0% found this document useful (0 votes)
305 views

B ACI Virtualization Guide 2 2 2

ACI Cisco

Uploaded by

smamedov80
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
305 views

B ACI Virtualization Guide 2 2 2

ACI Cisco

Uploaded by

smamedov80
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 432

Cisco ACI Virtualization Guide, Release 2.

2(2)
First Published: 2017-04-11
Last Modified: 2017-07-13

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)

2017 Cisco Systems, Inc. All rights reserved.


CONTENTS

Preface Preface xxi


Audience xxi
Document Conventions xxi
Related Documentation xxiii
Documentation Feedback xxiv
Obtaining Documentation and Submitting a Service Request xxiv

CHAPTER 1 New and Changed Information 1


New and Changed Information 1

CHAPTER 2 Cisco ACI Virtual Machine Networking 5


Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers 5
Virtual Machine Manager Domain Main Components 6
Virtual Machine Manager Domains 7
VMM Domain VLAN Pool Association 7
VMM Domain EPG Association 8
About Trunk Port Group 10
Attachable Entity Profile 11
EPG Policy Resolution and Deployment Immediacy 12
Guidelines for Deleting VMM Domains 13
Toggling Between Basic and Advanced GUI Modes 14
NetFlow with Virtual Machine Networking 15
About NetFlow with Virtual Machine Networking 15
About NetFlow Exporter Policies with Virtual Machine Networking 16
NetFlow Support with VMware vSphere Distributed Switch 16
Configuring a NetFlow Exporter Policy for VM Networking Using the GUI 16
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the GUI 17

Cisco ACI Virtualization Guide, Release 2.2(2)


iii
Contents

Enabling NetFlow on an Endpoint Group to VMM Domain Association Using the GUI 17
Configuring a NetFlow Exporter Policy for Virtual Machine Networking Using the
NX-OS-Style CLI 18
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the NX-OS-Style
CLI 19
Enabling or Disabling NetFlow on an Endpoint Group Using the NX-OS-Style CLI 19
Configuring a NetFlow Exporter Policy for VM Networking Using the REST API 20
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the REST API 20
Enabling NetFlow on an Endpoint Group for VMM Domain Association 20
Troubleshooting VMM Connectivity 21

CHAPTER 3 Cisco ACI with VMware VDS and VMware vShield Integration 23
Configuring Virtual Machine Networking Policies 23
APIC Supported VMware VDS Versions 24
Guidelines for Upgrading VMware DVS from 5.x to 6.x and VMM Integration 24
Mapping ACI and VMware Constructs 25
VMware VDS Parameters Managed By APIC 25
VDS Parameters Managed by APIC 25
VDS Port Group Parameters Managed by APIC 26
vShield Manager Parameters Managed by APIC 26
Creating a VMM Domain Profile 27
GUI Tasks 27
Prerequisites for Creating a VMM Domain Profile 27
vCenter Domain Operational Workflow 28
Creating a vCenter Domain Profile Using the Advanced GUI 29
Creating a vCenter Domain Profile Using the Basic GUI 30
Creating a vCenter Domain Profile Using the NX-OS Style CLI 32
vCenter and vShield Domain Operational Workflow 33
Creating a vCenter and a vShield Domain Profile Using the Advanced GUI 35
Creating a vCenter and a vShield Domain Profile Using the Basic GUI 37
Creating a vCenter and a vShield Domain Profile Using the NX-OS Style CLI 38
Creating VDS Uplink Port Groups 39
Creating a Trunk Port Group 40
Creating a Trunk Port Group Using the GUI 40
Creating a Trunk Port Group Using the NX-OS Style CLI 40

Cisco ACI Virtualization Guide, Release 2.2(2)


iv
Contents

Creating a Trunk Port Group Using the REST API 43


Working with Blade Servers 43
Guidelines for Cisco UCS B-Series Servers 43
Setting up an Access Policy for a Blade Server Using the GUI 44
Troubleshooting the Cisco ACI and VMware VMM System Integration 46
Additional Reference Sections 46
Custom User Account with Minimum VMware vCenter Privileges 46
Quarantine Port Groups 47
On-Demand VMM Inventory Refresh 47
Guidelines for Migrating a vCenter Hypervisor VMK0 to an ACI Inband VLAN 47
Create the Necessary Management EPG Policies in APIC 48
Migrate the VMK0 to the Inband ACI VLAN 48
REST API Tasks 48
Creating a vCenter Domain Profile Using the REST API 48
Creating a vCenter and a vShield Domain Profile Using the REST API 50
Setting Up an Access Policy for a Blade Server Using the REST API 52
NX-OS Style CLI Tasks 54
Creating a vCenter Domain Profile Using the NX-OS Style CLI 54
Creating a vCenter and a vShield Domain Profile Using the NX-OS Style CLI 55

CHAPTER 4 Microsegmentation with Cisco ACI 59


Microsegmentation with Cisco ACI 59
Benefits of Microsegmentation with Cisco ACI 60
How Microsegmentation Using Cisco ACI Works 60
Attributes for Microsegmentation with Cisco ACI 61
Precedence of Attributes 63
Precedence of Operators 64
Scenarios for Using Microsegmentation with Cisco ACI 65
Using Microsegmentation with Cisco ACI with VMs Within a Single Application EPG 65
Using Microsegmentation with Cisco ACI with VMs in Different Application EPGs 66
Using Microsegmentation with Network-based Attributes 67
Configuring Microsegmentation with Cisco ACI 68
Prerequisites for Configuring Microsegmentation with Cisco ACI 68
Workflow for Configuring Microsegmentation with Cisco ACI 69
Configuring Microsegmentation with Cisco ACI Using the GUI 69

Cisco ACI Virtualization Guide, Release 2.2(2)


v
Contents

Configuring Microsegmentation with Cisco ACI Using the NX-OS-style CLI 72


Configuring Microsegmentation with Cisco ACI Using the REST API 74

CHAPTER 5 Intra-EPG Isolation Enforcement and Cisco ACI 75


Intra-EPG Isolation for VMware vDS 75
Configuring Intra-EPG Isolation for VMware vDS using the GUI 77
Configuring Intra-EPG Isolation for VMware vDS using the NX-OS Style CLI 77
Configuring Intra-EPG Isolation for VMware vDS using the REST API 79
Intra-EPG Isolation Enforcement for Cisco AVS 79
Configuring Intra-EPG Isolation for Cisco AVS Using the GUI 80
Configuring Intra-EPG Isolation for Cisco AVS Using the NX-OS Style CLI 81
Configuring Intra-EPG Isolation for Cisco AVS Using the REST API 81
Choosing Statistics to View for Isolated Endpoints on Cisco AVS 82
Viewing Statistics for Isolated Endpoints on Cisco AVS 82

CHAPTER 6 Cisco ACI with Cisco AVS 85


Cisco AVS Overview 85
About the Cisco AVS and the VMware vCenter 87
Cisco AVS in a Multipod Environment 88
Required Software 89
Cisco AVS Documentation 89
Cisco AVS Installation 90
Workflow for Installing the Cisco AVS 90
Creating Interface, Switch, and vCenter Domain Profiles 91
Interface and Switch Profile Guidelines and Prerequisites 91
vCenter Domain Profile Guidelines and Prerequisites 92
Creating Interface and Switch Profiles and a vCenter Domain Profile Using the Advanced
GUI 93
Creating a vCenter Domain Using the Basic GUI 96
Configuring vSwitch Override Policies on the VMM Domain Using the Advanced
GUI 97
Pre-Cisco AVS Installation Configuration Using the NX-OS Style CLI 98
Creating a VLAN Domain Using the NX-OS Style CLI 98
Configuring a Port Channel Using the NX-OS Style CLI 99
Configuring a VPC Using the NX-OS Style CLI 99

Cisco ACI Virtualization Guide, Release 2.2(2)


vi
Contents

Configuring a VPC Domain Using the NX-OS Style CLI 99


Configuring a VPC on Switch Interfaces Using NX-OS Style CLI 100
Creating a VMM Domain with Local Switching or No Local Switching Using the
NX-OS Style CLI 100
Prerequisites for Installing Cisco AVS 101
Installing Cisco AVS Using the VMware vCenter Plug-in 102
Installing the Cisco AVS Using Cisco VSUM 104
Installing Cisco VSUM 104
About the Virtual Switch Image File Upload Utility 112
Uploading the Cisco AVS Image File 112
Installing Cisco AVS Using VSUM 115
Installing the Cisco AVS Software Using the ESXi CLI 120
Verifying the Cisco AVS Installation 121
Verifying the Virtual Switch Status 122
Verifying the vNIC Status 123
Adding Cisco AVS Hosts to the DVS 123
Uninstalling Cisco AVS 124
Uninstalling Cisco AVS Using the VMware vCenter Plug-in 125
Key Post-Installation Configuration Tasks for the Cisco AVS 126
Prerequisites for Configuring the Cisco AVS 126
Workflow for Key Post-Installation Configuration Tasks for the Cisco AVS 126
Deploying an Application Profile for Cisco AVS Using the Advanced GUI 128
Creating a Tenant, VRF, and Bridge Domain Using the Advanced GUI 128
Creating an Application Profile Using the GUI 129
Creating EPGs Using the GUI 129
Creating VLAN Pools with Encapsulation Blocks Using the Advanced GUI 130
Assigning Port Groups to the VM in vCenter 131
Creating a Filter Using the GUI 132
Creating a Contract Using the GUI 132
Deploying an Application Profile for Cisco AVS Using the Basic GUI 133
Creating a Tenant, VRF, and Bridge Domain Using the Basic GUI 133
Deploying an Application Policy Using the Basic GUI 134
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI 134
Creating a Tenant, VRF, and Bridge Domain Using the NX-OS Style CLI 134
Creating an Application Profile and EPG Using the NX-OS Style CLI 136

Cisco ACI Virtualization Guide, Release 2.2(2)


vii
Contents

Creating VLAN Pools with Encapsulation Blocks Using the NX-OS Style CLI 137
Deploying an Application Policy Using the NX-OS Style CLI 138
Verifying the Application Profile 141
Verifying the Application Profile and EPGs in the GUI 141
Verifying the EPGs in vCenter 141
Verifying that VMs can Communicate 141
Configuring an IP Address for VMs Connected to Cisco AVS 142
Assigning an IP Address to the Cisco AVS VM Network Adapter 142
Assigning a Gateway Address for the VMs Connected to Cisco AVS Using the
GUI 143
Guidelines for Using vMotion with Cisco AVS 144
Distributed Firewall 145
Benefits of Distributed Firewall 146
Configuring Distributed Firewall 147
Workflow for Configuring Distributed Firewall 148
Configuring a Stateful Policy for Distributed Firewall Using the Advanced GUI 148
Configuring a Stateful Policy for Distributed Firewall Using the NX-OS Style CLI 149
Creating a Distributed Firewall Policy or Changing its Mode Using the Advanced
GUI 150
Enabling Distributed Firewall After Installation or Upgrade 152
Configuring Distributed Firewall Using the NX-OS Style CLl 153
Distributed Firewall Flow Logging 153
Configuring Parameters for Distributed Firewall Flow Information 153
Guidelines for Configuring the Syslog Server 154
Distributed Firewall Flow Syslog Messages 155
Configuring a Static End Point Using the GUI 156
Configuring Parameters for Distributed Firewall Flow Information in the Advanced
GUI 157
Configuring Parameters for Distributed Firewall Flow Information in the NX-OS
Style CLI 160
Distributed Firewall Flow Counts 160
Choosing Statistics to View for Distributed Firewall 161
Viewing Statistics for Distributed Firewall 161
Microsegmentation with Cisco ACI for Cisco AVS 162
Configuring Layer 4 to Layer 7 Services 162

Cisco ACI Virtualization Guide, Release 2.2(2)


viii
Contents

Migrating Your Network from DVS to AVS 162


REST API Tasks for Cisco AVS 163
Creating a Tenant, VRF, and Bridge Domain Using the REST API 163
Deploying an Application Profile Using the REST API 164
Configuring a Stateful Policy for Distributed Firewall Using the REST API 166
Changing the Distributed Firewall Mode Using the REST API 166
Configuring Parameters for Distributed Firewall Flow Information in the REST API 167

CHAPTER 7 Cisco ACI with VMware vRealize 169


About Cisco ACI with VMware vRealize 169
Cisco ACI with VMware vRealize Solution Overview 170
Physical and Logical Topology 171
About the Mapping of ACI Constructs in VMware vRealize 172
Getting Started with Cisco ACI with VMware vRealize 173
Prerequisites for Getting Started with Cisco ACI with VMware vRealize 174
Setting Up an IaaS Handle in vRealize Orchestrator 175
Cisco ACI with VMware vRealize Installation Workflow 176
Installing the APIC Plug-in on the vRealize Orchestrator 176
Setting Up the VMware vRealize Automation Appliance for ACI 177
Day-0 Operations of ACI 179
Associating AEP with VMware VMM Domain 180
Cisco ACI with VMware vRealize Upgrade Workflow 180
Upgrading the APIC Plug-in on the vRealize Orchestrator 180
Verifying the Connection Between APIC and vRealize 182
Cisco ACI with VMware vRealize Downgrade Workflow 182
Deleting Package and Workflows 183
Use Case Scenarios for the Administrator and Tenant Experience 183
Overview of Tier Application Deployment 183
Deploying a Single-Tier Application Using Property Groups 184
Deploying a 3-Tier Application Using a Multi-Machine Blueprint 186
About Plan Types 190
About vRealize Service Categories and Catalog Items 190
Mapping of the ACI Plan Types to vRealize Service Categories 191
ACI Administrator Services in vRealize 193
List of Admin Services Catalog Items for ACI Administrator Services 193

Cisco ACI Virtualization Guide, Release 2.2(2)


ix
Contents

ACI Tenant Services in vRealize 196


List of Network Security Catalog Items for ACI Tenant Services 196
List of Tenant Network Services Catalog Items for ACI Tenant Services 197
List of Tenant Shared Plan Catalog Items for ACI Tenant Services 197
List of Tenant VPC Plan Catalog Items for ACI Tenant Services 199
List of VM Services Catalog Items for ACI Tenant Services 200
Entitlements for ACI catalog-items in vRealize 200
List of Entitlements for ACI Catalog Items 201
ACI Plug-in in vRealize Orchestrator 201
APIC Workflows 201
APIC Inventory View 202
About Load Balancing and Firewall Services 203
Prerequisites for Enabling Services 204
Configuring the Services on APIC Using XML POST 205
Deleting the Services Configuration 207
About L3 External Connectivity 208
Prerequisites for Configuring L3 External Connectivity for vRealize 208
Administrator Experiences 209
Cisco ACI with Cisco AVS 209
Cisco AVS VMM Domain Creation 209
Creating a Cisco AVS VMM Domain with Default VLAN Encapsulation 209
Creating a Cisco AVS VMM Domain with Default VXLAN Encapsulation 210
Creating a Cisco AVS VMM Domain with No Local Switching 211
Verifying Cisco AVS Creation in vCenter 212
Verifying Creation of the Cisco AVS VMM Domain on Cisco APIC 213
Update of Cisco AVS VMM Domain Encapsulation Pools 213
Updating the VLAN Pool of a Cisco AVS VMM Domain 213
Verifying the Update of the VLAN Pool of a Cisco AVS VMM Domain in Cisco
APIC 214
Updating the Multicast Address Pool of a Cisco AVS VMM Domain 214
Verifying the Update of a Multicast Address Pool on Cisco APIC 215
Deletion of Cisco AVS and VMM domain 215
Deleting the Cisco AVS and VMM Domain 215
Verifying Cisco AVS Deletion in vCenter 216
Verifying VMM Domain Deletion on Cisco APIC 216

Cisco ACI Virtualization Guide, Release 2.2(2)


x
Contents

Verifying VLAN Pool Deletion on Cisco APIC 216


Verifying Multicast Address Pool Deletion on Cisco APIC 217
Cisco AVS VMM Domain Security Domain Mapping 217
Updating the Security Domain Mapping of the Cisco AVS VMM Domain 217
Verifying the Security Domain Mapping of the Cisco AVS VMM Domain 218
Distributed Firewall Policy 218
Creating a Distributed Firewall Policy 218
Verifying Distributed Firewall Policy Creation on APIC 219
Updating a Distributed Firewall Policy 219
Verifying a Distributed Firewall Policy Update on APIC 220
Deleting a Distributed Firewall Policy 220
Verifying a Distributed Firewall Policy Deletion on APIC 221
Updating a Distributed Firewall Policy Association with the Cisco AVS VMM
Domain 221
Verifying a Distributed Firewall Policy Association with the Cisco AVS VMM
Domain on APIC 221
Tenant Experiences in a Shared or Virtual Private Cloud Plan 222
Creating Networks in a Shared Plan 222
Verifying the Newly Created Network on VMware vRealize and APIC 223
Creating a Bridge Domain in a VPC Plan 223
Verifying the Newly Created Bridge Domain on APIC 224
Creating a Network and Associating to a Bridge Domain in a VPC Plan 224
Verifying the Network and Association to the Bridge Domain in a VPC Plan on
APIC 225
Creating a Security Policy Within the Tenant 225
Verifying the Security Policy Within the Tenant on APIC 227
Verifying the Connectivity of the Security Policy within the Tenant 227
Consuming a Shared Service in the Common Tenant 227
Verifying the Security Policy in the Tenant Common on APIC 229
Verifying the Connectivity of the Security Policy in the Tenant Common 229
Updating Security Policies (Access Control Lists) 230
Deleting Security Policies (Access Control Lists) 231
Creating the Network in the VPC Plan 231
Verifying the Network in the VPC Plan on APIC 232
Verifying the Network in the VPC Plan on vCenter 233

Cisco ACI Virtualization Guide, Release 2.2(2)


xi
Contents

Updating a Tenant Network Association with the VMM Domain 233


Verifying Tenant Network Association with VMM Domains on APIC 234
Microsegmentation 234
Microsegmentation with Cisco ACI 234
Microsegmentation in a Shared Plan 234
Creating a Microsegment in a Shared Plan 235
Verifying Microsegmentation Creation in a Shared Plan on APIC 237
Deleting a Microsegment in a Shared Plan 237
Verifying Microsegmentation Deletion on APIC 238
Microsegmentation in a VPC Plan 238
Creating a Microsegment in a VPC Plan 238
Verifying Microsegmentation Creation in a VPC Plan on APIC 240
Deleting a Microsegment in a VPC Plan 241
Updating Microsegment Attributes 241
Verifying a Microsegmentation Attributes Update on APIC 243
Updating a Microsegment Association with the Cisco AVS VMM Domain 244
Verifying Microsegment Association Updates with Cisco AVS VMM Domains
on APIC 244
Creating the VMs and Attaching to Networks Without Using the Machine
Blueprints 245
About Adding the Load Balancer to the Tenant Network 245
Configuration Prerequisites on APIC 247
Adding the VIP Pool 247
Deleting the VIP Pool 248
Adding the Load Balancer to the Tenant-Network in a Shared Plan 248
Adding the Load Balancer to the Tenant-Network in a VPC Plan 249
Deleting the Load Balancer from the Tenant-Network in a Shared Plan 249
Deleting the Load Balancer from the Tenant-Network in a VPC Plan 249
Configuring the Firewall 250
Adding the Firewall to the Tenant-Network in a Shared Plan 250
Deleting the Firewall from the Tenant-Network in a Shared Plan 251
Configuring the Firewall and Load Balancer 251
Adding the Firewall and Load Balancer to the Tenant-Network in a Shared
Plan 253
Adding the Firewall and Load Balancer to the Tenant-Network in a VPC Plan 253

Cisco ACI Virtualization Guide, Release 2.2(2)


xii
Contents

Deleting the Firewall and Load Balancer from the Tenant-Network in a Shared
Plan 254
Deleting the Firewall and Load Balancer from the Tenant-Network in a VPC Plan 254
Configuring the Inter-EPG Firewall 255
Adding the Firewall to the Tenant-Network in a VPC Plan 255
Deleting the Firewall from the Tenant-Network in a VPC Plan 255
Attaching an External L3 Network Internet Access 256
Verify the Security and L3 Policy on the APIC 257
Verifying the Network Connectivity 258
Application Deployment Scenarios 258
About Property Groups 259
About Service Blueprints 259
Customizing Service Blueprints to a Specific Setup 260
Using the vRealize Utils Workflow to Import Blueprints and Configure the
Entitlements 260
Integration with vRealize Network Profiles (IPAM) 261
Documentation of APIC Workflows in vRealize Orchestrator 262
List of Methods in ApicConfigHelper Class 262
Writing Custom Workflows Using the APIC Plug-in Method 268
Multi-Tenancy and Role based Access Control Using Security Domains 269
Adding the Tenant 269
Deleting the Tenant 269
APIC Credentials for Workflows 270
Adding APIC with Admin Credentials 270
Adding APIC with Tenant Credentials 270
Troubleshooting 270
Collecting the Logs to Report 271
Installing the ACI Helper Scripts 271
Removing the APIC Plug-in 272
Plug-in Overview 272
Configuring a vRA Host for the Tenant in the vRealize Orchestrator 273
Configuring an IaaS Host in the vRealize Orchestrator 274
Installing the vRO Customizations 275

CHAPTER 8 Cisco ACI vCenter Plug-in 277

Cisco ACI Virtualization Guide, Release 2.2(2)


xiii
Contents

About Cisco ACI with VMware vSphere Web Client 277


Cisco ACI vCenter Plug-in Overview 278
Getting Started with Cisco ACI vCenter Plug-in 278
Cisco ACI vCenter Plug-in Software Requirements 278
Required APIC Configuration 279
Installing the Cisco ACI vCenter Plug-in 279
Connecting vCenter Plug-in to your ACI Fabric 280
Connecting vCenter Plug-in to your ACI Fabric Using Credentials 280
Connecting vCenter Plug-in to your ACI Fabric Using an Existing Certificate 281
Connecting vCenter Plug-in to your ACI Fabric by Creating a New Certificate 282
Cisco ACI vCenter Plug-in Features and Limitations 283
Upgrading VMware vCenter when Using the Cisco ACI vCenter Plug-in 288
Cisco ACI vCenter Plug-in GUI 289
Cisco ACI vCenter Plug-in GUI Architecture Overview 289
Cisco ACI vCenter Plug-in Overview 290
GUI Tips 295
Performing ACI Object Configurations 296
Creating a New Tenant 296
Creating a New Application Profile 296
Creating an EPG Using the Drag and Drop Method 297
Creating a New uSeg EPG Using the Drag and Drop Method 298
Creating a Contract Between Two EPGs Using the Drag and Drop Method 299
Adding an EPG to an Existing Contract Using Drag and Drop Method 300
Adding an EPG to an Existing Contract using the Security Tab 300
Setting up L3 External Network 301
Setting up L2 External Network 302
Creating a VRF Using the Drag and Drop Method 303
Creating a Bridge Domain 303
Start a New Troubleshooting Session Between Endpoints 304
Start an Exisiting Troubleshooting Session Between Endpoints 305
Uninstalling the Cisco ACI vCenter Plug-in 305
Upgrading the Cisco ACI vCenter Plug-in 306
Troubleshooting the Cisco ACI vCenter Plug-in Installation 306
Reference Information 307
Alternative Installation of the Cisco ACI vCenter Plug-in 307

Cisco ACI Virtualization Guide, Release 2.2(2)


xiv
Contents

CHAPTER 9 Cisco ACI with Microsoft SCVMM 311


About Cisco ACI with Microsoft SCVMM 311
Cisco ACI with Microsoft SCVMM Solution Overview 312
Physical and Logical Topology of SCVMM 312
About the Mapping of ACI Constructs in SCVMM 313
SCVMM Fabric Cloud and Tenant Clouds 313
Getting Started with Cisco ACI with Microsoft SCVMM 314
Prerequisites for Getting Started with Cisco ACI with Microsoft SCVMM 314
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components 315
Installing the APIC SCVMM Agent on SCVMM 317
Installing the APIC SCVMM Agent on a Highly Available SCVMM 318
Generating APIC OpFlex Certificate 318
Displaying the Certificate Information to be Used on APIC Using the REST API 319
Adding the OpFlex Certificate Policy to APIC 320
Installing the OpflexAgent Certificate 321
Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM Agent 323
Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM Agent on a
Highly Available SCVMM 324
Installing the APIC Hyper-V Agent on the Hyper-V Server 326
Verifying the Installation of Cisco ACI with Microsoft SCVMM 328
Verifying the APIC SCVMM Agent Installation on SCVMM 328
Verifying the APIC SCVMM Agent Installation on a Highly Available SCVMM 329
Verifying the APIC Hyper-V Agent Installation on the Hyper-V Server 330
Setting Up ACI Policies 331
Creating SCVMM Domain Profiles 331
Creating a SCVMM Domain Profile Using the GUI 331
Configuring the Port Channel Policy 332
Modifying the Interface Port Channel Policy 332
Overriding the VMM Domain VSwitch Policies for Blade Servers 333
Verifying the SCVMM VMM Domain and SCVMM VMM 333
Deploying the Logical Switch to the Host on SCVMM 334
Enabling the Logical Network on Tenant Clouds 335
Upgrading the Cisco ACI with Microsoft SCVMM Components 335
Upgrading the ACI Microsoft SCVMM Components Workflow 336

Cisco ACI Virtualization Guide, Release 2.2(2)


xv
Contents

Upgrading the APIC SCVMM Agent on SCVMM 336


Upgrading the APIC SCVMM Agent on a High Available SCVMM 337
Upgrading the APIC Hyper-V Agent 337
Deploying Tenant Policies 338
Deployment Tenant Policies Prerequisites 338
Creating a Tenant 339
Creating an EPG 339
Associating the Microsoft VMM Domain with an EPG 339
Verifying the EPG is Associated with the VMM Domain on APIC 340
Verifying the EPG is Associated with the VMM Domain on SCVMM 340
Creating a Static IP Address Pool 341
Creating a Static IP Address Pool Using the NX-OS Style CLI 342
Connecting and Powering on the Virtual Machine 343
Verifying the Association on APIC 343
Viewing EPGs on APIC 344
Troubleshooting the Cisco ACI with Microsoft SCVMM 344
Troubleshooting APIC to SCVMM Connectivity 344
Troubleshooting Leaf to Hyper-V Host Connectivity 344
Troubleshooting the EPG Configuration Issue 345
REST API References 345
Creating a SCVMM Domain Profile Using the REST API 345
Reference Information 349
Installing the APIC Agent on SCVMM Using the Windows Command Prompt 349
Installing the APIC Hyper-V Agent on the Hyper-V Server Using the Windows Command
Prompt 349
Creating a SCVMM Domain Profile Using the NX-OS Style CLI 350
Programmability References 351
ACI SCVMM PowerShell Cmdlets 351
Configuration References 352
MAC Address Configuration Recommendations 352
Uninstalling the Cisco ACI with Microsoft SCVMM Components 353
Uninstalling the APIC SCVMM Agent 354
Uninstalling the APIC SCVMM Agent on a Highly Available SCVMM 354
Downgrading the APIC Controller and the Switch Software with Cisco ACI with Microsoft
SCVMM Components 355

Cisco ACI Virtualization Guide, Release 2.2(2)


xvi
Contents

Exporting APIC OpFlex Certificate 356

CHAPTER 10 Cisco ACI with Microsoft Windows Azure Pack 357


About Cisco ACI with Microsoft Windows Azure Pack 357
Cisco ACI with Microsoft Windows Azure Pack Solution Overview 358
Physical and Logical Topology 359
About the Mapping of ACI Constructs in Microsoft Windows Azure Pack 360
Getting Started with Cisco ACI with Microsoft Windows Azure Pack 361
Prerequisites for Getting Started with Cisco ACI with Microsoft Windows Azure Pack 361
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft Windows Azure Pack
Components 362
Installing ACI Azure Pack Resource Provider 363
Installing the OpflexAgent Certificate 363
Configuring ACI Azure Pack Resource Provider Site 365
Installing ACI Azure Pack Admin Site Extension 366
Installing ACI Azure Pack Tenant Site Extension 366
Setting Up ACI 366
Verifying the Windows Azure Pack Resource Provider 367
Upgrading the Cisco ACI with Microsoft Windows Azure Pack Components 367
Upgrading the ACI Windows Azure Pack Workflow 368
Upgrading the ACI Windows Azure Pack Resource Provider 369
Upgrading the ACI Azure Pack Admin Site Extension 369
Upgrading the ACI Azure Pack Tenant Site Extension 370
Use Case Scenarios for the Administrator and Tenant Experience 370
Admin Tasks 374
About Plan Types 374
About Plan Options 374
Creating a Plan 375
Creating a Tenant 376
Allowing Tenants to Provide Shared Services 377
Allowing Tenants to Consume Shared Service 378
Allowing Tenants to Consume NAT Firewall and ADC Load Balancer Services 378
Viewing the Shared Service Providers and Consumers 379
Managing Shared Services 379
Deprecating a Shared Service from New Tenants 379

Cisco ACI Virtualization Guide, Release 2.2(2)


xvii
Contents

Revoking a Tenant from a Shared Service 380


About Load Balancing 380
Importing the Device Package on APIC 381
Configuring the Load Balancer Device on APIC using XML POST 381
Creating a Load Balancer to a Plan 387
About L3 External Connectivity 388
Prerequisites for Configuring L3 External Connectivity for Windows Azure
Pack 388
Creating a Contract to be Provided by the l3extinstP "default" 388
Creating a Contract to be Provided by the l3extinstP "vpcDefault" 389
Tenant Tasks 390
Shared or Virtual Private Cloud Plan Experience 390
Creating Networks in a Shared Plan 390
Verifying the Network you Created on Microsoft Windows Azure Pack on
APIC 390
Creating a Bridge Domain in a VPC Plan 391
Creating a Network and Associating to a Bridge Domain in a VPC Plan 391
Creating a Firewall Within the Same Subscription 392
Creating the Network in VPC Plan 392
Creating VMs and Attaching to Networks 393
Providing a Shared Service 394
Setting up the Shared Service to be Consumed 394
Configuring the Load Balancer 395
Adding Access Control Lists 395
Deleting Access Control Lists 396
Preparing a Tenant L3 External Out on APIC for Use at Windows Azure Pack 396
Creating a Network for External Connectivity 397
Creating a Firewall for External Connectivity 398
Verifying Tenant L3 External Connectivity on APIC 399
Adding NAT Firewall Layer 4 to Layer 7 Services to a VM Network 399
Adding NAT Firewall Port-Forwarding Rules for a VM Network 400
Adding NAT Firewall With a Private ADC Load Balancer Layer 4 to Layer 7
Services to a VM Network 400
Adding a Public ADC Load Balancer Layer 4 to Layer 7 Services to a VM
Network 401

Cisco ACI Virtualization Guide, Release 2.2(2)


xviii
Contents

Adding ADC Load Balancer Configuration for a VM Network 402


Troubleshooting Cisco ACI with Microsoft Windows Azure Pack 402
Troubleshooting as an Admin 402
Troubleshooting as a Tenant 402
Troubleshooting the EPG Configuration Issue 403
Programmability References 403
ACI Windows Azure Pack PowerShell Cmdlets 403
Uninstalling the Cisco ACI with Microsoft Windows Azure Pack Components 404
Uninstalling the APIC Windows Azure Pack Resource Provider 405
Uninstalling the ACI Azure Pack Resource Provider 405
Uninstalling the ACI Azure Pack Admin Site Extension 406
Uninstalling the ACI Azure Pack Tenant Site Extension 406
Uninstalling the APIC Hyper-V Agent 407
Downgrading the APIC Controller and the Switch Software with Cisco ACI with Microsoft
Windows Azure Pack Components 407

Cisco ACI Virtualization Guide, Release 2.2(2)


xix
Contents

Cisco ACI Virtualization Guide, Release 2.2(2)


xx
Preface
This preface includes the following sections:

Audience, page xxi


Document Conventions, page xxi
Related Documentation, page xxiii
Documentation Feedback, page xxiv
Obtaining Documentation and Submitting a Service Request, page xxiv

Audience
This guide is intended primarily for data center administrators with responsibilities and expertise in one or
more of the following:
Virtual machine installation and administration
Server administration
Switch and network administration

Document Conventions
Command descriptions use the following conventions:

Convention Description
bold Bold text indicates the commands and keywords that you enter literally
as shown.

Italic Italic text indicates arguments for which the user supplies the values.

[x] Square brackets enclose an optional element (keyword or argument).

Cisco ACI Virtualization Guide, Release 2.2(2)


xxi
Preface
Document Conventions

Convention Description
[x | y] Square brackets enclosing keywords or arguments separated by a vertical
bar indicate an optional choice.

{x | y} Braces enclosing keywords or arguments separated by a vertical bar


indicate a required choice.

[x {y | z}] Nested set of square brackets or braces indicate optional or required


choices within optional or required elements. Braces and a vertical bar
within square brackets indicate a required choice within an optional
element.

variable Indicates a variable for which you supply values, in context where italics
cannot be used.

string A nonquoted set of characters. Do not use quotation marks around the
string or the string will include the quotation marks.

Examples use the following conventions:

Convention Description
screen font Terminal sessions and information the switch displays are in screen font.

boldface screen font Information you must enter is in boldface screen font.

italic screen font Arguments for which you supply values are in italic screen font.

<> Nonprinting characters, such as passwords, are in angle brackets.

[] Default responses to system prompts are in square brackets.

!, # An exclamation point (!) or a pound sign (#) at the beginning of a line


of code indicates a comment line.

This document uses the following conventions:

Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.

Caution Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.

Cisco ACI Virtualization Guide, Release 2.2(2)


xxii
Preface
Related Documentation

Warning IMPORTANT SAFETY INSTRUCTIONS


This warning symbol means danger. You are in a situation that could cause bodily injury. Before you
work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with
standard practices for preventing accidents. Use the statement number provided at the end of each warning
to locate its translation in the translated safety warnings that accompanied this device.
SAVE THESE INSTRUCTIONS

Related Documentation
Application Policy Infrastructure Controller (APIC) Documentation
Companion documents for APIC, Cisco APIC Getting Started Guide, Cisco APIC Basic Configuration Guide,
Cisco APIC Layer 2 Networking Configuration Guide, Cisco APIC Layer 3 Networking Configuration Guide,
Cisco APIC NX-OS Style Command-Line Interface Configuration Guide, Cisco APIC REST API Configuration
Guide, Cisco APIC Layer 4 to Layer 7 Services Deployment Guide, and Cisco ACI Virtualization Guide are
available at the following URL: http://www.cisco.com/c/en/us/support/cloud-systems-management/
application-policy-infrastructure-controller-apic/tsd-products-support-series-home.html

Cisco Application Centric Infrastructure (ACI) Documentation


The broader ACI documentation is available at the following URL: http://www.cisco.com/c/en/us/support/
cloud-systems-management/application-policy-infrastructure-controller-apic/
tsd-products-support-series-home.html.

Cisco Application Centric Infrastructure (ACI) Simulator Documentation


The Cisco ACI Simulator documentation is available at http://www.cisco.com/c/en/us/support/
cloud-systems-management/application-centric-infrastructure-simulator/tsd-products-support-series-home.html.

Cisco Nexus 9000 Series Switches Documentation


The Cisco Nexus 9000 Series Switches documentation is available at http://www.cisco.com/c/en/us/support/
switches/nexus-9000-series-switches/tsd-products-support-series-home.html.

Cisco Application Virtual Switch Documentation


The Cisco Application Virtual Switch (AVS) documentation is available at http://www.cisco.com/c/en/us/
support/switches/application-virtual-switch/tsd-products-support-series-home.html.

Cisco Application Centric Infrastructure (ACI) Integration with OpenStack Documentation


Cisco ACI integration with OpenStack documentation is available at http://www.cisco.com/c/en/us/support/
cloud-systems-management/application-policy-infrastructure-controller-apic/
tsd-products-support-series-home.html.

Cisco ACI Virtualization Guide, Release 2.2(2)


xxiii
Preface
Documentation Feedback

Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to [email protected]. We appreciate your feedback.

Obtaining Documentation and Submitting a Service Request


For information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service
request, and gathering additional information, see What's New in Cisco Product Documentation at: http://
www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html
Subscribe to Whats New in Cisco Product Documentation, which lists all new and revised Cisco technical
documentation as an RSS feed and delivers content directly to your desktop using a reader application. The
RSS feeds are a free service.

Cisco ACI Virtualization Guide, Release 2.2(2)


xxiv
CHAPTER 1
New and Changed Information
This chapter contains the following sections:

New and Changed Information, page 1

New and Changed Information


The following table provides an overview of the significant changes to this guide up to this current release.
The table does not provide an exhaustive list of all changes made to the guide or of the new features up to
this release.

Cisco ACI Virtualization Guide, Release 2.2(2)


1
New and Changed Information
New and Changed Information

Table 1: New Features and Changed Behavior in the Cisco ACI Virtualization Guide

Cisco APIC Release Feature Description Where Documented


Version
2.2(2) Cisco ACI vCenter The Cisco ACI vCenter For more information,
plug-in for Cisco AVS plug-in can be used to see:
install, uninstall, or
upgrade Cisco AVS Installing Cisco
AVS Using the
through the vCenter.
VMware vCenter
Plug-in, on page
102
Uninstalling Cisco
AVS, on page 124
Uninstalling Cisco
AVS Using the
VMware vCenter
Plug-in, on page
125
For information
about upgrading or
downgrading Cisco
AVS using the
Cisco ACI vCenter
plug-in, see the
Cisco Application
Virtual Switch
Installation Guide,
Release
5.2(1)SV3(3.2)

Cisco ACI Virtualization Guide, Release 2.2(2)


2
New and Changed Information
New and Changed Information

Cisco APIC Release Feature Description Where Documented


Version
2.2(2) Windows Azure Pack Windows Azure Pack For more information,
Virtual Private Cloud Virtual Private Cloud see:
Services Integration Services Integration
enables Azure Pack Allowing Tenants to
Consume NAT
tenants the ability
Firewall and ADC
seamlessly to deploy
Load Balancer
Layer 4 to Layer 7
Services, on page
services through the Cisco
378
ACI service graph model.
This feature supports Adding NAT
NAT firewall with port Firewall Layer 4 to
forwarding, load Layer 7 Services to
balancing, and the ability a VM Network, on
to chain the two services. page 399
With the NAT firewall,
users will have the ability Adding NAT
to initiate outbound Firewall
connections in addition to Port-Forwarding
exposing services through Rules for a VM
port forwarding. Network, on page
400
Adding NAT
Firewall With a
Private ADC Load
Balancer Layer 4 to
Layer 7 Services to
a VM Network, on
page 400
Adding a Public
ADC Load Balancer
Layer 4 to Layer 7
Services to a VM
Network, on page
401
Adding ADC Load
Balancer
Configuration for a
VM Network, on
page 402

Cisco ACI Virtualization Guide, Release 2.2(2)


3
New and Changed Information
New and Changed Information

Cisco APIC Release Feature Description Where Documented


Version
2.2(1) Windows Azure Pack This feature enables a For more information,
Shared Services across Windows Azure Pack see:
Tenant VRFs tenant on a VPC plan to
provide shared services Use Case Scenarios
for the
from the tenants private
Administrator and
address space. Networks
Tenant Experience,
on a private addressing
on page 370
space can be used as
shared services Tenant Tasks, on
consumers or providers. page 390
Setting up the
Shared Service to be
Consumed, on page
394

2.2(1) NetFlow with Virtual The NetFlow technology For more information, see
Machine Networking provides the metering About NetFlow Exporter
base for a key set of Policies with Virtual
applications, including Machine Networking, on
network traffic page 16.
accounting, usage-based
network billing, network
planning, as well as denial
of services monitoring,
network monitoring,
outbound marketing, and
data mining for both
service providers and
enterprise customers.

2.2(1) ICMP and UDP Flow Cisco AVS monitors For more information, see
Logging for Distributed ICMP and UDP flows as Distributed Firewall Flow
Firewall well as TCP flows by Logging, on page 153.
default when you enable
Distributed Firewall.
However, Cisco AVS
does not deny ICMP and
UDP flows as it does TCP
flows.

Cisco ACI Virtualization Guide, Release 2.2(2)


4
CHAPTER 2
Cisco ACI Virtual Machine Networking
This chapter contains the following sections:

Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 5
Virtual Machine Manager Domain Main Components , page 6
Virtual Machine Manager Domains, page 7
VMM Domain VLAN Pool Association, page 7
VMM Domain EPG Association, page 8
About Trunk Port Group, page 10
Attachable Entity Profile, page 11
EPG Policy Resolution and Deployment Immediacy, page 12
Guidelines for Deleting VMM Domains, page 13
Toggling Between Basic and Advanced GUI Modes, page 14
NetFlow with Virtual Machine Networking, page 15
Troubleshooting VMM Connectivity, page 21

Cisco ACI VM Networking Supports Multiple Vendors' Virtual


Machine Managers
Cisco ACI virtual machine networking provides hypervisors from multiple vendors programmable and
automated access to high-performance scalable virtualized data center infrastructure. (See the Virtualization
Compatibility List Solution Overview for the most current list of verified interoperable products.)
Programmability and automation are critical features of scalable data center virtualization infrastructure. The
ACI open REST API enables virtual machine (VM) integration with and orchestration of the policy-model-based
ACI fabric. ACI VM networking enables consistent enforcement of policies across both virtual and physical
workloads managed by hypervisors from multiple vendors. Attachable entity profiles easily enable VM
mobility and placement of workloads anywhere in the ACI fabric. The ACI APIC controller provides centralized
troubleshooting, application health score, and virtualization monitoring. By reducing or eliminating manual

Cisco ACI Virtualization Guide, Release 2.2(2)


5
Cisco ACI Virtual Machine Networking
Virtual Machine Manager Domain Main Components

configuration and manual errors, ACI multi-hypervisor VM automation enables virtualized data centers to
support very large numbers of VMs reliably and cost effectively.

Virtual Machine Manager Domain Main Components


ACI fabric virtual machine manager (VMM) domains enable an administrator to configure connectivity
policies for virtual machine controllers. The essential components of an ACI VMM domain policy include
the following:
Virtual Machine Manager Domain ProfileGroups VM controllers with similar networking policy
requirements. For example, VM controllers can share VLAN pools and application endpoint groups
(EPGs). The APIC communicates with the controller to publish network configurations such as port
groups that are then applied to the virtual workloads. The VMM domain profile includes the following
essential components:
CredentialAssociates a valid VM controller user credential with an APIC VMM domain.
ControllerSpecifes how to connect to a VM controller that is part of a policy enforcement
domain. For example, the controller specifies the connection to a VMware vCenter that is part a
VMM domain.

Note A single VMM domain can contain multiple instances of VM controllers, but they must
be from the same vendor (for example, from VMware or from Microsoft.

EPG AssociationEndpoint groups regulate connectivity and visibility among the endpoints within
the scope of the VMM domain policy. VMM domain EPGs behave as follows:
The APIC pushes these EPGs as port groups into the VM controller.
An EPG can span multiple VMM domains, and a VMM domain can contain multiple EPGs.

Attachable Entity Profile AssociationAssociates a VMM domain with the physical network
infrastructure. An attachable entity profile (AEP) is a network interface template that enables deploying
VM controller policies on a large set of leaf switch ports. An AEP specifies which switches and ports
are available, and how they are configured.
VLAN Pool AssociationA VLAN pool specifies the VLAN IDs or ranges used for VLAN encapsulation
that the VMM domain consumes.

Cisco ACI Virtualization Guide, Release 2.2(2)


6
Cisco ACI Virtual Machine Networking
Virtual Machine Manager Domains

Virtual Machine Manager Domains


An APIC VMM domain profile is a policy that defines a VMM domain. The VMM domain policy is created
in APIC and pushed into the leaf switches.

Figure 1: ACI VMM Domain VM Controller Integration

VMM domains provide the following:


A common layer in the ACI fabric that enables scalable fault-tolerant support for multiple VM controller
platforms.
VMM support for multiple tenants within the ACI fabric.

VMM domains contain VM controllers such as VMware vCenter or Microsoft SCVMM Manager and the
credential(s) required for the ACI API to interact with the VM controller. A VMM domain enables VM
mobility within the domain but not across domains. A single VMM domain can contain multiple instances of
VM controllers but they must be the same kind. For example, a VMM domain can contain many VMware
vCenters managing multiple controllers each running multiple VMs but it may not also contain SCVMM
Managers. A VMM domain inventories controller elements (such as pNICs, vNICs, VM names, and so forth)
and pushes policies into the controller(s), creating port groups, and other necessary elements. The ACI VMM
domain listens for controller events such as VM mobility and responds accordingly.

VMM Domain VLAN Pool Association


VLAN pools represent blocks of traffic VLAN identifiers. A VLAN pool is a shared resource and can be
consumed by multiple domains such as VMM domains and Layer 4 to Layer 7 services.
Each pool has an allocation type (static or dynamic), defined at the time of its creation. The allocation type
determines whether the identifiers contained in it will be used for automatic assignment by the APIC (dynamic)

Cisco ACI Virtualization Guide, Release 2.2(2)


7
Cisco ACI Virtual Machine Networking
VMM Domain EPG Association

or set explicitly by the administrator (static). By default, all blocks contained within a VLAN pool have the
same allocation type as the pool but users can change the allocation type for encapsulation blocks contained
in dynamic pools to static. Doing so excludes them from dynamic allocation.
A VMM domain can associate with only one dynamic VLAN pool. By default, the assignment of VLAN
identifiers to EPGs that are associated with VMM domains is done dynamically by the APIC. While dynamic
allocation is the default and preferred configuration, an administrator can statically assign a VLAN identifier
to an EPG instead. In that case, the identifiers used must be selected from encapsulation blocks in the VLAN
pool associated with the VMM domain, and their allocation type must be changed to static.
The APIC provisions VMM domain VLAN on leaf ports based on EPG events, either statically binding on
leaf ports or based on VM events from controllers such as VMware vCenter or Microsoft SCVMM.

VMM Domain EPG Association


The ACI fabric associates tenant application profile EPGs to VMM domains, either automatically by an
orchestration component such as Microsoft Azure, or by an APIC administrator creating such configurations.
An EPG can span multiple VMM domains and a VMM domain can contain multiple EPGs.

Figure 2: VMM Domain EPG Association

In the illustration above, end points (EP) of the same color are part of the same end point group. For example,
all the green EPs are in the same EPG even though they are in two different VMM domains.

Cisco ACI Virtualization Guide, Release 2.2(2)


8
Cisco ACI Virtual Machine Networking
VMM Domain EPG Association

Refer to the latest Verified Scalability Guide for Cisco ACI document for virtual network and VMM domain
EPG capacity information.

Figure 3: VMM Domain EPG VLAN Consumption

Note Multiple VMM domains can connect to the same leaf switch if they do not have overlapping VLAN pools
on the same port. Similarly, the same VLAN pools can be used across different domains if they do not
use the same port of a leaf switch.

EPGs can use multiple VMM domains in the following ways:


An EPG within a VMM domain is identified by using an encapsulation identifier that is either
automatically managed by the APIC, or statically selected by the administrator. An example is a VLAN,
a Virtual Network ID (VNID).
An EPG can be mapped to multiple physical (for baremetal servers) or virtual domains. It can use
different VLAN or VNID encapsulations in each domain.

Note By default, the APIC dynamically manages allocating a VLAN for an EPG. VMware DVS administrators
have the option to configure a specific VLAN for an EPG. In that case, the VLAN is chosen from a static
allocation block within the pool associated with the VMM domain.

Cisco ACI Virtualization Guide, Release 2.2(2)


9
Cisco ACI Virtual Machine Networking
About Trunk Port Group

Applications can be deployed across VMM domains.

Figure 4: Multiple VMM Domains and Scaling of EPGs in the Fabric

While live migration of VMs within a VMM domain is supported, live migration of VMs across VMM domains
is not supported.

About Trunk Port Group


A trunk port group is used to aggregate the traffic of EPGs. Currently, it is supported under a VMware domain
only. The trunk port groups naming scheme does not follow an EPGs T|A|E format. The name can be any
ASCII string, as a trunk port group is not tenant-aware.
The aggregation of EPGs under the same domain is based on a VLAN range, which is specified as encapsulation
blocks contained in the trunk port group. Whenever a EPGs encapsulation is changed or a trunk port groups
encapsulation block is changed, the aggregation will be re-evaluated to determine if the EGP should be
aggregated. A trunk port group controls the deployment in leafs of network resources, such as VLANs,
allocated to EPGs being aggregated, including both the base EPG and uSeg EPG. In the case of a uSeg EPG,
the trunk port groups VLAN ranges need to include both the primary and secondary VLANs.

Cisco ACI Virtualization Guide, Release 2.2(2)


10
Cisco ACI Virtual Machine Networking
Attachable Entity Profile

Note When you configure Layer 3 Outside (L3Out) connections to external routers, or multipod connections
through an Inter-Pod Network (IPN), it is critical that the MTU be set appropriately on both sides. On
some platforms, such as ACI, Cisco NX-OS, and Cisco IOS, the configurable MTU value takes into
account packet headers (resulting in a max packet size to be set as 9000 bytes), whereas other platforms
such as IOS-XR configure the MTU value exclusive of packet headers (resulting in a max packet size of
8986 bytes).
For the appropriate MTU values for each platform, see the relevant configuration guides.
Cisco highly recommends you test the MTU using CLI-based commands. For example, on the Cisco
NX-OS CLI, use a command such as ping 1.1.1.1 df-bit packet-size 9000 source-interface
ethernet 1/1.

Caution If you install 1 Gigabit Ethernet (GE) or 10GE links between the leaf and spine switches in the fabric,
there is risk of packets being dropped instead of forwarded, because of inadequate bandwidth. To avoid
the risk, use 40GE or 100GE links between the leaf and spine switches.

For more information, see


Creating a Trunk Port Group Using the GUI, on page 40
Creating a Trunk Port Group Using the NX-OS Style CLI, on page 40
Creating a Trunk Port Group Using the REST API, on page 43

Attachable Entity Profile


The ACI fabric provides multiple attachment points that connect through leaf ports to various external entities
such as bare metal servers, virtual machine hypervisors, Layer 2 switches (for example, the Cisco UCS fabric
interconnect), or Layer 3 routers (for example Cisco Nexus 7000 Series switches). These attachment points
can be physical ports, FEX ports, port channels, or a virtual port channel (vPC) on leaf switches.

Note When creating a VPC domain between two leaf switches, both switches must be in the same switch
generation, one of the following:
Generation 1 - Cisco Nexus N9K switches without EX on the end of the switch name; for example,
N9K-9312TX
Generation 2 Cisco Nexus N9K switches with EX on the end of the switch model name; for
example, N9K-93108TC-EX

Switches such as these two are not compatible VPC peers. Instead, use switches of the same generation
An Attachable Entity Profile (AEP) represents a group of external entities with similar infrastructure policy
requirements. The infrastructure policies consist of physical interface policies that configure various protocol
options, such as Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), or Link Aggregation
Control Protocol (LACP).

Cisco ACI Virtualization Guide, Release 2.2(2)


11
Cisco ACI Virtual Machine Networking
EPG Policy Resolution and Deployment Immediacy

An AEP is required to deploy VLAN pools on leaf switches. Encapsulation blocks (and associated VLANs)
are reusable across leaf switches. An AEP implicitly provides the scope of the VLAN pool to the physical
infrastructure.
The following AEP requirements and dependencies must be accounted for in various configuration scenarios,
including network connectivity, VMM domains, and multipod configuration:
The AEP defines the range of allowed VLANS but it does not provision them. No traffic flows unless
an EPG is deployed on the port. Without defining a VLAN pool in an AEP, a VLAN is not enabled on
the leaf port even if an EPG is provisioned.
A particular VLAN is provisioned or enabled on the leaf port that is based on EPG events either statically
binding on a leaf port or based on VM events from external controllers such as VMware vCenter or
Microsoft Azure Service Center Virtual Machine Manager (SCVMM).
Attached entity profiles can be associated directly with application EPGs, which deploy the associated
application EPGs to all those ports associated with the attached entity profile. The AEP has a configurable
generic function (infraGeneric), which contains a relation to an EPG (infraRsFuncToEpg) that is deployed
on all interfaces that are part of the selectors that are associated with the attachable entity profile.

A virtual machine manager (VMM) domain automatically derives physical interface policies from the interface
policy groups of an AEP.
An override policy at the AEP can be used to specify a different physical interface policy for a VMM domain.
This policy is useful in scenarios where a VM controller is connected to the leaf switch through an intermediate
Layer 2 node, and a different policy is desired at the leaf switch and VM controller physical ports. For example,
you can configure LACP between a leaf switch and a Layer 2 node. At the same time, you can disable LACP
between the VM controller and the Layer 2 switch by disabling LACP under the AEP override policy.

EPG Policy Resolution and Deployment Immediacy


Whenever an EPG associates to a VMM domain, the administrator can choose the resolution and deployment
preferences to specify when a policy should be pushed into leaf switches.

Resolution Immediacy
Pre-provisionSpecifies that a policy (for example, VLAN, VXLAN binding, contracts, or filters) is
downloaded to a leaf switch even before a VM controller is attached to the virtual switch (for example,
VMware VDS) thereby pre-provisioning the configuration on the switch.
This helps the situation where management traffic for hypervisors/VM controllers are also using the
virtual switch associated to APIC VMM domain (VMM switch).
Deploying a VMM policy such as VLAN on ACI leaf switch requires APIC to collect CDP/LLDP
information from both hypervisors via VM controller and ACI leaf switch. However if VM Controller
is supposed to use the same VMM policy (VMM switch) to communicate with its hypervisors or even
APIC, the CDP/LLDP information for hypervisors can never be collected because the policy required
for VM controller/hypervisor management traffic is not deployed yet.
When using pre-provision immediacy, policy is downloaded to ACI leaf switch regardless of CDP/LLDP
neighborship. Even without a hypervisor host connected to the VMM switch.
ImmediateSpecifies that EPG policies (including contracts and filters) are downloaded to the associated
leaf switch software upon VM controller attachment to a virtual switch. LLDP or OpFlex permissions
are used to resolve the VM controller to leaf node attachments.

Cisco ACI Virtualization Guide, Release 2.2(2)


12
Cisco ACI Virtual Machine Networking
Guidelines for Deleting VMM Domains

The policy will be downloaded to leaf when you add host to the VMM switch. CDP/LLDP neighborship
from host to leaf is required.
On DemandSpecifies that a policy (for example, VLAN, VXLAN bindings, contracts, or filters) is
pushed to the leaf node only when a VM controller is attached to a virtual switch and a VM is placed in
the port group (EPG).
The policy will be downloaded to leaf when host is added to VMM switch and virtual machine needs
to be placed into port group (EPG). CDP/LLDP neighborship from host to leaf is required.
With both immediate and on demand, if host and leaf lose LLDP/CDP neighborship the policies are
removed.

Deployment Immediacy
Once the policies are downloaded to the leaf software, deployment immediacy can specify when the policy
is pushed into the hardware policy CAM.
ImmediateSpecifies that the policy is programmed in the hardware policy CAM as soon as the policy
is downloaded in the leaf software.
On DemandSpecifies that the policy is programmed in the hardware policy CAM only when the first
packet is received through the data path. This process helps to optimize the hardware space.

Guidelines for Deleting VMM Domains


Follow the sequence below to assure that the APIC request to delete a VMM domain automatically triggers
the associated VM controller (for example VMware vCenter or Microsoft SCVMM) to complete the process
normally, and that no orphan EPGs are stranded in the ACI fabric.
1 The VM administrator must detach all the VMs from the port groups (in the case of VMware vCenter) or
VM networks (in the case of SCVMM), created by the APIC.
In the case of Cisco AVS, the VM admin also needs to delete vmk interfaces associated with the Cisco
AVS.
2 The ACI administrator deletes the VMM domain in the APIC. The APIC triggers deletion of VMware
VDS or Cisco AVS or SCVMM logical switch and associated objects.

Note The VM administrator should not delete the virtual switch or associated objects (such as port groups or
VM networks); allow the APIC to trigger the virtual switch deletion upon completion of step 2 above.
EPGs could be orphaned in the APIC if the VM administrator deletes the virtual switch from the VM
controller before the VMM domain is deleted in the APIC.

If this sequence is not followed, the VM controller does delete the virtual switch associated with the APIC
VMM domain. In this scenario, the VM administrator must manually remove the VM and vtep associations
from the VM controller, then delete the virtual switch(es) previously associated with the APIC VMM domain.

Cisco ACI Virtualization Guide, Release 2.2(2)


13
Cisco ACI Virtual Machine Networking
Toggling Between Basic and Advanced GUI Modes

Toggling Between Basic and Advanced GUI Modes


When logged in to the APIC GUI, you can verify the GUI mode you are in. The mode you have entered is
displayed in the top right corner of the GUI. You can choose to operate in one of two modes:
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.
Basic ModeFor information about tasks that you perform in Basic Mode, see the chapter,Getting
Started with APIC Using the Basic GUI.
Advanced ModeFor information about tasks that you perform in Advanced Mode, see the
chapter,Getting Started with APIC Using the Advanced GUI.

You can also change from one GUI mode to another or toggle between modes as follows:
1 In the GUI, click the welcome, <login_name> drop-down list and choose Toggle GUI Mode.
2 In the Warning dialog box, click Yes .
3 Wait for the application to complete loading and display the GUI in the changed mode.

Cisco ACI Virtualization Guide, Release 2.2(2)


14
Cisco ACI Virtual Machine Networking
NetFlow with Virtual Machine Networking

Caution Changes made through the APIC Basic GUI can be seen, but cannot be modified in the Advanced GUI,
and changes made in the Advanced GUI cannot be rendered in the Basic GUI. The Basic GUI is kept
synchronized with the NX-OS style CLI, so that if you make a change from the NX-OS style CLI, these
changes are rendered in the Basic GUI, and changes made in the Basic GUI are rendered in the NX-OS
style CLI, but the same synchronization does not occur between the Advanced GUI and the NX-OS style
CLI. See the following examples:
Do not mix Basic and Advanced GUI modes. If you apply an interface policy to two ports using
Advanced mode and then change the settings of one port using Basic mode, your changes might be
applied to both ports.
Do not mix the Advanced GUI and the CLI, when doing per-interface configuration on APIC.
Configurations performed in the GUI, may only partially work in the NX-OS CLI.
For example, if you configure a switch port in the GUI at Tenants > tenant-name > Application
Profiles > application-profile-name > Application EPGs > EPG-name > Static Ports > Deploy
Static EPG on PC, VPC, or Interface
Then you use the show running-config command in the NX-OS style CLI, you receive output such
as:
leaf 102
interface ethernet 1/15
switchport trunk allowed vlan 201 tenant t1 application ap1 epg ep1
exit
exit
If you use these commands to configure a static port in the NX-OS style CLI, the following error
occurs:
apic1(config)# leaf 102
apic1(config-leaf)# interface ethernet 1/15
apic1(config-leaf-if)# switchport trunk allowed vlan 201 tenant t1 application ap1
epg ep1
No vlan-domain associated to node 102 interface ethernet1/15 encap vlan-201
This occurs because the CLI has validations that are not performed by the APIC GUI. For the
commands from the show running-config command to function in the NX-OS CLI, a vlan-domain
must have been previously configured. The order of configuration is not enforced in the GUI.
Do not make changes with the Basic GUI or the NX-OS CLI before using the Advanced GUI. This
may also inadvertantly cause objects to be created (with names prepended with _ui_) which cannot
be changed or deleted in the Advanced GUI.

For the steps to remove such objects, see Troubleshooting Unwanted _ui_ Objects in the APIC Troubleshooting
Guide.

NetFlow with Virtual Machine Networking


About NetFlow with Virtual Machine Networking
The NetFlow technology provides the metering base for a key set of applications, including network traffic
accounting, usage-based network billing, network planning, as well as denial of services monitoring, network
monitoring, outbound marketing, and data mining for both service providers and enterprise customers. Cisco
provides a set of NetFlow applications to collect NetFlow export data, perform data volume reduction, perform

Cisco ACI Virtualization Guide, Release 2.2(2)


15
Cisco ACI Virtual Machine Networking
About NetFlow Exporter Policies with Virtual Machine Networking

post-processing, and provide end-user applications with easy access to NetFlow data. If you have enabled
NetFlow monitoring of the traffic flowing through your datacenters, this feature enables you to perform the
same level of monitoring of the traffic flowing through the Cisco Application Centric Infrastructure (Cisco
ACI) fabric.
Instead of hardware directly exporting the records to a collector, the records are processed in the supervisor
engine and are exported to standard NetFlow collectors in the required format.
For more information about NetFlow, see the Cisco APIC and NetFlow knowledge base article.

About NetFlow Exporter Policies with Virtual Machine Networking


A virtual machine manager exporter policy (netflowVmmExporterPol) describes information about the data
collected for a flow that is sent to the reporting server or NetFlow collector. A NetFlow collector is an external
entity that supports the standard NetFlow protocol and accepts packets marked with valid NetFlow headers.
An exporter policy has the following properties:
VmmExporterPol.dstAddrThis mandatory property specifies the IPv4 or IPv6 address of the NetFlow
collector that accepts the NetFlow flow packets. This must be in the host format (that is, "/32" or "/128").
An IPv6 address is supported in vSphere Distributed Switch (vDS) version 6.0 and later.
VmmExporterPol.dstPortThis mandatory property specifies the port on which the NetFlow collector
application is listening on, which enables the collector to accept incoming connections.
VmmExporterPol.srcAddrThis optional property specifies the IPv4 address that is used as the source
address in the exported NetFlow flow packets.

NetFlow Support with VMware vSphere Distributed Switch


The VMware vSphere Distributed Switch (vDS) supports NetFlow with following caveats:
The external collector must be reachable through the ESX. ESX does not support virtual routing and
forwardings (VRFs).
A port group can enable or disable NetFlow.
vDS does not support flow-level filtering.

Configure the following vDS parameters in VMware vCenter:


Collector IP address and port. IPv6 is supported on vDS version 6.0 or later. These are mandatory.
Source IP address. This is optional.
Active flow timeout, idle flow timeout, and sampling rate. These are optional.

Configuring a NetFlow Exporter Policy for VM Networking Using the GUI


The following procedure configures a NetFlow exporter policy for VM networking using the advanced GUI
mode.

Cisco ACI Virtualization Guide, Release 2.2(2)


16
Cisco ACI Virtual Machine Networking
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the GUI

Procedure

Step 1 On the menu bar, choose Fabric > Access Policies.


Step 2 In the Navigation pane, choose Interface Policies > Policies > Analytics > NetFlow Exporters for VM
Networking.
Step 3 In the Work pane, choose Actions > Create NetFlow Exporter Policy
Step 4 In the Create NetFlow Exporter Policy dialog box, fill in the fields as required.
Step 5 Click Submit.

Consuming a NetFlow Exporter Policy Under a VMM Domain Using the GUI
The following procedure consumes a NetFlow exporter policy under a VMM domain using the advanced GUI
mode.

Procedure

Step 1 On the menu bar, choose VM Networking > Inventory.


Step 2 In the Navigation pane, choose VMware.
Step 3 In the Work pane, click +.
Step 4 In the Create vCenter Domain dialog box, fill in the fields as required, except as specified below:
a) In the NetFlow Exporter Policy drop-down list, choose the desired exporter policy or create a new one.
b) In the Active Flow Timeout field, enter the desired active flow timeout, in seconds.
The Active Flow Timeout parameter specifies the delay that NetFlow waits after the active flow is initiated,
after which NetFlow sends the collected data. The range is from 0 to 3600. The default value is 60.
c) In the Idle Flow Timeout field, enter the desired idle flow timeout, in seconds.
The Idle Flow Timeout parameter specifies the delay that NetFlow waits after the idle flow is initiated,
after which NetFlow sends the collected data. The range is from 0 to 300. The default value is 15.
d) In the Sampling Rate field, enter the desired sampling rate.
The Sampling Rate parameter specifies how many packets that NetFlow will drop after every collected
packet. If you specify a value of 0, then NetFlow does not drop any packets. The range is from 0 to 1000.
The default value is 0.

Step 5 Click Submit.

Enabling NetFlow on an Endpoint Group to VMM Domain Association Using


the GUI
The following procedure enables NetFlow on an endpoint group to VMM domain association using the
advanced GUI mode.

Cisco ACI Virtualization Guide, Release 2.2(2)


17
Cisco ACI Virtual Machine Networking
Configuring a NetFlow Exporter Policy for Virtual Machine Networking Using the NX-OS-Style CLI

Before You Begin


You must have configured the following things:
An application profile
An application endpoint group

Procedure

Step 1 On the menu bar, choose Tenants > All Tenants.


Step 2 In the Work pane, double-click the tenant's name.
Step 3 In the Navigation pane, choose Tenant tenant_name > Application Profiles > application_profile_name
> Application EPGs > application_EPG_name > Domains (VMs and Bae-Metals).
Step 4 In the Work pane, choose Actions > Add VMM Domain Association.
Step 5 In the Add VMM Domain Association dialog box, fill in the fields as required, except as specified below:
a) For the NetFlow buttons, click Enable.
Step 6 Click Submit.

Configuring a NetFlow Exporter Policy for Virtual Machine Networking Using


the NX-OS-Style CLI
The following example procedure uses the NX-OS-style CLI to configure a NetFlow exporter policy for
virtual machine networking.

Procedure

Step 1 Enter the configuration mode.

Example:
apic1# config

Step 2 Configure the exporter policy.

Example:
apic1(config)# flow vm-exporter vmExporter1 destination address 2.2.2.2 transport udp 1234
apic1(config-flow-vm-exporter)# source address 4.4.4.4
apic1(config-flow-vm-exporter)# exit
apic1(config)# exit

Cisco ACI Virtualization Guide, Release 2.2(2)


18
Cisco ACI Virtual Machine Networking
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the NX-OS-Style CLI

Consuming a NetFlow Exporter Policy Under a VMM Domain Using the


NX-OS-Style CLI
The following procedure uses the NX-OS-style CLI to consume a NetFlow exporter policy under a VMM
domain.

Procedure

Step 1 Enter the configuration mode.

Example:
apic1# config

Step 2 Consume the NetFlow exporter policy.

Example:
apic1(config)# vmware-domain mininet
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# flow exporter vmExporter1
apic1(config-vmware-dvs-flow-exporter)# active-flow-timeout 62
apic1(config-vmware-dvs-flow-exporter)# idle-flow-timeout 16
apic1(config-vmware-dvs-flow-exporter)# sampling-rate 1
apic1(config-vmware-dvs-flow-exporter)# exit
apic1(config-vmware-dvs)# exit
apic1(config-vmware)# exit
apic1(config)# exit

Enabling or Disabling NetFlow on an Endpoint Group Using the NX-OS-Style


CLI
The following procedure enables or disables NetFlow on an endpoint group using the NX-OS-style CLI.

Procedure

Step 1 Enable NetFlow:

Example:
apic1# config
apic1(config)# tenant tn1
apic1(config-tenant)# application app1
apic1(config-tenant-app)# epg epg1
apic1(config-tenant-app-epg)# vmware-domain member mininet
apic1(config-tenant-app-epg-domain)# flow monitor enable
apic1(config-tenant-app-epg-domain)# exit
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# exit
apic1(config-tenant)# exit
apic1(config)# exit
Step 2 (Optional) If you no longer want to use NetFlow, disable the feature:

Cisco ACI Virtualization Guide, Release 2.2(2)


19
Cisco ACI Virtual Machine Networking
Configuring a NetFlow Exporter Policy for VM Networking Using the REST API

Example:
apic1(config-tenant-app-epg-domain)# no flow monitor enable

Configuring a NetFlow Exporter Policy for VM Networking Using the REST


API
The following example XML shows how to configure a NetFlow exporter policy for VM networking using
the REST API:
<polUni>
<infraInfra>
<netflowVmmExporterPol name=vmExporter1 dstAddr=2.2.2.2 dstPort=1234
srcAddr=4.4.4.4/>
</infraInfra>
</polUni>

Consuming a NetFlow Exporter Policy Under a VMM Domain Using the REST
API
The following example XML shows how to consume a NetFlow exporter policy under a VMM domain using
the REST API:
<polUni>
<vmmProvP vendor=VMware>
<vmmDomP name=mininet>
<vmmVSwitchPolicyCont>
<vmmRsVswitchExporterPol tDn=uni/infra/vmmexporterpol-vmExporter1
activeFlowTimeOut=62 idleFlowTimeOut=16 samplingRate=1/>
</vmmVSwitchPolicyCont>
</vmmDomP>
</vmmProvP>
</polUni>

Enabling NetFlow on an Endpoint Group for VMM Domain Association


The following example XML shows how to enable NetFlow on an endpoint group for VMM domain association
using the REST APIs:
<polUni>
<fvTenant name=t1>
<fvAp name=a1>
<fvAEPg name=EPG1>
<fvRsDomAtt tDn=uni/vmmp-VMware/dom-mininet netflowPef=enabled />
</fvAEPg>
</fvAp>
</fvTenant>
</polUni>

Cisco ACI Virtualization Guide, Release 2.2(2)


20
Cisco ACI Virtual Machine Networking
Troubleshooting VMM Connectivity

Troubleshooting VMM Connectivity


The following procedure resolves VMM connectivity issues:

Procedure

Step 1 Trigger inventory resync on the Application Policy Infrastructure Controller (APIC).
For more information about how to trigger an inventory resync on APIC, see the following knowledge base
article:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/kb/b_KB_VMM_OnDemand_Inventory_
in_APIC.html

Step 2 If step 1 does not fix the issue, for the impacted EPGs, set the resolution immediacy to use preprovisioning
in the VMM domain.
"Pre-Provision removes the need for neighbor adjacencies or OpFlex permissions and subsequently the
dynamic nature of VMM Domain VLAN Programming. For more information about Resolution Immediacy
types, see the following EPG Policy Resolution and Deployment Immediacy section:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-x/aci-fundamentals/
b_ACI-Fundamentals/b_ACI-Fundamentals_chapter_01011.html#concept_
EF87ADDAD4EF47BDA741EC6EFDAECBBD

Step 3 If steps 1 and 2 do not fix the issue and you see the issue on all of the VMs, then delete the VM controller
policy and readd the policy.
Note Deleting the controller policy impacts traffic for all VMs that are on that controller.

Cisco ACI Virtualization Guide, Release 2.2(2)


21
Cisco ACI Virtual Machine Networking
Troubleshooting VMM Connectivity

Cisco ACI Virtualization Guide, Release 2.2(2)


22
CHAPTER 3
Cisco ACI with VMware VDS and VMware
vShield Integration
This chapter contains the following sections:

Configuring Virtual Machine Networking Policies, page 23


Creating a VMM Domain Profile, page 27
Creating VDS Uplink Port Groups, page 39
Creating a Trunk Port Group, page 40
Creating a Trunk Port Group Using the GUI, page 40
Creating a Trunk Port Group Using the NX-OS Style CLI, page 40
Creating a Trunk Port Group Using the REST API, page 43
Working with Blade Servers, page 43
Troubleshooting the Cisco ACI and VMware VMM System Integration, page 46
Additional Reference Sections, page 46

Configuring Virtual Machine Networking Policies


The APIC integrates with third-party VM manager (VMM) (for example, VMware vCenter) to extend the
benefits of ACI to the virtualized infrastructure. The APIC enables the ACI policies inside the VMM system
to be used by its administrator.
The following modes of Cisco ACI and VMware VMM integration are supported:
Vmware VDSWhen integrated with Cisco ACI, the VMware vSphere Distributed Switch (VDS)
enables you to configure VM networking in the ACI fabric.
Cisco Application Virtual Switch (AVS)For information about how to install and configure the Cisco
AVS with the Cisco ACI, see details in Cisco ACI with Cisco AVS, on page 85.

Cisco ACI Virtualization Guide, Release 2.2(2)


23
Cisco ACI with VMware VDS and VMware vShield Integration
APIC Supported VMware VDS Versions

APIC Supported VMware VDS Versions


VMware VDS Release 5.1 Release 5.5 Release 6.0 Release 6.5
VMware vCenter Supported Supported Supported Supported

VMware vShield Supported Supported N/A N/A

Note When adding additional VMware ESXi hosts to the VMM domain with VMware vSphere Distributed
Switch (VDS), ensure that the version of ESXi host is compatible with the Distributed Virtual Switch
(DVS) version already deployed in the vCenter. For more information about VMware VDS compatibility
requirements for ESXi hosts, see the VMware documentation.
If the ESXi host version is not compatible with the existing DVS version, vCenter will not be able to add
the ESXi host to the DVS, and an incompatibility error will occur. Modification of the existing DVS
Version setting from the Cisco APIC is not possible. To lower the DVS Version in the vCenter, you need
to remove and reapply the VMM domain configuration with a lower setting.

Important If you have ESXi 6.5 hosts running UCS B-Series or C-Series server with VIC cards, some of the vmnics
may go down on a port state event, such as a link flap or a TOR reload. To prevent this problem, do not
use the default eNIC driver but install it from Cisco.com: https://cspg-releng.cisco.com/vic/blade/3.1.3/
Drivers/VMware/Network/Cisco/VIC/ESXi_6.5/

Guidelines for Upgrading VMware DVS from 5.x to 6.x and VMM Integration
This section describes the guidelines for upgrading VMware Distributed Virtual Switch (DVS) from 5.x to
6.x and VMM integration.
DVS versioning is only applicable to the VMware DVS and not the Cisco Application Virtual Switch
(AVS). DVS upgrades are initiated from VMware vCenter, or the relevant orchestration tool and not
ACI. The Upgrade Version option appears greyed out for AVS switches within vCenter.
If you are upgrading the DVS from 5.x to 6.x, you must upgrade the vCenter Server to version 6.0 and
all hosts connected to the distributed switch to ESXi 6.0. For full details on upgrading your vCenter and
Hypervisor hosts, see VMware's upgrade documentation. To upgrade the DVS go to the Web Client:
Home > Networking > DatacenterX > DVS-X > Actions Menu > Upgrade Distributed Switch.
There is no functional impact on the DVS features, capability, performance and scale if the DVS version
shown in vCenter does not match the VMM domain DVS version configured on the APIC. The APIC
and VMM Domain DVS Version is only used for initial deployment.

Cisco ACI Virtualization Guide, Release 2.2(2)


24
Cisco ACI with VMware VDS and VMware vShield Integration
Mapping ACI and VMware Constructs

Mapping ACI and VMware Constructs


Table 2: Mapping of ACI and VMware Constructs

Cisco APIC Terms VMware Terms


VM controller vCenter (Datacenter) or vShield

Virtual Machine Manager (VMM) Domain vSphere Distributed Switch (VDS)

Endpoint group (EPG) Port group

VMware VDS Parameters Managed By APIC

VDS Parameters Managed by APIC


VMware VDS Default Value Configurable using APIC Policy
Name VMM domain name Yes (Derived from Domain)

Description "APIC Virtual Switch" No

Folder Name VMM domain name Yes (Derived from Domain)

Version Highest supported by vCenter Yes

Discovery Protocol LLDP Yes

Uplink Ports and Uplink Names 8 No

Uplink Name Prefix uplink No

Maximum MTU 9000 Yes

LACP policy disabled Yes

Port mirroring 0 sessions Yes

Alarms 2 alarms added at the folder level No

Cisco ACI Virtualization Guide, Release 2.2(2)


25
Cisco ACI with VMware VDS and VMware vShield Integration
VMware VDS Parameters Managed By APIC

VDS Port Group Parameters Managed by APIC


VMware VDS Port Group Default Value Configurable using APIC Policy
Name Tenant Name | Application Profile Yes (Derived from EPG)
Name | EPG Name

Port binding Static binding No

VLAN Picked from VLAN pool Yes

Load balancing algorithm Derived based on port-channel Yes


policy on APIC

Promiscuous mode Disabled Yes

Forged transmit Disabled Yes

Mac change Disabled Yes

Block all ports False No

vShield Manager Parameters Managed by APIC


vShield Manager Default Value Configurable using APIC Policy
virtualwire - Name Tenant Name | Application Profile Yes (Derived from EPG)
Name | EPG Name

virtualwire - Description desc No

virtualwire - segment id picked from Vxlan pool by vShield No

Network scope "apicNetworkScope" No

VxLAN segment-id ranges Not applicable Yes (using Vxlan pool)

Multicast address ranges Not applicable Yes (using Multicast address pool)

Cluster preparation All cluster are prepared by APIC No

Teaming policy Derived based on port channel Yes


policy on the APIC

Cisco ACI Virtualization Guide, Release 2.2(2)


26
Cisco ACI with VMware VDS and VMware vShield Integration
Creating a VMM Domain Profile

Creating a VMM Domain Profile


In this section, examples of a VMM domain are vCenter domain or vCenter and vShield domains.

GUI Tasks
This section shows how to perform tasks using GUI.
For references to REST API tasks, refer to REST API Tasks, on page 48.
For references to NX-OS Style CLI tasks, refer to NX-OS Style CLI Tasks, on page 54.

Prerequisites for Creating a VMM Domain Profile


To configure a VMM domain profile, you must meet the following prerequisites:
All fabric nodes are discovered and configured.
Inband (inb) or out-of-band (oob) management has been configured on the APIC.
A Virtual Machine Manager (VMM) is installed, configured, and reachable through the inb/oob
management network (for example, a vCenter).
You have the administrator/root credentials to the VMM (for example vCenter).

Note If you prefer not to use the vCenter admin/root credentials, you can create a custom user
account with minimum required permissions. See Custom User Account with Minimum
VMware vCenter Privileges, on page 46 for a list of the required user privileges.

A DNS policy for the APIC must be configured if you plan to reference the VMM by hostname rather
than an IP address.
A DHCP server and relay policy must be configured if you are creating a domain profile for VMware
vShield.

Cisco ACI Virtualization Guide, Release 2.2(2)


27
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter Domain Operational Workflow

vCenter Domain Operational Workflow


Figure 5: A Sequential Illustration of the vCenter Domain Operational Workflow

The APIC administrator configures the vCenter domain policies in the APIC. The APIC administrator provides
the following vCenter connectivity information:
vCenter IP address, vCenter credentials, VMM domain policies, and VMM domain SPAN
Policies (VLAN pools, domain type such as VMware VDS, Cisco Nexus 1000V switch)
Connectivity to physical leaf inerfaces (using attach entity profiles)

1 The APIC automatically connects to the vCenter.


2 The APIC creates a VDS under a specified data center on the vCenter.

Note The VDS name is the VMM domain name.

3 The vCenter administrator or the compute management tool adds the ESX host or hypervisor to the APIC
VDS and assigns the ESX host hypervisor ports as uplinks on the APIC VDS. These uplinks must connect
to the ACI leaf switches.

Cisco ACI Virtualization Guide, Release 2.2(2)


28
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter Domain Operational Workflow

4 The APIC learns the location of the hypervisor host to the leaf connectivity using LLDP or CDP information
of the hypervisors.
5 The APIC administrator creates and associates application EPG policies.
6 The APIC administrator associates EPG policies to VMM domains.
7 The APIC automatically creates port groups in the VMware vCenter under the VDS. This process provisions
the network policy in the VMware vCenter.

Note The port group name is a concatenation of the tenant name, the application profile name, and the
EPG name.
The port group is created under the VDS, and it was created earlier by the APIC.

8 The vCenter administrator or the compute management tool instantiates and assigns VMs to the port
groups.
9 The APIC learns about the VM placements based on the vCenter events. The APIC automatically pushes
the application EPG and its associated policy (for example, contracts and filters) to the ACI fabric.

Creating a vCenter Domain Profile Using the Advanced GUI


An overview of the tasks performed in the creation of a vCenter Domain are as follows (details are in the
steps that follow):
Create/select a switch profile
Create/select an interface profile
Create/select an interface policy group
Create/select VLAN pool
Create vCenter domain
Create vCenter credentials

Procedure

Step 1 On the menu bar, click FABRIC > Access Policies.


Step 2 In the Navigation pane, right-click Switch Policies, and then click Configured Interfaces, PC, and VPC.
Step 3 In the Configured Interfaces, PC, and VPC dialog box, perform the following actions:
a) Expand Configured Switch Interfaces.
b) Click the + icon.
c) Make sure that the Quick radio button is chosen.
d) From the Switches drop-down list, choose the appropriate leaf ID.
In the Switch Profile Name field, the switch profile name automatically populates.
e) Click the + icon to configure the switch interfaces.
f) In the Interface Type area, check the appropriate radio button.

Cisco ACI Virtualization Guide, Release 2.2(2)


29
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter Domain Operational Workflow

g) In the Interfaces field, enter the desired interface range.


h) In the Interface Selector Name field, the selector name automatically populates.
i) In the Interface Policy Group area, choose the Create One radio button.
j) From the Link Level Policy drop-down list, choose the desired link level policy.
k) From the CDP Policy drop-down list, choose the desired CDP policy.
Note Similarly choose the desired interface policies from the available policy
areas.
l) In the Attached Device Type area, choose ESX Hosts.
m) In the Domain area, make sure that the Create One radio button is chosen.
n) In the Domain Name field, enter the domain name.
o) In the VLAN area, make sure that the Create One radio button is chosen.
p) In the VLAN Range field, enter the VLAN range as appropriate.
Note We recommend a range of at least 200 VLAN numbers. Do not define a range that includes the
reserved VLAN ID for infrastructure network, because that VLAN is for internal use.
q) In the vCenter Login Name field, enter the login name.
r) (Optional) From the Security Domains drop-down list, choose the appropriate security domain.
s) In the Password field, enter a password.
t) In the Confirm Password field, reenter the password.
u) Expand vCenter/vShield.
Step 4 In the Create vCenter/vShield Controller dialog box, enter the appropriate information, and click OK.
Step 5 In the Configure Interface, PC, And VPC dialog box, complete the following actions:
If you do not specify policies in the Port Channel Mode and the vSwitch Policy areas, the same policies
that you configured earlier in this procedure will take effect for the vSwitch.
a) From the Port Channel Mode drop-down list, choose a mode.
b) In the vSwitch Policy area, click the desired radio button to enable CDP or LLDP.
c) From the NetFlow Exporter Policy drop-down list, choose a policy or create one.
A NetFlow exporter policy configures the external collector reachability.
d) Choose values from the Active Flow Time0ut, Idle Flow Timeout, and Sampling Rate drop-down lists.
e) Click SAVE twice and then click SUBMIT.
Step 6 Verify the new domain and profiles, by performing the following actions:
a) On the menu bar, choose VM Networking > Inventory.
b) In the Navigation pane, expand VMware > Domain_name > vCenter_name.
In the Work pane, under Properties, view the VMM domain name to verify that the controller is online. In
the Work pane, the vCenter properties are displayed including the operational status. The displayed information
confirms that connection from the APIC controller to the vCenter server is established, and the inventory is
available.

Creating a vCenter Domain Profile Using the Basic GUI


Before You Begin
Before you create a VMM domain profile, you must establish connectivity to external network using in-band
management network on the APIC.

Cisco ACI Virtualization Guide, Release 2.2(2)


30
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter Domain Operational Workflow

Procedure

Step 1 Login to the Basic Mode in the APIC GUI.


Step 2 On the menu bar, choose VM NETWORKING > Inventory.
Step 3 In the Navigation pane, right-click VMware and click Create vCenter Domain.
Step 4 In the Create vCenter Domain dialog box, in the Virtual Switch Name field, enter a Name.
Step 5 In the Virtual Switch field, verify that VMware vSphere Distributed Switch is selected.
Step 6 In the VLAN Pool drop-down list, choose Create VLAN Pool. In the Create VLAN Pool dialog box, perform
the following actions:
Note This step provides the VLAN range for all port groups and EPGs that will be created under this
server.
a) Enter a Name.
b) In the Allocation Mode field, verify that Dynamic Allocation is selected.
c) Expand Encap Blocks to add a VLAN block. In the Create Ranges dialog box, enter a VLAN range.
Note We recommend that you use a range of at least 200 VLAN numbers.
d) Click OK, and click Submit.
Step 7 In the Create vCenter Domain dialog box, expand vCenter/vShield and perform the following tasks:
a) In the Add vCenter/vShield Controller dialog box, in the Type field, click the vCenter radio button.
b) In the vCenter Controller Host Name (or IP Address) field, enter the name or IP address of your vCenter.
c) In the Datacenter field, enter the data center as appropriate.
d) In the vCenter Credential Name field, enter a name.
e) In the Username field, enter a username.
The username must be a credential to log in as an administrator of the vCenter.
f) In the Password field, enter the password and repeat the password in the Confirm Password field. Click
OK, and click Submit.
The password must be a credential to log in as an administrator of the vCenter.
Step 8 On the menu bar, choose FABRIC > Inventory.
Step 9 In the Navigation pane, expand Pod, click on the Configure tab and perform the following actions:
a) In the Configure pane, click on Add Switches and select the switch/switches to configure. Click Add
Selected.
Note Use the Command button to select more than one
switch.
b) Click on the port numbers to associate them to the VMware and click on Configure Interface.
c) In the Configure Interface pane, click on the VLAN tab.
d) In the VLAN pane, expand ESX And SCVMM.
e) In the Name field, choose the VMware that you have just created from the drop-down list. Click Update
and Apply Changes to complete VMware configuration.
Step 10 Verify the new domain and profiles by performing the following actions:
Note To ensure that the controllers are operational after the policy has been submitted, the administrator
of the vCenter must add the hosts to the distributed switch.
a) On the menu bar, choose VM Networking > Inventory.
b) In the Navigation pane, expand VMware, and expand the vCenter domain name.
c) In the Navigation pane, click the controller names to verify that the controllers are online.
In the Work pane, the properties are displayed including the operational status. The displayed information
confirms that connection from the APIC controller to the server is established, and the inventory is available.

Cisco ACI Virtualization Guide, Release 2.2(2)


31
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter Domain Operational Workflow

Creating a vCenter Domain Profile Using the NX-OS Style CLI


Before You Begin
This section describes how to create a vCenter domain profile using the NX-OS style CLI:

Procedure

Step 1 In the CLI, enter configuration mode:

Example:
apic1# configure
apic1(config)#

Step 2 Configure a VLAN domain:

Example:
apic1(config)# vlan-domain dom1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
apic1(config)#

Step 3 Add interfaces to this VLAN domain. These are the interfaces to be connected to VMware hypervisor uplink
ports:

Example:
apic1(config)# leaf 101-102
apic1(config-leaf)# interface ethernet 1/2-3
apic1(config-leaf-if)# vlan-domain member dom1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit

Step 4 Create a VMware domain and add VLAN domain membership:

Example:
apic1(config)# vmware-domain vmmdom1
apic1(config-vmware)# vlan-domain member dom1
apic1(config-vmware)#

Create the domain with a specific delimiter:

Example:
apic1(config)# vmware-domain vmmdom1 delimiter @

Step 5 Configure the domain type to DVS:

Example:
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# exit

Cisco ACI Virtualization Guide, Release 2.2(2)


32
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter and vShield Domain Operational Workflow

apic1(config-vmware)#

Step 6 Configure a controller in the domain:

Example:
apic1(config-vmware)# vcenter 192.168.66.2 datacenter prodDC
apic1(config-vmware-vc)# username administrator
Password:
Retype password:
apic1(config-vmware-vc)# exit
apic1(config-vmware)# exit
apic1(config)# exit

Note When configuring the password, you must precede special characters such as '$' or '!' with a backslash
('\$') to avoid misinterpretation by the Bash shell. The escape backslash is necessary only when
configuring the password; the backslash does not appear in the actual password.
Step 7 Verify configuration:

Example:
apic1# show running-config vmware-domain vmmdom1
# Command: show running-config vmware-domain vmmdom1
# Time: Wed Sep 2 22:14:33 2015
vmware-domain vmmdom1
vlan-domain member dom1
vcenter 192.168.66.2 datacenter prodDC
username administrator password *****
configure-dvs
exit
exit

vCenter and vShield Domain Operational Workflow


This workflow shows how the APIC integrates with the vShield Manager to use the hypervisor VXLAN
functionality provided by VMware.

Note The APIC controls and automates the entire VXLAN preparation and deployment on the vShield Manager
so that users are not required to perform any actions on the vShield Manager.

Prerequisites
The fabric infrastructure VLAN must be extended to the hypervisor ports. The fabric infrastructure
VLAN is used as the outer VLAN in the Ethernet header of the VXLAN data packet. The APIC
automatically pushes the fabric infrastructure VLAN to the vShield Manager when preparing the APIC
VDS for the VXLAN. This is accomplished by checking Enable Infrastructure VLAN in the attachable
entity profile used by this domain profile, as well as by manually enabling and allowing the infrastructure
VLAN ID on any intermediate Layer 2 switches between the fabric and hypervisors.

Cisco ACI Virtualization Guide, Release 2.2(2)


33
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter and vShield Domain Operational Workflow

Operational Workflow

Figure 6: A Sequential Illustration of the vCenter and vShield Domains Operational Workflow

The APIC administrator configures the vCenter and vShield domain policies in the APIC.

Note The APIC administrator must provide the association between vShield Manager and the vCenter
Server on the APIC.
The APIC administrator must provide the segment ID and multicast address pool that is required for
the VXLAN. The segment ID pool in the vShield Manager must not overlap with pools in other
vShield Managers that are configured on the APIC.

1 The APIC connects to vCenter and creates the VDS.


2 The APIC creates a VDS under a specified data center on the vCenter.

Note The vDS name is the VMM domain name.

3 The APIC connects to the vShield Manager, pushes the segment ID and multicast address pool, and prepares
the VDS for VXLAN.

Cisco ACI Virtualization Guide, Release 2.2(2)


34
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter and vShield Domain Operational Workflow

4 The vCenter administrator or the compute management tool attaches the hypervisors to the VDS. All
hypervisors in the cluster must be attached to the VDS. Only after that will vShield start VDS preparation.
5 The APIC learns the location of the hypervisor host to the leaf connectivity using LLDP or CDP information
from the hypervisors.
6 The APIC administrator creates application profiles and EPGs.
7 The APIC administrator associates them to VMM domains.
8 The APIC automatically creates virtual wires in the vShield Manager under the VDS. The APIC reads the
segment ID and the multicast address from the VXLAN virtual wire sent from the vShield Manager.
9 The vShield Manager creates virtual wire port groups in the vCenter server under the VDS.

Note The virtual wire name is a concatenation of the tenant name, the application profile name, and the EPG
name.

10 The vCenter administrator or compute management tool instantiates and assigns VMs to the virtual wire
port groups.
11 The APIC automatically pushes the policy to the ACI fabric.

Creating a vCenter and a vShield Domain Profile Using the Advanced GUI
An overview of the tasks performed in the creation of a vCenter and vShield domains are as follows (details
are in the steps that follow):
Create/select a switch profile.
Create/select an interface profile.
Create/select an interface policy group.
Create/select VLAN pool.
Create vCenter and vShield domains.
Create vCenter and vShield credentials.

Procedure

Step 1 On the menu bar, click FABRIC > Access Policies.


Step 2 In the Navigation pane, click Switch Policies, and then click Configure Interfaces, PC, and VPC.
Step 3 In the Configure Interface, PC, and VPC dialog box, perform the following actions:
a) Expand Configured Switch Interfaces.
b) Click the + icon.
c) In the Select Switches to Configure Interfaces area, make sure that the Quick radio button is chosen.
d) From the Switches drop-down list, choose the appropriate leaf IDs.
In the Switch Profile Name field, the switch profile name automatically populates.
e) Click the + icon to configure the switch interfaces.

Cisco ACI Virtualization Guide, Release 2.2(2)


35
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter and vShield Domain Operational Workflow

f) In the Interface Type area, click the appropriate radio button.


g) In the Interfaces field, enter the desired interface range.
h) In the Interface Selector Name field, the selector name automatically populates.
i) In the Interface Policy Group area, make sure that the Create One radio button is chosen.
j) From the Link Level Policy drop-down list, choose the desired link level policy.
k) From the CDP Policy drop-down list, choose the desired CDP policy.
Note Similarly choose the desired interface policies in the available policy
areas.
l) From the Attached Device Type drop-down list, choose the appropriate device type.
m) In the Domain area, make sure that the Create One radio button is chosen.
n) In the Domain Name field, enter the domain name.
o) In the VLAN area, make sure that the Create One radio button is chosen.
p) In the VLAN Range field, enter the VLAN range as appropriate.
Note We recommend a range of at least 200 VLAN numbers. Do not define a range that includes the
reserved VLAN ID for infrastructure network, because that VLAN is for internal use.
q) In the vCenter Login Name field, enter the login name.
r) In the Password field, enter a password.
s) In the Confirm Password field, reenter the password.
t) Expand vCenter/vShield.
Step 4 In the Create vCenter/vShield Controller dialog box, enter the appropriate information and click OK.
Step 5 In the Configure Interface, PC, And VPC dialog box, complete the following actions:
If you do not specify policies in the Port Channel Mode and the vSwitch Policy areas, the same policies
that you configured earlier in this procedure will take effect for the vSwitch.
a) From the Port Channel Mode drop-down list, choose a mode.
b) In the vSwitch Policy area, click the desired radio button to enable CDP or LLDP.
c) From the NetFlow Exporter Policy drop-down list, choose a policy or create one.
A NetFlow exporter policy configures the external collector reachability.
d) Choose values from the Active Flow Timeout, Idle Flow Timeout, and Sampling Rate drop-down lists.
e) Click SAVE twice and then click SUBMIT.
Step 6 Verify the new domain and profiles, by performing the following actions:
a) On the menu bar, choose VM Networking > Inventory.
b) In the Navigation pane, expand , and click VMware > Domain_name > vCenter_name.
In the Work pane, under Properties, view the VMM domain name to verify that the controller is online. In
the Work pane, the vCenter properties are displayed including the operational status. The displayed information
confirms that connection from the APIC controller to the vCenter server is established, and the inventory is
available.

