Chapter 5 Tenant Building Blocks
Chapter 5 Tenant Building Blocks
Home
o Your O'Reilly
Profile
History
Playlists
Highlights
o Answers
o Explore
All Topics
Most Popular Titles
Recommended
Early Releases
Shared Playlists
Resource Centers
o Live Events
All Events
Architectural Katas
AI & ML
Data Sci & Eng
Programming
Infra & Ops
Software Arch
o Interactive
Scenarios
Sandboxes
Jupyter Notebooks
o Certifications
o Settings
o Support
o Newsletters
o Sign Out
CLOSE
CCNP Data Center Application
Centric Infrastructure 300-620 DCACI Official Cert Guideby Ammar
AhmadiPublished by Cisco Press, 2021
1. Cover Page (01:09 mins)
2. About This eBook (01:09 mins)
3. Title Page (01:09 mins)
4. Copyright Page (03:27 mins)
5. About the Author (01:09 mins)
6. About the Technical Reviewers (01:09 mins)
7. Dedication (01:09 mins)
8. Acknowledgments (01:09 mins)
9. Contents at a Glance (01:09 mins)
10. Reader Services (01:09 mins)
11. Contents (13:48 mins)
12. Icons Used in This Book (01:09 mins)
13. Command Syntax Conventions (01:09 mins)
14. Introduction (12:39 mins)
15. Figure Credit (01:09 mins)
16. Part I Introduction to Deployment (01:09 mins)
o Chapter 1 The Big Picture: Why ACI? (32:12 mins)
o Chapter 2 Understanding ACI Hardware and Topologies (42:33 mins)
o Chapter 3 Initializing an ACI Fabric (93:09 mins)
o Chapter 4 Exploring ACI (59:48 mins)
17. Part II ACI Fundamentals (01:09 mins)
o Chapter 5 Tenant Building Blocks (44:51 mins)
o Chapter 6 Access Policies (55:12 mins)
o Chapter 7 Implementing Access Policies (92:00 mins)
o Chapter 8 Implementing Tenant Policies (97:45 mins)
18. Part III External Connectivity (01:09 mins)
o Chapter 9 L3Outs (125:21 mins)
o Chapter 10 Extending Layer 2 Outside ACI (60:57 mins)
19. Part IV Integrations (01:09 mins)
o Chapter 11 Integrating ACI into vSphere Using VDS (54:03 mins)
o Chapter 12 Implementing Service Graphs (69:00 mins)
20. Part V Management and Monitoring (01:09 mins)
o Chapter 13 Implementing Management (35:39 mins)
o Chapter 14 Monitoring ACI Using Syslog and SNMP (51:45 mins)
o Chapter 15 Implementing AAA and RBAC (63:15 mins)
21. Part VI Operations (01:09 mins)
o Chapter 16 ACI Anywhere (26:27 mins)
22. Part VII Final Preparation (01:09 mins)
o Chapter 17 Final Preparation (10:21 mins)
23. Appendix A Answers to the “Do I Know This Already?” Questions (27:36 mins)
24. Appendix B CCNP Data Center Application Centric Infrastructure DCACI 300-620
Exam Updates (02:18 mins)
25. Glossary (23:00 mins)
26. Index (69:00 mins)
27. Appendix C Memory Tables (32:12 mins)
28. Appendix D Memory Tables Answer Key (34:30 mins)
29. Appendix E Study Planner (04:36 mins)
30. Where are the companion content files? - Register (01:09 mins)
31. Inside Front Cover (01:09 mins)
32. Inside Back Cover (01:09 mins)
33. Code Snippets (05:45 mins)
Search in book...
Toggle Font Controls
o
o
o
o
PREV Previous Chapter
Chapter 5
Tenant Building Blocks
FOUNDATION TOPICS
UNDERSTANDING THE BASIC OBJECTS
IN TENANTS
ACI has multiple tenants enabled out of the box. There is little reason not to
deploy multiple user tenants to achieve fault isolation and tighter administrative
control. However, to fully leverage ACI multitenancy, you must first master the
tenant hierarchy.
In true multitenancy environments where roles are heavily delineated, tenant
policies are typically configured by a user who has been assigned either the
tenant-admin role or a role with similar privileges. (For more on implementation
of roles, see Chapter 15, “Implementing AAA and RBAC.”)
