Chapter 1 - Introducing Cisco ACI Fabric Infrastructure and Basic Concepts
Chapter 1 - Introducing Cisco ACI Fabric Infrastructure and Basic Concepts
More Secure
• From security perspective, in a traditional network device, you usually allow all the traffic by default, or you explicitly configure
the device to block the traffic. However, in Cisco ACI, an allow list model is used. By default, everything is blocked, unless you
explicitly allow the traffic.
Cisco ACI vs Traditional Network
Centralized Management
• Instead of using SSH to each and every device to configure and build the Cisco ACI fabric there is a centralized controller called
APIC.
• In Cisco ACI, there are typically three Cisco APIC controllers, and they form an APIC cluster. If you lose one of them, you can
still change and add new configurations through the remaining two controllers.
• Another very important point in the Cisco APIC is that it enables access via Cisco API.
Cisco ACI Topology and Hardware
Cisco ACI vs Traditional Network
Topology Simplicity
• In the Cisco ACI, a spine-leaf topology is used . There is no leaf-to-leaf and no spine-to-spine connectivity.
• The physical devices that are used in Cisco ACI Fabric are Cisco Nexus 9000 switches. ACI operating system Not NXOS
Cisco ACI fabric
The Cisco ACI fabric is composed of the Cisco APIC and the Cisco Nexus 9000 Series spine and leaf switches.
The leaf switches are connected to the spine switches, but never to each other. The spine switches are attached
only to the leaf switches. The Cisco APIC and all other endpoints and devices in the data center are connected to
the leaf switches only as seen from the following figure.
Spine-Leaf Topology Benefits
The fabric applies a densely tuned Intermediate System-to-Intermediate System (IS-IS) environment utilizing Level
1 connections within the topology for advertising loopback addresses. Loopback addresses are the Virtual Extensible LAN
(VXLAN) Tunnel Endpoints (TEPs) that are used in the integrated overlay and advertised to all other nodes
in the fabric for overlay tunnel use.
IS-IS is responsible for infrastructure connectivity in Cisco ACI:
IS-IS provides IP reachability among TEP addresses
Automatically deployed, no user intervention is required
No IS-IS knowledge is required
Main components of Cisco ACI:
• Spine Switches
5. Unified point of policy enforcement, health monitoring, and management for the Cisco ACI fabric
6. Not involved in data plane forwarding
Cisco ACI Fabric
• APIC Controller
• Minimum of 3 clusters
• Can scale up to 7 Cluster
• Odd number of Nodes only allowed on
Cluster ,3,5,7
• Should be Connected to Leaf APIC
App DB
Server Server
• Spine Leaf Underlay
• IS-IS
• Advertise VTEP Addresses
• The leaves and spines will exchange IS-IS routing
• Equal Cost Multipath.
• COOP Spine
• Each Leaf store Full ARP Entry into local station Table
40 Gbps
• Leaf will reports this information to one of the spine
QSFP
switches (chosen at random) using the
Council Of Oracles Protocol (COOP).
Leaf
• Spine will relay ARP information to other spines switches to
be stored at (Global Station Table)
MP-BGP
• Required for outside the fabric L3 Connectivity
APIC
App DB
Server Server
ACI APIC
• APIC
Cisco APIC is a policy controller. It relays the intended state of the policy to the fabric. The APIC does not represent
the control plane and does not sit in the traffic path. The hardware consists of a cluster of three or more servers in a
highly redundant array
10 Gbps
• APIC
• Cisco APIC is redundant on multiple levels, including interface-level and cluster-level.
• Cisco APICs use a bonded interface that is typically dual-homed to two leaf switches for connectivity to the Cisco ACI fabric, and
have the ability to use a bonded interface that can be dual-homed to the out-of-band management network. There are two bond
interfaces:
1. Bond0 is used to connect to the fabric itself (to connect to leaf switches that connect into the fabric). It is recommended to
connect two fabric uplinks, each to a separate leaf and/or vPC Leaf pairs.
2. Bond1 is used to connect to the out-of-band (OOB) segment (that allows setup of the APIC itself).
Cisco APIC Cluster
• Cisco APIC is deployed in a cluster with a minimum of three controllers
• The APIC cluster uses a large database technology called sharding. The APIC configuration database is partitioned into logically
bounded subsets, called shards, and each shard has three replicas. The shards are evenly distributed across the APICs.
Cisco Nexus 9000 Series Hardware
Several Cisco Nexus 9300 models can be deployed as Cisco ACI spine switches:
Cisco Nexus 9364C (64x 100/40GE)
Cisco Nexus 9332C (32x 100/40GE)
Cisco Nexus 9336PQ (36x 40GE)
Cisco Nexus 9316D-GX (16x 400GE)
Cisco Nexus 9300 ACI Fixed Spine Switches
Fabric Discovery
• LLDP is used to Discover Leaf (Neighbor Discovery)
• DHCP is used to assign IP Address for VTEP
• IFM messages used as heartbeat and for policy pushing
• IS-IS is automatically starts to create VTEP adjacency. Spine
40 Gbps
QSFP
Leaf
10 Gbps
Access policies configure external-facing interfaces that connect to devices such as hypervisors,
hosts, network attached storage, routers, or FEX interfaces. Access policies enable the configuration of
port channels and virtual port channels, protocols such asLink Layer Discovery Protocol (LLDP),
Cisco Discovery Protocol (CDP),or Link Aggregation Control Protocol (LACP), and features such
as statistics gathering, monitoring, and diagnostics.
Cisco ACI Access Policies
Interface policies dictate interface behavior, and are later tied to interface policy groups
that bundles sets of interface policies as a template. For example, there should be a policy
that dictates if the Cisco Discovery Protocol is disabled or enabled.
Examples of the protocols that can be configured are:
• Link-Level
• LLDP
• Cisco Discovery Protocol
• LACP
• NetFlow
• Control Plane Policing (CoPP)
Interface Policy Groups
Interface policy groups are templates that dictate interface level configurations via Interface Protocol
Policies and are associated to an AAEP.
Interface profiles help tie the pieces together. Interface profiles contain blocks of ports (interface selectors)
and are also tied to the interface policy groups that were described in the previous paragraphs.
A port such as e1/1 is arbitrary, and the profile must be associated to a specific
switch profile to configure the ports.
Domains and Attachable Access Entity Profiles
A physical domain profile stores the physical resources (ports and port channels) and encapsulation
resources(VLAN/VXLAN) that should be used for endpoint group connections to the fabric
You can configure the following domain types:
An AAEP (or AEP) is a component that bundles group of interfaces through Interface Policy Groups,
which contain multiple interfaces that share same port level policies such as LLDP. An AAEP is attached to
a domain so that a domain can provide a group of interfaces (via AAEP) and VLANs (via VLAN pool) to
the logical resources such as EPG, L3OUT. An AAEP can be attached to more than one domain. AAEPs are
configured under global policies
Relationship Between Access Policies
The relationship among the access policies can be summarized with the following figure:
Relationship Between Access Policies