VPC Configuration Best Practices
VPC Configuration Best Practices
and Maintenance
Best Practices
BRKDCN-2458
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Arvind Durai Anis Edavalath
– 20 years with Cisco Advanced Services - 7 years with Cisco Advanced Services
– Has worked with 100+ customers in enterprise architecture, Enterprise Campus and Datacenter across different verticals
technology designs and operational simplification -Worked 10 years with BU engineering groups in Security , switching,
– 11 years of Active Cisco live presenter datacenter and Network Management products
– Co-authored five Cisco Press Books - Design and deployment of Next Gen Data center architecture
enterprise and cloud customers
Cisco Firewall Services Module, Virtual Routing in the
Cloud, TCL Scripting for Cisco IOS and IP Multicast vol1 - AS team lead for ACI, VxLAN, Tetration, SDA (uniform policy)
&2 - Worked with major telecom vendors and Cloud providers prior to
– CCIE R/S and Security #7016 Cisco
- CCIE Datacenter # 48152
Contributors: Satish Kondalam, Nick Garner Junmei Zhang and many others from the Nexus TME team.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Course Objective & Goal
• To help Data Center operations and engineering staff understand the operational
best practices when maintaining a Cisco Nexus data center network deployment.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Agenda
• vPC and VxLAN Refresher
• Node Isolation
S2
S1
Orphan Port CFS
vPC Member
Port
Failure Scenario
vPC
• If both peers are active, then Secondary vPC peer will
disable all vPCs to avoid Dual-Active.
Orphan
Device • Data will automatically forward down remaining active
S3 port channel ports.
• vPC peer-gateway
LOW LOW
✓ Acts as active gateway for frames addressed to peer switch. Avoid Peer Link forwarding. IMPACT /
HARD TO
IMPACT /
EASY TO
IMPLEMENT IMPLEMENT
• Use vPC peer-switch
✓ Optimizes BPDU processing, single logical L2 entity
• Distribute port-channel member interfaces across line cards within the same chassis.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
VXLAN Overview
Layer 2 overlay on top of your Layer 3 underlay
▪ Each VXLAN Segment is identified by a unique
SPIN
24-bit segment ID called a VXLAN Network
E
Identifier (VNI)
▪ Only hosts on the same VNI are allowed to
L3 UNDERLAY communicate with each other
Unicast/Multicast ▪ Original L2 packet is encapsulated with VXLAN
Routing
header in a UDP->IP->Ethernet
Overcome 4094 VLAN Scale Limitation
LEAF
VTEP A ▪ VLANs use a 10-bit VLAN ID
VTEP B
HOST1
HOST2
Better utilization of available network paths
MAC H1
VLAN 1 → VNI1000
MAC H2 ▪ No need of Spanning Tree (blocks paths)
VLAN 1 → VNI1000 ▪ Utilize L3 underlay network (ECMP, Link Agg,…)
DMAC SMAC Original
DMAC
H2
SMAC
H1
Original
L2 Data
Multi-Tenant with virtualization
H2 H1 L2 Data
▪ Isolation of network traffic by a tenant and
reusability of networking taxonomy for tenancy
Outer VxLAN DMA Origina
Outer VNI SMAC
SIP/DI UDP C l L2
MAC 1000 H1
P Port H2 Data
VTEP-
10001
3
VTEP-3-
Nexthop: IP
VTEP-3-IP VTEP-3- BGP EVPN
BGP EVPN MAC update
Host B
update MAC-B: VNI MAC-B
MAC-A: VNI 10000 IP-B
10000 IP-B: VNI
IP-A: VNI 2 20000
10000 4 Nexthop:
VTEP-1 VTEP-
VTEP-2-IP
Nexthop:
2 3
VTEP-1-IP
VTEP-1- VTEP-2- GARP for IP B
Host A 1 IP IP Target MAC: MAC-B
MAC-A VTEP-1- VTEP-2- Target IP: IP-B
IP-A MAC-B
MAC 10000 VTEP-2-IP MAC
Hosts’ Setup
IP-B VRF FOO VTEP-2-IP MAC-A 10000 VTEP-1-IP
GARP for IP A Vlan 10: VNI IP-A VRF FOO VTEP-1-IP
Target MAC: MAC-A MAC-C 10000 VTEP-3-IP
10000
Target IP: IP-A MAC-C 10000 VTEP-3-IP
IP-C VRF FOO VTEP-3-IP VRF FOO: VNI
20000 IP-C VRF FOO VTEP-3-IP
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
vPC Configuration Best Practices
vPC Auto-recovery
Operational
Primary
P S P S
P
S1 S2 S1 S2 S1 S2
S3 S3 S3
1. vPC peer-link down : S2 - secondary shuts all its vPC member ports
2. S1 down : vPC peer-keepalive link down : S2 receives no keepalives
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
vPC Configuration Best Practices
Object-tracking
• vPC object tracking, tracks both peer-link and
uplinks in a list of Boolean OR S4 S5
• Object Tracking triggered when the track object
goes down
• Suspends the vPCs on the impaired device.
