Aci DC Cisco
Aci DC Cisco
Networking
Febrero 2015
A New Conversation
UDC
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
What is SDN?
OpenFlow?
Controller?
OpenStack?
Network virtualization?
Automation?
APIs?
Application-oriented?
Open vSwitch?
Define the
Invest Application Communication Policy
Time
Network Security Virtualization Application Cloud
Policy Framework
Spend
No Provision the Policy into the Fabric
Time (Fully Automated)
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Current Networking Constructs
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
The life cycle of a traditional network
And the frequency of the work required
1 Design Physical and Logical Network
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
A Typical Physical Network Design
L3 Backbone
Design Characteristics
Aggregation/Core • L2 access with and without
vPC Pair
vPC connected hosts
(including peer links where
needed)
• Port-Channel to Aggregation
Layer (vPC)
• Default Gateway in
vPC/PortChannel
Aggregation Layer
• Routing Protocol to the L3
Access (ToR) backbone
• VRF for multi-tenant
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
What is ACI ?
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
ACI - Logical Network Provisioning of Stateless Hardware
Embracing SDN and Moving beyond with ACI
Web App DB
APIC
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Why ACI?
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Should you…..
or
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
What is an Application?
Exchange
Subnet 10
Active Directory
Campus VLAN 10
Single Sign On
IP storage
Steve’s Custom Application
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
ACI as a Network
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
ACI as Application Centric Infrastructure
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
ACI Networking Constructs
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Definitions
Tenant - Logical Container for Hosted Tenants or Business units, can contain
multiple Private Networks
Private Network - VRF or context allows overlapping addresses
Owner*: Network Team
Bridge Domain - L2 Broadcast/Multicast domain
Application Profile - Definition of Application
End Point Group – Single or Multiple End Points (exist in single bridge Owner*: Application
Team
domains)
Contracts – Directional Access Control between EPGs
Subjects – Access rules (Filters) for the Contracts e.g. TCP port number,
redirect, mark
Owner*: Security Team
* Owners are notional simply to show how RBAC could be used in an Application Profile definition
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Definitions
Customer/ BU/ Group
Tenant
Subnet A Subnet B
Subnet D
Subnet B Subnet F IP Space(s)
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
End Points and End Point Groups
End Points are physical or virtual devices which attach to the network.
Identified End Points are aggregated into End Point Groups.
Examples include
Virtual Machine, Physical Server
Layer 2 or 3 switch
VLAN
Subnet
Load balancer
Firewall
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
EPG Definition
EPs are devices which attach to the network either virtually or physically, e.g:
• Virtual Machine
• Physical Server (running Bare Metal or Hypervisor)
• External Layer 2 device
• External Layer 3 device
Application
• VLAN
Profile
• Subnet
• Firewall
• Load balancer
EPG EPG
EP EP EP EP
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Single Bridge Domain, External Gateway
Traffic Permitted
Traffic Permitted
Traffic Permitted
Traffic Permitted
Traffic Permitted
Traffic Permitted
Without a contact traffic is * Note: Subnets can span EPGs, i.e. EPG Green can contain hosts in both subnets
blocked between EPG’s
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Single Bridge Domain, Multiple Subnets/Gateways
Traffic Permitted
Traffic Permitted
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Private Networks
Pepsi-Tenant Coke-Tenant
Private Network 1 Private Network 1
Private networks (also called
VRFs or contexts) are defined
within a tenant to allow
isolated and potentially
Private Network 2 Private Network 2 overlapping IP address space.
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Bridge Domain
Pepsi-Tenant Coke-Tenant
Within a private network, one
Private Network 1 Private Network 1
or more bridge domains must
Bridge Domain 1 Bridge Domain 1
be defined.
Bridge Domain 2 Bridge Domain 2
A bridge domain is a L2
Private Network 2 Private Network 2 forwarding construct within the
Bridge Domain 3 Bridge Domain 3
fabric, used to constrain
broadcast and multicast traffic.
Bridge Domain 4 Bridge Domain 4
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
End Point Groups
Pepsi-Tenant Coke-Tenant
Private Network 1 Private Network 1
Bridge Domain 1 EPG Bridge Domain 1 EPG
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
ACME – Campus Network Integration
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
ACME – Application as a Subnet
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Cisco Application - iExpenses
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Cisco Application - iExpenses
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
XML representation of iExpenses Application
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Demo
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Wrapping up
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Application Centric Infrastructure
SDN for ALL workloads, with built in security and micro segmentation.
