State
Disabled
Transmit State
Disabled
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
60
Step 7
Discovery Lab 3
Click the Submit button to complete the Create LLDP Interface Policy wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
61
Task 9: Verify Interface Profiles and Switch Profiles
In this task, you will verify three pairs of interface and switch profiles.
It is good practice to create interface and switch profiles for every leaf and vPC leaf pair, even before
configuring specific ports.
These settings in this task are performed only once in the ACI fabric.
Activity Procedure
Complete the following steps in the Web connection to the APIC:
Discovery Lab 3
Step 1
In the Menu bar, navigate to Fabric > Inventory > Fabric Membership.
Step 2
Under the Registered Nodes tab, take note of the Node ID and Name of the
Nexus switches. It is important to note which Node ID is associated with which
Name as you will refer to these labels in later lab steps. Make no changes here.
Step 3
In the Menu bar, navigate to Fabric > Access Policies > Interfaces > Leaf
Interfaces > Profiles.
Note
You can always learn more about the meaning of any object and its parameters from Cisco APIC
Online Help by clicking the question mark {?) button on the top right corner of your web browser
connected to the APIC.
Step 4
Note the pre-configured Profiles of LEAF101_IFP and LEAF103_IFP.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
62
Discovery Lab 3
Step 5
In the Menu bar, navigate to Fabric > Access Policies > Switches > Leaf
Switches > Profiles.
Step 6
Note the pre-configured Profiles of LEAF101_SWP and LEAF101_SWP with
the selected Interface Selectors.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
63
Task 10: Verify VPC Pair
A vPC domain is associated with a vPC security policy. The vPC security policy defines the leaf
switches that belong to the vPC domain. You will review the default vPC domain and add both leaf
switches to the vPC security policy.
These settings in this task are performed only once in the ACI fabric.
Activity Procedure
Complete the following steps:
Step 1
In the Menu bar, navigate to Fabric > Access Policies > Policies > Switch >
VPC Domain and choose default. Briefly review the default VPC Domain
parameters. Make no changes here.
Step 2
In the Menu bar, navigate to Fabric > Access Policies > Policies > Switch and
choose Virtual Port Channel default. Note the following pre-configured settings.
Change the vPC domain policy to default as needed and click Submit and
Submit Changes.
Field
Discovery Lab 3
Value
Name
LEAF101-103_ProtectionGroup
ID
100
vPC domain policy
default
Switch 1
101
Switch 2
103
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
64
Discovery Lab 3
Step 3
In the Menu bar, navigate to Fabric > Access Policies > Policies > Interface >
Port Channel and examine the default policy.
Step 4
Select the pre-configured Port Channel Policy of Static_Channel_On and
verify the settings. Ensure that the Mode is Static Channel – Mode On.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
65
Task 11: Configure Interface Selectors for the
Interface Profiles
The interface selector identifies a single interface or an interface block (range) that belongs to the
interface profile.
In this task, you will configure Interface Selectors for the Interface Profiles.
Note
Each student will perform all steps in this task.
Activity Procedure
Complete the following steps:
Step 1
Open the other PDF document for your assigned Rack number from your
Instructor named NterOne Cisco ACI Lab Resource Guide. Keep this
document open along with your lab guide as you will need both documents.
Step 2
In the Resource Guide, scroll down to the section entitled VPC Ports. Note the
settings for your assigned Pod number for both Leaf-1 and Leaf-2. You will use
these settings in later steps of this task. Keep this document open and available
to you.
Step 3
In the ACI Menu bar, navigate to Fabric > Access Policies > Interfaces > Leaf
Interfaces > Profiles. Select the pre-configured LEAF101_IFP.
Step 4
On the Interface Selectors section, click the plus sign (+).
Step 5
Click Continue on the Policy Usage Warning.
Step 6
Add these fields in the Create Access Port Selector window where ## is your
assigned pod number.
Name
Discovery Lab 3
Entry
Name
POD##
Interface ID
Select the Ethernet interface for your assigned pod on
Leaf-1 (101) from the VPC Ports table in the Resource
Guide for your assigned Rack.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
66
Step 7
Click Submit.
Step 8
In the Menu bar, navigate to Fabric > Access Policies > Interfaces > Leaf
Interfaces > Profiles. Select the LEAF103_IFP and click the plus sign + to add
an Interface Selector.
Step 9
Click Continue on the Policy Usage Warning.
Step 10
Add these fields in the Create Access Port Selector window.
Name
Step 11
Discovery Lab 3
Entry
Name
POD##
Interface ID
Select the Ethernet interface for your assigned pod on
Leaf-2 (103) from table in the Resource Guide for your
assigned Rack.
Click Submit.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
67
Task 12: Configure Interface Policy Groups
An interface policy defines a protocol or properties that are applied to an interface. You may use default
interface policies that ship with the APIC or configure your own. You will examine three default interface
policies (LLDP, CDP and Port Channel) and verify that the default LLDP and Port Channel policies suit
your needs. Nevertheless, you will configure explicit policies for LLDP, CDP, and Port Channel to
enable LLDP/CDP and configure static port channel (on). Enabling CDP will allow a vSphere standard
switch to discover its adjacent leaves.
Note
Each student will perform all steps in this task.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
Navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces > Policy
Groups.
Step 2
Right-click Leaf access Port to Create Leaf Access Port Policy Group.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
68
Step 3
Enter these fields.
Note
The setting of Link Level is different from Link Level Flow Control.
Name
Discovery Lab 3
Value
Name
POD##_VPC_IPG
CDP
POD##-ENABLE-CDP-INTERFACE-POLICY
LLDP
POD##-ENABLE-LLDP-INTERFACE-POLICY
Link Level
POD##-1G-LINK-LEVEL-POLICY
Step 4
Click Submit.
Step 5
Navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces > Policy
Groups and right-click VPC Interface to Create VPC Interface Policy Group.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
69
Step 6
Enter these fields.
Name
Discovery Lab 3
Value
Name
POD##
CDP
POD##-ENABLE-CDP-INTERFACE-POLICY
Link Level
POD##-1G-LINK-LEVEL-POLICY
LLDP
POD##-ENABLE-LLDP-INTERFACE-POLICY
Port Channel
Static_Channel_on
Step 7
Click Submit.
Step 8
Navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces >
Profiles.
Step 9
Expand the LEAF101_IFP profile and double-click your pod Interface Selector
POD##. From the Interface Policy Group drop-down menu, choose your Policy
Group named POD##_VPC_IPG.
Step 10
Click Submit and Submit Changes.
Step 11
Navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces >
Profiles.
Step 12
Expand the LEAF103_IFP profile and double-click your pod Interface Selector
POD##. From the Interface Policy Group drop-down menu, choose your Policy
Group named POD##_VPC_IPG.
Step 13
Click Submit and Submit Changes.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
70
Task 13: Configure VLAN Pool, Physical Domain,
and AAEP
You will define the encapsulation resources to be used for the connections to the ESXi host and the
external endpoint. These resources are configured using a VLAN pool, physical domain, and AAEP.
The allocation mode can be static or dynamic. The static mode allows you to individually select the
VLAN IDs for the endpoint groups (EPG) connected to the fabric. In the dynamic mode, the APIC uses
an internal scheme to allocate VLANs to the EPGs. Integration with VMM domains requires dynamic
allocation mode.
A physical domain profile stores the physical resources (ports and port channels) via AAEP and
encapsulation resources (VLAN) via VLAN Pool that should be used for endpoint group connections to
the fabric.
Note
Each student will perform all steps in this task.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
In the Menu bar, navigate to Fabric > Access Policies > Pools. Right-click
VLAN and choose Create VLAN Pool.
Step 2
Create a VLAN pool POD##-VPC and select the Allocation Mode: Static
Allocation.
Step 3
Click the plus sign (+) to add an Encap Blocks.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
71
Discovery Lab 3
Note
The name of the VLAN pool indicates its intended use, for a physical domain dedicated to your
assigned tenant POD## (## is your assigned pod number).
Step 4
Define VLAN Range 5## for one VlAN just for your pod and select Static
Allocation. Leave all settings at their default values. Click OK.
Step 5
Click Submit to complete the configuration of the Create VLAN Pool.
Step 6
Navigate to Fabric > Access Policies > Physical and External Domains,
right-click Physical Domains, and choose Create Physical Domain.
Step 7
Configure a physical domain POD##_PD. Select the VLAN pool POD##VPC(static).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
72
Discovery Lab 3
Note
The name of the physical domain indicates its intended use, for your tenant POD##.
Step 8
Click Submit.
Step 9
Navigate to Fabric > Access Policies > Policies > Global, right-click
Attachable Access Entity Profiles, and choose Create Attachable Access
Entity Profile.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
73
Discovery Lab 3
Note
An AAEP is a component that bundles a group of interfaces through Interface Policy Groups, which
contain multiple interfaces that share same port level policies such as LLDP. An AAEP is attached
to a domain so that a domain can provide a group of interfaces (via AAEP) and VLANs (via VLAN
pool) to the logical resources such as EPG, L3OUT. An AAEP can be attached to more than one
domain.
Step 10
Create an AAEP with the name POD##_VPC_AEP, click the plus sign (+) to add
a Domain, and select the POD##_PD(Physical) domain.
Step 11
Continue the AAEP configuration by clicking Update.
Step 12
Verify the Encapsulation details and click Next.
Step 13
Scroll down to POD##_VPC_IPG. Select All to select your pod interfaces.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
74
Discovery Lab 3
Step 14
Complete the Create Attachable Access Entity Profile configuration by clicking
Finish.
Step 15
Navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces > Policy
Groups > Leaf Access Port, select your interface policy group
POD##_VPC_IPG.
Step 16
Select POD##_VPC_AEP from the Attached Entity Profile drop-down menu.
Click Submit and Submit Changes as needed.
Step 17
Go to Fabric > Access Policies > Interfaces > Leaf Interfaces > Policy
Groups > VPC Interface.
Step 18
Select your interface policy group POD## and choose POD##_VPC_AEP from
the Attached Entity Profile drop-down menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
75
Step 19
Discovery Lab 3
Click Submit and Submit Changes.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
76
Task 14: Configure Port Channel on the External
Switch
Note
Each student will perform all steps in this task.
Activity Procedure
Complete the following steps:
Step 1
Open PuTTY and connect to the external switch VPC-RR-SW2 with the following
information:
Setting
Entry
IP Address
192.168.R0.44
Connection type
Telnet
Username
admin
Password
1234QWer
Note
SSH is not enabled on this switch.
Step 2
From global config mode, create the vlan 5##, where ## is your assigned pod
number. Type exit when done.
Step 3
In the Resource Guide under the VPC Ports section, identify the
GigabitEthernet Interface port number for your pod connected to Leaf-1.
Step 4
For your assigned Pod ##, configure the GigabitEthernet Interface for Leaf-1
with these settings. Be sure to reference the Resource Guide under the section
VPC Ports for your assigned pod port numbers, ## is your assigned pod
number.
Setting
Discovery Lab 3
Entry
GigabitEthernet Interface
Refer to Resource Guide for Leaf-1 (101)
switchport access vlan
5##
switchport mode access
on
channel-group ## mode
on
admin status
no shutdown
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
77
Step 5
For your assigned Pod ##, configure the GigabitEthernet Interface for Leaf-2
with these settings:
Setting
Entry
GigabitEthernet Interface
Refer to Resource Guide for Leaf-2 (103)
switchport access vlan
5##
switchport mode access
on
channel-group ## mode
on
admin status
no shutdown
Step 6
Type exit when done.
Step 7
For your assigned Pod ##, configure the Port-Channel Interface with these
settings:
Setting
Discovery Lab 3
Entry
Port-channel Interface
##
switchport access vlan
5##
switchport mode access
on
Step 8
Type end when done.
Step 9
Save your settings with wr.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
78
Task 15: Verify the vPC
Note
Each student will perform all steps in this task.
Activity Procedure
Complete the following steps:
Discovery Lab 3
Step 1
In PuTTY, connect to Leaf-1. List the available VPC verification commands by
entering show vpc and pressing ESC twice to see all the show vpc keyword
options.
Step 2
On Leaf-1, examine the vPC domain using the show vpc command.
Step 3
On Leaf-1, examine the vPC role using the show vpc role command.
Step 4
Use PuTTY to connect to Leaf-2, log in as admin with password 1234QWer,
verify the vPC domain (show vpc) and vpc role (show vpc role). The role should
be complementary to the role of Leaf-1.
Step 5
In the APIC UI, go to Fabric > Access Policies > Policies > Switch > Virtual
Port Channel default and view the vPC TEP address, shown as the Virtual IP
of the Explicit VPC Protection Groups.
Step 6
In PuTTY, connect to the external switch2 VPC-RR-SW2 at 192.168.R0.44. The
hostname will be resolved to 192.168.10.211. Log in as admin and 1234QWer.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
79
Discovery Lab 3
Step 7
Verify your port channel was configured for interface po##.
Step 8
Type show etherchannel summary and verify your pod Po## has the correctly
assigned ports.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
80
Discovery Lab 4: Enable Layer
2 Connectivity in the same EPG
Introduction
The Cisco Application-Centric Infrastructure (ACI) is designed to scale from smaller commercial
environments, which may use a single tenant, to large cloud providers with many tenants. A single
enterprise can use tenants to enforce administrative and operational separation between internal
businesses.
In this activity, you will create a tenant and configure its basic elements:

A tenant is a logical container for application policies that enable an administrator to exercise
domain-based access control. A tenant represents a unit of isolation from a policy perspective,
such as a customer in a service provider setting, an organization or domain in an enterprise
setting, or just a convenient grouping of policies.

A VRF is a unique Layer 3 forwarding domain. All endpoints within the Layer 3 domain must
have unique IP addresses. The terms VRF, network, context, and private network are
synonymous. Just as a router can have multiple VRFs configured, a tenant can have multiple
networks that are associated with it.

A bridge domain is a logical grouping of endpoints that appear to be on the same LAN. A bridge
group can contain one or more subnets. One or more bridge domains are associated with a
network. Subnets may overlap across tenants.

A subnet corresponds to an IP subnet and is configured as a default gateway address for that
subnet.

Endpoint groups (EPGs) are collections of similar endpoints representing an application tier or a
set of services. They provide a logical grouping for objects that require a similar policy.

An application profile is the combination of EPGs and the policies that define their interactions.
The interaction policies are called contracts.
Discovery Lab 4
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
81
The common tenant contains system generated pre-configured policies that govern the operation of
resources accessible to all tenants, such as firewalls, load balancers, Layer 4 to Layer 7 services,
intrusion detection appliances, and so on. Common tenant polices are configurable by the fabric
administrator.
The infra (infrastructure) tenant contains policies that govern the operation of infrastructure resources
such as the fabric VXLAN overlay. It also enables a fabric provider to selectively deploy resources to
one or more user tenants.
The management tenant contains policies that govern the operation of fabric management functions
used for in-band and out-of-band configuration of fabric nodes. The management tenant contains an
out-of-band address space for the APIC/fabric internal communications that is outside the fabric data
path that provides access through the management port of the switches. The management tenant
enables discovery and automation of communications with virtual machine controllers.
Job Aids
Device Access Rack = R
Device
Management IP
Other IP Addresses
Credentials
apic1
192.168.R0.1
---
admin/1234QWer
leaf-a
192.168.R0.101
—
admin/1234QWer
leaf-b
192.168.R0.103
—
admin/1234QWer
spine
192.168.R0.102
—
admin/1234QWer
vCenter A
192.168.R0.51
—
root@vsphere.local /1234QWer
esxi-a1.dc.local
esxi-a2.dc.local
ESXi
root/1234QWer
WEB (10.##.3.1), APP (10.##.1.1),
DB (10.##.2.1)
VMs
N/A (auto-login)
Overview
Complete this lab activity to create the basic network constructs to allow communication into the ACI
Fabric. All of the labs will leverage the multi-tenancy capabilities that allow ACI to scale. ACI is
designed to scale from smaller commercial environments, which may use a single Tenant to large cloud
providers with support for 64,000 Tenants and above. A single Enterprise can also leverage Tenants to
enforce administrative and operational separation between different internal businesses or processes.
Upon completing this guided lab, you will be able to:

Create a VRF.

Create a Bridge Domain.

Create Subnets.
Discovery Lab 4
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
82
Task 0: Log in to the APIC Controller
In this task, you will log in to the APIC controller using the graphical user interface (GUI).
Every student performs this lab independently.
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
Step 5
Discovery Lab 4

