SlideShare una empresa de Scribd logo
1 de 122
Descargar para leer sin conexión
Integration and Interoperation of existing Nexus
networks into an ACI Architecture
Mike Herbert – Principal Engineer INSBU
House Keeping Notes
• Thank you for attending Cisco Connect Toronto 2015, here are a few
housekeeping notes to ensure we all enjoy the session today.
•  Please ensure your cellphones / Laptops are set on silent to ensure
no one is disturbed during the session
•  A power bar is available under each desk in case you need to charge
your laptop
§  Cisco dCloud is a self-service platform that can be accessed via a browser, a high-speed
Internet connection, and a cisco.com account
§  Customers will have direct access to a subset of dCloud demos and labs
§  Restricted content must be brokered by an authorized user (Cisco or Partner) and then shared
with the customers (cisco.com user).
§  Go to dcloud.cisco.com, select the location closest to you, and log in with your cisco.com
credentials
§  Review the getting started videos and try Cisco dCloud today: https://dcloud-cms.cisco.com/help
dCloud
Customers now get full dCloud experience!
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
Application Oriented Policy = Operational Simplicity
Introducing: Application Centric Infrastructure (ACI)
Apps + Infrastructure
Physical + Virtual + ContainersOpen + Secure
On-Premises + Cloud
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Control & Audit Connectivity
(Security – Firewall, ACL, …)
IP Address, VLAN, VRF
Enable Connectivity
(The Network)
Application Requirements
IP Addressing
Application Requirements
Application Specific Connectivity
Dynamic provisioning of
connectivity explicitly defined for
the application
Application RequirementsApplication Requirements
Redirect and Load Balance
Connectivity
IP Address, VLAN, VRF
ACI directly maps the application
connectivity requirements onto the
network and services fabric
Why Networks are Complex
Overloaded Network Constructs
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Why Network Provisioning is Slow
Application Language Barriers
Developers
Application
Tiers
Provider /
Consumer
Relationships
Infrastructure Teams
VLANs
Subnets
Protocols
Ports
Developer and infrastructure teams must translate between disparate languages.
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
ADC
APP DBF/W
ADC
WEB
HYPERVISORHYPERVISOR HYPERVISOR
CONNECTIVITY
POLICY
SECURITY
POLICIES
QOS
STORAGE
AND
COMPUTE
APPLICATION
L4..7
SERVICES
SLA
QoS
Security
Load
Balancing
APP PROFILE
Centralized Policy and Distributed Enforcement
7
Two Big Questions
8
“Is ACI a Closed System?”
“Do I need to replace all of my existing
infrastructure to begin leveraging ACI?”
ABSOLUTELY NOT !!!
Let’s see WHY and HOW …
Extend ACI to local
hypervisors
vSwitch	
  
Things we would like to understand how to do
Extend ACI to
WAN/DCI
Interconnect to existing
DC Networks
Let me just run
my network (but
fix my Flooding,
Mobility,
Configuration,
Troubleshooting
challenges)
AVS	
  
AVS	
  
Extend ACI to to existing Nexus
installations via a full ACI VXLAN
Switching Enabled Hypervisor ‘and’
remote ACI Physical Leaf
vSwitch
ACI Policy Based Forwarding via an
Integrated Overlay
ACI Fabric – An IP network with an Integrated Overlay
Virtual and Physical
•  Cisco’s ACI solution leverages an integrated VXLAN based overlay
•  IP Network for Transport
•  VXLAN based tunnel end points (VTEP)
•  VTEP discovery via infrastructure routing
•  Directory (Mapping) service for EID (host MAC and IP address) to VTEP lookup
PayloadIPVXLANVTEP
APIC
VTEP VTEP VTEP VTEP VTEP VTEP
vSwitchvSwitch VTEPVTEP
IP Transport
VXLAN Enabled
Hypervisor
VTEP	
  
VXLAN Enabled
Hypervisor
VTEP	
  
•  Interworking with ACI
•  VXLAN enabled Hypervisor (FCS)
•  VXLAN Hardware VTEP (Nexus 9000 standalone, Nexus 3100/7000-F3, ASR9K, … )
•  MP-BGP EVPN based control plane for external VTEP connectivity (post FCS)
Service Interconnect to
ASR9K/N7K WAN/DCI
Multi-Fabric Topologies
VXLAN Based Fabric
ACI Fabric – Integrated Overlay
Connecting and Extending the Overlay
VTEP	
  
VTEP	
  
ACI Fabric – Integrated Overlay
Decoupled Identity, Location & Policy
Payload
Eth
IP
VXLAN
Outer
IP
PayloadIPNVGRE
Outer
IP
PayloadIP802.1Q
Payload
Eth
IP
Payload
Eth
MAC
ACI VXLAN (VXLAN) header identifies the
attributes of the application end point within
the fabric
Policy attributes are carried by every packet
External Identifiers are localized to
specific iLeaf or iLeaf ports (unless
external requirements for
consistency, e.g. downstream
networks)
VTEP
•  All Tenant traffic within the Fabric is
tagged with an ACI VXLAN (VXLAN)
header which identifies the policy
attributes of the application end point
within the fabric
•  Policy Group (source group)
•  Forwarding Group (Tenant, VRF,
Bridge Domain)
•  Load Balancing Policy
•  Telemetry Policy
•  At the ingress port the Fabric translates
an external identifier which can be used
to distinguish different application end
points via the internal VXLAN tagging
format
Payload
MAC
IP
VNIDFlagsVTEP
SRC
Group
AVS	
  
VTEP
ACI leverages VXLAN
RFC Draft – Next IETF Meeting
•  Forward based on destination IP Address for intra and inter subnet (Default Mode)
•  Bridge semantics are preserved for intra subnet traffic (no TTL decrement, no MAC
header rewrite, etc.)
•  Non-IP packets will be forwarded using MAC address. Fabric will learn MAC’s for non-IP
packets, IP address learning for all other packets
•  Route if MAC is router-mac, otherwise bridge (standard L2/L3 behaviour)
IP Forwarding:
Forwarded using DIPi
address, HW learning of IP
address
10.1.3.11 10.6.3.210.1.3.35 10.6.3.17
MAC Forwarding:
Forwarded using DMAC
address, HW learning of
MAC address
Overlay Elements – Host Forwarding
10.1.1.10 10.1.3.11 10.6.3.2
Distributed Default Gateway
•  ACI Fabric supports full layer 2 and layer 3 forwarding semantics, no changes required to applications or end point IP
stacks
•  ACI Fabric provides optimal forwarding for layer 2 and layer 3
•  Fabric provides a pervasive SVI which allows for a distributed default gateway
•  Layer 2 and layer 3 traffic is directly forwarded to destination end point
•  IP ARP/GARP packets are forwarded directly to target end point address contained within ARP/GARP header
(elimination of flooding)
10.1.3.35 10.1.1.10
10.1.3.11
10.6.3.2
Directed ARP Forwarding
10.1.3.35
Location Independent Forwarding
Layer 2 and Layer 3
10.1.3.11 10.6.3.2
Pervasive SVI
•  Default Gateway can reside internal or external to the Fabric
•  Pervasive SVI provides a distributed default gateway (anycast gateway)
•  Subnet default gateway addresses are programmed in all Leaves with end points present for the specific
Tenant IP subnet
•  Layer 2 and layer 3 traffic is directly forwarded to destination end point
•  External Gateway is used when Fabric is configured to provide layer 2 transport only for a specific Tenant
10.1.3.35 10.1.1.10
10.1.3.11
10.6.3.2
External Default Gateway
10.1.3.35
Where is my default Gateway?
10.6.3.2
10.6.3.110.1.3.1
Overlay Elements - Mapping/Directory Proxy
Inline Hardware Mapping DB - 1,000,000+ hosts
10.1.3.11 fe80::462a:60ff:fef7:8e5e10.1.3.35 fe80::62c5:47ff:fe0a:5b1a
•  The Forwarding Table on the Leaf Switch is divided between local (directly attached) and
global entries
•  The Leaf global table is a cached portion of the full global table
•  If an endpoint is not found in the local cache the packet is forwarded to the ‘default’
forwarding table in the spine switches (1,000,000+ entries in the spine forwarding table)
Local Station Table
contains addresses of
‘all’ hosts attached
directly to the iLeaf
10.1.3.11
10.1.3.35
Port 9
Leaf 3
Proxy A*
Global Station Table
contains a local cache
of the fabric endpoints
10.1.3.35 Leaf 3
10.1.3.11 Leaf 1
Leaf 4
Leaf 6
fe80::8e5e
fe80::5b1a
Proxy Station Table contains
addresses of ‘all’ hosts attached
to the fabric
Proxy Proxy Proxy Proxy
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Endpoint Repository (Proxy DataBase)
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Proxy Database (Oracle)
Spine-1# show coop internal info global Spine-1# show coop internal event-history oracle-adj <IP>
•  You still have full access to all forwarding, adjacency, ..., information via
CLI and debug commands when you want them
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
ACI Endpoint Tracker Application
•  Tracks all attachment, detachment,
movement of Endpoints in ACI fabric
•  Stores activity in open source MySQL
Database, allowing query capabilities
•  Provides foundation for visualization and
query tools
•  Some questions that could be solved:
–  What are all the Endpoints on network?
–  Where is a specific Endpoint?
–  What was connected last Thursday
between 3:30am and 4:00am?
–  What is the history of a given Endpoint?
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
GitHub – a resource for ACI scripts and tools
22
•  ACI Toolkit:
http://datacenter.github.io/acitoolkit/
https://github.com/datacenter/acitoolkit
•  ACI Diagram
https://github.com/cgascoig/aci-diagram
•  ACI Endpoint Tracker
http://datacenter.github.io/acitoolkit/
docsbuild/html/endpointtracker.html
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
ACI
A Policy Based IP Network
PayloadIPVXLANVTEP
AVS	
  
VTEP
APIC - Policy Controller &
Distributed Management
Information Tree (DMIT)
Physical and Virtual L4-7
Service Nodes
Physical and Virtual VTEP’s
(Policy & Forwarding Edge
Nodes)
Proxy (Directory)
Services
Physical and Virtual Endpoints
(Servers) & VMM (Hypervisor vSwitch)
VTEP
IP Network & Integrated
VXLAN
WAN/DCI
Services
VTEP
VTEP
AVS	
  
VTEP
Extending the Network
Transitions will and need to occur independently
vPC
vPC
vPC
Policy Zone ‘A’ Policy Zone ‘B’
Policy Zone ‘C’
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
App
Element
Application Container
Operations
Evolution
Policy
Evolution
Component
Evolution
§  Interconnect existing network POD’s with new ACI POD’s via standard
Layer 2 extensions (VLAN or VXLAN) or via standard Layer 3 routing
(OSPF, BGP)
§  Leverage an ACI policy/services block attached to any existing Nexus or
Catalyst network to provide L4-L7 services and policy automation for
existing virtual and physical servers
§  Extend the ACI forwarding and distributed policy capabilities to virtual
and physical leaf switches connected to an existing Nexus/Catalyst IP
based network
Extending ACI in to Current Data Center’s
Three Stages
Backbone
vPC
vPC
vPC
•  Layer 2 and Layer 3 interoperation between ACI Fabric and Existing Data Center builds
•  Layer 3 interconnect via standard routing interfaces,
OSPF, Static, iBGP (FCS)
MP-BGP, EIGRP, ISIS (Post FCS_
•  Layer 2 interconnect via standard STP or via VXLAN overlays
vSwitch	
   Hyper-­‐V	
  AVS	
  
