Sunday, July 31, 2022

Cisco ACI Fabric Access Policies (Physical) Constructs

 

Fabric Access Policies enable communication of systems that are attached to the Cisco ACI fabric.

You build a fabric access policy with multiple configuration elements as:

  • Pool: Defines a range of identifiers, such as VLANs
  • Physical domain: References a pool. You can think of it as a resource container
  • Attachable Access entity profile (AAEP): Reference a physical domain, and therefore specifies the VLAN pool that is activated on an interface.
  • Interface policy: Defines a protocol or interface properties that are applied to interfaces.
  • Interface policy group: Gathers multiple interface policies into one set and binds them to an AAEP.
  • Interface profile: Chooses one or more access ports and associates them with an interface policy group.
  • Switch Profile: Chooses one or more leaf switches and associates them with an interface profile.


VLAN Pool

A pool represents a range of traffic encapsulation identifiers (For example: VLAN IDs, VNIDs, and multicast address). A pool is a shared resource and can be consumed by multiple domains, physical or virtual. A leaf switch does not support overlapping VLAN pools, so you must not associate different VLAN pools with the same virtual domain.

When you’re creating a vlan pool you must define the type of allocation which is used by the vlan pool. There are two types:

Static Allocation:

  • It requires the administrator to make a choice about which vlan will be used. This is used primarily to attach physical devices to the fabric.
  • The EPG has a relation to the domain, and the domain has a relation to the pool. The pool contains a range of encapsulated VLANs and VXLANs. For static EPG deployment, the user defines the interface and the encapsulation. The encapsulation must be within the range of a pool that is associated with a domain with which the EPG is associated.

Dynamic Allocation:

  • It means that ACI decides which vlan is used for a specific EPG. Most often you’ll see this when integrating with a hypervisor like VMware.
  • In this case ACI defines the vlan that will be used (and will configure the portgroup on the hypervisor to use that specific vlan). This is ideal for situations in which you don’t care which vlan runs underneath the traffic, if it is mapped into the right EPG.

Note: For completeness, there are also VXLAN pools. You can use these to attach to devices that support VXLAN. This could be your hypervisor. Most fabrics only use Vlan pools. Be aware that they exist and that you could use them if required.

Step to Navigate to Access Policies and create a VLAN pool for a physical domain:

Step: A: Navigate

  1. Click Fabric
  2. Click Access Policies
  3. Expand Pools by clicking the toggle arrow (>)
  4. Right-click on VLAN
  5. Click Create VLAN Pool


Step: B1:Create Static VLAN Pool and its VLAN range

  1. Name the VLAN Pool: <User defined name>
  2. Ensure Static Allocation is selected
  3. Then click the plus sign (+) button to add your VLAN pool range
  4. VLAN Range: For example, 2900 – 2949
  5. Click Ok


Step: B2:Create Dynamic VLAN Pool and its VLAN range

    1. Name the VLAN Pool: <User defined name>
    2. Ensure Dynamic Allocation is selected
    3. Then click the plus sign (+) button to add your VLAN pool range
    4. VLAN Range: For example, 2950 – 2999
    5. Click Ok



    Physical Domain

    A domain is used to define the scope of VLANs in the Cisco ACI fabric. In other words, where and how a VLAN pool will be used.
    Domains are used to map an EPG to a vlan pool. An EPG must be member of a domain, and the domain must reference a vlan pool. This makes it possible for an EPG to have a vlan encap.

