, ,

ACI Advanced Monitoring and Troubleshooting

Paperback Engels 2021 9781587145285
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

ACI Advanced Monitoring and Troubleshooting provides a solid conceptual foundation and in-depth technical knowledge for monitoring and troubleshooting virtually any problem encountered during testing, deployment, or operation of Cisco Application Centric Infrastructure (ACI) infrastructure. Authored by leading ACI support experts at Cisco, it covers all students will need to learn to keep an ACI deployment working optimally. Coverage includes: Core ACI concepts and components, including Nexus 9000 Series platforms, APIC controllers, and protocols In-depth insight into ACI’s policy model ACI fabric design options: single and multiple data centers, stretched vs. multiple fabrics, and multi-pod/multi-site Automation, orchestration, and the cloud in ACI environments ACI topology and hardware/software specifications End host and network connectivity VMM integration Network management configuration, including SNMP, AAA, and SPAN Monitoring ACI fabrics and health Getting immediate results through the NX-OS command line interface Troubleshooting use cases: fabric discovery, APIC, management access, contracts, external connectivity, leaf/spine connectivity, end-host connectivity, VMM problems, ACI multi-pod/multi-site problems, and more

Specificaties

ISBN13:9781587145285
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<div> Foreword by Yusuf Bhaiji&nbsp; &nbsp; &nbsp;xxviii </div> <div> <br> </div> <div> Foreword by Ronak Desai&nbsp; &nbsp; &nbsp;xxix </div> <div> <br> </div> <div> Introduction&nbsp; &nbsp; &nbsp;xxx </div> <div> <br> </div> <div> PART I:&nbsp; INTRODUCTION TO ACI </div> <div> <br> </div> <div> Chapter 1&nbsp; Fundamental Functions and Components of Cisco ACI&nbsp; &nbsp; &nbsp;1 </div> <div> <br> </div> <div> ACI Building Blocks&nbsp; &nbsp; &nbsp;8 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hardware Specifications&nbsp; &nbsp; &nbsp;8 </div> <div> <br> </div> <div> ACI Key Concepts&nbsp; &nbsp; &nbsp;14 </div> <div> <br> </div> <div> &nbsp; &nbsp; Control Plane&nbsp; &nbsp; &nbsp;15 </div> <div> <br> </div> <div> &nbsp; &nbsp; Data Plane&nbsp; &nbsp; &nbsp;17 </div> <div> <br> </div> <div> &nbsp; &nbsp; VXLAN&nbsp; &nbsp; &nbsp;17 </div> <div> <br> </div> <div> &nbsp; &nbsp; Tenant&nbsp; &nbsp; &nbsp;18 </div> <div> <br> </div> <div> &nbsp; &nbsp; VRF&nbsp; &nbsp; &nbsp;19 </div> <div> <br> </div> <div> &nbsp; &nbsp; Application Profile&nbsp; &nbsp; &nbsp;20 </div> <div> <br> </div> <div> &nbsp; &nbsp; Endpoint Group&nbsp; &nbsp; &nbsp;21 </div> <div> <br> </div> <div> &nbsp; &nbsp; Contracts&nbsp; &nbsp; &nbsp;22 </div> <div> <br> </div> <div> &nbsp; &nbsp; Bridge Domain&nbsp; &nbsp; &nbsp;24 </div> <div> <br> </div> <div> &nbsp; &nbsp; External Routed or Bridged Network&nbsp; &nbsp; &nbsp;25 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;26 </div> <div> <br> </div> <div> Review Key Topics&nbsp; &nbsp; &nbsp;26 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;27 </div> <div> <br> </div> <div> Chapter 2&nbsp; Introduction to the ACI Policy Model&nbsp; &nbsp; &nbsp;31 </div> <div> <br> </div> <div> Key Characteristics of the Policy Model&nbsp; &nbsp; &nbsp;32 </div> <div> <br> </div> <div> &nbsp; &nbsp; Management Information Tree (MIT)&nbsp; &nbsp; &nbsp;33 </div> <div> <br> </div> <div> &nbsp; &nbsp; Benefits of a Policy Model&nbsp; &nbsp; &nbsp;37 </div> <div> <br> </div> <div> Logical Constructs&nbsp; &nbsp; &nbsp;37 </div> <div> <br> </div> <div> Tenant Objects&nbsp; &nbsp; &nbsp;38 </div> <div> <br> </div> <div> VRF Objects&nbsp; &nbsp; &nbsp;39 </div> <div> <br> </div> <div> Application Profile Objects&nbsp; &nbsp; &nbsp;40 </div> <div> <br> </div> <div> Endpoint Group Objects&nbsp; &nbsp; &nbsp;41 </div> <div> <br> </div> <div> Bridge Domain and Subnet Objects&nbsp; &nbsp; &nbsp;43 </div> <div> <br> </div> <div> &nbsp; &nbsp; Bridge Domain Options&nbsp; &nbsp; &nbsp;45 </div> <div> <br> </div> <div> Contract Objects&nbsp; &nbsp; &nbsp;46 </div> <div> <br> </div> <div> &nbsp; &nbsp; Labels, Filters, and Aliases&nbsp; &nbsp; &nbsp;48 </div> <div> <br> </div> <div> &nbsp; &nbsp; Contract Inheritance&nbsp; &nbsp; &nbsp;49 </div> <div> <br> </div> <div> &nbsp; &nbsp; Contract Preferred Groups&nbsp; &nbsp; &nbsp;49 </div> <div> <br> </div> <div> &nbsp; &nbsp; vzAny&nbsp; &nbsp; &nbsp;50 </div> <div> <br> </div> <div> Outside Network Objects&nbsp; &nbsp; &nbsp;51 </div> <div> <br> </div> <div> Physical Construct&nbsp; &nbsp; &nbsp;52 </div> <div> <br> </div> <div> &nbsp; &nbsp; Access Policies&nbsp; &nbsp; &nbsp;52 </div> <div> <br> </div> <div> &nbsp; &nbsp; Switch Policies&nbsp; &nbsp; &nbsp;53 </div> <div> <br> </div> <div> &nbsp; &nbsp; Interface Policies&nbsp; &nbsp; &nbsp;54 </div> <div> <br> </div> <div> &nbsp; &nbsp; Global Policies&nbsp; &nbsp; &nbsp;55 </div> <div> <br> </div> <div> Managed Object Relationships and Policy Resolution&nbsp; &nbsp; &nbsp;57 </div> <div> <br> </div> <div> Tags&nbsp; &nbsp; &nbsp;58 </div> <div> <br> </div> <div> Default Policies&nbsp; &nbsp; &nbsp;58 </div> <div> <br> </div> <div> How a Policy Model Helps in Diagnosis&nbsp; &nbsp; &nbsp;60 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;63 </div> <div> <br> </div> <div> Review Key Topics&nbsp; &nbsp; &nbsp;63 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;64 </div> <div> <br> </div> <div> Chapter 3&nbsp; ACI Command-Line Interfaces&nbsp; &nbsp; &nbsp;67 </div> <div> <br> </div> <div> APIC CLIs&nbsp; &nbsp; &nbsp;68 </div> <div> <br> </div> <div> &nbsp; &nbsp; NX-OS–Style CLI&nbsp; &nbsp; &nbsp;68 </div> <div> <br> </div> <div> &nbsp; &nbsp; Bash CLI&nbsp; &nbsp; &nbsp;74 </div> <div> <br> </div> <div> ACI Fabric Switch CLIs&nbsp; &nbsp; &nbsp;78 </div> <div> <br> </div> <div> &nbsp; &nbsp; iBash CLI&nbsp; &nbsp; &nbsp;78 </div> <div> <br> </div> <div> &nbsp; &nbsp; VSH CLI&nbsp; &nbsp; &nbsp;81 </div> <div> <br> </div> <div> &nbsp; &nbsp; VSH_LC CLI&nbsp; &nbsp; &nbsp;83 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;84 </div> <div> <br> </div> <div> Reference&nbsp; &nbsp; &nbsp;84 </div> <div> <br> </div> <div> Chapter 4&nbsp; ACI Fabric Design Options&nbsp; &nbsp; &nbsp;85 </div> <div> <br> </div> <div> Physical Design&nbsp; &nbsp; &nbsp;85 </div> <div> <br> </div> <div> &nbsp; &nbsp; Single- Versus Multiple-Fabric Design&nbsp; &nbsp; &nbsp;87 </div> <div> <br> </div> <div> &nbsp; &nbsp; Multi-Pod&nbsp; &nbsp; &nbsp;97 </div> <div> <br> </div> <div> &nbsp; &nbsp; Multi-Site&nbsp; &nbsp; &nbsp;116 </div> <div> <br> </div> <div> &nbsp; &nbsp; Remote Leaf&nbsp; &nbsp; &nbsp;131 </div> <div> <br> </div> <div> &nbsp; &nbsp; Hardware and Software Support&nbsp; &nbsp; &nbsp;134 </div> <div> <br> </div> <div> &nbsp; &nbsp; ACI Multi-Pod and Remote Leaf Integration&nbsp; &nbsp; &nbsp;143 </div> <div> <br> </div> <div> Logical Design&nbsp; &nbsp; &nbsp;149 </div> <div> <br> </div> <div> &nbsp; &nbsp; Design 1: Container-as-a-Service Using the OpenShift Platform and Calico CNI&nbsp; &nbsp; &nbsp;149 </div> <div> <br> </div> <div> Design 2: Vendor-Based ERP/SAP Hana Design with ACI&nbsp; &nbsp; &nbsp;165 </div> <div> <br> </div> <div> Design 3: vBrick Digital Media Engine Design with ACI&nbsp; &nbsp; &nbsp;175 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;180 </div> <div> <br> </div> <div> Review Key Topics&nbsp; &nbsp; &nbsp;181 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;181 </div> <div> <br> </div> <div> Chapter 