Foreword |
|
xxviii | |
|
Foreword |
|
xxix | |
|
Introduction |
|
xxx | |
|
Part I Introduction to ACI |
|
|
|
Chapter 1 Fundamental Functions and Components of Cisco ACI |
|
|
1 | (30) |
|
|
8 | (6) |
|
|
8 | (1) |
|
|
9 | (3) |
|
|
12 | (2) |
|
|
14 | (12) |
|
|
15 | (2) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (2) |
|
|
24 | (1) |
|
External Routed or Bridged Network |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
|
27 | (4) |
|
Chapter 2 Introduction to the ACI Policy Model |
|
|
31 | (36) |
|
Key Characteristics of the Policy Model |
|
|
32 | (5) |
|
Management Information Tree (MIT) |
|
|
33 | (4) |
|
Benefits of a Policy Model |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
Application Profile Objects |
|
|
40 | (1) |
|
|
41 | (2) |
|
Bridge Domain and Subnet Objects |
|
|
43 | (3) |
|
|
45 | (1) |
|
|
46 | (5) |
|
Labels, Filters, and Aliases |
|
|
48 | (1) |
|
|
49 | (1) |
|
Contract Preferred Groups |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (5) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
Attachable Access Entity Profile |
|
|
56 | (1) |
|
Managed Object Relationships and Policy Resolution |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
58 | (2) |
|
How a Policy Model Helps in Diagnosis |
|
|
60 | (3) |
|
|
63 | (1) |
|
|
63 | (1) |
|
|
64 | (3) |
|
Chapter 3 ACI Command-Line Interfaces |
|
|
67 | (18) |
|
|
68 | (10) |
|
|
68 | (6) |
|
|
74 | (4) |
|
|
78 | (6) |
|
|
78 | (3) |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
84 | (1) |
|
Chapter 4 ACI Fabric Design Options |
|
|
85 | (100) |
|
|
85 | (64) |
|
Single- Versus Multiple-Fabric Design |
|
|
87 | (3) |
|
|
90 | (2) |
|
Dense Wavelength-Division Multiplexing (DWDM) |
|
|
92 | (1) |
|
Ethernet over MPLS (EoMPLS) Pseudowire |
|
|
92 | (5) |
|
|
97 | (3) |
|
|
100 | (3) |
|
ACI Multi-Pod Scalability |
|
|
103 | (1) |
|
Inter-Pod Connectivity Deployment Considerations |
|
|
104 | (9) |
|
APIC Cluster Deployment Considerations |
|
|
113 | (3) |
|
|
116 | (4) |
|
Cisco ACI Multi-Site Orchestrator |
|
|
120 | (2) |
|
Cisco ACI Multi-Site Deployment Considerations |
|
|
122 | (2) |
|
|
124 | (4) |
|
Deployment Best Practices |
|
|
128 | (1) |
|
General Best Practices for Cisco ACI Multi-Site Design |
|
|
129 | (2) |
|
|
131 | (3) |
|
Hardware and Software Support |
|
|
134 | (1) |
|
Recommended QOS Configuration for a Remote Leaf Solution |
|
|
134 | (2) |
|
Discovery of a Remote Leaf |
|
|
136 | (2) |
|
Remote Leaf Control Plane and Data Plane |
|
|
138 | (3) |
|
Remote Leaf Design Considerations |
|
|
141 | (2) |
|
ACI Multi-Pod and Remote Leaf Integration |
|
|
143 | (6) |
|
|
149 | (31) |
|
Design 1 Container-as-a-Service Using the OpenShift Platform and Calico CNI |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (15) |
|
Design 2 Vendor-Based ERP/SAP Hana Design with ACI |
|
|
165 | (1) |
|
|
165 | (1) |
|
|
165 | (10) |
|
Design 3 vBrick Digital Media Engine Design with ACI |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
