Atjaunināt sīkdatņu piekrišanu

ACI Advanced Monitoring and Troubleshooting [Mīkstie vāki]

  • Formāts: Paperback / softback, 944 pages, height x width x depth: 230x190x46 mm, weight: 1500 g
  • Sērija : Networking Technology
  • Izdošanas datums: 05-Feb-2021
  • Izdevniecība: Cisco Press
  • ISBN-10: 1587145286
  • ISBN-13: 9781587145285
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 61,21 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 944 pages, height x width x depth: 230x190x46 mm, weight: 1500 g
  • Sērija : Networking Technology
  • Izdošanas datums: 05-Feb-2021
  • Izdevniecība: Cisco Press
  • ISBN-10: 1587145286
  • ISBN-13: 9781587145285
Citas grāmatas par šo tēmu:
Advanced real-world Cisco Application Centric Infrastructure (ACI) monitoring and troubleshooting

This expert guide and reference will help you confidently deploy, support, monitor, and troubleshoot ACI fabrics and components. It is also designed to help you prepare for your Cisco DCACIA (300-630) exam, earning Cisco Certified SpecialistACI Advanced Implementation certification and credit toward CCNP Data Center certification if you choose.

Authored by three leading Cisco ACI experts, it combines a solid conceptual foundation, in-depth technical knowledge, and practical techniques. It also contains proven features to help exam candidates prepare, including review questions in most chapters, and Key Topic icons highlighting concepts covered on the exam.

The authors thoroughly introduce ACI functions, components, policies, command-line interfaces, connectivity, fabric design, virtualization and service integration, automation, orchestration, and more. Next, they introduce best practices for monitoring and management, including the use of faults, health scores, tools, the REST API, in-band and out-of-band management techniques, and monitoring protocols. Proven configurations are provided, with steps for verification. Finally, they present advanced forwarding and troubleshooting techniques for maximizing ACI performance and value.

ACI Advanced Monitoring and Troubleshooting is an indispensable resource for every data center architect, engineer, developer, network or virtualization administrator, and operations team member working in ACI environments.



Understand Cisco ACI core functions, components, and protocols Apply the ACI Policy-Based Object Model to develop overall application frameworks Use command-line interfaces to manage and monitor Cisco ACI systems Master proven options for ACI physical and logical fabric design Establish connectivity for compute, storage, and service devices, switches, and routers Gain visibility into virtualization layers through VMM, and integrate hypervisors from multiple vendors Seamlessly integrate Layer 4 to Layer 7 services such as load balancing and firewalling Automate and orchestrate for fast deployment with the REST API, scripting, and Ansible Minimize downtime and maximize ROI through more effective monitoring and configuration Thoroughly master concepts and techniques for advanced ACI and VXLAN forwarding Build deep practical expertise for quickly troubleshooting critical events Gain quick visibility into traffic flows and streamline problem isolation with the ACI Visibility & Troubleshooting Tool Walk through multiple real-world troubleshooting scenarios step-by-step Forewords written by Yusuf Bhaiji, Director of Certifications, Cisco Systems; and Ronak Desai, VP of Engineering for the Data Center Networking Business Unit, Cisco Systems.



