Introduction |
|
xxv | |
|
Part I Introduction to Deployment |
|
|
|
Chapter 1 The Big Picture: Why ACI? |
|
|
2 | (16) |
|
"Do I Know This Already?" Quiz |
|
|
2 | (2) |
|
|
4 | (1) |
|
Understanding the Shortcomings of Traditional Networks |
|
|
4 | (5) |
|
|
4 | (1) |
|
|
5 | (3) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
Recognizing the Benefits of Cisco ACI |
|
|
9 | (7) |
|
Network Management Touchpoints |
|
|
9 | (1) |
|
Traffic Flow Optimizations |
|
|
10 | (1) |
|
Scalability Optimizations |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (3) |
|
|
14 | (1) |
|
Cross-Platform Integrations |
|
|
15 | (1) |
|
New Architectural Possibilities |
|
|
15 | (1) |
|
Integrated Health Monitoring and Enhanced Visibility |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
16 | (1) |
|
Complete Tables and Lists from Memory |
|
|
17 | (1) |
|
|
17 | (1) |
|
Chapter 2 Understanding ACI Hardware and Topologies |
|
|
18 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
18 | (3) |
|
|
21 | (1) |
|
ACI Topologies and Components |
|
|
21 | (11) |
|
|
21 | (1) |
|
|
22 | (2) |
|
ACI Stretched Fabric Topology |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (2) |
|
ACI Multi-Tier Architecture |
|
|
28 | (2) |
|
|
30 | (2) |
|
|
32 | (4) |
|
APIC Cluster Scalability and Sizing |
|
|
33 | (3) |
|
|
36 | (2) |
|
First-Generation Spine Switches |
|
|
37 | (1) |
|
Second-Generation Spine Switches |
|
|
37 | (1) |
|
|
38 | (3) |
|
First-Generation Leaf Switches |
|
|
38 | (1) |
|
Second-Generation Leaf Switches |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
41 | (1) |
|
Complete Tables and Lists from Memory |
|
|
41 | (1) |
|
|
41 | (1) |
|
Chapter 3 Initializing an ACI Fabric |
|
|
42 | (54) |
|
"Do I Know This Already?" Quiz |
|
|
42 | (2) |
|
|
44 | (1) |
|
Understanding ACI Fabric Initialization |
|
|
44 | (8) |
|
Planning Fabric Initialization |
|
|
45 | (1) |
|
Understanding Cabling Requirements |
|
|
45 | (1) |
|
Connecting APICs to the Fabric |
|
|
46 | (1) |
|
Initial Configuration of APICs |
|
|
47 | (1) |
|
APIC OOB Configuration Requirements |
|
|
47 | (1) |
|
Out-of-Band Versus In-Band Management |
|
|
48 | (1) |
|
Configuration Information for Fabric Initialization |
|
|
48 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
51 | (1) |
|
Initializing an ACI Fabric |
|
|
52 | (11) |
|
Changing the APIC BIOS Password |
|
|
52 | (1) |
|
Configuring the APIC Cisco IMC |
|
|
52 | (1) |
|
Initializing the First APIC |
|
|
53 | (2) |
|
Discovering and Activating Switches |
|
|
55 | (3) |
|
Understanding Graceful Insertion and Removal (GIR) |
|
|
58 | (1) |
|
Initializing Subsequent APICs |
|
|
59 | (1) |
|
Understanding Connectivity Following Switch Initialization |
|
|
59 | (4) |
|
Basic Post-Initialization Tasks |
|
|
63 | (30) |
|
Assigning Static Out-of-Band Addresses to Switches and APICs |
|
|
63 | (1) |
|
Applying a Default Contract to Out-of-Band Subnet |
|
|
64 | (2) |
|
|
66 | (7) |
|
|
73 | (1) |
|
Enabling Automatic Upgrades of New Switches |
|
|
74 | (1) |
|
