B ACI Virtualization Guide 2 2 2
B ACI Virtualization Guide 2 2 2
2(2)
First Published: 2017-04-11
Last Modified: 2017-07-13
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Enabling NetFlow on an Endpoint Group to VMM Domain Association Using the GUI 17
Configuring a NetFlow Exporter Policy for Virtual Machine Networking Using the
NX-OS-Style CLI 18
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the NX-OS-Style
CLI 19
Enabling or Disabling NetFlow on an Endpoint Group Using the NX-OS-Style CLI 19
Configuring a NetFlow Exporter Policy for VM Networking Using the REST API 20
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the REST API 20
Enabling NetFlow on an Endpoint Group for VMM Domain Association 20
Troubleshooting VMM Connectivity 21
CHAPTER 3 Cisco ACI with VMware VDS and VMware vShield Integration 23
Configuring Virtual Machine Networking Policies 23
APIC Supported VMware VDS Versions 24
Guidelines for Upgrading VMware DVS from 5.x to 6.x and VMM Integration 24
Mapping ACI and VMware Constructs 25
VMware VDS Parameters Managed By APIC 25
VDS Parameters Managed by APIC 25
VDS Port Group Parameters Managed by APIC 26
vShield Manager Parameters Managed by APIC 26
Creating a VMM Domain Profile 27
GUI Tasks 27
Prerequisites for Creating a VMM Domain Profile 27
vCenter Domain Operational Workflow 28
Creating a vCenter Domain Profile Using the Advanced GUI 29
Creating a vCenter Domain Profile Using the Basic GUI 30
Creating a vCenter Domain Profile Using the NX-OS Style CLI 32
vCenter and vShield Domain Operational Workflow 33
Creating a vCenter and a vShield Domain Profile Using the Advanced GUI 35
Creating a vCenter and a vShield Domain Profile Using the Basic GUI 37
Creating a vCenter and a vShield Domain Profile Using the NX-OS Style CLI 38
Creating VDS Uplink Port Groups 39
Creating a Trunk Port Group 40
Creating a Trunk Port Group Using the GUI 40
Creating a Trunk Port Group Using the NX-OS Style CLI 40
Creating VLAN Pools with Encapsulation Blocks Using the NX-OS Style CLI 137
Deploying an Application Policy Using the NX-OS Style CLI 138
Verifying the Application Profile 141
Verifying the Application Profile and EPGs in the GUI 141
Verifying the EPGs in vCenter 141
Verifying that VMs can Communicate 141
Configuring an IP Address for VMs Connected to Cisco AVS 142
Assigning an IP Address to the Cisco AVS VM Network Adapter 142
Assigning a Gateway Address for the VMs Connected to Cisco AVS Using the
GUI 143
Guidelines for Using vMotion with Cisco AVS 144
Distributed Firewall 145
Benefits of Distributed Firewall 146
Configuring Distributed Firewall 147
Workflow for Configuring Distributed Firewall 148
Configuring a Stateful Policy for Distributed Firewall Using the Advanced GUI 148
Configuring a Stateful Policy for Distributed Firewall Using the NX-OS Style CLI 149
Creating a Distributed Firewall Policy or Changing its Mode Using the Advanced
GUI 150
Enabling Distributed Firewall After Installation or Upgrade 152
Configuring Distributed Firewall Using the NX-OS Style CLl 153
Distributed Firewall Flow Logging 153
Configuring Parameters for Distributed Firewall Flow Information 153
Guidelines for Configuring the Syslog Server 154
Distributed Firewall Flow Syslog Messages 155
Configuring a Static End Point Using the GUI 156
Configuring Parameters for Distributed Firewall Flow Information in the Advanced
GUI 157
Configuring Parameters for Distributed Firewall Flow Information in the NX-OS
Style CLI 160
Distributed Firewall Flow Counts 160
Choosing Statistics to View for Distributed Firewall 161
Viewing Statistics for Distributed Firewall 161
Microsegmentation with Cisco ACI for Cisco AVS 162
Configuring Layer 4 to Layer 7 Services 162
Deleting the Firewall and Load Balancer from the Tenant-Network in a Shared
Plan 254
Deleting the Firewall and Load Balancer from the Tenant-Network in a VPC Plan 254
Configuring the Inter-EPG Firewall 255
Adding the Firewall to the Tenant-Network in a VPC Plan 255
Deleting the Firewall from the Tenant-Network in a VPC Plan 255
Attaching an External L3 Network Internet Access 256
Verify the Security and L3 Policy on the APIC 257
Verifying the Network Connectivity 258
Application Deployment Scenarios 258
About Property Groups 259
About Service Blueprints 259
Customizing Service Blueprints to a Specific Setup 260
Using the vRealize Utils Workflow to Import Blueprints and Configure the
Entitlements 260
Integration with vRealize Network Profiles (IPAM) 261
Documentation of APIC Workflows in vRealize Orchestrator 262
List of Methods in ApicConfigHelper Class 262
Writing Custom Workflows Using the APIC Plug-in Method 268
Multi-Tenancy and Role based Access Control Using Security Domains 269
Adding the Tenant 269
Deleting the Tenant 269
APIC Credentials for Workflows 270
Adding APIC with Admin Credentials 270
Adding APIC with Tenant Credentials 270
Troubleshooting 270
Collecting the Logs to Report 271
Installing the ACI Helper Scripts 271
Removing the APIC Plug-in 272
Plug-in Overview 272
Configuring a vRA Host for the Tenant in the vRealize Orchestrator 273
Configuring an IaaS Host in the vRealize Orchestrator 274
Installing the vRO Customizations 275
Audience
This guide is intended primarily for data center administrators with responsibilities and expertise in one or
more of the following:
Virtual machine installation and administration
Server administration
Switch and network administration
Document Conventions
Command descriptions use the following conventions:
Convention Description
bold Bold text indicates the commands and keywords that you enter literally
as shown.
Italic Italic text indicates arguments for which the user supplies the values.
Convention Description
[x | y] Square brackets enclosing keywords or arguments separated by a vertical
bar indicate an optional choice.
variable Indicates a variable for which you supply values, in context where italics
cannot be used.
string A nonquoted set of characters. Do not use quotation marks around the
string or the string will include the quotation marks.
Convention Description
screen font Terminal sessions and information the switch displays are in screen font.
boldface screen font Information you must enter is in boldface screen font.
italic screen font Arguments for which you supply values are in italic screen font.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage
or loss of data.
Related Documentation
Application Policy Infrastructure Controller (APIC) Documentation
Companion documents for APIC, Cisco APIC Getting Started Guide, Cisco APIC Basic Configuration Guide,
Cisco APIC Layer 2 Networking Configuration Guide, Cisco APIC Layer 3 Networking Configuration Guide,
Cisco APIC NX-OS Style Command-Line Interface Configuration Guide, Cisco APIC REST API Configuration
Guide, Cisco APIC Layer 4 to Layer 7 Services Deployment Guide, and Cisco ACI Virtualization Guide are
available at the following URL: http://www.cisco.com/c/en/us/support/cloud-systems-management/
application-policy-infrastructure-controller-apic/tsd-products-support-series-home.html
Documentation Feedback
To provide technical feedback on this document, or to report an error or omission, please send your comments
to [email protected]. We appreciate your feedback.
Table 1: New Features and Changed Behavior in the Cisco ACI Virtualization Guide
2.2(1) NetFlow with Virtual The NetFlow technology For more information, see
Machine Networking provides the metering About NetFlow Exporter
base for a key set of Policies with Virtual
applications, including Machine Networking, on
network traffic page 16.
accounting, usage-based
network billing, network
planning, as well as denial
of services monitoring,
network monitoring,
outbound marketing, and
data mining for both
service providers and
enterprise customers.
2.2(1) ICMP and UDP Flow Cisco AVS monitors For more information, see
Logging for Distributed ICMP and UDP flows as Distributed Firewall Flow
Firewall well as TCP flows by Logging, on page 153.
default when you enable
Distributed Firewall.
However, Cisco AVS
does not deny ICMP and
UDP flows as it does TCP
flows.
Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 5
Virtual Machine Manager Domain Main Components , page 6
Virtual Machine Manager Domains, page 7
VMM Domain VLAN Pool Association, page 7
VMM Domain EPG Association, page 8
About Trunk Port Group, page 10
Attachable Entity Profile, page 11
EPG Policy Resolution and Deployment Immediacy, page 12
Guidelines for Deleting VMM Domains, page 13
Toggling Between Basic and Advanced GUI Modes, page 14
NetFlow with Virtual Machine Networking, page 15
Troubleshooting VMM Connectivity, page 21
configuration and manual errors, ACI multi-hypervisor VM automation enables virtualized data centers to
support very large numbers of VMs reliably and cost effectively.
Note A single VMM domain can contain multiple instances of VM controllers, but they must
be from the same vendor (for example, from VMware or from Microsoft.
EPG AssociationEndpoint groups regulate connectivity and visibility among the endpoints within
the scope of the VMM domain policy. VMM domain EPGs behave as follows:
The APIC pushes these EPGs as port groups into the VM controller.
An EPG can span multiple VMM domains, and a VMM domain can contain multiple EPGs.
Attachable Entity Profile AssociationAssociates a VMM domain with the physical network
infrastructure. An attachable entity profile (AEP) is a network interface template that enables deploying
VM controller policies on a large set of leaf switch ports. An AEP specifies which switches and ports
are available, and how they are configured.
VLAN Pool AssociationA VLAN pool specifies the VLAN IDs or ranges used for VLAN encapsulation
that the VMM domain consumes.
VMM domains contain VM controllers such as VMware vCenter or Microsoft SCVMM Manager and the
credential(s) required for the ACI API to interact with the VM controller. A VMM domain enables VM
mobility within the domain but not across domains. A single VMM domain can contain multiple instances of
VM controllers but they must be the same kind. For example, a VMM domain can contain many VMware
vCenters managing multiple controllers each running multiple VMs but it may not also contain SCVMM
Managers. A VMM domain inventories controller elements (such as pNICs, vNICs, VM names, and so forth)
and pushes policies into the controller(s), creating port groups, and other necessary elements. The ACI VMM
domain listens for controller events such as VM mobility and responds accordingly.
or set explicitly by the administrator (static). By default, all blocks contained within a VLAN pool have the
same allocation type as the pool but users can change the allocation type for encapsulation blocks contained
in dynamic pools to static. Doing so excludes them from dynamic allocation.
A VMM domain can associate with only one dynamic VLAN pool. By default, the assignment of VLAN
identifiers to EPGs that are associated with VMM domains is done dynamically by the APIC. While dynamic
allocation is the default and preferred configuration, an administrator can statically assign a VLAN identifier
to an EPG instead. In that case, the identifiers used must be selected from encapsulation blocks in the VLAN
pool associated with the VMM domain, and their allocation type must be changed to static.
The APIC provisions VMM domain VLAN on leaf ports based on EPG events, either statically binding on
leaf ports or based on VM events from controllers such as VMware vCenter or Microsoft SCVMM.
In the illustration above, end points (EP) of the same color are part of the same end point group. For example,
all the green EPs are in the same EPG even though they are in two different VMM domains.
Refer to the latest Verified Scalability Guide for Cisco ACI document for virtual network and VMM domain
EPG capacity information.
Note Multiple VMM domains can connect to the same leaf switch if they do not have overlapping VLAN pools
on the same port. Similarly, the same VLAN pools can be used across different domains if they do not
use the same port of a leaf switch.
Note By default, the APIC dynamically manages allocating a VLAN for an EPG. VMware DVS administrators
have the option to configure a specific VLAN for an EPG. In that case, the VLAN is chosen from a static
allocation block within the pool associated with the VMM domain.
While live migration of VMs within a VMM domain is supported, live migration of VMs across VMM domains
is not supported.
Note When you configure Layer 3 Outside (L3Out) connections to external routers, or multipod connections
through an Inter-Pod Network (IPN), it is critical that the MTU be set appropriately on both sides. On
some platforms, such as ACI, Cisco NX-OS, and Cisco IOS, the configurable MTU value takes into
account packet headers (resulting in a max packet size to be set as 9000 bytes), whereas other platforms
such as IOS-XR configure the MTU value exclusive of packet headers (resulting in a max packet size of
8986 bytes).
For the appropriate MTU values for each platform, see the relevant configuration guides.
Cisco highly recommends you test the MTU using CLI-based commands. For example, on the Cisco
NX-OS CLI, use a command such as ping 1.1.1.1 df-bit packet-size 9000 source-interface
ethernet 1/1.
Caution If you install 1 Gigabit Ethernet (GE) or 10GE links between the leaf and spine switches in the fabric,
there is risk of packets being dropped instead of forwarded, because of inadequate bandwidth. To avoid
the risk, use 40GE or 100GE links between the leaf and spine switches.
Note When creating a VPC domain between two leaf switches, both switches must be in the same switch
generation, one of the following:
Generation 1 - Cisco Nexus N9K switches without EX on the end of the switch name; for example,
N9K-9312TX
Generation 2 Cisco Nexus N9K switches with EX on the end of the switch model name; for
example, N9K-93108TC-EX
Switches such as these two are not compatible VPC peers. Instead, use switches of the same generation
An Attachable Entity Profile (AEP) represents a group of external entities with similar infrastructure policy
requirements. The infrastructure policies consist of physical interface policies that configure various protocol
options, such as Cisco Discovery Protocol (CDP), Link Layer Discovery Protocol (LLDP), or Link Aggregation
Control Protocol (LACP).
An AEP is required to deploy VLAN pools on leaf switches. Encapsulation blocks (and associated VLANs)
are reusable across leaf switches. An AEP implicitly provides the scope of the VLAN pool to the physical
infrastructure.
The following AEP requirements and dependencies must be accounted for in various configuration scenarios,
including network connectivity, VMM domains, and multipod configuration:
The AEP defines the range of allowed VLANS but it does not provision them. No traffic flows unless
an EPG is deployed on the port. Without defining a VLAN pool in an AEP, a VLAN is not enabled on
the leaf port even if an EPG is provisioned.
A particular VLAN is provisioned or enabled on the leaf port that is based on EPG events either statically
binding on a leaf port or based on VM events from external controllers such as VMware vCenter or
Microsoft Azure Service Center Virtual Machine Manager (SCVMM).
Attached entity profiles can be associated directly with application EPGs, which deploy the associated
application EPGs to all those ports associated with the attached entity profile. The AEP has a configurable
generic function (infraGeneric), which contains a relation to an EPG (infraRsFuncToEpg) that is deployed
on all interfaces that are part of the selectors that are associated with the attachable entity profile.
A virtual machine manager (VMM) domain automatically derives physical interface policies from the interface
policy groups of an AEP.
An override policy at the AEP can be used to specify a different physical interface policy for a VMM domain.
This policy is useful in scenarios where a VM controller is connected to the leaf switch through an intermediate
Layer 2 node, and a different policy is desired at the leaf switch and VM controller physical ports. For example,
you can configure LACP between a leaf switch and a Layer 2 node. At the same time, you can disable LACP
between the VM controller and the Layer 2 switch by disabling LACP under the AEP override policy.
Resolution Immediacy
Pre-provisionSpecifies that a policy (for example, VLAN, VXLAN binding, contracts, or filters) is
downloaded to a leaf switch even before a VM controller is attached to the virtual switch (for example,
VMware VDS) thereby pre-provisioning the configuration on the switch.
This helps the situation where management traffic for hypervisors/VM controllers are also using the
virtual switch associated to APIC VMM domain (VMM switch).
Deploying a VMM policy such as VLAN on ACI leaf switch requires APIC to collect CDP/LLDP
information from both hypervisors via VM controller and ACI leaf switch. However if VM Controller
is supposed to use the same VMM policy (VMM switch) to communicate with its hypervisors or even
APIC, the CDP/LLDP information for hypervisors can never be collected because the policy required
for VM controller/hypervisor management traffic is not deployed yet.
When using pre-provision immediacy, policy is downloaded to ACI leaf switch regardless of CDP/LLDP
neighborship. Even without a hypervisor host connected to the VMM switch.
ImmediateSpecifies that EPG policies (including contracts and filters) are downloaded to the associated
leaf switch software upon VM controller attachment to a virtual switch. LLDP or OpFlex permissions
are used to resolve the VM controller to leaf node attachments.
The policy will be downloaded to leaf when you add host to the VMM switch. CDP/LLDP neighborship
from host to leaf is required.
On DemandSpecifies that a policy (for example, VLAN, VXLAN bindings, contracts, or filters) is
pushed to the leaf node only when a VM controller is attached to a virtual switch and a VM is placed in
the port group (EPG).
The policy will be downloaded to leaf when host is added to VMM switch and virtual machine needs
to be placed into port group (EPG). CDP/LLDP neighborship from host to leaf is required.
With both immediate and on demand, if host and leaf lose LLDP/CDP neighborship the policies are
removed.
Deployment Immediacy
Once the policies are downloaded to the leaf software, deployment immediacy can specify when the policy
is pushed into the hardware policy CAM.
ImmediateSpecifies that the policy is programmed in the hardware policy CAM as soon as the policy
is downloaded in the leaf software.
On DemandSpecifies that the policy is programmed in the hardware policy CAM only when the first
packet is received through the data path. This process helps to optimize the hardware space.
Note The VM administrator should not delete the virtual switch or associated objects (such as port groups or
VM networks); allow the APIC to trigger the virtual switch deletion upon completion of step 2 above.
EPGs could be orphaned in the APIC if the VM administrator deletes the virtual switch from the VM
controller before the VMM domain is deleted in the APIC.
If this sequence is not followed, the VM controller does delete the virtual switch associated with the APIC
VMM domain. In this scenario, the VM administrator must manually remove the VM and vtep associations
from the VM controller, then delete the virtual switch(es) previously associated with the APIC VMM domain.
You can also change from one GUI mode to another or toggle between modes as follows:
1 In the GUI, click the welcome, <login_name> drop-down list and choose Toggle GUI Mode.
2 In the Warning dialog box, click Yes .
3 Wait for the application to complete loading and display the GUI in the changed mode.
Caution Changes made through the APIC Basic GUI can be seen, but cannot be modified in the Advanced GUI,
and changes made in the Advanced GUI cannot be rendered in the Basic GUI. The Basic GUI is kept
synchronized with the NX-OS style CLI, so that if you make a change from the NX-OS style CLI, these
changes are rendered in the Basic GUI, and changes made in the Basic GUI are rendered in the NX-OS
style CLI, but the same synchronization does not occur between the Advanced GUI and the NX-OS style
CLI. See the following examples:
Do not mix Basic and Advanced GUI modes. If you apply an interface policy to two ports using
Advanced mode and then change the settings of one port using Basic mode, your changes might be
applied to both ports.
Do not mix the Advanced GUI and the CLI, when doing per-interface configuration on APIC.
Configurations performed in the GUI, may only partially work in the NX-OS CLI.
For example, if you configure a switch port in the GUI at Tenants > tenant-name > Application
Profiles > application-profile-name > Application EPGs > EPG-name > Static Ports > Deploy
Static EPG on PC, VPC, or Interface
Then you use the show running-config command in the NX-OS style CLI, you receive output such
as:
leaf 102
interface ethernet 1/15
switchport trunk allowed vlan 201 tenant t1 application ap1 epg ep1
exit
exit
If you use these commands to configure a static port in the NX-OS style CLI, the following error
occurs:
apic1(config)# leaf 102
apic1(config-leaf)# interface ethernet 1/15
apic1(config-leaf-if)# switchport trunk allowed vlan 201 tenant t1 application ap1
epg ep1
No vlan-domain associated to node 102 interface ethernet1/15 encap vlan-201
This occurs because the CLI has validations that are not performed by the APIC GUI. For the
commands from the show running-config command to function in the NX-OS CLI, a vlan-domain
must have been previously configured. The order of configuration is not enforced in the GUI.
Do not make changes with the Basic GUI or the NX-OS CLI before using the Advanced GUI. This
may also inadvertantly cause objects to be created (with names prepended with _ui_) which cannot
be changed or deleted in the Advanced GUI.
For the steps to remove such objects, see Troubleshooting Unwanted _ui_ Objects in the APIC Troubleshooting
Guide.
post-processing, and provide end-user applications with easy access to NetFlow data. If you have enabled
NetFlow monitoring of the traffic flowing through your datacenters, this feature enables you to perform the
same level of monitoring of the traffic flowing through the Cisco Application Centric Infrastructure (Cisco
ACI) fabric.
Instead of hardware directly exporting the records to a collector, the records are processed in the supervisor
engine and are exported to standard NetFlow collectors in the required format.
For more information about NetFlow, see the Cisco APIC and NetFlow knowledge base article.
Procedure
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the GUI
The following procedure consumes a NetFlow exporter policy under a VMM domain using the advanced GUI
mode.
Procedure
Procedure
Procedure
Example:
apic1# config
Example:
apic1(config)# flow vm-exporter vmExporter1 destination address 2.2.2.2 transport udp 1234
apic1(config-flow-vm-exporter)# source address 4.4.4.4
apic1(config-flow-vm-exporter)# exit
apic1(config)# exit
Procedure
Example:
apic1# config
Example:
apic1(config)# vmware-domain mininet
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# flow exporter vmExporter1
apic1(config-vmware-dvs-flow-exporter)# active-flow-timeout 62
apic1(config-vmware-dvs-flow-exporter)# idle-flow-timeout 16
apic1(config-vmware-dvs-flow-exporter)# sampling-rate 1
apic1(config-vmware-dvs-flow-exporter)# exit
apic1(config-vmware-dvs)# exit
apic1(config-vmware)# exit
apic1(config)# exit
Procedure
Example:
apic1# config
apic1(config)# tenant tn1
apic1(config-tenant)# application app1
apic1(config-tenant-app)# epg epg1
apic1(config-tenant-app-epg)# vmware-domain member mininet
apic1(config-tenant-app-epg-domain)# flow monitor enable
apic1(config-tenant-app-epg-domain)# exit
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# exit
apic1(config-tenant)# exit
apic1(config)# exit
Step 2 (Optional) If you no longer want to use NetFlow, disable the feature:
Example:
apic1(config-tenant-app-epg-domain)# no flow monitor enable
Consuming a NetFlow Exporter Policy Under a VMM Domain Using the REST
API
The following example XML shows how to consume a NetFlow exporter policy under a VMM domain using
the REST API:
<polUni>
<vmmProvP vendor=VMware>
<vmmDomP name=mininet>
<vmmVSwitchPolicyCont>
<vmmRsVswitchExporterPol tDn=uni/infra/vmmexporterpol-vmExporter1
activeFlowTimeOut=62 idleFlowTimeOut=16 samplingRate=1/>
</vmmVSwitchPolicyCont>
</vmmDomP>
</vmmProvP>
</polUni>
Procedure
Step 1 Trigger inventory resync on the Application Policy Infrastructure Controller (APIC).
For more information about how to trigger an inventory resync on APIC, see the following knowledge base
article:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/kb/b_KB_VMM_OnDemand_Inventory_
in_APIC.html
Step 2 If step 1 does not fix the issue, for the impacted EPGs, set the resolution immediacy to use preprovisioning
in the VMM domain.
"Pre-Provision removes the need for neighbor adjacencies or OpFlex permissions and subsequently the
dynamic nature of VMM Domain VLAN Programming. For more information about Resolution Immediacy
types, see the following EPG Policy Resolution and Deployment Immediacy section:
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-x/aci-fundamentals/
b_ACI-Fundamentals/b_ACI-Fundamentals_chapter_01011.html#concept_
EF87ADDAD4EF47BDA741EC6EFDAECBBD
Step 3 If steps 1 and 2 do not fix the issue and you see the issue on all of the VMs, then delete the VM controller
policy and readd the policy.
Note Deleting the controller policy impacts traffic for all VMs that are on that controller.
Note When adding additional VMware ESXi hosts to the VMM domain with VMware vSphere Distributed
Switch (VDS), ensure that the version of ESXi host is compatible with the Distributed Virtual Switch
(DVS) version already deployed in the vCenter. For more information about VMware VDS compatibility
requirements for ESXi hosts, see the VMware documentation.
If the ESXi host version is not compatible with the existing DVS version, vCenter will not be able to add
the ESXi host to the DVS, and an incompatibility error will occur. Modification of the existing DVS
Version setting from the Cisco APIC is not possible. To lower the DVS Version in the vCenter, you need
to remove and reapply the VMM domain configuration with a lower setting.
Important If you have ESXi 6.5 hosts running UCS B-Series or C-Series server with VIC cards, some of the vmnics
may go down on a port state event, such as a link flap or a TOR reload. To prevent this problem, do not
use the default eNIC driver but install it from Cisco.com: https://cspg-releng.cisco.com/vic/blade/3.1.3/
Drivers/VMware/Network/Cisco/VIC/ESXi_6.5/
Guidelines for Upgrading VMware DVS from 5.x to 6.x and VMM Integration
This section describes the guidelines for upgrading VMware Distributed Virtual Switch (DVS) from 5.x to
6.x and VMM integration.
DVS versioning is only applicable to the VMware DVS and not the Cisco Application Virtual Switch
(AVS). DVS upgrades are initiated from VMware vCenter, or the relevant orchestration tool and not
ACI. The Upgrade Version option appears greyed out for AVS switches within vCenter.
If you are upgrading the DVS from 5.x to 6.x, you must upgrade the vCenter Server to version 6.0 and
all hosts connected to the distributed switch to ESXi 6.0. For full details on upgrading your vCenter and
Hypervisor hosts, see VMware's upgrade documentation. To upgrade the DVS go to the Web Client:
Home > Networking > DatacenterX > DVS-X > Actions Menu > Upgrade Distributed Switch.
There is no functional impact on the DVS features, capability, performance and scale if the DVS version
shown in vCenter does not match the VMM domain DVS version configured on the APIC. The APIC
and VMM Domain DVS Version is only used for initial deployment.
Multicast address ranges Not applicable Yes (using Multicast address pool)
GUI Tasks
This section shows how to perform tasks using GUI.
For references to REST API tasks, refer to REST API Tasks, on page 48.
For references to NX-OS Style CLI tasks, refer to NX-OS Style CLI Tasks, on page 54.
Note If you prefer not to use the vCenter admin/root credentials, you can create a custom user
account with minimum required permissions. See Custom User Account with Minimum
VMware vCenter Privileges, on page 46 for a list of the required user privileges.
A DNS policy for the APIC must be configured if you plan to reference the VMM by hostname rather
than an IP address.
A DHCP server and relay policy must be configured if you are creating a domain profile for VMware
vShield.
The APIC administrator configures the vCenter domain policies in the APIC. The APIC administrator provides
the following vCenter connectivity information:
vCenter IP address, vCenter credentials, VMM domain policies, and VMM domain SPAN
Policies (VLAN pools, domain type such as VMware VDS, Cisco Nexus 1000V switch)
Connectivity to physical leaf inerfaces (using attach entity profiles)
3 The vCenter administrator or the compute management tool adds the ESX host or hypervisor to the APIC
VDS and assigns the ESX host hypervisor ports as uplinks on the APIC VDS. These uplinks must connect
to the ACI leaf switches.
4 The APIC learns the location of the hypervisor host to the leaf connectivity using LLDP or CDP information
of the hypervisors.
5 The APIC administrator creates and associates application EPG policies.
6 The APIC administrator associates EPG policies to VMM domains.
7 The APIC automatically creates port groups in the VMware vCenter under the VDS. This process provisions
the network policy in the VMware vCenter.
Note The port group name is a concatenation of the tenant name, the application profile name, and the
EPG name.
The port group is created under the VDS, and it was created earlier by the APIC.
8 The vCenter administrator or the compute management tool instantiates and assigns VMs to the port
groups.
9 The APIC learns about the VM placements based on the vCenter events. The APIC automatically pushes
the application EPG and its associated policy (for example, contracts and filters) to the ACI fabric.
Procedure
Procedure
Procedure
Example:
apic1# configure
apic1(config)#
Example:
apic1(config)# vlan-domain dom1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
apic1(config)#
Step 3 Add interfaces to this VLAN domain. These are the interfaces to be connected to VMware hypervisor uplink
ports:
Example:
apic1(config)# leaf 101-102
apic1(config-leaf)# interface ethernet 1/2-3
apic1(config-leaf-if)# vlan-domain member dom1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
Example:
apic1(config)# vmware-domain vmmdom1
apic1(config-vmware)# vlan-domain member dom1
apic1(config-vmware)#
Example:
apic1(config)# vmware-domain vmmdom1 delimiter @
Example:
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# exit
apic1(config-vmware)#
Example:
apic1(config-vmware)# vcenter 192.168.66.2 datacenter prodDC
apic1(config-vmware-vc)# username administrator
Password:
Retype password:
apic1(config-vmware-vc)# exit
apic1(config-vmware)# exit
apic1(config)# exit
Note When configuring the password, you must precede special characters such as '$' or '!' with a backslash
('\$') to avoid misinterpretation by the Bash shell. The escape backslash is necessary only when
configuring the password; the backslash does not appear in the actual password.
Step 7 Verify configuration:
Example:
apic1# show running-config vmware-domain vmmdom1
# Command: show running-config vmware-domain vmmdom1
# Time: Wed Sep 2 22:14:33 2015
vmware-domain vmmdom1
vlan-domain member dom1
vcenter 192.168.66.2 datacenter prodDC
username administrator password *****
configure-dvs
exit
exit
Note The APIC controls and automates the entire VXLAN preparation and deployment on the vShield Manager
so that users are not required to perform any actions on the vShield Manager.
Prerequisites
The fabric infrastructure VLAN must be extended to the hypervisor ports. The fabric infrastructure
VLAN is used as the outer VLAN in the Ethernet header of the VXLAN data packet. The APIC
automatically pushes the fabric infrastructure VLAN to the vShield Manager when preparing the APIC
VDS for the VXLAN. This is accomplished by checking Enable Infrastructure VLAN in the attachable
entity profile used by this domain profile, as well as by manually enabling and allowing the infrastructure
VLAN ID on any intermediate Layer 2 switches between the fabric and hypervisors.
Operational Workflow
Figure 6: A Sequential Illustration of the vCenter and vShield Domains Operational Workflow
The APIC administrator configures the vCenter and vShield domain policies in the APIC.
Note The APIC administrator must provide the association between vShield Manager and the vCenter
Server on the APIC.
The APIC administrator must provide the segment ID and multicast address pool that is required for
the VXLAN. The segment ID pool in the vShield Manager must not overlap with pools in other
vShield Managers that are configured on the APIC.
3 The APIC connects to the vShield Manager, pushes the segment ID and multicast address pool, and prepares
the VDS for VXLAN.
4 The vCenter administrator or the compute management tool attaches the hypervisors to the VDS. All
hypervisors in the cluster must be attached to the VDS. Only after that will vShield start VDS preparation.
5 The APIC learns the location of the hypervisor host to the leaf connectivity using LLDP or CDP information
from the hypervisors.
6 The APIC administrator creates application profiles and EPGs.
7 The APIC administrator associates them to VMM domains.
8 The APIC automatically creates virtual wires in the vShield Manager under the VDS. The APIC reads the
segment ID and the multicast address from the VXLAN virtual wire sent from the vShield Manager.
9 The vShield Manager creates virtual wire port groups in the vCenter server under the VDS.
Note The virtual wire name is a concatenation of the tenant name, the application profile name, and the EPG
name.
10 The vCenter administrator or compute management tool instantiates and assigns VMs to the virtual wire
port groups.
11 The APIC automatically pushes the policy to the ACI fabric.
Creating a vCenter and a vShield Domain Profile Using the Advanced GUI
An overview of the tasks performed in the creation of a vCenter and vShield domains are as follows (details
are in the steps that follow):
Create/select a switch profile.
Create/select an interface profile.
Create/select an interface policy group.
Create/select VLAN pool.
Create vCenter and vShield domains.
Create vCenter and vShield credentials.
Procedure
Creating a vCenter and a vShield Domain Profile Using the Basic GUI
Procedure
Creating a vCenter and a vShield Domain Profile Using the NX-OS Style CLI
Before You Begin
This section describes how to create a vCenter and vShield domain profile using the NX-OS CLI:
Procedure
Example:
apic1# configure
apic1(config)# exit
Step 2 Configure a VLAN domain as follows:
Example:
apic1(config)# vlan-domain dom1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
apic1(config)#
Step 3 Add interfaces to this VLAN domain. These are the interfaces to be connected to VMware hypervisor uplink
ports as follows:
Example:
apic1(config)# leaf 101-102
apic1(config-leaf)# interface ethernet 1/2-3
apic1(config-leaf-if)# vlan-domain member dom1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
apic1(config)#
Step 4 Create a VMware domain and add VLAN domain membership as follows:
Example:
apic1(config)# vmware-domain vmmdom1
apic1(config-vmware)# vlan-domain member dom1
apic1(config-vmware)#
Step 5 Configure the domain type to DVS as follows:
Example:
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# exit
apic1(config-vmware)#
Step 6 Configure a vCenter controller in the domain as follows:
Example:
apic1(config-vmware)# vcenter 192.168.66.2 datacenter prodDC
apic1(config-vmware-vc)# username administrator password password
apic1(config-vmware-vc)#
Step 7 Configure a VShield controller attached to this VCenter, and configure vxlan and multicast address pools for
this VShield as follows:
Example:
apic1(config-vmware-vc)# vshield 123.4.5.6
apic1(config-vmware-vc-vs)# username administrator password "password"
apic1(config-vmware-vc-vs)# vxlan pool 10000-12000
apic1(config-vmware-vc-vs)# vxlan multicast-pool 224.3.4.5-224.5.6.7
apic1(config-vmware-vc-vs)# exit
apic1(config-vmware-vc)#
Step 8 Verify the configuration as follows:
Example:
apic1# show running-config vmware-domain vmmdom1
# Command: show running-config vmware-domain vmmdom1
# Time: Wed Sep 2 22:14:33 2015
vmware-domain vmmdom1
vlan-domain member dom1
vcenter 192.168.66.2 datacenter prodDC
username administrator password *****
vshield 123.4.5.6
username administrator password *****
vxlan pool 10000-12000
vxlan multicast-pool 224.3.4.5-224.5.6.7
exit
exit
configure-dvs
exit
exit
Note When working with ACI and vSphere VMM integration, Link Aggregation Groups (LAGs) are not a
supported method of creating interface teams on distributed switches created by the APIC. The APIC
pushes the necessary interface teaming configuration based on the settings in the Interface Policy Group
and/or AEP vSwitch policy. It is not supported or required to manually create interface teams in vCenter.
Procedure
Procedure
Example:
apic1(config-vmware)# vmware-domain ifav2-vcenter1
Example:
apic1(config-vmware)# trunk-portgroup trunkpg1
Example:
apic1(config-vmware-trunk)# vlan-range 2800-2820, 2830-2850
Note If you do not specify a VLAN range, the VLAN list will be taken from the domains VLAN namespace.
Step 4 The mac changes is accept by default. If you choose to not to accept the mac changes, enter the following
command:
Example:
apic1(config-vmware-trunk)# no mac-changes accept
Step 5 The forged transmit is accept by default. If you choose to not to accept the forged transmit, enter the following
command:
Example:
apic1(config-vmware-trunk)# no forged-transmit accept
Step 6 The promiscuous mode is disable by default. If you choose to enable promiscuous mode on the trunk port
group:
Example:
apic1(config-vmware-trunk)# allow-promiscuous enable
Step 7 The trunk port group immediacy is set to on-demand by default. If you want to enable immediate immediacy,
enter the following command:
Example:
apic1(config-vmware-trunk)# immediacy-immediate enable
Example:
apic1(config-vmware)# show vmware domain name mininet
Domain Name : mininet
Virtual Switch Mode : VMware Distributed Switch
Switching Encap Mode : vlan
vCenters:
Faults: Grouped by severity (Critical, Major, Minor, Warning)
vCenter Type Datacenter Status ESXs VMs Faults
Trunk Portgroups:
Name VLANs
--------------------------------------------- ----------------------------------------------
epgtr1 280-285
epgtr2 280-285
epgtr3 2800-2850
Procedure
Example:
<vmmProvP vendor="VMware">
<vmmDomP name=DVS1">
<vmmUsrAggr name="EPGAggr_1">
<fvnsEncapBlk name="blk0" from="vlan-100 to="vlan-200"/>
</vmmUsrAggr>
</vmmDomP>
</vmmProvP>
Note This example shows how to configure a port channel access policy for integrating Cisco UCS blade servers.
You can use similar steps to set up a virtual port channel or individual link access policies depending upon
how your Cisco UCS blade server uplinks are connected to the fabric. If no port channel is explicitly
configured on the APIC for the UCS blade server uplinks, the default behavior will be mac-pinning.
The VM endpoint learning relies on either the CDP or LLDP protocol. If supported, CDP must be enabled
all the way from the leaf switch port through any blade switches and to the blade adapters.
Ensure the management address type, length, and value (TLV) is enabled on the blade switch (CDP or
LLDP protocol) and advertised towards servers and fabric switches. Configuration of management TLV
address must be consistent across CDP and LLDP protocols on the blade switch.
The APIC does not manage fabric interconnects and the blade server, so any UCS specific policies such
as CDP or port channel policies must be configured from the UCS Manager.
VLANs defined in the VLAN pool used by the attachable access entity profile on the APIC, must also
be manually created on the UCS and allowed on the appropriate uplinks connecting to the fabric. This
must include the infrastructure VLAN if applicable. For details, see the Cisco UCS Manager GUI
Configuration Guide.
When you are working with the Cisco UCS B-series server and using an APIC policy, Link Layer
Discovery Protocol (LLDP) is not supported.
Cisco Discovery Prototol (CDP) is disabled by default in Cisco UCS Manager. In Cisco UCS Manager,
you must enable CDP by creating a Network Control Policy.
Do not enable fabric failover on the adapters in the UCS server service profiles. Cisco recommends that
you allow the hypervisor to handle failover at the virtual switch layer so that load balancing of traffic
is appropriately performed.
Note Symptom: The change of management IP of the unmanaged node such as blade switch or fabric interconnect
gets updated in the VMware vCenter, but the VMware vCenter does not send any events to APIC.
Condition: This causes the APIC to be out of sync with VMware vCenter.
Workaround: You need to trigger an inventory pull for the VMware vCenter controller that manages ESX
servers behind the unmanaged node.
Procedure
Step 11 From the LACP Policy drop-down list, choose Create LACP Policy.
Between the leaf switch and the blade server, the LACP policy must be set to active.
Step 12 In the Create LACP Policy dialog box, perform the following actions:
a) In the Name field, enter a name for the policy.
b) In the Mode field, the Active radio button is checked.
c) Keep the remaining default values and click Submit.
Step 13 From the Attached Device Type field drop-down list, choose ESX Hosts.
Step 14 In the Domain Name field, enter a name as appropriate.
Step 15 In the VLAN Range field, enter the range.
Step 16 In the vCenter Login Name field, enter the login name.
Step 17 In the Password field, and the Confirm Password field, enter the password.
Step 18 Expand the vCenter/vShield field, and in the Create vCenter/vShield Controller dialog box, enter the
desired content and click OK.
Step 19 In the vSwitch Policy field, perform the following actions:
Between the blade server and the ESX hypervisor, CDP must be enabled, LLDP must be disabled, and LACP
must be disabled so Mac Pinning must be set.
a) Check the MAC Pinning check box.
b) Check the CDP check box.
c) Leave the LLDP check box unchecked because LLDP must remain disabled.
Step 20 Click Save, and click Save again. Click Submit.
The access policy is set.
Virtual machine
If you use Service Graph in addition to above, you need the Virtual machine privilege for the virtual
appliances which will be used for Service Graph.
As a result, APIC creates the port group under vCenter with VLAN specified by the user. APIC also
automatically pushes the policies on the leaf switches associated with the VMM domain and Attach
Entity Profile (AEP).
Procedure
Example:
POST URL: https://<api-ip>/api/node/mo/.xml
<polUni>
<vmmProvP vendor="VMware">
<!-- VMM Domain -->
<vmmDomP name="productionDC">
<!-- Association to VLAN Namespace -->
<infraRsVlanNs tDn="uni/infra/vlanns-VlanRange-dynamic"/>
<!-- Credentials for vCenter -->
<vmmUsrAccP name="admin" usr="administrator" pwd="admin" />
<!-- vCenter IP address -->
<vmmCtrlrP name="vcenter1" hostOrIp="<vcenter ip address>" rootContName="<Datacenter Name
in vCenter>">
<vmmRsAcc tDn="uni/vmmp-VMware/dom-productionDC/usracc-admin"/>
</vmmCtrlrP>
</vmmDomP>
</vmmProvP>
Example:
<polUni>
<vmmProvP vendor="VMware">
<vmmDomP name=mininet" delimiter=@" >
</vmmDomP>
</vmmProvP>
</polUni>
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraAttEntityP name="profile1">
<infraRsDomP tDn="uni/vmmp-VMware/dom-productionDC"/>
</infraAttEntityP>
</infraInfra>
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraAccPortP name="swprofile1ifselector">
<infraHPortS name="selector1" type="range">
<infraPortBlk name="blk"
fromCard="1" toCard="1" fromPort="1" toPort="3">
</infraPortBlk>
<infraRsAccBaseGrp tDn="uni/infra/funcprof/accportgrp-group1" />
</infraHPortS>
</infraAccPortP>
<infraFuncP>
<infraAccPortGrp name="group1">
<infraRsAttEntP tDn="uni/infra/attentp-profile1" />
</infraAccPortGrp>
</infraFuncP>
</infraInfra>
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraNodeP name="swprofile1">
<infraLeafS name="selectorswprofile11718" type="range">
Example:
POST URL: https://<apic-ip>/api/node/mo/.xml
<polUni>
<infraInfra>
<fvnsVlanInstP name="VlanRange" allocMode="dynamic">
<fvnsEncapBlk name="encap" from="vlan-100" to="vlan-400"/>
</fvnsVlanInstP>
</infraInfra>
</polUni>
Step 6 Locate all the configured controllers and their operational state.
Example:
GET:
https://<apic-ip>/api/node/class/compCtrlr.xml?
<imdata>
<compCtrlr apiVer="5.1" ctrlrPKey="uni/vmmp-VMware/dom-productionDC/ctrlr-vcenter1"
deployIssues="" descr="" dn="comp/prov-VMware/ctrlr-productionDC-vcenter1" domName="
productionDC"
hostOrIp="esx1" mode="default" model="VMware vCenter Server 5.1.0 build-756313"
name="vcenter1" operSt="online" port="0" pwd="" remoteOperIssues="" scope="vm"
usr="administrator" vendor="VMware, Inc." ... />
</imdata>
Step 7 Locate the hypervisor and VMs for a vCenter with the name 'vcenter1' under a VMM domain called
'ProductionDC'.
Example:
GET:
https://<apic-ip>/api/node/mo/comp/prov-VMware/ctrlr-productionDC-vcenter1.xml?query-target=children
<imdata>
<compHv descr="" dn="comp/prov-VMware/ctrlr-productionDC-vcenter1/hv-host-4832" name="esx1"
state="poweredOn" type="hv" ... />
<compVm descr="" dn="comp/prov-VMware/ctrlr-productionDC-vcenter1/vm-vm-5531" name="AppVM1"
state="poweredOff" type="virt" .../>
<hvsLNode dn="comp/prov-VMware/ctrlr-productionDC-vcenter1/sw-dvs-5646" lacpEnable="yes"
lacpMode="passive" ldpConfigOperation="both" ldpConfigProtocol="lldp" maxMtu="1500"
mode="default" name="apicVswitch" .../>
</imdata>
Creating a vCenter and a vShield Domain Profile Using the REST API
Procedure
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<polUni>
<infraInfra>
<fvnsVlanInstP name="vlan1" allocMode="dynamic">
<fvnsEncapBlk name="encap" from="vlan-100" to="vlan-400"/>
</fvnsVlanInstP>
</infraInfra>
</polUni>
Step 2 Create a vCenter domain, and assign a VLAN pool.