• Traffic forwarded over the remaining vPC peer.
! Track the vpc peer link
track 1 interface port-channel11 line-protocol
! Track the uplinks
track 2
track 3
interface Ethernet1/1 line-protocol
interface Ethernet1/2 line-protocol S1 S2
! Combine all tracked objects into one.
! “OR” means if ALL objects are down, this object will go down
track 10 list boolean OR
object 1
object 2
object 3
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
VPC Shutdown Feature Configure
PKA
Secondary
Primary
This feature allows customer to manually “isolate” a switch
Vlan 1-100
from vPC domain. This is a vPC configuration option.
Vlan 1-100
Pre-VPC Shutdown VPC Shutdown Behavior Vlan 1-100
Secondary
Primary
Vlan 1-100
• Down Peer Link will be re-initialized; vPC domain
• vPC Members brought to normal state.
• Etc.
Vlan 1-100 Vlan 1-100
Availability 3k/5k/6k/7k/9k BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
VPC Self-isolation Current
▪ Automatically triggered isolation Primary PKA Secondary
▪ Example Presented: All Line Cards Fail
Vlan 1-100
Current Impact Self-isolation feature Behavior
• When this failure When this failure happens: Vlan 1-100
Vlan 1-100
happens on primary, •Physically bring down peer-link
peer-link is brought down. •Physically bring down all vPC legs
• This causes the •Send self-isolation through peer-keep-alive
secondary to bring down Peer switch:
all legs. •Receive self-isolation from the peer through Self-isolation
• Traffic is completely peer-keep-alive Secondary PKA Primary
blocked. •Change role to Primary
•Bring up all down vPC legs
BU Testing Results:
Sub-second Recovery (N>S) (S>N) (E>W)
Vlan 1-100
Active Supervisor
Standby Hot Supervisor
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Routing Protocol Redundancy With NSF (Graceful
Restart)
Active Supervisor Engine Slot 1 Standby Supervisor Engine Slot 2
EIGRP RIB OSPF RIB ARP Table EIGRP RIB OSPF RIB ARP Table
Prefix Next Hop Prefix Next Hop IP MAC Prefix Next Hop Prefix Next Hop IP MAC
FIB Table
SSO FIB Table
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Routing Protocol Redundancy With NSF (Graceful Restart)
Active Supervisor Engine Slot 1 Standby Supervisor Engine Slot 2
EIGRP RIB OSPF RIB ARP Table EIGRP RIB OSPF RIB ARP Table
Prefix Next Hop Prefix Next Hop IP MAC Prefix Next Hop Prefix Next Hop IP MAC
FIB Table
SSO FIB Table
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Routing Protocol Redundancy With NSF (Graceful Restart)
Standby Supervisor Engine Slot 2
EIGRP RIB OSPF RIB ARP Table
10.0.0.0
- -
10.1.1.1 -
192.168.0 -
192.168.0.1 -
10.1.1.1 aabbcc:ddee3
-
2
-
10.1.0.0 -
10.1.1.1 192.168.55.
- 192.168.55.