Understanding Backups and Restores in ACI |
|
|
75 | (1) |
|
Making On-Demand Backups in ACI |
|
|
76 | (3) |
|
Making Scheduled Backups in ACI |
|
|
79 | (1) |
|
Taking Configuration Snapshots in ACI |
|
|
80 | (1) |
|
Importing Configuration Backups from Remote Servers |
|
|
80 | (2) |
|
Executing Configuration Rollbacks |
|
|
82 | (1) |
|
|
83 | (1) |
|
Configuring Network Time Protocol (NTP) Synchronization |
|
|
84 | (6) |
|
Configuring DNS Servers for Lookups |
|
|
90 | (2) |
|
Verifying COOP Group Configurations |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
Complete Tables and Lists from Memory |
|
|
94 | (1) |
|
|
94 | (2) |
|
|
96 | (34) |
|
"Do I Know This Already?" Quiz |
|
|
96 | (2) |
|
|
98 | (1) |
|
|
98 | (7) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (2) |
|
|
102 | (1) |
|
|
103 | (1) |
|
Management Access Modifications |
|
|
103 | (2) |
|
Understanding the ACI Object Model |
|
|
105 | (5) |
|
Learning ACI Through the Graphical User Interface |
|
|
107 | (1) |
|
Exploring the Object Hierarchy by Using Visore |
|
|
108 | (2) |
|
Why Understand Object Hierarchy Basics for DCACI? |
|
|
110 | (1) |
|
|
110 | (1) |
|
Integrated Health Monitoring and Enhanced Visibility |
|
|
110 | (18) |
|
|
111 | (2) |
|
|
113 | (2) |
|
|
115 | (1) |
|
Faults in the Object Model |
|
|
116 | (2) |
|
Monitoring Policies in ACI |
|
|
118 | (2) |
|
Customizing Fault Management Policies |
|
|
120 | (1) |
|
Squelching Faults and Changing Fault Severity |
|
|
121 | (3) |
|
Understanding Health Scores |
|
|
124 | (2) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
128 | (1) |
|
Complete Tables and Lists from Memory |
|
|
129 | (1) |
|
|
129 | (1) |
|
|
|
Chapter 5 Tenant Building Blocks |
|
|
130 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
130 | (2) |
|
|
132 | (1) |
|
Understanding the Basic Objects in Tenants |
|
|
132 | (16) |
|
|
133 | (1) |
|
Predefined Tenants in ACI |
|
|
134 | (1) |
|
|
135 | (2) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (1) |
|
The Pain of Designing Around Subnet Boundaries |
|
|
139 | (2) |
|
|
141 | (1) |
|
Configuring Bridge Domains, Application Profiles, and EPGs |
|
|
142 | (4) |
|
Classifying Endpoints into EPGs |
|
|
146 | (1) |
|
APIC CLI Configuration of Tenant Objects |
|
|
147 | (1) |
|
Contract Security Enforcement Basics |
|
|
148 | (3) |
|
Contracts, Subjects, and Filters |
|
|
148 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
Zero-Trust Using EPGs and Contracts |
|
|
151 | (1) |
|
Objects Enabling Connectivity Outside the Fabric |
|
|
151 | (2) |
|
|
151 | (2) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
Complete Tables and Lists from Memory |
|
|
154 | (1) |
|
|
154 | (2) |
|
Chapter 6 Access Policies |
|
|
156 | (30) |
|
"Do I Know This Already?" Quiz |
|
|
156 | (2) |
|
|
158 | (1) |
|
Pools, Domains, and AAEPs |
|
|
158 | (11) |
|
|
159 | (1) |
|
|
160 | (1) |
|
Common Designs for VLAN Pools and Domains |
|
|
161 | (3) |
|
Challenges with Overlap Between VLAN Pools |
|
|
164 | (1) |
|
Attachable Access Entity Profiles (AAEPs) |
|
|