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<vmmProvP dn="uni/vmmp-VMware">
<vmmDomP name="productionDC">
<infraRsVlanNs tDn="uni/infra/vlanns-vlan1-dynamic"/>
</vmmDomP>
</vmmProvP>
Step 3 Create an attachable entity profile for infrastructure VLAN deployment.
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraAttEntityP name="profile1">
<infraRsDomP tDn="uni/vmmp-VMware/dom-productionDC"/>
<infraProvAcc name="provfunc"/>
</infraAttEntityP>
</infraInfra>
Step 4 Create an interface policy group and selector.
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraAccPortP name="swprofile1ifselector">
<infraHPortS name="selector1" type="range">
<infraPortBlk name="blk"
fromCard="1" toCard="1" fromPort="1" toPort="3">
</infraPortBlk>
<infraRsAccBaseGrp tDn="uni/infra/funcprof/accportgrp-group1" />
</infraHPortS>
</infraAccPortP>
<infraFuncP>
<infraAccPortGrp name="group1">
<infraRsAttEntP tDn="uni/infra/attentp-profile1" />
</infraAccPortGrp>
</infraFuncP>
</infraInfra>
Step 5 Create a switch profile.
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraNodeP name="swprofile1">
<infraLeafS name="selectorswprofile11718" type="range">
<infraNodeBlk name="single0" from_="101" to_="101"/>
<infraNodeBlk name="single1" from_="102" to_="102"/>
</infraLeafS>
<infraRsAccPortP tDn="uni/infra/accportprof-swprofile1ifselector"/>
</infraNodeP>
</infraInfra>
Step 6 Create credentials for controllers.
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<vmmProvP dn="uni/vmmp-VMware">
<vmmDomP name="productionDC">
<vmmUsrAccP name="vcenter_user" usr="administrator" pwd="default"/>
<vmmUsrAccP name="vshield_user" usr="admin" pwd="default"/>
</vmmDomP>
</vmmProvP>
Step 7 Create a vCenter controller
Example:
<vmmProvP dn="uni/vmmp-VMware">
<vmmDomP name="productionDC">
<vmmCtrlrP name="vcenter1" hostOrIp="172.23.50.85" rootContName="Datacenter1">
<vmmRsAcc tDn="uni/vmmp-VMware/dom-productionDC/usracc-vcenter_user"/>
</vmmCtrlrP>
</vmmDomP>
</vmmProvP>
Step 8 Create a VXLAN pool and a multicast address range.
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<fvnsVxlanInstP name="vxlan1">
<fvnsEncapBlk name="encap" from="vxlan-6000" to="vxlan-6200"/>
</fvnsVxlanInstP>
<fvnsMcastAddrInstP name="multicast1">
<fvnsMcastAddrBlk name="mcast" from="224.0.0.1" to="224.0.0.20"/>
</fvnsMcastAddrInstP>
</infraInfra>
Step 9 Create a vShield controller.
Example:
POST URL: https://<apic-ip>/api/policymgr/mo/uni.xml
<vmmProvP dn="uni/vmmp-VMware">
<vmmDomP name="productionDC">
<vmmCtrlrP name="vshield1" hostOrIp="172.23.54.62" scope="iaas">
<vmmRsAcc tDn="uni/vmmp-VMware/dom-productionDC/usracc-vshield_user"/>
<vmmRsVmmCtrlrP tDn="uni/vmmp-VMware/dom-productionDC/ctrlr-vcenter1"/>
<vmmRsVxlanNs tDn="uni/infra/vxlanns-vxlan1"/>
<vmmRsMcastAddrNs tDn="uni/infra/maddrns-multicast1"/>
</vmmCtrlrP>
</vmmDomP>
</vmmProvP>
Setting Up an Access Policy for a Blade Server Using the REST API
Procedure
Example:
POST: https://<ip or hostname APIC>/api/node/mo/uni.xml
<polUni>
<infraInfra>
<!-- Define LLDP CDP and LACP policies -->
<lldpIfPol name="enable_lldp" adminRxSt="enabled" adminTxSt="enabled"/>
<lldpIfPol name="disable_lldp" adminRxSt="disabled" adminTxSt="disabled"/>
<cdpIfPol name="enable_cdp" adminSt="enabled"/>
<cdpIfPol name="disable_cdp" adminSt="disabled"/>
<lacpLagPol name='enable_lacp' ctrl='15' descr='LACP' maxLinks='16' minLinks='1'
mode='active'/>
<lacpLagPol name='disable_lacp' mode='mac-pin'/>
<!-- List of nodes. Contains leaf selectors. Each leaf selector contains list of
node blocks -->
<infraNodeP name="leaf1">
<infraLeafS name="leaf1" type="range">
<infraNodeBlk name="leaf1" from_="1017" to_="1017"/>
</infraLeafS>
<infraRsAccPortP tDn="uni/infra/accportprof-portselector"/>
</infraNodeP>
<!-- PortP contains port selectors. Each port selector contains list of ports. It
also has association to port group policies -->
<infraAccPortP name="portselector">
<infraHPortS name="pselc" type="range">
<infraPortBlk name="blk" fromCard="1" toCard="1" fromPort="39" toPort="40">
</infraPortBlk>
<infraRsAccBaseGrp tDn="uni/infra/funcprof/accbundle-leaf1_PC"/>
</infraHPortS>
</infraAccPortP>
</infraInfra>
</polUni>
OUTPUT:
<?xml version="1.0" encoding="UTF-8"?>
<imdata></imdata>
Procedure
Example:
apic1# configure
apic1(config)#
Example:
apic1(config)# vlan-domain dom1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
apic1(config)#
Step 3 Add interfaces to this VLAN domain. These are the interfaces to be connected to VMware hypervisor uplink
ports:
Example:
apic1(config)# leaf 101-102
apic1(config-leaf)# interface ethernet 1/2-3
apic1(config-leaf-if)# vlan-domain member dom1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
Example:
apic1(config)# vmware-domain vmmdom1
apic1(config-vmware)# vlan-domain member dom1
apic1(config-vmware)#
Example:
apic1(config)# vmware-domain vmmdom1 delimiter @
Example:
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# exit
apic1(config-vmware)#
Example:
apic1(config-vmware)# vcenter 192.168.66.2 datacenter prodDC
apic1(config-vmware-vc)# username administrator
Password:
Retype password:
apic1(config-vmware-vc)# exit
apic1(config-vmware)# exit
apic1(config)# exit
Note When configuring the password, you must precede special characters such as '$' or '!' with a backslash
('\$') to avoid misinterpretation by the Bash shell. The escape backslash is necessary only when
configuring the password; the backslash does not appear in the actual password.
Step 7 Verify configuration:
Example:
apic1# show running-config vmware-domain vmmdom1
# Command: show running-config vmware-domain vmmdom1
# Time: Wed Sep 2 22:14:33 2015
vmware-domain vmmdom1
vlan-domain member dom1
vcenter 192.168.66.2 datacenter prodDC
username administrator password *****
configure-dvs
exit
exit
Creating a vCenter and a vShield Domain Profile Using the NX-OS Style CLI
Before You Begin
This section describes how to create a vCenter and vShield domain profile using the NX-OS CLI:
Procedure
Example:
apic1# configure
apic1(config)# exit
Step 2 Configure a VLAN domain as follows:
Example:
apic1(config)# vlan-domain dom1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
apic1(config)#
Step 3 Add interfaces to this VLAN domain. These are the interfaces to be connected to VMware hypervisor uplink
ports as follows:
Example:
apic1(config)# leaf 101-102
apic1(config-leaf)# interface ethernet 1/2-3
apic1(config-leaf-if)# vlan-domain member dom1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
apic1(config)#
Step 4 Create a VMware domain and add VLAN domain membership as follows:
Example:
apic1(config)# vmware-domain vmmdom1
apic1(config-vmware)# vlan-domain member dom1
apic1(config-vmware)#
Step 5 Configure the domain type to DVS as follows:
Example:
apic1(config-vmware)# configure-dvs
apic1(config-vmware-dvs)# exit
apic1(config-vmware)#
Step 6 Configure a vCenter controller in the domain as follows:
Example:
apic1(config-vmware)# vcenter 192.168.66.2 datacenter prodDC
apic1(config-vmware-vc)# username administrator password password
apic1(config-vmware-vc)#
Step 7 Configure a VShield controller attached to this VCenter, and configure vxlan and multicast address pools for
this VShield as follows:
Example:
apic1(config-vmware-vc)# vshield 123.4.5.6
apic1(config-vmware-vc-vs)# username administrator password "password"
apic1(config-vmware-vc-vs)# vxlan pool 10000-12000
apic1(config-vmware-vc-vs)# vxlan multicast-pool 224.3.4.5-224.5.6.7
apic1(config-vmware-vc-vs)# exit
apic1(config-vmware-vc)#
Step 8 Verify the configuration as follows:
Example:
apic1# show running-config vmware-domain vmmdom1
# Command: show running-config vmware-domain vmmdom1
# Time: Wed Sep 2 22:14:33 2015
vmware-domain vmmdom1
Microsegmentation with network-based attributes also is supported for bare-metal environments. See the
section "Using Microsegmentation with Network-based Attributes on Bare Metal" in the Cisco APIC Basic
Configuration Guide, Release 2.x
Microsegmentation with Cisco ACI also provides support for physical endpoints using EPGs with IP-based
attributes.
Note You can configure Microsegmentation with Cisco ACI for physical and virtual endpoints, and you can
share the same EPGs for both physical and virtual endpoints.
Note If you want to use an AVS or a Microsoft MAC-based EPG and any attribute other than IP for virtual end
points, you must not have any overlapping IP attribute filters for physical endpoints or virtual endpoints
on a VDS VMM domain. If you do so, the AVS or Microsoft microsegmentation EPG classification will
be overwritten.
Microsegmentation polices used by the Cisco AVS, VMware VDS and Microsoft vSwitch are centrally
managed by the Cisco Application Policy Infrastructure Controller (APIC) and enforced by the fabric. This
section assumes that you are familiar with EPGs, tenants, contracts, and other key concepts regarding ACI
policies. For more information, see Cisco Application Centric Infrastructure Fundamentals.
Example: Microsegmentation with Cisco ACI Within a Single EPG or Multiple EPGs in the Same Tenant
You might assign web servers to an EPG so that you can apply the similar policies. By default, all endpoints
within an EPG can freely communicate with each other. However, if this web EPG contains a mix of production
and development web servers, you might not want to allow communication between these different types of
web servers. Microsegmentation with Cisco ACI allows you to create a new EPG and autoassign endpoints
based on their VM name attribute, such as "Prod-xxxx" or "Dev-xxx".
Cisco APIC
1 The user configures a VMM domain for Cisco AVS, VMware VDS, or Microsoft vSwitch in the Cisco
APIC.
2 The Cisco APIC connects to vCenter or SCVMM and does the following:
a Creates an instance of Cisco AVS, VMware VDS, or Microsoft vSwitch.
b Pulls VM and hypervisor inventory information from the associated VMware vCenter or Microsoft
SCVMM.
3 The user creates an application EPG and associates it with a vCenter/SCVMM domain. In each
vCenter/SCVMM domain, a new encapsulation is allocated for this application EPG. The application EPG
does not have any attributes.
The vCenter/SCVMM administrator assigns virtual endpoints to this application EPGnot to any
microsegment (uSeg) EPGs. It is the application EPG that appears in vCenter/SCVMM as a port group.
4 The user creates an uSeg EPG and associates it with the VMM domain.
The uSeg EPG does not appear in vCenter/SCVMM as a port group; it has a special function: The uSeg
EPG has VM-based attributes to match filter criteria. If a match occurs between the uSeg EPG VM attributes
and VMs, the Cisco APIC dynamically assigns the VMs to the uSeg EPG.
The endpoints are transferred from the application EPG to the uSeg EPG. If the uSeg EPG is deleted, the
endpoints are assigned back to the application EPG.
The uSeg EPG must be assigned to a VMM domain in order for it to take effect. When you associate an
uSeg EPG to a VMM domain, its criteria will be applied for that VMM domain only. If you have VMware
VDS, you also must assign the uSeg EPG to the same bridge domain as the application EPG.
In the case of VMware VDS, its criteria will be applied for that VMM domain and bridge domain.
Network-Based Attributes
The network-based attributes are MAC Address Filter and IP Address Filter. You can apply one or more MAC
or IP addresses to an uSeg EPG.
For IP addresses, you simply specify the address or the subnet; for MAC addresses, you simply specify the
address. You do not specify an operator or any other information relating to the attribute.
VM-Based Attributes
You can apply multiple VM-based attributes to an uSeg EPG. The VM-based attributes are VMM Domain,
Operating System, Hypervisor Identifier, Datacenter, VM Identifier, VM Name, and VNic Dn (vNIC domain
name).
When you create any VM-based attribute, in addition to naming the attribute, you must do the following:
1 Specify the attribute type, such as VM Name or Hypervisor Identifier.
2 Specify the operator, such as Equals, or Starts With.
3 Specify the value, such as a particular vNIC or name of the operating system.
Custom Attribute
If you have Cisco AVS or VMware VDS, the Custom Attribute allows you to define an attribute based on
criteria not used in other attributes. For example, you might want to define a Custom Attribute called "Security
Zone" in vCenter and then associate this attribute to one or more VMs with such values as "DMZ" or "Edge."
The APIC administrator can then create an uSeg EPG based on that VM custom attribute.
Custom Attribute, which appears in the APIC GUI as a VM attribute that is configured on vCenter, is available
for Cisco AVS and VMware VDS only.
If you want to use Custom Attribute, you also need to add it in VMware vSphere Web Client. We recommend
doing so before configuring Microsegmentation with Cisco AVS in Cisco APIC so you can choose the Custom
Attribute in the drop-down list while configuring Microsegmentation policy in Cisco APIC. You can add the
Custom Attribute in vSphere Web Client after you configure Microsegmentation with Cisco AVS in Cisco
APIC; however, you won't see the Custom Attribute in the drop-down list in Cisco APIC, although you can
type the name in the text box.
See VMware vSphere ESXi and vCenter Server documentation for instructions for adding a Custom Attribute
in vSphere Web Client.
Precedence of Attributes
When there are multiple uSeg EPGs within a tenant, filtering rules are applied in a certain order based on the
attributes.
VM Identifier VM 4 VM-598
VM Name VM 5 HR_VDI_VM1
Datacenter VM 8 SJC-DC1
Note Precedence of MAC-based and IP-based attributes differ for VMware VDS and Cisco AVS/Microsoft
vSwitch.
Precedence of Operators
In addition to applying filtering rules based on attributes of uSeg EPGs within a tenant, Cisco APIC applies
filtering rules within VM-based attributes based on the operator type.
When you configure a microsegment with a VM-based attribute, you select one of four operators: Contains,
Ends With, Equals, or Starts With. Each operators specifies the string or value match for the specific attribute.
For example, you might want to create a microsegment with the VM Name attribute and want to filter for
VMs with names that start with "HR_VM" or VMs that contain "HR" anywhere in their name. Or you might
want to configure a microsegment for a specific VM and filter for the name "HR_VM_01."
Contains 2
Starts With 3
Ends With 4
Because the operator type Equals has precedence over the operator type Contains, the value VM_01_HR_PROD
is matched before the value VM_01_HR. So the VM named VM_01_HR_PROD will be put into microsegment
HR-VM-01-PROD because it is an exact criterion match and because the operator Equals has precedence
over the operator Contains, even though the VM name matches both microsegments. The other two VMs will
be put in the Microsegment CONTAIN-HR.
Using Microsegmentation with Cisco ACI with VMs Within a Single Application EPG
You can use Microsegmentation with Cisco ACI to create new, uSeg EPGs to contain VMs from a single
application EPG. By default, VMs within an application EPG can communicate with each other; however,
you might want to prevent communication between groups of VMs, if VRF is in enforced mode and there is
no contract between uSeg EPGs.
For more information about Intra-EPG Isolation knob, that controls communication between VMs within the
EPG, see Intra-EPG Isolation for VMware vDS, on page 75.
Example: Putting VMs from the Same Application EPG into a Microsegmented EPG
Your company deploys a virtual desktop infrastructure (VDI) for its Human Resources, Finance, and Operations
departments. The VDI virtual desktop VMs are part of a single application EPG called EPG_VDI with identical
access requirements to the rest of the application EPGs.
Service contracts are built in such a way such that the EPG-VDI has access to Internet resources and internal
resources. But at the same time, the company must ensure that each of the VM groupsHuman Resources,
Finance, and Operationscannot access the others even though they belong to the same application EPG,
EPG_VDI.
To meet this requirement, you can create filters in the Cisco APIC that would check the names of the VMs
in the application EPG, EPG_VDI. If you create a filter with the value "HR_VM," Cisco APIC creates a uSeg
EPGa microsegmentfor all Human Resource VMs. Cisco APIC looks for matching values in all the EPGs
in a tenant even though you want to group the matching VMs within one EPG. So when you create VMs, we
recommend that you choose names unique within the tenant.
Similarly, you can create filters with the keyword "FIN_VMs" for Finance virtual desktops and "OPS_VMs"
for Operations virtual desktops. These uSeg EPGs are represented as new EPGs within the Cisco APIC policy
model. You can then apply contracts and filters to control access between the VM groups even though they
belong to the same application EPG.
Figure 7: Microsegmentation with Cisco ACI with VMs from a Single Application EPG
In the illustration above, all the virtual desktop VMs from the Human Resources, Finance, and Operations
groups have been moved from the application EPG, EPG_VDI, to new, uSeg EPGs: EPG_OPS_MS,
EP_FIN_MS, and EPG_HR_MS. Each uSeg EPG has the attribute type VM Name with a value to match key
parts of the VM's name. EPG_OPS_MS has the value OPS_VM, so all VMs in the tenant containing OPS_VM
in their names become part of EPG_OPS_MS. The other uSeg EPGs have corresponding values, resulting in
the movement of VMs in the tenant with matching names to the uSeg EPGs.
Using Microsegmentation with Cisco ACI with VMs in Different Application EPGs
You can configure Microsegmentation with Cisco ACI to put VMs that belong to different application EPGs
into a new uSeg EPG. You might want to do this to apply policy to VMs that share a certain characteristic
although they belong to different application EPGs.
Example: Putting VMs in Different Application EPGs into a New uSeg EPG
Your company deploys a three-tier web application. The application is built on VMs that run different operating
systems and different versions of the same operating system. For example, the VMs might run Linux, Windows
2008, and Windows 2008 R2. The application is distributed; the company has divided the VMs into three
different EPGs: EPG_Web, EPG_App, and EPG_DB.
Because of a recent vulnerability in the Windows 2008 operating system, your company's security team
decided to quarantine VMs running Windows 2008 in case those VMs are compromised. The security team
also decided to upgrade all Windows 2008 VMs to Windows 2012. It also wants to microsegment all production
VMs across all EPGs and restrict external connectivity to those VMs.
To meet this requirement, you can configure a uSeg EPG in the Cisco APIC. The attribute would be Operating
System, and the value of the attribute would be Windows 2008.
You can now quarantine the VMs running Windows 2008 and upgrade them to Windows 2012. Once the
upgrade is complete, the VMs will no longer be part of the uSeg EPG you created for VMs running Windows
2008. This change will be reflected dynamically to Cisco APIC, and those virtual machines revert to their
original EPGs.
In the illustration above, the new uSeg EPG EPG_Windows has the attribute type Operating System and the
value Windows. The VMs App_VM_2, DB_VM_1, DB_VM_2, and Web_VM_2, run Windows as their
operating systemand so have been moved to the new uSeg EPG EPG_Windows. However, the VMs
App_VM_1, DB_VM_3, and Web_VM_1 run Linux and so remain in their application EPGs.
Note If VXLAN load balancing is enabled in the VMware vCenter domain profile, Microsegmentation with
Cisco ACI is not supported on the domain.
You must already have VMs with names that can be used with the filters that you will use when creating
the uSeg EPGs.
If you do not have VMs with names that can be used, you can go ahead and create the uSeg EPGs and
then change the VM names that can be used with the filters. Cisco APIC will automatically make the
VMs part of the new uSeg EPGs.
1 Create the uSeg EPG: Specify a name and bridge domain for the new uSeg EPG and choose a
network-based or VM-based attribute for the EPG.
Note For VMware VDS, you need to choose the same bridge domain for the new uSeg EPG
that is use by the application EPG. Otherwise, the VDS uSeg will not match VM attributes
or place the VM into the uSeg EPG.
2 Associate the new uSeg EPG with a VMM domain profile; you need to associate it with the same
VMM domain profile used by the application EPG.
4 Verify that the end points have moved from the application EPG to the uSeg EPG.
Follow the instructions for these steps in the Configuring Microsegmentation with Cisco ACI, on page 68
section in this guide.
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.
Note The procedure for configuring Microsegmentation for Cisco ACI is the same in Advanced mode and Basic
mode.
Procedure
Step 1 Log into the Cisco APIC, choosing Advanced or Basic mode.
Step 2 Choose TENANTS and then choose the tenant within which you want to create a microsegment.
Step 3 In the tenant navigation pane, expand the tenant folder, the Application Profiles folder, the profile folder,
and the Application EPGs folder.
Step 4 a) Open the folder for the application EPG.
b) Right-click on the folder Domains (VMs and Bare-Metals).
c) In the Add VMM Domain Association dialog box, check the Allow Micro-Segmentation check box.
If you are using VMware VDS, you also need to configure all the required parameters.
d) Click SUBMIT.
Step 5 In the tenant navigation pane, right-click the uSeg EPGs folder, and then choose Create Useg EPG.
Step 6 Complete the following series of steps to begin creation of an uSeg EPG for one of the groups of VMs:
a) In the Create uSeg EPG dialog box, in the Name field, enter a name.
We recommend that you choose a name that indicates that the new uSeg EPG is a microsegment.
b) In the intra-EPG isolation field, select enforced or unenforced.
If you select enforced, ACI prevents all communication between the endpoint devices within this uSeg
EPG.
c) In the Bridge Domain area, choose a bridge domain from the drop-down list.
Note For VMware VDS, you must choose the same bridge domain that is used for the application EPG.
Otherwise, the VDS uSeg will not match VM attributes and will not place the VM into a uSeg
EPG.
d) In the uSeg Attributes area, choose IP Address Filter, MAC Address Filter or VM Attributes Filter
from the + drop-down list on the right side of the dialog box.
Step 7 Complete one of the following series of steps to configure the filter.
A MAC-based
attribute 1 In the Create MAC Attribute dialog box, in the Name field, enter a name.
We recommend that you choose a name that reflects the filter's function.
2 In the MAC Address field, enter a MAC address.
3 Click OK.
4 In the Create uSeg EPG dialog box, click SUBMIT.
A VM-based
Attribute 1 In the Create VM Attribute dialog box, in the Name field, enter a name.
We recommend that you choose a name that reflects the filter's function.
2 In the Type area, choose one of the VM attribute types, from the drop-down list.
If you have a Cisco AVS or VMware VDS, you can choose any VM attribute type;
if you have a Microsoft vSwitch, you can choose any VM attribute type except
Custom Attribute.
3 In the Operator area, choose the appropriate operator from the drop-down list.
4 Enter or choose the appropriate value.
Note If you choose Equals as the operator, you type a value into a Value field
only if you chose VMM Domain or Datacenter as the VM attribute type.
Otherwise, you choose a value appropriate to the VM attribute type from
drop-down lists.
5 Click OK.
6 In the Create uSeg EPG dialog box, click SUBMIT.
Step 8 Complete the following steps to associate the uSeg EPG with a VMM domain.
a) In the navigation pane, ensure that the uSeg EPG folder is open and then open the container for the
microsegment that you just created.
b) Click the folder Domains (VMs and Bare-Metals).
c) On the right side of the work pane, click ACTIONS and then choose Add VMM Domain Association
from the drop-down list.
d) In the Add VMM Domain Association dialog box, choose a profile from the VMM Domain Profile
drop-down list.
If you have a Cisco AVS or VMware VDS, choose a VMware domain; if you have a Microsoft vSwitch,
choose a Microsoft domain.
Note You must choose the same domain that is used by the application
EPG.
e) In the Deploy Immediacy area, for Cisco AVS or Microsoft vSwitch; accept the default On Demand;
for VMware VDS, choose Immediate.
f) In the Resolution Immediacy area, accept the default Immediate.
g) In the Port Encap area, for Cisco AVS or Microsoft vSwitch, specify a static VLAN, or leave the field
empty and Cisco APIC will dynamically allocate a VLAN or VXLAN from the appropriate pool; for
VMware VDS, leave the field empty and the uSeg will inherit the encapsulation of the application EPG.
Note If you specify a static VLAN, you must choose one from a static encapsulation block within the
VLAN pool that you set up earlier. Static VLAN is available only for VLAN and not VXLAN.
h) Click SUBMIT.
Step 9 Repeat Step 5 through Step 8 for any other the other uSeg EPGs that you want to create.
What to Do Next
Verify that the uSeg EPG was created correctly.
If you configured a VM-based attribute, complete the following steps:
1 In the Cisco APIC navigation pane, click the new microsegment.
2 In the work pane, click the OPERATIONAL tab and then ensure that the Client End-Points tab is active.
3 In the work pane, verify that the VMs that you wanted to move from the application EPG appear as
endpoints for the new uSeg EPG.
If you configured an IP- or MAC-based attribute, make sure that traffic is running on the VMs that you put
into the new microsegments.
Procedure
Example:
apic1# configure
apic1(config)#
Step 2 Create the uSeg EPG:
Example:
Example:
This example uses a filter based on the attribute VM Name.
apic1(config)# tenant cli-ten1
apic1(config-tenant)# application cli-a1
apic1(config-tenant-app)# epg cli-uepg1 type micro-segmented
apic1(config-tenant-app-uepg)# bridge-domain member cli-bd1
apic1(config-tenant-app-uepg)# attribute cli-uepg-att match vm-name contains <cos1>
#Schemes to express the name
contains contains
endsWith ends-with
equals equals
startsWith starts-with
apic1(config-tenant-app-uepg)# {vmware-domain | microsoft-domain} member cli-vmm1
Example:
This example uses a filter based on an IP address.
apic1(config)# tenant cli-ten1
apic1(config-tenant)# application cli-a1
apic1(config-tenant-app)# epg cli-uepg1 type micro-segmented
apic1(config-tenant-app-uepg)# bridge-domain member cli-bd1
apic1(config-tenant-app-uepg)# attribute cli-upg-att match ip <X.X.X.X>
#Schemes to express the ip
A.B.C.D IP Address
A.B.C.D/LEN IP Address and mask
apic1(config-tenant-app-uepg)# {vmware-domain | microsoft-domain} member cli-vmm1
Example:
This example uses a filter based on a MAC address.
apic1(config)# tenant cli-ten1
apic1(config-tenant)# application cli-a1
apic1(config-tenant-app)# epg cli-uepg1 type micro-segmented
apic1(config-tenant-app-uepg)# bridge-domain member cli-bd1
apic1(config-tenant-app-uepg)# attribute cli-upg-att match mac <FF-FF-FF-FF-FF-FF>
#Schemes to express the mac
E.E.E MAC address (Option 1)
EE-EE-EE-EE-EE-EE MAC address (Option 2)
EE:EE:EE:EE:EE:EE MAC address (Option 3)
EEEE.EEEE.EEEE MAC address (Option 4)
apic1(config-tenant-app-uepg)# {vmware-domain | microsoft-domain} member cli-vmm1
Step 3 Verify the uSeg EPG creation:
Example:
apic1(config-tenant-app-uepg)# show running-config
# Command: show running-config tenant cli-ten1 application cli-app1 epg cli-uepg1 type
micro-segmented
# Time: Thu Oct 8 11:54:32 2015
tenant cli-ten1
application cli-app1
epg cli-esx1bu type micro-segmented
bridge-domain cli-bd1
attribute cli-uepg-att match vm-name equals cos1
{vmware-domain | microsoft-domain} member cli-vmm1
exit
exit
exit
Procedure
Example:
The following example configures a microsegment named 41-subnet using an IP-based attribute.
<polUni>
<fvTenant dn="uni/tn-User-T1" name="User-T1">
<fvAp dn="uni/tn-User-T1/ap-Application-EPG" name="Application-EPG">
<fvAEPg dn="uni/tn-User-T1/ap-Application-EPG/epg-41-subnet" name="41-subnet"
pcEnfPref="enforced isUsegEPg="yes" >
<fvRsBd tnFvBDName="BD1" />
<fvCrtrn name="Security1">
<fvIpAttr name="41-filter" ip="12.41.0.0/16"/>
</fvCrtrn>
<fvRsDomAtt tDn="uni/vmmp-Microsoft/dom-cli-vmm1"/> / <fvRsDomAtt
tDn="uni/vmmp-VMware/dom-cli-vmm1"/>
</fvAEPg>
</fvAp>
</fvTenant>
</polUni>
Example:
This example is for an application EPG.
<polUni>
<fvTenant dn="uni/tn-User-T1" name="User-T1">
<fvAp dn="uni/tn-User-T1/ap-Application-EPG" name="Application-EPG">
<fvAEPg dn="uni/tn-User-T1/ap-Application-EPG/applicationEPG name=applicationEPG
pcEnfPref="enforced >
<fvRsBd tnFvBDName="BD1" />
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-cli-vmm1" classPref=useg/>
</fvAEPg>
</fvAp>
</fvTenant>
</polUni>
In the example above, the string <fvRsDomAtt tDn="uni/vmmp-VMware/dom-cli-vmm1"
classPref=useg/> is relevant only for VMware VDS and not for Cisco AVS or Microsoft vSwitch.
Note When intra-EPG isolation is not enforced, the VLAN-pri value is ignored even if it is specified in the
configuration.
VLAN-pri/VLAN-sec pairs for the vDS switch are selected per VMM domain during the EPG-to-domain
association. The port group created for the intra-EPG isolation EPGs uses the VLAN-sec tagged with type
set to PVLAN. The vDS and fabric swap the VLAN-pri/VLAN-sec encapsulation:
Communication from the ACI fabric to the vDS switch uses VLAN-pri.
Communication from the vDS switch to the ACI fabric uses VLAN-sec.
Related Topics
For information on configuring intra-EPG isolation in a Cisco AVS environment, see Intra-EPG Isolation
Enforcement for Cisco AVS.
Step 1 In a tenant, right click on an Application Profile, and open the Create Application EPG dialog box to
perform the following actions:
a) In the Name field, add the EPG name (intra_EPG-deny).
b) For Intra EPG Isolation, click Enforced.
c) In the Bridge Domain field, choose the bridge domain from the drop-down list (bd1).
d) Associate the EPG with a bare metal/physical domain interface or with a VM Domain.
For the VM Domain case, check the Associate to VM Domain Profiles check box.
For the bare metal case, check the Statically Link with Leaves/Paths check box.
e) Click Next.
f) In the Step 2 for Specify the VM Domains area, expand Associate VM Domain Profiles and from the
drop-down list, choose the desired VMM domain. Click Update and click OK.
Step 2 In the Domains dialog box, perform the following actions:
a) In the Domain Profile field, choose a domain profile from the drop-down list (VMwarePVLAN).
For the static case, in the Port Encap (or Secondary VLAN for Micro-Seg) field, specify the secondary
VLAN (vlan-2005), and in the Primary VLAN for Micro-Seg field, specify the primary VLAN
(vlan-2006). If the Encap fields are left blank, values will be allocated dynamically.
Note For the static case, a static VLAN must be available in the VLAN
pool.
b) Choose a domain profile from the drop-down list (VMwareDVS).
c) Click Update.
d) Click Finish.
Configuring Intra-EPG Isolation for VMware vDS using the NX-OS Style CLI
Procedure
Example:
The VMM case is below.
apic1(config)# tenant Test_Isolation
apic1(config-tenant)# application PVLAN
apic1(config-tenant-app)# epg EPG1
apic1(config-tenant-app-epg)# show running-config
# Command: show running-config
tenant Test_Isolation
application PVLAN epg EPG1
tenant Test_Isolation
application PVLAN
epg EPG1
bridge-domain member VMM_BD
contract consumer VMware_vDS-Ext
contract consumer default
contract provider Isolate_EPG
vmware-domain member PVLAN encap vlan-2002 primary-encap vlan-2001 push on-demand
<--- Assigns static primary & secondary encap to EPG.
vmware-domain member mininet <--- If no static vlan assigned APIC assigns primary
& secondary encap for isolated EPG.
isolation enforce <---- This enables EPG isolation mode.
exit
exit
exit
Step 2 Verify the configuration:
Example:
show epg StaticEPG detail
Application EPg Data:
Tenant : Test_Isolation
Application : PVLAN
AEPg : StaticEPG
BD : VMM_BD
uSeg EPG : no
Intra EPG Isolation : enforced
Vlan Domains : VMM
Consumed Contracts : VMware_vDS-Ext
Provided Contracts : default,Isolate_EPG
Denied Contracts :
Qos Class : unspecified
Tag List :
VMM Domains:
Domain Type Deployment Immediacy Resolution Immediacy State
Encap Primary
Encap
-------------------- --------- -------------------- -------------------- --------------
---------- ----------
DVS1 VMware On Demand immediate formed
auto auto
Static Leaves:
Node Encap Deployment Immediacy Mode Modification Time
Static Paths:
Node Interface Encap Modification Time
Static Endpoints:
Node Interface Encap End Point MAC End Point IP Address
Modification Time
---------- ------------------------------ ---------------- -----------------
------------------------------ ------------------------------
Dynamic Endpoints:
Encap: (P):Primary VLAN, (S):Secondary VLAN
Node Interface Encap End Point MAC End Point IP Address
Modification Time
---------- ------------------------------ ---------------- -----------------
------------------------------ ------------------------------
1017 eth1/3 vlan-943(P) 00:50:56:B3:64:C4 ---
2016-02-17T18:35:32.224-08:00
vlan-944(S)
Configuring Intra-EPG Isolation for VMware vDS using the REST API
Before You Begin
Procedure
Step 1 Send this HTTP POST message to deploy the application using the XML API.
Example:
POST https://apic-ip-address/api/mo/uni/tn-ExampleCorp.xml
Step 2 For a VMware vDS VMM deployment, include this XML structure in the body of the POST message.
Example:
<fvTenant name="Tenant_VMM" >
<fvAp name="Web">
<fvAEPg name="IntraEPGDeny" pcEnfPref="enforced">
<!-- pcEnfPref="enforced" ENABLES ISOLATION-->
<fvRsBd tnFvBDName="bd" />
<fvRsPathAtt tDn="topology/pod-1/paths-1017/pathep-[eth1/2]" encap="vlan-51"
primaryEncap="vlan-100" instrImedcy='immediate'/>
<!-- STATIC ENCAP ASSOCIATION TO VMM DOMAIN-->
<fvRsDomAtt encap="vlan-2001" instrImedcy="lazy" primaryEncap="vlan-2002"
resImedcy="immediate" tDn="uni/vmmp-VMware/dom-DVS1>
</fvAEPg>
</fvAp>
</fvTenant>
Note Using intra-EPG isolation on a Cisco AVS microsegment (uSeg) EPG is not currently supported.
Communication will be possible between two endpoints that reside in separate uSeg EPGs if either has
intra-EPG isolation enforced, regardless of any contract that exists between the two EPGs.
Note This procedure assumes that you want to isolate endpoints within an EPG when you create the EPG. If
you want to isolate endpoints within an existing EPG, select the EPG in Cisco APIC, and in the Properties
pane, in the Intra EPG Isolation area, choose Enforced, and then click SUBMIT.
Procedure
What to Do Next
You can select statistics and view them to help diagnose problems involving the endpoint. See the sections
Choosing Statistics to View for Isolated Endpoints on Cisco AVS and Viewing Statistics for Isolated Endpoints
on Cisco AVS in this guide.
Configuring Intra-EPG Isolation for Cisco AVS Using the NX-OS Style CLI
Before You Begin
Make sure that Cisco AVS is in VXLAN mode.
Procedure
Example:
# Command: show running-config
tenant TENANT1
application APP1
epg EPG1
bridge-domain member VMM_BD
vmware-domain member VMMDOM1
isolation enforce <---- This enables EPG into isolation mode.
exit
exit
exit
What to Do Next
You can select statistics and view them to help diagnose problems involving the endpoint. See the sections
Choosing Statistics to View for Isolated Endpoints on Cisco AVS and Viewing Statistics for Isolated Endpoints
on Cisco AVS in this guide.
Configuring Intra-EPG Isolation for Cisco AVS Using the REST API
Before You Begin
Make sure that Cisco AVS is in VXLAN mode.
Procedure
Step 1 Send this HTTP POST message to deploy the application using the XML API.
Example:
POST
https://192.0.20.123/api/mo/uni/tn-ExampleCorp.xml
Step 2 For a VMM deployment, include the XML structure in the following example in the body of the POST
message.
Example:
Example:
<fvTenant name="Tenant_VMM" >
<fvAp name="Web">
<fvAEPg name="IntraEPGDeny" pcEnfPref="enforced">
<!-- pcEnfPref="enforced" ENABLES ISOLATION-->
<fvRsBd tnFvBDName="bd" />
<fvRsDomAtt encap="vlan-2001" tDn="uni/vmmp-VMware/dom-DVS1>
</fvAEPg>
</fvAp>
</fvTenant>
What to Do Next
You can select statistics and view them to help diagnose problems involving the endpoint. See the sections
Choosing Statistics to View for Isolated Endpoints on Cisco AVS and Viewing Statistics for Isolated Endpoints
on Cisco AVS in this guide.
Procedure
Procedure
Beginning with Cisco AVS Release 5.2(1)SV3(2.5), you can configure a single VMM domain in Local
Switching mode to use VLAN and VXLAN encapsulation. Previously, encapsulation was determined solely
by the presence of VLAN or multicast pools, and you needed to have separate VMM domains for EPGs using
VLAN and VXLAN encapsulation.
If you choose VLAN encapsulation, a range of VLANs must be available for use by the Cisco AVS. These
VLANs have local scope in that they have significance only within the Layer 2 network between the Cisco
AVS and the leaf. If you choose VXLAN encapsulation, only the infra-VLAN needs to be available between
the Cisco AVS and the leaf. This results in a simplified configuration and is the recommended encapsulation
type if there are one or more switches between the Cisco AVS and the physical leaf.
The following figure shows a topology that includes the Cisco AVS with the Cisco Application Policy
Infrastructure Controller (APIC) and VMware vCenter.
The following features are not supported for Cisco AVS with multipod in the Cisco APIC 2.0(1.x) release:
L3 Multicast
Storage vMotion with two separate NFS in two separate PODs
ERSPAN destination in different PODs
Distributed Firewall syslog server in different PODs
Required Software
The following table shows the versions of software you need to install for Cisco Application Virtual Switch
(AVS) to work with the Cisco Application Policy Infrastructure Controller (APIC), VMware vCenter, and
VMware ESXi hypervisor:
Component Description
Cisco AVS software Cisco AVS is supported in Release 4.2(1)SV2(2.3) and later releases.
However, Release 5.2(1)SV3(1.5) or later is required if you want to
use Distributed Firewall and Microsegmentation with Cisco AVS.
Cisco APIC See the Cisco AVS Release Notes for compatibility information.
However, version 1.1(1j) or later is required with Cisco AVS
5.2(1)SV3(1.5) or later if you want to use Distributed Firewall and
Microsegmentation with Cisco AVS.
VMware vCenter Cisco AVS is compatible with release 5.1, 5.5, 6.0, or 6.5 of VMware
vCenter Server.
VMware vSphere bare metal Cisco AVS is supported as a vLeaf for the Cisco APIC with release
5.1 and later releases of the VMware ESXi hypervisor.
Note When you choose a Cisco AVS VIB, you need to choose the
one compatible with the version of VMware ESXi hypervisor
that you use. ESXi 5.1 uses xxix.3.1.1.vib, ESXi 5.5 uses
xxix.3.2.1.vib, ESXi 6.0 uses xxxx.6.0.1.vib, and ESXi 6.5
uses xxxx.6.5.1.vib.
Cisco Virtual Switch Update Cisco AVS is supported in VSUM Release 1.0 and later releases.
Manager (VSUM)
Note You can connect a single ESX or ESXi host to only one Cisco AVS at a time. You cannot add multiple
Cisco AVS to a single ESX or ESXi host.
Using Cisco VSUM is the recommended method for installing the Cisco AVS. Using Cisco VSUM
validates the version and compatibility for the ESXi host, and in one procedure enables you to install the
Cisco AVS onto the ESXi host and add the ESXi host to the Cisco AVS distributed virtual switch (DVS).
See the section Installing the Cisco AVS Using Cisco VSUM in this guide for instructions for installing
the Cisco AVS using VSUM.
However, you can install Cisco AVS using the ESXi CLI or VMware Virtual Update Manager (VUM).
You might want to do so if you have one or few Cisco AVS. See the section Installing the Cisco AVS
Software Using the ESXi CLI, on page 120 in this guide or "Installing the Cisco AVS Software Using
VMware VUM" in the Cisco Application Virtual Switch Installation Guide for instructions.
3 Verify the Cisco AVS Installation.
You need to verify that the Cisco AVS has been installed on the VMware ESXi hypervisor by verifying
the virtual switch status and the virtual NIC status. You also need to verify that the vmknic is created, that
OpFlex is online, and that the ports are in a forwarding state.
See the section Verifying the Cisco AVS Installation in this guide for instructions.
4 Add hosts to the Cisco AVS.
Once you have installed the Cisco AVS, you can add hosts, one at a time, to it.
See the section Adding Cisco AVS Hosts to the DVS, on page 123 in this guide for instructions.
Alternate Procedures
If you need to configure a FEX profile or detailed interface, switch, or vCenter domain profiles, you can find
instructions in Appendix C, "Procedures for Creating Interface, Switch, and vCenter Domain Profiles" in the
Cisco Application Virtual Switch Installation Guide.
Firewall Considerations
If you use the recommended united configuration wizard, the Cisco APIC automatically creates a firewall
policy, which can be modified later. If you instead use the alternate procedures to create interface, switch, or
vCenter domain profiles, you will need to create a firewall policy manually. Follow the instructions in the
Distributed Firewall section of this guide.
The number of links and leafs that you use determine whether you need to configure a PC or a VPC
policy for the Cisco AVS:
If you are using a single link between a leaf and an ESXi host, you need to configure a PC policy.
If you are using multiple links between one leaf and an ESXi host, you must configure a PC policy.
If you are using multiple links between multiple leafs and an ESXi host, you must configure a
VPC policy.
Note VXLAN load balancing is enabled by default. However, to use it effectively, you need to configure
additional VMK NICs to match the number of PNICs.
Beginning with Cisco AVS Release 5.2(1)SV3(1.15), you can use IPv6 when creating a VMM domain,
provided that the vCenter and ESXi host management are IPv6-enabled.
Make sure that you have a sufficient number of VLAN IDs. If you do not, ports on endpoint groups (EPGs)
might report that no encapsulation is available.
If you want to change the switch mode on a Cisco AVS, you first must remove the existing DVS and then
add the VMware vCenter domain with the desired switching mode. For instructions on removing the existing
DVS, see Cisco Application Virtual Switch Configuration Guide.
vCenter must be installed, configured, and reachable through the in-band/out-of-band management network.
