Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cisco ACI: Zero to Hero: A Comprehensive Guide to Cisco ACI Design, Implementation, Operation, and Troubleshooting

  • Formāts: PDF+DRM
  • Izdošanas datums: 26-Dec-2022
  • Izdevniecība: APress
  • Valoda: eng
  • ISBN-13: 9781484288382
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 65,42 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 26-Dec-2022
  • Izdevniecība: APress
  • Valoda: eng
  • ISBN-13: 9781484288382
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

It doesn’t matter if you are completely new to Cisco ACI or you already have some experience with the technology, this book will guide you through the whole implementation lifecycle and provide you with a comprehensive toolset to become confident in any ACI related task. 

In the beginning, it’s very important to build strong fundamental knowledge about Cisco ACI components. You'll go through underlay networking based on Nexus 9000 switches and describe the APIC controller cluster acting as the management plane of ACI. By building Access Policies, you'll see how to optimally connect servers, storages, routers, switches, or L4-L7 service devices to ACI. Then you'll properly design and implement Application Policies. You will understand all the fabric forwarding behavior when using different ACI settings and get a toolset on how to verify and troubleshoot eventual problems. 

This book also covers more advanced features like integration with virtualization hypervisors, service chaining of L4-L7 devices using Service Graphs, REST API automation based on Python or Ansible and ACI Cloud Deployment. Every data center architect today struggles to achieve the highest possible visibility in a data center. You'll learn how to start collecting and analyzing telemetry data from ACI inside the Nexus Dashboard tool to get unprecedented value and ease 2-day operation tasks. 

Cisco ACI: Zero to Hero can additionally be used as a valuable source of theoretical and practical knowledge for all candidates preparing for CCIE DC v3.0 Written or Lab exam.

What You'll Learn
  • Understand Cisco ACI components 
  • Underlay networking based on Nexus 9000 switches, APIC controllers, Application Policy Model
  • Integrate ACI with virtualization hypervisors 
  • Dynamically and seamlessly include L4-L7 service devices in communication between ACI endpoints 
  • Build ACI Anywhere – ACI public cloud deployment, Remote Leaf configuration, Virtual ACI PODs.
  • Utilize ACI REST-API, related Cobra SDK, and Ansible to develop your own automation and scripts on top of the ACI platform
Who This Book Is For

Network engineers, architects, network developers, administrators or NOC technicians.