Cisco ACI Virtualization Guide, Release 2.2(2)


36
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter and vShield Domain Operational Workflow

Creating a vCenter and a vShield Domain Profile Using the Basic GUI

Procedure

Step 1 Login to the Basic Mode in the APIC GUI.


Step 2 On the menu bar, choose VM NETWORKING > Inventory.
Step 3 In the Navigation pane, right-click VMware and click Create vCenter Domain.
Step 4 In the Create vCenter Domain dialog box, in the Virtual Switch Name field, enter a Name.
Step 5 In the Virtual Switch field, verify that VMware vSphere Distributed Switch is selected.
Step 6 This step provides the VLAN range for all port groups and EPGs that will be created under this server. In the
VLAN Pool drop-down list, choose Create VLAN Pool. In the Create VLAN Pool dialog box, perform the
following actions:
a) Enter a Name.
b) In the Allocation Mode field, verify that Dynamic Allocation is selected.
c) Expand Encap Blocks to add a VLAN block. In the Create Ranges dialog box, enter a VLAN range.
Note We recommend that you use a range of at least 200 VLAN
numbers.
d) Click OK, and click Submit.
Step 7 Expand vCenter/vShield and perform the following tasks:
a) In the Create vCenter/vShield Controller dialog box, in the Type field, click the vCenter + vShield
radio button.
b) In the vCenter Controller Host Name (or IP Address) field, enter the name or IP address of your vCenter.
c) In the Datacenter field, enter the data center as appropriate.
d) In the vCenter Credential Name field, enter a name.
e) In the Username field, enter a username.
The username must be a credential to log in as an administrator of the vCenter.
f) In the Password field, enter the password and repeat the password in the Confirm Password field.
The password must be a credential to log in as an administrator of the vCenter.
g) In the vShield Controller Host Name (or IP Address) field, enter the name or IP address of your vShield.
h) In the vCenter Credential Name field, enter a name.
i) In the Datacenter field, enter the data center as appropriate.
j) In the Username field, enter a username.
The username must be a credential to log in as an administrator of the vShield.
k) In the Password field, enter the password and repeat the password in the Confirm Password field.
The password must be a credential to log in as an administrator of the vShield.
l) Click OK, and click Submit.
Step 8 On the menu bar, choose FABRIC > Inventory.
Step 9 In the Navigation pane, expand Pod, click on the Configure tab and perform the following actions:
a) In the Configure pane, click on Add Switches and select the switch/switches to configure. Click Add
Selected.
Note Use the Command button to select more than one
switch.
b) Click on the port numbers to associate them to the VMware and click on Configure Interface.
c) In the Configure Interface pane, click on the VLAN tab.

Cisco ACI Virtualization Guide, Release 2.2(2)


37
Cisco ACI with VMware VDS and VMware vShield Integration
vCenter and vShield Domain Operational Workflow

d) In the VLAN pane, expand ESX And SCVMM.


e) In the Name field, choose the VMware that you have just created from the drop-down list. Click Update
and Apply Changes to complete VMware configuration.
Step 10 Verify the new domain and profiles by performing the following actions:
To ensure that the controllers are operational after the policy has been submitted, the administrator of the
vCenter and vShield must add the hosts to the distributed switch.
a) On the menu bar, choose VM Networking > Inventory.
b) In the Navigation pane, expand VMware, and expand the vCenter domain name.
Both the vCenter and vShield should be displayed in the VMware Work pane.
c) In the Navigation pane, click the controller names to verify that the controllers are online.
In the Work pane, the properties are displayed including the operational status. The displayed information
confirms that connection from the APIC controller to the server is established, and the inventory is available.

Creating a vCenter and a vShield Domain Profile Using the NX-OS Style CLI
Before You Begin
This section describes how to create a vCenter and vShield domain profile using the NX-OS CLI:

Procedure

Step 1 In the NX-OS CLI, enter configuration mode as follows:

Example:
apic1# configure
apic1(config)# exit
Step 2 Configure a VLAN domain as follows:

Example:
apic1(config)# vlan-domain dom1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
apic1(config)#
Step 3 Add interfaces to this VLAN domain. These are the interfaces to be connected to VMware hypervisor uplink
ports as follows:

Example:
apic1(config)# leaf 101-102
apic1(config-leaf)# interface ethernet 1/2-3
apic1(config-leaf-if)# vlan-domain member dom1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
apic1(config)#
Step 4 Create a VMware domain and add VLAN domain membership as follows:

Cisco ACI Virtualization Guide, Release 2.2(2)


38
Cisco ACI with VMware VDS and VMware vShield Integration
Creating VDS Uplink Port Groups

Example:
apic1(config)# vmware-domain vmmdom1
apic1(config-vmware)# vlan-domain member dom1
apic1(config-vmware)#
Step 5 Configure the domain type to DVS as follows:

Example:
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# exit
apic1(config-vmware)#
Step 6 Configure a vCenter controller in the domain as follows:

Example:
apic1(config-vmware)# vcenter 192.168.66.2 datacenter prodDC
apic1(config-vmware-vc)# username administrator password password
apic1(config-vmware-vc)#
Step 7 Configure a VShield controller attached to this VCenter, and configure vxlan and multicast address pools for
this VShield as follows:

Example:
apic1(config-vmware-vc)# vshield 123.4.5.6
apic1(config-vmware-vc-vs)# username administrator password "password"
apic1(config-vmware-vc-vs)# vxlan pool 10000-12000
apic1(config-vmware-vc-vs)# vxlan multicast-pool 224.3.4.5-224.5.6.7
apic1(config-vmware-vc-vs)# exit
apic1(config-vmware-vc)#
Step 8 Verify the configuration as follows:

Example:
apic1# show running-config vmware-domain vmmdom1
# Command: show running-config vmware-domain vmmdom1
# Time: Wed Sep 2 22:14:33 2015
vmware-domain vmmdom1
vlan-domain member dom1
vcenter 192.168.66.2 datacenter prodDC
username administrator password *****
vshield 123.4.5.6
username administrator password *****
vxlan pool 10000-12000
vxlan multicast-pool 224.3.4.5-224.5.6.7
exit
exit
configure-dvs
exit
exit

Creating VDS Uplink Port Groups


Each VMM domain appears in the vCenter as a vSphere Distributed Switch (VDS). The virtualization
administrator associates hosts to the VDS created by the APIC and selects which vmnics to use for the specific
VDS. The configuration of the VDS uplinks are performed from the APIC controller by changing the vSwitch
configuration from the Attach Entity Profile (AEP) that is associated with the VMM domain. You can find
the AEP in the APIC GUI in the Fabric Access Policies configuration area.

Cisco ACI Virtualization Guide, Release 2.2(2)


39
Cisco ACI with VMware VDS and VMware vShield Integration
Creating a Trunk Port Group

Note When working with ACI and vSphere VMM integration, Link Aggregation Groups (LAGs) are not a
supported method of creating interface teams on distributed switches created by the APIC. The APIC
pushes the necessary interface teaming configuration based on the settings in the Interface Policy Group
and/or AEP vSwitch policy. It is not supported or required to manually create interface teams in vCenter.

Creating a Trunk Port Group

Creating a Trunk Port Group Using the GUI


This section describes how to create a trunk port group using the Advanced or Basic GUI.

Before You Begin


Trunk port group must be tenant independent.

Procedure

Step 1 Log in to the Advanced mode in the APIC GUI.


Step 2 On the menu bar, choose VM NETWORKING.
Step 3 In the Navigation pane, choose VMware > Domain_name > Trunk Port Groups and right-click Create
Trunk Port Group.
Step 4 In the Create Trunk Port Group dialog box, perform the following actions:
a) In the Name field, enter the EPG name.
b) For the Promiscuous Mode buttons, click either Disabled or Enabled. The default is Disabled.
c) For the Trunk Portgroup Immediacy buttons, click either Immediate or On Demand. The default is
On Demand.
d) For the MAC changes buttons, click either Disabled or Enabled. The default is Enabled.
e) For the Forged transmits buttons, click either Disabled or Enabled. The default is Enabled.
f) In the VLAN Ranges field, choose the + icon and enter the VLAN range (vlan-100 vlan-200).
Note If you do not specify a VLAN Range, the VLAN list will be taken from the domains VLAN
namespace.
g) Click Update.
Step 5 Click Submit.

Creating a Trunk Port Group Using the NX-OS Style CLI


This section describes how to create a trunk port group using the NX-OS Style CLI.

Cisco ACI Virtualization Guide, Release 2.2(2)


40
Cisco ACI with VMware VDS and VMware vShield Integration
Creating a Trunk Port Group Using the NX-OS Style CLI

Before You Begin


Trunk port groups must be tenant independent.

Procedure

Step 1 Go to the vmware-domain context, enter the following command:

Example:
apic1(config-vmware)# vmware-domain ifav2-vcenter1

Step 2 Create a trunk port group, enter the following command:

Example:
apic1(config-vmware)# trunk-portgroup trunkpg1

Step 3 Enter the VLAN range:

Example:
apic1(config-vmware-trunk)# vlan-range 2800-2820, 2830-2850

Note If you do not specify a VLAN range, the VLAN list will be taken from the domains VLAN namespace.

Step 4 The mac changes is accept by default. If you choose to not to accept the mac changes, enter the following
command:

Example:
apic1(config-vmware-trunk)# no mac-changes accept

Step 5 The forged transmit is accept by default. If you choose to not to accept the forged transmit, enter the following
command:

Example:
apic1(config-vmware-trunk)# no forged-transmit accept

Step 6 The promiscuous mode is disable by default. If you choose to enable promiscuous mode on the trunk port
group:

Example:
apic1(config-vmware-trunk)# allow-promiscuous enable

Step 7 The trunk port group immediacy is set to on-demand by default. If you want to enable immediate immediacy,
enter the following command:

Example:
apic1(config-vmware-trunk)# immediacy-immediate enable

Step 8 Show the VMware domain:

Example:
apic1(config-vmware)# show vmware domain name mininet
Domain Name : mininet
Virtual Switch Mode : VMware Distributed Switch
Switching Encap Mode : vlan

Cisco ACI Virtualization Guide, Release 2.2(2)


41
Cisco ACI with VMware VDS and VMware vShield Integration
Creating a Trunk Port Group Using the NX-OS Style CLI

Vlan Domain : mininet (2800-2850, 2860-2900)


Physical Interfaces :
Number of EPGs : 2
Faults by Severity : 0, 2, 4, 0
LLDP override : no
CDP override : no
Channel Mode override : no

vCenters:
Faults: Grouped by severity (Critical, Major, Minor, Warning)
vCenter Type Datacenter Status ESXs VMs Faults

-------------------- -------- -------------------- -------- ----- ----- ---------------

172.22.136.195 vCenter mininet online 2 57 0,0,4,0

Trunk Portgroups:
Name VLANs

--------------------------------------------- ----------------------------------------------

epgtr1 280-285

epgtr2 280-285

epgtr3 2800-2850

apic1(config-vmware)# show vmware domain name mininet trunk-portgroup

Name Aggregated EPG


------------------------------ ----------------------------------------------
epgtr1 test|wwwtestcom3|test830
epgtr2
epgtr3 test|wwwtestcom3|test830
test|wwwtestcom3|test833

apic1(config-vmware)# )# show vmware domain name ifav2-vcenter1 trunk-portgroup name trunkpg1


Name Aggregated EPG Encap
------------------------------ ------------------------------ ------------
trunkpg1 LoadBalance|ap1|epg1 vlan-318
LoadBalance|ap1|epg2 vlan-317
LoadBalance|ap1|failover-epg vlan-362
SH:l3I:common:ASAv-HA:test- vlan-711
rhi|rhiExt|rhiExtInstP
SH:l3I:common:ASAv-HA:test- vlan-712
rhi|rhiInt|rhiIntInstP
test-dyn-ep|ASA_FWctxctx1bd- vlan-366
inside|int
test-dyn-ep|ASA_FWctxctx1bd- vlan-888
inside1|int
test-dyn-ep|ASA_FWctxctx1bd- vlan-365
outside|ext
test-dyn-ep|ASA_FWctxctx1bd- vlan-887
outside1|ext
test-inb|FW-Inbctxtrans- vlan-886
vrfinside-bd|int
test-inb|FW-Inbctxtrans- vlan-882
vrfoutside-bd|ext
test-inb|inb-ap|inb-epg vlan-883
test-pbr|pbr-ap|pbr-cons-epg vlan-451
test-pbr|pbr-ap|pbr-prov-epg vlan-452
test1|ap1|epg1 vlan-453
test1|ap1|epg2 vlan-485
test1|ap1|epg3 vlan-454
test2-scale|ASA- vlan-496
Trunkctxctx1bd-inside1|int
test2-scale|ASA- vlan-811
Trunkctxctx1bd-inside10|int

Cisco ACI Virtualization Guide, Release 2.2(2)


42
Cisco ACI with VMware VDS and VMware vShield Integration
Creating a Trunk Port Group Using the REST API

apic1(config-vmware)# show running-config vmware-domain mininet


# Command: show running-config vmware-domain mininet
# Time: Wed May 25 21:09:13 2016
vmware-domain mininet
vlan-domain member mininet type vmware
vcenter 172.22.136.195 datacenter mininet
exit
configure-dvs
exit
trunk-portgroup epgtr1 vlan 280-285
trunk-portgroup epgtr2 vlan 280-285
trunk-portgroup epgtr3 vlan 2800-2850
exit

Creating a Trunk Port Group Using the REST API


This section describes how to create a trunk port group using the REST API.

Before You Begin


Trunk port groups must be tenant independent.

Procedure

Create a trunk port group:

Example:
<vmmProvP vendor="VMware">
<vmmDomP name=DVS1">
<vmmUsrAggr name="EPGAggr_1">
<fvnsEncapBlk name="blk0" from="vlan-100 to="vlan-200"/>
</vmmUsrAggr>
</vmmDomP>
</vmmProvP>

Working with Blade Servers


Guidelines for Cisco UCS B-Series Servers
When integrating blade server systems into Cisco ACI for purposes of VMM integration (for example,
integrating Cisco UCS blade servers or other non-Cisco blade servers) you must consider the following
guidelines:

Cisco ACI Virtualization Guide, Release 2.2(2)


43
Cisco ACI with VMware VDS and VMware vShield Integration
Setting up an Access Policy for a Blade Server Using the GUI

Note This example shows how to configure a port channel access policy for integrating Cisco UCS blade servers.
You can use similar steps to set up a virtual port channel or individual link access policies depending upon
how your Cisco UCS blade server uplinks are connected to the fabric. If no port channel is explicitly
configured on the APIC for the UCS blade server uplinks, the default behavior will be mac-pinning.

The VM endpoint learning relies on either the CDP or LLDP protocol. If supported, CDP must be enabled
all the way from the leaf switch port through any blade switches and to the blade adapters.
Ensure the management address type, length, and value (TLV) is enabled on the blade switch (CDP or
LLDP protocol) and advertised towards servers and fabric switches. Configuration of management TLV
address must be consistent across CDP and LLDP protocols on the blade switch.
The APIC does not manage fabric interconnects and the blade server, so any UCS specific policies such
as CDP or port channel policies must be configured from the UCS Manager.
VLANs defined in the VLAN pool used by the attachable access entity profile on the APIC, must also
be manually created on the UCS and allowed on the appropriate uplinks connecting to the fabric. This
must include the infrastructure VLAN if applicable. For details, see the Cisco UCS Manager GUI
Configuration Guide.
When you are working with the Cisco UCS B-series server and using an APIC policy, Link Layer
Discovery Protocol (LLDP) is not supported.
Cisco Discovery Prototol (CDP) is disabled by default in Cisco UCS Manager. In Cisco UCS Manager,
you must enable CDP by creating a Network Control Policy.
Do not enable fabric failover on the adapters in the UCS server service profiles. Cisco recommends that
you allow the hypervisor to handle failover at the virtual switch layer so that load balancing of traffic
is appropriately performed.

Note Symptom: The change of management IP of the unmanaged node such as blade switch or fabric interconnect
gets updated in the VMware vCenter, but the VMware vCenter does not send any events to APIC.
Condition: This causes the APIC to be out of sync with VMware vCenter.
Workaround: You need to trigger an inventory pull for the VMware vCenter controller that manages ESX
servers behind the unmanaged node.

Setting up an Access Policy for a Blade Server Using the GUI


Before You Begin
To operate with the Cisco APIC, the Cisco UCS Fabric Interconnect must be at least a version 2.2(1c). All
components, such as the BIOS, CIMC, and the adapter must be a version 2.2(1c) or later. For further details,
see the Cisco UCS Manager CLI Configuration Guide.

Cisco ACI Virtualization Guide, Release 2.2(2)


44
Cisco ACI with VMware VDS and VMware vShield Integration
Setting up an Access Policy for a Blade Server Using the GUI

Procedure

Step 1 On the menu bar, choose FABRIC > Access Policies.


Step 2 In the Work pane, click Configure Interface, PC, and vPC.
Step 3 In the Configure Interface, PC, and vPC dialog box, click the + icon to select switches.
Step 4 In the Switches field, from the drop-down list, choose the desired switch IDs.
Step 5 Click the + icon to configure the switch interfaces.
Step 6 In the Interface Type field, click the VPC radio button.
Step 7 In the Interfaces field, enter the appropriate interface or interface range that is connected to the blade server.
Step 8 In the Interface Selector Name field, enter a name.
Step 9 From the CDP Policy drop-down list, choose default
The default CDP policy is set to disabled. (Between the leaf switch and the blade server, CDP must be disabled.)

Step 10 From the LLDP Policy drop-down list, choose default.


The default LLDP policy is set to enabled for the receive and transmit states. (Between the leaf switch and
the blade server, LLDP must be enabled.)

Step 11 From the LACP Policy drop-down list, choose Create LACP Policy.
Between the leaf switch and the blade server, the LACP policy must be set to active.

Step 12 In the Create LACP Policy dialog box, perform the following actions:
a) In the Name field, enter a name for the policy.
b) In the Mode field, the Active radio button is checked.
c) Keep the remaining default values and click Submit.
Step 13 From the Attached Device Type field drop-down list, choose ESX Hosts.
Step 14 In the Domain Name field, enter a name as appropriate.
Step 15 In the VLAN Range field, enter the range.
Step 16 In the vCenter Login Name field, enter the login name.
Step 17 In the Password field, and the Confirm Password field, enter the password.
Step 18 Expand the vCenter/vShield field, and in the Create vCenter/vShield Controller dialog box, enter the
desired content and click OK.
Step 19 In the vSwitch Policy field, perform the following actions:
Between the blade server and the ESX hypervisor, CDP must be enabled, LLDP must be disabled, and LACP
must be disabled so Mac Pinning must be set.
a) Check the MAC Pinning check box.
b) Check the CDP check box.
c) Leave the LLDP check box unchecked because LLDP must remain disabled.
Step 20 Click Save, and click Save again. Click Submit.
The access policy is set.

Cisco ACI Virtualization Guide, Release 2.2(2)


45
Cisco ACI with VMware VDS and VMware vShield Integration
Troubleshooting the Cisco ACI and VMware VMM System Integration

Troubleshooting the Cisco ACI and VMware VMM System


Integration
For troubleshooting information, see the following links:
Cisco APIC Troubleshooting Guide
ACI Troubleshooting Book

Additional Reference Sections


Custom User Account with Minimum VMware vCenter Privileges
This allows the APIC to send VMware API commands to vCenter to allow the creation of the DVS/AVS,
creation of the VMK interface (AVS), publish port groups and relay all necessary alerts.
To configure the vCenter from Cisco APIC, your credentials must allow the following minimum set of
privileges within the vCenter:
Alarms
APIC creates two alarms on the folder. One for DVS and another for port-group. The alarm is raised
when the EPG or Domain policy is deleted on APIC, but for port-group or DVS it cannot be deleted due
to the VMs are attached.
Distributed Switch
dvPort Group
Folder
Network
APIC manages the network settings such as add or delete port-groups, setting host/DVS MTU,
LLDP/CDP, LACP etc.
Host
If you use AVS in addition to above, you need the Host privilege on the data center where APIC will
create DVS.
Host.Configuration.Advanced settings
Host.Local operations.Reconfigure virtual machine
Host.Configuration.Network configuration
This is needed for AVS and the auto-placement feature for virtual Layer 4 to Layer 7 Service VMs.
For AVS, APIC creates VMK interface and places it in vtep port-group which is used for OpFlex.

Virtual machine
If you use Service Graph in addition to above, you need the Virtual machine privilege for the virtual
appliances which will be used for Service Graph.

Cisco ACI Virtualization Guide, Release 2.2(2)


46
Cisco ACI with VMware VDS and VMware vShield Integration
Quarantine Port Groups

Virtual machine.Configuration.Modify device settings


Virtual machine.Configuration.Settings

Quarantine Port Groups


The quarantine port group feature provides a method to clear port group assignments under certain
circumstances. In the VMware vCenter, when a VMware vSphere Distributed Switch (VDS) is created, a
quarantine port group is created in the VDS by default. The quarantine port group default policy is to block
all ports.
As part of integration with Layer 4 to Layer 7 virtual service appliances, such as a load balancer or firewall,
the Application Policy Infrastructure Controller (APIC) creates service port groups in vCenter for service
stitching and orchestrates placement of virtual appliances, such as service virtual machines (VMs), in these
service port groups as part of the service graph rendering mechanism. When the service graph is deleted, the
service VMs are automatically moved to the quarantine port group. This auto-move to a quarantine port group
on delete is only done for service VMs, which are orchestrated by the APIC.
You can take further action with the port in quarantine port group as desired. For example, you can migrate
all of the ports from the quarantine port group to another port group, such as a VM network.
The quarantine port group mechanism is not applicable to regular tenant endpoint groups (EPGs) and their
associated port groups and tenant VMs. Therefore, if the tenant EPG is deleted, any tenant VMs present in
the associated port group remains intact and they will not be moved to the quarantine port group. The placement
of tenant VMs into the tenant port group is outside the realm of the APIC.

On-Demand VMM Inventory Refresh


Triggered Inventory provides a manual trigger option to pull and resynchronize inventory between a virtual
machine manager (VMM) controller and the APIC. Triggered inventory provides instant recovery from
out-of-sync scenarios. Triggered inventory is applicable to vCenter VMM controllers only. It is not required
in normal scenarios and should be used with discretion since inventory sync is a burdensome operation for
the VMM controllers.
The APIC initiates vCenter inventory pull. Hosts, VMs, DVS, uplink port groups, NICs, and so on are retrieved
as part of the initial VMM Controller creation. Further changes in vCenter are learned through the event
subscription mechanism. This enables the APIC VMM manager to send endpoint attach/detach updates to
the APIC policy manager which downloads updated policies to leaf switches accordingly.
When there is a process restart, leadership change, or background periodic 24 hour inventory audit, the APIC
does inventory pull to keep VMM inventory synchronized between VMM controllers and the APIC. When
heavily loaded, the vCenter fails to provide the APIC an appropriate inventory event notification. In this case,
triggered inventory helps to keep the APIC in synchronization with the vCenter.

Guidelines for Migrating a vCenter Hypervisor VMK0 to an ACI Inband VLAN


Follow the guidelines below to migrate the default vCenter hypervisor VMK0 out of bound connectivity to
ACI inband ports. An ACI fabric infrastructure administrator configures the APIC with the necessary policies,
then the vCenter administrator migrates the VMK0 to the appropriate ACI port group.

Cisco ACI Virtualization Guide, Release 2.2(2)


47
Cisco ACI with VMware VDS and VMware vShield Integration
REST API Tasks

Create the Necessary Management EPG Policies in APIC


As an ACI fabric infrastructure administrator, use the following guidelines when creating the management
tenant and VMM domain policies:
Choose a VLAN to use for ESX management.
Add the VLAN chosen for ESX management to a range (or Encap Block) in the VLAN pool associated
with the target VMM domain. The range where this VLAN is added must have allocation mode set to
static allocation.
Create a management EPG in the ACI management tenant (mgmt).
Verify that the bridge domain associated with the management EPG is also associated with the private
network (inb).
Associate the management EPG with the target VMM domain as follows:
Use resolution immediacy as pre-provision.
Specify the management VLAN in the Port Encap field of the VM domain profile association.

As a result, APIC creates the port group under vCenter with VLAN specified by the user. APIC also
automatically pushes the policies on the leaf switches associated with the VMM domain and Attach
Entity Profile (AEP).

Migrate the VMK0 to the Inband ACI VLAN


By default vCenter configures the default VMK0 on the hypervisor management interface. The ACI polices
created above enable the vCenter administrator to migrate the default VMK0 to the port group that is created
by APIC. Doing so frees up the hypervisor management port.

REST API Tasks


This section shows how to perform tasks using REST API.
For references to GUI tasks, refer to sections, Creating a VMM Domain Profile, on page 27 and Setting
up an Access Policy for a Blade Server Using the GUI, on page 44.
For references to NX-OS Style CLI tasks, refer to NX-OS Style CLI Tasks, on page 54.

Creating a vCenter Domain Profile Using the REST API

Procedure

Step 1 Configure a VMM domain name, a controller, and user credentials.

Example:
POST URL: https://<api-ip>/api/node/mo/.xml

Cisco ACI Virtualization Guide, Release 2.2(2)


48
Cisco ACI with VMware VDS and VMware vShield Integration
REST API Tasks

<polUni>
<vmmProvP vendor="VMware">
<!-- VMM Domain -->
<vmmDomP name="productionDC">
<!-- Association to VLAN Namespace -->
<infraRsVlanNs tDn="uni/infra/vlanns-VlanRange-dynamic"/>
<!-- Credentials for vCenter -->
<vmmUsrAccP name="admin" usr="administrator" pwd="admin" />
<!-- vCenter IP address -->
<vmmCtrlrP name="vcenter1" hostOrIp="<vcenter ip address>" rootContName="<Datacenter Name
in vCenter>">
<vmmRsAcc tDn="uni/vmmp-VMware/dom-productionDC/usracc-admin"/>
</vmmCtrlrP>
</vmmDomP>
</vmmProvP>

Example:
<polUni>
<vmmProvP vendor="VMware">
<vmmDomP name=mininet" delimiter=@" >
</vmmDomP>
</vmmProvP>
</polUni>

Step 2 Create an attachable entity profile for VLAN namespace deployment.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraAttEntityP name="profile1">
<infraRsDomP tDn="uni/vmmp-VMware/dom-productionDC"/>
</infraAttEntityP>
</infraInfra>

Step 3 Create an interface policy group and selector.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<infraInfra>
<infraAccPortP name="swprofile1ifselector">
<infraHPortS name="selector1" type="range">
<infraPortBlk name="blk"
fromCard="1" toCard="1" fromPort="1" toPort="3">
</infraPortBlk>
<infraRsAccBaseGrp tDn="uni/infra/funcprof/accportgrp-group1" />
</infraHPortS>
</infraAccPortP>

<infraFuncP>
<infraAccPortGrp name="group1">
<infraRsAttEntP tDn="uni/infra/attentp-profile1" />
</infraAccPortGrp>
</infraFuncP>
</infraInfra>

Step 4 Create a switch profile.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<infraInfra>
<infraNodeP name="swprofile1">
<infraLeafS name="selectorswprofile11718" type="range">

Cisco ACI Virtualization Guide, Release 2.2(2)


49
Cisco ACI with VMware VDS and VMware vShield Integration
REST API Tasks

<infraNodeBlk name="single0" from_="101" to_="101"/>


<infraNodeBlk name="single1" from_="102" to_="102"/>
</infraLeafS>
<infraRsAccPortP tDn="uni/infra/accportprof-swprofile1ifselector"/>
</infraNodeP>
</infraInfra>

Step 5 Configure the VLAN pool.

Example:
POST URL: https://<apic-ip>/api/node/mo/.xml

<polUni>
<infraInfra>
<fvnsVlanInstP name="VlanRange" allocMode="dynamic">
<fvnsEncapBlk name="encap" from="vlan-100" to="vlan-400"/>
</fvnsVlanInstP>
</infraInfra>
</polUni>

Step 6 Locate all the configured controllers and their operational state.

Example:
GET:
https://<apic-ip>/api/node/class/compCtrlr.xml?
<imdata>
<compCtrlr apiVer="5.1" ctrlrPKey="uni/vmmp-VMware/dom-productionDC/ctrlr-vcenter1"
deployIssues="" descr="" dn="comp/prov-VMware/ctrlr-productionDC-vcenter1" domName="
productionDC"
hostOrIp="esx1" mode="default" model="VMware vCenter Server 5.1.0 build-756313"
name="vcenter1" operSt="online" port="0" pwd="" remoteOperIssues="" scope="vm"
usr="administrator" vendor="VMware, Inc." ... />
</imdata>

Step 7 Locate the hypervisor and VMs for a vCenter with the name 'vcenter1' under a VMM domain called
'ProductionDC'.

Example:
GET:
https://<apic-ip>/api/node/mo/comp/prov-VMware/ctrlr-productionDC-vcenter1.xml?query-target=children

<imdata>
<compHv descr="" dn="comp/prov-VMware/ctrlr-productionDC-vcenter1/hv-host-4832" name="esx1"
state="poweredOn" type="hv" ... />
<compVm descr="" dn="comp/prov-VMware/ctrlr-productionDC-vcenter1/vm-vm-5531" name="AppVM1"
state="poweredOff" type="virt" .../>
<hvsLNode dn="comp/prov-VMware/ctrlr-productionDC-vcenter1/sw-dvs-5646" lacpEnable="yes"
lacpMode="passive" ldpConfigOperation="both" ldpConfigProtocol="lldp" maxMtu="1500"
mode="default" name="apicVswitch" .../>
</imdata>

Creating a vCenter and a vShield Domain Profile Using the REST API

Procedure

Step 1 Create a VLAN pool.

Cisco ACI Virtualization Guide, Release 2.2(2)


50
Cisco ACI with VMware VDS and VMware vShield Integration
REST API Tasks

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<polUni>
<infraInfra>
<fvnsVlanInstP name="vlan1" allocMode="dynamic">
<fvnsEncapBlk name="encap" from="vlan-100" to="vlan-400"/>
</fvnsVlanInstP>
</infraInfra>
</polUni>
Step 2 Create a vCenter domain, and assign a VLAN pool.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<vmmProvP dn="uni/vmmp-VMware">
<vmmDomP name="productionDC">
<infraRsVlanNs tDn="uni/infra/vlanns-vlan1-dynamic"/>
</vmmDomP>
</vmmProvP>
Step 3 Create an attachable entity profile for infrastructure VLAN deployment.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<infraInfra>
<infraAttEntityP name="profile1">
<infraRsDomP tDn="uni/vmmp-VMware/dom-productionDC"/>
<infraProvAcc name="provfunc"/>
</infraAttEntityP>
</infraInfra>
Step 4 Create an interface policy group and selector.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<infraInfra>
<infraAccPortP name="swprofile1ifselector">
<infraHPortS name="selector1" type="range">
<infraPortBlk name="blk"
fromCard="1" toCard="1" fromPort="1" toPort="3">
</infraPortBlk>
<infraRsAccBaseGrp tDn="uni/infra/funcprof/accportgrp-group1" />
</infraHPortS>
</infraAccPortP>

<infraFuncP>
<infraAccPortGrp name="group1">
<infraRsAttEntP tDn="uni/infra/attentp-profile1" />
</infraAccPortGrp>
</infraFuncP>
</infraInfra>
Step 5 Create a switch profile.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<infraInfra>
<infraNodeP name="swprofile1">
<infraLeafS name="selectorswprofile11718" type="range">
<infraNodeBlk name="single0" from_="101" to_="101"/>
<infraNodeBlk name="single1" from_="102" to_="102"/>
</infraLeafS>
<infraRsAccPortP tDn="uni/infra/accportprof-swprofile1ifselector"/>

Cisco ACI Virtualization Guide, Release 2.2(2)


51
Cisco ACI with VMware VDS and VMware vShield Integration
REST API Tasks

</infraNodeP>
</infraInfra>
Step 6 Create credentials for controllers.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<vmmProvP dn="uni/vmmp-VMware">
<vmmDomP name="productionDC">
<vmmUsrAccP name="vcenter_user" usr="administrator" pwd="default"/>
<vmmUsrAccP name="vshield_user" usr="admin" pwd="default"/>
</vmmDomP>
</vmmProvP>
Step 7 Create a vCenter controller

Example:
<vmmProvP dn="uni/vmmp-VMware">
<vmmDomP name="productionDC">
<vmmCtrlrP name="vcenter1" hostOrIp="172.23.50.85" rootContName="Datacenter1">
<vmmRsAcc tDn="uni/vmmp-VMware/dom-productionDC/usracc-vcenter_user"/>
</vmmCtrlrP>
</vmmDomP>
</vmmProvP>
Step 8 Create a VXLAN pool and a multicast address range.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<infraInfra>
<fvnsVxlanInstP name="vxlan1">
<fvnsEncapBlk name="encap" from="vxlan-6000" to="vxlan-6200"/>
</fvnsVxlanInstP>
<fvnsMcastAddrInstP name="multicast1">
<fvnsMcastAddrBlk name="mcast" from="224.0.0.1" to="224.0.0.20"/>
</fvnsMcastAddrInstP>
</infraInfra>
Step 9 Create a vShield controller.

Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml

<vmmProvP dn="uni/vmmp-VMware">
<vmmDomP name="productionDC">
<vmmCtrlrP name="vshield1" hostOrIp="172.23.54.62" scope="iaas">
<vmmRsAcc tDn="uni/vmmp-VMware/dom-productionDC/usracc-vshield_user"/>
<vmmRsVmmCtrlrP tDn="uni/vmmp-VMware/dom-productionDC/ctrlr-vcenter1"/>
<vmmRsVxlanNs tDn="uni/infra/vxlanns-vxlan1"/>
<vmmRsMcastAddrNs tDn="uni/infra/maddrns-multicast1"/>
</vmmCtrlrP>
</vmmDomP>
</vmmProvP>

Setting Up an Access Policy for a Blade Server Using the REST API

Procedure

Set up an access policy for a blade server.

Cisco ACI Virtualization Guide, Release 2.2(2)


52
Cisco ACI with VMware VDS and VMware vShield Integration
REST API Tasks

Example:
POST: https://<ip or hostname APIC>/api/node/mo/uni.xml

<polUni>
<infraInfra>
<!-- Define LLDP CDP and LACP policies -->
<lldpIfPol name="enable_lldp" adminRxSt="enabled" adminTxSt="enabled"/>
<lldpIfPol name="disable_lldp" adminRxSt="disabled" adminTxSt="disabled"/>
<cdpIfPol name="enable_cdp" adminSt="enabled"/>
<cdpIfPol name="disable_cdp" adminSt="disabled"/>
<lacpLagPol name='enable_lacp' ctrl='15' descr='LACP' maxLinks='16' minLinks='1'
mode='active'/>
<lacpLagPol name='disable_lacp' mode='mac-pin'/>

<!-- List of nodes. Contains leaf selectors. Each leaf selector contains list of
node blocks -->
<infraNodeP name="leaf1">
<infraLeafS name="leaf1" type="range">
<infraNodeBlk name="leaf1" from_="1017" to_="1017"/>
</infraLeafS>
<infraRsAccPortP tDn="uni/infra/accportprof-portselector"/>
</infraNodeP>

<!-- PortP contains port selectors. Each port selector contains list of ports. It
also has association to port group policies -->
<infraAccPortP name="portselector">
<infraHPortS name="pselc" type="range">
<infraPortBlk name="blk" fromCard="1" toCard="1" fromPort="39" toPort="40">

</infraPortBlk>
<infraRsAccBaseGrp tDn="uni/infra/funcprof/accbundle-leaf1_PC"/>
</infraHPortS>
</infraAccPortP>

<!-- FuncP contains access bundle group policies -->


<infraFuncP>
<!-- Access bundle group has relation to PC, LDP policies and to attach
entity profile -->
<infraAccBndlGrp name="leaf1_PC" lagT='link'>
<infraRsLldpIfPol tnLldpIfPolName="enable_lldp"/>
<infraRsLacpPol tnLacpLagPolName='enable_lacp'/>
<infraRsAttEntP tDn="uni/infra/attentp-vmm-FI2"/>
</infraAccBndlGrp>
</infraFuncP>

<!-- AttEntityP has relation to VMM domain -->


<infraAttEntityP name="vmm-FI2">
<infraRsDomP tDn="uni/vmmp-VMware/dom-productionDC"/>
<!-- Functions -->
<infraProvAcc name="provfunc"/>
<!-- Policy overrides for VMM -->
<infraAttPolicyGroup name="attpolicy">
<!-- RELATION TO POLICIES GO HERE -->
<infraRsOverrideCdpIfPol tnCdpIfPolName="enable_cdp"/>
<infraRsOverrideLldpIfPol tnLldpIfPolName="disable_lldp"/>
<infraRsOverrideLacpPol tnLacpLagPolName="disable_lacp"/>
</infraAttPolicyGroup/>
</infraAttEntityP>

</infraInfra>
</polUni>

OUTPUT:
<?xml version="1.0" encoding="UTF-8"?>
<imdata></imdata>

Cisco ACI Virtualization Guide, Release 2.2(2)


53
Cisco ACI with VMware VDS and VMware vShield Integration
NX-OS Style CLI Tasks

NX-OS Style CLI Tasks


This section shows how to perform tasks using NX-OS Style CLI.
For references to GUI tasks, refer to sections, Creating a VMM Domain Profile, on page 27 and Setting
up an Access Policy for a Blade Server Using the GUI, on page 44.
For references to REST API tasks, refer to REST API Tasks, on page 48.

Creating a vCenter Domain Profile Using the NX-OS Style CLI


Before You Begin
This section describes how to create a vCenter domain profile using the NX-OS style CLI:

Procedure

Step 1 In the CLI, enter configuration mode:

Example:
apic1# configure
apic1(config)#

Step 2 Configure a VLAN domain:

Example:
apic1(config)# vlan-domain dom1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
apic1(config)#

Step 3 Add interfaces to this VLAN domain. These are the interfaces to be connected to VMware hypervisor uplink
ports:

Example:
apic1(config)# leaf 101-102
apic1(config-leaf)# interface ethernet 1/2-3
apic1(config-leaf-if)# vlan-domain member dom1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit

Step 4 Create a VMware domain and add VLAN domain membership:

Example:
apic1(config)# vmware-domain vmmdom1
apic1(config-vmware)# vlan-domain member dom1
apic1(config-vmware)#

Create the domain with a specific delimiter:

Cisco ACI Virtualization Guide, Release 2.2(2)


54
Cisco ACI with VMware VDS and VMware vShield Integration
NX-OS Style CLI Tasks

Example:
apic1(config)# vmware-domain vmmdom1 delimiter @

Step 5 Configure the domain type to DVS:

Example:
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# exit
apic1(config-vmware)#

Step 6 Configure a controller in the domain:

Example:
apic1(config-vmware)# vcenter 192.168.66.2 datacenter prodDC
apic1(config-vmware-vc)# username administrator
Password:
Retype password:
apic1(config-vmware-vc)# exit
apic1(config-vmware)# exit
apic1(config)# exit

Note When configuring the password, you must precede special characters such as '$' or '!' with a backslash
('\$') to avoid misinterpretation by the Bash shell. The escape backslash is necessary only when
configuring the password; the backslash does not appear in the actual password.
Step 7 Verify configuration:

Example:
apic1# show running-config vmware-domain vmmdom1
# Command: show running-config vmware-domain vmmdom1
# Time: Wed Sep 2 22:14:33 2015
vmware-domain vmmdom1
vlan-domain member dom1
vcenter 192.168.66.2 datacenter prodDC
username administrator password *****
configure-dvs
exit
exit

Creating a vCenter and a vShield Domain Profile Using the NX-OS Style CLI
Before You Begin
This section describes how to create a vCenter and vShield domain profile using the NX-OS CLI:

Procedure

Step 1 In the NX-OS CLI, enter configuration mode as follows:

Cisco ACI Virtualization Guide, Release 2.2(2)


55
Cisco ACI with VMware VDS and VMware vShield Integration
NX-OS Style CLI Tasks

Example:
apic1# configure
apic1(config)# exit
Step 2 Configure a VLAN domain as follows:

Example:
apic1(config)# vlan-domain dom1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
apic1(config)#
Step 3 Add interfaces to this VLAN domain. These are the interfaces to be connected to VMware hypervisor uplink
ports as follows:

Example:
apic1(config)# leaf 101-102
apic1(config-leaf)# interface ethernet 1/2-3
apic1(config-leaf-if)# vlan-domain member dom1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
apic1(config)#
Step 4 Create a VMware domain and add VLAN domain membership as follows:

Example:
apic1(config)# vmware-domain vmmdom1
apic1(config-vmware)# vlan-domain member dom1
apic1(config-vmware)#
Step 5 Configure the domain type to DVS as follows:

Example:
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# exit
apic1(config-vmware)#
Step 6 Configure a vCenter controller in the domain as follows:

Example:
apic1(config-vmware)# vcenter 192.168.66.2 datacenter prodDC
apic1(config-vmware-vc)# username administrator password password
apic1(config-vmware-vc)#
Step 7 Configure a VShield controller attached to this VCenter, and configure vxlan and multicast address pools for
this VShield as follows:

Example:
apic1(config-vmware-vc)# vshield 123.4.5.6
apic1(config-vmware-vc-vs)# username administrator password "password"
apic1(config-vmware-vc-vs)# vxlan pool 10000-12000
apic1(config-vmware-vc-vs)# vxlan multicast-pool 224.3.4.5-224.5.6.7
apic1(config-vmware-vc-vs)# exit
apic1(config-vmware-vc)#
Step 8 Verify the configuration as follows:

Example:
apic1# show running-config vmware-domain vmmdom1
# Command: show running-config vmware-domain vmmdom1
# Time: Wed Sep 2 22:14:33 2015
vmware-domain vmmdom1

Cisco ACI Virtualization Guide, Release 2.2(2)


56
Cisco ACI with VMware VDS and VMware vShield Integration
NX-OS Style CLI Tasks

vlan-domain member dom1


vcenter 192.168.66.2 datacenter prodDC
username administrator password *****
vshield 123.4.5.6
username administrator password *****
vxlan pool 10000-12000
vxlan multicast-pool 224.3.4.5-224.5.6.7
exit
exit
configure-dvs
exit
exit

Cisco ACI Virtualization Guide, Release 2.2(2)


57
Cisco ACI with VMware VDS and VMware vShield Integration
NX-OS Style CLI Tasks

Cisco ACI Virtualization Guide, Release 2.2(2)


58
CHAPTER 4
Microsegmentation with Cisco ACI
This chapter contains the following sections:

Microsegmentation with Cisco ACI, page 59

Microsegmentation with Cisco ACI


Microsegmentation with the Cisco Application Centric Infrastructure (ACI) provides the ability to automatically
assign endpoints to logical security zones called endpoint groups (EPGs) based on various network-based or
virtual machine (VM)-based attributes. This chapter contains conceptual information about Microsegmentation
with Cisco ACI and instructions for configuring microsegment (uSeg) EPGs.
Microsegmentation with Cisco ACI provides support for virtual endpoints attached to the following:
VMware vSphere Distributed Switch (VDS)
Cisco Application Virtual Switch (AVS)
Microsoft vSwitch

Microsegmentation with network-based attributes also is supported for bare-metal environments. See the
section "Using Microsegmentation with Network-based Attributes on Bare Metal" in the Cisco APIC Basic
Configuration Guide, Release 2.x
Microsegmentation with Cisco ACI also provides support for physical endpoints using EPGs with IP-based
attributes.

Note You can configure Microsegmentation with Cisco ACI for physical and virtual endpoints, and you can
share the same EPGs for both physical and virtual endpoints.

Note If you want to use an AVS or a Microsoft MAC-based EPG and any attribute other than IP for virtual end
points, you must not have any overlapping IP attribute filters for physical endpoints or virtual endpoints
on a VDS VMM domain. If you do so, the AVS or Microsoft microsegmentation EPG classification will
be overwritten.

Cisco ACI Virtualization Guide, Release 2.2(2)


59
Microsegmentation with Cisco ACI
Benefits of Microsegmentation with Cisco ACI

Microsegmentation polices used by the Cisco AVS, VMware VDS and Microsoft vSwitch are centrally
managed by the Cisco Application Policy Infrastructure Controller (APIC) and enforced by the fabric. This
section assumes that you are familiar with EPGs, tenants, contracts, and other key concepts regarding ACI
policies. For more information, see Cisco Application Centric Infrastructure Fundamentals.

Benefits of Microsegmentation with Cisco ACI


Endpoint groups (EPGs) are used to group virtual machines (VMs) within a tenant and apply filtering and
forwarding policies to them. Microsegmentation with Cisco ACI adds the ability to group endpoints in existing
application EPGs into new microsegment (uSeg) EPGs and configure network or VM-based attributes for
those uSeg EPGs. This enables you to filter with those attributes and apply more dynamic policies.
Microsegmentation with Cisco ACI also allows you to apply policies to any endpoints within the tenant.

Example: Microsegmentation with Cisco ACI Within a Single EPG or Multiple EPGs in the Same Tenant
You might assign web servers to an EPG so that you can apply the similar policies. By default, all endpoints
within an EPG can freely communicate with each other. However, if this web EPG contains a mix of production
and development web servers, you might not want to allow communication between these different types of
web servers. Microsegmentation with Cisco ACI allows you to create a new EPG and autoassign endpoints
based on their VM name attribute, such as "Prod-xxxx" or "Dev-xxx".

Example: Microsegmentation for Endpoint Quarantine


You might have separate EPGs for web servers and database servers, and each one contains both Windows
and Linux VMs. If a virus affecting only Windows threatens your network, you can isolate Windows VMs
across all EPGs by creating a new EPG called, for example, "Windows-Quarantine" and applying the VM-based
operating systems attribute to filter out all Windows-based endpoints. This quarantined EPG could have more
restrictive communication policies, such as limiting allowed protocols or preventing communication to any
other EPGs by not having any contract. A microsegment EPG can have a contract or not have a contract.

How Microsegmentation Using Cisco ACI Works


Microsegmentation using Cisco ACI involves the Cisco APIC, vCenter or Microsoft System Center Virtual
Machine Manager (SCVMM), and leaf switches. This section describes the workflow for microsegmentation
using Cisco AVS, VMware VDS, or Microsoft vSwitch.

Cisco APIC
1 The user configures a VMM domain for Cisco AVS, VMware VDS, or Microsoft vSwitch in the Cisco
APIC.
2 The Cisco APIC connects to vCenter or SCVMM and does the following:
a Creates an instance of Cisco AVS, VMware VDS, or Microsoft vSwitch.
b Pulls VM and hypervisor inventory information from the associated VMware vCenter or Microsoft
SCVMM.

3 The user creates an application EPG and associates it with a vCenter/SCVMM domain. In each
vCenter/SCVMM domain, a new encapsulation is allocated for this application EPG. The application EPG
does not have any attributes.

Cisco ACI Virtualization Guide, Release 2.2(2)


60
Microsegmentation with Cisco ACI
Attributes for Microsegmentation with Cisco ACI

The vCenter/SCVMM administrator assigns virtual endpoints to this application EPGnot to any
microsegment (uSeg) EPGs. It is the application EPG that appears in vCenter/SCVMM as a port group.
4 The user creates an uSeg EPG and associates it with the VMM domain.
The uSeg EPG does not appear in vCenter/SCVMM as a port group; it has a special function: The uSeg
EPG has VM-based attributes to match filter criteria. If a match occurs between the uSeg EPG VM attributes
and VMs, the Cisco APIC dynamically assigns the VMs to the uSeg EPG.
The endpoints are transferred from the application EPG to the uSeg EPG. If the uSeg EPG is deleted, the
endpoints are assigned back to the application EPG.
The uSeg EPG must be assigned to a VMM domain in order for it to take effect. When you associate an
uSeg EPG to a VMM domain, its criteria will be applied for that VMM domain only. If you have VMware
VDS, you also must assign the uSeg EPG to the same bridge domain as the application EPG.
In the case of VMware VDS, its criteria will be applied for that VMM domain and bridge domain.

Leaf Switch and Cisco AVS or Microsoft vSwitch


1 The physical leaf switch pulls the attribute policies from the Cisco APIC.
2 The Cisco AVS or Microsoft vSwitch sends a VM attach message to the physical leaf switch using the
OpFlex protocol when a VM attaches to Cisco AVS or Microsoft vSwitch.
3 The physical leaf switch matches the VM against the configured attribute policies for the tenant.
4 If the VM matches the configured VM attributes, the physical leaf switch pushes the uSeg EPGalong
with the corresponding encapsulation to Cisco AVS or Microsoft vSwitch.
Note that this action does not change the original port-group assignment for the VM in vCenter/SCVMM.

Packet Forwarding for Cisco AVS or Microsoft vSwitch


1 When the VM sends the data packets, Cisco AVS or Microsoft vSwitch tags the packets using encapsulation
corresponding to the uSeg EPG, not the application EPG.
2 The physical leaf hardware sees an attribute-based encapsulated VM packet and matches it with the
configured policy.
The VM is dynamically assigned to an uSeg EPG, and the packet is forwarded based on the policy defined
for that particular uSeg EPG.

Attributes for Microsegmentation with Cisco ACI


Applying attributes to uSeg EPGs enables you to apply forwarding and security policies with greater granularity
than you can to EPGs without attributes. Attributes are unique within the tenant.
There are two types of attributes that you can apply to uSeg EPGs: network-based attributes and VM-based
attributes.

Network-Based Attributes
The network-based attributes are MAC Address Filter and IP Address Filter. You can apply one or more MAC
or IP addresses to an uSeg EPG.

Cisco ACI Virtualization Guide, Release 2.2(2)


61
Microsegmentation with Cisco ACI
Attributes for Microsegmentation with Cisco ACI

For IP addresses, you simply specify the address or the subnet; for MAC addresses, you simply specify the
address. You do not specify an operator or any other information relating to the attribute.

VM-Based Attributes
You can apply multiple VM-based attributes to an uSeg EPG. The VM-based attributes are VMM Domain,
Operating System, Hypervisor Identifier, Datacenter, VM Identifier, VM Name, and VNic Dn (vNIC domain
name).

Note The attribute Datacenter corresponds to Cloud for Microsoft vSwitch.

When you create any VM-based attribute, in addition to naming the attribute, you must do the following:
1 Specify the attribute type, such as VM Name or Hypervisor Identifier.
2 Specify the operator, such as Equals, or Starts With.
3 Specify the value, such as a particular vNIC or name of the operating system.

Custom Attribute
If you have Cisco AVS or VMware VDS, the Custom Attribute allows you to define an attribute based on
criteria not used in other attributes. For example, you might want to define a Custom Attribute called "Security
Zone" in vCenter and then associate this attribute to one or more VMs with such values as "DMZ" or "Edge."
The APIC administrator can then create an uSeg EPG based on that VM custom attribute.
Custom Attribute, which appears in the APIC GUI as a VM attribute that is configured on vCenter, is available
for Cisco AVS and VMware VDS only.
If you want to use Custom Attribute, you also need to add it in VMware vSphere Web Client. We recommend
doing so before configuring Microsegmentation with Cisco AVS in Cisco APIC so you can choose the Custom
Attribute in the drop-down list while configuring Microsegmentation policy in Cisco APIC. You can add the
Custom Attribute in vSphere Web Client after you configure Microsegmentation with Cisco AVS in Cisco
APIC; however, you won't see the Custom Attribute in the drop-down list in Cisco APIC, although you can
type the name in the text box.
See VMware vSphere ESXi and vCenter Server documentation for instructions for adding a Custom Attribute
in vSphere Web Client.

Uniqueness of Attributes Within a Tenant


Attributes must be unique within a tenant. Uniqueness depends on the value of the attribute.
For example, for a network-based attribute, you can use the attribute IP Address Filter multiple times within
a tenant provided that the attribute has a different value for the IP address each time it is used. So you cannot
use the IP Address Filter attribute with the address 192.168.33.77 more than once; however, you can use the
IP Address Filter attribute a second time, provided that the IP address is different, for example 192.168.33.78.
For a VM-based attribute, you can use an attribute more than once within the tenant only if its combination
of attribute type, operator, and value is unique. For example, you can use the Operating System attribute with
the Operator "Equals" and the value "Microsoft Windows 7 (64-bit)" to specify only 64-bit Windows 7
machines. You can then use the Operating System attribute with the Operator "contains" and the value
"Microsoft Windows 7" to specify all Windows 7 machines, 32 or 64 bit.

Cisco ACI Virtualization Guide, Release 2.2(2)


62
Microsegmentation with Cisco ACI
Precedence of Attributes

Precedence of Attributes
When there are multiple uSeg EPGs within a tenant, filtering rules are applied in a certain order based on the
attributes.

How Rules for Attribute Precedence are Applied


When multiple attributes are defined for an uSeg EPG, rules are applied in a certain order.
The following table lists the attributes that can be specified for an uSeg EPG:

Attribute Type Precedence Order Example


MAC Address Filter Network 1- Cisco AVS/Microsoft 5c:01:23:ab:cd:ef
vSwitch
2- VMware VDS

IP Address Filter Network 1- VMware VDS 192.168.33.77


2- Cisco AVS/Microsoft 10.1.0.0/16
vSwitch

VNic Dn (vNIC domain VM 3 a1:23:45:67:89:0b


name)

VM Identifier VM 4 VM-598

VM Name VM 5 HR_VDI_VM1

Hypervisor Identifier VM 6 host-25

VMM Domain VM 7 AVS-SJC-DC1

Datacenter VM 8 SJC-DC1

Custom Attribute VM 9 SG_DMZ


(Cisco AVS and VMware
VDS only)

Operating System VM 10 Windows 2008

Note Precedence of MAC-based and IP-based attributes differ for VMware VDS and Cisco AVS/Microsoft
vSwitch.

Cisco ACI Virtualization Guide, Release 2.2(2)


63
Microsegmentation with Cisco ACI
Precedence of Operators

Examples of how Rules for Precedence are Applied


You might have four uSeg EPGs containing attributes that match the same VM, and each uSeg EPG has a
different network of VM attribute: Operating System, Hypervisor Identifier, IP Address Filter, and another
has MAC Address Filter.
Rules for Cisco AVS and Microsoft vSwtich are applied in this order: MAC Address Filter, IP Address Filter,
Hypervisor Identifier, and Operating System. The rule is applied to MAC Address Filter, and the subsequent
rules are skipped. However, if the uSeg EPG with the MAC Address Filter attribute is deleted, the rule is
applied to IP Address Filter, and the subsequent rules are skippedand so on with the other attributes.
Rules for VMware VDS are applied in this order: IP Address Filter, MAC Address Filter, Hypervisor Identifier,
and Operating System.
In another case, you might have uSeg EPGs containing the same VM, and each uSeg EPG has a different VM
attribute: VMM Domain, Datacenter, Custom Attribute, and VNic Dn. The rule is applied to VNic Dn, and
the subsequent rules as skipped. However, if the uSeg EPG with the VNic Dn attribute is deleted, the rule is
applied to VMM Domain, and the subsequent rules are skippedand so on with the other attributes.

Precedence of Operators
In addition to applying filtering rules based on attributes of uSeg EPGs within a tenant, Cisco APIC applies
filtering rules within VM-based attributes based on the operator type.
When you configure a microsegment with a VM-based attribute, you select one of four operators: Contains,
Ends With, Equals, or Starts With. Each operators specifies the string or value match for the specific attribute.
For example, you might want to create a microsegment with the VM Name attribute and want to filter for
VMs with names that start with "HR_VM" or VMs that contain "HR" anywhere in their name. Or you might
want to configure a microsegment for a specific VM and filter for the name "HR_VM_01."

How Rules for Operator Precedence are Applied


The operators for a specific VM attribute within a tenant determine the order in which the VM-based attributes
for microsegments are applied. They also determine which operator will have precedence among a group of
microsegments that share the same attribute and overlapping values. The table below shows the default operator
precedence for Cisco AVS and Microsoft vSwitch:

Operator Type Precedence Order


Equals 1

Contains 2

Starts With 3

Ends With 4

Examples of how Rules for Precedence are Applied


You have three Human Resources VM machines in a datacenter cluster under the same tenant:
VM_01_HR_DEV, VM_01_HR_TEST, and VM_01_HR_PROD. You have created two microsegmented
EPGs based on the VM Name attribute:

Cisco ACI Virtualization Guide, Release 2.2(2)


64
Microsegmentation with Cisco ACI
Scenarios for Using Microsegmentation with Cisco ACI

Criterion Microsegment CONTAIN-HR Microsegment HR-VM-01-PROD


Attribute type VM Name VM Name

Operator type Contains Equals

Value VM_01_HR VM_01_HR_PROD

Because the operator type Equals has precedence over the operator type Contains, the value VM_01_HR_PROD
is matched before the value VM_01_HR. So the VM named VM_01_HR_PROD will be put into microsegment
HR-VM-01-PROD because it is an exact criterion match and because the operator Equals has precedence
over the operator Contains, even though the VM name matches both microsegments. The other two VMs will
be put in the Microsegment CONTAIN-HR.

Scenarios for Using Microsegmentation with Cisco ACI


This section contains examples of circumstances in which you might find Microsegmentation useful in your
network.

Using Microsegmentation with Cisco ACI with VMs Within a Single Application EPG
You can use Microsegmentation with Cisco ACI to create new, uSeg EPGs to contain VMs from a single
application EPG. By default, VMs within an application EPG can communicate with each other; however,
you might want to prevent communication between groups of VMs, if VRF is in enforced mode and there is
no contract between uSeg EPGs.
For more information about Intra-EPG Isolation knob, that controls communication between VMs within the
EPG, see Intra-EPG Isolation for VMware vDS, on page 75.

Example: Putting VMs from the Same Application EPG into a Microsegmented EPG
Your company deploys a virtual desktop infrastructure (VDI) for its Human Resources, Finance, and Operations
departments. The VDI virtual desktop VMs are part of a single application EPG called EPG_VDI with identical
access requirements to the rest of the application EPGs.
Service contracts are built in such a way such that the EPG-VDI has access to Internet resources and internal
resources. But at the same time, the company must ensure that each of the VM groupsHuman Resources,
Finance, and Operationscannot access the others even though they belong to the same application EPG,
EPG_VDI.
To meet this requirement, you can create filters in the Cisco APIC that would check the names of the VMs
in the application EPG, EPG_VDI. If you create a filter with the value "HR_VM," Cisco APIC creates a uSeg
EPGa microsegmentfor all Human Resource VMs. Cisco APIC looks for matching values in all the EPGs
in a tenant even though you want to group the matching VMs within one EPG. So when you create VMs, we
recommend that you choose names unique within the tenant.
Similarly, you can create filters with the keyword "FIN_VMs" for Finance virtual desktops and "OPS_VMs"
for Operations virtual desktops. These uSeg EPGs are represented as new EPGs within the Cisco APIC policy

Cisco ACI Virtualization Guide, Release 2.2(2)


65
Microsegmentation with Cisco ACI
Scenarios for Using Microsegmentation with Cisco ACI

model. You can then apply contracts and filters to control access between the VM groups even though they
belong to the same application EPG.

Figure 7: Microsegmentation with Cisco ACI with VMs from a Single Application EPG

In the illustration above, all the virtual desktop VMs from the Human Resources, Finance, and Operations
groups have been moved from the application EPG, EPG_VDI, to new, uSeg EPGs: EPG_OPS_MS,
EP_FIN_MS, and EPG_HR_MS. Each uSeg EPG has the attribute type VM Name with a value to match key
parts of the VM's name. EPG_OPS_MS has the value OPS_VM, so all VMs in the tenant containing OPS_VM
in their names become part of EPG_OPS_MS. The other uSeg EPGs have corresponding values, resulting in
the movement of VMs in the tenant with matching names to the uSeg EPGs.

Using Microsegmentation with Cisco ACI with VMs in Different Application EPGs
You can configure Microsegmentation with Cisco ACI to put VMs that belong to different application EPGs
into a new uSeg EPG. You might want to do this to apply policy to VMs that share a certain characteristic
although they belong to different application EPGs.

Example: Putting VMs in Different Application EPGs into a New uSeg EPG
Your company deploys a three-tier web application. The application is built on VMs that run different operating
systems and different versions of the same operating system. For example, the VMs might run Linux, Windows
2008, and Windows 2008 R2. The application is distributed; the company has divided the VMs into three
different EPGs: EPG_Web, EPG_App, and EPG_DB.
Because of a recent vulnerability in the Windows 2008 operating system, your company's security team
decided to quarantine VMs running Windows 2008 in case those VMs are compromised. The security team
also decided to upgrade all Windows 2008 VMs to Windows 2012. It also wants to microsegment all production
VMs across all EPGs and restrict external connectivity to those VMs.
To meet this requirement, you can configure a uSeg EPG in the Cisco APIC. The attribute would be Operating
System, and the value of the attribute would be Windows 2008.

Cisco ACI Virtualization Guide, Release 2.2(2)


66
Microsegmentation with Cisco ACI
Scenarios for Using Microsegmentation with Cisco ACI

You can now quarantine the VMs running Windows 2008 and upgrade them to Windows 2012. Once the
upgrade is complete, the VMs will no longer be part of the uSeg EPG you created for VMs running Windows
2008. This change will be reflected dynamically to Cisco APIC, and those virtual machines revert to their
original EPGs.

Figure 8: Microsegmentation with Cisco ACI in Different Application EPGs

In the illustration above, the new uSeg EPG EPG_Windows has the attribute type Operating System and the
value Windows. The VMs App_VM_2, DB_VM_1, DB_VM_2, and Web_VM_2, run Windows as their
operating systemand so have been moved to the new uSeg EPG EPG_Windows. However, the VMs
App_VM_1, DB_VM_3, and Web_VM_1 run Linux and so remain in their application EPGs.

Using Microsegmentation with Network-based Attributes


You can use Cisco APIC to configure Microsegmentation with Cisco ACI to create a new, uSeg EPG using
a network-based attribute, a MAC address or one or more IP addresses. You can configure Microsegmentation
with Cisco ACI using network-based attributes to isolate VMs within a single application EPG or VMs in
different EPGs.

Using an IP-based Attribute


You can use an IP-based filter to isolate a single IP address, a subnet, or multiple of noncontiguous IP addresses.
Isolating multiple IP addresses in a single microsegment can be more convenient that specifying VMs by
name. You might want to isolate VMs based on IP addresses as a quick and simply way to create a security
zone, similar to using a firewall.

Using a MAC-based Attribute


You can use a MAC-based filter to isolate a single MAC address or multiple MAC addresses. You might
want to do this if you have a server sending bad traffic in he network; by creating a microsegment with a
MAC-based filter, you can isolate the server.

Cisco ACI Virtualization Guide, Release 2.2(2)


67
Microsegmentation with Cisco ACI
Configuring Microsegmentation with Cisco ACI

Configuring Microsegmentation with Cisco ACI


The following sections contain instructions for configuring Microsegmentation with Cisco AVS, VMware
VDS or Microsoft vSwitch using the Cisco APIC GUI and NX-OS style CLI. You can adapt the procedures
for your network's specific needs.

Note If VXLAN load balancing is enabled in the VMware vCenter domain profile, Microsegmentation with
Cisco ACI is not supported on the domain.

Prerequisites for Configuring Microsegmentation with Cisco ACI


Before you can configure Microsegmentation with Cisco ACI for Cisco AVS, VMware VDS or Microsoft
vSwitch, you need to fulfill the following prerequisites.
Ensure you meet the microsegmentation hardware requirements:

Table 3: Microsegmentation hardware support

Cisco Nexus Cisco Nexus Cisco Nexus Cisco Nexus


9332PQ, 9372PX, 9372PX-E and 93108TC-EX,93180YC-EX, 93180YC-FX,
9372TX, 9396PX, 9372TX-E and 93180LC-EX switches 93108TC-FX
9396TX, 93120TX, switches
and 93128TX
switches
AVS uSeg Yes Yes Yes Yes
(VM, IP, MAC)

Microsoft uSeg Yes Yes Yes Yes


(VM, IP, MAC)

VDS uSeg No No Yes Yes


(VM, IP, MAC)

Bare-Metal No Yes Yes Yes


(IP-EPG)

Bare-Metal N/A Yes Yes Yes


(MAC-EPG)

You must already have VMs with names that can be used with the filters that you will use when creating
the uSeg EPGs.
If you do not have VMs with names that can be used, you can go ahead and create the uSeg EPGs and
then change the VM names that can be used with the filters. Cisco APIC will automatically make the
VMs part of the new uSeg EPGs.

Cisco ACI Virtualization Guide, Release 2.2(2)


68
Microsegmentation with Cisco ACI
Configuring Microsegmentation with Cisco ACI

You must already have a application EPG.


Corresponding bridge domain must have IP subnet defined, otherwise the VMs will not be able to
communicate.
You must have chosen your own attributes, names, and values.
Attributes, names, and values used in the preceding scenarios were provided as examples.
You must create a contract before creating a microsegment with one or more attributes if you want to
associate the EPG with a contract.
If you have a Cisco AVS or VMware VDS and want to use a VM Custom Attribute, you also need to
add it in VMware vSphere Web Client. We recommend doing so before configuring Microsegmentation
in Cisco APIC so you can choose the Custom Attribute in the drop-down list while configuring the
microsegment in he Cisco APIC GUI.
See VMware vSphere ESXi and vCenter Server documentation for instructions for adding a Custom
Attribute in vSphere Web Client.
For Microsoft vSwitch based Microsegmentation - SCVMM 2012 R2 with Update Rollup 9 is required.
Update Rollup 9 includes a feature called "Enable Dynamic VLAN on the vNIC of a virtual machine",
which will be automatically enabled by the Cisco SCVMM Agent to allow live migration of Virtual
Machines which utilize Microsegmentation with ACI. For more information, see Microsoft's
documentation: https://support.microsoft.com/en-us/kb/3129784.

Workflow for Configuring Microsegmentation with Cisco ACI


This section provides a high-level description of the tasks that you need to perform in order to configure
Microsegmentation with Cisco ACI.

1 Create the uSeg EPG: Specify a name and bridge domain for the new uSeg EPG and choose a
network-based or VM-based attribute for the EPG.
Note For VMware VDS, you need to choose the same bridge domain for the new uSeg EPG
that is use by the application EPG. Otherwise, the VDS uSeg will not match VM attributes
or place the VM into the uSeg EPG.
2 Associate the new uSeg EPG with a VMM domain profile; you need to associate it with the same
VMM domain profile used by the application EPG.

3 Configure attributes for the uSeg EPG.

4 Verify that the end points have moved from the application EPG to the uSeg EPG.

Follow the instructions for these steps in the Configuring Microsegmentation with Cisco ACI, on page 68
section in this guide.

Configuring Microsegmentation with Cisco ACI Using the GUI


You can use Cisco APIC configure Microsegmentation with Cisco ACI to put VMs that belong to different
application EPGs or the same EPG into a new uSeg EPG. The task is essentially the same for Cisco AVS,
VMware VDS and Microsoft vSwitch; the slight difference is noted in the procedure.

Cisco ACI Virtualization Guide, Release 2.2(2)


69
Microsegmentation with Cisco ACI
Configuring Microsegmentation with Cisco ACI

Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.

Note The procedure for configuring Microsegmentation for Cisco ACI is the same in Advanced mode and Basic
mode.

Procedure

Step 1 Log into the Cisco APIC, choosing Advanced or Basic mode.
Step 2 Choose TENANTS and then choose the tenant within which you want to create a microsegment.
Step 3 In the tenant navigation pane, expand the tenant folder, the Application Profiles folder, the profile folder,
and the Application EPGs folder.
Step 4 a) Open the folder for the application EPG.
b) Right-click on the folder Domains (VMs and Bare-Metals).
c) In the Add VMM Domain Association dialog box, check the Allow Micro-Segmentation check box.
If you are using VMware VDS, you also need to configure all the required parameters.
d) Click SUBMIT.
Step 5 In the tenant navigation pane, right-click the uSeg EPGs folder, and then choose Create Useg EPG.
Step 6 Complete the following series of steps to begin creation of an uSeg EPG for one of the groups of VMs:
a) In the Create uSeg EPG dialog box, in the Name field, enter a name.
We recommend that you choose a name that indicates that the new uSeg EPG is a microsegment.
b) In the intra-EPG isolation field, select enforced or unenforced.
If you select enforced, ACI prevents all communication between the endpoint devices within this uSeg
EPG.
c) In the Bridge Domain area, choose a bridge domain from the drop-down list.
Note For VMware VDS, you must choose the same bridge domain that is used for the application EPG.
Otherwise, the VDS uSeg will not match VM attributes and will not place the VM into a uSeg
EPG.
d) In the uSeg Attributes area, choose IP Address Filter, MAC Address Filter or VM Attributes Filter
from the + drop-down list on the right side of the dialog box.
Step 7 Complete one of the following series of steps to configure the filter.

Cisco ACI Virtualization Guide, Release 2.2(2)


70
Microsegmentation with Cisco ACI
Configuring Microsegmentation with Cisco ACI

If you want to Then...


use...
An IP-based
attribute 1 In the Create IP Attribute dialog box, in the Name field, enter a name.
We recommend that you choose a name that reflects the filter's function.
2 In the IP Address field, enter an IP address or a subnet with the appropriate subnet
mask.
3 Click OK.
4 (Optional) Create a second IP Address filter by repeating Step 10 c through Step
11 c.
You might want to do this to include discontinuous IP addresses in the microsegment.
5 In the Create uSeg EPG dialog box, click SUBMIT.

A MAC-based
attribute 1 In the Create MAC Attribute dialog box, in the Name field, enter a name.
We recommend that you choose a name that reflects the filter's function.
2 In the MAC Address field, enter a MAC address.
3 Click OK.
4 In the Create uSeg EPG dialog box, click SUBMIT.

A VM-based
Attribute 1 In the Create VM Attribute dialog box, in the Name field, enter a name.
We recommend that you choose a name that reflects the filter's function.
2 In the Type area, choose one of the VM attribute types, from the drop-down list.
If you have a Cisco AVS or VMware VDS, you can choose any VM attribute type;
if you have a Microsoft vSwitch, you can choose any VM attribute type except
Custom Attribute.
3 In the Operator area, choose the appropriate operator from the drop-down list.
4 Enter or choose the appropriate value.
Note If you choose Equals as the operator, you type a value into a Value field
only if you chose VMM Domain or Datacenter as the VM attribute type.
Otherwise, you choose a value appropriate to the VM attribute type from
drop-down lists.
5 Click OK.
6 In the Create uSeg EPG dialog box, click SUBMIT.

Step 8 Complete the following steps to associate the uSeg EPG with a VMM domain.
a) In the navigation pane, ensure that the uSeg EPG folder is open and then open the container for the
microsegment that you just created.
b) Click the folder Domains (VMs and Bare-Metals).

Cisco ACI Virtualization Guide, Release 2.2(2)


71
Microsegmentation with Cisco ACI
Configuring Microsegmentation with Cisco ACI

c) On the right side of the work pane, click ACTIONS and then choose Add VMM Domain Association
from the drop-down list.
d) In the Add VMM Domain Association dialog box, choose a profile from the VMM Domain Profile
drop-down list.
If you have a Cisco AVS or VMware VDS, choose a VMware domain; if you have a Microsoft vSwitch,
choose a Microsoft domain.
Note You must choose the same domain that is used by the application
EPG.
e) In the Deploy Immediacy area, for Cisco AVS or Microsoft vSwitch; accept the default On Demand;
for VMware VDS, choose Immediate.
f) In the Resolution Immediacy area, accept the default Immediate.
g) In the Port Encap area, for Cisco AVS or Microsoft vSwitch, specify a static VLAN, or leave the field
empty and Cisco APIC will dynamically allocate a VLAN or VXLAN from the appropriate pool; for
VMware VDS, leave the field empty and the uSeg will inherit the encapsulation of the application EPG.
Note If you specify a static VLAN, you must choose one from a static encapsulation block within the
VLAN pool that you set up earlier. Static VLAN is available only for VLAN and not VXLAN.
h) Click SUBMIT.
Step 9 Repeat Step 5 through Step 8 for any other the other uSeg EPGs that you want to create.

What to Do Next
Verify that the uSeg EPG was created correctly.
If you configured a VM-based attribute, complete the following steps:
1 In the Cisco APIC navigation pane, click the new microsegment.
2 In the work pane, click the OPERATIONAL tab and then ensure that the Client End-Points tab is active.
3 In the work pane, verify that the VMs that you wanted to move from the application EPG appear as
endpoints for the new uSeg EPG.

If you configured an IP- or MAC-based attribute, make sure that traffic is running on the VMs that you put
into the new microsegments.

Configuring Microsegmentation with Cisco ACI Using the NX-OS-style CLI


This section describes how to configure Microsegmentation with Cisco ACI for Cisco AVS, VMware VDS
or Microsoft vSwitch using VM-based attributes within an application EPG.

Procedure

Step 1 In the CLI, enter configuration mode:

Example:
apic1# configure
apic1(config)#
Step 2 Create the uSeg EPG:

Example:

Cisco ACI Virtualization Guide, Release 2.2(2)


72
Microsegmentation with Cisco ACI
Configuring Microsegmentation with Cisco ACI

This example is for an application EPG.


Note The command to allow microsegmentation in the following example is required for VMware VDS
only.
apic1(config)# tenant cli-ten1
apic1(config-tenant)# application cli-a1
apic1(config-tenant-app)# epg cli-baseEPG1
apic1(config-tenant-app-epg)# bridge-domain member cli-bd1
apic1(config-tenant-app-epg)# vmware-domain member cli-vmm1 allow-micro-segmentation

Example:
This example uses a filter based on the attribute VM Name.
apic1(config)# tenant cli-ten1
apic1(config-tenant)# application cli-a1
apic1(config-tenant-app)# epg cli-uepg1 type micro-segmented
apic1(config-tenant-app-uepg)# bridge-domain member cli-bd1
apic1(config-tenant-app-uepg)# attribute cli-uepg-att match vm-name contains <cos1>
#Schemes to express the name
contains contains
endsWith ends-with
equals equals
startsWith starts-with
apic1(config-tenant-app-uepg)# {vmware-domain | microsoft-domain} member cli-vmm1

Example:
This example uses a filter based on an IP address.
apic1(config)# tenant cli-ten1
apic1(config-tenant)# application cli-a1
apic1(config-tenant-app)# epg cli-uepg1 type micro-segmented
apic1(config-tenant-app-uepg)# bridge-domain member cli-bd1
apic1(config-tenant-app-uepg)# attribute cli-upg-att match ip <X.X.X.X>
#Schemes to express the ip
A.B.C.D IP Address
A.B.C.D/LEN IP Address and mask
apic1(config-tenant-app-uepg)# {vmware-domain | microsoft-domain} member cli-vmm1

Example:
This example uses a filter based on a MAC address.
apic1(config)# tenant cli-ten1
apic1(config-tenant)# application cli-a1
apic1(config-tenant-app)# epg cli-uepg1 type micro-segmented
apic1(config-tenant-app-uepg)# bridge-domain member cli-bd1
apic1(config-tenant-app-uepg)# attribute cli-upg-att match mac <FF-FF-FF-FF-FF-FF>
#Schemes to express the mac
E.E.E MAC address (Option 1)
EE-EE-EE-EE-EE-EE MAC address (Option 2)
EE:EE:EE:EE:EE:EE MAC address (Option 3)
EEEE.EEEE.EEEE MAC address (Option 4)
apic1(config-tenant-app-uepg)# {vmware-domain | microsoft-domain} member cli-vmm1
Step 3 Verify the uSeg EPG creation:

Example:
apic1(config-tenant-app-uepg)# show running-config
# Command: show running-config tenant cli-ten1 application cli-app1 epg cli-uepg1 type
micro-segmented
# Time: Thu Oct 8 11:54:32 2015
tenant cli-ten1
application cli-app1
epg cli-esx1bu type micro-segmented
bridge-domain cli-bd1
attribute cli-uepg-att match vm-name equals cos1
{vmware-domain | microsoft-domain} member cli-vmm1
exit
exit
exit

Cisco ACI Virtualization Guide, Release 2.2(2)


73
Microsegmentation with Cisco ACI
Configuring Microsegmentation with Cisco ACI

Configuring Microsegmentation with Cisco ACI Using the REST API


This section describes how to configure Microsegmentation with Cisco ACI for Cisco AVS, VMware VDS,
or Microsoft vSwitch using the REST API.

Procedure

Step 1 Log in to the Cisco APIC.


Step 2 Post the policy to https://apic-ip-address/api/node/mo/.xml.

Example:
The following example configures a microsegment named 41-subnet using an IP-based attribute.
<polUni>
<fvTenant dn="uni/tn-User-T1" name="User-T1">
<fvAp dn="uni/tn-User-T1/ap-Application-EPG" name="Application-EPG">
<fvAEPg dn="uni/tn-User-T1/ap-Application-EPG/epg-41-subnet" name="41-subnet"
pcEnfPref="enforced isUsegEPg="yes" >
<fvRsBd tnFvBDName="BD1" />
<fvCrtrn name="Security1">
<fvIpAttr name="41-filter" ip="12.41.0.0/16"/>
</fvCrtrn>
<fvRsDomAtt tDn="uni/vmmp-Microsoft/dom-cli-vmm1"/> / <fvRsDomAtt
tDn="uni/vmmp-VMware/dom-cli-vmm1"/>
</fvAEPg>
</fvAp>
</fvTenant>
</polUni>

Example:
This example is for an application EPG.
<polUni>
<fvTenant dn="uni/tn-User-T1" name="User-T1">
<fvAp dn="uni/tn-User-T1/ap-Application-EPG" name="Application-EPG">
<fvAEPg dn="uni/tn-User-T1/ap-Application-EPG/applicationEPG name=applicationEPG
pcEnfPref="enforced >
<fvRsBd tnFvBDName="BD1" />
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-cli-vmm1" classPref=useg/>
</fvAEPg>
</fvAp>
</fvTenant>
</polUni>
In the example above, the string <fvRsDomAtt tDn="uni/vmmp-VMware/dom-cli-vmm1"
classPref=useg/> is relevant only for VMware VDS and not for Cisco AVS or Microsoft vSwitch.

Cisco ACI Virtualization Guide, Release 2.2(2)


74
CHAPTER 5
Intra-EPG Isolation Enforcement and Cisco ACI
This chapter contains the following sections:

Intra-EPG Isolation for VMware vDS, page 75


Intra-EPG Isolation Enforcement for Cisco AVS, page 79

Intra-EPG Isolation for VMware vDS


Intra-EPG Isolation is an option to prevent physical or virtual endpoint devices that are contained in the same
base EPG or uSeg EPG from communicating with each other. By default endpoint devices included in the
same EPG are allowed to communicate with one another; however, conditions exist in which total isolation
of the endpoint devices from on another within an EPG is desirable. For example, if the endpoint VMs in the
same EPG belong to multiple tenants, or if you want to prevent the possible spread of a virus that might infect
one VM from spreading to all VMs in an EPG, intra-EPG isolation might be desirable to enforce.
An ACI virtual machine manager (VMM) domain creates an isolated PVLAN port group at the VMware vDS
switch for each EPG that has intra-EPG isolation enabled. A fabric administrator specifies primary encapsulation
or the fabric dynamically specifies primary encapsulation at the time of EPG-to-VMM domain association.
When the fabric administrator selects the VLAN-pri and VLAN-sec values statically, the VMM domain
validates that the VLAN-pri and VLAN-sec are part of a static block in the domain pool.

Note When intra-EPG isolation is not enforced, the VLAN-pri value is ignored even if it is specified in the
configuration.

VLAN-pri/VLAN-sec pairs for the vDS switch are selected per VMM domain during the EPG-to-domain
association. The port group created for the intra-EPG isolation EPGs uses the VLAN-sec tagged with type
set to PVLAN. The vDS and fabric swap the VLAN-pri/VLAN-sec encapsulation:

Communication from the ACI fabric to the vDS switch uses VLAN-pri.

Cisco ACI Virtualization Guide, Release 2.2(2)


75
Intra-EPG Isolation Enforcement and Cisco ACI
Intra-EPG Isolation for VMware vDS

Communication from the vDS switch to the ACI fabric uses VLAN-sec.

Figure 9: Intra-EPG Isolation for VMware vDS

Note these details regarding this illustration:


1 EPG-DB sends VLAN traffic to the ACI leaf switch. The ACI egress leaf switch encapsulates traffic with
a primary VLAN (PVLAN) tag and forwards it to the Web-EPG endpoint.
2 The vDS switch sends traffic to the ACI leaf switch using VLAN-sec. The ACI leaf switch drops all
intra-EPG traffic because isolation is enforced for all intra VLAN-sec traffic within the Web-EPG.
3 The vDS VLAN-sec uplink to the ACI Leaf is in isolated trunk mode. The ACI leaf switch uses VLAN-pri
for downlink traffic to the vDS switch.
4 The PVLAN map is configured in the vDS and ACI leaf switches. VM traffic from WEB-EPG is
encapsulated in VLAN-sec. The vDS switch denies local intra-WEB EPG VM traffic according to the
PVLAN tag. All intra-ESXi host VM traffic is sent to the ACI leaf using VLAN-sec

Related Topics
For information on configuring intra-EPG isolation in a Cisco AVS environment, see Intra-EPG Isolation
Enforcement for Cisco AVS.

Cisco ACI Virtualization Guide, Release 2.2(2)


76
Intra-EPG Isolation Enforcement and Cisco ACI
Configuring Intra-EPG Isolation for VMware vDS using the GUI

Configuring Intra-EPG Isolation for VMware vDS using the GUI


Procedure

Step 1 In a tenant, right click on an Application Profile, and open the Create Application EPG dialog box to
perform the following actions:
a) In the Name field, add the EPG name (intra_EPG-deny).
b) For Intra EPG Isolation, click Enforced.
c) In the Bridge Domain field, choose the bridge domain from the drop-down list (bd1).
d) Associate the EPG with a bare metal/physical domain interface or with a VM Domain.
For the VM Domain case, check the Associate to VM Domain Profiles check box.
For the bare metal case, check the Statically Link with Leaves/Paths check box.
e) Click Next.
f) In the Step 2 for Specify the VM Domains area, expand Associate VM Domain Profiles and from the
drop-down list, choose the desired VMM domain. Click Update and click OK.
Step 2 In the Domains dialog box, perform the following actions:
a) In the Domain Profile field, choose a domain profile from the drop-down list (VMwarePVLAN).
For the static case, in the Port Encap (or Secondary VLAN for Micro-Seg) field, specify the secondary
VLAN (vlan-2005), and in the Primary VLAN for Micro-Seg field, specify the primary VLAN
(vlan-2006). If the Encap fields are left blank, values will be allocated dynamically.
Note For the static case, a static VLAN must be available in the VLAN
pool.
b) Choose a domain profile from the drop-down list (VMwareDVS).
c) Click Update.
d) Click Finish.

Configuring Intra-EPG Isolation for VMware vDS using the NX-OS Style CLI
Procedure

Step 1 In the CLI, create an intra-EPG isolation EPG:

Example:
The VMM case is below.
apic1(config)# tenant Test_Isolation
apic1(config-tenant)# application PVLAN
apic1(config-tenant-app)# epg EPG1
apic1(config-tenant-app-epg)# show running-config
# Command: show running-config
tenant Test_Isolation
application PVLAN epg EPG1
tenant Test_Isolation
application PVLAN

Cisco ACI Virtualization Guide, Release 2.2(2)


77
Intra-EPG Isolation Enforcement and Cisco ACI
Configuring Intra-EPG Isolation for VMware vDS using the NX-OS Style CLI

epg EPG1
bridge-domain member VMM_BD
contract consumer VMware_vDS-Ext
contract consumer default
contract provider Isolate_EPG
vmware-domain member PVLAN encap vlan-2002 primary-encap vlan-2001 push on-demand
<--- Assigns static primary & secondary encap to EPG.
vmware-domain member mininet <--- If no static vlan assigned APIC assigns primary
& secondary encap for isolated EPG.
isolation enforce <---- This enables EPG isolation mode.
exit
exit
exit
Step 2 Verify the configuration:

Example:
show epg StaticEPG detail
Application EPg Data:
Tenant : Test_Isolation
Application : PVLAN
AEPg : StaticEPG
BD : VMM_BD
uSeg EPG : no
Intra EPG Isolation : enforced
Vlan Domains : VMM
Consumed Contracts : VMware_vDS-Ext
Provided Contracts : default,Isolate_EPG
Denied Contracts :
Qos Class : unspecified
Tag List :
VMM Domains:
Domain Type Deployment Immediacy Resolution Immediacy State
Encap Primary
Encap
-------------------- --------- -------------------- -------------------- --------------
---------- ----------
DVS1 VMware On Demand immediate formed
auto auto

Static Leaves:
Node Encap Deployment Immediacy Mode Modification Time

---------- ---------------- -------------------- ------------------


------------------------------

Static Paths:
Node Interface Encap Modification Time

---------- ------------------------------ ---------------- ------------------------------

1018 eth101/1/1 vlan-100 2016-02-11T18:39:02.337-08:00

1019 eth1/16 vlan-101 2016-02-11T18:39:02.337-08:00

Static Endpoints:
Node Interface Encap End Point MAC End Point IP Address
Modification Time
---------- ------------------------------ ---------------- -----------------
------------------------------ ------------------------------

Dynamic Endpoints:
Encap: (P):Primary VLAN, (S):Secondary VLAN
Node Interface Encap End Point MAC End Point IP Address
Modification Time
---------- ------------------------------ ---------------- -----------------
------------------------------ ------------------------------
1017 eth1/3 vlan-943(P) 00:50:56:B3:64:C4 ---
2016-02-17T18:35:32.224-08:00
vlan-944(S)

Cisco ACI Virtualization Guide, Release 2.2(2)


78
Intra-EPG Isolation Enforcement and Cisco ACI
Configuring Intra-EPG Isolation for VMware vDS using the REST API

Configuring Intra-EPG Isolation for VMware vDS using the REST API
Before You Begin

Procedure

Step 1 Send this HTTP POST message to deploy the application using the XML API.

Example:
POST https://apic-ip-address/api/mo/uni/tn-ExampleCorp.xml
Step 2 For a VMware vDS VMM deployment, include this XML structure in the body of the POST message.

Example:
<fvTenant name="Tenant_VMM" >
<fvAp name="Web">
<fvAEPg name="IntraEPGDeny" pcEnfPref="enforced">
<!-- pcEnfPref="enforced" ENABLES ISOLATION-->
<fvRsBd tnFvBDName="bd" />
<fvRsPathAtt tDn="topology/pod-1/paths-1017/pathep-[eth1/2]" encap="vlan-51"
primaryEncap="vlan-100" instrImedcy='immediate'/>
<!-- STATIC ENCAP ASSOCIATION TO VMM DOMAIN-->
<fvRsDomAtt encap="vlan-2001" instrImedcy="lazy" primaryEncap="vlan-2002"
resImedcy="immediate" tDn="uni/vmmp-VMware/dom-DVS1>
</fvAEPg>
</fvAp>
</fvTenant>

Intra-EPG Isolation Enforcement for Cisco AVS


By default, endpoints with an EPG can communicate with each other without any contracts in place. However,
beginning with Cisco AVS Release 5.2(1)SV3(1.20), you can isolate endpoints within an EPG from each
other. In some instances, you might want to enforce endpoint isolation within an EPG to prevent a VM with
a virus or other problem from affecting other VMs in the EPG.
You can configure isolation on all or none of the endpoints within an application EPG; you cannot configure
isolation on some endpoints but not on others.
Isolating endpoints within an EPG does not affect any contracts that enable the endpoints to communicate
with endpoints in another EPG.
Isolating endpoints within an EPG will trigger a fault When the EPG is associated with Cisco AVS domains
in VLAN mode.

Cisco ACI Virtualization Guide, Release 2.2(2)


79
Intra-EPG Isolation Enforcement and Cisco ACI
Configuring Intra-EPG Isolation for Cisco AVS Using the GUI

Note Using intra-EPG isolation on a Cisco AVS microsegment (uSeg) EPG is not currently supported.
Communication will be possible between two endpoints that reside in separate uSeg EPGs if either has
intra-EPG isolation enforced, regardless of any contract that exists between the two EPGs.

Configuring Intra-EPG Isolation for Cisco AVS Using the GUI


Follow this procedure to create an EPG in which the endpoints of the EPG are isolated from each other.
The port that the EPG uses must belong to one of the VM Managers (VMMs).

Note This procedure assumes that you want to isolate endpoints within an EPG when you create the EPG. If
you want to isolate endpoints within an existing EPG, select the EPG in Cisco APIC, and in the Properties
pane, in the Intra EPG Isolation area, choose Enforced, and then click SUBMIT.

Before You Begin


Make sure that Cisco AVS is in VXLAN mode.

Procedure

Step 1 Log in to Cisco APIC, using Advanced or Basic mode.


Step 2 Choose Tenants, expand the folder for the tenant, and then expand the Application Profiles folder.
Step 3 Right-click an application profile, and choose Create Application EPG.
Step 4 In the Create Application EPG dialog box, complete the following actions:
a) In the Name field, enter the EPG name.
b) In the Intra EPG Isolation area, click Enforced.
c) From the Bridge Domain drop-down list, choose the bridge domain.
d) Check the Associate to VM Domain Profiles check box.
e) Click Next.
f) In the Associate VM Domain Profiles area, click the plus icon, and from the Domain Profile drop-down
list, choose the desired VMM domain.
g) Click Update and click FINISH.

What to Do Next
You can select statistics and view them to help diagnose problems involving the endpoint. See the sections
Choosing Statistics to View for Isolated Endpoints on Cisco AVS and Viewing Statistics for Isolated Endpoints
on Cisco AVS in this guide.

Cisco ACI Virtualization Guide, Release 2.2(2)


80
Intra-EPG Isolation Enforcement and Cisco ACI
Configuring Intra-EPG Isolation for Cisco AVS Using the NX-OS Style CLI

Configuring Intra-EPG Isolation for Cisco AVS Using the NX-OS Style CLI
Before You Begin
Make sure that Cisco AVS is in VXLAN mode.

Procedure

In the CLI, create an intra-EPG isolation EPG:

Example:
# Command: show running-config
tenant TENANT1
application APP1
epg EPG1
bridge-domain member VMM_BD
vmware-domain member VMMDOM1
isolation enforce <---- This enables EPG into isolation mode.
exit
exit
exit

What to Do Next
You can select statistics and view them to help diagnose problems involving the endpoint. See the sections
Choosing Statistics to View for Isolated Endpoints on Cisco AVS and Viewing Statistics for Isolated Endpoints
on Cisco AVS in this guide.

Configuring Intra-EPG Isolation for Cisco AVS Using the REST API
Before You Begin
Make sure that Cisco AVS is in VXLAN mode.

Procedure

Step 1 Send this HTTP POST message to deploy the application using the XML API.

Example:
POST
https://192.0.20.123/api/mo/uni/tn-ExampleCorp.xml
Step 2 For a VMM deployment, include the XML structure in the following example in the body of the POST
message.