165 | (4) |
|
Policies and Policy Groups |
|
|
169 | (7) |
|
Interface Policies and Interface Policy Groups |
|
|
169 | (4) |
|
Planning Deployment of Interface Policies |
|
|
173 | (1) |
|
Switch Policies and Switch Policy Groups |
|
|
174 | (2) |
|
|
176 | (7) |
|
Configuring Switch Profiles and Interface Profiles |
|
|
179 | (3) |
|
Stateless Networking in ACI |
|
|
182 | (1) |
|
|
183 | (1) |
|
Access Policies Hierarchy in Review |
|
|
183 | (1) |
|
Access Policies and Tenancy in Review |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
Complete Tables and Lists from Memory |
|
|
185 | (1) |
|
|
185 | (1) |
|
Chapter 7 Implementing Access Policies |
|
|
186 | (52) |
|
"Do I Know This Already?" Quiz |
|
|
186 | (2) |
|
|
188 | (1) |
|
Configuring ACI Switch Ports |
|
|
188 | (23) |
|
Configuring Individual Ports |
|
|
188 | (8) |
|
Configuring Port Channels |
|
|
196 | (5) |
|
Configuring Virtual Port Channel (vPC) Domains |
|
|
201 | (3) |
|
Configuring Virtual Port Channels |
|
|
204 | (4) |
|
Configuring Ports Using AAEP EPGs |
|
|
208 | (2) |
|
Implications of Initial Access Policy Design on Capabilities |
|
|
210 | (1) |
|
Configuring Access Policies Using Quick Start Wizards |
|
|
211 | (1) |
|
The Configure Interface, PC, and VPC Wizard |
|
|
211 | (1) |
|
The Configure Interface Wizard |
|
|
211 | (1) |
|
Additional Access Policy Configurations |
|
|
212 | (23) |
|
Configuring Fabric Extenders |
|
|
212 | (3) |
|
Configuring Dynamic Breakout Ports |
|
|
215 | (2) |
|
Configuring Global QoS Class Settings |
|
|
217 | (2) |
|
|
219 | (2) |
|
|
221 | (2) |
|
Configuring Storm Control |
|
|
223 | (2) |
|
|
225 | (5) |
|
Modifying BPDU Guard and BPDU Filter Settings |
|
|
230 | (1) |
|
Modifying the Error Disabled Recovery Policy |
|
|
231 | (1) |
|
Configuring Leaf Interface Overrides |
|
|
232 | (1) |
|
Configuring Port Channel Member Overrides |
|
|
232 | (3) |
|
|
235 | (1) |
|
|
235 | (1) |
|
Complete Tables and Lists from Memory |
|
|
236 | (1) |
|
|
236 | (2) |
|
Chapter 8 Implementing Tenant Policies |
|
|
238 | (50) |
|
"Do I Know This Already?" Quiz |
|
|
238 | (3) |
|
|
241 | (1) |
|
|
241 | (10) |
|
|
241 | (1) |
|
Local Endpoints and Remote Endpoints |
|
|
242 | (1) |
|
Understanding Local Endpoint Learning |
|
|
243 | (1) |
|
Unicast Routing and Its Impact on Endpoint Learning |
|
|
243 | (1) |
|
Understanding Remote Endpoint Learning |
|
|
244 | (1) |
|
Understanding the Use of VLAN IDs and VNIDs in ACI |
|
|
245 | (2) |
|
Endpoint Movements Within an ACI Fabric |
|
|
247 | (1) |
|
Understanding Hardware Proxy and Spine Proxy |
|
|
247 | (1) |
|
Endpoint Learning Considerations for Silent Hosts |
|
|
248 | (1) |
|
Where Data Plane IP Learning Breaks Down |
|
|
249 | (1) |
|
Endpoint Learning on L30uts |
|
|
249 | (1) |
|
Limiting IP Learning to a Subnet |
|
|
249 | (1) |
|
Understanding Enforce Subnet Check |
|
|
250 | (1) |
|
Disabling Data Plane Endpoint Learning on a Bridge Domain |
|
|
250 | (1) |
|
Disabling IP Data Plane Learning at the VRF Level |
|
|
251 | (1) |
|
|
251 | (12) |
|