    There are several types of domains:

    • Physical domains (physDomP): Typically used for bare metal server attachment and management access.
    • Virtual domains (vmmDomP): Required for virtual machine hypervisor integration
    • External Bridged domains (l2extDomP): Typically used to connect a bridged external network trunk switch to a leaf switch in the ACI fabric.
    • External Routed domains (or L3 domains) (l3extDomP): Used to connect a router to a leaf switch in the ACI fabric. Within this domain protocols like OSPF and BGP can be used to exchange routes
    • Fibre Channel domains (fcDomP): Used to connect Fibre Channel VLANs and VSANs

     Step to Navigate to Physical Domains for L2 Connections

    1. Click Fabric
    2. Click Access Policies
    3. In the left navigation pane, all the way the bottom, expand Physical and External Domains by clicking the toggle arrow (>)
    4. Right-click on Physical Domains
    5. Click Create Physical Domain
    6. Name the Physical Domain: <User-defined Name>
    7.  In the VLAN Pool dropdown, select your VLAN Pool created in the previous section
    8.  Click Submit

       Step to Navigate to Physical Domains for L3 External Domain

      1. Click Fabric
      2. Click Access Policies
      3. In the left navigation pane, all the way the bottom, expand Physical and External Domains by clicking the toggle arrow (>)
      4. Right-click on L3 Domains and Click Create Layer 3 Domain
      5. Name the Layer 3 Domain: aci_p29_extrtdom
      6. Click Submit

      Attachable Access entity profile (AAEP)

      The AAEP is another connector. It connects the domain (and thereby the vlan and the EPG) to the Policy Group which defines the policy on a physical port. When defining an AAEP you need to specify which domains are to be available to the AAEP. These domains (and their vlans) will be usable by the physical port.

      Sometimes you need to configure a lot of EPGs on a lot of ports. Say for example you’re not doing any VMware integration, but you do need to have ESXi hosts connected to your fabric. The old way of doing this was to create trunk ports and trunk all the required vlans to the VMware host. In ACI you’d need to configure a static port to the ESXi host on all EPGs that need to be available on the ESXi host. If you’re not automating this, it could take a lot of work. Even with automation this might be a messy way to do this.

      That’s why you can configure an EPG directly under the AAEP. This will cause every port that will be member of the same AAEP to automatically have all the EPGs defined at the AAEP level.


      Steps to Navigate and Create AAEP

      1. Click Fabric
      2. Click Access Policies
      3. Expand Policies by clicking the toggle arrow (>)
      4. Expand Global by clicking the toggle arrow (>)
      5. Right-click on Attachable Access Entity Profiles
      6. Click Create Attachable Access Entity Profile
      For Physical Domain
      1. Name the AEP: <User-defined Name>
      2. Click the plus button (+) to add a Domain
      3. In the Domain Profile dropdown, select your Physical Domain created in the previous section:
      4.  Click Update
      5.  Click Next
      For L3 Domain
      1. Name the AEP: <User-defined Name>
      2.  Click the plus button (+) to add an Domain
      3.  In the Domain Profile dropdown, select your Layer 3 Domain created in the previous section:
      4.  Click Update
      5.  Click Next

      Interface policy group

      The Interface Policy Group is a group of policies. These policies define the operation of the physical interface. Think of stuff like the Speed of the interface, CDP settings, BPDU settings, LACP and more.

      This is also the place where the AAEP is referenced. So, the Interface Policy Group takes care of attaching the vlan, domain and EPG to an interface through the AAEP.

      The specific policies are interface policies which are configured beforehand.

      Step to Navigate to Interface Policy Groups to Create Access Port Policy Group

      1. Fabric
      2. Access Policies
      3. Expand Interfaces by clicking the toggle arrow (>)
      4. Expand Leaf Interfaces by clicking the toggle arrow (>)
      5. Expand Policy Groups by clicking the toggle arrow (>)
      6. Right-click on Leaf Access Port
      7. Click Create Leaf Access Port Policy Group


      • Name the Policy Group: <User-defined name>
      • For the AEP, select aci_p29_l3_aep
      • For Link Level Policy, select aci_lab_10G
      • For CDP Policy, select aci_lab_cdp
      • For LLDP Policy, select aci_lab_lldp
      • For MCP Policy, select aci_lab_mcp
      • For L2 Interface Policy, select aci_lab_l2global
      • Scroll-down
      • Click Submit

      Similarly, we can create Port Channel policy group that will be used as a Layer 2 connectivity policy that is part of a single node port channel. In ACI, each policy group for either Port Channel or Virtual Port Channel identifies the bundle of interfaces as a singular interface policy in the fabric.