Example:
Example:
<fvTenant name="Tenant_VMM" >
<fvAp name="Web">
<fvAEPg name="IntraEPGDeny" pcEnfPref="enforced">
<!-- pcEnfPref="enforced" ENABLES ISOLATION-->
<fvRsBd tnFvBDName="bd" />
<fvRsDomAtt encap="vlan-2001" tDn="uni/vmmp-VMware/dom-DVS1>
</fvAEPg>

Cisco ACI Virtualization Guide, Release 2.2(2)


81
Intra-EPG Isolation Enforcement and Cisco ACI
Choosing Statistics to View for Isolated Endpoints on Cisco AVS

</fvAp>
</fvTenant>

What to Do Next
You can select statistics and view them to help diagnose problems involving the endpoint. See the sections
Choosing Statistics to View for Isolated Endpoints on Cisco AVS and Viewing Statistics for Isolated Endpoints
on Cisco AVS in this guide.

Choosing Statistics to View for Isolated Endpoints on Cisco AVS


If you configured intra-EPG isolation on a Cisco AVS, you need to choose statisticssuch as denied
connections, received packets, or transmitted multicast packetsfor the endpoints before you can view them.

Procedure

Step 1 Log into Cisco APIC, using Advanced or Basic mode.


Step 2 Choose Tenants > tenant.
Step 3 In the tenant navigation pane, choose Application Profiles > profile > Application EPGs, and then choose
the EPG containing the endpoint the statistics for which you want to view.
Step 4 In the EPG Properties work pane, click the Operational tab to display the endpoints in the EPG.
Step 5 Double-click the endpoint.
Step 6 In the Properties dialog box for the endpoint, click the Stats tab and then click the check icon.
Step 7 In the Select Stats dialog box, in the Available pane, choose the statistics that you want to view for the
endpoint and then use the right-pointing arrow to move them into the Selected pane.
Step 8 Click SUBMIT.

Viewing Statistics for Isolated Endpoints on Cisco AVS


If you configured intra-EPG isolation on a Cisco AVS, once you have chosen statistics for the endpoints, you
can view them.

Before You Begin


You must have chosen statistics to view for isolated endpoints. See "Choosing Statistics to View for Isolated
Endpoints for Cisco AVS" in this guide for instructions.

Cisco ACI Virtualization Guide, Release 2.2(2)


82
Intra-EPG Isolation Enforcement and Cisco ACI
Viewing Statistics for Isolated Endpoints on Cisco AVS

Procedure

Step 1 Log into Cisco APIC, using Advanced or Basic mode.


Step 2 Choose Tenants > tenant.
Step 3 In the tenant navigation pane, choose Application Profiles > profile > Application EPGs, and then choose
the EPG containing the endpoint the statistics for which you want to view.
Step 4 In the EPG Properties work pane, click the Operational tab to display the endpoints in the EPG.
Step 5 Double-click the endpoint.
Step 6 In the Properties dialog box for the endpoint, click the Stats tab.
The central pane displays the statistics that you chose earlier. You can change the view by clicking the table
view or chart view icon on the upper left side of the work pane.

Cisco ACI Virtualization Guide, Release 2.2(2)


83
Intra-EPG Isolation Enforcement and Cisco ACI
Viewing Statistics for Isolated Endpoints on Cisco AVS

Cisco ACI Virtualization Guide, Release 2.2(2)


84
CHAPTER 6
Cisco ACI with Cisco AVS
This chapter includes the following sections:

Cisco AVS Overview, page 85


Cisco AVS Installation, page 90
Key Post-Installation Configuration Tasks for the Cisco AVS, page 126
Distributed Firewall, page 145
Microsegmentation with Cisco ACI for Cisco AVS, page 162
Configuring Layer 4 to Layer 7 Services, page 162
Migrating Your Network from DVS to AVS, page 162
REST API Tasks for Cisco AVS, page 163

Cisco AVS Overview


The Cisco Application Virtual Switch (AVS) is a key part of the Cisco Application Centric Infrastructure
(ACI). It is a distributed virtual switch that offers different forwarding and encapsulation options and extends
across many virtualized hosts and data centers defined by the VMware vCenter Server.
The Cisco AVS is integrated with the Cisco ACI architecture as a virtual leaf and is managed by the Cisco
APIC. The Cisco AVS implements the OpFlex protocol for control plane communication.
This section provides an overview of the Cisco AVS.
The Cisco AVS supports two modes of traffic forwarding: Local Switching mode, formerly known as Fex
disable mode; and No Local Switching mode, formerly known as Fex enable mode. You choose the forwarding
mode during Cisco AVS installation.

Local Switching Mode


In Local Switching mode, all intra-EPG traffic is locally forwarded by the Cisco AVS, without the involvement
of the leaf. All inter-EPG traffic is forwarded through the leaf. In this mode, the Cisco AVS can use either
VLAN or VXLAN encapsulationor bothfor forwarding traffic to the leaf and back. You choose the
encapsulation type during Cisco AVS installation.

Cisco ACI Virtualization Guide, Release 2.2(2)


85
Cisco ACI with Cisco AVS
Cisco AVS Overview

Beginning with Cisco AVS Release 5.2(1)SV3(2.5), you can configure a single VMM domain in Local
Switching mode to use VLAN and VXLAN encapsulation. Previously, encapsulation was determined solely
by the presence of VLAN or multicast pools, and you needed to have separate VMM domains for EPGs using
VLAN and VXLAN encapsulation.
If you choose VLAN encapsulation, a range of VLANs must be available for use by the Cisco AVS. These
VLANs have local scope in that they have significance only within the Layer 2 network between the Cisco
AVS and the leaf. If you choose VXLAN encapsulation, only the infra-VLAN needs to be available between
the Cisco AVS and the leaf. This results in a simplified configuration and is the recommended encapsulation
type if there are one or more switches between the Cisco AVS and the physical leaf.

Figure 10: The Cisco AVS in Local Switching Mode

Cisco ACI Virtualization Guide, Release 2.2(2)


86
Cisco ACI with Cisco AVS
About the Cisco AVS and the VMware vCenter

No Local Switching Mode


In No Local Switching mode, all traffic is forwarded by the leaf. In this mode, VXLAN is the only allowed
encapsulation type.

Figure 11: The Cisco AVS in No Local Switching Mode

About the Cisco AVS and the VMware vCenter


The Cisco Application Virtual Switch (AVS) is a distributed virtual switch that extends across many virtualized
hosts. It manages a data center defined by the vCenter Server.
The Cisco AVS is compatible with any upstream physical access layer switch that complies with the Ethernet
standard, including Cisco Nexus switches. The Cisco AVS is compatible with any server hardware listed in
the VMware Hardware Compatibility List (HCL).
The Cisco AVS is a distributed virtual switch solution that is fully integrated within the VMware virtual
infrastructure, including VMware vCenter for the virtualization administrator. This solution allows the network
administrator to configure virtual switch and port groups in order to establish a consistent data center network
policy.

Cisco ACI Virtualization Guide, Release 2.2(2)


87
Cisco ACI with Cisco AVS
Cisco AVS in a Multipod Environment

The following figure shows a topology that includes the Cisco AVS with the Cisco Application Policy
Infrastructure Controller (APIC) and VMware vCenter.

Figure 12: Sample Cisco AVS Topology

Cisco AVS in a Multipod Environment


The Cisco AVS can be part of a multipod environment. Multipod environments use a single APIC cluster for
all the pods; all the pods act as a single fabric.
Multipod environments enable a more fault tolerant fabric comprising multiple pods with isolated control
plane protocols. They also provide greater flexibility in full mesh cabling between leaf and spine switches.
Cisco AVS does not require any additional configuration to operate in a multipod environment.
For detailed information about multipod environments, see the following documents on Cisco.com:
Cisco Application Centric Infrastructure Fundamentals
Cisco APIC Getting Started Guide
Cisco APIC NX-OS Style Command-Line Interface Configuration Guide

The following features are not supported for Cisco AVS with multipod in the Cisco APIC 2.0(1.x) release:
L3 Multicast
Storage vMotion with two separate NFS in two separate PODs
ERSPAN destination in different PODs
Distributed Firewall syslog server in different PODs

Cisco ACI Virtualization Guide, Release 2.2(2)


88
Cisco ACI with Cisco AVS
Required Software

Required Software
The following table shows the versions of software you need to install for Cisco Application Virtual Switch
(AVS) to work with the Cisco Application Policy Infrastructure Controller (APIC), VMware vCenter, and
VMware ESXi hypervisor:

Component Description
Cisco AVS software Cisco AVS is supported in Release 4.2(1)SV2(2.3) and later releases.
However, Release 5.2(1)SV3(1.5) or later is required if you want to
use Distributed Firewall and Microsegmentation with Cisco AVS.

Cisco APIC See the Cisco AVS Release Notes for compatibility information.
However, version 1.1(1j) or later is required with Cisco AVS
5.2(1)SV3(1.5) or later if you want to use Distributed Firewall and
Microsegmentation with Cisco AVS.

VMware vCenter Cisco AVS is compatible with release 5.1, 5.5, 6.0, or 6.5 of VMware
vCenter Server.

VMware vSphere bare metal Cisco AVS is supported as a vLeaf for the Cisco APIC with release
5.1 and later releases of the VMware ESXi hypervisor.
Note When you choose a Cisco AVS VIB, you need to choose the
one compatible with the version of VMware ESXi hypervisor
that you use. ESXi 5.1 uses xxix.3.1.1.vib, ESXi 5.5 uses
xxix.3.2.1.vib, ESXi 6.0 uses xxxx.6.0.1.vib, and ESXi 6.5
uses xxxx.6.5.1.vib.
Cisco Virtual Switch Update Cisco AVS is supported in VSUM Release 1.0 and later releases.
Manager (VSUM)

Cisco AVS Documentation


You can find documentation on the Cisco Application Virtual Switch page on Cisco.com.
Documentation for Cisco Application Virtual Switch (AVS) includes:
Cisco Application Virtual Switch Release Notes
Cisco Application Virtual Switch Documentation Overview
Cisco Application Virtual Switch Installation Guide
Cisco Application Virtual Switch Download Instructions for VMware ESXi Deployments
Cisco Application Virtual Switch Configuration Guide
Cisco Application Virtual Switch Verified Scalability Guide
Cisco Application Virtual Switch Solution Guide
Cisco Application Virtual Switch Troubleshooting Guide

Cisco ACI Virtualization Guide, Release 2.2(2)


89
Cisco ACI with Cisco AVS
Cisco AVS Installation

Cisco Virtual Switch Update Manager Getting Started Guide


Cisco Virtual Switch Update Manager Release Notes
Cisco Virtual Switch Update Manager Troubleshooting Guide

Cisco AVS Installation


Installing the Cisco Application Virtual Switch (AVS) consists of two separate sets of tasks: configuring the
Cisco Application Policy Infrastructure Controller (APIC) and then installing Cisco AVS using the Cisco
Virtual Switch Update Manager (VSUM), the ESXi CLI, or the VMware Virtual Update Manager (VUM).
You also must verify the installation.
This section provides the instructions for each set of tasks that you need to perform to install Cisco AVS to
use within the Cisco Application Centric Infrastructure (ACI) fabric.

Workflow for Installing the Cisco AVS


This section provides a high-level description of the tasks that you need to perform in order to install the Cisco
AVS.
1 Create interface and switch policies and a VMware vCenter domain profile for the Cisco AVS in the
unified configuration wizard in the Cisco Application Policy Infrastructure Controller (APIC) GUI.
An interface policy configures the type of interfaceport channel (PC) or virtual PC (VPC)for the
vSphere hosts and a link aggregation control protocol (LACP), or MAC pinning. See the appendix
"Recommended Topologies" in the Cisco Application Virtual Switch Installation Guide for supported
topologies.
A switch policy configures the connection between the Cisco AVS (the vLeaf) and the ESXi hypervisor
by specifying a physical port on the leaf switch and by specifying Cisco AVS trunk settings. These include
VLANs or VXLANs.
A VMware vCenter domain groups virtual machine (VM) controllers with similar networking policy
requirements. For example, VM controllers can share VLAN or Virtual Extensible Local Area Network
(VXLAN) space and application endpoint groups (EPGs). The Cisco APIC communicates with the controller
to publish network configurations such as port groups that are then applied to the virtual workloads.
See the section Creating Interface and Switch Profiles and a vCenter Domain Profile Using the Advanced
GUI in this guide for instructions.
2 Install the Cisco AVS and add the ESXi host to the Cisco AVS.

Note You can connect a single ESX or ESXi host to only one Cisco AVS at a time. You cannot add multiple
Cisco AVS to a single ESX or ESXi host.
Using Cisco VSUM is the recommended method for installing the Cisco AVS. Using Cisco VSUM
validates the version and compatibility for the ESXi host, and in one procedure enables you to install the
Cisco AVS onto the ESXi host and add the ESXi host to the Cisco AVS distributed virtual switch (DVS).
See the section Installing the Cisco AVS Using Cisco VSUM in this guide for instructions for installing
the Cisco AVS using VSUM.

Cisco ACI Virtualization Guide, Release 2.2(2)


90
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

However, you can install Cisco AVS using the ESXi CLI or VMware Virtual Update Manager (VUM).
You might want to do so if you have one or few Cisco AVS. See the section Installing the Cisco AVS
Software Using the ESXi CLI, on page 120 in this guide or "Installing the Cisco AVS Software Using
VMware VUM" in the Cisco Application Virtual Switch Installation Guide for instructions.
3 Verify the Cisco AVS Installation.
You need to verify that the Cisco AVS has been installed on the VMware ESXi hypervisor by verifying
the virtual switch status and the virtual NIC status. You also need to verify that the vmknic is created, that
OpFlex is online, and that the ports are in a forwarding state.
See the section Verifying the Cisco AVS Installation in this guide for instructions.
4 Add hosts to the Cisco AVS.
Once you have installed the Cisco AVS, you can add hosts, one at a time, to it.
See the section Adding Cisco AVS Hosts to the DVS, on page 123 in this guide for instructions.

Creating Interface, Switch, and vCenter Domain Profiles


Before you can install the Cisco AVS, you need to create interface, switch, and vCenter domain profiles. As
of Cisco APIC 1.1.x, we recommend that you perform these tasks in the united configuration wizard in the
Cisco APIC. This is the procedure Creating Interface and Switch Profiles and a vCenter Domain Profile Using
the Advanced GUI in this guide.
You should understand and follow the guidelines in this section before proceeding with the tasks.

Alternate Procedures
If you need to configure a FEX profile or detailed interface, switch, or vCenter domain profiles, you can find
instructions in Appendix C, "Procedures for Creating Interface, Switch, and vCenter Domain Profiles" in the
Cisco Application Virtual Switch Installation Guide.

Firewall Considerations
If you use the recommended united configuration wizard, the Cisco APIC automatically creates a firewall
policy, which can be modified later. If you instead use the alternate procedures to create interface, switch, or
vCenter domain profiles, you will need to create a firewall policy manually. Follow the instructions in the
Distributed Firewall section of this guide.

Interface and Switch Profile Guidelines and Prerequisites


Follow these guidelines and fulfil the prerequisites when creating interface and switch profiles for your Cisco
AVS.

Guidelines for Creating Interface and Switch Profiles


The Cisco AVS supports PC, VPC, MAC Pinning, and FEX interface policies. It does not support individual
interface policies. See the Cisco Application Virtual Switch Installation Guide for information about FEX
policies.
If there is a Layer 2 network between the leaf switch and the Cisco AVS vSphere host, configure the
interface policy on the interfaces that are connected to the Layer 2 network.

Cisco ACI Virtualization Guide, Release 2.2(2)


91
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

The number of links and leafs that you use determine whether you need to configure a PC or a VPC
policy for the Cisco AVS:
If you are using a single link between a leaf and an ESXi host, you need to configure a PC policy.
If you are using multiple links between one leaf and an ESXi host, you must configure a PC policy.
If you are using multiple links between multiple leafs and an ESXi host, you must configure a
VPC policy.

Follow these guidelines for choosing a LACP policy:


Choose LACP (Active or Passive) if the uplinks from the Cisco AVS (vSphere host) are directly
connected to the leaf switches and you want to use or turn on the LACP channeling protocol.
Choose Static Channel - Mode On if the uplinks form the Cisco AVS are directly connected to the
leaf switches but you do not want to use the LACP channeling protocol, for example, static port
channel.
Choose MAC Pinning if the uplinks from the Cisco AVS should not be channeled together and
will operate as separate links.

Prerequisites for Creating Interface and Switch Profiles


You should verify that the leaf switch interfaces are physically connected to the ESXi hypervisor or, if you
are using a Layer 2 device, verify that the leaf is physically connected to the Layer 2 device.

vCenter Domain Profile Guidelines and Prerequisites


You must create a new vCenter domain profile; you cannot convert an existing one. For information about
deleting an existing VMware vCenter domain profile, see the section "Guidelines for Deleting VMM Domains"
in Cisco Application Centric Infrastructure Fundamentals.

Guidelines for Creating a VMware vCenter Domain Profile


You can create multiple data centers and DVS entries under a single domain. However, you can have only
one Cisco AVS assigned to each data center.
If you choose VXLAN encapsulation and MAC pinning link aggregation, we recommend that you enable
VXLAN load balancing. See the section Enabling VXLAN load balancing in the Cisco Application Virtual
Switch Configuration Guide.

Note VXLAN load balancing is enabled by default. However, to use it effectively, you need to configure
additional VMK NICs to match the number of PNICs.
Beginning with Cisco AVS Release 5.2(1)SV3(1.15), you can use IPv6 when creating a VMM domain,
provided that the vCenter and ESXi host management are IPv6-enabled.

Prerequisites for Creating a VMware vCenter Domain Profile


Make sure that the multicast IP address pool has enough multicast IP addresses to accommodate the number
of EPGs that will be published to the VMware vCenter domain. You can add more IP addresses to a multicast
address pool that is already associated with a VMware vCenter domain at any time.

Cisco ACI Virtualization Guide, Release 2.2(2)


92
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

Make sure that you have a sufficient number of VLAN IDs. If you do not, ports on endpoint groups (EPGs)
might report that no encapsulation is available.
If you want to change the switch mode on a Cisco AVS, you first must remove the existing DVS and then
add the VMware vCenter domain with the desired switching mode. For instructions on removing the existing
DVS, see Cisco Application Virtual Switch Configuration Guide.
vCenter must be installed, configured, and reachable through the in-band/out-of-band management network.
You must have the administrator/root credentials to the vCenter.

Note If you prefer not to use the vCenter administrator/root credentials, you can create a custom user account
with minimum required permissions. See Custom User Account with Minimum VMware vCenter
Privileges, on page 46 for a list of the required user privileges.

Creating Interface and Switch Profiles and a vCenter Domain Profile Using the Advanced GUI
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.
For information about using Advanced and Basic modes, see the Cisco APIC Getting Started Guide.

Note If you want to choose a delimiter for the VMware PortGroup name when you create a vCenter domain,
you cannot do so in this procedure, which uses the configuration wizard. Instead, you must create the
vCenter domain separately; the delimiter option appears in the Create vCenter Domain dialog box. See
the procedure "Creating a VMware vCenter Domain Profile" in the Cisco Application Virtual Switch
Installation Guide.

Before You Begin


Before you create a vCenter domain profile, you must establish connectivity to external network using in-band
management network on the Cisco APIC.

Procedure

Step 1 Log into the Cisco APIC, choosing Advanced mode.


Step 2 On the menu bar, click Fabric > Access Policies.
Step 3 In the Policies Navigation pane, right-click Switch Policies, and then click Configure Interfaces, PC, and
VPC.
Step 4 In the Configure Interfaces, PC, and VPC dialog box, expand Configured Switch Interfaces, click the
green + icon, and then perform the following steps:
a) In the Select Switches to Configure Interfaces area, make sure that the Quick radio button is selected.
b) From the Switches drop-down list, choose the appropriate leaf ID.
In the Switch Profile Name field, the switch profile name automatically appears.
c) Click the green + icon again.

Cisco ACI Virtualization Guide, Release 2.2(2)


93
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

The Configure Interfaces, PC, and VPC dialog box displays a wizard that enables you to configure
interface, switch, and vCenter domain profiles.

Step 5 In the wizard, perform the following actions:


a) In the Interface Type area, choose the appropriate radio button.
PC or VPC are the only valid options for Cisco AVS deployment. See the section Interface and Switch
Profile Guidelines and Prerequisites in this guide.
b) In the Interfaces field, enter the interface or interface range for your vSphere hosts.
Once you enter the interface or interface range, the wizard enters a name in the Interface Selector Name
field.
c) In the Interface Policy Group area, choose the Create One radio button.
Note This procedure assumes that you are creating interface and switch policies and creating a vCenter
domain from scratch. If you choose the Choose One radio button, you will not be able to do so
in the wizard.
d) From the CDP Policy or the LLDP Policy drop-down list, create a policy.
Note If you use a Cisco Unified Computing System (UCS) server, create a policy to enable a Cisco
Discovery Protocol (CDP) policy and a policy to disable Link Layer Discovery Protocol (LLDP).
Note Beginning with Cisco AVS Release 5.2(1)SV3(1.15), CDP and LLDP policies are disabled by
default. You must enable them in the configuration wizard. Enable CDP or LLDP policies in the
Interface Policy Group area to enable them on Cisco AVS and other switches in the fabric. If
you want to enable CDP or LLDP only on Cisco AVS, enable them in the vSwitch Policy area
of the configuration wizard.
e) From the Link Level Policy drop-down list, choose the desired link level policy or create one.
The link level policy specifies the speed of the physical interface. If you do not choose a link level policy,
the speed will default to 10 Gbps.
f) In the Port Channel Policy drop-down list, choose Create Port Channel Policy.
You need to choose the same policy that is on the ESXi server. For example, if the server does not support
LACP, you can choose Static Channel - Mode On or MAC Pinning.
g) In the Attached Device Type area, choose AVS VLAN Hosts or AVS VXLAN Hosts.
Note If the hypervisors are directly connected to leaf switches, you can use either VLAN or VXLAN.
(Cisco UCS blade servers, where Fabric Interconnects are connected to the fabric, are considered
to be directly connected.) However, if the hypervisors are not directly connected to leaf switches,
you must use VXLAN. For more information, see the Cisco AVS Overview section.
h) In the Domain area, make sure that the Create One radio button is chosen.
The Create One option is used when creating a new VMM domain for an interface or switch profile, as
you do in this procedure. The Choose One button is used when creating an interface or switch profile for
a new host that you want to make part of an existing VMM domain.
i) In the Domain Name field, enter the domain name.
Note When you create the VMM domain, you choose VLAN or VXLAN encapsulation, depending on
the attached device type you chose in Step 5g. However, beginning with Cisco AVS Release
5.2(1)SV3(2.5), you can configure a single VMM domain to use VLAN and VXLAN
encapsulation. After you finish installing the Cisco AVS, you can enable mixed encapsulation
mode. See the section "Mixed-Mode Encapsulation Configuration" in the Cisco Application
Virtual Switch Configuration Guide.
j) If you chose AVS VLAN Hosts in Step 5 g, in the VLAN Range field, enter the VLAN range as
appropriate.
Note Do not define a range that includes the reserved VLAN ID for infrastructure network because
that VLAN is for internal use.
k) If you chose AVS VXLAN Hosts in Step 5 g, in the Fabric Multicast Address field, enter an address,
such as 225.1.1.1.

Cisco ACI Virtualization Guide, Release 2.2(2)


94
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

l) If you chose AVS VXLAN Hosts in Step 5 g, in the Pool of Multicast Address Ranges field, create a
new multicast pool or choose an existing one.
Note The multicast address configured in Step 5 l must not overlap with the ranges configured in Step
5 m.
m) If you chose AVS VXLAN Hosts in Step 5 g, in the Local Switching area, choose True or False.
With local switching, traffic within an endpoint group (EPG) does not go to the leaf, so if you choose local
switching, you might not see some traffic counters. If you want to see all intra-EPG traffic, you should
choose False. See the section Cisco AVS Overview for additional information about Local Switching and
No Local Switching modes.
n) (Optional) From the Security Domains drop-down list, choose or create a security domain.
o) In the vCenter Login Name field, enter the vCenter Administrator/root username.
p) In the Password field, enter the vCenter Administrator/root password.
q) In the Confirm Password field, reenter the password.
Step 6 Click the + icon to expand vCenter, and in the Create vCenter/vShield Controller dialog box, perform the
following actions:
a) In the Name field, enter a name to refer to the vCenter domain.
The name does not need to be the same as the vCenter domain name; you can use the vCenter host name.
b) In the Host Name (or IP Address) field, enter the host name or IP address.
If you use the host name, you must already have configured a DNS policy on Cisco APIC. If you do not
have a DNS policy configured, enter the IP address of the vCenter server.
c) From the DVS Version drop-down list, choose a DVS version.
The DVS version that you choose represents the minimum ESXi version of the host that can be added to
the virtual switch. So if you choose DVS version 5.1, you can add or manage hosts of ESXI version 5.1
and later.
d) In the Datacenter field, enter the data center name.
Note The name that you enter for Datacenter must match exactly the name in vCenter. The name is
case sensitive.
e) Click OK.
Note For the following three steps, if you do not specify port channel, vSwitch, or interface control
policies, the same interface policy that you configured earlier in this procedure will take effect
for the vSwitch.
f) From the Port Channel Mode drop-down list, choose a mode.
Choose MAC Pinning if you have a Unified Computing System (UCS) Fabric Interconnect (FI) between
the top-of-rack switch and the Cisco AVS.
g) In the vSwitch Policy area, choose a policy.
h) In the Interface Controls area, choose BPDU Guard, BPDU Filter, or both.
i) From the Firewall drop-down list, choose Learning, Enabled or Disabled mode.
Learning mode, the default, should be used only when upgrading from a version of Cisco AVS that does
not support Distributed Firewall to a version that does. Otherwise, Distributed Firewall should be in
Enabled mode.You can change the Distributed Firewall mode later. See the section Creating a Distributed
Firewall Policy or Changing its Mode Using the Advanced GUI in this guide for instructions.
Step 7 In the Configure Interface, PC, And VPC dialog box, click SAVE, click SAVE again, and then click
SUBMIT.
Step 8 Verify the new domain and profiles, by performing the following actions:
a) On the menu bar, choose VM Networking > Inventory.
b) In the navigation pane, expand VMware > Domain_name > Controllers, and then choose the vCenter.

Cisco ACI Virtualization Guide, Release 2.2(2)


95
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

In the work pane, under Properties, view the virtual machine manager (VMM) domain name to verify that
the controller is online. In the work pane, the vCenter properties are displayed including the operational status.
The displayed information confirms that connection from the APIC controller to the vCenter server is
established, and the inventory is available.

Creating a vCenter Domain Using the Basic GUI


Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.
For information about using Advanced and Basic modes, see the Cisco APIC Getting Started Guide.

Procedure

Step 1 Log in to the Cisco APIC, choosing Basic mode.


Step 2 Go to VM Networking > Inventory > VMware.
Step 3 Right-click VMware and choose Create vCenter Domain.
Step 4 In Create vCenter Domain dialog box, in the Virtual Switch Name field, enter a name.
Step 5 In the Virtual Switch field, choose Cisco AVS.
Step 6 In the Switching Mode field, choose, VLAN, VXLAN, or VXLAN-NS.
VXLAN-NS is VXLAN with no local switching.
Note When you create the VMM domain, you choose VLAN or VXLAN encapsulation, depending on the
attached device type you chose in Step 6. However, beginning with Cisco AVS Release 5.2(1)SV3(2.5),
you can configure a single VMM domain to use VLAN and VXLAN encapsulation. After you finish
installing the Cisco AVS, you can enable mixed encapsulation mode. See the section "Mixed-Mode
Encapsulation Configuration" in the Cisco Application Virtual Switch Configuration Guide.
Step 7 Complete one of the following actions:
If you chose... Then...
VLAN in Step 6 In the VLAN Pool drop-down list, choose a VLAN pool.

VXLAN or VXLAN-NS in Step 6


1 In the AVS Fabric-Wide Multicast Address field, type an
address.
2 From the Pool of Multicast Addresses (one per EPG), choose
an option.

Step 8 In the vCenter field, click the + icon.


Step 9 In the Create vCenter Controller dialog box, in the Host Name (or IP Address) field, identify one or more
vCenters.
Step 10 From the DVS Version drop-down list, choose a DVS version.

Cisco ACI Virtualization Guide, Release 2.2(2)


96
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

The DVS version that you choose represents the minimum ESXi version of the host that can be added to the
virtual switch. So if you choose DVS version 5.1, you can add or manage hosts of ESXI version 5.1 and later.

Step 11 In the Datacenter field, type the vCenter name.


Step 12 In the vCenter Credential Name field, type the vCenter credential name.
Step 13 In the Username field, type the username for logging in to the vCenter.
Step 14 In the Password field, type the password for logging in to the vCenter.
Step 15 In the Confirm Password field, retype the password.
Step 16 Click OK.
Step 17 In the Create vCenter Domain dialog box, in the vSwitch Policy area, check the appropriate check boxes.
In the vSwitch Policy area, check the MAC Pinning check box if you have a Unified Computing System
(UCS) Fabric Interconnect (FI) between the top-of-rack switch and the Cisco AVS.

Step 18 From the Firewall drop-down list, choose Learning, Enabled or Disabled mode.
Learning mode is used only when upgrading from a version of Cisco AVS that does not support Distributed
Firewall to a version that does. Otherwise, Distributed Firewall should be in Enabled mode.You can change
the Distributed Firewall mode later. See the section Creating a Distributed Firewall Policy or Changing its
Mode Using the Advanced GUI in this guide for instructions.

Step 19 Click SUBMIT.


The new vCenter domain appears in the central Properties pane. You now need to specify which ports are
connected to the new domain.
Step 20 Choose Fabric > Inventory, and in the Inventory navigation pane, click the Pod folder.
Step 21 In the work pane, click Topology.
Step 22 in your topology, right-click your leaf and choose Configure.
Step 23 In the top section of the work pane, choose the ports on the leaf that vCenter domain is connected to.
Step 24 In the bottom section of the work pane, click CONFIGURE INTERFACE.
Step 25 In the Interface tab, in the Speed field, choose a speed.
The default value is inherit.

Step 26 (Optional) In the L2 Protocols tab, select a protocol.


Step 27 In the VLAN tab, from the VLAN Domain drop-down list, choose a VLAN domain.
Step 28 In the ESX And SCVMM area, click the + icon, and in the Name drop-down list, choose the vCenter domain
that you created earlier in the procedure.
Step 29 Click APPLY CHANGES.
Step 30 In the Success dialog box, click OK.

Configuring vSwitch Override Policies on the VMM Domain Using the Advanced GUI
Before installing Cisco AVS, you can use the configuration wizard to create a VMware vCenter profile and
create interface policy group policies for Cisco AVS. You also can create vSwitch policies that override the
interface policy group policies and apply a different policy for the leaf.
However, if you did not use the configuration wizardor if you used the configuration wizard but did not
configure a vSwitch override policyyou can configure a vSwitch override policy by following the procedure
in this section.

Cisco ACI Virtualization Guide, Release 2.2(2)


97
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

Note In Cisco AVS 5.2(1)SV3(1.10), you cannot create a Distributed Firewall policy on the vSwitch using the
configuration wizard. See the section Configuring Distributed Firewall in this guide for instructions for
configuring a Distributed Firewall policy and associating it to the VMM domain.

Note Previously, you could configure a vSwitch override policy through the Fabric tab as well as the VM
Networking tab. Override policies configured through the VM Networking took precedence. However,
any override policy configured through the Fabric tab stands until it is reconfigured through the VM
Networking tab.

Before You Begin


We recommend that you already have created access policies and an attachable access entity profile for Cisco
AVS.

Procedure

Step 1 Log in to the Cisco APIC, choosing Advanced mode.


Step 2 Go to VM Networking > Inventory > VMware.
Step 3 In the navigation pane, choose the relevant VMM domain.
Step 4 In the VMM domain work pane, scroll to the VSwitch Policies area, and from the appropriate vSwitch policy
drop-down list, choose the policy that you want to apply as an override policy.
Step 5 Click SUBMIT.

What to Do Next
Verify that the policies are in effect on Cisco AVS.

Pre-Cisco AVS Installation Configuration Using the NX-OS Style CLI


You can perform some pre-Cisco AVS installation configuration tasks using the NX-OS style CLI.

Creating a VLAN Domain Using the NX-OS Style CLI

Procedure

Create a VLAN domain.

Example:
Configuring a VLAN domain with static allocation:
apic1# configure
apic1(config)# vlan-domain cli-vdom1
apic1(config-vlan)# vlan 101-200

apic1(config-vlan)# show running-config


# Command: show running-config vlan-domain cli-vdom1

Cisco ACI Virtualization Guide, Release 2.2(2)


98
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

# Time: Thu Oct 1 10:12:21 2015


vlan-domain cli-vdom1
vlan 101-200
exit

Example:
Configuring a VLAN domain with dynamic allocation:
apic1# configure
apic1(config)# vlan-domain cli-vdom1 dynamic
apic1(config-vlan)# vlan 101-200 dynamic

apic1(config-vlan)# show running-config


# Command: show running-config vlan-domain cli-vdom1 dynamic
# Time: Thu Oct 1 10:12:21 2015
vlan-domain cli-vdom1 dynamic
vlan 101-200 dynamic
exit

Configuring a Port Channel Using the NX-OS Style CLI

Procedure

Create a port channel.

Example:
apic1# config
apic1(config)# template port-channel cli-pc1
apic1(config-if)# channel-mode active
apic1(config-if)# vlan-domain member cli-vdom1

apic1(config-if)# show running-config


# Command: show running-config interface port-channel cli-pc1
# Time: Thu Oct 1 10:38:30 2015
interface port-channel cli-pc1
vlan-domain member cli-vdom1
channel-mode active
exit

Configuring a VPC Using the NX-OS Style CLI


Configuring a Virtual Port Channel (VPC) using the NX-OS style CLI consists of two tasks: configuring a
VPC domain and then configuring the VPC on the switch interfaces.

Configuring a VPC Domain Using the NX-OS Style CLI

Procedure

Configure a VPC domain.

Example:
apic1# config
apic1(config)# vpc domain explicit 10 leaf 101 102

apic1(config-vpc)# show running-config


# Command: show running-config vpc domain explicit 10 leaf 101 102
# Time: Thu Oct 1 10:39:26 2015

Cisco ACI Virtualization Guide, Release 2.2(2)


99
Cisco ACI with Cisco AVS
Creating Interface, Switch, and vCenter Domain Profiles

vpc domain explicit 10 leaf 101 102


exit

Configuring a VPC on Switch Interfaces Using NX-OS Style CLI

Procedure

Configuring a VPC on switch interfaces

Example:
apic1# config
apic1(config)# leaf 101 102
apic1(config-leaf)# interface ethernet 1/3
apic1(config-leaf-if)# channel-group cli-pc1 vpc

apic1(config-leaf-if)# show running-config


# Command: show running-config leaf 101 - 102 interface ethernet 1/3
# Time: Thu Oct 1 10:41:15 2015
leaf 101
interface ethernet 1/3
channel-group cli-pc1 vpc
exit
exit
leaf 102
interface ethernet 1/3
channel-group cli-pc1 vpc
exit
exit

Creating a VMM Domain with Local Switching or No Local Switching Using the NX-OS Style CLI

Procedure

Create a VMM domain with local switching or no local switching.

Example:
apic1(config)# vmware-domain cli-vmm1 delimiter=@
apic1(config-vmware)# vlan-domain member cli-vdom1
apic1(config-vmware)# vcenter 10.193.218.223 datacenter dc1 dvs-version 5.1
apic1(config-vmware-vc)# username root
Password:
Retype password:
apic1(config-vmware-vc)#
apic1(config-vmware)# configure-avs
apic1(config-vmware-avs)# switching mode vlan
<or>
apic1(config-vmware-avs)# switching mode vxlan-ns
apic1(config-vmware-avs)# multicast-address 226.0.0.1
apic1(config-vmware-avs)# vxlan multicast-pool 226.0.0.11-226.0.0.20

apic1(config-vmware-vc)# show running-config


# Command: show running-config vmware-domain cli-vmm1 vcenter 10.193.218.223 datacenter dc1
dvs-version 5.1
# Time: Thu Oct 1 10:51:45 2015
vmware-domain cli-vmm1 delimiter=@
vcenter 10.193.218.223 datacenter dc1 dvs-version 5.1
username root
exit
exit

apic1(config-vmware-avs)# show running-config


# Command: show running-config vmware-domain cli-vmm1 configure-avs

Cisco ACI Virtualization Guide, Release 2.2(2)


100
Cisco ACI with Cisco AVS
Prerequisites for Installing Cisco AVS

# Time: Thu Oct 1 10:53:28 2015


vmware-domain cli-vmm1 delimiter=@
configure-avs
switching mode vlan | vxlan | vxlan-ns
exit
exit
In the initial string vmware-domain cli-vmm1 delimiter=@, delimiter=@ is optional. If you do not enter a
delimiter, the system will use the default | delimiter.
For switching mode, mode might be vxlan or vxlan-ns. The string vxlan-ns is VXLAN encapsulation
with no local switching.
Note Beginning in Cisco AVS Release 5.2(1)SV3(2.5), you can configure a single VMM domain to use
VLAN and VXLAN encapsulation. You can do so after creating the VMM domain in this procedure
by following the procedure "Checking or Changing the VMM Domain Encapsulation Mode" in the
Cisco Application Virtual Switch Configuration Guide.

Prerequisites for Installing Cisco AVS


Installing Cisco AVS has the following prerequisites:
You must set up the Cisco APIC before you can set up the Cisco AVS. See the Cisco APIC Getting
Started Guide for instructions on how to configure the Cisco APIC for the first time.
You must make sure that all switches are registered and that the Cisco ACI fabric is up to date. See
Cisco Application Centric Infrastructure Fundamentals and the Cisco APIC Getting Started Guide.
The Cisco AVS configuration in the Cisco APIC must be completed manually. See the section Creating
Interface, Switch, and vCenter Domain Profiles in this guide or the Cisco Application Virtual Switch
Installation Guide for detailed information about configuring the Cisco APIC before Cisco AVS
installation.

If you want to use Cisco VSUM to install the Cisco AVS, you first must install Cisco VSUM. See the
section Installing Cisco VSUM, on page 104 in this guide.
If you want to use Cisco VSUM to install the Cisco AVS, you must have downloaded the appropriate
Cisco AVS image file from Cisco.com and uploaded it to the Cisco VSUM repository. See the sections
About the Virtual Switch Image File Upload Utility, on page 112 and Uploading the Cisco AVS Image
File, on page 112 in this guide.
You have created a tenant configuration that contains the required bridge domain, application profile,
endpoint groups, and contracts. See the Cisco APIC Getting Started Guide for more information.
The host has one or more unclaimed physical NICs.
You have administrative privileges for the vCenter Server.
When connecting the Cisco AVS using VXLAN encapsulation, set the maximum transmission unit
(MTU) value equal to or greater than 1600 on all intermediate devices on the path between the Cisco
ACI fabric and the Cisco AVS. These include FI switches and UCS-B. However, to optimize performance,
the MTU should be set to the maximum supported size that all intermediate devices on the path between
the Cisco ACI fabric and the Cisco AVS support.
When adding additional VMware ESXi hosts to the VMM domain for the Cisco AVS, ensure that the
version of the ESXi host is compatible with the Distributed Virtual Switch (DVS) version already
deployed in the vCenter. For more information about Cisco AVS compatibility for ESXi hosts, see the
Cisco AVS Release Notes for your Cisco AVS release.

Cisco ACI Virtualization Guide, Release 2.2(2)


101
Cisco ACI with Cisco AVS
Installing Cisco AVS Using the VMware vCenter Plug-in

If the ESXi host version is not compatible with the existing DVS version, vCenter will not be able to
add the ESXi host to the DVS, and an incompatibility error will occur. Modification of the existing DVS
Version setting from the Cisco APIC is not possible. To lower the DVS Version in the vCenter, you
need to remove and reapply the VMM domain configuration with a lower setting.

Important If you have ESXi 6.5 hosts running UCS B-Series or C-Series server with VIC cards, some of the vmnics
may go down on a port state event, such as a link flap or a TOR reload. To prevent this problem, do not
use the default eNIC driver but install it from the Web site: https://cspg-releng.cisco.com/vic/blade/3.1.3/
Drivers/VMware/Network/Cisco/VIC/ESXi_6.5/.

Installing Cisco AVS Using the VMware vCenter Plug-in


You can install Cisco AVS using the Cisco AVS plug-in in VMware vCenter, avoiding the need to install the
switch software with Cisco VSUM, VUM, or the CLI.
You should use the vCenter plug-in to install Cisco AVS if you are already using it to perform other tasks or
if you plan to do so. We do not recommend using the vCenter plug-in to install Cisco AVS unless you plan
to use it for other tasks. For information about the vCenter plug-in, see the chapter Cisco ACI vCenter Plug-in,
on page 277 in this guide.
This procedure does the following:
1 Places the host into maintenance mode.
If the host cannot be put into maintenance mode, the installation will not start.
2 Uploads the appropriate VIB file to the host data store.
The plug-in chooses the appropriate VIB file for east host, based on the version of ESXi host and version
of Cisco AVS that you choose.
3 Installs Cisco AVS software.
4 Deletes the VIB file from the host data store.
5 Takes the host out of maintenance mode.

Before You Begin


You must have downloaded the .zip folder with the VIB file from Cisco.com to your local computer.
You must have made sure that it is compatible with the version of Cisco APIC; check the Cisco AVS
Release Notes on Cisco.com for compatibility.
You must have already created a VMM domain on Cisco APIC.
You must have already registered the ACI fabric inside the vCenter plug-in.
For instructions, see Connecting vCenter Plug-in to your ACI Fabric , on page 280 in this guide.
You also must have fulfilled the other prerequisites for installing Cisco AVS documented earlier in this
guide.

Cisco ACI Virtualization Guide, Release 2.2(2)


102
Cisco ACI with Cisco AVS
Installing Cisco AVS Using the VMware vCenter Plug-in

Note You cannot use the vCenter plug-in to migrate hosts.

Procedure

Step 1 Log in to VMware vSphere Web Client.


Step 2 ChooseCisco ACI Fabric > Cisco AVS.
Step 3 At the top of the central work pane, from the Select an ACI domain drop-down list, choose a domain.
When you choose a domain, the work pane displays the host or hosts in the vCenter related to the VMM
domain. The central pane displays the following columns:
NameName of the host
ESX VersionThe ESX or ESXi version on the host
Added to DomainWhether the host is connected to the Cisco AVS associated with the selected domain
OpFlex StateWhether the OpFlex agent on the host is online
AVS VersionThe version of Cisco AVS, if any, installed on the host

Step 4 Choose a one or more hosts by clicking the appropriate check box or check boxes.
Step 5 In the Actions area of the work pane, perform one of the following actions from the AVS version drop-down
list:
Choose the version of Cisco AVS to be installed on the selected hosts; you see versions in the drop-down
list if you previously uploaded a Cisco AVS version to vCenter.
Choose Upload a new AVS version to open a dialog box enabling you to upload a new Cisco AVS
package from the VIB file on your local computer to vCenter.

Step 6 In the Concurrent Tasks drop-down, if you chose multiple hosts in Step 4, choose how many hosts on which
to install Cisco AVS at the same time.
You can choose up to 10 hosts on which to install Cisco AVS at the same time. If you choose multiple hosts
but do not choose a number from the Concurrent Tasks drop-down list, the default value of 2 will apply.

Step 7 Choose Install/Upgrade AVS.


Step 8 In the Install AVS dialog box, click Yes to put the hosts into maintenance mode.
In the central work pane, the AVS version for the host displays installation progress. You also can view
progress of the individual installation tasks in the Recent Tasks area.

What to Do Next
Verify the Cisco AVS installation. See Verifying the Cisco AVS Installation in this guide for instructions.

Note The procedure installs the VIB on the host; however, the host still needs to be manually connected to the
switch.

Cisco ACI Virtualization Guide, Release 2.2(2)


103
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Installing the Cisco AVS Using Cisco VSUM


Once you have finished configuring the Cisco AVS in the Cisco APIC, you complete the installation of the
Cisco AVS in the Cisco VSUM. You do so by installing the Cisco AVS and adding the ESXi host to the Cisco
AVS.

Installing Cisco VSUM


You can install the Cisco VSUM OVA using the following steps.

Before You Begin


Ensure that the Cisco VSUM OVA image is available in the file system.
Ensure that you have the IP address, subnet mask, gateway IP address, domain name, DNS server, and
vCenter IP address and credentials for deploying the OVA.

Note When you install Cisco VSUM, you must use the same credentials that you use to install
the thick client.

Procedure

Step 1 Log in to the VMware vSphere Web Client.

Step 2 Choose Hosts and Clusters.

Cisco ACI Virtualization Guide, Release 2.2(2)


104
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Step 3 Choose the host on which to deploy the Cisco VSUM OVA.

Step 4 From the Actions menu, choose Deploy OVF Template.

Cisco ACI Virtualization Guide, Release 2.2(2)


105
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Step 5 In the Deploy OVF Template wizard, complete the information as described in the following table.
Pane Action
1a Select source Choose the Cisco VSUM OVA.

Cisco ACI Virtualization Guide, Release 2.2(2)


106
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Pane Action
1b Review details Review the details.

1c Accept License Review the agreement and click Accept.


Agreements

Cisco ACI Virtualization Guide, Release 2.2(2)


107
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Pane Action
2a Select name and Enter a name and choose a location for the appliance.
folder

2b Select a resource Choose the host or cluster to run the OVA template.

Cisco ACI Virtualization Guide, Release 2.2(2)


108
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Pane Action
2c Select storage Choose the data store for the VM.
Choose either Thin provisioned format or Thick provisioned format to store the
VM virtual disks.
We recommend that you store the VM virtual disks in the Thick provisioned
format.

2d Setup networks Choose the destination network for the VM that is reachable from the vCenter
Server.

Cisco ACI Virtualization Guide, Release 2.2(2)


109
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Pane Action
2e Customize template Provide the following information:
Management IP address
Subnet mask
Gateway IP address
DNS server IP address
DNS entry to resolve the fully qualified domain name (FQDN)
vCenter IP or FQDN
vCenter username
vCenter password
HTTP cleartext port and HTTPS port

Cisco ACI Virtualization Guide, Release 2.2(2)


110
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Pane Action
3 Ready to complete Review the deployment settings.
Caution Any discrepancies can cause VM booting issues. Carefully review the
IP address, subnet mask, gateway information, and vCenter credentials.

Step 6 Click Finish.


Step 7 After Cisco VSUM deploys successfully, click Close.
Step 8 Power on the Cisco VSUM VM.
It might take 5 minutes for Cisco VSUM to be installed and registered as a vSphere Web Client plug-in.

Cisco ACI Virtualization Guide, Release 2.2(2)


111
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

If the Web Client session was open during the installation, you must log out and log in again to view the Cisco
VSUM plug-in.

About the Virtual Switch Image File Upload Utility


The Virtual Switch Image File Upload utility is a GUI that enables you to dynamically upload the Cisco AVS
image files before you install Cisco AVS. You must download the Cisco AVS image files from Cisco.com
on your local system before you upload them to the Cisco VSUM repository.

Uploading the Cisco AVS Image File


Before you install Cisco AVS using Cisco VSUM, you must upload the corresponding Cisco AVS image file
to Cisco VSUM.

Before You Begin


Download the Cisco AVS .zip image folder from https://software.cisco.com/download.

Attention You must download the Cisco AVS .zip image folder before starting the upload operation.

Procedure

Step 1 Log in to the VMware vSphere Web Client.


Step 2 Choose Home > Cisco Virtual Switch Update Manager.

Cisco ACI Virtualization Guide, Release 2.2(2)


112
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Step 3 In the Cisco Virtual Switch Update Manager pane, choose AVS > Upload.

Step 4 In the Upload Switch Image pane, click Upload.

Cisco ACI Virtualization Guide, Release 2.2(2)


113
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Step 5 In the Virtual Switch Image File Uploader window, click Browse, choose the appropriate image folder
available on your local machine, and then click Upload.

The upload might take a few minutes.

Step 6 In the dialog box telling you that the .zip image folder was successfully uploaded, click OK.

Cisco ACI Virtualization Guide, Release 2.2(2)


114
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Step 7 You can confirm the upload in the Manage Uploaded switch Images pane.

What to Do Next
Install Cisco AVS as described in the remaining procedures in this chapter.

Installing Cisco AVS Using VSUM


The following procedureusing the feature labeled Add Host-AVS in Cisco VSUMputs the hosts into
maintenance mode, installs the Cisco AVS, and adds an ESXi host or multiple hosts to the Cisco AVS.

Before You Begin


You must obtain the following information for the Cisco AVS:
vCenter IP address
vCenter user ID
vCenter password

Cisco ACI Virtualization Guide, Release 2.2(2)


115
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Procedure

Step 1 Log in to the VMware vSphere Web Client.


Step 2 Choose Home > Cisco Virtual Switch Update Manager.

Step 3 In the Cisco Virtual Switch Update Manager pane, choose AVS > Configure, choose a data center, choose
the Cisco AVS, and then click Manage.
You choose the Cisco AVS from the Choose an associated Distributed Virtual Switch area.

Cisco ACI Virtualization Guide, Release 2.2(2)


116
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

Step 4 In the switch pane, choose Cisco AVS > Add Host-AVS.

Step 5 In the Add Host-AVS tab, complete the following actions:


a) From the Target Version drop-down list, choose the target VIB version to be installed on the host.

b) Click Show Host.

Cisco ACI Virtualization Guide, Release 2.2(2)


117
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

The hosts are represented in the following categories:


ClusterHosts that are part of clusters.
StandaloneHosts that are not part of clusters. You can add hosts that are in a standalone mode.

c) Expand Cluster or Standalone, depending on your setup.


Hosts are further organized within the Cluster and Standalone categories:
SupportedHosts that are supported by the Cisco AVS. You can add these hosts.
UnsupportedHosts that are not supported by the Cisco AVS.
UnreachableHosts that are in a not responding state or are in a disconnected state.
Already in DVSHosts that are already associated with the DVS. You cannot add a host that is
already associated with a DVS.
No free PNICHosts that do not have a free PNIC. You cannot add a host that does not have a free
PNIC.

d) Choose one or more available hosts and then click Suggest.

Cisco ACI Virtualization Guide, Release 2.2(2)


118
Cisco ACI with Cisco AVS
Installing the Cisco AVS Using Cisco VSUM

The PNIC Selection area displays the available uplinks for each host.
e) In the PNIC Selection area, choose the PNIC or PNICs to be added to the Cisco AVS.

f) Click Finish to add the host or hosts to the Cisco AVS.


Step 6 Check the status of adding the host by completing the following steps:
a) Choose the host in the left navigation pane.
b) Click the Monitor tab and then click Tasks.

Cisco ACI Virtualization Guide, Release 2.2(2)


119
Cisco ACI with Cisco AVS
Installing the Cisco AVS Software Using the ESXi CLI

The task console appears in the work pane, displaying a list of tasks with the most recent task at the top.
c) Find the task in the Task Name column and then view the status in the Status column.
The Status column shows whether the task is complete or in progress.
Note Several tasks might appear above the primary task you just performed. They might be associated
with your primary task.
The host addition is confirmed when the primary task Add hosts to Cisco DVS has the
status Completed.
If you close the browser and later want to view the task's history, log in to the VMware vSphere Web Client,
and click Tasks in the navigation pane to display the lists of tasks in the work pane.

What to Do Next
Verify the Cisco AVS installation. See Verifying the Cisco AVS Installation in this guide for instructions.

Installing the Cisco AVS Software Using the ESXi CLI


You can install the Cisco AVS on the ESXi hypervisor with the CLI using a vSphere Installation Bundle
(VIB).

Procedure

Step 1 Open an ESXi CLI session to the ESXi hypervisor.


Step 2 Download the Cisco AVS VIB file from Cisco.com or the VMware portal.
Step 3 copy scp://filepath/file-name root@host:/tmp
Copy the Cisco AVS VIB to the ESXi hypervisor.

Cisco ACI Virtualization Guide, Release 2.2(2)


120
Cisco ACI with Cisco AVS
Verifying the Cisco AVS Installation

Example:
esxhost# copy scp://username@server/path/cisco-vem-v165-esx.vib root@host:/tmp
Step 4 esxcli software vib list | grep cisco
Locate the VIB on the ESXi hypervisor.
Note If there is an existing VIB file on the host, remove it by using the esxcli software remove command.

Example:
esxhost# esxcli software vib list | grep cisco
cisco-vem-v164-esx 5.2.1.2.2.0.88-3.1.74 Cisco PartnerSupported
2014-03-31
Step 5 esxcli software vib install -v absolute path to the image
Install the VIB on the ESXi hypervisor.

Example:
esxhost# esxcli software vib install -v /tmp/cross_cisco-vem-v165-4.2.1.2.2.2.473-3.1.165.vib
Installation Result
Message: Operation finished successfully.
Reboot Required: false
VIBs Installed: cisco-vem-v164-esx_5.2.1.2.2.0.88-3.1.74
VIBs Removed:
VIBs Skipped:
esxhost#
Note At this point, you might see the following error message:
[InstallationError]
Error in running rm /tardisks/cisco_ve.v00:
Return code: 1
Output: rm: can't remove '/tardisks/cisco_ve.v00': Device or
resource busy
It is not safe to continue. Please reboot the host immediately to
discard the unfinished update.
Please refer to the log file for more details.
This message occurs if the host was already added to the Cisco AVS in the vCenter. The solution is
to log in to VMware vSphere Web Client and in the vCenter remove the vmk1 under the distributed
switch.
Step 6 vemcmd show version
Displays the VIB version.

Example:
esxhost# vemcmd show version
Running esx version -799733 x86_64
VEM Version: 5.2.1.2.2.0.88-3.1.74
VSM Version:
System Version: VMware ESXi 5.1.0 Releasebuild-799733
esxhost#

Verifying the Cisco AVS Installation


The following sections describe how to verify that the Cisco Application Virtual Switch (AVS) has been
installed on the VMware ESXi hypervisor.

Cisco ACI Virtualization Guide, Release 2.2(2)


121
Cisco ACI with Cisco AVS
Verifying the Cisco AVS Installation

Verifying the Virtual Switch Status

Procedure

Step 1 Log in to the VMware vSphere Client.


Step 2 Choose Networking.
Step 3 Open the folder for the data center and click the virtual switch.
Step 4 Click the Hosts tab.

The VDS Status and Status fields display the virtual switch status. The VDS status should be Up to indicate
that OpFlex communication has been established.

Cisco ACI Virtualization Guide, Release 2.2(2)


122
Cisco ACI with Cisco AVS
Adding Cisco AVS Hosts to the DVS

Verifying the vNIC Status

Procedure

Step 1 In VMware vSphere Client, click the Home tab.


Step 2 Choose Hosts and Clusters.
Step 3 Click the host.
Step 4 Click the Configuration tab.
Step 5 In the Hardware panel, choose Networking.
Step 6 In the View field, click the vSphere Distributed Switch button.
Step 7 Click Manage Virtual Adapters. The vmk1 displays as a virtual adapter and lists an IP address.
Step 8 Click the newly created vmk interface to display the vmknic status.
Note Allow approximately 20 seconds for the vmk to receive an IP address through DHCP.

Adding Cisco AVS Hosts to the DVS


You can add only one host at a time. You need to perform this procedure once for every host that you want
to add.

Note If you installed the Cisco AVS by using the Cisco VSUM, you do not need to perform this procedure;
VSUM adds hosts to the DVS at the same time that it installs the Cisco AVS. However, you do need to
perform this procedure if you upgraded Cisco AVS by using the CLI or the VMware VUM.

Before You Begin


Before you add vLeafs to the DVS, ensure that you have created a tenant configuration that contains the
required bridge domain, application profiles, endpoint groups, and contracts. For more information, see the
Cisco APIC Getting Started Guide.

Cisco ACI Virtualization Guide, Release 2.2(2)


123
Cisco ACI with Cisco AVS
Uninstalling Cisco AVS

Procedure

Step 1 In vSphere Web Client, choose Home >Inventories > Networking.


Step 2 In the left navigation pane, choose AVS Distributed Switch, and then click the Hosts tab.
Step 3 Right-click anywhere within the work pane and choose Add Host to vSphere Distributed Switch.
Step 4 In the Add Host to vSphere Distributed Switch dialog box, choose the virtual NIC ports that are connected
to the leaf switch (vmnic2, vmnic3).
Step 5 Click Next.
Step 6 In the Network Connectivity dialog box, click Next.
Step 7 In the Virtual Machine Networking dialog box, click Next.
Step 8 In the Ready to Complete dialog box, click Finish.
Step 9 Repeat Step 1 through Step 8 for each additional host.

Uninstalling Cisco AVS


You might need to remove Cisco AVS for testing or if you need to remove all configuration from the Cisco
ACI fabric, resetting the fabric to its initial state. Follow the high-level steps in this procedure to remove the
Cisco AVS.

Procedure

Step 1 Complete the following steps in the VMware vSphere Client:


a) Remove all VMs from EPG port groups.
b) Remove all Virtual Tunnel Endpoint (VTEP) VMware kernels (VMKs) from the Cisco AVS hosts.
c) Remove all hosts from the Cisco AVS.
See the VMware documentation for instructions.

Step 2 Complete the following steps in the Cisco APIC:


a) Remove all virtual machine management (VMM) domain associations to EPGs to delete port groups.
This step is optional if you are removing all configuration from the Cisco ACI fabric.
b) Remove the Cisco AVS VMM domain.

What to Do Next
If you are uninstalling the Cisco AVS but not removing all configuration from the Cisco ACI fabric, you can
remove the VIB software from each host where it was installed. You can do so by completing one of the
following tasks:
Enter the following vSphere CLI command to remove the VIB software from a host: esxcli software
vib remove -n installed_vem_version

Cisco ACI Virtualization Guide, Release 2.2(2)


124
Cisco ACI with Cisco AVS
Uninstalling Cisco AVS Using the VMware vCenter Plug-in

Complete the procedure in the section "Uninstalling Cisco AVS Using the VMware vCenter Plug-in"
in this guide.

Uninstalling Cisco AVS Using the VMware vCenter Plug-in


This procedure removes the Cisco AVS VIB file from the host.
You should use the vCenter plug-in to uninstall Cisco AVS if you are already using it to perform other tasks
or if you plan to do so. We do not recommend using the vCenter plug-in to uninstall Cisco AVS unless you
plan to use it for other tasks. For information about the vCenter plug-in, see the chapter "Cisco ACI vCenter
Plug-in" in the Cisco ACI Virtualization Guide on Cisco.com.

Before You Begin


You must perform the all steps in the procedure "Uninstalling Cisco AVS" except for the task in the
"What to do next" section.
You must disconnect Cisco AVS from the VMM domain.

Procedure

Step 1 Log in to VMware vSphere Web Client.


Step 2 ChooseCisco ACI Fabric > Cisco AVS.
Step 3 At the top of the central work pane, from the Select an ACI domain drop-down list, choose a domain.
When you choose a domain, the work pane displays the host or hosts in the vCenter related to the VMM
domain. The central pane displays the following columns:
NameName of the host
ESX VersionThe ESX or ESXi version on the host
Added to DomainWhether the host is connected to the Cisco AVS associated with the selected domain
OpFlex StateWhether the OpFlex agent on the host is online
AVS VersionThe version of Cisco AVS, if any, installed on the host

Step 4 Choose a one or more hosts by clicking the appropriate check box or check boxes.
Step 5 In the Concurrent Tasks drop-down, if you chose multiple hosts in Step 4, choose how many hosts on which
to uninstall Cisco AVS at the same time.
You can choose up to 10 hosts on which to uninstall Cisco AVS at the same time. If you choose multiple
hosts but do not choose a number from the Concurrent Tasks drop-down list, Cisco AVS will be uninstalled
on the hosts one after another.

Step 6 Click Uninstall AVS.


Step 7 In the Uninstall AVS dialog box, click Yes to put the hosts into maintenance mode.
In the central work pane, the AVS version for the host displays uninstallation progress. You also can view
progress of the individual uninstallation tasks in the Recent Tasks area. When the uninstallation is complete,
"Not installed" will appear for the host in the central work pane AVS Version column.

Cisco ACI Virtualization Guide, Release 2.2(2)


125
Cisco ACI with Cisco AVS
Key Post-Installation Configuration Tasks for the Cisco AVS

What to Do Next
Take the following optional steps to remove from vCenter the version of Cisco AVS you just uninstalled:
1 Click Remove uploaded versions.
2 In the Select the AVS versions you wish to remove from vCenter dialog box, click the appropriate
check box and then click OK.

Key Post-Installation Configuration Tasks for the Cisco AVS


After you install the Cisco Application Virtual Switch (AVS), you need to perform some configuration tasks
in the Cisco Application Policy Infrastructure Controller (APIC).

Prerequisites for Configuring the Cisco AVS


Before you configure the Cisco Application Virtual Switch (AVS), you need to perform the following tasks:
1 Install the Cisco AVS as described in the previous sections of this guide.
2 Understand the concepts presented in the ACI Fundamentals Guide and the APIC Getting Started Guide.

Workflow for Key Post-Installation Configuration Tasks for the Cisco AVS
This section provides a high-level description of the tasks that you need to perform in the correct sequence
in order to configure Cisco AVS.
1 Deploy an application profile.
a Create a tenant.
A tenant is a logical container for application policies that enable an administrator to exercise
domain-based access control. Tenants can represent a customer in a service provider setting, an
organization or domain in an enterprise setting, or just a convenient grouping of policies.
The fabric can contain multiple tenants. Tenants can be isolated from one another or can share resources.
The primary elements that the tenant contains are filters, contracts, outside networks, bridge domains,
contexts, and application profiles that contain endpoint groups (EPGs). Entities in the tenant inherit
its policies.
You must configure a tenant before you can deploy any Layer 4 to Layer 7 services.
See the section Creating a Tenant, VRF, and Bridge Domain Using the Advanced GUI in this guide
for instructions for creating tenants.
b Create an application profile.
An application profile models application requirements. An application profile is a convenient logical
container for grouping EPGs.
Modern applications contain multiple components. For example, an e-commerce application could
require a web server, a database server, data located in a storage area network, and access to outside
resources that enable financial transactions. The application profile contains as many (or as few) EPGs
as necessary that are logically related to providing the capabilities of an application.

Cisco ACI Virtualization Guide, Release 2.2(2)


126
Cisco ACI with Cisco AVS
Workflow for Key Post-Installation Configuration Tasks for the Cisco AVS

See the section Creating an Application Profile Using the GUI in this guide for instructions for creating
an application profile.
c Create an endpoint group (EPG)
Endpoints are devices that are connected to the network directly or indirectly. They have an address
(identity), a location, attributes (such as version or patch level), and can be physical or virtual. Endpoint
examples include servers, virtual machines, network-attached storage, or clients on the Internet.
An EPG is a named logical entity that contains a collection of endpoints that have common policy
requirements such as security, virtual machine mobility, QoS, or Layer 4 to Layer 7 services. EPGs
enable you to manage endpoints as a group rather than having to configure and manage them
individually; endpoints in an EPG have the same configuration and changes to EPG configuration are
propagated automatically to all the endpoints assigned to it. In vCenter Server, an EPG is represented
as a port group.
See the section Creating EPGs Using the GUI in this guide for instructions for creating EPGs.
d Assign port groups to virtual machines (VMs) in vCenter.
In vCenter Server, an EPG is represented as a port group. The virtual Ethernet (vEth) interfaces are
assigned in vCenter Server to an EPG in order to do the following:
Define the port configuration by the policy.
Apply a single policy across a large number of ports.

EPGs that are configured as uplinks can be assigned by the server administrator to physical ports (which
can be vmnics or PNICs). EPGs that are not configured as uplinks can be assigned to a VM virtual
port.
See the section Assigning Port Groups to the VM in vCenter in this guide for instructions.
e Create filters.
A filter is a managed object that helps enable mixing and matching among EPGs and contracts so as
to satisfy various applications or service delivery requirements. It specifies the data protocols to be
allowed or denied by a contractrules for communications between EPGsthat contains the filter.
See the section Creating a Filter Using the GUI in this guide for instructions.
f Create contracts.
Contracts are policies that enable communications between EPGs. An administrator uses a contract to
select the type(s) of traffic that can pass between EPGs, including the protocols and ports allowed. If
there is no contract, inter-EPG communication is disabled by default. No contract is required for
communication within an EPG; communication within an EPG is always implicitly allowed.
Contracts govern the communication between EPGs that are labeled providers, consumers, or both.
An EPG can both provide and consume the same contract. An EPG can also provide and consume
multiple contracts simultaneously.
See the section Creating a Contract Using the GUI in this guide for instructions.

2 Verify the application profile.


You need to perform the following tasks to verify that the application profile has been created.
a Verify the application profile on the Cisco APIC.
b Verify that the EPGs appear in the vCenter.

Cisco ACI Virtualization Guide, Release 2.2(2)


127
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the Advanced GUI

c Ensure that the VMs can communicate.

See the section Verifying the Application Profile and EPGs in the GUI in this guide for instructions.
3 Configure an IPv4 or IPv6 address
To configure an IP address for VMs connected to Cisco AVS, you assign an IPv4 or IPv6 addressor
both an IPV4 and IPv6 addressfor the VM and then assign a gateway address.
See the section Configuring an IP Address for VMs Connected to Cisco AVS in this guide for instructions.
4 Configure an IGMP querier under the infra BD subnet.
In order for Cisco AVS to forward multi-destination trafficespecially when traffic goes through a blade
switchyou should configure an IGMP querier under the infra BD subnet. This enables devices to build
their Layer 2 multicast tree.
See the section "Configuring IGMP Querier and Snooping" in the Cisco AVS Configuration Guide for
instructions.
5 (Optional but recommended) Enable Distributed Firewall.
After you install or upgrade to Cisco AVS Release 5.2(1)SV3(1.5), you need to enable Distributed Firewall
if you want to use the feature. Distributed Firewall is in Learning mode by default. Follow the instructions
in Creating a Distributed Firewall Policy or Changing its Mode Using the Advanced GUI in this guide to
enable Distributed Firewall.

Deploying an Application Profile for Cisco AVS Using the Advanced GUI
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.

Creating a Tenant, VRF, and Bridge Domain Using the Advanced GUI
If you have a public subnet when you configure the routed outside, you must associate the bridge domain
with the outside configuration.

Procedure

Step 1 On the menu bar, click TENANT > Add Tenant.


Step 2 In the Create Tenant dialog box, perform the following tasks:
a) In the Name field, enter a name.
b) Click the Security Domains + icon to open the Create Security Domain dialog box.
c) In the Name field, enter a name for the security domain. Click Submit.
d) In the Create Tenant dialog box, check the check box for the security domain that you created, and click
Submit.
Step 3 In the Navigation pane, expand Tenant-name > Networking, and in the Work pane, drag the VRF icon to
the canvas to open the Create VRF dialog box, and perform the following tasks:
a) In the Name field, enter a name.

Cisco ACI Virtualization Guide, Release 2.2(2)


128
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the Advanced GUI

b) Click Submit to complete the VRF configuration.


Step 4 In the Networking pane, drag the BD icon to the canvas while connecting it to the VRF icon. In the Create
Bridge Domain dialog box that displays, perform the following tasks:
a) In the Name field, enter a name.
b) Click the L3 Configurations tab.
c) Expand Subnets to open the Create Subnet dialog box, enter the subnet mask in the Gateway IP field
and click OK.
d) Click Submit to complete bridge domain configuration.
Step 5 In the Networks pane, drag the L3 icon down to the canvas while connecting it to the VRF icon. In the Create
Routed Outside dialog box that displays, perform the following tasks:
a) In the Name field, enter a name.
b) Expand Nodes And Interfaces Protocol Profiles to open the Create Node Profile dialog box.
c) In the Name field, enter a name.
d) Expand Nodes to open the Select Node dialog box.
e) In the Node ID field, choose a node from the drop-down list.
f) In the Router ID field, enter the router ID.
g) Expand Static Routes to open the Create Static Route dialog box.
h) In the Prefix field, enter the IPv4 or IPv6 address.
i) Expand Next Hop Addresses and in the Next Hop IP field, enter the IPv4 or IPv6 address.
j) In the Preference field, enter a number, then click UPDATE and then OK.
k) In the Select Node dialog box, click OK.
l) In the Create Node Profile dialog box, click OK.
m) Check the BGP, OSPF, or EIGRP check boxes if desired, and click NEXT. Click OK to complete the
Layer 3 configuration.
To confirm L3 configuration, in the Navigation pane, expand Networking > VRFs.

Creating an Application Profile Using the GUI

Procedure

Step 1 On the menu bar, choose TENANTS. In the Navigation pane, expand the tenant, right-click Application
Profiles, and click Create Application Profile.
Step 2 In the Create Application Profile dialog box, in the Name field, add the application profile name (OnlineStore).

Creating EPGs Using the GUI


The port the EPG uses must belong to one of the VM Managers (VMM) or physical domains associated with
the EPG.

Cisco ACI Virtualization Guide, Release 2.2(2)


129
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the Advanced GUI

Procedure

Step 1 On the menu bar, choose Tenants and the tenant where you want to create an EPG.
Step 2 In the navigation pane, expand the folder for the tenant, the Application Profiles folder, and the folder for
the application profile.
Step 3 Right-click the Application EPG folder, and in the Create Application EPG dialog box, perform the following
actions:
a) In the Name field, add the EPG name (db).
b) In the Bridge Domain field, choose the bridge domain from the drop-down list (bd1).
c) Check the Associate to VM Domain Profiles check box. Click Next.
d) In the Step 2 for Specify the VM Domains area, expand Associate VM Domain Profiles and from the
drop-down list, choose the desired VMM domain.
e) (Optional) In the Delimiter field, enter one of the following symbols: |, ~, !, @, ^, +, or =.
If you do not enter a symbol, the system will use the default | delimiter in the VMware portgroup name.
f) If you have Cisco AVS, from the Encap Mode drop-down list, choose an encapsulation mode.
You can choose one of the following encap modes:
VXLANThis overrides the domain's VLAN configuration, and the EPG will use VXLAN
encapsulation. However, a fault will be triggered for the EPG if a multicast pool is not configured
on the domain.
VLANThis overrides the domain's VXLAN configuration, and the EPG will use VLAN
encapsulation. However, a fault will be triggered for the EPG if a VLAN pool is not configured on
the domain.
AutoThis causes the EPG to use the same encapsulation mode as the VMM domain. This is the
default configuration.

g) Click Update and then click FINISH.


Step 4 In the Create Application Profile dialog box, create two more EPGs. The three EPGs should be db, app, and
web in the same bridge domain and data center.

Creating VLAN Pools with Encapsulation Blocks Using the Advanced GUI
You can create VLAN pools to associate with a VMM domain or with EPGs, either application EPGs or
microsegments.

Procedure

Step 1 Log in to Cisco APIC, choosing Advanced mode.

Cisco ACI Virtualization Guide, Release 2.2(2)


130
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the Advanced GUI

Step 2 Go to Fabric > Access Policies.


Step 3 In the Policies navigation pane, expand the Pools folder.
Step 4 Right-click the VLAN folder and then choose Create VLAN Pool.
Step 5 In the Create VLAN Pool dialog box, in the Name field, give the VLAN pool a name.
Step 6 In the Allocation Mode area, choose Dynamic Allocation or Static Allocation mode.
Note If you want to associate the VLAN pool to a VMM domain, you must choose dynamic allocation. If
you define static allocation for a VLAN pool, then try to create a VMM domain, the VLAN pool
with static allocation will not be available.
Step 7 In the Encap Blocks area, click the + icon.
Step 8 In the Create Ranges dialog box, in the Range area, type the numbers of the appropriate VLANs in the From
and To fields.
Step 9 In the Allocation Mode area, choose Dynamic Allocation, Inherit allocMode from parent or Static
Allocation.
VLAN pools can contain encapsulation blocks with different allocation modes. For example, a VLAN pool
with dynamic allocation can contain encapsulation blocks with dynamic or static allocation.
Note You must configure an encapsulation block with static allocation if you want to configure an EPG
with static VLAN port encapsulation. You can use any one of the VLANS in the encapsulation block
with static allocation.
Step 10 Click OK.
The VLAN range and allocation mode appear in the Encap Blocks area of the Create VLAN Pool dialog
box.
Step 11 In the Create VLAN Pool dialog box, click SUBMIT.

Assigning Port Groups to the VM in vCenter

Procedure

Step 1 Log in to the vCenter.


Step 2 Navigate to the virtual machine (VM) in the navigation pane.
Step 3 Right-click the VM in the navigation pane.
Step 4 In the Edit Settings dialog box for the VM, complete the following actions:
a) From the Network Adapter 1 drop-down menu, choose the appropriate combined value for tenant,
application profile, and endpoint group (EPG).
For example, you might see an option similar to T2|ap4|EPG1 followed by the values that were configured
in Cisco APIC.
b) Repeat Step 4 a for any other network adapters you have and want to configure.
You must configure one network adapter; configuring others is optional.
c) Click OK.

Cisco ACI Virtualization Guide, Release 2.2(2)


131
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the Advanced GUI

Creating a Filter Using the GUI


Create a filter using the following steps. This task shows how to create an HTTP filter.

Before You Begin


Verify that the tenant, network, and bridge domain have been created.

Procedure

Step 1 On the menu bar, choose TENANTS. In the Navigation pane, expand the tenant > Security Policies,
right-click Filters, and click Create Filter.
Note In the Navigation pane, you expand the tenant where you want to add filters.

Step 2 In the Create Filter dialog box, perform the following actions:
a) In the Name field, enter the filter name (http).
b) Expand Entries, and in the Name field, enter the name (Dport-80).
c) From the EtherType drop-down list, choose the EtherType (IP).
d) From the IP Protocol drop-down list, choose the protocol (tcp).
e) From the Destination Port/Range drop-down lists, choose http in the From and To fields. (http)
f) Click Update, and click Submit.
The newly added filter appears in the Navigation pane and in the Work pane.
Step 3 Expand Entries in the Name field. Follow the same process to add another entry with HTTPS as the
Destination port, and click Update.
This new filter rule is added.

Creating a Contract Using the GUI


Create a contract using the following steps.

Procedure

Step 1 On the menu bar, choose TENANTS and the tenant name on which you want to operate. In the Navigation
pane, expand the tenant > Security Policies.
Step 2 Right-click Contracts > Create Contract.
Step 3 In the Create Contract dialog box, perform the following tasks:
a) In the Name field, enter the contract name (web).
b) Click the + sign next to Subjects to add a new subject.
c) In the Create Contract Subject dialog box, enter a subject name in the Name field. (web)
d) Note This step associates the filters created that were earlier with the contract subject.
In the Filter Chain area, click the + sign next to Filters.

Cisco ACI Virtualization Guide, Release 2.2(2)


132
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the Basic GUI

e) In the dialog box, from the drop-down menu, choose the filter name (http), and click Update.
Step 4 In the Create Contract Subject dialog box, click OK.

Deploying an Application Profile for Cisco AVS Using the Basic GUI
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.

Creating a Tenant, VRF, and Bridge Domain Using the Basic GUI

Procedure

Step 1 Log in to the Basic Mode in the APIC GUI, and on the menu bar, click TENANT > Add Tenant.
Step 2 In the Create Tenant dialog box, perform the following tasks:
a) In the Name field, enter a name.
b) Click the Security Domains + icon to open the Create Security Domain dialog box.
c) In the Name field, enter a name for the security domain. Click Submit.
d) In the Create Tenant dialog box, check the check box for the security domain that you created, and click
Submit.
Step 3 In the Navigation pane, expand Tenant-name > Networking, drag the VRF icon to the canvas to open the
Create VRF dialog box, and perform the following tasks:
a) In the Name field, enter a name.
b) Click Submit to complete the VRF configuration.
Step 4 In the Networking pane, drag the BD icon to the canvas while connecting it to the VRF icon. In the Create
Bridge Domain dialog box that displays, perform the following tasks:
a) In the Name field, enter a name.
b) Expand Subnets to open the Create Subnet dialog box, enter the subnet mask in the Gateway IP field
and click OK.
c) Click Submit to complete bridge domain configuration.
Step 5 In the Networking pane, drag the L3 icon down to the canvas while connecting it to the VRF icon. In the
Create Routed Outside dialog box that displays, perform the following tasks:
a) In the Node ID field, enter a node ID.
b) In the Router ID field, enter the router ID.
c) Expand Static Routes and enter the IPv4 or IPv6 addresses in the IP Address and the Next Hop IP fields
and click Update.
Note The gateway IPv6 address must be a global unicast IPv6
address.
d) Click the Protocols box and select BGP, OSPF, and EIGRP for configuration as desired.
e) Click OK and then click Submit to complete Layer 3 configuration.

Cisco ACI Virtualization Guide, Release 2.2(2)


133
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI

To confirm L3 configuration, in the Navigation pane, expand VRFs > VRF name > Deployed VRFs.

Deploying an Application Policy Using the Basic GUI


Before You Begin
Verify that the tenant, network, and bridge domain have been created.

Procedure

Step 1 Note Log in to the Basic Mode of the APIC


GUI.
On the menu bar, click Tenants > Tenant-name.
Step 2 In the Navigation pane, right-click Application Profiles and click Create Application Profile.
Step 3 In the Create Application Profile dialog box, enter a name for the profile. Click Submit.
Step 4 In the Navigation pane, click and choose the new application profile.
Step 5 In the Work pane, from the Drag and drop to configure toolbar, drag and drop the first EPG to the blank
screen below.
Step 6 In the Create Application EPG dialog box that is displayed, perform the following actions:
a) Enter the name for the application EPG.
b) In the Bridge Domain field, from the drop-down list, choose the desired bridge domain. Click OK.
Repeat this step to create additional EPGs as desired in different bridge domains.

Step 7 From the Drag and drop to configure toolbar, drag and drop Contract, and it auto connects as the provider
EPG the consumer EPG as the user desires and drags. The relationship is displayed with arrows.
The Config Contract With L4-L7 Service Graph dialog box is displayed with the selected details auto
populated. and the provider and consumer contracts associated.
a) In the Contract Name field, enter a contract name. Click OK.
b) In the No Filter field, uncheck the check box to create a customized filter.
Note A default filter will be auto created if you do not uncheck the check
box.
c) (Optional) To create a customized filter, enter the appropriate information in the Filter Entries fields as
desired. Click OK.
Step 8 In the Application Profile Work pane, click Submit.
This completes the steps for deploying an application profile.

Deploying an Application Profile for Cisco AVS Using the NX-OS CLI

Creating a Tenant, VRF, and Bridge Domain Using the NX-OS Style CLI
This section provides information on how to create tenants, VRFs, and bridge domains.

Cisco ACI Virtualization Guide, Release 2.2(2)


134
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI

Note Before creating the tenant configuration, you must create a VLAN domain using the vlan-domain command
and assign the ports to it.

Procedure

Step 1 Create a VLAN domain (which contains a set of VLANs that are allowable in a set of ports) and allocate
VLAN inputs, as follows:

Example:
In the following example ("exampleCorp"), note that VLANs 50 - 500 are allocated.
apic1# configure
apic1(config)# vlan-domain dom_exampleCorp
apic1(config-vlan)# vlan 50-500
apic1(config-vlan)# exit
Step 2 Once the VLANs have been allocated, specify the leaf (switch) and interface for which these VLANs can be
used. Then, enter "vlan-domain member" and then the name of the domain you just created.

Example:
In the following example, these VLANs (50 - 500) have been enabled on leaf 101 on interface ethernet 1/2-4
(three ports including 1/2, 1/3, and 1/4). This means that if you are using this interface, you can use VLANS
50-500 on this port for any application that the VLAN can be used for.
apic1(config-vlan)# leaf 101
apic1(config-vlan)# interface ethernet 1/2-4
apic1(config-leaf-if)# vlan-domain member dom_exampleCorp
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
Step 3 Create a tenant in global configuration mode, as shown in the following example:

Example:

apic1(config)# tenant exampleCorp


Step 4 Create a private network (also called VRF) in tenant configuration mode as shown in the following example:

Example:

apic1(config)# tenant exampleCorp


apic1(config-tenant)# vrf context exampleCorp_v1
apic1(config-tenant-vrf)# exit
Step 5 Create a bridge domain (BD) under the tenant, as shown in the following example:

Example:
apic1(config-tenant)# bridge-domain exampleCorp_b1
apic1(config-tenant-bd)# vrf member exampleCorp_v1
apic1(config-tenant-bd)# exit
Note In this case, the VRF is
"exampleCorp_v1".
Step 6 Allocate IP addresses for the BD (ip and ipv6), as shown in the following example.

Cisco ACI Virtualization Guide, Release 2.2(2)


135
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI

Example:
apic1(config-tenant)# interface bridge-domain exampleCorp_b1
apic1(config-tenant-interface)# ip address 172.1.1.1/24
apic1(config-tenant-interface)# ipv6 address 2001:1:1::1/64
apic1(config-tenant-interface)# exit

What to Do Next
The next section describes how to add an application profile, create an application endpoint group (EPG), and
associate the EPG to the bridge domain.

Related Topics
Configuring a VLAN Domain Using the NX-OS Style CLI

Creating an Application Profile and EPG Using the NX-OS Style CLI
Before You Begin
Before you can create an application profile and an application endpoint group (EPG), you must create a
VLAN domain, tenant, VRF, and BD (as described in the previous section).

Procedure

Step 1 Create an application profile, as shown in the following example ("exampleCorp_web1"):

Example:
apic1(config)# tenant exampleCorp
apic1(config-tenant)# application exampleCorp_web1
Step 2 Create an EPG under the application, as shown in the following example ("exampleCorp_webepg1"):

Example:
apic1(config-tenant-app)# epg exampleCorp_webepg1

Step 3 Associate the EPG to the bridge domain, shown as follows:

Example:
apic1(config-tenant-app-epg)# bridge-domain member exampleCorp_b1
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# exit
apic1(config-tenant)# exit
Note Every EPG belongs to a BD. An EPG can belong to a BD from the same tenant (or) from tenant
Common. If you look at the chain, the lowest end is the EPG, and above that is the BD. The BD
belongs to a VRF, and the VRF belongs to the tenant.

Cisco ACI Virtualization Guide, Release 2.2(2)


136
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI

What to Do Next
These examples have shown how to configure an application EPG on a tenant. The next section discusses
how to map a VLAN on a port to the EPG.

Creating VLAN Pools with Encapsulation Blocks Using the NX-OS Style CLI

Procedure

Step 1 Create a dynamic or static VLAN pool.

Example:
apic1# config
apic1(config)# vlan-domain AVS-DOM2 dynamic

or
apic1# config
apic1(config)# vlan-domain AVS-DOM2
Static VLAN pool is the default; you must add the keyword dynamic to the command if you want to create a
dynamic VLAN pool.

Step 2 Define a dynamic or static allocation block.

Example:
apic1(config-vlan)# vlan 1071-1075 dynamic

or
apic1(config-vlan)# vlan 1071-1075
Static allocation is the default; you must add the keyword dynamic to the command if you want to create a
dynamic allocation block.

Step 3 Allocate dynamic or static encapsulation blocks.

Example:
apic1(config-vlan)# vlan 1076-1080,1091 dynamic
scale-apic1(config-vlan)#
apic1(config-vlan)# exit
or
apic1(config-vlan)# vlan 1076-1080,1091
scale-apic1(config-vlan)#
apic1(config-vlan)# exit
Allocation is static by default; to allocate dynamic encapsulation, you need to add the keyword dynamic to
the command.
Note Static VLAN pools cannot contain dynamic encapsulation blocks; however, dynamic VLAN pools
can contain static and dynamic encapsulation blocks.
Step 4 Associate the VLAN pool to the VMM domain.

Example:
apic1(config)# vmware-domain AVS-DOM2
apic1(config-vmware)# vlan-domain member AVS-DOM2
apic1(config-vmware)# exit
apic1(config)# exit

Cisco ACI Virtualization Guide, Release 2.2(2)


137
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI

apic1#
apic1# show vlan-domain
Step 5 Verify that the VLAN pool was defined.
apic1# show vlan-domain name AVS-DOM2
Legend:
vlanscope: L (Portlocal). Default is global

vlan-domain : AVS-DOM2 Type : All

vlan : 1071-1075(dynamic) 1091(static) 1076-1080(static)

Node Interface Vlan Type Usage Operational State


Operational Vlan
------------ ---------------- ---- ----------- -------------------- -------------------------
---------------

scale-apic1#

Deploying an Application Policy Using the NX-OS Style CLI


The port the EPG uses must belong to one of the VM Managers (VMM) or physical domains associated with
the EPG.

Procedure

Step 1 To get into the configuration mode using the NX-OS CLI, enter the following:

Example:
apic1#configure
apic1(config)#
Step 2 Create an application network profile for the tenant.
The application network profile in this example is OnlineStore.

Example:
apic1(config)# tenant exampleCorp
apic1(config-tenant)# application OnlineStore
apic1(config-tenant-app)#
Step 3 Create application web, db, and app EPGs for this application network profile of the tenant.

Example:
apic1(config-tenant-app)# epg web
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# epg db
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# epg app
apic1(config-tenant-app-epg)# exit

Step 4 Get back into the tenant mode to create an access list (filter) for different traffic types between these EPGs.

Cisco ACI Virtualization Guide, Release 2.2(2)


138
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI

Example:
apic1(config-tenant-app)# exit
Step 5 Create an access list (filter) for the http and https traffic.

Example:
apic1(config-tenant)# access-list http
apic1(config-tenant-acl)# match tcp dest 80
apic1(config-tenant-acl)# match tcp dest 443
apic1(config-tenant-acl)# exit
Step 6 Create an access list (filter) for Remote Method Invocation (RMI) traffic.

Example:
apic1(config-tenant)# access-list rmi
apic1(config-tenant-acl)# match tcp dest 1099
apic1(config-tenant-acl)# exit
Step 7 Create an access list (filter) for the SQL/database traffic.

Example:
apic1(config-tenant)# access-list sql
apic1(config-tenant-acl)# match tcp dest 1521
apic1(config-tenant)# exit
Step 8 Create the contracts and assign an access group (filters) for RMI traffic between EPGs.

Example:
apic1(config)# tenant exampleCorp
apic1(config-tenant)# contract rmi
apic1(config-tenant-contract)# subject rmi
apic1(config-tenant-contract-subj)# access-group rmi both
apic1(config-tenant-contract-subj)# exit
apic1(config-tenant-contract)# exit
Step 9 Create the contracts and assign an access group (filters) for web traffic between EPGs.

Example:
apic1(config-tenant)# contract web
apic1(config-tenant-contract)# subject web
apic1(config-tenant-contract-subj)# access-group http both
apic1(config-tenant-contract-subj)# exit
Step 10 Create the contracts and assign an access group (filters) for SQL traffic between EPGs.

Example:
apic1(config-tenant)# contract sql
apic1(config-tenant-contract)# subject sql
apic1(config-tenant-contract-subj)# access-group sql both
apic1(config-tenant-contract-subj)# exit
apic1(config-tenant-contract)# exit

Step 11 Attach the bridge domain and contracts to the web EPG.

Cisco ACI Virtualization Guide, Release 2.2(2)


139
Cisco ACI with Cisco AVS
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI

Example:
apic1(config-tenant)# application OnlineStore
apic1(config-tenant-app)# epg web
apic1(config-tenant-app-epg)# bridge-domain member exampleCorp_b1
apic1(config-tenant-app-epg)# contract consumer rmi
apic1(config-tenant-app-epg)# contract provider web
apic1(config-tenant-app-epg)# exit
Step 12 Attach the bridge domain and contracts to the db EPG.

Example:
apic1(config-tenant-app)# epg db
apic1(config-tenant-app-epg)# bridge-domain member exampleCorp_b1
apic1(config-tenant-app-epg)# contract provider sql
apic1(config-tenant-app-epg)# exit
Step 13 Attach the bridge domain and contracts to the application EPG.

Example:
apic1(config-tenant-app)# epg app
apic1(config-tenant-app-epg)# bridge-domain member exampleCorp_b1

Step 14 Associate the provider contracts to the application EPGs.

Example:
apic1(config-tenant-app-epg)# contract provider rm1
apic1(config-tenant-app-epg)# contract consumer sql
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# exit
apic1(config-tenant)# exit
Step 15 Associate the ports and VLANs to the EPGs app, db, and web.

Example:
apic1(config)# leaf 103
apic1(config-leaf)# interface ethernet 1/2-4
apic1(config-leaf-if)# vlan-domain member exampleCorp
apic1(config-leaf)# exit
apic1(config)# leaf 103
apic1(config-leaf)# interface ethernet 1/2
apic1(config-leaf-if)# switchport
access trunk vlan
apic1(config-leaf-if)# switchport trunk allowed vlan 100 tenant exampleCorp application
OnlineStore epg app
apic1(config-leaf-if)# exit
apic1(config-leaf)# interface ethernet 1/3
apic1(config-leaf-if)# switchport trunk allowed vlan 101 tenant exampleCorp application
OnlineStore epg db
apic1(config-leaf-if)# exit
apic1(config-leaf)# interface ethernet 1/4
apic1(config-leaf-if)# switchport trunk allowed vlan 102 tenant exampleCorp application
OnlineStore epg web
apic1(config-leaf-if)# exit

Cisco ACI Virtualization Guide, Release 2.2(2)


140
Cisco ACI with Cisco AVS
Verifying the Application Profile

Verifying the Application Profile

Verifying the Application Profile and EPGs in the GUI


After you create an application profile and EPGs, you should verify that they appear in the Cisco APIC.
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.

Procedure

Step 1 Log in to the Cisco APIC, choosing Advanced mode or Basic mode.
Step 2 On the menu bar, choose TENANTS and the tenant in which you created the application profile and EPGs.
Step 3 In the navigation pane, expand the tenant folder and then expand the Application Profiles folder.
Step 4 Verify that the application profile that you created appears.
Step 5 Open the application profile folder and then click the Application EPGs folder.
Step 6 In the work pane, verify that the EPGs that you created appear and then click each EPG to view its properties.

Verifying the EPGs in vCenter


You need to verify that the EPGs that you created have been propagated to the vCenter.

Procedure

Step 1 Log in to the vCenter.


Step 2 Navigate to the Cisco AVS.
Step 3 Verify that the EPGs that you created appear among the port groups for the Cisco AVS.

Verifying that VMs can Communicate


You need to verify that VMs can communicate with each other.

Cisco ACI Virtualization Guide, Release 2.2(2)


141
Cisco ACI with Cisco AVS
Configuring an IP Address for VMs Connected to Cisco AVS

Procedure

Step 1 Log in to the vCenter.


Step 2 Navigate to one of the virtual machines VMs that you want to test.
Step 3 Click the console tab for the VM.
Step 4 Log in to the VM.
Step 5 Access the command prompt and enter the following command:ping Second IP address
Step 6 View the results to ensure that the two VMs can communicate.
Step 7 Repeat Step 2 through Step 6 as needed.

Configuring an IP Address for VMs Connected to Cisco AVS


To configure an IP address for VMs connected to Cisco AVS, you assign an IPv4 or IPv6 addressor both
an IPV4 and IPv6 addressto the VM and then assign a gateway address.

Assigning an IP Address to the Cisco AVS VM Network Adapter


You can assign either an IPv4 address or an IPv6 address to a Cisco AVS virtual machine network adapter.
You first associate a port group with the VM network adapter in the VMware vSphere Client, check whether
any IP addresses have already been assigned to the adapter on the VM console, and then assign a new IPv4
or IPV6 address, using the procedure appropriate for your Linux or Windows environment.

Note This procedure assumes that you have created a VM or VMs.

Before You Begin


You must have an IPv4 or IPv6 address to assign to the Cisco AVS VM network adapter.

Procedure

Step 1 Log in to the VMware vSphere Client.


Step 2 Choose Home > Inventory > Hosts and Clusters.
Step 3 In the navigation pane, click the server with the VM and then click the VM.
Step 4 In the central pane, click Edit virtual machine settings.
Step 5 In the Virtual Machine Properties dialog box, make sure that the Hardware tab is chosen.
Step 6 In the navigation pane, click the network adapter.
Step 7 In the Network Label area, choose a port group and then click OK.
The port group is associated with the network adapter.
Step 8 Log into the VM.

Cisco ACI Virtualization Guide, Release 2.2(2)


142
Cisco ACI with Cisco AVS
Configuring an IP Address for VMs Connected to Cisco AVS

You can log into the VM by right-clicking on the VM and choosing Open Console or by establishing a
SSH/Telnet session on the VM's management port if SSH/Telnet is already enabled.

Step 9 Use the command appropriate for your environment (such as ifconfig for Linux and ipconfig for Windows)
to list the IP addresses assigned to the network adapter.
Step 10 Use the configuration procedure relevant to your version of Linux or Windows to assign a new persistent
(static or dynamic) IPv4 or IPv6 address within the desired subnet of the EPG or bridge domain.
Step 11 Log out of the VM.