Extending ACI in to Current Data Center’s
Interconnect Existing to New ACI POD
Extend Layer 2 VLAN’s
where required
Interconnect at
Layer 3
Connecting/Extending ACI via Layer 2
Layer 2
Layer 2
Layer 2
Extend L2 domain beyond ACI fabric - 2 options
1.  Manually assign a port to a VLAN which in turn mapped to an EPG. This extend EPG beyond ACI fabric
(EPG == VLAN)
2.  Create a L2 connection to outside network. Extend bridge domain beyond ACI fabric. Allow contract
between EPG inside ACI and EPG outside of ACI
Lets Look at
the Links
© 2014 Cisco and/or its affiliates. All rights reserved.BRKACI-2001 Cisco Public
VXLAN
VNID = 5789
VXLAN
VNID = 11348
NVGRE
VSID = 7456
Any to Any
802.1Q
VLAN 50
Normalized
Encapsulation
Localized
Encapsulation
IP Fabric Using
VXLAN Tagging
PayloadIPVXLANVTEP
•  All traffic within the ACI Fabric is encapsulated with an extended VXLAN header
•  External VLAN, VXLAN, NVGRE tags are mapped at ingress to an internal VXLAN tag
•  Forwarding is not limited to, nor constrained within, the encapsulation type or
encapsulation ‘overlay’ network
•  External identifies are localized to the Leaf or Leaf port, allowing re-use and/or translation
if required
Payload
Payload
Payload
Payload
Payload
Eth
IP
VXLAN
Outer
IP
IPNVGRE
Outer
IP
IP802.1Q
Eth
IP
Eth
MAC
Normalization of Ingress
Encapsulation
ACI Fabric – Integrated Overlay
Data Path - Encapsulation Normalization
29
Extend the EPG
Option 1
VLAN 30
Layer 2
100.1.1.3 100.1.1.5
EPG
100.1.1.7100.1.1.99
•  VLAN’s are localized to the leaf nodes
•  The same subnet, bridge domain, EPG can be configured as a ‘different’ VLAN on each leaf
switch
•  In 1HCY15 VLAN’s will be port local
100.1.1.3
BD
Existing
App
VLAN 20
Extend the EPG
Option 1
Layer 2
VLAN 10
100.1.1.3 100.1.1.5
EPG
100.1.1.7100.1.1.99
•  Single Policy Group (one extended EPG)
•  Leverage vPC for interconnect (diagram shows a single port-channel which is an option)
•  BPDU should be enabled on the interconnect ports on the ‘vPC’ domain
100.1.1.3
VLAN 30
VLAN 20
BD
Existing
App
VLAN 10 VLAN 10 VLAN 10
Assign Port to an EPG
•  With VMM integration, port is assigned to EPG by
APIC dynamically.
•  In all other cases, such as connecting to switch,
router, bare metal, port need to be assigned to
EPG manually or use API
•  Use “Static Binding” under EPG to assign
port to EPG
•  The example assigns traffic received on port
eth1/32 with vlan tagging 100 to EPG VLAN
100
Assign Port to EPG
VLAN Tagging Mode
•  Tagged. Trunk mode
•  Untagged. Access mode. Port can only be in one
EPG
•  802.1P Tag. Native VLAN.
•  No Tagged and Untagged(for different port) config
for same EPG with current software
•  Assign port eth1/1 with VLAN 100 tagged mode
and port eth1/2 with VLAN 100 untagged mode to
EPG WEB is not supported
•  Use 802.1P Tag. Port eth1/1 vlan 100 tagged,
eth1/2 vlan 100 902.1P Tag
•  VLAN to EPG mapping is switch wide significant
C
Extend the Bridge Domain
Option 2
Layer 2
100.1.1.3 100.1.1.5100.1.1.7100.1.1.99
•  External EPG (policy between the L2 outside EPG and internal EPG)
•  Leverage vPC for interconnect (diagram shows a single port-channel which is an option)
•  BPDU should be enabled on the interconnect ports on the ‘vPC’ domain
•  L2 outside forces the same external VLAN << fewer operational errors
100.1.1.3
BD
Existing
App
EPG
Inside
EPG
Outside
VLAN 30
VLAN 10 VLAN 10 VLAN 10
VLAN 10
VLAN 20
L2 Outside Connection Configuration Example
•  Step 1. Create L2 Outside
connection.
•  Associate with BD.
•  Specify VLAN ID to connect to
outside L2 network
•  External Bridge Domain is a way
to specify the VLAN pool for
outside connection.
•  It is NOT a Bridge Domain.
L2 Outside Connection Configuration Example
•  Step 2. Specify leaf node
and interface providing
L2 outside connection
L2 Outside Connection Configuration Example
•  Step 3. Create external EPG
under L2 outside connection
•  Step 4. Create contract
between external EPG and
internal EPG
ACI Interaction with STP
BPDU
STP Root
Switch
Same L2 Outside
EPG
(e.g. VLAN 10)
•  No STP running within ACI fabric
•  BPDU frames are flooded between
ports configured to be members of the
same external L2 Outside (EPG)
•  No Explicit Configuration required
•  Hardware forwarding, no interaction
with CPU on leaf or spine switches
for standard BPDU frames
•  Protects CPU against any L2 flood
that is occurring externally
•  External switches break any potential
loop upon receiving the flooded BPDU
frame fabric
•  BPDU filter and BPDU guard can be
enabled with interface policy
APIC
BPDU
BPDU
BPDU
ACI Fabric Loopback Protection
STP Loop
Detection
LLDP Loop
Detection
•  Multiple Protection Mechanisms against
external loops
•  LLDP detects direct loopback cables
between any two switches in the same
fabric
•  Mis-Cabling Protocol (MCP) is a new link
level loopback packet that detects an
external L2 forwarding loop
•  MCP frame sent on all VLAN’s on all Ports
•  If any switch detects MCP packet arriving on
a port that originated from the same fabric the
port is err-disabled
•  External devices can leverage STP/
BPDU
•  MAC/IP move detection and learning
throttling and err-disable
APIC
BPDULLDP
MCP Loop
Detection
(supported with
11.1 release)
MCP
C
Managing Flooding Within the BD
Layer 2
100.1.1.3 100.1.1.5100.1.1.7100.1.1.99
•  In a classical network traffic is flooded with the Bridge Domain (within the VLAN)
•  You have more control in an ACI Fabric but need to understand what behaviour you want
100.1.1.3
BD
Multi
EPG
EPG
App 1
EPG
Outside
VLAN 30
VLAN 10 VLAN 10 VLAN 10
VLAN 10
EPG
App 2
VLAN 20
Managing Flooding Within the Fabric
ARP Unicast
ARP Flooding Disabled
(Default)
•  Disable ARP Flooding – ARP/GARP is
forwarded as a unicast packet within the
fabric based on the host forwarding DB
•  On egress the ARP/GARP is forwarded as a
flooded frame (supports hosts reachable via
downstream L2 switches)
Firewall Configured as
the Default Gateway
ARP
Managing Flooding Within the Fabric
ARP Flooding
ARP Flooding Enabled
•  Enabling ARP Flooding – ARP/GARP is
flooded within the BD
•  Commonly used when the default GW is
external to the Fabric
Firewall Configured as
the Default Gateway
ARP
Managing Flooding Within the Fabric
Unknown Unicast Proxy Lookup
Unknown Unicast
Lookup via Proxy
•  Hosts (MAC, v4, v6) that are not known by a
specific ingress leaf switch are forwarded to
one of the proxies for lookup and inline
rewrite of VTEP address
•  If the host is not known by any leaf in the
fabric it will be dropped at the proxy (allows
honeypot for scanning attacks)
Unknown
Unicast
Proxy
HW Proxy
Lookup
Managing Flooding Within the Fabric
Unknown Unicast Flooding
•  Hosts (MAC, v4, v6) that are not known by a
specific ingress leaf switch are flooded to all
ports within the bridge domain
•  Silent hosts can be installed as static entries
in the proxy (flooding not required for silent
hosts)
Unknown Unicast
Flooded
Unknown
Unicast
Unknown
Unicast
Flooded
Managing Flooding Within the Fabric
Unknown Multicast – Mode 1 (Flood)
•  Unknown Multicast traffic is flooded locally to
all ports in the BD on the same leaf the
source server is attached to
•  Unknown Multicast traffic is flooded to all
ports in the BD on leaf nodes with a ‘multicast
router port’
Unknown Multicast
Flooded
Unknown
Multicast
Managing Flooding Within the Fabric
Unknown Multicast – Mode 2 (OMF ‘or’ Optimized Flood)
•  Unknown Multicast traffic is only flooded to
‘multicast router ports’ in this mode
Unknown Multicast
Optimized Flooding
Unknown
Multicast
Managing Flooding Within the Fabric
Scoping Broadcasts to a micro segment
100.1.1.3 100.1.1.5100.1.1.7100.1.1.99 100.1.1.3
EPG
B
EPG
A
EPG
C
100.1.1.72
Traffic Type 11.0(x) Behaviour 11.1(x) Behaviour
ARP Flood or Unicast Flood or Unicast
Unknown Unicast Flood or Leverage Proxy Lookup Flood or Leverage Proxy Lookup
Unknown IP Multicast Flood or OMF Flood or OMF
L2 MCAST, BCAST, Link Local Flood Flood within the BD, Flood within the EPG,
Disable Flooding within the BD/EPG
Managing Flooding Within the Fabric
Multi Destination Flooding (Supported with 11.1(x) – Q2CY15)
•  Link Level Traffic is either
•  Contained within the EPG
•  Contained within the Bridge Domain
•  Dropped
•  Security Segmentation for Link Level Traffic
Link Level
BCAST
Manage
Flooding within
the BD
100.1.1.3
100.1.1.5
100.1.1.7100.1.1.99
100.1.1.72
100.1.1.52
EPG ‘A’
100.1.1.4
EPG ‘A’EPG ‘B’ EPG ‘B’
EPG ‘B’
Managing Flooding Within the Fabric
Flooding scoped to the EPG
100.1.1.3 100.1.1.5100.1.1.7100.1.1.99 100.1.1.3
EPG
B
EPG
A
EPG
C
100.1.1.72
•  Link Local, BCAST & L2 Multicast traffic can be managed on a micro-segment basis
•  As an example:
•  EPG A, EPG B & EPG C - Link Level traffic is flooded ‘only’ to the endpoints within the
EPG
Managing Flooding Within the Fabric
Disabling Flooding within the BD
100.1.1.3 100.1.1.5100.1.1.7100.1.1.99 100.1.1.3
EPG
B
EPG
A
EPG
C
100.1.1.72
•  When desired each Bridge Domain can be configure to permit or disable
flooding of Link Local, BCAST and L2 MCAST traffic
An Example of
Interconnecting and Migrating
Logical Design
HSRP
Default GW
VLAN / Subnet
P P VM VM VM
P
VM
vPC
N7k
N5k
L3 HSRP
P
VM
vPC
N7k
N5k
L3 HSRP
N2k
P
VM
N7k
FEX
L3 HSRP
P
VM
Cat6500
L3 HSRP
Many Different Physical Designs
Connect Fabric to existing Network
•  Functionally we are expanding the VLAN’s into ACI.
Existing Design
HSRP
Default GW
VLAN 10 / Subnet 10
P P
VM VM VM
ACI Fabric
EPG-10 = VLAN 10
Configure ACI Bridge Domain settings
•  Temporary Bridge Domain
specific settings while we are
using the HSRP gateways in
the existing network.
•  Select Forwarding to be
“Custom” which allow
•  Enable Flooding of L2
unknown unicast
•  Enble ARP flooding
•  Disable Unicast routing
Tenant “Red”
Context “Red”
Bridge Domain “10”
Subnet 10 EPG-10
Migrate Workloads
Existing Design
HSRP
Default GW
VLAN 10 / Subnet A
P P
VM VM VM
APIC
EPG “10”
P P
VM VM VM
APIC point of view, the policy model
VM’s will need to be connected to new Port
Group under APIC control (AVS or DVS).
Complete the Migration
Change BD settings back to normal for ACI mode
•  Change BD settings back to default.
–  No Flooding
–  Unicast Routing enabled.
Migrating Default Gateway to the ACI Fabric
Change GW MAC address. By default, All
fabric and all BD share same GW MAC
Enable Routing and ARP flooding
Extension and Connecting
It’s a Network with any VLAN Anywhere
Anycast Default Gateway
10.10.10.8 10.20.20.32
10.10.10.9
10.20.20.33
10.20.20.3110.10.10.6
Any IP - Anywhere
Application
Client
Subnet
10.20.20.0/24
Subnet
10.10.10.0/24
Subnet
10.30.30.0/24
Subnet
10.40.40.0/24
Subnet
10.50.50.0/24
External Networks
(Outside)
Redirect to Pre-
configured FW
Redirect to Pre-
configured FW
Critical Users
(Outside)
Middle Ware
Servers
Web
Servers
Oracle
DB Contract
Redirect to dynamically
configured FW
NFS ContractRedirect to
dynamically
configured FW
Default Users
(Outside)
NFS
Servers
Subnet
10.20.20.0/24
Subnet
10.10.10.0/24
Subnet
10.30.30.0/24
Permit TCP any
any
Redirect to Pre-
configured FW
Policy can be added gradually starting with what you have
today
Simple Policy During Migration - Any-to-Any
Configuration
Contracts
Provided
Filter Contracts
Provided
Contracts
consumed
Filter
EPG “VLAN 10” VLAN10 Default ALL ALL Default
EPG “VLAN 20” VLAN20 Default ALL ALL
EPG “VLAN 30” VLAN30 Default ALL ALL
ALLVLAN 10
VLAN 20
VLAN 30
I want to have a very open configuration with VLAN10
talking to anything (1)
Create “Contract”
ALL if it doesn’t exist
yet
Use filter “common/
default”
I want to have a very open configuration with VLAN10
talking to anything (2)
EPG VLAN 10
provides and
consumes “ALL”
Extension and Connecting
Dynamic Distributed ACL’s
Permit ACL is applied on
all ports between VLAN
10, 20 & 30
10.10.10.8 10.20.20.32
10.10.10.9
10.20.20.33
10.20.20.3110.10.10.6
All Subnets are allowed to communicate with this policy applied
Later if I want to put an ACL between VLAN 10 and 20
ALL
VLAN 10
VLAN 20
VLAN 30
Contracts
Provided
Filter Contracts
Provided
Contracts
consumed
Filter
EPG “VLAN 10” VLAN10 Default VLAN20 Port 80
EPG “VLAN 20” VLAN20 Default ALL ALL Default
EPG “VLAN 30” VLAN30 Default ALL ALL
Extension and Connecting
Dynamic ACL’s
Dynamic ACL is applied
between all endpoints
only allowing port 80
10.10.10.8 10.20.20.32
10.10.10.9
10.20.20.33
10.20.20.3110.10.10.6
Traffic is controlled between VLAN 10 & 20 to HTTP (port 80)
Integrating and Extending L4-7 Services
© 2014 Cisco and/or its affiliates. All rights reserved.BRKACI-2001 Cisco Public
Automate Service Insertion Through APIC
APP DBWEBEXTERNAL
APIC Policy Model
Endpoint Group (EPG): Collection of similar End Points identifying a particular
Application Tier. Endpoint could represent VMs, VNICs , IP, DNS name etc
Application Profile: Collection of Endpoint Groups and the policies that define way
Endpoint group communicate with each other
Application profile
PolicyPolicyPolicy
© 2014 Cisco and/or its affiliates. All rights reserved.BRKACI-2001 Cisco Public
ACI Service Insertion via Policy
•  Automated and scalable L4-
L7 service insertion
•  Packet match on a
redirection rule sends the
packet into a services
graph.
•  Service Graph can be one
or more service nodes pre-
defined in a series.
•  Service graph simplifies and
scales service operations
Begin End
Stage
1
FW_ADC1
EPG
2
EPG
1
Application
Admin
Service
Admin
ASA
5585
Netscaler
VPX
Chain
“FW_ADC 1”
Policy-based
Redirection
Stage
2
© 2014 Cisco and/or its affiliates. All rights reserved.BRKACI-2001 Cisco Public
Service Automation Through Device Package
Open Device
Package
Policy
Engine APIC provides extendable policy model through Device Package
Configuration
Model
Device Interface: REST/CLI
APIC Script Interface
Call Back Scripts
Event Engine
APIC– Policy Manager
Configuration
Model (XML File)
Call Back Script
Provider Administrator can upload a Device Package
Device Package contains XML fine defining Device Configuration
Device scripts translates APIC API callouts to device specific callouts
APIC
Backbone
Extending ACI in to Current Data Center’s
Standard Architecture with Services
vSwitch	
  