- - -
0 1 10.1.1.2 adbb32:d34e4
-
10.20.0.0 -
10.1.1.1 - - - -
3
192.168.32. 192.168.32.
0 1 10.20.1. aa25cc:ddeee
1 8
FIB Table
10.1.1.1 aabbcc:ddee32
10.1.1.2 adbb32:d34e43
192.168.0. aa25cc:ddeee8
0
GR/NSF Signaling per protocol
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Routing Protocol Redundancy With NSR (Stateful Restart)
Prefix Next Hop Prefix Next Hop IP MAC Prefix Next Hop Prefix Next Hop IP MAC
10.0.0.0 10.1.1.1 192.168.0 192.168.0.1 10.1.1.1 aabbcc:ddee3 10.0.0.0 10.1.1.1 192.168.0 192.168.0.1 10.1.1.1 aabbcc:ddee3
2 2
10.1.0.0 10.1.1.1 192.168.55. 192.168.55. 10.1.0.0 10.1.1.1 192.168.55. 192.168.55.
0 1 10.1.1.2 adbb32:d34e4 0 1 10.1.1.2 adbb32:d34e4
10.20.0.0 10.1.1.1 3 10.20.0.0 10.1.1.1 3
192.168.32. 192.168.32. 192.168.32. 192.168.32.
0 1 10.20.1. aa25cc:ddeee 0 1 10.20.1. aa25cc:ddeee
1 8 1 8
FIB Table
SSO FIB Table
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
Routing Protocol Redundancy With NSR (Stateful Restart)
Standby Supervisor Engine Slot 2
BGP RIB OSPF RIB ARP Table
FIB Table
10.1.1.1 aabbcc:ddee32
10.1.1.2 adbb32:d34e43
192.168.0. aa25cc:ddeee8
0
No additional signaling required to maintain topology
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
Standalone Chassis Redundant Core
Failure or Change at the Core
Best practices:
• Redundant topologies with equal cost • Layer 3
paths provide sub-second convergence. • Layer 2
• Hardware
• NSF/SSO provides superior availability in X
environments with non-redundant paths.
6
5
Seconds of Lost Voice*
RP Convergence
4 Is Dependent
on IGP and Tuning
3
• Enable BFD for all OSPF
2 neighbor links
• Adjust OSPF spf-throttling
1
timers with:
timers throttle spf
0
Link Node NSF SPF OSPF
timers throttle lsa
timers lsa arrival
Failure Failure SSO Throttle Convergence
• Service Restart-ability
Future Services
Protocol Stack (IPv4 / IPv6 / L2) Possibilities
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
In-Service Software Upgrade
Nexus# install all nxos bootflash:nxos.9.2.3.bin
Upgrade and reboot
Initiate stateful failover
Upgrade and reboot
Upgrade I/O modules
Active Standby
Release
Release Release
Release
7.0(3)I7(4)
OSPF
OSPF
9.2(3)
7.0(3)I7(4) 9.2(3)
BGP
BGP
PIM
etc.
PIM
etc.
HA Manager HA Manager
Linux Kernel Linux Kernel
Best Practice:
Release
Release VPCs should be distributed.
7.0(3)I7(4)
9.2(3)
I/O Module Images
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
NX-OS High Availability
Supervisor Switchover
• Triggers:
• HA Policy Initiated – e.g. 3 component crashes → SSO
• User Initiated – system switchover
• ISSU initiated SSO
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
NX-OS High Availability
ISSU
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
NX-OS High Availability - innovation
ISSU ISSU on EoR
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Defect Impact
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Software Patching in NX-OS
Who’s familiar with Software Maintenance Updates (SMU)?
Overview Benefits
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
SMU Lifecycle – CLI
SMU SMU
SMU
Repository
Switch# install add …
Switch# install remove …
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Patching Highlights
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Patching Highlights
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Operational
Best Practices
Hardware
Maintenance
Hardware Maintenance NX-OS >= 6.1: Parallel
EPLD Upgrades!
Electronic Programmable Logic Device Upgrade Example
The following example upgrades the EPLD image for module 1. The EPLD
image should be local when the upgrade is performed.