176 | (4) |
|
|
180 | (1) |
|
|
181 | (1) |
|
|
181 | (4) |
|
Chapter 5 End Host and Network Connectivity |
|
|
185 | (64) |
|
|
185 | (28) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Attachable Access Entity Profiles (AAEPs) |
|
|
186 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
187 | (1) |
|
|
188 | (1) |
|
|
188 | (1) |
|
|
189 | (2) |
|
Virtual Port Channel (VPC) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
193 | (2) |
|
Creating an Interface Policy |
|
|
195 | (1) |
|
Creating a Switch Profile |
|
|
196 | (1) |
|
|
197 | (1) |
|
Configuring a Port Channel |
|
|
198 | (3) |
|
|
201 | (1) |
|
Configuring an Access Port |
|
|
202 | (4) |
|
Best Practices in Configuring Access Policies |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (1) |
|
Compute and Storage Connectivity |
|
|
207 | (1) |
|
|
207 | (1) |
|
Cisco Blade Chassis Servers UCS B-Series |
|
|
208 | (1) |
|
Standalone Rack-Mount Servers |
|
|
209 | (1) |
|
Connecting Storage in ACI |
|
|
209 | (1) |
|
L4/L7 Service Device Connectivity |
|
|
210 | (1) |
|
|
211 | (1) |
|
Connecting Load Balancers |
|
|
212 | (1) |
|
|
213 | (29) |
|
Connecting an External Bridge Network |
|
|
213 | (1) |
|
Extending EPGs Outside the ACI Fabric |
|
|
213 | (3) |
|
Extending an ACI Bridge Domain Outside the Fabric |
|
|
216 | (2) |
|
Connecting an External Routed Network |
|
|
218 | (2) |
|
External Layer 3-Supported Routing Protocols |
|
|
220 | (1) |
|
Configuring MP-BGP Spine Route Reflectors |
|
|
221 | (1) |
|
Configuring External Routed Networks |
|
|
222 | (5) |
|
|
227 | (1) |
|
Network Connectivity Between Pods and Sites |
|
|
228 | (9) |
|
IPN Connectivity Considerations for Remote Leafs |
|
|
237 | (5) |
|
Diagnosing Connectivity Problems |
|
|
242 | (3) |
|
|
245 | (1) |
|
|
245 | (4) |
|
Chapter 6 VMM Integration |
|
|
249 | (50) |
|
Virtual Machine Manager (VMM) |
|
|
249 | (8) |
|
|
250 | (1) |
|
|
250 | (1) |
|
|
250 | (2) |
|
VMM Domain VLAN Pool Association |
|
|
252 | (1) |
|
Attachable Access Entity Profile Association |
|
|
252 | (1) |
|
VMM Domain EPG Association |
|
|
253 | (2) |
|
EPG Policy Resolution and Deployment Immediacy |
|
|
255 | (2) |
|
|
257 | (3) |
|
Prerequisites for VMM Integration with AVS or VDS |
|
|
257 | (1) |
|
Guidelines and Limitations for VMM Integration with AVS or VDS |
|
|
257 | (1) |
|
ACI VMM Integration Workflow |
|
|
258 | (1) |
|
Publishing EPGs to a VMM Domain |
|
|
258 | (1) |
|
Connecting Virtual Machines to the Endpoint Group Port Groups on vCenter |
|
|
259 | (1) |
|
Verifying VMM Integration with the AVS or VDS |
|
|
259 | (1) |
|
Verifying the Virtual Switch Status |
|
|
259 | (1) |
|
Verifying the vNIC Status |
|
|
260 | (1) |
|
Microsoft SCVMM Integration |
|
|
260 | (3) |
|
Mapping ACI and SCVMM Constructs |
|
|
261 | (1) |
|
Mapping Multiple SCVMMs to an APIC |
|
|
262 | (1) |
|
Verifying That the OpFlex Certificate Is Deployed for a Connection from the SCVMM to the APIC |
|
|
262 | (1) |
|
Verifying VMM Deployment from the APIC to the SCVMM |