You must have the administrator/root credentials to the vCenter.
Note If you prefer not to use the vCenter administrator/root credentials, you can create a custom user account
with minimum required permissions. See Custom User Account with Minimum VMware vCenter
Privileges, on page 46 for a list of the required user privileges.
Creating Interface and Switch Profiles and a vCenter Domain Profile Using the Advanced GUI
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.
For information about using Advanced and Basic modes, see the Cisco APIC Getting Started Guide.
Note If you want to choose a delimiter for the VMware PortGroup name when you create a vCenter domain,
you cannot do so in this procedure, which uses the configuration wizard. Instead, you must create the
vCenter domain separately; the delimiter option appears in the Create vCenter Domain dialog box. See
the procedure "Creating a VMware vCenter Domain Profile" in the Cisco Application Virtual Switch
Installation Guide.
Procedure
The Configure Interfaces, PC, and VPC dialog box displays a wizard that enables you to configure
interface, switch, and vCenter domain profiles.
l) If you chose AVS VXLAN Hosts in Step 5 g, in the Pool of Multicast Address Ranges field, create a
new multicast pool or choose an existing one.
Note The multicast address configured in Step 5 l must not overlap with the ranges configured in Step
5 m.
m) If you chose AVS VXLAN Hosts in Step 5 g, in the Local Switching area, choose True or False.
With local switching, traffic within an endpoint group (EPG) does not go to the leaf, so if you choose local
switching, you might not see some traffic counters. If you want to see all intra-EPG traffic, you should
choose False. See the section Cisco AVS Overview for additional information about Local Switching and
No Local Switching modes.
n) (Optional) From the Security Domains drop-down list, choose or create a security domain.
o) In the vCenter Login Name field, enter the vCenter Administrator/root username.
p) In the Password field, enter the vCenter Administrator/root password.
q) In the Confirm Password field, reenter the password.
Step 6 Click the + icon to expand vCenter, and in the Create vCenter/vShield Controller dialog box, perform the
following actions:
a) In the Name field, enter a name to refer to the vCenter domain.
The name does not need to be the same as the vCenter domain name; you can use the vCenter host name.
b) In the Host Name (or IP Address) field, enter the host name or IP address.
If you use the host name, you must already have configured a DNS policy on Cisco APIC. If you do not
have a DNS policy configured, enter the IP address of the vCenter server.
c) From the DVS Version drop-down list, choose a DVS version.
The DVS version that you choose represents the minimum ESXi version of the host that can be added to
the virtual switch. So if you choose DVS version 5.1, you can add or manage hosts of ESXI version 5.1
and later.
d) In the Datacenter field, enter the data center name.
Note The name that you enter for Datacenter must match exactly the name in vCenter. The name is
case sensitive.
e) Click OK.
Note For the following three steps, if you do not specify port channel, vSwitch, or interface control
policies, the same interface policy that you configured earlier in this procedure will take effect
for the vSwitch.
f) From the Port Channel Mode drop-down list, choose a mode.
Choose MAC Pinning if you have a Unified Computing System (UCS) Fabric Interconnect (FI) between
the top-of-rack switch and the Cisco AVS.
g) In the vSwitch Policy area, choose a policy.
h) In the Interface Controls area, choose BPDU Guard, BPDU Filter, or both.
i) From the Firewall drop-down list, choose Learning, Enabled or Disabled mode.
Learning mode, the default, should be used only when upgrading from a version of Cisco AVS that does
not support Distributed Firewall to a version that does. Otherwise, Distributed Firewall should be in
Enabled mode.You can change the Distributed Firewall mode later. See the section Creating a Distributed
Firewall Policy or Changing its Mode Using the Advanced GUI in this guide for instructions.
Step 7 In the Configure Interface, PC, And VPC dialog box, click SAVE, click SAVE again, and then click
SUBMIT.
Step 8 Verify the new domain and profiles, by performing the following actions:
a) On the menu bar, choose VM Networking > Inventory.
b) In the navigation pane, expand VMware > Domain_name > Controllers, and then choose the vCenter.
In the work pane, under Properties, view the virtual machine manager (VMM) domain name to verify that
the controller is online. In the work pane, the vCenter properties are displayed including the operational status.
The displayed information confirms that connection from the APIC controller to the vCenter server is
established, and the inventory is available.
Procedure
The DVS version that you choose represents the minimum ESXi version of the host that can be added to the
virtual switch. So if you choose DVS version 5.1, you can add or manage hosts of ESXI version 5.1 and later.
Step 18 From the Firewall drop-down list, choose Learning, Enabled or Disabled mode.
Learning mode is used only when upgrading from a version of Cisco AVS that does not support Distributed
Firewall to a version that does. Otherwise, Distributed Firewall should be in Enabled mode.You can change
the Distributed Firewall mode later. See the section Creating a Distributed Firewall Policy or Changing its
Mode Using the Advanced GUI in this guide for instructions.
Configuring vSwitch Override Policies on the VMM Domain Using the Advanced GUI
Before installing Cisco AVS, you can use the configuration wizard to create a VMware vCenter profile and
create interface policy group policies for Cisco AVS. You also can create vSwitch policies that override the
interface policy group policies and apply a different policy for the leaf.
However, if you did not use the configuration wizardor if you used the configuration wizard but did not
configure a vSwitch override policyyou can configure a vSwitch override policy by following the procedure
in this section.
Note In Cisco AVS 5.2(1)SV3(1.10), you cannot create a Distributed Firewall policy on the vSwitch using the
configuration wizard. See the section Configuring Distributed Firewall in this guide for instructions for
configuring a Distributed Firewall policy and associating it to the VMM domain.
Note Previously, you could configure a vSwitch override policy through the Fabric tab as well as the VM
Networking tab. Override policies configured through the VM Networking took precedence. However,
any override policy configured through the Fabric tab stands until it is reconfigured through the VM
Networking tab.
Procedure
What to Do Next
Verify that the policies are in effect on Cisco AVS.
Procedure
Example:
Configuring a VLAN domain with static allocation:
apic1# configure
apic1(config)# vlan-domain cli-vdom1
apic1(config-vlan)# vlan 101-200
Example:
Configuring a VLAN domain with dynamic allocation:
apic1# configure
apic1(config)# vlan-domain cli-vdom1 dynamic
apic1(config-vlan)# vlan 101-200 dynamic
Procedure
Example:
apic1# config
apic1(config)# template port-channel cli-pc1
apic1(config-if)# channel-mode active
apic1(config-if)# vlan-domain member cli-vdom1
Procedure
Example:
apic1# config
apic1(config)# vpc domain explicit 10 leaf 101 102
Procedure
Example:
apic1# config
apic1(config)# leaf 101 102
apic1(config-leaf)# interface ethernet 1/3
apic1(config-leaf-if)# channel-group cli-pc1 vpc
Creating a VMM Domain with Local Switching or No Local Switching Using the NX-OS Style CLI
Procedure
Example:
apic1(config)# vmware-domain cli-vmm1 delimiter=@
apic1(config-vmware)# vlan-domain member cli-vdom1
apic1(config-vmware)# vcenter 10.193.218.223 datacenter dc1 dvs-version 5.1
apic1(config-vmware-vc)# username root
Password:
Retype password:
apic1(config-vmware-vc)#
apic1(config-vmware)# configure-avs
apic1(config-vmware-avs)# switching mode vlan
<or>
apic1(config-vmware-avs)# switching mode vxlan-ns
apic1(config-vmware-avs)# multicast-address 226.0.0.1
apic1(config-vmware-avs)# vxlan multicast-pool 226.0.0.11-226.0.0.20
If the ESXi host version is not compatible with the existing DVS version, vCenter will not be able to
add the ESXi host to the DVS, and an incompatibility error will occur. Modification of the existing DVS
Version setting from the Cisco APIC is not possible. To lower the DVS Version in the vCenter, you
need to remove and reapply the VMM domain configuration with a lower setting.
Important If you have ESXi 6.5 hosts running UCS B-Series or C-Series server with VIC cards, some of the vmnics
may go down on a port state event, such as a link flap or a TOR reload. To prevent this problem, do not
use the default eNIC driver but install it from the Web site: https://cspg-releng.cisco.com/vic/blade/3.1.3/
Drivers/VMware/Network/Cisco/VIC/ESXi_6.5/.
Procedure
Step 4 Choose a one or more hosts by clicking the appropriate check box or check boxes.
Step 5 In the Actions area of the work pane, perform one of the following actions from the AVS version drop-down
list:
Choose the version of Cisco AVS to be installed on the selected hosts; you see versions in the drop-down
list if you previously uploaded a Cisco AVS version to vCenter.
Choose Upload a new AVS version to open a dialog box enabling you to upload a new Cisco AVS
package from the VIB file on your local computer to vCenter.
Step 6 In the Concurrent Tasks drop-down, if you chose multiple hosts in Step 4, choose how many hosts on which
to install Cisco AVS at the same time.
You can choose up to 10 hosts on which to install Cisco AVS at the same time. If you choose multiple hosts
but do not choose a number from the Concurrent Tasks drop-down list, the default value of 2 will apply.
What to Do Next
Verify the Cisco AVS installation. See Verifying the Cisco AVS Installation in this guide for instructions.
Note The procedure installs the VIB on the host; however, the host still needs to be manually connected to the
switch.
Note When you install Cisco VSUM, you must use the same credentials that you use to install
the thick client.
Procedure
Step 3 Choose the host on which to deploy the Cisco VSUM OVA.
Step 5 In the Deploy OVF Template wizard, complete the information as described in the following table.
Pane Action
1a Select source Choose the Cisco VSUM OVA.
Pane Action
1b Review details Review the details.
Pane Action
2a Select name and Enter a name and choose a location for the appliance.
folder
2b Select a resource Choose the host or cluster to run the OVA template.
Pane Action
2c Select storage Choose the data store for the VM.
Choose either Thin provisioned format or Thick provisioned format to store the
VM virtual disks.
We recommend that you store the VM virtual disks in the Thick provisioned
format.
2d Setup networks Choose the destination network for the VM that is reachable from the vCenter
Server.
Pane Action
2e Customize template Provide the following information:
Management IP address
Subnet mask
Gateway IP address
DNS server IP address
DNS entry to resolve the fully qualified domain name (FQDN)
vCenter IP or FQDN
vCenter username
vCenter password
HTTP cleartext port and HTTPS port
Pane Action
3 Ready to complete Review the deployment settings.
Caution Any discrepancies can cause VM booting issues. Carefully review the
IP address, subnet mask, gateway information, and vCenter credentials.
If the Web Client session was open during the installation, you must log out and log in again to view the Cisco
VSUM plug-in.
Attention You must download the Cisco AVS .zip image folder before starting the upload operation.
Procedure
Step 3 In the Cisco Virtual Switch Update Manager pane, choose AVS > Upload.
Step 5 In the Virtual Switch Image File Uploader window, click Browse, choose the appropriate image folder
available on your local machine, and then click Upload.
Step 6 In the dialog box telling you that the .zip image folder was successfully uploaded, click OK.
Step 7 You can confirm the upload in the Manage Uploaded switch Images pane.
What to Do Next
Install Cisco AVS as described in the remaining procedures in this chapter.
Procedure
Step 3 In the Cisco Virtual Switch Update Manager pane, choose AVS > Configure, choose a data center, choose
the Cisco AVS, and then click Manage.
You choose the Cisco AVS from the Choose an associated Distributed Virtual Switch area.
Step 4 In the switch pane, choose Cisco AVS > Add Host-AVS.
The PNIC Selection area displays the available uplinks for each host.
e) In the PNIC Selection area, choose the PNIC or PNICs to be added to the Cisco AVS.
The task console appears in the work pane, displaying a list of tasks with the most recent task at the top.
c) Find the task in the Task Name column and then view the status in the Status column.
The Status column shows whether the task is complete or in progress.
Note Several tasks might appear above the primary task you just performed. They might be associated
with your primary task.
The host addition is confirmed when the primary task Add hosts to Cisco DVS has the
status Completed.
If you close the browser and later want to view the task's history, log in to the VMware vSphere Web Client,
and click Tasks in the navigation pane to display the lists of tasks in the work pane.
What to Do Next
Verify the Cisco AVS installation. See Verifying the Cisco AVS Installation in this guide for instructions.
Procedure
Example:
esxhost# copy scp://username@server/path/cisco-vem-v165-esx.vib root@host:/tmp
Step 4 esxcli software vib list | grep cisco
Locate the VIB on the ESXi hypervisor.
Note If there is an existing VIB file on the host, remove it by using the esxcli software remove command.
Example:
esxhost# esxcli software vib list | grep cisco
cisco-vem-v164-esx 5.2.1.2.2.0.88-3.1.74 Cisco PartnerSupported
2014-03-31
Step 5 esxcli software vib install -v absolute path to the image
Install the VIB on the ESXi hypervisor.
Example:
esxhost# esxcli software vib install -v /tmp/cross_cisco-vem-v165-4.2.1.2.2.2.473-3.1.165.vib
Installation Result
Message: Operation finished successfully.
Reboot Required: false
VIBs Installed: cisco-vem-v164-esx_5.2.1.2.2.0.88-3.1.74
VIBs Removed:
VIBs Skipped:
esxhost#
Note At this point, you might see the following error message:
[InstallationError]
Error in running rm /tardisks/cisco_ve.v00:
Return code: 1
Output: rm: can't remove '/tardisks/cisco_ve.v00': Device or
resource busy
It is not safe to continue. Please reboot the host immediately to
discard the unfinished update.
Please refer to the log file for more details.
This message occurs if the host was already added to the Cisco AVS in the vCenter. The solution is
to log in to VMware vSphere Web Client and in the vCenter remove the vmk1 under the distributed
switch.
Step 6 vemcmd show version
Displays the VIB version.
Example:
esxhost# vemcmd show version
Running esx version -799733 x86_64
VEM Version: 5.2.1.2.2.0.88-3.1.74
VSM Version:
System Version: VMware ESXi 5.1.0 Releasebuild-799733
esxhost#
Procedure
The VDS Status and Status fields display the virtual switch status. The VDS status should be Up to indicate
that OpFlex communication has been established.
Procedure
Note If you installed the Cisco AVS by using the Cisco VSUM, you do not need to perform this procedure;
VSUM adds hosts to the DVS at the same time that it installs the Cisco AVS. However, you do need to
perform this procedure if you upgraded Cisco AVS by using the CLI or the VMware VUM.
Procedure
Procedure
What to Do Next
If you are uninstalling the Cisco AVS but not removing all configuration from the Cisco ACI fabric, you can
remove the VIB software from each host where it was installed. You can do so by completing one of the
following tasks:
Enter the following vSphere CLI command to remove the VIB software from a host: esxcli software
vib remove -n installed_vem_version
Complete the procedure in the section "Uninstalling Cisco AVS Using the VMware vCenter Plug-in"
in this guide.
Procedure
Step 4 Choose a one or more hosts by clicking the appropriate check box or check boxes.
Step 5 In the Concurrent Tasks drop-down, if you chose multiple hosts in Step 4, choose how many hosts on which
to uninstall Cisco AVS at the same time.
You can choose up to 10 hosts on which to uninstall Cisco AVS at the same time. If you choose multiple
hosts but do not choose a number from the Concurrent Tasks drop-down list, Cisco AVS will be uninstalled
on the hosts one after another.
What to Do Next
Take the following optional steps to remove from vCenter the version of Cisco AVS you just uninstalled:
1 Click Remove uploaded versions.
2 In the Select the AVS versions you wish to remove from vCenter dialog box, click the appropriate
check box and then click OK.
Workflow for Key Post-Installation Configuration Tasks for the Cisco AVS
This section provides a high-level description of the tasks that you need to perform in the correct sequence
in order to configure Cisco AVS.
1 Deploy an application profile.
a Create a tenant.
A tenant is a logical container for application policies that enable an administrator to exercise
domain-based access control. Tenants can represent a customer in a service provider setting, an
organization or domain in an enterprise setting, or just a convenient grouping of policies.
The fabric can contain multiple tenants. Tenants can be isolated from one another or can share resources.
The primary elements that the tenant contains are filters, contracts, outside networks, bridge domains,
contexts, and application profiles that contain endpoint groups (EPGs). Entities in the tenant inherit
its policies.
You must configure a tenant before you can deploy any Layer 4 to Layer 7 services.
See the section Creating a Tenant, VRF, and Bridge Domain Using the Advanced GUI in this guide
for instructions for creating tenants.
b Create an application profile.
An application profile models application requirements. An application profile is a convenient logical
container for grouping EPGs.
Modern applications contain multiple components. For example, an e-commerce application could
require a web server, a database server, data located in a storage area network, and access to outside
resources that enable financial transactions. The application profile contains as many (or as few) EPGs
as necessary that are logically related to providing the capabilities of an application.
See the section Creating an Application Profile Using the GUI in this guide for instructions for creating
an application profile.
c Create an endpoint group (EPG)
Endpoints are devices that are connected to the network directly or indirectly. They have an address
(identity), a location, attributes (such as version or patch level), and can be physical or virtual. Endpoint
examples include servers, virtual machines, network-attached storage, or clients on the Internet.
An EPG is a named logical entity that contains a collection of endpoints that have common policy
requirements such as security, virtual machine mobility, QoS, or Layer 4 to Layer 7 services. EPGs
enable you to manage endpoints as a group rather than having to configure and manage them
individually; endpoints in an EPG have the same configuration and changes to EPG configuration are
propagated automatically to all the endpoints assigned to it. In vCenter Server, an EPG is represented
as a port group.
See the section Creating EPGs Using the GUI in this guide for instructions for creating EPGs.
d Assign port groups to virtual machines (VMs) in vCenter.
In vCenter Server, an EPG is represented as a port group. The virtual Ethernet (vEth) interfaces are
assigned in vCenter Server to an EPG in order to do the following:
Define the port configuration by the policy.
Apply a single policy across a large number of ports.
EPGs that are configured as uplinks can be assigned by the server administrator to physical ports (which
can be vmnics or PNICs). EPGs that are not configured as uplinks can be assigned to a VM virtual
port.
See the section Assigning Port Groups to the VM in vCenter in this guide for instructions.
e Create filters.
A filter is a managed object that helps enable mixing and matching among EPGs and contracts so as
to satisfy various applications or service delivery requirements. It specifies the data protocols to be
allowed or denied by a contractrules for communications between EPGsthat contains the filter.
See the section Creating a Filter Using the GUI in this guide for instructions.
f Create contracts.
Contracts are policies that enable communications between EPGs. An administrator uses a contract to
select the type(s) of traffic that can pass between EPGs, including the protocols and ports allowed. If
there is no contract, inter-EPG communication is disabled by default. No contract is required for
communication within an EPG; communication within an EPG is always implicitly allowed.
Contracts govern the communication between EPGs that are labeled providers, consumers, or both.
An EPG can both provide and consume the same contract. An EPG can also provide and consume
multiple contracts simultaneously.
See the section Creating a Contract Using the GUI in this guide for instructions.
See the section Verifying the Application Profile and EPGs in the GUI in this guide for instructions.
3 Configure an IPv4 or IPv6 address
To configure an IP address for VMs connected to Cisco AVS, you assign an IPv4 or IPv6 addressor
both an IPV4 and IPv6 addressfor the VM and then assign a gateway address.
See the section Configuring an IP Address for VMs Connected to Cisco AVS in this guide for instructions.
4 Configure an IGMP querier under the infra BD subnet.
In order for Cisco AVS to forward multi-destination trafficespecially when traffic goes through a blade
switchyou should configure an IGMP querier under the infra BD subnet. This enables devices to build
their Layer 2 multicast tree.
See the section "Configuring IGMP Querier and Snooping" in the Cisco AVS Configuration Guide for
instructions.
5 (Optional but recommended) Enable Distributed Firewall.
After you install or upgrade to Cisco AVS Release 5.2(1)SV3(1.5), you need to enable Distributed Firewall
if you want to use the feature. Distributed Firewall is in Learning mode by default. Follow the instructions
in Creating a Distributed Firewall Policy or Changing its Mode Using the Advanced GUI in this guide to
enable Distributed Firewall.
Deploying an Application Profile for Cisco AVS Using the Advanced GUI
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.
Creating a Tenant, VRF, and Bridge Domain Using the Advanced GUI
If you have a public subnet when you configure the routed outside, you must associate the bridge domain
with the outside configuration.
Procedure
Procedure
Step 1 On the menu bar, choose TENANTS. In the Navigation pane, expand the tenant, right-click Application
Profiles, and click Create Application Profile.
Step 2 In the Create Application Profile dialog box, in the Name field, add the application profile name (OnlineStore).
Procedure
Step 1 On the menu bar, choose Tenants and the tenant where you want to create an EPG.
Step 2 In the navigation pane, expand the folder for the tenant, the Application Profiles folder, and the folder for
the application profile.
Step 3 Right-click the Application EPG folder, and in the Create Application EPG dialog box, perform the following
actions:
a) In the Name field, add the EPG name (db).
b) In the Bridge Domain field, choose the bridge domain from the drop-down list (bd1).
c) Check the Associate to VM Domain Profiles check box. Click Next.
d) In the Step 2 for Specify the VM Domains area, expand Associate VM Domain Profiles and from the
drop-down list, choose the desired VMM domain.
e) (Optional) In the Delimiter field, enter one of the following symbols: |, ~, !, @, ^, +, or =.
If you do not enter a symbol, the system will use the default | delimiter in the VMware portgroup name.
f) If you have Cisco AVS, from the Encap Mode drop-down list, choose an encapsulation mode.
You can choose one of the following encap modes:
VXLANThis overrides the domain's VLAN configuration, and the EPG will use VXLAN
encapsulation. However, a fault will be triggered for the EPG if a multicast pool is not configured
on the domain.
VLANThis overrides the domain's VXLAN configuration, and the EPG will use VLAN
encapsulation. However, a fault will be triggered for the EPG if a VLAN pool is not configured on
the domain.
AutoThis causes the EPG to use the same encapsulation mode as the VMM domain. This is the
default configuration.
Creating VLAN Pools with Encapsulation Blocks Using the Advanced GUI
You can create VLAN pools to associate with a VMM domain or with EPGs, either application EPGs or
microsegments.
Procedure
Procedure
Procedure
Step 1 On the menu bar, choose TENANTS. In the Navigation pane, expand the tenant > Security Policies,
right-click Filters, and click Create Filter.
Note In the Navigation pane, you expand the tenant where you want to add filters.
Step 2 In the Create Filter dialog box, perform the following actions:
a) In the Name field, enter the filter name (http).
b) Expand Entries, and in the Name field, enter the name (Dport-80).
c) From the EtherType drop-down list, choose the EtherType (IP).
d) From the IP Protocol drop-down list, choose the protocol (tcp).
e) From the Destination Port/Range drop-down lists, choose http in the From and To fields. (http)
f) Click Update, and click Submit.
The newly added filter appears in the Navigation pane and in the Work pane.
Step 3 Expand Entries in the Name field. Follow the same process to add another entry with HTTPS as the
Destination port, and click Update.
This new filter rule is added.
Procedure
Step 1 On the menu bar, choose TENANTS and the tenant name on which you want to operate. In the Navigation
pane, expand the tenant > Security Policies.
Step 2 Right-click Contracts > Create Contract.
Step 3 In the Create Contract dialog box, perform the following tasks:
a) In the Name field, enter the contract name (web).
b) Click the + sign next to Subjects to add a new subject.
c) In the Create Contract Subject dialog box, enter a subject name in the Name field. (web)
d) Note This step associates the filters created that were earlier with the contract subject.
In the Filter Chain area, click the + sign next to Filters.
e) In the dialog box, from the drop-down menu, choose the filter name (http), and click Update.
Step 4 In the Create Contract Subject dialog box, click OK.
Deploying an Application Profile for Cisco AVS Using the Basic GUI
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.
Creating a Tenant, VRF, and Bridge Domain Using the Basic GUI
Procedure
Step 1 Log in to the Basic Mode in the APIC GUI, and on the menu bar, click TENANT > Add Tenant.
Step 2 In the Create Tenant dialog box, perform the following tasks:
a) In the Name field, enter a name.
b) Click the Security Domains + icon to open the Create Security Domain dialog box.
c) In the Name field, enter a name for the security domain. Click Submit.
d) In the Create Tenant dialog box, check the check box for the security domain that you created, and click
Submit.
Step 3 In the Navigation pane, expand Tenant-name > Networking, drag the VRF icon to the canvas to open the
Create VRF dialog box, and perform the following tasks:
a) In the Name field, enter a name.
b) Click Submit to complete the VRF configuration.
Step 4 In the Networking pane, drag the BD icon to the canvas while connecting it to the VRF icon. In the Create
Bridge Domain dialog box that displays, perform the following tasks:
a) In the Name field, enter a name.
b) Expand Subnets to open the Create Subnet dialog box, enter the subnet mask in the Gateway IP field
and click OK.
c) Click Submit to complete bridge domain configuration.
Step 5 In the Networking pane, drag the L3 icon down to the canvas while connecting it to the VRF icon. In the
Create Routed Outside dialog box that displays, perform the following tasks:
a) In the Node ID field, enter a node ID.
b) In the Router ID field, enter the router ID.
c) Expand Static Routes and enter the IPv4 or IPv6 addresses in the IP Address and the Next Hop IP fields
and click Update.
Note The gateway IPv6 address must be a global unicast IPv6
address.
d) Click the Protocols box and select BGP, OSPF, and EIGRP for configuration as desired.
e) Click OK and then click Submit to complete Layer 3 configuration.
To confirm L3 configuration, in the Navigation pane, expand VRFs > VRF name > Deployed VRFs.
Procedure
Step 7 From the Drag and drop to configure toolbar, drag and drop Contract, and it auto connects as the provider
EPG the consumer EPG as the user desires and drags. The relationship is displayed with arrows.
The Config Contract With L4-L7 Service Graph dialog box is displayed with the selected details auto
populated. and the provider and consumer contracts associated.
a) In the Contract Name field, enter a contract name. Click OK.
b) In the No Filter field, uncheck the check box to create a customized filter.
Note A default filter will be auto created if you do not uncheck the check
box.
c) (Optional) To create a customized filter, enter the appropriate information in the Filter Entries fields as
desired. Click OK.
Step 8 In the Application Profile Work pane, click Submit.
This completes the steps for deploying an application profile.
Deploying an Application Profile for Cisco AVS Using the NX-OS CLI
Creating a Tenant, VRF, and Bridge Domain Using the NX-OS Style CLI
This section provides information on how to create tenants, VRFs, and bridge domains.
Note Before creating the tenant configuration, you must create a VLAN domain using the vlan-domain command
and assign the ports to it.
Procedure
Step 1 Create a VLAN domain (which contains a set of VLANs that are allowable in a set of ports) and allocate
VLAN inputs, as follows:
Example:
In the following example ("exampleCorp"), note that VLANs 50 - 500 are allocated.
apic1# configure
apic1(config)# vlan-domain dom_exampleCorp
apic1(config-vlan)# vlan 50-500
apic1(config-vlan)# exit
Step 2 Once the VLANs have been allocated, specify the leaf (switch) and interface for which these VLANs can be
used. Then, enter "vlan-domain member" and then the name of the domain you just created.
Example:
In the following example, these VLANs (50 - 500) have been enabled on leaf 101 on interface ethernet 1/2-4
(three ports including 1/2, 1/3, and 1/4). This means that if you are using this interface, you can use VLANS
50-500 on this port for any application that the VLAN can be used for.
apic1(config-vlan)# leaf 101
apic1(config-vlan)# interface ethernet 1/2-4
apic1(config-leaf-if)# vlan-domain member dom_exampleCorp
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
Step 3 Create a tenant in global configuration mode, as shown in the following example:
Example:
Example:
Example:
apic1(config-tenant)# bridge-domain exampleCorp_b1
apic1(config-tenant-bd)# vrf member exampleCorp_v1
apic1(config-tenant-bd)# exit
Note In this case, the VRF is
"exampleCorp_v1".
Step 6 Allocate IP addresses for the BD (ip and ipv6), as shown in the following example.
Example:
apic1(config-tenant)# interface bridge-domain exampleCorp_b1
apic1(config-tenant-interface)# ip address 172.1.1.1/24
apic1(config-tenant-interface)# ipv6 address 2001:1:1::1/64
apic1(config-tenant-interface)# exit
What to Do Next
The next section describes how to add an application profile, create an application endpoint group (EPG), and
associate the EPG to the bridge domain.
Related Topics
Configuring a VLAN Domain Using the NX-OS Style CLI
Creating an Application Profile and EPG Using the NX-OS Style CLI
Before You Begin
Before you can create an application profile and an application endpoint group (EPG), you must create a
VLAN domain, tenant, VRF, and BD (as described in the previous section).
Procedure
Example:
apic1(config)# tenant exampleCorp
apic1(config-tenant)# application exampleCorp_web1
Step 2 Create an EPG under the application, as shown in the following example ("exampleCorp_webepg1"):
Example:
apic1(config-tenant-app)# epg exampleCorp_webepg1
Example:
apic1(config-tenant-app-epg)# bridge-domain member exampleCorp_b1
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# exit
apic1(config-tenant)# exit
Note Every EPG belongs to a BD. An EPG can belong to a BD from the same tenant (or) from tenant
Common. If you look at the chain, the lowest end is the EPG, and above that is the BD. The BD
belongs to a VRF, and the VRF belongs to the tenant.
What to Do Next
These examples have shown how to configure an application EPG on a tenant. The next section discusses
how to map a VLAN on a port to the EPG.
Creating VLAN Pools with Encapsulation Blocks Using the NX-OS Style CLI
Procedure
Example:
apic1# config
apic1(config)# vlan-domain AVS-DOM2 dynamic
or
apic1# config
apic1(config)# vlan-domain AVS-DOM2
Static VLAN pool is the default; you must add the keyword dynamic to the command if you want to create a
dynamic VLAN pool.
Example:
apic1(config-vlan)# vlan 1071-1075 dynamic
or
apic1(config-vlan)# vlan 1071-1075
Static allocation is the default; you must add the keyword dynamic to the command if you want to create a
dynamic allocation block.
Example:
apic1(config-vlan)# vlan 1076-1080,1091 dynamic
scale-apic1(config-vlan)#
apic1(config-vlan)# exit
or
apic1(config-vlan)# vlan 1076-1080,1091
scale-apic1(config-vlan)#
apic1(config-vlan)# exit
Allocation is static by default; to allocate dynamic encapsulation, you need to add the keyword dynamic to
the command.
Note Static VLAN pools cannot contain dynamic encapsulation blocks; however, dynamic VLAN pools
can contain static and dynamic encapsulation blocks.
Step 4 Associate the VLAN pool to the VMM domain.
Example:
apic1(config)# vmware-domain AVS-DOM2
apic1(config-vmware)# vlan-domain member AVS-DOM2
apic1(config-vmware)# exit
apic1(config)# exit
apic1#
apic1# show vlan-domain
Step 5 Verify that the VLAN pool was defined.
apic1# show vlan-domain name AVS-DOM2
Legend:
vlanscope: L (Portlocal). Default is global
scale-apic1#
Procedure
Step 1 To get into the configuration mode using the NX-OS CLI, enter the following:
Example:
apic1#configure
apic1(config)#
Step 2 Create an application network profile for the tenant.
The application network profile in this example is OnlineStore.
Example:
apic1(config)# tenant exampleCorp
apic1(config-tenant)# application OnlineStore
apic1(config-tenant-app)#
Step 3 Create application web, db, and app EPGs for this application network profile of the tenant.
Example:
apic1(config-tenant-app)# epg web
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# epg db
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# epg app
apic1(config-tenant-app-epg)# exit
Step 4 Get back into the tenant mode to create an access list (filter) for different traffic types between these EPGs.
Example:
apic1(config-tenant-app)# exit
Step 5 Create an access list (filter) for the http and https traffic.
Example:
apic1(config-tenant)# access-list http
apic1(config-tenant-acl)# match tcp dest 80
apic1(config-tenant-acl)# match tcp dest 443
apic1(config-tenant-acl)# exit
Step 6 Create an access list (filter) for Remote Method Invocation (RMI) traffic.
Example:
apic1(config-tenant)# access-list rmi
apic1(config-tenant-acl)# match tcp dest 1099
apic1(config-tenant-acl)# exit
Step 7 Create an access list (filter) for the SQL/database traffic.
Example:
apic1(config-tenant)# access-list sql
apic1(config-tenant-acl)# match tcp dest 1521
apic1(config-tenant)# exit
Step 8 Create the contracts and assign an access group (filters) for RMI traffic between EPGs.
Example:
apic1(config)# tenant exampleCorp
apic1(config-tenant)# contract rmi
apic1(config-tenant-contract)# subject rmi
apic1(config-tenant-contract-subj)# access-group rmi both
apic1(config-tenant-contract-subj)# exit
apic1(config-tenant-contract)# exit
Step 9 Create the contracts and assign an access group (filters) for web traffic between EPGs.
Example:
apic1(config-tenant)# contract web
apic1(config-tenant-contract)# subject web
apic1(config-tenant-contract-subj)# access-group http both
apic1(config-tenant-contract-subj)# exit
Step 10 Create the contracts and assign an access group (filters) for SQL traffic between EPGs.
Example:
apic1(config-tenant)# contract sql
apic1(config-tenant-contract)# subject sql
apic1(config-tenant-contract-subj)# access-group sql both
apic1(config-tenant-contract-subj)# exit
apic1(config-tenant-contract)# exit
Step 11 Attach the bridge domain and contracts to the web EPG.
Example:
apic1(config-tenant)# application OnlineStore
apic1(config-tenant-app)# epg web
apic1(config-tenant-app-epg)# bridge-domain member exampleCorp_b1
apic1(config-tenant-app-epg)# contract consumer rmi
apic1(config-tenant-app-epg)# contract provider web
apic1(config-tenant-app-epg)# exit
Step 12 Attach the bridge domain and contracts to the db EPG.
Example:
apic1(config-tenant-app)# epg db
apic1(config-tenant-app-epg)# bridge-domain member exampleCorp_b1
apic1(config-tenant-app-epg)# contract provider sql
apic1(config-tenant-app-epg)# exit
Step 13 Attach the bridge domain and contracts to the application EPG.
Example:
apic1(config-tenant-app)# epg app
apic1(config-tenant-app-epg)# bridge-domain member exampleCorp_b1
Example:
apic1(config-tenant-app-epg)# contract provider rm1
apic1(config-tenant-app-epg)# contract consumer sql
apic1(config-tenant-app-epg)# exit
apic1(config-tenant-app)# exit
apic1(config-tenant)# exit
Step 15 Associate the ports and VLANs to the EPGs app, db, and web.
Example:
apic1(config)# leaf 103
apic1(config-leaf)# interface ethernet 1/2-4
apic1(config-leaf-if)# vlan-domain member exampleCorp
apic1(config-leaf)# exit
apic1(config)# leaf 103
apic1(config-leaf)# interface ethernet 1/2
apic1(config-leaf-if)# switchport
access trunk vlan
apic1(config-leaf-if)# switchport trunk allowed vlan 100 tenant exampleCorp application
OnlineStore epg app
apic1(config-leaf-if)# exit
apic1(config-leaf)# interface ethernet 1/3
apic1(config-leaf-if)# switchport trunk allowed vlan 101 tenant exampleCorp application
OnlineStore epg db
apic1(config-leaf-if)# exit
apic1(config-leaf)# interface ethernet 1/4
apic1(config-leaf-if)# switchport trunk allowed vlan 102 tenant exampleCorp application
OnlineStore epg web
apic1(config-leaf-if)# exit
Procedure
Step 1 Log in to the Cisco APIC, choosing Advanced mode or Basic mode.
Step 2 On the menu bar, choose TENANTS and the tenant in which you created the application profile and EPGs.
Step 3 In the navigation pane, expand the tenant folder and then expand the Application Profiles folder.
Step 4 Verify that the application profile that you created appears.
Step 5 Open the application profile folder and then click the Application EPGs folder.
Step 6 In the work pane, verify that the EPGs that you created appear and then click each EPG to view its properties.
Procedure
Procedure
Procedure
You can log into the VM by right-clicking on the VM and choosing Open Console or by establishing a
SSH/Telnet session on the VM's management port if SSH/Telnet is already enabled.
Step 9 Use the command appropriate for your environment (such as ifconfig for Linux and ipconfig for Windows)
to list the IP addresses assigned to the network adapter.
Step 10 Use the configuration procedure relevant to your version of Linux or Windows to assign a new persistent
(static or dynamic) IPv4 or IPv6 address within the desired subnet of the EPG or bridge domain.
Step 11 Log out of the VM.
What to Do Next
If you wish, you can configure a gateway address using the Cisco APIC.
Assigning a Gateway Address for the VMs Connected to Cisco AVS Using the GUI
You can configure the gateway address either under a bridge domain or under an EPG in that bridge domain
but not under both.
Caution: Cisco recommends that you do not mix configuration modes (Advanced or Basic). When you make
a configuration in either mode and change the configuration using the other mode, unintended changes can
occur. For example, if you apply an interface policy to two ports using Advanced mode and then change the
settings of one port using Basic mode, your changes might be applied to both ports.
Procedure
Step 3 Choose Tenants > tenant_name > Networking > Bridge Domains > bridge_domain_name > Subnets.
Step 4 On the right side of the work pane, click the + icon.
Step 5 In the Create Subnet dialog box, in the Gateway IP field, enter the gateway IPv4 or IPv6 address.
Step 6 Accept the default values in the dialog box.
In the Scope area, Private to VRF is chosen by default. In the Subnet Control area, ND RA Prefix is chosen
by default.
In the Scope area, Private to VRF is chosen by default. In the Subnet Control area, ND RA Prefix is chosen
by default.
vMotion Configuration
We recommend that you configure vMotion on a separate VMkernel NIC with a separate EPG. Do not
configure vMotion on the VMkernel NIC created for the OpFlex channel.
We recommend that you do not delete or change any parameters for the VMkernel NIC created for the
OpFlex channel.
Ensure that OpFlex is up on the destination host. Otherwise the EPG will not be available on the host.
Note If you delete the VMkernel NIC created for the OpFlex channel by mistake, recreate it with the attach
port-group vtep, and configure it with a dynamic IP address. You should never configure a static IP address
for an OpFlex VMkernel NIC.
Note Microsegmentation with Cisco ACI for Cisco AVS is not supported for cross-vCenter and cross-vDS
vMotion.
Note When you do a cross-vCenter vMotion of endpoints, you might experience a few seconds of traffic loss.
Distributed Firewall
The Distributed Firewall is a hardware-assisted firewall that supplementsbut does not replaceother security
features in the Cisco Application Centric Infrastructure (ACI) fabric such as Cisco Adaptive Security Virtual
Appliance (ASAv) or secure zones created by Microsegmentation with the Cisco Application Virtual Switch
(AVS). Distributed Firewall was a new feature in Cisco AVS in Release 5.2(1)SV3(1.5).
Part of Cisco AVS, the Distributed Firewall resides in the ESXi (hypervisor) kernel and is in learning mode
by default. No additional software is required for the Distributed Firewall to work. However, you must
configure policies in the Cisco Application Policy Infrastructure Controller (APIC) to work with the Distributed
Firewall.
The Distributed Firewall is supported on all Virtual Ethernet (vEth) ports but is disabled for all system ports
(Virtual Extensible LAN (VXLAN] tunnel endpoint [VTEP]) and all vmkernel ports) and for all uplink ports.
Distributed Firewall flows are limited to 10,000 per endpoint and 250,000 per Cisco AVS host.
Feature Description
Provides dynamic packet filtering (also known as Tracks the state of TCP and FTP connections and
stateful inspection) blocks packets unless they match a known active
connection. Traffic from the Internet and internal
network is filtered based on policies that you
configure in the APIC GUI.
Feature Description
Prevents SYN-ACK attacks When the provider VM initiates SYN-ACK packets,
the Distributed Firewall on the provider Cisco AVS
drops these packets because no corresponding flow
(connection) is created.
Is implemented at the flow level Enables a flow between VMs over the TCP
connection, eliminating the need to establish a TCP/IP
connection for each packet.
Not dependent on any particular topology or Works with either Local Switching and No Local
configuration Switching modes and with either VLAN and VXLAN.
Bases implementation on 5-tuple values Uses the source and destination IP addresses, the
source and destination ports, and the protocol in
implementing policies.
Because of the automatic reflexive ACL creation, the leaf switch allows the provider to connect to any client
port when the connection is in the established state. But this might not be desirable for some data centers.
That is because an endpoint in a provider EPG might initiate a SYN attack or a port-scan to the endpoints in
the consumer EPGs using its source port 80.
However, the Distributed Firewall, with the help of the physical hardware, will not allow such attack. The
physical leaf hardware evaluates the packet it receives from the hypervisor against the policy ternary content
addressable memory (TCAM) entry.
You need to create policies in Cisco APIC to work with Distributed Firewall.
Note We recommend that you use vmxnet3 adapters for the VMs when using Distributed Firewall. We also
recommend that you use vmxnet3 adapters in scale setups to increase the DVSLargeHeap size to its
maximum. You need to reboot the host for the change to take effect. For more information about using
vmxnet3 adapters for scale setups, see the related VMware knowledge base article, Error message is
displayed when a large number of dvPorts are in use in VMware ESXi 5.1.x (2034073).
Configuring a Stateful Policy for Distributed Firewall Using the Advanced GUI
You need to configure a stateful policy in the Cisco APIC.
You also can perform the procedure with the REST API or the NX-OS style CLI. See the section Configuring
a Stateful Policy for Distributed Firewall Using the REST API or the section Configuring a Stateful Policy
for Distributed Firewall Using the NX-OS Style CLI in this guide for instructions.
Procedure
Configuring a Stateful Policy for Distributed Firewall Using the NX-OS Style CLI
Procedure
Example:
apic1(config)# tenant Tenant1
apic1(config-tenant)# access-list TCP-511 apic1
apic1 (config-tenant-acl)# match icmp
apic1 (config-tenant-acl)# match raw TCP-511 dFromPort 443 dToPort 443 etherT ip prot 6
stateful yes
apic1 (config-tenant-acl)# match raw tcp etherT ip prot 6 sFromPort 443 sToPort 443 stateful
yes
apic1 (config-tenant-acl)# match raw tcp-22out dFromPort 22 dToPort 22 etherT ip prot 6
stateful yes apic1(config-tenant-acl)# match raw tcp-all etherT ip prot 6 stateful yes
apic1(config-tenant-acl)# match raw tcp22-from etherT ip prot 6 sFromPort 22 sToPort 22
stateful yes apic1(config-tenant-acl)# exit apic1(config-tenant)# contract TCP511
Creating a Distributed Firewall Policy or Changing its Mode Using the Advanced GUI
If you use the unified configuration wizard in the section Creating Interface and Switch Profiles and a vCenter
Domain Profile Using the Advanced GUI, Cisco APIC applies the firewall policy in the mode you chose:
Learning, Enabled, or Disabled. If you do not use the unified configuration wizard, Cisco APIC applies the
default policy, which is Learning mode. If you are upgrading from a version of Cisco AVS before Release
5.2(1)SV3(1.5)versions that did not support Distributed Firewallthe default policy, which is Learning
mode, also is applied. However, you can edit the policy or create a new one.
You can create a Distributed Firewall policy or change its mode in the Cisco APIC GUI. However, you also
can perform the procedure with the REST API. See the section Changing the Distributed Firewall Mode Using
the REST API in this guide for instructions.