5&nbsp; End Host and Network Connectivity&nbsp; &nbsp; &nbsp;185 </div> <div> <br> </div> <div> End Host Connectivity&nbsp; &nbsp; &nbsp;185 </div> <div> <br> </div> <div> &nbsp; &nbsp; VLAN Pool&nbsp; &nbsp; &nbsp;186 </div> <div> <br> </div> <div> &nbsp; &nbsp; Domain&nbsp; &nbsp; &nbsp;186 </div> <div> <br> </div> <div> &nbsp; &nbsp; Attachable Access Entity Profiles (AAEPs)&nbsp; &nbsp; &nbsp;186 </div> <div> <br> </div> <div> &nbsp; &nbsp; Switch Policies&nbsp; &nbsp; &nbsp;187 </div> <div> <br> </div> <div> &nbsp; &nbsp; Interface Policies&nbsp; &nbsp; &nbsp;188 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Port Channel (VPC)&nbsp; &nbsp; &nbsp;191 </div> <div> <br> </div> <div> &nbsp; &nbsp; Port Channel&nbsp; &nbsp; &nbsp;197 </div> <div> <br> </div> <div> &nbsp; &nbsp; Access Port&nbsp; &nbsp; &nbsp;201 </div> <div> <br> </div> <div> &nbsp; &nbsp; Best Practices in Configuring Access Policies&nbsp; &nbsp; &nbsp;206 </div> <div> <br> </div> <div> &nbsp; &nbsp; Compute and Storage Connectivity&nbsp; &nbsp; &nbsp;207 </div> <div> <br> </div> <div> &nbsp; &nbsp; L4/L7 Service Device Connectivity&nbsp; &nbsp; &nbsp;210 </div> <div> <br> </div> <div> Network Connectivity&nbsp; &nbsp; &nbsp;213 </div> <div> <br> </div> <div> &nbsp; &nbsp; Connecting an External Bridge Network&nbsp; &nbsp; &nbsp;213 </div> <div> <br> </div> <div> &nbsp; &nbsp; Connecting an External Routed Network&nbsp; &nbsp; &nbsp;218 </div> <div> <br> </div> <div> Diagnosing Connectivity Problems&nbsp; &nbsp; &nbsp;242 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;245 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;245 </div> <div> <br> </div> <div> Chapter 6&nbsp; VMM Integration&nbsp; &nbsp; &nbsp;249 </div> <div> <br> </div> <div> Virtual Machine Manager (VMM)&nbsp; &nbsp; &nbsp;249 </div> <div> <br> </div> <div> &nbsp; &nbsp; VMM Domain Policy Model&nbsp; &nbsp; &nbsp;250 </div> <div> <br> </div> <div> &nbsp; &nbsp; VMM Domain Components&nbsp; &nbsp; &nbsp;250 </div> <div> <br> </div> <div> &nbsp; &nbsp; VMM Domains&nbsp; &nbsp; &nbsp;250 </div> <div> <br> </div> <div> &nbsp; &nbsp; VMM Domain VLAN Pool Association&nbsp; &nbsp; &nbsp;252 </div> <div> <br> </div> <div> VMware Integration&nbsp; &nbsp; &nbsp;257 </div> <div> <br> </div> <div> &nbsp; &nbsp; Prerequisites for VMM Integration with AVS or VDS&nbsp; &nbsp; &nbsp;257 </div> <div> <br> </div> <div> &nbsp; &nbsp; Guidelines and Limitations for VMM Integration with AVS or VDS&nbsp; &nbsp; &nbsp;257 </div> <div> <br> </div> <div> &nbsp; &nbsp; ACI VMM Integration Workflow&nbsp; &nbsp; &nbsp;258 </div> <div> <br> </div> <div> &nbsp; &nbsp; Publishing EPGs to a VMM Domain&nbsp; &nbsp; &nbsp;258 </div> <div> <br> </div> <div> &nbsp; &nbsp; Connecting Virtual Machines to the Endpoint Group Port Groups on vCenter&nbsp; &nbsp; &nbsp;259 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying VMM Integration with the AVS or VDS&nbsp; &nbsp; &nbsp;259 </div> <div> <br> </div> <div> Microsoft SCVMM Integration&nbsp; &nbsp; &nbsp;260 </div> <div> <br> </div> <div> &nbsp; &nbsp; Mapping ACI and SCVMM Constructs&nbsp; &nbsp; &nbsp;261 </div> <div> <br> </div> <div> &nbsp; &nbsp; Mapping Multiple SCVMMs to an APIC&nbsp; &nbsp; &nbsp;262 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying That the OpFlex Certificate Is Deployed for a Connection from the SCVMM to the APIC&nbsp; &nbsp; &nbsp;262 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying VMM Deployment from the APIC to the SCVMM&nbsp; &nbsp; &nbsp;263 </div> <div> <br> </div> <div> OpenStack Integration&nbsp; &nbsp; &nbsp;263 </div> <div> <br> </div> <div> &nbsp; &nbsp; Extending OpFlex to the Compute Node&nbsp; &nbsp; &nbsp;264 </div> <div> <br> </div> <div> &nbsp; &nbsp; ACI with