This procedure is typically not required during an NX-OS upgrade.
n7000# install module 1 epld bootflash:n7000-s1-epld.4.0.1.img
EPLD upgrades are intrusive and
EPLD image file , built on Mon Mar 31 10:31:48 2008 may take up to 30 minutes per
EPLD Curr Ver New Ver module!
-------------------------------------------------------
Power Manager 4.1 5.3
IO 2.6 2.10 The “install” command highlights the
Forwarding Engine 1.4 1.6
WARNING: Upgrade process could take up to 30 minutes.
EPLD version differences
Module could be powered down and up.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Hardware Maintenance
• Scenario: Line Card Hardware Upgrade or Replacement
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Hardware Maintenance
Scenario: Chassis Hardware Upgrade
• Bring switch being replaced into Graceful Insertion and Removal mode or
manually isolate prior to power down.
• Gas up your fork lift.
Option 1 Advertise as Stub Router, Advertise as with LSP Database Manipulate Metrics
Isolate LSInfinity Overload Bit set interface e1/1
max-metric router-lsa [ on- set-overload-bit {always | ip delay eigrp
Recommended startup [ seconds | wait- on-startup {seconds | wait- instance-tag
for bgp tag ]] for bgp as-number}} [suppress seconds
[interlevel | external]]
Option 2 router ospf 1 router isis 1 router eigrp 1
Shutdown shutdown shutdown shutdown
Protocol
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Protocol Isolation in Nexus
BGP
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Nexus 9k/7k/6k 3k/5k/6k/7k/9k Availability
Graceful Removal
router bgp 33
Discontinue advertisement of all prefixes.
isolate
router eigrp 1
isolate Advertises maximum metrics for all K-values.
router ospf 1
isolate max-metric router-lsa
router isis 1
isolate
set-overload-bit
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
3k/5k/6k/7k/9k Availability
Nexus 9k/7k/6k/5k
Graceful Insertion
N9372(config)# no system
mode maintenance
Following configuration
will be applied:
• Move the switch from Maintenance mode to
Normal mode. router bgp 33
• Control plane maintained throughout isolation of no isolate
the switch.
router eigrp 1
• Protocols advertise routes only after it is
installed in hardware.
no isolate
router ospf 1
no isolate
router isis 1
no isolate
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Protocol Isolation in Nexus
• All Protocols
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Graceful Insertion and Removal
OSPF:
max-metric router-lsa
Isolate for
Change Window
VPC:
shutdown
feature ospf
feature vpc Scripting takes time.
It’d be nice to automate this…
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Graceful Insertion and Removal
vPC vPC
One command!
Pre-change System Snapshot
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Graceful Insertion and Removal
vPC vPC
One command!
Post-change System Snapshot
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Graceful Insertion and Removal
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Configuration Profiles
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Enabling Graceful Insertion and Removal
Automatic Profile Generation
N7K-1-Core# show system mode
System Mode : Normal
N7K-1-Core# config
Enter configuration commands, one per line. End with
CNTL/Z.