|
|
263 | (1) |
|
|
263 | (9) |
|
Extending OpFlex to the Compute Node |
|
|
264 | (1) |
|
ACI with OpenStack Physical Architecture |
|
|
264 | (1) |
|
OpFlex Software Architecture |
|
|
265 | (1) |
|
OpenStack Logical Topology |
|
|
265 | (1) |
|
Mapping OpenStack and ACI Constructs |
|
|
266 | (1) |
|
Prerequisites for OpenStack and Cisco ACI |
|
|
267 | (1) |
|
Guidelines and Limitations for OpenStack and Cisco ACI |
|
|
268 | (2) |
|
Verifying the OpenStack Configuration |
|
|
270 | (1) |
|
Configuration Examples for OpenStack and Cisco ACI |
|
|
271 | (1) |
|
|
272 | (9) |
|
Planning for Kubernetes Integration |
|
|
272 | (1) |
|
Prerequisites for Integrating Kubernetes with Cisco ACI |
|
|
273 | (1) |
|
Provisioning Cisco ACI to Work with Kubernetes |
|
|
274 | (3) |
|
Preparing the Kubernetes Nodes |
|
|
277 | (2) |
|
Installing Kubernetes and Cisco ACI Containers |
|
|
279 | (1) |
|
Verifying the Kubernetes Integration |
|
|
280 | (1) |
|
|
281 | (11) |
|
Planning for OpenShift Integration |
|
|
282 | (1) |
|
Prerequisites for Integrating OpenShift with Cisco ACI |
|
|
283 | (1) |
|
Provisioning Cisco ACI to Work with OpenShift |
|
|
284 | (3) |
|
Preparing the OpenShift Nodes |
|
|
287 | (3) |
|
Installing OpenShift and Cisco ACI Containers |
|
|
290 | (1) |
|
Updating the OpenShift Router to Use the ACI Fabric |
|
|
291 | (1) |
|
Verifying the OpenShift Integration |
|
|
291 | (1) |
|
VMM Integration with ACI at Multiple Locations |
|
|
292 | (6) |
|
|
292 | (1) |
|
Multiple Virtual Machine Managers Across Sites |
|
|
292 | (3) |
|
Single Virtual Machine Manager Across Sites |
|
|
295 | (1) |
|
|
295 | (3) |
|
|
298 | (1) |
|
Chapter 7 L4/L7 Service Integration |
|
|
299 | (44) |
|
|
299 | (1) |
|
|
300 | (22) |
|
Managed Mode Versus Un-Managed Mode |
|
|
301 | (1) |
|
L4-L7 Integration Use Cases |
|
|
302 | (1) |
|
How Contracts Work in ACI |
|
|
303 | (3) |
|
|
306 | (1) |
|
Configuring the Service Graph |
|
|
307 | (1) |
|
Step 1 Create an L4-L7 Device |
|
|
307 | (1) |
|
Step 2 Create a Service Graph Template |
|
|
308 | (1) |
|
Step 3 Deploy the Service Graph from the Template |
|
|
308 | (2) |
|
Step 4 Configure the L4-L7 Parameters (Managed Mode Only) |
|
|
310 | (1) |
|
Verifying the Service Graph Configuration |
|
|
310 | (2) |
|
Service Graph Design and Deployment Options |
|
|
312 | (1) |
|
Firewall as Default Gateway for Client and Server (Routed Mode) |
|
|
312 | (1) |
|
Firewall Not the Default Gateway for Clients (Routed Mode) |
|
|
312 | (2) |
|
Route Peering with a Firewall (Routed Mode) |
|
|
314 | (2) |
|
Service Graph with Firewall (Transparent Mode) |
|
|
316 | (1) |
|
Service Graph with ADC (One-Arm Mode with S-NAT) |
|
|
316 | (1) |
|
Service Graph with ADC (Two-Arm Mode) |
|
|
316 | (1) |
|
Service Graph with Two Service Nodes (Firewall with NAT and ADC in Two-Arm Mode) |
|
|
317 | (2) |
|
Service Graph with Two Service Nodes (Firewall with No NAT and ADC in Two-Arm Mode) |
|
|
319 | (1) |
|