Procedure
What to Do Next
Verify that the Distributed Firewall is in the desired state by completing the following steps:
1 In the Policies navigation pane, choose the policy in the Firewall folder.
2 In the Properties dialog box, verify that the mode is correct.
Procedure
Procedure
Example:
apic1# configure
apic1(config)# vmware-domain Direct-AVS2-VXLAN
apic1(config-vmware)# configure-avs
apic1(config-vmware-avs)# firewall mode < any of below 3>
disabled Disabled mode
enabled Enabled mode
learning Learning mode
Note A polling interval of 125 seconds is required to send data at maximum scale. We
recommend that you configure the syslog timer with a polling interval of at least 150
seconds.
Log severity
You can set the severity level from 0-7.
Cisco AVS reports up to 250,000 denied or permitted flows to the syslog server for each polling interval. If
you choose to log denied and permitted flows, Cisco AVS will report up to 500,000 flows. Cisco AVS also
reports up to 100,000 short-lived flowsflows that are shorter than the polling interval.
Syslog messages are sent only if the syslog destination log severity is at or below the same log severity for
the syslog policy. Severity levels for the syslog server and syslog policy are as follows:
0: Emergency
1: Alert
2: Critical
3: Error
4: Warning
5: Notification
6: Information
7: Debug
The syslog server should always be reachable from the Cisco AVS host management network or Cisco
AVS overlay-1 network (infraVRF [virtual routing and forwarding]).
If the syslog server is behind the Cisco AVS, bring up the VM VNIC in the VTEP port group.
The syslog server should always be on a different host from Cisco AVS.
Sending log messages from a Cisco AVS to a syslog server hosted behind the same Cisco AVS is not
supported.
If the syslog server destination is a VM, make sure that vMotion is disabled on it. If the syslog server
destination VM is moved to another host for any reason, make sure that the static client end point (CEP)
is configured accordingly. See the section Configuring a Static End Point Using the GUI
The IP for the syslog server can be obtained using DHCP (Option 61 is needed during DHCP) or static
configuration. Make sure that the IP address is in the same subnet as the other VTEPs in overlay-1
(infraVRF).
Example
Thu Apr 21 14:36:45 2016 10.197.138.90 <62>1 2016-04-22T11:34:49.198 10.197.138.90
avs-dfwlog - AVS IP: 10.197.138.90 DFWLOG-DENY_FLOW - ACK scan ingress AVS UUID:
4c4c4544-0047-3510-8048-c2c04f443032, Source IP: 192.168.5.1, Destination IP:
192.168.5.2, Source Port: 60957, Destination Port: 21, Source Interface:
UB4_sid.eth0, Protocol: "TCP"(6), Hit-Count = 1, EPG Name:
uni/epp/fv-[uni/tn-TEMP_CLIENT/ap-APP_PROF/epg-EPG-1]
Permitted flows
Format
<Syslog server timestamp> < PRI = Facility*8 + Severity> <syslog version> <Host
timestamp> <Host IP> <Application name (avs-dfwlog)> - AVS IP: <AVSIP>
DFWLOG-PERMIT_FLOW - AVS UUID: <UUID>, Source IP: <Source IP address>, Destination
IP: <Destination IP address>, Source Port: <Port Number>, Destination Port: <Port
Number>, Source Interface: <Interface name>, Protocol: "TCP"(6), Age = <Age in
seconds>, EPG Name: <Full EPG Name>
Example
Tue Apr 19 19:31:21 2016 10.197.138.90 <62>1 2016-04-20T16:30:03.418 10.197.138.90
avs-dfwlog - AVS IP: 10.197.138.90 DFWLOG-PERMIT_FLOW - ESTABLISHED AVS UUID:
4c4c4544-0047-3510-8048-c2c04f443032, Source IP: 192.168.5.1, Destination IP:
192.168.5.2, Source Port: 59418, Destination Port: 5001, Source Interface:
UB4_sid.eth0, Protocol: "TCP"(6), Age = 0, EPG Name:
uni/epp/fv-[uni/tn-TEMP_CLIENT/ap-APP_PROF/epg-EPG-1]
Example
Thu Apr 21 14:46:38 2016 10.197.138.88 <62>1 2016-04-22T06:26:37.610 10.197.138.88
avs-dfwlog - AVS IP: 10.197.138.88 DFWLOG-PERMIT_SHORT_LIVED - CLOSED AVS UUID:
4c4c4544-0037-5810-8047-b7c04f443032, Source IP: 192.168.5.2, Destination IP:
192.168.5.1, Source Port: 5001, Destination Port: 59508, Source Interface:
UB3_sid.eth0, Protocol: "TCP"(6), Timestamp = 2016-04-22T06:26:37.610, EPG Name:
uni/epp/fv-[uni/tn-TEMP_CLIENT/ap-APP_PROF/epg-EPG-1]
Example
2016-11-28 11:02:43 News.Info 10.197.138.88 1 2016-11-28T19:01:34.221 10.197.138.88
avs-dfwlog - AVS IP: 10.197.138.88 DFWLOG-ICMP_TRACKING AVS UUID:
4c4c4544-0037-5810-8047-b7c04f443032, Source IP: 192.168.5.1, Destination IP:
192.168.5.2, Icmp type and code: Echo request (8,0) Source Interface: UB4_sid.eth0,
Protocol: "ICMP"(1), Timestamp = 2016-11-28T19:01:34.221, Direction: Ingress, EpP
DN: uni/epp/fv-[uni/tn-TEST_TENT/ap-Temp1/epg-tempEPG]
Example
2016-11-28 11:00:23 News.Info 10.197.138.88 1 2016-11-28T19:00:14.252 10.197.138.88
avs-dfwlog - AVS IP: 10.197.138.88 DFWLOG-UDP_TRACKING AVS UUID:
4c4c4544-0037-5810-8047-b7c04f443032, Source IP: 169.254.170.192, Destination IP:
169.254.255.255, Source Port: 138, Destination Port: 138, Source Interface:
win_sys.eth1, Protocol: "UDP"(17), Timestamp = 2016-11-28T19:00:14.252, Direction:
Ingress, EpP DN: uni/epp/fv-[uni/tn-t0/ap-a0/epg-e0]
Procedure
Step 1 Log into Cisco APIC, choosing Advanced mode or Basic mode.
Step 2 In the Tenant infra navigation pane, open the following folders: Application Profiles > access > Application
EPGs > EPG default.
Step 3 Right-click the Static Endpoint folder and then choose Create Static EndPoint.
Step 4 In the Create Static Endpoint dialog box, complete the following steps:
a) In the MAC field, enter the syslog server destination's MAC address.
b) In the Type area, choose tep.
c) In the Path Type area, choose the appropriate path type.
The path type determines how the leaf is connected to the syslog server destination. The leaf can be
connected by port, direct port channel, or virtual port channel.
d) In the Path field, enter the appropriate path.
The path determines the policy group where the syslog server destination is attached.
e) In the IP Address field, enter the syslog server destination IP address.
f) In the Encap field, enter the overlay-1 VLAN (vlan-xxix).
g) Click SUBMIT.
Step 5 From the syslog server destination, ping any overlay-IP addressfor example, 10.0.0.30.
This step ensures that the fabric learns the Syslog server destination IP address.
Configuring Parameters for Distributed Firewall Flow Information in the Advanced GUI
To configure parameters, you first configure the parameters for the syslog server or servers and then configure
the parameters for the syslog policy. The syslog server is referred to as the Remote Destination in the GUI.
Procedure
What to Do Next
If you configured a syslog policy with a new Distributed Firewall policy, you must associate the Distributed
Firewall policy with a VMM domain.
1 In Cisco APIC, choose VM Networking > Inventory.
2 In the navigation pane, expand the VMware folder and then choose the relevant VMM domain.
3 In the work pane, click the ACTIONS down arrow and then choose Create VSwitch Policies.
4 In the Create VSwitch Policy Container dialog box, click Yes.
5 In the work pane, scroll to the VSwitch Policies area, and from the Firewall Policy drop-down list, choose
the policy.
6 Click SUBMIT.
7 If you see the Policy Usage Warning dialog box, click SUBMIT CHANGES.
Configuring Parameters for Distributed Firewall Flow Information in the NX-OS Style CLI
Procedure
Example:
apic1# configure
apic1(config)# logging server-group group name
apic1(config-logging)# server IP address severity severity level facility facility name
You can repeat the last command for additional syslog servers; you can configure up to three syslog servers.
Example:
apic1# configure
apic1(config)# vmware-domain Direct-AVS
apic1(config)# configure-avs
apic1(config-avs)# firewall mode enabled
apic1(config-avs)# firewall-logging server-group group name action-type permit, deny
Note You must enter the firewall mode enabled command before you enter the firewall-logging command.
Note For the firewall-logging command, you can enter either permit or deny. You can also enter both,
separated by a comma.
Procedure
Step 1 Choose VM Networking > Inventory > VMware > VMM_name > Controllers > data center_name >
DVS-VMM name > Portgroups > EPG_name > Learned Point MAC address (Node).
Step 2 Click the Stats tab.
Step 3 Click the tab with the check mark.
Step 4 In the Select Stats dialog box, click the statistics that you want to view in the Available pane and then click
the arrow pointing right to put them in the Selected pane.
Step 5 (Optional) Choose a sampling interval different from the default of 5 minutes.
Step 6 Click SUBMIT.
Procedure
Step 1 Choose VM Networking > Inventory > VMware > VMM_name > Controllers > data center_name >
DVS-VMM name > Portgroups > EPG_name > Learned Point MAC address (Node)
Step 2 Click the Stats tab.
The central pane displays the statistics that you chose earlier. You can change the view by clicking the table
view or chart view icon on the upper left side of the work pane.
Note You must install Cisco AVS before you can configure Layer 4 to Layer 7 services.
Beginning with Cisco AVS Release 5.2(1)SV3(1.10), Layer 4 to Layer 7 service graphs are supported for
Cisco AVS. Layer 4 to Layer 7 service graphs for Cisco AVS can be configured for VMs only and in VLAN
mode only. Layer 4 to Layer 7 service integration is not supported when the service VMs are deployed on a
host with VXLAN encapsulation.
However, beginning with Cisco AVS Release 5.2(1)SV3(2.14), Layer 4 to Layer 7 service integration is
supported when the service VMs are deployed on hosts with VXLAN encapsulation. This is achieved by
adding both service VM hosts and Compute VM hosts to a single VMM domain that is in mixed mode. Both
VLAN and multicast pools can be configured in mixed mode. Service VM EPGs will use VLAN from the
defined pool, and all other EPGs can use either VXLAN or VLAN encapsulation. Both VXLAN endpoints
and VLAN service VMs can now be part of same host in a mixed-mode VMM configuration.
Procedure
Step 3 Remove the configuration from ports in the Cisco ACI fabric that correspond to the host VMware DVS.
Step 4 Install Cisco AVS and verify its operational state, following the procedures in the Cisco AVS Installation
Guide or the Cisco AVS chapter in the Cisco ACI Virtualization Guide.
Step 5 Once Cisco AVS is operational, associate all the EPGs that were used by the VMware DVS to the Cisco AVS
VMM domain.
Associating the EPGs to the Cisco AVS VMM domain should lead to the creation of port groups for Cisco
AVS.
Step 6 Remove the host from maintenance mode and migrate the VMs that you removed from the host earlierbefore
you entered maintenance modeback to the host.
Step 7 In VM network settings, change the port group from VMware DVS to the same port group for Cisco AVS.
Step 8 (Optional but recommended) Remove the VMware DVS from the host.
What to Do Next
Repeat Step 1 through Step 7 for each remaining host.
Creating a Tenant, VRF, and Bridge Domain Using the REST API
Procedure
Example:
POST https://apic-ip-address/api/mo/uni.xml
<fvTenant name="ExampleCorp"/>
When the POST succeeds, you see the object that you created in the output.
Step 2 Create a VRF and bridge domain.
Note The Gateway Address can be an IPv4 or an IPv6 address. For more about details IPv6 gateway
address, see the related KB article, KB: Creating a Tenant, VRF, and Bridge Domain with IPv6
Neighbor Discovery .
Example:
URL for POST: https://apic-ip-address/api/mo/uni/tn-ExampleCorp.xml
<fvTenant name="ExampleCorp">
<fvCtx name="pvn1"/>
<fvBD name="bd1">
<fvRsCtx tnFvCtxName="pvn1"/>
<fvSubnet ip="10.10.100.1/24"/>
</fvBD>
</fvTenant>
Note If you have a public subnet when you configure the routed outside, you must associate the bridge
domain with the outside configuration.
Procedure
Step 1 Send this HTTP POST message to deploy the application using the XML API.
Example:
POST https://apic-ip-address/api/mo/uni/tn-ExampleCorp.xml
Step 2 Include this XML structure in the body of the POST message.
Example:
<fvTenant name="ExampleCorp">
<fvAp name="OnlineStore">
<fvAEPg name="web">
<fvRsBd tnFvBDName="bd1"/>
<fvRsCons tnVzBrCPName="rmi"/>
<fvRsProv tnVzBrCPName="web"/>
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"delimiter=@/>
</fvAEPg>
<fvAEPg name="db">
<fvRsBd tnFvBDName="bd1"/>
<fvRsProv tnVzBrCPName="sql"/>
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"/>
</fvAEPg>
<fvAEPg name="app">
<fvRsBd tnFvBDName="bd1"/>
<fvRsProv tnVzBrCPName="rmi"/>
<fvRsCons tnVzBrCPName="sql"/>
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"/>
</fvAEPg>
</fvAp>
<vzBrCP name="web">
<vzSubj name="web">
<vzRsSubjFiltAtt tnVzFilterName="http"/>
</vzSubj>
</vzBrCP>
<vzBrCP name="rmi">
<vzSubj name="rmi">
<vzRsSubjFiltAtt tnVzFilterName="rmi"/>
</vzSubj>
</vzBrCP>
<vzBrCP name="sql">
<vzSubj name="sql">
<vzRsSubjFiltAtt tnVzFilterName="sql"/>
</vzSubj>
</vzBrCP>
</fvTenant>
In the XML structure, the first line modifies, or creates if necessary, the tenant named ExampleCorp.
<fvTenant name="ExampleCorp">
<fvAp name="OnlineStore">
The elements within the application network profile create three endpoint groups, one for each of the three
servers. The following lines create an endpoint group named web and associate it with an existing bridge
domain named bd1. This endpoint group is a consumer, or destination, of the traffic allowed by the binary
contract named rmi and is a provider, or source, of the traffic allowed by the binary contract named web. The
endpoint group is associated with the VMM domain named datacenter.
<fvAEPg name="web">
<fvRsBd tnFvBDName="bd1"/>
<fvRsCons tnVzBrCPName="rmi"/>
<fvRsProv tnVzBrCPName="web"/>
<fvRsDomAtt tDn="uni/vmmp-VMware/dom-datacenter"/>
</fvAEPg>
The remaining two endpoint groups, for the application server and the database server, are created in a similar
way.
The following lines define a traffic filter named http that specifies TCP traffic of types HTTP (port 80) and
HTTPS (port 443).
The remaining two filters, for application data and database (sql) data, are created in a similar way.
The following lines create a binary contract named web that incorporates the filter named http:
<vzBrCP name="web">
<vzSubj name="web">
<vzRsSubjFiltAtt tnVzFilterName="http"/>
</vzSubj>
</vzBrCP>
The remaining two contracts, for rmi and sql data protocols, are created in a similar way.
The final line closes the structure:
</fvTenant>
Configuring a Stateful Policy for Distributed Firewall Using the REST API
Configure a stateful policy in the Cisco APIC.
Procedure
Example:
<polUni>
<infraInfra>
<infraFuncP>
<infraAccBndlGrp name="fw-bundle">
<infraRsFwPol tnNwsFwPolName="fwpol1"/>
<infraRsAttEntP tDn="uni/infra/attentp-testfw2"/>
</infraAccBndlGrp>
</infraFuncP>
<infraAttEntityP name="testfw2">
<infraRsDomP tDn="uni/vmmp-VMware/dom-mininet"/>
</infraAttEntityP>
</infraInfra>
</polUni>
Procedure
Example:
<polUni>
<infraInfra>
What to Do Next
Verify that the Distributed Firewall is in the desired state, as shown in the following example:
~ # vemcmd show dfw
Show DFW GLobals
DFW Feature Enable: ENABLED
DFW Total Flows : 0
DFW Current Time : 81115
~ #
Step 1 Configure the Distributed Firewall logging parameters for the source.
Example:
<infraInfra>
<nwsFwPol name="__ui_vmm_pol_PARAM-AVS" mode="enabled">
<nwsSyslogSrc adminState="enabled" name="PARAM-AVS" inclAction="deny" logLevel="4"
pollingInterval="120">
<nwsRsNwsSyslogSrcToDestGroup tDn="uni/fabric/slgroup-syslog-servers"/>
</nwsSyslogSrc>
</nwsFwPol>
</infraInfra>
Step 2 Identify the syslog server or servers that will receive the Distributed Firewall flows.
Example:
<syslogGroup name="syslog-servers" >
<syslogRemoteDest host="1.1.1.1" />
<syslogRemoteDest host="2.2.2.2" />
<syslogRemoteDest host="3.3.3.3" />
</syslogGroup>
The name of the syslog group must be the same in both REST API commands, as it does in the preceding
examples.
This consumption model allows users to deploy single and multi-tier application workloads in single click
with pre-defined as well as customizable compute and network policies. Catalog items are published by
infrastructure administrators, whereby granular entitlements can be added or removed on a per-tenant basis.
The integration offers two modes of networking:
Mode Description
Shared Shared mode is for Tenants who do not have a
preference for what IP address space they use and a
shared address space with shared context (VRF) is
used across tenants. Isolation is provided using ACI
Endpoint Groups (EPGs) and connectivity among
EPGs are enabled using a white listing method.
Virtual Private Cloud (VPC) VPC mode is a bring your own address space
architecture, where network connectivity is isolated
via a unique context (VRF) per tenant and external
connectivity is provided via a common shared L3 out.
Figure 13: This figure shows a logical model of the vRealize ACI Integration.
Figure 14: This figure shows the comparison between a Shared Services Plan and Virtual Private Cloud Plan.
EPGs Networks
VLANs, to apply connectivity and policy, EPGs use a grouping of application endpoints. EPGs are
mapped to networks in the vRealize portal. The isolated networks act as containers for collections of
applications, or of application components and tiers, that can be used to apply forwarding and policy
logic. They allow the separation of network policy, security, and forwarding from addressing and instead
apply these to logical application boundaries. When a network is created in vRealize, in the back end it
is created as a port group in vCenter. A vRealize tenant can use vCenter to manage the computing
resources and can attach the virtual machine to the appropriate network.
Layer 3 external connectivityThe Cisco ACI fabric connects to the outside through Layer 3 external
networks. These constructs are also available for vRealize tenants to access other services within the
data center, across the data center, or on the internet.
Security policyCisco ACI is built on a highly secure model, in which traffic between EPGs (isolated
networks) is denied, unless explicitly allowed by policy contracts. A Cisco ACI contract is mapped to
a security policy in the vRealize portal. The security policy describes which networks (EPGs) will provide
and consume a service. The security policy contains one or more rule entry lists (filters), stateless firewall
rules that describe a set of Layer 4 TCP or User Datagram Protocol (UDP) port numbers that define the
communication between the various applications.
Shared load balancer and firewallCisco ACI treats services as an integral part of an application. Any
services that are required are managed as a service graph that is instantiated on the Application Policy
Infrastructure Controller (APIC) . Users define the service for the application, and service graphs identify
the set of network and service functions that are needed by the application. Cisco ACI has an open
ecosystem of L4-7 service vendors whose services integrate natively with Cisco ACI. This integration
is achieved through device packages written and owned by the vendors. The APIC manages the network
services and inserts the services according to the Cisco ACI policy model. For vRealize, Cisco ACI
offers F5 and Citrix load balancers and Cisco ASA firewalls, both in virtual and physical form factors,
which are connected to the Cisco ACI fabric and shared across the various vRealize tenants. After the
device has been integrated into Cisco ACI, the vRealize administrator can choose to add the device as
a premium service and upsell the plan. The vRealize administrator manages the virtual IP address range
for the shared device, to simplify the vRealize tenants workflow.
VPC planIn a VPC plan, vRealize tenants can define their own address spaces, bring a DHCP server,
and map their address spaces to networks. A VPC tenant can also be offered services, such as load
balancing, from the shared service plan. In this scenario, a device would have multiple virtual NICs
(vNICs). One vNIC would connect to the private address space, and another would connect to the shared
service infrastructure. The vNIC that connects to the shared service infrastructure would have an address
assigned by the infrastructure and would also consume a shared load balancer owned by the infrastructure.
Procedure
Prerequisites for Getting Started with Cisco ACI with VMware vRealize
Before you get started, ensure that you have verified that your vRealize computing environment meets the
following prerequisites:
vRealize Automation Release 7.0 or 6.2 must be installed.
See VMware's vRealize documentation.
The vRealize ACI plug-in version and the Cisco APIC version must match.
A tenant is configured in vRealize automation and associated with identity store. The tenant must have
one or more users configured with "Infra Admin", "Tenant Admin", and "Tenant user" roles.
See VMware's vRealize documentation.
The tenant must have one more "Business group" configured.
See VMware's vRealize documentation.
Configure vRealize Orchestrator as an end-point.
See VMware's vRealize documentation.
Configure vCenter as an endpoint.
See VMware's vRealize documentation.
Configure "Reservations" using the vCenter compute resources.
See VMware's vRealize documentation.
Set up the vRealize Appliance.
See VMware's vRealize documentation.
If Layer 3 (L3) Out policies are to be consumed by a tenant, you must configure a BGP route reflector.
See the Cisco APIC Basic Configuration Guide about Configuring an MP-BGP Route Reflector Using
the Basic GUI or Configuring an MP-BGP Route Reflector Using the Advanced GUI.
Setup a vRA handle in vRO.
This is used for Installing the ACI service catalog workflow.
Setup a IAAS handle in vRO.
This is used for Installing the ACI service catalog workflow.
See Setting Up an IaaS Handle in vRealize Orchestrator, on page 175.
Install the vCAC/vRA Custom Property Toolkit for vCO/vRO. You can download the package from
the following URL:
https://communities.vmware.com/docs/DOC-26693
The embedded vRO in vRA has the vCAC vRO plug-in that is installed by default. If you are using a
standalone vRO, the vCAC vRO plug-in must be installed. You can download the plug-in from the
following URL:
https://solutionexchange.vmware.com/store/products/vmware-vrealize-orchestrator-plug-in-for-vra-6-2-0
Procedure
Procedure
Procedure
Step 1 Once you have unzipped the package, save the aci-vra-plugin-2.2.1000.N.dar file in a known directory.
Step 2 Log in to the vRA appliance as root using SSH, enter:
$ ssh root@<vra_ip>
Step 3 Start the configurator to enable the configurator services web interface, enter the following commands:
# service vco-configurator start
.
.
.
Tomcat started.
Status: Running as PID=15178
Step 4 Log in to the VMware appliance using the Firefox browser, enter:
https://applicance_address:8283/vco-controlcenter
Note Cisco recommends using the Firefox browser.
Do not use the Internet Explorer or the Chrome browser for the first time. There is a known issue
when you use the default username and password. It does not login properly.
For more information, see https://communities.vmware.com/thread/491785.
a) In the VMware vRealize Orchestrator Configuration GUI, enter the default username and password which
is vmware/vmware. You will then be required to change the password.
Step 5 In the navigation pane, ensure there is a green dot next to Plugins and then choose Plugins.
Step 6 In the right-side pane, scroll down to the Plugin file field and click the search icon.
a) Locate where you saved the aci-vra-plugin-2.2.1000.N.dar file and choose the
aci-vra-plugin-2.2.1000.N.dar file.
b) Click Upload and install.
At the top of the pane, you will see a similar message in green:
Cisco APIC Plugin
Step 7 In the vRA appliance where you logged in as root using SSH, enter the following commands:
# service vco-configurator restart
# service vco-server restart
Step 8 Refresh the Firefox browser where you log in to the VMware appliance.
a) In the VMware vRealize Orchestrator Configuration GUI, ensure the Cisco APIC Plugin is present and
has a green dot in the navigation pane.
b) Choose the Cisco APIC Plugin and you will see a similar message in the pane:
APIC Plugin for vRealize Orchestrator configuration is done through workflows. These workflows
are located in the "Cisco APIC workflows" folder.
c) Choose the Plugins, in the navigation pane, scroll down, locate the Cisco APIC Plugin and ensure it
states Installation OK.
The installation of the APIC plug-in on the vRealize Orchestrator is now complete.
Procedure
Step 1 Log in to the VMware vRealize Automation Appliance as the administrator through your tenant portal using
the browser:
https://applicance_address/vcac/org/tenant_id
Example:
https://192.168.0.10/vcac/org/tenant1
Enter the admin username and password.
Step 2 In the VMware vRealize Automation Appliance GUI, perform the following actions:
a) Choose Administration > Users & Groups > Custom Groups
b) In the Custom Group pane, click Add to add a custom group.
c) Enter the name of the custom group. (Service Architect)
d) In the Roles to this group field, select the custom group you created in the previous step. (Service Architect)
e) Choose the Member pane, enter and select the user name(s).
f) Click Add.
This creates a custom group with members.
g) In the Custom Group pane, choose the custom group you created. (Service Architect)
h) In the Edit Group pane, you can verify the members in the Members pane.
Step 3 In the browser, enter the vRealize Automation Appliance.
https://applicance_address
For example:
https://vra3-app.ascisco.net
a) Choose the vRealize Orchestrator Client to download the client.jnlp file.
b) The Downloads dialog box will appear, launch the client.jnlp file.
Step 4 Log in to the VMware vRealize Orchestrator as administrator.
Step 5 Once the VMware vRealize Ochestrator GUI appears, from the drop-down list, choose Run from the menu
bar.
Step 6 In the Navigation pane, choose the Workflows icon.
Step 7 Choose [email protected] > Cisco APIC Workflows > Utils > Install ACI Service
Catalog.
Step 8 Right-click Install ACI Service Catalog and choose Start Workflow.
Step 9 In the Start Workflow - Install ACI Service Catalog dialog box, perform the following actions:
a) In the vRealize Automation handle field, click Not set, navigate and choose the vRealize automation
handle for this appliance.
b) In the Business group field, click Not set to choose business group.
Note NOTE: If running vRealize 7.0, you need to select the Business Group from Business Group
(Deprecated).
c) In the JSON File containing vRealize Properties field, click Not set, navigate and choose the JSON file
containing the vRealize properties. (aci-vra-properties-2.1.1000.x.json)
d) In the Zip file containing the service blueprints field, click Not set, navigate and choose the zip file
containing the service blueprints. (aci-vra-asd-2.1.1000.x.zip)
e) In the Admin User field, enter the tenant admin user.
f) In the End users field, click Not set and enter the user names to enable privilege for.
Note Do not copy and paste the end user names, you should type the user
names.
g) Click Submit.
Step 10 In the Navigation pane, you will see a green check mark next to the Install ACI Service Catalog, if the
installation was successful.
Step 11 In the Navigation pane, choose the Workflows icon.
Step 12 Right-click Install ACI Property Definitions and choose Start Workflow.
Step 13 In the Start Workflow - Install ACI Property Definitions dialog box, click Net set, navigate and choose
the IaaS host.
a) Click Submit.
In the Navigation pane, you will see a green checkmark next to the Install ACI Property Definitions, if
the installation was successful.
Step 14 To verify as a tenant, log in to the vRealize Automation Appliance as tenant, choose Catalog and you will
see 22 services.
Step 15 To verify as an administrator, log in to the vRealize Automation Appliance as administrator, choose Catalog
and you will see 20 services.
a) Choose Infrastructure > Blueprints > Property Definitions and you will see 47 properties.
Procedure
See the Cisco APIC Basic Configuration Guide for more information.
Procedure
Step 1 Log in to the APIC GUI, choose FABRIC > ACCESS POLICIES.
Step 2 In the Navigation pane, expand Global Policies > Attachable Access Entity Policies > AEP_profile_name.
Step 3 In the PROPERTIES pane, perform the following actions:
a) In the Domains (VMM, Physical or External) Associated to Interfaces field, click on the + to expand.
b) In the Unformed field, choose a VMM domain and click UPDATE.
Procedure
Procedure
Step 1 Once you have unzip the package, save the aci-vra-plugin-2.2.1000.N.dar file in a known directory.
Step 2 Log in to the VRA appliance as root using SSH, enter:
$ ssh root@<vra_ip>
Step 3 Start the configurator to enable the configurator services web interface, enter the following commands:
# service vco-configurator start
.
.
.
Tomcat started.
Status: Running as PID=15178
Step 4 Log in to the VMware appliance using the Firefox browser, enter:
https://applicance_address:8283/vco-controlcenter
Note Cisco recommends using the Firefox browser.
Do not use the Internet Explorer or the Chrome browser for the first time. There is a known issue
when you use the default username and password. It does not login properly.
For more information, see https://communities.vmware.com/thread/491785.
a) In the VMware vRealize Orchestrator Configuration GUI, enter the default username and password which
is vmware/vmware. Then you will be required to change the password.
Step 5 In the navigation pane, ensure there is a green dot next to Plug-ins and then choose Plug-ins.
Step 6 In the right-side pane, scroll down to the Plug-in file field and click the search icon.
a) Locate where you saved the aci-vra-plugin-2.2.1000.N.dar file and choose the
aci-vra-plugin-2.2.1000.N.dar file.
b) Click Upload and install.
At the top of the pane, you will see a similar message in green:
Cisco APIC Plugin
Note If you are upgrading from a previous version you may receive a similar error message:
Error! Cannot Downgrade the aci-vro-plugin-2.2.139.dar plug-in. The installed version is
2.1.1000, the version you're trying to install is 2.2.139. Installation is canceled.
To resolve this issue:
1 Remove the previous version.
For more information see, Removing the APIC Plug-in, on page 272.
2 Upgrade the APIC plug-in on the vRealize Orchestrator with the new version using this
procedure.
Step 7 In the VRA appliance where you logged in as root using SSH, enter the following commands:
# service vco-configurator restart
# service vco-server restart
Step 8 Refresh the Firefox browser where you log in to the VMware appliance.
a) In the VMware vRealize Orchestrator Configuration GUI, ensure the Cisco APIC Plugin is present and
has a green dot in the navigation pane.
a) Choose the Cisco APIC Plug-in and you will see a similar message in the pane:
APIC Plugin for vRealize Orchestrator configuration is done through workflows. These workflows
are located in the "Cisco APIC workflows" folder.
b) Choose the Plug-ins, in the navigation pane, scroll down, locate the Cisco APIC Plugin and ensure it
states Installation OK.
Step 9 Upgrade your service blueprints, service categories, and entitlements, see Setting Up the VMware vRealize
Automation Appliance for ACI, on page 177.
Procedure
Procedure
For more information, see Setting Up the VMware vRealize Automation Appliance for ACI, on page 177.
Procedure
Deployment of a single-tier application using property See Deploying a Single-Tier Application Using
groups Property Groups, on page 184.
Procedure
Step 1 Connect to the vRealize Automation appliance by pointing your browser to the following URL:
https://appliance_address/vcac/org/tenant_id
g) Click Submit.
h) In the Property Group Name field, enter a name for the property group.
Example:
green-app-bp
m) Click Submit.
Step 9 Click Next.
Step 10 In the VM Networking tab, leave all of the fields at their default values.
Step 11 Click Next.
Step 12 In the Security tab, perform the following actions:
Note Machine prefixes generate a unique name for each virtual machine that is deployed. An example prefix
for a tenant named "Green" could be "green-web-", plus three unique digits for each machine. The sequence
would be: "green-web-001", "green-web-002", "green-web-003", and so on. It is important that you follow
a similar scheme with your machine prefixes so that the Application Policy Infrastructure Controller
(APIC) plug-in can accurately predict the name of the consumer endpoint group. Additionally, every
machine must be on the same prefix number. For example, the names for a 3-tier app must be: green-db-001,
green-app-001, and green-web-001. If any tier were not aligned, the security policy would fail to form a
correct relationship. This is a requirement because vRealize does not provide the name of the sibling tiers,
so the plug-in must infer the siblings' names based on its own name.
When configuring a security policy under a property group, the consumer name should be the second
word of the machine prefix. For the example prefix "green-web-", the consumer name would be "web".
This section describes how to deploy a 3-tier application using a multi-machine blueprint.
Procedure
Step 1 Connect to the vRealize Automation appliance by pointing your browser to the following URL:
https://appliance_address/vcac/org/tenant_id
g) Click Submit.
h) In the Property Group Name field, enter a name for the property group.
Example:
green-db-mm
l) Click Submit.
Step 9 Click Next.
Step 10 In the VM Networking tab, leave all of the fields at their default values.
Step 11 Click Next.
Step 12 In the Security tab, perform the following actions:
a) In the Configure Security Policy drop-down list, choose Yes.
b) In the Consumer Network/EPG Name of Security Policy field, enter the name of the consumer network,
without the full machine prefix.
Example:
app
The database tier must have the application tier as the consumer.
c) In the Starting Port Number in Security Policy field, enter the starting port number.
Example:
3306
d) In the Ending Port Number in Security Policy field, enter the ending port number.
Example:
3306
g) Click Submit.
h) In the Property Group Name field, enter a name for the property group.
Example:
green-app-mm
l) Click Submit.
Step 24 Click Next.
Step 25 In the VM Networking tab, leave all of the fields at their default values.
Step 26 Click Next.
Step 27 In the Security tab, perform the following actions:
a) In the Configure Security Policy drop-down list, choose Yes.
b) In the Consumer Network/EPG Name of Security Policy field, enter the name of the consumer network,
without the full machine prefix.
Example:
web
The application tier must have the web tier as the consumer.
c) In the Starting Port Number in Security Policy field, enter the starting port number.
Example:
8000
d) In the Ending Port Number in Security Policy field, enter the ending port number.
Example:
8000
g) Click Submit.
h) In the Property Group Name field, enter a name for the property group.
Example:
green-web-mm
l) Click Submit.
Step 39 Click Next.
Step 40 In the VM Networking tab, leave all of the fields at their default values.
Step 41 Click Next.
Step 42 In the Security tab, leave the field at its default value.
Because this is a consumer policy, you do not need to configure the security policy.
For more information, see Entitlements for ACI catalog-items in vRealize, on page 200.
Add APIC with Admin Credentials This creates the APIC handle with Admin credentials.
Add or Delete Bridge Domain in Tenant-common This adds or deletes the bridge domain in
tenant-common.
Add or Delete Consumer for Shared Service This adds or deletes consumer for shared service
(Contract) (Contract).
Add or Delete L3 context (VRF) in Tenant-common This adds or deletes Layer 3 context (VRF) in
tenant-common.
Add or Delete Subnets in Bridge Domain for This adds or deletes subnets in the bridge domain for
Tenant-Common tenant-common.
Add Provider for Shared Service (Contract) This adds provider for shared service (Contract).
Delete Provider Shared Service (Contract) This deletes the provider shared service (Contract).
This section provides a list of the admin services catalog items for ACI administrator services for the VMM
domain type DVS.
Delete VMM Domain, DVS, and VLAN Pool This deletes the VMM Domain, DVS and VLAN
Pool.
Update Vlan Pool (encap blocks) This updates the Vlan Pool (encap blocks).
Update VMM Domain DVS security domain mapping This updates the VMM Domain DVS security domain
mapping.
This section provides a list of the admin services catalog items for ACI administrator services for the VMM
domain type Cisco AVS.
Update VLAN Pool, AVS This updates the VLAN pool for the Cisco AVS
VMM domain.
Update AVS VMM Domain Security Domain This updates the security domain mapping of the
Mapping Cisco AVS VMM domain.
Delete VMM Domain, AVS and Multicast Pool This deletes the VMM domain and VLAN pool in
Cisco APIC and deletes the associated Cisco AVS in
vCenter.
Delete VMM Domain, AVS and VLAN Pool This deletes the VMM domain and VLAN pool in
Cisco APIC and deletes the associated Cisco AVS in
vCenter.
Delete VMM Domain, AVS Mixed Mode This deletes the VMM domain and associated VLAN,
and multicast address pool in Cisco APIC and deletes
the associated Cisco AVS in vCenter.
Create FW Policy (DFW) and Associate to AVS This creates a Distributed Firewall policy and
VMM Domain associates it to the Cisco AVS VMM domain.
Update FW Policy (DFW) association to AVS VMM This associates/dissociates an existing Distributed
Domain Firewall policy to the Cisco AVS VMM domain.
Update FW Policy (DFW) This updates the existing Distributed Firewall Policy.
Delete FW Policy (DFW) This deletes the existing Distributed Firewall Policy.
To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
2 Choose a request, enter the information in the fields and click Submit.
Delete Security Policy (Contracts) This deletes the security policy between tenant
networks. For example: APIC contracts between
consumer EPG and provider EPG.
Update Access List Security Rules This adds or removes access list rules associated with
a Security Policy Filter created in APIC (using Add
Security Policy (Contracts)). The access list rules are
of the format <source-port, destination-port, protocol,
ethertype>.
Note The Source and Dest Ports are not allowed
for arp, icmp, icmpv6 rules. Ports are valid
only for tcp and udp protocols. The access
list rules are deployed and enforced in ACI
fabric and they are stateless in nature.
In addition this blueprint also has an option to update
the stateful firewall rules on a Firewall appliance such
as Cisco-ASA for a specific service graph that is
provided as an input.
To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > Network Security.
2 Choose a request, enter the information in the fields and click Submit.
List of Tenant Network Services Catalog Items for ACI Tenant Services
The following table lists the Tenant Network Services catalog items for ACI tenant services. You must log
in to the tenant portal with tenant administrator privileges to execute the Tenant Network Services catalog
items.
Add or Delete L3 Context (VRF) in Tenant This adds or deletes Layer 3 context (VRF) in tenant.
Add or Delete Subnets in Bridge domain This adds or deletes subnets in the bridge domain.
Attach or Detach L3 external connectivity to Network This attaches or detaches Layer 3 external
connectivity to the network.
The following table lists the Tenant Network Services catalog items for VMM domain of type Cisco AVS
only. You must log in to the tenant portal with tenant administrator privileges to execute the Tenant Network
Services catalog items.
To submit a request:
1 Log in to the vRealize Automation as tenant admin, choose Catalog > Tenant Network Services.
2 Choose a request, enter the information in the fields and click Submit.
List of Tenant Shared Plan Catalog Items for ACI Tenant Services
The following table lists the Tenant Shared Plan catalog items for ACI tenant services. You must log in to
the tenant portal with tenant administrator privileges to execute the Tenant Shared Plan catalog items.
Add FW and LB to Tenant Network - Shared Plan This adds a firewall and load balancer to the tenant
network in a shared plan.
Add FW to Tenant Network - Shared Plan This adds a firewall to the tenant network in a shared
plan.
Add Load Balancer to Tenant Network - Shared Plan This adds load balancer to the tenant network in a
shared plan.
Delete FW and LB from Tenant Network - Shared This deletes the firewall and load balancer from the
Plan tenant network in a shared plan.
Delete FW from Tenant Network - Shared Plan This deletes the firewall from the tenant network in
a shared plan.
Delete Load Balancer from Tenant Network - Shared This deletes load balancer from the tenant network
Plan in a shared plan.
Delete Tenant Network - Shared Plan This deletes the tenant network in a shared plan.
The following table lists the Tenant Shared Plan catalog items for VMM domain of type Cisco AVS only.
You must log in to the tenant portal with tenant administrator privileges to execute the Tenant Shared Plan
catalog items.
Delete a Useg network - Shared Plan This deletes a microsegment EPG in a shared plan.
To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
2 Choose a request, enter the information in the fields and click Submit.
Note Symptom: You might see errors in the VMware vCenter during the deletion of the service graph through
the vRealize Automation (vRA) workflow.
Condition: During the deletion of the service graph, if a port group is deleted before service devices such
as VPX or F5 are configured, then these errors are seen. This sequence cannot be controlled through vRA.
Workaround: There is no workaround. These errors are transitory and will stop once the reconfiguration
of the service devices is done.
List of Tenant VPC Plan Catalog Items for ACI Tenant Services
The following table lists the Tenant Virtual Private Cloud (VPC) Plan catalog items for ACI tenant services.
You must log in to the tenant portal with tenant administrator privileges to execute the Tenant VPC Plan
catalog items
Add FW and LB to Tenant Network - VPC Plan This adds the firewall and load balancer to the tenant
network in a VPC plan.
Add FW to Tenant Network - VPC Plan This adds the firewall to the tenant network in a VPC
plan.
Add Load-balancer to Tenant Network - VPC Plan This adds the load balancer to tenant network in a
VPC plan.
Delete FW and LB from Tenant Network - VPC Plan This deletes the firewall and load balancer from tenant
network in a VPC plan.
Delete Load-balancer from Tenant Network - VPC This deletes load balancer from tenant network in a
Plan VPC plan.
Delete Tenant Network - VPC Plan This deletes the tenant network in a VPC plan.
The following table lists the Tenant VPC Plan catalog items for VMM domain of type Cisco AVS only. You
must log in to the tenant portal with tenant administrator privileges to execute the Tenant VPC Plan catalog
items.
Delete a Useg Network - VPC plan This deletes a microsegment EPG in a VPC plan.
To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
2 Choose a request, enter the information in the fields and click Submit.
To submit a request:
1 Log in to the vRealize Automation as admin, choose Catalog > VM Services.
2 Choose a request, enter the information in the fields and click Submit.
You can create and manage entitlements to control the access to the catalog items, actions, and specify the
approval policies to apply the catalog requests. You can update the priority of the entitlement to determine
which approval policy applies to a particular request.
Name
VMs Entitlements
Admin Entitlements
To edit an entitlement:
1 Log in to the vRealize Automation as admin, choose Administration > Catalog Management >
Entitlements.
2 Choose an entitlement to edit, enter the information in the fields and click Update.
APIC Workflows
These are the service categories and the catalog items and each catalog items is implemented as a workflow
in the vRealize Orchestrator and the catalog items parameter are exactly same as the workflow parameters.
L4-7 services, a property group has to be created using "Configure Property Group" catalog-item in the "Admin
Services". In addition of L4-7 services between existing application end-point groups can be done by choosing
the appropriate catalog-item from the "Tenant Shared Services" items.
Note In this release, only support for Shared-Plan is supported for Load balancer and Firewall services.
For the 2-node abstract graph, an access list to permit all traffic needs to be configured for the firewall
node.
Procedure
Step 1 Use the following link to download the required device packages Citrix, F5, and ASA. Ensure that the device
package version is certified for the APIC release that you are using. Store the device package zip files in this
directory:
http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/
solution-overview-c22-734587.html
Step 2 Replace the VENDOR-DEVICE-PACKAGE.zip entries in the shared.cfg or vpc.cfg file with the
correct device package files.
Step 3 Edit the setup.yaml file and change the variables to according to your setup.