Services Chassis
vSwitch	
   vSwitch	
  
Services Chassis
Extension and Connecting
Services Switch
Dynamic ACL is applied
between all endpoints
only allowing port 80
10.10.10.8 10.20.20.32
10.10.10.9
10.20.20.33
10.20.20.3110.10.10.6
•  Start with the picture we now understand
Extension and Connecting
Services Switch
10.10.10.8 10.20.20.32
•  Lets simplify things
Extension and Connecting
Services Switch
10.10.10.8 10.20.20.32
•  Start with just a few switches
Extension and Connecting
Services Switch
10.10.10.8 10.20.20.32
•  Let’s connect them the way we should, redundantly (the previous slides showed a simple interconnect
just as an example
Extension and Connecting
Services Switch
10.10.10.8 10.20.20.32
•  Let’s use a small spine switch
•  We are starting with a very small fabric
Extension and Connecting
Services Switch
•  Same picture as seen if the fabric was a services switch
Extension and Connecting
Services Switch
•  Attach the L4-7 Services
•  They can be physical and/or virtual
Extension and Connecting
Services Switch
vSwitch	
   vSwitch	
   vSwitch	
  
•  Add in the Core/WAN and the Servers and vSwitches
Extension and Connecting
Services Switch
vSwitch	
   vSwitch	
   vSwitch	
  
•  Activate the services, leverage the services chaining and dynamic provisioning
•  Leverage the fabric as the layer 3 gateway for all the other VLAN’s
Extending ACI - Application Virtual Switch
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
L/B
EPG
APP
EPG
DBF/W
EPG
WEB
Application Network Profile
VM VM VM
WEB PORT GROUP APP PORT GROUP DB PORT GROUP
Hypervisor Integration with ACI
APIC
§  ACI Fabric implements policy on
Virtual Networks by mapping
Endpoints to EPGs
§  Endpoints in a Virtualized
environment are represented as the
vNICs
§  VMM applies network configuration
by placement of vNICs into Port
Groups or VM Networks
§  EPGs are exposed to the VMM as a
1:1 mapping to Port Groups or VM
Networks
80
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
VMWare Integration
81
•  Three Different Options
+
Distributed Virtual Switch
(DVS)
vCenter + vShield
Application Virtual Switch
(AVS)
•  Encapsulations: VLAN
•  Installation: Native
•  VM discovery: LLDP
•  Software/Licenses:
vCenter with Enterprise
+ License
•  Encapsulations: VLAN,
VXLAN
•  Installation: Native
•  VM discovery: LLDP
•  Software/Licenses:
vCenter with Enterprise
+ License, vShield
Manager with vShield
License
•  Encapsulations: VLAN,
VXLAN
•  Installation: VIB through
VUM or Console
•  VM discovery: OpFlex
•  Software/Licenses:
vCenter with Enterprise
+ License
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
APIC Admin
VI/Server Admin Instantiate VMs,
Assign to Port Groups
L/B
EPG
APP
EPG DB
F/W
EPG
WEB
Application Network Profile
Create Application Policy
WebWebWeb App
HYPERVISOR HYPERVISOR
VIRTUAL DISTRIBUTED SWITCH
WEB PORT GROUP APP PORT GROUP DB PORT GROUP
vCenter
Server / vShield
8
5
1
9
ACI
Fabric
Automatically Map
EPG To Port Groups
Push Policy
Create VDS2
Cisco APIC and VMware
vCenter Initial
Handshake
6
DB DB
7
Create Port
Groups
ACI Hypervisor Integration – VMware DVS/vShield
82
APIC
3
Attach Hypervisor
to VDS
4
Learn location of ESX
Host through LLDP
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Application Virtual Switch with OpFlex in ACI Fabric
• AVS: First Virtual Leaf to
implement OpFlex
• Network policy communicated
from APIC to AVS through N9k
using OpFlex
• Increased control plane scale
through APIC Cluster and Leaf
Node
• APIC communicates with vCenter
Server for Port Group creation
OpFlex
AVS
vCenter
Hypervisor
Manager
VMVM VM VMVMVM VM VM
OpFlex OpFlex
OpFlex
AVS
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Hypervisor Integration with ACI
84
•  Endpoint Discovery
DVS Host
APIC
VMM
Control
(vCenter API)
Data Path
§  Virtual Endpoints are
discovered for reachability &
policy purposes via 2 methods:
§  Control Plane Learning:
-  Out-of-Band Handshake: vCenter
APIs
-  Inband Handshake: OpFlex-
enabled Host (AVS, Hyper-V,
etc.)
§  Data Path Learning: Distributed
switch learning
§  LLDP used to resolve Virtual
host ID to attached port on leaf
node (non-OpFlex Hosts) OpFlex Host
Control
(OpFlex)
Data Path
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
APIC Admin
VI/Server Admin Instantiate VMs,
Assign to Port Groups
L/B
EPG
APP
EPG
DB
F/W
EPG
WEB
Application Network Profile
Create Application Policy
WebWebWeb App
HYPERVISOR HYPERVISOR
Application Virtual Switch (AVS)
WEB PORT GROUP APP PORT GROUP DB PORT GROUP
vCenter
Server
8
5
1
9
ACI
Fabric
Automatically Map
EPG To Port Groups
Push Policy
Create AVS
VDS
2
Cisco APIC and VMware
vCenter Initial
Handshake
6
DB DB
7
Create Port
Groups
ACI Hypervisor Integration – AVS
85
APIC
3
Attach Hypervisor
to VDS
4
Learn location of ESX
Host through OpFlex
OpFlex Agent OpFlex Agent
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
ACI Hypervisor Integration – Cisco AVS
86
Name of VMM Domain
Type of vSwitch (DVS or AVS)
Associated Attachable Entity Profile (AEP)
VXLAN Pool
vCenter Administrator Credentials
vCenter server information
Switching mode (FEX or Normal)
Multicast Pool
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Extending ACI to Existing Virtual & Physical Networks
VLAN & VXLAN Extension
Layer 2
AVS	
  
Layer 2
AVS	
   AVS	
  
AVS	
   AVS	
  
AVS	
  
•  AVS supports OpFlex to integrate with APIC
•  Supports a Full multi-hop Layer 2 Network between Nexus 9k and AVS: Investment Protection
•  Layer 2 network is required to support OpFlex bootstrapping in this phase
OpFlex
OpFlex
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Extending ACI to Existing Virtual & Physical Networks
VLAN & VXLAN Extension
Layer 2
AVS	
  
Layer 2
AVS	
   AVS	
  
AVS	
   AVS	
  
AVS	
  
•  Supports VLAN and VXLAN for transport (Recommend VXLAN to automate new workload)
•  Existing Network need to have 1 Infrastructure VLAN for VXLAN transport
•  Multicast: Turn on IGMP Snooping
•  Recommend 1 L2 Multicast group per EPG
OpFlex
OpFlex
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
VLAN VXLAN VLAN
ESXi-­‐1
ESXi-­‐2
pepsi-­‐db
N1k-­‐APP
N1k-­‐W
EB
pepsi-­‐app
APIC APICAPIC
Pepsi-­‐W
eb
Shared_EPG-­‐1
N1Kvlan-­‐vSwitch-­‐leaf1
ESXi-­‐4 ESXi-­‐3
Coke-­‐W
ebCoke-­‐App
Spine	
  1 Spine	
  2
Leaf	
  1 Leaf	
  2 Leaf	
  3
ESXi-­‐1
Fabric
(40Gbps)
ACI - Investment protection for INTEGRATION / MIGRATION
Remote VTEP (Virtual) via AVS
Nexus 3K (L2)
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
End-Points end EPG membership
Server
Virtual Machines & Containers
Storage
Client 90
•  Endpoint == Workload unit connected to network directly
or indirectly
•  An endpoint has address (identity), location, attributes
(version, patch level)
•  Can be physical or virtual or container
•  End Point Group (EPG) membership defined by:
•  Ingress physical port (Leaf or FEX)
•  Ingress logical port (VM port group)
•  VLAN ID
•  VXLAN (VNID)
•  IP Prefix/Subnet (so far only applicable to external/border
leaf connectivity)
•  VM-based attributes (11.1 release)
•  IP address (planned for 11.1(MR2) – Sept 2015)
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
Hypervisor Integration with ACI 11.0
EPG Classification via Port Groups
•  VM’s are placed within the Port Group defined for each EPG
•  Traffic is encapsulated with the specific VLAN or VXLAN assigned to that port group
on that port and forwarded upstream to the TOR
VXLAN
VNID = 5789
VXLAN
VNID = 11348
802.1Q
VLAN 50
PayloadIP
GBP
VXLAN
VTEP
VXLAN
Leaf
VTEP
802.1Q
vSwitch
WEB PORT
GROUP
APP PORT
GROUP
vSwitch
WEB PORT
GROUP
APP PORT
GROUP
802.1Q
VLAN 125
PayloadIP
PayloadIP
Port Groups
Created for
Each EPG
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
Hypervisor Integration with ACI
EPG Classification via VM Attributes
•  End Point Groups (EPG’s) can leverage
multiple methods to ‘classify’ an endpoint or
traffic from an endpoint
•  VM Port Groups Provide a simple mechanism
to correlate a VM to a specific policy group
•  VM Attributes can also be used to classify a
VM as a member of an EPG
•  Leverage ACI release 11.1 with AVS (initial
deployment)
•  Support for other Hypervisor switches
VMware vDS, Microsoft vSwitch, OVS
(future)
VM Attribute
Guest OS
VM Name
VM (id)
VNIC (id)
Hypervisor
DVS port-group
DVS
Datacenter
Custom Attribute
MAC Address
IP Address
vCenterVMAttributes
VMTraffic
Attributes
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
Hypervisor Integration with ACI
EPG Classification via VM Attributes
•  There are two categories of Attributes
supported with the 11.1 release
•  VM Attributes (set by server administrator
on creation of the VM)
•  VM Traffic Attributes (VM MAC/IP address
or L4 port being used by the application)
•  Any endpoint placed within a Port Group on the
vSwitch can be micro-classified based on the
specific VM Attributes
•  Dynamic classification or re-classification
•  e.g. Re-classify an endpoint that has been
detected to have a security exposure
(move to quarantine security group)
VM Attribute
Guest OS
VM Name
VM (id)
VNIC (id)
Hypervisor
DVS port-group
DVS
Datacenter
Custom Attribute
MAC Address
IP Address
vCenterVMAttributes
VMTraffic
Attributes
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
AVS with ACI 11.1
EPG Classification via VM Attributes
vSwitch (AVS)
Port Group
EPG == VM
Attribute ‘x’
EPG == VM
Attribute ‘y’
APIC Admin
Create an EPG ==
VM Attribute ‘x’ on
VMM Domain ‘A’
3
4
APIC Distributes VM
Attribute Policies to
Leaf nodes
AVS notifies Leaf of
VM Attach via
OpFlex Channel
6
Leaf Determines
Attribute to EPG
Classification
7
Leaf Pushes EPG
encapsulation
binding to AVS via
OpFlex Channel
8
802.1Q
VLAN 50
AVS forwards traffic
with the correct EPG
label (encapsulation)
9
APIC Retrieves
Hypervisor State
(VM State & VM
Attributes) & Initiate
a Listener Process
for any changes/
updates
2
Administrator
Creates new vDS
(AVS)
1
VI/Server Admin
Boot new VM with
desired VM
Attributes
5
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
ACI Hypervisor Integration – Vmware vCenter View
95
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
VMware vCenter Plugin View
96
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
VMware vCenter Plugin View
97
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public
VMware vCenter Plugin View
98
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
APIC Admin
(Basic Infrastructure)
Azure Pack Tenant
Web WebWebWeb AppApp
3
6
ACI
Fabric
Push Network
Profiles to APIC
Pull Policy on leaf
where EP attaches
Indicate EP Attach to attached leaf
when VM starts
1
2
DB DB
HYPERVISOR HYPERVISOR HYPERVISOR
ACI Azure Pack Integration
APIC
Get VLANs allocated
for each EPG
Create Application
Policy
7
Azure Pack  SPF
SCVMM PluginAPIC Plugin
OpFlex Agent OpFlex Agent OpFlex Agent
Instantiate VMs
5
1
4
Create VM Networks
4
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
ACI OpenStack Integration
2
ACI Admin
(manages physical
network, monitors tenant
state)
L/B
EPG
APP
EPG DB
F/W
L/B
EPG
WEB
Application Network Profile
Create Application Policy
3
5
ACI
Fabric
Push Policy
OpenStack Tenant
(Performs step 1,4) Instantiate VMs
Web WebWebWeb AppApp4
Create Application Network
Profile
1
DB DB
HYPERVISOR HYPERVISOR HYPERVISOR
NOVANEUTRON
Automatically Push
Network Profiles to
APIC
L/B
EPG
APP
EPG DB
F/W
L/B
EPG
WEB
Application Network Profile
APIC
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Hypervisors vs. Linux Containers
Hardware
Operating System
Hypervisor
Virtual Machine
Operating
System
Bins / libs
App App
Virtual Machine
Operating
System
Bins / libs
App App
Hardware
Hypervisor
Virtual Machine
Operating
System
Bins / libs
App App
Virtual Machine
Operating
System
Bins / libs
App App
Hardware
Operating System
Container
Bins / libs
App App
Container
Bins / libs
App App
Type 1 Hypervisor Type 2 Hypervisor Linux Containers (LXC)
Containers share the OS kernel of the host and thus are lightweight.
However, each container must have the same OS kernel.
Containers are isolated, but share
OS and, where appropriate, libs /
bins.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
http://www.cisco.com/c/en/us/solutions/
collateral/data-center-virtualization/application-
centric-infrastructure/white-paper-
c11-732697.html
Docker and ACI
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
SECURITY
Trusted
Zone
DB
Tier
DMZ
External
Zone
APP DBWEB
EXTERNAL
ACI
Policy
ACI
Policy
ACI
Policy
103
One Network for Everything - Logical
! ! !
FW
ADC
Virtual Machines Docker Containers Bare-Metal Server
10
HYPERVISORHYPERVISORHYPERVISOR
Application Network Profile
Extending ACI into Existing Data Centers
Adding Remote Switch Nodes
vSwitch
Integration of Existing DC Network Assets
Extending the ACI Overlay to Existing DC Assets
vSwitch vSwitch
•  Maintain Existing Physical Network infrastructure and operations
•  Extend the ACI policy based forwarding to Hypervisor environment
attached to the existing physical network
IP Core with a Hardware Directory Service
•  Three data plane functions required within the ‘core’ of an ACI fabric
•  Transit: IP forwarding of traffic between VTEP’s
•  Multicast Root: Root for one of the 16 multicast forwarding topologies (used for optimization of multicast load
balancing and forwarding)
•  Proxy Lookup: Data Plane based directory for forwarding traffic based on mapping database of EID to VTEP bindings
•  Not all functions are required on all ‘spine’ switches
Transit Node
Proxy Lookup
Cached EID
Entry
Proxy Lookup –
Unknown EID
Multicast Root
ACI Spine Proxy == LISP Proxy Tunnel Router
+ Map-Server
http://tools.ietf.org/html/draft-moreno-lisp-datacenter-deployment-00
Direct Attach
Endpoints
Hypervisor Attached
Endpoints (VLAN or
VXLAN)
vSwitch
Extension of the ACI Overlay to remote AVS
ACI Extended Overlay – CY15
AVS	
  