About the Author xiii
About the Technical Reviewer xv
Acknowledgments xvii
Introduction xix
Chapter 1 Introduction: Datacenter Network Evolution
1(12)
From Traditional to Software-Defined Networking
2(10)
Traditional Three-Tier Network Architecture
2(3)
Let's Go Virtual
5(3)
Transition to Leaf-Spine Architecture and VXLAN
8(2)
Need for Network Automation
10(1)
Cisco Application Centric Infrastructure (ACI)
11(1)
Summary
12(1)
Chapter 2 ACI Fundamentals: Underlay Infrastructure
13(48)
Cisco Nexus 9000 and Cloud Scale ASICs
13(13)
Cloud Scale ASIC Architecture
16(3)
Nexus 9500: Modular Chassis Switches
19(6)
Nexus 9300: Fixed Switches
25(1)
ACI Underlay Networking
26(5)
ACI Leaf-Spine Fabric Topology
26(2)
ACI Underlay Cabling Options
28(2)
ACI Control Plane and Data Plane Overview
30(1)
ACI Architecture
31(16)
Multi-Tier ACI Fabric
31(3)
ACI Stretched Fabric
34(2)
ACI Multi-Pod Architecture
36(4)
ACI Multi-Site Architecture
40(6)
ACI Remote Leaf
46(1)
Application Policy Infrastructure Controller
47(9)
Hardware Equipment
49(1)
Connecting APIC Nodes to the Network
50(1)
APIC High Availability
51(5)
ACI Licensing
56(1)
High-Level ACI Design
57(2)
Summary
59(2)
Chapter 3 Fabric Initialization and Management
61(86)
Nexus 9000 in ACI Switch Mode
61(3)
Conversion From NX-OS to ACI Mode
63(1)
APIC Cluster Initialization
64(7)
Graphical User Interface Overview
71(4)
Fabric Discovery and Registration
75(7)
ACI Switch Discovery
77(3)
Multi-Pod Fabric Discovery
80(2)
ACI Switch Discovery Troubleshooting
82(10)
ACI Management Access
92(10)
Fabric Out-of-Band Configuration
92(4)
Fabric In-Band Configuration
96(4)
APIC Connectivity Preference
100(2)
Initial and Best Practice Fabric Configuration
102(7)
Network Time Protocol
102(2)
Internal ACI MP-BGP
104(2)
Domain Name System
106(2)
Securing Fabric Management Access
108(1)
Fabric-Wide Best Practice Configuration
109(2)
ACI Fabric Monitoring and Backup
111(17)
Simple Network Management Protocol
111(5)
Logging in ACI Syslog
116(5)
NetFlow
121(4)
ACI Fabric Backup
125(3)
ACI Multi-Pod Configuration
128(17)
Inter-POD Network Configuration
129(11)
APIC Multi-Pod Wizard
140(1)
ACI Multi-Pod Verification and Troubleshooting
141(4)
Summary
145(2)
Chapter 4 ACI Fundamentals: Access Policies
147(28)
Switch Policies
148(6)
Switch Protocol Policies and vPC
149(2)
Switch Policy Group
151(1)
Switch Profile
152(2)
Interface Policies
154(5)
Interface Protocol Policy
154(1)
Interface Policy Group
155(2)
Interface Profile
157(2)
Attachable Access Entity Profile
159(2)
Physical and External Domains
161(2)
VLAN IVXLAN IVSAN Pools
163(2)
Practical Example for Access Policies
165(6)
Access Policies Naming Convention
171(2)
Summary
173(2)
Chapter 5 ACI Fundamentals: Application Policy Model
175(70)
Application Policy Model Overview
175(2)
ACI Tenants
177(5)
Tenant Security and Access Control
178(1)
System Tenants
179(2)
User Tenants
181(1)
Tenant Monitoring
182(1)
Virtual Routing and Forwarding
182(3)
Bridge Domains
185(6)
Bridge Domain Subnets
189(1)
ARP Handling
190(1)
Application Profiles
191(1)
Endpoint Groups
192(14)
Mapping EPGs to Interfaces
196(4)
Endpoint Learning Verification
200(3)
EPG Design Options
203(3)
Microsegmentation uEPGs
206(4)
Endpoint Security Groups
210(3)
ACI Contracts
213(31)
Consumer and Provider EPGs
216(1)
Contract Configuration
217(4)
Contract Application to EPGs/ESGs
221(1)
Contract Zoning Rules on Leaf Switches
222(6)
EPG/ESG Preferred Groups
228(3)
VRF vzAny Object
231(3)
Intra-EPG Isolation and Contracts
234(2)
Zone Rules Verification and Troubleshooting
236(6)
Naming Convention for ACI Application Policies
242(2)
Summary
244(1)
Chapter 6 Fabric Forwarding (and Troubleshooting)
245(70)
ACI Data Plane - iVXLAN Encapsulation
245(5)
1) Outer MAC Header
248(1)
2) Outer IP Header
248(1)
3) UDP Header
249(1)
4) VXLAN Header
249(1)
5) Original Layer-2 Frame
250(1)
Fabric Control Plane Mechanisms Reviewed
250(6)
ACI Forwarding Scenarios
256(29)
Layer 2 Forwarding
259(12)
Layer 3 Forwarding
271(14)
Multi-Pod Forwarding
285(7)
Multi-Pod Control Plane
285(2)
Multi-Pod Data Plane
287(5)
Multi-Site Forwarding
292(7)
Name-Space Normalization (Translation)
293(6)
Additional Troubleshooting Toolset for Fabric Forwarding