OpenStack Physical Architecture&nbsp; &nbsp; &nbsp;264 </div> <div> <br> </div> <div> &nbsp; &nbsp; OpFlex Software Architecture&nbsp; &nbsp; &nbsp;265 </div> <div> <br> </div> <div> &nbsp; &nbsp; OpenStack Logical Topology&nbsp; &nbsp; &nbsp;265 </div> <div> <br> </div> <div> &nbsp; &nbsp; Mapping OpenStack and ACI Constructs&nbsp; &nbsp; &nbsp;266 </div> <div> <br> </div> <div> Kubernetes Integration&nbsp; &nbsp; &nbsp;272 </div> <div> <br> </div> <div> &nbsp; &nbsp; Planning for Kubernetes Integration&nbsp; &nbsp; &nbsp;272 </div> <div> <br> </div> <div> &nbsp; &nbsp; Prerequisites for Integrating Kubernetes with Cisco ACI&nbsp; &nbsp; &nbsp;273 </div> <div> <br> </div> <div> &nbsp; &nbsp; Provisioning Cisco ACI to Work with Kubernetes&nbsp; &nbsp; &nbsp;274 </div> <div> <br> </div> <div> &nbsp; &nbsp; Preparing the Kubernetes Nodes&nbsp; &nbsp; &nbsp;277 </div> <div> <br> </div> <div> &nbsp; &nbsp; Installing Kubernetes and Cisco ACI Containers&nbsp; &nbsp; &nbsp;279 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the Kubernetes Integration&nbsp; &nbsp; &nbsp;280 </div> <div> <br> </div> <div> OpenShift Integration&nbsp; &nbsp; &nbsp;281 </div> <div> <br> </div> <div> &nbsp; &nbsp; Planning for OpenShift Integration&nbsp; &nbsp; &nbsp;282 </div> <div> <br> </div> <div> &nbsp; &nbsp; Prerequisites for Integrating OpenShift with Cisco ACI&nbsp; &nbsp; &nbsp;283 </div> <div> <br> </div> <div> &nbsp; &nbsp; Provisioning Cisco ACI to Work with OpenShift&nbsp; &nbsp; &nbsp;284 </div> <div> <br> </div> <div> &nbsp; &nbsp; Preparing the OpenShift Nodes&nbsp; &nbsp; &nbsp;287 </div> <div> <br> </div> <div> &nbsp; &nbsp; Installing OpenShift and Cisco ACI Containers&nbsp; &nbsp; &nbsp;290 </div> <div> <br> </div> <div> &nbsp; &nbsp; Updating the OpenShift Router to Use the ACI Fabric&nbsp; &nbsp; &nbsp;291 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the OpenShift Integration&nbsp; &nbsp; &nbsp;291 </div> <div> <br> </div> <div> VMM Integration with ACI at Multiple Locations&nbsp; &nbsp; &nbsp;292 </div> <div> <br> </div> <div> &nbsp; &nbsp; Multi-Site&nbsp; &nbsp; &nbsp;292 </div> <div> <br> </div> <div> &nbsp; &nbsp; Remote Leaf&nbsp; &nbsp; &nbsp;295 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;298 </div> <div> <br> </div> <div> Chapter 7&nbsp; L4/L7 Service Integration&nbsp; &nbsp; &nbsp;299 </div> <div> <br> </div> <div> Service Insertion&nbsp; &nbsp; &nbsp;299 </div> <div> <br> </div> <div> The Service Graph&nbsp; &nbsp; &nbsp;300 </div> <div> <br> </div> <div> &nbsp; &nbsp; Managed Mode Versus Un-Managed Mode&nbsp; &nbsp; &nbsp;301 </div> <div> <br> </div> <div> &nbsp; &nbsp; L4–L7 Integration Use Cases&nbsp; &nbsp; &nbsp;302 </div> <div> <br> </div> <div> &nbsp; &nbsp; How Contracts Work in ACI&nbsp; &nbsp; &nbsp;303 </div> <div> <br> </div> <div> &nbsp; &nbsp; The Shadow EPG&nbsp; &nbsp; &nbsp;306 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuring the Service Graph&nbsp; &nbsp; &nbsp;307 </div> <div> <br> </div> <div> &nbsp; &nbsp; Service Graph Design and Deployment Options&nbsp; &nbsp; &nbsp;312 </div> <div> <br> </div> <div> Policy-Based Redirect (PBR)&nbsp; &nbsp; &nbsp;322 </div> <div> <br> </div> <div> &nbsp; &nbsp; PBR Design Considerations&nbsp; &nbsp; &nbsp;323 </div> <div> <br> </div> <div> &nbsp; &nbsp; PBR Design Scenarios&nbsp; &nbsp; &nbsp;324 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuring the PBR Service Graph&nbsp; &nbsp; &nbsp;325 </div> <div> <br> </div> <div> &nbsp; &nbsp; Service Node Health Check&nbsp; &nbsp; &nbsp;326 </div> <div> <br> </div> <div> &nbsp; &nbsp; Common Issues in the PBR Service Graph&nbsp; &nbsp; &nbsp;328 </div> <div> <br> </div> <div> L4/L7 Service Integration in Multi-Pod and Multi-Site&nbsp; &nbsp; &nbsp;332 </div> <div> <br> </div> <div> &nbsp; &nbsp; Multi-Pod&nbsp; &nbsp; &nbsp;332 </div> <div> <br> </div> <div> &nbsp; &nbsp; Multi-Site&nbsp; &nbsp; &nbsp;338 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;342 </div> <div> <br> </div> <div> Chapter 8&nbsp; Automation and Orchestration&nbsp; &nbsp; &nbsp;343 </div> <div> <br> </div> <div> The Difference Between Automation and Orchestration&nbsp; &nbsp; &nbsp;343 </div> <div> <br> </div> <div> &nbsp; &nbsp; Benefits of Automation and Orchestration&nbsp; &nbsp; &nbsp;344 </div> <div> <br> </div> <div> REST API&nbsp; &nbsp; &nbsp;349 </div> <div> <br> </div> <div> Automating Tasks Using the Native REST API: JSON and XML&nbsp; &nbsp; &nbsp;351 </div> <div> <br> </div> <div> &nbsp; &nbsp; API Inspector&nbsp; &nbsp; &nbsp;351 </div> <div> <br> </div> <div> &nbsp; &nbsp; Object (Save As)&nbsp; &nbsp; &nbsp;353 </div> <div> <br> </div> <div> &nbsp; &nbsp; Visore (Object Store Browser)&nbsp; &nbsp; &nbsp;355 </div> <div> <br> </div> <div> &nbsp; &nbsp; MOQuery&nbsp; &nbsp; &nbsp;357 </div> <div> <br> </div> <div> &nbsp; &nbsp; Automation Use Cases&nbsp; &nbsp; &nbsp;364 </div> <div> <br> </div> <div> Automating Tasks Using Ansible&nbsp; &nbsp; &nbsp;372 </div> <div> <br> </div> <div> &nbsp; &nbsp; Ansible Support in ACI&nbsp; &nbsp; &nbsp;375 </div> <div> <br> </div> <div> &nbsp; &nbsp; Installing Ansible and Ensuring a Secure Connection&nbsp; &nbsp; &nbsp;378 </div> <div> <br> </div> <div> &nbsp; &nbsp; APIC Authentication in Ansible&nbsp; &nbsp; &nbsp;382 </div> <div> <br> </div> <div> &nbsp; &nbsp; Automation Use Cases&nbsp; &nbsp; &nbsp;384 </div> <div> <br> </div> <div> Orchestration Through UCS Director&nbsp; &nbsp; &nbsp;392 </div> <div> <br> </div> <div> &nbsp; &nbsp; Management Through Cisco UCS Director&nbsp; &nbsp; &nbsp;392 </div> <div> <br> </div> <div> &nbsp; &nbsp; Automation and Orchestration with Cisco UCS Director&nbsp; &nbsp; &nbsp;393 </div> <div> <br> </div> <div> &nbsp; &nbsp; Automation Use Cases&nbsp; &nbsp; &nbsp;395 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;402 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;402 </div> <div> <br> </div> <div> PART II:&nbsp; MONITORING AND MANAGEMENT BEST PRACTICES </div> <div> <br> </div> <div> Chapter 9&nbsp; Monitoring ACI Fabric&nbsp; &nbsp; &nbsp;405 </div> <div> <br> </div> <div> Importance of Monitoring&nbsp; &nbsp; &nbsp;405 </div> <div> <br> </div> <div> Faults and Health Scores&nbsp; &nbsp; &nbsp;407 </div> <div> <br> </div> <div> Faults&nbsp; &nbsp; &nbsp;407 </div> <div> <br> </div> <div> Health Scores&nbsp; &nbsp; &nbsp;411 </div> <div> <br> </div> <div> ACI Internal Monitoring Tools&nbsp; &nbsp; &nbsp;415 </div> <div> <br> </div> <div> &nbsp; &nbsp; SNMP&nbsp; &nbsp; &nbsp;415 </div> <div> <br> </div> <div> &nbsp; &nbsp; Syslog&nbsp; &nbsp; &nbsp;420 </div> <div> <br> </div> <div> &nbsp; &nbsp; NetFlow&nbsp; &nbsp; &nbsp;426 </div> <div> <br> </div> <div> ACI External Monitoring Tools&nbsp; &nbsp; &nbsp;430 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Insights&nbsp; &nbsp; &nbsp;430 </div> <div> <br> </div> <div> &nbsp; &nbsp; Network Assurance Engine&nbsp; &nbsp; &nbsp;437 </div> <div> <br> </div> <div> &nbsp; &nbsp; Tetration&nbsp; &nbsp; &nbsp;453 </div> <div> <br> </div> <div> Monitoring Through the REST API&nbsp; &nbsp; &nbsp;473 </div> <div> <br> </div> <div> &nbsp; &nbsp; Monitoring an APIC&nbsp; &nbsp; &nbsp;475 </div> <div> <br> </div> <div> Monitoring Leafs and Spines&nbsp; &nbsp; &nbsp;482 </div> <div> <br> </div> <div> &nbsp; &nbsp; Monitoring Applications&nbsp; &nbsp; &nbsp;499 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;505 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;506 </div> <div> <br> </div> <div> Chapter 10&nbsp; Network Management