The template variables in the setup.yaml file are:
TEMPLATE_VARS:
VCENTER: "vcenter1"
ASA_IP: "1.1.1.1"
ASA_CLUSTER: "AsaCluster1"
ASA_VM: "asav-service5"
OUTSIDE_CTX: "outside"
INSIDE_CTX: "default"
FW_GRAPH: "FWOnlyGraph"
FW_SLB_GRAPH: "FWAndSLBGraph"
BD_WEB: "default"
CITRIX_MGMT_IP: "1.1.1.1"
FW_NODE: "FW"
SLB_NODE: "SLB"
CITRIX_GRAPH: "CitrixCluster1_L3"
CITRIX_CLUSTER: "CitrixCluster1_L3"
CITRIX_GRAPH: "CitrixCluster1_L3"
CITRIX_VM: "NS-service4"
F5_BD: "F5Cluster1_L3"
F5_EPG: "F5Cluster1_L3"
F5_CLUSTER: "F5Cluster1_L3"
F5_MGMT_IP: "1.1.1.1"
F5_GRAPH: "F5Cluster1_L3"
F5_ABS_NODE: "SLB"
# Use deleted to generate the "deleted" version of the posts
# STATUS: "deleted"
STATUS: ""
Example:
../jinja.py setup.yaml tn-common-template.xml > tn-common.xml
../jinja.py setup.yaml Shared-Plan-Citrix-graph-template.xml > Shared-Plan-Citrix-graph.xml
../jinja.py setup.yaml Shared-Plan-F5-graph-template.xml > Shared-Plan-F5-graph.xml
Example:
../jinja.py setup.yaml VPC-tn-common-template.xml > VPC-tn-common.xml
../jinja.py setup.yaml VPC-Plan-Citrix-LB-graph-template.xml > VPC-Plan-Citrix-LB-graph.xml
../jinja.py setup.yaml VPC-Plan-F5-LB-graph-template.xml > VPC-Plan-F5-LB-graph.xml
If you see python errors, ensure that the prerequisite python libraries are installed in the system.
Step 5 Edit the shared.cfg or vpc.cfg file and set the values for hosts: <YOUR_APIC_IP> and passwd:
<YOUR_APIC_ADMIN_PASSWD>.
Sample of the shared.cfg file:
Example:
host: <YOUR_APIC_IP>:443
name: admin
passwd: <YOUR_APIC_ADMIN_PASSWD>
tests:
- type: file
path: /ppi/node/mo/.xml
# file: asa-device-pkg-1.2.2.1.zip
# Replace actual ASA Device package file in the line below
file: ASA-DEVICE-PACKAGE.zip
wait: 2
- type: file
path: /ppi/node/mo/.xml
# file: CitrixNetscalerPackage.zip
# Replace actual Citrix Device package file in the line below
file: CITRIX-DEVICE-PACKAGE.zip
wait: 2
- type: file
path: /ppi/node/mo/.xml
# file: CitrixNetscalerPackage.zip
# Replace actual F5 Device package file in the line below
file: F5-DEVICE-PACKAGE.zip
wait: 2
- type: xml
path: /api/node/mo/.xml
file: tn-common.xml
wait: 0
- type: xml
path: /api/node/mo/.xml
file: Shared-Plan-Citrix-graph.xml
wait: 0
- type: xml
path: /api/node/mo/.xml
file: Shared-Plan-F5-graph.xml
wait: 0
Example:
../request.py shared.cfg
Example:
../request.py vpc.cfg
Procedure
Step 1 Edit the shared.cfg file and set the values for hosts: <YOUR_APIC_IP> and passwd:
<YOUR_APIC_ADMIN_PASSWD>.
Step 2 Edit the setup.yaml file and set the STATUS variable to deleted to generate the deleted version of the
posts.
Step 3 Run the following commands:
./jinja.py setup.yaml tn-common-template.xml > tn-common-del.xml
./jinja.py setup.yaml Shared-Plan-Citrix-graph-template.xml > Shared-Plan-Citrix-graph-del.xml
./jinja.py setup.yaml Shared-Plan-F5-graph-template.xml > Shared-Plan-F5-graph-del.xml
See Cisco APIC Basic Configuration Guide for L3 external connectivity configuration.
Ensure you have logged in to the APIC GUI, on the menu bar, choose TENANT > common.
Create a l3ExtOut called "vpcDefault", refer to BD "vpcDefault".
Create l3extInstP name="vpcDefaultInstP" under this l3ExtOut.
This is to be used by VPC tenants.
See Cisco APIC Basic Configuration Guide for configuring external connectivity for tenants.
vRealize leverages the common l3ExtOut configuration with no special requirement other than the
naming convention highlighted above
Administrator Experiences
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Add VMM Domain, AVS Local Switching with Vlan Encap.
Step 3 In the New Request dialog box, complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Domain/AVS name field, enter the VMM domain name.
d) In the AAEP Name field, enter an attachable access entity profile (AAEP) name to associate the VMM
domain to an AAEP.
We recommend that you previously created an AAEP as part of day-0 operation of ACI. If the AAEP that
you enter doesnt exist, it will be created.
e) In the Vcenter IP (or Hostname) field, enter the host name or IP address.
If you use the host name, you must already have configured a DNS policy on Cisco APIC. If you do not
have a DNS policy configured, enter the IP address of the vCenter server.
f) In the Username field, enter the user name for logging in to the vCenter.
g) In the Password field, type the password for logging in to the vCenter.
h) From DVS Version drop-down list, choose the DVS version.
Note Choose vCenter Default from the drop-down list for DVS 6.5 and later versions.
i) In the Datacenter field, enter the data center name.
Note The name that you enter for the data center must match exactly the name in vCenter. The name
is case sensitive.
j) In the Vlan Start field, enter the starting VLAN in Encap Block Range.
k) In the Vlan End field, enter the ending VLAN in Encap Block Range.
Note After Substep 3p, a VLAN pool Domain/AVS name_vlanpool with given Encap Block Range
will be created and associated to VMM domain.
l) (Optional) In the AVS Fabric-wide Multicast Address field, enter a valid multicast address between
224.0.0.0 and 239.255.255.255, inclusive, for the multicast address block range.
m) (Optional) In the Multicast Address Start field, enter the starting multicast address between 224.0.0.0
and 239.255.255.255, inclusive, for the multicast address block range.
n) (Optional) In the Multicast Address End field, between 224.0.0.0 and 239.255.255.255, inclusive, for
the multicast address block range.
Note After Substep 3p, a multicast address pool Domain/AVS name_mcastpool with the given multicast
address block range will be created and associated to the VMM domain.
o) In the AAA Domain area, click the green cross and then choose a security domain.
p) Click Submit.
What to Do Next
Complete the following procedures:
Verifying Cisco AVS Creation in vCenter, on page 212
Verifying Creation of the Cisco AVS VMM Domain on Cisco APIC, on page 213
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Add VMM Domain, AVS Local Switching with Vxlan Encap.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) In the Request Information pane, add a description and then click Next.
b) In the Domain/AVS name field, enter the VMM domain name.
c) In the AAEP Name field, enter an attachable access entity profile (AEP) name to associate the VMM
domain to an AAEP.
We recommend that you previously created an AAEP as part of day-0 operation of ACI. If the AAEP that
you enter doesnt exist, it will be created.
d) In the Vcenter IP (or Hostname) field, enter the host name or IP address.
If you use the host name, you must already have configured a DNS policy on Cisco APIC. If you do not
have a DNS policy configured, enter the IP address of the vCenter server.
e) In the Username field, enter the user name for logging in to the vCenter.
f) In the Password field, type the password for logging in to the vCenter.
g) From DVS Version drop-down list, choose the DVS version.
Note Choose vCenter Default from the drop-down list for DVS and later
versions.
h) In the Datacenter field, enter the data center name.
Note The name that you enter for the data center must match exactly the name in vCenter. The name
is case sensitive.
i) In AVS Fabric Multicast Address field, enter a valid multicast address between 224.0.0.0 and
239.255.255.255, inclusive, in the multicast address block range.
j) In the Multicast Address Start field, enter the starting multicast address between 224.0.0.0 and
239.255.255.255, inclusive, in the multicast address block range.
k) In the Multicast Address End field, between 224.0.0.0 and 239.255.255.255, inclusive.
Note After Substep 4o, a multicast address pool Domain/AVS name_mcastpool with the given multicast
address block range will be created and associated to the VMM domain.
l) (Optional) In the Vlan Start field, enter the starting VLAN for the encapsulation block range.
m) (Optional) In the Vlan End field, enter the ending VLAN in for the encapsulation block range.
Note After Substep 4o, a VLAN pool Domain/AVS name_vlanpool with the given encapsulation block
range will be created and associated to the VMM domain.
n) In the AAA Domain area, click the green cross and then choose a security domain.
o) Click Submit.
What to Do Next
Complete the following procedures:
Verifying Cisco AVS Creation in vCenter, on page 212
Verifying Creation of the Cisco AVS VMM Domain on Cisco APIC, on page 213
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Add VMM Domain, AVS No Local Switching.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) In the Request Information pane, add a description and then click Next.
b) In the Domain/AVS name field, enter the VMM domain name.
c) In the AAEP Name field, enter an attachable access entity profile (AAEP) name to associate the VMM
domain to an AAEP.
We recommend that you previously created an AAEP as part of day-0 operation of ACI. If the AAEP that
you enter doesnt exist, it will be created.
d) In the Vcenter IP (or Hostname) field, enter the host name or IP address.
If you use the host name, you must already have configured a DNS policy on Cisco APIC. If you do not
have a DNS policy configured, enter the IP address of the vCenter server.
e) In the Username field, enter the user name for logging in to the vCenter.
f) In the Password field, type the password for logging in to the vCenter.
g) From DVS Version drop-down list, choose the DVS version.
Note Choose vCenter Default from the drop-down list for DVS 6.5 and later versions.
h) In the Datacenter field, enter the data center name.
Note The name that you enter for the data center must match exactly the name in vCenter. The name
is case sensitive.
i) In AVS Fabric Multicast Address field, enter a valid multicast address between 224.0.0.0 and
239.255.255.255, inclusive.
j) In the Multicast address Start field, enter the starting multicast address between 224.0.0.0 and
239.255.255.255, inclusive, in the multicast address block range.
k) In the Multicast address End field, enter the ending multicast address 224.0.0.0 and 239.255.255.255,
inclusive, in the multicast address block range.
l) In the AAA Domain area, click the green cross and then choose a security domain.
m) Click Submit.
What to Do Next
Complete the following procedures:
Verifying Cisco AVS Creation in vCenter, on page 212
Verifying Creation of the Cisco AVS VMM Domain on Cisco APIC, on page 213
Procedure
Procedure
Procedure
Step 1 Log in to the vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update Vlan Pool, AVS.
Note This update operation is only supported for dynamic VLAN pools. Static VLAN pools are not
supported.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) Add the description and then click Next.
b) In the Vlan Pool Name field, enter the name of the existing VLAN pool.
c) In the List of encap blocks area, click the green cross next to New.
d) For each Encap block, in the VlanRangeStart column, enter the starting VLAN.
e) In VlanRangeEnd column, enter the ending VLAN.
Tick the check box in column IsAddOperation to add encap blocks to vlan pool; leave the check box
unchecked to removed an entered encap block from a VLAN pool.
f) Click Submit.
What to Do Next
Complete the procedure Verifying the Update of the VLAN Pool of a Cisco AVS VMM Domain in Cisco
APIC, on page 214.
Verifying the Update of the VLAN Pool of a Cisco AVS VMM Domain in Cisco APIC
Procedure
Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose Fabric > Access Policies
Step 3 In the Policies navigation pane, expand the Pools folder.
Step 4 Expand the VLAN folder.
Step 5 Choose the VLAN pool.
Step 6 In the work pane, under Pools - VLAN, ensure that the VLAN pool is updated.
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update Multicast Pool, AVS.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) In the Multicast Pool Name field, enter the name of the existing multicast address pool.
b) In the List of Multicast Address Range area, click the green cross next to New.
c) For each multicast address block, enter the starting multicast address between 224.0.0.0 and
239.255.255.255, inclusive, in the MulticastAddressStart column.
d) In the MulticastAddressEnd column, enter the ending multicast address between 224.0.0.0 and
239.255.255.255, inclusive.
e) Tick the check box in the column IsAddOperation to add multicast address blocks to the multicast address
pool; leave the check box unchecked to remove an entered multicast address block from the multicast
address pool.
f) Click Submit.
What to Do Next
Complete the procedure Verifying the Update of a Multicast Address Pool on Cisco APIC , on page 215.
Procedure
Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose Fabric > Access Policies.
Step 3 in the Policies navigation pane, expand the Pools folder.
Step 4 Expand the Multicast Address folder.
Step 5 Choose the multicast address pool.
Step 6 In the work pane, under Pools - Multicast Address, ensure that the multicast address pool is updated.
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Delete VMM Domain, AVS Mixed Mode.
Step 3 View the Service Blueprint Information for the input fields and then click Request.
Step 4 In the New Request dialog box, complete the following steps:
a) Add a description and then click Next.
b) In the Domain/AVS name field, enter the name of the VMM domain that you want to delete.
Note If the VMM domain has an associated multicast address pool (Domain/AVS name_mcastpool) or
a VLAN pool (Domain/AVS name_vlanpool), it also will be deleted.
c) Click Submit.
What to Do Next
Complete the following procedures:
Verifying Cisco AVS Deletion in vCenter, on page 216
Verifying VMM Domain Deletion on Cisco APIC, on page 216
Verifying VLAN Pool Deletion on Cisco APIC, on page 216
Verifying Multicast Address Pool Deletion on Cisco APIC, on page 217
Procedure
Procedure
Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose VM Networking > Inventory.
Step 3 In the Inventory navigation pane, expand VMware.
Step 4 Under VMware, ensure that the deleted VMM domain is not present.
Procedure
Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose Fabric > Access Policies
Step 3 In the Policies navigation pane, expand the Pools folder.
Step 4 Choose the VLAN folder.
Step 5 In the work pane, under Pools - VLAN, ensure that the VLAN pool (Domain/AVS name_vlanpool) is
deleted.
Procedure
Step 1 Log in to Cisco APIC as the administrator, choosing the Advanced GUI.
Step 2 Choose Fabric > Access Policies.
Step 3 In the Policies navigation pane, expand the Pools folder.
Step 4 Choose the Multicast Address folder.
Step 5 In the work pane, under Pools - Multicast Address, ensure that the multicast address pool (Domain/AVS
name_mcastpool) is deleted.
Updating the Security Domain Mapping of the Cisco AVS VMM Domain
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update AVS VMM Domain Security Domain Mapping and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the AVS/VMM-domain name field, enter the VMM domain name.
d) In the AAA Domain list table, click New and enter the AAA domain name.
For each entry, specify the existing security domain in the aaaDomainName column. Check the check
box in the IsAddOperation column to add the AVS/VMM domain to the AAA domain. If unchecked,
the AVS/VMM domain is removed from the AAA domain.
e) Click Submit.
What to Do Next
Complete the procedure Verifying the Security Domain Mapping of the Cisco AVS VMM Domain, on page
218.
Verifying the Security Domain Mapping of the Cisco AVS VMM Domain
Procedure
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Create FW Policy (DFW) and Associate to AVS VMM Domain and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the FW Policy Name field, enter a name for the policy.
d) From the Mode drop-down list, choose Learning, Enabled, or Disabled.
LearningCisco AVS monitors all TCP communication and creates flows in a flow table but does
not enforce the firewall. Learning mode lets you enable the firewall without losing traffic.
EnabledEnforces the Distributed Firewall. If you upgrade from an earlier version of Cisco
AVSone that does not support Distributed Firewalland are upgrading Cisco AVS only, you
must first upgrade all the Cisco AVS hosts in that VMM domain and then enable Distributed Firewall.
DisabledDoes not enforce the Distributed Firewall and removes all flow information from the
Cisco AVS. Choose this mode only if you do not want to use the Distributed Firewall.
e) In the VMM Name field, enter the name of the existing Cisco AVS VMM domain to which you want to
associate the DFW policy and click Next.
f) In the Syslog Form page, choose Disabled or Enabled from the Administrative State drop-down list.
g) Cisco AVS reports the flows that are permitted or denied by the Distributed Firewall to the system log
(syslog) server. Do the following:
From the Permitted flows drop-down list, choose yes if you want Cisco AVS to report permitted
flows to the syslog server. Choose no if you do not want Cisco AVS to report permitted flows to the
syslog server.
From the Denied flows drop-down list, choose yes if you want Cisco AVS to report denied flows
to the syslog server. Choose no if you do not want Cisco AVS to report denied flows to the syslog
server.
h) In the Polling Interval (seconds) area, enter an interval from 60 to 86,400 seconds.
i) From the Log Level drop-down list, choose a logging severity level that is greater than or equal to the
severity level defined for the syslog server.
j) In the Dest Group area, enter an existing syslog monitoring destination group.
k) Click Submit.
What to Do Next
Complete the procedure Verifying Distributed Firewall Policy Creation on APIC, on page 219.
Procedure
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update FW Policy (DFW) and complete the following steps:
In the service blueprint, some drop-down lists have a <NO CHANGE> option that you can choose if you do
not want to change the configured value.
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the FW Policy Name field, enter an updated name for the policy.
d) From the Mode drop-down list, choose Learning, Enabled, Disabled, or <NO CHANGE>. Click Next.
e) In the Syslog Form page, choose Disabled, Enabled, or <NO CHANGE> from the Administrative
State drop-down list.
f) From the Permitted flows drop-down list, choose yes, no, or <NO CHANGE>.
g) From the Denied flows drop-down list, choose yes, no, or <NO CHANGE>.
h) In the Polling Interval (seconds) area, update the interval to a value from 60 to 86,400 seconds.
Note If you do not specify an interval, no update
occurs.
i) From the Log Level drop-down list, choose a logging severity level that is greater than or equal to the
severity level defined for the syslog server. Choose <NO CHANGE> if you do not want to change the
log level.
j) In the Dest Group area, enter a new or existing syslog monitoring destination group.
Note If you do not enter a new or existing syslog monitoring destination group, no update occurs.
k) Click Submit.
Procedure
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Delete FW Policy (DFW) and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the FW Policy Name field, enter the name of the DFW policy that you want to delete.
d) Click Submit.
Procedure
Updating a Distributed Firewall Policy Association with the Cisco AVS VMM Domain
This section describes how to update a DFW policy that is associated with a Cisco AVS VMM domain.
Procedure
Step 1 Log in to vRealize Automation as the administrator and then choose Catalog.
Step 2 Choose Update FW Policy (DFW) association to AVS VMM Domain and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the FW Policy Name field, enter a name for the policy.
d) In the VMM Domain name field, enter an existing Cisco AVS VMM domain name.
e) From the Operation drop-down list, choose one of the following options:
addAssociates the DFW policy with the Cisco AVS VMM domain.
delDisassociates the DFW policy from the Cisco AVS VMM domain.
f) Click Submit.
What to Do Next
Complete the procedure Verifying Microsegment Association Updates with Cisco AVS VMM Domains on
APIC, on page 244
Verifying a Distributed Firewall Policy Association with the Cisco AVS VMM Domain on APIC
This section describes how to verify the association of a distributed firewall policy with Cisco AVS on
Application Policy Infrastructure Controller.
Procedure
Procedure
Step 1 Log in to the vRealize Automation as the tenant administrator, choose Catalog.
Step 2 In the navigation pane, choose Tenant Shared Plan.
Step 3 In the Tenant Shared Plan pane, choose Add Tenant Network - Shared Plan and perform the following
actions:
a) View the Service Blueprint Information for the input fields and click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Step pane, perform the following actions:
d) In the NetworkEPG name field, enter the name of the new shared network (new-shared-network).
e) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and select the DVS.
f) From the encapMode drop-down list, choose either Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMMdomain type is Cisco AVS (Local Switching).
Selecting VLAN or VXLAN for vDS VMM Domain, may lead into unpredictable results.
g) In the Application Tier Number field, enter a numeric value from 1-10.
h) In the Intra EPG Deny field, select a value either Yes or No.
i) In the Allow Microsegmentation field, select a value either Yes or No.
Note The Allow Microsegmentation field is applicable only if the VMMdomain type is vDS VMM
Domain.
j) In the Use Default BD? field, select a value either Yes or No.
If you selected No, choose a custom bridge domain by clicking on Add.
Expand your_apic_user > Tenants > your_tenant > Networking > BridgeDomains >
your_bridgedomain and select this bridge domain.
k) Click Submit.
Procedure
Step 1 Log in to the vRealize Automation as the tenant administrator, choose Request and ensure your request status
is successful.
Step 2 Log into the APIC GUI as the Tenant, choose Tenants.
Step 3 In the navigation pane, expand the Tenant name > Application Profiles > default > Application EPGs >
EPG new-shared-network.
Step 4 In the Properties pane, ensure the Received Bridge Domain field is common/default.
Step 5 In the navigation pane, choose Domains (VMs and Bare-Metals), ensure it is bound to
VMware/your_vmm_domain.
Procedure
Step 1 Log in to the vRealize Automation as the tenant administrator, choose Catalog.
Step 2 In the navigation pane, choose Tenant Network Services.
Step 3 In the Tenant Network Services pane, choose Add or Delete Bridge domain in Tenant and perform the
following actions:
a) View the Service Blueprint Information for the input fields and click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Step pane, perform the following actions:
d) In the Add a bridge domain field, choose Yes.
e) In the Bridge Domain name field, enter the bridge domain name (new-bd).
f) In the Enable ARP Flooding field, choose No.
g) In the Enable flooding for L2 Unknown Unicast field, choose hardware-proxy.
h) In the Enable flooding for L3 Unknown Multicast field, choose flood.
i) In the L3 context (VRF) field, click Add, expand your_apic > Tenants > your_tenant > Networking >
VRFs and select the VRF (ctx1).
j) Click Submit.
k) In the Operation field, choose Add.
l) Click Submit.
Procedure
Step 1 Log into the APIC GUI as the tenant, choose Tenants.
Step 2 In the navigation pane, expand the Tenant name > Networking > Bridge Domain > your_newly_created_bd.
Step 3 In the Properties pane, ensure the fields are the same as in the VMware vRealize GUI.
Procedure
Step 1 Log in to the vRealize Automation as the tenant administrator, choose Catalog.
Step 2 In the navigation pane, choose Tenant VPC Plan.
Step 3 In the Tenant VPC Plan pane, choose Add Tenant Network - VPC Plan and perform the following actions:
a) View the Service Blueprint Information for the input fields and click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Step pane, perform the following actions:
d) In the NetworkEPG name field, enter the name of the new shared network (new-vpc-network).
e) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and select the DVS.
f) From the encapMode drop-down list, choose either Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMMdomain type is Cisco AVS (Local Switching).
Selecting VLAN or VXLAN for vDS VMM Domain, may lead into unpredictable results.
g) In the Application Tier Number field, enter a numeric value from 1-10.
h) In the Intra EPG Deny field, select a value either Yes or No.
i) In the Allow Microsegmentation field, select a value either Yes or No.
Note The Allow Microsegmentation field is applicable only if the VMMdomain type is vDS VMM
Domain.
j) In the Use Default BD? field, select a value either Yes or No.
If you selected No, choose a custom bridge domain by clicking on Add.
Expand your_apic_user > Tenants > your_tenant > Networking > BridgeDomains >
your_bridgedomain and select this bridge domain.
k) In the Subnet Prefix field, enter the gateway IP address and the subnet mask (10.1.1.1/24).
l) Click Submit.
Verifying the Network and Association to the Bridge Domain in a VPC Plan on APIC
This section describes how to verify the newly created bridge domain on APIC.
Procedure
Step 1 Log into the APIC GUI as the Tenant, choose Tenants.
Step 2 In the navigation pane, expand the Tenant name > Application Profiles > default > Application EPGs >
EPG new-vpc-network.
Step 3 In the Properties pane, ensure the Bridge Domain is your_tenant/bd1.
Step 4 In the navigation pane, choose Domains (VMs and Bare-Metals), ensure it is bound to
VMware/your_vmm_domain.
Step 5 In the navigation pane, expand the Tenant name > Networking > Bridge Domain > bd1 > Subnets.
Step 6 In the Subnets pane, ensure the gateway IP address and subnet mask that you enter when creating a network
and associating to a bridge domain in a VPC plan (10.1.1.1/24) and the scope is Private to VRF.
Step 7 On the menu bar, choose VM Networking.
Step 8 In the navigation pane, expand the VMware > your_vmm_domain > Controllers > vcenter1 > DVS -
your_vmm_domain > Portgroups and ensure you see the port group with the tenant application profile EPG
name.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Network Security.
Step 2 Choose Add Security Policy (Contracts)
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the Rule Entry List field, enter the values and click Save.
This table shows the values for each Rule Entry:
dstToPort
Blank
Unspecified
1-65535
protocol
icmp
icmpv6
tcp
udp
Blank
etherType
IP
ARP
b) In the Consumer Network/EPG name field, click Add to locate and choose the consumer network/EPG.
(web-host)
c) Click Submit.
d) In the Provider Network/EPG name field, click Add to locate and choose the provider network/EPG.
(app-host)
e) Click Submit.
Step 7 Click Submit.
Step 8 Click OK.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, on the menu bar choose TENANTS.
Step 2 In the navigation pane, expand Tenant your_tenant > Networking > Security Policies > Contracts.
a) Ensure the name nested under Contracts is the provider and consumer name. (app-host_ctrct_web-hosts)
Step 3 In the navigation pane, expand Tenant your_tenant > Networking > Security Policies > Filters.
a) Ensure the name nested under Filters is the provider and consumer name. (app-host_flt_web-hosts)
Step 4 In the navigation pane, expand Tenant your_tenant > Networking > Application Profiles > default >
Application EPGs > EPG web-hosts > Contracts.
a) In the work pane, ensure the consumer is Comsumed.
Step 5 In the navigation pane, expand Tenant your_tenant > Networking > Application Profiles > default >
Application EPGs > EPG app-hosts > Contracts.
a) In the work pane, ensure the provider is Provided.
Procedure
Step 1 Log in to the virtual machine (web-host), from the command line, ping the other VM (app-host).
Step 2 Log in to the virtual machine (app-host), from the command line, ping the other VM (web-host).
This ensure the VMs are communicating with each other.
Procedure
Step 1 Log in to the vRealize Automation as tenant, choose Catalog > Network Security.
Step 2 Choose Add Security Policy (Contracts)
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the Rule Entry List field, enter the values and click Save.
This table shows the values for each Rule Entry:
dstToPort
Blank
Unspecified
1-65535
protocol
icmp
icmpv6
tcp
udp
Blank
etherType
IP
ARP
b) In the Consumer Network/EPG name field, click Add to locate and choose the consumer network/EPG.
(web-host)
c) Click Submit.
d) In the Provider Network/EPG name field, click Add to locate and choose the provider network/EPG.
(SYSLOG-EPG)
e) Click Submit.
Step 7 Click Submit.
Step 8 Click OK.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, on the menu bar choose TENANTS.
Step 2 In the navigation pane, expand Tenant your_tenant > Networking > Security Policies > Contracts.
a) Ensure the name nested under Contracts is the provider and consumer name.
(SYSLOG-EPG_ctrct_web-hosts)
Step 3 In the navigation pane, expand Tenant your_tenant > Networking > Security Policies > Filters.
a) Ensure the name nested under Filters is the provider and consumer name. (SYSLOG-EPG_flt_web-hosts)
Step 4 In the navigation pane, expand Tenant your_tenant > Networking > Application Profiles > default >
Application EPGs > EPG web-hosts > Contracts.
a) In the work pane, ensure the consumer is Comsumed.
Step 5 In the navigation pane, expand Tenant your_tenant > Networking > Application Profiles > default >
Application EPGs > EPG SYSLOG-EPG-hosts > Contracts.
a) In the work pane, ensure the provider is Provided.
Procedure
Step 1 Log in to the virtual machine (web-host), from the command line, ping the other VM (SYSLOG-EPG).
Step 2 Log in to the virtual machine (SYSLOG-EPG), from the command line, ping the other VM (web-host).
This ensure the VMs are communicating with each other.
Procedure
Step 1 Log in to the vRealize Automation as tenant, choose Catalog > Network Security.
Step 2 Choose Update Security policies (Access Control Lists)
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the apic security filter name field, click Add to locate and choose a filter that been pushed by vRealize.
b) In the Rule Entry List field, enter the values and click Save. You must recreate the rule entry list.
Note This updating security policies access control lists will push new rules in including over writing
existing rule of the same name.
This table shows the values for each Rule Entry:
dstToPort
Blank
Unspecified
1-65535
protocol
icmp
icmpv6
tcp
udp
Blank
etherType
IP
ARP
c) In the Update firewall access-list field, if the access-list being use by a firewall, click Yes otherwise click
No.
d) Click Submit.
Step 7 Click OK.
Step 8 To verify your request, choose the Requests tab.
a) Choose the request you submitted and click view details. Ensure the status is Succesful.
Procedure
Step 1 Log in to the vRealize Automation as tenant, choose Catalog > Network Security.
Step 2 Choose Delete Security policies (Access Control Lists)
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the Comsume Network/EPG name field, click Add to locate and choose the provider network/EPG.
(web-host)
b) In the Provider Network/EPG name field, click Add to locate and choose the provider network/EPG.
(app-host)
c) Click Submit.
Step 7 Click OK.
Step 8 To verify your request, choose the Requests tab.
a) Choose the request you submitted and click view details. Ensure the status is Succesful.
Procedure
Step 1 Log in to the vRealize Automation Appliance as the tenant, choose Catalog > Tenant VPC Plan > Add
Tenant Network - VPC plan and click Request.
Step 2 In the Request Information pane, perform the following actions:
a) In the Description field, enter the description.
b) Click Next.
Step 3 In the Step pane, perform the following actions:
a) In the Network/EPG name field, enter the Network/EPG name. (web-hosts-vpc)
b) In the Domain Type field, from the drop-down list, choose either VmmDomain (Dynamic Binding) for
connecting to virtual machines or PhysDomain (Static Binding) for connecting to physical infrastructure.
Cisco recommends choosing VmmDomain (Dynamic Binding) to use the full features of the vRealize
plug-in.
c) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and select the DVS.
d) From the encapMode drop-down list, choose either Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMMdomain type is Cisco AVS (Local Switching).
Selecting VLAN or VXLAN for vDS VMM Domain, may lead into unpredictable results.
e) In the Application Tier Number field, enter a numeric value from 1-10.
f) In the Intra EPG Deny field, select a value either Yes or No.
g) In the Allow Microsegmentation field, select a value either Yes or No.
Note The Allow Microsegmentation field is applicable only if the VMMdomain type is vDS VMM
Domain.
h) In the Use Default BD? field, select a value either Yes or No.
If you selected No, choose a custom bridge domain by clicking on Add.
Expand your_apic_user > Tenants > your_tenant > Networking > BridgeDomains >
your_bridgedomain and select this bridge domain.
i) In the Subnet prefix field, enter the gateway IP address and the subnet mask. (192.168.1.1/24)
The subnet prefix is the subnet that this VPC will have available to any hosts.
j) Click Submit.
k) Click OK.
Step 4 Choose Requests.
Step 5 Choose the request you submitted and click view details.
Step 6 Ensure your request status is Successful.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > Application EPGs
> EPG web-hosts-vpc
Step 3 In the properties pane, in the Bridge Domain field, verify your tenant name and bd1 is present. (green/bd1)
Step 4 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > Application EPGs
> EPG web-hosts-vpc > Domains (VMs and Bare-Metals).
Step 5 Ensure the state is formed and the domain profile is VMware/vmmdomain_you_specified.
Step 6 In the navigation pane, choose Tenant your_tenant > Networking > Bridge Domains > bd1 > Subnets.
Step 7 Under Subnets, ensure the subnet prefix that you specified is present.
Procedure
Step 1 Log in to vSphere Web Client GUI, choose the Networking icon.
Step 2 In the navigation pane, choose vCenter_IP/Host > Datacenter > green > distributed_virtual_switch >
port_group and ensure it is present.
The port_group name is in the following format: Tenant Name|Application Profile Name|Application EPG
Name.
Procedure
Step 1 Log in to vRealize Automation as the tenant administrator and choose Catalog.
Step 2 In the navigation pane, choose Tenant Network services.
Step 3 Choose Update Tenant Network and perform the following actions:
a) View the Service Blueprint Information for the input fields and click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Tenant name field, input the name of corresponding tenant.
d) In the Network/EPG field, click Add, and expand your_apic > Tenants > your_tenant >
End-Point-Groups and select the EPG.
e) From the Domain Type drop-down list, choose the domain type. The domain type is VmmDomain
(Dynamic Binding) for VMWare vDS or Cisco AVS.
f) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and then select the
DVS to associate the tenant network (EPG) to the VMM domain.
g) From the encapMode drop-down list, choose Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only when associating an EPG to a VMM domain of the Cisco
AVS(Local Switching) type. That association is performed in the following step.
h) From the Operation drop-down list, choose add to associate the tenant network with the VMM domain.
Choose delete to disassociate the tenant network from the VMM domain.
i) Click Submit.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, choose Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > Application EPGs
> your_tenant_network > Domains (VMs and Bare-Metals).
Step 3 Confirm that any associations with VMM domains are correct.
Microsegmentation
This section describes microsegmentation in shared and VPC plans and explains the usage-related service
blueprints.
Note Starting with the Cisco APIC vRealize Plug-In 2.0(1) release, the service blueprints related to
microsegmentation are supported only for Cisco AVS VMM domains.
Procedure
Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant Shared Plan.
Step 3 Choose Add a Useg Network - Shared Plan and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Tenant name field, enter the name of the corresponding tenant.
d) In the Network/EPG name field, enter the name of the microsegment (uSeg) that you want to create.
e) From the Domain Type drop-down list, choose the domain type. For the Cisco AVS VMM domain, the
domain type is VmmDomain (Dynamic Binding).
f) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter, and then and select
the DVS (Cisco AVS VMM domain) to associate the uSeg to the VMM domain.
g) From the encapMode drop-down list, choose Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMMdomain type is Cisco AVS (Local Switching).
h) In the Application Tier Number field, enter the number of the tier to which the uSeg belongs. The default
tier number is 1. The tier number that you enter must be less than or equal to the number of application
tiers that were created as part of the tenant creation via the service blueprint Add or Update Tenant
option.
For example, if you enter tier number 2, the uSeg will be placed in BD (common/cmnbd2), which is part
of VRF (common/default). See the following table for reference.
2 common/cmnbd2 common/default
3 common/cmnbd3 common/default
i) From the Intra EPG Deny drop-down list, choose Yes to enforce intra-EPG isolation. Choose No if you
do not want to enforce intra-EPG isolation.
Intra-EPG isolation is not supported in AVS-VLAN mode, DVS-VXLAN mode, or for Microsoft VMM
domains. If you enforce intra-EPG isolation for those modes or domains, ports might go into blocked state.
j) In the Ip Criteria table, click New and enter the IP criteria (or IP attribute). The following columns apply
to each entry:
NameName of the IP criteria (or IP attribute).
DescriptionDescription of the IP criteria.
IPFor IP addresses, specify the address or the subnet (for example, 1.1.1.1 or 1.1.1.0/30).
k) In the Mac Criteria table, click New and enter the MAC criteria (or MAC attribute). The following
columns apply to each entry:
l) In the VM Criteria table, click New and enter the VM criteria (or VM attribute). The following columns
apply to each entry:
NameName of the VM criteria (or VM attribute).
TypeThe following table lists the supported attribute types, their mapping in APIC, and examples.
(The MAC attribute and IP attribute have precedence 1 and 2, respectively.)
vm VM Identifier 4 vm-821
OperatorThe following table lists the supported operators and their mapping in APIC.
contains Contains
(AVS VMM domain) and <vC> (vCenter) belong to a controller instance. For example:
vmmdomain1/vcenter1/VM1.
ValueEnter the attribute type value. Examples of each attribute type are listed in the preceding
Type table.
m) Click Submit.
What to Do Next
Complete the procedure Verifying Microsegmentation Creation in a Shared Plan on APIC, on page 237.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs.
Step 3 In the uSeg EPGs pane, double-click the required uSeg to view its properties.
Step 4 In the Properties pane, confirm that the configuration is correct.
Step 5 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs >
your_useg > Domains (VMs and Bare-Metals).
Step 6 Confirm that the state is formed and that the domain profile is VMware/vmmdomain_you_specified.
Procedure
Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant Shared Plan.
Step 3 Choose Delete a Useg Network - Shared Plan and then complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Tenant name field, confirm that the tenant name is hard coded to the corresponding tenant.
d) In the Network/EPG field, click Add, expand priapic > Tenants > appurtenant >
Useg-End-Point-Groups, and then select the microsegment EPG.
e) Click Submit.
What to Do Next
Complete the procedure Verifying Microsegmentation Deletion on APIC, on page 238.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs.
Step 3 In the uSeg EPGs pane, confirm that the deleted uSeg is not present.
Procedure
Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant VPC Plan.
Step 3 Choose Add a Useg Network - VPC Plan and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Tenant name field, enter the name of the corresponding tenant.
d) In the Network/EPG name field, enter the name of the microsegment (uSeg) that you want to create.
e) From the Domain Type drop-down list, choose the domain type.
f) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter, and then select the
DVS (Cisco AVS VMM domain) to associate the uSeg to the VMM domain.
g) From the encapMode drop-down list, choose Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only if the VMM domain type is Cisco AVS (Local Switching).
h) In the Subnet field, enter the gateway IP address and the subnet mask (1.1.1.1/24).
i) In the Application Tier Number field, enter the number of the tier to which the uSeg belongs. The default
tier number is 1. The tier number that you enter must be less than or equal to the number of application
tiers that were created as part of the tenant creation via the service blueprint Add or Update Tenant
option.
For example, for a tenant named coke, if you enter tier number 2, the uSeg will be placed in BD (coke/bd2),
which is part of VRF (coke/ctx1). See the following table for reference.
3 coke/bd3 coke/ctx1
j) From the Intra EPG Deny drop-down list, choose Yes to enforce intra-EPG isolation. Choose No if you
do not want to enforce intra-EPG isolation.
Intra-EPG isolation is not supported in AVS-VLAN mode, DVS-VXLAN mode, or for Microsoft VMM
domains. If you enforce intra-EPG isolation for those modes or domains, ports might go into blocked state.
k) In the Ip Criteria table, click New and enter the IP criteria (or IP attribute). The following columns apply
to each entry:
NameName of the IP criteria (or IP attribute).
DescriptionDescription of the IP criteria.
IPFor IP addresses, specify the address or the subnet (for example, 1.1.1.1 or 1.1.1.0/30).
l) In the Mac Criteria table, click New and enter the MAC criteria (or MAC attribute). The following
columns apply to each entry:
NameName of the MAC criteria (or MAC attribute).
DescriptionDescription of the MAC criteria.
MACFor MAC addresses, specify the address (for example, 00:50:56:44:44:5D).
m) In the VM Criteria table, click New and enter the VM criteria (or VM attribute). The following columns
apply to each entry:
NameName of the VM criteria (or VM attribute).
DescriptionDescription of the VM criteria.
TypeThe following table lists the supported attribute types, their mapping in APIC, and examples.
(The MAC attribute and IP attribute have precedence 1 and 2, respectively.)
vm VM Identifier 4 vm-821
OperatorThe following table lists the supported operators and their mapping in APIC.
contains Contains
n) Click Submit.
What to Do Next
Complete the procedure Verifying Microsegmentation Creation in a VPC Plan on APIC, on page 240.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs.
Step 3 In the uSeg EPGs pane, double-click the required uSeg to view its properties.
Step 4 In the Properties pane, confirm that the configuration is correct.
Step 5 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs >
your_useg > Domains (VMs and Bare-Metals).
Step 6 Confirm that the state is formed and that the domain profile is VMware/vmmdomain_you_specified.
Step 7 In the navigation pane, choose Tenant your_tenant > Networking > Bridge Domains > corresponding_bd
> Subnets.
Step 8 Under Subnets, confirm that the subnet prefix that you specified is present.
Procedure
Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant VPC Plan.
Step 3 Choose Delete a Useg Network - VPC Plan and then complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Tenant name field, confirm that the tenant name is hard coded to the corresponding tenant.
d) In the Network/EPG field, click Add, expand your_apic > Tenants > your_tenant >
Useg-End-Point-Groups and select the uSeg EPG.
e) Click Submit.
What to Do Next
Complete the procedure Verifying Microsegmentation Deletion on APIC, on page 238.
Procedure
Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant Network services.
Step 3 Choose Add or Delete Useg Attribute and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add a description and then click Next.
c) In the Network/EPG field, click Add, expand your_apic > Tenants > your_tenant >
Useg-End-Point-Groups and select the uSeg EPG.
d) In the Tenant name field, enter the name of the corresponding tenant.
e) If you want to add IP criteria, in the Add Ip Criteria table, click New and enter the IP criteria (or IP
attribute). The following columns apply to each entry:
NameName of the IP criteria (or IP attribute).
DescriptionDescription of the IP criteria.
IPFor IP addresses, specify the address or the subnet (for example, 1.1.1.1 or 1.1.1.0/30).
f) If you want to add Mac criteria, in the Add Mac Criteria table, click New and enter the MAC criteria (or
MAC attribute). The following columns apply to each entry:
NameName of the MAC criteria (or MAC attribute).
DescriptionDescription of the MAC criteria.
MACFor MAC addresses, specify the address (for example, 00:50:56:44:44:5D).
g) If you want to add VM criteria, in the Add Vm Criteria table, click New and enter the VM criteria (or
VM attribute). The following columns apply to each entry:
NameName of the VM criteria (or VM attribute).
TypeThe following table lists the supported attribute types, their mapping in APIC, and examples.
(The MAC attribute and IP attribute have precedence 1 and 2, respectively.)
vm VM Identifier 4 vm-821
OperatorThe following table lists the supported operators and their mapping in APIC.
contains Contains
h) If you want to delete existing IP criteria, in the Delete IP Criteria table, click New and enter the name of
the IP criteria (or IP attribute) to delete.
i) If you want to delete existing Mac criteria, in the Delete Mac Criteria table, click New and enter the name
of the MAC criteria (or MAC attribute) to delete.
j) If you want to delete existing VM criteria, in the Delete Vm Criteria table, click New and enter the name
of the VM criteria (or VM attribute) to delete.
k) Click Submit.
What to Do Next
Complete the procedure Verifying a Microsegmentation Attributes Update on APIC, on page 243.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs.
Step 3 In the uSeg EPGs pane, double-click the required uSeg to view its properties.
Step 4 In the Properties pane, confirm that the attributes in the uSeg Attributes field have been updated.
Procedure
Step 1 Log in to vRealize Automation as the tenant administrator and then choose Catalog.
Step 2 In the navigation pane, choose Tenant Network services.
Step 3 Choose Update Tenant Network and complete the following steps:
a) View the Service Blueprint Information for the input fields and then click Request.
b) In the Request Information pane, add the description and click Next.
c) In the Tenant name field, enter the name of the corresponding tenant.
d) In the Network/EPG field, click Add, expand your_apic > Tenants > your_tenant >
Useg-End-Point-Groups and select the uSeg EPG.
e) From the Domain Type drop-down list, choose the domain type. For the Cisco AVS VMM domain, the
domain type is VmmDomain (Dynamic Binding).
f) In the Domain/DVS field, click Add, expand your_apic > vCenters > your_vcenter and then select the
DVS (Cisco AVS VMM domain) to associate the uSeg to the VMM domain.
g) From the encapMode drop-down list, choose Auto, VLAN, or VXLAN for the encapsulation mode.
Note The encapMode field is applicable only when associating an EPG to a VMM domain of the Cisco
AVS(Local Switching) type. That association is performed in the following step.
h) From the Operation drop-down list, choose add to associate the microsegment with the Cisco AVS
domain. Choose delete to disassociate the microsegment from the Cisco AVS VMM domain.
i) Click Submit.