Forwarding Scenario 1: Both Endpoints Attach to the Same Leaf |
|
|
251 | (1) |
|
Understanding Pervasive Gateways |
|
|
252 | (2) |
|
Forwarding Scenario 2: Known Destination Behind Another Leaf |
|
|
254 | (1) |
|
Verifying the Traffic Path Between Known Endpoints |
|
|
254 | (2) |
|
Understanding Learning and Forwarding for vPCs |
|
|
256 | (2) |
|
Forwarding Scenario 3: Spine Proxy to Unknown Destination |
|
|
258 | (3) |
|
Forwarding Scenario 4: Flooding to Unknown Destination |
|
|
261 | (1) |
|
Understanding ARP Flooding |
|
|
262 | (1) |
|
Deploying a Multi-Tier Application |
|
|
263 | (9) |
|
Configuring Application Profiles, BDs, and EPGs |
|
|
264 | (3) |
|
Assigning Domains to EPGs |
|
|
267 | (1) |
|
Policy Deployment Following BD and EPG Setup |
|
|
267 | (1) |
|
Mapping EPGs to Ports Using Static Bindings |
|
|
267 | (2) |
|
Verifying EPG-to-Port Assignments |
|
|
269 | (1) |
|
Policy Deployment Following EPG-to-Port Assignment |
|
|
270 | (1) |
|
Mapping an EPG to All Ports on a Leaf |
|
|
270 | (1) |
|
Enabling DHCP Relay for a Bridge Domain |
|
|
271 | (1) |
|
Whitelisting Intra-VRF Communications via Contracts |
|
|
272 | (13) |
|
Planning Contract Enforcement |
|
|
272 | (1) |
|
Configuring Filters for Bidirectional Application |
|
|
273 | (2) |
|
Configuring Subjects for Bidirectional Application of Filters |
|
|
275 | (2) |
|
Understanding Apply Both Directions and Reverse Filter Ports |
|
|
277 | (1) |
|
Verifying Subject Allocation to a Contract |
|
|
278 | (1) |
|
Assigning Contracts to EPGs |
|
|
278 | (1) |
|
Understanding the TCP Established Session Rule |
|
|
279 | (1) |
|
Creating Filters for Unidirectional Application |
|
|
280 | (1) |
|
Configuring Subjects for Unidirectional Application of Filters |
|
|
280 | (2) |
|
Additional Whitelisting Examples |
|
|
282 | (1) |
|
Verifying Contract Enforcement |
|
|
283 | (1) |
|
Understanding the Stateful Checkbox in Filter Entries |
|
|
284 | (1) |
|
Contract Scopes in Review |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
285 | (2) |
|
Complete Tables and Lists from Memory |
|
|
287 | (1) |
|
|
287 | (1) |
|
Part III External Connectivity |
|
|
|
|
288 | (70) |
|
"Do I Know This Already?" Quiz |
|
|
288 | (3) |
|
|
291 | (1) |
|
|
291 | (16) |
|
Stub Network and Transit Routing |
|
|
291 | (1) |
|
|
292 | (1) |
|
Key Functions of an L30ut |
|
|
293 | (1) |
|
|
293 | (2) |
|
Planning Deployment of L30ut Node and Interface Profiles |
|
|
295 | (1) |
|
Understanding L30ut Interface Types |
|
|
296 | (1) |
|
Understanding L30ut Bridge Domains |
|
|
296 | (2) |
|
Understanding SVI Encap Scope |
|
|
298 | (1) |
|
Understanding SVI Auto State |
|
|
299 | (2) |
|
Understanding Prerequisites for Deployment of L30uts |
|
|
301 | (1) |
|
L3 Domain Implementation Examples |
|
|
301 | (2) |
|
Understanding the Need for BGP Route Reflection |
|
|
303 | (1) |
|
Implementing BGP Route Reflectors |
|
|
304 | (1) |
|
Understanding Infra MP-BGP Route Distribution |
|
|
305 | (2) |
|
|
307 | (37) |
|
Configuring an L30ut for EIGRP Peering |
|
|
307 | (3) |