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
83
Task 1: Create a Tenant
In this task, you will create a Tenant using the APIC wizard. A tenant is a container for policies to
exercise domain-based access control. A tenant represents a unit of isolation from a policy perspective,
but it does not represent a private network. Tenants can represent a customer in a service provider
setting, an organization, a domain in an enterprise setting, or just a convenient grouping of policies.
Activity Procedure
Complete the following steps:
Step 1
In the ACI Menu bar, click Tenants.
Note
By default there are three pre-existing tenants: common, infra, and mgmt.
Step 2
In the Submenu bar, click Add Tenant.
Step 3
The Create Tenant wizard will appear. Enter the values in the following table and
do NOT change any of the values that are not listed in the following table.
Field
Discovery Lab 4
Value
Name
POD## (replace “##” with your assigned 2-digit Pod Number)
Description
(enter your name and/or nickname)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
84
Step 4
Discovery Lab 4
Click the Submit button to complete the Create Tenant wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
85
Task 2: Create a VRF
In this task, you will create a VRF within your assigned pod Tenant.
A VRF is a unique Layer 3 forwarding and application policy domain. One or more bridge domains are
associated with a VRF. All of the endpoints within the Layer 3 domain must have unique IP addresses.
In ACI nomenclature, the terms Context, Private Network, and VRF are synonymous. Just as a router
can have multiple VRFs configured, an ACI tenant can have multiple Contexts associated with it.
Activity Procedure
Complete the following steps within your newly created tenant:
Discovery Lab 4
Step 1
Navigate to Tenants > POD##.
Step 2
Expand POD## > Networking > VRFs.
Step 3
Right-click the VRFs folder and then select Create VRF from the context menu.
Step 4
The Create VRF wizard will appear. In STEP 1 > VRF, enter the values in the
following table; do NOT change any of the values that are not listed in the
following table.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
86
Field
Value
Name
POD##-VRF
(replace “##” with your assigned 2-digit Pod Number)
Create a Bridge Domain
Unchecked
Step 5
Click the Finish button.
Note
What does Policy Enforcement mean? By default, policy enforcement is enforced on a context and
is performed by either the ingress or egress Leaf. As traffic enters the leaf switch the packet fabric
header is marked with the EPG of the source endpoint. The leaf switch then performs a forwarding
lookup on the packet destination IP address within the tenant space. A unicast (/32) or subnet
prefix (not /32) hit provides the EPG of the destination endpoint destination subnet prefix, and
either the local interface or the remote leaf switch VTEP IP address where the destination endpoint
subnet prefix is present.
A miss causes the packet to be sent to the forwarding proxy in the spine switch, which performs a
forwarding table lookup. If this is a miss, the packet is dropped. If it is a hit, the packet is sent to the
egress leaf switch that contains the destination endpoint. Because the egress leaf switch knows the
EPG of the source and destination, it performs the security policy enforcement.
On the egress leaf switch, the source IP address and source EPG information will be stored in the
local forwarding table through learning. Because most flows are bidirectional, a return packet
populates the forwarding table on both sides of the flow, which enables the traffic to be ingress
filtered in both directions.
Discovery Lab 4
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
87
Task 3: Create a Bridge Domain
In this task, you will create a bridge domain in your assigned tenant.
Activity Procedure
Complete the following steps within your tenant:
Step 1
In the ACI navigation pane, expand POD## > Networking > Bridge Domains.
Step 2
Right-click the Bridge Domains folder and then select Create Bridge Domain
from the context menu.
Step 3
The Create Bridge Domain wizard will appear. In STEP 1 > Main, enter the
values in the following table and do NOT change any of the values that are not
listed in the following table.
Field
Discovery Lab 4
Value
Name
POD##-BD
(replace “##” with your assigned 2-digit Pod Number)
VRF
POD##-VRF
(replace “##” with your assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
88
Discovery Lab 4
Step 4
Click the Next button. In STEP 2 > L3 Configurations, do not make any
changes.
Step 5
Click the Next button. In STEP 3 > Advanced/Troubleshooting, do not make
any changes.
Step 6
Click the Finish button to complete the Create Bridge Domain wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
89
Task 4: Create Subnets within the Bridge Domain
In this task, you will create subnets within the bridge domain. These subnet IP addresses will be the
default gateway of your Windows VMs that you will configure in later labs.
Activity Procedure
Complete the following steps:
Step 1
In the Navigation pane, expand Tenants > POD## > Networking > Bridge
Domains > POD##BD > Subnets.
Step 2
Right-click the Subnets folder and then select Create Subnet from the context
menu.
Step 3
The Create Subnet wizard will appear. Enter the values in the following table
and do NOT change any of the values that are not listed in the following table.
Field
Gateway IP
Discovery Lab 4
| © 2023 Cisco Systems, Inc.
Value
10.##.1.254/24
(replace “##” with your assigned 2-digit Pod Number)
DCACI Lab Guide
90
Discovery Lab 4
Note
The Scope of a subnet defines the network visibility of the subnet. The scope can be:
 Advertised Externally – Defines subnets under an endpoint group to route leak to other
Tenants in the Fabric.
 Shared between VRFs – Defines subnets under an endpoint group to route leak for shared
services (endpoint groups in a different VRF).
Step 4
Click the Submit button. The subnet you just created will be visible in the
Subnets subsection.
Step 5
Repeat the previous three steps to create a subnet with the Gateway IP of
10.##.2.254/24 (replace “##” with your assigned 2-digit Pod Number).
Step 6
Repeat the previous three steps to create a subnet with the Gateway IP of
10.##.3.254/24 (replace “##” with your assigned 2-digit Pod Number).
Step 7
In the Navigation pane, in the Subnets folder, verify that you see the three
Subnets listed.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
91
Discovery Lab 4
Step 8
From your Student Server desktop, start a PuTTY session with your assigned
rack APIC.
Step 9
Log in to APIC-1 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Step 10
View the current configuration of your tenant by entering the show runningconfiguration tenant POD## command (replace “##”with your assigned 2- digit
Pod Number). Verify you see your tenant, the bridge domain, the VRF, and the
subnets that you created during this lab exercise.
Note
The name of the tenant is case-sensitive in this command, as are all other commands executed on
the APIC command line.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
92
Task 5: Create Filters
In this task, you will create filters in your tenant to be used in the various contracts that you will create in
the next Task.
Activity Procedure
Complete the following steps:
Step 1
In the Menu bar, click Tenants.
Step 2
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 3
In the Navigation pane, expand POD## > Contracts > Filters.
Step 4
Right-click the Filters folder and then select Create Filter from the context
menu.
Step 5
The Create Filter wizard will appear. In the Name field type POD##-FILTERANY (replace “##” with your assigned 2-digit Pod Number).
Step 6
In the Entries subsection, click the plus sign + to create a new entry. Enter the
values in the following table.
Field
Discovery Lab 4
Value
Name
ANY
EtherType
Unspecified
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
93
Note
An ACI filter with the EtherType of Unspecified will allow all traffic over Ethernet.
Step 7
Click the Update button.
Step 8
Click the Submit button to complete the Create Filter wizard. You should now
see the filter you just created in the Filters folder.
Step 9
Right-click the Filters folder again and then select Create Filter from the context
menu to create the next filter.
Step 10
The Create Filter wizard will appear. In the Name field type POD##-FILTERICMP (replace “##” with your assigned 2-digit Pod Number).
Step 11
In the Entries subsection, click the plus sign + to create a new entry. Enter the
values in the following table.
Field
Discovery Lab 4
Value
Name
ICMP
EtherType
IP
IP Protocol
icmp
Match Only Fragment
Unchecked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
94
Step 12
Click the Update and Submit buttons.
Step 13
Right-click the Filters folder again and then select Create Filter from the context
menu to create the next filter.
Step 14
The Create Filter wizard will appear. In the Name field type POD##-FILTERPORT-80 (replace “##” with your assigned 2-digit Pod Number).
Step 15
In the Entries subsection, click the plus sign + to create a new entry. Enter the
values in the following table.
Field
Discovery Lab 4
Value
Name
PORT-80
EtherType
IP
IP Protocol
tcp
Match Only Fragment
Unchecked
Stateful
Checked
Source Port / Range – From
1024
Source Port / Range – To
65535
Destination Port / Range – From
80 (you can also select http)
Destination Port / Range – To
80 (you can also select http)
TCP Session Rules (default)
Unspecified
Step 16
Click the Update button.
Step 17
Click the Submit button to complete the Create Filter wizard.
Step 18
Verify you see the filters you just created in the Filters folder. At this point there
should be three filters listed under the Contracts folder.
Note
These filters are not yet functional in your whitelist. They need to be added to a contract as you will
do in the next task.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
95
Discovery Lab 4
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
96
Task 6: Create Contracts
In this task, you will create Contracts that will use the Filters that you created in the previous task. You
will apply these contracts in the subsequent lab exercises.
Activity Procedure
Complete the following steps in your assigned tenant:
Discovery Lab 4
Step 1
In the Navigation pane under Tenants, expand POD## > Contracts.
Step 2
Right-click the Contracts folder and then select Create Contract from the
context menu.
Step 3
The Create Contract wizard will appear. In the Name field type POD##CONTRACT-ANY (replace “##” with your assigned 2-digit Pod Number).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
97
Step 4
In the Subjects subsection, click the plus sign + to create a new entry. Enter the
values in the following table.
Field
Discovery Lab 4
Value
Name
SUBJECT-ANY
Apply Both Directions
Checked
Reverse Filter Ports
Checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
98
Discovery Lab 4
Step 5
In the Filter Chain subsection, click the plus sign + to create a new entry. In the
drop-down list, select POD##-FILTER-ANY.
Step 6
Click the Update button and then click the OK button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
99
Step 7
Click the Submit button to complete the Create Contract wizard. You should
now see the contract you just created in the Contracts folder.
Step 8
Right-click the Contracts folder again and then select Create Contract from the
context menu to create the next contract.
Step 9
The Create Contract wizard will appear. In the Name field type POD##CONTRACT-DB-APP (replace “##” with your assigned 2-digit Pod Number).
Step 10
In the Subjects subsection, click the plus sign + to create a new entry. Enter the
values in the following table.
Field
Discovery Lab 4
Value
Name
SUBJECT-ANY
Apply Both Directions
Checked
Reverse Filter Ports
Checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
100
Step 11
In the Filter Chain subsection, click the plus sign + to create a new entry. In the
drop-down list, select POD##-FILTER-ANY.
Step 12
Click the Update button, and then click the OK button.
Step 13
Click the Submit button to complete the Create Contract wizard. You should
now see the two contracts you just created in the Contracts folder.
Step 14
Right-click the Contracts folder again and then select Create Contract from the
context menu to make the next contract.
Step 15
The Create Contract wizard will appear. In the Name field type POD##CONTRACT-APP-WEB (replace “##” with your assigned 2-digit Pod Number).
Step 16
In the Subjects subsection, click the plus sign + to create a new entry. Enter the
values in the following table.
Field
Discovery Lab 4
Value
Name
SUBJECT-ANY
Apply Both Directions
Checked
Reverse Filter Ports
Checked
Step 17
In the Filter Chain subsection, click the plus sign + to create a new entry. In the
drop-down list, select POD##-FILTER-ANY.
Step 18
Click the Update button, and then click the OK button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
101
Discovery Lab 4
Step 19
Click the Submit button to complete the Create Contract wizard. At this point
there should be three contracts listed in the Contracts folder.
Step 20
From your Student Server desktop, start a PuTTY session with your APIC.
Step 21
Log in to APIC-1 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
102
Discovery Lab 4
Step 22
View the current configuration of your tenant by entering the show runningconfiguration tenant POD## command (replace “##” with your assigned 2-digit
Pod Number). You should see the filters and contracts that you created during
this lab exercise.
Note
The name of the tenant is case-sensitive in this command, as are all other commands executed on
the APIC command line.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
103
Task 7: Create Application Profile
With the Filters and Contracts from the previous tasks, you can now build an Application Profile. The
Application Profile allows your environment to build a template of network attributes and policies that
can be dynamically instantiated and seamlessly inserted.
Application Profiles are a powerful tool for building out application connectivity and policy using
repeatable processes. Application connectivity is defined based on the services tiers or components
provide and the tiers they consume. Contracts define the policy for those connections and can be used
for provider or consumer relationships.
Complete this task to become familiar with the configuration of an Application Profile.
In this task, you will create an Application Profile.
Activity Procedure
Complete the following steps within your assigned Tenant:
Discovery Lab 4
Step 1
In the Menu bar, click Tenants.
Step 2
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 3
In the Navigation pane, expand POD## > Application Profiles.
Step 4
Right-click the Application Profiles folder and then select Create Application
Profile from the context menu.
Step 5
The Create Application Profile wizard will appear. In the Name field type
POD##-APPLICATION-PROFILE (replace “##” with your assigned 2-digit Pod
Number).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
104
Step 6
In the EPGs subsection, click the plus sign + to create a new EPG. Enter the
values in the following table and do NOT change any of the values that are not
listed in the following table.
Field
Name
BD
Provided Contract
Discovery Lab 4
| © 2023 Cisco Systems, Inc.
Value
POD##-DB-EPG
(replace “##” with your assigned 2-digit Pod Number)
POD##-BD
replace “##” with your assigned 2-digit Pod Number)
POD##-CONTRACT-DB-APP
(replace “##” with your assigned 2-digit Pod Number)
DCACI Lab Guide
105
Step 7
Click the Update button.
Step 8
In the EPGs subsection, click the plus + to create another EPG. Enter the values
in the following table and do NOT change any of the values that are not listed in
the following table.
Field
Name
BD
Provided Contract
Consumed Contract
POD##-APP-EPG
(replace “##” with your assigned 2-digit Pod Number)
POD##-BD
(replace “##” with your assigned 2-digit Pod Number)
POD##-CONTRACT-APP-WEB
(replace “##” with your assigned 2-digit Pod Number)
POD##-CONTRACT-DB-APP
(replace “##” with your assigned 2-digit Pod Number)
Step 9
Click the Update button.
Step 10
In the EPGs subsection, click the plus + to create another EPG. Enter the values
in the following table and do NOT change any of the values that are not listed in
the following table.
Field
Name
BD
Consumed Contract
Discovery Lab 4
Value
Value
POD##-WEB-EPG
(replace “##” with your assigned 2-digit Pod Number)
POD##-BD
(replace “##” with your assigned 2-digit Pod Number)
POD##-CONTRACT-APP-WEB
(replace “##” with your assigned 2-digit Pod Number)
Step 11
Click the Update button. You should now see three EPGs listed in the EPGs
pane.
Step 12
Click the Submit button to complete the Create Application Profile wizard.
Step 13
In the Navigation pane, expand the Application Profiles folder, and then click
the POD##-APPLICATION-PROFILE object. In the Work pane, select the
Topology tab. This tab displays a diagram that logically represents the
application profile. This is the whitelist in your tenant.
Note
You may need to drag-and-drop the various icons in order to create a diagram that is easier to
view. Click the Save Layout button when done to save your relative positions.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
106
Step 14
In the Navigation pane, expand from your tenant POD## > Contracts >
Standard > POD##-CONTRACT-APP-WEB. In the Work pane, select the
Topology tab. This tab displays a smaller diagram that logically represents the
contract and its relationship with the end point groups.
Note
The arrows from an EPG to a Contract indicates a provided contract.
Note
The arrows from a Contract to an EPG represents a consumed contract. Note the table of Relation
Indicators on the right for color coding.
Step 15
From your Student Server desktop, start a PuTTY session with your APIC.
Step 16
Log in to the APIC using the following information:
Step 17
Discovery Lab 4

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
View the current configuration of your tenant by entering the show runningconfiguration tenant POD## application command (replace “##” with your
assigned 2-digit Pod Number). You should see the application profile that you
created during this lab exercise.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
107
Discovery Lab 4
Note
The name of the tenant is case-sensitive in this command and all other commands executed on the
APIC command line.
Note
Actual verification of network connectivity within the whitelist you just configured in your tenant
requires integration of virtual machines in this lab environment. You will perform this integration in
the following labs.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
108
Discovery Lab 5: Integrate
Cisco APIC with VMware
vCenter Using VMware VDS
Overview
Integration of virtual machine managers (VMMs) with Cisco ACI allows you to apply policies to
individual VMs. In this lab exercise, you will integrate the Cisco APIC with the vCenter domain, assign
multiple VMs to their port groups, and test the IP connectivity among them.
The ACI fabric is able to integrate with various hypervisor technologies. This lab demonstrates the
capability of integrating into VMware's vCenter technology and will allow the APIC to create policies
that the VMware virtual environment can use.
In this lab section, you will register the APIC to your virtual environment, which will be using VMware's
vCenter Server. This lab will walk you through this registration process, which will allow the APIC to
push application policies down to the virtual machines in your pod. This tight integration will be shown
in another lab; this lab will focus on building the connection between the APIC and VMware's vCenter
Server.
Complete this lab activity to become familiar with registering a VMware domain in ACI. Upon
completing this guided lab, you will be able to:

Register APIC to VMware vCenter Server, creating a Distributed Virtual Switch inside VMware's
Network construct.

Create vCenter Credentials and a Server object.

Verify that the ACI DVS has been created and the connection between APIC and vCenter
Server is established.
Discovery Lab 5
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
109
Job Aids
Device Access Rack = R
Device
Management IP
Other IP Addresses
Credentials
apic1
192.168.R0.1
---
admin/1234QWer
leaf-1
192.168.R0.101
—
admin/1234QWer
leaf-2
192.168.R0.103
—
admin/1234QWer
Spine-1
192.168.R0.102
—
admin/1234QWer
vCenter A
192.168.R0.51
—
root@vsphere.local /1234QWer
ESXi
VMs
Discovery Lab 5
esxi-a1.dc.local
esxi-a2.dc.local
root/1234QWer
WEB (10.##.3.1), APP (10.##.1.1),
DB (10.##.2.1)
| © 2023 Cisco Systems, Inc.
N/A (auto-login)
DCACI Lab Guide
110
Task 0: Log in to the APIC Controller and the Web
based VMware vSphere Client
In this task, you will log in to the APIC controller using the graphical user interface (GUI) and you will
log in to your assigned VMware vCenter server using the web based VMware vSphere Client.
Activity Procedure
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Warning
This lab demands that you use and refer to the Resource Guide. Open the resource guide now.
Pay close attention to your assigned pod and rack number.
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
Step 5
Discovery Lab 5

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
111
Discovery Lab 5
Warning
You may have this older VMware vSphere client on your desktop. Do NOT use this client as it has
been deprecated by VMware for the later versions of vCenter used in this lab environment.
Step 6
From your Student Server, within your Chrome browser, open another browser
tab and log in to your assigned vCenter server using the following credentials:

IP address / Name: vcenter-@.dc.local (replace “@” with your assigned
vCenter letter) or 192.168.R0.51

Select LAUNCH VSPHERE CLIENT (HTML5).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
112
Step 7
Discovery Lab 5
Log in using these credentials:

Username: root@vsphere.local

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
113
Discovery Lab 5
Step 8
In the vSphere Client window, click on the Hosts and Clusters icon in the
upper left. Expand the Datacenter and Cluster. Locate the VMs assigned to
your pod.
Note
Keep both tabs open in your browser to vCenter and the APIC. You will refer back to these often in
later lab steps.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
114
Task 1: Create a VLAN Pool
In this task, you will create VLAN pool that will be used by the VMM domain you will create in a
subsequent task.
A VLAN pool specifies the VLAN IDs or ranges used for VLAN encapsulation that the VMM domain
consumes. Each time you associate an EPG to a VMM domain a VLAN ID is taken from the VLAN pool
and assigned to the virtual machine group that is created within the VMM domain (e.g., a port group
within the ACI DVS within a vCenter).
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
Return to the APIC GUI running in your Chrome browser.
Step 2
In the ACI menu bar, click Fabric.
Step 3
In the Submenu bar, click Access Policies.
Step 4
In the Navigation pane, expand Pools > VLAN.
Step 5
Right-click the VLAN folder and then select Create VLAN Pool from the context
menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
115
Step 6
Step 7
Step 8
Discovery Lab 5
The Create VLAN Pool wizard will appear. Enter the values in the following
table.
Field
Value
Name
POD##-VMM-DOMAIN-VLAN-POOL
(replace “##” with your assigned 2-digit Pod Number)
Allocation Mode
Dynamic Allocation
In the Encap Blocks subsection, click the plus sign + to create a new VLAN
range. Enter the values in the following table.
Field
Value
Range (From)
3##0 (replace “##” with your assigned 2-digit Pod Number)
Range (To)
3##9 (replace “##” with your assigned 2-digit Pod Number)
Click the OK button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
116
Discovery Lab 5
Step 9
Click the Submit button to complete the Create VLAN Pool wizard.
Step 10
Verify that you see the VLAN Pool you just created in the VLAN folder.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
117
Task 2: Create a VMM Domain
In this task, you will create a VMM domain, which will integrate the ACI fabric with your assigned
vCenter server.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
In the ACI top Menu bar, click Virtual Networking and VMware.
Step 2
In the Navigation pane right-click the VMware folder and select Create vCenter
Domain from the pull-down menu.
Step 3
The Create vCenter Domain wizard will appear. Enter the values in the following
table and do NOT change any of the values that are not listed in the following
table. Do not yet click Submit.
Field
Value
Virtual Switch Name
POD##-VMM-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
Virtual Switch
VMware vSphere Distributed Switch
VLAN Pool
POD##-VMM-DOMAIN-VLAN-POOL
(replace “##” with your assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
118
Step 4
Discovery Lab 5
In the vCenter Credentials subsection, click the plus sign + to create a new
entry. The Create vCenter Credential wizard will appear. Enter the values in the
following table.
Field
Value
Name
VCENTER-CREDENTIAL
Username
root@vsphere.local
Password and Confirm Password
1234QWer
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
119
Discovery Lab 5
Step 5
Click the OK button to complete the Create vCenter Credential wizard.
Do NOT yet click Submit.
Step 6
Open the NterOne Cisco ACI Resource Guide for your assigned Rack. You will
need it for entries that follow.
Step 7
In the vCenter subsection, click the plus sign + to create a new entry. The Add
vCenter Controller wizard will appear. Enter the values in the following table
and do NOT change any of the values that are not listed in the following table.
Be sure to refer to your resource guide for the value of @.
Warning
The version of VMware running in this lab environment is v6.7. However, be sure to select the DVS
Version 6.5 as shown in this table. If not, the VMM integration will fail.
Field
Value
Name
vCenter-@
(replace “@” with your assigned vCenter CAPITAL letter)
Host Name (or IP Address)
192.168.R0.51
DVS Version
DVS Version 6.5
Datacenter
Datacenter-@
(replace “@” with your assigned vCenter CAPITAL letter)
Associated Credential
VCENTER-CREDENTIAL
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
120
Discovery Lab 5
Note
The name of the Datacenter must exactly match the name as it appears in the vSphere Client,
otherwise the APIC will not be able to locate and configure the correct Datacenter in the vCenter
Server. In this lab the “D” at the beginning of the name and the vCenter letter are capitalized; the
rest of the name is in lower case.
Step 8
Click the OK button to complete.
Step 9
Click the Submit button to complete the Create vCenter Domain wizard.
Step 10
Verify that you see the VMM domain you just created in the VMware folder.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
121
Task 3: Verify the APIC Connection to the vCenter
Server
In this task, you will verify the APIC connection to your assigned vCenter server.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Note
The following steps demonstrate how you can also verify the connection between the APIC and the
vCenter server by using the vSphere client to view that the ACI DVS has been created.
Step 1
Return to the VMware vSphere Client tab within Chrome.
Step 2
Select the Networking icon from the Menu.
Step 3
Expand the Datacenter and POD##-VMM-DOMAIN folders.
Step 4
Verify that a new DVS has been created for your pod named POD##-VMMDOMAIN and there are two default port groups: one port group for DVS uplinks
and another port group named quarantine. If this step fails, return to the prior
task, and verify every case sensitive entry.
Note
You may or may not see other student pods appearing here.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
122
Note
Discovery Lab 5
The presence of the created switch verifies that the APIC now has a connection to the VMware
vCenter Server.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
123
Task 4: Verify an Attachable Access Entity Profile
In this task, you will verify an Attachable Access Entity Profile that will contain the VMM domain that
you created previously.
An attachable entity profile (AEP) represents a group of external entities with similar infrastructure
policy requirements. The infrastructure policies consist of physical interface policies, for example, Cisco
Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), maximum transmission unit (MTU),
and Link Aggregation Control Protocol (LACP). A VM Management (VMM) domain automatically
derives the physical interfaces policies from the interface policy groups that are associated with an
AEP.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
In the ACI Menu bar, click Fabric.
Step 2
In the Submenu bar, click Access Policies.
Step 3
Navigate to Policies > Global > Attachable Access Entity Profiles.
Step 4
Verify the settings of the pre-configured Attachable Access Entity Profile with
these entries.
Field
Value
Name
VCENTER-@-AEP
(replace “@” with your assigned vCenter letter)
Enable Infrastructure VLAN
Checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
124
Task 5: Add the VMM Domain to the AEP
In this task, you will add the VMM domain that you created previously to the vCenter AEP created in the
last task.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Note
All students must perform this task for your assigned pod.
Step 1
Navigate to Fabric > Access Policies > Policies > Global > Attachable
Access Entity Profiles.
Step 2
Verify you see this pre-created AAEP in the last task: VCENTER-@-AEP.
Highlight this object and double-click this object to go into its configuration.
Step 3
In the Work pane, in the Domains (VMM, Physical or External) Associated to
Interfaces subsection, click the plus + sign to associate your pod VMM domain.
Step 4
A Policy Usage Warning will appear indicating the other objects that will be
affected by the changes. Click the Continue button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
125
Discovery Lab 5
Step 5
In the name drop-down list, select POD##-VMM-DOMAIN (replace “##” with your
assigned two-digit Pod Number).
Step 6
Click the Update button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
126
Task 6: Create an Interface Policy Group
In this task, you will create an Interface Policy Group that will be used in a subsequent task.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Note
All students perform this task.
Step 1
In the ACI menu bar, click Virtual Networking and VMWare.
Step 2
Navigate to VMware > POD##-VMM-DOMAIN (replace “##” with your assigned
two-digit Pod Number).
Step 3
Right-click your POD##-VMM-DOMAIN and then select Create vSwitch
Policies in the context menu.
Step 4
Note that a warning will appear indicating that the vSwitch policy container has
been created.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
127
Discovery Lab 5
Step 5
Click the OK button on the Warning pop-up window.
Step 6
Click the VSwitch Policy tab to the right of the General tab within the content
pane on the right.
Step 7
Enter the values in the following table and do NOT change any of the values that
are not listed in the following table.
Warning
If the CDP and LLDP settings do not match the VMware settings the VMM integration will fail.
Field
Value
LLDP Policy
POD##-DISABLE-LLDP-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
CDP Policy
POD##-ENABLE-CDP-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
Step 8
Click the Submit button.
Step 9
A Policy Usage Warning will appear indicating the other objects that will be
affected by the changes. Click the Submit Changes button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
128
Task 7: Verify the Properties of your Pod
Distributed Switch
In this task, you will verify that the properties of your POD##-VMM-DOMAIN distributed switch within
the VMware vCenter have been updated to use Cisco Discovery Protocol (CDP) as the Discovery
Protocol between the ACI fabric and the VMware ESXi hosts that will be attached to the fabric later in
this lab exercise.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
Return to the VMware vSphere Client tab within Chrome.
Step 2
Select Networking section from the menu.
Step 3
Expand the Datacenter and POD##-VMM-DOMAIN folders.
Step 4
Right-click your assigned POD##-VMM-DOMAIN distributed switch and then
select Settings > Edit Settings… from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
129
Discovery Lab 5
Step 5
The POD##-VMM-DOMAIN Edit Settings window will appear. Click Advanced
in the left-hand side of the window.
Step 6
The Discovery Protocol settings will be visible in the right-hand side of the
window. Verify that the Type is now set to Cisco Discovery Protocol. Click OK
when you are done.
Note
It is critical that this setting is correct in order for the VMware ESXi hosts to communicate properly
with the leaf switches in the next lab exercise.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
130
Discovery Lab 5
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
131
Task 8: Verify the Interface Policy Groups
In this task, you will verify the Interface Policy Groups that will be used in a subsequent task. These
policy groups are configured once per fabric available to all tenants.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
In ACI, navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces >
Policy Groups > Leaf Access Port.
Step 2
Verify you see two pre-configured Leaf Access Ports for ESXi A1 and A2 as
referenced in the following table.
Field
Value
Name
ESXI-@@-INTERFACE-POLICY-GROUP
(replace “@@” with your assigned ESXi host ID)
Attached Entity Profile
VCENTER-@-AEP
(replace “@” with your assigned vCenter letter)
Link Level
POD##-10G-LINK-LEVEL-POLICY
(replace “##” with your assigned 2-digit Pod Number)
CDP
POD##-ENABLE-CDP-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
LLDP
POD##-DISABLE-LLDP-INTERFACE-POLICY
(replace “##” with your assigned 2- digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
132
Task 9: Verify the Leaf Interface Profiles
In this task, you will verify the Leaf Interface Profiles that will be used in a subsequent task. These
profiles are configured once per fabric available to all tenants.
The VPC you configured in prior labs was not configured for the ESXi hosts. The ESXi hosts are singlehomed in this lab environment.
Activity Procedure
Complete the following steps:
Step 1
Open your Resource Guide. Scroll down to the diagram Lab Topology and
Wiring Diagram-ESXi Hosts Managed By vCenter-A. Note the exact singlehomed ports from each Leaf to each ESXi host.
Step 2
In ACI, navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces >
Profiles.
Step 3
Verify that both of the two pre-configured Profiles ESXI-A1-INTERFACEPROFILE and ESXI-A2-INTERFACE-PROFILE have the correct settings per the
table:
Field
Value
Name
INTERFACE-SELECTOR
Interface ID
ESXi-A1: 1/33
ESXi-A2: 1/34
ESXi-B1: 1/35
ESXi-B2: 1/36
ESXi-C1: 1/37
ESXi-C2: 1/38
ESXi-D1: 1/39
ESXi-D2: 1/40
Interface Policy Group
Discovery Lab 5
| © 2023 Cisco Systems, Inc.
ESXI-@@-INTERFACE-POLICY-GROUP
(replace “@@” with your assigned ESXi host ID)
DCACI Lab Guide
133
Task 10: Verify the Leaf Profiles
In this task, you will verify the Leaf Profiles that will be used in a subsequent task. These profiles are
configured once per fabric available to all tenants.
Activity Procedure
Complete the following steps:
Step 1
Navigate to Fabric > Access Policies > Switches > Leaf Switches > Profiles.
Step 2
Verify that both of the two pre-configured Leaf Profiles ESXI-A1-SWITCHPROFILE and ESXI-A2-SWITCH-PROFILE have the correct settings per the
table:
Step 3
Discovery Lab 5
Field
Value
Leaf Selector
SWITCH-SELECTOR
Blocks
ESXi-A1: 101
ESXi-A2: 103
ESXi-B1: 101
ESXi-B2: 103
ESXi-C1: 101
ESXi-C2: 103
ESXi-D1: 101
ESXi-D2: 103
Associated Interface Selector
Profiles:
ESXI-@@-INTERFACE-PROFILE (replace “@@” with your
assigned ESXi host ID
From your Student Server desktop, start a PuTTY session with Leaf-1.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
134
Step 4
Log in to Leaf-1 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Step 5
From your Student Server desktop, start another PuTTY session with Leaf-2.
Step 6
Log in to Leaf-2 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Warning
Be sure to review the NterOne Resource Guide right now. Note the drawing that shows only one
cable from each ESXi host to a leaf switch, and that the other ESXi host connects to the other leaf
switch. Multihoming is not present for these ESXi hosts to your leaves.
Step 7
Execute the show interface e1/XX brief command using the interface number
corresponding to your ESXi host. This command will show you the status of the
interface connected to your ESXi host. Verify that the interface is in the up state.
There will not be any traffic between the leaf switch and the ESXi host yet until
the ESXi host has been configured to use the interface.
Interface ID
ESXi-A1: Leaf-1 1/33
ESXi-A2: Leaf-2 1/34
ESXi-B1: Leaf-1 1/35
ESXi-B2: Leaf-2 1/36
ESXi-C1: Leaf-1 1/37
ESXi-C2: Leaf-2 1/38
ESXi-D1: Leaf-1 1/39
ESXi-D2: Leaf-2 1/40
Leaf-1# show interface e1/XX brief
-------------------------------------------------------------------------------Ethernet
VLAN
Type Mode
Status Reason
Speed
Port Interface
Ch #
-------------------------------------------------------------------------------Eth1/XX
0
eth trunk
up
none
10G(D)
-Step 8
Discovery Lab 5
Be SURE this task is verified for both ESXi hosts in your assigned vCenter.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
135
Task 11: Add ESXi Hosts to the ACI DVS
In this task, you will add ESXi hosts to the ACI DVS that has been created by the APIC within the
vCenter server.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Note
All students must perform this Task for your assigned pod only.
Step 1
Return to the VMware vSphere Client tab in Chrome.
Step 2
Select Networking section from the Menu.
Step 3
Navigate to 192.168.R0.51 > Datacenter-@ > POD##-VMM-DOMAIN >
POD##-VMM-DOMAIN.
Step 4
Right-click your POD##-VMM-DOMAIN distributed switch and select Add and
Manage Hosts… from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
136
Step 5
Discovery Lab 5
The Add and Manage Hosts wizard will appear. The first step of the wizard is to
select Add Host and click NEXT.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
137
Discovery Lab 5
Step 6
On the 2. Select hosts page, select the green Plus + to add New hosts.
Step 7
Select both ESXi hosts and click OK, and then NEXT.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
138
Step 8
Discovery Lab 5
From the Manage physical adapters page, you will be selecting only one vmnic
interface from both of the hosts listed in the table. These vmnic’s will be
connected to your VMM domain distributed virtual switch. There will be several
physical adapters listed under each host. Use the following table to determine the
vmnic interfaces that you should select; select the same vmnic interface on both
hosts.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
139
Note
Pod
Number
First ESXi Host
vmnic Interface
Second ESXi Host
vmnic Interface
11
esxi-a1.dc.local
vmnic5
esxi-a2.dc.local
vmnic5
12
esxi-a1.dc.local
vmnic6
esxi-a2.dc.local
vmnic6
13
esxi-a1.dc.local
vmnic7
esxi-a2.dc.local
vmnic7
14
esxi-a1.dc.local
vmnic8
esxi-a2.dc.local
vmnic8
15
esxi-a1.dc.local
vmnic9
esxi-a2.dc.local
vmnic9
16
esxi-a1.dc.local
vmnic10
esxi-a2.dc.local
vmnic10
17
esxi-a1.dc.local
vmnic11
esxi-a2.dc.local
vmnic11
18
esxi-a1.dc.local
vmnic12
esxi-a2.dc.local
vmnic12
19
esxi-a1.dc.local
vmnic13
esxi-a2.dc.local
vmnic13
20
esxi-a1.dc.local
vmnic14
esxi-a2.dc.local
vmnic14
21
esxi-a1.dc.local
vmnic15
esxi-a2.dc.local
vmnic15
22
esxi-a1.dc.local
vmnic16
esxi-a2.dc.local
vmnic16
23
esxi-a1.dc.local
vmnic17
esxi-a2.dc.local
vmnic17
24
esxi-a1.dc.local
vmnic18
esxi-a2.dc.local
vmnic18
25
esxi-a1.dc.local
vmnic19
esxi-a2.dc.local
vmnic19
Step 9
Discovery Lab 5
Any vmnic can be used by any pod. BUT, two pods cannot share the same vmnic. This chart is
suggested, but NOT required. Do NOT select a vmnic that is already assigned to another pod.
Select your vmnic and click Assign uplink.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
140
Discovery Lab 5
Step 10
The Select an Uplink window will appear. Select uplink1, check the box Apply
the uplink assignment to the rest of the hosts and click OK.
Step 11
Click the NEXT button.
Step 12
The Manage VMkernal adapters step will appear. Click the NEXT button.
Step 13
The Migrate VM networking step will appear. Click the NEXT button.
Step 14
The Ready to Complete step will appear.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
141
Discovery Lab 5
Step 15
Click the FINISH button.
Step 16
Click the Hosts tab in the Work pane. Verify that you see your two ESXi hosts
listed there and in a connected state.
Note
As long as your hosts are both present for your switch, any ESXi warnings or alerts present in ESXi
are of little concern.
Step 17
Return to the PuTTY sessions to both of your leaf switches.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
142
Step 18
Discovery Lab 5
Execute the show cdp neighbors command. Verify that you see that the leaf
switch is receiving CDP information from its attached ESXi host. It may take a
few minutes for the CDP entries to appear. While referring to your resource
guide, check the CDP neighbors for both leaves.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
143
Task 12: Associate the vCenter Domain to the APP
EPG
In this task, you will associate the vCenter Domain to the APP EPG.
Activity Procedure
Complete the following steps for your assigned Pod/Tenant:
Discovery Lab 5
Step 1
In the ACI Menu bar, click Tenants.
Step 2
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 3
In the Navigation pane, expand Tenant POD## > Application Profiles >
POD##-APPLICATION-PROFILE > Application EPGs > POD##-APP-EPG.
Step 4
Right-click the EPG POD##-APP-EPG folder and then select Add VMM Domain
Association from the context menu.
Step 5
The Add VMM Domain Association wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
Field
Value
VMM Domain Profile
POD##-VMM-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
Deploy Immediacy
Immediate
Resolution Immediacy
Immediate
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
144
Discovery Lab 5
Note
Resolution Immediacy controls when the policies are downloaded to the leaf. Immediate specifies
that EPG policies (including contracts and filters) are downloaded to the leaf upon hypervisor
attachment to VDS. LLDP or OpFlex permissions are used to resolve the hypervisor to leaf node
attachments. On Demand specifies that EPG policies are downloaded to the leaf only when a pNIC
attaches to the hypervisor connector and a VM is placed in the port group (EPG).
Note
Deploy Immediacy controls when the policy is pushed into the hardware policy CAM. Immediate
specifies that the policy is programmed in the hardware policy CAM as soon as the policy is
downloaded in the leaf software. On Demand specifies that the policy is programmed in the
hardware policy CAM only when the first packet is received through the data path. This process
helps to optimize the hardware space.
Step 6
Click the Submit button to complete the Add VMM Domain Association wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
145
Task 13: Associate the vCenter Domain to the DB
EPG
In this task, you will associate the vCenter Domain to the DB EPG.
Activity Procedure
Complete the following steps:
Step 1
In the Navigation pane, expand Tenant POD## > Application Profiles >
POD##-APPLICATION-PROFILE > Application EPGs > EPG POD##-DB-EPG.
Step 2
Right-click the EPG POD##-DB-EPG folder and then select Add VMM Domain
Association from the context menu.
Step 3
The Add VMM Domain Association wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
Step 4
Discovery Lab 5
Field
Value
VMM Domain Profile
POD##-VMM-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
Deploy Immediacy
Immediate
Resolution Immediacy
Immediate
Click the Submit button to complete the Add VMM Domain Association wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
146
Task 14: Associate the vCenter Domain to the WEB
EPG
In this task, you will associate the vCenter Domain to the WEB EPG.
Activity Procedure
Complete the following steps:
Step 1
In the Navigation pane, expand Tenant POD## > Application Profiles >
POD##-APPLICATION-PROFILE > Application EPGs > EPG POD##-WEBEPG.
Step 2
Right-click the EPG POD##-WEB-EPG folder and then select Add VMM Domain
Association from the context menu.
Step 3
The Add VMM Domain Association wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
Step 4
Discovery Lab 5
Field
Value
VMM Domain Profile
VMware/POD##-VMM-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
Deploy Immediacy
Immediate
Resolution Immediacy
Immediate
Click the Submit button to complete the Add VMM Domain Association wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
147
Task 15: Verify the Creation of the ACI DVS Port
Groups within vCenter
In this task, you will verify that the correct ACI DVS port groups were created within the vCenter.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
Return to the VMware vSphere Client tab in your browser.
Step 2
Navigate to the Networking section.
Step 3
Navigate to 192.168.R0.51 > Datacenter-@ > POD##-VMM-DOMAIN >
POD##-VMM-DOMAIN.
Step 4
Verify you have three new port groups listed under the ACI DVS, each of which
will correspond to the EPGs within your application profile. The name of each
port group is a combination of the Tenant, Application Profile, and EPG names.
If the port groups don’t show up, review your prior lab steps for any
misconfigurations.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
148
Step 5
Discovery Lab 5
Right-click one of the port groups that were created and then select Edit
Settings… from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
149
Note
Discovery Lab 5
In the Settings window that appears, in the left-hand side click VLAN. You will see the VLAN ID
that was assigned to the port group by the APIC. The VLAN ID was taken from the VLAN pool
associated with the VMM domain associated with vCenter. Make no changes.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
150
Step 6
Look at the other settings of the port group which were assigned by the APIC.
Click CANCEL when you are done to close this window.
Step 7
From your Student Server desktop, start a PuTTY session with Leaf-1.
Step 8
Log in to Leaf-1 using the following information:
Step 9
Discovery Lab 5

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Execute the show vrf command. Verify that you now see that a VRF has been
created in the fabric corresponding to the VRF used by your application profile
(within your pod). The name of the VRF will be the combination of the names of
the Tenant and Private Network (VRF).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
151
Step 10
Execute the show vlan extended command. You should now see that VLANs
have been created corresponding to the EPGs that you have associated to the
vCenter server.
Step 11
From your Student Server desktop, start a PuTTY session with Leaf-2.
Step 12
Log in to Leaf-2 using the following information:
Step 13
Discovery Lab 5

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Execute the show vrf command. You should now see that a VRF has been
created in the fabric corresponding to the VRF used by your application profile
(within your pod). The name of the VRF will be the combination of the names of
the Tenant and Private Network (VRF).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
152
Step 14
Discovery Lab 5
Execute the show vlan extended command. You should now see that VLANs
have been created corresponding to the EPGs that you have associated to the
vCenter server.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
153
Task 16: Add the App Server VM to the ACI DVS
In this task, you will configure the network adapter within the App Server VM to use the correct ACI
DVS port group.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
Return to the Chrome tab for VMware vSphere Client.
Note
Be sure you are connected to your vCenter, and not to any ESXi host directly.
Step 2
Select Hosts and Clusters section from the Menu.
Note
If your VMs are powered on when you change the port groups in the following steps, you will have
to reboot the Windows VM to implement the change. Do NOT reboot the ESXi host.
Step 3
Navigate to 192.168.R0.51 > Datacenter-@ > Cluster-@ (replace “@” with your
assigned vCenter letter). Verify that see three virtual machines which are
assigned to your Pod (replace “##” with your assigned Pod number):
Virtual Machine
IP Address
Default Gateway
Pod##-App
10.##.1.1 /24
10.##.1.254
Pod##-DB
10.##.2.1 /24
10.##.2.254
Pod##-Web
10.##.3.1 /24
10.##.3.254
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
154
Discovery Lab 5
Step 4
Verify that your three VMs are currently powered off by not showing the green
triangle on the VM icon.
Warning
If the VMs are powered on and you changed the network settings in the following steps, you will
need to reboot the Windows VMs following these settings.
Step 5
Right-click the Pod##-App VM and then select Edit Settings… from the context
menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
155
Discovery Lab 5
Step 6
The Edit Settings window for Pod##-App will appear.
Step 7
In the left-hand side of the window select Network adapter 1.
Step 8
Click the pull-down menu next to the vSS Port Group and select Browse from
the menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
156
Step 9
Discovery Lab 5
From the Select Network window, select POD##|POD##-APPLICATIONPROFILE|POD##-APP-EPG from the drop-down list. Click OK.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
157
Discovery Lab 5
Warning
Be sure to select for your assigned pod number. Other pod entries will likely be present.
Step 10
Verify that the Connect box is checked.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
158
Discovery Lab 5
Step 11
Click the OK button to save the changes to the properties of the virtual machine.
Step 12
Right-click the Pod##-App VM, and then select Power > Power On from the
context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
159
Step 13
Discovery Lab 5
After a few seconds verify that you see the powered on green triangle icon next
to the virtual machine. If you see this, skip ahead to the next Task.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
160
Step 14
In some cases it is possible that when you power on a virtual machine you will
see a small “i” appear on the virtual machine icon:
If this occurs, select the virtual machine, and then select the Summary tab in the
Work pane. You will see a question presented to you regarding the state of the
virtual machine.
Step 15
Discovery Lab 5
Select I Moved It, and then click the OK button. The VM will then complete the
power on process.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
161
Task 17: Add the DB Server VM to the ACI DVS
In this task, you will configure the network adapter within the DB Server VM to use the correct ACI DVS
port group.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
Right-click the Pod##-DB VM and then select Edit Settings… from the context
menu.
Step 2
The Edit Settings for Pod##-DB will appear.
Step 3
In the left-hand side of the window select Network adapter 1.
Step 4
In the right side of the window, click the Network label setting and then select
Browse to select POD##|POD##-APPLICATION-PROFILE|POD##-DB-EPG
from the drop-down list.
Step 5
Click the OK button to save the changes to the properties of the virtual machine.
Step 6
Right-click the Pod##-DB VM and then select Power > Power On from the
context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
162
Task 18: Add the Web Server VM to the ACI DVS
In this task, you will configure the network adapter within the Web Server VM to use the correct ACI
DVS port group.
Activity Procedure
Complete the following steps:
Discovery Lab 5
Step 1
Right-click the Pod##-Web VM, and then select Edit Settings… from the context
menu.
Step 2
The Virtual Machine Properties for Pod##-Web will appear.
Step 3
In the left-hand side of the window select Network adapter 1.
Step 4
In the right-hand side of the window, click the Network label setting, and then
select Browse to select POD##|POD##-APPLICATION-PROFILE|POD##-WebEPG from the drop-down list.
Step 5
Click the OK button to save the changes to the properties of the virtual machine.
Step 6
Right-click the Pod##-Web VM and then select Power > Power On from the
context menu.
Step 7
Leave these three VMs powered on forever as you will refer back to them in later
labs.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
163
Task 19: Verify Base Connectivity in the Three VMs
In this task, you will verify each VM can now ping the default gateway provided by the subnet you
configured in prior labs. You will also test connectivity to other VMs allows in your previously configured
ACI whitelist.
Activity Procedure
Complete the following steps:
Step 1
Discovery Lab 5
Right-click the Pod##-Web VM, and then select Open Remote Console.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
164
Step 2
Discovery Lab 5
If you are prompted by your browser, click Open Link.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
165
Step 3
Discovery Lab 5
If you are prompted by a security warning in the VM, click Connect Anyway.
“Agree” with any other security warning that you might see.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
166
Step 4
Discovery Lab 5
When the Windows VM opens, start the Command Prompt.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
167
Step 5
Discovery Lab 5
Type ipconfig in the Command Prompt and note your pre-configured IP
address. The second byte of the IP address is your assigned Pod number.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
168
Discovery Lab 5
Step 6
Verify you can ping your default gateway. This address is the subnet in the
bridge domain in your tenant.
Note
All ping tests of IP connecitivity for your Web, App or DB VMs need to be done within the Windows
Command Prompt.
Note
If you are not able to ping your own default gateway for each VM, review prior lab steps to find and
correct any misconfigurations.
Step 7
Repeat all steps in this task for your pod Pod##-DB and Pod##-App VMs and
ensure they can ping their own default gateway.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
169
Discovery Lab 6: Enable
Inter-EPG Layer 2 Connectivity
Overview
There are a variety of methods to configure network connectivity between devices integrated into the
ACI fabric and devices in a layer 2 network that is external to the ACI fabric. This lab exercise will focus
on the method that is referred to as extending an end point group (EPG).
When extending an EPG method is used, network connectivity is configured so that the external device
is able to be added to an application EPG within the fabric. The external device is treated as an
endpoint in the same way a virtual machine within an integrated host is treated. Policies and contracts
applied to the EPG are also applied to traffic to and from the external device.
In this lab exercise you will be configuring connectivity between your assigned interface on Leaf-1 and
a device that is reachable via layer 2. You will also be creating a new bridge domain and EPG within
which you will place the external device. This is not necessary in general; however, additional
functionality will be demonstrated during the lab exercise. At the end of the lab exercise your assigned
DB server VM should be able to communicate with the external device.
Note
Discovery Lab 6
To distinguish the “extending an EPG” method from the “extending the bridge domain” method the
terms bare metal network and bare metal server will be used in this lab exercise. These terms refer
to devices that are directly or indirectly connected to a leaf switch at layer 2. The term “bare metal”
indicates that the server is not a hypervisor/host (no virtualization is present) and the Windows /
Linux / UNIX operating system is installed directly onto the hardware. These terms are found in
many of the Cisco ACI documents.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
170
Job Aids
Device Access Rack = R
Device
Management IP
Other IP Addresses
Credentials
apic1
192.168.R0.1
---
admin/1234QWer
leaf-1
192.168.R0.101
—
admin/1234QWer
leaf-2
192.168.R0.103
—
admin/1234QWer
Spine-1
192.168.R0.102
—
admin/1234QWer
vCenter A
192.168.R0.51
—
root@vsphere.local /1234QWer
ESXi
VMs
Discovery Lab 6
esxi-a1.dc.local
esxi-a2.dc.local
root/1234QWer
WEB (10.##.3.1), APP (10.##.1.1),
DB (10.##.2.1)
| © 2023 Cisco Systems, Inc.
N/A (auto-login)
DCACI Lab Guide
171
Task 0: Log in to the APIC Controller and the Web
based VMware vSphere Client
In this task, you will log in to the APIC controller using the graphical user interface (GUI) and you will
log in to your assigned VMware vCenter server using the web based VMware vSphere Client.
Activity Procedure
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Warning
This lab demands that you use and refer to the Resource Guide. Open the resource guide now.
Pay close attention to your assigned pod and rack number.
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
Step 5
Discovery Lab 6