ACI VXLAN Extended
Overlay
Infrastructure VRF
Extended
AVS	
  
•  ACI Policy overlay can be extended over existing IP
networks
Full ACI VXLAN
Switching Enabled
Hypervisor
L2 ‘or’ L3
VTEP VTEP VTEP
VTEPVTEP
VTEP
Lets Look at
the Details
Multicast Support for Overlays
Requirement Classic VXLAN ACI Extended Overlay
VTEP Discovery Multicast Flood & Learn Control Plane
EID to VTEP Binding Discovery Multicast Flood & Learn Control Plane
Tenant Broadcast and Multicast Traffic Multicast Multicast
•  Multicast provides three functions in an overlay (applies to ‘all’ overlays)
•  VTEP Discovery, EID to VTEP Binding Learning, Transport of actual broadcast and
multicast traffic
•  ACI Extended Overlay leverages control plane for VTEP discovery and Proxy for EID to VTEP
Binding Learning
•  ACI Extended Overlay leverages
•  Native network data plane multicast to support the 3rd case, transport of endpoint
broadcast and multicast traffic
•  Head end replication for environments that do not have multicast enabled
vSwitch
Forwarding within the Extended Overlay
Adding Remote Leaf Nodes, Nexus 9000
AVS	
   DVS	
  
VTEP VTEP VTEP
VTEP
VTEP
•  Nexus 9000 as a remote ACI Leaf
•  Support for full policy based forwarding, atomic counters,
zero touch install, health scores
VMVM
10.2.4.710.9.3.37
VM
VM
10.2.4.32
VM
10.9.3.89
10.9.3.38
AVS	
  
VTEP
AVS	
  
VTEP
VM
10.2.4.1910.9.3.123
VM
VM
10.2.4.74
VTEP
ACI VXLAN Extended
Overlay
Infrastructure VRF
Extended
Lets Look at
the DetailsVTEP VTEP
vSwitch
Forwarding within the Extended Overlay
Adding Remote Leaf Nodes, Nexus 9000
AVS	
   DVS	
  
VTEP VTEP VTEP
VTEP
VTEP
•  Nexus 9000 as a remote ACI Leaf
•  Support for full policy based forwarding, atomic counters,
zero touch install, health scores
VMVM
10.2.4.710.9.3.37
VM
VM
10.2.4.32
VM
10.9.3.89
10.9.3.38
AVS	
  
VTEP
AVS	
  
VTEP
VM
10.2.4.1910.9.3.123
VM
VM
10.2.4.74
VTEPVTEP VTEP
VTEP
IP
VNID Tenant Packet
Group
Policy
vSwitch
Forwarding within the Extended Overlay
Adding Remote Leaf Nodes, Nexus 9000
AVS	
   DVS	
  
VTEP VTEP VTEP
VTEP
VTEP
VMVM
10.2.4.710.9.3.37
VM
VM
10.2.4.3
2
VM
10.9.3.89
10.9.3.38
AVS	
  
VTEP
AVS	
  
VTEP
VM
10.2.4.1910.9.3.123
VM
VM
10.2.4.74
VTEP
vSwitch
•  Nexus 9000 as a remote ACI Leaf will support vSwitch
downstream (ESX/DVS, Hyper-V, OVS)
•  Leverage Existing Hypervisor implementations
VTEPVTEPVTEP VTEP
vSwitch
Forwarding within the Extended Overlay
Adding Remote Leaf Nodes, Nexus 9000
AVS	
   DVS	
  
VTEP VTEP VTEP
VTEP
VTEP
VMVM
10.2.4.710.9.3.37
VM
VM
10.2.4.32
VM
10.9.3.89
10.9.3.38
AVS	
  
VTEP
AVS	
  
VTEP
VM
10.2.4.1910.9.3.123
VM
VM
10.2.4.74
VTEP
vSwitch
•  ACI 9300 performs both L2 ‘and’ L3’ forwarding (Remote Leaf
is a full member of the fabric)
•  Remote 9300 Leaf performs full local inter EPG policy
forwarding
VTEPVTEP VTEP
vSwitch
Forwarding within the Extended Overlay
Adding Remote Leaf Nodes, Nexus 9000
AVS	
   DVS	
  
VTEP VTEP VTEP
VTEP
VTEP
VMVM
10.2.4.710.9.3.37
VM
VM
10.2.4.3
2
VM
10.9.3.89
10.9.3.38
AVS	
  
VTEP
AVS	
  
VTEP
VM
10.2.4.1910.9.3.123
VM
VM
10.2.4.74
VTEP
vSwitch
Unknown MAC/IP
Known MAC/IP
(Cache Entry Exists)
•  First packet for an ‘unknown’ MAC or IP host address passes
through the inline directory
•  Subsequent packets are forwarded directly to the target
VTEP (local switching)
VTEPVTEP VTEP
vSwitch
Forwarding within the Extended Overlay
Adding Remote Leaf Nodes, Nexus 9000
AVS	
   AVS	
  
VTEP VTEP VTEP
VTEPVTEP
VTEP
VMVM
10.2.4.710.9.3.37
VM
VM
10.2.4.32
VM
10.9.3.89
10.9.3.38
AVS	
  
VTEP
VM
10.2.4.74
VTEP
vSwitch
•  ACI services insertion and full L4-L7 policy are supported via
the AVS
VTEPVTEP VTEP
Multi-Site Fabrics
•  Host Level Reachability Advertised between Fabrics via BGP
•  Transit Network is IP Based
•  Host Routes do not need to be advertised into transit network
•  Policy Context is carried with packets as they traverse the transit IP Network
•  Forwarding between multiple Fabrics is allowed (not limited to two sites)
Fabric ‘A’ Fabric ‘B’
Web/App
DB
Web/App
Multi-Site
Traffic
mBGP - EVPN
VTEP
IP
VNID Tenant Packet
Group
Policy
Applications will spread across existing and new
infrastructure
vPC
vPC
vPC
Outside
(Tenant
VRF)
App DBWeb
QoS
Filter
QoS
Service
QoS
Filter
DB
AppWeb
Outside
(Tenant VRF)
QoS
Filter
QoS
Service
QoS
Filter
DB Outside EPG
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
IP Enabled Data Center
Network
AVS	
  
Directory/Proxy
Service Nodes
AVS	
  
Border Leaves
APIC Policy
Controller
ACI Leaf
Nexus 9000
ACI Virtual Leaf
(AVS)
vSwitch	
  
ACI Services
extended in to any
existing IP
enabled Data
Center
ACI Policy and Automation
Extended to Virtual Servers
via Cisco AVS
ACI Policy and Automation
Extended to Physical and
Existing Virtual Servers via
Cisco Nexus 9000
ACI Enabled L4-7
Virtual and Physical
Services (Support for
Existing and New
Services Instances)
Extending ACI Policy and Automation into the Existing Data Center
ACI
It’s an ‘IP’ Network
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Recommended Readings
119
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public
Give us your feedback and receive a
Cisco Live 2015 T-Shirt!
Complete your Overall Event Survey and 5 Session
Evaluations.
•  Directly from your mobile device on the Cisco Live
Mobile App
•  By visiting the Cisco Live Mobile Site
http://showcase.genie-connect.com/clmelbourne2015
•  Visit any Cisco Live Internet Station located
throughout the venue
T-Shirts can be collected in the World of Solutions
on Friday 20 March 12:00pm - 2:00pm
Complete Your Online Session Evaluation
Learn online with Cisco Live!
Visit us online after the conference for full
access to session videos and
presentations. www.CiscoLiveAPAC.com
Integration and Interoperation of existing Nexus networks into an ACI Architecture
Integration and Interoperation of existing Nexus networks into an ACI Architecture

Más contenido relacionado

La actualidad más candente

3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overviewMostafa El Lathy
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
 
VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)Netwax Lab
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceBertrand Duvivier
 
7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces conceptsMostafa El Lathy
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyCisco Canada
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISECisco Canada
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
 
Next Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureNext Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureCisco Canada
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsAlejandro Marin
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clusteringib_cims
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...Cisco Canada
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service ProvidersBAKOTECH
 
17 palo alto threat prevention concept
17 palo alto threat prevention concept17 palo alto threat prevention concept
17 palo alto threat prevention conceptMostafa El Lathy
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to HeroDhruv Sharma
 

La actualidad más candente (20)

3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview3 palo alto ngfw architecture overview
3 palo alto ngfw architecture overview
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)
 
Cisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advanceCisco Live Milan 2015 - BGP advance
Cisco Live Milan 2015 - BGP advance
 
7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts7 palo alto security zones &amp; interfaces concepts
7 palo alto security zones &amp; interfaces concepts
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Understanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN TechnologyUnderstanding Cisco’ Next Generation SD-WAN Technology
Understanding Cisco’ Next Generation SD-WAN Technology
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
Next Generation Nexus 9000 Architecture
Next Generation Nexus 9000 ArchitectureNext Generation Nexus 9000 Architecture
Next Generation Nexus 9000 Architecture
 
IOS Cisco - Cheat sheets
IOS Cisco - Cheat sheetsIOS Cisco - Cheat sheets
IOS Cisco - Cheat sheets
 
Cisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW ClusteringCisco Live Brksec 3032 - NGFW Clustering
Cisco Live Brksec 3032 - NGFW Clustering
 
Base Designs Lab Setup for Validated Reference Design
Base Designs Lab Setup for Validated Reference DesignBase Designs Lab Setup for Validated Reference Design
Base Designs Lab Setup for Validated Reference Design
 
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...Cisco Connect Halifax 2018   Understanding Cisco's next generation sd-wan sol...
Cisco Connect Halifax 2018 Understanding Cisco's next generation sd-wan sol...
 