N7K-1-Core(config)# system mode maintenance
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Graceful Insertion and Removal Mode for
Unplanned Outages
system mode maintenance on-reload reset-reason reason
HW_ERROR-Hardware error,
SVC_FAILURE-Critical service failure,
KERN_FAILURE-Kernel panic,
WDOG_TIMEOUT-Watchdog timeout,
FATAL_ERROR-Fatal error,
MANUAL_RELOAD---Manual reload,
MATCH_ANY-Any of the above reasons,
ANY_OTHER-Any reload reason not specified above.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Nexus GIR Snapshots
• Used before and after a GIR mode to compare pre/post change operation.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Nexus GIR Snapshots Comparison
Nexus# sh snapshots compare before_maintenance after_maintenance switch# show snapshots compare snapshot1 snapshot2 ipv4routes
================================================================================ metric snapshot1 snapshot2 changed
Feature Tag before_maintenance after_maintenance # of routes 33 3 *
================================================================================ # of adjacencies 10 4 *
[bgp]
-------------------------------------------------------------------------------- Prefix Changed Attribute
------ -----------------
[neighbor-id:100.120.1.221] 23.0.0.0/8 not in snapshot2
connectionsdropped 2 **3** 10.10.10.1/32 not in snapshot2
lastflap P1DT21H5M12S **P1DT21H25M47S** 21.1.2.3/8 adjacency index has changed from 29 (snapshot1) to 38
lastread P1DT21H25M12S **PT0S** (snapshot2)
lastwrite P1DT21H25M14S **PT0S**
state Established **Idle**
localport 52737 **0**
{+-}
remoteport 179 **0**
notificationssent 2 **3**
<...>
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Nexus 5k Scenario: Dual-homed FEX w/ VPC
Software Upgrade
Primary Secondary
V1 V1
Overview
vPC
• Highly Redundant Design
• Dual-attached FEX
• Dual-attached Hosts
1 2 3 4
Po1 Po2
How do we upgrade this environment with
minimal disruption?
FEX 102
FEX 101
V1 V1
Po10 Po20
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Nexus 5k Scenario: Dual-homed FEX w/ VPC
Software Upgrade
Image Version
Mismatch with
both FEXs
• Enter GIR Mode on N5k1
Secondary
V2
V1
Primary
V1
Traffic flow through N5k2
vPC
• Upgrade N5k1
• Exit GIR on N5k1
1 2 3 4
Po1 Po2
FEX 102
FEX 101
V1 V1
Po10 Po20
IF Down
IF Up, No Forwarding BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Nexus 5k Scenario: Dual-homed FEX w/ VPC
Software Upgrade
• Manually shut down IF3 on N5k2
Primary Secondary
V2
V1 V1
vPC
FEX 101 goes offline.
FEX 101 HIFs go down.
V1
V2 V1
Po10 Po20
IF Down
IF Up, No Forwarding BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Nexus 5k Scenario: Dual-homed FEX w/ VPC
Software Upgrade
• Manually shut down IF4 on N5k2
Primary Secondary
V2
V1 V1
vPC
FEX 102 goes offline.
FEX 102 HIFs go down.
1 2 3 4
FEX 102 starts pairing process with N5k1.
Po1 Po2
FEX 102
FEX 101
V1
V2 V1
V2
IF Down
IF Up, No Forwarding BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Nexus 5k Scenario: Dual-homed FEX w/ VPC
Software Upgrade
• Enter GIR Mode on N5k2
Secondary
V2
V1
Primary
V1
V2
IF 3 & 4 Still Admin Down
vPC
• Upgrade N5k2
• Exit GIR on N5k2
1 2 3 4 • Manual Up of IF 3 & 4
Po1 Po2
FEX 102
FEX 101
V1
V2 V1
V2
Environment upgrade completed with
minimal traffic disruption.
Po10 Po20
IF Down
IF Up, No Forwarding BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
ACI Operational
Practices
SDN ‘with’ FCAPS ‘and’ Automation
Application Centric
Programmable Network
Infrastructure
Automated application centric-policy model with DevOps toolset used for Network Management
embedded security (Puppet, Chef, Ansible etc.)
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Application Centric Infrastructure (ACI)
Rapid Deployment of Applications onto
Networks with Scale, Security and Full Visibility
Web App DB
APPLICATION CENTRIC
NEXUS 9500 AND 9300 CONTROLLER
Nexus 9k POLICYPolicy
App Centric APIC
ACI
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Application Network Profiles (ANP) – what’s that ?
=
POLICY MODEL
Inbound/Outbound Inbound/Outbound
Policies Policies
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Application Network Profiles (ANP) & ACI: how it
works ?