This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
Foreword xxviii
Yusuf Bhaiji
Foreword xxix
Ronak Desai
Introduction xxx
Part I Introduction to ACI
Chapter 1 Fundamental Functions and Components of Cisco ACI
1(30)
ACI Building Blocks
8(6)
Hardware Specifications
8(1)
Nexus 9000 Platform
9(3)
APIC Controller
12(2)
ACI Key Concepts
14(12)
Control Plane
15(2)
Data Plane
17(1)
VXLAN
17(1)
Tenant
18(1)
VRF
19(1)
Application Profile
20(1)
Endpoint Group
21(1)
Contracts
22(2)
Bridge Domain
24(1)
External Routed or Bridged Network
25(1)
Summary
26(1)
Review Key Topics
26(1)
Review Questions
27(4)
Chapter 2 Introduction to the ACI Policy Model
31(36)
Key Characteristics of the Policy Model
32(5)
Management Information Tree (MIT)
33(4)
Benefits of a Policy Model
37(1)
Logical Constructs
37(1)
Tenant Objects
38(1)
VRF Objects
39(1)
Application Profile Objects
40(1)
Endpoint Group Objects
41(2)
Bridge Domain and Subnet Objects
43(3)
Bridge Domain Options
45(1)
Contract Objects
46(5)
Labels, Filters, and Aliases
48(1)
Contract Inheritance
49(1)
Contract Preferred Groups
49(1)
vzAny
50(1)
Outside Network Objects
51(1)
Physical Construct
52(5)
Access Policies
52(1)
Switch Policies
53(1)
Interface Policies
54(1)
Global Policies
55(1)
VLAN Pools
55(1)
Domains
56(1)
Attachable Access Entity Profile
56(1)
Managed Object Relationships and Policy Resolution
57(1)
Tags
58(1)
Default Policies
58(2)
How a Policy Model Helps in Diagnosis
60(3)
Summary
63(1)
Review Key Topics
63(1)
Review Questions
64(3)
Chapter 3 ACI Command-Line Interfaces
67(18)
APIC CLIs
68(10)
NX-OS-Style CLI
68(6)
Bash CLI
74(4)
ACI Fabric Switch CLIs
78(6)
iBash CLI
78(3)
VSHCLI
81(2)
VSH LC CLI
83(1)
Summary
84(1)
Reference
84(1)
Chapter 4 ACI Fabric Design Options
85(100)
Physical Design
85(64)
Single- Versus Multiple-Fabric Design
87(3)
Dark Fiber
90(2)
Dense Wavelength-Division Multiplexing (DWDM)
92(1)
Ethernet over MPLS (EoMPLS) Pseudowire
92(5)
Multi-Pod
97(3)
ACI Multi-Pod Use Cases
100(3)
ACI Multi-Pod Scalability
103(1)
Inter-Pod Connectivity Deployment Considerations
104(9)
APIC Cluster Deployment Considerations
113(3)
Multi-Site
116(4)
Cisco ACI Multi-Site Orchestrator
120(2)
Cisco ACI Multi-Site Deployment Considerations
122(2)
Migration Scenarios
124(4)
Deployment Best Practices
128(1)
General Best Practices for Cisco ACI Multi-Site Design
129(2)
Remote Leaf
131(3)
Hardware and Software Support
134(1)
Recommended QOS Configuration for a Remote Leaf Solution
134(2)
Discovery of a Remote Leaf
136(2)
Remote Leaf Control Plane and Data Plane
138(3)
Remote Leaf Design Considerations
141(2)
ACI Multi-Pod and Remote Leaf Integration
143(6)
Logical Design
149(31)
Design 1 Container-as-a-Service Using the OpenShift Platform and Calico CNI
149(1)
Business Case
149(1)
Design Solution
150(15)
Design 2 Vendor-Based ERP/SAP Hana Design with ACI
165(1)
Business Case
165(1)
Design Solution
165(10)
Design 3 vBrick Digital Media Engine Design with ACI
175(1)
Business Case
176(1)
Design Solution
176(4)
Summary
180(1)
Review Key Topics
181(1)
Review Questions
181(4)
Chapter 5 End Host and Network Connectivity
185(64)
End Host Connectivity
185(28)
VLAN Pool
186(1)
Domain
186(1)
Attachable Access Entity Profiles (AAEPs)
186(1)
Switch Policies
187(1)
Switch Policy Groups
187(1)
Switch Profiles
187(1)
Interface Policies
188(1)
Interface Policy Groups
188(1)
Interface Profiles
189(2)
Virtual Port Channel (VPC)
191(1)
Configu ring VPC
192(1)
Defining the VPC Domain
193(2)
Creating an Interface Policy
195(1)
Creating a Switch Profile
196(1)
Port Channel
197(1)
Configuring a Port Channel
198(3)
Access Port
201(1)