and Monitoring Configuration&nbsp; &nbsp; &nbsp;509 </div> <div> <br> </div> <div> Out-of-Band Management&nbsp; &nbsp; &nbsp;509 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating Static Management Addresses&nbsp; &nbsp; &nbsp;510 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating the Management Contract&nbsp; &nbsp; &nbsp;510 </div> <div> <br> </div> <div> &nbsp; &nbsp; Choosing the Node Management EPG&nbsp; &nbsp; &nbsp;513 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating an External Management Entity EPG&nbsp; &nbsp; &nbsp;513 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the OOB Management Configuration&nbsp; &nbsp; &nbsp;515 </div> <div> <br> </div> <div> In-Band Management&nbsp; &nbsp; &nbsp;517 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating a Management Contract&nbsp; &nbsp; &nbsp;517 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating Leaf Interface Access Policies for APIC INB Management&nbsp; &nbsp; &nbsp;518 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating Access Policies for the Border Leaf(s) Connected to L3Out&nbsp; &nbsp; &nbsp;520 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating INB Management External Routed Networks (L3Out)&nbsp; &nbsp; &nbsp;522 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating External Management EPGs&nbsp; &nbsp; &nbsp;524 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating an INB BD with a Subnet&nbsp; &nbsp; &nbsp;527 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuring the Node Management EPG&nbsp; &nbsp; &nbsp;529 </div> <div> <br> </div> <div> &nbsp; &nbsp; Creating Static Management Addresses&nbsp; &nbsp; &nbsp;530 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the INB Management Configuration&nbsp; &nbsp; &nbsp;530 </div> <div> <br> </div> <div> AAA&nbsp; &nbsp; &nbsp;533 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuring Cisco Secure ACS&nbsp; &nbsp; &nbsp;533 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuring Cisco ISE&nbsp; &nbsp; &nbsp;542 </div> <div> <br> </div> <div> &nbsp; &nbsp; Configuring AAA in ACI&nbsp; &nbsp; &nbsp;547 </div> <div> <br> </div> <div> &nbsp; &nbsp; Recovering with the Local Fallback User&nbsp; &nbsp; &nbsp;550 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the AAA Configuration&nbsp; &nbsp; &nbsp;550 </div> <div> <br> </div> <div> Syslog&nbsp; &nbsp; &nbsp;551 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the Syslog Configuration and Functionality&nbsp; &nbsp; &nbsp;555 </div> <div> <br> </div> <div> SNMP&nbsp; &nbsp; &nbsp;556 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the SNMP Configuration and Functionality&nbsp; &nbsp; &nbsp;562 </div> <div> <br> </div> <div> SPAN&nbsp; &nbsp; &nbsp;566 </div> <div> <br> </div> <div> &nbsp; &nbsp; Access SPAN&nbsp; &nbsp; &nbsp;567 </div> <div> <br> </div> <div> &nbsp; &nbsp; Fabric SPAN&nbsp; &nbsp; &nbsp;571 </div> <div> <br> </div> <div> &nbsp; &nbsp; Tenant SPAN&nbsp; &nbsp; &nbsp;572 </div> <div> <br> </div> <div> &nbsp; &nbsp; Ensuring Visibility and Troubleshooting SPAN&nbsp; &nbsp; &nbsp;575 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the SPAN Configuration and Functionality&nbsp; &nbsp; &nbsp;576 </div> <div> <br> </div> <div> NetFlow&nbsp; &nbsp; &nbsp;577 </div> <div> <br> </div> <div> &nbsp; &nbsp; NetFlow with Access Policies&nbsp; &nbsp; &nbsp;580 </div> <div> <br> </div> <div> &nbsp; &nbsp; NetFlow with Tenant Policies&nbsp; &nbsp; &nbsp;582 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying the NetFlow Configuration and Functionality&nbsp; &nbsp; &nbsp;585 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;587 </div> <div> <br> </div> <div> PART III:&nbsp; ADVANCED FORWARDING AND TROUBLESHOOTING TECHNIQUES </div> <div> <br> </div> <div> Chapter 11&nbsp; ACI Topology&nbsp; &nbsp; &nbsp;589 </div> <div> <br> </div> <div> Physical Topology&nbsp; &nbsp; &nbsp;589 </div> <div> <br> </div> <div> APIC Initial Setup&nbsp; &nbsp; &nbsp;593 </div> <div> <br> </div> <div> Fabric Access Policies&nbsp; &nbsp; &nbsp;595 </div> <div> <br> </div> <div> &nbsp; &nbsp; Switch Profiles, Switch Policies, and Interface Profiles&nbsp; &nbsp; &nbsp;595 </div> <div> <br> </div> <div> &nbsp; &nbsp; Interface Policies and Policy Groups&nbsp; &nbsp; &nbsp;596 </div> <div> <br> </div> <div> &nbsp; &nbsp; Pools, Domains, and AAEPs&nbsp; &nbsp; &nbsp;597 </div> <div> <br> </div> <div> VMM Domain Configuration&nbsp; &nbsp; &nbsp;601 </div> <div> <br> </div> <div> &nbsp; &nbsp; VMM Topology&nbsp; &nbsp; &nbsp;601 </div> <div> <br> </div> <div> Hardware and Software Specifications&nbsp; &nbsp; &nbsp;603 </div> <div> <br> </div> <div> Logical Layout of EPGs, BDs, VRF Instances, and Contracts&nbsp; &nbsp; &nbsp;605 </div> <div> <br> </div> <div> &nbsp; &nbsp; L3Out Logical Layout&nbsp; &nbsp; &nbsp;606 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;608 </div> <div> <br> </div> <div> Review Key Topics&nbsp; &nbsp; &nbsp;608 </div> <div> <br> </div> <div> References&nbsp; &nbsp; &nbsp;609 </div> <div> <br> </div> <div> Chapter 12&nbsp; Bits and Bytes of ACI Forwarding&nbsp; &nbsp; &nbsp;611 </div> <div> <br> </div> <div> Limitations of Traditional Networks and the Evolution of Overlay Networks&nbsp; &nbsp; &nbsp;611 </div> <div> <br> </div> <div> High-Level VXLAN Overview&nbsp; &nbsp; &nbsp;613 </div> <div> <br> </div> <div> IS-IS, TEP Addressing, and the ACI Underlay&nbsp; &nbsp; &nbsp;615 </div> <div> <br> </div> <div> &nbsp; &nbsp; IS-IS and TEP Addressing&nbsp; &nbsp; &nbsp;615 </div> <div> <br> </div> <div> &nbsp; &nbsp; FTags and the MDT&nbsp; &nbsp; &nbsp;618 </div> <div> <br> </div> <div> Endpoint Learning in ACI&nbsp; &nbsp; &nbsp;626 </div> <div> <br> </div> <div> &nbsp; &nbsp; Endpoint Learning in a Layer 2–Only Bridge Domain&nbsp; &nbsp; &nbsp;627 </div> <div> <br> </div> <div> &nbsp; &nbsp; Endpoint Learning in a Layer 3–Enabled Bridge Domain&nbsp; &nbsp; &nbsp;635 </div> <div> <br> </div> <div> &nbsp; &nbsp; Fabric Glean&nbsp; &nbsp; &nbsp;640 </div> <div> <br> </div> <div> &nbsp; &nbsp; Remote Endpoint Learning&nbsp; &nbsp; &nbsp;641 </div> <div> <br> </div> <div> &nbsp; &nbsp; Endpoint Mobility&nbsp; &nbsp; &nbsp;645 </div> <div> <br> </div> <div> &nbsp; &nbsp; Anycast Gateway&nbsp; &nbsp; &nbsp;647 </div> <div> <br> </div> <div> &nbsp; &nbsp; Virtual Port Channels in ACI&nbsp; &nbsp; &nbsp;649 </div> <div> <br> </div> <div> Routing in ACI&nbsp; &nbsp; &nbsp;651 </div> <div> <br> </div> <div> &nbsp; &nbsp; Static or Dynamic Routes&nbsp; &nbsp; &nbsp;651 </div> <div> <br> </div> <div> &nbsp; &nbsp; Learning External Routes in the ACI Fabric&nbsp; &nbsp; &nbsp;656 </div> <div> <br> </div> <div> &nbsp; &nbsp; Transit Routing&nbsp; &nbsp; &nbsp;659 </div> <div> <br> </div> <div> Policy Enforcement&nbsp; &nbsp; &nbsp;661 </div> <div> <br> </div> <div> &nbsp; &nbsp; Shared Services&nbsp; &nbsp; &nbsp;664 </div> <div> <br> </div> <div> &nbsp; &nbsp; L3Out Flags&nbsp; &nbsp; &nbsp;668 </div> <div> <br> </div> <div> Quality of Service (QoS) in ACI&nbsp; &nbsp; &nbsp;669 </div> <div> <br> </div> <div> &nbsp; &nbsp; Externally Set DSCP and CoS Markings&nbsp; &nbsp; &nbsp;671 </div> <div> <br> </div> <div> CoS Preservation in ACI&nbsp; &nbsp; &nbsp;672 </div> <div> <br> </div> <div> Multi-Pod&nbsp; &nbsp; &nbsp;674 </div> <div> <br> </div> <div> Multi-Site&nbsp; &nbsp; &nbsp;680 </div> <div> <br> </div> <div> Remote Leaf&nbsp; &nbsp; &nbsp;684 </div> <div> <br> </div> <div> Forwarding Scenarios&nbsp; &nbsp; &nbsp;686 </div> <div> <br> </div> <div> &nbsp; &nbsp; ARP