|
|
310 | (2) |
|
Verifying Forwarding Out an L30ut |
|
|
312 | (2) |
|
Advertising Subnets Assigned to Bridge Domains via an L30ut |
|
|
314 | (2) |
|
Enabling Communications over L30uts Using Contracts |
|
|
316 | (2) |
|
Deploying a Blacklist EPG with Logging |
|
|
318 | (3) |
|
Advertising Host Routes Out an ACI Fabric |
|
|
321 | (1) |
|
Implementing BFD on an EIGRP L30ut |
|
|
321 | (3) |
|
Configuring Authentication for EIGRP |
|
|
324 | (1) |
|
EIGRP Customizations Applied at the VRF Level |
|
|
324 | (1) |
|
Configuring an L30ut for OSPF Peering |
|
|
325 | (3) |
|
A Route Advertisement Problem for OSPF and EIGRP L30uts |
|
|
328 | (1) |
|
Implementing BFD on an OSPF L30ut |
|
|
328 | (1) |
|
OSPF Customizations Applied at the VRF Level |
|
|
329 | (1) |
|
Adding Static Routes on an L30ut |
|
|
329 | (1) |
|
Implementing IP SLA Tracking for Static Routes |
|
|
330 | (4) |
|
Configuring an L30ut for BGP Peering |
|
|
334 | (3) |
|
Implementing BGP Customizations at the Node Level |
|
|
337 | (2) |
|
Implementing Per-Neighbor BGP Customizations |
|
|
339 | (2) |
|
Implementing BFD on a BGP L30ut |
|
|
341 | (1) |
|
Implementing BGP Customizations at the VRF Level |
|
|
342 | (1) |
|
Implementing OSPF for IP Reachability on a BGP L30ut |
|
|
343 | (1) |
|
Implementing Hot Standby Router Protocol (HSRP) |
|
|
344 | (1) |
|
|
344 | (1) |
|
Implementing Route Control |
|
|
344 | (9) |
|
|
344 | (2) |
|
Modifying Route Attributes to All Peers Behind an L30ut |
|
|
346 | (3) |
|
Modifying Route Attributes to a Specific Peer Behind an L30ut |
|
|
349 | (2) |
|
Assigning Different Policies to Routes at the L30ut Level |
|
|
351 | (1) |
|
Configuring Inbound Route Filtering in ACI |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
353 | (3) |
|
Complete Tables and Lists from Memory |
|
|
356 | (1) |
|
|
356 | (2) |
|
Chapter 10 Extending Layer 2 Outside ACI |
|
|
358 | (34) |
|
"Do I Know This Already?" Quiz |
|
|
358 | (3) |
|
|
361 | (1) |
|
Understanding Network Migrations into ACI |
|
|
361 | (11) |
|
Understanding Network-Centric Deployments |
|
|
361 | (1) |
|
Understanding Full-Mesh Network-Centric Contracts |
|
|
362 | (2) |
|
|
364 | (1) |
|
Understanding Preferred Group Members |
|
|
365 | (2) |
|
Disabling Contract Enforcement at the VRF Instance Level |
|
|
367 | (1) |
|
Flooding Requirements for L2 Extension to Outside Switches |
|
|
368 | (2) |
|
Understanding GARP-Based Detection |
|
|
370 | (1) |
|
Understanding Legacy Mode |
|
|
371 | (1) |
|
Endpoint Learning Considerations for Layer 2 Extension |
|
|
371 | (1) |
|
Preparing for Network-Centric Migrations |
|
|
372 | (1) |
|
Implementing Layer 2 Connectivity to Non-ACI Switches |
|
|
372 | (14) |
|
Understanding EPG Extensions |
|
|
372 | (2) |
|
Understanding Bridge Domain Extensions |
|
|
374 | (1) |
|
Comparing EPG Extensions and BD Extensions |
|
|
374 | (1) |
|
Implementing EPG Extensions |
|
|
375 | (5) |
|
|
380 | (5) |
|
Migrating Overlapping VLANs into ACI |
|
|
385 | (1) |
|
Understanding ACI Interaction with Spanning Tree Protocol |