Configuring an Access Port
202(4)
Best Practices in Configuring Access Policies
206(1)
Policy Best Practices
206(1)
Domain Best Practices
206(1)
AAEP Best Practices
207(1)
Compute and Storage Connectivity
207(1)
FEX Connectivity
207(1)
Cisco Blade Chassis Servers UCS B-Series
208(1)
Standalone Rack-Mount Servers
209(1)
Connecting Storage in ACI
209(1)
L4/L7 Service Device Connectivity
210(1)
Connecting Firewalls
211(1)
Connecting Load Balancers
212(1)
Network Connectivity
213(29)
Connecting an External Bridge Network
213(1)
Extending EPGs Outside the ACI Fabric
213(3)
Extending an ACI Bridge Domain Outside the Fabric
216(2)
Connecting an External Routed Network
218(2)
External Layer 3-Supported Routing Protocols
220(1)
Configuring MP-BGP Spine Route Reflectors
221(1)
Configuring External Routed Networks
222(5)
GOLF
227(1)
Network Connectivity Between Pods and Sites
228(9)
IPN Connectivity Considerations for Remote Leafs
237(5)
Diagnosing Connectivity Problems
242(3)
Summary
245(1)
Review Questions
245(4)
Chapter 6 VMM Integration
249(50)
Virtual Machine Manager (VMM)
249(8)
VMM Domain Policy Model
250(1)
VMM Domain Components
250(1)
VMM Domains
250(2)
VMM Domain VLAN Pool Association
252(1)
Attachable Access Entity Profile Association
252(1)
VMM Domain EPG Association
253(2)
EPG Policy Resolution and Deployment Immediacy
255(2)
VMware Integration
257(3)
Prerequisites for VMM Integration with AVS or VDS
257(1)
Guidelines and Limitations for VMM Integration with AVS or VDS
257(1)
ACI VMM Integration Workflow
258(1)
Publishing EPGs to a VMM Domain
258(1)
Connecting Virtual Machines to the Endpoint Group Port Groups on vCenter
259(1)
Verifying VMM Integration with the AVS or VDS
259(1)
Verifying the Virtual Switch Status
259(1)
Verifying the vNIC Status
260(1)
Microsoft SCVMM Integration
260(3)
Mapping ACI and SCVMM Constructs
261(1)
Mapping Multiple SCVMMs to an APIC
262(1)
Verifying That the OpFlex Certificate Is Deployed for a Connection from the SCVMM to the APIC
262(1)
Verifying VMM Deployment from the APIC to the SCVMM
263(1)
OpenStack Integration
263(9)
Extending OpFlex to the Compute Node
264(1)
ACI with OpenStack Physical Architecture
264(1)
OpFlex Software Architecture
265(1)
OpenStack Logical Topology
265(1)
Mapping OpenStack and ACI Constructs
266(1)
Prerequisites for OpenStack and Cisco ACI
267(1)
Guidelines and Limitations for OpenStack and Cisco ACI
268(2)
Verifying the OpenStack Configuration
270(1)
Configuration Examples for OpenStack and Cisco ACI
271(1)
Kubernetes Integration
272(9)
Planning for Kubernetes Integration
272(1)
Prerequisites for Integrating Kubernetes with Cisco ACI
273(1)
Provisioning Cisco ACI to Work with Kubernetes
274(3)
Preparing the Kubernetes Nodes
277(2)
Installing Kubernetes and Cisco ACI Containers
279(1)
Verifying the Kubernetes Integration
280(1)
OpenShift Integration
281(11)
Planning for OpenShift Integration
282(1)
Prerequisites for Integrating OpenShift with Cisco ACI
283(1)
Provisioning Cisco ACI to Work with OpenShift
284(3)
Preparing the OpenShift Nodes
287(3)
Installing OpenShift and Cisco ACI Containers
290(1)
Updating the OpenShift Router to Use the ACI Fabric
291(1)
Verifying the OpenShift Integration
291(1)
VMM Integration with ACI at Multiple Locations
292(6)
Multi-Site
292(1)
Multiple Virtual Machine Managers Across Sites
292(3)
Single Virtual Machine Manager Across Sites
295(1)
Remote Leaf
295(3)
Summary
298(1)
Chapter 7 L4/L7 Service Integration
299(44)
Service Insertion
299(1)
The Service Graph
300(22)
Managed Mode Versus Un-Managed Mode
301(1)
L4-L7 Integration Use Cases
302(1)
How Contracts Work in ACI
303(3)