What to Do Next
Complete the procedure Verifying Microsegment Association Updates with Cisco AVS VMM Domains on
APIC, on page 244.
Verifying Microsegment Association Updates with Cisco AVS VMM Domains on APIC
This section describes how to verify updates to microsegment associations with Cisco AVS VMM domains
on APIC.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, Tenants > your_tenant.
Step 2 In the navigation pane, choose Tenant your_tenant > Application Profiles > default > uSeg EPGs >
your_useg > Domains (VMs and Bare-Metals).
Step 3 Confirm that any associations with VMM domains are correct.
Creating the VMs and Attaching to Networks Without Using the Machine Blueprints
This section describes how to verify the creating machines (VMs) and attaching to networks without using
the machine blueprints.
Procedure
Step 1 Log in to vSphere Web Client GUI, choose the Networking icon.
Step 2 In the navigation pane, choose vCenter_IP/Host > Datacenter > Unmanaged and choose the virtual machine
you want to attach ACI network to.
Step 3 In the Summary pane, in the VM Hardware section, click Edit Settings.
Step 4 In the Edit Settings dialog box, choose the network adapter that you want to connect to the ACI network and
from the drop-down list, choose the port group you created. (green|default|web-hosts-vpc (green))
Step 5 Click OK.
Now this VM can take advantage of the ACI networking.
In this plan, the load balancer is deployed in tn-common thereby offering consumption model for vRA and
APIC tenant using shared infrastructure.
Note The VIP pool should be in one of the subnets defined under BD "default" in the tenant "common"
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Add VIP Pool and perform the following actions:
a) In the Tenant field, enter the Tenant name.
b) In the VIP address start field, enter the VIP address start.
c) In the VIP Address End field, enter the VIP address end.
d) In the Internal VIP for Inter-EPG in VPC plan field, select Yes or No.
e) Click Submit.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Delete VIP Pool, perform the following action items.
a) In the Tenant field, click Add, expand your_apic > Tenants and select the tenant.
b) In the VIP address start field, enter the VIP address start.
c) In the VIP Address End field, enter the VIP address end.
d) In the Internal VIP for Inter-EPG in VPC plan field, select Yes or No.
e) Click Submit.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Add Load Balancer to Tenant Network - Shared Plan, click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Note In a VPC plan, the Inter-EPG load balancer is not supported. Only the load balancer between L3out and
First-Tier (Web) is supported in release 1.2(2x).
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Add Load Balancer to Tenant Network - VPC Plan, click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Delete Load Balancer to Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Delete Load Balancer to Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Note The perimeter firewall only service is not supported in VPC Plan. In VPC plan, the firewall service can
be configured between EPGs.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Add FW to Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Delete FW from Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
In this plan, the firewall and load balancer devices are deployed in the "common" tenant, there by offering
consumption model for vRealize Automation (vRA) and the APIC tenant using the shared infrastructure.
Adding the Firewall and Load Balancer to the Tenant-Network in a Shared Plan
The virtual IP address pool must be added to the tenant before using the firewall and load balancer service.
See Adding the VIP Pool, on page 247.
The firewall and load balancer can be added to an existing tenant network or endpoint group. The consumer
of the firewall must have a Layer 3 out connectivity policy configured in the "outside" VRF.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Add FW and LB to Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Adding the Firewall and Load Balancer to the Tenant-Network in a VPC Plan
This section describes how to add the firewall and load balancer to the Tenant-Network in a VPC Plan.
Note Whenever a firewall and load balancer (LB) workflow is executed then external leg of LB is pointing to
"default" Bridge Domain (BD). Customers should always deploy internal leg of firewall in "default" BD
under tn-common. This ensures that both the firewall and load balancer point to same BD and traffic flows
in an uninterrupted way.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Add FW and LB to Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Deleting the Firewall and Load Balancer from the Tenant-Network in a Shared Plan
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant Shared Plan.
Step 2 Choose Delete FW and LB from Tenant Network - Shared Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Deleting the Firewall and Load Balancer from the Tenant-Network in a VPC Plan
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Delete FW and LB from Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Procedure
Step 1 Log into the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Add FW to Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Procedure
Step 1 Log into the vRealize Automation as admin, choose Catalog > Tenant VPC Plan.
Step 2 Choose Delete FW from Tenant Network - VPC Plan and click Request.
Step 3 Enter the requested information in the fields.
Step 4 Click Submit.
Procedure
Step 1 Log in to the vRealize Automation as tenant, choose Catalog > Tenant Network service.
Step 2 Choose Attach or Detach L3 external connectivity to Network
Step 3 Choose Request.
Step 4 In the Request Information tab, enter a description of the request.
Step 5 Choose Next.
Step 6 In the Step tab, perform the following actions:
a) In the Rule Entry List field, enter the values and click Save.
This table shows the values for each Rule Entry:
dstToPort
Blank
Unspecified
1-65535
etherType
IP
ARP
b) In the L3out Policy field, click Add to locate and choose the L3 connectivity policy in the common tenant.
(default)
c) In the Network/EPG name field, click Add to locate and choose the network/EPG in the common tenant.
(web-host)
d) In the EPG/Network plan type field, click Add to locate and choose the network/EPG in the common
tenant. (web-host)
e) In the Operation field, click Add to add a Layer3 Out.
Step 7 To verify your request, choose the Requests tab.
a) Choose the request you submitted and click view details. Ensure the status is Succesful.
Procedure
Step 1 Log in to APIC Advanced GUI as the tenant, on the menu bar choose TENANTS > common.
Step 2 In the navigation pane, expand Tenant Common > Networking > Security Policies > Contracts.
a) Nested under Contracts there should be a new contract with the end_user_tenant
name-L3ext_ctrct_network_name that you connected to. (green-L3ext_ctrct_web-hosts)
b) Expand the end_user_tenant name-L3ext_ctrct_network_name. (green-L3ext_ctrct_web-hosts)
c) Choose the end_user_tenant name-L3ext_ctrct_network_name. (green-L3ext_ctrct_web-hosts)
d) In the Property pane, in the Filter field, click the filter. (green-L3ext_filt_web-hosts)
e) In the Properties pane, you can see the filter is mapped to vRealize.
Step 3 In the navigation pane, expand Tenant Common > Networking > External Routed Networks > default
> Networks > defaultInstP.
a) In the Properties pane, in the Provided Contracts field, you should see the end_user_tenant
name-L3ext_ctrct_network_name. (green-L3ext_filt_web-hosts)
b) In the Consumed Contracts field, you should see the end_user_tenant
name-L3ext_ctrct_network/EPG_name. (green-L3ext_filt_web-hosts)
Step 4 On the menu bar choose TENANTS > your_tenant.
Step 5 In the navigation pane, expand Tenant your_tenant > Application Profile > default > Application EPGs
> EPG web-hosts > Contracts.
a) In the Contracts pane, you can verify the contract and consumes a contract is present.
Procedure
Log in to the virtual machine (web-host), from the command line, ping the other VM.
Web > Firewall > L3out Web Tier with Firewall and L3out (L3out configured
in "outside" VRF)
Web > Load Balancer > L3out Web Tier with Load balancer connected to L3out
(L3out configured in "default")
Web > Load Balancer and Firewall > L3out Web Tier with Load balancer and Firewall service
connected to L3out (L3out configured in "outside")
Application > Web App tier to Web tier, connected using security policy
Database > Application Db tier to App tier, connected using security policy
Application > Load Balancer > Web App tier to Web tier using Load balancer. Traffic
from Web tier towards App tier is load balanced.
Application > Firewall > Web App tier to Web tier using firewall.
In a multi-tenant deployment, there are some restrictions in the service deployment configuration. The
administrator must decide whether the applications in this deployment will use firewall services or a load
balancer-only service at the first (web) tier.
The following table shows the supported combinations of services in the shared plan:
Deployment FW + LB > L3out LB only > L3out FW > L3out LB between FW between EPGs
Type EPGs
Firewall only or Yes Yes Yes Yes
Firewall and
Load balancer
In case of multi-tenancy, you should use a dedicated service device for each tenant.
Tenant workflow:
Create EPGs
Create contracts
Provide contracts
Consume contracts
Consume L3Outs
Consume Layer 4-7 devices
Using the vRealize Utils Workflow to Import Blueprints and Configure the Entitlements
This section describes how to use the vRealize utils to import blueprints and configure the entitlements.
Procedure
i) Click Submit.
Step 7 In the navigation pane, expand Install ACI Service Catalog.
Step 8 Right-click Install ACI Service Catalog xx.yy.zz, where xx.yy.zz is the identifier of the service catalog that
you just installed, and choose Start Workflow.
Step 9 In the Workflow interacton form - Install ACI Service Catalog : User interaction dialog box, perform
the following actions:
a) In the Host Name field, enter the name of the host without any spaces.
b) In the Host URL field, enter the host's URL.
c) For the Automatically install SSL certificates radio buttons, choose Yes.
d) In the Connection field, leave the default value.
e) In the Operation timeout field, leave the default value.
f) In the Tenant field, enter the tenant's name, in all lowercase.
g) In the Authentication username field, enter the administrator user name plus the fully-qualified domain
name.
h) In the Authentication password field, enter the administrator password.
i) Click Submit.
Step 10 In the navigation pane, expand Install ACI Service Catalog.
Step 11 Right-click Install ACI Service Catalog xx.yy.zz, where xx.yy.zz is the identifier of the service catalog that
you just installed, and choose Start Workflow.
Step 12 In the Workflow interacton form - Install ACI Service Catalog : Ask for business group dialog box, click
Not set.
Step 13 In the Select dialog box, choose vRealize Automation > Cisco APIC workflows > Administration >
Business Groups > business_group, where business_group is the business group for your setup.
Step 14 Click Select.
Step 15 In the Workflow interacton form - Install ACI Service Catalog : Ask for business group dialog box, click
Submit.
Once the business group has been submitted, the workflow will set up your vRealize Automation with the
catalog items and users assigned to entitlements. The workflow takes about five minutes to complete.
Procedure
This adds an APIC host to the repository and does a login to the APIC:
ApicHandle addHost(String hostName,
String hostIp0,
String hostIp1,
String hostIp2,
String userName,
String pwd,
int port,
boolean noSsl,
String role,
String tenantName)
This gets the list of APIC handles for a given <role, username>:
List<ApicHandle> getApicHandleByRole(String role, String userName)
This adds or deletes subnets to the bridge domain in the virtual private cloud (VPC) tenant:
ApicResponse updateSubnets(ApicHandle handle,
String tenantName,
String bdName,
fvSubnet subnetList[],
boolean add)
String lbVendor,
String ldevName,
String graphName,
boolean sharedLb,
String protocol,
String port,
String consumerDn,
String snipIntAddress,
String snipIntNetMask,
String snipExtAddress,
String snipExtNetMask,
String snipNextHopGW,
boolean addOperation)
This opens a connection to the URL, sends the postBody string to the URL location, and returns result:
ApicResponse addOrDelFWReq(ApicHandle handle,
String tenantName,
String apName,
String epgName,
String ctrctName,
String graphName,
vzEntry entryList[],
String consumerDn,
boolean addOp,
boolean updateOp)
This adds the firewall service to an endpoint group in the shared and VPC plan:
ApicResponse addFWToNetwork(ApicHandle handle,
String tenantName,
String apName,
String epgName,
boolean vpc,
String fwVendor,
String ldevName,
String graphName,
vzEntry entryList[],
String fwL3extExternal,
String fwL3extInternal,
boolean skipFWReq,
String consumerDn)
This deletes the firewall from the endpoint group in the shared and VPC Plan:
ApicResponse deleteFWFromNetwork(ApicHandle handle,
String tenantName,
String apName,
String epgName,
boolean vpc,
String graphName,
String ctrctName,
String protocol,
String startPort,
boolean skipFWReq,
String consumerDn)
This creates the tenant, bridge domain and the context (Ctx) in APIC:
ApicResponse addTenant(ApicHandle handle,
String tenantName,
String bdName,
String ctxName,
String aaaDomain)
This adds VlaNS, vmmDomP, vmmCtrlP, vmmUsrAccp and required relation objects to the APIC:
ApicResponse addVmmDomain(ApicHandle handle,
String dvsName,
String vcenterIP,
String userName,
String passwd,
String datacenter,
String vlanPoolName,
int vlanStart,
int vlanEnd,
String aaaDomain)
This creates AVS VMM Domain and adds related objects to the APIC:
ApicResponse addAvsVmmDomain(ApicHandle handle,
String dvsName,
String aepName,
String vcenterIP,
String userName,
String passwd,
String dvsVersion,
String datacenter,
String mcastIP,
String poolName,
String rangeStart,
String rangeEnd,
String aaaDomain,
int domType,
String secondRangeStart,
String secondRangeEnd,
String secondPoolName)
This updates the pools (VLAN, Multicast Address) relevant to Cisco AVS VMM domain:
ApicResponse updateAvsVlanMcastPool(ApicHandle handle,
String poolName,
fvnsEncapBlk encapList[],
int poolType)
This updates Distributed Firewall association with Cisco AVS VMM domain:
ApicResponse updateFWPolMapping(ApicHandle handle,
String polName,
String vmmName,
Boolean opValue)
Procedure
Step 13 In the Navigation pane, expand All Workflows > Administrator > Cisco APIC workflows > Advanced
Network Services.
Step 14 Drag and drop Attach or Detach L3 external connectivity to Network onto the blue arrow that is to the
right of the Add Tenant Network object in the Work pane.
Step 15 In the Do you want to add the activity's parameters as input/output to the current workflow? dialog
box, click Setup....
Step 16 In the Promote Workflow Input/Output Parameters dialog box, click Promote.
Leave all of the values at their defaults.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Add Tenant, enter the information in the fields and click Submit.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Delete Tenant, enter the information in the fields and click Submit.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Network Security.
Step 2 Choose Add APIC with Admin Credentials, enter the information in the fields and click Submit.
Step 3 To access APIC using certificates, set the "Use certificate authentication" to yes and enter the Certificate
Name and Private Key parameters.
Procedure
Step 1 Log in to the vRealize Automation as admin, choose Catalog > Admin Services.
Step 2 Choose Add APIC with Tenant credentials, enter the information in the fields and click Submit.
Step 3 To access APIC using certificates, set the "Use certificate authentication" to yes and enter the Certificate
Name and Private Key parameters.
Troubleshooting
This section describes the troubleshooting techniques.
Procedure
Example:
./get_logs.sh p ***** -s vra-app
VMware vRealize Automation Appliance
Compressing Logs
logs/
logs/app-server/
logs/app-server/catalina.out
logs/app-server/server.log
logs/configuration/
logs/configuration/catalina.out
Logs saved in vra_logs_201511251716.tar.gz
Procedure
Example:
./install_apic_scripts.sh -p ***** -s vra-app
Copying APIC scripts 'rmapic', 'restart' to vra: vra-app
Procedure
Step 2 Create a rmapic bash script in ~/rmapic and add the following content:
#!/bin/bash
cd /usr/lib/vco
find . -name "*aci*" -exec rm -rf {} \;
cd /var/lib/vco
find . -name "*aci*" -exec rm -rf {} \;\rm -f /var/lib/vco/app-server/conf/plugins/apic.xml
cd /var/lib/vco/app-server/conf/plugins/
sed -i.bak '/<entry key="APIC">.*<\/entry>/d _VSOPluginInstallationVersion.xml
service vco-configurator restart;sleep 10;service vco-server restart
Step 4 Execute the rmapic bash script to remove the APIC plug-in:
# ~/rmapic
Plug-in Overview
vRA Blueprints input parameters vRO Javascript Object Name APIC Managed Object Name
Tenant ApicTenant com.cisco.apic.mo.fvTenant
vRA Blueprints input parameters vRO Javascript Object Name APIC Managed Object Name
Bridge Domain ApicBridgeDomain com.cisco.apic.mo.fvBD
Note There will be one vRA host handle already created by default. This is for the global tenant and is used for
administration purposes and to create the IaaS host handle.
Procedure
Procedure
Procedure
About Cisco ACI with VMware vSphere Web Client, page 277
Getting Started with Cisco ACI vCenter Plug-in, page 278
Cisco ACI vCenter Plug-in Features and Limitations, page 283
Upgrading VMware vCenter when Using the Cisco ACI vCenter Plug-in, page 288
Cisco ACI vCenter Plug-in GUI, page 289
Performing ACI Object Configurations, page 296
Uninstalling the Cisco ACI vCenter Plug-in, page 305
Upgrading the Cisco ACI vCenter Plug-in, page 306
Troubleshooting the Cisco ACI vCenter Plug-in Installation, page 306
Reference Information, page 307
The Cisco ACI vCenter plug-in also provides a more limited operation regarding the usage of L2 and L3 Out,
where all of the advanced configuration needs to be done in APIC beforehand.
Preconfigured L2 and L3 Out can be used as providers or consumers of a contract.
Cannot be created, edited or deleted.
The Cisco ACI vCenter plug-in also allows to consume preconfigured L4-L7 Services, by applying existing
graph template to a Contract.
Can use existing graph templates, not create them.
Only empty mandatory parameter of the function profile will be displayed and configurable.
Ensure HTTPS traffic is allowed between your vCenter server and APIC.
Procedure
Example:
https://<APIC>/vcplugin
Note The registration is vCenter wide and it does not take into account the user that performs it. It is a
configuration for the whole vCenter, not just for the logged in user that performs it.
Role Based Access Control (RBAC) is based on the credentials used upon registration. Permission
of the APIC account used for the registration defines configuration restriction on the vCenter plug-in.
You can connect the vCenter plug-in to your ACI fabric, using one of the following ways:
Connect the vCenter plug-in to your ACI fabric using For more information, see Connecting vCenter
credentials. Plug-in to your ACI Fabric Using Credentials, on
page 280.
Connect the vCenter plug-in to your ACI fabric using For more information, see Connecting vCenter Plug-in
an existing certificate. to your ACI Fabric Using an Existing Certificate, on
page 281.
Connect the vCenter plug-in to your ACI fabric by For more information, see Connecting vCenter Plug-in
creating a new certificate. to your ACI Fabric by Creating a New Certificate,
on page 282.
Procedure
Step 7 In the ACI Fabric pane, you will see the new registered APIC discover the other APICs.
The Cisco ACI vCenter plug-in always uses a single APIC for its requests. It will however switch the APIC,
if the APIC currently used is no longer available.
Procedure
Procedure
Step 10 Add this certificate to the admin user in APIC. Make sure to use the same certificate name.
a) Log into the APIC GUI as admin.
b) On the menu bar, choose Admin.
c) In the Navigation pane, expand Security Management > Local Users > admin.
d) In the Work pane, in the User Certificate section, click the plus icon to add the certificate.
e) In the Name field, enter the certificate name.
f) In the Data field, paste the certificate content that you copied in step 8.
g) Click Submit.
Step 11 In the vCenter plug-in, click Check Certificate.
The status changes to Connection Success.
Note If a Connection Failure message displays, check that the certificate is correctly added on the APIC
and that the certificate names are the same.
Step 12 Click OK.
Step 13 In the Information dialog box, click OK.
The APIC node is successfully added to the ACI fabric.
Step 14 In the ACI Fabric pane, the newly registered APIC discovers the other APICs.
The Cisco ACI vCenter plug-in always uses a single APIC for its requests. If the currently used APIC is no
longer available, the Cisco ACI vCenter plug-in switches APICs.
Tenants
The Cisco ACI vCenter plug-in allows CRUD operations on the Tenant object. The following attributes are
exposed in the plug-in:
Name: The name of the tenant.
Description (Optional): The description of the tenant.
When a tenant is created by the plug-in, a VRF <tenant_name>_default and a Bridge Domain
<tenant_name>_default connected to that VRF are automatically created inside. An Application Profile
<tenant_name>_default is also created inside it.
The infrastructure Tenant (infra) and the management Tenant (mgmt) are not exposed in the plug-in.
Note The tenants visible in the plug-in will also depends on the permissions associated with the account used
while registering the ACI fabric into the plug-in.
Application Profiles
The Cisco ACI vCenter plug-in allows CRUD operations on the Application Profile objects. The following
attributes are exposed in the plug-in:
Name: The name of the Application Profile.
Description (Optional): The description of the Application Profile.
Endpoint Groups
The Cisco ACI vCenter plug-in allows CRUD operations on the Endpoint Group objects. The following
attributes are exposed in the plug-in:
Name: The name of the Endpoint Group.
Description (Optional): The description of the Endpoint Group
Bridge Domain: The Bridge Domain associated with this Endpoint Group.
Intra-EPG Isolation: This allows to deny all traffic between the virtual machines that are connected to
an EPG. By default, all virtual machines in the same EPG can talk to each other.
Distributed Switch: The DVS/Cisco AVS where the EPG is deployed. This correspond to the association
with a VMM domain in ACI
By default, all EPGs created with the plug-in are associated with the VMM Domain pointing to the
vCenter where the plug-in is used. If there are multiple VMM Domains pointing to the same vCenter,
you must choose at least one, in the form of selected on which DVS to deploy the EPG.
Allow microsegmentation (only for DVS, not Cisco AVS): This allows you to create a Base EPG . All the
virtual machines connected to this EPG are candidates to apply microsegmentation rules of a uSeg EPG.
Microsegmented EPG rules only applies to virtual machine that are connected to a Base EPG .
Note All EPGs are considered as base EPGs if the distributed switch is Cisco AVS.
An EPG linked to a VMM domain pointing to the vCenter where the plug-in is being used is displayed as
"Virtual." Other EPGs are displayed as "Physical."
Update and Delete actions are only authorized for EPGs linked to a VMM domain that is pointing to the
vCenter (Virtual). Others EPGs (Physical) are read-only. Updates are still authorized to make EPGs consume
or provide contracts, regardless of their VMM domain.
uSeg EPGs
The Cisco ACI vCenter plug-in allows CRUD operations on the mircosegemented EPG objects. The following
attributes are exposed in the plug-in:
Name: The name of the microsegmented EPG.
Description (Optional): The description of the microsegmented EPG.
Bridge Domain: The Bridge Domain associated with this microsegmented EPG.
Intra-EPG Isolation: This allows to deny all traffic between the virtual machines that are connected to
an EPG. By default, all virtual machines in the same EPG can talk to each other.
Distributed Switch: The DVS/Cisco AVS where the EPG is deployed. This correspond to the association
with a VMM domain in ACI
By default, all EPGs created with the plug-in are associated with the VMM Domain pointing to the
vCenter where the plug-in is used. If there are multiple VMM Domains pointing to the same vCenter,
you must choose at least one, in the form of selected on which DVS to deploy the EPG.
Miro-segmentation attributes: List of rules that decide which VM belongs to this microsegmented EPG.
Rules options include: IP, MAC, VM name, OS, Host, VM id, VNic, Domain, Data Center, Custom
Attribute.
Note Domain attributes (VMM Domain) only allow you to select VMM domains to the local vCenter. You
choose a domain by selecting the corresponding DVS/Cisco AVS.
Custom attributes can only be chosen. They cannot be set by the plug-in. They must be set by the VMware
vSphere Client. To create custom labels, see: https://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1005720
VRF
The Cisco ACI vCenter plug-in allows CRUD operations on the VRF objects. The following attributes are
exposed in the plug-in:
Name: The name of the VRF
Description (Optional): The description of the VRF
Enforce policies: Determine if the contracts need to be enforced for the EPG in this VRF.
Bridge Domains
The Cisco ACI vCenter plug-in allows CRUD operations on the Bridge Domain objects. The following
attributes are exposed in the plug-in:
Name: The name of the Bridge Domain
Description (Optional): The description of the Bridge Domain
Private Subnets: List of gateways for this Bridge Domain.
Note Shared and advertised subnets are read only. They cannot be configured by the plug-in. Only the
private subnets can be added or deleted.
If the Bridge Domain has been connected to an L3/L2 Out by the APIC, it cannot be deleted.
Contracts
The Cisco ACI vCenter plug-in allows CRUD operations on the Contract objects. The following attributes
are exposed in the plug-in:
Name: The name of the contract
Description (Optional): The description of the contract.
Consumers: The consumers for the contract (EPG, uSeg EPGs, L2/L3 External Networks)
Providers: The providers for the contract (EPG, uSeg EPGs, L2/L3 External Networks)
Filters: List of filters associated with the contract
Apply both direction: Indicate if the specified Filters are applying only from consumers to providers or
also from providers to consumers.
L4-L7 Graph Template: It is possible to associate existing graph template to a Contract. See L4-L7
Service section below.
Note Subject is not exposed. The plug-in only manages contracts with a single subject. Contracts with
multiple subjects are seen, but not editable.
If the consumer and the contract are not in the same tenant, a contract interface is automatically
created (named to_Tenant-name_contract-name).
Filters
The Cisco ACI vCenter plug-in allows CRUD operations on the Filter objects. All parameters from the APIC
are exposed.
L4-L7 Services
L4-L7 services can only be added on contracts that have a single provider.
The graph template cannot be created by the plug-in (only consume existing graph templates)
The graph template must be configured so that it contains:
Association with devices
Association with a function profile
The Function Profile folders naming and hierarchy must be valid as the plug-in does not allow folder
manipulation.
Only empty mandatory parameters of the function profile are editable by the plug-in.
Troubleshooting
Only endpoint to endpoint troubleshooting sessions are supported.
You can choose an existing session or create a new one
The physical topology (spine / leaf) is not displayed.
The topology display is VM-centric, focusing on Host, VM, vNIC, and the EPG the vNICs connect
to
Once the vCenter plug-in is connected to the ACI fabric, it allows you to see all the Cisco AVS domains
present on Cisco APIC, and to install, uninstall, upgrade, or downgrade Cisco AVS for some or all of
the hosts in the data center associated with the Cisco AVS domains.
New versions of Cisco AVS that have been downloaded from Cisco.com can be uploaded to the vCenter
using the GUI. These versions can then be installed on the hosts in a given domain.
You can see all hosts if they are connected to a given Cisco AVS domain. You also can see the hosts'
OpFlex Agent status and the current version of Cisco AVS, if installed.
When installing or upgrading Cisco AVS, the vCenter plug-in automatically performs the following steps on
a ESXi host:
1 Places the host into maintenance mode.
2 Uploads the appropriate VIB file to the host data store.
3 Installs or reinstalls Cisco AVS software.
4 Deletes the VIB file from the host data store.
5 Takes the host out of maintenance mode.
Note The vCenter plug-in only installs or uninstalls Cisco AVS VIBs on the hosts; you need to manually
connect or disconnect the host to the Cisco AVS switch.
If the host is part of an HA/DRS cluster, when the host is placed in maintenance mode, the VMs
will be migrated automatically. If the VMs cant be migrated automatically, you need to migrate
them or turn off all the VMs on the host for the installation or upgrade to succeed.
For more information see, Installing Cisco AVS Using the VMware vCenter Plug-in, on page 102 in this guide
or "Upgrading Cisco AVS Using the VMware vCenter Plug-in," "Uninstalling Cisco AVS using the VMware
vCenter Plug-in," or "Downgrading Cisco AVS using the VMware vCenter Plug-in" in the Cisco AVS
Installation Guide.
Procedure
Although you can still register a fabric, you do not have rights to override settings that were created in the
old vCenter. You need to enter any changes in APIC configuration again after restarting vCenter.
Main Menu
1 HomeDisplays the Cisco ACI vCenter plug-in home page and has a Getting Started and an
About tab.
The Getting Started tab that allows you to perform basic tasks such as Create a new Tenant,
Create a new Application Profile, Create a new Endpoint Group and click the Cisco Application
Centric Infrastructure (ACI) link to explore the ACI website.
The About tab displays the current version of the Cisco ACI vCenter plug-in.
2 ACI FabricUsed to register an ACI Fabric in the plug-in and manage the tenants of the fabrics.
3 Application ProfileUsed to manage application profiles by a drag and drop interface of EPG,
uSeg EPG, L2/L3Out and Contract. Provides visibility on an application health, Stats and Faults.
7 ResourcesAllows you to browse in a hierarchical view of all objects managed by the plug-in.
Note While navigating through Application Profile, Networking and Resources sections, a selection bar at
the top of each screen allows you to select an active tenant. Content displayed for each section is specific
to the tenant selected in that bar.
Note All of the times for faults, stats, event and audits are shown in the local timezone of the browser. If the
APIC's time zone does not match the time zone of your system, the time stamp can have a different time
zone.
Home
In the VMware vSphere Web Client, in the Navigator pane, choose Home. In the Work pane displays the
following tabs:
Getting Started tab
The bottom of the Getting Started pane enables you to do the following things:
Click Create a new Tenant to create a new tenant.
About tab
The About pane displays the Cisco ACI vCenter plug-in version.
ACI Fabric
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric. In the Work pane
displays the following tabs:
ACI Fabric tab
The ACI Fabric pane enables you to do the following things:
Click Register a new ACI Fabric / ACI Node to register a new ACI fabric or ACI node.
View information about the current APIC states of the fabric.
Note When the plug-in detects APIC as unavailable, it stops trying to connect to it and will
not update its status anymore. To avoid having to wait for the timeout that comes with
trying to connect to an unresponsive APIC. Click Reload to refresh the APIC state. This
forces it to try to reconnect to each APIC, even to the unavailable ones. This updates
their status, if they are available again.
Tenants tab
The Tenants pane enables you to do the following things:
Manage the different tenants present in the registered ACI Fabrics.
Click Create a new Tenant to create a new tenant.
View the different tenants.
If you select a tenant in the table, you can delete a tenant if you click Delete Tenant <tenant_name>.
If you select a tenant in the table, you can edit the tenant description if you right-click the
<tenant_name> and choose Edit settings.
Application Profile
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Application Profile.
In the Work pane enables you to do the following things:
Choose an active tenant and the application profile.
Click Create a new Application Profile to create a new application profile.
Use the Drag and drop to configure section to drag and drop the different elements to configure your
Application Profiles fully. The elements are:
Endpoint Group
uSeg
L3 External Network
L2 External Network
Contract
View the Policy, Traffic Stats, Health, Faults, Audit Logs, and Events by using the tabs.
In the Policy tab, you can switch back to Consumer and Provider view or traffic view.
Networking
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Networking. In the
Work pane enables you to do the following things:
Set up your own addressing for all endpoint groups by creating isolated VRFs that are populated with
bridge domains. An endpoint group will be associated with one bridge domain.
Choose an active tenant.
Use the Drag and drop to configure section to drag and drop the following elements:
VRF
Bridge Domain
Note The available Layer 3 and Layer 2 endpoint groups are displayed here, but are not
configurable.
Troubleshooting
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Troubleshooting.
In the Work pane displays the following tabs:
Policy Checker tab
The Policy Checker tab enables you to select two entities (Virtual Machine, endpoint group, Layer 3
external network or endpoint), and view all of the contracts and Layer 4 to Layer 7 services that are
enforced between those 2 entities.
You can also start a troubleshooting session between two endpoints:
Choose the time frame of the session in the From, To and fixed time check box.
You can configure the time frame by putting a check in the Fix Time check box.
In the Source Destination section, you can choose the source and destination endpoints. Click on
Start Troubleshooting session to start a new troubleshooting session.
In the Troubleshooting Session, you can inspect faults, configured contracts, event, audits, and
traffic stats.
You can start a trace route between the two endpoints if you click Traceroute.
You can click the icon next to an elements to get details that correspond to the category that you
chose in the left pane.
You can get a topology that represents, for each endpoint, the corresponding vNIC, VM, and host,
and the EPG to which the vNIC is connected.
You can quickly view if the associated EPG has good health or any faults, and view the tenant and
application profile to which it belongs.
Resources
Network
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Resources >
Network. In the Work pane displays the following tabs:
Endpoint Groups tab
Configure the network infrastructure by creating endpoint groups. Each endpoint group has a
corresponding VMware Distributed Port Group where you can connect your virtual machines. You
can organize your different endpoint groups into application profiles.
Choose an active tenant.
Click Create a new Application Profile to create a new application profile.
Choose an application in the table and click Create a new Endpoint Group to create a new
endpoint group.
View the table to see the application profiles and endpoint groups of an active tenant.
Choose an endpoint group to view all of the VMs that are connected to it.
VRFs tab
For all endpoint groups, you can setup your own addressing by creating isolated VRFs that are
populated with bridge domains. An endpoint group will be associated with one bridge domain.
Choose an active tenant.
Click Create a new VRF to create a new VRF.
Click Create a new Bridge Domain to create a new bridge domain.
View the table to see the VRFs.
Security
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Resources >
Security. In the Work pane displays the following tabs:
Contracts tab
Contracts allows you to define security policies between different endpoint groups and security
policies between endpoint groups and Layer 3 and Layer 2 external networks.
Choose an active tenant.
Click Create a new Contract to create a new contract.
View the table to see the contracts.
Filters tab
Filters are entities that matches a given type of traffic (based on protocol, port, etc.). They are used
by contracts to define the authorized services between endpoint groups and Layer 3 external
networks.
Choose an active tenant.
Click Create a new Filter to create a new filter.
View the table to see the filters.
External Connectivity
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Resources >
External Connectivity. In the Work pane displays the following tabs:
L3 External Networks tab
Layer 3 external networks are defined by the APIC administrator. You have the possibility to
consume the defined networks in your contracts and Layer 4 to Layer 7 services, in order to bring
external connectivity to your infrastructure.
Choose an active tenant.
View the table to see the Layer 3 external networks.
L4-7 Services
In the VMware vSphere Web Client, in the Navigator pane, choose Cisco ACI Fabric > Resources >
External Connectivity. In the Work pane displays the following:
Layer 4 to Layer 7 services enables you to add pre-provisoned firewalls and load balancers between
your endpoint groups and Layer 3 external networks.
Choose an active tenant.
View the table to see the Layer 4 to Layer 7 graph instances currently deployed inside the tenant.
GUI Tips
This section provides GUI tips.
You can right-click on ACI object displayed in tables or in graph, to get associated actions.
When a Virtual Machine object is displayed inside a table in the vCenter plug-in, you can double-click
on it to navigate to that Virtual Machine in the vSphere Web Client.
Procedure
Procedure
Procedure
c) Put a check in the Intra EPG isolation check box to isolate the EPG.
This allows you to deny all traffic between the virtual machines that are connected to this EPG. This rule
also applies to machines that are seen under a microsegmented EPG. By default, all virtual machines in
the same EPG can talk to each other.
Creating a New uSeg EPG Using the Drag and Drop Method
This section describes how to create a new uSeg EPG using the drag and drop method.
Procedure
Step 6 In the Bridge Domain field, choose any bridge domain from common or from the tenant where the uSeg EPG
is created. The default bridge domain is common/default. Click the pen icon to select another bridge domain.
Step 7 Put a check in the Intra EPG isolation check box to isolate the EPG.
Step 8 In the Microsegmentation section, click the + icon.
Step 9 In the New micro-segmentation Attribute dialog box, perform the following actions:
Creating a Contract Between Two EPGs Using the Drag and Drop Method
This section describes how to create a contract between two endpoint groups (EPGs) using the drag and drop
method.
Procedure
Procedure
Step 1 Log into the VMware vSphere Web Client. In the Navigator pane, choose Application Profile .
Step 2 In the Navigator pane, choose Application Profile .
Step 3 In the Application Profile pane, perform the following actions:
a) From the Tenant drop-down list, choose a tenant.
b) From the Application Profile drop-down list, choose an application profile.
Step 4 In the Drag and drop to configure element area, drag and drop the contract, and do one of the following:
To have the EPG consume the contract:
1 Drag and drop the Contract on the EPG that needs to consume the contract.
2 Choose the relevant contract (an arrow is displayed going from the EPG to the contract), and click
the contract to make the EPG consume the contract.
For more information, see Creating an EPG Using the Drag and Drop Method, on page 297.
Procedure
Note You cannot do any configuration with a Layer 3 external network. You can only set up a Layer 3 external
network that exists in APIC.
Procedure
c) In the Drag and drop to configure element area, drag and drop the L3 External Network into the
topology.
Step 4 In the Select an object dialog box, expand Tenant <tenant_name> (tenant1), choose the Layer 3 external
network and click OK.
Step 5 In the Drag and drop to configure element area, drag and drop the Contract on top of the Layer 3 external
network and drag to connect the EPG (WEB).
Step 6 In the New Contract dialog box, perform the following actions:
a) In the Consumers field, verify that it displays the correct Layer 3 external network (L3ext).
b) In the Providers field, verify that it displays the correct EPG (WEB).
c) In the Name field, enter the name of the contract (L3ext-to-WEB).
d) (Optional) In the Description field, enter the description of the contract.
e) In the Filters field, you can add traffic filters by clicking the + icon.
f) In the new dialog box, drag and drop all the filters you wish to add to the contract from the list on the left
to the list on the right and click OK.
g) (Optional) Check the Configure L4-7 service check box to configure Layer 4 to Layer 7 services.
h) Click OK to create the contract.
Note You cannot do any configuration with an L2 External Network. You can only set up an L2 External
Network that exists in the APIC.
Procedure
d) In the Drag and drop to configure element area, drag and drop the Contract on top of the L2 external
network, and then drag to connect the EPG (WEB).
Step 4 In the New Contract dialog box, perform the following actions:
a) In the Consumers field, verify that it displays the correct L2 External Network (L2ext).
b) In the Providers field, verify that it displays the correct EPG (WEB).
c) In the Name field, enter the name of the contract (L2ext-to-WEB).
d) In the Description field, enter the description of the contract.
e) In the Filters field, you can add traffic filters by clicking the + icon.
f) In the new dialog box, drag and drop all the filters you wish to add to the contract from the list on the left
to the list on the right and click OK.
g) (Optional) Check the Configure L4-7 service check box to configure Layer 4 to Layer 7 services.
h) Click OK.
Procedure
Procedure
Procedure
Step 13 In the Navigation pane, click Traceroute to start a trace route between the two endpoints.
Procedure
Step 1 Log into the VMware vSphere Web Client, in the Work pane, choose Cisco ACI Fabric.
Step 2 In the Navigator pane, choose Troubleshooting.
Step 3 In the Policy Checker tab, in the Session name section, click Select an existing session.
a) In the Select a section dialog box, choose a troubleshooting session.
b) Click OK.
You can only do endpoint to endpoint troubleshooting.
Step 6 In the Navigation pane, click Traceroute to start a trace route between the two endpoints.
Procedure
you should see the following message in the console if the uninstallation was successful:
Procedure
To upgrade the Cisco ACI vCenter Plug-in, you must follow the installation procedure.
For more information, see Installing the Cisco ACI vCenter Plug-in, on page 279.
com.vmware.vise.vim.cm.CmCatalogManager
Detected service providers (ms):206
[2016-05-31T19:32:56.872Z] [INFO ] m-catalog-manager-pool-11128 70002693 100019 200004
com.vmware.vise.vim.cm.CmCatalogManager
No new locales or service infos to download.
[2016-05-31T19:32:57.678Z] [INFO ] -extensionmanager-pool-11139 70002693 100019 200004
com.vmware.vise.vim.extension.VcExtensionManager
Done downloading plugin package from https://172.23.137.72/vcenter-plugin-2.0.343.6.zip
com.vmware.vise.vim.extension.VcExtensionManager
Done expanding plugin package to /etc/vmware/vsphere-client/vc-packages/vsphere-client-
serenity/com.cisco.aciPlugin-2.0.343.6
[2016-05-31T19:32:58.440Z] [INFO ] -extensionmanager-pool-11139 70002693 100019 200004
com.vmware.vise.extensionfw.ExtensionManager
Undeploying plugin package 'com.cisco.aciPlugin:2.0.343.5.
Reference Information
Alternative Installation of the Cisco ACI vCenter Plug-in
This section describes how to install the Cisco ACI vCenter plug-in. If you cannot enable HTTPS traffic
between your vCenter and APIC and you wish to use your own web server to host the Cisco ACI vCenter
plug-in zip file, follow this procedure.
Procedure
3 In the dialog box, enter the root privilege credentials of the vCenter.
Options Description
To use Python Note You must use Python 2.7.9 or higher and have the pyvmomi package installed in
the Python environment.
Run the Python script: python deployPlugin.py
When prompted, enter the following information:
In the vCenter IP field, enter the vCenter where the plug-in needs to be installed.
In the vCenter Username & Password field, enter the root privilege credentials of
the vCenter.
In the Plugin .zip file URL field, enter the URL where the vCenter will be able to
download the plug-in.
Ensure you have not renamed the .zip file.
In the Https server thumbprint field, Leave this empty, if you are using HTTP.
Otherwise, enter the SHA1 Thumbprint of the Web server used. The fields are separated
with colons. For example:
D7:9F:07:61:10:B3:92:93:E3:49:AC:89:84:5B:03:80:C1:9E:2F:8B
Note There is also a deploy.cfg file available, where you can pre-enter your information.
You can then run the script with the file as argument. For example:
$ python deployPlugin.py deploy.cfg
Step 3 Log into the vSphere Web Client once the registration is completed.
Note First login may take longer, as the vCenter will be downloading and deploying the plug-in from the
Web server.
Once the VMware vSphere Web Client loads, you will see the Cisco ACI Fabric in the Navigator pane. This
allows you to manage your ACI fabric.
Note After you register the plug-in, when you launch the web client for the first time, an error message
might display asking to reload the web client. Click Reload to refresh the page and the error message
will not appear again.
Cisco ACI and Microsoft Windows Azure PackFor information about how to set up Cisco ACI and
Microsoft Windows Azure Pack, see Cisco ACI with Microsoft Windows Azure Pack Solution Overview,
on page 358.
EPG VM Network
on the Application Policy Infrastructure Controller (APIC), while the tenant cloud is an SCVMM cloud that
contains a subset of the host groups specified in the fabric cloud. SCVMM contains all the host groups that
will be used to deploy the logical switch. Once the fabric cloud is set up and the logical switch has been
deployed to the hosts in the host groups, an SCVMM Admin can then create tenant clouds and enable the
apicLogicalNetwork on that tenant cloud, enabling Windows Azure Pack tenants to create and deploy tenant
networks on the fabric.
Example:
SCVMM Cloud Name: Fabric_Cloud
Host Groups: All Hosts
Host Group HumanResources:
HyperV Node: Node-2-24
Host Group Engineering:
HyperV Node: Node-2-25
Note Cisco ACI with Microsoft System Center Virtual Machine Manager (SCVMM) only supports ASCII
characters. Non-ASCII characters are not supported.
Ensure that English is set in the System Locale settings for Windows, otherwise ACI with SCVMM will
not install. In addition, if the System Locale is later modified to a non-English Locale after the installation,
the integration components may fail when communicating with the APIC and the ACI fabric.
Prerequisites for Getting Started with Cisco ACI with Microsoft SCVMM
Before you get started, ensure that you have verified that your computing environment meets the following
prerequisites:
Ensure Microsoft System Center 2016 or 2012 R2 - Virtual Machine Manager (SCVMM) Server and
Administrator Console (SCVMM) with Update Rollup 5, 6, 7, 9, 10 or 11 is installed.
See Microsoft's documentation.
To enable Microsegmentation integration with SCVMM, ensure Microsoft System Center 2016
or 2012 R2 - Virtual Machine Manager (SCVMM) Server and Administrator Console (SCVMM)
with Update Rollup 9, 10, or 11 is installed.
Ensure Windows Server 2016 or 2012 R2 is installed on the Hyper-V server with the Hyper-V role
enabled.
See Microsoft's documentation.
Ensure the cloud is configured in SCVMM and appropriate hosts added to that cloud.
See Microsoft's documentation.
Ensure "default" AEP exists with infrastructure VLAN enabled.
Ensure you have the Cisco MSI files for APIC SCVMM and the Host Agent.