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
172
Discovery Lab 6
Warning
You may have this older VMware vSphere client on your desktop. Do NOT use this client as it has
been deprecated by VMware for the later versions of vCenter used in this lab environment.
Step 6
From your Student Server, within your Chrome browser, open another browser
tab and log in to your assigned vCenter server using the following credentials:

IP address / Name: vcenter-@.dc.local (replace “@” with your assigned
vCenter letter) or 192.168.R0.51

Select LAUNCH VSPHERE CLIENT (HTML5).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
173
Step 7
Discovery Lab 6
Log in using these credentials:

Username: root@vsphere.local

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
174
Step 8
Discovery Lab 6
In the vSphere Client window, click on Hosts and Clusters in the upper left.
Expand the Datacenter and Cluster. Locate the VMs assigned to your pod.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
175
Task 1: Create a VLAN Pool
In this task, you will create VLAN pool that will be used by the physical domain you will create in a
subsequent Task.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
Return to the APIC GUI running in your Chrome browser.
Step 2
In the Menu bar, click Fabric.
Step 3
In the Submenu bar, click Access Policies.
Step 4
In the Navigation pane, expand Pools > VLAN.
Step 5
Right-click the VLAN folder and then select Create VLAN Pool from the context
menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
176
Step 6
The Create VLAN Pool wizard will appear. Enter the values in the following
table.
Field
Value
Name
POD##-BARE-METAL-VLAN-POOL
(replace “##” with your assigned 2-digit Pod Number)
Allocation Mode
Static Allocation
Step 7
In the Encap Blocks subsection, click the plus sign + to create a new VLAN
range for one VLAN. Enter the values in the following table for one single VLAN.
Field
Discovery Lab 6
Value
Range (From)
4## (replace “##” with your assigned 2-digit Pod Number)
Range (To)
4## (replace “##” with your assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
177
Discovery Lab 6
Step 8
Click the OK button.
Step 9
Click the Submit button to complete the Create VLAN Pool wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
178
Task 2: Create a Physical Domain
The next step in configuring an external bridged network is to create a Physical Domain. The physical
domain contains the VLAN Pool containing the external VLANs, and it must be added to the correct
Attachable Access Entity Profile (AEP) that is used by the correct leaf switch interface.
In this task, you will create a Physical Domain that will used by the application EPG that you will create
in a subsequent task.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
In the Menu bar, click Fabric.
Step 2
In the Submenu bar, click Access Policies.
Step 3
Navigate to Physical and External Domains > Physical Domains.
Step 4
Right-click the Physical Domains folder and then select Create Physical
Domain from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
179
Step 5
The Create Physical Domain wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
Field
Name
POD##-BARE-METAL-PHYSICAL-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
VLAN Pool
POD##-BARE-METAL-VLAN-POOL(static)
(replace “##” with your assigned 2-digit Pod Number)
Step 6
Discovery Lab 6
Value
Click the Submit button to complete the Create Physical Domain wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
180
Task 3: Create an Attachable Access Entity Profile
In this task, you will create an Attachable Access Entity Profile that will contain the physical domain that
you created previously.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
In the Menu bar, click Fabric.
Step 2
In the Submenu bar, click Access Policies.
Step 3
Navigate to Policies > Global > Attachable Access Entity Profiles.
Step 4
Right-click the Attachable Access Entity Profiles folder and then select Create
Attachable Access Entity Profile from the context menu.
Step 5
The Create Attachable Access Entity Profile wizard will appear. In STEP 1. >
Profile, enter the values in the following table.
Field
Value
Name
POD##-BARE-METAL-AEP
(replace “##” with your assigned 2-digit Pod Number)
Enable Infrastructure VLAN
Checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
181
Discovery Lab 6
Step 6
In the Domains (VMM, Physical or External) To Be Associated to Interfaces
subsection, click the plus sign + to associate your physical domain.
Step 7
In the Domain Profile drop-down list, select POD##-BARE-METAL-PHYSICALDOMAIN (replace “##” with your assigned two-digit Pod Number).
Step 8
Click the Update button.
Step 9
Click the Next button. In STEP 2 > Association to Interfaces, do not make any
changes.
Step 10
Click the Finish button to complete the Create Attachable Access Entity
Profile wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
182
Task 4: Create an Interface Policy Group
In this task, you will create an Interface Policy Group that will be used in a subsequent Task.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
In ACI, navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces >
Policy Groups > Leaf Access Port.
Step 2
Right-click the Leaf Access Port folder and then select Create Leaf Access
Port Policy Group from the context menu.
Step 3
The Create Leaf Access Port Policy Group wizard will appear. Enter the
values in the following table and do NOT change any of the values that are not
listed in the following table.
Field
Value
Name
POD##-BARE-METAL-INTERFACE-POLICY-GROUP
(replace “##” with your assigned 2-digit Pod Number)
Attached Entity Profile
POD##-BARE-METAL-AEP
(replace “##” with your assigned 2-digit Pod Number)
Link Level
POD##-1G-LINK-LEVEL-POLICY
(replace “##” with your assigned 2-digit Pod Number)
CDP
POD##-ENABLE-CDP-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
LLDP
POD##-ENABLE-LLDP-INTERFACE-POLICY
(replace “##” with your assigned 2- digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
183
Step 4
Discovery Lab 6
Click the Submit button to complete the Create Leaf Access Port Policy Group
wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
184
Task 5: Create an Interface Profile
In this task, you will create an Interface Profile that will be used in a subsequent Task.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
Navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces >
Profiles.
Step 2
Right-click the Profiles folder and then select Create Leaf Interface Profile from
the context menu.
Step 3
The Create Leaf Interface Profile wizard will appear. In the Name field, type
POD##-BARE-METAL-INTERFACE-PROFILE (replace “##” with your assigned
two-digit Pod Number).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
185
Step 4
Discovery Lab 6
In the Interface Selectors subsection, click the plus sign + to create a new entry.
The Create Access Port Selector wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
Field
Value
Name
INTERFACE-SELECTOR
Interface ID
1/##
(replace “##” with your assigned 2-digit Pod Number)
Interface Policy Group
POD##-BARE-METAL-INTERFACE-POLICY-GROUP
(replace “##” with your assigned 2- digit Pod Number)
Step 5
Click the OK button to complete the Create Access Port Selector wizard.
Step 6
Click the Submit button to complete the Create Interface Profile wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
186
Task 6: Create a Switch Profile
In this task, you will create a Switch Profile that will be used in a subsequent Task.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
Navigate to Fabric > Access Policies > Switches > Leaf Switches > Profiles.
Step 2
Right-click the Profiles folder and then select Create Leaf Profile from the
context menu.
Step 3
The Create Leaf Profile wizard will appear. In STEP 1 > Profile, in the Name
field, type POD##-BARE-METAL-SWITCH-PROFILE (replace “##” with your
assigned two-digit Pod Number).
Step 4
In the Leaf Selectors subsection, click the plus sign + to create a new entry.
Enter the values in the following table.
Field
Value
Name
SWITCH-SELECTOR
Blocks
101
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
187
Discovery Lab 6
Step 5
Click the Update button.
Step 6
Click the Next button.
Step 7
In STEP 2 > Associations, in the Interface Selector Profiles pane, select
POD##-BARE-METAL-INTERFACE-PROFILE (replace “##” with your assigned
two-digit Pod Number).
Step 8
Click the Finish button to complete the Create Leaf Profile wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
188
Task 7: Create a Bridge Domain
In this task, you will create a new Bridge Domain that will eventually contain the “bare metal server”
connected to Leaf-1 You will also create a new Subnet that will be used to communicate with the bare
metal server.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
In the Menu bar, click Tenants.
Step 2
In the Submenu bar, double-click POD## (replace “##” with your assigned 2-digit
Pod Number).
Step 3
In the Navigation pane, expand POD## > Networking > Bridge Domains.
Step 4
Right-click the Bridge Domains folder and then select Create Bridge Domain
from the context menu.
Step 5
The Create Bridge Domain wizard will appear. In STEP 1 > Main, enter the
values in the following table and do NOT change any of the values that are not
listed in the following table.
Field
Value
Name
POD##-BARE-METAL-BD
(replace “##” with your assigned 2-digit Pod Number)
VRF
POD##/POD##-VRF
(replace “##” with your assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
189
Discovery Lab 6
Step 6
Click the Next button. In STEP 2 > L3 Configurations, in the Subnets
subsection, click the plus sign + to start the Create Subnet wizard.
Step 7
The Create Subnet wizard will appear. Enter the values in the following table
and do NOT change any of the values that are not listed in the following table.
Field
Value
Gateway IP
10.##.4.254/24
(replace “##” with your assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
190
Discovery Lab 6
Step 8
Click the OK button to complete the Create Subnet wizard.
Step 9
Click the Next button.
Step 10
In STEP 3 > Advanced/Troubleshooting, do not make any changes.
Step 11
Click the Finish button to complete the Create Bridge Domain wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
191
Task 8: Create a Bare Metal EPG
In this task, you will create a Bare Metal EPG within the Bare Metal bridge domain. You will also
configure the Bare Metal EPG with the settings necessary to include the bare metal server within the
EPG.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
In the Menu bar, click Tenants.
Step 2
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 3
In the Navigation pane, expand POD## > Application Profiles > POD##APPLICATION-PROFILE > Application EPGs.
Step 4
Right-click the Application EPGs folder and then select Create Application
EPG from the context menu.
Step 5
The Create Application EPG wizard will appear. In STEP 1 > Identity, enter the
values in the following table and do NOT change any of the values that are not
listed in the following table.
Field
Value
Name
POD##-BARE-METAL-EPG
(replace “##” with your assigned 2-digit Pod Number)
Bridge Domain
POD##/POD##-BARE-METAL-BD
(replace “##” with your assigned 2-digit Pod Number)
Statically Link with Leaves/Paths
Checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
192
Discovery Lab 6
Step 6
Click the Next button.
Step 7
In STEP 2 > Leaves/Paths, in the Physical Domain drop-down list, select
POD##-BARE-METAL-PHYSICAL-DOMAIN (replace “##” with your assigned
two-digit Pod Number).
Step 8
Click the Finish button to complete the Create Application EPG wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
193
Discovery Lab 6
Step 9
In the Navigation pane, expand Tenants > POD## > Application Profiles >
POD##-APPLICATION-PROFILE > Application EPGs > POD##-BAREMETAL-EPG > Static Ports.
Step 10
Right-click the Static Ports folder and then select Deploy Static EPG on PC,
VPC, or Interface from the context menu.
Step 11
The Deploy Static EPG on PC, VPC, or Interface wizard will appear. Enter the
values in the following table.
Field
Value
Path Type
Port
Node
101
Path
eth1/##
(replace “##” with your assigned 2-digit Pod Number)
Port Encap (or Secondary VLAN for Micro-Seg)
VLAN 4##
(replace “##” with your assigned 2-digit Pod Number)
Deployment Immediacy
Immediate
Mode
Trunk
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
194
Discovery Lab 6
Step 12
Click Next.
Step 13
Click the Finish button to complete the Deploy Static EPG on PC, VPC, or
Interface wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
195
Task 9: Create a New Contract
In this task, you will create a new Contract that will be used (in the following Task) to allow
communications between the DB EPG and the Bare Metal EPG.
Activity Procedure
Complete the following steps in your assigned Tenant:
Discovery Lab 6
Step 1
In the Navigation pane, expand Tenant > POD## > Contracts.
Step 2
Right-click the Contracts folder and then select Create Contract from the
context menu.
Step 3
The Create Contract wizard will appear. In the Name field type POD##CONTRACT-DB-BARE-METAL (replace “##” with your assigned 2-digit Pod
Number).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
196
Step 4
Step 5
Discovery Lab 6
In the Subjects subsection, click the plus sign + to create a new entry. Enter the
values in the following table.
Field
Value
Name
SUBJECT-ANY
Apply Both Directions
Checked
Reverse Filter Ports
Checked
In the Filters subsection, click the plus sign + to create a new entry. In the dropdown list, select POD##/POD##-FILTER-ANY.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
197
Discovery Lab 6
Step 6
Click the Update button, and then click the OK button.
Step 7
Click the Submit button to complete the Create Contract wizard. Verify you see
the contract you just created in the Contracts folder.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
198
Task 10: Configure Contracts between the DB EPG
and the Bare Metal EPG
In this task, you will apply the Bare Metal Contract to allow traffic to flow between the DB EPG and the
Bare Metal EPG.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
In the Navigation pane, expand Tenant POD## > Application Profiles >
POD##-APPLICATION-PROFILE > Application EPGs > EPG POD##-DB-EPG
> Contracts.
Step 2
Right-click the Contracts folder and then select Add Provided Contract from
the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
199
Discovery Lab 6
Step 3
The Add Provided Contract wizard will appear. In the Contract field, select
POD##-CONTRACT-DB-BARE-METAL from the drop-down list.
Step 4
Click the Submit button to complete the Add Provided Contract wizard.
Step 5
In the Navigation pane, expand Tenants > POD## > Application Profiles >
POD##-APPLICATION-PROFILE > Application EPGs > EPG POD##-BAREMETAL-EPG > Contracts.
Step 6
Right-click the Contracts folder and then select Add Consumed Contract from
the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
200
Step 7
Discovery Lab 6
The Add Consumed Contract wizard will appear. In the Contract drop-down list
select POD##-CONTRACT-DB-BARE-METAL (replace “##” with your assigned
2-digit Pod Number).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
201
Discovery Lab 6
Step 8
Click the Submit button to complete the Add Consumed Contract wizard.
Step 9
In the Navigation pane, expand Tenant > POD## > Application Profiles >
POD##-APPLICATION-PROFILE, then click the Topology tab in the Work
pane. Verify that you now see the updated diagram for the application profile and
that it includes the new connectivity to the bare metal server.
Note
You may need to drag and drop the icons to see this same visual layout.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
202
Task 11: Verify Connectivity to the Bare Metal
Server
In this task, you will verify that your Pod DB server can communicate with the bare metal server
connected to the leaf switch.
Activity Procedure
Complete the following steps:
Discovery Lab 6
Step 1
Return to the VMware vSphere Client tab in your browser.
Step 2
Select the Hosts and Clusters icon and scroll down to locate your pod VMs.
Step 3
Navigate to 192.168.R0.51 > Datastore-@ > Cluster-@ (replace “@” with your
assigned vCenter letter). You should see three virtual machines which are
assigned to your Pod (replace “##” with your assigned Pod number):
Virtual Machine
IP Address
Default Gateway
Pod##-App
10.##.1.1 /24
10.##.1.254
Pod##-DB
10.##.2.1 /24
10.##.2.254
Pod##-Web
10.##.3.1 /24
10.##.3.254
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
203
Discovery Lab 6
Note
If your Remote Console to Pod##-DB VM is still open from the prior lab, you don’t have to open it
again.
Step 4
Right-click the Pod##-DB VM and then select Open Remote Console from the
context menu.
Step 5
The console window for Pod##-DB will appear. You will see the DB server’s
desktop.
Step 6
Click on Connect Anyway if prompted.
Step 7
Open a Command Prompt window within the VM.
Step 8
Type ipconfig and note your pre-configured IP addressing.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
204
Discovery Lab 6
Step 9
Verify that your Pod##-DB can ping the bare metal file server using the ping
10.##.4.1 command (replace “##” with your assigned 2-digit Pod Number).
Note
You may see the first ping response fail. Feel free to repeat the same ping to verify full connectivity
to the bare metal server.
Step 10
Verify that your Pod##-DB can trace route to the bare metal file server using the
tracert 10.##.4.1 command (replace “##” with your assigned 2-digit Pod
Number).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
205
Discovery Lab 6
Note
As the 10.##.4.1 address is currently on a different Layer 3 subnet, you have to connect through
the default gateway of Pod##-DB to reach the bare metal server.
Step 11
From your Student Server desktop, start a PuTTY session with Leaf-1.
Step 12
Log in to Leaf-1 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Step 13
Execute the show vrf command.
Note
The output of the show vrf command is useful when you need to copy and paste a VRF name into
another command.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
206
Step 14
Discovery Lab 6
Execute the show endpoint vrf POD##:POD##-VRF command (replace “##”
with your assigned 2-digit Pod Number). This command will display the endpoints
identified by the APIC within your VRF. Verify that you see an entry with the IP
address of 10.##.4.1.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
207
Step 15
Discovery Lab 6
Execute the show vlan extended | grep POD## command. Verify that you see a
new fabric VLAN that has been created that is associated with the port
connected to the bare metal server.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
208
Task 12: Verify Connectivity to the Bare Metal
Server as a Layer 2 Connection
In this task, you will change the bare metal server to be on the same layer 2 subnet as the Pod##-DB
VM and verify its connectivity. In this lab environment, the Bare Metal server is simply an SVI
configured on an external switch.
Activity Procedure
Complete the following steps:
Step 1
In ACI, navigate to Tenants > POD## > Application Profiles > POD##APPLICATION-PROFILE > Application EPGs > POD##-BARE-METAL-EPG.
Step 2
Click on the tabs Policy > General.
Step 3
Change the Bridge Domain to POD##-BD.
Step 4
Click Submit and Submit Changes.
Step 5
From your desktop, open a new PuTTY session to the ACI-SWITCH with the
credentials:
Step 6
Discovery Lab 6

IP address: 192.168.R0.42

Username: student

Password: 1234QWer

Enable Password: 1234QWer
Create an SVI of VLAN 4## with an IP address of 10.##.2.2 255.255.255.0.
Verify you can ping the address from the local switch. ## is your assigned pod
number.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
209
Step 7
Discovery Lab 6
Return to the Pod##-DB VM and verify you can ping 10.##.2.2.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
210
Discovery Lab 6
Step 8
From Pod##-DB VM verify you can do a traceroute to 10.##.2.2.
Note
Note how Pod##-DB now has connectivity to 10.##.2.2 without passing thru another Layer 3
address as they are on the same layer 2 network
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
211
Discovery Lab 7: Enable
Inter-EPG Layer 3 Connectivity
Overview
Complete this lab activity to become familiar with Layer 3 connectivity within ACI between different
EPGs. Upon completing this guided lab, you will be able to:

Verify connectivity between EPGs within an ACI Tenant.
Job Aids
Device Access Rack = R
Device
Management IP
Other IP Addresses
Credentials
apic1
192.168.R0.1
---
admin/1234QWer
leaf-1
192.168.R0.101
—
admin/1234QWer
leaf-2
192.168.R0.103
—
admin/1234QWer
Spine-1
192.168.R0.102
—
admin/1234QWer
vCenter A
192.168.R0.51
—
root@vsphere.local /1234QWer
ESXi
VMs
Discovery Lab 7
esxi-a1.dc.local
esxi-a2.dc.local
root/1234QWer
WEB (10.##.3.1), APP (10.##.1.1),
DB (10.##.2.1)
| © 2023 Cisco Systems, Inc.
N/A (auto-login)
DCACI Lab Guide
212
Task 0: Log in to the APIC Controller and the Web
based VMware vSphere Client
In this task, you will log in to the APIC controller using the graphical user interface (GUI) and you will
log in to your assigned VMware vCenter server using the web based VMware vSphere Client.
Activity Procedure
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Warning
This lab demands that you use and refer to the Resource Guide. Open the resource guide now.
Pay close attention to your assigned pod and rack number.
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
Step 5
Discovery Lab 7

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
213
Discovery Lab 7
Warning
You may have this older VMware vSphere client on your desktop. Do NOT use this client as it has
been deprecated by VMware for the later versions of vCenter used in this lab environment.
Step 6
From your Student Server, within your Chrome browser, open another browser
tab and log in to your assigned vCenter server using the following credentials:

IP address / Name: vcenter-@.dc.local (replace “@” with your assigned
vCenter letter) or 192.168.R0.51

Select LAUNCH VSPHERE CLIENT (HTML5).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
214
Step 7
Step 8
Discovery Lab 7
Log in using these credentials:

Username: root@vsphere.local

Password: 1234QWer (note that “QW” is capitalized)
In the vSphere Client window, click on Hosts and Clusters in the upper left.
Expand the Datacenter and Cluster. Locate the VMs assigned to your pod.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
215
Discovery Lab 7
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
216
Task 1: Examine Cisco ACI Layer 3 Networking
In this task, you will verify that all of the steps necessary to configure network connectivity between the
Pod virtual machines have been taken.
Note
The only way to test the ACI whitelist in this lab environment is from within the console of the VMs,
as you will do in this task. Feel free to keep the console open throughout this class as you will
return to these VMs often.
Activity Procedure
Complete the following steps:
Discovery Lab 7
Step 1
In ACI, navigate to Tenants > POD## > Application Profiles > POD##APPLICATION-PROFILE.
Step 2
Click on the Topology tab. Review your currently configured whitelist in your
tenant by observing the drawing. Make no changes.
Step 3
In the vSphere Client web tab, right-click the Pod##-App VM and then select
Open Remote Console from the context menu.
Note
If you have the VM Remote Consoles open from a prior lab, you don’t have to open them again.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
217
Discovery Lab 7
Step 4
Confirm that you want to Open VMware Remote Console.
Step 5
If you get an Invalid Security Certificate, click Connect Anyway.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
218
Step 6
Discovery Lab 7
The console window for Pod##-App will appear. You will see the App server’s
desktop. Click OK on any pop-up window.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
219
Discovery Lab 7
Step 7
Open a Command Prompt window within your Windows VM.
Step 8
Type ipconfig/all and note your pre-configured IP address and MAC address.
Step 9
Verify that your Pod##-App can ping Pod##-DB at 10.##.2.1. This is allowed
because you have a contract configured between Pod##-App and Pod##-DB
with a filter allowing all traffic.
Step 10
Verify that your Pod##-Web can ping Pod##-App at 10.##.1.1. This is allowed
because you have a contract configured between Pod##-Web and Pod##-App
with a filter allowing all traffic.
Step 11
Verify that your Pod##-Web can NOT ping Pod##-DB at 10.##.2.1. This is
intentionally NOT allowed because you don’t currently have a contract configured
between Pod##-Web and Pod##-DB.
Step 12
From your Student Server desktop, start a PuTTY session with Leaf-1.
Step 13
Log in to Leaf-1 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
220
Discovery Lab 7
Step 14
Execute the show mac address-table command. Verify you can see the MAC
addresses for the virtual machines in your Pod.
Note
The output of the show mac address-table command does not give you much information about the
virtual machines and the port groups (EPGs) to which they belong.
Step 15
Execute the show endpoint detail | more command and use the space bar to
go one page at a time to see more information about the virtual machines. In the
output you can see the MAC address of each virtual machine, the name of the
port group, and the VLAN ID assigned to the port group to which it belongs.
Step 16
Return to the APIC GUI.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
221
Step 17
In the Navigation pane, select Tenant POD## > Application Profiles > POD##APPLICATION-PROFILE > Application EPGs > EPG POD##-APP-EPG.
Step 18
In the content pane select the Operational tab, and then select the Client EndPoints subtab. Refer to the Resource Guide for the IP addresses in your pod.
Verify you see the Pod##-App virtual machine listed in the table along with a
number of details about the virtual machine such as the IP and MAC addresses.
Discovery Lab 7
Step 19
Select the Configured Access Policies subtab. The contents of this tab identify
where the fabric should be seeing endpoints associated with this end point
group.
Step 20
Select the Contracts subtab. The contents of this tab identify the contracts
configured on the end point group and a summary of the amount of traffic that
has been passed between the POD##-APP-EPG and other EPGs.
Step 21
Familiarize yourself with the other tabs that are present for the POD##-APPEPG.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
222
Note
Discovery Lab 7
When troubleshooting problems communicating with an endpoint, the content pane for the
associated end point group is a good starting point.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
223
Discovery Lab 8: Configure
External Layer 2 Connection
Overview
Complete this lab activity to become familiar with configuring an L2 connection to an external network.
An L2 outside connection is associated with a bridge domain and it is designed to extend the whole
bridge domain.
Upon completing this guided lab, you will be able to:

Create an External Bridged Network.
Job Aids
Device Access Racks = R
Device
Management IP
Other IP Addresses
Credentials
apic1
192.168.R0.1
---
admin/1234QWer
leaf-1
192.168.R0.101
—
admin/1234QWer
leaf-2
192.168.R0.103
—
admin/1234QWer
Spine-1
192.168.R0.102
—
admin/1234QWer
vCenter A
192.168.R0.51
—
root@vsphere.local /1234QWer
ESXi
VMs
Discovery Lab 8
esxi-a1.dc.local
esxi-a2.dc.local
root/1234QWer
WEB (10.##.3.1), APP (10.##.1.1),
DB (10.##.2.1)
| © 2023 Cisco Systems, Inc.
N/A (auto-login)
DCACI Lab Guide
224
Task 0: Log in to the APIC Controller and the Web
based VMware vSphere Client
In this task, you will log in to the APIC controller using the graphical user interface (GUI) and you will
log in to your assigned VMware vCenter server using the web based VMware vSphere Client.
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Open your Resource Guide. Scroll down to the diagram Lab Topology and
Wiring Diagram – Connectivity to External Layer 2 Networks. Pay close
attention to your assigned pod and rack number. Study the connectivity to the
one external switch ACI-SWITCH-R that will be shared by all tenants in the
fabric.
Step 2
Verify that you are currently logged in to your Student Server.
Step 3
From your Student Server desktop, start the Chrome browser.
Step 4
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 5
Log in to the APIC using the following credentials:
Step 6
Discovery Lab 8

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
225
Discovery Lab 8
Warning
You may have this older VMware vSphere client on your desktop. Do NOT use this client as it has
been deprecated by VMware for the later versions of vCenter used in this lab environment.
Step 7
From your Student Server, within your Chrome browser, open another browser
tab and log in to your assigned vCenter server using the following credentials:

IP address / Name: 192.168.R0.51

Select LAUNCH VSPHERE CLIENT (HTML5).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
226
Step 8
Discovery Lab 8
Log in using these credentials.

Username: root@vsphere.local

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
227
Step 9
Discovery Lab 8
In the vSphere Client window, click on Hosts and Clusters in the upper left.
Expand the Datacenter and Cluster. Locate the VMs assigned to your pod.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
228
Task 1: Verify an Attachable Access Entity Profile
In this task, you will verify a pre-configured Attachable Access Entity Profile (AAEP) that will be used
in later tasks.
Activity Procedure
Complete the following steps:
Discovery Lab 8
Step 1
Navigate to Fabric > Access Policies > Policies > Global > Attachable
Access Entity Profiles.
Step 2
Verify the configuration of the pre-configured AAEP for Layer 2 connectivity for
the entire fabric.
Field
Value
Name
L2-LAB-AEP
Enable Infrastructure VLAN
Checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
229
Task 2: Verify an Interface Policy Group
In this task, you will verify a pre-configured Interface Policy Group that will be used by the leaf interface
connecting to the bridged networks. The Interface Policy Group defines how an interface on a leaf
switch should operate (e.g., link speed), and the Interface Policy Group is also the point where you
indicate which AEP will use the interface. An Interface Policy Group may only include one AEP.
Activity Procedure
Complete the following steps:
Discovery Lab 8
Step 1
Navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces > Policy
Groups > Leaf Access Port.
Step 2
Verify the pre-configured Leaf Access Port per the following table.
Field
Value
Name
L2-LAB-INTERFACE-POLICY-GROUP
Attached Entity Profile
L2-LAB-AEP
Link Level
1G-LINK-LEVEL-POLICY
CDP Policy
ENABLE-CDP-INTERFACE-POLICY
LLDP Policy
ENABLE-LLDP-INTERFACE-POLICY
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
230
Task 3: Verify an Interface Profile
In this task, you will verify a pre-configured Interface Profile that will be used by the leaf interface
connecting to the bridged networks.
An Interface Profile is used for each Fabric. The Interface Profile will identify the specific interface
number(s) on the leaf switches that will use the associated Interface Policy Group. The Interface Profile
does not identify the leaf switches where the interfaces are located; the leaf switches are identified in
the Switch Profile (created later in this lab exercise).
Activity Procedure
Complete the following steps:
Discovery Lab 8
Step 1
Navigate to Fabric > Access Polices > Interfaces > Leaf Interfaces > Profiles.
Step 2
Verify the settings of the pre-configured Profile in the following table. All tenants
will configure connectivity to this same external layer 2 switch in later tasks.
Field
Value
Profile
L2-LAB-INTERFACE-PROFILE
Name
INTERFACE-SELECTOR
Blocks
1/5
Policy Group
L2-LAB-INTERFACE-POLICY-GROUP
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
231
Task 4: Verify a Switch Profile
In this task, you will verify the configuration of a pre-configured Profile that will be used by the leaf
interface connecting to the bridged networks.
The Switch Profile identifies the specific nodes (leaf switches) to which the associated Interface Profile
should be applied. At the end of this step, assuming everything was configured properly, the physical
interface on the leaf switch should be in an up state.
Activity Procedure
Complete the following steps:
Discovery Lab 8
Step 1
Navigate to Fabric > Access Policies > Switches > Leaf Switches > Profiles.
Step 2
Verify the configuration of the pre-configured Profile from the following table.
Field
Value
Profile
L2-LAB-SWITCH-PROFILE
Leaf Selectors: Name
SWITCH-SELECTOR
Blocks
103 (Leaf-2)
Associated Interface Selector Profile
L2-LAB-INTERFACE-PROFILE
Step 3
From your Student Server desktop, start a PuTTY session with Leaf-2.
Step 4
Log in to Leaf-2 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
232
Step 5
Discovery Lab 8
Verify that the interface that will be used to connect to the external switch is
functioning properly by executing the show interface ethernet 1/5 brief
command. Verify the Status is up.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
233
Task 5: Create a VLAN Pool for the External
Bridged Domain
In this task, you will create VLAN pool that will be used by the external bridged domain you will create
in the next Task.
Activity Procedure
Complete the following steps for tenant:
Discovery Lab 8
Note
All students must perform this Task and all remaining Tasks in this lab exercise.
Step 1
Return to the APIC GUI running in your Chrome browser.
Step 2
In the Menu bar, click Fabric.
Step 3
In the Submenu bar, click Access Policies.
Step 4
In the Navigation pane, expand Pools > VLAN.
Step 5
Right-click the VLAN folder and then select Create VLAN Pool from the context
menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
234
Step 6
Step 7
Discovery Lab 8
The Create VLAN Pool wizard will appear. Enter the values in the following
table.
Field
Value
Name
POD##-EXTERNAL-BRIDGED-DOMAIN-VLAN-POOL
(replace “##” with your assigned 2-digit Pod Number)
Allocation Mode
Static Allocation
In the Encap Blocks subsection, click the plus sign + to create a new VLAN
range of a single VLAN. Enter the values in the following table for a single VLAN.
Field
Value
Range (From)
2## (replace “##” with your assigned 2-digit Pod Number)
Range (To)
2## (replace “##” with your assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
235
Discovery Lab 8
Step 8
Click the OK button.
Step 9
Click the Submit button to complete the Create VLAN Pool wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
236
Task 6: Create an External Bridged Domain (Layer 2
Domain)
In this task, you will create an External Bridged Domain that will use the VLAN Pool you created in the
previous Task.
You will create an External Bridged Domain which will be used in subsequent lab exercises. An
External Bridged Domain is required in order to configure layer 2 connectivity to external networks.
Activity Procedure
Complete the following steps:
Discovery Lab 8
Step 1
In the Menu bar, click Fabric.
Step 2
In the Submenu bar, click Access Policies.
Step 3
Navigate to Physical and External Domains > External Bridged Domains.
Step 4
Right-click the External Bridged Domains folder and then select Create Layer
2 Domain from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
237
Step 5
Field
Value
Name
POD##-EXTERNAL-BRIDGED-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
Associated Attachable Entity Profile
L2-LAB-AEP
VLAN Pool
POD##-EXTERNAL-BRIDGED-DOMAIN-VLAN-POOL
(replace “##” with your assigned 2-digit Pod Number)
Step 6
Discovery Lab 8
The Create Layer 2 Domain wizard will appear. Enter the values in the following
table and do NOT change any of the values that are not listed in the following
table.
Click the Submit button to complete the Create Layer 2 Domain wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
238
Task 7: Create an External Bridged Network
In this task, you will configure an External Bridged Network, which will contain all of the necessary
information to create a layer 2 connection between the leaf switch and an external VLAN.
Activity Procedure
Complete the following steps:
Discovery Lab 8
Step 1
In the ACI menu bar, click Tenants.
Step 2
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 3
In the Navigation pane, expand Tenant POD## > Networking > L2Outs.
Step 4
Right-click the L2Outs folder and then select Create L2Out from the context
menu.
Step 5
The Create L2Out wizard will appear. In STEP 1. > Identity, enter the values in
the following table and do NOT change any of the values that are not listed in the
following table.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
239
Discovery Lab 8
Field
Value
Name
POD##-EXTERNAL-BRIDGED-NETWORK
(replace “##” with your assigned 2-digit Pod Number)
External Bridged Domain
POD##-EXTERNAL-BRIDGED-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
Bridge Domain
POD##-BD
(replace “##” with your assigned 2-digit Pod Number)
Encap
VLAN 2##
(replace “##” with your assigned 2-digit Pod Number)
Path Type
Port
Node
Leaf-2 (Node-103)
Path
eth1/5
(click the Add button after selecting the path)
Note
Be sure to click the Add button after you select the path. The path you select must appear in the
lower blue portion of the wizard.
Step 6
Click the Next button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
240
Discovery Lab 8
Step 7
In STEP 2 > External EPG Networks, in the External EPG Networks
subsection, click the plus sign + to create a new entry.
Step 8
The Create External EPG wizard will appear. In the Name field type POD##EXTERNAL-BRIDGED-EPG (replace “##” with your assigned 2-digit Pod
Number).
Step 9
Click the OK button to complete the Create External EPG wizard.
Step 10
Click the Finish button to complete the Create L2Out wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
241
Task 8: Configure Contracts between the Web EPG
and the External Bridged Network
In this task, you will configure Contracts to allow traffic to flow between the Web EPG and the External
Bridged Network EPG.
Activity Procedure
Complete the following steps:
Discovery Lab 8
Step 1
In the Navigation pane, expand Tenant > POD## > Application Profiles >
POD##-APPLICATION-PROFILE > Application EPGs > POD##-WEB-EPG >
Contracts.
Step 2
Right-click the Contracts folder and then select Add Consumed Contract from
the context menu.
Step 3
The Add Consumed Contract wizard will appear. In the Contract field, select
POD##-CONTRACT-ANY from the drop-down list.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
242
Discovery Lab 8
Step 4
Click the Submit button to complete the Add Consumed Contract wizard.
Step 5
In the Navigation pane, expand Tenant > POD## > Networking > L2Outs >
POD##-EXTERNAL- BRIDGED-NETWORK > External EPGs > POD##EXTERNAL-BRIDGED-EPG.
Step 6
In the Work panel, click the Policy and both Contracts tabs.
Step 7
In the Provided Contracts pane, click the plus + sign to create a new entry. In
the Name field, select POD##-CONTRACT-ANY from the drop-down list.
Step 8
Click the Update button.
Step 9
In the Navigation pane, expand Tenant POD## > Application Profiles >
POD##-APPLICATION-PROFILE and then click the Topology tab in the Work
pane. Verify you see the updated diagram for the application profile and that it
includes the new connectivity to the external bridged network from the Web EPG.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
243
Note
Discovery Lab 8
You may need to drag and drop the icons to display the same as visually shown here.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
244
Task 9: Verify That the Web EPG Can Communicate
with the External Bridged Domain
In this task, you will verify that the Web Server in your Web EPG can successfully communicate with a
device in the External Bridged Domain.
Activity Procedure
Complete the following steps:
Discovery Lab 8
Step 1
Return to the VMware vSphere Client tab in your browser.
Step 2
Click on Hosts and Clusters.
Step 3
Navigate to 192.168.R0.51 > Datastore-@ > Cluster-@ (replace “@” with your
assigned vCenter letter). Verify you see three virtual machines which are
assigned to your Pod (replace “##” with your assigned Pod number):
Virtual Machine
IP Address
Default Gateway
Pod##-App
10.##.1.1 /24
10.##.1.254
Pod##-DB
10.##.2.1 /24
10.##.2.254
Pod##-Web
10.##.3.1 /24
10.##.3.254
Step 4
Right-click the Pod##-WEB VM and then select Open Remote Console from
the context menu.
Note
If you have the Remote Consoles open from prior labs, you don’t have to open them again.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
245
Discovery Lab 8
Step 5
The console window for Pod##-WEB will appear. You will see the WEB server’s
desktop. Click to agree to any pop-up’s you may see.
Step 6
Open a Command Prompt window.
Step 7
Type ipconfig to review your pre-configured IP address.
Step 8
Verify you can ping your own default gateway at 10.##.3.254.
Step 9
There is a device in the external bridged network that is configured to use VLAN
##1 with the IP address 10.##.3.2 (this is the same subnet used by your DB
Server virtual machine). Verify that your Web Server can ping this IP address
using the ping 10.##.3.2 command (replace “##” with your assigned 2-digit Pod
Number).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
246
Discovery Lab 8
Step 10
From your Student Server desktop, start a PuTTY session with Leaf-2.
Step 11
Log in to Leaf-2 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Step 12
Execute the show vrf command. Look for the vrf for your tenant.
Note
The output of the show vrf command is useful when you need to copy and paste a VRF name into
another command.
Step 13
Execute the show endpoint vrf POD##:POD##-VRF | more command (replace
“##” with your assigned 2-digit Pod Number). Use the space bar to advance
through the pages of output as needed. This command will display the endpoints
identified by the APIC within your VRF. You should see an entry with the IP
address of 10.##.3.2 on eth1/5.
Step 14
Execute the show vlan extended | more command. Verify you see a new fabric
VLAN that has been created that is associated with the port Eth1/5 connected to
the external bridge domain VLAN 2##.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
247
Discovery Lab 8
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
248
Discovery Lab 9:
Configure External Layer 3
(L3Out) Connection
Overview
Complete this lab activity to become familiar with configuring L3 communications to an external
network. L3 outside connections provide IP connectivity between a Private Network of a Tenant and an
external IP network. The physical connection to the ACI Fabric is via an ACI leaf (also called a border
leaf in this context). Tenant subnets are injected into the routing protocol running between the border
leaf and external router. Users have control of which Tenant subnets they want to advertise to external
routers.
Upon completing this guided lab, you will be able to:

Configure External L3 network.

Create Application Profile to propagate Internal Public Routes.

Associate an L3 outside connection to a Bridge Domain.

Verify that the Leaf is Learning OSPF Routes.

Configure a contract between internal and external EPG.
Discovery Lab 9
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
249
Job Aids
Device Access Rack = R
Device
Management IP
Other IP Addresses
Credentials
apic1
192.168.R0.1
---
admin/1234QWer
leaf-1
192.168.R0.101
—
admin/1234QWer
leaf-2
192.168.R0.103
—
admin/1234QWer
Spine-1
192.168.R0.102
—
admin/1234QWer
vCenter A
192.168.R0.51
—
root@vsphere.local /1234QWer
ESXi
VMs
Discovery Lab 9
esxi-a1.dc.local
esxi-a2.dc.local
root/1234QWer
WEB (10.##.3.1), APP (10.##.1.1),
DB (10.##.2.1)
| © 2023 Cisco Systems, Inc.
N/A (auto-login)
DCACI Lab Guide
250
Task 0: Log in to the APIC Controller and the Web
based VMware vSphere Client
In this task, you will log in to the APIC controller using the graphical user interface (GUI) and you will
log in to your assigned VMware vCenter server using the web based VMware vSphere Client.
Note
.This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Open your Resource Guide. Scroll down to the diagram Lab Topology and
Wiring Diagram – Connectivity to External Layer 3 Networks. Pay close
attention to your assigned pod and rack number. Study the connectivity from the
ACI Leaf-2 to the one external router ACI-ROUTER-R that will be shared by all
tenants in the fabric.
Step 2
Verify that you are currently logged in to your Student Server.
Step 3
From your Student Server desktop, start the Chrome browser.
Step 4
Navigate to https://192.168.R0.1 (replace “R” with your assigned ACI Rack
Number).
Step 5
Log in to the APIC using the following credentials:
Step 6
Discovery Lab 9

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
251
Discovery Lab 9
Warning
You may have this older VMware vSphere client on your desktop. Do NOT use this client as it has
been deprecated by VMware for the later versions of vCenter used in this lab environment.
Step 7
From your Student Server, within your Chrome browser, open another browser
tab and log in to your assigned vCenter server using the following credentials:

IP address / Name: 192.168.R0.51

Select LAUNCH VSPHERE CLIENT (HTML5).
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
252
Step 8
Discovery Lab 9
Log in using these credentials.