The Shadow EPG
306(1)
Configuring the Service Graph
307(1)
Step 1 Create an L4-L7 Device
307(1)
Step 2 Create a Service Graph Template
308(1)
Step 3 Deploy the Service Graph from the Template
308(2)
Step 4 Configure the L4-L7 Parameters (Managed Mode Only)
310(1)
Verifying the Service Graph Configuration
310(2)
Service Graph Design and Deployment Options
312(1)
Firewall as Default Gateway for Client and Server (Routed Mode)
312(1)
Firewall Not the Default Gateway for Clients (Routed Mode)
312(2)
Route Peering with a Firewall (Routed Mode)
314(2)
Service Graph with Firewall (Transparent Mode)
316(1)
Service Graph with ADC (One-Arm Mode with S-NAT)
316(1)
Service Graph with ADC (Two-Arm Mode)
316(1)
Service Graph with Two Service Nodes (Firewall with NAT and ADC in Two-Arm Mode)
317(2)
Service Graph with Two Service Nodes (Firewall with No NAT and ADC in Two-Arm Mode)
319(1)
Service Graph with Two Service Nodes (Firewall with No NAT and ADC in One-Arm Mode)
319(1)
Service Graph with an Intrusion Prevention System (IPS)
319(3)
Policy-Based Redirect (PBR)
322(10)
PBR Design Considerations
323(1)
PBR Design Scenarios
324(1)
PBR Service Graph with an ADC (One-Arm Mode and No S-NAT)
324(1)
PBR Service Graph with a Firewall (Two-Arm Mode and Routed)
324(1)
Configuring the PBR Service Graph
325(1)
Service Node Health Check
326(1)
L4-L7 PBR Tracking
326(1)
L4-L7 PBR Threshold
326(1)
L4-L7 PBR Health Groups
327(1)
Common Issues in the PBR Service Graph
328(1)
Unnecessary Layer 2 Traffic Redirection Toward the Service Node
328(1)
Inability to Ping the Consumer Connector
329(1)
Routing on a Service Node
330(2)
L4/L7 Service Integration in Multi-Pod and Multi-Site
332(10)
Multi-Pod
332(2)
Any cast Services in Multi-Pod
334(4)
Multi-Site
338(4)
Review Questions
342(1)
Chapter 8 Automation and Orchestration
343(62)
The Difference Between Automation and Orchestration
343(6)
Benefits of Automation and Orchestration
344(1)
Example 1
345(2)
Example 2
347(2)
REST API
349(2)
Automating Tasks Using the Native REST API: JSON and XML
351(21)
API Inspector
351(2)
Object (Save As)
353(2)
Visore (Object Store Browser)
355(2)
MOQuery
357(7)
Automation Use Cases
364(8)
Automating Tasks Using Ansible
372(20)
Ansible Support in ACI
375(3)
Installing Ansible and Ensuring a Secure Connection
378(4)
APIC Authentication in Ansible
382(2)
Automation Use Cases
384(1)
Use Case 1
384(4)
Use Case 2
388(4)
Orchestration Through UCS Director
392(10)
Management Through Cisco UCS Director
392(1)
Automation and Orchestration with Cisco UCS Director
393(2)
Automation Use Cases
395(7)
Summary
402(1)
Review Questions
402(3)
Part II Monitoring and Management Best Practices
Chapter 9 Monitoring ACI Fabric
405(104)
Importance of Monitoring
405(2)
Faults and Health Scores
407(8)
Faults
407(4)
Health Scores
411(2)
Health Score Used in Proactive Monitoring
413(1)
Health Score Used in Reactive Monitoring
414(1)
Health Score with Interface Errors
414(1)
ACI Internal Monitoring Tools
415(15)
SNMP
415(3)
Interface Failures Example
418(2)
Syslog
420(3)
Example: Leaf Membership Failure
423(1)
Example: Spine/IPN Failure
423(3)
NetFlow
426(2)
Example: Network Visibility on a Border Leaf
428(2)
ACI External Monitoring Tools
430(43)
Network Insights
430(1)
Network Insights for Resources (NIR)
431(1)
Network Insights Advisor (NIA)
432(1)
Example: Application Intermittent Disconnect Issue (Standalone Compute)
433(2)
Example: Application Connectivity Issue (Virtual Compute)
435(2)
Network Assurance Engine
437(2)
NAE Installation
439(1)
NAE Configuration and Initial Setup
440(10)
Example: Subnet Reachability Issue
450(3)
Tetration
453(2)