What to Do Next
If you wish, you can configure a gateway address using the Cisco APIC.

Assigning a Gateway Address for the VMs Connected to Cisco AVS Using the GUI
You can configure the gateway address either under a bridge domain or under an EPG in that bridge domain
but not under both.
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.

Procedure

Step 1 Log in to Cisco APIC, choosing Advanced mode or Basic mode.


Step 2 Complete one of the following sets of steps:
If you are configuring a gateway under the bridge domain subnets, complete Step 3 through Step 7 and
skip Step 8 through 12.
If you are configuring a gateway under the EPG subnets, skip Step 3 through Step 7 and complete Step
8 through Step 12.

Step 3 Choose Tenants > tenant_name > Networking > Bridge Domains > bridge_domain_name > Subnets.
Step 4 On the right side of the work pane, click the + icon.
Step 5 In the Create Subnet dialog box, in the Gateway IP field, enter the gateway IPv4 or IPv6 address.
Step 6 Accept the default values in the dialog box.
In the Scope area, Private to VRF is chosen by default. In the Subnet Control area, ND RA Prefix is chosen
by default.

Step 7 Click SUBMIT.


Step 8 Choose Tenant > tenant_name > Application Profiles > application_profile_name > Application EPGs
> epg_name > Subnets.
Step 9 On the right side of the work pane, click the ACTIONS down arrow and choose Create EPG Subnet.
Step 10 In the Create EPG Subnet dialog box, in the Default Gateway IP field, enter the gateway IPv4 or IPv6
address.
Step 11 Accept the default values in the dialog box.

Cisco ACI Virtualization Guide, Release 2.2(2)


143
Cisco ACI with Cisco AVS
Guidelines for Using vMotion with Cisco AVS

In the Scope area, Private to VRF is chosen by default. In the Subnet Control area, ND RA Prefix is chosen
by default.

Step 12 Click SUBMIT.

Guidelines for Using vMotion with Cisco AVS


Follow the guidelines in this section for using vMotion with Cisco AVS.

vMotion Configuration
We recommend that you configure vMotion on a separate VMkernel NIC with a separate EPG. Do not
configure vMotion on the VMkernel NIC created for the OpFlex channel.
We recommend that you do not delete or change any parameters for the VMkernel NIC created for the
OpFlex channel.
Ensure that OpFlex is up on the destination host. Otherwise the EPG will not be available on the host.

Note If you delete the VMkernel NIC created for the OpFlex channel by mistake, recreate it with the attach
port-group vtep, and configure it with a dynamic IP address. You should never configure a static IP address
for an OpFlex VMkernel NIC.

vMotion with Cisco AVS when Using VXLAN Encapsulation


When using vMotion with Cisco AVS and using virtual extensible LAN (VXLAN) encapsulation, you must
take into account the following when setting the maximum transmission unit (MTU).
Using the default value of 1500 MTU will cause a timeout during vMotion migration to Cisco AVS. So
we recommend an MTU greater than or equal to 1600. However, in order to optimize performance, the
MTU should be set to the maximum allowed value of 8950.
Cisco AVS will enforce the physical NIC (PNIC) MTU by fragmenting or segmenting the inner packet.
Any switch in the path, such as Fabric Interconnect, must have an MTU value greater than or equal to
the Cisco AVS PNIC MTU.
The path MTU between the Virtual Tunnel Endpoint (VTEP) and the fabric must be greater than Cisco
AVS PNIC MTU because reassembly of VXLAN packets is not supported.
Total overhead when using VXLAN is at least 50 bytes:
Outer Ethernet14 bytes
IP Header20 bytes
UDP header8 bytes
VXLAN Header8 bytes

Cisco ACI Virtualization Guide, Release 2.2(2)


144
Cisco ACI with Cisco AVS
Distributed Firewall

Cross-vCenter vMotion Support


Cisco AVS supports cross-vCenter vMotion beginning in Release 5.2(1)SV3(1.15).

Note Microsegmentation with Cisco ACI for Cisco AVS is not supported for cross-vCenter and cross-vDS
vMotion.

Note When you do a cross-vCenter vMotion of endpoints, you might experience a few seconds of traffic loss.

Guidelines for Using Cross-vCenter and Cross-vDS vMotion


The source and destination VMware vCenter Server instances and ESXi hosts must be running version
6.0 or later.
The source and destination vSphere Distributed Switch (vDS) version must be same.
Refer to VMware documentation for prerequisites for cross-vDS and Cross-VCenter vMotion.

Distributed Firewall
The Distributed Firewall is a hardware-assisted firewall that supplementsbut does not replaceother security
features in the Cisco Application Centric Infrastructure (ACI) fabric such as Cisco Adaptive Security Virtual
Appliance (ASAv) or secure zones created by Microsegmentation with the Cisco Application Virtual Switch
(AVS). Distributed Firewall was a new feature in Cisco AVS in Release 5.2(1)SV3(1.5).
Part of Cisco AVS, the Distributed Firewall resides in the ESXi (hypervisor) kernel and is in learning mode
by default. No additional software is required for the Distributed Firewall to work. However, you must
configure policies in the Cisco Application Policy Infrastructure Controller (APIC) to work with the Distributed
Firewall.
The Distributed Firewall is supported on all Virtual Ethernet (vEth) ports but is disabled for all system ports
(Virtual Extensible LAN (VXLAN] tunnel endpoint [VTEP]) and all vmkernel ports) and for all uplink ports.
Distributed Firewall flows are limited to 10,000 per endpoint and 250,000 per Cisco AVS host.

Key Features of the Distributed Firewall

Feature Description
Provides dynamic packet filtering (also known as Tracks the state of TCP and FTP connections and
stateful inspection) blocks packets unless they match a known active
connection. Traffic from the Internet and internal
network is filtered based on policies that you
configure in the APIC GUI.

Is distributed Tracks connections even if virtual machines (VMs)


are relocated by vMotion to other servers.

Cisco ACI Virtualization Guide, Release 2.2(2)


145
Cisco ACI with Cisco AVS
Benefits of Distributed Firewall

Feature Description
Prevents SYN-ACK attacks When the provider VM initiates SYN-ACK packets,
the Distributed Firewall on the provider Cisco AVS
drops these packets because no corresponding flow
(connection) is created.

Supports TCP flow aging Connections in ESTABLISHED state are maintained


for 2 hours unless the per-port limit reaches the 75%
threshold. Once that threshold is reached, any new
connection can potentially replace the old connection
(which has been inactive for at least 5 minutes).
Connections in non-ESTABLISHED TCP state are
retained for 5 minutes of idle/inactive time.

Is implemented at the flow level Enables a flow between VMs over the TCP
connection, eliminating the need to establish a TCP/IP
connection for each packet.

Not dependent on any particular topology or Works with either Local Switching and No Local
configuration Switching modes and with either VLAN and VXLAN.

Is hardware-assisted In the ACI fabric, Cisco Nexus 9000 leaf switches


store the policies, avoiding impact on performance.

Bases implementation on 5-tuple values Uses the source and destination IP addresses, the
source and destination ports, and the protocol in
implementing policies.

Is in learning mode by default Facilitates upgrades; Distributed Firewall must be in


learning mode when you upgrade from an earlier
release of Cisco AVS to Release 5.2(1)SV3(1.5) or
later releases that support Distributed Firewall.

Benefits of Distributed Firewall


This section provides examples of how Distributed Firewall works with hardware in the Cisco ACI fabric to
provide security.

Enhanced Security For Reflexive ACLs


An administrator creates a contract using subjects and filters in the Cisco APIC between consumer and provider
EPGs to allow web traffic. The administrator creates a policy in Cisco APIC to allow traffic from any source
port to destination port 80.
As soon as the policy is configured in Cisco APIC, a reflexive access control list (ACL) entry from the provider
to the consumer is automatically programmed in the ACI hardware. This reflexive ACL is created to allow
the reverse traffic for the time when a connection remains established. This reflexive ACL entry is necessary
to allow the reverse traffic to flow.

Cisco ACI Virtualization Guide, Release 2.2(2)


146
Cisco ACI with Cisco AVS
Configuring Distributed Firewall

Because of the automatic reflexive ACL creation, the leaf switch allows the provider to connect to any client
port when the connection is in the established state. But this might not be desirable for some data centers.
That is because an endpoint in a provider EPG might initiate a SYN attack or a port-scan to the endpoints in
the consumer EPGs using its source port 80.
However, the Distributed Firewall, with the help of the physical hardware, will not allow such attack. The
physical leaf hardware evaluates the packet it receives from the hypervisor against the policy ternary content
addressable memory (TCAM) entry.

Protecting Data when VMs are Moved with vMotion


Distributed Firewall is present in the hypervisor kernel. Every packet sent or received follows the flow-based
entry in the Cisco AVS Distributed Firewall in the hypervisor kernel as well as in the physical leaf. Since the
flows are directly attached to a virtual machine (VM) virtual Ethernet (vEth) interface, even when VMs are
moved by vMotion to a different hypervisor host, the flows and table entries move with it to the new hypervisor.
This movement also is reported back to physical leaf. The physical leaf allows the legitimate flow to continue
and will prevent attacks if they occur. So even when the VM is moved to the new hosts, VM is still
communicating without losing protection.

Seamless FTP Traffic Handling


The behavior and interworking of the FTP protocol is different than other TCP-based protocols. For this
reason, it requires special treatment in the Distributed Firewall. FTP Server (Provider) listens on the Control
port (TCP port 21) and a Data port (TCP port 20). When communication begins between FTP client (Consumer)
and server (Provider), the control connection is set up initially between the FTP client and server. The data
connection is set up on demand (only when there is data to be exchanged) and torn down immediately after
the data transfer.
Distributed Firewall supports only Active-FTP mode handling. The data connections are not tracked for the
Passive-FTP mode.
Distributed Firewall will allow the FTP data connection only if it matches the FTP Client IP and Port
information that was received during the control connection handshake. Distributed Firewall will block the
FTP data connections if there is no corresponding control connection; this is what prevents FTP attacks.

Configuring Distributed Firewall


You configure Distributed Firewall by setting it to one of its three modes:
EnabledEnforces the Distributed Firewall.
DisabledDoes not enforce Distributed Firewall. This mode should be used only if you do not want to
use the Distributed Firewall. Disabling Distributed Firewall removes all flow information on the Cisco
AVS.
LearningCisco AVS monitors all TCP communication and creates flows in a flow table but does not
enforce the firewall. Learning is the default firewall mode in Cisco AVS Release 5.2(1)SV3(1.5) and
Release 5.2(1)SV3(1.10). Learning mode provides a way to enable the firewall without losing traffic.

You need to create policies in Cisco APIC to work with Distributed Firewall.

Cisco ACI Virtualization Guide, Release 2.2(2)


147
Cisco ACI with Cisco AVS
Configuring Distributed Firewall

Note We recommend that you use vmxnet3 adapters for the VMs when using Distributed Firewall. We also
recommend that you use vmxnet3 adapters in scale setups to increase the DVSLargeHeap size to its
maximum. You need to reboot the host for the change to take effect. For more information about using
vmxnet3 adapters for scale setups, see the related VMware knowledge base article, Error message is
displayed when a large number of dvPorts are in use in VMware ESXi 5.1.x (2034073).

Workflow for Configuring Distributed Firewall


This section provides a high-level description of the tasks that you need to perform in order to change the
Distributed Firewall mode and create policies.
1 Create an interface policy group to enable the firewall policy in the Cisco APIC, or, if you already have
an interface policy group, make sure that it contains a firewall policy.
If you followed instructions in the section Creating Interface and Switch Profiles and a vCenter Domain
Profile Using the Advanced GUI in this guide, using the configuration wizard, you created an interface
policy group with a firewall policy.
2 Configure a stateful policy for Distributed Firewall.
Follow instructions in the section Configuring a Stateful Policy for Distributed Firewall Using the Advanced
GUI in this guide.
3 Change the Distributed Firewall mode if necessary.
Distributed Firewall is in learning mode by default. If you have not previously enabled Distributed Firewall,
follow the instructions in the section Creating a Distributed Firewall Policy or Changing its Mode Using
the Advanced GUI in this guide to make sure that the feature is enabled.
4 Configure Distributed Firewall flow logging.
Cisco AVS reports the flows that are denied by Distributed Firewall to the system log (syslog) server. You
can configure parameters for the flows and view the denied flows on the syslog server. See the instructions
in the section Distributed Firewall Flow Logging in this guide.
5 Choose which Distributed Firewall flow count statistics that you want to view.
Cisco AVS collects Distributed Firewall flow information, but you must choose which statistics you want
to know about before you can view the. See the instructions in the section Distributed Firewall Flow Counts
in this guide.

Configuring a Stateful Policy for Distributed Firewall Using the Advanced GUI
You need to configure a stateful policy in the Cisco APIC.
You also can perform the procedure with the REST API or the NX-OS style CLI. See the section Configuring
a Stateful Policy for Distributed Firewall Using the REST API or the section Configuring a Stateful Policy
for Distributed Firewall Using the NX-OS Style CLI in this guide for instructions.

Cisco ACI Virtualization Guide, Release 2.2(2)


148
Cisco ACI with Cisco AVS
Configuring Distributed Firewall

Procedure

Step 1 Log in to the Cisco APIC, choosing Advanced mode.


Step 2 Choose Tenants.
Step 3 In the navigation pane, expand the folder for the tenant for which you want to configure the policy and then
expand the Security Policies folder.
Step 4 Right-click the Contracts folder and then choose Create Contract.
Step 5 In the Create Contract dialog box, in the Name field, type a name for the contract.
Step 6 In the Subjects area, click the + icon.
Step 7 In the Create Contract Subject dialog box, in the Name field, type a name for the subject.
Step 8 In the Filters area, click the + icon next to FILTERS.
Step 9 Click the down arrow to display the Name drop-down filter list, and then click the + icon at the top of the
Name list.
Step 10 In the Create Filter dialog box, complete the following actions:
a) In the Name field, type a name for the filter.
b) In the Entries area, click the + icon to display additional fields below.
c) In the Name field, type a name to further describe the filter, if necessary.
d) From the Ether Type drop-down menu, choose IP.
e) From the IP Protocol field, choose tcp.
f) Check the Stateful check box.
g) (Optional) In the Source Port / Range field, from the To and the From drop-down menus, choose
Unspecified, the default.
h) In the Destination Port / Range field, from the To and the From drop-down menus, choose http.
i) Click UPDATE and then click SUBMIT.
Step 11 In the Create Contract Subject dialog box, in the Filters area, click UPDATE and then click OK.
Step 12 In the Create Contract dialog box, click SUBMIT.

Configuring a Stateful Policy for Distributed Firewall Using the NX-OS Style CLI

Procedure

Configure a stateful policy in the Cisco APIC.

Example:
apic1(config)# tenant Tenant1
apic1(config-tenant)# access-list TCP-511 apic1
apic1 (config-tenant-acl)# match icmp
apic1 (config-tenant-acl)# match raw TCP-511 dFromPort 443 dToPort 443 etherT ip prot 6
stateful yes
apic1 (config-tenant-acl)# match raw tcp etherT ip prot 6 sFromPort 443 sToPort 443 stateful
yes
apic1 (config-tenant-acl)# match raw tcp-22out dFromPort 22 dToPort 22 etherT ip prot 6
stateful yes apic1(config-tenant-acl)# match raw tcp-all etherT ip prot 6 stateful yes
apic1(config-tenant-acl)# match raw tcp22-from etherT ip prot 6 sFromPort 22 sToPort 22
stateful yes apic1(config-tenant-acl)# exit apic1(config-tenant)# contract TCP511

Cisco ACI Virtualization Guide, Release 2.2(2)


149
Cisco ACI with Cisco AVS
Configuring Distributed Firewall

apic1(config-tenant-contract)# subject TCP-ICMP


apic1(config-tenant-contract-subj)# access-group TCP-511 both
apic1(config-tenant-contract-subj)# access-group arp both
apic1(config-tenant-contract-subj)#

Creating a Distributed Firewall Policy or Changing its Mode Using the Advanced GUI
If you use the unified configuration wizard in the section Creating Interface and Switch Profiles and a vCenter
Domain Profile Using the Advanced GUI, Cisco APIC applies the firewall policy in the mode you chose:
Learning, Enabled, or Disabled. If you do not use the unified configuration wizard, Cisco APIC applies the
default policy, which is Learning mode. If you are upgrading from a version of Cisco AVS before Release
5.2(1)SV3(1.5)versions that did not support Distributed Firewallthe default policy, which is Learning
mode, also is applied. However, you can edit the policy or create a new one.
You can create a Distributed Firewall policy or change its mode in the Cisco APIC GUI. However, you also
can perform the procedure with the REST API. See the section Changing the Distributed Firewall Mode Using
the REST API in this guide for instructions.

Procedure

Step 1 Log in to the Cisco APIC, choosing Advanced mode.


Step 2 Go to Fabric > Access Policies.
Step 3 Perform one of the following sets of actions:

Cisco ACI Virtualization Guide, Release 2.2(2)


150
Cisco ACI with Cisco AVS
Configuring Distributed Firewall

If you want to ... Then...


Create a new
Distributed Firewall 1 In the Policies navigation pane, open the Interface Policies and Policies folders.
policy 2 Right-click the Firewall folder and choose Create Firewall Policy.
3 In the Create Firewall Policy dialog box, in the Name field, type a name for
the policy.
4 In the Mode area, choose a mode, and then click SUBMIT.
The default mode is Learning. However, learning mode is used only when
upgrading from a version of Cisco AVS that does not support Distributed Firewall
to a version that does. Otherwise, Distributed Firewall should be in Enabled
mode.
Note Do not change the mode from Disabled directly to Enabled. Doing so
will lead to traffic loss. Instead, from Disabled mode, change the mode
to Learning, wait 5 minutes, and then change the mode to Enabled.
Note The Create Firewall Policy dialog box includes a Syslog area where
you can configure the source for Distributed Firewall flow information
that is sent to the syslog server. See the section Distributed Firewall
Flow Logging in this guide for information about configuring the source
and destination.
5 Associate the new policy with the VMM domain by completing the following
steps:
a Go to VM Networking > Inventory.
b In the Inventory navigation pane, open the VMware folder, and then choose
the relevant VMM domain.
c In the VMM domain work pane, scroll to the VSwitch Policies area, and
from the Firewall Policy drop-down list, choose the firewall policy that you
just created.
d Click SUBMIT.

Cisco ACI Virtualization Guide, Release 2.2(2)


151
Cisco ACI with Cisco AVS
Configuring Distributed Firewall

If you want to ... Then...


Change the mode of an
existing Distributed 1 In the Policies navigation pane, open the Interface Policies, Policies, and
Firewall policy Firewall folders.
Note It is assumed 2 Click the policy that you want to modify.
that the policy
is already 3 In the Properties work pane, in the Mode area, choose a mode, and then click
associated SUBMIT.
with a VMM Note Do not change the mode from Disabled directly to Enabled. Doing so
domain. will lead to traffic loss. Instead, from Disabled mode, change the mode
to Learning, wait 5 minutes, and then change the mode to Enabled.
Changing to Learning mode will allow Cisco AVS to add flow table
entries for existing flows.
Note The Properties work pane includes a Syslog area where you can
configure the source for Distributed Firewall flow information that is
sent to the syslog server. See the section Distributed Firewall Flow
Logging in this guide for information about configuring the source and
destination.

What to Do Next
Verify that the Distributed Firewall is in the desired state by completing the following steps:
1 In the Policies navigation pane, choose the policy in the Firewall folder.
2 In the Properties dialog box, verify that the mode is correct.

Enabling Distributed Firewall After Installation or Upgrade


When you install or upgrade to Cisco AVS Release 5.2(1)SV3(1.5) or later, Distributed Firewall is in learning
mode by default. If you upgrade Cisco APIC first, you have the option to enable Distributed Firewall at that
time. However, if you upgrade from an earlier version of Cisco AVSthat does not support Distributed
Firewalland are upgrading Cisco AVS only, you must first upgrade all the Cisco AVS hosts and then enable
Distributed Firewall.
Distributed Firewall is in learning mode by default in Release 5.2(1)SV3(1.5) and later releases to facilitate
upgrades from previous versions of Cisco AVS. Learning mode allows the flow of traffic on the Cisco AVS
and creates connections in the established state.
See the section Distributed Firewall in this guide for more information.
Use the following procedure to enable Distributed Firewall after you install or upgrade to Cisco AVS Release
5.2(1)SV3(1.5) or later releases that support Distributed Firewall.

Cisco ACI Virtualization Guide, Release 2.2(2)


152
Cisco ACI with Cisco AVS
Distributed Firewall Flow Logging

Procedure

Step 1 Log into the Cisco APIC, choosing Advanced mode.


Step 2 Go to FABRIC > ACCESS POLICIES.
Step 3 In the left navigation pane, open the Interface Policies, Policies, and Firewall folders.
Step 4 Click the policy that you want to modify.
Step 5 In the Properties dialog box in the work pane, in the Mode area, choose the Enabled radio button.

Configuring Distributed Firewall Using the NX-OS Style CLl

Procedure

Enable Distributed Firewall or change its mode.

Example:
apic1# configure
apic1(config)# vmware-domain Direct-AVS2-VXLAN
apic1(config-vmware)# configure-avs
apic1(config-vmware-avs)# firewall mode < any of below 3>
disabled Disabled mode
enabled Enabled mode
learning Learning mode

Distributed Firewall Flow Logging


You can view flow information for Distributed Firewall with the Cisco APIC to assist with auditing network
security.
Cisco AVS reports the flows that are denied and permitted by Distributed Firewall to the system log (syslog)
server. When you enable Distributed Firewall, Cisco AVS monitors TCP, UDP, and ICMP traffic by default.
It also tracks, logs, anddepending on how you configure parameterspermits or denies TCP traffic. You
can view the denied and permitted flows on the syslog server.

Configuring Parameters for Distributed Firewall Flow Information


Cisco AVS reports the flows that are denied or permitted by Distributed Firewall as well UDP and ICMP
flows to the system log (syslog) server. You can configure parameters for the flows in the CLI or REST API
to assist with auditing network security.
You configure Distributed Firewall logging in two tasks: configuring up to three syslog servers, referred to
as remote destinations in the GUI, and configuring the syslog policy. You can configure the following
parameters:
Syslog server parameters
Enable/disable

Cisco ACI Virtualization Guide, Release 2.2(2)


153
Cisco ACI with Cisco AVS
Distributed Firewall Flow Logging

Note Distributed Firewall logging is disabled by default.

Permitted flows, Denied flows, or both


Polling interval
You can set the interval for exporting the flows from 60 seconds to 24 hours.

Note A polling interval of 125 seconds is required to send data at maximum scale. We
recommend that you configure the syslog timer with a polling interval of at least 150
seconds.

Log severity
You can set the severity level from 0-7.

Syslog policy parameters


IP address
Port
Log severity
You can set the severity level from 0-7.
Log facility

Cisco AVS reports up to 250,000 denied or permitted flows to the syslog server for each polling interval. If
you choose to log denied and permitted flows, Cisco AVS will report up to 500,000 flows. Cisco AVS also
reports up to 100,000 short-lived flowsflows that are shorter than the polling interval.
Syslog messages are sent only if the syslog destination log severity is at or below the same log severity for
the syslog policy. Severity levels for the syslog server and syslog policy are as follows:
0: Emergency
1: Alert
2: Critical
3: Error
4: Warning
5: Notification
6: Information
7: Debug

Guidelines for Configuring the Syslog Server


Follow the guidelines in this section when configuring the syslog server for Cisco AVS.

Cisco ACI Virtualization Guide, Release 2.2(2)


154
Cisco ACI with Cisco AVS
Distributed Firewall Flow Logging

The syslog server should always be reachable from the Cisco AVS host management network or Cisco
AVS overlay-1 network (infraVRF [virtual routing and forwarding]).
If the syslog server is behind the Cisco AVS, bring up the VM VNIC in the VTEP port group.
The syslog server should always be on a different host from Cisco AVS.
Sending log messages from a Cisco AVS to a syslog server hosted behind the same Cisco AVS is not
supported.
If the syslog server destination is a VM, make sure that vMotion is disabled on it. If the syslog server
destination VM is moved to another host for any reason, make sure that the static client end point (CEP)
is configured accordingly. See the section Configuring a Static End Point Using the GUI
The IP for the syslog server can be obtained using DHCP (Option 61 is needed during DHCP) or static
configuration. Make sure that the IP address is in the same subnet as the other VTEPs in overlay-1
(infraVRF).

Distributed Firewall Flow Syslog Messages


This section provides the formats and examples of syslog messages for distributed Firewall flows
Denied flows
Format
<Syslog Server timestamp> < PRI = Facility*8 + Severity > <syslog version> <Host
timestamp> <Host IP> <Application name (avs-dfwlog)> - AVS IP: <AVSIP>
DFWLOG-DENY_FLOW - <Deny Reason> AVS UUID: <UUID>, Source IP: <Source IP address>,
Destination IP: <Destination IP address> , Source Port: <Port number>, Destination
Port: <Port Number>, Source Interface: <Interface name>, Protocol: "TCP"(6),
Hit-Count = <Number of Occurrences>, EPG Name: <EPG Name>

Example
Thu Apr 21 14:36:45 2016 10.197.138.90 <62>1 2016-04-22T11:34:49.198 10.197.138.90
avs-dfwlog - AVS IP: 10.197.138.90 DFWLOG-DENY_FLOW - ACK scan ingress AVS UUID:
4c4c4544-0047-3510-8048-c2c04f443032, Source IP: 192.168.5.1, Destination IP:
192.168.5.2, Source Port: 60957, Destination Port: 21, Source Interface:
UB4_sid.eth0, Protocol: "TCP"(6), Hit-Count = 1, EPG Name:
uni/epp/fv-[uni/tn-TEMP_CLIENT/ap-APP_PROF/epg-EPG-1]

Permitted flows
Format
<Syslog server timestamp> < PRI = Facility*8 + Severity> <syslog version> <Host
timestamp> <Host IP> <Application name (avs-dfwlog)> - AVS IP: <AVSIP>
DFWLOG-PERMIT_FLOW - AVS UUID: <UUID>, Source IP: <Source IP address>, Destination
IP: <Destination IP address>, Source Port: <Port Number>, Destination Port: <Port
Number>, Source Interface: <Interface name>, Protocol: "TCP"(6), Age = <Age in
seconds>, EPG Name: <Full EPG Name>

Example
Tue Apr 19 19:31:21 2016 10.197.138.90 <62>1 2016-04-20T16:30:03.418 10.197.138.90
avs-dfwlog - AVS IP: 10.197.138.90 DFWLOG-PERMIT_FLOW - ESTABLISHED AVS UUID:
4c4c4544-0047-3510-8048-c2c04f443032, Source IP: 192.168.5.1, Destination IP:
192.168.5.2, Source Port: 59418, Destination Port: 5001, Source Interface:
UB4_sid.eth0, Protocol: "TCP"(6), Age = 0, EPG Name:
uni/epp/fv-[uni/tn-TEMP_CLIENT/ap-APP_PROF/epg-EPG-1]

Short-lived permitted flows


Format
<Syslog Server timestamp> < PRI = Facility*8 + Severity > <syslog version> <Host
timestamp> <Host IP> <Application name (avs-dfwlog)> - AVS IP: <AVSIP>

Cisco ACI Virtualization Guide, Release 2.2(2)


155
Cisco ACI with Cisco AVS
Distributed Firewall Flow Logging

DFWLOG-PERMIT_SHORT_LIVED - <State of flow> AVS UUID: <UUID>, Source IP: <Source


IP address>, Destination IP: <Destination IP address>, Source Port: <Port Number>,
Destination Port: <Port Number>, Source Interface: <Interface Name>, Protocol:
"TCP"(6), Timestamp = <Host Timestamp>, EPG Name: <EPG Name>

Example
Thu Apr 21 14:46:38 2016 10.197.138.88 <62>1 2016-04-22T06:26:37.610 10.197.138.88
avs-dfwlog - AVS IP: 10.197.138.88 DFWLOG-PERMIT_SHORT_LIVED - CLOSED AVS UUID:
4c4c4544-0037-5810-8047-b7c04f443032, Source IP: 192.168.5.2, Destination IP:
192.168.5.1, Source Port: 5001, Destination Port: 59508, Source Interface:
UB3_sid.eth0, Protocol: "TCP"(6), Timestamp = 2016-04-22T06:26:37.610, EPG Name:
uni/epp/fv-[uni/tn-TEMP_CLIENT/ap-APP_PROF/epg-EPG-1]

ICMP monitored flows


Format
<Syslog server timestamp> < PRI = Facility*8 + Severity> <syslog version> <Host
timestamp> <Host IP> <Application name (avs-dfwlog)> - AVS IP: <AVSIP>
DFWLOG-PERMIT_FLOW_ICMP - AVS UUID: <UUID>, Source IP: <Source IP address>,
Destination IP: <Destination IP address>, Type:<ICMP type field>, Source Interface:
<Interface name>, Protocol: "ICMP"(1), Timestamp= <Host time stamp>, Direction:
<Egress/Ingress>, EPG Name:<Full EPG Name>

Example
2016-11-28 11:02:43 News.Info 10.197.138.88 1 2016-11-28T19:01:34.221 10.197.138.88
avs-dfwlog - AVS IP: 10.197.138.88 DFWLOG-ICMP_TRACKING AVS UUID:
4c4c4544-0037-5810-8047-b7c04f443032, Source IP: 192.168.5.1, Destination IP:
192.168.5.2, Icmp type and code: Echo request (8,0) Source Interface: UB4_sid.eth0,
Protocol: "ICMP"(1), Timestamp = 2016-11-28T19:01:34.221, Direction: Ingress, EpP
DN: uni/epp/fv-[uni/tn-TEST_TENT/ap-Temp1/epg-tempEPG]

UDP monitored flows


Format
UDP:
<Syslog server timestamp> < PRI = Facility*8 + Severity> <syslog version> <Host
timestamp> <Host IP> <Application name (avs-dfwlog)> - AVS IP: <AVSIP>
DFWLOG-PERMIT_FLOW_UDP - AVS UUID: <UUID>, Source IP: <Source IP address>,
Destination IP: <Destination IP address>, Source Port: <Port Number>, Destination
Port: <Port Number>, Source Interface: <Interface name>, Protocol: "UDP"(17),
Timestamp=<Host timestamp>, Direction: <Egress/Ingress>, EPG Name: <Full EPG Name>

Example
2016-11-28 11:00:23 News.Info 10.197.138.88 1 2016-11-28T19:00:14.252 10.197.138.88
avs-dfwlog - AVS IP: 10.197.138.88 DFWLOG-UDP_TRACKING AVS UUID:
4c4c4544-0037-5810-8047-b7c04f443032, Source IP: 169.254.170.192, Destination IP:
169.254.255.255, Source Port: 138, Destination Port: 138, Source Interface:
win_sys.eth1, Protocol: "UDP"(17), Timestamp = 2016-11-28T19:00:14.252, Direction:
Ingress, EpP DN: uni/epp/fv-[uni/tn-t0/ap-a0/epg-e0]

Configuring a Static End Point Using the GUI

Procedure

Step 1 Log into Cisco APIC, choosing Advanced mode or Basic mode.
Step 2 In the Tenant infra navigation pane, open the following folders: Application Profiles > access > Application
EPGs > EPG default.

Step 3 Right-click the Static Endpoint folder and then choose Create Static EndPoint.
Step 4 In the Create Static Endpoint dialog box, complete the following steps:

Cisco ACI Virtualization Guide, Release 2.2(2)


156
Cisco ACI with Cisco AVS
Distributed Firewall Flow Logging

a) In the MAC field, enter the syslog server destination's MAC address.
b) In the Type area, choose tep.
c) In the Path Type area, choose the appropriate path type.
The path type determines how the leaf is connected to the syslog server destination. The leaf can be
connected by port, direct port channel, or virtual port channel.
d) In the Path field, enter the appropriate path.
The path determines the policy group where the syslog server destination is attached.
e) In the IP Address field, enter the syslog server destination IP address.
f) In the Encap field, enter the overlay-1 VLAN (vlan-xxix).
g) Click SUBMIT.
Step 5 From the syslog server destination, ping any overlay-IP addressfor example, 10.0.0.30.
This step ensures that the fabric learns the Syslog server destination IP address.

Configuring Parameters for Distributed Firewall Flow Information in the Advanced GUI
To configure parameters, you first configure the parameters for the syslog server or servers and then configure
the parameters for the syslog policy. The syslog server is referred to as the Remote Destination in the GUI.

Before You Begin


You must have Distributed Firewall enabled. See the Distributed Firewall section of the "Cisco ACI and Cisco
AVS" chapter in this guide information about configuring Distributed Firewall.

Procedure

Step 1 Log into Cisco APIC, choosing Advanced mode.


Step 2 Go to Admin > External Data Collectors.
Step 3 In the External Data Collectors navigation pane, expand the Monitoring Destinations folder and then
choose the Syslog folder.
Step 4 In the Syslog work pane, click the ACTIONS down arrow and then choose Create Syslog Monitoring
Destination Group.
Step 5 In the Create Syslog Monitoring Destination Group STEP 1 > Profile dialog box, complete the following
steps:
a) In the Define Group Name and Profile area, enter a name in the Name field.
b) In the Admin State area, make sure that enabled is chosen from the drop-down list.
c) Accept the defaults in the rest of the dialog box and click NEXT.
Step 6 In the Create Syslog Monitoring Destination Group STEP 2 > Remote Destinations dialog box, click the
+ icon.
Step 7 In the Create Syslog Remote Destination dialog box, complete the following steps:
a) In the Host field, enter the host IP address.
b) In the Name field, enter the host name.
c) In the Admin State area, make sure that enabled is chosen.
d) In the Format area, make sure that aci is chosen.

Cisco ACI Virtualization Guide, Release 2.2(2)


157
Cisco ACI with Cisco AVS
Distributed Firewall Flow Logging

e) From the Severity drop-down list, choose a severity.


f) From the Port drop-down list, accept the standard port unless you are using another port.
g) From the Forwarding Facility drop-down list, choose a facility.
h) Ignore the Management EPG drop-down list and click OK.
Step 8 (Optional) In the Create Syslog Monitoring Destination Group STEP 2 > Remote Destinations dialog
box, create up to two additional remote destinations.
Step 9 In the Create Syslog Monitoring Destination Group STEP 2 > Remote Destinations dialog box, click
FINISH.
The newly created destination appears in the Syslog folder in the External Data Collectors navigation pane.
Step 10 Choose Fabric > Access Policies.
Step 11 In the Policies navigation pane, open the Interface Polices and Policies folders.
Step 12 Complete one of the following sets of steps:
If you want to... Then...
Configure a syslog
policy with a new 1 Right-click the Firewall folder and choose Create Firewall Policy.
Distributed Firewall 2 In the Create Firewall Policy dialog box, in the Specify the Firewall Policy
policy Properties area, type a name for the policy in the Name field.
3 In the Mode area, choose a mode.
Learning mode is used only when upgrading from a version of Cisco AVS that
does not support Distributed Firewall to a version that does. Otherwise, Distributed
Firewall should be in Enabled mode.
4 In the Syslog area, make sure that enabled is chosen from the Administrative
State drop-down list.
5 From the Included Flows area, choose Permitted flows, Denied flows, or both.
6 In the Polling Interval (seconds) area, choosing an interval from 60 seconds to
24 hours.
7 From the Log Level drop-down list, choose a severity level.
The logging severity level should be greater than or equal to severity level defined
for the syslog server. See the section Configuring Parameters for Distributed
Firewall Flow Information in this guide for information about severity.
8 From the Destination Group drop-down list, choose the destination group that
you just created.
9 Click SUBMIT.
10 Go to the section "What To Do Next" and associate the new Distributed Firewall
policy with a VMM domain.

Cisco ACI Virtualization Guide, Release 2.2(2)


158
Cisco ACI with Cisco AVS
Distributed Firewall Flow Logging

If you want to... Then...


Configure a syslog
policy with an 1 Expand the Firewall folder and choose the Distributed Firewall policy that you
existing Distributed want to modify.
Firewall policy 2 In the policy work pane, change the Mode if desired.
Learning mode is used only when upgrading from a version of Cisco AVS that
does not support Distributed Firewall to a version that does. Otherwise, Distributed
Firewall should be in Enabled mode.
3 In the Syslog area, make sure that enabled is chosen from the Administrative
State drop-down list.
4 From the Included Flows area, choose Permitted flows, Denied flows, or both.
5 In the Polling Interval (seconds) area, choosing an interval from 60 seconds to
24 hours.
6 From the Log Level drop-down list, choose a severity level.
The logging severity level should be greater than or equal to severity level defined
for the syslog server. See the section Configuring Parameters for Distributed
Firewall Flow Information in this guide for information about severity.
7 From the Destination Group drop-down list, choose the destination group that
you just created.
8 Click SUBMIT.
9 If you see the Policy Usage Warning dialog box, click SUBMIT CHANGES.

What to Do Next
If you configured a syslog policy with a new Distributed Firewall policy, you must associate the Distributed
Firewall policy with a VMM domain.
1 In Cisco APIC, choose VM Networking > Inventory.
2 In the navigation pane, expand the VMware folder and then choose the relevant VMM domain.
3 In the work pane, click the ACTIONS down arrow and then choose Create VSwitch Policies.
4 In the Create VSwitch Policy Container dialog box, click Yes.
5 In the work pane, scroll to the VSwitch Policies area, and from the Firewall Policy drop-down list, choose
the policy.
6 Click SUBMIT.
7 If you see the Policy Usage Warning dialog box, click SUBMIT CHANGES.

Cisco ACI Virtualization Guide, Release 2.2(2)


159
Cisco ACI with Cisco AVS
Distributed Firewall Flow Counts

Configuring Parameters for Distributed Firewall Flow Information in the NX-OS Style CLI

Before You Begin


You must have Distributed Firewall enabled. See the "Distributed Firewall" section of the "Cisco ACI and
Cisco AVS" chapter in the Cisco ACI Virtualization Guide for information about configuring Distributed
Firewall.

Procedure

Step 1 Configure the parameters for the syslog server or servers.

Example:
apic1# configure
apic1(config)# logging server-group group name
apic1(config-logging)# server IP address severity severity level facility facility name
You can repeat the last command for additional syslog servers; you can configure up to three syslog servers.

Step 2 Configure the parameters for the syslog source.

Example:
apic1# configure
apic1(config)# vmware-domain Direct-AVS
apic1(config)# configure-avs
apic1(config-avs)# firewall mode enabled
apic1(config-avs)# firewall-logging server-group group name action-type permit, deny
Note You must enter the firewall mode enabled command before you enter the firewall-logging command.
Note For the firewall-logging command, you can enter either permit or deny. You can also enter both,
separated by a comma.

Distributed Firewall Flow Counts


You can view Distributed Firewall flow counts with the Cisco APIC.
Cisco AVS collects Distributed Firewall flow information, but you must choose which statistics you want to
know about before you can view them. You can choose a sampling interval with choices ranging from 10
seconds to 1 year; however, the default is 5 minutes.
You can choose statistics and view them from two different places in Cisco APIC: one beginning with VM
Networking and one beginning with Tenants. However, the steps for choosing and viewing statistics are the
same.
When you choose statistics in Cisco APIC, you see a list of different kinds of statistics, but only nine are
relevant to Distributed Firewall:
aged connections (connections)
created connections (connections)
destroyed connections (connections)

Cisco ACI Virtualization Guide, Release 2.2(2)


160
Cisco ACI with Cisco AVS
Distributed Firewall Flow Counts

denied global input connections (connections)


denied per port limit connections (connections)
invalid SYN ACK packets (packets)
invalid SYN packets (packets)
invalid connection packets (packets)
invalid ftp SYN packets (packets)

Choosing Statistics to View for Distributed Firewall


Before You Begin
You must have Distributed Firewall enabled. See the "Distributed Firewall" section of the "Cisco ACI and
Cisco AVS" chapter in the Cisco ACI Virtualization Guide for information about configuring Distributed
Firewall.

Procedure

Step 1 Choose VM Networking > Inventory > VMware > VMM_name > Controllers > data center_name >
DVS-VMM name > Portgroups > EPG_name > Learned Point MAC address (Node).
Step 2 Click the Stats tab.
Step 3 Click the tab with the check mark.
Step 4 In the Select Stats dialog box, click the statistics that you want to view in the Available pane and then click
the arrow pointing right to put them in the Selected pane.
Step 5 (Optional) Choose a sampling interval different from the default of 5 minutes.
Step 6 Click SUBMIT.

Viewing Statistics for Distributed Firewall


Once you have chosen statistics for Distributed Firewall, you can view them.

Before You Begin


You must have chosen statistics to view for Distributed Firewall. See Choosing Statistics to View for Distributed
Firewall for instructions.

Procedure

Step 1 Choose VM Networking > Inventory > VMware > VMM_name > Controllers > data center_name >
DVS-VMM name > Portgroups > EPG_name > Learned Point MAC address (Node)
Step 2 Click the Stats tab.
The central pane displays the statistics that you chose earlier. You can change the view by clicking the table
view or chart view icon on the upper left side of the work pane.

Cisco ACI Virtualization Guide, Release 2.2(2)


161
Cisco ACI with Cisco AVS
Microsegmentation with Cisco ACI for Cisco AVS

Microsegmentation with Cisco ACI for Cisco AVS


Microsegmentation with the Cisco ACI enables you to automatically assign endpoints to logical security zones
called EPGs based on various attributes. Microsegmentation with Cisco ACI is available in Cisco AVS Release
5.2(1)SV3(1.5) and later releases.
For detailed conceptual information about Microsegmentation with Cisco ACIincluding how it works,
attributes, and precedenceand instructions for configuring it, see the chapter Microsegmentation with Cisco
ACI in this guide.

Configuring Layer 4 to Layer 7 Services


For information about configuring Layer 4 to Layer 7 services on the Cisco AVS, see the Cisco APIC Layer
4 to Layer 7 Services Deployment Guide.
When you follow instructions in the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide, instead of
configuring services on the VMware Distributed Virtual Switch (DVS), configure the services on the Cisco
AVS.

Note You must install Cisco AVS before you can configure Layer 4 to Layer 7 services.
Beginning with Cisco AVS Release 5.2(1)SV3(1.10), Layer 4 to Layer 7 service graphs are supported for
Cisco AVS. Layer 4 to Layer 7 service graphs for Cisco AVS can be configured for VMs only and in VLAN
mode only. Layer 4 to Layer 7 service integration is not supported when the service VMs are deployed on a
host with VXLAN encapsulation.
However, beginning with Cisco AVS Release 5.2(1)SV3(2.14), Layer 4 to Layer 7 service integration is
supported when the service VMs are deployed on hosts with VXLAN encapsulation. This is achieved by
adding both service VM hosts and Compute VM hosts to a single VMM domain that is in mixed mode. Both
VLAN and multicast pools can be configured in mixed mode. Service VM EPGs will use VLAN from the
defined pool, and all other EPGs can use either VXLAN or VLAN encapsulation. Both VXLAN endpoints
and VLAN service VMs can now be part of same host in a mixed-mode VMM configuration.

Migrating Your Network from DVS to AVS


Complete the following steps in VMware vSphere Web Client to migrate your network from VMware DVS
to Cisco AVS.

Before You Begin


You must remove the configuration that you made in Cisco APIC for the VMware DVS.

Cisco ACI Virtualization Guide, Release 2.2(2)


162
Cisco ACI with Cisco AVS
REST API Tasks for Cisco AVS

Procedure

Step 1 Put the ESXi host in maintenance mode.


Step 2 Remove from the VMware DVS the uplinks that you plan to use for Cisco AVS.
Do not delete the VMware DVS at this point.

Step 3 Remove the configuration from ports in the Cisco ACI fabric that correspond to the host VMware DVS.
Step 4 Install Cisco AVS and verify its operational state, following the procedures in the Cisco AVS Installation
Guide or the Cisco AVS chapter in the Cisco ACI Virtualization Guide.
Step 5 Once Cisco AVS is operational, associate all the EPGs that were used by the VMware DVS to the Cisco AVS
VMM domain.
Associating the EPGs to the Cisco AVS VMM domain should lead to the creation of port groups for Cisco
AVS.

Step 6 Remove the host from maintenance mode and migrate the VMs that you removed from the host earlierbefore
you entered maintenance modeback to the host.
Step 7 In VM network settings, change the port group from VMware DVS to the same port group for Cisco AVS.
Step 8 (Optional but recommended) Remove the VMware DVS from the host.

What to Do Next
Repeat Step 1 through Step 7 for each remaining host.

REST API Tasks for Cisco AVS


This section contains the REST API versions of tasks documented in the Cisco APIC GUI in this chapter.

Creating a Tenant, VRF, and Bridge Domain Using the REST API
Procedure

Step 1 Create a tenant.

Example:
POST https://apic-ip-address/api/mo/uni.xml
<fvTenant name="ExampleCorp"/>
When the POST succeeds, you see the object that you created in the output.
Step 2 Create a VRF and bridge domain.
Note The Gateway Address can be an IPv4 or an IPv6 address. For more about details IPv6 gateway
address, see the related KB article, KB: Creating a Tenant, VRF, and Bridge Domain with IPv6
Neighbor Discovery .

Example:
URL for POST: https://apic-ip-address/api/mo/uni/tn-ExampleCorp.xml

Cisco ACI Virtualization Guide, Release 2.2(2)


163
Cisco ACI with Cisco AVS
Deploying an Application Profile Using the REST API

<fvTenant name="ExampleCorp">
<fvCtx name="pvn1"/>
<fvBD name="bd1">
<fvRsCtx tnFvCtxName="pvn1"/>
<fvSubnet ip="10.10.100.1/24"/>
</fvBD>
</fvTenant>
Note If you have a public subnet when you configure the routed outside, you must associate the bridge
domain with the outside configuration.

Deploying an Application Profile Using the REST API


The port the EPG uses must belong to one of the VM Managers (VMM) or physical domains associated with
the EPG.

Procedure

Step 1 Send this HTTP POST message to deploy the application using the XML API.

Example:
POST https://apic-ip-address/api/mo/uni/tn-ExampleCorp.xml
Step 2 Include this XML structure in the body of the POST message.

Example:
<fvTenant name="ExampleCorp">

<fvAp name="OnlineStore">
<fvAEPg name="web">
<fvRsBd tnFvBDName="bd1"/>
<fvRsCons tnVzBrCPName="rmi"/>
<fvRsProv tnVzBrCPName="web"/>
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"delimiter=@/>
</fvAEPg>

<fvAEPg name="db">
<fvRsBd tnFvBDName="bd1"/>
<fvRsProv tnVzBrCPName="sql"/>
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"/>
</fvAEPg>

<fvAEPg name="app">
<fvRsBd tnFvBDName="bd1"/>
<fvRsProv tnVzBrCPName="rmi"/>
<fvRsCons tnVzBrCPName="sql"/>
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"/>
</fvAEPg>
</fvAp>

<vzFilter name="http" >


<vzEntry dFromPort="80" name="DPort-80" prot="tcp" etherT="ip"/>
<vzEntry dFromPort="443" name="DPort-443" prot="tcp" etherT="ip"/>
</vzFilter>
<vzFilter name="rmi" >
<vzEntry dFromPort="1099" name="DPort-1099" prot="tcp" etherT="ip"/>
</vzFilter>
<vzFilter name="sql">
<vzEntry dFromPort="1521" name="DPort-1521" prot="tcp" etherT="ip"/>
</vzFilter>

Cisco ACI Virtualization Guide, Release 2.2(2)


164
Cisco ACI with Cisco AVS
Deploying an Application Profile Using the REST API

<vzBrCP name="web">
<vzSubj name="web">
<vzRsSubjFiltAtt tnVzFilterName="http"/>
</vzSubj>
</vzBrCP>

<vzBrCP name="rmi">
<vzSubj name="rmi">
<vzRsSubjFiltAtt tnVzFilterName="rmi"/>
</vzSubj>
</vzBrCP>

<vzBrCP name="sql">
<vzSubj name="sql">
<vzRsSubjFiltAtt tnVzFilterName="sql"/>
</vzSubj>
</vzBrCP>
</fvTenant>

In the string fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"delimiter=@/, delimiter=@ is optional.


If you do not enter a delimiter, the system will use the default | delimiter.

In the XML structure, the first line modifies, or creates if necessary, the tenant named ExampleCorp.

<fvTenant name="ExampleCorp">

This line creates an application network profile named OnlineStore.

<fvAp name="OnlineStore">

The elements within the application network profile create three endpoint groups, one for each of the three
servers. The following lines create an endpoint group named web and associate it with an existing bridge
domain named bd1. This endpoint group is a consumer, or destination, of the traffic allowed by the binary
contract named rmi and is a provider, or source, of the traffic allowed by the binary contract named web. The
endpoint group is associated with the VMM domain named datacenter.

<fvAEPg name="web">
<fvRsBd tnFvBDName="bd1"/>
<fvRsCons tnVzBrCPName="rmi"/>
<fvRsProv tnVzBrCPName="web"/>
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"/>
</fvAEPg>

The remaining two endpoint groups, for the application server and the database server, are created in a similar
way.
The following lines define a traffic filter named http that specifies TCP traffic of types HTTP (port 80) and
HTTPS (port 443).

<vzFilter name="http" >


<vzEntry dFromPort="80" name="DPort-80" prot="tcp" etherT="ip"/>
<vzEntry dFromPort="443" name="DPort-443" prot="tcp" etherT="ip"/>
</vzFilter>

The remaining two filters, for application data and database (sql) data, are created in a similar way.
The following lines create a binary contract named web that incorporates the filter named http:

<vzBrCP name="web">
<vzSubj name="web">
<vzRsSubjFiltAtt tnVzFilterName="http"/>

Cisco ACI Virtualization Guide, Release 2.2(2)


165
Cisco ACI with Cisco AVS
Configuring a Stateful Policy for Distributed Firewall Using the REST API

</vzSubj>
</vzBrCP>

The remaining two contracts, for rmi and sql data protocols, are created in a similar way.
The final line closes the structure:

</fvTenant>

Configuring a Stateful Policy for Distributed Firewall Using the REST API
Configure a stateful policy in the Cisco APIC.

Procedure

Step 1 Log in to the Cisco APIC.


Step 2 Post the policy to https://APIC-ip-address/api/node/mo/.xml.

Example:
<polUni>
<infraInfra>

<nwsFwPol name="fwpol1" mode="enabled"/> (enabled, disabled, learning)

<infraFuncP>
<infraAccBndlGrp name="fw-bundle">
<infraRsFwPol tnNwsFwPolName="fwpol1"/>
<infraRsAttEntP tDn="uni/infra/attentp-testfw2"/>
</infraAccBndlGrp>
</infraFuncP>

<infraAttEntityP name="testfw2">
<infraRsDomP tDn="uni/vmmp-VMware/dom-mininet"/>
</infraAttEntityP>

</infraInfra>

</polUni>

Changing the Distributed Firewall Mode Using the REST API


Configure Distributed Firewall by putting it in the correct mode.

Procedure

Step 1 Log in to the Cisco APIC.


Step 2 Post the policy to https://APIC-ip-address/api/node/mo/.xml.

Example:
<polUni>
<infraInfra>

Cisco ACI Virtualization Guide, Release 2.2(2)


166
Cisco ACI with Cisco AVS
Configuring Parameters for Distributed Firewall Flow Information in the REST API

<nwsFwPol name="fwpol1" mode="<enabled|disabled|learning>"/>


<infraFuncP>
<infraAccBndlGrp name="fw-bundle">
<infraRsFwPol tnNwsFwPolName="fwpol1"/>
<infraRsAttEntP tDn="uni/infra/attentp-testfw2"/>
</infraAccBndlGrp>
</infraFuncP>
<infraAttEntityP name="testfw2">
<infraRsDomP tDn="uni/vmmp-VMware/dom-<VMM-Domain-Name>"/>
</infraAttEntityP>
</infraInfra>
</polUni>

What to Do Next
Verify that the Distributed Firewall is in the desired state, as shown in the following example:
~ # vemcmd show dfw
Show DFW GLobals
DFW Feature Enable: ENABLED
DFW Total Flows : 0
DFW Current Time : 81115
~ #

Configuring Parameters for Distributed Firewall Flow Information in the REST


API
Procedure

Step 1 Configure the Distributed Firewall logging parameters for the source.

Example:
<infraInfra>
<nwsFwPol name="__ui_vmm_pol_PARAM-AVS" mode="enabled">
<nwsSyslogSrc adminState="enabled" name="PARAM-AVS" inclAction="deny" logLevel="4"
pollingInterval="120">
<nwsRsNwsSyslogSrcToDestGroup tDn="uni/fabric/slgroup-syslog-servers"/>
</nwsSyslogSrc>
</nwsFwPol>
</infraInfra>
Step 2 Identify the syslog server or servers that will receive the Distributed Firewall flows.

Example:
<syslogGroup name="syslog-servers" >
<syslogRemoteDest host="1.1.1.1" />
<syslogRemoteDest host="2.2.2.2" />
<syslogRemoteDest host="3.3.3.3" />
</syslogGroup>
The name of the syslog group must be the same in both REST API commands, as it does in the preceding
examples.

Cisco ACI Virtualization Guide, Release 2.2(2)


167
Cisco ACI with Cisco AVS
Configuring Parameters for Distributed Firewall Flow Information in the REST API

Cisco ACI Virtualization Guide, Release 2.2(2)


168
CHAPTER 7
Cisco ACI with VMware vRealize
This chapter contains the following sections:

About Cisco ACI with VMware vRealize, page 169


Getting Started with Cisco ACI with VMware vRealize, page 173
Cisco ACI with VMware vRealize Upgrade Workflow, page 180
Cisco ACI with VMware vRealize Downgrade Workflow, page 182
Use Case Scenarios for the Administrator and Tenant Experience, page 183
Troubleshooting, page 270
Removing the APIC Plug-in, page 272
Plug-in Overview, page 272
Configuring a vRA Host for the Tenant in the vRealize Orchestrator, page 273
Configuring an IaaS Host in the vRealize Orchestrator, page 274
Installing the vRO Customizations, page 275

About Cisco ACI with VMware vRealize


Cisco Application Centric Infrastructure (ACI) integrates with VMware's products vRealize Orchestrator
(vRO), vRealize Automation (vRA), and vCenter.
Cisco Application Centric Infrastructure (ACI), in addition to integrating with VMware vCenter, integrates
with VMware's products vRealize Automation (vRA) and vRealize Orchestrator (vRO). vRA and vRO are
parts of the VMware vRealize Suite for building and managing multivendor hybrid cloud environments.
Beginning with Application Policy Infrastructure Controller (APIC) Release 2.0(1), vRA and vRO support
Cisco AVS in addition to VMware DVS.

Cisco ACI Virtualization Guide, Release 2.2(2)


169
Cisco ACI with VMware vRealize
Cisco ACI with VMware vRealize Solution Overview

Cisco ACI with VMware vRealize Solution Overview


vRA integration is delivered through a set of service blueprints imported into vRA. The service blueprints
leverage the vRO Application Policy Infrastructure Controller (APIC) workflows, providing a set of catalog
items in a self-service portal that allows Tenants to build, manage, and remove networking components.
Multi-machine with ACI workflows achieve following functionalities:
Auto-create Tenant Endpoint Groups (EPGs)
Required policies in APIC
Create VMs and portgroups in vCenter
Auto-place the VMs is respective port groups
Created by APIC
Create security policy with access lists
Configure L4-L7 services, and provide external connectivity

This consumption model allows users to deploy single and multi-tier application workloads in single click
with pre-defined as well as customizable compute and network policies. Catalog items are published by
infrastructure administrators, whereby granular entitlements can be added or removed on a per-tenant basis.
The integration offers two modes of networking:

Mode Description
Shared Shared mode is for Tenants who do not have a
preference for what IP address space they use and a
shared address space with shared context (VRF) is
used across tenants. Isolation is provided using ACI
Endpoint Groups (EPGs) and connectivity among
EPGs are enabled using a white listing method.

Virtual Private Cloud (VPC) VPC mode is a bring your own address space
architecture, where network connectivity is isolated
via a unique context (VRF) per tenant and external
connectivity is provided via a common shared L3 out.

Cisco ACI Virtualization Guide, Release 2.2(2)


170
Cisco ACI with VMware vRealize
Physical and Logical Topology

Physical and Logical Topology


This section shows the logical model of the vRealize ACI Integration and comparison between a Shared
Services Plan and Virtual Private Cloud Plan.

Figure 13: This figure shows a logical model of the vRealize ACI Integration.

Figure 14: This figure shows the comparison between a Shared Services Plan and Virtual Private Cloud Plan.

Cisco ACI Virtualization Guide, Release 2.2(2)


171
Cisco ACI with VMware vRealize
About the Mapping of ACI Constructs in VMware vRealize

For details, see the Cisco APIC Basic Configuration Guide.

About the Mapping of ACI Constructs in VMware vRealize


This table shows the mapping between the features of Cisco ACI policy and vRealize policy

Cisco ACI VMware vRealize


Tenant Tenant

EPGs Networks

Layer 3 external connectivity External routed network

Contract Security policy

Filter Rule entry list

L4-L7 service device Shared load balancer or firewall

This list provides details regarding the features:


TenantTenants can be employees within an organization, business units, application owners, or
applications. Or if you are a service provider, they can be hosting customers (individuals or organizations
that pay you to provide IT services).
NetworksIn Cisco ACI, the term network refers to EPGs, which are used to provide a new model
for mapping applications to the network. Rather than using forwarding constructs, such as addresses or

Cisco ACI Virtualization Guide, Release 2.2(2)


172
Cisco ACI with VMware vRealize
Getting Started with Cisco ACI with VMware vRealize

VLANs, to apply connectivity and policy, EPGs use a grouping of application endpoints. EPGs are
mapped to networks in the vRealize portal. The isolated networks act as containers for collections of
applications, or of application components and tiers, that can be used to apply forwarding and policy
logic. They allow the separation of network policy, security, and forwarding from addressing and instead
apply these to logical application boundaries. When a network is created in vRealize, in the back end it
is created as a port group in vCenter. A vRealize tenant can use vCenter to manage the computing
resources and can attach the virtual machine to the appropriate network.
Layer 3 external connectivityThe Cisco ACI fabric connects to the outside through Layer 3 external
networks. These constructs are also available for vRealize tenants to access other services within the
data center, across the data center, or on the internet.
Security policyCisco ACI is built on a highly secure model, in which traffic between EPGs (isolated
networks) is denied, unless explicitly allowed by policy contracts. A Cisco ACI contract is mapped to
a security policy in the vRealize portal. The security policy describes which networks (EPGs) will provide
and consume a service. The security policy contains one or more rule entry lists (filters), stateless firewall
rules that describe a set of Layer 4 TCP or User Datagram Protocol (UDP) port numbers that define the
communication between the various applications.
Shared load balancer and firewallCisco ACI treats services as an integral part of an application. Any
services that are required are managed as a service graph that is instantiated on the Application Policy
Infrastructure Controller (APIC) . Users define the service for the application, and service graphs identify
the set of network and service functions that are needed by the application. Cisco ACI has an open
ecosystem of L4-7 service vendors whose services integrate natively with Cisco ACI. This integration
is achieved through device packages written and owned by the vendors. The APIC manages the network
services and inserts the services according to the Cisco ACI policy model. For vRealize, Cisco ACI
offers F5 and Citrix load balancers and Cisco ASA firewalls, both in virtual and physical form factors,
which are connected to the Cisco ACI fabric and shared across the various vRealize tenants. After the
device has been integrated into Cisco ACI, the vRealize administrator can choose to add the device as
a premium service and upsell the plan. The vRealize administrator manages the virtual IP address range
for the shared device, to simplify the vRealize tenants workflow.
VPC planIn a VPC plan, vRealize tenants can define their own address spaces, bring a DHCP server,
and map their address spaces to networks. A VPC tenant can also be offered services, such as load
balancing, from the shared service plan. In this scenario, a device would have multiple virtual NICs
(vNICs). One vNIC would connect to the private address space, and another would connect to the shared
service infrastructure. The vNIC that connects to the shared service infrastructure would have an address
assigned by the infrastructure and would also consume a shared load balancer owned by the infrastructure.

Getting Started with Cisco ACI with VMware vRealize


This section describes how to get started with Cisco ACI with VMware vRealize.
You must download and unzip the Cisco ACI and VMware vRealize file for the 2.2(1) release before installing
Cisco ACI with VMware vRealize.

Procedure

Step 1 Go to Cisco's Application Policy Infrastructure Controller (APIC) Website:


http://www.cisco.com/c/en/us/support/cloud-systems-management/
application-policy-infrastructure-controller-apic/tsd-products-support-series-home.html

Cisco ACI Virtualization Guide, Release 2.2(2)


173
Cisco ACI with VMware vRealize
Prerequisites for Getting Started with Cisco ACI with VMware vRealize

Step 2 Choose All Downloads for this Product.


Step 3 Choose the release version and the apic-vrealize-2.2.1x.tgz file.
Step 4 Click Download.
Step 5 Unzip the apic-vrealize-2.2.1x.tgz file.
Note Cisco ACI with VMware vRealize only supports ASCII characters. Non-ASCII characters are not
supported.

Prerequisites for Getting Started with Cisco ACI with VMware vRealize
Before you get started, ensure that you have verified that your vRealize computing environment meets the
following prerequisites:
vRealize Automation Release 7.0 or 6.2 must be installed.
See VMware's vRealize documentation.
The vRealize ACI plug-in version and the Cisco APIC version must match.
A tenant is configured in vRealize automation and associated with identity store. The tenant must have
one or more users configured with "Infra Admin", "Tenant Admin", and "Tenant user" roles.
See VMware's vRealize documentation.
The tenant must have one more "Business group" configured.
See VMware's vRealize documentation.
Configure vRealize Orchestrator as an end-point.
See VMware's vRealize documentation.
Configure vCenter as an endpoint.
See VMware's vRealize documentation.
Configure "Reservations" using the vCenter compute resources.
See VMware's vRealize documentation.
Set up the vRealize Appliance.
See VMware's vRealize documentation.
If Layer 3 (L3) Out policies are to be consumed by a tenant, you must configure a BGP route reflector.
See the Cisco APIC Basic Configuration Guide about Configuring an MP-BGP Route Reflector Using
the Basic GUI or Configuring an MP-BGP Route Reflector Using the Advanced GUI.
Setup a vRA handle in vRO.
This is used for Installing the ACI service catalog workflow.
Setup a IAAS handle in vRO.
This is used for Installing the ACI service catalog workflow.
See Setting Up an IaaS Handle in vRealize Orchestrator, on page 175.

Cisco ACI Virtualization Guide, Release 2.2(2)


174
Cisco ACI with VMware vRealize
Prerequisites for Getting Started with Cisco ACI with VMware vRealize

Install the vCAC/vRA Custom Property Toolkit for vCO/vRO. You can download the package from
the following URL:
https://communities.vmware.com/docs/DOC-26693
The embedded vRO in vRA has the vCAC vRO plug-in that is installed by default. If you are using a
standalone vRO, the vCAC vRO plug-in must be installed. You can download the plug-in from the
following URL:
https://solutionexchange.vmware.com/store/products/vmware-vrealize-orchestrator-plug-in-for-vra-6-2-0

Setting Up an IaaS Handle in vRealize Orchestrator


This section describes how to set up an Infrastructure as a Service (IaaS) handle in the vRealize Orchestrator
(vRO).

Procedure

Step 1 Log in to the VMware vRealize Orchestrator as administrator.


Step 2 Once the VMware vRealize Ochestrator GUI appears, from the drop-down list, choose Run from the menu
bar.
Step 3 In the navigation pane, choose the Workflows icon.
Step 4 Choose Adminstrator@vra_name > Library > vRealize Automation > Configuration > Add the IaaS
host of a vRA host.
Step 5 Right-click Add the IaaS host of a vRA host and choose Start Workflow.
Step 6 In the Start Workflow: Add the IaaS host of a vRA host dialog box, perform the following actions:
a) In the vRA host field, enter your vRealize Handle.
b) Click Next.
Step 7 In the next screen, perform the following actions:
a) In the Host Name field, enter a name.
b) In the Host URL field, enter the URL of your IaaS host.
c) Use the default values for the remaining fields.
d) Click Next.
Step 8 In the next screen, perform the following actions:
a) In the Session mode drop-down list, choose Shared Session.
b) In the Authentication user name field, enter the authentication user name.
c) In the Authentication password field, enter the password.
d) Click Next.
Step 9 In the next screen, perform the following actions:
a) In the Workstation for NTLM authentication field, enter the name of the workstation that you will use
for NTLM authentication.
b) In the Domain for NTLM authentication field, enter the domain that is used in the IaaS host URL.
c) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


175
Cisco ACI with VMware vRealize
Cisco ACI with VMware vRealize Installation Workflow

Cisco ACI with VMware vRealize Installation Workflow


This section describes the Cisco ACI with VMware vRealize installation workflow.

Procedure

Step 1 Install the APIC plug-in on the vRealize Orchestrator (vRO).


For more information, see Installing the APIC Plug-in on the vRealize Orchestrator, on page 176.

Step 2 Set up the VMware vRealize Automation Appliance for ACI.


For more information, see Setting Up the VMware vRealize Automation Appliance for ACI, on page 177.

Installing the APIC Plug-in on the vRealize Orchestrator


This section describes how to install APIC plug-in on the vRealize Orchestrator.

Procedure

Step 1 Once you have unzipped the package, save the aci-vra-plugin-2.2.1000.N.dar file in a known directory.
Step 2 Log in to the vRA appliance as root using SSH, enter:
$ ssh root@<vra_ip>

Step 3 Start the configurator to enable the configurator services web interface, enter the following commands:
# service vco-configurator start
.
.
.
Tomcat started.
Status: Running as PID=15178

Ensure the status is running.

Step 4 Log in to the VMware appliance using the Firefox browser, enter:
https://applicance_address:8283/vco-controlcenter
Note Cisco recommends using the Firefox browser.
Do not use the Internet Explorer or the Chrome browser for the first time. There is a known issue
when you use the default username and password. It does not login properly.
For more information, see https://communities.vmware.com/thread/491785.
a) In the VMware vRealize Orchestrator Configuration GUI, enter the default username and password which
is vmware/vmware. You will then be required to change the password.
Step 5 In the navigation pane, ensure there is a green dot next to Plugins and then choose Plugins.
Step 6 In the right-side pane, scroll down to the Plugin file field and click the search icon.

Cisco ACI Virtualization Guide, Release 2.2(2)


176
Cisco ACI with VMware vRealize
Cisco ACI with VMware vRealize Installation Workflow

a) Locate where you saved the aci-vra-plugin-2.2.1000.N.dar file and choose the
aci-vra-plugin-2.2.1000.N.dar file.
b) Click Upload and install.
At the top of the pane, you will see a similar message in green:
Cisco APIC Plugin

Step 7 In the vRA appliance where you logged in as root using SSH, enter the following commands:
# service vco-configurator restart
# service vco-server restart

Step 8 Refresh the Firefox browser where you log in to the VMware appliance.
a) In the VMware vRealize Orchestrator Configuration GUI, ensure the Cisco APIC Plugin is present and
has a green dot in the navigation pane.
b) Choose the Cisco APIC Plugin and you will see a similar message in the pane:
APIC Plugin for vRealize Orchestrator configuration is done through workflows. These workflows
are located in the "Cisco APIC workflows" folder.
c) Choose the Plugins, in the navigation pane, scroll down, locate the Cisco APIC Plugin and ensure it
states Installation OK.
The installation of the APIC plug-in on the vRealize Orchestrator is now complete.

Setting Up the VMware vRealize Automation Appliance for ACI


This section describes how to set up the VMware vRealize Automation Appliance for ACI.

Procedure

Step 1 Log in to the VMware vRealize Automation Appliance as the administrator through your tenant portal using
the browser:
https://applicance_address/vcac/org/tenant_id

Example:
https://192.168.0.10/vcac/org/tenant1
Enter the admin username and password.

Step 2 In the VMware vRealize Automation Appliance GUI, perform the following actions:
a) Choose Administration > Users & Groups > Custom Groups
b) In the Custom Group pane, click Add to add a custom group.
c) Enter the name of the custom group. (Service Architect)
d) In the Roles to this group field, select the custom group you created in the previous step. (Service Architect)
e) Choose the Member pane, enter and select the user name(s).
f) Click Add.
This creates a custom group with members.
g) In the Custom Group pane, choose the custom group you created. (Service Architect)

Cisco ACI Virtualization Guide, Release 2.2(2)


177
Cisco ACI with VMware vRealize
Cisco ACI with VMware vRealize Installation Workflow

h) In the Edit Group pane, you can verify the members in the Members pane.
Step 3 In the browser, enter the vRealize Automation Appliance.
https://applicance_address
For example:
https://vra3-app.ascisco.net
a) Choose the vRealize Orchestrator Client to download the client.jnlp file.
b) The Downloads dialog box will appear, launch the client.jnlp file.
Step 4 Log in to the VMware vRealize Orchestrator as administrator.
Step 5 Once the VMware vRealize Ochestrator GUI appears, from the drop-down list, choose Run from the menu
bar.
Step 6 In the Navigation pane, choose the Workflows icon.
Step 7 Choose [email protected] > Cisco APIC Workflows > Utils > Install ACI Service
Catalog.
Step 8 Right-click Install ACI Service Catalog and choose Start Workflow.
Step 9 In the Start Workflow - Install ACI Service Catalog dialog box, perform the following actions:
a) In the vRealize Automation handle field, click Not set, navigate and choose the vRealize automation
handle for this appliance.
b) In the Business group field, click Not set to choose business group.
Note NOTE: If running vRealize 7.0, you need to select the Business Group from Business Group
(Deprecated).
c) In the JSON File containing vRealize Properties field, click Not set, navigate and choose the JSON file
containing the vRealize properties. (aci-vra-properties-2.1.1000.x.json)
d) In the Zip file containing the service blueprints field, click Not set, navigate and choose the zip file
containing the service blueprints. (aci-vra-asd-2.1.1000.x.zip)
e) In the Admin User field, enter the tenant admin user.
f) In the End users field, click Not set and enter the user names to enable privilege for.
Note Do not copy and paste the end user names, you should type the user
names.
g) Click Submit.
Step 10 In the Navigation pane, you will see a green check mark next to the Install ACI Service Catalog, if the
installation was successful.
Step 11 In the Navigation pane, choose the Workflows icon.
Step 12 Right-click Install ACI Property Definitions and choose Start Workflow.
Step 13 In the Start Workflow - Install ACI Property Definitions dialog box, click Net set, navigate and choose
the IaaS host.
a) Click Submit.
In the Navigation pane, you will see a green checkmark next to the Install ACI Property Definitions, if
the installation was successful.

Step 14 To verify as a tenant, log in to the vRealize Automation Appliance as tenant, choose Catalog and you will
see 22 services.
Step 15 To verify as an administrator, log in to the vRealize Automation Appliance as administrator, choose Catalog
and you will see 20 services.

Cisco ACI Virtualization Guide, Release 2.2(2)


178
Cisco ACI with VMware vRealize
Cisco ACI with VMware vRealize Installation Workflow

a) Choose Infrastructure > Blueprints > Property Definitions and you will see 47 properties.

Day-0 Operations of ACI


This section describes day-0 operations of ACI.

Before You Begin


Fabric bring-up
Bring up the fabric and all topologies are supported.
Access policies
Attach Entity Policy (AEP)
Configure access policies between the leaf switches and ESXi hosts to ensure CDP and LLDP is
enabled between the leaf and host.

Layer 3 (L3) Out configuration


Create any L3 Out configurations in the common tenant that you wish to be consumed user tenants.
You can choose any name for the L3 policy.
External EPG must be named "[L3OutName|InstP]".
Create two policies.
For shared plan, specify "default" and for VPC plan, specify "vpcDefault".
For more information, see About L3 External Connectivity, on page 208.

Service graph templates and devices


Create any service graph devices in the common tenant.
For more information, see Configuring the Services on APIC Using XML POST, on page 205.
Security domains and tenant user
vRealize plug-in requires two user accounts.
The first account needs administrator privileges. This account allows you to create, read, update,
and destroy objects in the tenant common, access policies, and VMM domains.
The second account needs restricted tenant privileges. This account allows you to only read common
tenant and VMM domains, but you can create, read, update, and destroy objects in their own tenant.
Role-based access control (RBAC) rules are enforced through the APIC not the plug-in.

Procedure

See the Cisco APIC Basic Configuration Guide for more information.

Cisco ACI Virtualization Guide, Release 2.2(2)


179
Cisco ACI with VMware vRealize
Cisco ACI with VMware vRealize Upgrade Workflow

Associating AEP with VMware VMM Domain


This section describes how to associate attachable entity profile (AEP) with VMware VMM domain.

Procedure

Step 1 Log in to the APIC GUI, choose FABRIC > ACCESS POLICIES.
Step 2 In the Navigation pane, expand Global Policies > Attachable Access Entity Policies > AEP_profile_name.
Step 3 In the PROPERTIES pane, perform the following actions:
a) In the Domains (VMM, Physical or External) Associated to Interfaces field, click on the + to expand.
b) In the Unformed field, choose a VMM domain and click UPDATE.

Cisco ACI with VMware vRealize Upgrade Workflow


This section describes the Cisco ACI with VMware vRealize upgrade workflow.

Procedure

Step 1 Upgrade the APIC image.


Step 2 Upgrade the APIC plug-in on the vRealize Orchestrator (vRO).
For more information, see Upgrading the APIC Plug-in on the vRealize Orchestrator, on page 180.

Step 3 Set Up the VMware vRealize Automation Appliance for ACI.


For more information, see Setting Up the VMware vRealize Automation Appliance for ACI, on page 177.

Step 4 Verify the connection between APIC and vRealize.


For more information, see Verifying the Connection Between APIC and vRealize, on page 182.

Upgrading the APIC Plug-in on the vRealize Orchestrator


This section describes how to upgrade the APIC plug-in certificate on the vRealize Orchestrator.

Procedure

Step 1 Once you have unzip the package, save the aci-vra-plugin-2.2.1000.N.dar file in a known directory.
Step 2 Log in to the VRA appliance as root using SSH, enter:
$ ssh root@<vra_ip>

Cisco ACI Virtualization Guide, Release 2.2(2)


180
Cisco ACI with VMware vRealize
Upgrading the APIC Plug-in on the vRealize Orchestrator

Step 3 Start the configurator to enable the configurator services web interface, enter the following commands:
# service vco-configurator start
.
.
.
Tomcat started.
Status: Running as PID=15178

Ensure the status is running.

Step 4 Log in to the VMware appliance using the Firefox browser, enter:
https://applicance_address:8283/vco-controlcenter
Note Cisco recommends using the Firefox browser.
Do not use the Internet Explorer or the Chrome browser for the first time. There is a known issue
when you use the default username and password. It does not login properly.
For more information, see https://communities.vmware.com/thread/491785.
a) In the VMware vRealize Orchestrator Configuration GUI, enter the default username and password which
is vmware/vmware. Then you will be required to change the password.
Step 5 In the navigation pane, ensure there is a green dot next to Plug-ins and then choose Plug-ins.
Step 6 In the right-side pane, scroll down to the Plug-in file field and click the search icon.
a) Locate where you saved the aci-vra-plugin-2.2.1000.N.dar file and choose the
aci-vra-plugin-2.2.1000.N.dar file.
b) Click Upload and install.
At the top of the pane, you will see a similar message in green:
Cisco APIC Plugin
Note If you are upgrading from a previous version you may receive a similar error message:
Error! Cannot Downgrade the aci-vro-plugin-2.2.139.dar plug-in. The installed version is
2.1.1000, the version you're trying to install is 2.2.139. Installation is canceled.
To resolve this issue:
1 Remove the previous version.
For more information see, Removing the APIC Plug-in, on page 272.
2 Upgrade the APIC plug-in on the vRealize Orchestrator with the new version using this
procedure.

Step 7 In the VRA appliance where you logged in as root using SSH, enter the following commands:
# service vco-configurator restart
# service vco-server restart

Step 8 Refresh the Firefox browser where you log in to the VMware appliance.
a) In the VMware vRealize Orchestrator Configuration GUI, ensure the Cisco APIC Plugin is present and
has a green dot in the navigation pane.
a) Choose the Cisco APIC Plug-in and you will see a similar message in the pane:
APIC Plugin for vRealize Orchestrator configuration is done through workflows. These workflows
are located in the "Cisco APIC workflows" folder.

Cisco ACI Virtualization Guide, Release 2.2(2)


181
Cisco ACI with VMware vRealize
Verifying the Connection Between APIC and vRealize

b) Choose the Plug-ins, in the navigation pane, scroll down, locate the Cisco APIC Plugin and ensure it
states Installation OK.
Step 9 Upgrade your service blueprints, service categories, and entitlements, see Setting Up the VMware vRealize
Automation Appliance for ACI, on page 177.

Verifying the Connection Between APIC and vRealize


After you have upgraded the Application Policy Infrastructure Controller (APIC) controller and the switch
software, you must verify the connection from the vRealize Orchestrator to APIC.

Before You Begin


Ensure the APIC controller and the switch software is upgraded.
For more information, see the Cisco ACI Firmware Management Guide.

Procedure

Step 1 Log in to the vRealize Orchestrator as administrator.


Step 2 In the navigation pane, choose the Inventory icon.
Step 3 Expand the Cisco APIC Plugin, choose the APIC and check the following:
a) In the General pane, check if the controllers are showing in the Name field.
b) Check if you can maneuver through the nested hierarchy below the APIC. This ensures you are
communicating with APIC.
If the connection from vRO to APIC is not established, then next to the APIC name the string down will
be present, indicating that the connection is down.

Cisco ACI with VMware vRealize Downgrade Workflow


This section describes the Cisco ACI with VMware vRealize downgrade workflow.

Procedure

Step 1 Downgrade the APIC image.


Step 2 Delete the APIC plug-in package and all the APIC workflows.
For more information, see Deleting Package and Workflows , on page 183.

Step 3 Install the APIC plug-in on the vRealize Orchestrator (vRO).


For more information, see Upgrading the APIC Plug-in on the vRealize Orchestrator, on page 180.

Step 4 Set up the VMware vRealize Automation Appliance for ACI.

Cisco ACI Virtualization Guide, Release 2.2(2)


182
Cisco ACI with VMware vRealize
Deleting Package and Workflows

For more information, see Setting Up the VMware vRealize Automation Appliance for ACI, on page 177.

Step 5 Verify the connection between APIC and vRealize.


For more information, see Verifying the Connection Between APIC and vRealize, on page 182.

Deleting Package and Workflows


This section describes how to delete the package and workflows.

Procedure

Step 1 Log in to the vRO client as administrator.


Step 2 Choose the Design role.
Step 3 Choose the Packages tab.
Step 4 Right-click on the com.cisco.apic.package and choose Delete element with content.
Step 5 Choose Keep Shared in the pop-up window.
Step 6 Choose the Workflows tab.
Step 7 Ensure that all workflows in the "Cisco APIC workflows" folder and subfolders are deleted.
To delete the workflow: Select the workflow, right-click and choose Delete.

Use Case Scenarios for the Administrator and Tenant


Experience
This section describes use case scenarios for the administrator and tenant experience.

Overview of Tier Application Deployment


This section describes the overview of 3-tier application deployment.

Deployment of a single-tier application using property See Deploying a Single-Tier Application Using
groups Property Groups, on page 184.

Deployment of a 3-tier application using a See Deploying a 3-Tier Application Using a


multi-machine blueprint Multi-Machine Blueprint, on page 186.

Cisco ACI Virtualization Guide, Release 2.2(2)


183
Cisco ACI with VMware vRealize
Overview of Tier Application Deployment

Deploying a Single-Tier Application Using Property Groups


This section describes how to deploy a single-tier application using property groups.

Procedure

Step 1 Connect to the vRealize Automation appliance by pointing your browser to the following URL:
https://appliance_address/vcac/org/tenant_id

Step 2 Enter the tenant administrator username and password.


Step 3 Choose Catalog.
Step 4 Click Configure Property Groups.
You will configure the database tier.

Step 5 Click Request.


Step 6 In the Request Information tab, enter a description of the request.
Step 7 Click Next.
Step 8 In the Common tab, perform the following actions:
a) In the IaaS Host for vRealize field, click Add.
b) Put a check in the box next to the desired IaaS host.
c) Click Submit.
d) In the APIC Tenant field, click Add.
e) Expand apic_name > Tenants.
f) Put a check in the box next to the desired tenant's name.
Example:
green

g) Click Submit.
h) In the Property Group Name field, enter a name for the property group.
Example:
green-app-bp

i) In the Plan Type (Shared or VPC) field, click Shared.


j) In the VMM Domain/DVS field, click Add.
k) Expand apic_name > Vcenters > vcenter_name
l) Put a check in the box next to the desired vCenter's name.
Example:
green

m) Click Submit.
Step 9 Click Next.
Step 10 In the VM Networking tab, leave all of the fields at their default values.
Step 11 Click Next.
Step 12 In the Security tab, perform the following actions:

Cisco ACI Virtualization Guide, Release 2.2(2)


184
Cisco ACI with VMware vRealize
Overview of Tier Application Deployment

a) In the Configure Security Policy drop-down list, choose No.


Step 13 In the Load Balancer tab, from the drop-down list, choose No.
Step 14 In the Firewall tab, from the drop-down list, choose No.
Step 15 Click Submit.
Step 16 Click OK.
Step 17 To verify your request, choose the Requests tab.
a) Choose the request you submitted and click view details. Ensure the status is Succesful.
Step 18 (Optional) To edit a blueprint in the property group, choose Infrastructure > Blueprints > Property Groups.
a) In the Property Group pane, choose the property group you created (green-app-bp) and click edit.
b) In the Edit Property Group pane, choose the property group you want to edit and click on the pencil icon
to edit a certain blueprint.
c) Once you have completed your edits, click OK.
Step 19 Attach the property group to the VMs, choose Infrastructure > Blueprints.
Step 20 In the Blueprints pane, click New Blueprint, from the drop-down list, choose Virtual > vSphere (vCenter).
Step 21 In the New Blueprint vSphere (vCenter)pane, perform the following actions:
a) In the Blueprint Information tab, enter the information to create your blueprint and click OK. See
VMware's documentation for details on how to create your machine blueprint.
b) In the Build Information tab, enter the information to create your property group and click OK. See
VMware's documentation for details on how to create your machine blueprint.
Step 22 In the Properties tab, perform the following actions:
a) In the Property Groups field, choose your property group that you created (green-app-bp) and click OK.
b) Click on the magnifying glass icon for the newly created property group (green-app-bp).
c) In the Property Group Custom Properties dialog box, ensure that the properties match your property
group and this makes a connection with the VM and the ACI networking.
d) In the New Blueprint vSphere (vCenter)pane, click OK.
Step 23 In the Blueprints pane, perform the following actions:
a) Choose your property group that you created (green-app-bp), hover and choose Publish.
b) Click OK.
c) Choose Aministration > Catalog Management > Catalog Items.
Step 24 In the Catalog Items pane, perform the following actions.
a) Find and choose the blueprint that you created (Green App Tier).
Step 25 In the Configure Catalog Item pane, perform the following actions.
a) In the Details tab, in the Service field, choose VM Services.
b) Check the check box for New and noteworthy.
c) Click Update.
You now have deployed a single-tier application using property groups.
Step 26 To verify the deployment of the single-tier application, log out of the administrator session and log back in
as the tenant.
a) Click the Catalog tab.
b) In the navigation pane, choose VM Services.
c) In the Work pane, choose the blueprint you created.
d) In the Catalog Item Details pane, verify the properties of the blueprint and click Request.

Cisco ACI Virtualization Guide, Release 2.2(2)


185
Cisco ACI with VMware vRealize
Overview of Tier Application Deployment

e) In the New Request pane, click Submit and then OK.


This provisions a new virtual machine, ACI networking, and connects the two together.

Deploying a 3-Tier Application Using a Multi-Machine Blueprint


VMware vRealize multi-machine blueprints are groupings of one or more machine blueprints to be deployed
simultaneously. A common use case is a three-tier web application, where the web, app, and database tiers
are deployed together. From a networking perspective, you must push the application policy into Cisco
Application Centric Infrastructure (ACI) to enable secure communication between tiers that need to
communicate. This is achieved by creating a security policy and associating the relevant machines dynamically
at deployment time.
When configuring a blueprint that will be used in a multi-machine blueprint, a security policy must be created.
During the creation process, the consumer and provider must be provided. The provider is always the machine
that you are building, and the consumer can be any other machine or network.
As an example, say that you have a MySQL database machine blueprint that provides a service on port 3306.
The application tier machines need to access this database, but the web tier machines do not. Under the
Security Policy section of the Configure Property Group workflow, you create a policy with the "app" tier
as the consumer, listing port 3306 as permissible (everything else is denied by default) and the blueprint will
automatically place the "db" tier as the provider.
The "app" tier also must provide a service; in this example a server is listening on port 8000. The web tier
will then consume this service. The security policy must be specified in the "app" tier property group.

Note Machine prefixes generate a unique name for each virtual machine that is deployed. An example prefix
for a tenant named "Green" could be "green-web-", plus three unique digits for each machine. The sequence
would be: "green-web-001", "green-web-002", "green-web-003", and so on. It is important that you follow
a similar scheme with your machine prefixes so that the Application Policy Infrastructure Controller
(APIC) plug-in can accurately predict the name of the consumer endpoint group. Additionally, every
machine must be on the same prefix number. For example, the names for a 3-tier app must be: green-db-001,
green-app-001, and green-web-001. If any tier were not aligned, the security policy would fail to form a
correct relationship. This is a requirement because vRealize does not provide the name of the sibling tiers,
so the plug-in must infer the siblings' names based on its own name.
When configuring a security policy under a property group, the consumer name should be the second
word of the machine prefix. For the example prefix "green-web-", the consumer name would be "web".

This section describes how to deploy a 3-tier application using a multi-machine blueprint.

Procedure

Step 1 Connect to the vRealize Automation appliance by pointing your browser to the following URL:
https://appliance_address/vcac/org/tenant_id

Step 2 Enter the tenant administrator username and password.


Step 3 Choose Catalog.
Step 4 Click Configure Property Group.

Cisco ACI Virtualization Guide, Release 2.2(2)


186
Cisco ACI with VMware vRealize
Overview of Tier Application Deployment

You will configure the database tier.

Step 5 Click Request.


Step 6 In the Request Information tab, enter a description of the request.
Step 7 Click Next.
Step 8 In the Common tab, perform the following actions:
a) In the IaaS Host for vRealize field, click Add.
b) Put a check in the box next to the desired IaaS host.
c) Click Submit.
d) In the APIC Tenant field, click Add.
e) Expand apic_name > Tenants.
f) Put a check in the box next to the desired tenant's name.
Example:
green

g) Click Submit.
h) In the Property Group Name field, enter a name for the property group.
Example:
green-db-mm

i) In the VMM Domain/DVS field, click Add.


j) Expand apic_name > Vcenters > vcenter_name
k) Put a check in the box next to the desired vCenter's name.
Example:
green

l) Click Submit.
Step 9 Click Next.
Step 10 In the VM Networking tab, leave all of the fields at their default values.
Step 11 Click Next.
Step 12 In the Security tab, perform the following actions:
a) In the Configure Security Policy drop-down list, choose Yes.
b) In the Consumer Network/EPG Name of Security Policy field, enter the name of the consumer network,
without the full machine prefix.
Example:
app

The database tier must have the application tier as the consumer.
c) In the Starting Port Number in Security Policy field, enter the starting port number.
Example:
3306

d) In the Ending Port Number in Security Policy field, enter the ending port number.
Example:
3306

Cisco ACI Virtualization Guide, Release 2.2(2)


187
Cisco ACI with VMware vRealize
Overview of Tier Application Deployment

e) For the other fields, leave their values at the defaults.


Step 13 Click Next.
Step 14 In the Load Balancer tab, leave the field at its default value.
Step 15 Click Next.
Step 16 In the Firewall tab, leave the field at its default value.
Step 17 Click Submit.
Step 18 Click OK.
Step 19 Click Configure Property Group.
This time, you will configure the application tier.

Step 20 Click Request.


Step 21 In the Request Information tab, enter a description of the request.
Step 22 Click Next.
Step 23 In the Common tab, perform the following actions:
a) In the IaaS Host for vRealize field, click Add.
b) Put a check in the box next to the desired IaaS host.
c) Click Submit.
d) In the APIC Tenant field, click Add.
e) Expand apic_name > Tenants.
f) Put a check in the box next to the desired tenant's name.
Example:
green

g) Click Submit.
h) In the Property Group Name field, enter a name for the property group.
Example:
green-app-mm

i) In the VMM Domain/DVS field, click Add.


j) Expand apic_name > Vcenters > vcenter_name
k) Put a check in the box next to the desired vCenter's name.
Example:
green

l) Click Submit.
Step 24 Click Next.
Step 25 In the VM Networking tab, leave all of the fields at their default values.
Step 26 Click Next.
Step 27 In the Security tab, perform the following actions:
a) In the Configure Security Policy drop-down list, choose Yes.
b) In the Consumer Network/EPG Name of Security Policy field, enter the name of the consumer network,
without the full machine prefix.
Example:
web

The application tier must have the web tier as the consumer.

Cisco ACI Virtualization Guide, Release 2.2(2)


188
Cisco ACI with VMware vRealize
Overview of Tier Application Deployment

c) In the Starting Port Number in Security Policy field, enter the starting port number.
Example:
8000

d) In the Ending Port Number in Security Policy field, enter the ending port number.
Example:
8000

e) For the other fields, leave their values at the defaults.


Step 28 Click Next.
Step 29 In the Load Balancer tab, leave the field at its default value.
Step 30 Click Next.
Step 31 In the Firewall tab, leave the field at its default value.
Step 32 Click Submit.
Step 33 Click OK.
Step 34 Click Configure Property Group.
You will configure the web tier.

Step 35 Click Request.


Step 36 In the Request Information tab, enter a description of the request.
Step 37 Click Next.
Step 38 In the Common tab, perform the following actions:
a) In the IaaS Host for vRealize field, click Add.
b) Put a check in the box next to the desired IaaS host.
c) Click Submit.
d) In the APIC Tenant field, click Add.
e) Expand apic_name > Tenants.
f) Put a check in the box next to the desired tenant's name.
Example:
green

g) Click Submit.
h) In the Property Group Name field, enter a name for the property group.
Example:
green-web-mm

i) In the VMM Domain/DVS field, click Add.


j) Expand apic_name > Vcenters > vcenter_name
k) Put a check in the box next to the desired vCenter's name.
Example:
green

Cisco ACI Virtualization Guide, Release 2.2(2)


189
Cisco ACI with VMware vRealize
About Plan Types

l) Click Submit.
Step 39 Click Next.
Step 40 In the VM Networking tab, leave all of the fields at their default values.
Step 41 Click Next.
Step 42 In the Security tab, leave the field at its default value.
Because this is a consumer policy, you do not need to configure the security policy.

Step 43 Click Next.


Step 44 In the Load Balancer tab, leave the field at its default value.
Step 45 Click Next.
Step 46 In the Firewall tab, leave the field at its default value.
Step 47 Click Submit.
Step 48 Click OK.

About Plan Types


The administrator creates the plan with their own values. The plan types are as follows:
Shared Infrastructure Virtual Private Cloud (VPC)
Isolated Networks Yes Yes

Firewall Yes Yes

Provider DHCP Yes Yes

Shared Load Balancer Yes Yes

Public Internet Access Yes Yes

Shared Services between Tenants Yes Yes

Bring your own address space No Yes


(Private Address Space) and DHCP
Server

About vRealize Service Categories and Catalog Items


This section describes the vRealize services categories and catalog items. The list of all catalog items they
are grouped into services and each of these services are assigned an entitlement. ACI entitlement is assigned
to certain users.
For more information, see ACI Administrator Services in vRealize, on page 193.
For more information, see ACI Tenant Services in vRealize, on page 196.

Cisco ACI Virtualization Guide, Release 2.2(2)


190
Cisco ACI with VMware vRealize
About vRealize Service Categories and Catalog Items

For more information, see Entitlements for ACI catalog-items in vRealize, on page 200.

Mapping of the ACI Plan Types to vRealize Service Categories


This section shows the mapping of the ACI plan types to vRealize service categories.