Tenants
VRF Instances
black-hole 3 Up --
DCACI:Chapter5 6 Up --
management 2 Up --
overlay-1 4 Up --
Note that the subnet and IP addresses shown in Example 5-1 were not created as
a result of the VRF instance creation process demonstrated in Figure 5-
3 and Figure 5-4.
Application Profiles
An application profile is a container that allows EPGs to be grouped according
to their relationship with one another to simplify configuration and auditing of
relevant policies and to enable a level of policy reuse.
Many modern applications contain multiple components (tiers). For instance, an
e-commerce application could require one or more web servers, backend
database servers, storage, and access to outside resources that enable financial
transactions. In ACI deployments, especially if whitelisting is desired, each one
of these component types (for example, web servers) would be classified into a
separate EPG. An important benefit of organizing interrelated component EPGs
of a multitiered application into an application profile container is that the
allowed communication between these application tiers can then be easily
audited by exploring the resulting application profile topology. Figure 5-5
presents a sample application profile topology comprising a web tier and a
database tier rendered by ACI.
EPGs that are placed in an application profile do not need to be bound to the
same bridge domain. In addition, application profiles are not tied to VRF
instances.
Endpoints that live within a bridge domain subnet need to be associated with an
EPG to be able to forward traffic within ACI. An EPG serves as an endpoint
identity from a policy perspective. EPGs are the point of security policy
enforcement within ACI. Traffic flowing between EPGs can be selectively
filtered through the use of contracts. Policies not necessarily related to security,
such as QoS, can also be applied at the EPG level. If traffic from a set of
endpoints may need to be selectively punted to a firewall or any other stateful
services device, a policy-based redirect (PBR) operation can be applied to the
EPG to bypass the default forwarding rules. In a sense, therefore, EPG
boundaries also have a hand in the application of forwarding policies.
Figure 5-8 demonstrates how ACI decouples policy from forwarding by using
bridge domains as the subnet definition point and EPGs as the policy
application point.
VLAN IDs and VXLAN IDs are forms of encapsulation that ACI uses to
classify Ethernet traffic into EPGs.
Note
A uSeg EPG is a specific type of endpoint group that uses endpoint attributes as opposed
to encapsulations to classify endpoints. For instance, if you wanted to dynamically
classify all virtual machines that run a specific operating system (OS) into an EPG, you
could use uEPGs. Classifying endpoints into uSeg EPGs is particularly useful when
there is a need to leverage endpoint attributes defined outside ACI (for example,
VMware vCenter) to whitelist communication. Use of uSeg EPGs for whitelisting is
called microsegmentation.
Figure 5-17 provides a simple but realistic depiction of a tenant, a VRF
instance, bridge domains, EPGs, and subnets, and it shows how VLAN
encapsulations are used to classify endpoints into a given EPG. The
encapsulation configurations shown are commonly configured within tenants
and at the EPG level. In this case, the tenant administrator has decided to map
the EPG named DNS to port channel 1 on Leaf 101 using the VLAN 101
encapsulation. Likewise, the same encapsulation has been mapped to port 1
(Eth1/1) on Leaf 102 to classify server traffic in VLAN 101 into the DNS EPG.
Encapsulations can also be mapped to virtual port channels.
Figure 5-17 Mapping EPGs to Encapsulations
There is no hard requirement for an EPG to be mapped to a single encapsulation
across all leaf switches within an ACI fabric. However, it is common practice,
and most companies do it to promote standardization.
Note
If you do a cursory review of the ACI GUI, you might wonder why there is a subnet
definition section under the EPG view if bridge domains are the construct that defines
subnets. Although you can define a subnet under an EPG (and definition of subnets
under EPGs is required in some cases), it is still the switch virtual interface (SVI)
associated with the bridge domain and not the EPG that handles routing. Later chapters
expand on this simplistic explanation.
tenant DCACI
exit
bridge-domain BD-CRITICAL-STUFF
exit
application Critical-Application
exit
exit
exit
CONTRACT SECURITY ENFORCEMENT
BASICS
ACI performs whitelisting out of the box. This means that, by default, ACI acts
as a firewall and drops all communication between EPGs unless security rules
(most commonly contracts) are put in place to allow communication.
ACI security policy enforcement generally involves the implementation of
contracts, subjects, and filters.
Contract Direction
Contract Scope
A contract scope is a condition that determines whether a contract can be
enforced between EPGs. Options for contract scope are as follows:
External EPGs
Paragraph Defines and provides a sample use case for intra-EPG isolation
Support
Sign Out
© 2021 O'Reilly Media, Inc. Terms of Service / Privacy Policy