299(15)
Endpoint Tracker
299(1)
Embedded Logic Analyzer Module
300(3)
Ftriage
303(4)
Switch Port Analyzer
307(4)
Visibility & Troubleshooting Tool
311(1)
Interface Drops Analysis
312(2)
Summary
314(1)
Chapter 7 External Layer 2 and Layer 3 Connectivity
315(78)
Layer 2 External Connectivity
315(16)
Bridge Domain Extension
316(5)
Endpoint Group Extension
321(2)
Spanning Tree Protocol and ACI
323(8)
Layer 3 External Connectivity
331(61)
Main L30UT Components
333(18)
External Route Propagation
351(2)
Internal Bridge Domain Subnet Advertisement
353(4)
Contract Application to External EPG
357(2)
Dynamic Routing Protocols in ACI
359(18)
Static Routing with L30UTs
377(2)
ACI Transit Routing
379(7)
Route Profiles (Route Maps)
386(6)
Summary
392(1)
Chapter 8 Service Chaining with L4-L7 Devices
393(46)
To Use or Not to Use Service Insertion
394(2)
Service Graph Overview
396(3)
L4-L7 Device Deployment (Design) Modes
399(7)
Traditional Service Graph Designs
399(4)
Policy-Based Redirect Service Graph Designs
403(3)
L4-L7 Policy-Based Redirect
406(31)
VRF Sandwich vs. Policy-Based Redirect
407(3)
Endpoint Learning for PBR Device
410(2)
PBR Configuration and Verification
412(17)
Traffic Flow Between EPGs with PBR
429(7)
Symmetric PBR
436(1)
Summary
437(2)
Chapter 9 Integrating ACI with Virtualization and Container Platforms
439(60)
Virtualization platform Integration
439(17)
VMware Integration Overview
440(3)
Access Policies for ESXi Hosts
443(2)
ACI VMM Domain
445(5)
VDS Uplink to ESXi Mapping
450(1)
VMM Domain to EPG Binding
451(4)
VM to Port Group Association
455(1)
Container Integration to ACI
456(42)
Kubernetes Platform Overview
457(3)
Kubernetes Networking Overview
460(2)
Preparing ACI and Kubernetes Integration
462(12)
Kubernetes Server Nodes Network configuration
474(4)
Kubernetes Installation
478(10)
ACI CNI Components
488(2)
Demo YELB Application with ACI L4-L7 Service Graph and EPG segmentation
490(8)
Summary
498(1)
Chapter 10 ACI Automation and Programmability
499(88)
ACI Programmability Introduction
500(1)
REST APIs
501(4)
REST HTTP Response Codes
502(3)
Data Encoding Formats
505(4)
XML
506(1)
JSON
507(1)
YAML
508(1)
ACI Object Model
509(12)
Managed Object Discovery Tools
511(10)
ACI REST API
521(7)
URL and Body Format
521(4)
REST API Authentication
525(3)
Direct REST API Access
528(7)
Linux Command Line - cURL
530(1)
Postman
531(1)
Python Requests Library
532(3)
Cobra Software Development Kit
535(3)
Cobra SDK Installation
535(1)
Using Cobra SDK for Querying and Creating ACI Objects
536(2)
Automating ACI Using Ansible
538(20)
Ansible Component Architecture
539(6)
ACI Ansible Collection and Installation
545(1)
Practical Example 1- Create and Query ACI Objects
546(4)
Practical Example 2- CSV Based ACI Automation
550(8)
Automating ACI Using Terraform
558(16)
Terraform Config and State Files
559(3)
Terraform Commands
562(5)
ACI Terraform Provider Authentication Options
567(2)
Terraform Config Drift
569(1)
Sample Terraform Configuration File for ACI
569(5)
Advanced ACI API Features
574(12)
Presigned REST API Calls
574(6)
ACI Object Subscriptions
580(6)
Summary
586(1)
Useful Cisco ACI Resources 587(4)
Index 591
Jan Janovic, 2x CCIE No. 55858 (R&S|DC) and Cisco Certified Instructor (CCSI #35493), is an IT enthusiast with 10+ years of experience with network design, implementation and support for customers from a wide variety of industry sectors. During the last years, he has focused on data center networking, mainly, but not limited to solutions based on Cisco Nexus platforms traditional vPC architectures, VXLAN BGP EVPN network fabrics and Cisco ACI Software-Defined Networking. All with an emphasis on mutual technology integration, automation and analytic tools. Another significant part of his job is the delivery of professional training for customers all around Europe. 

During his university studies, he led a group of students to the successful development of the world's first Open-Source EIGRP implementation for the Quagga Linux package (currently under the name FRRouting). He also contributed to OSPF features there.

His technical focus additionally expands to public cloud topics connected with the design and deployment of AWS and Azure solutions.