Service Graph with Two Service Nodes (Firewall with No NAT and ADC in One-Arm Mode) |
|
|
319 | (1) |
|
Service Graph with an Intrusion Prevention System (IPS) |
|
|
319 | (3) |
|
Policy-Based Redirect (PBR) |
|
|
322 | (10) |
|
PBR Design Considerations |
|
|
323 | (1) |
|
|
324 | (1) |
|
PBR Service Graph with an ADC (One-Arm Mode and No S-NAT) |
|
|
324 | (1) |
|
PBR Service Graph with a Firewall (Two-Arm Mode and Routed) |
|
|
324 | (1) |
|
Configuring the PBR Service Graph |
|
|
325 | (1) |
|
Service Node Health Check |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
326 | (1) |
|
|
327 | (1) |
|
Common Issues in the PBR Service Graph |
|
|
328 | (1) |
|
Unnecessary Layer 2 Traffic Redirection Toward the Service Node |
|
|
328 | (1) |
|
Inability to Ping the Consumer Connector |
|
|
329 | (1) |
|
Routing on a Service Node |
|
|
330 | (2) |
|
L4/L7 Service Integration in Multi-Pod and Multi-Site |
|
|
332 | (10) |
|
|
332 | (2) |
|
Any cast Services in Multi-Pod |
|
|
334 | (4) |
|
|
338 | (4) |
|
|
342 | (1) |
|
Chapter 8 Automation and Orchestration |
|
|
343 | (62) |
|
The Difference Between Automation and Orchestration |
|
|
343 | (6) |
|
Benefits of Automation and Orchestration |
|
|
344 | (1) |
|
|
345 | (2) |
|
|
347 | (2) |
|
|
349 | (2) |
|
Automating Tasks Using the Native REST API: JSON and XML |
|
|
351 | (21) |
|
|
351 | (2) |
|
|
353 | (2) |
|
Visore (Object Store Browser) |
|
|
355 | (2) |
|
|
357 | (7) |
|
|
364 | (8) |
|
Automating Tasks Using Ansible |
|
|
372 | (20) |
|
|
375 | (3) |
|
Installing Ansible and Ensuring a Secure Connection |
|
|
378 | (4) |
|
APIC Authentication in Ansible |
|
|
382 | (2) |
|
|
384 | (1) |
|
|
384 | (4) |
|
|
388 | (4) |
|
Orchestration Through UCS Director |
|
|
392 | (10) |
|
Management Through Cisco UCS Director |
|
|
392 | (1) |
|
Automation and Orchestration with Cisco UCS Director |
|
|
393 | (2) |
|
|
395 | (7) |
|
|
402 | (1) |
|
|
402 | (3) |
|
Part II Monitoring and Management Best Practices |
|
|
|
Chapter 9 Monitoring ACI Fabric |
|
|
405 | (104) |
|
|
405 | (2) |
|
|
407 | (8) |
|
|
407 | (4) |
|
|
411 | (2) |
|
Health Score Used in Proactive Monitoring |
|
|
413 | (1) |
|
Health Score Used in Reactive Monitoring |
|
|
414 | (1) |
|
Health Score with Interface Errors |
|
|
414 | (1) |
|
ACI Internal Monitoring Tools |
|
|
415 | (15) |
|
|
415 | (3) |
|
Interface Failures Example |
|
|
418 | (2) |
|
|
420 | (3) |
|
Example: Leaf Membership Failure |
|
|
423 | (1) |
|
Example: Spine/IPN Failure |
|
|
423 | (3) |
|
|
426 | (2) |
|
Example: Network Visibility on a Border Leaf |
|
|
428 | (2) |
|
ACI External Monitoring Tools |
|
|
430 | (43) |
|
|
430 | (1) |
|
Network Insights for Resources (NIR) |
|
|
431 | (1) |
|
Network Insights Advisor (NIA) |
|
|
432 | (1) |
|
Example: Application Intermittent Disconnect Issue (Standalone Compute) |
|
|
433 | (2) |
|
Example: Application Connectivity Issue (Virtual Compute) |
|
|
435 | (2) |
|
|
437 | (2) |
|
|
439 | (1) |
|
NAE Configuration and Initial Setup |
|
|
440 | (10) |
|