F5 Solutions for Service Providers
F5 Solutions for Service ProvidersF5 Solutions for Service Providers
F5 Solutions for Service Providers
 
17 palo alto threat prevention concept
17 palo alto threat prevention concept17 palo alto threat prevention concept
17 palo alto threat prevention concept
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
SD WAN
SD WANSD WAN
SD WAN
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to Hero
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 

Destacado

Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 finalKwonSun Bae
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterF5NetworksAPJ
 
Emc san-overview-presentation
Emc san-overview-presentationEmc san-overview-presentation
Emc san-overview-presentationjabramo
 
Net Devops Overview
Net Devops OverviewNet Devops Overview
Net Devops OverviewJoel W. King
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLANIndonesia Network Operators Group
 
OpenStack: Virtual Routers On Compute Nodes
OpenStack: Virtual Routers On Compute NodesOpenStack: Virtual Routers On Compute Nodes
OpenStack: Virtual Routers On Compute Nodesclayton_oneill
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
 
Docker 사용가이드 public v0.1
Docker 사용가이드 public v0.1Docker 사용가이드 public v0.1
Docker 사용가이드 public v0.1Steve Shim
 
오픈스택 멀티노드 설치 후기
오픈스택 멀티노드 설치 후기오픈스택 멀티노드 설치 후기
오픈스택 멀티노드 설치 후기영우 김
 
OVS VXLAN Network Accelaration on OpenStack (VXLAN offload and DPDK) - OpenSt...
OVS VXLAN Network Accelaration on OpenStack (VXLAN offload and DPDK) - OpenSt...OVS VXLAN Network Accelaration on OpenStack (VXLAN offload and DPDK) - OpenSt...
OVS VXLAN Network Accelaration on OpenStack (VXLAN offload and DPDK) - OpenSt...VirtualTech Japan Inc.
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)Krishna Kahar
 
Contrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at ScaleContrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at ScaleMarketingArrowECS_CZ
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG IT
 
Storage area network
Storage area networkStorage area network
Storage area networkNeha Agarwal
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)sankcomp
 

Destacado (20)

Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
Cisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data CenterCisco ACI & F5 Integrate to Transform the Data Center
Cisco ACI & F5 Integrate to Transform the Data Center
 
10.) vxlan
10.) vxlan10.) vxlan
10.) vxlan
 
Emc san-overview-presentation
Emc san-overview-presentationEmc san-overview-presentation
Emc san-overview-presentation
 
Net Devops Overview
Net Devops OverviewNet Devops Overview
Net Devops Overview
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
 
OpenStack: Virtual Routers On Compute Nodes
OpenStack: Virtual Routers On Compute NodesOpenStack: Virtual Routers On Compute Nodes
OpenStack: Virtual Routers On Compute Nodes
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
 
VXLAN Practice Guide
VXLAN Practice GuideVXLAN Practice Guide
VXLAN Practice Guide
 
Docker 사용가이드 public v0.1
Docker 사용가이드 public v0.1Docker 사용가이드 public v0.1
Docker 사용가이드 public v0.1
 
오픈스택 멀티노드 설치 후기
오픈스택 멀티노드 설치 후기오픈스택 멀티노드 설치 후기
오픈스택 멀티노드 설치 후기
 
OVS VXLAN Network Accelaration on OpenStack (VXLAN offload and DPDK) - OpenSt...
OVS VXLAN Network Accelaration on OpenStack (VXLAN offload and DPDK) - OpenSt...OVS VXLAN Network Accelaration on OpenStack (VXLAN offload and DPDK) - OpenSt...
OVS VXLAN Network Accelaration on OpenStack (VXLAN offload and DPDK) - OpenSt...
 
Storage Area Network(SAN)
Storage Area Network(SAN)Storage Area Network(SAN)
Storage Area Network(SAN)
 
Contrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at ScaleContrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at Scale
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep Dive
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e Design
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Storage Area Network (San)
Storage Area Network (San)Storage Area Network (San)
Storage Area Network (San)
 

Similar a Integration and Interoperation of existing Nexus networks into an ACI Architecture

PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof MazepaPLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof MazepaPROIDEA
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsFab Fusaro
 
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPROIDEA
 
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...PROIDEA
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball Networks
 
WAN Automation Engine API Deep Dive
WAN Automation Engine API Deep DiveWAN Automation Engine API Deep Dive
WAN Automation Engine API Deep DiveCisco DevNet
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANLdgoodell
 
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...Indonesia Network Operators Group
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxParthaDas754073
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Cisco Russia
 
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...Sanjeev Rampal
 
Introduction to the Container Networking and Security
Introduction to the Container Networking and SecurityIntroduction to the Container Networking and Security
Introduction to the Container Networking and SecurityCloud 66
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)SDNRG ITB
 
 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business TransformationCisco Service Provider
 
Encor chapter 1_packet forwarding
Encor chapter 1_packet forwardingEncor chapter 1_packet forwarding
Encor chapter 1_packet forwardingmerhatsidikmelke
 

Similar a Integration and Interoperation of existing Nexus networks into an ACI Architecture (20)

PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof MazepaPLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
PLNOG15: Cisco Application Centric Infrastructure - why ...? - Krzysztof Mazepa
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on Lab
 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
 
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick MartinPLNOG14: Application Centric Infrastructure Introduction - Nick Martin
PLNOG14: Application Centric Infrastructure Introduction - Nick Martin
 
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration Guide
 
WAN Automation Engine API Deep Dive
WAN Automation Engine API Deep DiveWAN Automation Engine API Deep Dive
WAN Automation Engine API Deep Dive
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL
 
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
 
CCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptxCCNA_RSE_Chp4 and their working principles.pptx
CCNA_RSE_Chp4 and their working principles.pptx
 
ENSA_Module_8.pptx
ENSA_Module_8.pptxENSA_Module_8.pptx
ENSA_Module_8.pptx
 
Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning Enterprise Architecture, Deployment and Positioning
Enterprise Architecture, Deployment and Positioning
 
BRKCRS-2110.pdf
BRKCRS-2110.pdfBRKCRS-2110.pdf
BRKCRS-2110.pdf
 
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...
 
Introduction to the Container Networking and Security
Introduction to the Container Networking and SecurityIntroduction to the Container Networking and Security
Introduction to the Container Networking and Security
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
 
 Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation Network Innovations Driving Business Transformation
 Network Innovations Driving Business Transformation
 
Encor chapter 1_packet forwarding
Encor chapter 1_packet forwardingEncor chapter 1_packet forwarding
Encor chapter 1_packet forwarding
 

Más de Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

Más de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Integration and Interoperation of existing Nexus networks into an ACI Architecture