Single open API
for entire system Network Service Appliances X86 Multi-Hypervisor
X86-Virtual Machines & LXC Containers X86 Servers Unix Systems IP Storage
Virtual Appliances Dockers
©2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Two Types of Languages
Infrastructure Language App Language
Febrero 2015
Legal Disclaimer
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
ACI System’s Overview
POLICY MODEL
Application Network Profile
END POINTS
Physical and Virtual HY P E RV I S O R HY P E RV I S O R HY P E RV I S O R
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Integration of Existing DC Network Assets
Extending the ACI Overlay to Existing DC Assets
vSwitch vSwitch
vSwitch
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Nexus – ACI Integration Summary
APIC
N2K Integration in ACI Fabric
• Deploy N2K in ACI fabric
APIC
N9K ACI
2K-7K
Fabric
9K
ACI Leaf Overlay
AVS AVS • Full Policy & Management Model
•
A A
Hosts
p
p
O
S
p
p
O
S Seamless HW GWY integration
Virtual Phy sical N2K FEX
Extend Integrate
ACI Integrated N7K DCI
APIC
• Automated DCI integration
APIC • Large Scale Tenant Extension
ACI Policy Block
2K-7K
Fabric
EPG Extension
A
p
p
O
A
p
p
O
• Full Policy Model Nexus 7x00 WAN/DCI
Hosts S S
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Nexus – ACI Integration: EPG Extension
Extend Integrate
APIC
2K-7K
Fabric
EPG Extension
A
p
p
O
A
p
p
O
• Full Policy Model
Hosts S S
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Co-existence of ACI hosted applications with existing application
components
• Layer 2 and Layer 3 interoperation between ACI Fabric and Existing Data Center builds
• Layer 3 interconnect via standard routing interfaces,
OSPF, iBGP, Static (FCS)
EIGRP, EVPN, eBGP (Post FCS)
• Layer 2 interconnect via standard methods
Subnet ‘A’
Subnet ‘B’
Subnet ‘C’ Subnet ‘D’
Classical L2/L3
ACI - VXLAN
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Extending ACI into Current Data Center’s
Extend EPGs to VLANs on existing infrastructure
• Connect non-ACI networks to ACI leaf nodes
• Connect at L2 with VLAN trunks (802.1Q)
• Objective: Map VLANs to EPGs, extend policy model to non-ACI networks
L2 connection
to Leaf Node
Extend VLANs
Backbone (Trunk)
vPC
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Existing Designs Many Different Physical Designs
The part we care about – the host layers
N7k Cat6500
L3 HSRP L3 HSRP
VM
P
HSRP
Default GW N7k
VLAN / Subnet L3 HSRP
N7k
L3 HSRP
vPC
VM VM VM
P P N5k
vPC
N5k
N2k
The Focus for Moving Workloads
VM VM
P P
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Connect Fabric to existing Network
HSRP
Default GW
VLAN 10 / Subnet 10
EPG-10 = VLAN 10
P P
VM VM VM
Trunk (.1Q)
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Connect Fabric to Existing Network
The ACI “Infra Admin” creates the Leaf interface policy (speed,
CDP, LLDP etc…) for the port.
The ACI “Tenant Admin” uses that port for the migration (see
later).
APIC
Existing Design
Lets call this Tenant “Red”
HSRP
Default GW
VLAN 10 / Subnet 10
VM VM VM
P P
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Configure ACI in preparation for the migration
(EPG equals VLAN) Always need a Tenant & Context
For the migration:
Tenant “Red”
create a BD in for each VLAN & define
Context “Red” the subnet.
Create EPG and assign it the correct
Bridge Domain “10”
subnet and VLAN.
Subnet 10 EPG-10 Per Bridge-Domain:
We don’t want ACI to route this subnet
Bridge Domain “20” yet, the existing HSRP gateways remain
the default gateway for now.
Subnet 20 EPG-20 Disable Unicast Routing and Enable
flooding (ARP, L2 unknown Unicast)
Temporary Bridge Domain specific settings
while we are using the HSRP gateways in
the existing network.
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Use-case: Move Workloads
APIC point of view, the policy model
EPG-10
VM VM VM
P P
APIC
VM’s will need to be connected to new Port
Group under the APIC control
(AVS or DVS).
Existing Design
HSRP
Default GW
VLAN 10 / Subnet A
VM VM VM
P P
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Use Case: Migrate all workloads to ACI
Change BD settings back to normal for ACI mode
Once all hosts are migrated (moved to ACI Leaves)
Change BD settings back to default.
Hardware Proxy, No ARP Flooding
Unicast Routing enabled.
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Use Case: Move Services into ACI Services Graphs
APIC point of view, the policy model
EPG-20
EPG-10
VM VM VM
P P
APIC
VM’s will need to be connected to new Port
Group under the APIC control
(AVS or DVS).