SLA
QoS
APPLICATION STORAGE
CONNECTIVIT SECURITY
Security QOS L4..7 AND
Y POLICY POLICIES
Classification SERVICES COMPUTE
APP PROFILE
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
Abstracting / Mapping via ACI’s Application
Network Profiles Application Network Profile
External
Zone Virtual Machines Docker Containers Bare-Metal Server
APIC
• ACI Fabric decouples the tenant end-point address, it’s “identifier”, from the location of
that end-point which is defined by it’s “locator” or VTEP address
• Forwarding within the Fabric is between VTEPs (ACI VXLAN tunnel endpoints) and
leverages an extender VXLAN header format referred to as the ACI VXLAN policy header
• The mapping of the internal tenant MAC or IP address to location is performed by the
VTEP using a distributed mapping database
• The control plane managed by COOP (Council of Oracle Protocols)
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
ACI Network Centric Deployment
Network configuration
WAN/
Corp-L3out Internet
• VRF CORP …. vrf
Tenant: Example-Corp
configuration VRF: Corp
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Use case for Complex deployment made simple
Cisco AS DAFE- Deploy ACI from Excel
1) Fill in the excel sheet
“spicy” XML
Templates
2) Select the tasks (ACI Objects)
you want to deploy XML Files
Python Script
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Operational Best Practices
• MO Naming Convention • EP Loop Prevention
• Develop and plan the MO(Managed Objects) Naming
Convention according to Organizations best Practice
• BD Level Configuration
• Limit IP Learning to Subnet
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Cisco ACI Fabric
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Health Score
Aggregated View
Fabric Topology
View
Aggregation of system-wide health, including pod health scores, tenant
health scores, system fault counts domain and type and the APIC cluster
health state.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
Troubleshoot a flow
Use ACI inbuilt Visibility engine
Faults
Eligible Path
Drops
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Troubleshoot a flow
Use ACI inbuilt Visibility engine
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Maintenance Upgrade #1
Download the release on the APIC
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
Maintenance Upgrade #2
Upgrade APIC
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Maintenance Upgrade #3
Create Groups
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Maintenance Upgrade #4
Upgrade the Maintenance Groups
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Capacity Dashboard
View the capacity of Data center Fabric
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
Cisco ACI Deployment Lifecycle
Proactive Preemptive Reactive
• Troubleshoot
• Faults • Monitor • Manage
• Image Management • Audit Logs
• Events
• Config Export / Import • iPing
• Health Score
• Fabric Inventory • iTraceroute
• Atomic Counter
• Show Usage • Endpoint Tracker
• Contract deny logs
• Configuration Rollback • ERSPAN
• Statistics
• Traffic Map
• Capacity Dashboard
• On Demand Counter
View
• CLI option
Recommended Live sessions for ACI :
BRKACI-2210, LTRACI-2143 BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
DCNM
DCNM : Functionality
Trend Analysis
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
DCNM Infrastructure & LAN Fabric Updates
VXLAN FP
• Multi-Fabric/Overlay
• Arrange by Tier
• [Core, Ag, Access
Leaf, Spine etc..]
• Metadata Tags
• Device Pop-Over
• Side-By Side View
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Demo
DAFE & DCNM
Network Insights
Network Insights Applications
Apps
Proactive Software
Recommendations/Notifications Physical/Logical
Issue Vulnerability Detection & DCNM APIC Network Capacity
Platform
Remediation & Utilization
Data & Control
Plane &
Environmental
Physical/Logical Network Capacity & Utilization Health
Data & Control Plane & Environmental Health
App Hosting Framework App Hosting Framework
App Store App Store
Data collection and ingestion Data correlation and analysis Data visualization and action
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Network Insights Advisor High Level Architecture
EoL/EoS
Correlation Engines
PSIRT / Field Notice
Recommendations
Image Repo
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
How does NIA detect known issues?