Figure 15: vRA - User, Entitlements, Services and Blueprints

Cisco ACI Virtualization Guide, Release 2.2(2)


191
Cisco ACI with VMware vRealize
About vRealize Service Categories and Catalog Items

vRA Catalog Category List of Blueprints


Admin service blueprints Add APIC with Admin credentials
Add APIC with Tenant credentials
Add Provider for Shared Service (Contract)
Add or Update Tenant
Add VIP Pool
Add VMM Domain, AVS Local Switching with Vlan Encap
Add VMM Domain, AVS Local Switching with Vxlan Encap
Add VMM Domain, AVS No Local Switching
Add VMM Domain, DVS and Vlan Pool
Add or Delete Bridge Domain in Tenant-common
Add or Delete Consumer for Shared Service (Contract)
Add or Delete L3 context (VRF) in Tenant-common
Add or Delete Router Id
Add or Delete Subnets in Bridge Domain for Tenant-Common
Update FW Policy (DFW) association to AVS VMM Domain
Configure Property Group
Create FW Policy (DFW) and Associate to AVS VMM Domain
Delete APIC
Delete FW Policy (DFW)
Delete Provider Shared Service (Contract)
Delete Tenant
Delete VIP Pool
Delete VMM Domain, AVS and Multicast Pool
Delete VMM Domain, AVS and Vlan Pool
Delete VMM Domain, AVS Mixed Mode
Delete VMM Domain, DVS and Vlan Pool
Generate and Add Certificate to APIC
Rest API
Update FW Policy (DFW)
Update Vlan Pool (encap blocks)
Update Multicast Pool, AVS
Update Vlan Pool, AVS
Update VMM Domain DVS security domain mapping
Update AVS VMM Domain Security Domain Mapping

Tenant Shared Plan service Add a Useg Network - Shared Plan


Add FW and LB to Tenant Network - Shared Plan
blueprints Add FW to Tenant Network - Shared Plan
Add Loadbalancer to Tenant Network - Shared plan
Add Tenant Network - Shared plan
Delete a Useg Network - Shared Plan
Delete FW and LB from Tenant Network - Shared Plan
Delete FW from Tenant Network - Shared Plan
Delete Loadbalancer from Tenant Network - Shared Plan
Delete Tenant Network - Shared plan

Tenant VPC Plan service Add a Useg Network - VPC Plan


Add FW and LB to Tenant Network - VPC Plan
blueprints Add FW to Tenant Network - VPC Plan
Add Loadbalancer to Tenant Network - VPC plan
Add Tenant Network - VPC plan
Delete a Useg Network - VPC Plan
Delete FW and LB from Tenant Network - VPC Plan
Delete Loadbalancer from Tenant Network - VPC Plan
Delete Tenant Network - VPC plan

Network Security service Add Security Policy (Contracts)


Delete Security Policy (Contracts)
blueprints Update Access List Security Rules

Tenant Network Service Add or Delete Bridge domain in Tenant


Add or Delete L3 Context (VRF) in Tenant
blueprints Add or Delete Subnets in Bridge domain
Add or Delete Useg Attribute
Attach or Detach L3 external connectivity to Network
Update Tenant Network

Cisco ACI Virtualization Guide, Release 2.2(2)


192
Cisco ACI with VMware vRealize
ACI Administrator Services in vRealize

ACI Administrator Services in vRealize


This section describes the ACI Administrator Services in vRealize.

List of Admin Services Catalog Items for ACI Administrator Services


This section provides a list of the admin services catalog items for ACI administrator services.

Catalog Item Description


Add APIC with Tenant Credentials This creates the Application Policy Infrastructure
Controller (APIC) handle with tenant credentials.

Add APIC with Admin Credentials This creates the APIC handle with Admin credentials.

Add or Delete Bridge Domain in Tenant-common This adds or deletes the bridge domain in
tenant-common.

Add or Delete Consumer for Shared Service This adds or deletes consumer for shared service
(Contract) (Contract).

Add or Delete L3 context (VRF) in Tenant-common This adds or deletes Layer 3 context (VRF) in
tenant-common.

Add or Delete Subnets in Bridge Domain for This adds or deletes subnets in the bridge domain for
Tenant-Common tenant-common.

Add Provider for Shared Service (Contract) This adds provider for shared service (Contract).

Add or Delete Router Id This adds or deletes the router Id.

Add or Update Tenant This adds or updates a tenant.


If the tenant wants to use the Firewall between EPGs,
set "Enable inter-EPG Firewall" to Yes. Also the
number application tiers should be set. To use typical
3-tier web, app, db application the number of tiers
should be set to 3.

Add VIP Pool This adds the Virtual IP Pool.

Configure Property Group This configures the property group.

Delete APIC This deletes the APIC.

Delete Provider Shared Service (Contract) This deletes the provider shared service (Contract).

Delete Tenant This deletes a tenant.

Delete VIP Pool This deletes the Virtual IP Pool.

Cisco ACI Virtualization Guide, Release 2.2(2)


193
Cisco ACI with VMware vRealize
ACI Administrator Services in vRealize

Catalog Item Description


Generate and Add Certificate to APIC This blueprints can be used to generate a certificate
for a given user. This certificate then be used in the
certificate based access to APIC.

REST API This is the REST API.

This section provides a list of the admin services catalog items for ACI administrator services for the VMM
domain type DVS.

Catalog Item Description


Add VMM Domain, DVS and VLAN Pool This adds VMM Domain, DVS, and VLAN Pool.
Ensure all hosts of the data-center that has the APIC
created DVS in vCenter, must have at least one
physical NIC attached. This ensures that the
port-groups of the DVS are available for virtual NIC
placements.

Delete VMM Domain, DVS, and VLAN Pool This deletes the VMM Domain, DVS and VLAN
Pool.

Update Vlan Pool (encap blocks) This updates the Vlan Pool (encap blocks).

Update VMM Domain DVS security domain mapping This updates the VMM Domain DVS security domain
mapping.

This section provides a list of the admin services catalog items for ACI administrator services for the VMM
domain type Cisco AVS.

Catalog Item Description


Add VMM Domain, AVS Local Switching with Vlan This creates a VMM domain in Cisco APIC with
Encap VLAN as the default encapsulation mode. It also
creates a VLAN pool and multicast address pool (in
the case of mixed mode). This item also creates an
associated Cisco AVS with local switching in
vCenter.
Note While creating a VMM domain for Cisco
AVS using vRealize, from the DVS Version
drop-down list, choose vCenter Default for
DVS 6.5 and later versions.

Cisco ACI Virtualization Guide, Release 2.2(2)


194
Cisco ACI with VMware vRealize
ACI Administrator Services in vRealize

Catalog Item Description


Add VMM Domain, AVS Local Switching with This creates a VMM domain in Cisco APIC with
Vxlan Encap VXLAN as the default encapsulation mode. It also
creates a multicast address pool and VLAN pool (in
the case of mixed mode). This item also creates an
associated Cisco AVS with local switching in
vCenter.
Note While creating a VMM domain for Cisco
AVS using vRealize, from the DVS Version
drop-down list, choose vCenter Default for
DVS 6.5 and later versions.
Add VMM Domain, AVS No Local Switching This adds VMM domain, multicast address pool in
Cisco APIC and creates an associated Cisco AVS
with no local switching in vCenter.
Note While creating a VMM domain for Cisco
AVS using vRealize, from the DVS Version
drop-down list, choose vCenter Default for
DVS 6.5 and later versions.
Update Multicast Pool, AVS This updates the multicast pool for Cisco AVS VMM
domain.

Update VLAN Pool, AVS This updates the VLAN pool for the Cisco AVS
VMM domain.

Update AVS VMM Domain Security Domain This updates the security domain mapping of the
Mapping Cisco AVS VMM domain.

Delete VMM Domain, AVS and Multicast Pool This deletes the VMM domain and VLAN pool in
Cisco APIC and deletes the associated Cisco AVS in
vCenter.
Delete VMM Domain, AVS and VLAN Pool This deletes the VMM domain and VLAN pool in
Cisco APIC and deletes the associated Cisco AVS in
vCenter.

Delete VMM Domain, AVS Mixed Mode This deletes the VMM domain and associated VLAN,
and multicast address pool in Cisco APIC and deletes
the associated Cisco AVS in vCenter.

Create FW Policy (DFW) and Associate to AVS This creates a Distributed Firewall policy and
VMM Domain associates it to the Cisco AVS VMM domain.

Update FW Policy (DFW) association to AVS VMM This associates/dissociates an existing Distributed
Domain Firewall policy to the Cisco AVS VMM domain.

Update FW Policy (DFW) This updates the existing Distributed Firewall Policy.

Delete FW Policy (DFW) This deletes the existing Distributed Firewall Policy.

Cisco ACI Virtualization Guide, Release 2.2(2)


195
Cisco ACI with VMware vRealize
ACI Tenant Services in vRealize

To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
2 Choose a request, enter the information in the fields and click Submit.

To view your request:


1 In the vRealize Automation GUI, choose Requests.
2 Choose the request you submitted and click view details.

ACI Tenant Services in vRealize


This section describes the ACI tenant services in the vRealize.

List of Network Security Catalog Items for ACI Tenant Services


This section provides a list of the Network Security catalog items for ACI tenant services.

Catalog Item Description


Add Security Policy (Contracts) This creates the security policy between tenant
networks. For example: APIC contracts between
consumer EPG and provider EPG.

Delete Security Policy (Contracts) This deletes the security policy between tenant
networks. For example: APIC contracts between
consumer EPG and provider EPG.

Update Access List Security Rules This adds or removes access list rules associated with
a Security Policy Filter created in APIC (using Add
Security Policy (Contracts)). The access list rules are
of the format <source-port, destination-port, protocol,
ethertype>.
Note The Source and Dest Ports are not allowed
for arp, icmp, icmpv6 rules. Ports are valid
only for tcp and udp protocols. The access
list rules are deployed and enforced in ACI
fabric and they are stateless in nature.
In addition this blueprint also has an option to update
the stateful firewall rules on a Firewall appliance such
as Cisco-ASA for a specific service graph that is
provided as an input.

To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > Network Security.
2 Choose a request, enter the information in the fields and click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


196
Cisco ACI with VMware vRealize
ACI Tenant Services in vRealize

To view your request:


1 In the vRealize Automation GUI, choose Requests.
2 Choose the request you submitted and click view details.

List of Tenant Network Services Catalog Items for ACI Tenant Services
The following table lists the Tenant Network Services catalog items for ACI tenant services. You must log
in to the tenant portal with tenant administrator privileges to execute the Tenant Network Services catalog
items.

Catalog Item Description


Add or Delete Bridge Domain in Tenant This adds or deletes the bridge domain in tenant.

Add or Delete L3 Context (VRF) in Tenant This adds or deletes Layer 3 context (VRF) in tenant.

Add or Delete Subnets in Bridge domain This adds or deletes subnets in the bridge domain.

Attach or Detach L3 external connectivity to Network This attaches or detaches Layer 3 external
connectivity to the network.

Update Tenant Network This updates the tenant network.

The following table lists the Tenant Network Services catalog items for VMM domain of type Cisco AVS
only. You must log in to the tenant portal with tenant administrator privileges to execute the Tenant Network
Services catalog items.

Catalog Item Description


Add or Delete Useg Attribute This adds or deletes an attribute for a microsegment
EPG.

To submit a request:
1 Log in to the vRealize Automation as tenant admin, choose Catalog > Tenant Network Services.
2 Choose a request, enter the information in the fields and click Submit.

To view your request:


1 In the vRealize Automation GUI, choose Requests.
2 Choose the request you submitted and click view details.

List of Tenant Shared Plan Catalog Items for ACI Tenant Services
The following table lists the Tenant Shared Plan catalog items for ACI tenant services. You must log in to
the tenant portal with tenant administrator privileges to execute the Tenant Shared Plan catalog items.

Cisco ACI Virtualization Guide, Release 2.2(2)


197
Cisco ACI with VMware vRealize
ACI Tenant Services in vRealize

Catalog Items Description


Add Tenant Network This adds the tenant network in a shared plan.

Add FW and LB to Tenant Network - Shared Plan This adds a firewall and load balancer to the tenant
network in a shared plan.

Add FW to Tenant Network - Shared Plan This adds a firewall to the tenant network in a shared
plan.

Add Load Balancer to Tenant Network - Shared Plan This adds load balancer to the tenant network in a
shared plan.

Delete FW and LB from Tenant Network - Shared This deletes the firewall and load balancer from the
Plan tenant network in a shared plan.

Delete FW from Tenant Network - Shared Plan This deletes the firewall from the tenant network in
a shared plan.

Delete Load Balancer from Tenant Network - Shared This deletes load balancer from the tenant network
Plan in a shared plan.

Delete Tenant Network - Shared Plan This deletes the tenant network in a shared plan.

The following table lists the Tenant Shared Plan catalog items for VMM domain of type Cisco AVS only.
You must log in to the tenant portal with tenant administrator privileges to execute the Tenant Shared Plan
catalog items.

Catalog Item Description


Add a Useg Network - Shared Plan This adds a microsegment EPG in a shared plan.

Delete a Useg network - Shared Plan This deletes a microsegment EPG in a shared plan.

To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
2 Choose a request, enter the information in the fields and click Submit.

To view your request:


1 In the vRealize Automation GUI, choose Requests.
2 Choose the request you submitted and click view details.

Cisco ACI Virtualization Guide, Release 2.2(2)


198
Cisco ACI with VMware vRealize
ACI Tenant Services in vRealize

Note Symptom: You might see errors in the VMware vCenter during the deletion of the service graph through
the vRealize Automation (vRA) workflow.
Condition: During the deletion of the service graph, if a port group is deleted before service devices such
as VPX or F5 are configured, then these errors are seen. This sequence cannot be controlled through vRA.
Workaround: There is no workaround. These errors are transitory and will stop once the reconfiguration
of the service devices is done.

List of Tenant VPC Plan Catalog Items for ACI Tenant Services
The following table lists the Tenant Virtual Private Cloud (VPC) Plan catalog items for ACI tenant services.
You must log in to the tenant portal with tenant administrator privileges to execute the Tenant VPC Plan
catalog items

Catalog Item Description


Add Tenant Network - VPC Plan This adds the tenant network in a VPC plan.

Add FW and LB to Tenant Network - VPC Plan This adds the firewall and load balancer to the tenant
network in a VPC plan.

Add FW to Tenant Network - VPC Plan This adds the firewall to the tenant network in a VPC
plan.

Add Load-balancer to Tenant Network - VPC Plan This adds the load balancer to tenant network in a
VPC plan.

Delete FW and LB from Tenant Network - VPC Plan This deletes the firewall and load balancer from tenant
network in a VPC plan.

Delete Load-balancer from Tenant Network - VPC This deletes load balancer from tenant network in a
Plan VPC plan.

Delete Tenant Network - VPC Plan This deletes the tenant network in a VPC plan.

The following table lists the Tenant VPC Plan catalog items for VMM domain of type Cisco AVS only. You
must log in to the tenant portal with tenant administrator privileges to execute the Tenant VPC Plan catalog
items.

Catalog Item Description


Add a Useg Network - VPC plan This adds a microsegment EPG in a VPC plan.

Delete a Useg Network - VPC plan This deletes a microsegment EPG in a VPC plan.

To submit a request:

Cisco ACI Virtualization Guide, Release 2.2(2)


199
Cisco ACI with VMware vRealize
Entitlements for ACI catalog-items in vRealize

1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
2 Choose a request, enter the information in the fields and click Submit.

To view your request:


1 In the vRealize Automation GUI, choose Requests.
2 Choose the request you submitted and click view details.

List of VM Services Catalog Items for ACI Tenant Services


This section provides a list of the VM services catalog items for ACI tenant services.
This service category has the tenant catalog items based on single machine and multi-machine blueprints. For
example, for typical three tier application, it contains 3 catalog items "Web", "App", "Db" using single-machine
blueprints and 1 catalog item "Web-App-Db" using multi-machine blueprint.

Catalog Item Description


App This is the application VM.

Db This is the database VM.

Test This is the single-machine VM blueprint for testing


property groups.

Web This is the web VM.

Web-Db-App This multi-machine blueprint creates a 3-tier


application, load balancer attached to the Web tier
and the security policy configuration.

To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > VM Services.
2 Choose a request, enter the information in the fields and click Submit.

To view your request:


1 In the vRealize Automation GUI, choose Requests.
2 Choose the request you submitted and click view details.

Entitlements for ACI catalog-items in vRealize


This section describes the entitlements for ACI catalog-items in vRealize. Each service category must have
an entitlement. Entitlement enables the catalog items to be available for the users.

Cisco ACI Virtualization Guide, Release 2.2(2)


200
Cisco ACI with VMware vRealize
ACI Plug-in in vRealize Orchestrator

You can create and manage entitlements to control the access to the catalog items, actions, and specify the
approval policies to apply the catalog requests. You can update the priority of the entitlement to determine
which approval policy applies to a particular request.

List of Entitlements for ACI Catalog Items


This section provides a list of the entitlements for ACI catalog items.

Name
VMs Entitlements

Admin Entitlements

Tenant Shared Plan Entitlements

Tenant VPC Plan Entitlements

Common Network Services Entitlements

Tenant Network Services Entitlements

Tenant-common Network Services

Network Security Entitlements

To edit an entitlement:
1 Log in to the vRealize Automation as admin, choose Administration > Catalog Management >
Entitlements.
2 Choose an entitlement to edit, enter the information in the fields and click Update.

ACI Plug-in in vRealize Orchestrator


The service category and the catalog item maps to a workflow.

APIC Workflows
These are the service categories and the catalog items and each catalog items is implemented as a workflow
in the vRealize Orchestrator and the catalog items parameter are exactly same as the workflow parameters.

Service Categories Description


Admin Services Admin catalog-items to be executed by the global
administrator

Network Security Catalog-items for configuring security policies

Cisco ACI Virtualization Guide, Release 2.2(2)


201
Cisco ACI with VMware vRealize
ACI Plug-in in vRealize Orchestrator

Service Categories Description


Tenant Network Services For configuring network services (bridge-domain,
subnets)

Tenant Shared Plan For configuring EPG/networks, microsegment EPGs,


consuming load balancer, and firewall services in
shared mode

Tenant VPC Plan For configuring EPG/networks, microsegment EPGs,


consuming load balancer, and firewall services in
VPC mode

VM Services Single-machine and multi-machine blueprints


configured with ACI property groups

APIC Inventory View


In the Inventory view of the vRealize Orchestrator GUI, the Cisco APIC Plugin is a read only view. The Cisco
APIC Plugin for vRealize Orchestrator maps to the APIC. For example, if you look at an object in the vRealize

Cisco ACI Virtualization Guide, Release 2.2(2)


202
Cisco ACI with VMware vRealize
About Load Balancing and Firewall Services

Orchestrator GUI it provides the MultiApicDn in the APIC GUI.

About Load Balancing and Firewall Services


VLAN, virtual routing and forwarding (VRF) stitching is supported by traditional service insertion models,
the Application Policy Infrastructure Controller (APIC) can automate service insertion while acting as a central
point of policy control. The APIC policies manage both the network fabric and services appliances. The APIC
can configure the network automatically so that traffic flows through the services. The APIC can also
automatically configure the service according to the application's requirements, which allows organizations
to automate service insertion and eliminate the challenge of managing the complex techniques of traditional
service insertion.
Perimeter Firewall is typically used to provide state-full firewall services for all incoming external traffic to
the application. Once the traffic passes the firewall, another typical service that is inserted is the load balancing.
The external traffic is sent towards, a virtual IP. The load balancer terminates this traffic and load balances
the incoming traffic among the available servers (such as web servers) behind the load balancers.
See the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide for more information.
APIC vRealize plug-in can be used to create new multi-tier applications while inserting the load balancer
and/or firewall services for the traffic between them or it can be used to insert the firewall and load-balancer
services for traffic between existing application end-point groups. For creating a multi-tier application with

Cisco ACI Virtualization Guide, Release 2.2(2)


203
Cisco ACI with VMware vRealize
About Load Balancing and Firewall Services

L4-7 services, a property group has to be created using "Configure Property Group" catalog-item in the "Admin
Services". In addition of L4-7 services between existing application end-point groups can be done by choosing
the appropriate catalog-item from the "Tenant Shared Services" items.

Note In this release, only support for Shared-Plan is supported for Load balancer and Firewall services.

Prerequisites for Enabling Services


This section describes the prerequisites for enabling services.
You must perform the following tasks to deploy Layer 4 to Layer 7 services using the APIC vRealize plug-in:
Device package for load balancer needs to be uploaded by APIC admin.
Use the link to download the required Citrix, F5, and Cisco ASA device packages:
http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/
application-centric-infrastructure/solution-overview-c22-734587.html
Ensure the device package version is certified for the APIC release that you are using.
Device cluster for load balancer, firewall needs to be created in tenant "common" by APIC-admin. Citrix
and F5 are the supported vendors for load balancers. Cisco ASA is the supported vendor for firewall.
For stand-alone firewall or load balancer service, a service graph template with single node must be
configured. For the firewall and load balancer service, a service graph template with two nodes must be
configured.
For the abstract service graph, the firewall node (vnsAbsNode) must be named FW, and the load balancer
node must be named SLB.
For the load balancer only abstract service graph name (vnsAbsGraph) should be same as the load
balancer device cluster (vnsLdevVip).
For the load balancer only service, the consumer L3 connectivity policy must be configured in the
"default" VRF of the tenant common.
For the firewall, the consumer L3 connectivity policy must be configured in the separate VRF ("outside")
of the tenant common.
The firewall device needs to be deployed in the routed mode. For firewall device connectivity, two
additional L3 connectivity policy must be configured. One must be configured in the "outside" VRF,
and is used as the external connection to the firewall device. The other must be configured in the "default"
VRF and is used as the internal connection to the firewall device. These two L3 connectivity policies,
attached to the firewall enables the firewall to do the VRF stitching and re-direct the traffic appropriately
between the VRFs. The administrator has to ensure that appropriate prefixes with the correct import and
export flags are configured under the L3 external connectivity policies.
The following convention should be used when configuring the L3 connectivity policies. For the L3
connectivity policy should be named as L3ExtName, the child L3 instance should be named as
L3ExtNameInst.
The interface IP addresses that are used on the firewall and load balancer devices need to be configured
in the abstract graph.

Cisco ACI Virtualization Guide, Release 2.2(2)


204
Cisco ACI with VMware vRealize
About Load Balancing and Firewall Services

For the 2-node abstract graph, an access list to permit all traffic needs to be configured for the firewall
node.

Configuring the Services on APIC Using XML POST


Only the administrator can configure and post the XML POST. The template POSTs are located in the
apic-vrealize package under the services directory.

Before You Begin


The device package file should be uploaded on the Application Policy Infrastructure Controller (APIC).
See the Cisco APIC Layer 4 to Layer 7 Device Package Development Guide for more information.
The tenant common should have the two bridge domains named "default" and "vpcDefault". Ensure that
the subnets being used by the tenant who is consuming the load balancer are added to these bridge
domains. Typically you would have created these bridge domains and subnets while setting up the DHCP
infrastructure for vRealize tenants.
For a non-Virtual Private Cloud (VPC) plan, the backend interface of the load balancer should be placed
in the default EPG under the tenant common that was created above. For a VPC plan, the EPG should
be "vpcDefault".
Ensure that the VIP subnet is linked with L3. One VIP per EPG will be allocated from the VIP pool
associated with the tenant.
Prerequisites for the service scripts:
Python 2.7
Python libraries:
jinja2
yaml
glob
json
requests
xml
re

Procedure

Step 1 Use the following link to download the required device packages Citrix, F5, and ASA. Ensure that the device
package version is certified for the APIC release that you are using. Store the device package zip files in this
directory:
http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/
solution-overview-c22-734587.html

Cisco ACI Virtualization Guide, Release 2.2(2)


205
Cisco ACI with VMware vRealize
About Load Balancing and Firewall Services

Step 2 Replace the VENDOR-DEVICE-PACKAGE.zip entries in the shared.cfg or vpc.cfg file with the
correct device package files.
Step 3 Edit the setup.yaml file and change the variables to according to your setup.
The template variables in the setup.yaml file are:
TEMPLATE_VARS:
VCENTER: "vcenter1"
ASA_IP: "1.1.1.1"
ASA_CLUSTER: "AsaCluster1"
ASA_VM: "asav-service5"
OUTSIDE_CTX: "outside"
INSIDE_CTX: "default"
FW_GRAPH: "FWOnlyGraph"
FW_SLB_GRAPH: "FWAndSLBGraph"
BD_WEB: "default"
CITRIX_MGMT_IP: "1.1.1.1"
FW_NODE: "FW"
SLB_NODE: "SLB"
CITRIX_GRAPH: "CitrixCluster1_L3"
CITRIX_CLUSTER: "CitrixCluster1_L3"
CITRIX_GRAPH: "CitrixCluster1_L3"
CITRIX_VM: "NS-service4"
F5_BD: "F5Cluster1_L3"
F5_EPG: "F5Cluster1_L3"
F5_CLUSTER: "F5Cluster1_L3"
F5_MGMT_IP: "1.1.1.1"
F5_GRAPH: "F5Cluster1_L3"
F5_ABS_NODE: "SLB"
# Use deleted to generate the "deleted" version of the posts
# STATUS: "deleted"
STATUS: ""

Step 4 Enter the following commands:


For Shared Plan:

Example:
../jinja.py setup.yaml tn-common-template.xml > tn-common.xml
../jinja.py setup.yaml Shared-Plan-Citrix-graph-template.xml > Shared-Plan-Citrix-graph.xml
../jinja.py setup.yaml Shared-Plan-F5-graph-template.xml > Shared-Plan-F5-graph.xml

For VPC Plan:

Example:
../jinja.py setup.yaml VPC-tn-common-template.xml > VPC-tn-common.xml
../jinja.py setup.yaml VPC-Plan-Citrix-LB-graph-template.xml > VPC-Plan-Citrix-LB-graph.xml
../jinja.py setup.yaml VPC-Plan-F5-LB-graph-template.xml > VPC-Plan-F5-LB-graph.xml

If you see python errors, ensure that the prerequisite python libraries are installed in the system.

Step 5 Edit the shared.cfg or vpc.cfg file and set the values for hosts: <YOUR_APIC_IP> and passwd:
<YOUR_APIC_ADMIN_PASSWD>.
Sample of the shared.cfg file:

Cisco ACI Virtualization Guide, Release 2.2(2)


206
Cisco ACI with VMware vRealize
About Load Balancing and Firewall Services

Example:
host: <YOUR_APIC_IP>:443
name: admin
passwd: <YOUR_APIC_ADMIN_PASSWD>
tests:
- type: file
path: /ppi/node/mo/.xml
# file: asa-device-pkg-1.2.2.1.zip
# Replace actual ASA Device package file in the line below
file: ASA-DEVICE-PACKAGE.zip
wait: 2
- type: file
path: /ppi/node/mo/.xml
# file: CitrixNetscalerPackage.zip
# Replace actual Citrix Device package file in the line below
file: CITRIX-DEVICE-PACKAGE.zip
wait: 2
- type: file
path: /ppi/node/mo/.xml
# file: CitrixNetscalerPackage.zip
# Replace actual F5 Device package file in the line below
file: F5-DEVICE-PACKAGE.zip
wait: 2
- type: xml
path: /api/node/mo/.xml
file: tn-common.xml
wait: 0
- type: xml
path: /api/node/mo/.xml
file: Shared-Plan-Citrix-graph.xml
wait: 0
- type: xml
path: /api/node/mo/.xml
file: Shared-Plan-F5-graph.xml
wait: 0

Step 6 Post the templates.


For Shared Plan, enter the following command:

Example:
../request.py shared.cfg

For VPC Plan, enter the following command:

Example:
../request.py vpc.cfg

Deleting the Services Configuration


This section describes how to delete the services configuration. Only the administrator can configure and post
the XML POST. The template POSTs are located in the apic-vrealize package under the services
directory.

Cisco ACI Virtualization Guide, Release 2.2(2)


207
Cisco ACI with VMware vRealize
About L3 External Connectivity

Procedure

Step 1 Edit the shared.cfg file and set the values for hosts: <YOUR_APIC_IP> and passwd:
<YOUR_APIC_ADMIN_PASSWD>.
Step 2 Edit the setup.yaml file and set the STATUS variable to deleted to generate the deleted version of the
posts.
Step 3 Run the following commands:
./jinja.py setup.yaml tn-common-template.xml > tn-common-del.xml
./jinja.py setup.yaml Shared-Plan-Citrix-graph-template.xml > Shared-Plan-Citrix-graph-del.xml
./jinja.py setup.yaml Shared-Plan-F5-graph-template.xml > Shared-Plan-F5-graph-del.xml

Step 4 Post the templates:


./request.py shared_del.cfg

About L3 External Connectivity


Layer 3 (L3) external connectivity is an Cisco Application Centric Infrastructure (ACI) feature to connect
ACI fabric to an external network by L3 routing protocols, including static routing, OSPF, EIGRP, and BGP.
By setting up L3 external connectivity for vRealize, it allows a tenant network to initiate outgoing traffic
destined outside the fabric and to attract traffic from outside. The assumption of this feature is the tenant
virtual machine IP addresses are visible outside the fabric without NAT, ACI L3 external connectivity does
not include NAT.

Prerequisites for Configuring L3 External Connectivity for vRealize


To configure Layer 3 (L3) external connectivity for vRealize, you must meet the following prerequisites:
Ensure you have logged in to the Application Policy Infrastructure Controller (APIC) GUI, on the menu
bar, choose TENANT > common.
Create a l3ExtOut called default, refer to BD default.
Create l3extInstP name="defaultInstP" under the l3ExtOut. This is to be used by shared service
tenants.

See Cisco APIC Basic Configuration Guide for L3 external connectivity configuration.
Ensure you have logged in to the APIC GUI, on the menu bar, choose TENANT > common.
Create a l3ExtOut called "vpcDefault", refer to BD "vpcDefault".
Create l3extInstP name="vpcDefaultInstP" under this l3ExtOut.
This is to be used by VPC tenants.

See Cisco APIC Basic Configuration Guide for configuring external connectivity for tenants.
vRealize leverages the common l3ExtOut configuration with no special requirement other than the
naming convention highlighted above

Cisco ACI Virtualization Guide, Release 2.2(2)


208
Cisco ACI with VMware vRealize
Administrator Experiences

Administrator Experiences

Cisco ACI with Cisco AVS


See the Chapter "Cisco ACI with Cisco AVS" in the latest version of the Cisco ACI Virtualization Guide.

Cisco AVS VMM Domain Creation


You can create VMM domains for Cisco AVS using VLAN or VXLAN encapsulation or with no local
switching.
Beginning with Cisco APIC Release 2.1(1), you can mix encapsulation modes. That is, you can configure a
VMM domain to use VLAN or VXLAN and later add EPGs that override the domain's default encapsulation.
For details, see the section "Mixed-Mode Encapsulation Configuration" in the Cisco Application Virtual
Switch Configuration Guide.
You also can create a Cisco AVS VMM domain with no local switching. In local switching mode, all traffic
is forwarded by the leaf, and VXLAN is the only allowed encapsulation type. See the Cisco Application
Virtual Switch Installation Guide .
After you create a Cisco AVS VMM domain, you can update the domain's encapsulation pools and delete the
Cisco AVS and VMM domain.

Creating a Cisco AVS VMM Domain with Default VLAN Encapsulation


This section shows how to create a Cisco AVS VMM domain in mixed mode, supporting both VLAN and
VXLAN encapsulation with VLAN as the default encapsulation mode. Because the default mode is VLAN,
the steps in the GUI for the following procedure for configuring VXLAN configuration are optional. The
VXLAN-related inputs are AVS Fabric-wide Multicast Address, Multicast Address Start, and Multicast
Address End.

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Add VMM Domain, AVS Local Switching with Vlan Encap.
Step 3 In the New Request dialog box, complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Domain/AVS name field, enter the VMM domain name.
d) In the AAEP Name field, enter an attachable access entity profile (AAEP) name to associate the VMM
domain to an AAEP.
We recommend that you previously created an AAEP as part of day-0 operation of ACI. If the AAEP that
you enter doesnt exist, it will be created.
e) In the Vcenter IP (or Hostname) field, enter the host name or IP address.
If you use the host name, you must already have configured a DNS policy on Cisco APIC. If you do not
have a DNS policy configured, enter the IP address of the vCenter server.
f) In the Username field, enter the user name for logging in to the vCenter.

Cisco ACI Virtualization Guide, Release 2.2(2)


209
Cisco ACI with VMware vRealize
Administrator Experiences

g) In the Password field, type the password for logging in to the vCenter.
h) From DVS Version drop-down list, choose the DVS version.
Note Choose vCenter Default from the drop-down list for DVS 6.5 and later versions.
i) In the Datacenter field, enter the data center name.
Note The name that you enter for the data center must match exactly the name in vCenter. The name
is case sensitive.
j) In the Vlan Start field, enter the starting VLAN in Encap Block Range.
k) In the Vlan End field, enter the ending VLAN in Encap Block Range.
Note After Substep 3p, a VLAN pool Domain/AVS name_vlanpool with given Encap Block Range
will be created and associated to VMM domain.
l) (Optional) In the AVS Fabric-wide Multicast Address field, enter a valid multicast address between
224.0.0.0 and 239.255.255.255, inclusive, for the multicast address block range.
m) (Optional) In the Multicast Address Start field, enter the starting multicast address between 224.0.0.0
and 239.255.255.255, inclusive, for the multicast address block range.
n) (Optional) In the Multicast Address End field, between 224.0.0.0 and 239.255.255.255, inclusive, for
the multicast address block range.
Note After Substep 3p, a multicast address pool Domain/AVS name_mcastpool with the given multicast
address block range will be created and associated to the VMM domain.
o) In the AAA Domain area, click the green cross and then choose a security domain.
p) Click Submit.

What to Do Next
Complete the following procedures:
Verifying Cisco AVS Creation in vCenter, on page 212
Verifying Creation of the Cisco AVS VMM Domain on Cisco APIC, on page 213

Creating a Cisco AVS VMM Domain with Default VXLAN Encapsulation


This section shows how to create a Cisco AVS VMM domain in mixed mode, supporting both VXLAN and
VLAN encapsulation with VXLAN as the default encapsulation mode. Because the default mode is VXLAN,
the steps in the GUI for the following procedure for configuring VLAN are optional. Those VLAN-related
inputs are Vlan Start and Vlan End.

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Add VMM Domain, AVS Local Switching with Vxlan Encap.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) In the Request Information pane, add a description and then click Next.
b) In the Domain/AVS name field, enter the VMM domain name.
c) In the AAEP Name field, enter an attachable access entity profile (AEP) name to associate the VMM
domain to an AAEP.

Cisco ACI Virtualization Guide, Release 2.2(2)


210
Cisco ACI with VMware vRealize
Administrator Experiences

We recommend that you previously created an AAEP as part of day-0 operation of ACI. If the AAEP that
you enter doesnt exist, it will be created.
d) In the Vcenter IP (or Hostname) field, enter the host name or IP address.
If you use the host name, you must already have configured a DNS policy on Cisco APIC. If you do not
have a DNS policy configured, enter the IP address of the vCenter server.
e) In the Username field, enter the user name for logging in to the vCenter.
f) In the Password field, type the password for logging in to the vCenter.
g) From DVS Version drop-down list, choose the DVS version.
Note Choose vCenter Default from the drop-down list for DVS and later
versions.
h) In the Datacenter field, enter the data center name.
Note The name that you enter for the data center must match exactly the name in vCenter. The name
is case sensitive.
i) In AVS Fabric Multicast Address field, enter a valid multicast address between 224.0.0.0 and
239.255.255.255, inclusive, in the multicast address block range.
j) In the Multicast Address Start field, enter the starting multicast address between 224.0.0.0 and
239.255.255.255, inclusive, in the multicast address block range.
k) In the Multicast Address End field, between 224.0.0.0 and 239.255.255.255, inclusive.
Note After Substep 4o, a multicast address pool Domain/AVS name_mcastpool with the given multicast
address block range will be created and associated to the VMM domain.
l) (Optional) In the Vlan Start field, enter the starting VLAN for the encapsulation block range.
m) (Optional) In the Vlan End field, enter the ending VLAN in for the encapsulation block range.
Note After Substep 4o, a VLAN pool Domain/AVS name_vlanpool with the given encapsulation block
range will be created and associated to the VMM domain.
n) In the AAA Domain area, click the green cross and then choose a security domain.
o) Click Submit.

What to Do Next
Complete the following procedures:
Verifying Cisco AVS Creation in vCenter, on page 212
Verifying Creation of the Cisco AVS VMM Domain on Cisco APIC, on page 213

Creating a Cisco AVS VMM Domain with No Local Switching

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Add VMM Domain, AVS No Local Switching.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) In the Request Information pane, add a description and then click Next.
b) In the Domain/AVS name field, enter the VMM domain name.

Cisco ACI Virtualization Guide, Release 2.2(2)


211
Cisco ACI with VMware vRealize
Administrator Experiences

c) In the AAEP Name field, enter an attachable access entity profile (AAEP) name to associate the VMM
domain to an AAEP.
We recommend that you previously created an AAEP as part of day-0 operation of ACI. If the AAEP that
you enter doesnt exist, it will be created.
d) In the Vcenter IP (or Hostname) field, enter the host name or IP address.
If you use the host name, you must already have configured a DNS policy on Cisco APIC. If you do not
have a DNS policy configured, enter the IP address of the vCenter server.
e) In the Username field, enter the user name for logging in to the vCenter.
f) In the Password field, type the password for logging in to the vCenter.
g) From DVS Version drop-down list, choose the DVS version.
Note Choose vCenter Default from the drop-down list for DVS 6.5 and later versions.
h) In the Datacenter field, enter the data center name.
Note The name that you enter for the data center must match exactly the name in vCenter. The name
is case sensitive.
i) In AVS Fabric Multicast Address field, enter a valid multicast address between 224.0.0.0 and
239.255.255.255, inclusive.
j) In the Multicast address Start field, enter the starting multicast address between 224.0.0.0 and
239.255.255.255, inclusive, in the multicast address block range.
k) In the Multicast address End field, enter the ending multicast address 224.0.0.0 and 239.255.255.255,
inclusive, in the multicast address block range.
l) In the AAA Domain area, click the green cross and then choose a security domain.
m) Click Submit.

What to Do Next
Complete the following procedures:
Verifying Cisco AVS Creation in vCenter, on page 212
Verifying Creation of the Cisco AVS VMM Domain on Cisco APIC, on page 213

Verifying Cisco AVS Creation in vCenter

Procedure

Step 1 Open a vSphere Client connection to a vCenter server.


Step 2 In vCenter, choose Home > Inventory > Networkingview.
Step 3 Choose the data center.
Step 4 Under the data center, ensure that the Cisco AVS and its folder are created.

Cisco ACI Virtualization Guide, Release 2.2(2)


212
Cisco ACI with VMware vRealize
Administrator Experiences

Verifying Creation of the Cisco AVS VMM Domain on Cisco APIC

Procedure

Step 1 Log in to APIC as the administrator, choosing the Advanced GUI.


Step 2 Choose VM Networking > Inventory.
Step 3 In the Inventory navigation pane, choose VMware.
Step 4 In the work pane, under Properties, in the vCenter Domains field, ensure that the newly created VMM
domain is listed.

Update of Cisco AVS VMM Domain Encapsulation Pools


After you create a Cisco AVS VMM domain, you can update VLAN or multicast address pools. You should
then verify the update.

Updating the VLAN Pool of a Cisco AVS VMM Domain

Procedure

Step 1 Log in to the vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update Vlan Pool, AVS.
Note This update operation is only supported for dynamic VLAN pools. Static VLAN pools are not
supported.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) Add the description and then click Next.
b) In the Vlan Pool Name field, enter the name of the existing VLAN pool.
c) In the List of encap blocks area, click the green cross next to New.
d) For each Encap block, in the VlanRangeStart column, enter the starting VLAN.
e) In VlanRangeEnd column, enter the ending VLAN.
Tick the check box in column IsAddOperation to add encap blocks to vlan pool; leave the check box
unchecked to removed an entered encap block from a VLAN pool.
f) Click Submit.

What to Do Next
Complete the procedure Verifying the Update of the VLAN Pool of a Cisco AVS VMM Domain in Cisco
APIC, on page 214.

Cisco ACI Virtualization Guide, Release 2.2(2)


213
Cisco ACI with VMware vRealize
Administrator Experiences

Verifying the Update of the VLAN Pool of a Cisco AVS VMM Domain in Cisco APIC

Procedure

Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose Fabric > Access Policies
Step 3 In the Policies navigation pane, expand the Pools folder.
Step 4 Expand the VLAN folder.
Step 5 Choose the VLAN pool.
Step 6 In the work pane, under Pools - VLAN, ensure that the VLAN pool is updated.

Updating the Multicast Address Pool of a Cisco AVS VMM Domain

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update Multicast Pool, AVS.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) In the Multicast Pool Name field, enter the name of the existing multicast address pool.
b) In the List of Multicast Address Range area, click the green cross next to New.
c) For each multicast address block, enter the starting multicast address between 224.0.0.0 and
239.255.255.255, inclusive, in the MulticastAddressStart column.
d) In the MulticastAddressEnd column, enter the ending multicast address between 224.0.0.0 and
239.255.255.255, inclusive.
e) Tick the check box in the column IsAddOperation to add multicast address blocks to the multicast address
pool; leave the check box unchecked to remove an entered multicast address block from the multicast
address pool.
f) Click Submit.

What to Do Next
Complete the procedure Verifying the Update of a Multicast Address Pool on Cisco APIC , on page 215.

Cisco ACI Virtualization Guide, Release 2.2(2)


214
Cisco ACI with VMware vRealize
Administrator Experiences

Verifying the Update of a Multicast Address Pool on Cisco APIC

Procedure

Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose Fabric > Access Policies.
Step 3 in the Policies navigation pane, expand the Pools folder.
Step 4 Expand the Multicast Address folder.
Step 5 Choose the multicast address pool.
Step 6 In the work pane, under Pools - Multicast Address, ensure that the multicast address pool is updated.

Deletion of Cisco AVS and VMM domain


You can delete the Cisco AVS and VMM domain. After you do so, you should verify the deletion.

Deleting the Cisco AVS and VMM Domain

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Delete VMM Domain, AVS Mixed Mode.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) Add a description and then click Next.
b) In the Domain/AVS name field, enter the name of the VMM domain that you want to delete.
Note If the VMM domain has an associated multicast address pool (Domain/AVS name_mcastpool) or
a VLAN pool (Domain/AVS name_vlanpool), it also will be deleted.
c) Click Submit.

What to Do Next
Complete the following procedures:
Verifying Cisco AVS Deletion in vCenter, on page 216
Verifying VMM Domain Deletion on Cisco APIC, on page 216
Verifying VLAN Pool Deletion on Cisco APIC, on page 216
Verifying Multicast Address Pool Deletion on Cisco APIC, on page 217

Cisco ACI Virtualization Guide, Release 2.2(2)


215
Cisco ACI with VMware vRealize
Administrator Experiences

Verifying Cisco AVS Deletion in vCenter

Procedure

Step 1 Open a vSphere Client connection to a vCenter server.


Step 2 In vCenter, choose Home > Inventory > Networking view.
Step 3 Choose the data center.
Step 4 Under the data center, ensure that the Cisco AVS and its folder are deleted.

Verifying VMM Domain Deletion on Cisco APIC

Procedure

Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose VM Networking > Inventory.
Step 3 In the Inventory navigation pane, expand VMware.
Step 4 Under VMware, ensure that the deleted VMM domain is not present.

Verifying VLAN Pool Deletion on Cisco APIC

Procedure

Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose Fabric > Access Policies
Step 3 In the Policies navigation pane, expand the Pools folder.
Step 4 Choose the VLAN folder.
Step 5 In the work pane, under Pools - VLAN, ensure that the VLAN pool (Domain/AVS name_vlanpool) is
deleted.

Cisco ACI Virtualization Guide, Release 2.2(2)


216
Cisco ACI with VMware vRealize
Administrator Experiences

Verifying Multicast Address Pool Deletion on Cisco APIC

Procedure

Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose Fabric > Access Policies.
Step 3 In the Policies navigation pane, expand the Pools folder.
Step 4 Choose the Multicast Address folder.
Step 5 In the work pane, under Pools - Multicast Address, ensure that the multicast address pool (Domain/AVS
name_mcastpool) is deleted.

Cisco AVS VMM Domain Security Domain Mapping


You can update the security domain mapping for the Cisco AVS VMM domain.

Updating the Security Domain Mapping of the Cisco AVS VMM Domain

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update AVS VMM Domain Security Domain Mapping and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the AVS/VMM-domain name field, enter the VMM domain name.
d) In the AAA Domain list table, click New and enter the AAA domain name.
For each entry, specify the existing security domain in the aaaDomainName column. Check the check
box in the IsAddOperation column to add the AVS/VMM domain to the AAA domain. If unchecked,
the AVS/VMM domain is removed from the AAA domain.
e) Click Submit.

What to Do Next
Complete the procedure Verifying the Security Domain Mapping of the Cisco AVS VMM Domain, on page
218.

Cisco ACI Virtualization Guide, Release 2.2(2)


217
Cisco ACI with VMware vRealize
Administrator Experiences

Verifying the Security Domain Mapping of the Cisco AVS VMM Domain

Procedure

Step 1 Log in to Cisco APIC as the administrator.


Step 2 Choose VM Networking > Inventory > VMware.
Step 3 Choose the VMM domain.
Step 4 In the work pane, under Properties, ensure that the Security Domains field has been updated.

Distributed Firewall Policy


You can create, update, and delete a Distributed Firewall (DFW) policy and update the DFW policy association
with the Cisco AVS VMM domain.
For detailed information about Distributed Firewall, see the section "Distributed Firewall" in the chapter
"Cisco ACI with Cisco AVS" in this guide.

Creating a Distributed Firewall Policy


This section describes how to create a DFW policy and associate it with a Cisco AVS VMM domain.

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Create FW Policy (DFW) and Associate to AVS VMM Domain and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the FW Policy Name field, enter a name for the policy.
d) From the Mode drop-down list, choose Learning, Enabled, or Disabled.
LearningCisco AVS monitors all TCP communication and creates flows in a flow table but does
not enforce the firewall. Learning mode lets you enable the firewall without losing traffic.
EnabledEnforces the Distributed Firewall. If you upgrade from an earlier version of Cisco
AVSone that does not support Distributed Firewalland are upgrading Cisco AVS only, you
must first upgrade all the Cisco AVS hosts in that VMM domain and then enable Distributed Firewall.
DisabledDoes not enforce the Distributed Firewall and removes all flow information from the
Cisco AVS. Choose this mode only if you do not want to use the Distributed Firewall.

e) In the VMM Name field, enter the name of the existing Cisco AVS VMM domain to which you want to
associate the DFW policy and click Next.
f) In the Syslog Form page, choose Disabled or Enabled from the Administrative State drop-down list.
g) Cisco AVS reports the flows that are permitted or denied by the Distributed Firewall to the system log
(syslog) server. Do the following:

Cisco ACI Virtualization Guide, Release 2.2(2)


218
Cisco ACI with VMware vRealize
Administrator Experiences

From the Permitted flows drop-down list, choose yes if you want Cisco AVS to report permitted
flows to the syslog server. Choose no if you do not want Cisco AVS to report permitted flows to the
syslog server.
From the Denied flows drop-down list, choose yes if you want Cisco AVS to report denied flows
to the syslog server. Choose no if you do not want Cisco AVS to report denied flows to the syslog
server.

h) In the Polling Interval (seconds) area, enter an interval from 60 to 86,400 seconds.
i) From the Log Level drop-down list, choose a logging severity level that is greater than or equal to the
severity level defined for the syslog server.
j) In the Dest Group area, enter an existing syslog monitoring destination group.
k) Click Submit.

What to Do Next
Complete the procedure Verifying Distributed Firewall Policy Creation on APIC, on page 219.

Verifying Distributed Firewall Policy Creation on APIC


This section describes how to verify the creation of a distributed firewall policy on Application Policy
Infrastructure Controller.

Procedure

Step 1 Log in to APIC Advanced GUI as the administrator.


Step 2 Choose Fabric > Access Policies.
Step 3 In the Policies navigation pane, choose Interface Policies > Policies > Firewall.
Step 4 In the Work pane, under Policies - Firewall, confirm that the corresponding firewall policy is created.
Step 5 To view the distributed firewall policy association with a VMM domain, do the following:
a) Choose VM Networking > Inventory > VMware.
b) Click the corresponding VMM domain.
c) In the Work pane, under Properties, confirm that the created distributed firewall policy is present in the
Firewall Policy field for vSwitch Policies.

Updating a Distributed Firewall Policy


This section describes how to update an existing DFW policy.

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update FW Policy (DFW) and complete the following steps:
In the service blueprint, some drop-down lists have a <NO CHANGE> option that you can choose if you do
not want to change the configured value.

Cisco ACI Virtualization Guide, Release 2.2(2)


219
Cisco ACI with VMware vRealize
Administrator Experiences

a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the FW Policy Name field, enter an updated name for the policy.
d) From the Mode drop-down list, choose Learning, Enabled, Disabled, or <NO CHANGE>. Click Next.
e) In the Syslog Form page, choose Disabled, Enabled, or <NO CHANGE> from the Administrative
State drop-down list.
f) From the Permitted flows drop-down list, choose yes, no, or <NO CHANGE>.
g) From the Denied flows drop-down list, choose yes, no, or <NO CHANGE>.
h) In the Polling Interval (seconds) area, update the interval to a value from 60 to 86,400 seconds.
Note If you do not specify an interval, no update
occurs.
i) From the Log Level drop-down list, choose a logging severity level that is greater than or equal to the
severity level defined for the syslog server. Choose <NO CHANGE> if you do not want to change the
log level.
j) In the Dest Group area, enter a new or existing syslog monitoring destination group.
Note If you do not enter a new or existing syslog monitoring destination group, no update occurs.
k) Click Submit.

Verifying a Distributed Firewall Policy Update on APIC


This section describes how to verify an update to a distributed firewall policy on Application Policy
Infrastructure Controller.

Procedure

Step 1 Log in to APIC Advanced GUI as the administrator.


Step 2 Choose Fabric > Access Policies.
Step 3 In the Policies navigation pane, choose Interface Policies > Policies > Firewall.
Step 4 In the work pane, under Policies - Firewall, double-click the required firewall policy and confirm that it is
updated.

Deleting a Distributed Firewall Policy


This section describes how to delete a DFW policy.

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Delete FW Policy (DFW) and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the FW Policy Name field, enter the name of the DFW policy that you want to delete.

Cisco ACI Virtualization Guide, Release 2.2(2)


220
Cisco ACI with VMware vRealize
Administrator Experiences

d) Click Submit.

Verifying a Distributed Firewall Policy Deletion on APIC


This section describes how to verify the deletion of a distributed firewall policy on Application Policy
Infrastructure Controller.

Procedure

Step 1 Log in to APIC Advanced GUI as the administrator.


Step 2 Choose Fabric > Access Policies.
Step 3 In the Policies navigation pane, choose Interface Policies > Policies > Firewall.
Step 4 In the Work pane, under Policies - Firewall, confirm that the deleted firewall policy is not present.

Updating a Distributed Firewall Policy Association with the Cisco AVS VMM Domain
This section describes how to update a DFW policy that is associated with a Cisco AVS VMM domain.

Procedure

Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update FW Policy (DFW) association to AVS VMM Domain and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the FW Policy Name field, enter a name for the policy.
d) In the VMM Domain name field, enter an existing Cisco AVS VMM domain name.
e) From the Operation drop-down list, choose one of the following options:
addAssociates the DFW policy with the Cisco AVS VMM domain.
delDisassociates the DFW policy from the Cisco AVS VMM domain.

f) Click Submit.

What to Do Next
Complete the procedure Verifying Microsegment Association Updates with Cisco AVS VMM Domains on
APIC, on page 244

Verifying a Distributed Firewall Policy Association with the Cisco AVS VMM Domain on APIC
This section describes how to verify the association of a distributed firewall policy with Cisco AVS on
Application Policy Infrastructure Controller.

Cisco ACI Virtualization Guide, Release 2.2(2)


221
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log in to APIC Advanced GUI as the administrator.


Step 2 Choose VM Networking > Inventory > VMware.
Step 3 Click the required VMM domain.
Step 4 In the Work pane, under Properties, confirm that the distributed firewall policy is associated with the VMM
domain in the Firewall Policy field for vSwitch Policies.

Tenant Experiences in a Shared or Virtual Private Cloud Plan

Creating Networks in a Shared Plan


This section describes how to create a network in a shared plan.

Procedure

Step 1 Log in to the vRealize Automation as the tenant administrator, choose Catalog.
Step 2 In the navigation pane, choose Tenant Shared Plan.
Step 3 In the Tenant Shared Plan pane, choose Add Tenant Network - Shared Plan and perform the following
actions:
a) View the Service Blueprint Information for the input fields and click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Step pane, perform the following actions:
d) In the NetworkEPG name field, enter the name of the new shared network (new-shared-network).
e) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and select the DVS.
f) From the encapMode drop-down list, choose either Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMMdomain type is Cisco AVS (Local Switching).
Selecting VLAN or VXLAN for vDS VMM Domain, may lead into unpredictable results.
g) In the Application Tier Number field, enter a numeric value from 1-10.
h) In the Intra EPG Deny field, select a value either Yes or No.
i) In the Allow Microsegmentation field, select a value either Yes or No.
Note The Allow Microsegmentation field is applicable only if the VMMdomain type is vDS VMM
Domain.
j) In the Use Default BD? field, select a value either Yes or No.
If you selected No, choose a custom bridge domain by clicking on Add.
Expand your_apic_user > Tenants > your_tenant > Networking > BridgeDomains >
your_bridgedomain and select this bridge domain.

k) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


222
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Verifying the Newly Created Network on VMware vRealize and APIC


This section describes how to verify the newly created network on VMware vRealize and Application Policy
Infrastructure Controller (APIC) .

Procedure

Step 1 Log in to the vRealize Automation as the tenant administrator, choose Request and ensure your request status
is successful.
Step 2 Log into the APIC GUI as the Tenant, choose Tenants.
Step 3 In the navigation pane, expand the Tenant name > Application Profiles > default > Application EPGs >
EPG new-shared-network.
Step 4 In the Properties pane, ensure the Received Bridge Domain field is common/default.
Step 5 In the navigation pane, choose Domains (VMs and Bare-Metals), ensure it is bound to
VMware/your_vmm_domain.

Creating a Bridge Domain in a VPC Plan


This section describes how to create a bridge domain in a VPC plan.

Procedure

Step 1 Log in to the vRealize Automation as the tenant administrator, choose Catalog.
Step 2 In the navigation pane, choose Tenant Network Services.
Step 3 In the Tenant Network Services pane, choose Add or Delete Bridge domain in Tenant and perform the
following actions:
a) View the Service Blueprint Information for the input fields and click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Step pane, perform the following actions:
d) In the Add a bridge domain field, choose Yes.
e) In the Bridge Domain name field, enter the bridge domain name (new-bd).
f) In the Enable ARP Flooding field, choose No.
g) In the Enable flooding for L2 Unknown Unicast field, choose hardware-proxy.
h) In the Enable flooding for L3 Unknown Multicast field, choose flood.
i) In the L3 context (VRF) field, click Add, expand your_apic > Tenants > your_tenant > Networking >
VRFs and select the VRF (ctx1).
j) Click Submit.
k) In the Operation field, choose Add.
l) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


223
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Verifying the Newly Created Bridge Domain on APIC


This section describes how to verify the newly created bridge domain on Application Policy Infrastructure
Controller (APIC).

Procedure

Step 1 Log into the APIC GUI as the tenant, choose Tenants.
Step 2 In the navigation pane, expand the Tenant name > Networking > Bridge Domain > your_newly_created_bd.
Step 3 In the Properties pane, ensure the fields are the same as in the VMware vRealize GUI.

Creating a Network and Associating to a Bridge Domain in a VPC Plan


This section describes how to create a network and associating to a bridge domain in a VPC Plan.

Procedure

Step 1 Log in to the vRealize Automation as the tenant administrator, choose Catalog.
Step 2 In the navigation pane, choose Tenant VPC Plan.
Step 3 In the Tenant VPC Plan pane, choose Add Tenant Network - VPC Plan and perform the following actions:
a) View the Service Blueprint Information for the input fields and click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Step pane, perform the following actions:
d) In the NetworkEPG name field, enter the name of the new shared network (new-vpc-network).
e) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and select the DVS.
f) From the encapMode drop-down list, choose either Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMMdomain type is Cisco AVS (Local Switching).
Selecting VLAN or VXLAN for vDS VMM Domain, may lead into unpredictable results.
g) In the Application Tier Number field, enter a numeric value from 1-10.
h) In the Intra EPG Deny field, select a value either Yes or No.
i) In the Allow Microsegmentation field, select a value either Yes or No.
Note The Allow Microsegmentation field is applicable only if the VMMdomain type is vDS VMM
Domain.
j) In the Use Default BD? field, select a value either Yes or No.
If you selected No, choose a custom bridge domain by clicking on Add.
Expand your_apic_user > Tenants > your_tenant > Networking > BridgeDomains >
your_bridgedomain and select this bridge domain.

k) In the Subnet Prefix field, enter the gateway IP address and the subnet mask (10.1.1.1/24).
l) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


224
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Verifying the Network and Association to the Bridge Domain in a VPC Plan on APIC
This section describes how to verify the newly created bridge domain on APIC.

Procedure

Step 1 Log into the APIC GUI as the Tenant, choose Tenants.
Step 2 In the navigation pane, expand the Tenant name > Application Profiles > default > Application EPGs >
EPG new-vpc-network.
Step 3 In the Properties pane, ensure the Bridge Domain is your_tenant/bd1.
Step 4 In the navigation pane, choose Domains (VMs and Bare-Metals), ensure it is bound to
VMware/your_vmm_domain.
Step 5 In the navigation pane, expand the Tenant name > Networking > Bridge Domain > bd1 > Subnets.
Step 6 In the Subnets pane, ensure the gateway IP address and subnet mask that you enter when creating a network
and associating to a bridge domain in a VPC plan (10.1.1.1/24) and the scope is Private to VRF.
Step 7 On the menu bar, choose VM Networking.
Step 8 In the navigation pane, expand the VMware > your_vmm_domain > Controllers > vcenter1 > DVS -
your_vmm_domain > Portgroups and ensure you see the port group with the tenant application profile EPG
name.

Creating a Security Policy Within the Tenant


This section describes how to create a security policy within the tenant.
This figure shows that Web and App are in the same bridge domain, but there is no communication. Web and
App are isolated, but they can communicate to their gateway. You need to create a security policy for Web
and App to communicate.

Before You Begin


Ensure you have set up two shared networks with two virtual machines (VMs).

Cisco ACI Virtualization Guide, Release 2.2(2)


225
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Network Security.
Step 2 Choose Add Security Policy (Contracts)
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the Rule Entry List field, enter the values and click Save.
This table shows the values for each Rule Entry:

Rule Entry List Values


dstFormPort
Blank
Unspecified
1-65535

dstToPort
Blank
Unspecified
1-65535

protocol
icmp
icmpv6
tcp
udp
Blank

etherType
IP
ARP

b) In the Consumer Network/EPG name field, click Add to locate and choose the consumer network/EPG.
(web-host)
c) Click Submit.
d) In the Provider Network/EPG name field, click Add to locate and choose the provider network/EPG.
(app-host)

Cisco ACI Virtualization Guide, Release 2.2(2)


226
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

e) Click Submit.
Step 7 Click Submit.
Step 8 Click OK.

Verifying the Security Policy Within the Tenant on APIC


This section describes how to verify the security policy within the tenant on APIC.

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, on the menu bar choose TENANTS.
Step 2 In the navigation pane, expand Tenant your_tenant > Networking > Security Policies > Contracts.
a) Ensure the name nested under Contracts is the provider and consumer name. (app-host_ctrct_web-hosts)
Step 3 In the navigation pane, expand Tenant your_tenant > Networking > Security Policies > Filters.
a) Ensure the name nested under Filters is the provider and consumer name. (app-host_flt_web-hosts)
Step 4 In the navigation pane, expand Tenant your_tenant > Networking > Application Profiles > default >
Application EPGs > EPG web-hosts > Contracts.
a) In the work pane, ensure the consumer is Comsumed.
Step 5 In the navigation pane, expand Tenant your_tenant > Networking > Application Profiles > default >
Application EPGs > EPG app-hosts > Contracts.
a) In the work pane, ensure the provider is Provided.

Verifying the Connectivity of the Security Policy within the Tenant


This section describes how to verify the connectivity of the security policy within the tenant.

Procedure

Step 1 Log in to the virtual machine (web-host), from the command line, ping the other VM (app-host).
Step 2 Log in to the virtual machine (app-host), from the command line, ping the other VM (web-host).
This ensure the VMs are communicating with each other.

Consuming a Shared Service in the Common Tenant


This section describes consuming a shared service in the common tenant.

Cisco ACI Virtualization Guide, Release 2.2(2)


227
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Before You Begin


You must have an EPG in the common tenant that has a bridge domain relationship to "common/default".

Procedure

Step 1 Log in to the vRealize Automation as tenant, choose Catalog > Network Security.
Step 2 Choose Add Security Policy (Contracts)
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the Rule Entry List field, enter the values and click Save.
This table shows the values for each Rule Entry:

Rule Entry List Values


dstFormPort
Blank
Unspecified
1-65535

dstToPort
Blank
Unspecified
1-65535

protocol
icmp
icmpv6
tcp
udp
Blank

etherType
IP
ARP

b) In the Consumer Network/EPG name field, click Add to locate and choose the consumer network/EPG.
(web-host)
c) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


228
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

d) In the Provider Network/EPG name field, click Add to locate and choose the provider network/EPG.
(SYSLOG-EPG)
e) Click Submit.
Step 7 Click Submit.
Step 8 Click OK.

Verifying the Security Policy in the Tenant Common on APIC


This section describes how to verify the security policy in the tenant common on APIC.

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, on the menu bar choose TENANTS.
Step 2 In the navigation pane, expand Tenant your_tenant > Networking > Security Policies > Contracts.
a) Ensure the name nested under Contracts is the provider and consumer name.
(SYSLOG-EPG_ctrct_web-hosts)
Step 3 In the navigation pane, expand Tenant your_tenant > Networking > Security Policies > Filters.
a) Ensure the name nested under Filters is the provider and consumer name. (SYSLOG-EPG_flt_web-hosts)
Step 4 In the navigation pane, expand Tenant your_tenant > Networking > Application Profiles > default >
Application EPGs > EPG web-hosts > Contracts.
a) In the work pane, ensure the consumer is Comsumed.
Step 5 In the navigation pane, expand Tenant your_tenant > Networking > Application Profiles > default >
Application EPGs > EPG SYSLOG-EPG-hosts > Contracts.
a) In the work pane, ensure the provider is Provided.

Verifying the Connectivity of the Security Policy in the Tenant Common


This section describes how to verify the connectivity of the security policy in the tenant common.

Procedure

Step 1 Log in to the virtual machine (web-host), from the command line, ping the other VM (SYSLOG-EPG).
Step 2 Log in to the virtual machine (SYSLOG-EPG), from the command line, ping the other VM (web-host).
This ensure the VMs are communicating with each other.

Cisco ACI Virtualization Guide, Release 2.2(2)


229
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Updating Security Policies (Access Control Lists)


This section describes how to update security policies (access control lists).

Procedure

Step 1 Log in to the vRealize Automation as tenant, choose Catalog > Network Security.
Step 2 Choose Update Security policies (Access Control Lists)
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the apic security filter name field, click Add to locate and choose a filter that been pushed by vRealize.
b) In the Rule Entry List field, enter the values and click Save. You must recreate the rule entry list.
Note This updating security policies access control lists will push new rules in including over writing
existing rule of the same name.
This table shows the values for each Rule Entry:

Rule Entry List Values


dstFormPort
Blank
Unspecified
1-65535

dstToPort
Blank
Unspecified
1-65535

protocol
icmp
icmpv6
tcp
udp
Blank

etherType
IP
ARP

Cisco ACI Virtualization Guide, Release 2.2(2)


230
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

c) In the Update firewall access-list field, if the access-list being use by a firewall, click Yes otherwise click
No.
d) Click Submit.
Step 7 Click OK.
Step 8 To verify your request, choose the Requests tab.
a) Choose the request you submitted and click view details. Ensure the status is Succesful.

Deleting Security Policies (Access Control Lists)


This section describes how to delete security policies (access control lists).

Procedure

Step 1 Log in to the vRealize Automation as tenant, choose Catalog > Network Security.
Step 2 Choose Delete Security policies (Access Control Lists)
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the Comsume Network/EPG name field, click Add to locate and choose the provider network/EPG.
(web-host)
b) In the Provider Network/EPG name field, click Add to locate and choose the provider network/EPG.
(app-host)
c) Click Submit.
Step 7 Click OK.
Step 8 To verify your request, choose the Requests tab.
a) Choose the request you submitted and click view details. Ensure the status is Succesful.

Creating the Network in the VPC Plan


This section describes how to create the network in the VPC plan.

Procedure

Step 1 Log in to the vRealize Automation Appliance as the tenant, choose Catalog > Tenant VPC Plan > Add
Tenant Network - VPC plan and click Request.
Step 2 In the Request Information pane, perform the following actions:
a) In the Description field, enter the description.

Cisco ACI Virtualization Guide, Release 2.2(2)


231
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

b) Click Next.
Step 3 In the Step pane, perform the following actions:
a) In the Network/EPG name field, enter the Network/EPG name. (web-hosts-vpc)
b) In the Domain Type field, from the drop-down list, choose either VmmDomain (Dynamic Binding) for
connecting to virtual machines or PhysDomain (Static Binding) for connecting to physical infrastructure.
Cisco recommends choosing VmmDomain (Dynamic Binding) to use the full features of the vRealize
plug-in.
c) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and select the DVS.
d) From the encapMode drop-down list, choose either Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMMdomain type is Cisco AVS (Local Switching).
Selecting VLAN or VXLAN for vDS VMM Domain, may lead into unpredictable results.
e) In the Application Tier Number field, enter a numeric value from 1-10.
f) In the Intra EPG Deny field, select a value either Yes or No.
g) In the Allow Microsegmentation field, select a value either Yes or No.
Note The Allow Microsegmentation field is applicable only if the VMMdomain type is vDS VMM
Domain.
h) In the Use Default BD? field, select a value either Yes or No.
If you selected No, choose a custom bridge domain by clicking on Add.
Expand your_apic_user > Tenants > your_tenant > Networking > BridgeDomains >
your_bridgedomain and select this bridge domain.

i) In the Subnet prefix field, enter the gateway IP address and the subnet mask. (192.168.1.1/24)
The subnet prefix is the subnet that this VPC will have available to any hosts.
j) Click Submit.
k) Click OK.
Step 4 Choose Requests.
Step 5 Choose the request you submitted and click view details.
Step 6 Ensure your request status is Successful.

Verifying the Network in the VPC Plan on APIC


This section describes how to verify the network in the VPC plan on APIC.

Cisco ACI Virtualization Guide, Release 2.2(2)


232
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > Application EPGs
> EPG web-hosts-vpc
Step 3 In the properties pane, in the Bridge Domain field, verify your tenant name and bd1 is present. (green/bd1)
Step 4 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > Application EPGs
> EPG web-hosts-vpc > Domains (VMs and Bare-Metals).
Step 5 Ensure the state is formed and the domain profile is VMware/vmmdomain_you_specified.
Step 6 In the navigation pane, choose Tenant your_tenant > Networking > Bridge Domains > bd1 > Subnets.
Step 7 Under Subnets, ensure the subnet prefix that you specified is present.

Verifying the Network in the VPC Plan on vCenter


This section describes how to verify the network in the VPC plan on vCenter.

Procedure

Step 1 Log in to vSphere Web Client GUI, choose the Networking icon.
Step 2 In the navigation pane, choose vCenter_IP/Host > Datacenter > green > distributed_virtual_switch >
port_group and ensure it is present.
The port_group name is in the following format: Tenant Name|Application Profile Name|Application EPG
Name.

Updating a Tenant Network Association with the VMM Domain


This section describes how to update a tenant network association with the VMM domain.

Procedure

Step 1 Log in to vRealize Automation as the tenant administrator and choose Catalog.
Step 2 In the navigation pane, choose Tenant Network services.
Step 3 Choose Update Tenant Network and perform the following actions:
a) View the Service Blueprint Information for the input fields and click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Tenant name field, input the name of corresponding tenant.
d) In the Network/EPG field, click Add, and expand your_apic > Tenants > your_tenant >
End-Point-Groups and select the EPG.

Cisco ACI Virtualization Guide, Release 2.2(2)


233
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

e) From the Domain Type drop-down list, choose the domain type. The domain type is VmmDomain
(Dynamic Binding) for VMWare vDS or Cisco AVS.
f) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and then select the
DVS to associate the tenant network (EPG) to the VMM domain.
g) From the encapMode drop-down list, choose Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only when associating an EPG to a VMM domain of the Cisco
AVS(Local Switching) type. That association is performed in the following step.
h) From the Operation drop-down list, choose add to associate the tenant network with the VMM domain.
Choose delete to disassociate the tenant network from the VMM domain.
i) Click Submit.

Verifying Tenant Network Association with VMM Domains on APIC


This section describes how to verify a tenant Network association with VMM domains on APIC.

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, choose Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > Application EPGs
> your_tenant_network > Domains (VMs and Bare-Metals).
Step 3 Confirm that any associations with VMM domains are correct.

Microsegmentation
This section describes microsegmentation in shared and VPC plans and explains the usage-related service
blueprints.

Note Starting with the Cisco APIC vRealize Plug-In 2.0(1) release, the service blueprints related to
microsegmentation are supported only for Cisco AVS VMM domains.

Microsegmentation with Cisco ACI


Microsegmentation with the Cisco ACI provides the ability to automatically assign endpoints to logical security
zones called endpoint groups (EPGs) based on various attributes.
For detailed information about Microsegmentation, see the chapter "Microsegmentation with Cisco ACI" in
the Cisco ACI Virtualization Guide.

Microsegmentation in a Shared Plan


You can create, update, and delete a microsegment in a shared plan.

Cisco ACI Virtualization Guide, Release 2.2(2)


234
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Creating a Microsegment in a Shared Plan


This section describes how to create a microsegment in a shared plan.

Procedure

Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant Shared Plan.
Step 3 Choose Add a Useg Network - Shared Plan and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Tenant name field, enter the name of the corresponding tenant.
d) In the Network/EPG name field, enter the name of the microsegment (uSeg) that you want to create.
e) From the Domain Type drop-down list, choose the domain type. For the Cisco AVS VMM domain, the
domain type is VmmDomain (Dynamic Binding).
f) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter, and then and select
the DVS (Cisco AVS VMM domain) to associate the uSeg to the VMM domain.
g) From the encapMode drop-down list, choose Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMMdomain type is Cisco AVS (Local Switching).
h) In the Application Tier Number field, enter the number of the tier to which the uSeg belongs. The default
tier number is 1. The tier number that you enter must be less than or equal to the number of application
tiers that were created as part of the tenant creation via the service blueprint Add or Update Tenant
option.
For example, if you enter tier number 2, the uSeg will be placed in BD (common/cmnbd2), which is part
of VRF (common/default). See the following table for reference.

Tier Number BD VRF


1 common/default common/default

2 common/cmnbd2 common/default

3 common/cmnbd3 common/default

i) From the Intra EPG Deny drop-down list, choose Yes to enforce intra-EPG isolation. Choose No if you
do not want to enforce intra-EPG isolation.
Intra-EPG isolation is not supported in AVS-VLAN mode, DVS-VXLAN mode, or for Microsoft VMM
domains. If you enforce intra-EPG isolation for those modes or domains, ports might go into blocked state.
j) In the Ip Criteria table, click New and enter the IP criteria (or IP attribute). The following columns apply
to each entry:
NameName of the IP criteria (or IP attribute).
DescriptionDescription of the IP criteria.
IPFor IP addresses, specify the address or the subnet (for example, 1.1.1.1 or 1.1.1.0/30).

k) In the Mac Criteria table, click New and enter the MAC criteria (or MAC attribute). The following
columns apply to each entry:

Cisco ACI Virtualization Guide, Release 2.2(2)


235
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

NameName of the MAC criteria (or MAC attribute).


DescriptionDescription of the MAC criteria.
MACFor MAC addresses, specify the address (for example, 00:50:56:44:44:5D).

l) In the VM Criteria table, click New and enter the VM criteria (or VM attribute). The following columns
apply to each entry:
NameName of the VM criteria (or VM attribute).
TypeThe following table lists the supported attribute types, their mapping in APIC, and examples.
(The MAC attribute and IP attribute have precedence 1 and 2, respectively.)

Type in vRealize Type in APIC (Mapping) Precedence Examples


vnic VNic Dn 3 00:50:56:44:44:5D

vm VM Identifier 4 vm-821

vmName VM Name 5 HR_VDI_VM1

hv Hypervisor Identifier 6 host-43

domain VMM Domain 7 AVS-SJC-DC1

datacenter Datacenter 8 DCI

customLabel Custom Attribute 9 SG_DMZ

guestOS Operating System 10 Windows 2008

OperatorThe following table lists the supported operators and their mapping in APIC.

Operator in vRealize Operator in APIC (Mapping)


equals Equals

contains Contains

startsWith Starts With

endsWith Ends With

AttributeNameEnter an attribute name. In the VM Criteria table, the AttributeName applies


only to the customLabel attribute type.
VmmDomain_vC_VmNameIn the VM Criteria table, it is applicable only for the type vnic,
operator equals. The format to input is <VmmDomain>/<vC>/<VmName>, where <VmmDomain>

Cisco ACI Virtualization Guide, Release 2.2(2)


236
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

(AVS VMM domain) and <vC> (vCenter) belong to a controller instance. For example:
vmmdomain1/vcenter1/VM1.
ValueEnter the attribute type value. Examples of each attribute type are listed in the preceding
Type table.

m) Click Submit.

What to Do Next
Complete the procedure Verifying Microsegmentation Creation in a Shared Plan on APIC, on page 237.

Verifying Microsegmentation Creation in a Shared Plan on APIC


This section describes how to verify that microsegmentation creation in a shared plan has been successful on
Application Policy Infrastructure Controller.

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs.
Step 3 In the uSeg EPGs pane, double-click the required uSeg to view its properties.
Step 4 In the Properties pane, confirm that the configuration is correct.
Step 5 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs >
your_useg > Domains (VMs and Bare-Metals).
Step 6 Confirm that the state is formed and that the domain profile is VMware/vmmdomain_you_specified.

Deleting a Microsegment in a Shared Plan


This section describes how to delete a microsegment.

Procedure

Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant Shared Plan.
Step 3 Choose Delete a Useg Network - Shared Plan and then complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Tenant name field, confirm that the tenant name is hard coded to the corresponding tenant.
d) In the Network/EPG field, click Add, expand priapic > Tenants > appurtenant >
Useg-End-Point-Groups, and then select the microsegment EPG.
e) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


237
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

What to Do Next
Complete the procedure Verifying Microsegmentation Deletion on APIC, on page 238.

Verifying Microsegmentation Deletion on APIC


This section describes how to verify microsegmentation deletion on Application Policy Infrastructure Controller.

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs.
Step 3 In the uSeg EPGs pane, confirm that the deleted uSeg is not present.

Microsegmentation in a VPC Plan


You can create, update, and delete a microsegment in a VPC plan.

Creating a Microsegment in a VPC Plan


This section describes how to create a microsegment in a VPC plan.

Procedure

Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant VPC Plan.
Step 3 Choose Add a Useg Network - VPC Plan and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Tenant name field, enter the name of the corresponding tenant.
d) In the Network/EPG name field, enter the name of the microsegment (uSeg) that you want to create.
e) From the Domain Type drop-down list, choose the domain type.
f) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter, and then select the
DVS (Cisco AVS VMM domain) to associate the uSeg to the VMM domain.
g) From the encapMode drop-down list, choose Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMM domain type is Cisco AVS (Local Switching).
h) In the Subnet field, enter the gateway IP address and the subnet mask (1.1.1.1/24).
i) In the Application Tier Number field, enter the number of the tier to which the uSeg belongs. The default
tier number is 1. The tier number that you enter must be less than or equal to the number of application
tiers that were created as part of the tenant creation via the service blueprint Add or Update Tenant
option.
For example, for a tenant named coke, if you enter tier number 2, the uSeg will be placed in BD (coke/bd2),
which is part of VRF (coke/ctx1). See the following table for reference.

Tier Number BD VRF


1 coke/bd1 coke/ctx1

Cisco ACI Virtualization Guide, Release 2.2(2)


238
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Tier Number BD VRF


2 coke/bd2 coke/ctx1

3 coke/bd3 coke/ctx1

j) From the Intra EPG Deny drop-down list, choose Yes to enforce intra-EPG isolation. Choose No if you
do not want to enforce intra-EPG isolation.
Intra-EPG isolation is not supported in AVS-VLAN mode, DVS-VXLAN mode, or for Microsoft VMM
domains. If you enforce intra-EPG isolation for those modes or domains, ports might go into blocked state.
k) In the Ip Criteria table, click New and enter the IP criteria (or IP attribute). The following columns apply
to each entry:
NameName of the IP criteria (or IP attribute).
DescriptionDescription of the IP criteria.
IPFor IP addresses, specify the address or the subnet (for example, 1.1.1.1 or 1.1.1.0/30).

l) In the Mac Criteria table, click New and enter the MAC criteria (or MAC attribute). The following
columns apply to each entry:
NameName of the MAC criteria (or MAC attribute).
DescriptionDescription of the MAC criteria.
MACFor MAC addresses, specify the address (for example, 00:50:56:44:44:5D).

m) In the VM Criteria table, click New and enter the VM criteria (or VM attribute). The following columns
apply to each entry:
NameName of the VM criteria (or VM attribute).
DescriptionDescription of the VM criteria.
TypeThe following table lists the supported attribute types, their mapping in APIC, and examples.
(The MAC attribute and IP attribute have precedence 1 and 2, respectively.)

Type in vRealize Type in APIC (Mapping) Precedence Examples


vnic VNic Dn 3 00:50:56:44:44:5D

vm VM Identifier 4 vm-821

vmName VM Name 5 HR_VDI_VM1

hv Hypervisor Identifier 6 host-43

domain VMM Domain 7 AVS-SJC-DC1

datacenter Datacenter 8 DCI

Cisco ACI Virtualization Guide, Release 2.2(2)


239
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Type in vRealize Type in APIC (Mapping) Precedence Examples


customLabel Custom Attribute 9 SG_DMZ

guestOS Operating System 10 Windows 2008

OperatorThe following table lists the supported operators and their mapping in APIC.

Operator in vRealize Operator in APIC (Mapping)


equals Equals

contains Contains

startsWith Starts With

endsWith Ends With

AttributeNameEnter an attribute name. In the VM Criteria table, the AttributeName applies


only to the customLabel attribute type.
VmmDomain_vC_VmNameIn the VM Criteria table, it is applicable only for the type vnic,
operator equals. The format to input is <VmmDomain>/<vC>/<VmName>where <VmmDomain>
(AVS VMM domain) and <vC> (vCenter) belong to a controller instance. For example:
vmmdomain1/vcenter1/VM1.
ValueEnter the attribute type value. Examples of each attribute type are listed in the preceding
Type table.

n) Click Submit.

What to Do Next
Complete the procedure Verifying Microsegmentation Creation in a VPC Plan on APIC, on page 240.

Verifying Microsegmentation Creation in a VPC Plan on APIC


This section describes how to verify microsegmentation creation in a VPC plan on Application Policy
Infrastructure Controller.

Cisco ACI Virtualization Guide, Release 2.2(2)


240
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs.
Step 3 In the uSeg EPGs pane, double-click the required uSeg to view its properties.
Step 4 In the Properties pane, confirm that the configuration is correct.
Step 5 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs >
your_useg > Domains (VMs and Bare-Metals).
Step 6 Confirm that the state is formed and that the domain profile is VMware/vmmdomain_you_specified.
Step 7 In the navigation pane, choose Tenant your_tenant > Networking > Bridge Domains > corresponding_bd
> Subnets.
Step 8 Under Subnets, confirm that the subnet prefix that you specified is present.

Deleting a Microsegment in a VPC Plan


This section describes how to delete a microsegment.

Procedure

Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant VPC Plan.
Step 3 Choose Delete a Useg Network - VPC Plan and then complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Tenant name field, confirm that the tenant name is hard coded to the corresponding tenant.
d) In the Network/EPG field, click Add, expand your_apic > Tenants > your_tenant >
Useg-End-Point-Groups and select the uSeg EPG.
e) Click Submit.

What to Do Next
Complete the procedure Verifying Microsegmentation Deletion on APIC, on page 238.

Updating Microsegment Attributes


This section describes how to update an existing microsegment.

Procedure

Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant Network services.
Step 3 Choose Add or Delete Useg Attribute and complete the following steps:

Cisco ACI Virtualization Guide, Release 2.2(2)


241
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Network/EPG field, click Add, expand your_apic > Tenants > your_tenant >
Useg-End-Point-Groups and select the uSeg EPG.
d) In the Tenant name field, enter the name of the corresponding tenant.
e) If you want to add IP criteria, in the Add Ip Criteria table, click New and enter the IP criteria (or IP
attribute). The following columns apply to each entry:
NameName of the IP criteria (or IP attribute).
DescriptionDescription of the IP criteria.
IPFor IP addresses, specify the address or the subnet (for example, 1.1.1.1 or 1.1.1.0/30).

f) If you want to add Mac criteria, in the Add Mac Criteria table, click New and enter the MAC criteria (or
MAC attribute). The following columns apply to each entry:
NameName of the MAC criteria (or MAC attribute).
DescriptionDescription of the MAC criteria.
MACFor MAC addresses, specify the address (for example, 00:50:56:44:44:5D).

g) If you want to add VM criteria, in the Add Vm Criteria table, click New and enter the VM criteria (or
VM attribute). The following columns apply to each entry:
NameName of the VM criteria (or VM attribute).
TypeThe following table lists the supported attribute types, their mapping in APIC, and examples.
(The MAC attribute and IP attribute have precedence 1 and 2, respectively.)

Type in vRealize Type in APIC (Mapping) Precedence Examples


vnic VNic Dn 3 00:50:56:44:44:5D

vm VM Identifier 4 vm-821

vmName VM Name 5 HR_VDI_VM1

hv Hypervisor Identifier 6 host-43

domain VMM Domain 7 AVS-SJC-DC1

datacenter Datacenter 8 DCI

customLabel Custom Attribute 9 SG_DMZ

guestOS Operating System 10 Windows 2008

OperatorThe following table lists the supported operators and their mapping in APIC.

Cisco ACI Virtualization Guide, Release 2.2(2)


242
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Operator in vRealize Operator in APIC (Mapping)


equals Equals

contains Contains

startsWith Starts With

endsWith Ends With

AttributeNameEnter an attribute name. In the VM Criteria table, the AttributeName applies


only to the customLabel attribute type.
ValueEnter the attribute type value. Examples of each attribute type are listed in the preceding
Type table.
VmmDomain_vC_VmNameIn the VM Criteria table, it is applicable only for the type vnic,
operator equals. The format to input is <VmmDomain>/<vC>/<VmName>, where <VmmDomain>
(AVS VMM domain) and <vC> (vCenter) belong to a controller instance. For example:
vmmdomain1/vcenter1/VM1.

h) If you want to delete existing IP criteria, in the Delete IP Criteria table, click New and enter the name of
the IP criteria (or IP attribute) to delete.
i) If you want to delete existing Mac criteria, in the Delete Mac Criteria table, click New and enter the name
of the MAC criteria (or MAC attribute) to delete.
j) If you want to delete existing VM criteria, in the Delete Vm Criteria table, click New and enter the name
of the VM criteria (or VM attribute) to delete.
k) Click Submit.

What to Do Next
Complete the procedure Verifying a Microsegmentation Attributes Update on APIC, on page 243.

Verifying a Microsegmentation Attributes Update on APIC


This section describes how to verify that microsegmentation attributes have been updated on Application
Policy Infrastructure Controller.

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs.
Step 3 In the uSeg EPGs pane, double-click the required uSeg to view its properties.
Step 4 In the Properties pane, confirm that the attributes in the uSeg Attributes field have been updated.

Cisco ACI Virtualization Guide, Release 2.2(2)


243
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Updating a Microsegment Association with the Cisco AVS VMM Domain


This section describes how to update a microsegment that is associated with a Cisco AVS VMM domain.

Procedure

Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant Network services.
Step 3 Choose Update Tenant Network and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Tenant name field, enter the name of the corresponding tenant.
d) In the Network/EPG field, click Add, expand your_apic > Tenants > your_tenant >
Useg-End-Point-Groups and select the uSeg EPG.
e) From the Domain Type drop-down list, choose the domain type. For the Cisco AVS VMM domain, the
domain type is VmmDomain (Dynamic Binding).
f) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and then select the
DVS (Cisco AVS VMM domain) to associate the uSeg to the VMM domain.
g) From the encapMode drop-down list, choose Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only when associating an EPG to a VMM domain of the Cisco
AVS(Local Switching) type. That association is performed in the following step.
h) From the Operation drop-down list, choose add to associate the microsegment with the Cisco AVS
domain. Choose delete to disassociate the microsegment from the Cisco AVS VMM domain.
i) Click Submit.

What to Do Next
Complete the procedure Verifying Microsegment Association Updates with Cisco AVS VMM Domains on
APIC, on page 244.

Verifying Microsegment Association Updates with Cisco AVS VMM Domains on APIC
This section describes how to verify updates to microsegment associations with Cisco AVS VMM domains
on APIC.

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs >
your_useg > Domains (VMs and Bare-Metals).
Step 3 Confirm that any associations with VMM domains are correct.

Cisco ACI Virtualization Guide, Release 2.2(2)


244
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Creating the VMs and Attaching to Networks Without Using the Machine Blueprints
This section describes how to verify the creating machines (VMs) and attaching to networks without using
the machine blueprints.

Procedure

Step 1 Log in to vSphere Web Client GUI, choose the Networking icon.
Step 2 In the navigation pane, choose vCenter_IP/Host > Datacenter > Unmanaged and choose the virtual machine
you want to attach ACI network to.
Step 3 In the Summary pane, in the VM Hardware section, click Edit Settings.
Step 4 In the Edit Settings dialog box, choose the network adapter that you want to connect to the ACI network and
from the drop-down list, choose the port group you created. (green|default|web-hosts-vpc (green))
Step 5 Click OK.
Now this VM can take advantage of the ACI networking.

About Adding the Load Balancer to the Tenant Network


This section covers the configuration steps to add a load balancer service to a tenant network (APIC's EPG).
This release only supports shared plan for load balancer. In subsequent releases we will have support for VPC
plan.

Cisco ACI Virtualization Guide, Release 2.2(2)


245
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

In this plan, the load balancer is deployed in tn-common thereby offering consumption model for vRA and
APIC tenant using shared infrastructure.

Figure 16: Shared Plan - Load Balancer Overview

Figure 17: VPC Plan - Load Balancer Only

Cisco ACI Virtualization Guide, Release 2.2(2)


246
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Configuration Prerequisites on APIC


This section describes the configuration prerequisites on APIC.
Device package for load balancer needs to be uploaded by APIC admin.
Device cluster for load balancer needs to be created in tn-common or tenant "common" by APIC-admin.
Citrix and F5 are the supported vendors for load balancers.
Shared Plan load balancer service graph templates for Citrix and F5 needs to be created in tn-common
by APIC-admin.

Adding the VIP Pool


This section describes how to add the VIP Pool.

Before You Begin


Before vRA-Tenant can consumer Load balancer services, vRA admin needs to create a Virtual-IP pool per
vRA tenant, using the "Add VIP pool" service blueprint in Admin catalog.
For example for Tenant-Red, VIP pool is 6.1.1.1 to 6.1.1.30 and for Tenant-Green, VIP pool is 6.1.2.1 to
6.1.2.30.

Note The VIP pool should be in one of the subnets defined under BD "default" in the tenant "common"

Cisco ACI Virtualization Guide, Release 2.2(2)


247
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Add VIP Pool and perform the following actions:
a) In the Tenant field, enter the Tenant name.
b) In the VIP address start field, enter the VIP address start.
c) In the VIP Address End field, enter the VIP address end.
d) In the Internal VIP for Inter-EPG in VPC plan field, select Yes or No.
e) Click Submit.

Deleting the VIP Pool


This section describes how to delete the VIP Pool.
This blueprint is to do necessary cleanup of VIP pool, once all the load balancer services consumed in the
tenant are deleted.

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Delete VIP Pool, perform the following action items.
a) In the Tenant field, click Add, expand your_apic > Tenants and select the tenant.
b) In the VIP address start field, enter the VIP address start.
c) In the VIP Address End field, enter the VIP address end.
d) In the Internal VIP for Inter-EPG in VPC plan field, select Yes or No.
e) Click Submit.

Adding the Load Balancer to the Tenant-Network in a Shared Plan


vRA-Tenant can add a load balancer (LB) to Tenant-Network. The required parameters are Network-Name,
LB device cluster, LB-endpoint (protocol, port), Vendor Type, and Consumer EPG or L3out. As part of this
workflow, all the required service graph instance and contract (security policy) with chosen Tenant-Network
as Provider-EPG is created. The consumer of this load balanced endpoint could be L3out in tenant common,
or it could be another Tenant-Network belonging to the tenant.

Cisco ACI Virtualization Guide, Release 2.2(2)


248
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Add Load Balancer to Tenant Network - Shared Plan, click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Adding the Load Balancer to the Tenant-Network in a VPC Plan


This section describes how to add the load balancer to the tenant-network in a VPC Plan.

Note In a VPC plan, the Inter-EPG load balancer is not supported. Only the load balancer between L3out and
First-Tier (Web) is supported in release 1.2(2x).

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Add Load Balancer to Tenant Network - VPC Plan, click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Deleting the Load Balancer from the Tenant-Network in a Shared Plan


You can delete the load balancer service (lb-port, lb-protocol) from an existing tenant network or endpoint
group.

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Delete Load Balancer to Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Deleting the Load Balancer from the Tenant-Network in a VPC Plan


You can delete the load balancer service (lb-port, lb-protocol) from an existing tenant network or endpoint
group.

Cisco ACI Virtualization Guide, Release 2.2(2)


249
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Delete Load Balancer to Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Configuring the Firewall


This section discusses the configuration steps to add a firewall service to a tenant network (the Application
Policy Infrastructure Controller's endpoint group).

Figure 18: Shared Plan - Perimeter Firewall Only Overview

Note The perimeter firewall only service is not supported in VPC Plan. In VPC plan, the firewall service can
be configured between EPGs.

Adding the Firewall to the Tenant-Network in a Shared Plan


You can add the firewall to an existing tenant network or endpoint group. The consumer of the firewall must
have a Layer 3 out connectivity policy configured in another VRF for example, "outside" VRF.

Cisco ACI Virtualization Guide, Release 2.2(2)


250
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Add FW to Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Deleting the Firewall from the Tenant-Network in a Shared Plan


You can delete the firewall from an existing tenant network or endpoint group.

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Delete FW from Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Configuring the Firewall and Load Balancer


This section covers the configuration steps to add a firewall and load balancer service to a tenant network (the
Application Policy Infrastructure Controller's endpoint group).

Cisco ACI Virtualization Guide, Release 2.2(2)


251
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

In this plan, the firewall and load balancer devices are deployed in the "common" tenant, there by offering
consumption model for vRealize Automation (vRA) and the APIC tenant using the shared infrastructure.

Figure 19: Shared Plan - Firewall and Load Balancer Overview

Figure 20: VPC Plan - Perimeter Firewall and Load Balancer

Cisco ACI Virtualization Guide, Release 2.2(2)


252
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Adding the Firewall and Load Balancer to the Tenant-Network in a Shared Plan
The virtual IP address pool must be added to the tenant before using the firewall and load balancer service.
See Adding the VIP Pool, on page 247.
The firewall and load balancer can be added to an existing tenant network or endpoint group. The consumer
of the firewall must have a Layer 3 out connectivity policy configured in the "outside" VRF.

Before You Begin


For both Firewall and Load-Balancer only services have to be met before a firewall and load balancer service
can be deployed.

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Add FW and LB to Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Adding the Firewall and Load Balancer to the Tenant-Network in a VPC Plan
This section describes how to add the firewall and load balancer to the Tenant-Network in a VPC Plan.