Example: Subnet Reachability Issue |
|
|
450 | (3) |
|
|
453 | (2) |
|
|
455 | (1) |
|
|
455 | (1) |
|
Tetration Installation and Configuration |
|
|
455 | (6) |
|
Tetration System Monitoring |
|
|
461 | (2) |
|
|
463 | (1) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
465 | (2) |
|
|
467 | (1) |
|
|
467 | (2) |
|
|
469 | (1) |
|
Tetration Cluster Shutdown |
|
|
469 | (1) |
|
Example: Workload Security with Tetration |
|
|
470 | (3) |
|
Monitoring Through the REST API |
|
|
473 | (32) |
|
|
475 | (1) |
|
Monitoring CPU and Memory |
|
|
475 | (2) |
|
Monitoring Disk Utilization |
|
|
477 | (1) |
|
|
478 | (3) |
|
Monitoring the APIC Cluster State |
|
|
481 | (1) |
|
Monitoring Leafs and Spines |
|
|
482 | (1) |
|
Monitoring CPU Utilization |
|
|
482 | (3) |
|
Monitoring Memory Utilization |
|
|
485 | (1) |
|
Monitoring Power Supply Unit (PSU) Status |
|
|
486 | (2) |
|
|
488 | (1) |
|
|
489 | (2) |
|
Monitoring Leaf/Spine Membership Status in a Fabric |
|
|
491 | (5) |
|
Monitoring Interface Status |
|
|
496 | (3) |
|
|
499 | (1) |
|
Monitoring Application Traffic Status |
|
|
499 | (3) |
|
Monitoring External Network Connectivity |
|
|
502 | (2) |
|
Monitoring the PBR Service Graph |
|
|
504 | (1) |
|
|
505 | (1) |
|
|
506 | (3) |
|
Chapter 10 Network Management and Monitoring Configuration |
|
|
509 | (80) |
|
|
509 | (8) |
|
Creating Static Management Addresses |
|
|
510 | (1) |
|
Creating the Management Contract |
|
|
510 | (3) |
|
Choosing the Node Management EPG |
|
|
513 | (1) |
|
Creating an External Management Entity EPG |
|
|
513 | (2) |
|
Verifying the OOB Management Configuration |
|
|
515 | (2) |
|
|
517 | (16) |
|
Creating a Management Contract |
|
|
517 | (1) |
|
Creating Leaf Interface Access Policies for APIC INB Management |
|
|
518 | (2) |
|
Creating Access Policies for the Border Leaf(s) Connected to L30ut |
|
|
520 | (2) |
|
Creating INB Management External Routed Networks (L30ut) |
|
|
522 | (2) |
|
Creating External Management EPGs |
|
|
524 | (3) |
|
Creating an INB BD with a Subnet |
|
|
527 | (2) |
|
Configuring the Node Management EPG |
|
|
529 | (1) |
|
Creating Static Management Addresses |
|
|
530 | (1) |
|
Verifying the INB Management Configuration |
|
|
530 | (3) |
|
|
533 | (18) |
|
Configuring Cisco Secure ACS |
|
|
533 | (9) |
|
|
542 | (5) |
|
|
547 | (3) |
|
Recovering with the Local Fallback User |
|
|
550 | (1) |
|
Verifying the AAA Configuration |
|
|
550 | (1) |
|
|
551 | (5) |
|
Verifying the Syslog Configuration and Functionality |
|
|
555 | (1) |
|
|
556 | (10) |
|
Verifying the SNMP Configuration and Functionality |
|
|
562 | (4) |
|
|
566 | (11) |
|
|
567 | (4) |
|
|
571 | (1) |
|
|
572 | (3) |
|
Ensuring Visibility and Troubleshooting SPAN |
|
|
575 | (1) |
|
Verifying the SPAN Configuration and Functionality |
|
|
576 | (1) |
|
|
577 | (10) |
|
NetFlow with Access Policies |
|
|
580 | (2) |
|
NetFlow with Tenant Policies |
|
|
582 | (3) |
|
Verifying the NetFlow Configuration and Functionality |
|
|
585 | (2) |
|