Existing Design
HSRP
Default GW
VLAN 10 / Subnet A
VM VM VM
P P
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Extending ACI in to Current Data Center’s
Standard Architecture with Services
Backbone Backbone
Services
Services Chassis Services
“Fabric”
Chassis
APIC Policy
Controller
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Nexus – ACI Integration Summary
APIC
N9K ACI
2K-7K
Fabric
9K
ACI Leaf Overlay
AVS AVS • Full Policy & Management Model
•
A A
Hosts
p
p
O
S
p
p
O
S Seamless HW GWY integration
Virtual Phy sical
Extend Integrate
APIC
2K-7K
Fabric
EPG Extension
A
p
p
O
A
p
p
O
• Full Policy Model
Hosts S S
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Application Virtual Switch (AVS) with
OpFlex in ACI Fabric
• AVS: First Virtual Leaf to Hypervisor Manager
implement OpFlex vCenter
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Virtual Leaf Switching Modes
• Local Switching (LS) Mode: Intra-EPGs traffic switched on the same host
Punt to Leaf for all traffic Punt to Leaf for Inter-EPG traffic Full Policy Enforcement
VM VM VM VM VM VM VM VM VM VM VM VM
EPG Web EPG App EPG Web EPG App EPG Web EPG App
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
AVS: Extend ACI to Existing Virtual &
Physical Network
AVS-APIC OpFlex integration
No VLAN-EPG Stitching/Mapping
OpFlex
Protection
OpFlex
OpFlex
Phase 1: L2 network required AVS
AVS 1.0: Local Switching & FEX mode
AVS 2.0: Full Switching mode AVS
OS
App
OS
and service insertion capability are extended
Virtual Physical
• 2K-7K infrastructure not managed by APIC
Application Virtual Switch (AVS) is an • Other ACI innovation requires full ACI fabric:
Congestion based Load Balancing, Flowlet prioritization
APIC managed extension of the ACI
POD on a remote network
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
IP Core with a Hardware Directory Service
• Three data plane functions required within the ‘core’ of an ACI fabric
• Transit: IP forwarding of traffic between VTEP’s
• Multicast Root: Root for one of the 16 multicast forwarding topologies (used for
optimization of multicast load balancing and forwarding)
• Proxy Lookup: Data Plane based directory for forwarding traffic based on mapping
database of EID to VTEP bindings
• Not all functions are required on all ‘spine’ switches
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Extending ACI into Current Data Center’s
Extend the underlay infrastructure to the non-ACI fabric
• Objective: Extend infrastructure (VRF) IP connectivity to non-ACI fabric
L3 Connection
to Spine
Extend
Infrastructure
VRF
Backbone
vPC
vPC
vPC
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Extending ACI Policy Based Forwarding into
Existing Data Center Networks (1HCY15)
1. Extend Policy Based Forwarding
2. Extend Visibility, Fault and Audit
3. Automated Device Management for extended Fabric nodes
ACI Enabled
Remote N9K
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Nexus – ACI Integration Summary
APIC
N2K Integration in ACI Fabric
• Deploy N2K in ACI fabric
APIC
N9K ACI
2K-7K
Fabric
9K
ACI Leaf Overlay
AVS AVS • Full Policy & Management Model
•
A A
Hosts
p
p
O
S
p
p
O
S Seamless HW GWY integration
Virtual Phy sical N2K FEX
Extend Integrate
APIC
2K-7K
Fabric
EPG Extension
A
p
p
O
A
p
p
O
• Full Policy Model
Hosts S S
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Attaching a FEX to ACI Fabric
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
Nexus – ACI Integration Summary
APIC
N2K Integration in ACI Fabric
• Deploy N2K in ACI fabric
APIC
N9K ACI
2K-7K
Fabric
9K
ACI Leaf Overlay
AVS AVS • Full Policy & Management Model
•
A A
Hosts
p
p
O
S
p
p
O
S Seamless HW GWY integration
Virtual Phy sical N2K FEX
Extend Integrate
ACI Integrated N7K DCI
APIC
• Automated DCI integration
APIC • Large Scale Tenant Extension
ACI Policy Block
2K-7K
Fabric
EPG Extension
A
p
p
O
A
p
p
O
• Full Policy Model Nexus 7x00 WAN/DCI
Hosts S S
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Integrate N7K as a DCI/WAN Router in the
ACI Fabric
APIC
Nexus 7000
ASR 9000
Auto-provision
WAN/DCI
Or DC Core
OpFlex
Tenant Segmentation
Integrate DCI services in the ACI Architecture
• Disaster Recovery, Business Continuity, Multi-DC Workload Mobility
• Leverage Proven/Mature DCI technologies and implementations
• Provide the necessary connectivity to extend the Group Policy Model to the N2-7K
Fabric
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
Additional Resources
© 2013-2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
Thank you.