Username: root@vsphere.local

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
253
Step 9
Discovery Lab 9
In the vSphere Client window, click on Hosts and Clusters in the upper left.
Expand the Datacenter and Cluster. Locate the VMs assigned to your pod.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
254
Task 1: Verify an Attachable Access Entity Profile
used for L3Out
In this task, you will verify the settings of a pre-configured Attachable Access Entity Profile (AAEP)
that will be used in the following tasks.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Step 1
In the ACI menu bar, click Fabric.
Step 2
In the Submenu bar, click Access Policies.
Step 3
Navigate to Policies > Global > Attachable Access Entity Profiles.
Step 4
Verify the pre-configured settings of this AAEP.
Field
Value
Name
L3-LAB-AEP
Enable Infrastructure VLAN
Checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
255
Task 2: Verify a Leaf Access Port
In this task, you will verify a pre-configured Leaf Access Port that will be used by the leaf interface
connecting to the routed networks.
The Leaf Access Port defines how an interface on a leaf switch should operate (e.g., link speed), and
the Leaf Access Port is also the point where you indicate which AEP will use the interface.
A Leaf Access Port may only include one AEP.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Step 1
In ACI, navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces >
Policy Groups > Leaf Access Port.
Step 2
Verify the settings of this pre-configured Leaf Access Port.
Field
Value
Name
L3-LAB-INTERFACE-POLICY-GROUP
Attached Entity Profile
L3-LAB-AEP
Link Level
1G-LINK-LEVEL-POLICY
CDP
ENABLE-CDP-INTERFACE-POLICY
LLDP
ENABLE-LLDP-INTERFACE-POLICY
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
256
Task 3: Verify an Interface Profile
In this task, you will verify the settings of a pre-configured Interface Profile that will be used by the leaf
interface connecting to the routed networks.
The Interface Profile will identify the specific interface number(s) on the leaf switches that will use the
associated Interface Policy Group. The Interface Profile does not identify the leaf switches where the
interfaces are located; the leaf switches are identified in the Switch Profile (created later in this lab
exercise).
Activity Procedure
Complete the following steps:
Discovery Lab 9
Step 1
Navigate to Fabric > Access Policies > Interfaces > Leaf Interfaces >
Profiles.
Step 2
Verify the settings of this pre-configured Interface Profile
Field
Value
Name
INTERFACE-SELECTOR
Interface ID
1/6
Interface Policy Group
L3-LAB-INTERFACE-POLICY-GROUP
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
257
Task 4: Verify a Leaf Profile
In this task, you will verify the settings of a pre-created Leaf Profile that will be used by the leaf interface
connecting to the routed networks.
The Leaf Profile identifies the specific nodes (leaf switches) to which the associated Interface Profile
should be applied. At the end of this step, assuming everything was configured properly, the physical
interface on the leaf switch should be in an up state.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Step 1
Navigate to Fabric > Access Policies > Switches > Leaf Switches > Profiles.
Step 2
Verify the settings of this pre-configured Leaf Profile.
Field
Value
Name:
L3-LAB-SWITCH-PROFILE
Leaf Selectors: Name
SWITCH-SELECTOR
Blocks
103
Associated Interface
Selector Profiles
L3-LAB-INTERFACE-PROFILE
Step 3
From your Student Server desktop, start a PuTTY session with Leaf-2.
Step 4
Log in to Leaf-2 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
258
Step 5
Discovery Lab 9
Verify that the interface that will be used to connect to the external router is
functioning properly with a Status of up by executing the show interface
ethernet 1/6 brief command.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
259
Task 5: Create a VLAN Pool for the External Routed
Domain
In this task, you will create VLAN pool that will be used by the external routed domain you will create in
the next Task.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Note
All students must perform this and all remaining tasks in this lab exercise.
Step 1
In the ACI Menu bar, navigate to Fabric.
Step 2
In the Submenu bar, click Access Policies.
Step 3
In the Navigation pane, expand Pools > VLAN.
Step 4
Right-click the VLAN folder and then select Create VLAN Pool from the context
menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
260
Step 5
Step 6
Discovery Lab 9
The Create VLAN Pool wizard will appear. Enter the values in the following
table.
Field
Value
Name
POD##-EXTERNAL-ROUTED-DOMAIN-VLAN-POOL
(replace “##” with your assigned 2-digit Pod Number)
Allocation Mode
Static Allocation
In the Encap Blocks subsection, click the plus sign + to create a new VLAN
range for a single VLAN. Enter the values in the following table.
Field
Value
Range (From)
3## (replace “##” with your assigned 2-digit Pod Number)
Range (To)
3## (replace “##” with your assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
261
Discovery Lab 9
Step 7
Click the OK button.
Step 8
Click the Submit button to complete the Create VLAN Pool wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
262
Task 6: Create an External Routed Domain (Layer 3
Domain)
In this task, you will create an External Routed Domain that will use the VLAN Pool you created in the
previous Task and will be used in subsequent lab exercises. An External Routed Domain is required in
order to configure layer 3 connectivity to external networks.
Note
All students must perform this task.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Step 1
In the ACI menu bar, click Fabric.
Step 2
In the Submenu bar, click Access Policies.
Step 3
Navigate to Physical and External Domains > L3 Domains.
Step 4
Right-click the L3 Domains folder and then select Create L3 Domain from the
context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
263
Step 5
Field
Value
Name
POD##-EXTERNAL-ROUTED-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
Associated Attachable Entity Profile
L3-LAB-AEP
VLAN Pool
POD##-EXTERNAL-ROUTED-DOMAIN-VLAN-POOL
(replace “##” with your assigned 2-digit Pod Number)
Step 6
Discovery Lab 9
The Create L3 Domain wizard will appear. Enter the values in the following table
and do NOT change any of the values that are not listed in the following table.
Click the Submit button to complete the Create L3 Domain wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
264
Task 7: Configure an OSPF Interface Policy
In this task, you will configure an OSPF Interface Policy which is used to specify the settings necessary
to bring up an OSPF adjacency.
At this point the physical interface of the leaf switch connected to the external network is ready for use.
Next, you will configure the policies necessary to route traffic through this interface.
You will configure an OSPF Interface Policy, which defines attributes of how an interface should use
OSPF. These attributes correspond to those you would configure on an interface in IOS.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Note
All students must perform this task.
Step 1
In the Menu bar, click Tenants.
Step 2
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 3
In the Navigation pane, expand POD## > Policies > Protocol > OSPF > OSPF
Interface.
Step 4
Right-click the OSPF Interface folder and then select Create OSPF Interface
Policy from the context menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
265
Step 5
Field
Value
Name
POD##-OSPF-INTERFACE-POLICY
(replace “##” with your assigned 2-digit Pod Number)
Network Type
Broadcast
Interface Controls – Advertise Subnet
Checked
Step 6
Discovery Lab 9
The Create OSPF Interface Policy wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
Click the Submit button to complete the Create OSPF Interface Policy wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
266
Task 8: Create an External Routed Network
In this task, you will configure an External Routed Network, which will contain all of the necessary
information to create an OSPF connection between the leaf switch and an external router.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Step 1
In the Menu bar, click Tenants.
Step 2
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 3
In the Navigation pane, expand POD## > Networking > L3Outs.
Step 4
Right-click the L3Outs folder and then select Create L3Out from the context
menu.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
267
Step 5
Field
Value
Name
POD##-EXTERNAL-ROUTED-NETWORK
(replace “##” with your assigned 2-digit Pod Number)
VRF
POD##-VRF
(replace “##” with your assigned 2-digit Pod Number)
L3 Domain
POD##-EXTERNAL-ROUTED-DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
OSPF
Checked
OSPF Area ID
## (replace “##” with your assigned 2-digit Pod Number)
OSPF Area Type
NSSA area
Step 6
Discovery Lab 9
The Create L3Out wizard will appear. In the 1. Identity step, enter the values in
the following table and do NOT change any of the values that are not listed in the
following table.
Click Next.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
268
Step 7
Field
Value
Layer 3
SVI
Layer 2
Port
Node ID
Leaf-2 (Node 103)
Router ID
##.##.##.##
(replace “##” with your assigned 2-digit Pod Number for all four bytes in this IP address)
Interface
Eth 1/6 (on Node-103)
Encap
VLAN 3## (replace “##” with your assigned 2-digit Pod Number)
MTU (bytes)
1500 (do NOT use the Inherit option)
IP Address
172.16.##.2/24 (replace “##” with your assigned 2-digit Pod Number)
Step 8
Discovery Lab 9
In the 2. Nodes And Interfaces subsection enter the values in the following table
and do NOT change any of the values that are not listed in the following table.
Click Next.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
269
Discovery Lab 9
Step 9
In the 3. Protocols subsection, under Policy, select the POD##-OSPFINTERFACE-POLICY.
Step 10
Click Next.
Step 11
In the 4. External EPG subsection, enter the values in the following table and do
NOT change any of the values that are not listed in the following table.
Field
Value
Name
POD##-ROUTED-EXTERNAL-EPG
Consumed Contract
POD##/POD##-CONTRACT-ANY
Default EPG for all external networks
checked
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
270
Step 12
Discovery Lab 9
Click Finish.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
271
Task 9: Verify that the Leaf is Learning OSPF
Routes
In this task, you will verify what you have configured for OSPF and check the OSPF adjacency and
routes on the ACI border leaf (Leaf-2).
Activity Procedure
Complete the following steps in your Tenant:
Discovery Lab 9
Step 1
In the ACI navigation pane, expand Tenants > POD## > Networking > L3 Outs
> POD##-OSPF-EXTERNAL- ROUTED-NETWORK > Logical Node Profiles >
POD##-OSPF-EXTERNAL-ROUTED-NETWORK_nodeProfile > Configured
Nodes > topology /pod-1/node-103 > OSPF for VRF POD##:POD##-VRF.
Step 2
Select the Neighbors tab. Verify you see one OSPF neighbor in the Full State to
the external router listed for your pod.
Step 3
In the Navigation pane, expand OSPF for VRF POD##:POD##-VRF > Routes.
You should see several routes being advertised by the external routers, which
include the following:

10.1##.7.1/32

10.1##.8.1/32

10.1##.9.1/32
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
272
Discovery Lab 9
Step 4
From your Student Server desktop, start a PuTTY session with Leaf-2.
Step 5
Log in to Leaf-2 using the following information:

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Step 6
Execute the show vrf command. Verify you can see the vrf for your pod.
Note
The output of the show vrf command is useful when you need to copy and paste a VRF name into
another command.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
273
Discovery Lab 9
Step 7
Verify that the OSPF adjacency between Leaf-2 and the external router is up by
entering the show ip ospf neighbors vrf POD##:POD##-VRF command
(replace “##” with your assigned 2-digit Pod Number). You should see one entry
for your pod with the neighbor ID of 172.16.##.1. Verify the state is FULL/<DR or
BDR>.
Step 8
View the OSPF-related details of the loopback interface and the SVI interface
used by Leaf-2 to form the OSPF adjacency by entering the show ip ospf
interface vrf POD##:POD##-VRF command (replace “##” with your assigned
2-digit Pod Number).
Step 9
Execute the show ip route ospf vrf POD##:POD##-VRF command (replace
“##” with your assigned 2-digit Pod Number). Verify you see routes to the
following subnets:

10.1##.7.1/32

10.1##.8.1/32

10.1##.9.1/32
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
274
Step 10
Execute the iping –V POD##:POD##-VRF 10.1##.7.1 command (replace “##”
with your assigned 2-digit Pod Number). Verify the ping is successful.
Note
When testing connectivity through the fabric, the iping command will generate traffic and use the
VXLAN overlay as needed. However, the ping command is not able to use the VXLAN overlay.
Step 11
From your Student Server desktop, start a PuTTY session with Leaf-1.
Step 12
Log in to Leaf-1 using the following information:
Step 13
Discovery Lab 9

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Execute the show vrf command.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
275
Discovery Lab 9
Step 14
Execute the show ip route ospf vrf POD##:POD ##-VRF command (replace
“##” with your assigned 2-digit Pod Number). You will not see any routes as
OSPF is not running on Leaf-1.
Step 15
Execute the show ip route bgp vrf POD##:POD##-VRF command (replace “##”
with your assigned 2-digit Pod Number). You will see the routes to the external
networks as prefixes that have been redistributed into the BGP routing process.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
276
Task 10: Configure Contracts between the Web
EPG and the External Routed Network
In this task, you will configure Contracts to allow traffic to flow between the Web EPG and the External
Routed Network EPG.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Step 1
In the ACI navigation pane, expand Tenants > POD## > Application Profiles >
POD##-APPLICATION-PROFILE > Application EPGs > EPG POD##-WEBEPG > Contracts.
Step 2
Right-click the Contracts folder and then select Add Provided Contract from
the context menu.
Step 3
The Add Provided Contract wizard will appear. In the Contract field, select
POD##/POD##-CONTRACT-ANY from the drop-down list.
Step 4
Click the Submit button to complete the Add Provided Contract wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
277
Discovery Lab 9
Step 5
In the Navigation pane, expand Tenants > POD## > Networking > L3Outs >
POD##-EXTERNAL- ROUTED-NETWORK > EXTERNAL EPGs > POD##ROUTED-EXTERNAL-EPG.
Step 6
In the Work panel, click the Policy tab and then click the Contracts sub-tab.
Step 7
Verify you see the POD##/POD##-CONTRACT-ANY Consumed Contract
assigned from a prior step.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
278
Task 11: Associate the External Routed Network to
the Bridge Domain
In this task, you will configure the bridge domain within your Tenant to use the external routed network.
Activity Procedure
Complete the following steps:
Discovery Lab 9
Step 1
In the Navigation pane, expand Tenants > POD## > Networking > Bridge
Domains > POD##-BD.
Step 2
In the Work panel, click the Policy tab and then click the L3 Configurations
sub-tab.
Step 3
In the Work pane, in the Associated L3 Outs subsection, click the plus sign + to
create a new entry. In the L3 OUT field, select POD##/POD##-EXTERNALROUTED-NETWORK from the drop-down list
Step 4
Click the Update button.
Step 5
In the Navigation pane, expand Tenant POD## > Application Profiles >
POD##-APPLICATION-PROFILE and then click the Topology tab in the Work
pane. You should now see the updated diagram for the application profile and
that it includes the new connectivity to the external routed network.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
279
Note
Discovery Lab 9
You may need to drag and drop the icons to see the same visual appearance as shown here.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
280
Task 12: Advertise Subnets to the External Routed
Network
In this task, you will configure the bridge domain within your Tenant to advertise routes to the external
routed network.
Activity Procedure
Complete the following steps:
Step 1
In the Navigation pane, expand Tenants > POD## > Networking > Bridge
Domains > POD##-BD > Subnets > 10.##.3.254/24.
Step 2
In the Work pane, change the Scope setting to Advertised Externally.
Step 3
Click the Submit button. A Policy Usage Warning will appear indicating the
other objects that will be affected by the changes.
Step 4
Click the Submit Changes button.
Step 5
From your Student Server desktop, start a PuTTY session with Leaf-2.
Step 6
Log in to Leaf-2 using the following information:
Step 7
Discovery Lab 9

Login as: admin

Password: 1234QWer (note that “QW” is capitalized)
Execute the show vrf command.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
281
Discovery Lab 9
Step 8
Execute the show endpoint vrf POD##:POD##-VRF command (replace “##”
with your assigned 2-digit Pod Number). This command will display the endpoints
identified by the APIC within your VRF.
Step 9
Verify you see an entry with the IP address of ##.##.##.##. This is the loopback
interface created for the OSPF process for your tenant.
Step 10
Return to the VMware vSphere Client tab in your browser.
Step 11
Click on the Hosts and Clusters icon.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
282
Step 12
Virtual Machine
IP Address
Default Gateway
Pod##-App
10.##.1.1 /24
10.##.1.254
Pod##-DB
10.##.2.1 /24
10.##.2.254
Pod##-Web
10.##.3.1 /24
10.##.3.254
Step 13
Right-click the Pod##-Web VM and then select Open Remote Console from the
context menu.
Note
If you still have the Pod##-Web VM Remote Console open from a prior lab, you do not have to
open it again. Look at your task bar and click on it if it is present.
Step 14
The console window for Pod##-Web will appear. You will see the Web server’s
desktop.
Step 15
Open a Command Prompt window within your Web server.
Step 16
Verify that your Web Server can ping the IP address of the first route learned via
OSPF using the ping 10.1##.7.1 command (replace “##” with your assigned
2-digit Pod Number).
Step 17
Verify that your Web Server can ping the IP address of the second route learned
via OSPF using the ping 10.1##.8.1 command (replace “##” with your assigned
2-digit Pod Number).
Step 18
Verify that your Web Server can ping the IP address of the third route learned via
OSPF using the ping 10.1##.9.1 command (replace “##” with your assigned
2-digit Pod Number).
Step 19
Open your resource guide and note the credentials for the external router
ACI-ROUTER.
Step 20
Open a new PuTTY session to the ACI-ROUTER at:
Step 21
Discovery Lab 9
Navigate to 192.168.R0.51 > Datastore-@ > Cluster-@ (replace “@” with your
assigned vCenter letter). You should see three virtual machines which are
assigned to your Pod (replace “##” with your assigned Pod number):

IP address: 192.168.R0.43

User: student

Password: 1234QWer
Verify you can see your Pod Web server subnet advertised to the external router
ACI-ROUTER with the command show ip route | include N2.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
283
Discovery Lab 9
Note
Your App and DB subnets were intentionally not routed externally to demonstrate a secure data
center not exposing all servers.
Step 22
Verify you can ping your Web server at 10.##.3.1.
Step 23
Verify you can trace to your Web server at 10.##.3.1. Note that you pass through
the hop of your OSPF neighbor in your tenant.
Step 24
Verify you can connect via TCP port 80 to your Web server with the command
telnet 10.##.3.1 80.
Note
This TCP port 80 test is very primitive and will be slow. After several seconds, click on the screen
and verify you see at least some HTML code returning. This HTML, even with a 400 Bad Request
error, is showing port 80 is accessible from this outside router into your web server.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
284
Discovery Lab 9
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
285
NterOne ACI Bonus Labs
Overview
The following labs are not a part of the formal Cisco DCACI lab guide. These labs are extra and can be
done at the students discretion. All of these bonus labs are performed on the physical ACI Rack.
NterOne Bonus Labs
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
286
Discovery Lab 10:
Monitoring and Diagnosing ACI
Overview
Complete this lab activity to become familiar with configuring ACI to send messages to a Syslog server.
Upon completing this guided lab, you will be able to:

Configure ACI to log to a Syslog Server.

View Faults Using the Cisco APIC GUI.

View events using the Cisco APIC GUI.

Use the API Inspector.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
287
Task 0: Log in to the APIC Controller
In this task, you will log in to the APIC controller using the graphical user interface (GUI).
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
Warning
BONUS – Discovery Lab 10

Username: admin

Password: 1234QWer (note that “QW” is capitalized)

Domain: DefaultAuth (if prompted)
You may need to disable the Windows Firewall in your pod desktop for these Supplementary labs.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
288
Task 1: Configuring Syslog Monitoring
In this task, you will configure syslog monitoring.
Activity Procedure
Complete the following steps:
Warning
The Windows operating system you are using for your pod desktop will allow only one Syslog
Server to run at any one time. If you are sharing the same pod desktop with another student for
user student and student2, you will need to coordinate to take turns only running one Syslog
server at a time. Close the Syslog server when you are done.
Step 1
On your Student Server desktop, start the 3CDaemon application by doubleclicking it. You can keep 3CDaemon open for the rest of the class.
Step 2
On your Student Server desktop open a Command Prompt and note your
192.168.x.x IP address from ipconfig. This is the same IP address of your pod
Syslog server. Keep this window open as you will need this IP address in later
steps.
Note
You will likely see other IP addresses on your Windows desktop. Do not use or change them.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
289
Step 3
Return to the APIC GUI running in your Chrome browser.
Step 4
In the Menu bar, click Admin.
Step 5
In the Submenu bar, click External Data Collectors.
Step 6
In the Navigation pane, expand Monitoring Destinations > Syslog.
Step 7
Right-click the Syslog folder and then select Create Syslog Monitoring
Destination Group from the context menu.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
290
Step 8
The Create Syslog Monitoring Destination Group wizard will appear. In STEP
1. > Profile, in the Name field type POD##-SYSLOG-GROUP (replace “##” with
your assigned 2-digit Pod Number).
Step 9
Click the Next button.
Step 10
In 2. > Remote Destinations, in the Remote Destinations subsection, click the
plus sign + to create a new entry.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
291
Step 11
The Create Syslog Remote Destination wizard will appear. Enter the values in
the following table for your assigned pod.
Field
Value
Host Name/IP:
IP Address of your pod desktop Syslog Server
Name
POD##-SYSLOG-SERVER
(replace “##” with your assigned 2-digit Pod Number)
Admin State
Enabled
Management EPG
default (Out-of-Band)
Step 12
Click the OK button to complete the Create Syslog Remote Destination wizard.
Step 13
Click the Finish button to complete the Create Syslog Monitoring Destination
Group wizard.
Note
In the previous steps, you configured the syslog server. In the next steps, you will configure a
syslog policy that will result in the generation of syslog messages to the syslog server.
Step 14
In the ACI Menu bar, click Fabric.
Step 15
In the Submenu bar, click Fabric Policies.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
292
Step 16
In the Navigation pane, expand Policies > Monitoring > default >
CallHome/Smart Callhome/SNMP/Syslog/TACACS.
Note
You can also access Monitoring Policies under individual tenants and Fabric Access Policies.
Step 17
In the Work pane, in the Source Type setting, choose Syslog.
Step 18
In the far right-hand side of the Work pane click the plus sign + to create a new
entry.
Step 19
The Create Syslog Source wizard will appear. Enter the values in the following
table.
Field
BONUS – Discovery Lab 10
Value
Name
POD##-SYSLOG-SOURCE
(replace “##” with your assigned 2-digit Pod Number)
Min Severity
information
Include
(check all boxes)
Dest. Group
POD##-SYSLOG-GROUP
(replace “##” with your assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
293
Step 20
Click the Submit button to complete the Create Syslog Source wizard.
Step 21
Return to the 3CDaemon window.
Step 22
Click the Syslog Server tab to display syslog messages from the APIC.
Note
Keep the Syslog Server open. You can refer back to it in later labs when events take place that
send log messages.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
294
Task 2: View Faults Using the Cisco APIC GUI
In this task, you will view faults using the Cisco APIC GUI.
When troubleshooting issues with Cisco Application Centric Infrastructure (ACI), the first step will be to
inspect any faults recorded in the Cisco ACI. The logged faults are presented in many places in the
GUI. They are filtered to show only those faults that are relevant to the current GUI context. Wherever a
Faults tab appears in the GUI Work pane, you can view the relevant entries from the fault log.
A fault object is placed in the Management Information Tree (MIT) as a child of the port object. If the
same condition is detected multiple times, no additional instances of the fault object are created. Fault
records are never modified after they are created and they are deleted only when their number exceeds
the maximum value that is specified in the fault retention policy.
Activity Procedure
Complete the following steps:
Step 1
In ACI, to view a summary of fault statistics for the overall system, click System
from the main menu.
Step 2
Select Dashboard.
Note
The Dashboard tables display the fault counts by domain and by type.
Note
This is just an example. Your Fault Counts output will be different. Read the entries in the
Dashboard.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
295
Step 3
In the Menu bar, click Tenants.
Step 4
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 5
Select the Dashboard tab in the Work Pane. Read all the entries for your tenant.
Note
The Work pane will display a Dashboard specific to a Tenant.
Step 6
In the Work pane, click the Faults tab. Take a moment to review any recorded
faults.
Note
If you have performed all of the previous lab exercises properly there should not be any faults
listed.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
296
Note
By clicking specific ACI constructs (e.g., Application Profiles, Bridge Domains, etc.), in the
Navigation pane, you will have access to the Faults tab which records all faults that are specific to
the current GUI context.
Step 7
In the Menu bar, click Admin.
Step 8
In the Submenu bar, click Historical Record Policies.
Step 9
In the Navigation pane, select Controller Policies.
Step 10
In the Work pane, note the retention policy settings that appear for the following
logs:
BONUS – Discovery Lab 10

Audit Logs Retention Policy

Events Retention Policy

Fault Records Retention Policy

Health Records Retention Policy
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
297
Note
The Controller Policies folder is the location where you manage the sizes of the different controller
policies. These policies are for issues that are specific to the controller.
The maximum size range is 1,000 to 500,000 records; the default is 100,000 records. The Purge
Window Size is the maximum number of records to be deleted in a single swipe once the number
of records in the log is greater than the Maximum Size. The Purge Window Size default is designed
to minimize impact on performance when records are purged.
Step 11
BONUS – Discovery Lab 10
In the Navigation pane, expand Switch Policies. This is the location where you
can manage the size of the various switch log retention policies. Note the entries
and make no changes.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
298
Task 3: View Events Using the Cisco APIC GUI
In this task, you will view events using the Cisco Application Policy Infrastructure Controller (APIC) GUI.
The APIC maintains a comprehensive, up-to-date, run-time representation of the administrative and
operational state of the Cisco ACI Fabric in the form of a collection of managed objects (MOs). Any
configuration or state change in any MO is considered an event. Most events are part of the normal
workflow and there is no need to record their occurrence or to bring them to the attention of the user
unless they meet one of the following criteria:

The event is an anomaly, such as a fault being raised.