  • 1. Integration and Interoperation of existing Nexus networks into an ACI Architecture Mike Herbert – Principal Engineer INSBU
  • 2. House Keeping Notes • Thank you for attending Cisco Connect Toronto 2015, here are a few housekeeping notes to ensure we all enjoy the session today. •  Please ensure your cellphones / Laptops are set on silent to ensure no one is disturbed during the session •  A power bar is available under each desk in case you need to charge your laptop
  • 3. §  Cisco dCloud is a self-service platform that can be accessed via a browser, a high-speed Internet connection, and a cisco.com account §  Customers will have direct access to a subset of dCloud demos and labs §  Restricted content must be brokered by an authorized user (Cisco or Partner) and then shared with the customers (cisco.com user). §  Go to dcloud.cisco.com, select the location closest to you, and log in with your cisco.com credentials §  Review the getting started videos and try Cisco dCloud today: https://dcloud-cms.cisco.com/help dCloud Customers now get full dCloud experience!
  • 4. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Application Oriented Policy = Operational Simplicity Introducing: Application Centric Infrastructure (ACI) Apps + Infrastructure Physical + Virtual + ContainersOpen + Secure On-Premises + Cloud
  • 5. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Control & Audit Connectivity (Security – Firewall, ACL, …) IP Address, VLAN, VRF Enable Connectivity (The Network) Application Requirements IP Addressing Application Requirements Application Specific Connectivity Dynamic provisioning of connectivity explicitly defined for the application Application RequirementsApplication Requirements Redirect and Load Balance Connectivity IP Address, VLAN, VRF ACI directly maps the application connectivity requirements onto the network and services fabric Why Networks are Complex Overloaded Network Constructs
  • 6. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Why Network Provisioning is Slow Application Language Barriers Developers Application Tiers Provider / Consumer Relationships Infrastructure Teams VLANs Subnets Protocols Ports Developer and infrastructure teams must translate between disparate languages.
  • 7. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public ADC APP DBF/W ADC WEB HYPERVISORHYPERVISOR HYPERVISOR CONNECTIVITY POLICY SECURITY POLICIES QOS STORAGE AND COMPUTE APPLICATION L4..7 SERVICES SLA QoS Security Load Balancing APP PROFILE Centralized Policy and Distributed Enforcement 7
  • 8. Two Big Questions 8 “Is ACI a Closed System?” “Do I need to replace all of my existing infrastructure to begin leveraging ACI?” ABSOLUTELY NOT !!! Let’s see WHY and HOW …
  • 9. Extend ACI to local hypervisors vSwitch   Things we would like to understand how to do Extend ACI to WAN/DCI Interconnect to existing DC Networks Let me just run my network (but fix my Flooding, Mobility, Configuration, Troubleshooting challenges) AVS   AVS   Extend ACI to to existing Nexus installations via a full ACI VXLAN Switching Enabled Hypervisor ‘and’ remote ACI Physical Leaf vSwitch
  • 10. ACI Policy Based Forwarding via an Integrated Overlay
  • 11. ACI Fabric – An IP network with an Integrated Overlay Virtual and Physical •  Cisco’s ACI solution leverages an integrated VXLAN based overlay •  IP Network for Transport •  VXLAN based tunnel end points (VTEP) •  VTEP discovery via infrastructure routing •  Directory (Mapping) service for EID (host MAC and IP address) to VTEP lookup PayloadIPVXLANVTEP APIC VTEP VTEP VTEP VTEP VTEP VTEP vSwitchvSwitch VTEPVTEP IP Transport
  • 12. VXLAN Enabled Hypervisor VTEP   VXLAN Enabled Hypervisor VTEP   •  Interworking with ACI •  VXLAN enabled Hypervisor (FCS) •  VXLAN Hardware VTEP (Nexus 9000 standalone, Nexus 3100/7000-F3, ASR9K, … ) •  MP-BGP EVPN based control plane for external VTEP connectivity (post FCS) Service Interconnect to ASR9K/N7K WAN/DCI Multi-Fabric Topologies VXLAN Based Fabric ACI Fabric – Integrated Overlay Connecting and Extending the Overlay VTEP   VTEP  
  • 13. ACI Fabric – Integrated Overlay Decoupled Identity, Location & Policy Payload Eth IP VXLAN Outer IP PayloadIPNVGRE Outer IP PayloadIP802.1Q Payload Eth IP Payload Eth MAC ACI VXLAN (VXLAN) header identifies the attributes of the application end point within the fabric Policy attributes are carried by every packet External Identifiers are localized to specific iLeaf or iLeaf ports (unless external requirements for consistency, e.g. downstream networks) VTEP •  All Tenant traffic within the Fabric is tagged with an ACI VXLAN (VXLAN) header which identifies the policy attributes of the application end point within the fabric •  Policy Group (source group) •  Forwarding Group (Tenant, VRF, Bridge Domain) •  Load Balancing Policy •  Telemetry Policy •  At the ingress port the Fabric translates an external identifier which can be used to distinguish different application end points via the internal VXLAN tagging format Payload MAC IP VNIDFlagsVTEP SRC Group AVS   VTEP
  • 14. ACI leverages VXLAN RFC Draft – Next IETF Meeting
  • 15. •  Forward based on destination IP Address for intra and inter subnet (Default Mode) •  Bridge semantics are preserved for intra subnet traffic (no TTL decrement, no MAC header rewrite, etc.) •  Non-IP packets will be forwarded using MAC address. Fabric will learn MAC’s for non-IP packets, IP address learning for all other packets •  Route if MAC is router-mac, otherwise bridge (standard L2/L3 behaviour) IP Forwarding: Forwarded using DIPi address, HW learning of IP address 10.1.3.11 10.6.3.210.1.3.35 10.6.3.17 MAC Forwarding: Forwarded using DMAC address, HW learning of MAC address Overlay Elements – Host Forwarding
  • 16. 10.1.1.10 10.1.3.11 10.6.3.2 Distributed Default Gateway •  ACI Fabric supports full layer 2 and layer 3 forwarding semantics, no changes required to applications or end point IP stacks •  ACI Fabric provides optimal forwarding for layer 2 and layer 3 •  Fabric provides a pervasive SVI which allows for a distributed default gateway •  Layer 2 and layer 3 traffic is directly forwarded to destination end point •  IP ARP/GARP packets are forwarded directly to target end point address contained within ARP/GARP header (elimination of flooding) 10.1.3.35 10.1.1.10 10.1.3.11 10.6.3.2 Directed ARP Forwarding 10.1.3.35 Location Independent Forwarding Layer 2 and Layer 3
  • 17. 10.1.3.11 10.6.3.2 Pervasive SVI •  Default Gateway can reside internal or external to the Fabric •  Pervasive SVI provides a distributed default gateway (anycast gateway) •  Subnet default gateway addresses are programmed in all Leaves with end points present for the specific Tenant IP subnet •  Layer 2 and layer 3 traffic is directly forwarded to destination end point •  External Gateway is used when Fabric is configured to provide layer 2 transport only for a specific Tenant 10.1.3.35 10.1.1.10 10.1.3.11 10.6.3.2 External Default Gateway 10.1.3.35 Where is my default Gateway? 10.6.3.2 10.6.3.110.1.3.1
  • 18. Overlay Elements - Mapping/Directory Proxy Inline Hardware Mapping DB - 1,000,000+ hosts 10.1.3.11 fe80::462a:60ff:fef7:8e5e10.1.3.35 fe80::62c5:47ff:fe0a:5b1a •  The Forwarding Table on the Leaf Switch is divided between local (directly attached) and global entries •  The Leaf global table is a cached portion of the full global table •  If an endpoint is not found in the local cache the packet is forwarded to the ‘default’ forwarding table in the spine switches (1,000,000+ entries in the spine forwarding table) Local Station Table contains addresses of ‘all’ hosts attached directly to the iLeaf 10.1.3.11 10.1.3.35 Port 9 Leaf 3 Proxy A* Global Station Table contains a local cache of the fabric endpoints 10.1.3.35 Leaf 3 10.1.3.11 Leaf 1 Leaf 4 Leaf 6 fe80::8e5e fe80::5b1a Proxy Station Table contains addresses of ‘all’ hosts attached to the fabric Proxy Proxy Proxy Proxy
  • 19. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Endpoint Repository (Proxy DataBase)
  • 20. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Proxy Database (Oracle) Spine-1# show coop internal info global Spine-1# show coop internal event-history oracle-adj <IP> •  You still have full access to all forwarding, adjacency, ..., information via CLI and debug commands when you want them
  • 21. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public ACI Endpoint Tracker Application •  Tracks all attachment, detachment, movement of Endpoints in ACI fabric •  Stores activity in open source MySQL Database, allowing query capabilities •  Provides foundation for visualization and query tools •  Some questions that could be solved: –  What are all the Endpoints on network? –  Where is a specific Endpoint? –  What was connected last Thursday between 3:30am and 4:00am? –  What is the history of a given Endpoint?
  • 22. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public GitHub – a resource for ACI scripts and tools 22 •  ACI Toolkit: http://datacenter.github.io/acitoolkit/ https://github.com/datacenter/acitoolkit •  ACI Diagram https://github.com/cgascoig/aci-diagram •  ACI Endpoint Tracker http://datacenter.github.io/acitoolkit/ docsbuild/html/endpointtracker.html
  • 23. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public ACI A Policy Based IP Network PayloadIPVXLANVTEP AVS   VTEP APIC - Policy Controller & Distributed Management Information Tree (DMIT) Physical and Virtual L4-7 Service Nodes Physical and Virtual VTEP’s (Policy & Forwarding Edge Nodes) Proxy (Directory) Services Physical and Virtual Endpoints (Servers) & VMM (Hypervisor vSwitch) VTEP IP Network & Integrated VXLAN WAN/DCI Services VTEP VTEP AVS   VTEP
  • 25. Transitions will and need to occur independently vPC vPC vPC Policy Zone ‘A’ Policy Zone ‘B’ Policy Zone ‘C’ App Element App Element App Element App Element App Element App Element App Element App Element App Element App Element App Element App Element App Element App Element Application Container Operations Evolution Policy Evolution Component Evolution
  • 26. §  Interconnect existing network POD’s with new ACI POD’s via standard Layer 2 extensions (VLAN or VXLAN) or via standard Layer 3 routing (OSPF, BGP) §  Leverage an ACI policy/services block attached to any existing Nexus or Catalyst network to provide L4-L7 services and policy automation for existing virtual and physical servers §  Extend the ACI forwarding and distributed policy capabilities to virtual and physical leaf switches connected to an existing Nexus/Catalyst IP based network Extending ACI in to Current Data Center’s Three Stages
  • 27. Backbone vPC vPC vPC •  Layer 2 and Layer 3 interoperation between ACI Fabric and Existing Data Center builds •  Layer 3 interconnect via standard routing interfaces, OSPF, Static, iBGP (FCS) MP-BGP, EIGRP, ISIS (Post FCS_ •  Layer 2 interconnect via standard STP or via VXLAN overlays vSwitch   Hyper-­‐V  AVS   Extending ACI in to Current Data Center’s Interconnect Existing to New ACI POD Extend Layer 2 VLAN’s where required Interconnect at Layer 3
  • 28. Connecting/Extending ACI via Layer 2 Layer 2 Layer 2 Layer 2 Extend L2 domain beyond ACI fabric - 2 options 1.  Manually assign a port to a VLAN which in turn mapped to an EPG. This extend EPG beyond ACI fabric (EPG == VLAN) 2.  Create a L2 connection to outside network. Extend bridge domain beyond ACI fabric. Allow contract between EPG inside ACI and EPG outside of ACI Lets Look at the Links
  • 29. © 2014 Cisco and/or its affiliates. All rights reserved.BRKACI-2001 Cisco Public VXLAN VNID = 5789 VXLAN VNID = 11348 NVGRE VSID = 7456 Any to Any 802.1Q VLAN 50 Normalized Encapsulation Localized Encapsulation IP Fabric Using VXLAN Tagging PayloadIPVXLANVTEP •  All traffic within the ACI Fabric is encapsulated with an extended VXLAN header •  External VLAN, VXLAN, NVGRE tags are mapped at ingress to an internal VXLAN tag •  Forwarding is not limited to, nor constrained within, the encapsulation type or encapsulation ‘overlay’ network •  External identifies are localized to the Leaf or Leaf port, allowing re-use and/or translation if required Payload Payload Payload Payload Payload Eth IP VXLAN Outer IP IPNVGRE Outer IP IP802.1Q Eth IP Eth MAC Normalization of Ingress Encapsulation ACI Fabric – Integrated Overlay Data Path - Encapsulation Normalization 29
  • 30. Extend the EPG Option 1 VLAN 30 Layer 2 100.1.1.3 100.1.1.5 EPG 100.1.1.7100.1.1.99 •  VLAN’s are localized to the leaf nodes •  The same subnet, bridge domain, EPG can be configured as a ‘different’ VLAN on each leaf switch •  In 1HCY15 VLAN’s will be port local 100.1.1.3 BD Existing App VLAN 20
  • 31. Extend the EPG Option 1 Layer 2 VLAN 10 100.1.1.3 100.1.1.5 EPG 100.1.1.7100.1.1.99 •  Single Policy Group (one extended EPG) •  Leverage vPC for interconnect (diagram shows a single port-channel which is an option) •  BPDU should be enabled on the interconnect ports on the ‘vPC’ domain 100.1.1.3 VLAN 30 VLAN 20 BD Existing App VLAN 10 VLAN 10 VLAN 10
  • 32. Assign Port to an EPG •  With VMM integration, port is assigned to EPG by APIC dynamically. •  In all other cases, such as connecting to switch, router, bare metal, port need to be assigned to EPG manually or use API •  Use “Static Binding” under EPG to assign port to EPG •  The example assigns traffic received on port eth1/32 with vlan tagging 100 to EPG VLAN 100
  • 33. Assign Port to EPG VLAN Tagging Mode •  Tagged. Trunk mode •  Untagged. Access mode. Port can only be in one EPG •  802.1P Tag. Native VLAN. •  No Tagged and Untagged(for different port) config for same EPG with current software •  Assign port eth1/1 with VLAN 100 tagged mode and port eth1/2 with VLAN 100 untagged mode to EPG WEB is not supported •  Use 802.1P Tag. Port eth1/1 vlan 100 tagged, eth1/2 vlan 100 902.1P Tag •  VLAN to EPG mapping is switch wide significant
  • 34. C Extend the Bridge Domain Option 2 Layer 2 100.1.1.3 100.1.1.5100.1.1.7100.1.1.99 •  External EPG (policy between the L2 outside EPG and internal EPG) •  Leverage vPC for interconnect (diagram shows a single port-channel which is an option) •  BPDU should be enabled on the interconnect ports on the ‘vPC’ domain •  L2 outside forces the same external VLAN << fewer operational errors 100.1.1.3 BD Existing App EPG Inside EPG Outside VLAN 30 VLAN 10 VLAN 10 VLAN 10 VLAN 10 VLAN 20
  • 35. L2 Outside Connection Configuration Example •  Step 1. Create L2 Outside connection. •  Associate with BD. •  Specify VLAN ID to connect to outside L2 network •  External Bridge Domain is a way to specify the VLAN pool for outside connection. •  It is NOT a Bridge Domain.
  • 36. L2 Outside Connection Configuration Example •  Step 2. Specify leaf node and interface providing L2 outside connection
  • 37. L2 Outside Connection Configuration Example •  Step 3. Create external EPG under L2 outside connection •  Step 4. Create contract between external EPG and internal EPG