|
|
386 | (3) |
|
Remediating Against Excessive Spanning Tree Protocol TCNs |
|
|
386 | (1) |
|
Configuring MST Instance Mappings in ACI |
|
|
387 | (1) |
|
Understanding Spanning Tree Protocol Link Types |
|
|
388 | (1) |
|
Using MCP to Detect Layer 2 Loops |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (1) |
|
Complete Tables and Lists from Memory |
|
|
390 | (1) |
|
|
390 | (2) |
|
|
|
Chapter 11 Integrating ACI into vSphere Using VDS |
|
|
392 | (32) |
|
"Do I Know This Already?" Quiz |
|
|
392 | (2) |
|
|
394 | (1) |
|
Understanding Networking in VMware vSphere |
|
|
394 | (9) |
|
Understanding vSphere Standard Switches |
|
|
395 | (2) |
|
Understanding vSphere Distributed Switches |
|
|
397 | (1) |
|
Understanding vSphere System Traffic |
|
|
397 | (2) |
|
Impact of vCenter Failure on Production Traffic |
|
|
399 | (1) |
|
Understanding Port Bindings in vSphere |
|
|
400 | (1) |
|
Understanding Teaming and Failover Policies |
|
|
400 | (3) |
|
Understanding VMM Integration |
|
|
403 | (4) |
|
Planning vCenter VMM Integrations |
|
|
403 | (2) |
|
What Happens After VDS Deployment? |
|
|
405 | (1) |
|
Understanding Immediacy Settings |
|
|
405 | (2) |
|
Connecting ESXi Servers to the Fabric |
|
|
407 | (1) |
|
Configuring Connectivity to ESXi in UCS Domains |
|
|
407 | (1) |
|
Integrating ACI into vSphere Using VDS |
|
|
407 | (15) |
|
Prerequisites for VMM Integration with vSphere VDS |
|
|
408 | (1) |
|
Configuring a VMM Domain Profile |
|
|
408 | (3) |
|
Adding ESXi Hosts to a VDS |
|
|
411 | (4) |
|
Pushing EPGs to vCenter as Distributed Port Groups |
|
|
415 | (2) |
|
Assigning VMs to Distributed Port Groups |
|
|
417 | (1) |
|
Less Common VMM Domain Association Settings |
|
|
418 | (1) |
|
Enhanced LACP Policy Support |
|
|
419 | (3) |
|
|
422 | (1) |
|
|
422 | (1) |
|
Complete Tables and Lists from Memory |
|
|
423 | (1) |
|
|
423 | (1) |
|
Chapter 12 Implementing Service Graphs |
|
|
424 | (38) |
|
"Do I Know This Already?" Quiz |
|
|
424 | (2) |
|
|
426 | (1) |
|
Service Graph Fundamentals |
|
|
426 | (15) |
|
Service Graphs as Concatenation of Functions |
|
|
427 | (1) |
|
Service Graph Management Models |
|
|
428 | (1) |
|
Understanding Network Policy Mode |
|
|
428 | (2) |
|
Understanding Service Policy Mode |
|
|
430 | (2) |
|
Understanding Service Manager Mode |
|
|
432 | (2) |
|
When to Use Service Graphs |
|
|
434 | (1) |
|
Choosing an L4-L7 Services Integration Method |
|
|
435 | (1) |
|
Understanding Deployment Modes and the Number of BDs Required |
|
|
435 | (1) |
|
Deploying Service Graphs for Devices in GoTo Mode |
|
|
436 | (1) |
|
Deploying Service Graphs for Devices in GoThrough Mode |
|
|
437 | (1) |
|
Deploying Service Graphs for One-Arm Load Balancers |
|
|
437 | (1) |
|
Understanding Route Peering |
|
|
438 | (1) |
|
Understanding Dynamic Endpoint Attach |
|
|
439 | (1) |
|
Understanding Bridge Domain Settings for Service Graphs |
|
|
439 | (1) |
|
Understanding Service Graph Rendering |
|
|
440 | (1) |
|
Service Graph Implementation Workflow |
|
|
441 | (6) |
|