See Getting Started with Cisco ACI with Microsoft SCVMM, on page 314.
Ensure that you scheduled a maintenance window for the SCVMM Installation. The Cisco ACI SCVMM
Installation process with automatically restart the current running SCVMM service instance.
Note If the VMs in SCVMM are configured with Dynamic MAC, then it takes time for the
APIC to update the VM Inventory as the SCVMM takes time to learn or discover these
MAC addresses.
Ensure the Hyper-V Management Tools is installed on the Hyper-V hosts as well as the SCVMM server.
To install the Hyper-V Management Tools feature:
1 In the Remote Server Administration Tools, Add Roles and Features > Feature > Remote Server
Administration Tools > Role Administration Tools > Hyper-V Management Tools and finish
the wizard to install the feature.
2 Repeat for each Hyper-V and the SCVMM server.
This installs the Hyper-V PowerShell cmdlets needed for the APIC SCVMM and host agent.
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft SCVMM
Components
This section describes how to install, set up, and verify the Cisco Application Centric Infrastructure (ACI)
with Microsoft System Center Virtual Machine Manager (SCVMM) components.
Component Task
Install the APIC SCVMM Agent on SCVMM or on See Installing the APIC SCVMM Agent on SCVMM,
a Highly Available SCVMM on page 317.
See Installing the APIC SCVMM Agent on a Highly
Available SCVMM, on page 318
For the Windows Command Prompt method, see
Installing the APIC Agent on SCVMM Using the
Windows Command Prompt, on page 349.
Generate the OpflexAgent certificate See Generating APIC OpFlex Certificate, on page
318.
Add the OpFlex certificate policy to APIC See Adding the OpFlex Certificate Policy to APIC,
on page 320.
Install the OpflexAgent certificate See Installing the OpflexAgent Certificate, on page
321.
Configure APIC IP Settings with APIC credentials See Configuring APIC IP Settings with OpflexAgent
on the SCVMM Agent or on the SCVMM Agent on Certificate on the SCVMM Agent, on page 323.
a Highly Available SCVMM or
See Configuring APIC IP Settings with OpflexAgent
Certificate on the SCVMM Agent on a Highly
Available SCVMM, on page 324.
Install the APIC Hyper-V Agent on the Hyper-V See Installing the APIC Hyper-V Agent on the
server Hyper-V Server, on page 326.
For the Windows Command Prompt method, see
Installing the APIC Hyper-V Agent on the Hyper-V
Server Using the Windows Command Prompt , on
page 349.
Verify the APIC SCVMM Agent installation on See Verifying the APIC SCVMM Agent Installation
SCVMM or on a Highly Available SCVMM on SCVMM, on page 328.
or
See Verifying the APIC SCVMM Agent Installation
on a Highly Available SCVMM, on page 329.
Verify the APIC Hyper-V Agent installation on the See Verifying the APIC Hyper-V Agent Installation
Hyper-V server on the Hyper-V Server, on page 330.
Component Task
Create SCVMM Domain Profiles See Creating SCVMM Domain Profiles, on page 331
and Creating a SCVMM Domain Profile Using the
GUI, on page 331.
For the NX-OS Style CLI method, see Creating a
SCVMM Domain Profile Using the NX-OS Style
CLI, on page 350.
For the REST API method, see Creating a SCVMM
Domain Profile Using the REST API, on page 345.
Verify the SCVMM VMM Domain and SCVMM See Verifying the SCVMM VMM Domain and
VMM SCVMM VMM, on page 333.
Deploy the logical switch to the host on SCVMM See Deploying the Logical Switch to the Host on
SCVMM, on page 334.
Enable the Logical Network on Tenant Clouds See Enabling the Logical Network on Tenant Clouds,
on page 335.
Procedure
Procedure
Step 1 Log in to the Current Owner Node of the Highly Available SCVMM installation.
Step 2 On the SCVMM server in File Explorer, locate the APIC SCVMM Agent.msi file.
Step 3 Right-click APIC SCVMM Agent.msi file and select Install.
Step 4 In the Cisco APIC SCVMM Agent Setup dialog box, perform the following actions:
a) Click Next.
b) Check the I accept the terms in the License Agreement check box and click Next.
c) Enter your account name and password credentials.
Provide the same credentials that you used for the SCVMM console. The Cisco APIC SCVMM agent
requires these credentials for the SCVMM operations to be able to function.
The installation process verifies the entered account name and password credentials. If the installation
fails, the SCVMM shows an error message and you must re-enter valid credentials.
d) After successful validation of the account name and password credentials, click Install.
e) Click Finish.
Step 5 Repeat steps 1-4 for each Standby Node in the Windows Failover Cluster.
Procedure
Step 1 Log in to the SCVMM server, choose Start > Run > Windows Powershell, and then, in the app bar, click
Run as administrator.
Step 2 Load ACISCVMMPsCmdlets and create a new OpflexAgent.pfx certificate file, by entering the following
commands:
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.
PS C:\Users\Administrator.INSCISCO> cd \
PS C:\> cd '.\Program Files (x86)\ApicVMMService'
PS C:\Program Files (x86)\ApicVMMService> Import-Module .\ACIScvmmPsCmdlets.dll
Displaying the Certificate Information to be Used on APIC Using the REST API
This section describes how to display the certificate information to be used on APIC using the REST API.
Procedure
4DEcP+bPiFbiDjMDQ3tMMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQ0FAAOCAQEANc5kKvN4
Q62tIYa1S2HSyiwjaMq7bXoqIH/ICPRqEXu1XE6+VnLnYqpo3TitLmU4G99uz+aS8dySNWaEYghk
8jgLpu39HH6yWxdPiZlcCQ17J5B5vRu3Xjnc/2/ZPqlQDEElobrAOdTko4uAHG4lFBHLwAZA/f72
5fciyb/pjNPhPgpCP0r7svElQ/bjAP1wK8PhCfd7k2rJx5jHr+YX8SCoM2jKyzaQx1BAdufspX3U
7AWH0aF7ExdWy/hW6CduO9NJf+98XNQe0cNH/2oSKYCl9qEK6FesdOBFvCjlRYR9ENqiY4q7xpyB
tqDkBm80V0JslU2xXn+G0yCWGO3VRQ==
-----END CERTIFICATE-----
PS C:\Program Files (x86)\ApicVMMService>
Procedure
Add the AAA policy to allow authenticate this certificate on the APIC server. The Hyper-V agent certificate
policy can be added in APIC through the GUI or REST Post:
GUI method:
1 Log in to the APIC GUI, on the menu bar, choose ADMIN > AAA.
2 In the Navigation pane, choose Security Management > Local Users and click on admin.
3 In the PROPERTIES pane, choose Actions > Create X509 Certificate, in the drop-down list, enter
the name and data.
4 In the Create X509 Certificate dialog box, in the Name field, you must enter "OpflexAgent".
5 On the SCVMM server, enter the output of the PowerShell Read-ApicOpflexCert cmdlet.
6 When you run the Read-ApicOpflexCert cmdlet, provide the full link when prompted for the name
of the pfx file: C:\Program Files (x86)\ApicVMMService\OpflexAgent.pfx, then enter the password.
7 Copy from the beginning of "-----BEGIN CERTIFICATE-----" to the end of "-----END
CERTIFICATE-----"and paste it in the DATA field.
8 Click SUBMIT.
9 In the PROPERTIES pane, under the User Certificates field, you will see the user certificate
displayed.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-----END CERTIFICATE-----
Procedure
10 In the Certificates Import Wizard dialog box, perform the following actions:
a Click Next.
b Browse to the Opflex Agent file and click Next.
11 Enter the password for the certificate that was provided when you installed MSI.
12 You must choose the Mark this key as exportable. This will allow you to back up or transport
your keys at a later time radio button.
13 Choose the Include all extended properties radio button.
14 Choose the Place all certificates in the following store radio button, browse to locate Personal,
and click Next.
15 Click Finish.
16 Click OK.
Procedure
Step 1 Log in to the SCVMM server, choose Start > Run > Windows PowerShell.
Step 2 Load ACISCVMMPsCmdlets by entering the following commands:
Example:
Note Get-ApicCredentials and Set-ApicCredentials are now deprecated, use Get-ApicConnInfo and
Set-ApicConnInfo.
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.
PS C:\Users\Administrator.INSCISCO> cd \
PS C:\> cd '.\Program Files (x86)\ApicVMMService'
PS C:\Program Files (x86)\ApicVMMService> Import-Module .\ACIScvmmPsCmdlets.dll
PS C:\Program Files (x86)\ApicVMMService> Get-Command -Module ACIScvmmPsCmdlets
If you enter the wrong information in Set-ApicCredentials, the information fails to apply and validate on the
APIC. This information is not preserved.
PS C:\Program Files (x86)\ApicVMMService> Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224
-CertificateSubjectName O
pflexAgentWrong
Failed cmdlet with Error: Invalid APIC Connection Settings.
Set-ApicConnInfo : The remote server returned an error: (400) Bad Request.
At line:1 char:1
+ Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224 -CertificateSubjectName Opf ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : InvalidArgument: (:) [Set-ApicConnInfo], WebException
+ FullyQualifiedErrorId : Failed cmdlet with Error: Invalid APIC Connection
Settings.,Cisco.ACI.SCVMM.
PowerShell.SetApicConnInfo
Step 4 Verify that the APIC connection parameters are set properly on APIC SCVMM Agent, enter the following
command:
PS C:\Program Files (x86)\ApicVMMService> Get-ApicConnInfo
EndpointAddress :
Username :
Password :
ApicAddresses : 172.23.139.224
ConnectionStatus : Connected
adminSettingsFlags : 0
certificateSubjectName : OpflexAgent
ExtensionData :
Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM Agent on a Highly
Available SCVMM
This section describes how to configure the Application Policy Infrastructure Controller (APIC) IP settings
with OpflexAgent Certificate on the System Center Virtual Machine Manager (SCVMM) agent.
Procedure
Step 1 Log in to the Owner Node SCVMM server, choose Start > Run > Windows PowerShell.
Step 2 Load ACISCVMMPsCmdlets by entering the following commands:
Example:
Note Get-ApicCredentials and Set-ApicCredentials are now deprecated, use Get-ApicConnInfo and
Set-ApicConnInfo.
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.
PS C:\Users\Administrator.INSCISCO> cd \
PS C:\> cd '.\Program Files (x86)\ApicVMMService'
PS C:\Program Files (x86)\ApicVMMService> Import-Module .\ACIScvmmPsCmdlets.dll
PS C:\Program Files (x86)\ApicVMMService> Get-Command -Module ACIScvmmPsCmdlets
If you enter the wrong information in Set-ApicCredentials, the information fails to apply and validate on the
APIC. This information is not preserved.
PS C:\Program Files (x86)\ApicVMMService> Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224
-CertificateSubjectName O
pflexAgentWrong
Failed cmdlet with Error: Invalid APIC Connection Settings.
Set-ApicConnInfo : The remote server returned an error: (400) Bad Request.
At line:1 char:1
+ Set-ApicConnInfo -ApicNameOrIPAddress 172.23.139.224 -CertificateSubjectName Opf ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : InvalidArgument: (:) [Set-ApicConnInfo], WebException
+ FullyQualifiedErrorId : Failed cmdlet with Error: Invalid APIC Connection
Settings.,Cisco.ACI.SCVMM.
PowerShell.SetApicConnInfo
Step 4 Verify that the APIC connection parameters is set properly on APIC SCVMM Agent, enter the following
command:
PS C:\Program Files (x86)\ApicVMMService> Get-ApicConnInfo
EndpointAddress :
Username :
Password :
ApicAddresses : 172.23.139.224
ConnectionStatus : Connected
adminSettingsFlags : 0
certificateSubjectName : OpflexAgent
ExtensionData
Procedure
Step 1 Log on to the SCVMM server and bring the Hyper-V node into Maintenance Mode.
Step 2 Log in to the Hyper-V server with administrator credentials.
Step 3 On the Hyper-V server in File Explorer, locate the APIC Hyper-V Agent.msi file.
Step 4 Right-click the APIC Hyper-V Agent.msi file and choose Install.
Step 5 In the ApicHypervAgent Setup dialog box, perform the following actions:
a) Check the I accept the terms in the License Agreement check box.
b) Click Install.
c) Click Finish.
Step 6 Follow the steps in Microsoft's documentation to view and bring the apicVSwitch Logical Switch into
compliance. Also referred to in this guide as Host Remediate or Logical Switch Instance Remediation: https:/
/technet.microsoft.com/en-us/library/dn249415.aspx
Step 7 Use one of the following methods:
For large-scale deployments, see Microsoft's documentation for Deploy Certificates by Using Group
Policy:
https://technet.microsoft.com/en-us/library/cc770315(v=ws.10).aspx
For small-scale deployments follow these steps:
You must add OpFlex security certificate in the local system. The Microsoft Hyper-V agent has a security
certificate file named OpflexAgent.pfx located in the C:\Program Files (x86)\ApicVMMService folder
on the SCVMM server. If the following steps are not performed on your Hyper-V servers, the APIC
Hyper-V Agent cannot communicate with the Cisco Application Centric Infrastructure (ACI) fabric leaf
switches.
Install the OpFlex security certificate on the Hyper-V Windows Server 2012 local machines certificate
repository. On each Hyper-V server, install this certificate by performing the following steps:
1 Choose Start > Run.
2 Enter mmc and click OK.
3 In the Console Root window, on the menu bar, choose Add/Remove Snap-in.
4 In the Available Snap-ins field, choose Certificates and click Add.
5 In the Certificates snap-in dialog box, choose the Computer Account radio button, and click Next.
6 In the Select Computer dialog box, choose the Local Computer radio button, and click Finish.
7 Click OK to go back to the main MMC Console window.
8 In the MMC Console window, double-click Certificates (local computer) to expand its view.
9 Right-click Certificates under Personal and choose All Tasks > Import.
10 In the Certificates Import Wizard dialog box, perform the following actions:
a Click Next.
b Browse to the Opflex Agent file and click Next.
11 Enter the password for the certificate that was provided when you installed MSI.
12 You must choose the Mark this key as exportable. This will allow you to back up or transport
your keys at a later time radio button.
13 Choose the Include all extended properties radio button.
14 Choose the Place all certificates in the following store radio button, browse to locate Personal,
and click Next.
15 Click Finish.
16 Click OK.
Step 8 Log on to the SCVMM Sserver and bring the Hyper-V node out of Maintenance Mode.
Step 9 Repeat steps 1 through 8 for each Hyper-V server.
Procedure
Step 4 Verify the ApicVMMService is in RUNNING state through the GUI or CLI:
GUI method: Choose Start > Run and enter services.msc. In the Service pane, locate the
ApicVMMService and verify the state is RUNNING.
CLI method: From the command prompt, enter the sc.exe query ApicHypervAgent command and
verify the state is RUNNING:
sc.exe query ApicVMMService
SERVICE_NAME: ApicVMMService
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Procedure
Step 4 Verify the ApicVMMService is in RUNNING state through the GUI or CLI:
GUI method: Choose Start > Run and enter services.msc. In the Service pane, locate the
ApicVMMService and verify the state is RUNNING.
CLI method: From the command prompt, enter the sc.exe query ApicHypervAgent command and
verify the state is RUNNING:
sc.exe query ApicVMMService
SERVICE_NAME: ApicVMMService
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Step 5 Choose Start > PowerShell and enter the following commands:
PS C:\Users\administrator.APIC\Downloads> Get-ClusterResource -Name ApicVMMService
Resource Name
-------- ----
ApicVMMService SOFTWARE\Wow6432Node\Cisco\Apic
Resource DependencyExpression
-------- --------------------
ApicVMMService ([VMM Service clustervmm07-ha])
Procedure
Step 4 Verify the ApicHypervAgent is in RUNNING state through the GUI or CLI:
GUI method: Choose Start > Run and enter services.msc. In the Service pane, locate the
ApicHypervAgent and verify the state is RUNNING.
CLI method: From the command prompt, enter the sc.exe query ApicHypervAgent command and
verify the state is RUNNING:
sc.exe query ApicHypervAgent
SERVICE_NAME: ApicHypervAgent
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose VM NETWORKING > Inventory.
Step 2 In the Navigation pane, right-click the VM Provider Microsoft and choose Create SCVMM Domain.
Step 3 In the Create SCVMM domain dialog box, in the Name field, enter the domain's name (productionDC).
Step 4 Optional: In the Delimiter field, enter one of the following: |, ~, !, @, ^, +, or =. If you do not enter a symbol,
the system default | delimiter will appear in the policy.
Step 5 In the Associated Attachable Entity Profile field, from the drop-down list, choose Create Attachable Entity
Profile, and perform the following actions to configure the list of switch interfaces across the span of the
VMM domain:
a) In the Create Attachable Access Entity Profile dialog box, in the Profile area, in the Name field, enter
the name (profile1), and click Next.
b) In the Association to Interfaces area, expand Interface Policy Group.
c) In the Configured Interface, PC, and VPC dialog box, in the Configured Interfaces, PC, and VPC
area, expand Switch Profile.
d) In the Switches field, from the drop-down list, check the check boxes next to the desired switch IDs (101
and 102).
e) In the Switch Profile Name field, enter the name (swprofile1).
f) Expand the + icon to configure interfaces.
g) Choose the appropriate interface ports individually in the switch image (interfaces 1/1, 1/2, and 1/3).
The Interfaces field gets populated with the corresponding interfaces.
h) In the Interface Selector Name field, enter the name (selector1).
i) In the Interface Policy Group field, from the drop-down list, choose Create Interface Policy Group.
j) In the Create Access Port Policy Group dialog box, in the Name field, enter the name (group1).
k) Click Submit.
l) Click Save, and click Save again.
m) Click Submit.
n) In the Select the interfaces area, under Select Interfaces, click the All radio button.
o) Verify that in the vSwitch Policies field, the Inherit radio button is selected.
p) Click Finish.
The Attach Entity Profile is selected and is displayed in the Associated Attachable Entity Profile field.
Step 6 In the VLAN Pool field, from the drop-down list, choose Create VLAN Pool. In the Create VLAN Pool
dialog box, perform the following actions:
a) In the Name field, enter the VLAN pool name (VlanRange).
b) In the Allocation Mode field, verify that the Dynamic Allocation radio button is selected.
c) Expand Encap Blocks to add a VLAN block. In the Create Ranges dialog box, enter a VLAN range.
Note We recommend a range of at least 200 VLAN numbers. Do not define a range that includes the
reserved VLAN ID for infrastructure network because that VLAN is for internal use.
d) Click OK, and click Submit.
In the VLAN Pool field, "VlanRange-dynamic" is displayed.
Step 7 Expand SCVMM. In the Create SCVMM Controller dialog box, verify that the Type is SCVMM, and then
perform the following actions:
a) In the Name field, enter the name (SCVMM1).
b) To connect to a SCVMM HA Cluster, specify the SCVMM HA Cluster IP address or the SCVMM Cluster
Resource DNS name, which was specified during the SCVMM HA installation. See How to Connect to
a Highly Available VMM Management Server by Using the VMM Console: https://technet.microsoft.com/
en-us/library/gg610673.aspx
c) In the Host Name (or IP Address) field, enter the Fully Qualified Domain Name (FQDN) or IP address
of your SCVMM.
d) In the SCVMM Cloud Name field, enter the SCVMM cloud name (ACI-Cloud).
e) Click OK.
f) In the Create SCVMM Domain dialog box, click Submit.
Step 8 Verify the new domain and profiles, by performing the following actions:
a) On the menu bar, choose VM Networking > Inventory.
b) In the Navigation pane, choose Microsoft > productionDC > SCVMM1.
c) In the Work pane, view the VMM domain name to verify that the controller is online.
d) In the Work pane, the SCVMM1 properties are displayed including the operational status. The displayed
information confirms that connection from the APIC controller to the SCVMM server is established, and
the inventory is available.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose Fabric > Access Policies.
Step 2 In the Navigation pane, expand Interface Policies > Policy Groups.
Step 3 Choose the policy group and check the name of the policy group.
Step 4 Navigate to the policy group and update it based on your requirements (e.g. LACP or MAC pinning).
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose VM Networking.
Step 2 In the Navigation pane, expand Microsoft > Domain_Name.
Step 3 In the Work pane, click ACTIONS and choose Create VSwitch Policies.
Step 4 On the port channel policy, select the existing policy for mac pinning or create a new policy.
Note If the hosts are already connected to logical switch, then the SCVMM admin should perform host
remediate for all the hosts for uplink policy to take effect.
Procedure
In the System Center Virtual Machine Manager Console GUI, the following object has been created by the
SCVMM agent for the newly created SCVMM VMM domain and VMM Controllers rootContName (SCVMM
Cloud Name):
a) Click Fabric at the bottom left side pane and under fabric verify the following objects:
Example:
1 Choose Networking > Logical Switches and in the right side pane, the logical switch name is
apicVSwitch_VMMdomainName.
2 Choose Networking > Logical Networks and in the right side pane, the logical network name is
apicLogicalNetwork_VMMdomainName.
3 Choose Networking > Port Profiles and in the right side pane, the port profile name is
apicUplinkPortProfile_VMMdomainName.
Example:
1 Choose VM Networks.
2 In the right side pane, the VM network name is apicInfra|10.0.0.30|SCVMM Controller
HostNameORIPAddress filed value|VMMdomainName.
You must use infra VM Network to create VTEP on the Hyper-V server.
Note If SCVMM upgrade is performed and hosts are already connected to logical switch then SCVMM admin
should perform host remediate for all the hosts for hosts to establish connection to leaf.
Procedure
Step 1 Log in to the SCVMM server, in the Navigation pane, choose Fabric on the bottom left.
Step 2 In the Navigation pane, expand Networking > Logical Switches to ensure the logical switch is created
(apicVswitch_cloud1).
Step 3 In the Navigation pane, choose VMs and Services on the bottom left.
Step 4 In the Navigation pane, expand All Hosts.
Step 5 Choose the Hyper-V host folder (Dev8).
Step 6 Right-click the Hyper-V host (Dev8-HV1) and choose Properties.
Step 7 In the Dev8-HV1.inscisco.net Properties dialog box, choose Virtual Switches and perform the following
actions:
a) Choose + New Virtual Switch.
b) Choose New Logical Switch.
c) In the Logical switch field, from the drop-down list, choose a logical switch (apicVswitch_cloud1).
d) In the Adapter field, from the drop-down list, choose an adapter (Leaf1-1-1 - Intel(R) Ethernet Server
Adapter X520-2 #2).
e) In the Uplink Port Profile field, from the drop-down list, choose an Uplink Port Profile
(apicUplinkPortProfile_Cloud01).
f) Click New Virtual Network Adapter, choose the unnamed virtual network adapter, and enter the name
(dev8-hv1-infra-vtep).
g) Click Browse.
h) In the Dev8-HV1.inscisco.net Properties dialog box, choose the VM network
(apicInfra|10.0.0.30|dev8-scvmm.apic.net|Cloud01) and click OK.
Procedure
Step 1 Log in to the SCVMM server with SCVMM administrator credentials, and open up the SCVMM Admin
Console.
Step 2 On the SCVMM Admin Console, navigate to VMs and Services.
Step 3 In the Navigation pane, expand Clouds, right-click on your target Tenant Cloud (HR_Cloud) and choose
Properties.
Step 4 In the Pop-Up Window, in the Navigation pane, choose Logical Networks
a) Locate the logical network which was automatically created as part of associating the VMM Domain to
this SCVMM.
b) Click the logical network check box (apicLogicalNetwork_MyVmmDomain).
c) Click OK.
The tenant cloud is now ready to be used within ACI Integration at the Windows Azure Pack Plan configuration
page.
Procedure
Step 2 Upgrade the APIC SCVMM Agent on SCVMM or Upgrade the APIC SCVMM Agent on a Highly Available
SCVMM.
For more information, see Upgrading the APIC SCVMM Agent on SCVMM, on page 336.
For more information, see Upgrading the APIC SCVMM Agent on a High Available SCVMM, on page 337.
Procedure
The MSI packages handles uninstalling the previous version and installing the new version as part of the
upgrade.
b) Follow the steps outline in the Exporting APIC OpFlex Certificate, on page 356.
c) Follow the steps outline in the Installing the OpflexAgent Certificate, on page 321.
d) Follow the steps outline in the Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM
Agent, on page 323 or Configuring APIC IP Settings with OpflexAgent Certificate on the SCVMM Agent
on a Highly Available SCVMM, on page 324.
Procedure
Step 4 In the Cisco APIC SCVMM Agent Setup dialog box, perform the following actions:
a) Click Next.
b) Check the I accept the terms in the License Agreement check box and click Next.
c) Enter your account name and password credentials.
Provide the same credentials as used for the SCVMM console. The Cisco APIC SCVMM agent requires
these credentials for the SCVMM operations to be able to function.
The installation process verifies the entered account name and password credentials. If the installation
fails, the SCVMM shows an error message and you must re-enter valid credentials.
d) After successful validation of the account name and password credentials, click Install.
e) Click Finish.
Step 5 Repeat steps 1-4 for each Standby Node in the Windows Failover Cluster.
Step 6 Failover from the Current Owner Node of the Highly Available SCVMM installation to one of the newly
upgrade Standby Nodes.
Step 7 Follow steps 2-4 on the final Standby Node of the Windows Failover Cluster.
Procedure
Creating a Tenant
Procedure
Step 1 On the menu bar, choose TENANTS, and perform the following actions:
a) Click Add Tenant.
The Create Tenant dialog box opens.
b) In the Name field, add the tenant name (ExampleCorp).
Step 2 Click Finish.
See the Cisco APIC Basic Configuration Guide for more information.
Creating an EPG
This section describes how to create an endpoint group (EPG).
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Application Profiles > Application Profile Name, right-click
Application EPGs, and choose Create Application EPG.
Step 3 In the Create Application EPG dialog box, perform the following actions:
a) In the Name field, enter the name (EPG1).
b) In the Bridge Domain field, from the drop-down list, choose one to associate with the bridge domain.
c) In the Associate to VM Domain Profiles field, click the appropriate radio button and click Next.
d) In the Associated VM Domain Profiles field, click the + icon, and choose a cloud to add (Cloud10).
You have now created an EPG.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Application Profiles > Application Profile Name >
Application EPGs and select an existing EPG.
Step 3 In the Navigation pane, choose Domains (VMs and Bare-Metals).
Step 4 In the Domains (VM and Bare-Metals) pane, click on the ACTIONS and choose Add VMM Domain
Association.
Step 5 In the Add VMM Domain Association dialog box, click the Deploy Immediacy field radio button for either
Immediate or On Demand.
See EPG Policy Resolution and Deployment Immediacy, on page 12 for more information.
Step 6 In the Add VMM Domain Association dialog box, click the Resolution Immediacy field radio button for
either Immediate, On Demand, or Pre-Provision.
See EPG Policy Resolution and Deployment Immediacy, on page 12 for more information.
You have now created a VM Network.
Step 7 Optional: In the Delimiter field, use a single character as the VM Network Name delimiter, enter one of the
following: |, ~, !, @, ^, +, or = . If you do not enter a symbol, the system default of | will be used.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose VM NETWORKING > INVENTORY.
Step 2 In the Navigation pane, expand Microsoft > Cloud10 > Controller > Controller1 > Distributed Virtual
Switch > SCVMM|Tenant|SCVMM|EPG1|Cloud1.
The name of the new VM Network is in the following format: Tenant Name|Application Profile
Name|Application EPG Name|Microsoft VMM Domain.
Step 3 In the PROPERTIES pane, verify the EPG associated with the VMM domain, the VM Network, and the
details such as NIC NAME, VM NAME, IP, MAC, and STATE.
Procedure
Step 1 Open the Virual Machine Manager Console icon on your desktop.
Step 2 In the bottom left pane, click on VMs and Services or press Ctrl+M.
Step 3 In the VMs and Services pane, click on VM Networks and verify the EPG associated with the VMM domain.
The EPG associated with the VMM domain is in the following format: Tenant Name|Application Profile
Name|Application EPG Name|Microsoft VMM Domain.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Application Profiles > Application Profile Name >
Application EPGs > Your Target EPG, right-click Subnets, and choose Create EPG Subnet.
Step 3 In the Create EPG Subnet dialog box, perform the following actions:
a) Enter a default Gateway IP in address/mask format.
b) Click Submit.
Step 4 Right-click on the newly created subnet and choose Create Static IP Pool Policy.
Step 5 In the Create Static IP Pool Policy dialog box, perform the following actions:
a) Enter a Name (IP).
b) Enter a Start IP and End IP.
c) Enter optional Static IP Pool policies.
The DNS Servers, DNS Search Suffix, Wins Servers fields Allow a list of entries, simply use semicolon
to separate the entries. For example within the DNS Servers Field:
192.168.1.1;192.168.1.2
Note When configuring the Start IP and End IP, ensure they are within the same Subnet as the Gateway
defined in Step 3. If not deployment of the Static IP Address Pool to SCVMM fails.
Only 1 Static IP Address Pool will be used for a given EPG. Do not create multiple Static IP Pool
Policies under a Subnet as the others will not take effect.
The Static IP Address Pool Policy follows the VMM Domain association. If this EPG is deployed
to multiple SCVMM Controllers in the same VMM Domain, then the same Static IP Addresses
will be deployed, causing duplicate IP Addresses. For this scenario, deploy an addition EPG with
a non-overlapping Address pool and create the necessary policies and contracts for the endpoints
to communicate.
Example:
apic1# config
Example:
apic1(config)# tenant t0
apic1(config-tenant)# application a0
apic1(config-tenant-app)# epg e0
apic1(config-tenant-app-epg)# mic
microsoft microsoft-domain
apic1(config-tenant-app-epg)# microsoft static-ip-pool test_pool gateway 1.2.3.4/5
apic1(config-tenant-app-epg-ms-ip-pool)# iprange 1.2.3.4 2.3.4.5
apic1(config-tenant-app-epg-ms-ip-pool)# dns
dnssearchsuffix dnsservers dnssuffix
apic1(config-tenant-app-epg-ms-ip-pool)# dnssuffix testsuffix
apic1(config-tenant-app-epg-ms-ip-pool)# exit
apic1(config-tenant-app-epg)# no mi
microsoft microsoft-domain
apic1(config-tenant-app-epg)# no microsoft static-ip-pool ?
test_pool
apic1(config-tenant-app-epg)# no microsoft static-ip-pool test_pool gateway ?
gwAddress gwAddress
apic1(config-tenant-app-epg)# no microsoft static-ip-pool test_pool gateway 1.2.3.4/5
apic1(config-tenant-app-epg)#
Example:
apic1(config-tenant-app-epg-ms-ip-pool)# show running-config
# Command: show running-config tenant t0 application a0 epg e0 microsoft static-ip-pool
test_pool gateway 1.2.3.4/5
# Time: Thu Feb 11 23:08:04 2016
tenant t0
application a0
epg e0
Procedure
Step 1 Log in to the SCVMM server, choose VMs and Services > All Hosts, and choose one of the hosts.
Step 2 In the VMs pane, right-click on the VM host that you want to associate to the VM Network and choose
Properties.
Step 3 In the Properties dialog box, choose Hardware Configuration, and choose a network adapter (Network
Adapter 1).
Step 4 In the Network Adapter 1 pane, perform the following actions to connect to a VM network:
a) Click the Connect to a VM network radio button.
b) Click the Browse button.
c) Verify the list of VM networks, which lists all of the VM networks to which the hypervisor is associated.
Step 5 Power on the virtual machine.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose VM NETWORKING > INVENTORY.
Step 2 In the Navigation pane, expand Microsoft > Cloud10 > Controller > Controller1 > Hypervisors >
Hypervisor1 > Virtual Machines to verify the association.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Application Profiles > VMM > Application EPGs >
EPG1.
Step 3 In the Application EPG - EPG1 pane, click the OPERATIONAL button, and verify if the endpoint group
is present.
Procedure
Step 1 Log in to the SCVMM server, go to the ApicVMMService logs. Located at C:\Program Files
(X86)\ApicVMMService\Logs.
Step 2 Check the ApicVMMService logs to debug.
If you are unable to debug, on the SCVMM server copy all the ApicVMMService logs from C:\Program
Files (X86)\ApicVMMService\Logs and send them to Cisco Tech Support.
Procedure
Step 1 Log in to the Hyper-V servers, go to the ApicHypervAgent logs. Located at C:\Program Files
(x86)\ApicHypervAgent\Logs.
Step 2 Check the ApicHypervAgent logs to debug.
If you are unable to debug, on the Hyper-V servers copy all the ApicHypervAgent logs from C:\Program
Files (x86)\ApicHypervAgent\Logs and send them to Cisco Tech Support.
Procedure
To perform this operation run the following PowerShell commands on the SCVMM server:
Example:
$VMs = Get-SCVirtualMachine
$VMs | Read-SCVirtualMachine
$NonCompliantAdapters=Get-SCVirtualNetworkAdapter -All | Where-Object
{$_.VirtualNetworkAdapterComplianceStatus -eq "NonCompliant"}
$NonCompliantAdapters | Repair-SCVirtualNetworkAdapter
Procedure
Step 1 Configure a VMM domain name and System Center Virtual Machine Manager (SCVMM) Controller.
Example:
https://<apic-ip>/api/node/mo/.xml
<polUni>
<vmmProvP vendor="Microsoft">
<!-- VMM Domain -->
<vmmDomP name="productionDC">
<!-- Association to VLAN Namespace -->
<infraRsVlanNs tDn="uni/infra/vlanns-VlanRange-dynamic"/>
<!-- SCVMM IP address information
<vmmCtrlrP name="SCVMM1" hostOrIp="172.21.120.21" rootContName="rootCont01"> -->
</vmmCtrlrP>
</vmmDomP>
</vmmProvP>
Step 2 Create an attachable entity profile for VLAN namespace deployment.
Example:
https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraAttEntityP name="profile1">
<infraRsDomP tDn="uni/vmmp-Microsoft/dom-productionDC"/>
</infraAttEntityP>
</infraInfra>
Step 3 Create an interface policy group and selector.
Example:
https://<apic-ip>/api/policymgr/mo/uni.xml
<infraInfra>
<infraAccPortP name="swprofile1ifselector">
<infraHPortS name="selector1" type="range">
<infraPortBlk name="blk"
fromCard="1" toCard="1" fromPort="1" toPort="3">
</infraPortBlk>
<infraRsAccBaseGrp tDn="uni/infra/funcprof/accportgrp-group1" />
</infraHPortS>
</infraAccPortP>
<infraFuncP>
<infraAccPortGrp name="group1">
<infraRsAttEntP tDn="uni/infra/attentp-profile1" />
</infraAccPortGrp>
</infraFuncP>
</infraInfra>
Step 4 Create a switch profile.
Example:
https://<apic-ip>/api/policymgr/mo/uni.xml <infraInfra>
<infraNodeP name="swprofile1"> <infraLeafS
name="selectorswprofile11718" type="range"> <infraNodeBlk name="single0"
from_="101" to_="101"/> <infraNodeBlk name="single1" from_="102"
to_="102"/> </infraLeafS> <infraRsAccPortP
tDn="uni/infra/accportprof-swprofile1ifselector"/> </infraNodeP>
</infraInfra>
Example:
https://<apic-ip>/api/node/mo/.xml
<polUni>
<infraInfra>
<fvnsVlanInstP name="VlanRange" allocMode="dynamic">
<fvnsEncapBlk name="encap" from="vlan-100" to="vlan-400"/>
</fvnsVlanInstP>
</infraInfra>
</polUni>
Step 6 Locate all the configured controllers and their operational state.
Example:
GET:
https://<apic-ip>/api/node/class/vmmAgtStatus.xml
<imdata totalCount="11">
<vmmAgtStatus HbCount="9285" childAction="" dn="uni/vmmp-Microsoft/dom-productionDC
/ctrlr-SCVMM1/AgtStatus-172.21.120.21" lastHandshakeTime="2015-02-24T23:02:51.800+00:00"
lcOwn="local"
modTs="2015-02-24T23:02:53.695+00:00" monPolDn="uni/infra/moninfra-default"
name="172.21.120.21"
operSt="online" remoteErrMsg="" remoteOperIssues="" status="" uid="15374"/>
</imdata>
Step 7 Get the Hyper-Vs under one controller.
Example:
https://<apic-ip>/api/node/class/opflexODev.json?query-target-filter=and(eq(opflexODev.
ctrlrName,'Scale-Scvmm1.inscisco.net'),eq(opflexODev.domName,'Domain1'),ne(opflexODev.isSecondary,'true'))
{"totalCount":"8","subscriptionId":"72057718609018900","imdata":[{"opflexODev":{"attributes":{"childAction"
:"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167807069","devOperIssues":"","devType":"hyperv","dn":"
topology/pod-1/node-191/sys/br-[eth1/43]/odev-167807069","domName":"Domain1","encap":"unknown","features":"0
","hbStatus":"valid-dvs","hostName":"Scale-Hv2.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.136.93",
"isSecondary":"false","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:10:25.684-07:00","lastNumHB":"19772","
lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:12:09.485-07:00","monPolDn":
"uni/fabric/monfab-default","name":"","numHB":"19772","operSt":"identified","pcIfId":"1","portId":"0","state
":"connected","status":"","transitionStatus":"attached","uid":"15374","updateTs":"0","uuid":"","version":""}
}},{"opflexODev":{"attributes":{"childAction":"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167831641"
,"devOperIssues":"","devType":"hyperv","dn":"topology/pod-1/node-191/sys/br-[eth1/43]/odev-167831641","domNa
me":"Domain1","encap":"unknown","features":"0","hbStatus":"valid-dvs","hostName":"Scale-Hv6.inscisco.net","i
d":"0","ip":"0.0.0.0","ipAddr":"10.0.232.89","isSecondary":"false","lNodeDn":"","lastHandshakeTime":"2015-04
-15T17:10:26.492-07:00","lastNumHB":"15544","lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs
":"2015-04-15T17:12:10.292-07:00","monPolDn":"uni/fabric/monfab-default","name":"","numHB":"15544","operSt":
"identified","pcIfId":"1","portId":"0","state":"connected","status":"","transitionStatus":"attached","uid":"
15374","updateTs":"0","uuid":"","version":""}}},{"opflexODev":{"attributes":{"childAction":"","ctrlrName":"S
cale-Scvmm1.inscisco.net","devId":"167831643","devOperIssues":"","devType":"hyperv","dn":"topology/pod-1/nod
e-191/sys/br-[eth1/43]/odev-167831643","domName":"Domain1","encap":"unknown","features":"0","hbStatus":"vali
d-dvs","hostName":"Scale-Hv3.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.232.91","isSecondary":"fal
se","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:10:23.268-07:00","lastNumHB":"15982","lcOwn":"local","ma
c":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:12:07.068-07:00","monPolDn":"uni/fabric/monfab
-default","name":"","numHB":"15982","operSt":"identified","pcIfId":"1","portId":"0","state":"connected","sta
tus":"","transitionStatus":"attached","uid":"15374","updateTs":"0","uuid":"","version":""}}},{"opflexODev":{
"attributes":{"childAction":"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167807070","devOperIssues":"
","devType":"hyperv","dn":"topology/pod-1/node-191/sys/br-[eth1/43]/odev-167807070","domName":"Domain1","enc
ap":"unknown","features":"0","hbStatus":"valid-dvs","hostName":"Scale-Hv8.inscisco.net","id":"0","ip":"0.0.0
.0","ipAddr":"10.0.136.94","isSecondary":"false","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:10:26.563-0
7:00","lastNumHB":"14219","lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:1
2:10.364-07:00","monPolDn":"uni/fabric/monfab-default","name":"","numHB":"14219","operSt":"identified","pcIf
Id":"1","portId":"0","state":"connected","status":"","transitionStatus":"attached","uid":"15374","updateTs":
"0","uuid":"","version":""}}},{"opflexODev":{"attributes":{"childAction":"","ctrlrName":"Scale-Scvmm1.inscis
co.net","devId":"167831642","devOperIssues":"","devType":"hyperv","dn":"topology/pod-1/node-191/sys/br-[eth1
/43]/odev-167831642","domName":"Domain1","encap":"unknown","features":"0","hbStatus":"valid-dvs","hostName":
"Scale-Hv4.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.232.90","isSecondary":"false","lNodeDn":"","
lastHandshakeTime":"2015-04-15T17:10:24.978-07:00","lastNumHB":"13947","lcOwn":"local","mac":"00:00:00:00:00
:00","maxMissHb":"0","modTs":"2015-04-15T17:12:08.778-07:00","monPolDn":"uni/fabric/monfab-default","name":"
","numHB":"13947","operSt":"identified","pcIfId":"1","portId":"0","state":"connected","status":"","transitio
nStatus":"attached","uid":"15374","updateTs":"0","uuid":"","version":""}}},{"opflexODev":{"attributes":{"chi
ldAction":"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167807071","devOperIssues":"","devType":"hyper
v","dn":"topology/pod-1/node-190/sys/br-[eth1/43]/odev-167807071","domName":"Domain1","encap":"unknown","fea
tures":"0","hbStatus":"valid-dvs","hostName":"Scale-Hv7.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0
.136.95","isSecondary":"false","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:12:10.057-07:00","lastNumHB":
"5708","lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:12:09.659-07:00","mo
nPolDn":"uni/fabric/monfab-default","name":"","numHB":"5708","operSt":"identified","pcIfId":"1","portId":"0"
,"state":"connected","status":"","transitionStatus":"attached","uid":"15374","updateTs":"0","uuid":"","versi
on":""}}},{"opflexODev":{"attributes":{"childAction":"","ctrlrName":"Scale-Scvmm1.inscisco.net","devId":"167
807067","devOperIssues":"","devType":"hyperv","dn":"topology/pod-1/node-190/sys/br-[eth1/43]/odev-167807067"
,"domName":"Domain1","encap":"unknown","features":"0","hbStatus":"valid-dvs","hostName":"Scale-Hv1.inscisco.
net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.136.91","isSecondary":"false","lNodeDn":"","lastHandshakeTime":"
2015-04-15T17:12:08.637-07:00","lastNumHB":"17659","lcOwn":"local","mac":"00:00:00:00:00:00","maxMissHb":"0"
,"modTs":"2015-04-15T17:12:08.240-07:00","monPolDn":"uni/fabric/monfab-default","name":"","numHB":"17659","o
perSt":"identified","pcIfId":"1","portId":"0","state":"connected","status":"","transitionStatus":"attached",
"uid":"15374","updateTs":"0","uuid":"","version":""}}},{"opflexODev":{"attributes":{"childAction":"","ctrlrN
ame":"Scale-Scvmm1.inscisco.net","devId":"167831644","devOperIssues":"","devType":"hyperv","dn":"topology/po
d-1/node-190/sys/br-[eth1/43]/odev-167831644","domName":"Domain1","encap":"unknown","features":"0","hbStatus
":"valid-dvs","hostName":"Scale-Hv5.inscisco.net","id":"0","ip":"0.0.0.0","ipAddr":"10.0.232.92","isSecondar
y":"false","lNodeDn":"","lastHandshakeTime":"2015-04-15T17:12:09.093-07:00","lastNumHB":"15433","lcOwn":"loc
al","mac":"00:00:00:00:00:00","maxMissHb":"0","modTs":"2015-04-15T17:12:08.695-07:00","monPolDn":"uni/fabric
/monfab-default","name":"","numHB":"15433","operSt":"identified","pcIfId":"1","portId":"0","state":"connecte
d","status":"","transitionStatus":"attached","uid":"15374","updateTs":"0","uuid":"","version":""}}}]}
Example:
https://<apic-ip>/api/node/mo/topology/pod-1/node-190/sys/br-[eth1/43]/odev-167807067.
json?query-target=children&target-subtree-class=opflexOVm&subscription=yes
{"totalCount":"1","subscriptionId":"72057718609018947","imdata":[{"opflexOVm":{"attributes":{"childAction":"
","ctrlrName":"Scale-Scvmm1.inscisco.net","dn":"topology/pod-1/node-190/sys/br-[eth1/43]/odev-167807067/ovm-
ExtConn_1002_EPG17_003","domName":"Domain1","id":"0","lcOwn":"local","modTs":"2015-04-14T17:36:51.512-07:00"
,"name":"ExtConn_1002_EPG17_003","state":"Powered On","status":"","uid":"15374"}}}]}
Step 9 Get VNICs under one VM.