  • 38. ACI Interaction with STP BPDU STP Root Switch Same L2 Outside EPG (e.g. VLAN 10) •  No STP running within ACI fabric •  BPDU frames are flooded between ports configured to be members of the same external L2 Outside (EPG) •  No Explicit Configuration required •  Hardware forwarding, no interaction with CPU on leaf or spine switches for standard BPDU frames •  Protects CPU against any L2 flood that is occurring externally •  External switches break any potential loop upon receiving the flooded BPDU frame fabric •  BPDU filter and BPDU guard can be enabled with interface policy APIC BPDU BPDU BPDU
  • 39. ACI Fabric Loopback Protection STP Loop Detection LLDP Loop Detection •  Multiple Protection Mechanisms against external loops •  LLDP detects direct loopback cables between any two switches in the same fabric •  Mis-Cabling Protocol (MCP) is a new link level loopback packet that detects an external L2 forwarding loop •  MCP frame sent on all VLAN’s on all Ports •  If any switch detects MCP packet arriving on a port that originated from the same fabric the port is err-disabled •  External devices can leverage STP/ BPDU •  MAC/IP move detection and learning throttling and err-disable APIC BPDULLDP MCP Loop Detection (supported with 11.1 release) MCP
  • 40. C Managing Flooding Within the BD Layer 2 100.1.1.3 100.1.1.5100.1.1.7100.1.1.99 •  In a classical network traffic is flooded with the Bridge Domain (within the VLAN) •  You have more control in an ACI Fabric but need to understand what behaviour you want 100.1.1.3 BD Multi EPG EPG App 1 EPG Outside VLAN 30 VLAN 10 VLAN 10 VLAN 10 VLAN 10 EPG App 2 VLAN 20
  • 41. Managing Flooding Within the Fabric ARP Unicast ARP Flooding Disabled (Default) •  Disable ARP Flooding – ARP/GARP is forwarded as a unicast packet within the fabric based on the host forwarding DB •  On egress the ARP/GARP is forwarded as a flooded frame (supports hosts reachable via downstream L2 switches) Firewall Configured as the Default Gateway ARP
  • 42. Managing Flooding Within the Fabric ARP Flooding ARP Flooding Enabled •  Enabling ARP Flooding – ARP/GARP is flooded within the BD •  Commonly used when the default GW is external to the Fabric Firewall Configured as the Default Gateway ARP
  • 43. Managing Flooding Within the Fabric Unknown Unicast Proxy Lookup Unknown Unicast Lookup via Proxy •  Hosts (MAC, v4, v6) that are not known by a specific ingress leaf switch are forwarded to one of the proxies for lookup and inline rewrite of VTEP address •  If the host is not known by any leaf in the fabric it will be dropped at the proxy (allows honeypot for scanning attacks) Unknown Unicast Proxy HW Proxy Lookup
  • 44. Managing Flooding Within the Fabric Unknown Unicast Flooding •  Hosts (MAC, v4, v6) that are not known by a specific ingress leaf switch are flooded to all ports within the bridge domain •  Silent hosts can be installed as static entries in the proxy (flooding not required for silent hosts) Unknown Unicast Flooded Unknown Unicast Unknown Unicast Flooded
  • 45. Managing Flooding Within the Fabric Unknown Multicast – Mode 1 (Flood) •  Unknown Multicast traffic is flooded locally to all ports in the BD on the same leaf the source server is attached to •  Unknown Multicast traffic is flooded to all ports in the BD on leaf nodes with a ‘multicast router port’ Unknown Multicast Flooded Unknown Multicast
  • 46. Managing Flooding Within the Fabric Unknown Multicast – Mode 2 (OMF ‘or’ Optimized Flood) •  Unknown Multicast traffic is only flooded to ‘multicast router ports’ in this mode Unknown Multicast Optimized Flooding Unknown Multicast
  • 47. Managing Flooding Within the Fabric Scoping Broadcasts to a micro segment 100.1.1.3 100.1.1.5100.1.1.7100.1.1.99 100.1.1.3 EPG B EPG A EPG C 100.1.1.72 Traffic Type 11.0(x) Behaviour 11.1(x) Behaviour ARP Flood or Unicast Flood or Unicast Unknown Unicast Flood or Leverage Proxy Lookup Flood or Leverage Proxy Lookup Unknown IP Multicast Flood or OMF Flood or OMF L2 MCAST, BCAST, Link Local Flood Flood within the BD, Flood within the EPG, Disable Flooding within the BD/EPG
  • 48. Managing Flooding Within the Fabric Multi Destination Flooding (Supported with 11.1(x) – Q2CY15) •  Link Level Traffic is either •  Contained within the EPG •  Contained within the Bridge Domain •  Dropped •  Security Segmentation for Link Level Traffic Link Level BCAST Manage Flooding within the BD 100.1.1.3 100.1.1.5 100.1.1.7100.1.1.99 100.1.1.72 100.1.1.52 EPG ‘A’ 100.1.1.4 EPG ‘A’EPG ‘B’ EPG ‘B’ EPG ‘B’
  • 49. Managing Flooding Within the Fabric Flooding scoped to the EPG 100.1.1.3 100.1.1.5100.1.1.7100.1.1.99 100.1.1.3 EPG B EPG A EPG C 100.1.1.72 •  Link Local, BCAST & L2 Multicast traffic can be managed on a micro-segment basis •  As an example: •  EPG A, EPG B & EPG C - Link Level traffic is flooded ‘only’ to the endpoints within the EPG
  • 50. Managing Flooding Within the Fabric Disabling Flooding within the BD 100.1.1.3 100.1.1.5100.1.1.7100.1.1.99 100.1.1.3 EPG B EPG A EPG C 100.1.1.72 •  When desired each Bridge Domain can be configure to permit or disable flooding of Link Local, BCAST and L2 MCAST traffic
  • 51. An Example of Interconnecting and Migrating Logical Design HSRP Default GW VLAN / Subnet P P VM VM VM P VM vPC N7k N5k L3 HSRP P VM vPC N7k N5k L3 HSRP N2k P VM N7k FEX L3 HSRP P VM Cat6500 L3 HSRP Many Different Physical Designs
  • 52. Connect Fabric to existing Network •  Functionally we are expanding the VLAN’s into ACI. Existing Design HSRP Default GW VLAN 10 / Subnet 10 P P VM VM VM ACI Fabric EPG-10 = VLAN 10
  • 53. Configure ACI Bridge Domain settings •  Temporary Bridge Domain specific settings while we are using the HSRP gateways in the existing network. •  Select Forwarding to be “Custom” which allow •  Enable Flooding of L2 unknown unicast •  Enble ARP flooding •  Disable Unicast routing Tenant “Red” Context “Red” Bridge Domain “10” Subnet 10 EPG-10
  • 54. Migrate Workloads Existing Design HSRP Default GW VLAN 10 / Subnet A P P VM VM VM APIC EPG “10” P P VM VM VM APIC point of view, the policy model VM’s will need to be connected to new Port Group under APIC control (AVS or DVS).
  • 55. Complete the Migration Change BD settings back to normal for ACI mode •  Change BD settings back to default. –  No Flooding –  Unicast Routing enabled.
  • 56. Migrating Default Gateway to the ACI Fabric Change GW MAC address. By default, All fabric and all BD share same GW MAC Enable Routing and ARP flooding
  • 57. Extension and Connecting It’s a Network with any VLAN Anywhere Anycast Default Gateway 10.10.10.8 10.20.20.32 10.10.10.9 10.20.20.33 10.20.20.3110.10.10.6 Any IP - Anywhere
  • 58. Application Client Subnet 10.20.20.0/24 Subnet 10.10.10.0/24 Subnet 10.30.30.0/24 Subnet 10.40.40.0/24 Subnet 10.50.50.0/24 External Networks (Outside) Redirect to Pre- configured FW Redirect to Pre- configured FW Critical Users (Outside) Middle Ware Servers Web Servers Oracle DB Contract Redirect to dynamically configured FW NFS ContractRedirect to dynamically configured FW Default Users (Outside) NFS Servers Subnet 10.20.20.0/24 Subnet 10.10.10.0/24 Subnet 10.30.30.0/24 Permit TCP any any Redirect to Pre- configured FW Policy can be added gradually starting with what you have today
  • 59. Simple Policy During Migration - Any-to-Any Configuration Contracts Provided Filter Contracts Provided Contracts consumed Filter EPG “VLAN 10” VLAN10 Default ALL ALL Default EPG “VLAN 20” VLAN20 Default ALL ALL EPG “VLAN 30” VLAN30 Default ALL ALL ALLVLAN 10 VLAN 20 VLAN 30
  • 60. I want to have a very open configuration with VLAN10 talking to anything (1) Create “Contract” ALL if it doesn’t exist yet Use filter “common/ default”
  • 61. I want to have a very open configuration with VLAN10 talking to anything (2) EPG VLAN 10 provides and consumes “ALL”
  • 62. Extension and Connecting Dynamic Distributed ACL’s Permit ACL is applied on all ports between VLAN 10, 20 & 30 10.10.10.8 10.20.20.32 10.10.10.9 10.20.20.33 10.20.20.3110.10.10.6 All Subnets are allowed to communicate with this policy applied
  • 63. Later if I want to put an ACL between VLAN 10 and 20 ALL VLAN 10 VLAN 20 VLAN 30 Contracts Provided Filter Contracts Provided Contracts consumed Filter EPG “VLAN 10” VLAN10 Default VLAN20 Port 80 EPG “VLAN 20” VLAN20 Default ALL ALL Default EPG “VLAN 30” VLAN30 Default ALL ALL
  • 64. Extension and Connecting Dynamic ACL’s Dynamic ACL is applied between all endpoints only allowing port 80 10.10.10.8 10.20.20.32 10.10.10.9 10.20.20.33 10.20.20.3110.10.10.6 Traffic is controlled between VLAN 10 & 20 to HTTP (port 80)
  • 65. Integrating and Extending L4-7 Services
  • 66. © 2014 Cisco and/or its affiliates. All rights reserved.BRKACI-2001 Cisco Public Automate Service Insertion Through APIC APP DBWEBEXTERNAL APIC Policy Model Endpoint Group (EPG): Collection of similar End Points identifying a particular Application Tier. Endpoint could represent VMs, VNICs , IP, DNS name etc Application Profile: Collection of Endpoint Groups and the policies that define way Endpoint group communicate with each other Application profile PolicyPolicyPolicy
  • 67. © 2014 Cisco and/or its affiliates. All rights reserved.BRKACI-2001 Cisco Public ACI Service Insertion via Policy •  Automated and scalable L4- L7 service insertion •  Packet match on a redirection rule sends the packet into a services graph. •  Service Graph can be one or more service nodes pre- defined in a series. •  Service graph simplifies and scales service operations Begin End Stage 1 FW_ADC1 EPG 2 EPG 1 Application Admin Service Admin ASA 5585 Netscaler VPX Chain “FW_ADC 1” Policy-based Redirection Stage 2
  • 68. © 2014 Cisco and/or its affiliates. All rights reserved.BRKACI-2001 Cisco Public Service Automation Through Device Package Open Device Package Policy Engine APIC provides extendable policy model through Device Package Configuration Model Device Interface: REST/CLI APIC Script Interface Call Back Scripts Event Engine APIC– Policy Manager Configuration Model (XML File) Call Back Script Provider Administrator can upload a Device Package Device Package contains XML fine defining Device Configuration Device scripts translates APIC API callouts to device specific callouts APIC
  • 69. Backbone Extending ACI in to Current Data Center’s Standard Architecture with Services vSwitch   Services Chassis vSwitch   vSwitch   Services Chassis
  • 70. Extension and Connecting Services Switch Dynamic ACL is applied between all endpoints only allowing port 80 10.10.10.8 10.20.20.32 10.10.10.9 10.20.20.33 10.20.20.3110.10.10.6 •  Start with the picture we now understand
  • 71. Extension and Connecting Services Switch 10.10.10.8 10.20.20.32 •  Lets simplify things
  • 72. Extension and Connecting Services Switch 10.10.10.8 10.20.20.32 •  Start with just a few switches
  • 73. Extension and Connecting Services Switch 10.10.10.8 10.20.20.32 •  Let’s connect them the way we should, redundantly (the previous slides showed a simple interconnect just as an example
  • 74. Extension and Connecting Services Switch 10.10.10.8 10.20.20.32 •  Let’s use a small spine switch •  We are starting with a very small fabric
  • 75. Extension and Connecting Services Switch •  Same picture as seen if the fabric was a services switch
  • 76. Extension and Connecting Services Switch •  Attach the L4-7 Services •  They can be physical and/or virtual
  • 77. Extension and Connecting Services Switch vSwitch   vSwitch   vSwitch   •  Add in the Core/WAN and the Servers and vSwitches
  • 78. Extension and Connecting Services Switch vSwitch   vSwitch   vSwitch   •  Activate the services, leverage the services chaining and dynamic provisioning •  Leverage the fabric as the layer 3 gateway for all the other VLAN’s
  • 79. Extending ACI - Application Virtual Switch
  • 80. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public L/B EPG APP EPG DBF/W EPG WEB Application Network Profile VM VM VM WEB PORT GROUP APP PORT GROUP DB PORT GROUP Hypervisor Integration with ACI APIC §  ACI Fabric implements policy on Virtual Networks by mapping Endpoints to EPGs §  Endpoints in a Virtualized environment are represented as the vNICs §  VMM applies network configuration by placement of vNICs into Port Groups or VM Networks §  EPGs are exposed to the VMM as a 1:1 mapping to Port Groups or VM Networks 80
  • 81. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public VMWare Integration 81 •  Three Different Options + Distributed Virtual Switch (DVS) vCenter + vShield Application Virtual Switch (AVS) •  Encapsulations: VLAN •  Installation: Native •  VM discovery: LLDP •  Software/Licenses: vCenter with Enterprise + License •  Encapsulations: VLAN, VXLAN •  Installation: Native •  VM discovery: LLDP •  Software/Licenses: vCenter with Enterprise + License, vShield Manager with vShield License •  Encapsulations: VLAN, VXLAN •  Installation: VIB through VUM or Console •  VM discovery: OpFlex •  Software/Licenses: vCenter with Enterprise + License
  • 82. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public APIC Admin VI/Server Admin Instantiate VMs, Assign to Port Groups L/B EPG APP EPG DB F/W EPG WEB Application Network Profile Create Application Policy WebWebWeb App HYPERVISOR HYPERVISOR VIRTUAL DISTRIBUTED SWITCH WEB PORT GROUP APP PORT GROUP DB PORT GROUP vCenter Server / vShield 8 5 1 9 ACI Fabric Automatically Map EPG To Port Groups Push Policy Create VDS2 Cisco APIC and VMware vCenter Initial Handshake 6 DB DB 7 Create Port Groups ACI Hypervisor Integration – VMware DVS/vShield 82 APIC 3 Attach Hypervisor to VDS 4 Learn location of ESX Host through LLDP
  • 83. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Application Virtual Switch with OpFlex in ACI Fabric • AVS: First Virtual Leaf to implement OpFlex • Network policy communicated from APIC to AVS through N9k using OpFlex • Increased control plane scale through APIC Cluster and Leaf Node • APIC communicates with vCenter Server for Port Group creation OpFlex AVS vCenter Hypervisor Manager VMVM VM VMVMVM VM VM OpFlex OpFlex OpFlex AVS
  • 84. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Hypervisor Integration with ACI 84 •  Endpoint Discovery DVS Host APIC VMM Control (vCenter API) Data Path §  Virtual Endpoints are discovered for reachability & policy purposes via 2 methods: §  Control Plane Learning: -  Out-of-Band Handshake: vCenter APIs -  Inband Handshake: OpFlex- enabled Host (AVS, Hyper-V, etc.) §  Data Path Learning: Distributed switch learning §  LLDP used to resolve Virtual host ID to attached port on leaf node (non-OpFlex Hosts) OpFlex Host Control (OpFlex) Data Path
  • 85. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public APIC Admin VI/Server Admin Instantiate VMs, Assign to Port Groups L/B EPG APP EPG DB F/W EPG WEB Application Network Profile Create Application Policy WebWebWeb App HYPERVISOR HYPERVISOR Application Virtual Switch (AVS) WEB PORT GROUP APP PORT GROUP DB PORT GROUP vCenter Server 8 5 1 9 ACI Fabric Automatically Map EPG To Port Groups Push Policy Create AVS VDS 2 Cisco APIC and VMware vCenter Initial Handshake 6 DB DB 7 Create Port Groups ACI Hypervisor Integration – AVS 85 APIC 3 Attach Hypervisor to VDS 4 Learn location of ESX Host through OpFlex OpFlex Agent OpFlex Agent