|
587 | (2) |
|
Part III Advanced Forwarding and Troubleshooting Techniques |
|
|
|
|
589 | (22) |
|
|
589 | (4) |
|
|
593 | (2) |
|
|
595 | (6) |
|
Switch Profiles, Switch Policies, and Interface Profiles |
|
|
595 | (1) |
|
Interface Policies and Policy Groups |
|
|
596 | (1) |
|
Pools, Domains, and AAEPs |
|
|
597 | (4) |
|
|
601 | (2) |
|
|
601 | (2) |
|
Hardware and Software Specifications |
|
|
603 | (2) |
|
Logical Layout of EPGs, BDs, VRF Instances, and Contracts |
|
|
605 | (3) |
|
|
606 | (2) |
|
|
608 | (1) |
|
|
608 | (1) |
|
|
609 | (2) |
|
Chapter 12 Bits and Bytes of ACI Forwarding |
|
|
611 | (106) |
|
Limitations of Traditional Networks and the Evolution of Overlay Networks |
|
|
611 | (2) |
|
High-Level VXLAN Overview |
|
|
613 | (2) |
|
IS-IS, TEP Addressing, and the ACI Underlay |
|
|
615 | (11) |
|
|
615 | (3) |
|
|
618 | (8) |
|
|
626 | (25) |
|
Endpoint Learning in a Layer 2-Only Bridge Domain |
|
|
627 | (5) |
|
Council of Oracle Protocol (CO OP) |
|
|
632 | (2) |
|
Updating the Managed Object (MO) Tree |
|
|
634 | (1) |
|
Endpoint Learning in a Layer 3-Enabled Bridge Domain |
|
|
635 | (5) |
|
|
640 | (1) |
|
|
641 | (4) |
|
|
645 | (2) |
|
|
647 | (2) |
|
Virtual Port Channels in ACI |
|
|
649 | (2) |
|
|
651 | (10) |
|
|
651 | (5) |
|
Learning External Routes in the ACI Fabric |
|
|
656 | (3) |
|
|
659 | (2) |
|
|
661 | (8) |
|
|
664 | (4) |
|
|
668 | (1) |
|
Quality of Service (QoS) in ACI |
|
|
669 | (5) |
|
Externally Set DSCP and CoS Markings |
|
|
671 | (1) |
|
|
671 | (1) |
|
|
671 | (1) |
|
|
671 | (1) |
|
|
672 | (1) |
|
|
672 | (1) |
|
|
672 | (2) |
|
DSCP Class-to-CoS Translation Policy |
|
|
674 | (1) |
|
|
674 | (6) |
|
|
680 | (4) |
|
|
684 | (2) |
|
|
686 | (9) |
|
|
686 | (2) |
|
|
688 | (2) |
|
|
690 | (1) |
|
Layer 2 Unknown Unicast Proxy |
|
|
690 | (3) |
|
L3 Policy Enforcement When Going to L30ut |
|
|
693 | (2) |
|
L3 Policy Enforcement for External Traffic Coming into the Fabric |
|
|
695 | (1) |
|
Route Leaking/Shared Services |
|
|
695 | (3) |
|
|
695 | (3) |
|
|
698 | (1) |
|
Multi-Pod Forwarding Examples |
|
|
698 | (5) |
|
|
700 | (1) |
|
|
700 | (3) |
|
Multi-Site Forwarding Examples |
|
|
703 | (4) |
|
|
703 | (2) |
|
|
705 | (2) |
|
|
707 | (6) |
|
|
707 | (3) |
|
|
710 | (3) |
|
|
713 | (1) |
|
|
713 | (1) |
|
|
714 | (1) |
|
|
714 | (3) |
|
Chapter 13 Troubleshooting Techniques |
|
|
717 | (54) |
|
|
717 | (10) |
|
Faults, Events, and Audits |
|
|
718 | (4) |
|
|
722 | (2) |
|
|
724 | (2) |
|
|
726 | (1) |
|
Infrastructure Troubleshooting |
|
|
727 | (10) |
|
APIC Cluster Troubleshooting |
|
|
727 | (7) |
|
Fabric Node Troubleshooting |
|
|
734 | (3) |
|
How to Verify Physical- and Platform-Related Issues |
|
|
737 | (14) |
|
|
737 | (6) |
|
|
743 | (1) |
|
|
744 | (1) |
|
|
744 | (1) |
|
|
745 | (3) |
|
|
748 | (3) |
|
Troubleshooting Endpoint Connectivity |
|
|
751 | (8) |
|
Endpoint Tracker and Log Files |
|
|
752 | (4) |
|
Enhanced Endpoint Tracker (EPT) App |
|
|
756 | (2) |
|
|
758 | (1) |
|