The event is defined in the model as requiring notification.

The event follows a user action that needs to be auditable.
Many places in the GU present the logged events. The events are filtered to show only those events
that are relevant to the current GUI context. Wherever a History tab appears in the GUI work pane, you
can view the relevant log entries from the event log, health log, or audit log.
Activity Procedure
Complete the following steps:
Step 1
In the Menu bar, click Admin, and then in the Submenu bar, click AAA.
Step 2
In the Navigation pane, click the Authentication folder.
Step 3
In the right-hand work pane, click the AAA tab.
Step 4
Below the AAA tab, click the History tab.
Step 5
Under the History tab, click the Events subtab to view the Events.
Step 6
Double-click any event entry to view more details about the event if an entry
exists.
Note
By clicking specific ACI constructs – for example, Application Profiles, Bridge Domains, Private
Networks – in the Navigation pane, you will have access to the History tab. This tab records the
history that is specific to the current GUI context.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
299
Task 4: Using the API Inspector
In this task, you will use the API Inspector. By using the built-in API Inspector tool, you can capture API
messaging as you perform tasks in the Cisco Application Policy Infrastructure Controller (APIC) GUI.
The captured messages provide examples of the API operation that you can use to develop external
applications that will use the API.
Activity Procedure
Complete the following steps:
Step 1
In the upper-right corner of the APIC window, click the Help and tools icon to
view the drop-down menu.
Step 2
In the drop-down menu, choose the Show API Inspector.
Note
The API Inspector opens in a new browser window.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
300
Step 3
Arrange the APIC browser window side-by-side with the API Inspector window to
make it easier to read both windows
Step 4
In the API Inspector window, select the Newest at the top check box.
Note
This action allows you to interact with the APIC GUI and simultaneously observe the API calls that
are made in reaction to your interactions with the GUI.
Note
In the Filters toolbar of the API Inspector window, note how you can choose the types of API log
messages to display. The displayed messages are color-coded according to the selected message
types. This table shows the available message types:
Log Type
BONUS – Discovery Lab 10
Description
debug
Displays debug messages. This type includes most API commands and
responses.
info
Displays informational messages.
warn
Displays warning messages.
error
Displays error messages.
fatal
Displays fatal messages.
all
Checking this check box causes all other check boxes to become
checked. Unchecking any other check box causes this check box to be
unchecked.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
301
Step 5
In the APIC GUI, click Tenants from the Menu bar, and then navigate to ALL
TENANTS > common.
Step 6
In the Navigation pane, right-click Application Profiles, and then choose Create
Application Profile from the context menu.
Note
Note how the HTTP GET messages are showing up in the API Inspector window.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
302
Step 7
In the Name field, type POD##-TEMP, and then click Submit.
Step 8
In the API Inspector, enter POST in the Search field and press enter.
Note
Note that there is a POST method request that instructs the API to create a new application profile
in the Common Tenant.
The request payload will be in the JSON format. The following is an example of the request:
Step 9
BONUS – Discovery Lab 10
Maximize your API Inspector window. Highlight only the content of the POST
payload which is in JSON format.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
303
Step 10
Open the Notepad++ application on your desktop.
Step 11
Copy and paste the payload into a new document in Notepad++.
Note
The URL and JSON array that are recovered from the API Inspector could be used to make REST
calls to configure the fabric.
Step 12
Click Close on the API Inspector when you are done.
BONUS – Discovery Lab 10
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
304
Discovery Lab 11: Use Visore
to Explore an ACI Tenant
Overview
Complete this lab activity to become familiar with monitoring and troubleshooting tools in the Cisco
Application Policy Infrastructure Controller (APIC) GUI. Upon completing this guided lab, you will be
able to:

Use the Managed Object Browser (Visore).
BONUS – Discovery Lab 11
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
305
Task 0: Log in to the APIC Controller
In this task, you will log in to the APIC controller using the graphical user interface (GUI).
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
BONUS – Discovery Lab 11

Username: admin

Password: 1234QWer (note that “QW” is capitalized)

Domain: DefaultAuth (if prompted)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
306
Task 1: Use the Managed Object Browser (Visore)
In this task, you will use the Managed Object Browser to validate the AAA configuration.
The Managed Object Browser, or Visore, is a utility that is built into the Cisco Application Policy
Infrastructure Controller (APIC). It provides a read only graphical view of the managed objects (MOs)
using a browser. The Visore utility uses the APIC REST API query methods to browse MOs that are
active in the ACI Fabric, allowing you to see the query that was used to obtain the information.
You cannot use the Visore utility to perform configuration changes.
Note
Only the Firefox, Chrome, and Safari browsers are supported for Visore access.
Activity Procedure
Complete the following steps:
Step 1
From your Student Server desktop, start the Chrome browser.
Step 2
Open another tab and navigate to https://192.168.R0.1/visore.html
(replace “R” with your ACI Rack Number).
Step 3
If needed, log in to the APIC using the following credentials:
Step 4
BONUS – Discovery Lab 11

Username: admin

Password: 1234QWer (note that “QW” is capitalized)
Click Login.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
307
Step 5
The APIC Object Store Browser will appear. In the Class or DN field, type
aaaLoginDomain, and then click the Run Query button.
Step 6
The query results show all Login Domains.
Step 7
Click the blue “>” symbol at the end of the dn field.
Note
This action will take you to the details of that DN, if it exists in the object tree.
Note
Clicking > sends a query to the APIC for the children of the MO (managed object).
Clicking < sends a query for the parent of the MO.
BONUS – Discovery Lab 11
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
308
Step 8
Click the Show URL of response and last query link to display the API call that
executed the query.
Note
Note how this is another way to display the JSON or XML of any Managed Object (MO) in ACI.
Step 9
Click Close when you are done reading the JSON output.
BONUS – Discovery Lab 11
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
309
Discovery Lab 12:
Configure Tenant Span
Overview
Complete this lab activity to become familiar with monitoring and troubleshooting tools in the Cisco
Application Policy Infrastructure Controller (APIC) GUI. Upon completing this guided lab, you will be
able to:

Setup Visibility and Troubleshooting using the Cisco APIC GUI.

Setup SPAN using the Cisco APIC GUI.

View captured SPAN packets with Wireshark.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
310
Task 0: Log in to the APIC Controller
In this task, you will log in to the APIC controller using the graphical user interface (GUI).
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
BONUS – Discovery Lab 12

Username: admin

Password: 1234QWer (note that “QW” is capitalized)

Domain: DefaultAuth (if prompted)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
311
Task 1: Using the Operations Tab in APIC
In this task, you will use the Operations tab in Cisco Application Policy Infrastructure Controller (APIC).
Activity Procedure
Complete the following steps:
Warning
The Cisco ACI leaf switches used in this lab support a maximum of 4 unidirectional or 2
bidirectional infra/tenant SPAN sessions. If you have a full class, this will likely exceed these limits
for this lab. Coordinate with your instructor to delete your SPAN session after this lab to free the
SPAN sessions for other students.
Step 1
To create some traffic, open the command prompt in your Web VM and perform
a continuous ping to your pod App VM at 10.##.1.1.
Step 2
Return to the APIC GUI running in your Chrome browser.
Step 3
In the Menu bar, click Operations.
Step 4
In the Submenu bar, click Visibility and Troubleshooting.
Step 5
In the Session Name field type POD##-SESSION (replace “##” with your
assigned 2-digit Pod Number).
Note
You will not see this entry initially, but note that even though there is a pull-down box, you can type
in the new entry for your pod.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
312
Step 6
Under the Targets section, in the Source field, enter 10.##.1.1 (the IP address of
Pod##-App) and then click the Search button.
Step 7
You should see a single search result. Click it, which will cause the row to turn
grey.
Step 8
In the Destination field, enter 10.##.3.1 (the IP address of Pod##-Web) and then
click the Search button.
Step 9
You should see a single search result. Click it, which will cause the row to turn
grey.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
313
Step 10
Click Submit in the lower right side of the page.
Step 11
Be patient as the topology loads.
Step 12
Click Traceroute in the Navigation Pane. From the Protocol drop-down menu,
choose icmp. Press the Play button in the top left part of the window.
Step 13
Click OK if a warning pops up.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
314
Step 14
Be patient as the results load. The interface will display the result of a traceroute.
Observe that the Traceroute Status is complete and that the arrows in the
screen are green.
Step 15
Click the Stop button to end the traceroute.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
315
Task 2: Configure SPAN
In this task, you will configure SPAN and send packets to Wireshark for packet inspection.
Activity Procedure
Complete the following steps in your tenant:
Step 1
In ACI, navigate to Tenants > POD## > Networking > Bridge Domains >
POD##-BD > Subnets.
Step 2
Right-click on Subnets and select Create Subnet.
Step 3
Enter the Gateway IP of 10.##.10.254/24.
Step 4
Click Submit.
Step 5
Return to the VMware vSphere Client tab in your browser. Log in again as
needed.
BONUS – Discovery Lab 12

URL: https://192.168.R0.51

Getting Started Option: LAUNCH VSPHERE CLIENT (HTML5)

Username: root@vsphere.local

Password: 1234QWer
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
316
Note
You may see the older VMware vSphere client icon on your desktop. Do NOT use this app as it has
been deprecated by VMware for the newer version of software used in this lab environment.
Step 6
Select the Hosts and Clusters icon in the upper right.
Step 7
Right-click the Pod##-Wireshark VM and then select Edit Settings… from the
context menu.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
317
Step 8
Highlight Network adapter 1. On the pull-down, select Browse…
Step 9
Select the WEB-EPG for your assigned pod. You will likely need to hover the
mouse over the entries to see the full name.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
318
Step 10
Click OK.
Step 11
Select the Connected check box.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
319
Step 12
Click OK.
Step 13
Give the process several seconds to complete. Then, right-click the Pod##Wireshark VM and select Power > Power On.
Step 14
Right-click the Pod##-Wireshark VM and select Open Remote Console. Click
Open VMware Console if prompted again.
Step 15
Click Connect Anyway if you are prompted with an Invalid Security Certificate
pop-up window.
Step 16
If you are prompted with an error on connecting to vCenter, enter the vCenter
credentials:
BONUS – Discovery Lab 12

Username: root@vsphere.local

password: 1234QWer
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
320
Step 17
BONUS – Discovery Lab 12
Be patient as the Windows 10 VM loads. Click inside the console to see the
Windows desktop. Log in to Windows as needed with the credentials:

User: Student

Password: 1234QWer
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
321
Step 18
Open a Command Prompt in your Pod##-Wireshark VM.
Step 19
Type ipconfig to view your pre-configured IP address.
Step 20
Verify you can ping your default gateway, which is the Subnet you previously
configured in ACI.
Step 21
On your Pod##-Wireshark VM, double-click to start Wireshark.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
322
Step 22
In Wireshark, navigate to Capture > Options….
Step 23
Select the one Ethernet interface as needed and click Start.
Step 24
Return to ACI. Navigate to Operations > Visibility & Troubleshooting.
Step 25
As needed, select the Session Name of POD##-SESSION you created in the
last task.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
323
Step 26
Click Submit.
Step 27
After the topology loads, click SPAN.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
324
Step 28
Enter the following values. Replace ## with your assigned pod number.
Field
Step 29
BONUS – Discovery Lab 12
Value
Destination Type
EPG
Dest EPG: Tenant
POD##
Application Profile
POD##-APPLICATION
EPG
POD##-APP-EPG
Destination IP
10.##.10.1
Source IP Prefix:
255.255.255.0
Click the Start button.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
325
Step 30
In vCenter, return to the command prompt of your Web VM. Ping the App server
at 10.##.1.1.
Note
If you still have a continuous ping from the previous configuration, let it run.
Step 31
Return to your Pod##-Wireshark VM.
Step 32
Stop the packet capture.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
326
Step 33
Verify you can see the ICMP packets. Highlight any one of the ICMP packets.
Note the content contains a Generic Routing Encapsulation (GRE) header for the
ERSPAN session. Note the source and destination IPs of the ping you
performed.
Warning
The Cisco ACI leaf’s used in this lab support a maximum of 4 unidirectional or 2 bidirectional
infra/tenant SPAN sessions. If you have a full class, this will likely exceed these limits for this lab.
Coordinate with your instructor to stop and delete your SPAN session after this lab to free the
SPAN sessions for other students.
BONUS – Discovery Lab 12
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
327
Discovery Lab 13:
Configure RBAC using
Local and Radius Users
RADIUS Accounts
Overview
Complete this lab activity to become familiar with configuring role-based access control (RBAC) and
integration with AAA services.
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides
centralized Authentication, Authorization, and Accounting management for users who connect and use
a network service. RADIUS runs on UDP ports 1812 and 1813. Cisco ACI has support for RADIUS on a
fabric wide basis.
Upon completing this guided lab, you will be able to:

Configure a local security domain.

Configure local users and roles for your tenant security domain.

Create a RADIUS security domain and map to your tenant.

Create an AAA login domain for RADIUS authentication.

Test RADIUS authentication and authorization.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
328
Task 0: Log in to the APIC Controller
In this task, you will log in to the APIC controller using the graphical user interface (GUI).
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
Step 5
BONUS – Discovery Lab 13

Username: admin

Password: 1234QWer (note that “QW” is capitalized)

Domain: DefaultAuth (if prompted)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
329
Task 1: Verify the RADIUS Provider
In this task, you will verify the ACI RADIUS provider or configure one as needed. The RADIUS provider
used in this lab environment is a Microsoft Windows Server pre-configured as a RADIUS server.
Activity Procedure
Complete the following steps:
Step 1
Return to the APIC GUI running in your Chrome browser.
Step 2
In the Menu bar, click Admin.
Step 3
In the Submenu bar, click AAA > Authentication.
Step 4
Select the RADIUS tab.
Step 5
If you see an existing RADIUS Provider to 10.0.0.29, you do not have to create
it again. A RADIUS Provider is required only once per ACI fabric. If the provider
is not present, then continue with the remaining steps in this task.
Step 6
Click the tools icon on the far right and then select Create RADIUS Provider
from the context menu.
Step 7
The Create RADIUS Provider wizard will appear. Enter the values in the
following table and do NOT change any of the values that are not listed in the
following table.
BONUS – Discovery Lab 13
Field
Value
Host Name (or IP Address)
10.0.0.29
Key / Confirm Key
1234QWer
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
330
Step 8
BONUS – Discovery Lab 13
Click the Submit button to complete the Create RADIUS Provider wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
331
Task 2: Create a Security Domain and Map It to
Your Tenant
In this task, you will configure a new security domain and map it to your tenant.
Activity Procedure
Complete the following steps:
Step 1
In the Menu bar, click Admin.
Step 2
In the Submenu bar, click AAA.
Step 3
Navigate to the Security folder.
Step 4
Right-click the Security folder and then select Create Security Domain from the
context menu.
Step 5
The Create Security Domain wizard will appear. In the Name field type POD##SD-LOCAL (replace “##” with your assigned 2-digit Pod Number).
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
332
Step 6
Click the Submit button to complete the Create Security Domain wizard.
Step 7
In the Menu bar, click Tenants.
Step 8
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 9
In the Navigation pane, click your Tenant POD##, and then click the Policy tab in
the Work pane.
Step 10
In the Security Domains subsection, click the plus sign to create a new entry.
In the Name drop-down list select POD##-SD-LOCAL.
Step 11
Click the Update button.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
333
Task 3: Configure Local Users and Roles for your
Tenant Security Domain
In this task, you will create tenant-specific admin and audit users with the appropriate roles and map
them to your tenant security domain. You will implement Role Based Access Control (RBAC) for two
users and then test their access by logging into both.
Activity Procedure
Complete the following steps:
Step 1
In the Menu bar, click Admin.
Step 2
In the Submenu bar, click AAA.
Step 3
Navigate to the Users folder.
Step 4
Right-click the Users folder and then select Create Local User from the context
menu.
Step 5
The Create Local User wizard will appear. In 1. User Identity, enter the
following credentials:
BONUS – Discovery Lab 13

Username: POD##-ADMIN-LOCAL (replace “##” with your assigned 2-digit
Pod Number)

Password: !234QWer (note that “QW” is capitalized) (the number 1 has been
replaced with an !)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
334
Step 6
Click the Next button.
Step 7
In 2. Security, in the Security Domain sub-section, click the checkbox next to
POD##-SD-LOCAL.
Step 8
Click the Next button.
Step 9
In 3. Roles, in the Domain POD##-SD-LOCAL sub-section, click the plus sign +
to add a Role Name and Role Privilege Type.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
335
Step 10
Step 11
BONUS – Discovery Lab 13
Add each of the following Role Names. Change the Role Privilege Type to
Write for all ten Role Names. Click Update for each entry and click the plus sign
+ to add each new entry.

aaa

admin

fabric-admin

nw-svc-admin

nw-svc-params

ops

read-all

tenant-admin

tenant-ext-admin

vmm-admin
Click the Finish button to complete the Create Local User wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
336
Step 12
Right-click the Users folder and then select Create Local User from the context
menu.
Step 13
The Create Local User wizard will appear. In 1. User Identity, enter the values
in the following table and do NOT change any of the values that are not listed in
the following table.
Field
Value
Login ID
POD##-AUDIT-LOCAL (replace “##” with your assigned 2-digit Pod Number)
Password / Confirm
Password
!234QWer (the number 1 has been replaced with an !)
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
337
Step 14
Click the Next button.
Step 15
In 2. Security, in the Security Domain sub-section, click the checkbox next to
POD##-SD-LOCAL.
Step 16
Click the Next button.
Step 17
In 3. Roles, in the Domain POD##-SD-LOCAL sub-section, click the plus sign +
to add a Role Name and Role Privilege Type.
Step 18
Add each of the following Role Names. Change the Role Privilege Type to
Write for all ten Role Names. Click Update for each entry and click the plus sign
+ to add each new entry.
BONUS – Discovery Lab 13

aaa

admin

fabric-admin

nw-svc-admin

nw-svc-params

ops

read-all

tenant-admin

tenant-ext-admin

vmm-admin
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
338
Step 19
BONUS – Discovery Lab 13
Click the Finish button to complete the Create Local User wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
339
Task 4: Verify the Configuration of the Local User
Accounts
In this task, you will log in to the APIC GUI using the accounts that you just created in order to verify
that the correct rights have been granted to each account.
Activity Procedure
Complete the following steps:
Step 1
In the upper right-hand corner of the APIC GUI, click the far right icon named
Manage my profile and then click Logout from the drop-down menu.
Step 2
Log in to the APIC using the following credentials:
BONUS – Discovery Lab 13

Username: POD##-ADMIN-LOCAL (replace “##” with your assigned 2-digit
Pod Number)

Password: !234QWer (note that “QW” is capitalized) (the number 1 has been
replaced with an !)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
340
Step 3
BONUS – Discovery Lab 13
Click the Do not show on login button if prompted. Then click Get Started.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
341
Step 4
The first screen that you will see is the Dashboard. Notice how there is nothing
visible as the POD##-ADMIN-LOCAL account does not have system-wide rights.
Also notice how many of the Menu bar selections are greyed out.
Step 5
In the Menu bar, click Tenants.
Step 6
In the Submenu bar, click ALL TENANTS. Notice how there are only two
Tenants listed, common and POD##.
Step 7
Double-click on the tenant POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 8
Navigate to various portions of your Tenant. Notice how you have the ability to
change the configuration of your Tenant. Make no actual changes to your
Tenant.
Step 9
In the upper right-hand corner of the APIC GUI, click the Manage my profile
icon on the far right of POD##-ADMIN-LOCAL, and then select View My
Permissions from the drop-down menu.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
342
Step 10
The User Permissions window will appear. This window will display all of the
permissions that have been granted to the user account with which you are
currently logged in.
Step 11
Click the Close button.
Step 12
Logout of the APIC GUI.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
343
Step 13
Step 14
BONUS – Discovery Lab 13
Log in to the APIC using the following credentials:

Username: POD##-AUDIT-LOCAL (replace “##” with your assigned 2-digit
Pod Number)

Password: !234QWer (note that “QW” is capitalized) (the number 1 has been
replaced by an !)
Click the Do not show on login button if prompted. Then click Get Started.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
344
Step 15
The first screen that you will see is the Dashboard. Notice how there is nothing
visible as the POD##-AUDIT-LOCAL account does not have system-wide rights.
Also notice how many of the Menu bar selections are greyed out.
Step 16
In the Menu bar, click Tenants.
Step 17
In the Submenu bar, click ALL TENANTS. Notice how there are only two
Tenants listed, common and POD##.
Step 18
Double-click POD## (replace “##” with your assigned 2-digit Pod Number).
Step 19
Navigate to various portions of your Tenant. Notice how you have the ability to
view and change the configuration of your Tenant. Make no actual changes.
Step 20
Click ALL TENANTS.
Step 21
Click the common Tenant.
Step 22
Navigate to various portions of the common Tenant. Notice how you have the
ability to view but not change the configuration of the common Tenant.
Step 23
In the upper right-hand corner of the APIC GUI, click the Manage my profile
icon on the far right of POD##-ADMIN-LOCAL, and then select View My
Permissions from the drop-down menu.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
345
Step 24
The User Permissions window will appear. This window will display all of the
permissions that have been granted to the user account with which you are
currently logged in.
Step 25
Click the Close button.
Step 26
Logout of the APIC GUI.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
346
Task 5: Create a RADIUS Security Domain and Map
It to your Tenant
In this task, you will configure a new RADIUS security domain and map it to your tenant.
Activity Procedure
Complete the following steps:
Step 1
Log in to the APIC GUI using the credentials:

Username: admin

Password: 1234QWer
Step 2
In the Menu bar, click Admin.
Step 3
In the Submenu bar, click AAA.
Step 4
Navigate to the Authentication folder.
Step 5
Select the RADIUS tab in the right-hand work pane.
Step 6
Notice the Radius host that was created in a previous task.
Step 7
Navigate to the Authentication folder.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
347
Step 8
Right-click the Authentication folder and then select Create Login Domain
from the context menu.
Step 9
The Create Login Domain wizard will appear. Enter the values in the following
table.
Field
Value
Name
POD##_RADIUS_LOGIN_DOMAIN
(replace “##” with your assigned 2-digit Pod Number)
Realm
RADIUS
Note
BONUS – Discovery Lab 13
The name of the Login Domain may not use the dash character. However, you may use the
underscore character.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
348
Step 10
In the Providers section, click the + sign to add a Radius Provider.
Step 11
Select 10.0.0.29 from the name pull-down menu and enter 1 from the Priority
pull-down menu. Click the Update button and then click Submit.
Step 12
Click Submit.
Step 13
Navigate to the Security folder.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
349
Step 14
Right-click the Security folder and then select Create Security Domain from the
context menu.
Step 15
The Create Security Domain wizard will appear. In the Name field type POD##SD-RADIUS (replace “##” with your assigned 2-digit Pod Number).
Note
It is important that you enter this value correctly because it is a value that is used by the RADIUS
server to assign av pairs to the login account.
Step 16
BONUS – Discovery Lab 13
Click the Submit button to complete the Create Security Domain wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
350
Step 17
In the Menu bar, click Tenants.
Step 18
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 19
In the Navigation pane, click POD##, and then click the Policy tab in the Work
pane.
Step 20
In the Security Domains subsection, click the plus sign + to create a new entry.
In the Name drop-down list select POD##-SD-RADIUS.
Step 21
Click the Update button. There should now be two security domains listed,
POD##-SD-LOCAL and POD##-SD-RADIUS.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
351
Task 6: Create a RADIUS User Accounts
Activity Procedure
Complete the following steps:
Step 1
In the Menu bar, click Admin.
Step 2
In the Submenu bar, click AAA.
Step 3
Navigate to the Users folder.
Step 4
Right-click the Users folder and then select Create Local User from the context
menu.
Step 5
The Create Local User wizard will appear. In 1. User Identity, enter the values
in the following table and do NOT change any of the values that are not listed in
the following table.
Field
Value
Login ID
POD##-ADMIN-RAD
(replace “##” with your assigned 2-digit Pod Number)
Password / Confirm Password
1234QWer
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
352
Step 6
Click the Next button.
Step 7
In 2. Security, in the Security Domain sub-section, click the checkbox next to
POD##-SD-RADIUS.
Step 8
Click the Next button.
Step 9
In 3. Roles, in the Domain POD##-SD-RADIUS sub-section, click the plus sign +
to add a Role Name and Role Privilege Type.
Step 10
Add each of the following Role Names. Change the Role Privilege Type to
Write for all ten Role Names. Click Update for each entry and click the plus sign
+ to add each new entry.
Step 11
BONUS – Discovery Lab 13

aaa

admin

fabric-admin

nw-svc-admin

nw-svc-params

ops

read-all

tenant-admin

tenant-ext-admin

vmm-admin
Click the Finish button to complete the Create Local User wizard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
353
Task 7: Verify the Configuration of the RADIUS
User Accounts
In this task, you will log in to the APIC GUI using the RADIUS accounts in order to verify that the correct
rights have been granted to each account.
Activity Procedure
Complete the following steps:
Step 1
In the upper right-hand corner of the APIC GUI, click the far right icon named
Manage my profile and then click Logout from the drop-down menu.
Step 2
Log in to the APIC using the following credentials:
BONUS – Discovery Lab 13

Username: POD##-ADMIN-RAD (replace “##” with your assigned 2-digit Pod
Number)

Password: 1234QWer (note that “QW” is capitalized)

Domain: POD##_RADIUS_LOGIN_DOMAIN (replace “##” with your
assigned 2-digit Pod Number)
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
354
Step 3
BONUS – Discovery Lab 13
Click the Do not show on login button if prompted. Then click Get Started.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
355
Step 4
The first screen that you will see is the Dashboard. Notice how there is little
shown as the POD##-ADMIN-RAD account does not have system-wide rights.
Also notice how many of the Menu bar selections are greyed out.
Step 5
In the Menu bar, click Tenants. In the Submenu bar, click ALL TENANTS.
Notice the only Tenant listed is POD##.
Step 6
Double-click POD## (replace “##” with your assigned 2-digit Pod Number).
Step 7
Navigate to various portions of your Tenant. Notice how you have the ability to
change the configuration of your Tenant. Make no actual changes to your tenant.
Step 8
In the upper right-hand corner of the APIC GUI, click the Manage my profile
icon on the far right of POD##-ADMIN-RAD, and then select View My
Permissions from the drop-down menu.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
356
Step 9
The User Permissions window will appear. Note all of the permissions that have
been granted to the user account with which you are currently logged in.
Step 10
Click the Close button.
Step 11
Logout of the APIC GUI.
BONUS – Discovery Lab 13
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
357
Discovery Lab 14: Configure the
APIC Using the ACI Cobra SDK
(Python)
Overview
The Python API provides a Python programming interface to the underlying REST API, allowing you to
develop your own applications to control the APIC and the network fabric, enabling greater flexibility in
infrastructure automation, management, monitoring, and programmability.
Complete this lab activity to become familiar with the ability to configure the APIC controller with the
ACI Cobra SDK using Python.
The Cisco ACI Python Cobra software development kit (SDK) are downloadable files from Cisco that
enables network automation and programmability using python programming.
Upon completing this guided lab, you will be able to:

Configure the Communication Policy.

Review a Python script.

Use a Python Script to create a Tenant.
BONUS – Discovery Lab 14
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
358
Task 0: Log in to the APIC Controller
In this task, you will log in to the APIC controller using the graphical user interface (GUI).
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
Step 5
BONUS – Discovery Lab 14

Username: admin

Password: 1234QWer (note that “QW” is capitalized)

Domain: DefaultAuth (if prompted)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
359
Task 1: Enable HTTP Access for the APIs to use
TCP port 80
In this task, you will enable HTTP access to the APICs so that the APIs are accessible via HTTP TCP
port 80.
While TCP port 80 is totally unsecure compared to HTTPS TCP port 443, port 80 allows for an easier
entry to learning and practicing ACI APIs. These settings are insecure and are not recommended for a
production environment.
Activity Procedure
Complete the following steps:
Step 1
In the Menu bar, click Fabric.
Step 2
In the Submenu bar, click Fabric Policies.
Step 3
Navigate to Policies > Pod > Management Access > default.
Step 4
In the Work pane, in the HTTP section, verify that the Admin State is set to
Enabled and the Redirect is set to Disabled. You do not have to change this
setting again if it is already done.
Note
Within this ACI lab environment, if these settings are incorrect, this lab exercise will not function
properly. These settings are insecure and are not recommended for a production environment.
You may see a note on port 80 being depricated in later releases.
BONUS – Discovery Lab 14
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
360
Step 5
If needed, click the Submit button to commit the configuration changes. A Policy
Usage Warning will appear indicating the other objects that will be affected by
the changes.
Step 6
Click the Submit Changes button.
BONUS – Discovery Lab 14
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
361
Task 2: Review an Existing Python Script
In this task, you will review a Python script that can be used to create a new Tenant configuration by
leveraging the Cobra SDK.
Note
Executing a Python script on the Windows 10 operating system demands Administrative access.
Activity Procedure
Complete the following steps:
Step 1
On your Student Server, open Explorer and navigate to the S: drive under
This PC.
Step 2
Navigate to the S:\DCAC9K folder.
Step 3
Locate your pod-specific Python script, which is named POD##-PYTHON
(replace “##” with your assigned Pod number).
BONUS – Discovery Lab 14
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
362
Step 4
Right-click on your pod-specific Python script, and then select Edit with
Notepad++ from the context menu.
Step 5
The Notepad++ application will start and display the contents of your podspecific Python script.
BONUS – Discovery Lab 14
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
363
Step 6
BONUS – Discovery Lab 14
Review the opened Python script. This script will be used in the next Task to
create a Tenant. Keep this file open in Notepad++.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
364
Task 3: Use a Python Script to Create a Tenant
In this task, you will use a Python script to create a new Tenant in ACI.
Activity Procedure
Complete the following steps:
Step 1
From Notepad++, click File > Save As….
Step 2
Select the c:\Python27 directory on your Student PC and click Save.
BONUS – Discovery Lab 14
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
365
Step 3
From your Windows Student Desktop, select the Command Prompt, right-click
and More > Run as administrator.
Note
All recent versions of Microsoft Windows requires administrative access to run executable
programs such as a Python script.
BONUS – Discovery Lab 14
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
366
Step 4
BONUS – Discovery Lab 14
Change into the C:\Python27 directory. Verify you can see your Python script.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
367
Step 5
Using the Python PIP command note the Cisco ACI Python packages that have
already been downloaded into this Windows PC.
Step 6
Run the python script for your assigned pod from the Command Prompt. Enter in
the following when prompted:
BONUS – Discovery Lab 14

APIC login username: admin

APIC URL: http://192.168.R0.1 (R is your assigned rack number)

APIC Password: 1234QWer
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
368
Note
You may need to close your browser tab to the APIC, open and log in again as admin.
Step 7
If this Python script executes successfully, it will not display any output. Return to
your APIC and verify your new tenant was created from this Python script.
Note
The Python script that you used only creates a new Tenant and does not configure any other
objects or properties.
BONUS – Discovery Lab 14
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
369
Discovery Lab 15:
Configure the APIC Using the
Cisco APIC REST to Python
Adapter (ARYA)
Overview
The Cisco APIC REST to Python Adapter (ARYA) is a tool developed by Cisco Advanced Services.
The ARYA tool enables you to generate code directly from what resides in the APIC object model.
Complete this lab activity to become familiar with the ability to use the ARYA to configure the APIC.
Upon completing this guided lab, you will be able to:

Save the configuration of an object within the APIC as an XML file.

Use ARYA to create a Python script.

Use Notepad++ to edit a Python script.

Create a new object within the APIC using the Python script.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
370
Task 0: Log in to the APIC Controller
In this task, you will log in to the APIC controller using the graphical user interface (GUI).
Note
This lab must be performed on the ACI-Physical Equipment as shown in the Labtyme portal.
Activity Procedure
Complete the following steps:
Step 1
Verify that you are currently logged in to your Student Server.
Step 2
From your Student Server desktop, start the Chrome browser.
Step 3
Navigate to https://192.168.R0.1 (replace “R” with your ACI Rack Number).
Step 4
Log in to the APIC using the following credentials:
Step 5
BONUS – Discovery Lab 15

Username: admin

Password: 1234QWer (note that “QW” is capitalized)

Domain: DefaultAuth (if prompted)
At this point you should see the APIC Dashboard.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
371
Task 1: Save an Object as an XML File
In this task, you will save the configuration of a Subnet object as an XML file, which you will later
transform into a Python script using ARYA.
Activity Procedure
Complete the following steps:
Step 1
In the Menu bar, click Tenants.
Step 2
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 3
In the Navigation pane, expand Tenant POD## > Networking > Bridge
Domains > POD##-BD > Subnets > 10.##.1.254/24.
Step 4
Right-click the 10.##.1.254/24 object and then select Save as … from the context
menu.
Step 5
The Save As wizard will appear. Enter the values in the following table.
BONUS – Discovery Lab 15
Field
Value
Content
Only Configuration
Scope
Subtree
Export Format
XML
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
372
Step 6
Click the Download button. This will save a file named subnet-[10.##.1.25424].xml to the Downloads folder on your Student Server. Press Keep if you are
prompted.
Step 7
On your Student Server, open Explorer and navigate to the Downloads
directory.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
373
Step 8
BONUS – Discovery Lab 15
Right-click the XML file you just created (subnet-[10.##.1.254-24].xml) and
select Cut. Then, Paste the file into the C:\arya folder.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
374
Task 2: Use ARYA to Create a Python Script
In this task, you will use ARYA to create a Python script, which you will then use to configure a new
subnet object.
Activity Procedure
Complete the following steps:
Step 1
BONUS – Discovery Lab 15
From your Windows Student Desktop, select the Command Prompt, right-click
and select More > Run as administrator.
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
375
Step 2
The Command Prompt window will appear. Use the “cd C:\arya” command to
change to the arya directory.
Step 3
Note the content of this directory.
Step 4
Delete the file student.py if it is present from a prior student.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
376
Step 5
You will now use ARYA to create a Python script based on the XML file that you
downloaded from the APIC GUI. Enter the following command into the Command
Prompt (replace “##” with your assigned 2-digit Pod Number and replace “R” with
your ACI Rack Number).
python arya.py -f C:\arya\subnet-[10.##.1.254_24].xml -i 192.168.R0.1 -u admin -p
1234QWer > C:\arya\student.py
Note
You may want to copy and paste the command to a text editor, modify the command, and then
copy and paste the edited command into the Command Prompt window.
Step 6
If the syntax of the command is correct, all that will happen is that you will see
the command prompt return after the ARYA utility finishes running.
C:\arya>python arya.py -f C:\arya\subnet-[10.##.1.254_24].xml -i 192.168.R0.1 -u admin -p
1234QWer > C:\arya\student.py
C:\arya>
Note
The right angle bracket (>) between the password and “student.py” is used to pipe the Python file
that is generated by ARYA. If you make a mistake on the command, it will still create a file that is
called student.py with zero bytes. Delete that file before troubleshooting your CLI input.
Step 7
Return to Windows Explorer. Verify you see a new file named student.py in the
C:\arya folder.
Step 8
Right-click the student.py file, and then select Edit with Notepad++ from the
context menu.
Step 9
The Notepad++ application will start and open the student.py file for editing.
Study the contents of this Python script.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
377
Step 10
BONUS – Discovery Lab 15
In the Menu bar select Search > Replace….
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
378
Step 11
The Replace window will appear. The entries you see may be cached from a
prior student. Fully replace “10.##.1.254” with “10.##.9.254” (replace “##” with
your assigned 2-digit Pod Number).
Step 12
Click the Replace All button, and then click the Close button.
Step 13
Save the file by selecting File > Save from the Menu bar. Keep Notepad++
open.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
379
Task 3: Configure the APIC Using the Modified
Python Script
In this task, you will create a new Subnet within your Tenant using the Python script that you created in
the previous task.
Activity Procedure
Complete the following steps:
Step 1
Return to the Command Prompt that you started as an administrator and execute
the modified student.py script by entering the python student.py command.
C:\arya>python student.py
Traceback (most recent call last):
File "student.py", line 9, in <module>
'need to be changed')
RuntimeError: Please review the auto generated code before executing the output. Some
placeholders will need to be changed
Note
The execution of the script will fail and the RuntimeError displayed at the end of the output will
indicate the reason.
Step 2
Return to the Notepad++ application.
Step 3
There are three lines of code that prevent the script from running. These lines are
intentionally inserted by ARYA to prevent accidental execution of the script.
These three lines are near the top of the script and start with “raise
RuntimeError”. Find these lines and add a # in front of them to comment them
out.
Step 4
Save the file by selecting File > Save from the Menu bar.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
380
Step 5
Return to the Command Prompt and execute the modified student.py script by
entering the python student.py command.
C:\arya>python student.py
C:\Python27\lib\site-packages\requests-2.7.0py2.7.egg\requests\packages\urllib3\connectionpool.py:768: InsecureRequestWarning: Unverified
HTTPS request is being made. Adding certificate verification is strongly advised. See:
https://urllib3.readthedocs.org/en/latest/security.html
InsecureRequestWarning)
Traceback (most recent call last):
File "student.py", line 28, in <module>
fvSubnet = cobra.model.fv.Subnet(fvBD, name='', descr='', ctrl='', ip='10.##.9.254/24',
preferred='no', virtual='no')
File "c:\python27\lib\site-packages\acimodel-1.1_4f-py2.7.egg\cobra\model\fv.py", line 59019,
in
init
Mo. init (self, parentMoOrDn, markDirty, *namingVals, **creationProps)
File "c:\python27\lib\site-packages\acicobra-1.1_4f-py2.7.egg\cobra\mit\mo.py",
line 15, in __init
BaseMo. init (self, parentMoOrDn, markDirty, *namingVals, **creationProps)
File "c:\python27\lib\site-packages\acicobra-1.1_4fpy2.7.egg\cobra\internal\base\moimpl.py", line 226, in
init
propMeta = props[name]
File "c:\python27\lib\site-packages\acicobra-1.1_4f-py2.7.egg\cobra\mit\meta.py", line 152,
in
getitem
return self._props[propName]
KeyError: 'virtual'
Note
Once again, the execution of the script will fail. In this case the type of error is a KeyError, which
means that there is one or more keys within a command within the script that the Python interpreter
does not understand. The KeyError indicates which key is causing the error, and the output
indicates which line within the script contains this key. In this example, the “virtual” key is contained
around line 28 or 30. You may see the error in a slightly different line, like line 30. Look closely.
Note
The primary cause of a KeyError is a mismatch between the version of the APIC software that is
currently in use (in this case version 5) and the version of the ACI modules that are being used by
Python (in this case version 1.2). If the version of the Python ACI modules is lower than the version
of the APIC software (which is the case here) there will be new features and attributes that the
older Python modules cannot comprehend. The instructions to install and manage the Cisco APIC
Python SDK (Cobra) can be found at cisco.com.
Step 6
Return to the Notepad++ application.
Step 7
Locate the line (in this example line 28) that contains the “virtual” key.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
381
Step 8
Delete all of the following text from the line but delete nothing else:
,
,
,
,
virtual=’no’
userdom=’:all:’
nameAlias=’’,
annotation=’’
Step 9
Save the file by selecting File > Save from the Menu bar.
Step 10
Return to the Command Prompt and execute the modified student.py script by
entering the python student.py command.
C:\arya>python student.py
C:\Python27\lib\site-packages\requests-2.7.0py2.7.egg\requests\packages\urllib3\connectionpool.py:768: InsecureRequestWarning: Unverified
HTTPS request is being made. Adding certificate verification is strongly advised. See:
https://urllib3.readthedocs.org/en/latest/security.html
InsecureRequestWarning)
<?xml version="1.0" encoding="UTF-8"?>
<fvBD status='created,modified' name='POD11-BD'><fvSubnet name='' descr='' ctrl=''
ip='10.11.9.254/24' preferred='no' status='created,modified'></fvSubnet></fvBD>
C:\Python27\lib\site-packages\requests-2.7.0py2.7.egg\requests\packages\urllib3\connectionpool.py:768: InsecureRequestWarning: Unverified
HTTPS request is being made. Adding certificate verification is strongly advised. See:
https://urllib3.readthedocs.org/en/latest/security.html
InsecureRequestWarning)
Note
The script should execute properly. If you see an error go back and review the contents of the
student.py script.
Note
The InsecureRequestWarning that keeps appearing is due to the fact HTTP (instead of HTTPS,
which is secure) is being used to deliver the command to the APIC. This is acceptable in this lab
environment. In a production environment, you should configure your Python interpreter to use
secure communications with the APICs.
Step 11
Return to the APIC GUI running in your Chrome browser.
Step 12
In the Menu bar, click Tenants.
Step 13
In the Submenu bar, click POD## (replace “##” with your assigned 2-digit Pod
Number).
Step 14
In the Navigation pane, expand Tenant POD## > Networking > Bridge
Domains > POD##-BD > Subnets.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
382
Step 15
You should see a new Subnet named 10.##.9.254/24 added to your Tenant.
This new Subnet was created by the Python script you just executed.
Note
This was a simple example of how to use Python in conjunction with ARYA to create a new object
that is similar to an existing object. Larger and more complex objects can be created as well using
the same process.
Caution
Always be extremely careful using Python to make changes to the configuration of the APIC.
Python will allow you to overwrite existing objects; it will not present an “are you sure you want to
do this?” prompt. You should always test your scripts in a lab environment (if possible) before using
them in a production environment.
BONUS – Discovery Lab 15
| © 2023 Cisco Systems, Inc.
DCACI Lab Guide
383
Download