Note Whenever a firewall and load balancer (LB) workflow is executed then external leg of LB is pointing to
"default" Bridge Domain (BD). Customers should always deploy internal leg of firewall in "default" BD
under tn-common. This ensures that both the firewall and load balancer point to same BD and traffic flows
in an uninterrupted way.

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Add FW and LB to Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


253
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Deleting the Firewall and Load Balancer from the Tenant-Network in a Shared Plan

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Delete FW and LB from Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Deleting the Firewall and Load Balancer from the Tenant-Network in a VPC Plan

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Delete FW and LB from Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


254
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Configuring the Inter-EPG Firewall


This section describes how to configure the inter-EPG firewall service to a tenant network (the Application
Policy Infrastructure Controller's endpoint group).

Figure 21: VPC Plan - Inter EPG FW

Adding the Firewall to the Tenant-Network in a VPC Plan


This section describes how to add the firewall to an existing tenant network or endpoint group (EPG). When
adding the tenant, "Enable Inter-EPG Firewall" should be set to "yes" and the number of tiers used in the
application should be configured. When configuring the network (EPG) tier number should be set. In this
scenario, the firewall is configured between a provider EPG and consumer EPG.

Procedure

Step 1 Log into the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Add FW to Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Deleting the Firewall from the Tenant-Network in a VPC Plan


This section describes how to delete the firewall from an existing tenant network or endpoint group (EPG).

Cisco ACI Virtualization Guide, Release 2.2(2)


255
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Procedure

Step 1 Log into the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Delete FW from Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.

Attaching an External L3 Network Internet Access


This section describes how to attach an external Layer 3 (L3) Network Internet Access.

Before You Begin


You can choose any name for the L3 policy.
External L3 policy instance must be named [L3OutName|InstP].

Procedure

Step 1 Log in to the vRealize Automation as tenant, choose Catalog > Tenant Network service.
Step 2 Choose Attach or Detach L3 external connectivity to Network
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the Rule Entry List field, enter the values and click Save.
This table shows the values for each Rule Entry:

Rule Entry List Values


dstFormPort
Blank
Unspecified
1-65535

dstToPort
Blank
Unspecified
1-65535

Cisco ACI Virtualization Guide, Release 2.2(2)


256
Cisco ACI with VMware vRealize
Tenant Experiences in a Shared or Virtual Private Cloud Plan

Rule Entry List Values


protocol
icmp
icmpv6
tcp
udp
Blank

etherType
IP
ARP

b) In the L3out Policy field, click Add to locate and choose the L3 connectivity policy in the common tenant.
(default)
c) In the Network/EPG name field, click Add to locate and choose the network/EPG in the common tenant.
(web-host)
d) In the EPG/Network plan type field, click Add to locate and choose the network/EPG in the common
tenant. (web-host)
e) In the Operation field, click Add to add a Layer3 Out.
Step 7 To verify your request, choose the Requests tab.
a) Choose the request you submitted and click view details. Ensure the status is Succesful.

Verify the Security and L3 Policy on the APIC


This section describes how to verifying the security and Layer 3 (L3) policy on APIC.

Procedure

Step 1 Log in to APIC Advanced GUI as the tenant, on the menu bar choose TENANTS > common.
Step 2 In the navigation pane, expand Tenant Common > Networking > Security Policies > Contracts.
a) Nested under Contracts there should be a new contract with the end_user_tenant
name-L3ext_ctrct_network_name that you connected to. (green-L3ext_ctrct_web-hosts)
b) Expand the end_user_tenant name-L3ext_ctrct_network_name. (green-L3ext_ctrct_web-hosts)
c) Choose the end_user_tenant name-L3ext_ctrct_network_name. (green-L3ext_ctrct_web-hosts)
d) In the Property pane, in the Filter field, click the filter. (green-L3ext_filt_web-hosts)
e) In the Properties pane, you can see the filter is mapped to vRealize.
Step 3 In the navigation pane, expand Tenant Common > Networking > External Routed Networks > default
> Networks > defaultInstP.

Cisco ACI Virtualization Guide, Release 2.2(2)


257
Cisco ACI with VMware vRealize
Application Deployment Scenarios

a) In the Properties pane, in the Provided Contracts field, you should see the end_user_tenant
name-L3ext_ctrct_network_name. (green-L3ext_filt_web-hosts)
b) In the Consumed Contracts field, you should see the end_user_tenant
name-L3ext_ctrct_network/EPG_name. (green-L3ext_filt_web-hosts)
Step 4 On the menu bar choose TENANTS > your_tenant.
Step 5 In the navigation pane, expand Tenant your_tenant > Application Profile > default > Application EPGs
> EPG web-hosts > Contracts.
a) In the Contracts pane, you can verify the contract and consumes a contract is present.

Verifying the Network Connectivity


This section describes how to verify the network connectivity.

Procedure

Log in to the virtual machine (web-host), from the command line, ping the other VM.

Application Deployment Scenarios


The following table shows the supported deployment scenarios:

Deployment Scenario Description


Web > L3out Web Tier to L3 external connectivity policy connected
using security policy (L3out configured in "default"
VRF)

Web > Firewall > L3out Web Tier with Firewall and L3out (L3out configured
in "outside" VRF)

Web > Load Balancer > L3out Web Tier with Load balancer connected to L3out
(L3out configured in "default")

Web > Load Balancer and Firewall > L3out Web Tier with Load balancer and Firewall service
connected to L3out (L3out configured in "outside")

Application > Web App tier to Web tier, connected using security policy

Database > Application Db tier to App tier, connected using security policy

Application > Load Balancer > Web App tier to Web tier using Load balancer. Traffic
from Web tier towards App tier is load balanced.

Application > Firewall > Web App tier to Web tier using firewall.

Cisco ACI Virtualization Guide, Release 2.2(2)


258
Cisco ACI with VMware vRealize
About Property Groups

In a multi-tenant deployment, there are some restrictions in the service deployment configuration. The
administrator must decide whether the applications in this deployment will use firewall services or a load
balancer-only service at the first (web) tier.
The following table shows the supported combinations of services in the shared plan:

Deployment FW + LB > L3out LB only > L3out FW > L3out LB between FW between EPGs
Type EPGs
Firewall only or Yes Yes Yes Yes
Firewall and
Load balancer

Load Balancer Yes Yes


only

In case of multi-tenancy, you should use a dedicated service device for each tenant.

About Property Groups


Property groups are a vRealize Automation (vRA) construct that provide virtual machine customization. Using
property groups, vRA can invoke workflows in vRealize Orchestration (vRO) at given stage of virtual machine's
life cycle. This virtual machine extension capability is used by Application Policy Infrastructure Controller
(APIC) vRealize to invoke APIC vRA workflows and configure APIC policies.
APIC vRealize supports a number of application deployment scenarios. In a multi-tier application, the APIC
security policy or the load balancing or firewall services can be inserted between tiers. This is achieved by
the following steps:
1 Execute the Configure Property Group catalog-item in the Admin Services catalog to create a property
group.
2 Use the Security Policy, Load Balancer, and Firewall tabs to customize the property group.
3 Enable the property group in the single-machine blueprint at the Infrastructure > Blueprints > Single
Machine Blueprint level in vRealize.

About Service Blueprints


This section describes the service blueprints.
In vRealize there are two sets of blueprints one is a machine blueprints that is for compute for installing,
setting up VMs, and spinning VMs. There is a single- and a multi-machine blueprint for launching single-tier
application workload or multi-tier application workload that is called machine blueprint for networking
workflows.
Admin workflow:
Create APIC handles
Create VMM domains
Create Tenants

Cisco ACI Virtualization Guide, Release 2.2(2)


259
Cisco ACI with VMware vRealize
About Service Blueprints

Create subnets in common


Create Layer 4-7 devices

Tenant workflow:
Create EPGs
Create contracts
Provide contracts
Consume contracts
Consume L3Outs
Consume Layer 4-7 devices

Customizing Service Blueprints to a Specific Setup


The Cisco Advanced Service Designer (ASD) blueprints can be used to customize a setup for any tenant.
Users can specify which tenant by specifying the vRealize Automation (vRA) handle that is associated with
the tenant in the Install ACI Service Catalog workflow.

Using the vRealize Utils Workflow to Import Blueprints and Configure the Entitlements
This section describes how to use the vRealize utils to import blueprints and configure the entitlements.

Procedure

Step 1 Log in to the VMware vRealize Orchestrator as administrator.


Step 2 Once the VMware vRealize Ochestrator GUI appears, from the drop-down list, choose Run from the menu
bar.
Step 3 In the Navigation pane, choose the Workflows icon.
Step 4 Choose vra_name > Cisco APIC workflows > Utils > Install ACI Service Catalog.
Step 5 Right-click Install ACI Service Catalog and choose Start Workflow.
Step 6 In the Start Workflow: Install ACI Service Catalog dialog box, perform the following actions:
a) In the JSON File containing vRealize Properties field, enter the JSON file containing the vRealize
properties. (vra-properties.json)
b) For the Delete All Cisco Service Blueprints (Cannot be reverted) radio buttons, choose Yes.
c) In the Zip file containing the service blueprints field, enter the name of the zip file that contains the
service blueprints. (advanced-designer-service.zip)
d) For the Do you want to use an existing vRA handle and business group radio buttons, choose No.
e) For the Do you want to use an existing vRA handle radio buttons, choose No.
f) For the Do you want to use an existing vRA business group radio buttons, choose Yes.
g) In the Admin user field, enter the administrator user name plus the fully-qualified domain name.
([email protected])
h) In the End user field, enter the end user names that are associated with your vRealize.
([email protected])
These users will be the tenant users for the entitlements, except for the admin entitlement.

Cisco ACI Virtualization Guide, Release 2.2(2)


260
Cisco ACI with VMware vRealize
About Service Blueprints

i) Click Submit.
Step 7 In the navigation pane, expand Install ACI Service Catalog.
Step 8 Right-click Install ACI Service Catalog xx.yy.zz, where xx.yy.zz is the identifier of the service catalog that
you just installed, and choose Start Workflow.
Step 9 In the Workflow interacton form - Install ACI Service Catalog : User interaction dialog box, perform
the following actions:
a) In the Host Name field, enter the name of the host without any spaces.
b) In the Host URL field, enter the host's URL.
c) For the Automatically install SSL certificates radio buttons, choose Yes.
d) In the Connection field, leave the default value.
e) In the Operation timeout field, leave the default value.
f) In the Tenant field, enter the tenant's name, in all lowercase.
g) In the Authentication username field, enter the administrator user name plus the fully-qualified domain
name.
h) In the Authentication password field, enter the administrator password.
i) Click Submit.
Step 10 In the navigation pane, expand Install ACI Service Catalog.
Step 11 Right-click Install ACI Service Catalog xx.yy.zz, where xx.yy.zz is the identifier of the service catalog that
you just installed, and choose Start Workflow.
Step 12 In the Workflow interacton form - Install ACI Service Catalog : Ask for business group dialog box, click
Not set.
Step 13 In the Select dialog box, choose vRealize Automation > Cisco APIC workflows > Administration >
Business Groups > business_group, where business_group is the business group for your setup.
Step 14 Click Select.
Step 15 In the Workflow interacton form - Install ACI Service Catalog : Ask for business group dialog box, click
Submit.

Once the business group has been submitted, the workflow will set up your vRealize Automation with the
catalog items and users assigned to entitlements. The workflow takes about five minutes to complete.

Integration with vRealize Network Profiles (IPAM)


vRealize IP address management (IPAM) uses the network profiles concept to assign a pool of addresses to
one or more networks. You can assign network profiles to ACI backed networks in the same fashion as a
regular vRealize network.
To integrate with the vRealize IPAM:

Procedure

Step 1 Ensure the subnet exists to the bridge domain.


See Add or Delete Subnets in Bridge Domain for Tenant-Common.

Step 2 Create a network profile.


See VMware's documentation for creating a network profile.

Cisco ACI Virtualization Guide, Release 2.2(2)


261
Cisco ACI with VMware vRealize
Documentation of APIC Workflows in vRealize Orchestrator

Step 3 This depends on if your blueprint generates a new network or not:


If you use the same network for each machine blueprint:
Under your vCenter reservation find the EPG (Network Path) and assign the network profile to it.
a) In the vCenter, navigate to Infrastructure > Reservations.
b) Find "Your Reservation", hover and click Edit.
c) Navigate to Network > Find desired Network Path (EPG), from the drop-down list, choose the Network
Profile and click Ok.
If you generate a network per VM:
Add a property to your property group with the network profile as the value.
a) In the vCenter, navigate to Infrastructure > Blueprints > Property Groups.
b) Find "Your Blueprint", hover and click Edit.
c) Click + New Property.
d) Set the Name to "VirtualMachine.NetworkX.NetworkProfileName".
where X is the VM NIC number (in the range [0-9]).
e) Set the Value to the name of the Network Profile you created.
f) Click the green tick icon to confirm and click Ok.
New applications will be assigned an address from this pool.

Step 4 Use guest customizations to assign the IP address to the server.


See VMware's documentation for guest customizations.

Documentation of APIC Workflows in vRealize Orchestrator


To get documentation on the APIC methods and types, the vRO API search can be used.
1 Log in to the vRO GUI, choose Tools > API Search
2 Enter APIC.
This shows the list of all APIC methods and types.

List of Methods in ApicConfigHelper Class


This section provides a list of methods in ApicConfigHelper class.

This adds an APIC host to the repository and does a login to the APIC:
ApicHandle addHost(String hostName,
String hostIp0,
String hostIp1,
String hostIp2,
String userName,
String pwd,
int port,
boolean noSsl,
String role,
String tenantName)

Cisco ACI Virtualization Guide, Release 2.2(2)


262
Cisco ACI with VMware vRealize
Documentation of APIC Workflows in vRealize Orchestrator

This gets the APIC handle give the APIC name:


ApicHandle getApicHandle(String hostName)

This gets the list of APIC handles for a given <role, username>:
List<ApicHandle> getApicHandleByRole(String role, String userName)

This removes an APIC host from the repository:


boolean removeHost(String inApicName)

This creates Tenant endpoint group and association to vmmDomain in APIC:


ApicResponse addNetwork(ApicHandle handle,
String tenantName,
String apName,
String epgName,
String bdName,
String ctxName,
String subnet,
String domName,
boolean vmm,
boolean vpc,
boolean intraEpgDeny,
boolean allowUseg,
String encapMode)

This updates the domain of the endpoint group by adding or deleting:


ApicResponse updateNetwork(ApicHandle handle,
String tenantName,
String apName,
String epgName,
String domName,
boolean vmm,
boolean add,
String encapMode)

This adds or deletes subnets to the bridge domain in the virtual private cloud (VPC) tenant:
ApicResponse updateSubnets(ApicHandle handle,
String tenantName,
String bdName,
fvSubnet subnetList[],
boolean add)

This adds or deletes the bridge domain to or from the tenant:


ApicResponse updateBD(ApicHandle handle,
String tenantName,
String bdName,
String ctxName,
boolean arpFlooding,
String l2UnknownUnicast,
String l3UnknownMulticast,
boolean add)

This adds or deletes the context (Ctx) to or from the tenant:


ApicResponse updateCtx(ApicHandle handle,
String tenantName,
String ctxName,
boolean add)

This adds or deletes the following based on add or delete:


ApicResponse addOrDeleteLBToNetwork(ApicHandle handle,
String tenantName,
String apName,
String epgName,
String bdName,
String ctxName,
boolean vpc,
String planName,

Cisco ACI Virtualization Guide, Release 2.2(2)


263
Cisco ACI with VMware vRealize
Documentation of APIC Workflows in vRealize Orchestrator

String lbVendor,
String ldevName,
String graphName,
boolean sharedLb,
String protocol,
String port,
String consumerDn,
String snipIntAddress,
String snipIntNetMask,
String snipExtAddress,
String snipExtNetMask,
String snipNextHopGW,
boolean addOperation)

This opens a connection to the URL, sends the postBody string to the URL location, and returns result:
ApicResponse addOrDelFWReq(ApicHandle handle,
String tenantName,
String apName,
String epgName,
String ctrctName,
String graphName,
vzEntry entryList[],
String consumerDn,
boolean addOp,
boolean updateOp)

This adds the firewall service to an endpoint group in the shared and VPC plan:
ApicResponse addFWToNetwork(ApicHandle handle,
String tenantName,
String apName,
String epgName,
boolean vpc,
String fwVendor,
String ldevName,
String graphName,
vzEntry entryList[],
String fwL3extExternal,
String fwL3extInternal,
boolean skipFWReq,
String consumerDn)

This deletes the firewall from the endpoint group in the shared and VPC Plan:
ApicResponse deleteFWFromNetwork(ApicHandle handle,
String tenantName,
String apName,
String epgName,
boolean vpc,
String graphName,
String ctrctName,
String protocol,
String startPort,
boolean skipFWReq,
String consumerDn)

This implements the REST API to APIC:


String apicRestApi(ApicHandle handle,
String apiUrl,
String method,
String postBody)

This adds or deletes the router ID in a tenant:


ApicResponse addOrDelRouterId(ApicHandle handle,
String rtrId,
boolean addOp)

Cisco ACI Virtualization Guide, Release 2.2(2)


264
Cisco ACI with VMware vRealize
Documentation of APIC Workflows in vRealize Orchestrator

This deletes the tenant endpoint group and the association:


ApicResponse deleteNetwork(ApicHandle handle,
String tenantName,
String apName,
String epgName)

This creates the tenant, bridge domain and the context (Ctx) in APIC:
ApicResponse addTenant(ApicHandle handle,
String tenantName,
String bdName,
String ctxName,
String aaaDomain)

This deletes the tenant in APIC:


ApicResponse deleteTenant(ApicHandle handle,
String tenantName)

This adds VlaNS, vmmDomP, vmmCtrlP, vmmUsrAccp and required relation objects to the APIC:
ApicResponse addVmmDomain(ApicHandle handle,
String dvsName,
String vcenterIP,
String userName,
String passwd,
String datacenter,
String vlanPoolName,
int vlanStart,
int vlanEnd,
String aaaDomain)

This deletes VlanNS and vmmDomP objects from the APIC:


ApicResponse deleteVmmDomain(ApicHandle handle,
String domName,
String vlanPoolName)

This adds or deletes encap blocks in the VLAN pool:


ApicResponse updateVlanPool(ApicHandle handle,
String vlanPoolName,
fvnsEncapBlk encapList[])

This adds the security policy (contract entry):


ApicResponse addSecurityPolicySet(ApicHandle handle,
String tenant,
String ap,
String srcEpg,
String dstEpg,
vzEntry entryList[],
boolean createFlg
)

This updates the security policy (contract entry):


ApicResponse updateSecurityFilters(ApicHandle handle,
String tenant,
String filterName,
vzEntry entryList[]
)

This adds or removes the consumer contract interface:


ApicResponse updateSharedSvcConsumer(ApicHandle handle,
String tenant,
String ap,
String consumerEpg,
vzBrCP contract,
boolean add
)

Cisco ACI Virtualization Guide, Release 2.2(2)


265
Cisco ACI with VMware vRealize
Documentation of APIC Workflows in vRealize Orchestrator

This updates the security policy (contract entry):


ApicResponse updateL3outPolicy(ApicHandle handle,
String tenant,
String ap,
String dstEpg,
vzEntry entryList[],
l3extOut l3out,
boolean vpc,
boolean add
)

This deletes all the security policy (contracts):


ApicResponse deleteSecurityPolicy(ApicHandle handle,
String tenant,
String ap,
String srcEpg,
String dstEpg
)

This creates VIP address block in the tn-common:


ApicResponse addVipPool(ApicHandle handle,
String planName,
String addrStart,
String addrEnd)

This deletes VIP address block in the tn-common:


ApicResponse deleteVipPool(ApicHandle handle,
String planName,
String addrStart,
String addrEnd)

This adds or deletes the security domain associations:


ApicResponse updateVmmDomain(ApicHandle handle,
String domName,
aaaDomainRef aaaList[])

This deletes a shared service provider (endpoint group) from a contract:


ApicResponse deleteSharedServiceProvider(ApicHandle handle,
String tenant,
String ap,
String srcEpg,
String dstEpg,
vzBrCP contract)

This creates AVS VMM Domain and adds related objects to the APIC:
ApicResponse addAvsVmmDomain(ApicHandle handle,
String dvsName,
String aepName,
String vcenterIP,
String userName,
String passwd,
String dvsVersion,
String datacenter,
String mcastIP,
String poolName,
String rangeStart,
String rangeEnd,
String aaaDomain,
int domType,
String secondRangeStart,
String secondRangeEnd,
String secondPoolName)

This updates the pools (VLAN, Multicast Address) relevant to Cisco AVS VMM domain:
ApicResponse updateAvsVlanMcastPool(ApicHandle handle,
String poolName,

Cisco ACI Virtualization Guide, Release 2.2(2)


266
Cisco ACI with VMware vRealize
Documentation of APIC Workflows in vRealize Orchestrator

fvnsEncapBlk encapList[],
int poolType)

This deletes Cisco AVS VMM Domain:


ApicResponse deleteAvsVmmDomain(ApicHandle handle,
String domName,
String poolName,
int poolType)

This deletes Cisco AVS VMM Domain which is in mixed mode:


ApicResponse deleteAvsVmmDomainMixedmode(ApicHandle handle,
String domName )

This creates Distributed Firewall for Cisco AVS VMM domain:


ApicResponse createFWPol(ApicHandle handle,
String polName,
String vmmName,
String polMode,
String pInterval,
String logLevel,
String adminState,
String destGrpName,
String inclAction,
int caseVal)

This updates Distributed Firewall association with Cisco AVS VMM domain:
ApicResponse updateFWPolMapping(ApicHandle handle,
String polName,
String vmmName,
Boolean opValue)

This deletes Distributed Firewall:


ApicResponse deleteFWPol(ApicHandle handle,
String polName)

This adds or deletes attribute(s) for a Microsegment EPG:


ApicResponse addOrDelUsegAttr(ApicHandle handle,
String tenantName,
String apName,
String epgName,
String criteriaName,
fvVmAttrV addFvVmAttrList[],
fvMacAttr addFvMacAttrList[],
fvIpAttr addFvIpAttrList[],
fvVmAttr delFvVmAttrList[],
fvMacAttr delFvMacAttrList[],
fvIpAttr delFvIpAttrList[])

This adds a microsegment EPG:


ApicResponse addUsegEpg(ApicHandle handle,
String tenantName,
String apName,
String epgName,
String bdName,
String ctxName,
String subnet,
String domName,
String criteriaName,
boolean vmm,
boolean vpc,
boolean intraEpgDeny,
fvVmAttrV fvVmAttrList[],
fvMacAttr fvMacAttrList[],
fvIpAttr fvIpAttrList[],
String encapMode)

Cisco ACI Virtualization Guide, Release 2.2(2)


267
Cisco ACI with VMware vRealize
Writing Custom Workflows Using the APIC Plug-in Method

Writing Custom Workflows Using the APIC Plug-in Method


This section describes how to write custom workflows using the Application Policy Infrastructure Controller
(APIC) plug-in method. Tenants might have unique requirements for their logical network topology that are
not covered by the out-of-box designs. Existing Cisco APIC workflows can be combined together into a
custom workflow that enables limitless network designs.
All workflows expect a set of input parameters, and workflows that create new objects will export a set of
output parameters. Output parameters can be chained into the input parameter of the next workflow.
The following example procedure creates a custom workflow that builds a new network, and then directly
passes the newly created network into the input of the attach Layer 3 workflow.

Procedure

Step 1 Log in to the vRealize Orchestrator.


Step 2 Switch to the Design mode.
Step 3 In the Navigation pane, create a folder named "Custom Workflows".
Step 4 Choose the Custom Workflows folder.
Step 5 In the Work pane, click the New workflow button.
Step 6 In the Workflow name dialog box, enter a name for the workflow.
Example:
Create_Network_Attach_L3

Step 7 Click OK.


Step 8 Choose the Schema tab.
Step 9 In the Navigation pane, expand All Workflows > Administrator > Cisco APIC workflows > Tenant Shared
Plan
Step 10 Drag and drop Add Tenant Network - Shared Plan onto the blue arrow in the Work pane.
Step 11 In the Do you want to add the activity's parameters as input/output to the current workflow? dialog
box, click Setup....
Step 12 In the Promote Workflow Input/Output Parameters dialog box, click Promote.
Leave all of the values at their defaults.

Step 13 In the Navigation pane, expand All Workflows > Administrator > Cisco APIC workflows > Advanced
Network Services.
Step 14 Drag and drop Attach or Detach L3 external connectivity to Network onto the blue arrow that is to the
right of the Add Tenant Network object in the Work pane.
Step 15 In the Do you want to add the activity's parameters as input/output to the current workflow? dialog
box, click Setup....
Step 16 In the Promote Workflow Input/Output Parameters dialog box, click Promote.
Leave all of the values at their defaults.

Step 17 Choose the Inputs tab.


The screen displays the inputs for the workflow. You can verify that the inputs are all exposed and that the
created endpoint group is an output parameter.

Cisco ACI Virtualization Guide, Release 2.2(2)


268
Cisco ACI with VMware vRealize
Multi-Tenancy and Role based Access Control Using Security Domains

Step 18 Choose the Schema tab.


Step 19 In the Work pane, click Validate to verify that the custom workflow is valid.
Step 20 Click Close.
Step 21 Click Run to test the workflow.
Step 22 In the Start Workflow dialog box, click Submit to start the workflow.

Multi-Tenancy and Role based Access Control Using Security Domains


APIC and vRA both supports multi-tenancy natively. vRA tenant user is mapped one-to-one with a APIC
tenant user and thus Tenant names need to match exactly on both systems.
For every vRA tenant, APIC admin needs to ensure that an user account and required security domains and
roles are created in APIC as part of Day-0 operation.
As a next step, vRA-Admin would execute Add Tenant service blueprint (part of Admin catalog), to
create/update Tenant in APIC and associate it with the right security Domain. For eg: Tenant-Green on vRA
is mapped to Tenant-Green in APIC with association to Security Domain "Domain-Green" enabled for
"User-Green".
By associating tenant to right security domains, Role based access control is enforced and it allows for granular
as well stricter Tenant policy enforcement.

Adding the Tenant


This section describes how to add the tenant.
In this blueprint, a tenant identified by input parameter "Tenant" is created in APIC with association the
security domain that is provided as second input.

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Add Tenant, enter the information in the fields and click Submit.

Deleting the Tenant


This section describes how to delete the tenant from APIC.

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Delete Tenant, enter the information in the fields and click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


269
Cisco ACI with VMware vRealize
APIC Credentials for Workflows

APIC Credentials for Workflows


As part of ACI-integration with vRA, this release supports pairing up vRA with a ACI fabric managed by a
APIC-cluster.
The network service blueprints are categorized into Admin and Tenant workflows and accordingly vRA admin
has to setup APIC connection handles for APIC-Admin credential as well as APIC-Tenant credential for every
vRA-Tenant.
As part of plug-in, the right handles (Admin vs Tenant) are auto-selected implicitly based on the workflow
context and the privileges needs to create and managed objects in APIC. This provides stronger access control
and isolation among tenants.

Adding APIC with Admin Credentials


This section describes how to add APIC with admin credentials.
All the blueprints and workflows that are part of catalog items in Admin portal are performed using the
Admin-credential.

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Network Security.
Step 2 Choose Add APIC with Admin Credentials, enter the information in the fields and click Submit.
Step 3 To access APIC using certificates, set the "Use certificate authentication" to yes and enter the Certificate
Name and Private Key parameters.

Adding APIC with Tenant Credentials


This section describes how to using tenant admin credentials (security domain).

Procedure

Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Add APIC with Tenant credentials, enter the information in the fields and click Submit.
Step 3 To access APIC using certificates, set the "Use certificate authentication" to yes and enter the Certificate
Name and Private Key parameters.

Troubleshooting
This section describes the troubleshooting techniques.

Cisco ACI Virtualization Guide, Release 2.2(2)


270
Cisco ACI with VMware vRealize
Collecting the Logs to Report

Collecting the Logs to Report


This section describes how to collect the log files from the vRealize Appliance to report.

Procedure

To collect the log files, enter the following commands:


tar xvfz apic-vrealize-1.2.1x.tgz
cd apic-vrealize-1.2.1x
cd scripts/
./get_logs.sh
Usage: get_logs.sh [-u] [-p <password>] [-s <vra_setup>]
-p password (can be skipped for default passwd)
-s vra_setup
-u un-compress (ie., don't create .tar.gz file)

Example:
./get_logs.sh p ***** -s vra-app

VMware vRealize Automation Appliance
Compressing Logs
logs/
logs/app-server/
logs/app-server/catalina.out
logs/app-server/server.log
logs/configuration/
logs/configuration/catalina.out
Logs saved in vra_logs_201511251716.tar.gz

Installing the ACI Helper Scripts


This section describes how to install the helper scripts. The ACI helper scripts provide the following:
Restarts the vco-server and vco-configurator
Uninstalls the APIC plug-in

Procedure

To install the helper scripts, enter the following commands:


cd scripts
./install_apic_scripts.sh
Usage: install_apic_scripts.sh [-p <password>] [-s <vra_setup>]
-p password
-s vra_setup

Example:
./install_apic_scripts.sh -p ***** -s vra-app
Copying APIC scripts 'rmapic', 'restart' to vra: vra-app

Cisco ACI Virtualization Guide, Release 2.2(2)


271
Cisco ACI with VMware vRealize
Removing the APIC Plug-in

Removing the APIC Plug-in


This section describes how to remove the APIC plug-in.

Procedure

Step 1 Log in to the VRA appliance as root using SSH:


$ ssh root@<vra_ip>

Step 2 Create a rmapic bash script in ~/rmapic and add the following content:
#!/bin/bash

cd /usr/lib/vco
find . -name "*aci*" -exec rm -rf {} \;
cd /var/lib/vco
find . -name "*aci*" -exec rm -rf {} \;\rm -f /var/lib/vco/app-server/conf/plugins/apic.xml
cd /var/lib/vco/app-server/conf/plugins/
sed -i.bak '/<entry key="APIC">.*<\/entry>/d _VSOPluginInstallationVersion.xml
service vco-configurator restart;sleep 10;service vco-server restart

Step 3 Change the permissions to the rmapic bash script to be executable:


# chmod a+x rmapic

Step 4 Execute the rmapic bash script to remove the APIC plug-in:
# ~/rmapic

Step 5 Click Plug-ins.


Step 6 In the right-side pane, scroll and click search/browse.
a) Locate where you saved the aci-vra-plugin-2.2.1000.N.dar file and choose the
aci-vra-plugin-2.2.1000.N.dar .
b) Click Upload and install.
Step 7 Restart the configurator and the app-server:
service vco-configurator restart;sleep 10;service vco-server restart

Plug-in Overview
vRA Blueprints input parameters vRO Javascript Object Name APIC Managed Object Name
Tenant ApicTenant com.cisco.apic.mo.fvTenant

Cisco ACI Virtualization Guide, Release 2.2(2)


272
Cisco ACI with VMware vRealize
Configuring a vRA Host for the Tenant in the vRealize Orchestrator

vRA Blueprints input parameters vRO Javascript Object Name APIC Managed Object Name
Bridge Domain ApicBridgeDomain com.cisco.apic.mo.fvBD

VRF ApicL3Context com.cisco.apic.mo.fvCtx

Tenant Network (EPG) ApicEPG com.cisco.apic.mo.fvAEPg

Security Policy (Contracts) ApicSecurityPolicy com.cisco.apic.mo.vzBrCP

Security Filters ApicSecurityFilter com.cisco.apic.mo.vzFilter

Security Rules ApicSecurityRule com.cisco.apic.mo.vzEntry

AAA Domain ApicAAADomain com.cisco.apic.mo.aaaDomain

VMM Domain ApicVmmDomain com.cisco.apic.mo.vmmDomP

VMM Controller ApicVmmController com.cisco.apic.mo.vmmCtrlrP

Physical Domain ApicPhysicalDomain com.cisco.apic.mo.physDomP

L4-L7 Device Cluster ApicLogicalLBDevice com.cisco.apic.mo.vnsLDevVip

L3 external connectivity ApicL3Connectivity com.cisco.apic.mo.l3extOut

Configuring a vRA Host for the Tenant in the vRealize


Orchestrator
This section describes how to configure a vRA host for the tenant in the vRealize Orchestratorr (vRO).

Note There will be one vRA host handle already created by default. This is for the global tenant and is used for
administration purposes and to create the IaaS host handle.

Procedure

Step 1 Log in to the VMware vRealize Orchestrator as administrator.


Step 2 Once the VMware vRealize Ochestrator GUI appears, from the drop-down list, choose Run from the menu
bar.
Step 3 In the Navigation pane, choose the Workflows icon.
Step 4 Choose Adminstrator@vra_name > Library > vRealize Automation > Configuration > Add a vRA host.
Step 5 Right-click Add a vRA host and choose Start Workflow.
Step 6 In the Start Workflow: Add a vRA host dialog box, perform the following actions:

Cisco ACI Virtualization Guide, Release 2.2(2)


273
Cisco ACI with VMware vRealize
Configuring an IaaS Host in the vRealize Orchestrator

a) In the Host Name field, enter the host's name.


b) In the Host URL field, enter the host's URL.
c) For Autotmatically install SSL certificates, choose Yes.
d) In the Connection timeout field, enter "30".
e) In the Operation timeout field, enter "60".
f) For Session Mode, choose Shared session.
g) In the Tenant field, enter the tenant's name.
h) In the Authentication username field, enter your tenant administrator username.
i) In the Authentication pwd field, enter your tenant administrator password.
j) Click Submit.

Configuring an IaaS Host in the vRealize Orchestrator


This section describes how to configure an IaaS host in the vRealize Orchestratorr (vRO).

Procedure

Step 1 Log in to the VMware vRealize Orchestrator as administrator.


Step 2 Once the VMware vRealize Ochestrator GUI appears, from the drop-down list, choose Run from the menu
bar.
Step 3 In the Navigation pane, choose the Workflows icon.
Step 4 Choose Adminstrator@vra_name > Library > vRealize Automation > Configuration > Add the Iaas
host of a vRA host.
Step 5 Right-click Add the Iaas host of a vRA host and choose Start Workflow.
Step 6 In the Start Workflow: Add the Iaas host of a vRA host dialog box, perform the following actions:
a) In the vRA Host drop-down list, choose the default vRA host that was created by the system. Do not
choose the tenant handle.
b) In the Host Name field, leave the auto-filled name as is.
c) In the Host URL field, enter the vRA host's URL.
d) In the Connection timeout field, enter "30".
e) In the Operation timeout field, enter "60".
f) For Session Mode, choose Shared session.
g) In the Authentication username field, enter your IaaS administrator username.
h) In the Authentication pwd field, enter your IaaS administrator password.
i) In the Workstation for NTLM authentication field, enter your IaaS host name.
j) In the Domain for NTLM authentication field, enter your IaaS domain name.
k) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


274
Cisco ACI with VMware vRealize
Installing the vRO Customizations

Installing the vRO Customizations


This section describes how to install the vRealize Orchestrator (vRO) customizations. This enables the virtual
machine extensibility in vRealize Automation (vRA)/IaaS. The following website provides more information
about vRO customizations and installation procedure:
http://orchestration.io/2015/02/09/installing-vro-customizations-on-vrealize-automation/

Procedure

Step 1 Log in to the VMware vRealize Orchestrator as administrator.


Step 2 Once the VMware vRealize Ochestrator GUI appears, from the drop-down list, choose Run from the menu
bar.
Step 3 In the Navigation pane, choose the Workflows icon.
Step 4 Choose Adminstrator@vra_name > Library > vRealize Automation > Infrastructure Administration
> Extensibility > Installation > Install vRO Customization.
Step 5 In the Install vRO Customization dialog box, perform the following actions:
a) In the vRA Host screen, in the vRA host drop-down list, choose IaaS host.
b) Click Next.
c) In the Stubs screen, use the default values.
d) Click Next.
e) In the Virtual machine menus screen, change the number of menu actions, if necessary.
f) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


275
Cisco ACI with VMware vRealize
Installing the vRO Customizations

Cisco ACI Virtualization Guide, Release 2.2(2)


276
CHAPTER 8
Cisco ACI vCenter Plug-in
This chapter contains the following sections:

About Cisco ACI with VMware vSphere Web Client, page 277
Getting Started with Cisco ACI vCenter Plug-in, page 278
Cisco ACI vCenter Plug-in Features and Limitations, page 283
Upgrading VMware vCenter when Using the Cisco ACI vCenter Plug-in, page 288
Cisco ACI vCenter Plug-in GUI, page 289
Performing ACI Object Configurations, page 296
Uninstalling the Cisco ACI vCenter Plug-in, page 305
Upgrading the Cisco ACI vCenter Plug-in, page 306
Troubleshooting the Cisco ACI vCenter Plug-in Installation, page 306
Reference Information, page 307

About Cisco ACI with VMware vSphere Web Client


The Cisco ACI vCenter plug-in is a user interface that allows you to manage the ACI fabric from within the
vSphere Web client.
This allows the VMware vSphere Web Client to become a single pane of glass to configure both VMware
vCenter and the ACI fabric.
The Cisco ACI vCenter plug-in empowers virtualization administrators to define network connectivity
independently of the networking team while sharing the same infrastructure.
No configuration of in-depth networking is done through the Cisco ACI vCenter plug-in. Only the elements
that are relevant to virtualization administrators are exposed.

Cisco ACI Virtualization Guide, Release 2.2(2)


277
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Overview

Cisco ACI vCenter Plug-in Overview


The Cisco Application Centric Infrastructure (ACI) vCenter plug-in for the VMware vSphere Web Client,
adds a new view to the GUI called Cisco ACI Fabric.
The Cisco Application Centric Infrastructure (ACI) vCenter plug-in does not change existing integration of
ACI with vCenter, it allows you to configure an EPG, uSeg EPG, contract, tenant, VRF, and bridge domain
from the VMware vSphere Web Client.
Cisco Application Centric Infrastructure (ACI) vCenter plug-in is stateless, fetches everything from Application
Policy Infrastructure Controller (APIC) and does not store any information.
The following is a brief overview of the features provided by Cisco ACI vCenter plug-in:
For more detailed information, see Cisco ACI vCenter Plug-in Features and Limitations, on page 283.
The Cisco ACI vCenter plug-in provides the possibility to create, read, update and delete (CRUD) the following
object on the ACI Fabric:
Tenant
Application Profile
EPG / uSeg EPG
Contract
VRF
Bridge Domain

The Cisco ACI vCenter plug-in also provides a more limited operation regarding the usage of L2 and L3 Out,
where all of the advanced configuration needs to be done in APIC beforehand.
Preconfigured L2 and L3 Out can be used as providers or consumers of a contract.
Cannot be created, edited or deleted.

The Cisco ACI vCenter plug-in also allows to consume preconfigured L4-L7 Services, by applying existing
graph template to a Contract.
Can use existing graph templates, not create them.
Only empty mandatory parameter of the function profile will be displayed and configurable.

The Cisco ACI vCenter plug-in also has troubleshooting capabilities:


Endpoint to endpoint sessions (Faults, Audits, Events, Stats, Contract, Traceroute )

Getting Started with Cisco ACI vCenter Plug-in


Cisco ACI vCenter Plug-in Software Requirements
The Cisco ACI vCenter plug-in Software Requirements:

Cisco ACI Virtualization Guide, Release 2.2(2)


278
Cisco ACI vCenter Plug-in
Required APIC Configuration

Platform Series Recommended Release


vCenter
5.5 Linux Appliance
5.5 Windows Server 2008
6.0 Linux Appliance
6.0 Windows Server 2008
6.5 Linux Appliance
6.5 Windows Server 2008

Application Policy Infrastructure Controller (APIC) Release 2.2(1)


Release 2.2(2)

Required APIC Configuration


This sections describes the required APIC configuration.
At least one VMM domain should already exists between the APIC and the vCenter where the plug-in is being
installed.
For more information, see the Cisco Application Centric Infrastructure Fundamentals Guide.

Installing the Cisco ACI vCenter Plug-in


This section describes how to install the Cisco ACI vCenter plug-in. You must have working HTTPS traffic
between your vCenter and APIC, as the vCenter will be downloading the plug-in directly from the APIC.
If you cannot enable HTTPS traffic between your vCenter and APIC, and you wish to use your own web
server to host the Cisco ACI vCenter plug-in zip file, see the Alternative Installation of the Cisco ACI vCenter
Plug-in, on page 307.
If you are using vCenter 5.5 (Update 3e or later) or vCenter 6.0 (Update 2 or later), follow the procedure in
this section. If you are using an earlier release of vCenter 5.5 or 6.0, see the Alternative Installation of the
Cisco ACI vCenter Plug-in, on page 307.
To install a plug-in, the vCenter must download the plug-in from a Web Server. In the following procedure,
the APIC is used as the Web Server, and the vCenter downloads the plug-in directly from the APIC.
Prior to vCenter 5.5 Update 3e or vCenter 6.0 Update 2, vCenter uses TLSv1 for the HTTPS communication,
which is now obsolete. For security reasons APIC only supports TLSv1.1 and TLSv1.2, therefore the vCenter
will not be able to download the plug-in from the APIC. The plug-in must be put on a separate Web server,
that allows TLSv1 or that does not use HTTPS.

Before You Begin


Make sure all of the prerequisites are met.
For more information, see the Cisco ACI vCenter Plug-in Software Requirements, on page 278 and
Required APIC Configuration, on page 279 sections.

Cisco ACI Virtualization Guide, Release 2.2(2)


279
Cisco ACI vCenter Plug-in
Connecting vCenter Plug-in to your ACI Fabric

Ensure HTTPS traffic is allowed between your vCenter server and APIC.

Procedure

Step 1 Go to the following URL:

Example:
https://<APIC>/vcplugin

Step 2 Follow the instructions on that web page.

Connecting vCenter Plug-in to your ACI Fabric


This section describes how to connect the vCenter plug-in to your ACI fabric.

Note The registration is vCenter wide and it does not take into account the user that performs it. It is a
configuration for the whole vCenter, not just for the logged in user that performs it.
Role Based Access Control (RBAC) is based on the credentials used upon registration. Permission
of the APIC account used for the registration defines configuration restriction on the vCenter plug-in.

You can connect the vCenter plug-in to your ACI fabric, using one of the following ways:

Connect the vCenter plug-in to your ACI fabric using For more information, see Connecting vCenter
credentials. Plug-in to your ACI Fabric Using Credentials, on
page 280.

Connect the vCenter plug-in to your ACI fabric using For more information, see Connecting vCenter Plug-in
an existing certificate. to your ACI Fabric Using an Existing Certificate, on
page 281.

Connect the vCenter plug-in to your ACI fabric by For more information, see Connecting vCenter Plug-in
creating a new certificate. to your ACI Fabric by Creating a New Certificate,
on page 282.

Connecting vCenter Plug-in to your ACI Fabric Using Credentials


This section describes how to connect vCenter plug-in to your ACI fabric using credentials.

Before You Begin


Ensure the Cisco ACI vCenter plug-in is installed. For more information, see Installing the Cisco ACI vCenter
Plug-in, on page 279.

Cisco ACI Virtualization Guide, Release 2.2(2)


280
Cisco ACI vCenter Plug-in
Connecting vCenter Plug-in to your ACI Fabric

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Cisco ACI Fabric.
Step 3 In the Getting Started pane, choose Connect vSphere to your ACI Fabric.
Step 4 In the Register a new ACI Fabric dialog box, click Yes to register a new ACI fabric.
Step 5 In the Register a new APIC Node dialog box, perform the following actions:
a) In the IP/FQDN field, enter the IP address or the fully qualified domain name (FQDN).
b) In the Use Certificate field, do not put a check in the Use Certificate check box to use APIC authentication.
c) In the Username field, enter the user name (admin).
d) In the Password field, enter the password.
e) Click OK.
Step 6 In the Information dialog box, click OK.
The APIC node was successfully added to the ACI fabric.

Step 7 In the ACI Fabric pane, you will see the new registered APIC discover the other APICs.
The Cisco ACI vCenter plug-in always uses a single APIC for its requests. It will however switch the APIC,
if the APIC currently used is no longer available.

Connecting vCenter Plug-in to your ACI Fabric Using an Existing Certificate


This section describes how to connect the vCenter plug-in to your ACI fabric using an existing certificate.

Before You Begin


A certificate is already setup on the APIC for the admin user.
You have the name and private key of the certificate.

Procedure

Step 1 Log in to the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Cisco ACI Fabric.
Step 3 In the Getting Started pane, choose Connect vSphere to your ACI Fabric.
Step 4 In the Register a new ACI Fabric dialog box, click Yes to register a new ACI fabric.
Step 5 In the Register a new APIC Node dialog box, perform the following actions:
a) In the IP/FQDN field, enter the IP address or the fully qualified domain name (FQDN).
b) In the Use Certificate field, check the Use Certificate check box.
Step 6 In the Action section, choose Use an existing certificate.
Step 7 In the Name field, enter the certificate name.
Step 8 In the Private Key section, paste the private key of the certificate.
Step 9 Click Check Certificate.

Cisco ACI Virtualization Guide, Release 2.2(2)


281
Cisco ACI vCenter Plug-in
Connecting vCenter Plug-in to your ACI Fabric

The status switches to Connection Success.


Note If connection failure is displayed, check that the certificate name and private key are correct, and try
again.
Step 10 Click OK.
Step 11 In the Information dialog box, click OK .
The APIC node was successfully added to the ACI fabric.
Step 12 In the ACI Fabric pane the newly registered APIC discovers the other APICs.
The Cisco ACI vCenter plug-in always uses a single APIC for its requests. If the currently used APIC is no
longer available, the Cisco ACI vCenter plug-in switches APICs.

Connecting vCenter Plug-in to your ACI Fabric by Creating a New Certificate


This section describes how to connect the vCenter plug-in to your ACI fabric by creating a new certificate.

Before You Begin


Ensure the plug-in is installed.
You have access to the APIC admin credentials.

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Cisco ACI Fabric.
Step 3 In the Getting Started pane, choose Connect vSphere to your ACI Fabric.
Step 4 In the Register a new ACI Fabric dialog box, click Yes to register a new ACI fabric.
Step 5 In the Register a new APIC Node dialog box, perform the following actions:
a) In the IP/FQDN field, enter the IP address or the fully qualified domain name (FQDN).
b) In the Use Certificate field, check the Use Certificate check box.
Step 6 In the Action field, choose Generate a new certificate.
Step 7 In the Name field, enter the new certificate name.
Step 8 Click the Generate certificate button.
Step 9 Copy the displayed certificate.
From -----BEGIN CERTIFICATE----- included, to -----END CERTIFICATE----- included.

Step 10 Add this certificate to the admin user in APIC. Make sure to use the same certificate name.
a) Log into the APIC GUI as admin.
b) On the menu bar, choose Admin.
c) In the Navigation pane, expand Security Management > Local Users > admin.
d) In the Work pane, in the User Certificate section, click the plus icon to add the certificate.
e) In the Name field, enter the certificate name.
f) In the Data field, paste the certificate content that you copied in step 8.

Cisco ACI Virtualization Guide, Release 2.2(2)


282
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Features and Limitations

g) Click Submit.
Step 11 In the vCenter plug-in, click Check Certificate.
The status changes to Connection Success.
Note If a Connection Failure message displays, check that the certificate is correctly added on the APIC
and that the certificate names are the same.
Step 12 Click OK.
Step 13 In the Information dialog box, click OK.
The APIC node is successfully added to the ACI fabric.
Step 14 In the ACI Fabric pane, the newly registered APIC discovers the other APICs.
The Cisco ACI vCenter plug-in always uses a single APIC for its requests. If the currently used APIC is no
longer available, the Cisco ACI vCenter plug-in switches APICs.

Cisco ACI vCenter Plug-in Features and Limitations


This section describes the possible operations provided by the Cisco ACI vCenter plug-in, for all object types
it manages. It also goes over intentional configuration limitations.
For more information about the objects, see the Cisco Application Centric Infrastructure Fundamentals Guide.

Tenants
The Cisco ACI vCenter plug-in allows CRUD operations on the Tenant object. The following attributes are
exposed in the plug-in:
Name: The name of the tenant.
Description (Optional): The description of the tenant.

When a tenant is created by the plug-in, a VRF <tenant_name>_default and a Bridge Domain
<tenant_name>_default connected to that VRF are automatically created inside. An Application Profile
<tenant_name>_default is also created inside it.
The infrastructure Tenant (infra) and the management Tenant (mgmt) are not exposed in the plug-in.

Note The tenants visible in the plug-in will also depends on the permissions associated with the account used
while registering the ACI fabric into the plug-in.

Application Profiles
The Cisco ACI vCenter plug-in allows CRUD operations on the Application Profile objects. The following
attributes are exposed in the plug-in:
Name: The name of the Application Profile.
Description (Optional): The description of the Application Profile.

Cisco ACI Virtualization Guide, Release 2.2(2)


283
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Features and Limitations

Endpoint Groups
The Cisco ACI vCenter plug-in allows CRUD operations on the Endpoint Group objects. The following
attributes are exposed in the plug-in:
Name: The name of the Endpoint Group.
Description (Optional): The description of the Endpoint Group
Bridge Domain: The Bridge Domain associated with this Endpoint Group.
Intra-EPG Isolation: This allows to deny all traffic between the virtual machines that are connected to
an EPG. By default, all virtual machines in the same EPG can talk to each other.
Distributed Switch: The DVS/Cisco AVS where the EPG is deployed. This correspond to the association
with a VMM domain in ACI
By default, all EPGs created with the plug-in are associated with the VMM Domain pointing to the
vCenter where the plug-in is used. If there are multiple VMM Domains pointing to the same vCenter,
you must choose at least one, in the form of selected on which DVS to deploy the EPG.

Allow microsegmentation (only for DVS, not Cisco AVS): This allows you to create a Base EPG . All the
virtual machines connected to this EPG are candidates to apply microsegmentation rules of a uSeg EPG.
Microsegmented EPG rules only applies to virtual machine that are connected to a Base EPG .

Note All EPGs are considered as base EPGs if the distributed switch is Cisco AVS.
An EPG linked to a VMM domain pointing to the vCenter where the plug-in is being used is displayed as
"Virtual." Other EPGs are displayed as "Physical."
Update and Delete actions are only authorized for EPGs linked to a VMM domain that is pointing to the
vCenter (Virtual). Others EPGs (Physical) are read-only. Updates are still authorized to make EPGs consume
or provide contracts, regardless of their VMM domain.

uSeg EPGs
The Cisco ACI vCenter plug-in allows CRUD operations on the mircosegemented EPG objects. The following
attributes are exposed in the plug-in:
Name: The name of the microsegmented EPG.
Description (Optional): The description of the microsegmented EPG.
Bridge Domain: The Bridge Domain associated with this microsegmented EPG.
Intra-EPG Isolation: This allows to deny all traffic between the virtual machines that are connected to
an EPG. By default, all virtual machines in the same EPG can talk to each other.
Distributed Switch: The DVS/Cisco AVS where the EPG is deployed. This correspond to the association
with a VMM domain in ACI
By default, all EPGs created with the plug-in are associated with the VMM Domain pointing to the
vCenter where the plug-in is used. If there are multiple VMM Domains pointing to the same vCenter,
you must choose at least one, in the form of selected on which DVS to deploy the EPG.
Miro-segmentation attributes: List of rules that decide which VM belongs to this microsegmented EPG.
Rules options include: IP, MAC, VM name, OS, Host, VM id, VNic, Domain, Data Center, Custom
Attribute.

Cisco ACI Virtualization Guide, Release 2.2(2)


284
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Features and Limitations

Note Domain attributes (VMM Domain) only allow you to select VMM domains to the local vCenter. You
choose a domain by selecting the corresponding DVS/Cisco AVS.
Custom attributes can only be chosen. They cannot be set by the plug-in. They must be set by the VMware
vSphere Client. To create custom labels, see: https://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1005720

L2 and L3 External Networks


Layer 2 and Layer 3 External Networks must be created and configured on the APIC by the network
administrator. They are read-only on the vCenter plug-in.
The only plug-in operations permitted on these objects are to make them consume or provide contracts.
The visible information for an L3 External Network is:
Name: The name of the L3 External Network
Subnets: External subnets represented by this L3 external network
VRF: The VRF this L3 External Network belongs to
Connected Bridge Domains: The Bridge Domains connected to this L3 External Network

The visible information for an L2 External Network is:


Name: The name of the L2 External Network
Bridge Domain: The bridge domain associated with this Bridge Domain
VLAN ID: The VLAN ID associated with this L2 External Network

VRF
The Cisco ACI vCenter plug-in allows CRUD operations on the VRF objects. The following attributes are
exposed in the plug-in:
Name: The name of the VRF
Description (Optional): The description of the VRF
Enforce policies: Determine if the contracts need to be enforced for the EPG in this VRF.

Bridge Domains
The Cisco ACI vCenter plug-in allows CRUD operations on the Bridge Domain objects. The following
attributes are exposed in the plug-in:
Name: The name of the Bridge Domain
Description (Optional): The description of the Bridge Domain
Private Subnets: List of gateways for this Bridge Domain.

Cisco ACI Virtualization Guide, Release 2.2(2)


285
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Features and Limitations

Note Shared and advertised subnets are read only. They cannot be configured by the plug-in. Only the
private subnets can be added or deleted.
If the Bridge Domain has been connected to an L3/L2 Out by the APIC, it cannot be deleted.

Contracts
The Cisco ACI vCenter plug-in allows CRUD operations on the Contract objects. The following attributes
are exposed in the plug-in:
Name: The name of the contract
Description (Optional): The description of the contract.
Consumers: The consumers for the contract (EPG, uSeg EPGs, L2/L3 External Networks)
Providers: The providers for the contract (EPG, uSeg EPGs, L2/L3 External Networks)
Filters: List of filters associated with the contract
Apply both direction: Indicate if the specified Filters are applying only from consumers to providers or
also from providers to consumers.
L4-L7 Graph Template: It is possible to associate existing graph template to a Contract. See L4-L7
Service section below.

Note Subject is not exposed. The plug-in only manages contracts with a single subject. Contracts with
multiple subjects are seen, but not editable.
If the consumer and the contract are not in the same tenant, a contract interface is automatically
created (named to_Tenant-name_contract-name).

Filters
The Cisco ACI vCenter plug-in allows CRUD operations on the Filter objects. All parameters from the APIC
are exposed.

L4-L7 Services
L4-L7 services can only be added on contracts that have a single provider.
The graph template cannot be created by the plug-in (only consume existing graph templates)
The graph template must be configured so that it contains:
Association with devices
Association with a function profile

Only support graph templates with a maximum of two nodes

Cisco ACI Virtualization Guide, Release 2.2(2)


286
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Features and Limitations

The Function Profile folders naming and hierarchy must be valid as the plug-in does not allow folder
manipulation.
Only empty mandatory parameters of the function profile are editable by the plug-in.

Graph connectors can be configured.


All parameters from the APIC are exposed
You can only consume redirect policies, if needed, not create them

Troubleshooting
Only endpoint to endpoint troubleshooting sessions are supported.
You can choose an existing session or create a new one
The physical topology (spine / leaf) is not displayed.
The topology display is VM-centric, focusing on Host, VM, vNIC, and the EPG the vNICs connect
to

Available information in a session:


Faults
Contracts: A table listing all the Contract/Filters/Entries between the two EPGs (hit counts are not
displayed)
Drop/Stats
Audits/Events
Traceroute

Atomic Counter and SPAN are not available


A more basic troubleshooting tool is available between objects that are not endpoints (VM, EPG, L3
Out), that only display configured contracts between two selected objects.
A view of VMs and their connection to EPGs is available.
For a given VM, it is possible to view the EPGs to which its VNICs are connected.

If a L4-L7 connecter is used as source or destination of a troubleshooting session, then it is expected to


get the following error on the Contract section of the troubleshooting wizard:
The feature required the source and destination endpoint to both be part on an EPG.
You can safely ignore the error message.

Cisco AVS Installation and Upgrade


The Cisco ACI vCenter plug-in enables you to install, uninstall, upgrade, or downgrade Cisco AVS from the
vSphere Web Client:

Cisco ACI Virtualization Guide, Release 2.2(2)


287
Cisco ACI vCenter Plug-in
Upgrading VMware vCenter when Using the Cisco ACI vCenter Plug-in

Once the vCenter plug-in is connected to the ACI fabric, it allows you to see all the Cisco AVS domains
present on Cisco APIC, and to install, uninstall, upgrade, or downgrade Cisco AVS for some or all of
the hosts in the data center associated with the Cisco AVS domains.
New versions of Cisco AVS that have been downloaded from Cisco.com can be uploaded to the vCenter
using the GUI. These versions can then be installed on the hosts in a given domain.
You can see all hosts if they are connected to a given Cisco AVS domain. You also can see the hosts'
OpFlex Agent status and the current version of Cisco AVS, if installed.

When installing or upgrading Cisco AVS, the vCenter plug-in automatically performs the following steps on
a ESXi host:
1 Places the host into maintenance mode.
2 Uploads the appropriate VIB file to the host data store.
3 Installs or reinstalls Cisco AVS software.
4 Deletes the VIB file from the host data store.
5 Takes the host out of maintenance mode.

Note The vCenter plug-in only installs or uninstalls Cisco AVS VIBs on the hosts; you need to manually
connect or disconnect the host to the Cisco AVS switch.
If the host is part of an HA/DRS cluster, when the host is placed in maintenance mode, the VMs
will be migrated automatically. If the VMs cant be migrated automatically, you need to migrate
them or turn off all the VMs on the host for the installation or upgrade to succeed.

For more information see, Installing Cisco AVS Using the VMware vCenter Plug-in, on page 102 in this guide
or "Upgrading Cisco AVS Using the VMware vCenter Plug-in," "Uninstalling Cisco AVS using the VMware
vCenter Plug-in," or "Downgrading Cisco AVS using the VMware vCenter Plug-in" in the Cisco AVS
Installation Guide.

Upgrading VMware vCenter when Using the Cisco ACI vCenter


Plug-in
If you are upgrading VMware vCenter from version 6.0 to version 6.5, and you are using the Cisco ACI
vCenter plug-in, you need to take an additional step before you proceed with the upgrade.

Procedure

Delete the folder C:\ProgramData\cisco_aci_plugin\ on the vCenter.


If you do not delete the folder, and you try to register a fabric again after the upgrade, you see the following
error message: "Error while saving setting in C:\ProgramData\cisco_aci_plugin\user_domain.properties"
where the user is the user currently logged in to the vSphere Web Client, and the domain is the domain to
which it belongs.

Cisco ACI Virtualization Guide, Release 2.2(2)


288
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in GUI

Although you can still register a fabric, you do not have rights to override settings that were created in the
old vCenter. You need to enter any changes in APIC configuration again after restarting vCenter.

Cisco ACI vCenter Plug-in GUI


Cisco ACI vCenter Plug-in GUI Architecture Overview
This section describes the Cisco ACI vCenter plug-in GUI architecture Overview.

Main Menu

Figure 22: Main Menu

Cisco ACI Virtualization Guide, Release 2.2(2)


289
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Overview

1 HomeDisplays the Cisco ACI vCenter plug-in home page and has a Getting Started and an
About tab.
The Getting Started tab that allows you to perform basic tasks such as Create a new Tenant,
Create a new Application Profile, Create a new Endpoint Group and click the Cisco Application
Centric Infrastructure (ACI) link to explore the ACI website.
The About tab displays the current version of the Cisco ACI vCenter plug-in.

2 ACI FabricUsed to register an ACI Fabric in the plug-in and manage the tenants of the fabrics.

3 Application ProfileUsed to manage application profiles by a drag and drop interface of EPG,
uSeg EPG, L2/L3Out and Contract. Provides visibility on an application health, Stats and Faults.

4 NetworkingDrag and Drop interface to manage VRFs and Bridge Domains.

5 TroubleshootingView contracts defined between to entity, Start endpoint to endpoint


troubleshooting sessions, browse the virtual machines (VMs) and view their connections to the
endpoint groups (EPGs).

6 Cisco AVSInstall, upgrade, or uninstall Cisco AVS.

7 ResourcesAllows you to browse in a hierarchical view of all objects managed by the plug-in.

Note While navigating through Application Profile, Networking and Resources sections, a selection bar at
the top of each screen allows you to select an active tenant. Content displayed for each section is specific
to the tenant selected in that bar.

Cisco ACI vCenter Plug-in Overview


This section describes the Cisco ACI vCenter plug-in GUI overview.

Note All of the times for faults, stats, event and audits are shown in the local timezone of the browser. If the
APIC's time zone does not match the time zone of your system, the time stamp can have a different time
zone.

Home
In the VMware vSphere Web Client, in the Navigator pane, choose Home. In the Work pane displays the
following tabs:
Getting Started tab
The bottom of the Getting Started pane enables you to do the following things:
Click Create a new Tenant to create a new tenant.

Cisco ACI Virtualization Guide, Release 2.2(2)


290
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Overview

Click Create a new Application Profile to create a new application profile.


Click Create a new Endpoint Group to create a new endpoint group.
Click the Cisco Application Centric Infrastructure (ACI) link to explore the ACI website.

About tab
The About pane displays the Cisco ACI vCenter plug-in version.

ACI Fabric
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric. In the Work pane
displays the following tabs:
ACI Fabric tab
The ACI Fabric pane enables you to do the following things:
Click Register a new ACI Fabric / ACI Node to register a new ACI fabric or ACI node.
View information about the current APIC states of the fabric.

Note When the plug-in detects APIC as unavailable, it stops trying to connect to it and will
not update its status anymore. To avoid having to wait for the timeout that comes with
trying to connect to an unresponsive APIC. Click Reload to refresh the APIC state. This
forces it to try to reconnect to each APIC, even to the unavailable ones. This updates
their status, if they are available again.

Tenants tab
The Tenants pane enables you to do the following things:
Manage the different tenants present in the registered ACI Fabrics.
Click Create a new Tenant to create a new tenant.
View the different tenants.
If you select a tenant in the table, you can delete a tenant if you click Delete Tenant <tenant_name>.

Cisco ACI Virtualization Guide, Release 2.2(2)


291
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Overview

If you select a tenant in the table, you can edit the tenant description if you right-click the
<tenant_name> and choose Edit settings.

Figure 23: ACI Fabric - Home

Application Profile
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Application Profile.
In the Work pane enables you to do the following things:
Choose an active tenant and the application profile.
Click Create a new Application Profile to create a new application profile.
Use the Drag and drop to configure section to drag and drop the different elements to configure your
Application Profiles fully. The elements are:
Endpoint Group
uSeg
L3 External Network
L2 External Network
Contract

View the Policy, Traffic Stats, Health, Faults, Audit Logs, and Events by using the tabs.
In the Policy tab, you can switch back to Consumer and Provider view or traffic view.

Cisco ACI Virtualization Guide, Release 2.2(2)


292
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Overview

Networking
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Networking. In the
Work pane enables you to do the following things:
Set up your own addressing for all endpoint groups by creating isolated VRFs that are populated with
bridge domains. An endpoint group will be associated with one bridge domain.
Choose an active tenant.
Use the Drag and drop to configure section to drag and drop the following elements:
VRF
Bridge Domain

Note The available Layer 3 and Layer 2 endpoint groups are displayed here, but are not
configurable.

Troubleshooting
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Troubleshooting.
In the Work pane displays the following tabs:
Policy Checker tab
The Policy Checker tab enables you to select two entities (Virtual Machine, endpoint group, Layer 3
external network or endpoint), and view all of the contracts and Layer 4 to Layer 7 services that are
enforced between those 2 entities.
You can also start a troubleshooting session between two endpoints:
Choose the time frame of the session in the From, To and fixed time check box.
You can configure the time frame by putting a check in the Fix Time check box.
In the Source Destination section, you can choose the source and destination endpoints. Click on
Start Troubleshooting session to start a new troubleshooting session.
In the Troubleshooting Session, you can inspect faults, configured contracts, event, audits, and
traffic stats.
You can start a trace route between the two endpoints if you click Traceroute.
You can click the icon next to an elements to get details that correspond to the category that you
chose in the left pane.
You can get a topology that represents, for each endpoint, the corresponding vNIC, VM, and host,
and the EPG to which the vNIC is connected.

Virtual Machines tab


This view is to visualize if the network interface cards of your virtual machine are connected to any
endpoint groups.
You can restrict the list by using the search field.
You view each of the VMs if the vNICs are connected to an EPG.

Cisco ACI Virtualization Guide, Release 2.2(2)


293
Cisco ACI vCenter Plug-in
Cisco ACI vCenter Plug-in Overview

You can quickly view if the associated EPG has good health or any faults, and view the tenant and
application profile to which it belongs.

Resources
Network
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Resources >
Network. In the Work pane displays the following tabs:
Endpoint Groups tab
Configure the network infrastructure by creating endpoint groups. Each endpoint group has a
corresponding VMware Distributed Port Group where you can connect your virtual machines. You
can organize your different endpoint groups into application profiles.
Choose an active tenant.
Click Create a new Application Profile to create a new application profile.
Choose an application in the table and click Create a new Endpoint Group to create a new
endpoint group.
View the table to see the application profiles and endpoint groups of an active tenant.
Choose an endpoint group to view all of the VMs that are connected to it.

VRFs tab
For all endpoint groups, you can setup your own addressing by creating isolated VRFs that are
populated with bridge domains. An endpoint group will be associated with one bridge domain.
Choose an active tenant.
Click Create a new VRF to create a new VRF.
Click Create a new Bridge Domain to create a new bridge domain.
View the table to see the VRFs.

Security
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Resources >
Security. In the Work pane displays the following tabs:
Contracts tab
Contracts allows you to define security policies between different endpoint groups and security
policies between endpoint groups and Layer 3 and Layer 2 external networks.
Choose an active tenant.
Click Create a new Contract to create a new contract.
View the table to see the contracts.

Filters tab

Cisco ACI Virtualization Guide, Release 2.2(2)


294
Cisco ACI vCenter Plug-in
GUI Tips

Filters are entities that matches a given type of traffic (based on protocol, port, etc.). They are used
by contracts to define the authorized services between endpoint groups and Layer 3 external
networks.
Choose an active tenant.
Click Create a new Filter to create a new filter.
View the table to see the filters.

External Connectivity
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Resources >
External Connectivity. In the Work pane displays the following tabs:
L3 External Networks tab
Layer 3 external networks are defined by the APIC administrator. You have the possibility to
consume the defined networks in your contracts and Layer 4 to Layer 7 services, in order to bring
external connectivity to your infrastructure.
Choose an active tenant.
View the table to see the Layer 3 external networks.

L2 External Networks tab


Layer 2 external networks are defined by the APIC administrator. You have the possibility to
consume the defined networks in your Contracts and Layer 4 to Layer 7 services, in order to bring
external connectivity to your infrastructure.
Choose an active tenant.
View the table to see the Layer 2 external networks.

L4-7 Services
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Resources >
External Connectivity. In the Work pane displays the following:
Layer 4 to Layer 7 services enables you to add pre-provisoned firewalls and load balancers between
your endpoint groups and Layer 3 external networks.
Choose an active tenant.
View the table to see the Layer 4 to Layer 7 graph instances currently deployed inside the tenant.

GUI Tips
This section provides GUI tips.
You can right-click on ACI object displayed in tables or in graph, to get associated actions.
When a Virtual Machine object is displayed inside a table in the vCenter plug-in, you can double-click
on it to navigate to that Virtual Machine in the vSphere Web Client.

Cisco ACI Virtualization Guide, Release 2.2(2)


295
Cisco ACI vCenter Plug-in
Performing ACI Object Configurations

Performing ACI Object Configurations


Creating a New Tenant
This section describes how to create a new tenant.

Before You Begin


Ensure that an ACI fabric is registered. For more information, see Connecting vCenter Plug-in to your ACI
Fabric Using Credentials, on page 280.

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Work pane, choose Cisco ACI Fabric.
Step 3 In the Navigator pane, choose ACI Fabric.
Step 4 In the ACI Fabric pane, choose the Tenants tab.
Step 5 In the Tenants pane, click Create a new Tenant.
Step 6 In the New Tenant dialog box, perform the following actions:
a) In the Enter a name for the Tenant field, enter the tenant name.
b) (Optional) In the Enter a description for the Tenant field, enter the description for the tenant.
c) Click OK.

Creating a New Application Profile


This section describes how to create a new application profile.

Before You Begin


Ensure that a tenant has been created.
For more information, see Creating a New Tenant, on page 296.

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Work pane, choose Cisco ACI Fabric.
Step 3 In the Navigator pane, choose Resources > Network.
Step 4 In the Network pane, under the Endpoint Groups tab, perform the following actions:
a) From the Tenant drop-down list, choose the tenant name.

Cisco ACI Virtualization Guide, Release 2.2(2)


296
Cisco ACI vCenter Plug-in
Creating an EPG Using the Drag and Drop Method

b) Click Create a new Application Profile.


Step 5 In the New Application Profile dialog box, perform the following actions:
a) In the Name field, the application profile name.
b) (Optional) In the Description field, enter the description of the application profile name.
c) Click OK.

Creating an EPG Using the Drag and Drop Method


This section describes how to create an endpoint group (EPG) using the drag and drop method.

Before You Begin


Ensure that a tenant has been created.
For more information, see Creating a New Tenant, on page 296.
Ensure that an application profile has been created.
For more information, see Creating a New Application Profile, on page 296.

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Application Profile.
Step 3 In the Application Profile pane, perform the following actions:
a) In the Tenant field, from the drop-down list, choose a tenant.
b) In the Application Profile field, from the drop-down list, choose an application profile.
c) In the Drag and drop to configure element area, drag and drop Endpoint Group.
Step 4 In the New Endpoint Group dialog box, perform the following actions:
a) In the Name field, enter the name of the endpoint group.
b) (Optional) In the Description field, enter the description of the EPG.
c) In the Bridge Domain field, choose any bridge domain from common or from the tenant where the EPG
is created. The default bridge domain is common/default. Click the pen icon to choose another bridge
domain.
Step 5 In the Distributed Switch field, perform the following actions:
a) Put a check in at least one distributed switch check box to connect the EPG to the chosen distributed
switches.
b) Put a check in the Allow micro-segmentation check box to allow micro-segmentation.
The Allow micro-segmentation check box only shows if the distributed switch is DVS. If the distributed
switch is AVS, then the GUI does not show the Allow micro-segmentation check box. All EPGs are
considered to be base EPGs if the distributed switch is AVS.
This allows you to create a base EPG. All of the virtual machines that are connected to this EPG are
candidates to apply the micro-segmentation rules of a uSeg EPG. Micro-segmented EPG rules only apply
to virtual machines that are connected to a base EPG.

Cisco ACI Virtualization Guide, Release 2.2(2)


297
Cisco ACI vCenter Plug-in
Creating a New uSeg EPG Using the Drag and Drop Method

c) Put a check in the Intra EPG isolation check box to isolate the EPG.
This allows you to deny all traffic between the virtual machines that are connected to this EPG. This rule
also applies to machines that are seen under a microsegmented EPG. By default, all virtual machines in
the same EPG can talk to each other.

Step 6 Click OK to push the new EPG on APIC.


You will see the new EPG that you created in the topology.

Creating a New uSeg EPG Using the Drag and Drop Method
This section describes how to create a new uSeg EPG using the drag and drop method.

Before You Begin


Ensure that a tenant has been created
For more information, see Create a New Tenant.
Ensure that an application profile has been created.
For more information, see Creating a New Application Profile, on page 296.
(DVS only, not AVS) Ensure you have created a base EPG, and connected all the VMs that needs to
participate in micro-segmentation to that base EPG. For more information, see Creating a new Endpoint
Group.

Procedure

Step 1 Log in to the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Application Profile.
Step 3 In the Application Profile pane, perform the following actions:
a) From the Tenant drop-down list, choose a tenant.
b) From the Application Profile drop-down list, choose an application profile.
c) In the Drag and drop to configure element area, drag and drop the uSeg into the topology.
Step 4 In the New Endpoint Group dialog box, perform the following actions:
a) In the Name field, enter the name of the EPG.
b) In the Description field, enter the description of the EPG.
Step 5 In the Distributed Switch field, choose which distributed switch needs to be associated with that uSeg EPG.
Note If there is only one DVS, no check box is displayed as it is chosen by default.

Step 6 In the Bridge Domain field, choose any bridge domain from common or from the tenant where the uSeg EPG
is created. The default bridge domain is common/default. Click the pen icon to select another bridge domain.
Step 7 Put a check in the Intra EPG isolation check box to isolate the EPG.
Step 8 In the Microsegmentation section, click the + icon.
Step 9 In the New micro-segmentation Attribute dialog box, perform the following actions:

Cisco ACI Virtualization Guide, Release 2.2(2)


298
Cisco ACI vCenter Plug-in
Creating a Contract Between Two EPGs Using the Drag and Drop Method

a) In the Name field, enter the name of the new attribute.


b) (Optional) In the Description field, enter the description of the new attribute.
c) In the Type section, choose the type on which to filter.
d) In the Operator section, choose Contains the operator you wish to use.
e) If available, click the Browse button to choose a specific object, instead of manually entering a value.
f) Click OK to add the new attribute to the uSeg EPG.
Step 10 Repeat Step 7 and Step 8 to add other attributes to the uSeg EPG.
Step 11 Click OK.

Creating a Contract Between Two EPGs Using the Drag and Drop Method
This section describes how to create a contract between two endpoint groups (EPGs) using the drag and drop
method.

Before You Begin


Ensure that two EPGs have been created.
For more information, see Creating an EPG Using the Drag and Drop Method, on page 297.

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Work pane, choose Cisco ACI Fabric.
Step 3 In the Navigator pane, choose Application Profile.
Step 4 In the Application Profile pane, perform the following actions:
a) From the Tenant drop-down list, choose a tenant.
b) From the Application Profile drop-down list, choose an application profile.
Step 5 In the Drag and drop to configure element area, drag and drop the contract on the source EPG.
Step 6 Click on the destination EPG. An arrow will display, going from the source EPG to the destination EPG.
Step 7 In the New Contract dialog box, perform the following actions:
a) In the Consumers field, verify that it displays the correct EPG.
b) In the Providers field, verify that it displays the correct EPG.
c) In the Name field, enter the name of the contract.
d) (Optional) In the Description field, enter the description of the contract.
e) In the Filters field, click the + icon to add filters to the contract.
f) In the new dialog box, drag and drop all the filters you wish to add to the Contract from the list on the left
to the list on the right and click OK.
g) (Optional) Check the Configure L4-7 service check box to configure Layer 4 to Layer 7 services.
h) Click OK to create the contract.

Cisco ACI Virtualization Guide, Release 2.2(2)


299
Cisco ACI vCenter Plug-in
Adding an EPG to an Existing Contract Using Drag and Drop Method

Adding an EPG to an Existing Contract Using Drag and Drop Method


This section describes how to add an EPG to an existing contract using the drag and drop method.

Before You Begin


Ensure that a contract has been created.
Ensure that an EPG has been created.
For more information, see Creating an EPG Using the Drag and Drop Method, on page 297.
Ensure that the contract is visible on the Application Profile pane. For example, if another EPG of the
Application Profile is already using the contract. If this is not the case, follow the steps of Adding an
EPG to an Existing Contract using the Security Tab.

Procedure

Step 1 Log into the VMware vSphere Web Client. In the Navigator pane, choose Application Profile .
Step 2 In the Navigator pane, choose Application Profile .
Step 3 In the Application Profile pane, perform the following actions:
a) From the Tenant drop-down list, choose a tenant.
b) From the Application Profile drop-down list, choose an application profile.
Step 4 In the Drag and drop to configure element area, drag and drop the contract, and do one of the following:
To have the EPG consume the contract:
1 Drag and drop the Contract on the EPG that needs to consume the contract.
2 Choose the relevant contract (an arrow is displayed going from the EPG to the contract), and click
the contract to make the EPG consume the contract.

To have the EPG provide the contract:


1 Drag and drop the Contract on the contract that the EPG needs to provide.
2 Choose the relevant contract (an arrow is displayed going from the contract to the EPG), and click
the Contract to make the EPG provide that contact.

Adding an EPG to an Existing Contract using the Security Tab


Before You Begin
Ensure that a contract has been created.
Ensure that an EPG has been created.

Cisco ACI Virtualization Guide, Release 2.2(2)


300
Cisco ACI vCenter Plug-in
Setting up L3 External Network

For more information, see Creating an EPG Using the Drag and Drop Method, on page 297.

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Resources > Security.
Step 3 From the Tenant drop-down list, choose a tenant.
Step 4 Click on the contract where the EPG needs to be added in the list of contract.
Step 5 Click on the + icon of either the Consumers or Providers columns (to respectively have the EPG consume
or provide the contract).
Step 6 From the menu that opens, choose Add Endpoint Groups.
Step 7 In the dialog box, perform the following actions:
a) Expand the tenant where the EPG is located.
b) Expand the Application Profile where the EPG is located.
c) Drag and drop the EPG from the list on the left to the list on the right.
d) Click OK.

Setting up L3 External Network


This section describes how to connect an a Layer 3 external network.

Note You cannot do any configuration with a Layer 3 external network. You can only set up a Layer 3 external
network that exists in APIC.

Before You Begin


Ensure that a Layer 3 (L3) external network on APIC is configured. For more information, see the ACI
Basic Configuration Guide.
Ensure that an EPG has been created. For more information, see Creating an EPG Using the Drag and
Drop Method, on page 297.

Procedure

Step 1 Log in to the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Application Profile.
Step 3 In the Application Profile pane, perform the following actions:
a) From the Tenant drop-down list, choose a tenant.
b) From the Application Profile drop-down list, choose an application profile (app).

Cisco ACI Virtualization Guide, Release 2.2(2)


301
Cisco ACI vCenter Plug-in
Setting up L2 External Network

c) In the Drag and drop to configure element area, drag and drop the L3 External Network into the
topology.
Step 4 In the Select an object dialog box, expand Tenant <tenant_name> (tenant1), choose the Layer 3 external
network and click OK.
Step 5 In the Drag and drop to configure element area, drag and drop the Contract on top of the Layer 3 external
network and drag to connect the EPG (WEB).
Step 6 In the New Contract dialog box, perform the following actions:
a) In the Consumers field, verify that it displays the correct Layer 3 external network (L3ext).
b) In the Providers field, verify that it displays the correct EPG (WEB).
c) In the Name field, enter the name of the contract (L3ext-to-WEB).
d) (Optional) In the Description field, enter the description of the contract.
e) In the Filters field, you can add traffic filters by clicking the + icon.
f) In the new dialog box, drag and drop all the filters you wish to add to the contract from the list on the left
to the list on the right and click OK.
g) (Optional) Check the Configure L4-7 service check box to configure Layer 4 to Layer 7 services.
h) Click OK to create the contract.

The contract is connected to the Layer 3 external network in the topology.

Setting up L2 External Network


This section describes how to connect Layer 2 (L2) External Network.

Note You cannot do any configuration with an L2 External Network. You can only set up an L2 External
Network that exists in the APIC.

Before You Begin


Ensure that a L2 external network on APIC is configured. For more information, see the ACI Basic
Configuration Guide
Ensure that a EPG exists.

Procedure

Step 1 Log in to the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Application Profile.
Step 3 In the Application Profile pane, perform the following actions:
a) From the Tenant drop-down list, choose a tenant (tenant1).
b) From the Application Profile drop-down list, choose Expenses.
c) In the Drag and drop to configure element area, drag and drop the L2 External Network into the
topology.

Cisco ACI Virtualization Guide, Release 2.2(2)


302
Cisco ACI vCenter Plug-in
Creating a VRF Using the Drag and Drop Method

d) In the Drag and drop to configure element area, drag and drop the Contract on top of the L2 external
network, and then drag to connect the EPG (WEB).
Step 4 In the New Contract dialog box, perform the following actions:
a) In the Consumers field, verify that it displays the correct L2 External Network (L2ext).
b) In the Providers field, verify that it displays the correct EPG (WEB).
c) In the Name field, enter the name of the contract (L2ext-to-WEB).
d) In the Description field, enter the description of the contract.
e) In the Filters field, you can add traffic filters by clicking the + icon.
f) In the new dialog box, drag and drop all the filters you wish to add to the contract from the list on the left
to the list on the right and click OK.
g) (Optional) Check the Configure L4-7 service check box to configure Layer 4 to Layer 7 services.
h) Click OK.

The contract is connected to the L2 external network in the topology.

Creating a VRF Using the Drag and Drop Method


This sections describes how to create a VRF using the drag and drop method.

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Work pane, choose Networking.
Step 3 In the Networking pane, perform the following actions:
a) From the Tenant drop-down list, choose a tenant
b) In the Drag and drop to configure element area, drag and drop the VRF into the pane.
Step 4 In the New VRF dialog box, perform the following actions:
a) In the Name field, enter the name of the VRF.
b) (Optional) In the Description field, enter the description of the VRF.
c) In the Security section, check the Enforce Policies check box. Enforce Policies determines if the security
rules (Contracts) should be enforced or not for that VRF.
d) Click OK.

Creating a Bridge Domain


This section describes how to create a bridge domain.

Before You Begin


Ensure that a VRF (Private Network) exists.

Cisco ACI Virtualization Guide, Release 2.2(2)


303
Cisco ACI vCenter Plug-in
Start a New Troubleshooting Session Between Endpoints

Procedure

Step 1 Log in to the VMware vSphere Web Client.


Step 2 In the Navigator pane, choose Networking.
Step 3 In the Networking pane, perform the following actions:
a) From the Tenant drop-down list, choose a tenant (tenant1).
b) In the Drag and drop to configure element area, drag and drop the Bridge Domain on top of the VRF in
the topology.
Step 4 In the New Bridge Domain dialog box, perform the following actions:
a) In the Name field, enter the name of the bridge domain (BD2).
b) (Optional) In the Description field, enter the description of the bridge domain.
c) In the Private Subnets section, enter the private subnets (2.2.2.2/24) and click the + icon to add the subnet
to the bridge domain.
d) (Optional) Repeat substeps c and d to add the desired number of subnets to the bridge domain.
e) Click OK.

The bridge domain connects to the VRF in the topology.

Start a New Troubleshooting Session Between Endpoints


This section describes how to start a new troubleshooting session between endpoints.

Procedure

Step 1 Log into the VMware vSphere Web Client.


Step 2 In the Work pane, choose Cisco ACI Fabric.
Step 3 In the Navigator pane, choose Troubleshooting.
Step 4 In the Policy Checker tab, in the Session name section, enter the new session name.
Step 5 In the Source and Destination section, click Select source.
Step 6 From the Menu that opens, click on Select Endpoint.
Step 7 In the new dialog box that opens, select the endpoint to use as source and click OK.
Step 8 In the Source and Destination section, click Select destination.
Step 9 From the Menu that opens, click on Select Endpoint.
Step 10 In the new dialog box that opens, select the endpoint to use as destination and click OK
Step 11 Click Start Troubleshooting Session.
Step 12 In the Troubleshooting pane, you can inspect the faults, configured contracts, event, audits and traffic stats.
A topology displays your configuration for each endpoint, the corresponding vNIC, VM, host, and the EPG
to which the vNIC is connected. You can click the icon next to an elements to get details, corresponding to
the category selected in the left pane.

Step 13 In the Navigation pane, click Traceroute to start a trace route between the two endpoints.

Cisco ACI Virtualization Guide, Release 2.2(2)


304
Cisco ACI vCenter Plug-in
Start an Exisiting Troubleshooting Session Between Endpoints

Start an Exisiting Troubleshooting Session Between Endpoints


This section describes how to start an existing troubleshooting session between endpoints.

Before You Begin

Procedure

Step 1 Log into the VMware vSphere Web Client, in the Work pane, choose Cisco ACI Fabric.
Step 2 In the Navigator pane, choose Troubleshooting.
Step 3 In the Policy Checker tab, in the Session name section, click Select an existing session.
a) In the Select a section dialog box, choose a troubleshooting session.
b) Click OK.
You can only do endpoint to endpoint troubleshooting.

Step 4 Click Start Troubleshooting Session.


Step 5 In the Troubleshooting pane, you can inspect the faults, configured contracts, event, audits and traffic stats.
A topology displays your configuration for each endpoint, the corresponding vNIC, VM, host, and the EPG
to which the vNIC is connected. You can click the icon next to an elements to get details, corresponding to
the category selected in the left pane.

Step 6 In the Navigation pane, click Traceroute to start a trace route between the two endpoints.

Uninstalling the Cisco ACI vCenter Plug-in


This section describes how to uninstall the VMware vCenter Plug-in.

Before You Begin


You must have a PowerCLI console available.
You must have the ACIPlugin-Uninstall.ps1 script available.
You can find the script inside the plug-in archive, or you can download it from:
https://APIC_IP/vcplugin/ACIPlugin-Uninstall.ps1.

Procedure

Step 1 Open a PowerCLI console.


Step 2 Run the ACIPlugin-Uninstall.ps1 script.
Step 3 When prompted, in the vCenter IP / FQDN field, enter the vCenter where the plug-in needs to be uninstalled.
Step 4 In the dialog box that appears, enter the root privilege credentials of the vCenter.

Cisco ACI Virtualization Guide, Release 2.2(2)


305
Cisco ACI vCenter Plug-in
Upgrading the Cisco ACI vCenter Plug-in

you should see the following message in the console if the uninstallation was successful:

[x] Uninstalled ACI vCenter Plugin

Upgrading the Cisco ACI vCenter Plug-in


This section describes how to upgrade the Cisco ACI vCenter Plug-in.

Procedure

To upgrade the Cisco ACI vCenter Plug-in, you must follow the installation procedure.
For more information, see Installing the Cisco ACI vCenter Plug-in, on page 279.

Troubleshooting the Cisco ACI vCenter Plug-in Installation


This section describes how to troubleshoot the Cisco ACI vCenter plug-in installation.
If the Cisco ACI vCenter plug-in is not seen the VMware vSphere Web Client GUI, perform the following
actions:
Make sure the .zip file can be downloaded from the vCenter by ensuring that HTTPS/HTTP traffic is
working between the vCenter and web server where the .zip is hosted.
Ensure that you have enabled HTTP download if your using a HTTP web server.
Ensure that the Thumbprint used is correct if you are using HTTPS.
Check if the registration has happened by going to the following URL:
https://<VCENTER_IP>/mob/?moid=ExtensionManager&doPath=extensionList%5b"com%2ecisco%2eaciPlugin"%5d
You should see the Cisco ACI vCenter plug-in details.
If you do not and the page is blank, this indicates that the registration did not succeed. This means an
error occurred while executing the registration script. To resolve this, you must perform the installation
procedure again and note if an error is displayed by the registration scripts.
Check the vSphere Web Client logs.
Linux Appliance:
/var/log/vmware/vsphere-client/logs/vsphere_client_virgo.log
5.5 Windows 2008: C:\ProgramData\VMware\vSphere Web
Client\serviceability\logs\vsphere_client_virgo.log
6.0 Windows 2008:
%ALLUSERSPROFILE%\VMWare\vCenterServer\logs\vsphere-client\logs\vsphere_client_virgo.log
Searching for vcenter-plugin or com.cisco.aciPlugin in the log displays relevant information
about the install/upgrade.

Cisco ACI Virtualization Guide, Release 2.2(2)


306
Cisco ACI vCenter Plug-in
Reference Information

An Example of a successful upgrade:


[2016-05-31T19:32:56.780Z] [INFO ] -extensionmanager-pool-11139 70002693 100019
200004 com.vmware.vise.vim.extension.VcExtensionManager
Downloading plugin package from https://172.23.137.72/vcenter-plugin-2.0.343.6.zip
(no proxy defined)
[2016-05-31T19:32:56.872Z] [INFO ] m-catalog-manager-pool-11128 70002693 100019 200004

com.vmware.vise.vim.cm.CmCatalogManager
Detected service providers (ms):206
[2016-05-31T19:32:56.872Z] [INFO ] m-catalog-manager-pool-11128 70002693 100019 200004

com.vmware.vise.vim.cm.CmCatalogManager
No new locales or service infos to download.
[2016-05-31T19:32:57.678Z] [INFO ] -extensionmanager-pool-11139 70002693 100019 200004

com.vmware.vise.vim.extension.VcExtensionManager
Done downloading plugin package from https://172.23.137.72/vcenter-plugin-2.0.343.6.zip

[2016-05-31T19:32:58.438Z] [INFO ] -extensionmanager-pool-11139 70002693 100019 200004

com.vmware.vise.vim.extension.VcExtensionManager
Done expanding plugin package to /etc/vmware/vsphere-client/vc-packages/vsphere-client-
serenity/com.cisco.aciPlugin-2.0.343.6
[2016-05-31T19:32:58.440Z] [INFO ] -extensionmanager-pool-11139 70002693 100019 200004

com.vmware.vise.extensionfw.ExtensionManager
Undeploying plugin package 'com.cisco.aciPlugin:2.0.343.5.

Reference Information
Alternative Installation of the Cisco ACI vCenter Plug-in
This section describes how to install the Cisco ACI vCenter plug-in. If you cannot enable HTTPS traffic
between your vCenter and APIC and you wish to use your own web server to host the Cisco ACI vCenter
plug-in zip file, follow this procedure.

Before You Begin


Make sure that all the prerequisites are met.
For more information, see Cisco ACI vCenter Plug-in Software Requirements, on page 278.
For more information, see Required APIC Configuration, on page 279.
Have a PowerCLI console available.
For more information, see VMware's documentation.

Procedure

Step 1 Make the .zip file available on a Web server.


a) If the Web server is not HTTPS: By default, vCenter will only allow a download from HTTPS sources.
To allow from HTTP, open and edit the following configuration file for your vCenter version:
vCenter 5.5 Linux Appliance: /var/lib/vmware/vsphere-client/webclient.properties
vCenter 6.0 Linux Appliance: /etc/vmware/vsphere-client/webclient.properties

Cisco ACI Virtualization Guide, Release 2.2(2)


307
Cisco ACI vCenter Plug-in
Alternative Installation of the Cisco ACI vCenter Plug-in

vCenter 5.5 Windows 2008: %ALLUSERSPROFILE%\VMware\vSphere Web


Client\webclient.properties
vCenter 6.0 Windows 2008:
C:\ProgramData\VMware\vCenterServer\cfg\vsphere-client\webclient.properties

b) Add allowHttp=true at the end of the file.


c) If the Web server is not HTTPS, restart the vSphere Web Client service using the '/etc/init.d/vsphere-client
restart' command.
Step 2 Run the script using the PowerCLI console or Python:
Options Description
To use the
PowerCLI 1 Open a PowerCLI console.
console 2 Run the ACIPlugin-Install.ps1 script.
When prompted, enter the following information:
In the vCenter IP / FQDN field, enter the vCenter where the plug-in needs to be
installed.
In the Plugin .zip file URL field, enter the URL where the vCenter will be able
to download the plug-in.
Note Ensure you have not renamed the .zip
file.
If you are using HTTP, leave the SHA1 Thumbprint field empty. Otherwise, enter
the SHA1 Thumbprint of the Web server used. The fields are separated with colons.
For example:
D7:9F:07:61:10:B3:92:93:E3:49:AC:89:84:5B:03:80:C1:9E:2F:8B

3 In the dialog box, enter the root privilege credentials of the vCenter.

Cisco ACI Virtualization Guide, Release 2.2(2)


308
Cisco ACI vCenter Plug-in
Alternative Installation of the Cisco ACI vCenter Plug-in

Options Description
To use Python Note You must use Python 2.7.9 or higher and have the pyvmomi package installed in
the Python environment.
Run the Python script: python deployPlugin.py
When prompted, enter the following information:
In the vCenter IP field, enter the vCenter where the plug-in needs to be installed.
In the vCenter Username & Password field, enter the root privilege credentials of
the vCenter.
In the Plugin .zip file URL field, enter the URL where the vCenter will be able to
download the plug-in.
Ensure you have not renamed the .zip file.
In the Https server thumbprint field, Leave this empty, if you are using HTTP.
Otherwise, enter the SHA1 Thumbprint of the Web server used. The fields are separated
with colons. For example:
D7:9F:07:61:10:B3:92:93:E3:49:AC:89:84:5B:03:80:C1:9E:2F:8B

Note There is also a deploy.cfg file available, where you can pre-enter your information.
You can then run the script with the file as argument. For example:
$ python deployPlugin.py deploy.cfg

Step 3 Log into the vSphere Web Client once the registration is completed.
Note First login may take longer, as the vCenter will be downloading and deploying the plug-in from the
Web server.
Once the VMware vSphere Web Client loads, you will see the Cisco ACI Fabric in the Navigator pane. This
allows you to manage your ACI fabric.
Note After you register the plug-in, when you launch the web client for the first time, an error message
might display asking to reload the web client. Click Reload to refresh the page and the error message
will not appear again.