Importing Device Packages |
|
|
441 | (2) |
|
Identifying L4-L7 Devices to the Fabric |
|
|
443 | (1) |
|
Creating Custom Function Profiles |
|
|
444 | (1) |
|
Configuring a Service Graph Template |
|
|
445 | (1) |
|
Configuring Device Selection Policies |
|
|
446 | (1) |
|
Applying a Service Graph Template |
|
|
446 | (1) |
|
Configuring Additional Service Graph Parameters |
|
|
447 | (1) |
|
Monitoring Service Graphs and Devices |
|
|
447 | (1) |
|
Service Graph Implementation Examples |
|
|
447 | (13) |
|
Deploying an Unmanaged Firewall Pair in a Service Graph |
|
|
447 | (6) |
|
Deploying Service Graphs for a Firewall in Managed Mode |
|
|
453 | (7) |
|
|
460 | (1) |
|
|
460 | (1) |
|
Complete Tables and Lists from Memory |
|
|
461 | (1) |
|
|
461 | (1) |
|
Part V Management and Monitoring |
|
|
|
Chapter 13 Implementing Management |
|
|
462 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
462 | (2) |
|
|
464 | (1) |
|
Configuring Management in ACI |
|
|
464 | (17) |
|
Understanding Out-of-Band Management Connectivity |
|
|
464 | (1) |
|
Understanding In-Band Management Connectivity |
|
|
465 | (2) |
|
Deploying In-Band and OOB Management Side by Side |
|
|
467 | (1) |
|
Configuring In-Band Management |
|
|
467 | (1) |
|
Configuring Access Policies for APIC In-Band Interfaces |
|
|
468 | (1) |
|
Configuring the In-Band Management Bridge Domain |
|
|
469 | (1) |
|
Configuring In-Band Management IP Addressing |
|
|
470 | (4) |
|
Optionally Extending the In-Band Network Out of the Fabric |
|
|
474 | (2) |
|
Optionally Setting Up Additional Connectivity |
|
|
476 | (1) |
|
Whitelisting Desired Connectivity to and from an In-Band EPG |
|
|
476 | (2) |
|
Evaluating APIC Connectivity Preferences |
|
|
478 | (1) |
|
Out-of-Band Management Contracts in Review |
|
|
479 | (2) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
|
481 | (1) |
|
Chapter 14 Monitoring ACI Using Syslog and SNMP |
|
|
482 | (32) |
|
"Do I Know This Already?" Quiz |
|
|
482 | (3) |
|
|
485 | (1) |
|
Understanding System Messages |
|
|
485 | (2) |
|
Forwarding System Messages to Syslog Servers |
|
|
487 | (13) |
|
Apply Necessary Contracts to Allow Syslog Forwarding |
|
|
487 | (5) |
|
Configuring Syslog Monitoring Destination Groups |
|
|
492 | (2) |
|
Configuring Syslog Sources for Desired Monitoring Policies |
|
|
494 | (4) |
|
Verify Syslog Forwarding to Desired Syslog Servers |
|
|
498 | (2) |
|
|
500 | (2) |
|
|
501 | (1) |
|
ACI SNMP Configuration Caveats |
|
|
502 | (1) |
|
|
502 | (9) |
|
Apply Necessary Contracts for SNMP |
|
|
503 | (1) |
|
Associate an SNMP Policy with a Pod Policy |
|
|
504 | (2) |
|
Associate SNMP Contexts with Desired VRF Instances |
|
|
506 | (1) |
|
Configure SNMP Monitoring Destination Groups |
|
|
507 | (1) |
|
Configure SNMP Sources for All Desired Monitoring Policies |
|
|
508 | (1) |
|
Verify SNMP Forwarding to Desired SNMP Servers |
|
|
509 | (2) |
|
|
511 | (1) |
|
|
511 | (1) |
|
Complete Tables and Lists from Memory |
|
|
512 | (1) |
|
|
512 | (2) |
|
Chapter 15 Implementing AAA and RBAC |
|
|
514 | (38) |