Software Agents
455(1)
Hardware Agents
455(1)
Tetration Installation and Configuration
455(6)
Tetration System Monitoring
461(2)
Configuring Email Alerts
463(1)
Enabling Syslog
464(1)
Tetration Scopes
465(1)
Tetration Applications
465(2)
Tetration Code Upgrades
467(1)
Tetration Patch Upgrade
467(2)
Tetration Cluster Reboot
469(1)
Tetration Cluster Shutdown
469(1)
Example: Workload Security with Tetration
470(3)
Monitoring Through the REST API
473(32)
Monitoring an APIC
475(1)
Monitoring CPU and Memory
475(2)
Monitoring Disk Utilization
477(1)
Monitoring Interfaces
478(3)
Monitoring the APIC Cluster State
481(1)
Monitoring Leafs and Spines
482(1)
Monitoring CPU Utilization
482(3)
Monitoring Memory Utilization
485(1)
Monitoring Power Supply Unit (PSU) Status
486(2)
Monitoring Fan Status
488(1)
Monitoring Module Status
489(2)
Monitoring Leaf/Spine Membership Status in a Fabric
491(5)
Monitoring Interface Status
496(3)
Monitoring Applications
499(1)
Monitoring Application Traffic Status
499(3)
Monitoring External Network Connectivity
502(2)
Monitoring the PBR Service Graph
504(1)
Summary
505(1)
Review Questions
506(3)
Chapter 10 Network Management and Monitoring Configuration
509(80)
Out-of-Band Management
509(8)
Creating Static Management Addresses
510(1)
Creating the Management Contract
510(3)
Choosing the Node Management EPG
513(1)
Creating an External Management Entity EPG
513(2)
Verifying the OOB Management Configuration
515(2)
In-Band Management
517(16)
Creating a Management Contract
517(1)
Creating Leaf Interface Access Policies for APIC INB Management
518(2)
Creating Access Policies for the Border Leaf(s) Connected to L30ut
520(2)
Creating INB Management External Routed Networks (L30ut)
522(2)
Creating External Management EPGs
524(3)
Creating an INB BD with a Subnet
527(2)
Configuring the Node Management EPG
529(1)
Creating Static Management Addresses
530(1)
Verifying the INB Management Configuration
530(3)
AAA
533(18)
Configuring Cisco Secure ACS
533(9)
Configuring Cisco ISE
542(5)
Configuring AAA in ACI
547(3)
Recovering with the Local Fallback User
550(1)
Verifying the AAA Configuration
550(1)
Syslog
551(5)
Verifying the Syslog Configuration and Functionality
555(1)
SNMP
556(10)
Verifying the SNMP Configuration and Functionality
562(4)
SPAN
566(11)
Access SPAN
567(4)
Fabric SPAN
571(1)
Tenant SPAN
572(3)
Ensuring Visibility and Troubleshooting SPAN
575(1)
Verifying the SPAN Configuration and Functionality
576(1)
NetFlow
577(10)
NetFlow with Access Policies
580(2)
NetFlow with Tenant Policies
582(3)
Verifying the NetFlow Configuration and Functionality
585(2)
Summary
587(2)
Part III Advanced Forwarding and Troubleshooting Techniques
Chapter 11 ACI Topology
589(22)
Physical Topology
589(4)
APIC Initial Setup
593(2)
Fabric Access Policies
595(6)
Switch Profiles, Switch Policies, and Interface Profiles
595(1)
Interface Policies and Policy Groups
596(1)
Pools, Domains, and AAEPs
597(4)
VMM Domain Configuration
601(2)
VMM Topology
601(2)
Hardware and Software Specifications
603(2)
Logical Layout of EPGs, BDs, VRF Instances, and Contracts
605(3)
L3Out Logical Layout
606(2)
Summary
608(1)
Review Key Topics
608(1)
References
609(2)
Chapter 12 Bits and Bytes of ACI Forwarding
611(106)
Limitations of Traditional Networks and the Evolution of Overlay Networks
611(2)
High-Level VXLAN Overview
613(2)
IS-IS, TEP Addressing, and the ACI Underlay
615(11)
IS-IS and TEP Addressing
615(3)
FTags and the MDT
618(8)
Endpoint Learning in ACI
626(25)
Endpoint Learning in a Layer 2-Only Bridge Domain
627(5)
Council of Oracle Protocol (CO OP)
632(2)
Updating the Managed Object (MO) Tree