Cisco ACI Virtualization Guide, Release 2.2(2)


309
Cisco ACI vCenter Plug-in
Alternative Installation of the Cisco ACI vCenter Plug-in

Cisco ACI Virtualization Guide, Release 2.2(2)


310
CHAPTER 9
Cisco ACI with Microsoft SCVMM
This chapter contains the following sections:

About Cisco ACI with Microsoft SCVMM, page 311


Getting Started with Cisco ACI with Microsoft SCVMM, page 314
Upgrading the Cisco ACI with Microsoft SCVMM Components, page 335
Deploying Tenant Policies, page 338
Troubleshooting the Cisco ACI with Microsoft SCVMM, page 344
REST API References, page 345
Reference Information, page 349
Programmability References, page 351
Configuration References, page 352
Uninstalling the Cisco ACI with Microsoft SCVMM Components, page 353
Downgrading the APIC Controller and the Switch Software with Cisco ACI with Microsoft SCVMM
Components, page 355
Exporting APIC OpFlex Certificate, page 356

About Cisco ACI with Microsoft SCVMM


The Application Policy Infrastructure Controller (APIC) integrates with Microsoft VM management systems
and enhances the network management capabilities of the platform. The Cisco Application Centric Infrastructure
(ACI) integrates at the following levels of the Microsoft VM Management systems:
Cisco ACI with Microsoft System Center Virtual Machine Manager (SCVMM)When integrated with
Cisco ACI, SCVMM enables communication between ACI and SCVMM for network management.

Note Migrating from SCVMM to SCVMM HA is not supported by Microsoft.

Cisco ACI Virtualization Guide, Release 2.2(2)


311
Cisco ACI with Microsoft SCVMM
Cisco ACI with Microsoft SCVMM Solution Overview

Cisco ACI and Microsoft Windows Azure PackFor information about how to set up Cisco ACI and
Microsoft Windows Azure Pack, see Cisco ACI with Microsoft Windows Azure Pack Solution Overview,
on page 358.

Cisco ACI with Microsoft SCVMM Solution Overview


At this integration point the Application Policy Infrastructure Controller (APIC) and Microsoft System Center
Virtual Machine Manager (SCVMM) communicate with each other for network management. Endpoint groups
(EPGs) are created in APIC and are created as VM networks in SCVMM. Compute is provisioned in SCVMM
and can consume these networks.

Physical and Logical Topology of SCVMM


This figure shows a representative topology of a typical System Center Virtual Machine Manager (SCVMM)
deployment with Cisco Application Centric Infrastructure (ACI) fabric. The Microsoft SCVMM service can
be deployed as a Standalone Service or as a Highly Available Service on physical hosts or virtual machines,
but will logically be viewed as a single SCVMM instance which communicates to the APIC.
Connectivity between an SCVMM Service and the Application Policy Infrastructure Controller (APIC) is
over the management network.

Figure 24: Topology with ACI Fabric and SCVMM

Cisco ACI Virtualization Guide, Release 2.2(2)


312
Cisco ACI with Microsoft SCVMM
About the Mapping of ACI Constructs in SCVMM

About the Mapping of ACI Constructs in SCVMM


This section shows a table and figure of the mapping of Application Policy Infrastructure Controller (APIC)
constructs in Microsoft System Center Virtual Machine Manager (SCVMM).

Table 4: Mapping of APIC and SCVMM constructs

APIC System Center


VMM Domain Logical Switch and Logical Network

VMM Controller SCVMM

SCVMM Cloud Name Cloud (Fabric)

EPG VM Network

Infrastructure VLAN One infrastructure VM network for each logical


switch

Figure 25: Mapping of ACI and SCVMM constructs

The mapping is bound by the following rule:


One VMM domain cannot map to the same SCVMM more than once.

SCVMM Fabric Cloud and Tenant Clouds


Microsoft System Center Virtual Machine Manager (SCVMM) provides an object called "Cloud", which acts
as a container of logical and physical fabric resources. ACI Integration with SCVMM automatically creates
the various logical networking pieces and enables the logical networks at your designated cloud. When
configuring ACI Integration with SCVMM, the fabric cloud is the cloud that is specified as the root container

Cisco ACI Virtualization Guide, Release 2.2(2)


313
Cisco ACI with Microsoft SCVMM
Getting Started with Cisco ACI with Microsoft SCVMM

on the Application Policy Infrastructure Controller (APIC), while the tenant cloud is an SCVMM cloud that
contains a subset of the host groups specified in the fabric cloud. SCVMM contains all the host groups that
will be used to deploy the logical switch. Once the fabric cloud is set up and the logical switch has been
deployed to the hosts in the host groups, an SCVMM Admin can then create tenant clouds and enable the
apicLogicalNetwork on that tenant cloud, enabling Windows Azure Pack tenants to create and deploy tenant
networks on the fabric.
Example:
SCVMM Cloud Name: Fabric_Cloud
Host Groups: All Hosts
Host Group HumanResources:
HyperV Node: Node-2-24
Host Group Engineering:
HyperV Node: Node-2-25

SCVMM Cloud Name: HR_Cloud


Host Groups: HumanResources

SCVMM Cloud Name: Engineering_Cloud


Host Groups: Engineering

Getting Started with Cisco ACI with Microsoft SCVMM


This section describes how to get started with Cisco Application Centric Infrastructure (ACI) with Microsoft
System Center Virtual Machine Manager (SCVMM).
You must download and unzip the Cisco ACI and Microsoft Integration file for the 2.2(1) release before
installing Cisco ACI with Microsoft Windows Azure Pack.
1 Go to Cisco's Application Policy Infrastructure Controller (APIC) Website:
http://www.cisco.com/c/en/us/support/cloud-systems-management/
application-policy-infrastructure-controller-apic/tsd-products-support-series-home.html
2 Choose All Downloads for this Product.
3 Choose the release version and the aci-msft-pkg-2.2.1x.zip file.
4 Click Download.
5 Unzip the aci-msft-pkg-2.2.1x.zip file.

Note Cisco ACI with Microsoft System Center Virtual Machine Manager (SCVMM) only supports ASCII
characters. Non-ASCII characters are not supported.
Ensure that English is set in the System Locale settings for Windows, otherwise ACI with SCVMM will
not install. In addition, if the System Locale is later modified to a non-English Locale after the installation,
the integration components may fail when communicating with the APIC and the ACI fabric.

Prerequisites for Getting Started with Cisco ACI with Microsoft SCVMM
Before you get started, ensure that you have verified that your computing environment meets the following
prerequisites:

Cisco ACI Virtualization Guide, Release 2.2(2)


314
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Ensure Microsoft System Center 2016 or 2012 R2 - Virtual Machine Manager (SCVMM) Server and
Administrator Console (SCVMM) with Update Rollup 5, 6, 7, 9, 10 or 11 is installed.
See Microsoft's documentation.
To enable Microsegmentation integration with SCVMM, ensure Microsoft System Center 2016
or 2012 R2 - Virtual Machine Manager (SCVMM) Server and Administrator Console (SCVMM)
with Update Rollup 9, 10, or 11 is installed.

Ensure Windows Server 2016 or 2012 R2 is installed on the Hyper-V server with the Hyper-V role
enabled.
See Microsoft's documentation.
Ensure the cloud is configured in SCVMM and appropriate hosts added to that cloud.
See Microsoft's documentation.
Ensure "default" AEP exists with infrastructure VLAN enabled.
Ensure you have the Cisco MSI files for APIC SCVMM and the Host Agent.
See Getting Started with Cisco ACI with Microsoft SCVMM, on page 314.
Ensure that you scheduled a maintenance window for the SCVMM Installation. The Cisco ACI SCVMM
Installation process with automatically restart the current running SCVMM service instance.

Note If the VMs in SCVMM are configured with Dynamic MAC, then it takes time for the
APIC to update the VM Inventory as the SCVMM takes time to learn or discover these
MAC addresses.

Ensure the Hyper-V Management Tools is installed on the Hyper-V hosts as well as the SCVMM server.
To install the Hyper-V Management Tools feature:
1 In the Remote Server Administration Tools, Add Roles and Features > Feature > Remote Server
Administration Tools > Role Administration Tools > Hyper-V Management Tools and finish
the wizard to install the feature.
2 Repeat for each Hyper-V and the SCVMM server.

This installs the Hyper-V PowerShell cmdlets needed for the APIC SCVMM and host agent.

Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM
Components
This section describes how to install, set up, and verify the Cisco Application Centric Infrastructure (ACI)
with Microsoft System Center Virtual Machine Manager (SCVMM) components.

Cisco ACI Virtualization Guide, Release 2.2(2)


315
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Component Task
Install the APIC SCVMM Agent on SCVMM or on See Installing the APIC SCVMM Agent on SCVMM,
a Highly Available SCVMM on page 317.
See Installing the APIC SCVMM Agent on a Highly
Available SCVMM, on page 318
For the Windows Command Prompt method, see
Installing the APIC Agent on SCVMM Using the
Windows Command Prompt, on page 349.

Generate the OpflexAgent certificate See Generating APIC OpFlex Certificate, on page
318.

Add the OpFlex certificate policy to APIC See Adding the OpFlex Certificate Policy to APIC,
on page 320.

Install the OpflexAgent certificate See Installing the OpflexAgent Certificate, on page
321.

Configure APIC IP Settings with APIC credentials See Configuring APIC IP Settings with OpflexAgent
on the SCVMM Agent or on the SCVMM Agent on Certificate on the SCVMM Agent, on page 323.
a Highly Available SCVMM or
See Configuring APIC IP Settings with OpflexAgent
Certificate on the SCVMM Agent on a Highly
Available SCVMM, on page 324.

Install the APIC Hyper-V Agent on the Hyper-V See Installing the APIC Hyper-V Agent on the
server Hyper-V Server, on page 326.
For the Windows Command Prompt method, see
Installing the APIC Hyper-V Agent on the Hyper-V
Server Using the Windows Command Prompt , on
page 349.

Verify the APIC SCVMM Agent installation on See Verifying the APIC SCVMM Agent Installation
SCVMM or on a Highly Available SCVMM on SCVMM, on page 328.
or
See Verifying the APIC SCVMM Agent Installation
on a Highly Available SCVMM, on page 329.

Verify the APIC Hyper-V Agent installation on the See Verifying the APIC Hyper-V Agent Installation
Hyper-V server on the Hyper-V Server, on page 330.

Cisco ACI Virtualization Guide, Release 2.2(2)


316
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Component Task
Create SCVMM Domain Profiles See Creating SCVMM Domain Profiles, on page 331
and Creating a SCVMM Domain Profile Using the
GUI, on page 331.
For the NX-OS Style CLI method, see Creating a
SCVMM Domain Profile Using the NX-OS Style
CLI, on page 350.
For the REST API method, see Creating a SCVMM
Domain Profile Using the REST API, on page 345.

Verify the SCVMM VMM Domain and SCVMM See Verifying the SCVMM VMM Domain and
VMM SCVMM VMM, on page 333.

Deploy the logical switch to the host on SCVMM See Deploying the Logical Switch to the Host on
SCVMM, on page 334.

Enable the Logical Network on Tenant Clouds See Enabling the Logical Network on Tenant Clouds,
on page 335.

Installing the APIC SCVMM Agent on SCVMM


This section describes how to install the Application Policy Infrastructure Controller (APIC) SCVMM agent
on System Center Virtual Machine Manager (SCVMM).

Procedure

Step 1 Log in to the SCVMM server with SCVMM administrator credentials.


Step 2 On the SCVMM server in Explorer, locate the APIC SCVMM Agent.msi file.
Step 3 Right-click APIC SCVMM Agent.msi file and select Install.
Step 4 In the Cisco APIC SCVMM Agent Setup dialog box, perform the following actions:
a) Click Next.
b) Check the I accept the terms in the License Agreement check box and click Next.
c) Enter your account name and password credentials.
Provide the same credentials that you used for the SCVMM console. The Cisco APIC SCVMM agent
requires these credentials for the SCVMM operations to be able to function.
The installation process verifies the entered account name and password credentials. If the installation
fails, the SCVMM shows an error message and you must re-enter valid credentials.
d) After successful validation of the account name and password credentials, click Install.
e) Click Finish.

Cisco ACI Virtualization Guide, Release 2.2(2)


317
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Installing the APIC SCVMM Agent on a Highly Available SCVMM


This section describes how to install the Application Policy Infrastructure Controller (APIC) SCVMM agent
on a Highly Available System Center Virtual Machine Manager (SCVMM).

Procedure

Step 1 Log in to the Current Owner Node of the Highly Available SCVMM installation.
Step 2 On the SCVMM server in File Explorer, locate the APIC SCVMM Agent.msi file.
Step 3 Right-click APIC SCVMM Agent.msi file and select Install.
Step 4 In the Cisco APIC SCVMM Agent Setup dialog box, perform the following actions:
a) Click Next.
b) Check the I accept the terms in the License Agreement check box and click Next.
c) Enter your account name and password credentials.
Provide the same credentials that you used for the SCVMM console. The Cisco APIC SCVMM agent
requires these credentials for the SCVMM operations to be able to function.
The installation process verifies the entered account name and password credentials. If the installation
fails, the SCVMM shows an error message and you must re-enter valid credentials.
d) After successful validation of the account name and password credentials, click Install.
e) Click Finish.
Step 5 Repeat steps 1-4 for each Standby Node in the Windows Failover Cluster.

Generating APIC OpFlex Certificate


This section describes how to generate APIC OpFlex certificate to secure communication between the
Application Policy Infrastructure Controller (APIC) and SCVMM agents.

Note This should only be done once per installation.

Procedure

Step 1 Log in to the SCVMM server, choose Start > Run > Windows Powershell, and then, in the app bar, click
Run as administrator.
Step 2 Load ACISCVMMPsCmdlets and create a new OpflexAgent.pfx certificate file, by entering the following
commands:
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.

PS C:\Users\Administrator.INSCISCO> cd \
PS C:\> cd '.\Program Files (x86)\ApicVMMService'
PS C:\Program Files (x86)\ApicVMMService> Import-Module .\ACIScvmmPsCmdlets.dll

Cisco ACI Virtualization Guide, Release 2.2(2)


318
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

PS C:\Program Files (x86)\ApicVMMService> Get-Command -Module ACIScvmmPsCmdlets

CommandType Name ModuleName


----------- ---- ----------
Cmdlet Get-ACIScvmmOpflexInfo ACIScvmmPsCmdlets
Cmdlet Get-ApicConnInfo ACIScvmmPsCmdlets
Cmdlet Get-ApicCredentials ACIScvmmPsCmdlets
Cmdlet New-ApicOpflexCert ACIScvmmPsCmdlets
Cmdlet Read-ApicOpflexCert ACIScvmmPsCmdlets
Cmdlet Set-ApicConnInfo ACIScvmmPsCmdlets
Cmdlet Set-ApicCredentials ACIScvmmPsCmdlets
Step 3 Generate a new OpFlex Certificate, by entering the following commands. The "New-ApicOpflexCert"
PowerShell command will both generate the PFX certificate package file for use on other machines and install
the certificate to the local machine's Certificate Store.
PS C:\Program Files (x86)\ApicVMMService> $pfxpassword = ConvertTo-SecureString "MyPassword"
-AsPlainText -Force
PS C:\Program Files (x86)\ApicVMMService> New-ApicOpflexCert -ValidNotBefore 1/1/2015
-ValidNotAfter 1/1/2020
-Email [email protected] -Country USA -State CA -Locality "San Jose" -Organization MyOrg
PfxPassword $pfxpassword
Successfully created:
C:\Program Files (x86)\ApicVMMService\OpflexAgent.pfx

PS C:\Program Files (x86)\ApicVMMService>


Step 4 Display the certificate information to be used on APIC using the REST API.
See Displaying the Certificate Information to be Used on APIC Using the REST API, on page 319.

Displaying the Certificate Information to be Used on APIC Using the REST API
This section describes how to display the certificate information to be used on APIC using the REST API.

Procedure

To display the certificate information to be used on the APIC.


PS C:\Program Files (x86)\ApicVMMService> $pfxpassword = ConvertTo-SecureString "MyPassword"
-AsPlainText -Force
PS C:\Program Files (x86)\ApicVMMService> Read-ApicOpflexCert -PfxFile
"C:\Program Files (x86)\ApicVMMService\OpflexAgent.pfx" -PfxPassword $pfxpassword
-----BEGIN CERTIFICATE-----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Cisco ACI Virtualization Guide, Release 2.2(2)


319
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

4DEcP+bPiFbiDjMDQ3tMMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQ0FAAOCAQEANc5kKvN4
Q62tIYa1S2HSyiwjaMq7bXoqIH/ICPRqEXu1XE6+VnLnYqpo3TitLmU4G99uz+aS8dySNWaEYghk
8jgLpu39HH6yWxdPiZlcCQ17J5B5vRu3Xjnc/2/ZPqlQDEElobrAOdTko4uAHG4lFBHLwAZA/f72
5fciyb/pjNPhPgpCP0r7svElQ/bjAP1wK8PhCfd7k2rJx5jHr+YX8SCoM2jKyzaQx1BAdufspX3U
7AWH0aF7ExdWy/hW6CduO9NJf+98XNQe0cNH/2oSKYCl9qEK6FesdOBFvCjlRYR9ENqiY4q7xpyB
tqDkBm80V0JslU2xXn+G0yCWGO3VRQ==
-----END CERTIFICATE-----
PS C:\Program Files (x86)\ApicVMMService>

Adding the OpFlex Certificate Policy to APIC


This section describes how to add the OpFlex certificate policy to theApplication Policy Infrastructure
Controller (APIC) .

Procedure

Add the AAA policy to allow authenticate this certificate on the APIC server. The Hyper-V agent certificate
policy can be added in APIC through the GUI or REST Post:
GUI method:
1 Log in to the APIC GUI, on the menu bar, choose ADMIN > AAA.
2 In the Navigation pane, choose Security Management > Local Users and click on admin.
3 In the PROPERTIES pane, choose Actions > Create X509 Certificate, in the drop-down list, enter
the name and data.
4 In the Create X509 Certificate dialog box, in the Name field, you must enter "OpflexAgent".
5 On the SCVMM server, enter the output of the PowerShell Read-ApicOpflexCert cmdlet.
6 When you run the Read-ApicOpflexCert cmdlet, provide the full link when prompted for the name
of the pfx file: C:\Program Files (x86)\ApicVMMService\OpflexAgent.pfx, then enter the password.
7 Copy from the beginning of "-----BEGIN CERTIFICATE-----" to the end of "-----END
CERTIFICATE-----"and paste it in the DATA field.
8 Click SUBMIT.
9 In the PROPERTIES pane, under the User Certificates field, you will see the user certificate
displayed.

REST Post method:


POST
http://<apic-ip>/api/policymgr/mo/uni/userext/user-admin.json?rsp-subtree=full
{"aaaUserCert":{"attributes":
{"name":"OpflexAgent", "data":"
-----BEGIN CERTIFICATE-----
MIIDojCCAoqgAwIBAgIQHz+F2luuOpFKK0p3jxWRfjANBgkqhkiG9w0BAQ0FADBfMRwwGgYJKoZI
hvcNAQkBFg10MEBkb21haW4uY29tMQ4wDAYDVQQKDAVNeU9yZzELMAkGA1UECAwCQ0ExDDAKBgNV
BAYTA1VTQTEUMBIGA1UEAwwLT3BmbGV4QWdlbnQwHhcNMTUwMTAxMDAwMDAwWhcNMjAwMTAxMDAw
MDAwWjBfMRwwGgYJKoZIhvcNAQkBFg10MEBkb21haW4uY29tMQ4wDAYDVQQKDAVNeU9yZzELMAkG
A1UECAwCQ0ExDDAKBgNVBAYTA1VTQTEUMBIGA1UEAwwLT3BmbGV4QWdlbnQwggEiMA0GCSqGSIb3
DQEBAQUAA4IBDwAwggEKAoIBAQCzQS3rvrIdxiHfeAUqtX68CdjIL1+nDtqBH8LzDk0RBVb0KU6V

Cisco ACI Virtualization Guide, Release 2.2(2)


320
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components
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-----END CERTIFICATE-----

Installing the OpflexAgent Certificate


This section describes how to install the OpflexAgent Certificate.

Procedure

Step 1 Log in to the SCVMM server with administrator credentials.


Step 2 Use one of the following methods:
For large-scale deployments, see Microsoft's documentation for Deploy Certificates by Using Group
Policy:
https://technet.microsoft.com/en-us/library/cc770315(v=ws.10).aspx.
For small-scale deployments follow these steps:
You must add OpFlex security certificate to the local machine. The Microsoft SCVMM agent has a
security certificate file named OpflexAgent.pfx located in the C:\Program Files (x86)\ApicVMMService
folder on the SCVMM server. If the following steps are not performed on your SCVMM servers, the
APIC SCVMM Agent cannot communicate with the Application Policy Infrastructure Controller (APIC)
.
Install the OpFlex security certificate on the SCVMM Windows Server 2012 local machines certificate
repository. On each SCVMM server, install this certificate by performing the following steps:
1 Choose Start > Run.
2 Enter mmc and click OK.
3 In the Console Root window, on the menu bar, choose Add/Remove Snap-in.
4 In the Available Snap-ins field, choose Certificates and click Add.
5 In the Certificates snap-in dialog box, choose the Computer Account radio button, and click Next.
6 In the Select Computer dialog box, choose the Local Computer radio button, and click Finish.
7 Click OK to go back to the main MMC Console window.
8 In the MMC Console window, double-click Certificates (local computer) to expand its view.
9 Right-click Certificates under Personal and choose All Tasks > Import.

Cisco ACI Virtualization Guide, Release 2.2(2)


321
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

10 In the Certificates Import Wizard dialog box, perform the following actions:
a Click Next.
b Browse to the Opflex Agent file and click Next.

11 Enter the password for the certificate that was provided when you installed MSI.
12 You must choose the Mark this key as exportable. This will allow you to back up or transport
your keys at a later time radio button.
13 Choose the Include all extended properties radio button.
14 Choose the Place all certificates in the following store radio button, browse to locate Personal,
and click Next.
15 Click Finish.
16 Click OK.

Cisco ACI Virtualization Guide, Release 2.2(2)


322
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Step 3 Repeat steps 1 through 5 for each SCVMM server.

Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM Agent


This section describes how to configure the Application Policy Infrastructure Controller (APIC) IP settings
with OpflexAgent Certificate on the System Center Virtual Machine Manager (SCVMM) agent.

Procedure

Step 1 Log in to the SCVMM server, choose Start > Run > Windows PowerShell.
Step 2 Load ACISCVMMPsCmdlets by entering the following commands:

Example:
Note Get-ApicCredentials and Set-ApicCredentials are now deprecated, use Get-ApicConnInfo and
Set-ApicConnInfo.
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.

PS C:\Users\Administrator.INSCISCO> cd \
PS C:\> cd '.\Program Files (x86)\ApicVMMService'
PS C:\Program Files (x86)\ApicVMMService> Import-Module .\ACIScvmmPsCmdlets.dll
PS C:\Program Files (x86)\ApicVMMService> Get-Command -Module ACIScvmmPsCmdlets

CommandType Name ModuleName


----------- ---- ----------
Cmdlet Get-ACIScvmmOpflexInfo ACIScvmmPsCmdlets
Cmdlet Get-ApicConnInfo ACIScvmmPsCmdlets
Cmdlet Get-ApicCredentials ACIScvmmPsCmdlets
Cmdlet New-ApicOpflexCert ACIScvmmPsCmdlets
Cmdlet Read-ApicOpflexCert ACIScvmmPsCmdlets
Cmdlet Set-ApicConnInfo ACIScvmmPsCmdlets

Cisco ACI Virtualization Guide, Release 2.2(2)


323
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Cmdlet Set-ApicCredentials ACIScvmmPsCmdlets

PS C:\Program Files (x86)\ApicVMMService>


Step 3 Set up APIC connection parameters for the SCVMM agent, enter the following commands:
PS C:\Users\administrator.APIC> Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224
-CertificateSubjectName OpflexAgent

Apic Credential is successfully set to APIC SCVMM service agent.

If you enter the wrong information in Set-ApicCredentials, the information fails to apply and validate on the
APIC. This information is not preserved.
PS C:\Program Files (x86)\ApicVMMService> Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224

-CertificateSubjectName O
pflexAgentWrong
Failed cmdlet with Error: Invalid APIC Connection Settings.
Set-ApicConnInfo : The remote server returned an error: (400) Bad Request.
At line:1 char:1
+ Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224 -CertificateSubjectName Opf ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : InvalidArgument: (:) [Set-ApicConnInfo], WebException
+ FullyQualifiedErrorId : Failed cmdlet with Error: Invalid APIC Connection
Settings.,Cisco.ACI.SCVMM.
PowerShell.SetApicConnInfo
Step 4 Verify that the APIC connection parameters are set properly on APIC SCVMM Agent, enter the following
command:
PS C:\Program Files (x86)\ApicVMMService> Get-ApicConnInfo

EndpointAddress :
Username :
Password :
ApicAddresses : 172.23.139.224
ConnectionStatus : Connected
adminSettingsFlags : 0
certificateSubjectName : OpflexAgent
ExtensionData :

PS C:\Program Files (x86)\ApicVMMService>

Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM Agent on a Highly
Available SCVMM
This section describes how to configure the Application Policy Infrastructure Controller (APIC) IP settings
with OpflexAgent Certificate on the System Center Virtual Machine Manager (SCVMM) agent.

Cisco ACI Virtualization Guide, Release 2.2(2)


324
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Procedure

Step 1 Log in to the Owner Node SCVMM server, choose Start > Run > Windows PowerShell.
Step 2 Load ACISCVMMPsCmdlets by entering the following commands:

Example:
Note Get-ApicCredentials and Set-ApicCredentials are now deprecated, use Get-ApicConnInfo and
Set-ApicConnInfo.
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.

PS C:\Users\Administrator.INSCISCO> cd \
PS C:\> cd '.\Program Files (x86)\ApicVMMService'
PS C:\Program Files (x86)\ApicVMMService> Import-Module .\ACIScvmmPsCmdlets.dll
PS C:\Program Files (x86)\ApicVMMService> Get-Command -Module ACIScvmmPsCmdlets

CommandType Name ModuleName


----------- ---- ----------
Cmdlet Get-ACIScvmmOpflexInfo ACIScvmmPsCmdlets
Cmdlet Get-ApicConnInfo ACIScvmmPsCmdlets
Cmdlet Get-ApicCredentials ACIScvmmPsCmdlets
Cmdlet New-ApicOpflexCert ACIScvmmPsCmdlets
Cmdlet Read-ApicOpflexCert ACIScvmmPsCmdlets
Cmdlet Set-ApicConnInfo ACIScvmmPsCmdlets
Cmdlet Set-ApicCredentials ACIScvmmPsCmdlets

PS C:\Program Files (x86)\ApicVMMService>


Step 3 Set up APIC connection parameters to the SCVMM agent, enter the following commands:
PS C:\Users\administrator.APIC> Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224
-CertificateSubjectName OpflexAgent

Apic Credential is successfully set to APIC SCVMM service agent. 10:25 AM

If you enter the wrong information in Set-ApicCredentials, the information fails to apply and validate on the
APIC. This information is not preserved.
PS C:\Program Files (x86)\ApicVMMService> Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224

-CertificateSubjectName O
pflexAgentWrong
Failed cmdlet with Error: Invalid APIC Connection Settings.
Set-ApicConnInfo : The remote server returned an error: (400) Bad Request.
At line:1 char:1
+ Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224 -CertificateSubjectName Opf ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : InvalidArgument: (:) [Set-ApicConnInfo], WebException
+ FullyQualifiedErrorId : Failed cmdlet with Error: Invalid APIC Connection
Settings.,Cisco.ACI.SCVMM.
PowerShell.SetApicConnInfo
Step 4 Verify that the APIC connection parameters is set properly on APIC SCVMM Agent, enter the following
command:
PS C:\Program Files (x86)\ApicVMMService> Get-ApicConnInfo

EndpointAddress :
Username :

Cisco ACI Virtualization Guide, Release 2.2(2)


325
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Password :
ApicAddresses : 172.23.139.224
ConnectionStatus : Connected
adminSettingsFlags : 0
certificateSubjectName : OpflexAgent
ExtensionData

Installing the APIC Hyper-V Agent on the Hyper-V Server


This section describes how to install the APIC Hyper-V agent on the Hyper-V server.

Before You Begin


Scheduled downtime for the Hyper-V node. For more information regarding Hyper-V Maintenance Mode
behavior, see: https://technet.microsoft.com/en-us/library/hh882398.aspx

Procedure

Step 1 Log on to the SCVMM server and bring the Hyper-V node into Maintenance Mode.
Step 2 Log in to the Hyper-V server with administrator credentials.
Step 3 On the Hyper-V server in File Explorer, locate the APIC Hyper-V Agent.msi file.
Step 4 Right-click the APIC Hyper-V Agent.msi file and choose Install.
Step 5 In the ApicHypervAgent Setup dialog box, perform the following actions:
a) Check the I accept the terms in the License Agreement check box.
b) Click Install.
c) Click Finish.
Step 6 Follow the steps in Microsoft's documentation to view and bring the apicVSwitch Logical Switch into
compliance. Also referred to in this guide as Host Remediate or Logical Switch Instance Remediation: https:/
/technet.microsoft.com/en-us/library/dn249415.aspx
Step 7 Use one of the following methods:
For large-scale deployments, see Microsoft's documentation for Deploy Certificates by Using Group
Policy:
https://technet.microsoft.com/en-us/library/cc770315(v=ws.10).aspx
For small-scale deployments follow these steps:
You must add OpFlex security certificate in the local system. The Microsoft Hyper-V agent has a security
certificate file named OpflexAgent.pfx located in the C:\Program Files (x86)\ApicVMMService folder
on the SCVMM server. If the following steps are not performed on your Hyper-V servers, the APIC
Hyper-V Agent cannot communicate with the Cisco Application Centric Infrastructure (ACI) fabric leaf
switches.
Install the OpFlex security certificate on the Hyper-V Windows Server 2012 local machines certificate
repository. On each Hyper-V server, install this certificate by performing the following steps:
1 Choose Start > Run.
2 Enter mmc and click OK.

Cisco ACI Virtualization Guide, Release 2.2(2)


326
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

3 In the Console Root window, on the menu bar, choose Add/Remove Snap-in.
4 In the Available Snap-ins field, choose Certificates and click Add.
5 In the Certificates snap-in dialog box, choose the Computer Account radio button, and click Next.
6 In the Select Computer dialog box, choose the Local Computer radio button, and click Finish.
7 Click OK to go back to the main MMC Console window.
8 In the MMC Console window, double-click Certificates (local computer) to expand its view.
9 Right-click Certificates under Personal and choose All Tasks > Import.
10 In the Certificates Import Wizard dialog box, perform the following actions:
a Click Next.
b Browse to the Opflex Agent file and click Next.

11 Enter the password for the certificate that was provided when you installed MSI.
12 You must choose the Mark this key as exportable. This will allow you to back up or transport
your keys at a later time radio button.
13 Choose the Include all extended properties radio button.
14 Choose the Place all certificates in the following store radio button, browse to locate Personal,
and click Next.
15 Click Finish.
16 Click OK.

Cisco ACI Virtualization Guide, Release 2.2(2)


327
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Step 8 Log on to the SCVMM Sserver and bring the Hyper-V node out of Maintenance Mode.
Step 9 Repeat steps 1 through 8 for each Hyper-V server.

Verifying the Installation of Cisco ACI with Microsoft SCVMM

Verifying the APIC SCVMM Agent Installation on SCVMM


This section describes how to verify the APIC SCVMM agent installation on System Center Virtual Machine
Manager (SCVMM).

Procedure

Step 1 Choose Start > Control Panel.


Step 2 In the Control Panel window, enter Control Panel\Programs\Programs and Features in the address bar.
Step 3 Locate Cisco APIC SCVMM Agent. If Cisco APIC SCVMM Agent is present, then the product is installed.
If Cisco APIC SCVMM Agent is not present, then the product is not installed. See the Installing the APIC
SCVMM Agent on SCVMM, on page 317 or Installing the APIC Agent on SCVMM Using the Windows
Command Prompt, on page 349 section.

Step 4 Verify the ApicVMMService is in RUNNING state through the GUI or CLI:
GUI method: Choose Start > Run and enter services.msc. In the Service pane, locate the
ApicVMMService and verify the state is RUNNING.

Cisco ACI Virtualization Guide, Release 2.2(2)


328
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

CLI method: From the command prompt, enter the sc.exe query ApicHypervAgent command and
verify the state is RUNNING:
sc.exe query ApicVMMService

SERVICE_NAME: ApicVMMService
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0

Verifying the APIC SCVMM Agent Installation on a Highly Available SCVMM


This section describes how to verify the APIC SCVMM agent installation on a Highly Available System
Center Virtual Machine Manager (SCVMM).

Procedure

Step 1 Choose Start > Control Panel.


Step 2 In the Control Panel window, enter Control Panel\Programs\Programs and Features in the address bar.
Step 3 Locate Cisco APIC SCVMM Agent. If Cisco APIC SCVMM Agent is present, then the product is installed.
If Cisco APIC SCVMM Agent is not present, then the product is not installed. See the Installing the APIC
SCVMM Agent on SCVMM, on page 317 or Installing the APIC Agent on SCVMM Using the Windows
Command Prompt, on page 349 section.

Step 4 Verify the ApicVMMService is in RUNNING state through the GUI or CLI:
GUI method: Choose Start > Run and enter services.msc. In the Service pane, locate the
ApicVMMService and verify the state is RUNNING.
CLI method: From the command prompt, enter the sc.exe query ApicHypervAgent command and
verify the state is RUNNING:
sc.exe query ApicVMMService

SERVICE_NAME: ApicVMMService
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0

Step 5 Choose Start > PowerShell and enter the following commands:
PS C:\Users\administrator.APIC\Downloads> Get-ClusterResource -Name ApicVMMService

Name State OwnerGroup ResourceType

Cisco ACI Virtualization Guide, Release 2.2(2)


329
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

---- ----- ---------- ------------


ApicVMMService Online clustervmm07-ha Generic Service

PS C:\Users\administrator.APIC\Downloads> Get-ClusterCheckpoint -ResourceName ApicVMMService

Resource Name
-------- ----
ApicVMMService SOFTWARE\Wow6432Node\Cisco\Apic

PS C:\Users\administrator.APIC\Downloads> Get-ClusterResourceDependency -Resource


ApicVMMService

Resource DependencyExpression
-------- --------------------
ApicVMMService ([VMM Service clustervmm07-ha])

Verifying the APIC Hyper-V Agent Installation on the Hyper-V Server


This section describes how to verify the APIC Hyper-V agent installation on the Hyper-V server.

Procedure

Step 1 Choose Start > Control Panel.


Step 2 In the Control Panel window, enter Control Panel\Programs\Programs and Features in the address bar.
Step 3 Locate Cisco APIC Hyperv Agent. If Cisco APIC Hyperv Agent is present, then the product is installed.
If Cisco APIC Hyperv Agent is not present, then the product is not installed. See the Installing the APIC
Hyper-V Agent on the Hyper-V Server, on page 326 or Installing the APIC Hyper-V Agent on the Hyper-V
Server Using the Windows Command Prompt , on page 349 section.

Step 4 Verify the ApicHypervAgent is in RUNNING state through the GUI or CLI:
GUI method: Choose Start > Run and enter services.msc. In the Service pane, locate the
ApicHypervAgent and verify the state is RUNNING.
CLI method: From the command prompt, enter the sc.exe query ApicHypervAgent command and
verify the state is RUNNING:
sc.exe query ApicHypervAgent

SERVICE_NAME: ApicHypervAgent
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0

Cisco ACI Virtualization Guide, Release 2.2(2)


330
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Setting Up ACI Policies

Creating SCVMM Domain Profiles


In this section, the examples of a VMM domain are System Center Virtual Machine Manager (SCVMM)
domains. The example tasks are as follows:
Configuring the VMM domain name and SCVMM controller.
Creating an attach entity profile and associating it to the VMM domain.
Configuring a pool.
Verifying all configured controllers and their operational states.

Creating a SCVMM Domain Profile Using the GUI


Before You Begin
Before you create a VMM domain profile, you must establish connectivity to an external network using
in-band or out-of-band management network on the Application Policy Infrastructure Controller (APIC).

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose VM NETWORKING > Inventory.
Step 2 In the Navigation pane, right-click the VM Provider Microsoft and choose Create SCVMM Domain.
Step 3 In the Create SCVMM domain dialog box, in the Name field, enter the domain's name (productionDC).
Step 4 Optional: In the Delimiter field, enter one of the following: |, ~, !, @, ^, +, or =. If you do not enter a symbol,
the system default | delimiter will appear in the policy.
Step 5 In the Associated Attachable Entity Profile field, from the drop-down list, choose Create Attachable Entity
Profile, and perform the following actions to configure the list of switch interfaces across the span of the
VMM domain:
a) In the Create Attachable Access Entity Profile dialog box, in the Profile area, in the Name field, enter
the name (profile1), and click Next.
b) In the Association to Interfaces area, expand Interface Policy Group.
c) In the Configured Interface, PC, and VPC dialog box, in the Configured Interfaces, PC, and VPC
area, expand Switch Profile.
d) In the Switches field, from the drop-down list, check the check boxes next to the desired switch IDs (101
and 102).
e) In the Switch Profile Name field, enter the name (swprofile1).
f) Expand the + icon to configure interfaces.
g) Choose the appropriate interface ports individually in the switch image (interfaces 1/1, 1/2, and 1/3).
The Interfaces field gets populated with the corresponding interfaces.
h) In the Interface Selector Name field, enter the name (selector1).
i) In the Interface Policy Group field, from the drop-down list, choose Create Interface Policy Group.
j) In the Create Access Port Policy Group dialog box, in the Name field, enter the name (group1).
k) Click Submit.
l) Click Save, and click Save again.
m) Click Submit.

Cisco ACI Virtualization Guide, Release 2.2(2)


331
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

n) In the Select the interfaces area, under Select Interfaces, click the All radio button.
o) Verify that in the vSwitch Policies field, the Inherit radio button is selected.
p) Click Finish.
The Attach Entity Profile is selected and is displayed in the Associated Attachable Entity Profile field.
Step 6 In the VLAN Pool field, from the drop-down list, choose Create VLAN Pool. In the Create VLAN Pool
dialog box, perform the following actions:
a) In the Name field, enter the VLAN pool name (VlanRange).
b) In the Allocation Mode field, verify that the Dynamic Allocation radio button is selected.
c) Expand Encap Blocks to add a VLAN block. In the Create Ranges dialog box, enter a VLAN range.
Note We recommend a range of at least 200 VLAN numbers. Do not define a range that includes the
reserved VLAN ID for infrastructure network because that VLAN is for internal use.
d) Click OK, and click Submit.
In the VLAN Pool field, "VlanRange-dynamic" is displayed.
Step 7 Expand SCVMM. In the Create SCVMM Controller dialog box, verify that the Type is SCVMM, and then
perform the following actions:
a) In the Name field, enter the name (SCVMM1).
b) To connect to a SCVMM HA Cluster, specify the SCVMM HA Cluster IP address or the SCVMM Cluster
Resource DNS name, which was specified during the SCVMM HA installation. See How to Connect to
a Highly Available VMM Management Server by Using the VMM Console: https://technet.microsoft.com/
en-us/library/gg610673.aspx
c) In the Host Name (or IP Address) field, enter the Fully Qualified Domain Name (FQDN) or IP address
of your SCVMM.
d) In the SCVMM Cloud Name field, enter the SCVMM cloud name (ACI-Cloud).
e) Click OK.
f) In the Create SCVMM Domain dialog box, click Submit.
Step 8 Verify the new domain and profiles, by performing the following actions:
a) On the menu bar, choose VM Networking > Inventory.
b) In the Navigation pane, choose Microsoft > productionDC > SCVMM1.
c) In the Work pane, view the VMM domain name to verify that the controller is online.
d) In the Work pane, the SCVMM1 properties are displayed including the operational status. The displayed
information confirms that connection from the APIC controller to the SCVMM server is established, and
the inventory is available.

Configuring the Port Channel Policy


This section describes how to configure the port channel policy.

Modifying the Interface Port Channel Policy


The ACI SCVMM Agent sync's the SCVMM uplink port profile with the aggregated interface port channel
policies and performs an automated update when there are changes to the policy.
To update the policy for hyper-v servers perform the following steps.

Cisco ACI Virtualization Guide, Release 2.2(2)


332
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose Fabric > Access Policies.
Step 2 In the Navigation pane, expand Interface Policies > Policy Groups.
Step 3 Choose the policy group and check the name of the policy group.
Step 4 Navigate to the policy group and update it based on your requirements (e.g. LACP or MAC pinning).

Overriding the VMM Domain VSwitch Policies for Blade Servers


When Blade servers are connected to ACI fabric interface port channel policy will be used between interface
and fabric interconnect. When fabric interconnect is configured for LACP you will need to configure the
Hyper-V server for MAC pinning mode.
To configure the Hyper-V server for MAC pinning mode perform the following steps.

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose VM Networking.
Step 2 In the Navigation pane, expand Microsoft > Domain_Name.
Step 3 In the Work pane, click ACTIONS and choose Create VSwitch Policies.
Step 4 On the port channel policy, select the existing policy for mac pinning or create a new policy.
Note If the hosts are already connected to logical switch, then the SCVMM admin should perform host
remediate for all the hosts for uplink policy to take effect.

Verifying the SCVMM VMM Domain and SCVMM VMM

Procedure

In the System Center Virtual Machine Manager Console GUI, the following object has been created by the
SCVMM agent for the newly created SCVMM VMM domain and VMM Controllers rootContName (SCVMM
Cloud Name):
a) Click Fabric at the bottom left side pane and under fabric verify the following objects:

Example:
1 Choose Networking > Logical Switches and in the right side pane, the logical switch name is
apicVSwitch_VMMdomainName.
2 Choose Networking > Logical Networks and in the right side pane, the logical network name is
apicLogicalNetwork_VMMdomainName.
3 Choose Networking > Port Profiles and in the right side pane, the port profile name is
apicUplinkPortProfile_VMMdomainName.

b) Click VMs and Services in the bottom left side pane.

Cisco ACI Virtualization Guide, Release 2.2(2)


333
Cisco ACI with Microsoft SCVMM
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM Components

Example:
1 Choose VM Networks.
2 In the right side pane, the VM network name is apicInfra|10.0.0.30|SCVMM Controller
HostNameORIPAddress filed value|VMMdomainName.
You must use infra VM Network to create VTEP on the Hyper-V server.

Deploying the Logical Switch to the Host on SCVMM


This section describes how to deploy the logical switch to the host on System Center Virtual Machine Manager
(SCVMM).

Note If SCVMM upgrade is performed and hosts are already connected to logical switch then SCVMM admin
should perform host remediate for all the hosts for hosts to establish connection to leaf.

Procedure

Step 1 Log in to the SCVMM server, in the Navigation pane, choose Fabric on the bottom left.
Step 2 In the Navigation pane, expand Networking > Logical Switches to ensure the logical switch is created
(apicVswitch_cloud1).
Step 3 In the Navigation pane, choose VMs and Services on the bottom left.
Step 4 In the Navigation pane, expand All Hosts.
Step 5 Choose the Hyper-V host folder (Dev8).
Step 6 Right-click the Hyper-V host (Dev8-HV1) and choose Properties.
Step 7 In the Dev8-HV1.inscisco.net Properties dialog box, choose Virtual Switches and perform the following
actions:
a) Choose + New Virtual Switch.
b) Choose New Logical Switch.
c) In the Logical switch field, from the drop-down list, choose a logical switch (apicVswitch_cloud1).
d) In the Adapter field, from the drop-down list, choose an adapter (Leaf1-1-1 - Intel(R) Ethernet Server
Adapter X520-2 #2).
e) In the Uplink Port Profile field, from the drop-down list, choose an Uplink Port Profile
(apicUplinkPortProfile_Cloud01).
f) Click New Virtual Network Adapter, choose the unnamed virtual network adapter, and enter the name
(dev8-hv1-infra-vtep).
g) Click Browse.
h) In the Dev8-HV1.inscisco.net Properties dialog box, choose the VM network
(apicInfra|10.0.0.30|dev8-scvmm.apic.net|Cloud01) and click OK.

Cisco ACI Virtualization Guide, Release 2.2(2)


334
Cisco ACI with Microsoft SCVMM
Upgrading the Cisco ACI with Microsoft SCVMM Components

i) In the Virtual Machine Manager dialog box, click OK.


Step 8 Click Jobs on the bottom left.
Step 9 In the History pane, you can check the status of the Change properties of virtual machine host job to ensure
that the job has completed.
Step 10 You must refresh the host under SCVMM for the Hyper-V server to reflect proper Hyper-V Host IP address
in SCVMM. Once it has been refreshed, the APIC GUI reflects the updated Hyper-V Host IP information.

Enabling the Logical Network on Tenant Clouds


This section describes how to enable the Cisco ACI Integration with SCVMM Tenant Clouds. For more
information, see the SCVMM Fabric Cloud and Tenant Clouds, on page 313.

Procedure

Step 1 Log in to the SCVMM server with SCVMM administrator credentials, and open up the SCVMM Admin
Console.
Step 2 On the SCVMM Admin Console, navigate to VMs and Services.
Step 3 In the Navigation pane, expand Clouds, right-click on your target Tenant Cloud (HR_Cloud) and choose
Properties.
Step 4 In the Pop-Up Window, in the Navigation pane, choose Logical Networks
a) Locate the logical network which was automatically created as part of associating the VMM Domain to
this SCVMM.
b) Click the logical network check box (apicLogicalNetwork_MyVmmDomain).
c) Click OK.
The tenant cloud is now ready to be used within ACI Integration at the Windows Azure Pack Plan configuration
page.

Upgrading the Cisco ACI with Microsoft SCVMM Components


If you are trying to upgrade to SCVMM 2016, you must follow the Microsoft procedure and then install the
Cisco ACI with Microsoft SCVMM components as a fresh install.
Prerequisites:
If upgrading to SCVMM 2012 R2, Microsoft servers that you integrate into ACI must be updated with the
KB2919355 and KB3000850 update rollups prior to upgrading ACI to the 2.2(1) release. The KB2919355
update rollup includes the 2929781 patch, which adds new TLS cipher suites and changes the cipher suite
priorities in Windows 8.1 and Windows Server 2012 R2.
You must patch the following Microsoft servers:
Microsoft Windows Azure Pack Resource Provider Servers
Microsoft Windows Azure Pack Tenant Site Servers

Cisco ACI Virtualization Guide, Release 2.2(2)


335
Cisco ACI with Microsoft SCVMM
Upgrading the ACI Microsoft SCVMM Components Workflow

Microsoft Windows Azure Pack Admin Site Servers


Microsoft System Center Service Provider Foundation/Orchestration Servers
Microsoft System Center 2012 R2 Servers
Microsoft HyperV 2012 R2 Servers

Upgrading the ACI Microsoft SCVMM Components Workflow


This sections describes upgrading the ACI Microsoft SCVMM components workflow.

Procedure

Step 1 Upgrade the APIC Controller and the Switch Software.


For more information, see the Cisco APIC Firmware Management Guide.

Step 2 Upgrade the APIC SCVMM Agent on SCVMM or Upgrade the APIC SCVMM Agent on a Highly Available
SCVMM.
For more information, see Upgrading the APIC SCVMM Agent on SCVMM, on page 336.
For more information, see Upgrading the APIC SCVMM Agent on a High Available SCVMM, on page 337.

Step 3 Upgrade the APIC Hyper-V Agent.


For more information, see Upgrading the APIC Hyper-V Agent, on page 337.

Upgrading the APIC SCVMM Agent on SCVMM


This section describes how to upgrade the APIC SCVMM agent on System Center Virtual Machine Manager
(SCVMM).

Before You Begin


Scheduled downtime for the Microsoft SCVMM Server. The upgrade process will automatically restart the
Microsoft System Center Virtual Machine Manager Service, resulting in the SCVMM Service to be temporarily
unable to handle any change or query requests.

Procedure

Upgrade the APIC SCVMM agent on SCVMM.


If upgrading from release 1.1(2x) or later:
a) Follow the steps outlined in the Installing the APIC SCVMM Agent on SCVMM, on page 317.
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.

If upgrading from a prior release of 1.1(2x):


a) Follow the steps outlined in the Installing the APIC SCVMM Agent on SCVMM, on page 317.

Cisco ACI Virtualization Guide, Release 2.2(2)


336
Cisco ACI with Microsoft SCVMM
Upgrading the APIC SCVMM Agent on a High Available SCVMM

The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.
b) Follow the steps outline in the Exporting APIC OpFlex Certificate, on page 356.
c) Follow the steps outline in the Installing the OpflexAgent Certificate, on page 321.
d) Follow the steps outline in the Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM
Agent, on page 323 or Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM Agent
on a Highly Available SCVMM, on page 324.

Upgrading the APIC SCVMM Agent on a High Available SCVMM


This section describes how to upgrade the APIC SCVMM agent on a high available System Center Virtual
Machine Manager (SCVMM).

Procedure

Step 1 Log in to a Standby node of the Highly Available SCVMM installation.


Step 2 On the SCVMM server in File Explorer, locate the APIC SCVMM Agent.msi file.
Step 3 Right-click APIC SCVMM Agent.msi file and select Install.
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.

Step 4 In the Cisco APIC SCVMM Agent Setup dialog box, perform the following actions:
a) Click Next.
b) Check the I accept the terms in the License Agreement check box and click Next.
c) Enter your account name and password credentials.
Provide the same credentials as used for the SCVMM console. The Cisco APIC SCVMM agent requires
these credentials for the SCVMM operations to be able to function.
The installation process verifies the entered account name and password credentials. If the installation
fails, the SCVMM shows an error message and you must re-enter valid credentials.
d) After successful validation of the account name and password credentials, click Install.
e) Click Finish.
Step 5 Repeat steps 1-4 for each Standby Node in the Windows Failover Cluster.
Step 6 Failover from the Current Owner Node of the Highly Available SCVMM installation to one of the newly
upgrade Standby Nodes.
Step 7 Follow steps 2-4 on the final Standby Node of the Windows Failover Cluster.

Upgrading the APIC Hyper-V Agent


This section describes how to upgrade the APIC Hyper-V agent.

Cisco ACI Virtualization Guide, Release 2.2(2)


337
Cisco ACI with Microsoft SCVMM
Deploying Tenant Policies

Before You Begin


Scheduled downtime for the Hyper-V node. For more information regarding Hyper-V Maintenance Mode
behavior, see: https://technet.microsoft.com/en-us/library/hh882398.aspx

Procedure

Upgrade the APIC Hyper-V agent.


If upgrading from release 1.1(2x) or later:
a) Follow steps 1-8 in the Installing the APIC Hyper-V Agent on the Hyper-V Server, on page 326. Skip step
7. Step 7 is not required for upgrades as the OpflexAgent certificate is already installed on the Hyper-V
node.
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.

If upgrading from a prior release of 1.1(2x):


a) Follow the steps outlined in the Uninstalling the APIC Hyper-V Agent, on page 407.
b) Follow steps 1-8 in the Installing the APIC Hyper-V Agent on the Hyper-V Server, on page 326. Skip step
7. Step 7 is not required for upgrades as the OpflexAgent certificate is already installed on the Hyper-V
node.
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.

Deploying Tenant Policies


Deployment Tenant Policies Prerequisites
Ensure that your computing environment meets the following prerequisites:
Ensure you have installed the APIC SCVMM Agent.
For details, see Installing the APIC SCVMM Agent on SCVMM, on page 317.
Ensure you have installed the APIC Hyper-V Agent.
For details, see Installing the APIC Hyper-V Agent on the Hyper-V Server, on page 326.
Ensure you have created a logical switch.
See Microsoft's documentation.
Ensure you have created a virtual switch.
See Microsoft's documentation.

Cisco ACI Virtualization Guide, Release 2.2(2)


338
Cisco ACI with Microsoft SCVMM
Creating a Tenant

Creating a Tenant
Procedure

Step 1 On the menu bar, choose TENANTS, and perform the following actions:
a) Click Add Tenant.
The Create Tenant dialog box opens.
b) In the Name field, add the tenant name (ExampleCorp).
Step 2 Click Finish.
See the Cisco APIC Basic Configuration Guide for more information.

Creating an EPG
This section describes how to create an endpoint group (EPG).

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Application Profiles > Application Profile Name, right-click
Application EPGs, and choose Create Application EPG.
Step 3 In the Create Application EPG dialog box, perform the following actions:
a) In the Name field, enter the name (EPG1).
b) In the Bridge Domain field, from the drop-down list, choose one to associate with the bridge domain.
c) In the Associate to VM Domain Profiles field, click the appropriate radio button and click Next.
d) In the Associated VM Domain Profiles field, click the + icon, and choose a cloud to add (Cloud10).
You have now created an EPG.

Associating the Microsoft VMM Domain with an EPG


This section describes how to create a VM Network by associating the Microsoft VMM domain with an
endpoint group (EPG).

Before You Begin


Ensure you have created an EPG.

Cisco ACI Virtualization Guide, Release 2.2(2)


339
Cisco ACI with Microsoft SCVMM
Verifying the EPG is Associated with the VMM Domain on APIC

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Application Profiles > Application Profile Name >
Application EPGs and select an existing EPG.
Step 3 In the Navigation pane, choose Domains (VMs and Bare-Metals).
Step 4 In the Domains (VM and Bare-Metals) pane, click on the ACTIONS and choose Add VMM Domain
Association.
Step 5 In the Add VMM Domain Association dialog box, click the Deploy Immediacy field radio button for either
Immediate or On Demand.
See EPG Policy Resolution and Deployment Immediacy, on page 12 for more information.

Step 6 In the Add VMM Domain Association dialog box, click the Resolution Immediacy field radio button for
either Immediate, On Demand, or Pre-Provision.
See EPG Policy Resolution and Deployment Immediacy, on page 12 for more information.
You have now created a VM Network.
Step 7 Optional: In the Delimiter field, use a single character as the VM Network Name delimiter, enter one of the
following: |, ~, !, @, ^, +, or = . If you do not enter a symbol, the system default of | will be used.

Verifying the EPG is Associated with the VMM Domain on APIC


This section describes how to verify the endpoint group association with the VMM domain on Application
Policy Infrastructure Controller (APIC).

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose VM NETWORKING > INVENTORY.
Step 2 In the Navigation pane, expand Microsoft > Cloud10 > Controller > Controller1 > Distributed Virtual
Switch > SCVMM|Tenant|SCVMM|EPG1|Cloud1.
The name of the new VM Network is in the following format: Tenant Name|Application Profile
Name|Application EPG Name|Microsoft VMM Domain.

Step 3 In the PROPERTIES pane, verify the EPG associated with the VMM domain, the VM Network, and the
details such as NIC NAME, VM NAME, IP, MAC, and STATE.

Verifying the EPG is Associated with the VMM Domain on SCVMM


This section describes how to verify the endpoint group (EPG) associated with the VMM domain on System
Center Virtual Machine Manager (SCVMM).

Cisco ACI Virtualization Guide, Release 2.2(2)


340
Cisco ACI with Microsoft SCVMM
Creating a Static IP Address Pool

Procedure

Step 1 Open the Virual Machine Manager Console icon on your desktop.
Step 2 In the bottom left pane, click on VMs and Services or press Ctrl+M.
Step 3 In the VMs and Services pane, click on VM Networks and verify the EPG associated with the VMM domain.
The EPG associated with the VMM domain is in the following format: Tenant Name|Application Profile
Name|Application EPG Name|Microsoft VMM Domain.

Creating a Static IP Address Pool


Static IP Address Pools enable an Microsoft SCVMM Server to statically assign IP Address to virtual machines
during the VM Template Deployment phase. This feature removes the need to request a DHCP address from
a DHCP Server. This feature is most often used to deploy server VMs which require statically assigned IP
Addresses in the network such as: Windows Active Directory Domain Controllers, DNS Servers, DHCP
Servers, Network Gateways, etc.
For more information regarding Static IP address pools, see the Microsoft Documentation: https://
technet.microsoft.com/en-us/library/jj721568.aspx#BKMK_StaticIPAddressPools
With Cisco ACI SCVMM Integration - the Cisco APIC can automate the deployment of a Static IP Address
Pool to a VM Network, bypassing the need to perform these operations on the Microsoft SCVMM Server
itself.

Before You Begin


Ensure an EPG is associated to a Microsoft SCVMM VMM Domain.

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Application Profiles > Application Profile Name >
Application EPGs > Your Target EPG, right-click Subnets, and choose Create EPG Subnet.
Step 3 In the Create EPG Subnet dialog box, perform the following actions:
a) Enter a default Gateway IP in address/mask format.
b) Click Submit.
Step 4 Right-click on the newly created subnet and choose Create Static IP Pool Policy.
Step 5 In the Create Static IP Pool Policy dialog box, perform the following actions:
a) Enter a Name (IP).
b) Enter a Start IP and End IP.
c) Enter optional Static IP Pool policies.
The DNS Servers, DNS Search Suffix, Wins Servers fields Allow a list of entries, simply use semicolon
to separate the entries. For example within the DNS Servers Field:
192.168.1.1;192.168.1.2

Cisco ACI Virtualization Guide, Release 2.2(2)


341
Cisco ACI with Microsoft SCVMM
Creating a Static IP Address Pool Using the NX-OS Style CLI

Note When configuring the Start IP and End IP, ensure they are within the same Subnet as the Gateway
defined in Step 3. If not deployment of the Static IP Address Pool to SCVMM fails.
Only 1 Static IP Address Pool will be used for a given EPG. Do not create multiple Static IP Pool
Policies under a Subnet as the others will not take effect.
The Static IP Address Pool Policy follows the VMM Domain association. If this EPG is deployed
to multiple SCVMM Controllers in the same VMM Domain, then the same Static IP Addresses
will be deployed, causing duplicate IP Addresses. For this scenario, deploy an addition EPG with
a non-overlapping Address pool and create the necessary policies and contracts for the endpoints
to communicate.

Creating a Static IP Address Pool Using the NX-OS Style CLI


Procedure

Step 1 In the CLI, enter configuration mode:

Example:
apic1# config

Step 2 Create the Static IP Address Pool:

Example:
apic1(config)# tenant t0
apic1(config-tenant)# application a0
apic1(config-tenant-app)# epg e0
apic1(config-tenant-app-epg)# mic
microsoft microsoft-domain
apic1(config-tenant-app-epg)# microsoft static-ip-pool test_pool gateway 1.2.3.4/5
apic1(config-tenant-app-epg-ms-ip-pool)# iprange 1.2.3.4 2.3.4.5
apic1(config-tenant-app-epg-ms-ip-pool)# dns
dnssearchsuffix dnsservers dnssuffix
apic1(config-tenant-app-epg-ms-ip-pool)# dnssuffix testsuffix
apic1(config-tenant-app-epg-ms-ip-pool)# exit
apic1(config-tenant-app-epg)# no mi
microsoft microsoft-domain
apic1(config-tenant-app-epg)# no microsoft static-ip-pool ?
test_pool
apic1(config-tenant-app-epg)# no microsoft static-ip-pool test_pool gateway ?
gwAddress gwAddress
apic1(config-tenant-app-epg)# no microsoft static-ip-pool test_pool gateway 1.2.3.4/5
apic1(config-tenant-app-epg)#

Step 3 Verify the Static IP Address Pool:

Example:
apic1(config-tenant-app-epg-ms-ip-pool)# show running-config
# Command: show running-config tenant t0 application a0 epg e0 microsoft static-ip-pool
test_pool gateway 1.2.3.4/5
# Time: Thu Feb 11 23:08:04 2016
tenant t0
application a0
epg e0

Cisco ACI Virtualization Guide, Release 2.2(2)


342
Cisco ACI with Microsoft SCVMM
Connecting and Powering on the Virtual Machine

microsoft static-ip-pool test_pool gateway 1.2.3.4/5


iprange 1.2.3.4 2.3.4.5
dnsservers
dnssuffix testsuffix
dnssearchsuffix
winservers
exit
exit
exit

Connecting and Powering on the Virtual Machine


This section describes how to connect and power on the virtual machine.

Procedure

Step 1 Log in to the SCVMM server, choose VMs and Services > All Hosts, and choose one of the hosts.
Step 2 In the VMs pane, right-click on the VM host that you want to associate to the VM Network and choose
Properties.
Step 3 In the Properties dialog box, choose Hardware Configuration, and choose a network adapter (Network
Adapter 1).
Step 4 In the Network Adapter 1 pane, perform the following actions to connect to a VM network:
a) Click the Connect to a VM network radio button.
b) Click the Browse button.
c) Verify the list of VM networks, which lists all of the VM networks to which the hypervisor is associated.
Step 5 Power on the virtual machine.

Verifying the Association on APIC


This section describes how to verify the association on Application Policy Infrastructure Controller (APIC).

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose VM NETWORKING > INVENTORY.
Step 2 In the Navigation pane, expand Microsoft > Cloud10 > Controller > Controller1 > Hypervisors >
Hypervisor1 > Virtual Machines to verify the association.

Cisco ACI Virtualization Guide, Release 2.2(2)


343
Cisco ACI with Microsoft SCVMM
Viewing EPGs on APIC

Viewing EPGs on APIC


This section describes how to view endpoint groups (EPGs) on the Application Policy Infrastructure Controller
(APIC).

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Application Profiles > VMM > Application EPGs >
EPG1.
Step 3 In the Application EPG - EPG1 pane, click the OPERATIONAL button, and verify if the endpoint group
is present.

Troubleshooting the Cisco ACI with Microsoft SCVMM


Troubleshooting APIC to SCVMM Connectivity
Use the ApicVMMService logs to debug the System Center Virtual Machine Manager (SCVMM) server.

Procedure

Step 1 Log in to the SCVMM server, go to the ApicVMMService logs. Located at C:\Program Files
(X86)\ApicVMMService\Logs.
Step 2 Check the ApicVMMService logs to debug.
If you are unable to debug, on the SCVMM server copy all the ApicVMMService logs from C:\Program
Files (X86)\ApicVMMService\Logs and send them to Cisco Tech Support.

Troubleshooting Leaf to Hyper-V Host Connectivity


Use the ApicHypervAgent logs to debug the Hyper-V servers.

Procedure

Step 1 Log in to the Hyper-V servers, go to the ApicHypervAgent logs. Located at C:\Program Files
(x86)\ApicHypervAgent\Logs.
Step 2 Check the ApicHypervAgent logs to debug.
If you are unable to debug, on the Hyper-V servers copy all the ApicHypervAgent logs from C:\Program
Files (x86)\ApicHypervAgent\Logs and send them to Cisco Tech Support.

Cisco ACI Virtualization Guide, Release 2.2(2)


344
Cisco ACI with Microsoft SCVMM
Troubleshooting the EPG Configuration Issue

Troubleshooting the EPG Configuration Issue


If during the lifetime of the endpoint group (EPG), the VLAN ID of the EPG changes on the APIC, then
SCVMM needs to update the VLAN configuration on all virtual machines for the new setting to take effect.

Procedure

To perform this operation run the following PowerShell commands on the SCVMM server:

Example:
$VMs = Get-SCVirtualMachine
$VMs | Read-SCVirtualMachine
$NonCompliantAdapters=Get-SCVirtualNetworkAdapter -All | Where-Object
{$_.VirtualNetworkAdapterComplianceStatus -eq "NonCompliant"}
$NonCompliantAdapters | Repair-SCVirtualNetworkAdapter

REST API References


Creating a SCVMM Domain Profile Using the REST API
This section describes how to create a SCVMM domain profile using the REST API.

Procedure

Step 1 Configure a VMM domain name and System Center Virtual Machine Manager (SCVMM) Controller.

Example:
https://<apic-ip>/api/node/mo/.xml

<polUni>
<vmmProvP vendor="Microsoft">
<!-- VMM Domain -->
<vmmDomP name="productionDC">
<!-- Association to VLAN Namespace -->
<infraRsVlanNs tDn="uni/infra/vlanns-VlanRange-dynamic"/>
<!-- SCVMM IP address information
<vmmCtrlrP name="SCVMM1" hostOrIp="172.21.120.21" rootContName="rootCont01"> -->
</vmmCtrlrP>
</vmmDomP>
</vmmProvP>
Step 2 Create an attachable entity profile for VLAN namespace deployment.

Example:
https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraAttEntityP name="profile1">
<infraRsDomP tDn="uni/vmmp-Microsoft/dom-productionDC"/>

Cisco ACI Virtualization Guide, Release 2.2(2)


345
Cisco ACI with Microsoft SCVMM
Creating a SCVMM Domain Profile Using the REST API

</infraAttEntityP>
</infraInfra>
Step 3 Create an interface policy group and selector.

Example:
https://<apic-ip>/api/policymgr/mo/uni.xml

<infraInfra>
<infraAccPortP name="swprofile1ifselector">
<infraHPortS name="selector1" type="range">
<infraPortBlk name="blk"
fromCard="1" toCard="1" fromPort="1" toPort="3">
</infraPortBlk>
<infraRsAccBaseGrp tDn="uni/infra/funcprof/accportgrp-group1" />
</infraHPortS>
</infraAccPortP>

<infraFuncP>
<infraAccPortGrp name="group1">
<infraRsAttEntP tDn="uni/infra/attentp-profile1" />
</infraAccPortGrp>
</infraFuncP>
</infraInfra>
Step 4 Create a switch profile.

Example:
https://<apic-ip>/api/policymgr/mo/uni.xml <infraInfra>
<infraNodeP name="swprofile1"> <infraLeafS
name="selectorswprofile11718" type="range"> <infraNodeBlk name="single0"
from_="101" to_="101"/> <infraNodeBlk name="single1" from_="102"
to_="102"/> </infraLeafS> <infraRsAccPortP
tDn="uni/infra/accportprof-swprofile1ifselector"/> </infraNodeP>
</infraInfra>

Step 5 Configure the VLAN pool.

Example:
https://<apic-ip>/api/node/mo/.xml

<polUni>
<infraInfra>
<fvnsVlanInstP name="VlanRange" allocMode="dynamic">
<fvnsEncapBlk name="encap" from="vlan-100" to="vlan-400"/>
</fvnsVlanInstP>
</infraInfra>
</polUni>
Step 6 Locate all the configured controllers and their operational state.

Example:
GET:
https://<apic-ip>/api/node/class/vmmAgtStatus.xml

<imdata totalCount="11">
<vmmAgtStatus HbCount="9285" childAction="" dn="uni/vmmp-Microsoft/dom-productionDC
/ctrlr-SCVMM1/AgtStatus-172.21.120.21" lastHandshakeTime="2015-02-24T23:02:51.800+00:00"
lcOwn="local"
modTs="2015-02-24T23:02:53.695+00:00" monPolDn="uni/infra/moninfra-default"
name="172.21.120.21"
operSt="online" remoteErrMsg="" remoteOperIssues="" status="" uid="15374"/>
</imdata>
Step 7 Get the Hyper-Vs under one controller.

Cisco ACI Virtualization Guide, Release 2.2(2)


346
Cisco ACI with Microsoft SCVMM
Creating a SCVMM Domain Profile Using the REST API

Example:
https://<apic-ip>/api/node/class/opflexODev.json?query-target-filter=and(eq(opflexODev.
ctrlrName,'Scale-Scvmm1.inscisco.net'),eq(opflexODev.domName,'Domain1'),ne(opflexODev.isSecondary,'true'))

{"totalCount":"8","subscriptionId":"72057718609018900","imdata":[{"opflexODev":{"attributes":{"childAction"
:"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167807069","devOperIssues":"","devType":"hyperv","dn":"
topology/pod-1/node-191/sys/br-[eth1/43]/odev-167807069","domName":"Domain1","encap":"unknown","features":"0
","hbStatus":"valid-dvs","hostName":"Scale-Hv2.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.136.93",
"isSecondary":"false","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:10:25.684-07:00","lastNumHB":"19772","
lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:12:09.485-07:00","monPolDn":
"uni/fabric/monfab-default","name":"","numHB":"19772","operSt":"identified","pcIfId":"1","portId":"0","state
":"connected","status":"","transitionStatus":"attached","uid":"15374","updateTs":"0","uuid":"","version":""}
}},{"opflexODev":{"attributes":{"childAction":"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167831641"
,"devOperIssues":"","devType":"hyperv","dn":"topology/pod-1/node-191/sys/br-[eth1/43]/odev-167831641","domNa
me":"Domain1","encap":"unknown","features":"0","hbStatus":"valid-dvs","hostName":"Scale-Hv6.inscisco.net","i
d":"0","ip":"0.0.0.0","ipAddr":"10.0.232.89","isSecondary":"false","lNodeDn":"","lastHandshakeTime":"2015-04
-15T17:10:26.492-07:00","lastNumHB":"15544","lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs
":"2015-04-15T17:12:10.292-07:00","monPolDn":"uni/fabric/monfab-default","name":"","numHB":"15544","operSt":
"identified","pcIfId":"1","portId":"0","state":"connected","status":"","transitionStatus":"attached","uid":"
15374","updateTs":"0","uuid":"","version":""}}},{"opflexODev":{"attributes":{"childAction":"","ctrlrName":"S
cale-Scvmm1.inscisco.net","devId":"167831643","devOperIssues":"","devType":"hyperv","dn":"topology/pod-1/nod
e-191/sys/br-[eth1/43]/odev-167831643","domName":"Domain1","encap":"unknown","features":"0","hbStatus":"vali
d-dvs","hostName":"Scale-Hv3.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.232.91","isSecondary":"fal
se","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:10:23.268-07:00","lastNumHB":"15982","lcOwn":"local","ma
c":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:12:07.068-07:00","monPolDn":"uni/fabric/monfab
-default","name":"","numHB":"15982","operSt":"identified","pcIfId":"1","portId":"0","state":"connected","sta
tus":"","transitionStatus":"attached","uid":"15374","updateTs":"0","uuid":"","version":""}}},{"opflexODev":{
"attributes":{"childAction":"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167807070","devOperIssues":"
","devType":"hyperv","dn":"topology/pod-1/node-191/sys/br-[eth1/43]/odev-167807070","domName":"Domain1","enc
ap":"unknown","features":"0","hbStatus":"valid-dvs","hostName":"Scale-Hv8.inscisco.net","id":"0","ip":"0.0.0
.0","ipAddr":"10.0.136.94","isSecondary":"false","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:10:26.563-0
7:00","lastNumHB":"14219","lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:1
2:10.364-07:00","monPolDn":"uni/fabric/monfab-default","name":"","numHB":"14219","operSt":"identified","pcIf
Id":"1","portId":"0","state":"connected","status":"","transitionStatus":"attached","uid":"15374","updateTs":
"0","uuid":"","version":""}}},{"opflexODev":{"attributes":{"childAction":"","ctrlrName":"Scale-Scvmm1.inscis
co.net","devId":"167831642","devOperIssues":"","devType":"hyperv","dn":"topology/pod-1/node-191/sys/br-[eth1
/43]/odev-167831642","domName":"Domain1","encap":"unknown","features":"0","hbStatus":"valid-dvs","hostName":
"Scale-Hv4.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.232.90","isSecondary":"false","lNodeDn":"","
lastHandshakeTime":"2015-04-15T17:10:24.978-07:00","lastNumHB":"13947","lcOwn":"local","mac":"00:00:00:00:00
:00","maxMissHb":"0","modTs":"2015-04-15T17:12:08.778-07:00","monPolDn":"uni/fabric/monfab-default","name":"
","numHB":"13947","operSt":"identified","pcIfId":"1","portId":"0","state":"connected","status":"","transitio
nStatus":"attached","uid":"15374","updateTs":"0","uuid":"","version":""}}},{"opflexODev":{"attributes":{"chi
ldAction":"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167807071","devOperIssues":"","devType":"hyper
v","dn":"topology/pod-1/node-190/sys/br-[eth1/43]/odev-167807071","domName":"Domain1","encap":"unknown","fea
tures":"0","hbStatus":"valid-dvs","hostName":"Scale-Hv7.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0
.136.95","isSecondary":"false","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:12:10.057-07:00","lastNumHB":
"5708","lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:12:09.659-07:00","mo
nPolDn":"uni/fabric/monfab-default","name":"","numHB":"5708","operSt":"identified","pcIfId":"1","portId":"0"
,"state":"connected","status":"","transitionStatus":"attached","uid":"15374","updateTs":"0","uuid":"","versi
on":""}}},{"opflexODev":{"attributes":{"childAction":"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167
807067","devOperIssues":"","devType":"hyperv","dn":"topology/pod-1/node-190/sys/br-[eth1/43]/odev-167807067"
,"domName":"Domain1","encap":"unknown","features":"0","hbStatus":"valid-dvs","hostName":"Scale-Hv1.inscisco.
net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.136.91","isSecondary":"false","lNodeDn":"","lastHandshakeTime":"
2015-04-15T17:12:08.637-07:00","lastNumHB":"17659","lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0"
,"modTs":"2015-04-15T17:12:08.240-07:00","monPolDn":"uni/fabric/monfab-default","name":"","numHB":"17659","o
perSt":"identified","pcIfId":"1","portId":"0","state":"connected","status":"","transitionStatus":"attached",
"uid":"15374","updateTs":"0","uuid":"","version":""}}},{"opflexODev":{"attributes":{"childAction":"","ctrlrN
ame":"Scale-Scvmm1.inscisco.net","devId":"167831644","devOperIssues":"","devType":"hyperv","dn":"topology/po
d-1/node-190/sys/br-[eth1/43]/odev-167831644","domName":"Domain1","encap":"unknown","features":"0","hbStatus
":"valid-dvs","hostName":"Scale-Hv5.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.232.92","isSecondar
y":"false","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:12:09.093-07:00","lastNumHB":"15433","lcOwn":"loc
al","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:12:08.695-07:00","monPolDn":"uni/fabric
/monfab-default","name":"","numHB":"15433","operSt":"identified","pcIfId":"1","portId":"0","state":"connecte
d","status":"","transitionStatus":"attached","uid":"15374","updateTs":"0","uuid":"","version":""}}}]}

Step 8 Get the VMs under one Hyper-V.

Cisco ACI Virtualization Guide, Release 2.2(2)


347
Cisco ACI with Microsoft SCVMM
Creating a SCVMM Domain Profile Using the REST API

Example:
https://<apic-ip>/api/node/mo/topology/pod-1/node-190/sys/br-[eth1/43]/odev-167807067.
json?query-target=children&target-subtree-class=opflexOVm&subscription=yes

{"totalCount":"1","subscriptionId":"72057718609018947","imdata":[{"opflexOVm":{"attributes":{"childAction":"
","ctrlrName":"Scale-Scvmm1.inscisco.net","dn":"topology/pod-1/node-190/sys/br-[eth1/43]/odev-167807067/ovm-
ExtConn_1002_EPG17_003","domName":"Domain1","id":"0","lcOwn":"local","modTs":"2015-04-14T17:36:51.512-07:00"
,"name":"ExtConn_1002_EPG17_003","state":"Powered On","status":"","uid":"15374"}}}]}
Step 9 Get VNICs under one VM.

Example:
https://<apic-ip>/api/node/class/opflexIDEp.json?query-target-filter=eq(opflexIDEp.
containerName,'ExtConn_1002_EPG17_003')

{"totalCount":"4","subscriptionId":"72057718609018983","imdata":[{"opflexIDEp":{"attributes":{"brIfId":"eth1
/43","childAction":"","compHvDn":"","compVmDn":"","containerName":"ExtConn_1002_EPG17_003","ctrlrName":"Scal
e-Scvmm1.inscisco.net","dn":"topology/pod-1/node-190/sys/br-[eth1/43]/idep-00:15:5D:D2:14:84-encap-[vlan-139
8]","domName":"Domain1","domPDn":"","dpAttr":"0","encap":"vlan-1398","epHostAddr":"http://10.0.136.91:17000/
Vleaf/policies/setpolicies","epPolDownloadHint":"all","epgID":"","eppDownloadHint":"always","eppdn":"uni/epp
/fv-[uni/tn-ExtConn_1002/ap-SCVMM/epg-EPG17]","gtag":"0","handle":"0","hypervisorName":"Scale-Hv1.inscisco.n
et","id":"0","instType":"unknown","ip":"0.0.0.0","lcC":"","lcOwn":"local","mac":"00:15:5D:D2:14:84","mcastAd
dr":"0.0.0.0","modTs":"2015-04-14T17:36:50.838-07:00","monPolDn":"uni/fabric/monfab-default","name":"00155DD
21484","pcIfId":"1","portId":"0","scopeId":"0","state":"up","status":"","transitionStatus":"attached","uuid"
:"","vendorId":"Microsoft","vmAttr":"vm-name","vmAttrDn":"","vmAttrOp":"equals","vmAttrOverride":"0","vmmSrc
":"msft"}}},{"opflexIDEp":{"attributes":{"brIfId":"eth1/43","childAction":"","compHvDn":"","compVmDn":"","co
ntainerName":"ExtConn_1002_EPG17_003","ctrlrName":"Scale-Scvmm1.inscisco.net","dn":"topology/pod-1/node-190/
sys/br-[eth1/43]/idep-00:15:5D:D2:14:85-encap-[vlan-1438]","domName":"Domain1","domPDn":"","dpAttr":"0","enc
ap":"vlan-1438","epHostAddr":"http://10.0.136.91:17000/Vleaf/policies/setpolicies","epPolDownloadHint":"all"
,"epgID":"","eppDownloadHint":"always","eppdn":"uni/epp/fv-[uni/tn-ExtConn_1002/ap-SCVMM-Domain1/epg-EPG1]",
"gtag":"0","handle":"0","hypervisorName":"Scale-Hv1.inscisco.net","id":"0","instType":"unknown","ip":"0.0.0.
0","lcC":"","lcOwn":"local","mac":"00:15:5D:D2:14:85","mcastAddr":"0.0.0.0","modTs":"2015-04-14T17:36:51.025
-07:00","monPolDn":"uni/fabric/monfab-default","name":"00155DD21485","pcIfId":"1","portId":"0","scopeId":"0"
,"state":"up","status":"","transitionStatus":"attached","uuid":"","vendorId":"Microsoft","vmAttr":"vm-name",
"vmAttrDn":"","vmAttrOp":"equals","vmAttrOverride":"0","vmmSrc":"msft"}}},{"opflexIDEp":{"attributes":{"brIf
Id":"eth1/43","childAction":"","compHvDn":"","compVmDn":"","containerName":"ExtConn_1002_EPG17_003","ctrlrNa
me":"Scale-Scvmm1.inscisco.net","dn":"topology/pod-1/node-191/sys/br-[eth1/43]/idep-00:15:5D:D2:14:84-encap-
[vlan-1398]","domName":"Domain1","domPDn":"","dpAttr":"0","encap":"vlan-1398","epHostAddr":"http://10.0.136.
91:17000/Vleaf/policies/setpolicies","epPolDownloadHint":"all","epgID":"","eppDownloadHint":"always","eppdn"
:"uni/epp/fv-[uni/tn-ExtConn_1002/ap-SCVMM/epg-EPG17]","gtag":"0","handle":"0","hypervisorName":"Scale-Hv1.i
nscisco.net","id":"0","instType":"unknown","ip":"0.0.0.0","lcC":"","lcOwn":"local","mac":"00:15:5D:D2:14:84"
,"mcastAddr":"0.0.0.0","modTs":"2015-04-14T17:36:50.731-07:00","monPolDn":"uni/fabric/monfab-default","name"
:"00155DD21484","pcIfId":"1","portId":"0","scopeId":"0","state":"up","status":"","transitionStatus":"attache
d","uuid":"","vendorId":"Microsoft","vmAttr":"vm-name","vmAttrDn":"","vmAttrOp":"equals","vmAttrOverride":"0
","vmmSrc":"msft"}}},{"opflexIDEp":{"attributes":{"brIfId":"eth1/43","childAction":"","compHvDn":"","compVmD
n":"","containerName":"ExtConn_1002_EPG17_003","ctrlrName":"Scale-Scvmm1.inscisco.net","dn":"topology/pod-1/
node-191/sys/br-[eth1/43]/idep-00:15:5D:D2:14:85-encap-[vlan-1438]","domName":"Domain1","domPDn":"","dpAttr"
:"0","encap":"vlan-1438","epHostAddr":"http://10.0.136.91:17000/Vleaf/policies/setpolicies","epPolDownloadHi
nt":"all","epgID":"","eppDownloadHint":"always","eppdn":"uni/epp/fv-[uni/tn-ExtConn_1002/ap-SCVMM-Domain1/ep
g-EPG1]","gtag":"0","handle":"0","hypervisorName":"Scale-Hv1.inscisco.net","id":"0","instType":"unknown","ip
":"0.0.0.0","lcC":"","lcOwn":"local","mac":"00:15:5D:D2:14:85","mcastAddr":"0.0.0.0","modTs":"2015-04-14T17:
36:50.932-07:00","monPolDn":"uni/fabric/monfab-default","name":"00155DD21485","pcIfId":"1","portId":"0","sco
peId":"0","state":"up","status":"","transitionStatus":"attached","uuid":"","vendorId":"Microsoft","vmAttr":"
vm-name","vmAttrDn":"","vmAttrOp":"equals","vmAttrOverride":"0","vmmSrc":"msft"}}}]}

Cisco ACI Virtualization Guide, Release 2.2(2)


348
Cisco ACI with Microsoft SCVMM
Reference Information

Reference Information
Installing the APIC Agent on SCVMM Using the Windows Command Prompt
This section describes how to install the APIC Agent on System Center Virtual Machine Manager (SCVMM)
using the Windows Command Prompt.

Procedure

Step 1 Log in to the SCVMM server with SCVMM administrator credential.


Step 2 Launch the command prompt, change to the folder where you copied the APIC SCVMM Agent.msi file,
and execute following commands:

Example:
C:\>cd MSIPackage

C:\MSIPackage>dir
Volume in drive C has no label.
Volume Serial Number is 726F-5AE6

Directory of C:\MSIPackage

02/24/2015 01:11 PM <DIR> .


02/24/2015 01:11 PM <DIR> ..
02/24/2015 05:47 AM 3,428,352 APIC SCVMM Agent.msi
1 File(s) 3,428,352 bytes
2 Dir(s) 37,857,198,080 bytes free

C:\MSIPackage>msiexec.exe /I "APIC SCVMM Agent.msi" /Qn ACCOUNT="inscisco\Administrator"


PASSWORD="MyPassword" /log "C:\InstallLog.txt"
C:\MSIPackage>sc.exe query ApicVMMService

SERVICE_NAME: ApicVMMService
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Step 3 If the msiexec.exe installer package succeeds, it finishes without any warning or error messages. If it fails, it
displays the appropriate warning or error message.

Installing the APIC Hyper-V Agent on the Hyper-V Server Using the Windows
Command Prompt
This section describes how to install the APIC Hyper-V Agent on the Hyper-V server using the windows
Command Prompt.

Cisco ACI Virtualization Guide, Release 2.2(2)


349
Cisco ACI with Microsoft SCVMM
Creating a SCVMM Domain Profile Using the NX-OS Style CLI

Procedure

Step 1 Log in to the Hyper-V server with administrator credentials.


Step 2 Launch the command prompt, change to the folder where you copied the APIC Hyper-V Agent.msi file, and
execute the following commands:

Example:
C:\>cd MSIPackage

C:\MSIPackage>dir
Volume in drive C has no label.
Volume Serial Number is C065-FB79

Directory of C:\MSIPackage

02/24/2015 01:11 PM <DIR> .


02/24/2015 01:11 PM <DIR> ..
02/24/2015 05:44 AM 958,464 APIC Hyper-V Agent.msi
1 File(s) 958,464 bytes
2 Dir(s) 749,486,202,880 bytes free

C:\MSIPackage>msiexec.exe /I "APIC Hyper-V Agent.msi" /log "C:\InstallLog.txt"

C:\MSIPackage>msiexec.exe /I "APIC Hyper-V Agent.msi" /Qn /log "C:\InstallLog.txt"

C:\MSIPackage>sc.exe query ApicHyperVAgent

SERVICE_NAME: ApicHyperVAgent
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Step 3 Repeat steps 1 through 2 for each Hyper-V server.
If the msiexec.exe installer package succeeds, it finishes without any warning or error messages. If it fails, it
displays the appropriate warning or error message.

Creating a SCVMM Domain Profile Using the NX-OS Style CLI


This section describes how to create a SCVMM domain profile using the command-line interface (CLI).

Procedure

Step 1 In the NX-OS Style CLI, configure a vlan-domain and add the VLAN ranges:

Example:
apic1# configure
apic1(config)# vlan-domain vmm_test_1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic

Cisco ACI Virtualization Guide, Release 2.2(2)


350
Cisco ACI with Microsoft SCVMM
Programmability References

apic1(config-vlan)# exit

Step 2 Add interfaces to the vlan-domain:

Example:
apic1(config)# leaf 101
apic1(config-leaf)# interface ethernet 1/2
apic1(config-leaf-if)# vlan-domain member vmm_test_1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit

Step 3 Create the Microsoft SCVMM domain and associate it with the previously created vlan-domain. Create the
SCVMM controller under this domain:

Example:
apic1(config)# microsoft-domain mstest
apic1(config-microsoft)# vlan-domain member vmm_test_1
apic1(config-microsoft)# scvmm 134.5.6.7 cloud test
apic1#

Programmability References
ACI SCVMM PowerShell Cmdlets
This section describes how to list the Cisco Application Centric Infrastructure (ACI) System Center Virtual
Machine Manager (SCVMM) PowerShell cmdlets, help, and examples.

Procedure

Step 1 Log in to the SCVMM server, choose Start > Run > Windows PowerShell.
Step 2 Enter the following commands:

Example:
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.

PS C:\Program Files (x86)\ApicVMMService> cd C:\Program Files (x86)\ApicVMMService>


PS C:\Program Files (x86)\ApicVMMService> Import-Module .\ACIScvmmPsCmdlets.dll
PS C:\Program Files (x86)\ApicVMMService> Add-Type -Path .\Newtonsoft.Json.dll
PS C:\Program Files (x86)\ApicVMMService> Get-Command -Module ACIScvmmPsCmdlets

CommandType Name ModuleName


----------- ---- ----------
Cmdlet Get-ACIScvmmOpflexInfo ACIScvmmPsCmdlets
Cmdlet Get-ApicConnInfo ACIScvmmPsCmdlets
Cmdlet Get-ApicCredentials ACIScvmmPsCmdlets
Cmdlet New-ApicOpflexCert ACIScvmmPsCmdlets
Cmdlet Read-ApicOpflexCert ACIScvmmPsCmdlets

Cisco ACI Virtualization Guide, Release 2.2(2)


351
Cisco ACI with Microsoft SCVMM
Configuration References

Cmdlet Set-ApicConnInfo ACIScvmmPsCmdlets


Cmdlet Set-ApicCredentials ACIScvmmPsCmdlets
Step 3 Generating help:

Example:
commandname -?
Step 4 Generating examples:

Example:
get-help commandname -examples

Configuration References
MAC Address Configuration Recommendations
This section describes the MAC address configuration recommendations.
Both Dynamic and Static MAC are supported.
Static MAC for the VM Network adapter is recommended if you want the VM inventory to show up
quickly on APIC.
If you choose Dynamic MAC there is a delay for the VM inventory to show up on APIC. The delay is
because Dynamic MACs are not learned by SCVMM right away.

Cisco ACI Virtualization Guide, Release 2.2(2)


352
Cisco ACI with Microsoft SCVMM
Uninstalling the Cisco ACI with Microsoft SCVMM Components

Note The Data plane works fine even though the VM inventory does not show up.

Figure 26: Shows the MAC address section in the Properties pane.

Uninstalling the Cisco ACI with Microsoft SCVMM Components


This section describes how to uninstall the Cisco Application Centric Infrastructure (ACI) with Microsoft
System Center Virtual Machine Manager (SCVMM) components.

Procedure

Step 1 Detach all virtual machines from the VM networks.

Cisco ACI Virtualization Guide, Release 2.2(2)


353
Cisco ACI with Microsoft SCVMM
Uninstalling the APIC SCVMM Agent

See Microsoft's documentation.

Step 2 Delete the Infra VLAN tunnel endpoint (VTEP) and APIC logical switches on all Hyper-Vs.
See Microsoft's documentation.

Step 3 Verify the APIC GUI to make sure all the VMs and hosts are disconnected.
Step 4 Delete the VMM Domain from the Application Policy Infrastructure Controller (APIC).
See Guidelines for Deleting VMM Domains, on page 13.

Step 5 Verify the logical switch and logical networks are removed from SCVMM.
Step 6 Uninstall the APIC SCVMM Agent on SCVMM or on a Highly Available SCVMM.
See Uninstalling the APIC SCVMM Agent, on page 354.
See Uninstalling the APIC SCVMM Agent on a Highly Available SCVMM, on page 354

Uninstalling the APIC SCVMM Agent


This section describes how to uninstall the APIC SCVMM Agent.

Procedure

Step 1 Log in to the SCVMM server.


Step 2 Choose Start > Control Panel > Uninstall a Program.
Step 3 In the Programs and Features window, right-click ApicVMMService and choose Uninstall.
This uninstalls the APIC SCVMM Agent.
Step 4 To verify if the APIC SCVMM Agent is uninstalled, in the Programs and Features window, verify that
ApicVMMService is not present.

Uninstalling the APIC SCVMM Agent on a Highly Available SCVMM


This section describes how to install the Application Policy Infrastructure Controller (APIC) SCVMM agent
on a Highly Available System Center Virtual Machine Manager (SCVMM).

Cisco ACI Virtualization Guide, Release 2.2(2)


354
Cisco ACI with Microsoft SCVMM
Downgrading the APIC Controller and the Switch Software with Cisco ACI with Microsoft SCVMM Components

Procedure

Step 1 Log in to any node within the Highly Available SCVMM Failover Cluster.
Step 2 Open the Failover Cluster Manager Application.
Step 3 In the Windows Failover Cluster Manager window, select ApicVMMService in the Highly Available
SCVMM Roles/Resources tab.
Step 4 Right-click on the ApicVMMService Role and choose Take Offline.
Step 5 Once the Role is offline, right-click on the ApicVMMService Role and choose Remove.
Step 6 On each node within the Highly Available SCVMM Failover Cluster, perform the following actions to uninstall
the APIC SCVMM Agent:
a) Log in to the SCVMM server.
b) Choose Start > Control Panel > Uninstall a Program.
c) In the Programs and Features window, right-click ApicVMMService and choose Uninstall.
This uninstalls the APIC SCVMM Agent.
d) To verify if the APIC SCVMM Agent is uninstalled, in the Programs and Features window, verify that
ApicVMMService is not present.

Downgrading the APIC Controller and the Switch Software with


Cisco ACI with Microsoft SCVMM Components
This section describes how to downgrade the APIC controller and the switch software with Cisco ACI with
Microsoft System Center Virtual Machine Manager (SCVMM) Components.

Procedure

Step 1 Uninstall the APIC SCVMM Agent on SCVMM or on a Highly Available SCVMM.
See Uninstalling the APIC SCVMM Agent, on page 354.
See Uninstalling the APIC SCVMM Agent on a Highly Available SCVMM, on page 354

Step 2 Update the logical switch and virtual switch extension mapping.
a) In the logical switch properties dialog box.
b) Choose Extensions.
c) Uncheck Cisco ACI Virtual Switch Filter.
d) Click OK.
Step 3 Downgrade APIC controller.
See the Cisco APIC Firmware Management Guide.

Step 4 Install an older version of SCVMM agent.

Cisco ACI Virtualization Guide, Release 2.2(2)


355
Cisco ACI with Microsoft SCVMM
Exporting APIC OpFlex Certificate

Exporting APIC OpFlex Certificate


This section describes how to back up APIC OpFlex certificate to a file which can be used to deploy new
Hyper-V nodes, System Center Virtual Machine Manager (SCVMM) and Windows Azure Pack Resource
Provider servers to the ACI Fabric when the original OpFlex certificate cannot be located.

Procedure

Step 1 Log in to a Hyper-V node which is currently a member of the ACI Fabric.
Step 2 Export the certificate from the Hyper-V node by performing the following actions:
a) Choose Start > Run and type certlm.msc to launch the Certificate Manager.
b) In the navigation pane, right-click on Certificates - Local Computer and choose Find Certificates.
c) In the Find Certificate dialog box, perform the following actions:
In the Find in field, from the drop-down list, choose All certificate stores.
In the Contains field, enter OpflexAgent.
In the Look in Field field, from the drop-down list, choose Issued By.
Click Find Now.
Your result list should have a single Certificate in the list.

d) Right-click on the newly found OpflexAgent certificate and choose Export.