|
"Do I Know This Already?" Quiz |
|
|
514 | (2) |
|
|
516 | (1) |
|
Implementing Role-Based Access Control (RBAC) |
|
|
516 | (16) |
|
Understanding Security Domains |
|
|
517 | (2) |
|
Understanding Privileges and Roles |
|
|
519 | (2) |
|
Creating Local Users and Assigning Access |
|
|
521 | (4) |
|
Tweaking Roles and User Access |
|
|
525 | (3) |
|
|
528 | (3) |
|
|
531 | (1) |
|
Integrating with External AAA Servers |
|
|
532 | (18) |
|
Configuring ACI for TACACS+ |
|
|
532 | (4) |
|
Configuring ISE to Authenticate and Authorize Users for ACI |
|
|
536 | (2) |
|
Expected Cisco AV Pair Formatting for ACI |
|
|
538 | (2) |
|
Configuring ACI for RADIUS |
|
|
540 | (1) |
|
|
541 | (6) |
|
AAA Authentication Policy Settings |
|
|
547 | (3) |
|
Regaining Access to the Fabric via Fallback Domain |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
550 | (1) |
|
Complete Tables and Lists from Memory |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
|
|
552 | (14) |
|
"Do I Know This Already?" Quiz |
|
|
552 | (3) |
|
|
555 | (1) |
|
ACI Multi-Site Fundamentals |
|
|
555 | (3) |
|
Interconnecting ACI Fabrics with ACI Multi-Site |
|
|
555 | (2) |
|
New ACI Multi-Site Constructs and Configuration Concepts |
|
|
557 | (1) |
|
Locally Governed Versus MSO-Governed Configurations |
|
|
557 | (1) |
|
Schemas and Templates in Practice |
|
|
557 | (1) |
|
Building Primary and Disaster Recovery Data Centers with ACI |
|
|
558 | (4) |
|
Centralized Orchestration and Management of Multiple Fabrics |
|
|
559 | (1) |
|
Tweaking Broadcast and Stretch Settings on a Per-BD Basis |
|
|
560 | (1) |
|
Cross-Data Center Ingress Routing Optimizations |
|
|
561 | (1) |
|
Simultaneous or Independent Policy Deployment to Sites |
|
|
561 | (1) |
|
Building Active/Active Data Centers with ACI |
|
|
562 | (2) |
|
VMM Integrations Applicable to Multiple Data Centers |
|
|
563 | (1) |
|
Stateful-Services Integration in ACI Multi-Pod and Multi-Site |
|
|
563 | (1) |
|
Extending ACI to Remote Locations and Public Clouds |
|
|
564 | (1) |
|
Extending ACI into Public Clouds with ACI Multi-Site |
|
|
564 | (1) |
|
Extending ACI into Bare-Metal Clouds with vPod |
|
|
564 | (1) |
|
Integrating Remote Sites into ACI Using Remote Leaf Switches |
|
|
564 | (1) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
565 | (1) |
|
|
565 | (1) |
|
Part VII Final Preparation |
|
|
|
Chapter 17 Final Preparation |
|
|
566 | (6) |
|
|
566 | (1) |
|
Tools for Final Preparation |
|
|
567 | (3) |
|
Pearson Cert Practice Test Engine and Questions on the Website |
|
|
567 | (1) |
|
Accessing the Pearson Test Prep Software Online |
|
|
567 | (1) |
|
Accessing the Pearson Test Prep Software Offline |
|
|
568 | (1) |
|
|
568 | (1) |
|
|
569 | (1) |
|
|
569 | (1) |
|
Suggested Plan for Final Review/Study |
|
|
570 | (1) |
|
|
570 | (2) |
Appendix A Answers to the "Do I Know This Already?" Questions |
|
572 | (14) |
Appendix B CCNP Data Center Application Centric Infrastructure DCACI 300-620 Exam Updates |
|
586 | (3) |
Glossary |
|
589 | (13) |
Index |
|
602 | |