Hardening
Check
Tech Storage
Support Data Sources Signature Advisory NIA – GUI
and ‘show
Matching Services
run’
Insights DB
collection
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Data Center
Behavioral
Monitoring
Modern Data Centers Are Getting Increasingly
Complex
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Evolving landscape & monitoring
Data Analysis
Data Creation
Multiple
collectors
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Need for Data Analytics
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Cisco Tetration
Profile and Context Driven Application Segmentation/ behavioral
assessment
Cisco Tetration
Customer Defined
Platform Performs the
Translation
*Note: No per-packet Telemetry, Not an enforcement point ✓ Enforcement Point (Software agents)
✓ Low CPU Overhead (SLA enforced) ✓ Highly Secure (Code Signed, Authenticated)
✓ Low Network Overhead (SLA enforced) ✓ Every Flow (No sampling), NO PAYLOAD
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Data Granularity Needs to Improve
Type of Problems Customers are Looking to
Address
Workload Placement
ADM
Capacity Planning
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Data Granularity Needs to Improve
Sub Second HW/SW Push – Use case 1
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Application Conversation View – Use Case 2
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Maintenance Windows – Golden Rules
• Change Review Board
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Traditional vPC Environment Change
Change Best Practice & Window
Primary Secondary
Core Isolation
1. Graceful L3 Protocol Isolation
vPC
2. Layer 2 Isolation
• VPC
3. Interface Isolation
Using GIR Mode Steps 1-3 could be achieved prescriptively.
Access Isolation
1. Layer 2 Isolation
• VPC
2. Interface Isolation
1. Fex-fabric (include/exclude)
2. Dual-attached FEX Procedure * Recommended
Fex Using GIR Mode Steps 1-2 could be achieved prescriptively.
NOTE: Maintenance mode consideration should be based on Fex-
fabric connectivity.
If change window is for software upgrade or spot fix, consider ISSU or SMU feasibility.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
L3 Environment
Change Best Practice & Window
Core Isolation
1. Graceful L3 Protocol Isolation
2. Interface Isolation
Using GIR Mode Steps 1-2 could be achieved prescriptively.
Access Isolation
Layer 3 1. L3 Protocol isolation
2. Layer 2 Isolation
• vPC
3. Interface Isolation
1. Fex-fabric (include/exclude)
2. Dual-attached FEX Procedure * Recommended
Using GIR Mode, prescriptive isolation is possible.
If change window is for software upgrade or spot fix, consider ISSU or SMU feasibility.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
FabricPath Environment
Change Best Practice & Window
Spine Isolation
1. Use FabricPath IS-IS Overload Bit
Using GIR Mode with isolate configuration, Step 1 could be
achieved prescriptively.
If change window is for software upgrade or spot fix, consider ISSU or SMU feasibility.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
VxLAN EVPN Environment
Change Best Practice & Window Spine Isolation
1. L3 Protocol isolation
• If iBGP EVPN, consider IGP isolation
iBGP RR
• If eBGP EVPN, consider BGP isolation
2. Interface Isolation
Using GIR Mode Steps 1-2 could be achieved prescriptively.
Leaf Isolation
1. L3 Protocol isolation
VxLAN • If iBGP EVPN, consider IGP isolation
• If eBGP EVPN, consider BGP isolation
2. Layer 2 Isolation
• vPC
VTEPs 3. Interface Isolation
1. Fex-fabric (include/exclude)
2. Dual-attached FEX Procedure * Recommended
Using GIR Mode, prescriptive isolation is possible.
If change window is for software upgrade or spot fix, consider ISSU or SMU feasibility.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
NX-OS 6.x -> 7.x
Use Case
NX-OS 6.x -> 7.x Use Case - Secondary Manual Effort
7k Upgrade
7k • Prerequisites
• Code Staging
• Peer Switch
• Peer Gateway • VPC Best Practices
• Auto-recovery
• L3 Link between • Manual Isolation of Secondary
vPC pairs • Protocol Isolation
• BFD
5k • Routing Protocol • Max-metric LSA, etc. -> No service impact (0-
Convergence 20ms)
Tuning • VPC Isolation
• Down vPCs-> No service impact (0-20ms)
• Down Peer Link-> No service impact
ISSU ✓ X ✓
GIR + Cold Boot ✓ X ✓
GIR + Disruptive
✓ X ✓
Installer
SMU Restart ✓ X X
GIR + SMU ISSU ✓ X X
GIR X ✓ X
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Summary
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Continue Your Education
• Related sessions
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 115
Continue your education
Demos in the
Walk-In Labs
Cisco Showcase
BRKDCN-2458 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 116
Thank you