634(1)
Endpoint Learning in a Layer 3-Enabled Bridge Domain
635(5)
Fabric Glean
640(1)
Remote Endpoint Learning
641(4)
Endpoint Mobility
645(2)
Anycast Gateway
647(2)
Virtual Port Channels in ACI
649(2)
Routing in ACI
651(10)
Static or Dynamic Routes
651(5)
Learning External Routes in the ACI Fabric
656(3)
Transit Routing
659(2)
Policy Enforcement
661(8)
Shared Services
664(4)
L30ut Flags
668(1)
Quality of Service (QoS) in ACI
669(5)
Externally Set DSCP and CoS Markings
671(1)
EPG QoS
671(1)
Custom QoS Policy
671(1)
Contract QoS
671(1)
CoS Preservation in ACI
672(1)
iTraceroute Class
672(1)
QoS and Multi-Pod
672(2)
DSCP Class-to-CoS Translation Policy
674(1)
Multi-Pod
674(6)
Multi-Site
680(4)
Remote Leaf
684(2)
Forwarding Scenarios
686(9)
ARP Flooding
686(2)
Layer 2 Known Unicast
688(2)
ARP Optimization
690(1)
Layer 2 Unknown Unicast Proxy
690(3)
L3 Policy Enforcement When Going to L30ut
693(2)
L3 Policy Enforcement for External Traffic Coming into the Fabric
695(1)
Route Leaking/Shared Services
695(3)
Consumer to Provider
695(3)
Provider to Consumer
698(1)
Multi-Pod Forwarding Examples
698(5)
ARP Flooding
700(1)
Layer 3 Proxy Flow
700(3)
Multi-Site Forwarding Examples
703(4)
ARP Flooding
703(2)
Layer 3 Proxy Flow
705(2)
Remote Leaf
707(6)
ARP Flooding
707(3)
Layer 3 Proxy Flow
710(3)
Summary
713(1)
Review Key Topics
713(1)
References
714(1)
Review Questions
714(3)
Chapter 13 Troubleshooting Techniques
717(54)
General Troubleshooting
717(10)
Faults, Events, and Audits
718(4)
moquery
722(2)
iCurl
724(2)
Visore
726(1)
Infrastructure Troubleshooting
727(10)
APIC Cluster Troubleshooting
727(7)
Fabric Node Troubleshooting
734(3)
How to Verify Physical- and Platform-Related Issues
737(14)
Counters
737(6)
CPU Packet Captures
743(1)
ASIC
744(1)
ASIC Interface
744(1)
Application
745(3)
SPAN
748(3)
Troubleshooting Endpoint Connectivity
751(8)
Endpoint Tracker and Log Files
752(4)
Enhanced Endpoint Tracker (EPT) App
756(2)
Rogue Endpoint Detection
758(1)
Troubleshooting Contract-Related Issues
759(6)
Verifying Policy Deny Drops
764(1)
Embedded Logic Analyzer Module (ELAM)
765(4)
Summary
769(1)
Review Key Topics
769(1)
Review Questions
769(2)
Chapter 14 The ACI Visibility & Troubleshooting Tool
771(20)
Visibility & Troubleshooting Tool Overview
771(1)
Faults Tab
772(1)
Drop/Stats Tab
773(4)
Ingress/Egress Buffer Drop Packets
774(1)
Ingress Error Drop Packets Periodic
774(1)
Storm Control
774(1)
Ingress Forward Drop Packets
775(1)
Ingress Load Balancer Drop Packets
776(1)
Contract Drops Tab
777(2)
Contracts
777(1)
Contract Considerations
778(1)
Events and Audits Tab
779(1)
Traceroute Tab
780(2)
Atomic Counter Tab
782(3)
Latency Tab
785(1)
SPAN Tab
786(1)
Network Insights Resources (NIR) Overview
787(3)
Summary
790(1)
Chapter 15 Troubleshooting Use Cases
791(70)
Troubleshooting Fabric Discovery: Leaf Discovery
792(3)
Solution
794(1)
Troubleshooting APIC Controllers and Clusters: Clustering
795(4)
Solution
798(1)
Troubleshooting Management Access: Out-of-Band EPG
799(2)
Solution
801(1)
Troubleshooting Contracts: Traffic Not Traversing a Firewall as Expected
801(3)
Solution
803(1)
Troubleshooting Contracts: Contract Directionality
804(3)
Solution
807(1)
Troubleshooting End Host Connectivity: Layer 2 Traffic Flow Through ACI
807(5)
Solution
810(2)
Troubleshooting External Layer 2 Connectivity: Broken Layer 2 Traffic Flow Through ACI
812(2)
Solution 1
813(1)
Solution 2
813(1)
Troubleshooting External Layer 3 Connectivity: Broken Layer 3 Traffic Flow Through ACI
814(2)
Solution
816(1)
Troubleshooting External Layer 3 Connectivity: Unexpected Layer 3 Traffic Flow Through ACI
816(5)