The Certificate Export Wizard will appear.

Step 3 In the Certificate Export Wizard dialog box, perform the following actions:
a) In the Welcome to the Certificate Export Wizard dialog box, click Next
b) In the Export Private Key dialog box, choose the Yes, export the private key radio button, and click
Next.
c) In the Export File Format dialog box, choose the Personal Information Exchange - PKCS #12 (.PFX)
radio button, check the Include all certificates in the certificate path if possible and Export all extended
properties check box. Click Next.
d) In the Security dialog box, check the Password check box, enter your PFX password and enter your PFX
password again to confirm. Click Next.
Your PFX password will be used later to import the PFX file on the target machine.
e) In the File to Export dialog box, enter the filename you wish to save the exported file (C:\OpflexAgent.pfx)
and click Next.
f) In the Completing the Certificate Export Wizard dialog box, review all your specified settings are
correct and click Finish.
g) The Certificate Export Wizard dialog box will appear with The export was successful. and click Ok.
Step 4 Copy the PFX file to a known location.
You can deploy the certificate through an Active Directory Group Policy or copy the file to your various
Microsoft Servers which host your SCVMM, Windows Azure Pack Resource Provider, and Hyper-V services
for integration into the ACI Fabric.

Cisco ACI Virtualization Guide, Release 2.2(2)


356
CHAPTER 10
Cisco ACI with Microsoft Windows Azure Pack
This chapter contains the following sections:

About Cisco ACI with Microsoft Windows Azure Pack, page 357
Getting Started with Cisco ACI with Microsoft Windows Azure Pack, page 361
Upgrading the Cisco ACI with Microsoft Windows Azure Pack Components, page 367
Use Case Scenarios for the Administrator and Tenant Experience, page 370
Troubleshooting Cisco ACI with Microsoft Windows Azure Pack, page 402
Programmability References, page 403
Uninstalling the Cisco ACI with Microsoft Windows Azure Pack Components, page 404
Downgrading the APIC Controller and the Switch Software with Cisco ACI with Microsoft Windows
Azure Pack Components, page 407

About Cisco ACI with Microsoft Windows Azure Pack


Cisco Application Centric Infrastructure (ACI) integrates in Microsoft Windows Azure Pack to provide a
self-service experience for the tenant.
ACI enhances the network management capabilities of the platform. Microsoft Windows Azure Pack is built
on top of an existing Microsoft System Center Virtual Machine Manager (SCVMM) installation. Cisco ACI
has integration points at each of these layers, enabling you to leverage the work performed in a SCVMM
environment and use it in a Microsoft Windows Azure Pack installation.
Cisco ACI with Microsoft Windows Azure PackMicrosoft Windows Azure Pack for Windows Server
is a collection of Microsoft Azure technologies that include the following capabilities:
Management portal for tenants
Management portal for administrators
Service management API

Cisco ACI Virtualization Guide, Release 2.2(2)


357
Cisco ACI with Microsoft Windows Azure Pack
Cisco ACI with Microsoft Windows Azure Pack Solution Overview

Cisco ACI with Microsoft System Center Virtual Machine Manager For information about how to
set up Cisco ACI with Microsoft System Center Virtual Machine Manager (SCVMM), see details in
Cisco ACI with Microsoft SCVMM Solution Overview, on page 312.

Cisco ACI with Microsoft Windows Azure Pack Solution Overview


Cisco Application Centric Infrastructure (ACI) integrates in Microsoft Windows Azure Pack to provide a
self-service experience for tenants. ACI resource provider in Windows Azure Pack drives the Application
Policy Infrastructure Controller (APIC) for network management. Networks are created in System Center
Virtual Machine Manager (SCVMM) and are available in Windows Azure Pack for respective tenants. ACI
Layer 4 to Layer 7 capabilities for F5 and Citrix load balancers and stateless firewall are provided for tenants.
For details, see the About Load Balancing, on page 380.
Windows Azure Pack for Windows Server is a collection of Microsoft Azure technologies, available to
Microsoft customers at no additional cost for installation into your data center. It runs on top of Windows
Server 2012 R2 and System Center 2012 R2 and, through the use of the Windows Azure technologies, enables
you to offer a rich, self-service, multi-tenant cloud, consistent with the public Windows Azure experience.
Windows Azure Pack includes the following capabilities:
Management portal for tenantsa customizable self-service portal for provisioning, monitoring, and
managing services such as networks, bridge domains, VMs, firewalls, load balancers, external
connectivity, and shared services. See the User Portal GUI.
Management portal for administratorsa portal for administrators to configure and manage resource
clouds, user accounts, and tenant offers, quotas, pricing, Web Site Clouds, Virtual Machine Clouds, and
Service Bus Clouds.
Service management APIa REST API that helps enable a range of integration scenarios including
custom portal and billing systems.

See Use Case Scenarios for the Administrator and Tenant Experience, on page 370 for details.

Cisco ACI Virtualization Guide, Release 2.2(2)


358
Cisco ACI with Microsoft Windows Azure Pack
Physical and Logical Topology

Physical and Logical Topology


Figure 27: Topology of a typical Windows Azure Pack deployment with ACI Fabric

The above figure shows a representative topology of a typical Windows Azure Pack deployment with Cisco
Application Centric Infrastructure (ACI) fabric. Connectivity between Windows Azure Pack and Application

Cisco ACI Virtualization Guide, Release 2.2(2)


359
Cisco ACI with Microsoft Windows Azure Pack
About the Mapping of ACI Constructs in Microsoft Windows Azure Pack

Policy Infrastructure Controller (APIC) is over the management network. Tenants interface is only with
Windows Azure Pack either through the GUI or REST API. Tenants do not have direct access to APIC.

Figure 28: ACI in Resource Provider Framework

About the Mapping of ACI Constructs in Microsoft Windows Azure Pack


This section shows a table of the mapping of Cisco Application Centric Infrastructure (ACI) constructs in
Microsoft Windows Azure Pack.

Table 5: Mapping of ACI and Windows Azure Pack constructs

Windows Azure Pack ACI


Subscription Tenant

Network EPG

Firewall Rule Intra-tenant contract

Shared Service Inter-tenant contract

SCVMM Cloud VM Domain

Cisco ACI Virtualization Guide, Release 2.2(2)


360
Cisco ACI with Microsoft Windows Azure Pack
Getting Started with Cisco ACI with Microsoft Windows Azure Pack

Getting Started with Cisco ACI with Microsoft Windows Azure


Pack
This section describes how to get started with Cisco ACI with Microsoft Windows Azure Pack.
You must download and unzip the Cisco ACI and Microsoft Integration file for the 2.2(1) release before
installing Cisco ACI with Microsoft Windows Azure Pack.
1 Go to Cisco's Application Policy Infrastructure Controller (APIC) Website:
http://www.cisco.com/c/en/us/support/cloud-systems-management/
application-policy-infrastructure-controller-apic/tsd-products-support-series-home.html
2 Choose All Downloads for this Product.
3 Choose the release version and the aci-msft-pkg-2.2.1x.zip file.
4 Click Download.
5 Unzip the aci-msft-pkg-2.2.1x.zip file.

Note Cisco ACI with Microsoft Windows Azure Pack only supports ASCII characters. Non-ASCII characters
are not supported.
Ensure that English is set in the System Locale settings for Windows, otherwise ACI with Windows Azure
Pack will not install. In addition, if the System Locale is later modified to a non-English Locale after the
installation, the integration components may fail when communicating with the APIC and the ACI fabric.

Prerequisites for Getting Started with Cisco ACI with Microsoft Windows
Azure Pack
Before you get started, ensure that you have verified that your computing environment meets the following
prerequisites:
Ensure Cisco Application Centric Infrastructure (ACI) with Microsoft System Center Virtual Machine
Manager (SCVMM) has been set up.
For more information, see Getting Started with Cisco ACI with Microsoft SCVMM, on page 314.
Ensure Microsoft Windows Azure Pack Update Rollup 5, 6, 7, 9, 10, or 11 is installed.
See Microsoft's documentation.
Ensure Microsoft System Center 2012 R2 - Virtual Machine Manager (SCVMM) Administrator Console
is installed on the Windows Azure Pack Resource Provider Server.
See Microsoft's documentation.
Ensure Hyper-V Host is installed.

Cisco ACI Virtualization Guide, Release 2.2(2)


361
Cisco ACI with Microsoft Windows Azure Pack
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft Windows Azure Pack Components

See Microsoft's documentation.


Ensure a cloud is configured on SCVMM.
See Microsoft's documentation.
Ensure a VM cloud is configured on Windows Azure Pack.
See Microsoft's documentation.
Ensure "default" AEP exists with infrastructure VLAN enabled.
Ensure "default" and "vpcDefault" BDs and corresponding "default" and "vpcDefault" EPGs exist in
tenant common.
Ensure you have the Cisco MSI files for APIC Windows Azure Pack Resource and the Host Agent.
For more information, see Getting Started with Cisco ACI with Microsoft SCVMM, on page 314.

Note Symptom: When you either create or update a plan it may fail with an error message.
Condition: If you have configured Microsoft's Windows Azure Pack without the FQDN, you will encounter
the following error message:
Cannot validate the new quota settings because one of the underlying services failed to
respond. Details: An error has occurred.

Workaround: When you configure the VM Clouds, follow Microsoft's Windows Azure Pack UI instructions
which informs you to use the FQDN for your SCVMM server.

Installing, Setting Up, and Verifying the Cisco ACI with Microsoft Windows
Azure Pack Components
This section describes how to install, set up, and verify the Cisco ACI with Microsoft Windows Azure Pack
components.

Component Task
Install ACI Azure Pack Resource Provider See Installing ACI Azure Pack Resource Provider,
on page 363.

Install the OpflexAgent certificate See Installing the OpflexAgent Certificate, on page
363.

Configure ACI Azure Pack Resource Provider Site See Configuring ACI Azure Pack Resource Provider
Site, on page 365.

Install ACI Azure Pack Admin site extension See Installing ACI Azure Pack Admin Site
Extension, on page 366.

Install ACI Azure Pack tenant site extension See Installing ACI Azure Pack Tenant Site
Extension, on page 366.

Cisco ACI Virtualization Guide, Release 2.2(2)


362
Cisco ACI with Microsoft Windows Azure Pack
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft Windows Azure Pack Components

Component Task
Set up the ACI See Setting Up ACI, on page 366.

Verify the Windows Azure Pack Resource Provider See Verifying the Windows Azure Pack Resource
Provider, on page 367.

Installing ACI Azure Pack Resource Provider


This section describes how to install ACI Azure Pack Resource Provider on the Windows Azure Pack server.

Procedure

Step 1 Log in to the Microsoft Service Provider Foundation Server which provides VM Clouds in the Windows
Azure Pack environment. Locate and copy over ACI Azure Pack - Resource Provider Site.msi file.
Step 2 Double-click the ACI Azure Pack - Resource Provider Site.msi file.
Step 3 In the Setup dialog box, perform the following actions to install ACI Azure Pack - Resource Provider:
a) Check the I accept the terms in the License Agreement check box.
b) Click Install.
c) Click Install.
d) Click Finish.

Installing the OpflexAgent Certificate


This section describes how to install the OpflexAgent Certificate.

Procedure

Step 1 Log in to the Windows Azure Pack server with administrator credentials.
Step 2 Use one of the following methods:
For large-scale deployments, see Microsoft's documentation for Deploy Certificates by Using Group
Policy:
https://technet.microsoft.com/en-us/library/cc770315(v=ws.10).aspx.
For small-scale deployments follow these steps:
You must add OpFlex security certificate to the local system. The ACI Windows Azure Pack resource
provider uses the same security certificate file from the Cisco ACI SCVMM installation process located
on your SCVMM Server at: C:\Program Files (x86)\ApicVMMService\OpflexAgent.pfx. Copy this
file to the Windows Azure Pack Resource Provider Server. If the following steps are not performed on
your ACI Windows Azure Pack resource provider servers, the APIC ACI Windows Azure Pack resource
provider cannot communicate with the Application Policy Infrastructure Controller (APIC) .

Cisco ACI Virtualization Guide, Release 2.2(2)


363
Cisco ACI with Microsoft Windows Azure Pack
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft Windows Azure Pack Components

Install the OpFlex security certificate on the ACI Windows Azure Pack resource provider Windows
Server 2012 local machines certificate repository. On each ACI Windows Azure Pack resource provider
server, install this certificate by performing the following steps:
1 Choose Start > Run.
2 Enter mmc and click OK.
3 In the Console Root window, on the menu bar, choose Add/Remove Snap-in.
4 In the Available Snap-ins field, choose Certificates and click Add.
5 In the Certificates snap-in dialog box, choose the Computer Account radio button, and click Next.
6 In the Select Computer dialog box, choose the Local Computer radio button, and click Finish.
7 Click OK to go back to the main MMC Console window.
8 In the MMC Console window, double-click Certificates (local computer) to expand its view.
9 Right-click Certificates under Personal and choose All Tasks > Import.
10 In the Certificates Import Wizard dialog box, perform the following actions:
a Click Next.
b Browse to the Opflex Agent file and click Next.

11 Enter the password for the certificate that was provided when you installed MSI.
12 You must choose the Mark this key as exportable. This will allow you to back up or transport
your keys at a later time radio button.
13 Choose the Include all extended properties radio button.
14 Choose the Place all certificates in the following store radio button, browse to locate Personal,
and click Next.
15 Click Finish.

Cisco ACI Virtualization Guide, Release 2.2(2)


364
Cisco ACI with Microsoft Windows Azure Pack
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft Windows Azure Pack Components

16 Click OK.

Configuring ACI Azure Pack Resource Provider Site


This section describes how to configure ACI Azure Pack Resource Provider IIS Site on the Windows Azure
Pack server.

Procedure

Step 1 Log in to the Windows Azure Pack server and open the Internet Information Services Manager Application.
Step 2 Navigate to Application Pools > Cisco-ACI.
Step 3 Click the Advanced Settings in the Actions tab.
a) Locate the Identity field and click on the ellipses to the left of the scroll bar.
b) Select Custom Account and input your account name and password credentials for Service Provider
Foundation Administrator. The Service Provider Foundation Administrator user account should have the
following group memberships: Administrators, SPF_Admin. This user account is required as the Resource
Provider queries the attached SCVMM servers. In addition, the User Credentials must have permission
to write to the Local Machine Registry and have Read/Write access to the following directory for Resource
Provider Logging:
C:\Windows\System32\config\systemprofile\AppData\Local
c) Click OK to exit Application Pool Identity.
Step 4 Click OK to exit Advanced Settings

Cisco ACI Virtualization Guide, Release 2.2(2)


365
Cisco ACI with Microsoft Windows Azure Pack
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft Windows Azure Pack Components

Installing ACI Azure Pack Admin Site Extension


This section describes how to install ACI Azure Pack Admin Site Extension on the Windows Azure Pack
server.

Procedure

Step 1 Log in to the Windows Azure Pack server and locate the ACI Azure Pack - Admin Site Extension.msi file.
Step 2 Double-click the ACI Azure Pack - Admin Site Extension.msi file.
Step 3 In the Setup dialog box, perform the following actions to install ACI Azure Pack - Admin Site Extension:
a) Check the I accept the terms in the License Agreement check box.
b) Click Install.
c) Click Finish.

Installing ACI Azure Pack Tenant Site Extension


This section describes how to install ACI Azure Pack Tenant Site Extension on the Windows Azure Pack
server.

Procedure

Step 1 Log in to the Windows Azure Pack server and locate the ACI Azure Pack - Tenant Site Extension.msi file.
Step 2 Double-click the ACI Azure Pack - Tenant Site Extension.msi file.
Step 3 In the Setup dialog box, perform the following actions to install ACI Azure Pack - Tenant Site Extension:
a) Check the I accept the terms in the License Agreement check box.
b) Click Install.
c) Click Finish.

Setting Up ACI
This section describes how to setup ACI.

Procedure

Step 1 Log in to the Service Management Portal.


Step 2 In the navigation pane, choose ACI.
If you do not see ACI, click Refresh.

Step 3 Click the QuickStart icon.


Step 4 In the QuickStart pane, perform the following actions in order:

Cisco ACI Virtualization Guide, Release 2.2(2)


366
Cisco ACI with Microsoft Windows Azure Pack
Upgrading the Cisco ACI with Microsoft Windows Azure Pack Components

a) Click on Register your ACI REST endpoint.


b) In the ENDPOINT URL field, enter the resource provider address:Cisco-ACI port
(http://resource_provider_address:50030).
c) In the USERSNAME field, enter the user name (domain administrator).
d) In the PASSWORD field, enter the password (domain administrator password).
Step 5 Choose the ACI > Setup tab, and perform the following actions:
a) In the APIC ADDRESS field, enter the APIC IP Address(es).
b) In the CERTIFICATE NAME field, enter OpflexAgent.

Verifying the Windows Azure Pack Resource Provider


This section describes how to verify the Windows Azure Pack Resource Provider.

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, choose the QuickStart Cloud icon.
Ensure the Register your ACI REST Endpoint link is greyed out.

Step 4 In the aci pane, choose SETUP.


Ensure that you see the APIC Address has valid apic addresses and the Certificate name is OpflexAgent.

Upgrading the Cisco ACI with Microsoft Windows Azure Pack


Components
Prerequisites:
Microsoft servers that you integrate into ACI must be updated with the KB2919355 and KB3000850 update
rollups prior to upgrading ACI to the 2.0(1) release. The KB2919355 update rollup includes the 2929781
patch, which adds new TLS cipher suites and changes the cipher suite priorities in Windows 8.1 and Windows
Server 2012 R2.
You must patch the following Microsoft servers:
Microsoft Windows Azure Pack Resource Provider Servers
Microsoft Windows Azure Pack Tenant Site Servers
Microsoft Windows Azure Pack Admin Site Servers
Microsoft System Center Service Provider Foundation/Orchestration Servers
Microsoft System Center 2012 R2 Servers

Cisco ACI Virtualization Guide, Release 2.2(2)


367
Cisco ACI with Microsoft Windows Azure Pack
Upgrading the ACI Windows Azure Pack Workflow

Microsoft HyperV 2012 R2 Servers

To upgrade the .msi files for each Cisco ACI with Windows Azure Pack Integration follow the Microsoft
general guidelines for upgrading Windows Azure Pack Components listed per Update Rollup. The general
guidelines are:
If the system is currently operational (handling customer traffic), schedule downtime for the Azure
servers. The Windows Azure Pack does currently not support rolling upgrades.
Stop or redirect customer traffic to sites that you consider satisfactory.
Create backups of the computers.

Note If you are using virtual machines (VMs), take snapshots of their current state.
If you are not using VMs, take a backup of each MgmtSvc-* folder in the inetpub directory on each
machine that has a Windows Azure Pack component installed.
Collect information and files that are related to your certificates, host headers, or any port changes.
Once the upgrade is complete and has been verified, follow Hyper-V best practices regarding managing
VM snapshots: https://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx

Upgrading the ACI Windows Azure Pack Workflow


This section describes upgrading the ACI Windows Azure Pack Workflow.

Procedure

Step 1 Upgrade the APIC Controller and the Switch Software.


See the Cisco APIC Firmware Management Guide.

Step 2 Upgrade the ACI Windows Azure Pack.


If upgrading from a prior release of 1.1(2x):
a) You must uninstall the APIC Windows Azure Pack Resource Provider, see Uninstalling the APIC Windows
Azure Pack Resource Provider, on page 405.
b) Follow the steps that are outlined in the Installing, Setting Up, and Verifying the Cisco ACI with Microsoft
Windows Azure Pack Components, on page 362.
c) Skip to step 6, Upgrade the APIC SCVMM Agent on SCVMM or Upgrade the APIC SCVMM Agent on
a Highly Available SCVMM.
If upgrading from release 1.1(2x) or later:
a) Proceed to step 3.
Step 3 Upgrade the ACI Windows Azure Pack Resource Provider.
For more information, see Upgrading the ACI Windows Azure Pack Resource Provider, on page 369.

Step 4 Upgrade the ACI Azure Pack Admin Site Extension.


For more information, see Upgrading the ACI Azure Pack Admin Site Extension, on page 369.

Cisco ACI Virtualization Guide, Release 2.2(2)


368
Cisco ACI with Microsoft Windows Azure Pack
Upgrading the ACI Windows Azure Pack Resource Provider

Step 5 Upgrade the ACI Azure Pack Tenant Site Extension.


For more information, see Upgrading the ACI Azure Pack Tenant Site Extension, on page 370.

Step 6 Upgrade the APIC SCVMM Agent on SCVMM or Upgrade the APIC SCVMM Agent on a Highly Available
SCVMM.
For more information, see Upgrading the APIC SCVMM Agent on SCVMM, on page 336.
For more information, see Upgrading the APIC SCVMM Agent on a High Available SCVMM, on page 337.

Step 7 Upgrade the APIC Hyper-V Agent.


For more information, see Upgrading the APIC Hyper-V Agent, on page 337.

Upgrading the ACI Windows Azure Pack Resource Provider


This section describes how to upgrade the ACI Windows Azure Pack resource provider.

Procedure

Upgrade the ACI Windows Azure Pack resource provider.


If upgrading from release 1.1(2x) or later:
a) Follow the steps outlined in the Installing ACI Azure Pack Resource Provider, on page 363.
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.
b) Follow the steps outline in the Configuring ACI Azure Pack Resource Provider Site, on page 365.
If upgrading from a prior release of 1.1(2x):
a) Follow the steps outlined in the Uninstalling the APIC Windows Azure Pack Resource Provider, on page
405.
b) Follow the steps outlined in the Installing ACI Azure Pack Resource Provider, on page 363.
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.
c) Follow the steps outline in the Configuring ACI Azure Pack Resource Provider Site, on page 365.

Upgrading the ACI Azure Pack Admin Site Extension


This section describes how to upgrade the ACI Azure Pack Admin site extension.

Procedure

Upgrade the ACI Azure Pack Admin site extension.


a) Follow the steps outlined in the Installing ACI Azure Pack Admin Site Extension, on page 366.
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.

Cisco ACI Virtualization Guide, Release 2.2(2)


369
Cisco ACI with Microsoft Windows Azure Pack
Upgrading the ACI Azure Pack Tenant Site Extension

Upgrading the ACI Azure Pack Tenant Site Extension


This section describes how to upgrade the ACI Azure Pack Tenant site extension.

Procedure

Upgrade the ACI Azure Pack Tenant site extension.


a) Follow the steps outlined in the Installing ACI Azure Pack Tenant Site Extension, on page 366.
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.

Use Case Scenarios for the Administrator and Tenant


Experience
This section describes the use case scenarios for the administrator and tenant experience.

Note If the shared service consumer is in a different VRF than the provider, route leaking between the VRFs
will automatically occur in order to enable the communication.

Use case Shared VPC User Task


Plan Plan
Creating a plan Yes Yes Admin 1. See About Plan Types, on page 374.
This allows the administrator to create
plans with their own moderation values. Admin 2. See Creating a Plan, on page 375.

Creating a tenant Yes Yes Admin See Creating a Tenant, on page 376.
This allows the administrator to create a
tenant.

Creating and verifying networks in a Yes No Tenant 1. See Creating Networks in a Shared
shared plan Plan, on page 390.
This allows the tenant to create and verify
networks in a shared plan. Tenant 2. See Verifying the Network you
Created on Microsoft Windows Azure
Pack on APIC, on page 390.

Creating the network in VPC plan No Yes Tenant See Creating the Network in VPC
Plan, on page 392.
This allows the tenant to create networks
in a VPC plan.

Cisco ACI Virtualization Guide, Release 2.2(2)


370
Cisco ACI with Microsoft Windows Azure Pack
Use Case Scenarios for the Administrator and Tenant Experience

Use case Shared VPC User Task


Plan Plan
Creating a bridge domain in a VPC plan No Yes Tenant 1. See Creating a Bridge Domain in a
and creating a network and associating to VPC Plan, on page 391.
the bridge domain
This applies only in a virtual private cloud Tenant 2. See Creating a Network and
(VPC) plan. This allows a tenant to bring Associating to a Bridge Domain in a
its own IP address space for the networks. VPC Plan, on page 391.

Creating a firewall within the same Yes Yes Tenant See Creating a Firewall Within the
subscription. Same Subscription, on page 392.
This allows the tenant to create a firewall
within the same subscription.

Allowing tenants to provide shared Yes Yes Admin 1. See Allowing Tenants to Provide
services Shared Services, on page 377.
This allows tenants to create networks,
attach compute services (servers) to those Tenant 2. See Providing a Shared Service,
networks, and offer the connectivity to on page 394.
these services to other tenants. The
administrator needs to explicitly enable Tenant 3. See Adding Access Control Lists,
this capability in the plan. on page 395 or Deleting Access
Control Lists, on page 396.

Admin 4. See Allowing Tenants to Consume


Shared Service, on page 378.

Tenant 5. See Setting up the Shared Service


to be Consumed, on page 394.

Admin 6. See Viewing the Shared Service


Providers and Consumers, on page
379.

Cisco ACI Virtualization Guide, Release 2.2(2)


371
Cisco ACI with Microsoft Windows Azure Pack
Use Case Scenarios for the Administrator and Tenant Experience

Use case Shared VPC User Task


Plan Plan
Allowing tenants to consume NAT No Yes Admin 1. See Allowing Tenants to Consume
firewall and ADC load balancer services NAT Firewall and ADC Load
Balancer Services, on page 378.

Tenant 2. See Adding NAT Firewall Layer 4


to Layer 7 Services to a VM
Network, on page 399.

Tenant 3. See Adding NAT Firewall


Port-Forwarding Rules for a VM
Network, on page 400.

Tenant 4. See Adding NAT Firewall With a


Private ADC Load Balancer Layer 4
to Layer 7 Services to a VM
Network, on page 400.

Tenant 5. See Adding a Public ADC Load


Balancer Layer 4 to Layer 7 Services
to a VM Network, on page 401.

Tenant 6. See Adding ADC Load Balancer


Configuration for a VM Network, on
page 402.

Managing shared services Yes Yes Admin See Deprecating a Shared Service
from New Tenants, on page 379.
This allows the administrator to deprecate
a shared service from new tenants and See Revoking a Tenant from a Shared
revoke a tenant access from a shared Service, on page 380.
service.

Creating VMs and attaching to networks Yes Yes Tenant See Creating VMs and Attaching to
Networks, on page 393.

Cisco ACI Virtualization Guide, Release 2.2(2)


372
Cisco ACI with Microsoft Windows Azure Pack
Use Case Scenarios for the Administrator and Tenant Experience

Use case Shared VPC User Task


Plan Plan
Creating the load balancer Yes Yes Admin 1. See About Load Balancing, on
page 380.

Admin 2. See Importing the Device Package


on APIC, on page 381.

Admin 3. See Configuring the Load Balancer


Device on APIC using XML POST,
on page 381.

Admin 4. See Creating a Load Balancer to a


Plan, on page 387.

Tenant 5. See Configuring the Load


Balancer, on page 395.

Creating external connectivity Yes Yes APIC 1. See About L3 External


Admin Connectivity, on page 388.
This allows a tenant network to initiate
outgoing traffic destined outside the fabric
and to attract traffic from outside. APIC 2. See Prerequisites for Configuring
Admin L3 External Connectivity for
Windows Azure Pack, on page 388.

APIC 3. See Creating a Contract to be


Admin Provided by the l3extinstP "default",
on page 388.

APIC 4. See Creating a Contract to be


Admin Provided by the l3extinstP
"vpcDefault", on page 389.

Tenant 5. See Creating a Network for


External Connectivity, on page 397.

Tenant 6. See Creating a Firewall for External


Connectivity, on page 398.

APIC 7. See Verifying Tenant L3 External


Admin Connectivity on APIC, on page 399.

Cisco ACI Virtualization Guide, Release 2.2(2)


373
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Admin Tasks

About Plan Types


The administrator creates the plan with their own values. The plan types are as follows:
Shared Infrastructure Virtual Private Cloud
Isolated Networks Yes Yes

Firewall Yes Yes

Provider DHCP Yes Yes *

Shared Load Balancer Yes Yes *

Public Internet Access Yes Yes

Shared Services between Tenants Yes Yes

Bring your own address space No Yes


(Private Address Space) and DHCP
Server

* In a Virtual Private Cloud (VPC) plan, a load balancer and DHCP is not supported for private address space.
Both features are still offered to a tenant, but owned by the shared infrastructure.

About Plan Options


This section describes about the plan options.
APIC Tenant: Disable Auto Creation of an APIC Tenant
Default: Unselected.
Unselected: Cisco ACI Azure Pack Resource Provider will automatically create/delete an APIC
tenant. The APIC tenant name will be the Subscription ID (GUID) of the Windows Azure Pack
tenant. No manual intervention by the APIC admin is required as the Resource Provider will handle
all the necessary mapping.
Selected: Cisco ACI Azure Pack Resource Provider will NOT automatically create/delete an APIC
tenant. The APIC tenant must be explicitly mapped to a Windows Azure Pack Subscription ID.
Once this mapping is established on the APIC, the Azure Pack Tenant will be able to perform his
normal operations of working with networks, firewalls, load balancers, etc.

Features enabled by Disabling Auto Creation of an APIC Tenant


SCVMM and Windows Azure Pack VM Network names take on the APIC Tenant Name rather
than a GUID. This increases readability for an SCVMM Admin and Azure Pack Tenant as VM
Networks will have a friendly name rather than a GUID.

Cisco ACI Virtualization Guide, Release 2.2(2)


374
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Plan Quotas: Azure Pack Plan Admins can now create Plans which limit the number of EPGs, BDs, and
VRFs an Azure Pack Tenant can create.
The EPG, BD, and VRF created by the APIC admin under an APIC Tenant count against their
quota for Azure Pack Plan.
Example 1: Plan Admin creates an Azure Pack plan with a limit of 5 EPGs. Azure Pack
Tenant creates 4 EPGs and the APIC Admin creates an EPG for the Azure Pack Tenant. The
Azure Pack Tenant has now reached his plan quota and cannot create EPGs until he is below
plan quota.
Example 2: Plan Admin creates an Azure Pack plan with a limit of 5 EPGs. Azure Pack
Tenant creates 5 EPGs. An APIC Admin creates an EPG for the Azure Pack Tenant. The
Azure Pack Tenant has now reached his plan quota and cannot create EPGs until he is below
plan quota.
These quotas are enforced for the Azure Pack Tenant, but do not apply to the APIC Admin.
An APIC admin can continue to create EPGs, BDs, and VRFs for an Azure Pack Tenant even
when the Tenant has gone beyond his quota.

All Plan Types - Publishing EPGs


Ability for an APIC admin to push EPGs to Windows Azure Pack tenants.
An APIC admin can now create EPGs for their Azure Pack Tenants by creating the EPG on the
APIC and associating it to the VMM Domain (SCVMM Cloud) associated with the Tenants Plan.
The default Application Profile under the tenant is considered Azure Pack Tenant owned space.
This means that the Azure Pack Tenant is allowed to create contracts with it and delete it.
All other Application Profiles will be considered APIC Admin owned space. These EPGs will be
available to the Azure Pack Tenant for consumption, but the Azure Pack tenant will not be allowed
to modify, delete, or work with the EPG outside of associating with a Virtual Machine Network
Adapter.

Creating a Plan
This allows the administrator to create plans with their own values.

Cisco ACI Virtualization Guide, Release 2.2(2)


375
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose PLANS.
Step 3 Choose NEW.
Step 4 In the NEW pane, choose CREATE PLAN.
Step 5 In the Let's Create a Hosting Plan dialog box, enter the name for your plan (Bronze) and click the arrow
for next.
Step 6 In the Select services for a Hosting Plan dialog box, choose your features. Check the check box for VIRTUAL
MACHINE CLOUDS, NETWORKING (ACI), and click the arrow for next.
Step 7 In the Select add-ons for the plan dialog box, click the checkmark for next.
Step 8 In the plans pane, wait for the plan (Bronze) to be created and choose the (Bronze) plan arrow to configure
it.
Step 9 In the Bronze pane under plan services, choose Virtual Machine Clouds arrow.
Step 10 In the virtual machine clouds pane, perform the following actions:
a) In the VMM MANAGEMENT SERVER field, choose the VMM management server (172.23.142.63).
b) In the VIRTUAL MACHINE CLOUD field, choose the cloud name (Cloud01).
c) Scroll down and choose Add templates.
d) In the Select templates to add to this plan dialog box, check the check box for your template(s) and click
the checkmark for next.
e) Scroll down to Custom Settings, check the Disable built-in network extensions for tenants check box
for SCVMM.
f) Click SAVE at the bottom.
g) Once completed, click OK.
Step 11 In the Service Management Portal, click the back arrow which takes you back to the Bronze pane.
Step 12 In the Bronze pane under plan services, click Networking (ACI) and perform the following actions:
a) In the PLAN TYPE field, from the drop-down list, choose the plan type.
b) For Virtual Private Cloud plan type, enter a valid value between 1 to 4000 number for the Maximum EPG
allowed per tenant, Maximum BD allowed per tenant and Maximum CTX allowed per tenant.
For Shared Infrastructure Plan type, enter a valid value between 1 to 4000 number for the Maximum EPG
allowed per tenant.
c) Click SAVE.
Step 13 Click OK.
You have now created a plan.

Creating a Tenant
This allows the administrator to create a tenant.

Cisco ACI Virtualization Guide, Release 2.2(2)


376
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose USER ACCOUNTS.
Step 3 Choose NEW.
Step 4 In the NEW pane, scroll down and choose USER ACCOUNTS.
Step 5 In the NEW pane, choose QUICK CREATE and perform the following actions:
a) In the ENTER EMAIL ADDRESS field, enter the email address ([email protected]).
b) In the ENTER PASSWORD field, enter the password.
c) In the CONFIRM PASSWORD field, enter the password again.
d) In the CHOOSE PLAN field, choose a plan (BRONZE).
e) Click CREATE.
f) Click OK.
You have now created a tenant.
Step 6 For Windows Azure Pack Tenants associated with Plans that Disable Auto Creation of an APIC Tenant,
Take note of the Azure Pack Tenant Login and Subscription ID.
a) Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name. The Tenant is the intended
APIC Tenant targeted for Azure Pack Subscription mapping.
b) Select the Policy Tab.
c) In the GUID section, click the + icon to add a new Azure Pack subscription mapping.
d) Populate the GUID with the Azure Pack Tenant Subscription ID and the Account Name with the Azure
Pack Login Account.
e) Click Submit to save the changes.
Note An APIC Tenant can only map to a single Azure Pack Tenant Subscription
ID.

Allowing Tenants to Provide Shared Services


This option allows tenants to create networks, attach compute services (servers) to those networks, and offer
the connectivity to these services to other tenants. The administrator needs to explicitly enable this capability
in the plan.

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose PLANS.
a) Choose a plan.
b) Click Networking (ACI) under plan services.
Step 3 In the networking (aci) pane, check the allow tenants to provide shared services check box and click SAVE.

Cisco ACI Virtualization Guide, Release 2.2(2)


377
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Allowing Tenants to Consume Shared Service


Even though tenants are allowed to create a shared service to be used by other tenants, the administrator needs
to select the services which can be shared across tenants. This procedure shows how Windows Azure Pack
admin can choose the shared services for the plan:

Before You Begin


Ensure the administrator has allowed tenants to provide shared services.
Ensure the tenant has provided a shared service.

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose PLANS.
Step 3 In the plans pane, choose PLANS.
a) Click on the plan (Gold).
Step 4 In the Gold pane, choose Networking (ACI).
Step 5 In the networking (aci) pane, check the shared service check box you want to give access to (DBSrv).
Step 6 Click SAVE.

Allowing Tenants to Consume NAT Firewall and ADC Load Balancer Services
Cisco Application Centric Infrastructure (ACI) has the concept of service graphs, which allows a tenant to
insert service nodes performing various Layer 4 to Layer 7 functions between two endpoint groups (EPGs)
within the fabric.
Windows Azure Pack with ACI integration now includes the ability to easily and seamlessly provision and
deploy services graphs in a Virtual Private Cloud (VPC) setting where the external NAT firewall IP and
external ADC load balancer sit within a shared space. The most common use-case for this is the service
provider model where a limited number externally accessible IP addresses are available for use, in which case
various port-forwarding techniques or load balancing of an entire EPG is done against the one external IP.
Tenants within Azure Pack can utilize a strict VPC model where all their networking is contained within the
tenant virtual routing and forwarding (VRF) or a split VRF model where an APIC admin can configure a set
of L3Out which is accessible by all tenants utilizing the ACI fabric. The following are instructions on providing
a split VRF workflow allowing Azure Pack tenants to consume the Layer 4 to Layer 7 service devices as well
as being allocated public addresses for the services provided from within the tenant VRF:

Before You Begin


Ensure the Application Policy Infrastructure Controller (APIC) administrator has configured at least 1
Layer 4 to Layer 7 resource pool in tenant common.

Cisco ACI Virtualization Guide, Release 2.2(2)


378
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose PLANS.
Step 3 In the plans pane, choose PLANS.
a) Click on the plan (Gold).
Step 4 In the Gold pane, choose Networking (ACI).
Step 5 In the networking (aci) pane, choose the Layer 4 to Layer 7 services pool provisioned by the APIC admin
for Azure Pack consumption.
Step 6 Click SAVE.

Viewing the Shared Service Providers and Consumers


This allows the administrator to view the shared service providers and consumers.

Before You Begin


Ensure the administrator has allowed tenants to provide shared services.
Ensure the tenant has provided a shared service.
Ensure the administrator has enabled the shared service on a plan.
Ensure the tenant has set up the shared service to be consumed.

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the ACI pane, choose SHARED SERVICES to view the shared service providers.
Step 4 Click on the provider.
Step 5 Click INFO to display all the users that are consuming this shared service.

Managing Shared Services

Deprecating a Shared Service from New Tenants


This allows the administrator to deprecate a shared service from new tenants.

Cisco ACI Virtualization Guide, Release 2.2(2)


379
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose PLANS.
Step 3 In the plans pane, choose the plan (Gold).
Step 4 In the gold pane, choose Networking (ACI).
Step 5 In the networking (aci) pane, uncheck the service from the plan and click SAVE.
You have deprecated the shared service from tenants.

Revoking a Tenant from a Shared Service


This allows the administrator to revoke a tenant from a shared service.

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, choose the shared service (DBSrv).
Step 4 Click INFO to ensure that the user you want to revoke is present in that shared service.
Step 5 In the navigation pane, choose PLANS.
Step 6 In the plans pane, choose the plan (Gold).
Step 7 In the gold pane, choose Networking (ACI).
Step 8 In the networking (aci) pane, uncheck the service from the plan and click SAVE.
Step 9 In the navigation pane, choose ACI.
Step 10 In the aci pane, choose SHARED SERVICES.
Step 11 In the aci pane, choose the shared service (DBSrv) and click INFO.
Step 12 In the Revoke Consumers of DBSrv dialog box, check the check box of the user you want to revoke.
Step 13 Click the checkmark.

About Load Balancing


VLAN, virtual routing and forwarding (VRF) stitching is supported by traditional service insertion models,
the Application Policy Infrastructure Controller (APIC) can automate service insertion while acting as a central
point of policy control. The APIC policies manage both the network fabric and services appliances. The APIC
can configure the network automatically so that traffic flows through the services. The APIC can also
automatically configure the service according to the application's requirements, which allows organizations
to automate service insertion and eliminate the challenge of managing the complex techniques of traditional
service insertion.
See the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide for more information.

Cisco ACI Virtualization Guide, Release 2.2(2)


380
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

You must perform the following tasks to deploy Layer 4 to Layer 7 services using the APIC GUI:

Import the device package. See Importing the Device Package on APIC, on page
Only the administrator can import the device package. 381.

Configure and post the XML POST to Application See Configuring the Load Balancer Device on APIC
Policy Infrastructure Controller (APIC) using XML POST, on page 381.
Refer to Microsoft's Windows Azure Pack Services
section about the device package.
Only the administrator can configure and post the
XML POST.

Creating a load balancer to a plan See Creating a Load Balancer to a Plan, on page 387.
The VIP range to Windows Azure Pack is set.
Only the administrator can create a load balancer to
a plan.

Configure the load balancer See Configuring the Load Balancer, on page 395.
Only the tenant can configure the load balancer.

Importing the Device Package on APIC


Only the administrator can import the device package. The administrator can import a device package into
the Application Policy Infrastructure Controller (APIC) so that the APIC knows what devices you have and
what the devices can do.

Before You Begin


Ensure you have downloaded the device package.

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose L4-L7 SERVICES > PACKAGES.
Step 2 In the navigation pane, choose Quick Start.
Step 3 In the Quick Start pane, choose Import a Device Package.
Step 4 In the Import Device Package dialog box, perform the following action:
a) Click BROWSE and locate your device package such as F5 or Citrix device package.
b) Click SUBMIT.

Configuring the Load Balancer Device on APIC using XML POST


Only the administrator can configure and post the XML POST.

Cisco ACI Virtualization Guide, Release 2.2(2)


381
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Before You Begin


The device package file should be uploaded on the Application Policy Infrastructure Controller (APIC).
See Cisco APIC Layer 4 to Layer 7 Device Package Development Guide for more information.
The tenant common should have the two bridge domains named "default" and "vpcDefault". Ensure that
the subnets being used by the tenant who is consuming the load balancer is added to these bridge domains.
Typically you would have created these bridge domains and subnets while setting up the DHCP
infrastructure for Windows Azure Pack tenants.
For a non-VPC plan, the backend interface of the load balancer should be placed in the default EPG
under the tenant common that was created above. For a VPC plan, the EPG should be "vpcDefault".
The VIP interface of the load balancer should be placed in an EPG of your choice which should be linked
to external world.
See Cisco APIC Layer 4 to Layer 7 Device Package Development Guide for L3 extOut external
connectivity outside the Fabric.
(Optional) If desired, ensure the VIP subnet is linked with L3 or L2 extOut. One VIP per EPG will be
allocated.

Procedure

Step 1 These are example XML POSTs for Citrix and F5:
a) Citrix example XML POST:

Example:
<polUni dn="uni">
<fvTenant dn="uni/tn-common" name="common">

<vnsLDevVip name="MyLB" devtype="VIRTUAL">

<!-- Device Package -->


<vnsRsMDevAtt tDn="uni/infra/mDev-Citrix-NetScaler-1.0"/>

<!-- VmmDomain -->


<vnsRsALDevToDomP tDn="uni/vmmp-VMware/dom-mininet"/>

<vnsCMgmt name="devMgmt" host="172.31.208.179" port="80"/>


<vnsCCred name="username" value="nsroot"/>
<vnsCCredSecret name="password" value="nsroot"/>

<vnsDevFolder key="enableFeature" name="EnableFeature">


<vnsDevParam key="LB" name="lb_1" value="ENABLE"/>
<vnsDevParam key="CS" name="cs_1" value="ENABLE"/>
<vnsDevParam key="SSL" name="ssl_1" value="ENABLE"/>
</vnsDevFolder>
<vnsDevFolder key="enableMode" name="EnableMode_1">
<vnsDevParam key="USIP" name="usip_1" value="DISABLE"/>
<vnsDevParam key="USNIP" name="usnip_1" value="ENABLE"/>
</vnsDevFolder>

<vnsCDev name="ADC1" devCtxLbl="C1">


<vnsCIf name="1_1"/>
<vnsCIf name="mgmt"/>

<vnsCMgmt name="devMgmt" host="172.31.208.179" port="80"/>


<vnsCCred name="username" value="nsroot"/>
<vnsCCredSecret name="password" value="nsroot"/>
</vnsCDev>

Cisco ACI Virtualization Guide, Release 2.2(2)


382
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

<vnsLIf name="C5">
<vnsRsMetaIf tDn="uni/infra/mDev-Citrix-NetScaler-1.0/mIfLbl-outside"/>
<vnsRsCIfAtt tDn="uni/tn-common/lDevVip-MyLB/cDev-ADC1/cIf-[1_1]"/>
</vnsLIf>
<vnsLIf name="C4">
<vnsRsMetaIf tDn="uni/infra/mDev-Citrix-NetScaler-1.0/mIfLbl-inside"/>
<vnsRsCIfAtt tDn="uni/tn-common/lDevVip-MyLB/cDev-ADC1/cIf-[1_1]"/>
</vnsLIf>

</vnsLDevVip>

<vnsAbsGraph name ="MyLB">

<!-- Node2 Provides SLB functionality -->


<vnsAbsNode name = "Node2" funcType="GoTo" >

<vnsRsDefaultScopeToTerm
tDn="uni/tn-common/AbsGraph-MyLB/AbsTermNodeProv-Output1/outtmnl"/>

<vnsAbsFuncConn name = "C4">


<vnsRsMConnAtt
tDn="uni/infra/mDev-Citrix-NetScaler-1.0/mFunc-LoadBalancing/mConn-external" />
</vnsAbsFuncConn>

<vnsAbsFuncConn name = "C5" attNotify="true">


<vnsRsMConnAtt
tDn="uni/infra/mDev-Citrix-NetScaler-1.0/mFunc-LoadBalancing/mConn-internal" />
</vnsAbsFuncConn>

<vnsAbsDevCfg>
<vnsAbsFolder key="Network"
name="network"
scopedBy="epg">
<vnsAbsFolder key="nsip" name="snip1">
<vnsAbsParam key="ipaddress" name="ip1" value="5.5.5.251"/>
<vnsAbsParam key="netmask" name="netmask1"
value="255.255.255.0"/>
<vnsAbsParam key="hostroute" name="hostroute"
value="DISABLED"/>
<vnsAbsParam key="dynamicrouting" name="dynamicrouting"
value="ENABLED"/>
<vnsAbsParam key="type" name="type" value="SNIP"/>
</vnsAbsFolder>
</vnsAbsFolder>

</vnsAbsDevCfg>

<vnsAbsFuncCfg>
<vnsAbsFolder key="internal_network"
name="internal_network"
scopedBy="epg">
<vnsAbsCfgRel name="internal_network_key"
key="internal_network_key"
targetName="network/snip1"/>
</vnsAbsFolder>
</vnsAbsFuncCfg>

<vnsRsNodeToMFunc
tDn="uni/infra/mDev-Citrix-NetScaler-1.0/mFunc-LoadBalancing"/>
</vnsAbsNode>

<vnsAbsTermNodeCon name = "Input1">


<vnsAbsTermConn name = "C1"/>
</vnsAbsTermNodeCon>

<vnsAbsTermNodeProv name = "Output1">


<vnsAbsTermConn name = "C6"/>
</vnsAbsTermNodeProv>

<vnsAbsConnection name = "CON1" adjType="L2">


<vnsRsAbsConnectionConns

Cisco ACI Virtualization Guide, Release 2.2(2)


383
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

tDn="uni/tn-common/AbsGraph-MyLB/AbsTermNodeCon-Input1/AbsTConn" />
<vnsRsAbsConnectionConns
tDn="uni/tn-common/AbsGraph-MyLB/AbsNode-Node2/AbsFConn-C4" />
</vnsAbsConnection>

<vnsAbsConnection name = "CON3" adjType="L2">


<vnsRsAbsConnectionConns
tDn="uni/tn-common/AbsGraph-MyLB/AbsNode-Node2/AbsFConn-C5" />
<vnsRsAbsConnectionConns
tDn="uni/tn-common/AbsGraph-MyLB/AbsTermNodeProv-Output1/AbsTConn" />
</vnsAbsConnection>

</vnsAbsGraph>

</fvTenant>
</polUni>
b) F5 example XML POST:

Example:
<polUni dn="uni">
<fvTenant name="common">

<fvBD name="MyLB">
<fvSubnet ip="6.6.6.254/24" />
<fvRsCtx tnFvCtxName="default"/>
</fvBD>

<vnsLDevVip name="MyLB" devtype="VIRTUAL">


<vnsRsMDevAtt tDn="uni/infra/mDev-F5-BIGIP-1.1.1"/>
<vnsRsALDevToDomP tDn="uni/vmmp-VMware/dom-mininet"/>
<vnsCMgmt name="devMgmt" host="172.31.210.88" port="443"/>
<vnsCCred name="username" value="admin"/>
<vnsCCredSecret name="password" value="admin"/>

<vnsLIf name="internal">
<vnsRsMetaIf tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mIfLbl-internal"/>
<vnsRsCIfAtt tDn="uni/tn-common/lDevVip-MyLB/cDev-BIGIP-1/cIf-[1_1]"/>
</vnsLIf>

<vnsLIf name="external">
<vnsRsMetaIf tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mIfLbl-external"/>
<vnsRsCIfAtt tDn="uni/tn-common/lDevVip-MyLB/cDev-BIGIP-1/cIf-[1_2]"/>
</vnsLIf>

<vnsCDev name="BIGIP-1">
<vnsCIf name="1_1"/>
<vnsCIf name="1_2"/>

<vnsCMgmt name="devMgmt" host="172.31.210.88" port="443"/>


<vnsCCred name="username" value="admin"/>
<vnsCCredSecret name="password" value="admin"/>

<vnsDevFolder key="HostConfig" name="HostConfig">


<vnsDevParam key="HostName" name="HostName"
value="example22-bigip1.ins.local"/>
<vnsDevParam key="NTPServer" name="NTPServer" value="172.23.48.1"/>
</vnsDevFolder>

</vnsCDev>

</vnsLDevVip>
<vnsAbsGraph name = "MyLB">
<vnsAbsTermNodeCon name = "Consumer">
<vnsAbsTermConn name = "Consumer">
</vnsAbsTermConn>
</vnsAbsTermNodeCon>
<!-- Node1 Provides Virtual-Server functionality -->
<vnsAbsNode name = "Virtual-Server" funcType="GoTo">

<vnsAbsFuncConn name = "internal" attNotify="yes">


<vnsRsMConnAtt

Cisco ACI Virtualization Guide, Release 2.2(2)


384
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mFunc-Virtual-Server/mConn-internal" />

</vnsAbsFuncConn>
<vnsAbsFuncConn name = "external">
<vnsRsMConnAtt
tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mFunc-Virtual-Server/mConn-external" />

</vnsAbsFuncConn>
<vnsRsNodeToMFunc
tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mFunc-Virtual-Server"/>
<vnsAbsDevCfg>
<vnsAbsFolder key="Network" name="webNetwork">

<!-- Active Bigip SelfIP -->


<vnsAbsFolder key="ExternalSelfIP" name="External1" devCtxLbl="ADC1">
<vnsAbsParam key="SelfIPAddress" name="seflfipaddress"
value="6.6.6.251"/>
<vnsAbsParam key="SelfIPNetmask" name="selfipnetmask"
value="255.255.255.0"/>
<vnsAbsParam key="Floating" name="floating"
value="NO"/>
</vnsAbsFolder>
<vnsAbsFolder key="InternalSelfIP" name="Internal1" devCtxLbl="ADC1">
<vnsAbsParam key="SelfIPAddress" name="seflfipaddress"
value="12.0.251.251"/>
<vnsAbsParam key="SelfIPNetmask" name="selfipnetmask"
value="255.255.0.0"/>
<vnsAbsParam key="Floating" name="floating"
value="NO"/>
</vnsAbsFolder>
<vnsAbsFolder key="Route" name="Route">
<vnsAbsParam key="DestinationIPAddress" name="DestinationIPAddress"
value="0.0.0.0" />
<vnsAbsParam key="DestinationNetmask" name="DestinationNetmask"
value="0.0.0.0"/>
<vnsAbsParam key="NextHopIPAddress" name="NextHopIP"
value="6.6.6.254"/>
</vnsAbsFolder>
</vnsAbsFolder>
</vnsAbsDevCfg>
<vnsAbsFuncCfg>
<vnsAbsFolder key="NetworkRelation" name="webNetwork">
<vnsAbsCfgRel key="NetworkRel" name="webNetworkRel"
targetName="webNetwork"/>
</vnsAbsFolder>
</vnsAbsFuncCfg>
</vnsAbsNode>
<vnsAbsTermNodeProv name = "Provider">
<vnsAbsTermConn name = "Provider" >
</vnsAbsTermConn>
</vnsAbsTermNodeProv>
<vnsAbsConnection name = "CON3" adjType="L3">
<vnsRsAbsConnectionConns
tDn="uni/tn-common/AbsGraph-MyLB/AbsTermNodeCon-Consumer/AbsTConn" />
<vnsRsAbsConnectionConns
tDn="uni/tn-common/AbsGraph-MyLB/AbsNode-Virtual-Server/AbsFConn-external" />
</vnsAbsConnection>
<vnsAbsConnection name = "CON1" adjType="L2">
<vnsRsAbsConnectionConns
tDn="uni/tn-common/AbsGraph-MyLB/AbsNode-Virtual-Server/AbsFConn-internal" />
<vnsRsAbsConnectionConns
tDn="uni/tn-common/AbsGraph-MyLB/AbsTermNodeProv-Provider/AbsTConn" />
</vnsAbsConnection>
</vnsAbsGraph>
</fvTenant>

</polUni>

Step 2 These are the configurable parameters for Citrix and F5:
a) Configurable parameters for Citrix:

Cisco ACI Virtualization Guide, Release 2.2(2)


385
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Parameter Sample Value Description


vnsLDevVip name "MyLB" This value is an identifier for your
load balancer and is shown in the
Windows Azure Pack admin
portal in the plan section for the
load balancer selection. You can
modify this globally throughout
the XML POST with the same
alternate value.

vnsRsALDevToDomP tDn "uni/vmmp-VMware/dom-mininet" This is the VMM Domiain where


your load balancer VM sits. For
example, if you have a virtual
load balancer you can associate it
with a vCenter VMM domain, a
SCVMM, or a physical domain.
Note Whichever domain you
give it should have an
associated VLAN range
with it.
vnsCMgmt name="devMgmt" "172.31.208.179" This is the IP address of the load
host balancer that communicates to
Cisco Application Centric
Infrastructure (ACI) fabric.

vnsCCred name "username" This is the username.

vnsCCredSecret name "password" This is the password.

vnsAbsParam key "ipaddress" This is the IP address which the


fabric identifies for this device.

vnsAbsParam "5.5.5.251" This IP address should be one of


key="ipaddress" your bridge domains.
name="ip1" value

b) Configurable parameters for F5:


Parameter Sample Value Description
fvBD name "MyLB" This value is an identifier for your
load balancer and is shown in the
Windows Azure Pack admin
portal in the plan section for the
load balancer selection. You can
modify this globally throughout
the XML POST with the same
alternate value.

Cisco ACI Virtualization Guide, Release 2.2(2)


386
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Parameter Sample Value Description


vnsRsALDevToDomP tDn "uni/vmmp-VMware/dom-mininet" This can be any VMM domain
with a valid VLAN ENCAP
Block.
Note In this Windows Azure
Pack load balancer
configuration, this VMM
domain has no other
relevance for the LB
configuration. This is
used for backward
compatibility.
vnsCMgmt name="devMgmt" "172.31.210.88" This is the IP address of the load
host balancer that communicates to
ACI fabric.

vnsCCred name "username" This is the username.

vnsCCredSecret name "password" This is the password.

Step 3 POST one of the device packages for either F5 or Citrix.

Creating a Load Balancer to a Plan


Only the administrator can import the device package.

Before You Begin


Import the device package.
Configure and post the XML POST to Application Policy Infrastructure Controller (APIC) .

Procedure

Step 1 Log in to the Service Management Portal (Admin Portal).


Step 2 In the Navigation pane, choose PLANS.
Step 3 In the plans pane, choose the plan that you want to add a load balancer (shareplan).
Step 4 In the shareplan pane, choose Networking (ACI).
Step 5 In the networking (aci) pane, perform the following actions to add a shared load balancer:
a) Check the shared load balancer check box
b) In the LB DEVICE ID IN APIC field, from the drop-down list, choose the load balancer (MyLB).
c) In the VIP RANGE field, provide the VIP range (5.5.5.1 - 5.5.5.100).
d) Click SAVE.

Cisco ACI Virtualization Guide, Release 2.2(2)


387
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Note You can have a single load balancer that is shared across different plans as long as the VIP ranges
do not over lap.

About L3 External Connectivity


Layer 3 (L3) external connectivity is an Cisco Application Centric Infrastructure (ACI) feature to connect
ACI fabric to an external network by L3 routing protocols, including static routing, OSPF, EIGRP, and BGP.
By setting up L3 external connectivity for Microsoft Windows Azure Pack, it allows a tenant network to
initiate outgoing traffic destined outside the fabric and to attract traffic from outside. The assumption of this
feature is the tenant virtual machine IP addresses are visible outside the fabric without NAT, ACI L3 external
connectivity does not include NAT.

Prerequisites for Configuring L3 External Connectivity for Windows Azure Pack


To configure Layer 3 (L3) external connectivity for Windows Azure Pack, you must meet the following
prerequisites:
Ensure you have logged in to the Application Policy Infrastructure Controller (APIC) GUI, on the menu
bar, choose TENANT > common.
Create a l3ExtOut called default, refer to BD default.
Create l3extInstP name="defaultInstP" under the l3ExtOut. This is to be used by shared service
tenants.

See the Cisco APIC Basic Configuration Guide for L3 external connectivity configuration.
Ensure you have logged in to the APIC GUI, on the menu bar, choose TENANT > common.
Create a l3ExtOut called "vpcDefault", refer to BD "vpcDefault".
Create l3extInstP name="vpcDefaultInstP" under this l3ExtOut.
This is to be used by VPC tenants.

See the Cisco APIC Basic Configuration Guide for configuring external connectivity for tenants.
Windows Azure Pack leverages the common l3ExtOut configuration with no special requirement other
than the naming convention highlighted above

Creating a Contract to be Provided by the l3extinstP "default"


This section describes how to creating a contract to be provided by the l3extinstP "default".
See Prerequisites for Configuring L3 External Connectivity for Windows Azure Pack, on page 388.
Make sure the scope is "Global". This contract allows all traffic from consumer to provider, and only allow
TCP established from provider to consumer.

Cisco ACI Virtualization Guide, Release 2.2(2)


388
Cisco ACI with Microsoft Windows Azure Pack
Admin Tasks

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > common.
Step 2 In the Navigation pane, expand Tenant Name > Security Policies > Contracts.
Step 3 Click ACTION, from the drop-down list, choose Create Contract.
Step 4 In the Create Contract dialog box, perform the following actions:
a) In the Name field, enter the name (L3_DefaultOut).
b) In the Scope field, from the drop-down list, choose Global.
c) In the Subjects field, click the + icon.
d) In the Create Contract Subject dialog box, perform the following actions:
e) In the Name field, enter the name of your choice.
f) Uncheck Apply Both direction.
g) In the Filter Chain For Consumer to Provider field, click the + icon, from the drop-down list, choose
default/common, and click Update.
h) In the Filter Chain For Provider to Consumer field, click the + icon, from the drop-down list, choose
est/common, and click Update.
i) Click OK to close the Create Contract Subject dialog box.
j) Click OK to close the Create Contractdialog box.
You have now creating a contract to be provided by the l3extinstP "default".

Creating a Contract to be Provided by the l3extinstP "vpcDefault"


This section describes how to creating a contract to be provided by the l3extinstP "vpcDefault".
See Prerequisites for Configuring L3 External Connectivity for Windows Azure Pack, on page 388.
Make sure the scope is "Global". This contract allows all traffic from consumer to provider, and only allow
TCP established from provider to consumer.

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > common.
Step 2 In the Navigation pane, expand Tenant Name > Security Policies > Contracts.
Step 3 Click ACTION, from the drop-down list, choose Create Contract.
Step 4 In the Create Contract dialog box, perform the following actions:
a) In the Name field, enter the name (L3_VpcDefaultOut).
b) In the Scope field, from the drop-down list, choose Global.
c) In the Subjects field, click the + icon.
d) In the Create Contract Subject dialog box, perform the following actions:
e) In the Name field, enter the name of your choice.
f) Uncheck Apply Both direction.
g) In the Filter Chain For Consumer to Provider field, click the + icon, from the drop-down list, choose
default/common, and click Update.

Cisco ACI Virtualization Guide, Release 2.2(2)


389
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

h) In the Filter Chain For Provider to Consumer field, click the + icon, from the drop-down list, choose
est/common, and click Update.
i) Click OK to close the Create Contract Subject dialog box.
j) Click OK to close the Create Contractdialog box.
You have now creating a contract to be provided by the l3extinstP "vpcDefault".

Tenant Tasks
This section describes the tenant tasks.

Note If the shared service consumer is in a different VRF than the provider, route leaking between the VRFs
will automatically occur in order to enable the communication.

Shared or Virtual Private Cloud Plan Experience


This is an experience of a tenant in a shared or virtual private cloud (VPC) plan.

Creating Networks in a Shared Plan


This allows the administrator to create networks in a shared plan.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the ACI pane, choose NETWORKS.
Step 4 Click NEW.
Step 5 In the NEW pane, choose NETWORKS and perform the following actions:
a) In the NETWORK NAME field, enter the name of the network (S01).
b) Click CREATE.
c) Click REFRESH.

Verifying the Network you Created on Microsoft Windows Azure Pack on APIC
This section describes how to verify the network you created on Microsoft Windows Azure Pack on APIC.

Cisco ACI Virtualization Guide, Release 2.2(2)


390
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS.
Step 2 In the Navigation pane, expand Tenant 018b2f7d-9e80-43f0-abff-7559c026bad5 > Application Profiles
> default > Application EPGs > EPG Network01 to verify that the network you created on Microsoft
Windows Azure Pack was created on APIC.

Creating a Bridge Domain in a VPC Plan


This applies only in a virtual private cloud (VPC) plan. This allows a tenant to bring its own IP address space
for the networks.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 Click NEW.
Step 4 In the NEW pane, choose BRIDGE DOMAIN.
Step 5 In the BRIDGE DOMAIN field, enter the bridge domain name (BD01).
Step 6 If the current tenant is subscribed to multiple Azure Pack Plans, select the Subscription to create the Bridge
Domain against.
Step 7 Optional: In the SUBNET'S GATEWAY field, enter the subnet's gateway (192.168.1.1/24).
Step 8 In the CONTEXT field, select a Context that is already part of the subscription or choose Create One to
create a new Context for the Bridge Domain.
Step 9 Click CREATE.

Creating a Network and Associating to a Bridge Domain in a VPC Plan


This allows the tenant to create a network and associate to a bridge domain in a VPC plan.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 Click NEW.
Step 4 In the NEW pane, choose NETWORK.
Step 5 In the NETWORK NAME field, enter the network name (S01).
Step 6 In the BRIDGE NAME field, enter the bridge name (BD01).
Step 7 Click CREATE.
Step 8 In the aci pane, choose NETWORKS.
You will see the network is now associated to the bridge domain.

Cisco ACI Virtualization Guide, Release 2.2(2)


391
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

Creating a Firewall Within the Same Subscription


This allows the tenant to create a firewall within the same subscription.

Before You Begin


Ensure two networks have been created.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 Click NEW.
Step 4 In the NEW pane, choose FIREWALL.
Step 5 In the FROM NETWORK field, in the drop-down list, choose the network name (WEB01).
Step 6 In the TO NETWORK field, in the drop-down list, choose another network name (WEB02).
Step 7 In the PROTOCOL field, enter the protocol (tcp).
Step 8 In the PORT RANGE BEGIN field, enter the beginning port range (50).
Step 9 In the PORT RANGE END field, enter the end of the port range (150).
Step 10 Click CREATE.
You have added a firewall within the same subscription.

Creating the Network in VPC Plan


This allows the tenant to create networks in a VPC plan.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the Navigation pane, choose ACI.
Step 3 Click NEW.
Step 4 In the NEW pane, choose ACI > NETWORK and perform the following actions:
a) In the NETWORK NAME field, enter the network name (Network01).
b) Option 1: Creating a network in a shared Bridge Domain.
In the BRIDGE DOMAIN field, from the drop-down, choose the bridge domain. (default).
Click CREATE.
This could take a few minutes for this process to complete.

c) Option 2: Creating a network in a Tenant Bridge Domain.

Cisco ACI Virtualization Guide, Release 2.2(2)


392
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

In the BRIDGE DOMAIN field, from the drop-down, choose the bridge domain (myBridgeDomain).

d) Optional: To deploy the Network with a Static IP Address Pool, perform the following actions:
Enter a Gateway in Address/Mask format (192.168.1.1/24). The resultant Static IP Address Pool
will use the full range of the Gateway Subnet.
Enter DNS Servers. If more than one is required, separate out the list with semicolons
(192.168.1.2;192.168.1.3)
Note The Subnet will be validated against all other subnets in the Context. The Network create
will return an error if an overlap is detected.
Click CREATE.
This could take a few minutes for this process to complete.

Creating VMs and Attaching to Networks


This allows the tenant to create VMs and attach to networks.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 Click NEW.
Step 4 In the NEW pane, choose STANDALONE VIRTUAL MACHINE > FROM GALLERY.
Step 5 In the Virtual Machine Configuration dialog box, choose your configuration (LinuxCentOS).
Step 6 Click the arrow for next.
Step 7 In the Portal Virtual Machine Settings dialog box, perform the following actions:
a) In the NAME field, enter the VM name (SVM01).
b) In the ADMINISTRATOR ACCOUNT field, root displays.
c) In the NEW PASSWORD field, enter a new password.
d) In the CONFIRM field, re-enter the password to confirm.
e) Click the arrow for next.
Step 8 In the Provide Virtual Machine Hardware Information dialog box, perform the following actions:
a) In the NETWORK ADAPTER 1 field, from the drop-down list, choose the network adapter to associate
and compute (6C6DB302-aObb-4d49-a22c-151f2fbad0e9|default|S01).
b) Click the checkmark.
Step 9 In the navigation pane, choose Virtual Machines to check the status of the VM (SVM01).

Cisco ACI Virtualization Guide, Release 2.2(2)


393
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

Providing a Shared Service


This allows the tenant to provide a shared service.

Before You Begin


Ensure the administrator has allowed tenants to provide shared services.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the ACI pane, choose SHARED SERVICE.
Step 4 In the SHARED SERVICES dialog box, perform the following actions:
a) In the ACTION field, from the drop-down list, choose PROVIDE A SHARED SERVICE CONTRACT.
b) In the NETWORK field, from the drop-down list, choose the network (WEB01).
c) In the SERVICE NAME field, enter the service name (DBSrv).
d) In the DESCRIPTION field, enter the description.
e) In the PROTOCOL field, enter the protocol (tcp).
f) In the PORT RANGE BEGIN field, enter the beginning port range (139).
g) In the PORT RANGE END field, enter the end port range (139).
h) Click the checkmark.

Setting up the Shared Service to be Consumed


This allows the tenant to setup the shared service to be consumed.

Before You Begin


Ensure the administrator has allowed tenants to provide shared services.
Ensure the tenant has provided a shared service.
Ensure the administrator has enabled the shared service on a plan.
If the shared service consumer is in a different VRF than the provider, route leaking between the VRFs
will automatically occur in order to enable the communication.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI > SHARED SERVICE.
Step 3 In the SHARED SERVICE dialog box, perform the following actions:
a) In the Network field, choose the network (V1).
b) In the Consumed Services field, check the service check box (DBSrv).

Cisco ACI Virtualization Guide, Release 2.2(2)


394
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

c) Check the checkmark.


Step 4 In the aci pane, choose SHARED SERVICES to check the consumer of the plan.

Configuring the Load Balancer


This allows the tenant to configure the load balancer.

Before You Begin


Ensure the administrator imported the device package.
Ensure the administrator configured and posted the XML POST to Application Policy Infrastructure
Controller (APIC).
Ensure the administrator added the load balancer to a plan.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 Click NEW.
Step 4 In the NEW pane, choose LOAD BALANCER.
Step 5 In the NETWORK NAME field, enter the network name (WEB01).
Step 6 In the PORT field, enter the port (80).
Step 7 In the PROTOCOL field, enter the protocol (tcp).
Step 8 Click CREATE.
Step 9 In the ACI pane, choose LOAD BALANCER to check the network, virtual server, application server, port,
and protocol of the load balancer.
The bridge domain should have the following subnets:
SNIP subnet
Host subnet
VIP subnet

If you want the VIP subnet, it should be linked with L3 or L2 extOut.

Adding Access Control Lists


This allows the tenant to add access control lists (ACLs) to the shared service.

Cisco ACI Virtualization Guide, Release 2.2(2)


395
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, choose SHARED SERVICES.
Step 4 In the aci pane, choose a shared service to which you want to add more ACLs (DBSrv).
Step 5 Click +ACL to add ACLs.
Step 6 In the Add ACL for DBSrv dialog box, perform the following actions:
a) In the PROTOCOL field, enter the protocol (tcp).
b) In the PORT NUMBER BEGIN field, enter the beginning port number (301).
c) In the PORT NUMBER END field, enter the end port number (400).
d) Click the checkmark.

Deleting Access Control Lists


This allows the tenant to delete access control lists (ACLs) from the shared service.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, perform the following actions:
a) Choose SHARED SERVICES.
b) Choose a shared service from which you want to delete ACLs (DBSrv).
c) Click Trash ACL to delete ACLs.
Step 4 In the Delete ACL from DBSrv dialog box, check the ACLs check box that you want to delete and click the
checkmark.

Preparing a Tenant L3 External Out on APIC for Use at Windows Azure Pack
This section describes how to prepare a tenant L3 External Out on APIC for use at Windows Azure Pack.

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Networking > External Routed Networks, right-click
External Routed Networks, and choose Create Routed Outside.
Step 3 In the Create Route Outside dialog box, perform the following actions:
a) Enter a Name (myRouteOut).

Cisco ACI Virtualization Guide, Release 2.2(2)


396
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

b) Select a VRF (3b4efb29-f66e-4c93-aed4-dc88ed4be8f2/CTX_01).


c) Configure the current dialog box according to your network config requirements. The following website
provides more information about ACI Fabric Layer 3 Outside Connectivity: http://www.cisco.com/c/en/
us/td/docs/switches/datacenter/aci/apic/sw/1-x/basic-config/b_ACI_Config_Guide/b_ACI_Config_Guide_
chapter_0110.html
d) Click Next.
e) Click Finish.
Step 4 In the Navigation pane, expand Tenant Name > Networking > External Routed Networks > Route Outside
Name, right-click Logical Node Profiles, and choose Create Node Profile.
Step 5 Follow the L3ExtOut Guide to complete your Node Profile Creation. The following website provides more
information about ACI Fabric Layer 3 Outside Connectivity: http://www.cisco.com/c/en/us/td/docs/switches/
datacenter/aci/apic/sw/1-x/basic-config/b_ACI_Config_Guide/b_ACI_Config_Guide_chapter_0110.html
Step 6 In the Navigation pane, expand Tenant Name > Networking > External Routed Networks > Route Outside
Name, right-click Networks, and choose Create External Network.
Step 7 In the Create External Network dialog box, perform the following actions:
a) Enter the Name in the following format: <RouteOutsideName>InstP. For example: Route Outside Name
is myRoutOut, my External Network Name is myRoutOutInstP.
b) In the Subnet section, click the + icon .
c) Enter your External Subnet details in the Create Subnet dialog box per your network design.
d) In the Create Subnet dialog box, click OK to complete.
e) In the Create External Network dialog box, click Submit.
Step 8 In the Navigation pane, expand Tenant Name > Networking > Bridge Domains > Bridge Domain Name,
select the L3 Configurations tab and perform the following actions:
a) Click the + icon to the right of Associated L3 Outs.
b) In the drop-down list, select the L3 Out (3b4efb29-f66e-4c93-aed4-dc88ed4be8f2/myRouteOut).
c) Click UPDATE.
d) Click Submit on the Bridge Domain - <Name> Page.
Step 9 Optional: For Tenant Networks which do not use the ACI Integrated Windows Azure Pack Integrated Static
IP Address Pool feature.
In the Navigation pane, expand Tenant Name > Networking > Bridge Domains > Bridge Domain Name,
select the L3 Configurations tab and perform the following actions:
a) Click the + icon to the right of Subnets.
b) In the Create Subnet dialog box, perform the following actions:
Enter a Gateway IP in Address/Mask format.
Check the Advertised Externally check box .
Click Submit.

Creating a Network for External Connectivity


This allows the tenant to create a network for external connectivity.

Cisco ACI Virtualization Guide, Release 2.2(2)


397
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

External Connectivity can be established either through the ACI Common L3ExtOut or through a user defined
L3ExtOut.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 Click NEW.
Step 4 In the NEW pane, choose NETWORK.
Step 5 In the NETWORK NAME field, enter the network name (wapL3test).
Step 6 Option 1: Uses the Bridge Domain's Subnet for Route Advertisement.
Click CREATE.

Step 7 Option 2: Uses the EPG's Subnet for Route Advertisement.


Enter a Gateway in Address/Mask format (192.168.1.1/24).
a) Click CREATE.

Creating a Firewall for External Connectivity


This allows the tenant to create a firewall for external connectivity.
External Connectivity can be established either through the ACI Common L3ExtOut or through a user defined
L3ExtOut.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 Click NEW.
Step 4 In the NEW pane, choose FIREWALL.
Step 5 Option 1: For Shared Windows Azure Pack Plans or VPC Windows Azure Pack Plans using the ACI Common
L3ExtOut *External:default.
a) In the FROM NETWORK field, in the drop-down list, choose the network name (*External:default).
Option 2: For VPC Windows Azure Pack Plans using a user defined External Network.
a) In the FROM NETWORK field, in the drop-down list, choose the network name (External:myRouteOut).
Step 6 In the TO NETWORK field, in the drop-down list, choose another network name (wapL3test).
Step 7 In the PROTOCOL field, enter the protocol (tcp).
Step 8 In the PORT RANGE BEGIN field, enter the beginning port range (12345).
Step 9 In the PORT RANGE END field, enter the end of the port range (45678).
Step 10 Click CREATE.
You have added a firewall for external connectivity.

Cisco ACI Virtualization Guide, Release 2.2(2)


398
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

Verifying Tenant L3 External Connectivity on APIC


This section describes how to verify the Tenant L3 External Connectivity on APIC.

Procedure

Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS.
Step 2 In the Navigation pane, expand Tenant b81b7a5b-7ab8-4d75-a217-fee3bb23f427 > Application Profiles
> Application EPG, ensure the network you created in Creating a Network for External Connectivity, on
page 397 exists (wapL3test).
Step 3 In the Navigation pane, expand EPG wapL3test > Contracts, ensure the contract name exists in the format
of L3+EPG name+protocols+port range (L3wapL3testtcp1234545678), the contract is Provided by the EPG,
and the STATE is formed.
Step 4 Option1: For Shared L3 Out deployments, where the contract was created with *External:default, on the menu
bar, choose TENANTS > common.
Option 2: For Tenant owned L3 Out deployments, on the menu bar, choose TENANTS > <your tenant-id>.

Step 5 In the Navigation pane, expand Security Policies > Imported Contracts, ensure the contract that you verified
in step 3 is imported as an contract interface.
Step 6 Option 1: For Shared L3 Out deployments, where the contract was created with *External:default, on the
menu bar, choose TENANTS > common.
Option 2: For Tenant owned L3 Out deployments, choose TENANTS > <your tenant-id>.

Step 7 In the External Network Instance Profile -defaultInstP pane, in the Consumed Contracts field, search
for the contract interface that you verified in step 5 and ensure it exists and the STATE is formed.
Step 8 On the menu bar, choose TENANTS.
Step 9 In the Navigation pane, expand Tenant b81b7a5b-7ab8-4d75-a217-fee3bb23f427 > Application Profiles
> Application EPG > EPG wapL3test > Contracts.
Step 10 In the Contracts pane, in the Consumed Contracts field, ensure the default contract that you defined in
Prerequisites for Configuring L3 External Connectivity for Windows Azure Pack, on page 388 for either
shared service tenant or for VPC tenant is consumed by this EPG and the STATE is formed.
Step 11 Option 2: For VPC Windows Azure Pack Plans using a user defined External Network with a Tenant Network
with a Gateway specified.
In the Navigation pane, select Tenant Name > Application Profiles > Application EPG > EPG wapL3test
> Subnets > Subnet Address, verify that the Scope is marked as Advertised Externally.

Adding NAT Firewall Layer 4 to Layer 7 Services to a VM Network


This provisions an Adaptive Security Appliance (ASA) firewall or firewall context, dynamically allocate a
network address translation (NAT) IP from the external IP address pool, configure dynamic PAT on the ASA
to allow outbound traffic, and provision the rest of the service graph for an easy deployment.

Before You Begin


Ensure the Azure Pack plan is configured to access an Layer 4 to Layer 7 service pool.
Ensure the ACI VM network has been created with a gateway or subnet.

Cisco ACI Virtualization Guide, Release 2.2(2)


399
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

If the private subnet of the Layer 4 to Layer 7 resource pool was not provided by the APIC admin,
attempting to add Layer 4 to Layer 7 services with an overlapping subnet results in an error and no
configuration will be pushed. In this case, delete and recreate the VM network with an alternate subnet.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, choose NETWORKS, click on the arrow to enter further network configuration.
Step 4 Click the Enable direct internet access using NAT check box.
Step 5 Click SAVE.

Adding NAT Firewall Port-Forwarding Rules for a VM Network


This configures the network address translation (NAT) firewall to forward traffic from the NAT IP to the
internal IP within the VM network.

Before You Begin


Ensure the Cisco Application Centric Infrastructure (ACI) VM network has been configured to enable
NAT.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, choose NETWORKS, click on the arrow to enter further network configuration.
Step 4 In the NETWORKS pane, choose RULES.
Step 5 Click ADD at the bottom panel.
Step 6 Input the required information for the Port-Forwarding Rule.
Note The destination IP address should be an IP address within the bounds of the VM network
subnet.
Step 7 Click the SAVE checkmark.

Adding NAT Firewall With a Private ADC Load Balancer Layer 4 to Layer 7 Services to a VM Network
In addition to deploying a NAT firewall, this configuration will also deploy an internal load balancer. In this
scenario, the load balancer VIPs are dynamically allocated from the Layer 4 to Layer 7 private IP address
subnet (per tenant VRF). In this 2-Node service graph deployment, it is assumed that the tenant creates a
Port-Fowarding Rule to forward traffic to the internal load balancer for traffic load balancing.

Cisco ACI Virtualization Guide, Release 2.2(2)


400
Cisco ACI with Microsoft Windows Azure Pack
Tenant Tasks

Before You Begin


Ensure the Azure Pack Plan is configured to access an Layer 4 to Layer 7 service pool.
Ensure the ACI VM network has been created with a gateway or subnet.
If the private subnet of the Layer 4 to Layer 7 resource pool was not provided by the APIC admin,
attempting to add Layer 4 to Layer 7 services with an overlapping subnet results in an error and no
configuration will be pushed. In this case, delete and recreate the VM network with an alternate subnet.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, choose NETWORKS, click on the arrow to enter further network configuration.
Step 4 Click the Enable direct internet access using NAT check box.
Step 5 Click the Enable internal load balancer (internal) check box.
Step 6 Click SAVE.

Adding a Public ADC Load Balancer Layer 4 to Layer 7 Services to a VM Network


This provisions a load balancer, dynamically allocate a VIP from the external IP address pool, add the necessary
routes and provision the rest of the service graph for an easy deployment.

Before You Begin


Ensure the Azure Pack Plan is configured to access an Layer 4 to Layer 7 service pool.
Ensure the ACI VM network has been created with a gateway or subnet.
If the private subnet of the Layer 4 to Layer 7 resource pool was not provided by the APIC admin,
attempting to add Layer 4 to Layer 7 services with an overlapping subnet results in an error and no
configuration will be pushed. In this case, delete and recreate the VM network with an alternate subnet.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, choose NETWORKS, click on the arrow to enter further network configuration.
Step 4 Click the Enable load balancer (public) check box.
Step 5 (Optional) Click the Allow Outbound Connections check box.
Note This option is only available if NAT has NOT been configured for this VM network.

Step 6 Click SAVE.

Cisco ACI Virtualization Guide, Release 2.2(2)


401
Cisco ACI with Microsoft Windows Azure Pack
Troubleshooting Cisco ACI with Microsoft Windows Azure Pack

Adding ADC Load Balancer Configuration for a VM Network


This configures either the public, private ADC load balancer, listening on the VIP allocated to the VM network
and forwarding load balancing traffic to the real servers based on the one with the least number of connections.
The entire VM network will be load balanced. As VMs or VNICs come online, they will be added to the load
balancer automatically. Since the entire VM Network is load balanced, it is assumed that all endpoints in the
VM network are the same and can service the load balancer configuration defined.

Before You Begin


Ensure the ACI VM network has been configured for either public or private load balancing.

Procedure

Step 1 Log in to the Service Management Portal (Tenant Portal).


Step 2 In the navigation pane, choose ACI.
Step 3 In the aci pane, choose NETWORKS, click on the arrow to enter further network configuration.
Step 4 In the NETWORKS pane, choose LOAD BALANCERS.
Step 5 Click ADD at the bottom panel.
Step 6 Input the required information for the load balancer (Name: HTTP, Protocol: TCP, Port: 80).
Step 7 Click the SAVE checkmark.

Troubleshooting Cisco ACI with Microsoft Windows Azure Pack


Troubleshooting as an Admin
Procedure

Windows Azure Pack Administrator can look at all networks deployed by tenants in the admin portal. In case
there is an issue, use the APIC GUI to look for any faults on the following objects:
a) VMM domain
b) Tenant and EPG corresponding to the Windows Azure Pack tenant networks.

Troubleshooting as a Tenant
If there is an error message, provide the error message along with the description of the workflow and action
to your Administrator.

Cisco ACI Virtualization Guide, Release 2.2(2)


402
Cisco ACI with Microsoft Windows Azure Pack
Troubleshooting the EPG Configuration Issue

Troubleshooting the EPG Configuration Issue


If during the lifetime of the endpoint group (EPG), the VLAN ID of the EPG changes on the APIC then
SCVMM needs to update the VLAN configuration on all virtual machines for the new setting to take effect.

Procedure

To perform this operation, run the following PowerShell commands on the SCVMM server:

Example:
$VMs = Get-SCVirtualMachine
$VMs | Read-SCVirtualMachine
$NonCompliantAdapters=Get-SCVirtualNetworkAdapter -All | Where-Object
{$_.VirtualNetworkAdapterComplianceStatus -eq "NonCompliant"}
$NonCompliantAdapters | Repair-SCVirtualNetworkAdapter

Programmability References
ACI Windows Azure Pack PowerShell Cmdlets
This section describes how to list the Cisco Application Centric Infrastructure (ACI) Windows Azure Pack
PowerShell cmdlets, help, and examples.

Procedure

Step 1 Log in to the Windows Azure Pack server, choose Start > Run > Windows PowerShell.
Step 2 Enter the followings commands:

Example:
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.

PS C:\Users\administrator> cd C:\inetpub\Cisco-ACI\bin
PS C:\inetpub\Cisco-ACI\bin> Import-Module .\ACIWapPsCmdlets.dll
PS C:\inetpub\Cisco-ACI\bin> Add-Type -Path .\Newtonsoft.Json.dll
PS C:\inetpub\Cisco-ACI\bin> Get-Command -Module ACIWapPsCmdlets

CommandType Name ModuleName


----------- ---- ----------
Cmdlet Add-ACIWAPEndpointGroup ACIWapPsCmdlets
Cmdlet Get-ACIWAPAdminObjects ACIWapPsCmdlets
Cmdlet Get-ACIWAPAllEndpointGroups ACIWapPsCmdlets
Cmdlet Get-ACIWAPBDSubnets ACIWapPsCmdlets
Cmdlet Get-ACIWAPConsumersForSharedService ACIWapPsCmdlets
Cmdlet Get-ACIWAPEndpointGroups ACIWapPsCmdlets
Cmdlet Get-ACIWAPEndpoints ACIWapPsCmdlets
Cmdlet Get-ACIWAPLBConfiguration ACIWapPsCmdlets
Cmdlet Get-ACIWAPOpflexInfo ACIWapPsCmdlets
Cmdlet Get-ACIWAPPlans ACIWapPsCmdlets
Cmdlet Get-ACIWAPStatelessFirewall ACIWapPsCmdlets
Cmdlet Get-ACIWAPSubscriptions ACIWapPsCmdlets
Cmdlet Get-ACIWAPTenantCtx ACIWapPsCmdlets
Cmdlet Get-ACIWAPTenantPlan ACIWapPsCmdlets
Cmdlet Get-ACIWAPTenantSharedService ACIWapPsCmdlets

Cisco ACI Virtualization Guide, Release 2.2(2)


403
Cisco ACI with Microsoft Windows Azure Pack
Uninstalling the Cisco ACI with Microsoft Windows Azure Pack Components

Cmdlet Get-ACIWAPVlanNamespace ACIWapPsCmdlets


Cmdlet New-ApicOpflexCert ACIWapPsCmdlets
Cmdlet Read-ApicOpflexCert ACIWapPsCmdlets
Cmdlet Remove-ACIWAPEndpointGroup ACIWapPsCmdlets
Cmdlet Remove-ACIWAPPlan ACIWapPsCmdlets
Cmdlet Remove-ACIWAPTenantCtx ACIWapPsCmdlets
Cmdlet Set-ACIWAPAdminLogin ACIWapPsCmdlets
Cmdlet Set-ACIWAPBDSubnets ACIWapPsCmdlets
Cmdlet Set-ACIWAPLBConfiguration ACIWapPsCmdlets
Cmdlet Set-ACIWAPLogin ACIWapPsCmdlets
Cmdlet Set-ACIWAPOpflexOperation ACIWapPsCmdlets
Cmdlet Set-ACIWAPPlan ACIWapPsCmdlets
Cmdlet Set-ACIWAPStatelessFirewall ACIWapPsCmdlets
Cmdlet Set-ACIWAPTenantSharedService ACIWapPsCmdlets
Cmdlet Set-ACIWAPUpdateShareServiceConsumption ACIWapPsCmdlets
Cmdlet Set-ACIWAPVlanNamespace ACIWapPsCmdlets
Step 3 Generating help:

Example:
commandname -?
Step 4 Generating examples:

Example:
get-help commandname -examples

Uninstalling the Cisco ACI with Microsoft Windows Azure Pack


Components
This section describes how to uninstall the Cisco Application Centric Infrastructure (ACI) with Microsoft
Windows Azure Pack components.

Note Uninstall involves removing artifacts such as VM and logical networks. Uninstalling succeeds only when
no other resource, such as a VM or a host, is consuming them.

Component Task
Detach all virtual machines from the VM networks See Microsoft's documentation.

Delete VXLAN tunnel endpoint (VTEP) logical See Microsoft's documentation.


switch on all hyper-Vs

Delete cloud on System Center Virtual Machine See Microsoft's documentation.


Manager (SCVMM)

To uninstall the ACI with Microsoft Windows Azure See Uninstalling the APIC Windows Azure Pack
Pack 1.1(1j) release, uninstall the APIC Windows Resource Provider, on page 405.
Azure Pack Resource Provider

Cisco ACI Virtualization Guide, Release 2.2(2)


404
Cisco ACI with Microsoft Windows Azure Pack
Uninstalling the APIC Windows Azure Pack Resource Provider

Component Task
To uninstall this release of ACI with Microsoft See Uninstalling the ACI Azure Pack Resource
Windows Azure Pack, uninstall the following: Provider, on page 405.
ACI Azure Pack Resource Provider See Uninstalling the ACI Azure Pack Admin Site
Extension, on page 406.
ACI Azure Pack Admin Site Extension
See Uninstalling the ACI Azure Pack Tenant Site
ACI Azure Pack Tenant Site Extension Extension, on page 406.

Uninstall the APIC Hyper-V Agent See Uninstalling the APIC Hyper-V Agent, on page
407.

Uninstalling the APIC Windows Azure Pack Resource Provider


This section describes how to uninstall the APIC Windows Azure Pack Resource Provider.

Procedure

Step 1 Log in to the Windows Azure Pack server.


Step 2 Choose Start > Control Panel > Uninstall a Program.
Step 3 In the Programs and Features window, right-click APIC Windows Azure Pack Resource Provider and
choose Uninstall.
This uninstalls the APIC Windows Azure Pack Resource Provider from the Windows Azure Pack server.
Step 4 To verify if the APIC Windows Azure Pack Resource Provider is uninstalled, perform the following actions:
a) Choose Start > Control Panel > Uninstall a Program.
b) In the Programs and Features window, verify that APIC Windows Azure Pack Resource Provider is
not present.

Uninstalling the ACI Azure Pack Resource Provider


This section describes how to uninstall the ACI Azure Pack Resource Provider.

Procedure

Step 1 Log in to the Windows Azure Pack server.


Step 2 Choose Start > Control Panel > Uninstall a Program.
Step 3 In the Programs and Features window, right-click ACI Azure Pack Resource Provider and choose
Uninstall.
This uninstalls the ACI Azure Pack Resource Provider from the Windows Azure Pack server.
Step 4 To verify if the ACI Azure Pack Resource Provider is uninstalled, perform the following actions:

Cisco ACI Virtualization Guide, Release 2.2(2)


405
Cisco ACI with Microsoft Windows Azure Pack
Uninstalling the ACI Azure Pack Admin Site Extension

a) Choose Start > Control Panel > Uninstall a Program.


b) In the Programs and Features window, verify that ACI Azure Pack Resource Provider is not present.

Uninstalling the ACI Azure Pack Admin Site Extension


This section describes how to uninstall the ACI Azure Pack Admin Site Extension.

Procedure

Step 1 Log in to the Windows Azure Pack server.


Step 2 Choose Start > Control Panel > Uninstall a Program.
Step 3 In the Programs and Features window, right-click ACI Azure Pack Admin Site Extension and choose
Uninstall.
This uninstalls the ACI Azure Pack Admin Site Extension from the Windows Azure Pack server.
Step 4 To verify if the ACI Azure Pack Admin Site Extension is uninstalled, perform the following actions:
a) Choose Start > Control Panel > Uninstall a Program.
b) In the Programs and Features window, verify that ACI Azure Pack Admin Site Extension is not
present.

Uninstalling the ACI Azure Pack Tenant Site Extension


This section describes how to uninstall the ACI Azure Pack Tenant Site Extension.

Procedure

Step 1 Log in to the Windows Azure Pack server.


Step 2 Choose Start > Control Panel > Uninstall a Program.
Step 3 In the Programs and Features window, right-click ACI Azure Pack Tenant Site Extension and choose
Uninstall.
This uninstalls the ACI Azure Pack Tenant Site Extension from the Windows Azure Pack server.
Step 4 To verify if the ACI Azure Pack Tenant Site Extension is uninstalled, perform the following actions:
a) Choose Start > Control Panel > Uninstall a Program.
b) In the Programs and Features window, verify that ACI Azure Pack Tenant Site Extension is not
present.

Cisco ACI Virtualization Guide, Release 2.2(2)


406
Cisco ACI with Microsoft Windows Azure Pack
Uninstalling the APIC Hyper-V Agent

Uninstalling the APIC Hyper-V Agent


This section describes how to uninstall the APIC Hyper-V Agent.

Procedure

Step 1 Log in to the Hyper-V server.


Step 2 Choose Start > Control Panel > Uninstall a Program.
Step 3 In the Programs and Features window, right-click Cisco APIC HyperV Agent and choose Uninstall.
This uninstalls the APIC Hyper-V Agent from the Hyper-V server.
Step 4 To verify if the APIC Hyper-V Agent is uninstalled, perform the following actions:
a) Choose Start > Control Panel > Uninstall a Program.
b) In the Programs and Features window, verify that Cisco APIC HyperV Agent is not present.
Step 5 Repeat steps 1-4 for each Hyper-V server.

Downgrading the APIC Controller and the Switch Software with


Cisco ACI with Microsoft Windows Azure Pack Components
This section describes how to downgrade the APIC controller and the switch software with Cisco ACI with
Microsoft Windows Azure Pack components.

Procedure

Step 1 Uninstall Cisco ACI with Microsoft Windows Azure Pack components.
See Uninstalling the Cisco ACI with Microsoft Windows Azure Pack Components, on page 404.

Step 2 Downgrade the APIC controller and the switch software.


See the Cisco APIC Firmware Management Guide.

Cisco ACI Virtualization Guide, Release 2.2(2)


407
Cisco ACI with Microsoft Windows Azure Pack
Downgrading the APIC Controller and the Switch Software with Cisco ACI with Microsoft Windows Azure Pack
Components

Cisco ACI Virtualization Guide, Release 2.2(2)


408

You might also like