Example:
https://<apic-ip>/api/node/class/opflexIDEp.json?query-target-filter=eq(opflexIDEp.
containerName,'ExtConn_1002_EPG17_003')
{"totalCount":"4","subscriptionId":"72057718609018983","imdata":[{"opflexIDEp":{"attributes":{"brIfId":"eth1
/43","childAction":"","compHvDn":"","compVmDn":"","containerName":"ExtConn_1002_EPG17_003","ctrlrName":"Scal
e-Scvmm1.inscisco.net","dn":"topology/pod-1/node-190/sys/br-[eth1/43]/idep-00:15:5D:D2:14:84-encap-[vlan-139
8]","domName":"Domain1","domPDn":"","dpAttr":"0","encap":"vlan-1398","epHostAddr":"http://10.0.136.91:17000/
Vleaf/policies/setpolicies","epPolDownloadHint":"all","epgID":"","eppDownloadHint":"always","eppdn":"uni/epp
/fv-[uni/tn-ExtConn_1002/ap-SCVMM/epg-EPG17]","gtag":"0","handle":"0","hypervisorName":"Scale-Hv1.inscisco.n
et","id":"0","instType":"unknown","ip":"0.0.0.0","lcC":"","lcOwn":"local","mac":"00:15:5D:D2:14:84","mcastAd
dr":"0.0.0.0","modTs":"2015-04-14T17:36:50.838-07:00","monPolDn":"uni/fabric/monfab-default","name":"00155DD
21484","pcIfId":"1","portId":"0","scopeId":"0","state":"up","status":"","transitionStatus":"attached","uuid"
:"","vendorId":"Microsoft","vmAttr":"vm-name","vmAttrDn":"","vmAttrOp":"equals","vmAttrOverride":"0","vmmSrc
":"msft"}}},{"opflexIDEp":{"attributes":{"brIfId":"eth1/43","childAction":"","compHvDn":"","compVmDn":"","co
ntainerName":"ExtConn_1002_EPG17_003","ctrlrName":"Scale-Scvmm1.inscisco.net","dn":"topology/pod-1/node-190/
sys/br-[eth1/43]/idep-00:15:5D:D2:14:85-encap-[vlan-1438]","domName":"Domain1","domPDn":"","dpAttr":"0","enc
ap":"vlan-1438","epHostAddr":"http://10.0.136.91:17000/Vleaf/policies/setpolicies","epPolDownloadHint":"all"
,"epgID":"","eppDownloadHint":"always","eppdn":"uni/epp/fv-[uni/tn-ExtConn_1002/ap-SCVMM-Domain1/epg-EPG1]",
"gtag":"0","handle":"0","hypervisorName":"Scale-Hv1.inscisco.net","id":"0","instType":"unknown","ip":"0.0.0.
0","lcC":"","lcOwn":"local","mac":"00:15:5D:D2:14:85","mcastAddr":"0.0.0.0","modTs":"2015-04-14T17:36:51.025
-07:00","monPolDn":"uni/fabric/monfab-default","name":"00155DD21485","pcIfId":"1","portId":"0","scopeId":"0"
,"state":"up","status":"","transitionStatus":"attached","uuid":"","vendorId":"Microsoft","vmAttr":"vm-name",
"vmAttrDn":"","vmAttrOp":"equals","vmAttrOverride":"0","vmmSrc":"msft"}}},{"opflexIDEp":{"attributes":{"brIf
Id":"eth1/43","childAction":"","compHvDn":"","compVmDn":"","containerName":"ExtConn_1002_EPG17_003","ctrlrNa
me":"Scale-Scvmm1.inscisco.net","dn":"topology/pod-1/node-191/sys/br-[eth1/43]/idep-00:15:5D:D2:14:84-encap-
[vlan-1398]","domName":"Domain1","domPDn":"","dpAttr":"0","encap":"vlan-1398","epHostAddr":"http://10.0.136.
91:17000/Vleaf/policies/setpolicies","epPolDownloadHint":"all","epgID":"","eppDownloadHint":"always","eppdn"
:"uni/epp/fv-[uni/tn-ExtConn_1002/ap-SCVMM/epg-EPG17]","gtag":"0","handle":"0","hypervisorName":"Scale-Hv1.i
nscisco.net","id":"0","instType":"unknown","ip":"0.0.0.0","lcC":"","lcOwn":"local","mac":"00:15:5D:D2:14:84"
,"mcastAddr":"0.0.0.0","modTs":"2015-04-14T17:36:50.731-07:00","monPolDn":"uni/fabric/monfab-default","name"
:"00155DD21484","pcIfId":"1","portId":"0","scopeId":"0","state":"up","status":"","transitionStatus":"attache
d","uuid":"","vendorId":"Microsoft","vmAttr":"vm-name","vmAttrDn":"","vmAttrOp":"equals","vmAttrOverride":"0
","vmmSrc":"msft"}}},{"opflexIDEp":{"attributes":{"brIfId":"eth1/43","childAction":"","compHvDn":"","compVmD
n":"","containerName":"ExtConn_1002_EPG17_003","ctrlrName":"Scale-Scvmm1.inscisco.net","dn":"topology/pod-1/
node-191/sys/br-[eth1/43]/idep-00:15:5D:D2:14:85-encap-[vlan-1438]","domName":"Domain1","domPDn":"","dpAttr"
:"0","encap":"vlan-1438","epHostAddr":"http://10.0.136.91:17000/Vleaf/policies/setpolicies","epPolDownloadHi
nt":"all","epgID":"","eppDownloadHint":"always","eppdn":"uni/epp/fv-[uni/tn-ExtConn_1002/ap-SCVMM-Domain1/ep
g-EPG1]","gtag":"0","handle":"0","hypervisorName":"Scale-Hv1.inscisco.net","id":"0","instType":"unknown","ip
":"0.0.0.0","lcC":"","lcOwn":"local","mac":"00:15:5D:D2:14:85","mcastAddr":"0.0.0.0","modTs":"2015-04-14T17:
36:50.932-07:00","monPolDn":"uni/fabric/monfab-default","name":"00155DD21485","pcIfId":"1","portId":"0","sco
peId":"0","state":"up","status":"","transitionStatus":"attached","uuid":"","vendorId":"Microsoft","vmAttr":"
vm-name","vmAttrDn":"","vmAttrOp":"equals","vmAttrOverride":"0","vmmSrc":"msft"}}}]}
Reference Information
Installing the APIC Agent on SCVMM Using the Windows Command Prompt
This section describes how to install the APIC Agent on System Center Virtual Machine Manager (SCVMM)
using the Windows Command Prompt.
Procedure
Example:
C:\>cd MSIPackage
C:\MSIPackage>dir
Volume in drive C has no label.
Volume Serial Number is 726F-5AE6
Directory of C:\MSIPackage
SERVICE_NAME: ApicVMMService
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Step 3 If the msiexec.exe installer package succeeds, it finishes without any warning or error messages. If it fails, it
displays the appropriate warning or error message.
Installing the APIC Hyper-V Agent on the Hyper-V Server Using the Windows
Command Prompt
This section describes how to install the APIC Hyper-V Agent on the Hyper-V server using the windows
Command Prompt.
Procedure
Example:
C:\>cd MSIPackage
C:\MSIPackage>dir
Volume in drive C has no label.
Volume Serial Number is C065-FB79
Directory of C:\MSIPackage
SERVICE_NAME: ApicHyperVAgent
TYPE : 10 WIN32_OWN_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, ACCEPTS_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0
Step 3 Repeat steps 1 through 2 for each Hyper-V server.
If the msiexec.exe installer package succeeds, it finishes without any warning or error messages. If it fails, it
displays the appropriate warning or error message.
Procedure
Step 1 In the NX-OS Style CLI, configure a vlan-domain and add the VLAN ranges:
Example:
apic1# configure
apic1(config)# vlan-domain vmm_test_1 dynamic
apic1(config-vlan)# vlan 150-200 dynamic
apic1(config-vlan)# exit
Example:
apic1(config)# leaf 101
apic1(config-leaf)# interface ethernet 1/2
apic1(config-leaf-if)# vlan-domain member vmm_test_1
apic1(config-leaf-if)# exit
apic1(config-leaf)# exit
Step 3 Create the Microsoft SCVMM domain and associate it with the previously created vlan-domain. Create the
SCVMM controller under this domain:
Example:
apic1(config)# microsoft-domain mstest
apic1(config-microsoft)# vlan-domain member vmm_test_1
apic1(config-microsoft)# scvmm 134.5.6.7 cloud test
apic1#
Programmability References
ACI SCVMM PowerShell Cmdlets
This section describes how to list the Cisco Application Centric Infrastructure (ACI) System Center Virtual
Machine Manager (SCVMM) PowerShell cmdlets, help, and examples.
Procedure
Step 1 Log in to the SCVMM server, choose Start > Run > Windows PowerShell.
Step 2 Enter the following commands:
Example:
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.
Example:
commandname -?
Step 4 Generating examples:
Example:
get-help commandname -examples
Configuration References
MAC Address Configuration Recommendations
This section describes the MAC address configuration recommendations.
Both Dynamic and Static MAC are supported.
Static MAC for the VM Network adapter is recommended if you want the VM inventory to show up
quickly on APIC.
If you choose Dynamic MAC there is a delay for the VM inventory to show up on APIC. The delay is
because Dynamic MACs are not learned by SCVMM right away.
Note The Data plane works fine even though the VM inventory does not show up.
Figure 26: Shows the MAC address section in the Properties pane.
Procedure
Step 2 Delete the Infra VLAN tunnel endpoint (VTEP) and APIC logical switches on all Hyper-Vs.
See Microsoft's documentation.
Step 3 Verify the APIC GUI to make sure all the VMs and hosts are disconnected.
Step 4 Delete the VMM Domain from the Application Policy Infrastructure Controller (APIC).
See Guidelines for Deleting VMM Domains, on page 13.
Step 5 Verify the logical switch and logical networks are removed from SCVMM.
Step 6 Uninstall the APIC SCVMM Agent on SCVMM or on a Highly Available SCVMM.
See Uninstalling the APIC SCVMM Agent, on page 354.
See Uninstalling the APIC SCVMM Agent on a Highly Available SCVMM, on page 354
Procedure
Procedure
Step 1 Log in to any node within the Highly Available SCVMM Failover Cluster.
Step 2 Open the Failover Cluster Manager Application.
Step 3 In the Windows Failover Cluster Manager window, select ApicVMMService in the Highly Available
SCVMM Roles/Resources tab.
Step 4 Right-click on the ApicVMMService Role and choose Take Offline.
Step 5 Once the Role is offline, right-click on the ApicVMMService Role and choose Remove.
Step 6 On each node within the Highly Available SCVMM Failover Cluster, perform the following actions to uninstall
the APIC SCVMM Agent:
a) Log in to the SCVMM server.
b) Choose Start > Control Panel > Uninstall a Program.
c) In the Programs and Features window, right-click ApicVMMService and choose Uninstall.
This uninstalls the APIC SCVMM Agent.
d) To verify if the APIC SCVMM Agent is uninstalled, in the Programs and Features window, verify that
ApicVMMService is not present.
Procedure
Step 1 Uninstall the APIC SCVMM Agent on SCVMM or on a Highly Available SCVMM.
See Uninstalling the APIC SCVMM Agent, on page 354.
See Uninstalling the APIC SCVMM Agent on a Highly Available SCVMM, on page 354
Step 2 Update the logical switch and virtual switch extension mapping.
a) In the logical switch properties dialog box.
b) Choose Extensions.
c) Uncheck Cisco ACI Virtual Switch Filter.
d) Click OK.
Step 3 Downgrade APIC controller.
See the Cisco APIC Firmware Management Guide.
Procedure
Step 1 Log in to a Hyper-V node which is currently a member of the ACI Fabric.
Step 2 Export the certificate from the Hyper-V node by performing the following actions:
a) Choose Start > Run and type certlm.msc to launch the Certificate Manager.
b) In the navigation pane, right-click on Certificates - Local Computer and choose Find Certificates.
c) In the Find Certificate dialog box, perform the following actions:
In the Find in field, from the drop-down list, choose All certificate stores.
In the Contains field, enter OpflexAgent.
In the Look in Field field, from the drop-down list, choose Issued By.
Click Find Now.
Your result list should have a single Certificate in the list.
Step 3 In the Certificate Export Wizard dialog box, perform the following actions:
a) In the Welcome to the Certificate Export Wizard dialog box, click Next
b) In the Export Private Key dialog box, choose the Yes, export the private key radio button, and click
Next.
c) In the Export File Format dialog box, choose the Personal Information Exchange - PKCS #12 (.PFX)
radio button, check the Include all certificates in the certificate path if possible and Export all extended
properties check box. Click Next.
d) In the Security dialog box, check the Password check box, enter your PFX password and enter your PFX
password again to confirm. Click Next.
Your PFX password will be used later to import the PFX file on the target machine.
e) In the File to Export dialog box, enter the filename you wish to save the exported file (C:\OpflexAgent.pfx)
and click Next.
f) In the Completing the Certificate Export Wizard dialog box, review all your specified settings are
correct and click Finish.
g) The Certificate Export Wizard dialog box will appear with The export was successful. and click Ok.
Step 4 Copy the PFX file to a known location.
You can deploy the certificate through an Active Directory Group Policy or copy the file to your various
Microsoft Servers which host your SCVMM, Windows Azure Pack Resource Provider, and Hyper-V services
for integration into the ACI Fabric.
About Cisco ACI with Microsoft Windows Azure Pack, page 357
Getting Started with Cisco ACI with Microsoft Windows Azure Pack, page 361
Upgrading the Cisco ACI with Microsoft Windows Azure Pack Components, page 367
Use Case Scenarios for the Administrator and Tenant Experience, page 370
Troubleshooting Cisco ACI with Microsoft Windows Azure Pack, page 402
Programmability References, page 403
Uninstalling the Cisco ACI with Microsoft Windows Azure Pack Components, page 404
Downgrading the APIC Controller and the Switch Software with Cisco ACI with Microsoft Windows
Azure Pack Components, page 407
Cisco ACI with Microsoft System Center Virtual Machine Manager For information about how to
set up Cisco ACI with Microsoft System Center Virtual Machine Manager (SCVMM), see details in
Cisco ACI with Microsoft SCVMM Solution Overview, on page 312.
See Use Case Scenarios for the Administrator and Tenant Experience, on page 370 for details.
The above figure shows a representative topology of a typical Windows Azure Pack deployment with Cisco
Application Centric Infrastructure (ACI) fabric. Connectivity between Windows Azure Pack and Application
Policy Infrastructure Controller (APIC) is over the management network. Tenants interface is only with
Windows Azure Pack either through the GUI or REST API. Tenants do not have direct access to APIC.
Network EPG
Note Cisco ACI with Microsoft Windows Azure Pack only supports ASCII characters. Non-ASCII characters
are not supported.
Ensure that English is set in the System Locale settings for Windows, otherwise ACI with Windows Azure
Pack will not install. In addition, if the System Locale is later modified to a non-English Locale after the
installation, the integration components may fail when communicating with the APIC and the ACI fabric.
Prerequisites for Getting Started with Cisco ACI with Microsoft Windows
Azure Pack
Before you get started, ensure that you have verified that your computing environment meets the following
prerequisites:
Ensure Cisco Application Centric Infrastructure (ACI) with Microsoft System Center Virtual Machine
Manager (SCVMM) has been set up.
For more information, see Getting Started with Cisco ACI with Microsoft SCVMM, on page 314.
Ensure Microsoft Windows Azure Pack Update Rollup 5, 6, 7, 9, 10, or 11 is installed.
See Microsoft's documentation.
Ensure Microsoft System Center 2012 R2 - Virtual Machine Manager (SCVMM) Administrator Console
is installed on the Windows Azure Pack Resource Provider Server.
See Microsoft's documentation.
Ensure Hyper-V Host is installed.
Note Symptom: When you either create or update a plan it may fail with an error message.
Condition: If you have configured Microsoft's Windows Azure Pack without the FQDN, you will encounter
the following error message:
Cannot validate the new quota settings because one of the underlying services failed to
respond. Details: An error has occurred.
Workaround: When you configure the VM Clouds, follow Microsoft's Windows Azure Pack UI instructions
which informs you to use the FQDN for your SCVMM server.
Installing, Setting Up, and Verifying the Cisco ACI with Microsoft Windows
Azure Pack Components
This section describes how to install, set up, and verify the Cisco ACI with Microsoft Windows Azure Pack
components.
Component Task
Install ACI Azure Pack Resource Provider See Installing ACI Azure Pack Resource Provider,
on page 363.
Install the OpflexAgent certificate See Installing the OpflexAgent Certificate, on page
363.
Configure ACI Azure Pack Resource Provider Site See Configuring ACI Azure Pack Resource Provider
Site, on page 365.
Install ACI Azure Pack Admin site extension See Installing ACI Azure Pack Admin Site
Extension, on page 366.
Install ACI Azure Pack tenant site extension See Installing ACI Azure Pack Tenant Site
Extension, on page 366.
Component Task
Set up the ACI See Setting Up ACI, on page 366.
Verify the Windows Azure Pack Resource Provider See Verifying the Windows Azure Pack Resource
Provider, on page 367.
Procedure
Step 1 Log in to the Microsoft Service Provider Foundation Server which provides VM Clouds in the Windows
Azure Pack environment. Locate and copy over ACI Azure Pack - Resource Provider Site.msi file.
Step 2 Double-click the ACI Azure Pack - Resource Provider Site.msi file.
Step 3 In the Setup dialog box, perform the following actions to install ACI Azure Pack - Resource Provider:
a) Check the I accept the terms in the License Agreement check box.
b) Click Install.
c) Click Install.
d) Click Finish.
Procedure
Step 1 Log in to the Windows Azure Pack server with administrator credentials.
Step 2 Use one of the following methods:
For large-scale deployments, see Microsoft's documentation for Deploy Certificates by Using Group
Policy:
https://technet.microsoft.com/en-us/library/cc770315(v=ws.10).aspx.
For small-scale deployments follow these steps:
You must add OpFlex security certificate to the local system. The ACI Windows Azure Pack resource
provider uses the same security certificate file from the Cisco ACI SCVMM installation process located
on your SCVMM Server at: C:\Program Files (x86)\ApicVMMService\OpflexAgent.pfx. Copy this
file to the Windows Azure Pack Resource Provider Server. If the following steps are not performed on
your ACI Windows Azure Pack resource provider servers, the APIC ACI Windows Azure Pack resource
provider cannot communicate with the Application Policy Infrastructure Controller (APIC) .
Install the OpFlex security certificate on the ACI Windows Azure Pack resource provider Windows
Server 2012 local machines certificate repository. On each ACI Windows Azure Pack resource provider
server, install this certificate by performing the following steps:
1 Choose Start > Run.
2 Enter mmc and click OK.
3 In the Console Root window, on the menu bar, choose Add/Remove Snap-in.
4 In the Available Snap-ins field, choose Certificates and click Add.
5 In the Certificates snap-in dialog box, choose the Computer Account radio button, and click Next.
6 In the Select Computer dialog box, choose the Local Computer radio button, and click Finish.
7 Click OK to go back to the main MMC Console window.
8 In the MMC Console window, double-click Certificates (local computer) to expand its view.
9 Right-click Certificates under Personal and choose All Tasks > Import.
10 In the Certificates Import Wizard dialog box, perform the following actions:
a Click Next.
b Browse to the Opflex Agent file and click Next.
11 Enter the password for the certificate that was provided when you installed MSI.
12 You must choose the Mark this key as exportable. This will allow you to back up or transport
your keys at a later time radio button.
13 Choose the Include all extended properties radio button.
14 Choose the Place all certificates in the following store radio button, browse to locate Personal,
and click Next.
15 Click Finish.
16 Click OK.
Procedure
Step 1 Log in to the Windows Azure Pack server and open the Internet Information Services Manager Application.
Step 2 Navigate to Application Pools > Cisco-ACI.
Step 3 Click the Advanced Settings in the Actions tab.
a) Locate the Identity field and click on the ellipses to the left of the scroll bar.
b) Select Custom Account and input your account name and password credentials for Service Provider
Foundation Administrator. The Service Provider Foundation Administrator user account should have the
following group memberships: Administrators, SPF_Admin. This user account is required as the Resource
Provider queries the attached SCVMM servers. In addition, the User Credentials must have permission
to write to the Local Machine Registry and have Read/Write access to the following directory for Resource
Provider Logging:
C:\Windows\System32\config\systemprofile\AppData\Local
c) Click OK to exit Application Pool Identity.
Step 4 Click OK to exit Advanced Settings
Procedure
Step 1 Log in to the Windows Azure Pack server and locate the ACI Azure Pack - Admin Site Extension.msi file.
Step 2 Double-click the ACI Azure Pack - Admin Site Extension.msi file.
Step 3 In the Setup dialog box, perform the following actions to install ACI Azure Pack - Admin Site Extension:
a) Check the I accept the terms in the License Agreement check box.
b) Click Install.
c) Click Finish.
Procedure
Step 1 Log in to the Windows Azure Pack server and locate the ACI Azure Pack - Tenant Site Extension.msi file.
Step 2 Double-click the ACI Azure Pack - Tenant Site Extension.msi file.
Step 3 In the Setup dialog box, perform the following actions to install ACI Azure Pack - Tenant Site Extension:
a) Check the I accept the terms in the License Agreement check box.
b) Click Install.
c) Click Finish.
Setting Up ACI
This section describes how to setup ACI.
Procedure
Procedure
To upgrade the .msi files for each Cisco ACI with Windows Azure Pack Integration follow the Microsoft
general guidelines for upgrading Windows Azure Pack Components listed per Update Rollup. The general
guidelines are:
If the system is currently operational (handling customer traffic), schedule downtime for the Azure
servers. The Windows Azure Pack does currently not support rolling upgrades.
Stop or redirect customer traffic to sites that you consider satisfactory.
Create backups of the computers.
Note If you are using virtual machines (VMs), take snapshots of their current state.
If you are not using VMs, take a backup of each MgmtSvc-* folder in the inetpub directory on each
machine that has a Windows Azure Pack component installed.
Collect information and files that are related to your certificates, host headers, or any port changes.
Once the upgrade is complete and has been verified, follow Hyper-V best practices regarding managing
VM snapshots: https://technet.microsoft.com/en-us/library/dd560637(v=ws.10).aspx
Procedure
Step 6 Upgrade the APIC SCVMM Agent on SCVMM or Upgrade the APIC SCVMM Agent on a Highly Available
SCVMM.
For more information, see Upgrading the APIC SCVMM Agent on SCVMM, on page 336.
For more information, see Upgrading the APIC SCVMM Agent on a High Available SCVMM, on page 337.
Procedure
Procedure
Procedure
Note If the shared service consumer is in a different VRF than the provider, route leaking between the VRFs
will automatically occur in order to enable the communication.
Creating a tenant Yes Yes Admin See Creating a Tenant, on page 376.
This allows the administrator to create a
tenant.
Creating and verifying networks in a Yes No Tenant 1. See Creating Networks in a Shared
shared plan Plan, on page 390.
This allows the tenant to create and verify
networks in a shared plan. Tenant 2. See Verifying the Network you
Created on Microsoft Windows Azure
Pack on APIC, on page 390.
Creating the network in VPC plan No Yes Tenant See Creating the Network in VPC
Plan, on page 392.
This allows the tenant to create networks
in a VPC plan.
Creating a firewall within the same Yes Yes Tenant See Creating a Firewall Within the
subscription. Same Subscription, on page 392.
This allows the tenant to create a firewall
within the same subscription.
Allowing tenants to provide shared Yes Yes Admin 1. See Allowing Tenants to Provide
services Shared Services, on page 377.
This allows tenants to create networks,
attach compute services (servers) to those Tenant 2. See Providing a Shared Service,
networks, and offer the connectivity to on page 394.
these services to other tenants. The
administrator needs to explicitly enable Tenant 3. See Adding Access Control Lists,
this capability in the plan. on page 395 or Deleting Access
Control Lists, on page 396.
Managing shared services Yes Yes Admin See Deprecating a Shared Service
from New Tenants, on page 379.
This allows the administrator to deprecate
a shared service from new tenants and See Revoking a Tenant from a Shared
revoke a tenant access from a shared Service, on page 380.
service.
Creating VMs and attaching to networks Yes Yes Tenant See Creating VMs and Attaching to
Networks, on page 393.
Admin Tasks
* In a Virtual Private Cloud (VPC) plan, a load balancer and DHCP is not supported for private address space.
Both features are still offered to a tenant, but owned by the shared infrastructure.
Plan Quotas: Azure Pack Plan Admins can now create Plans which limit the number of EPGs, BDs, and
VRFs an Azure Pack Tenant can create.
The EPG, BD, and VRF created by the APIC admin under an APIC Tenant count against their
quota for Azure Pack Plan.
Example 1: Plan Admin creates an Azure Pack plan with a limit of 5 EPGs. Azure Pack
Tenant creates 4 EPGs and the APIC Admin creates an EPG for the Azure Pack Tenant. The
Azure Pack Tenant has now reached his plan quota and cannot create EPGs until he is below
plan quota.
Example 2: Plan Admin creates an Azure Pack plan with a limit of 5 EPGs. Azure Pack
Tenant creates 5 EPGs. An APIC Admin creates an EPG for the Azure Pack Tenant. The
Azure Pack Tenant has now reached his plan quota and cannot create EPGs until he is below
plan quota.
These quotas are enforced for the Azure Pack Tenant, but do not apply to the APIC Admin.
An APIC admin can continue to create EPGs, BDs, and VRFs for an Azure Pack Tenant even
when the Tenant has gone beyond his quota.
Creating a Plan
This allows the administrator to create plans with their own values.
Procedure
Creating a Tenant
This allows the administrator to create a tenant.
Procedure
Procedure
Procedure
Allowing Tenants to Consume NAT Firewall and ADC Load Balancer Services
Cisco Application Centric Infrastructure (ACI) has the concept of service graphs, which allows a tenant to
insert service nodes performing various Layer 4 to Layer 7 functions between two endpoint groups (EPGs)
within the fabric.
Windows Azure Pack with ACI integration now includes the ability to easily and seamlessly provision and
deploy services graphs in a Virtual Private Cloud (VPC) setting where the external NAT firewall IP and
external ADC load balancer sit within a shared space. The most common use-case for this is the service
provider model where a limited number externally accessible IP addresses are available for use, in which case
various port-forwarding techniques or load balancing of an entire EPG is done against the one external IP.
Tenants within Azure Pack can utilize a strict VPC model where all their networking is contained within the
tenant virtual routing and forwarding (VRF) or a split VRF model where an APIC admin can configure a set
of L3Out which is accessible by all tenants utilizing the ACI fabric. The following are instructions on providing
a split VRF workflow allowing Azure Pack tenants to consume the Layer 4 to Layer 7 service devices as well
as being allocated public addresses for the services provided from within the tenant VRF:
Procedure
Procedure
Procedure
Procedure
You must perform the following tasks to deploy Layer 4 to Layer 7 services using the APIC GUI:
Import the device package. See Importing the Device Package on APIC, on page
Only the administrator can import the device package. 381.
Configure and post the XML POST to Application See Configuring the Load Balancer Device on APIC
Policy Infrastructure Controller (APIC) using XML POST, on page 381.
Refer to Microsoft's Windows Azure Pack Services
section about the device package.
Only the administrator can configure and post the
XML POST.
Creating a load balancer to a plan See Creating a Load Balancer to a Plan, on page 387.
The VIP range to Windows Azure Pack is set.
Only the administrator can create a load balancer to
a plan.
Configure the load balancer See Configuring the Load Balancer, on page 395.
Only the tenant can configure the load balancer.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose L4-L7 SERVICES > PACKAGES.
Step 2 In the navigation pane, choose Quick Start.
Step 3 In the Quick Start pane, choose Import a Device Package.
Step 4 In the Import Device Package dialog box, perform the following action:
a) Click BROWSE and locate your device package such as F5 or Citrix device package.
b) Click SUBMIT.
Procedure
Step 1 These are example XML POSTs for Citrix and F5:
a) Citrix example XML POST:
Example:
<polUni dn="uni">
<fvTenant dn="uni/tn-common" name="common">
<vnsLIf name="C5">
<vnsRsMetaIf tDn="uni/infra/mDev-Citrix-NetScaler-1.0/mIfLbl-outside"/>
<vnsRsCIfAtt tDn="uni/tn-common/lDevVip-MyLB/cDev-ADC1/cIf-[1_1]"/>
</vnsLIf>
<vnsLIf name="C4">
<vnsRsMetaIf tDn="uni/infra/mDev-Citrix-NetScaler-1.0/mIfLbl-inside"/>
<vnsRsCIfAtt tDn="uni/tn-common/lDevVip-MyLB/cDev-ADC1/cIf-[1_1]"/>
</vnsLIf>
</vnsLDevVip>
<vnsRsDefaultScopeToTerm
tDn="uni/tn-common/AbsGraph-MyLB/AbsTermNodeProv-Output1/outtmnl"/>
<vnsAbsDevCfg>
<vnsAbsFolder key="Network"
name="network"
scopedBy="epg">
<vnsAbsFolder key="nsip" name="snip1">
<vnsAbsParam key="ipaddress" name="ip1" value="5.5.5.251"/>
<vnsAbsParam key="netmask" name="netmask1"
value="255.255.255.0"/>
<vnsAbsParam key="hostroute" name="hostroute"
value="DISABLED"/>
<vnsAbsParam key="dynamicrouting" name="dynamicrouting"
value="ENABLED"/>
<vnsAbsParam key="type" name="type" value="SNIP"/>
</vnsAbsFolder>
</vnsAbsFolder>
</vnsAbsDevCfg>
<vnsAbsFuncCfg>
<vnsAbsFolder key="internal_network"
name="internal_network"
scopedBy="epg">
<vnsAbsCfgRel name="internal_network_key"
key="internal_network_key"
targetName="network/snip1"/>
</vnsAbsFolder>
</vnsAbsFuncCfg>
<vnsRsNodeToMFunc
tDn="uni/infra/mDev-Citrix-NetScaler-1.0/mFunc-LoadBalancing"/>
</vnsAbsNode>
tDn="uni/tn-common/AbsGraph-MyLB/AbsTermNodeCon-Input1/AbsTConn" />
<vnsRsAbsConnectionConns
tDn="uni/tn-common/AbsGraph-MyLB/AbsNode-Node2/AbsFConn-C4" />
</vnsAbsConnection>
</vnsAbsGraph>
</fvTenant>
</polUni>
b) F5 example XML POST:
Example:
<polUni dn="uni">
<fvTenant name="common">
<fvBD name="MyLB">
<fvSubnet ip="6.6.6.254/24" />
<fvRsCtx tnFvCtxName="default"/>
</fvBD>
<vnsLIf name="internal">
<vnsRsMetaIf tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mIfLbl-internal"/>
<vnsRsCIfAtt tDn="uni/tn-common/lDevVip-MyLB/cDev-BIGIP-1/cIf-[1_1]"/>
</vnsLIf>
<vnsLIf name="external">
<vnsRsMetaIf tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mIfLbl-external"/>
<vnsRsCIfAtt tDn="uni/tn-common/lDevVip-MyLB/cDev-BIGIP-1/cIf-[1_2]"/>
</vnsLIf>
<vnsCDev name="BIGIP-1">
<vnsCIf name="1_1"/>
<vnsCIf name="1_2"/>
</vnsCDev>
</vnsLDevVip>
<vnsAbsGraph name = "MyLB">
<vnsAbsTermNodeCon name = "Consumer">
<vnsAbsTermConn name = "Consumer">
</vnsAbsTermConn>
</vnsAbsTermNodeCon>
<!-- Node1 Provides Virtual-Server functionality -->
<vnsAbsNode name = "Virtual-Server" funcType="GoTo">
tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mFunc-Virtual-Server/mConn-internal" />
</vnsAbsFuncConn>
<vnsAbsFuncConn name = "external">
<vnsRsMConnAtt
tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mFunc-Virtual-Server/mConn-external" />
</vnsAbsFuncConn>
<vnsRsNodeToMFunc
tDn="uni/infra/mDev-F5-BIGIP-1.1.1/mFunc-Virtual-Server"/>
<vnsAbsDevCfg>
<vnsAbsFolder key="Network" name="webNetwork">
</polUni>
Step 2 These are the configurable parameters for Citrix and F5:
a) Configurable parameters for Citrix:
Procedure
Note You can have a single load balancer that is shared across different plans as long as the VIP ranges
do not over lap.
See the Cisco APIC Basic Configuration Guide for L3 external connectivity configuration.
Ensure you have logged in to the APIC GUI, on the menu bar, choose TENANT > common.
Create a l3ExtOut called "vpcDefault", refer to BD "vpcDefault".
Create l3extInstP name="vpcDefaultInstP" under this l3ExtOut.
This is to be used by VPC tenants.
See the Cisco APIC Basic Configuration Guide for configuring external connectivity for tenants.
Windows Azure Pack leverages the common l3ExtOut configuration with no special requirement other
than the naming convention highlighted above
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > common.
Step 2 In the Navigation pane, expand Tenant Name > Security Policies > Contracts.
Step 3 Click ACTION, from the drop-down list, choose Create Contract.
Step 4 In the Create Contract dialog box, perform the following actions:
a) In the Name field, enter the name (L3_DefaultOut).
b) In the Scope field, from the drop-down list, choose Global.
c) In the Subjects field, click the + icon.
d) In the Create Contract Subject dialog box, perform the following actions:
e) In the Name field, enter the name of your choice.
f) Uncheck Apply Both direction.
g) In the Filter Chain For Consumer to Provider field, click the + icon, from the drop-down list, choose
default/common, and click Update.
h) In the Filter Chain For Provider to Consumer field, click the + icon, from the drop-down list, choose
est/common, and click Update.
i) Click OK to close the Create Contract Subject dialog box.
j) Click OK to close the Create Contractdialog box.
You have now creating a contract to be provided by the l3extinstP "default".
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > common.
Step 2 In the Navigation pane, expand Tenant Name > Security Policies > Contracts.
Step 3 Click ACTION, from the drop-down list, choose Create Contract.
Step 4 In the Create Contract dialog box, perform the following actions:
a) In the Name field, enter the name (L3_VpcDefaultOut).
b) In the Scope field, from the drop-down list, choose Global.
c) In the Subjects field, click the + icon.
d) In the Create Contract Subject dialog box, perform the following actions:
e) In the Name field, enter the name of your choice.
f) Uncheck Apply Both direction.
g) In the Filter Chain For Consumer to Provider field, click the + icon, from the drop-down list, choose
default/common, and click Update.
h) In the Filter Chain For Provider to Consumer field, click the + icon, from the drop-down list, choose
est/common, and click Update.
i) Click OK to close the Create Contract Subject dialog box.
j) Click OK to close the Create Contractdialog box.
You have now creating a contract to be provided by the l3extinstP "vpcDefault".
Tenant Tasks
This section describes the tenant tasks.
Note If the shared service consumer is in a different VRF than the provider, route leaking between the VRFs
will automatically occur in order to enable the communication.
Procedure
Verifying the Network you Created on Microsoft Windows Azure Pack on APIC
This section describes how to verify the network you created on Microsoft Windows Azure Pack on APIC.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS.
Step 2 In the Navigation pane, expand Tenant 018b2f7d-9e80-43f0-abff-7559c026bad5 > Application Profiles
> default > Application EPGs > EPG Network01 to verify that the network you created on Microsoft
Windows Azure Pack was created on APIC.
Procedure
Procedure
Procedure
Procedure
In the BRIDGE DOMAIN field, from the drop-down, choose the bridge domain (myBridgeDomain).
d) Optional: To deploy the Network with a Static IP Address Pool, perform the following actions:
Enter a Gateway in Address/Mask format (192.168.1.1/24). The resultant Static IP Address Pool
will use the full range of the Gateway Subnet.
Enter DNS Servers. If more than one is required, separate out the list with semicolons
(192.168.1.2;192.168.1.3)
Note The Subnet will be validated against all other subnets in the Context. The Network create
will return an error if an overlap is detected.
Click CREATE.
This could take a few minutes for this process to complete.
Procedure
Procedure
Procedure
Procedure
Procedure
Procedure
Preparing a Tenant L3 External Out on APIC for Use at Windows Azure Pack
This section describes how to prepare a tenant L3 External Out on APIC for use at Windows Azure Pack.
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS > Tenant Name.
Step 2 In the Navigation pane, expand Tenant Name > Networking > External Routed Networks, right-click
External Routed Networks, and choose Create Routed Outside.
Step 3 In the Create Route Outside dialog box, perform the following actions:
a) Enter a Name (myRouteOut).
External Connectivity can be established either through the ACI Common L3ExtOut or through a user defined
L3ExtOut.
Procedure
Procedure
Procedure
Step 1 Log in to the APIC GUI, on the menu bar, choose TENANTS.
Step 2 In the Navigation pane, expand Tenant b81b7a5b-7ab8-4d75-a217-fee3bb23f427 > Application Profiles
> Application EPG, ensure the network you created in Creating a Network for External Connectivity, on
page 397 exists (wapL3test).
Step 3 In the Navigation pane, expand EPG wapL3test > Contracts, ensure the contract name exists in the format
of L3+EPG name+protocols+port range (L3wapL3testtcp1234545678), the contract is Provided by the EPG,
and the STATE is formed.
Step 4 Option1: For Shared L3 Out deployments, where the contract was created with *External:default, on the menu
bar, choose TENANTS > common.
Option 2: For Tenant owned L3 Out deployments, on the menu bar, choose TENANTS > <your tenant-id>.
Step 5 In the Navigation pane, expand Security Policies > Imported Contracts, ensure the contract that you verified
in step 3 is imported as an contract interface.
Step 6 Option 1: For Shared L3 Out deployments, where the contract was created with *External:default, on the
menu bar, choose TENANTS > common.
Option 2: For Tenant owned L3 Out deployments, choose TENANTS > <your tenant-id>.
Step 7 In the External Network Instance Profile -defaultInstP pane, in the Consumed Contracts field, search
for the contract interface that you verified in step 5 and ensure it exists and the STATE is formed.
Step 8 On the menu bar, choose TENANTS.
Step 9 In the Navigation pane, expand Tenant b81b7a5b-7ab8-4d75-a217-fee3bb23f427 > Application Profiles
> Application EPG > EPG wapL3test > Contracts.
Step 10 In the Contracts pane, in the Consumed Contracts field, ensure the default contract that you defined in
Prerequisites for Configuring L3 External Connectivity for Windows Azure Pack, on page 388 for either
shared service tenant or for VPC tenant is consumed by this EPG and the STATE is formed.
Step 11 Option 2: For VPC Windows Azure Pack Plans using a user defined External Network with a Tenant Network
with a Gateway specified.
In the Navigation pane, select Tenant Name > Application Profiles > Application EPG > EPG wapL3test
> Subnets > Subnet Address, verify that the Scope is marked as Advertised Externally.
If the private subnet of the Layer 4 to Layer 7 resource pool was not provided by the APIC admin,
attempting to add Layer 4 to Layer 7 services with an overlapping subnet results in an error and no
configuration will be pushed. In this case, delete and recreate the VM network with an alternate subnet.
Procedure
Procedure
Adding NAT Firewall With a Private ADC Load Balancer Layer 4 to Layer 7 Services to a VM Network
In addition to deploying a NAT firewall, this configuration will also deploy an internal load balancer. In this
scenario, the load balancer VIPs are dynamically allocated from the Layer 4 to Layer 7 private IP address
subnet (per tenant VRF). In this 2-Node service graph deployment, it is assumed that the tenant creates a
Port-Fowarding Rule to forward traffic to the internal load balancer for traffic load balancing.
Procedure
Procedure
Procedure
Windows Azure Pack Administrator can look at all networks deployed by tenants in the admin portal. In case
there is an issue, use the APIC GUI to look for any faults on the following objects:
a) VMM domain
b) Tenant and EPG corresponding to the Windows Azure Pack tenant networks.
Troubleshooting as a Tenant
If there is an error message, provide the error message along with the description of the workflow and action
to your Administrator.
Procedure
To perform this operation, run the following PowerShell commands on the SCVMM server:
Example:
$VMs = Get-SCVirtualMachine
$VMs | Read-SCVirtualMachine
$NonCompliantAdapters=Get-SCVirtualNetworkAdapter -All | Where-Object
{$_.VirtualNetworkAdapterComplianceStatus -eq "NonCompliant"}
$NonCompliantAdapters | Repair-SCVirtualNetworkAdapter
Programmability References
ACI Windows Azure Pack PowerShell Cmdlets
This section describes how to list the Cisco Application Centric Infrastructure (ACI) Windows Azure Pack
PowerShell cmdlets, help, and examples.
Procedure
Step 1 Log in to the Windows Azure Pack server, choose Start > Run > Windows PowerShell.
Step 2 Enter the followings commands:
Example:
Windows PowerShell
Copyright (C) 2013 Microsoft Corporation. All rights reserved.
PS C:\Users\administrator> cd C:\inetpub\Cisco-ACI\bin
PS C:\inetpub\Cisco-ACI\bin> Import-Module .\ACIWapPsCmdlets.dll
PS C:\inetpub\Cisco-ACI\bin> Add-Type -Path .\Newtonsoft.Json.dll
PS C:\inetpub\Cisco-ACI\bin> Get-Command -Module ACIWapPsCmdlets
Example:
commandname -?
Step 4 Generating examples:
Example:
get-help commandname -examples
Note Uninstall involves removing artifacts such as VM and logical networks. Uninstalling succeeds only when
no other resource, such as a VM or a host, is consuming them.
Component Task
Detach all virtual machines from the VM networks See Microsoft's documentation.
To uninstall the ACI with Microsoft Windows Azure See Uninstalling the APIC Windows Azure Pack
Pack 1.1(1j) release, uninstall the APIC Windows Resource Provider, on page 405.
Azure Pack Resource Provider
Component Task
To uninstall this release of ACI with Microsoft See Uninstalling the ACI Azure Pack Resource
Windows Azure Pack, uninstall the following: Provider, on page 405.
ACI Azure Pack Resource Provider See Uninstalling the ACI Azure Pack Admin Site
Extension, on page 406.
ACI Azure Pack Admin Site Extension
See Uninstalling the ACI Azure Pack Tenant Site
ACI Azure Pack Tenant Site Extension Extension, on page 406.
Uninstall the APIC Hyper-V Agent See Uninstalling the APIC Hyper-V Agent, on page
407.
Procedure
Procedure
Procedure
Procedure
Procedure
Procedure
Step 1 Uninstall Cisco ACI with Microsoft Windows Azure Pack components.
See Uninstalling the Cisco ACI with Microsoft Windows Azure Pack Components, on page 404.