      Interface Profile/Selector

      Interface Profiles are the way the Policy Group is attached to a switch. Part of an Interface Profile is the Interface Selector. The Interface selector specifies the interfaces and attaches the policy to that specific interface. However, it does not specify which switch(es) those interfaces belong to.

      You can have multiple interface selectors listed under a single Interface Profiles. It depends on the way you like to work how you’re going to use them.

      • Interface Profiles per switch
      • Interface Profiles per policy group

      The advantage of using a Interface Profiles per policy group is that you can use consistent naming to map policy groups to Interface profiles, making it easier to find the interface profile where a policy group is attached to. However, if you have a lot of policy groups, this could cause long lists in the GUI. This way of working is better suited for automation when you’re working in large fabrics.

      Step to Create Interface Profiles

      1. Fabric
      2. Access Policies
      3. Expand Quick Start by clicking the toggle arrow (>)
      4. Right-click on Interface Configuration
      5. Click Configure Interface


      Now  you can create the interface profiles for:
      • Access port Interface
      • Port-channel Interface
      • VPC Interface

      Steps to Create Access Port Interface

      1. Set the Leafs to 203
      2. Set the Interfaces to 1/29
      3. Ensure the Interface Type is set to Individual
      4. In the dropdown, select your Leaf Access Port Policy Group you created earlier: aci_p29_intpolg_access
      5. The Leaf Profile Name will be aci_p29_access_sp
      6. The Interface Profile Name will be aci_p29_acc_intf_p

      Steps to Create Port-channel Interface

        1. Set the Leafs to 205
        2. Set the Interfaces to 1/57-58
        3. Ensure the Interface Type is set to Port Channel (PC)
        4. In the dropdown, select your Port Channel Policy Group you created earlier: aci_p29_intpolg_pc
        5. The Leaf Profile Name will be aci_p29_pc_sp
        6. The Interface Profile Name will be aci_p29_pc_intf_p
        7. Click Next

        Steps to Create VPC Interface

        1. Set the Leafs to 207 - 208
        2. Set the Interfaces to 1/29
        3. Ensure the Interface Type is set to Virtual Port Channel (VPC)
        4. In the dropdown, select your VPC Port Policy Group you created earlier: aci_p29_intpolg_vpc
        5. The Leaf Profile Name will be aci_p29_vpc_sp
        6. The Interface Profile Name will be aci_p29_vpc_intf_p
        7. Click Next

        Switch Profiles

        A switch profile is the mapping between the policy model and the actual physical switch. The switch profile maps the Leaf Interface Policy, containing the interface selectors to the physical switch. So, as soon as you apply a Interface profile onto a switch profile it will program the ports according to the policy group you defined.

        Step to Create Switch Profiles

        1. Fabric
        2. Access Policies
        3. Expand Quick Start by clicking the toggle arrow (>)
        4. Expand the Switch policies
        5. Right-click on Profile to create switch Profile
        6. Configure Switch Profile Name and assign leaf switch and Interface profile to it created above
        7. Click Submit

        Wrapping it all up together

        So, we’ve just read that all these policies in the end configure a port with specific parameters. We’ve also read that the domain and the AAEP ensure that an EPG can be programmed onto a port. But how does the ACI fabric know which EPGs to put onto the port?

        Several options exist. The most common ones are:

        • Static configuration
        • Dynamic configuration through VMM domains

        Static configuration

        As to static configuration. You as an administrator configure static ports at the EPG level. You need to define which port (or portchannel) to use and which encap must be used. Encap in this context is usually a vlan tag but could in theory also be a VXLAN or QinQ tag.


        Another way is to attach an EPG directly onto the AAEP. This causes the EPG with the specified encap to be attached to all policy groups that are configured with this AAEP as described earlier.

        Dynamic Configuration

        The dynamic configuration based on VMM domains automatically created a port group in the virtual machine manager that corresponds to the EPG when the EPG is configured to be a member of the VMM domain.

        No comments:

        Post a Comment