  • 86. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public ACI Hypervisor Integration – Cisco AVS 86 Name of VMM Domain Type of vSwitch (DVS or AVS) Associated Attachable Entity Profile (AEP) VXLAN Pool vCenter Administrator Credentials vCenter server information Switching mode (FEX or Normal) Multicast Pool
  • 87. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Extending ACI to Existing Virtual & Physical Networks VLAN & VXLAN Extension Layer 2 AVS   Layer 2 AVS   AVS   AVS   AVS   AVS   •  AVS supports OpFlex to integrate with APIC •  Supports a Full multi-hop Layer 2 Network between Nexus 9k and AVS: Investment Protection •  Layer 2 network is required to support OpFlex bootstrapping in this phase OpFlex OpFlex
  • 88. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Extending ACI to Existing Virtual & Physical Networks VLAN & VXLAN Extension Layer 2 AVS   Layer 2 AVS   AVS   AVS   AVS   AVS   •  Supports VLAN and VXLAN for transport (Recommend VXLAN to automate new workload) •  Existing Network need to have 1 Infrastructure VLAN for VXLAN transport •  Multicast: Turn on IGMP Snooping •  Recommend 1 L2 Multicast group per EPG OpFlex OpFlex
  • 89. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public VLAN VXLAN VLAN ESXi-­‐1 ESXi-­‐2 pepsi-­‐db N1k-­‐APP N1k-­‐W EB pepsi-­‐app APIC APICAPIC Pepsi-­‐W eb Shared_EPG-­‐1 N1Kvlan-­‐vSwitch-­‐leaf1 ESXi-­‐4 ESXi-­‐3 Coke-­‐W ebCoke-­‐App Spine  1 Spine  2 Leaf  1 Leaf  2 Leaf  3 ESXi-­‐1 Fabric (40Gbps) ACI - Investment protection for INTEGRATION / MIGRATION Remote VTEP (Virtual) via AVS Nexus 3K (L2)
  • 90. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public End-Points end EPG membership Server Virtual Machines & Containers Storage Client 90 •  Endpoint == Workload unit connected to network directly or indirectly •  An endpoint has address (identity), location, attributes (version, patch level) •  Can be physical or virtual or container •  End Point Group (EPG) membership defined by: •  Ingress physical port (Leaf or FEX) •  Ingress logical port (VM port group) •  VLAN ID •  VXLAN (VNID) •  IP Prefix/Subnet (so far only applicable to external/border leaf connectivity) •  VM-based attributes (11.1 release) •  IP address (planned for 11.1(MR2) – Sept 2015)
  • 91. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Hypervisor Integration with ACI 11.0 EPG Classification via Port Groups •  VM’s are placed within the Port Group defined for each EPG •  Traffic is encapsulated with the specific VLAN or VXLAN assigned to that port group on that port and forwarded upstream to the TOR VXLAN VNID = 5789 VXLAN VNID = 11348 802.1Q VLAN 50 PayloadIP GBP VXLAN VTEP VXLAN Leaf VTEP 802.1Q vSwitch WEB PORT GROUP APP PORT GROUP vSwitch WEB PORT GROUP APP PORT GROUP 802.1Q VLAN 125 PayloadIP PayloadIP Port Groups Created for Each EPG
  • 92. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Hypervisor Integration with ACI EPG Classification via VM Attributes •  End Point Groups (EPG’s) can leverage multiple methods to ‘classify’ an endpoint or traffic from an endpoint •  VM Port Groups Provide a simple mechanism to correlate a VM to a specific policy group •  VM Attributes can also be used to classify a VM as a member of an EPG •  Leverage ACI release 11.1 with AVS (initial deployment) •  Support for other Hypervisor switches VMware vDS, Microsoft vSwitch, OVS (future) VM Attribute Guest OS VM Name VM (id) VNIC (id) Hypervisor DVS port-group DVS Datacenter Custom Attribute MAC Address IP Address vCenterVMAttributes VMTraffic Attributes
  • 93. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public Hypervisor Integration with ACI EPG Classification via VM Attributes •  There are two categories of Attributes supported with the 11.1 release •  VM Attributes (set by server administrator on creation of the VM) •  VM Traffic Attributes (VM MAC/IP address or L4 port being used by the application) •  Any endpoint placed within a Port Group on the vSwitch can be micro-classified based on the specific VM Attributes •  Dynamic classification or re-classification •  e.g. Re-classify an endpoint that has been detected to have a security exposure (move to quarantine security group) VM Attribute Guest OS VM Name VM (id) VNIC (id) Hypervisor DVS port-group DVS Datacenter Custom Attribute MAC Address IP Address vCenterVMAttributes VMTraffic Attributes
  • 94. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public AVS with ACI 11.1 EPG Classification via VM Attributes vSwitch (AVS) Port Group EPG == VM Attribute ‘x’ EPG == VM Attribute ‘y’ APIC Admin Create an EPG == VM Attribute ‘x’ on VMM Domain ‘A’ 3 4 APIC Distributes VM Attribute Policies to Leaf nodes AVS notifies Leaf of VM Attach via OpFlex Channel 6 Leaf Determines Attribute to EPG Classification 7 Leaf Pushes EPG encapsulation binding to AVS via OpFlex Channel 8 802.1Q VLAN 50 AVS forwards traffic with the correct EPG label (encapsulation) 9 APIC Retrieves Hypervisor State (VM State & VM Attributes) & Initiate a Listener Process for any changes/ updates 2 Administrator Creates new vDS (AVS) 1 VI/Server Admin Boot new VM with desired VM Attributes 5
  • 95. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public ACI Hypervisor Integration – Vmware vCenter View 95
  • 96. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public VMware vCenter Plugin View 96
  • 97. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public VMware vCenter Plugin View 97
  • 98. © 2015 Cisco and/or its affiliates. All rights reserved. Cisco Public VMware vCenter Plugin View 98
  • 99. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public APIC Admin (Basic Infrastructure) Azure Pack Tenant Web WebWebWeb AppApp 3 6 ACI Fabric Push Network Profiles to APIC Pull Policy on leaf where EP attaches Indicate EP Attach to attached leaf when VM starts 1 2 DB DB HYPERVISOR HYPERVISOR HYPERVISOR ACI Azure Pack Integration APIC Get VLANs allocated for each EPG Create Application Policy 7 Azure Pack SPF SCVMM PluginAPIC Plugin OpFlex Agent OpFlex Agent OpFlex Agent Instantiate VMs 5 1 4 Create VM Networks 4
  • 100. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public ACI OpenStack Integration 2 ACI Admin (manages physical network, monitors tenant state) L/B EPG APP EPG DB F/W L/B EPG WEB Application Network Profile Create Application Policy 3 5 ACI Fabric Push Policy OpenStack Tenant (Performs step 1,4) Instantiate VMs Web WebWebWeb AppApp4 Create Application Network Profile 1 DB DB HYPERVISOR HYPERVISOR HYPERVISOR NOVANEUTRON Automatically Push Network Profiles to APIC L/B EPG APP EPG DB F/W L/B EPG WEB Application Network Profile APIC
  • 101. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Hypervisors vs. Linux Containers Hardware Operating System Hypervisor Virtual Machine Operating System Bins / libs App App Virtual Machine Operating System Bins / libs App App Hardware Hypervisor Virtual Machine Operating System Bins / libs App App Virtual Machine Operating System Bins / libs App App Hardware Operating System Container Bins / libs App App Container Bins / libs App App Type 1 Hypervisor Type 2 Hypervisor Linux Containers (LXC) Containers share the OS kernel of the host and thus are lightweight. However, each container must have the same OS kernel. Containers are isolated, but share OS and, where appropriate, libs / bins.
  • 102. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public http://www.cisco.com/c/en/us/solutions/ collateral/data-center-virtualization/application- centric-infrastructure/white-paper- c11-732697.html Docker and ACI
  • 103. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public SECURITY Trusted Zone DB Tier DMZ External Zone APP DBWEB EXTERNAL ACI Policy ACI Policy ACI Policy 103 One Network for Everything - Logical ! ! ! FW ADC Virtual Machines Docker Containers Bare-Metal Server 10 HYPERVISORHYPERVISORHYPERVISOR Application Network Profile
  • 104. Extending ACI into Existing Data Centers Adding Remote Switch Nodes
  • 105. vSwitch Integration of Existing DC Network Assets Extending the ACI Overlay to Existing DC Assets vSwitch vSwitch •  Maintain Existing Physical Network infrastructure and operations •  Extend the ACI policy based forwarding to Hypervisor environment attached to the existing physical network
  • 106. IP Core with a Hardware Directory Service •  Three data plane functions required within the ‘core’ of an ACI fabric •  Transit: IP forwarding of traffic between VTEP’s •  Multicast Root: Root for one of the 16 multicast forwarding topologies (used for optimization of multicast load balancing and forwarding) •  Proxy Lookup: Data Plane based directory for forwarding traffic based on mapping database of EID to VTEP bindings •  Not all functions are required on all ‘spine’ switches Transit Node Proxy Lookup Cached EID Entry Proxy Lookup – Unknown EID Multicast Root
  • 107. ACI Spine Proxy == LISP Proxy Tunnel Router + Map-Server http://tools.ietf.org/html/draft-moreno-lisp-datacenter-deployment-00
  • 108. Direct Attach Endpoints Hypervisor Attached Endpoints (VLAN or VXLAN) vSwitch Extension of the ACI Overlay to remote AVS ACI Extended Overlay – CY15 AVS   ACI VXLAN Extended Overlay Infrastructure VRF Extended AVS   •  ACI Policy overlay can be extended over existing IP networks Full ACI VXLAN Switching Enabled Hypervisor L2 ‘or’ L3 VTEP VTEP VTEP VTEPVTEP VTEP Lets Look at the Details
  • 109. Multicast Support for Overlays Requirement Classic VXLAN ACI Extended Overlay VTEP Discovery Multicast Flood & Learn Control Plane EID to VTEP Binding Discovery Multicast Flood & Learn Control Plane Tenant Broadcast and Multicast Traffic Multicast Multicast •  Multicast provides three functions in an overlay (applies to ‘all’ overlays) •  VTEP Discovery, EID to VTEP Binding Learning, Transport of actual broadcast and multicast traffic •  ACI Extended Overlay leverages control plane for VTEP discovery and Proxy for EID to VTEP Binding Learning •  ACI Extended Overlay leverages •  Native network data plane multicast to support the 3rd case, transport of endpoint broadcast and multicast traffic •  Head end replication for environments that do not have multicast enabled
  • 110. vSwitch Forwarding within the Extended Overlay Adding Remote Leaf Nodes, Nexus 9000 AVS   DVS   VTEP VTEP VTEP VTEP VTEP •  Nexus 9000 as a remote ACI Leaf •  Support for full policy based forwarding, atomic counters, zero touch install, health scores VMVM 10.2.4.710.9.3.37 VM VM 10.2.4.32 VM 10.9.3.89 10.9.3.38 AVS   VTEP AVS   VTEP VM 10.2.4.1910.9.3.123 VM VM 10.2.4.74 VTEP ACI VXLAN Extended Overlay Infrastructure VRF Extended Lets Look at the DetailsVTEP VTEP
  • 111. vSwitch Forwarding within the Extended Overlay Adding Remote Leaf Nodes, Nexus 9000 AVS   DVS   VTEP VTEP VTEP VTEP VTEP •  Nexus 9000 as a remote ACI Leaf •  Support for full policy based forwarding, atomic counters, zero touch install, health scores VMVM 10.2.4.710.9.3.37 VM VM 10.2.4.32 VM 10.9.3.89 10.9.3.38 AVS   VTEP AVS   VTEP VM 10.2.4.1910.9.3.123 VM VM 10.2.4.74 VTEPVTEP VTEP VTEP IP VNID Tenant Packet Group Policy
  • 112. vSwitch Forwarding within the Extended Overlay Adding Remote Leaf Nodes, Nexus 9000 AVS   DVS   VTEP VTEP VTEP VTEP VTEP VMVM 10.2.4.710.9.3.37 VM VM 10.2.4.3 2 VM 10.9.3.89 10.9.3.38 AVS   VTEP AVS   VTEP VM 10.2.4.1910.9.3.123 VM VM 10.2.4.74 VTEP vSwitch •  Nexus 9000 as a remote ACI Leaf will support vSwitch downstream (ESX/DVS, Hyper-V, OVS) •  Leverage Existing Hypervisor implementations VTEPVTEPVTEP VTEP
  • 113. vSwitch Forwarding within the Extended Overlay Adding Remote Leaf Nodes, Nexus 9000 AVS   DVS   VTEP VTEP VTEP VTEP VTEP VMVM 10.2.4.710.9.3.37 VM VM 10.2.4.32 VM 10.9.3.89 10.9.3.38 AVS   VTEP AVS   VTEP VM 10.2.4.1910.9.3.123 VM VM 10.2.4.74 VTEP vSwitch •  ACI 9300 performs both L2 ‘and’ L3’ forwarding (Remote Leaf is a full member of the fabric) •  Remote 9300 Leaf performs full local inter EPG policy forwarding VTEPVTEP VTEP
  • 114. vSwitch Forwarding within the Extended Overlay Adding Remote Leaf Nodes, Nexus 9000 AVS   DVS   VTEP VTEP VTEP VTEP VTEP VMVM 10.2.4.710.9.3.37 VM VM 10.2.4.3 2 VM 10.9.3.89 10.9.3.38 AVS   VTEP AVS   VTEP VM 10.2.4.1910.9.3.123 VM VM 10.2.4.74 VTEP vSwitch Unknown MAC/IP Known MAC/IP (Cache Entry Exists) •  First packet for an ‘unknown’ MAC or IP host address passes through the inline directory •  Subsequent packets are forwarded directly to the target VTEP (local switching) VTEPVTEP VTEP
  • 115. vSwitch Forwarding within the Extended Overlay Adding Remote Leaf Nodes, Nexus 9000 AVS   AVS   VTEP VTEP VTEP VTEPVTEP VTEP VMVM 10.2.4.710.9.3.37 VM VM 10.2.4.32 VM 10.9.3.89 10.9.3.38 AVS   VTEP VM 10.2.4.74 VTEP vSwitch •  ACI services insertion and full L4-L7 policy are supported via the AVS VTEPVTEP VTEP
  • 116. Multi-Site Fabrics •  Host Level Reachability Advertised between Fabrics via BGP •  Transit Network is IP Based •  Host Routes do not need to be advertised into transit network •  Policy Context is carried with packets as they traverse the transit IP Network •  Forwarding between multiple Fabrics is allowed (not limited to two sites) Fabric ‘A’ Fabric ‘B’ Web/App DB Web/App Multi-Site Traffic mBGP - EVPN VTEP IP VNID Tenant Packet Group Policy
  • 117. Applications will spread across existing and new infrastructure vPC vPC vPC Outside (Tenant VRF) App DBWeb QoS Filter QoS Service QoS Filter DB AppWeb Outside (Tenant VRF) QoS Filter QoS Service QoS Filter DB Outside EPG
  • 118. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public IP Enabled Data Center Network AVS   Directory/Proxy Service Nodes AVS   Border Leaves APIC Policy Controller ACI Leaf Nexus 9000 ACI Virtual Leaf (AVS) vSwitch   ACI Services extended in to any existing IP enabled Data Center ACI Policy and Automation Extended to Virtual Servers via Cisco AVS ACI Policy and Automation Extended to Physical and Existing Virtual Servers via Cisco Nexus 9000 ACI Enabled L4-7 Virtual and Physical Services (Support for Existing and New Services Instances) Extending ACI Policy and Automation into the Existing Data Center ACI It’s an ‘IP’ Network
  • 119. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Recommended Readings 119
  • 120. © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public Give us your feedback and receive a Cisco Live 2015 T-Shirt! Complete your Overall Event Survey and 5 Session Evaluations. •  Directly from your mobile device on the Cisco Live Mobile App •  By visiting the Cisco Live Mobile Site http://showcase.genie-connect.com/clmelbourne2015 •  Visit any Cisco Live Internet Station located throughout the venue T-Shirts can be collected in the World of Solutions on Friday 20 March 12:00pm - 2:00pm Complete Your Online Session Evaluation Learn online with Cisco Live! Visit us online after the conference for full access to session videos and presentations. www.CiscoLiveAPAC.com