Solution
820(1)
Troubleshooting Leaf and Spine Connectivity: Leaf Issue
821(5)
Solution
822(4)
Troubleshooting VMM Domains: VMM Controller Offline
826(3)
Solution 1
829(1)
Solution 2
829(1)
Troubleshooting VMM Domains: VM Connectivity Issue After Deploying the VMM Domain
829(3)
Solution 1
830(1)
Solution 2
831(1)
Solution 3
831(1)
Troubleshooting L4-L7: Deploying an L4-L7 Device
832(2)
Solution
834(1)
Troubleshooting L4-L7: Control Protocols Stop Working After Service Graph Deployment
834(3)
Solution
836(1)
Troubleshooting Multi-Pod: BUM Traffic Not Reaching Remote Pods
837(2)
Solution 1
839(1)
Solution 2
839(1)
Troubleshooting Multi-Pod: Remote L30ut Not Reachable
839(2)
Solution
841(1)
Troubleshooting Multi-Site: Using Consistency Checker to Verify State at Each Site
841(3)
Solution
842(2)
Troubleshooting Programmability Issues: JSON Script Generates Error
844(2)
Solution
844(2)
Troubleshooting Multicast Issues: PIM Sparse Mode Any-Source Multicast (ASM)
846(14)
Solution
847(13)
Summary
860(1)
Appendix A Answers to
Chapter Review Questions
861(12)
Index 873
Sadiq Memon, CCIE No. 47508, is a Lead Solutions Integration Architect (Automotive) with Cisco Customer Experience (CX). He has over 30 years of diversified experience in information technology with specialization and expertise in data center and enterprise networking. Sadiq joined Cisco in 2007, and as a Cisco veteran of over 13 years, he has worked with various large enterprise customers, including automotive, financials, manufacturing, and government in designing, implementing, and supporting end-to-end architectures and solutions. Sadiq was part of the Cisco Advanced Services Tiger Team during the early ACI incubation period. He has published a series of short videos covering ACI configuration on YouTube and has presented ACI/Cloud-related topics at Cisco Live! Sadiq was the technical editor for the Cisco Press book Deploying ACI and possesses multiple IT industry certifications from leading companies such as Cisco (CCIE, CCNA), VMware (VCP-DCV), Microsoft, and Citrix. Sadiq holds a bachelor's degree in computer systems engineering from NED University of Engineering & Technology, Karachi, Pakistan.

Joseph Ristaino, CCIE No. 41799, is a Technical Leader with the ACI Escalation Team in RTP, North Carolina. He joined Cisco in 2011 after graduating from Wentworth Institute of Technology with a bachelor's degree in computer networking. Joseph started with Cisco on the Server Virtualization TAC team, specializing in UCS and virtualization technologies. He has in-depth knowledge of compute/networking technologies and has been supporting customers for over eight years as they implement and manage data center deployments around the globe. Joseph now works closely with the ACI Technical Support teams to provide assistance on critical customer issues that go unsolved and has been working on ACI since its inception in 2014. Joseph lives with his wife in Durham, North Carolina.

Carlo Schmidt, CCIE No. 41842, is a Data Center Solutions Architect. He works with global enterprises, designing their next-generation data centers. Carlo started at Cisco in 2011, on the Data Center Switching TAC team. In that role, he focused on Nexus platforms and technologies such as FCoE, fabric path, and OTV. In 2016, he migrated to the ACI TAC team, where he specialized in customer problem resolution as well as improving product usability. In 2019 Carlo decided to take his knowledge and lessons learned from his eight years in Cisco TAC to a presales role as a Solutions Architect. Carlo is based out of Research Triangle Park, North Carolina.