Troubleshooting Contract-Related Issues |
|
|
759 | (6) |
|
Verifying Policy Deny Drops |
|
|
764 | (1) |
|
Embedded Logic Analyzer Module (ELAM) |
|
|
765 | (4) |
|
|
769 | (1) |
|
|
769 | (1) |
|
|
769 | (2) |
|
Chapter 14 The ACI Visibility & Troubleshooting Tool |
|
|
771 | (20) |
|
Visibility & Troubleshooting Tool Overview |
|
|
771 | (1) |
|
|
772 | (1) |
|
|
773 | (4) |
|
Ingress/Egress Buffer Drop Packets |
|
|
774 | (1) |
|
Ingress Error Drop Packets Periodic |
|
|
774 | (1) |
|
|
774 | (1) |
|
Ingress Forward Drop Packets |
|
|
775 | (1) |
|
Ingress Load Balancer Drop Packets |
|
|
776 | (1) |
|
|
777 | (2) |
|
|
777 | (1) |
|
|
778 | (1) |
|
|
779 | (1) |
|
|
780 | (2) |
|
|
782 | (3) |
|
|
785 | (1) |
|
|
786 | (1) |
|
Network Insights Resources (NIR) Overview |
|
|
787 | (3) |
|
|
790 | (1) |
|
Chapter 15 Troubleshooting Use Cases |
|
|
791 | (70) |
|
Troubleshooting Fabric Discovery: Leaf Discovery |
|
|
792 | (3) |
|
|
794 | (1) |
|
Troubleshooting APIC Controllers and Clusters: Clustering |
|
|
795 | (4) |
|
|
798 | (1) |
|
Troubleshooting Management Access: Out-of-Band EPG |
|
|
799 | (2) |
|
|
801 | (1) |
|
Troubleshooting Contracts: Traffic Not Traversing a Firewall as Expected |
|
|
801 | (3) |
|
|
803 | (1) |
|
Troubleshooting Contracts: Contract Directionality |
|
|
804 | (3) |
|
|
807 | (1) |
|
Troubleshooting End Host Connectivity: Layer 2 Traffic Flow Through ACI |
|
|
807 | (5) |
|
|
810 | (2) |
|
Troubleshooting External Layer 2 Connectivity: Broken Layer 2 Traffic Flow Through ACI |
|
|
812 | (2) |
|
|
813 | (1) |
|
|
813 | (1) |
|
Troubleshooting External Layer 3 Connectivity: Broken Layer 3 Traffic Flow Through ACI |
|
|
814 | (2) |
|
|
816 | (1) |
|
Troubleshooting External Layer 3 Connectivity: Unexpected Layer 3 Traffic Flow Through ACI |
|
|
816 | (5) |
|
|
820 | (1) |
|
Troubleshooting Leaf and Spine Connectivity: Leaf Issue |
|
|
821 | (5) |
|
|
822 | (4) |
|
Troubleshooting VMM Domains: VMM Controller Offline |
|
|
826 | (3) |
|
|
829 | (1) |
|
|
829 | (1) |
|
Troubleshooting VMM Domains: VM Connectivity Issue After Deploying the VMM Domain |
|
|
829 | (3) |
|
|
830 | (1) |
|
|
831 | (1) |
|
|
831 | (1) |
|
Troubleshooting L4-L7: Deploying an L4-L7 Device |
|
|
832 | (2) |
|
|
834 | (1) |
|
Troubleshooting L4-L7: Control Protocols Stop Working After Service Graph Deployment |
|
|
834 | (3) |
|
|
836 | (1) |
|
Troubleshooting Multi-Pod: BUM Traffic Not Reaching Remote Pods |
|
|
837 | (2) |
|
|
839 | (1) |
|
|
839 | (1) |
|
Troubleshooting Multi-Pod: Remote L30ut Not Reachable |
|
|
839 | (2) |
|
|
841 | (1) |
|
Troubleshooting Multi-Site: Using Consistency Checker to Verify State at Each Site |
|
|
841 | (3) |
|
|
842 | (2) |
|
Troubleshooting Programmability Issues: JSON Script Generates Error |
|
|
844 | (2) |
|
|
844 | (2) |
|
Troubleshooting Multicast Issues: PIM Sparse Mode Any-Source Multicast (ASM) |
|
|
846 | (14) |
|
|
847 | (13) |
|
|
860 | (1) |
Appendix A Answers to Chapter Review Questions |
|
861 | (12) |
Index |
|
873 | |