Flooding&nbsp; &nbsp; &nbsp;686 </div> <div> <br> </div> <div> &nbsp; &nbsp; Layer 2 Known Unicast&nbsp; &nbsp; &nbsp;688 </div> <div> <br> </div> <div> &nbsp; &nbsp; ARP Optimization&nbsp; &nbsp; &nbsp;690 </div> <div> <br> </div> <div> &nbsp; &nbsp; Layer 2 Unknown Unicast Proxy&nbsp; &nbsp; &nbsp;690 </div> <div> <br> </div> <div> &nbsp; &nbsp; L3 Policy Enforcement When Going to L3Out&nbsp; &nbsp; &nbsp;693 </div> <div> <br> </div> <div> &nbsp; &nbsp; L3 Policy Enforcement for External Traffic Coming into the Fabric&nbsp; &nbsp; &nbsp;695 </div> <div> <br> </div> <div> Route Leaking/Shared Services&nbsp; &nbsp; &nbsp;695 </div> <div> <br> </div> <div> &nbsp; &nbsp; Consumer to Provider&nbsp; &nbsp; &nbsp;695 </div> <div> <br> </div> <div> &nbsp; &nbsp; Provider to Consumer&nbsp; &nbsp; &nbsp;698 </div> <div> <br> </div> <div> Multi-Pod Forwarding Examples&nbsp; &nbsp; &nbsp;698 </div> <div> <br> </div> <div> &nbsp; &nbsp; ARP Flooding&nbsp; &nbsp; &nbsp;700 </div> <div> <br> </div> <div> &nbsp; &nbsp; Layer 3 Proxy Flow&nbsp; &nbsp; &nbsp;700 </div> <div> <br> </div> <div> Multi-Site Forwarding Examples&nbsp; &nbsp; &nbsp;703 </div> <div> <br> </div> <div> &nbsp; &nbsp; ARP Flooding&nbsp; &nbsp; &nbsp;703 </div> <div> <br> </div> <div> &nbsp; &nbsp; Layer 3 Proxy Flow&nbsp; &nbsp; &nbsp;705 </div> <div> <br> </div> <div> Remote Leaf&nbsp; &nbsp; &nbsp;707 </div> <div> <br> </div> <div> &nbsp; &nbsp; ARP Flooding&nbsp; &nbsp; &nbsp;707 </div> <div> <br> </div> <div> &nbsp; &nbsp; Layer 3 Proxy Flow&nbsp; &nbsp; &nbsp;710 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;713 </div> <div> <br> </div> <div> Review Key Topics&nbsp; &nbsp; &nbsp;713 </div> <div> <br> </div> <div> References&nbsp; &nbsp; &nbsp;714 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;714 </div> <div> <br> </div> <div> Chapter 13&nbsp; Troubleshooting Techniques&nbsp; &nbsp; &nbsp;717 </div> <div> <br> </div> <div> General Troubleshooting&nbsp; &nbsp; &nbsp;717 </div> <div> <br> </div> <div> &nbsp; &nbsp; Faults, Events, and Audits&nbsp; &nbsp; &nbsp;718 </div> <div> <br> </div> <div> &nbsp; &nbsp; moquery&nbsp; &nbsp; &nbsp;722 </div> <div> <br> </div> <div> &nbsp; &nbsp; iCurl&nbsp; &nbsp; &nbsp;724 </div> <div> <br> </div> <div> &nbsp; &nbsp; Visore&nbsp; &nbsp; &nbsp;726 </div> <div> <br> </div> <div> Infrastructure Troubleshooting&nbsp; &nbsp; &nbsp;727 </div> <div> <br> </div> <div> &nbsp; &nbsp; APIC Cluster Troubleshooting&nbsp; &nbsp; &nbsp;727 </div> <div> <br> </div> <div> &nbsp; &nbsp; Fabric Node Troubleshooting&nbsp; &nbsp; &nbsp;734 </div> <div> <br> </div> <div> How to Verify Physical- and Platform-Related Issues&nbsp; &nbsp; &nbsp;737 </div> <div> <br> </div> <div> &nbsp; &nbsp; Counters&nbsp; &nbsp; &nbsp;737 </div> <div> <br> </div> <div> &nbsp; &nbsp; CPU Packet Captures&nbsp; &nbsp; &nbsp;743 </div> <div> <br> </div> <div> &nbsp; &nbsp; SPAN&nbsp; &nbsp; &nbsp;748 </div> <div> <br> </div> <div> Troubleshooting Endpoint Connectivity&nbsp; &nbsp; &nbsp;751 </div> <div> <br> </div> <div> &nbsp; &nbsp; Endpoint Tracker and Log Files&nbsp; &nbsp; &nbsp;752 </div> <div> <br> </div> <div> &nbsp; &nbsp; Enhanced Endpoint Tracker (EPT) App&nbsp; &nbsp; &nbsp;756 </div> <div> <br> </div> <div> &nbsp; &nbsp; Rogue Endpoint Detection&nbsp; &nbsp; &nbsp;758 </div> <div> <br> </div> <div> Troubleshooting Contract-Related Issues&nbsp; &nbsp; &nbsp;759 </div> <div> <br> </div> <div> &nbsp; &nbsp; Verifying Policy Deny Drops&nbsp; &nbsp; &nbsp;764 </div> <div> <br> </div> <div> Embedded Logic Analyzer Module (ELAM)&nbsp; &nbsp; &nbsp;765 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;769 </div> <div> <br> </div> <div> Review Key Topics&nbsp; &nbsp; &nbsp;769 </div> <div> <br> </div> <div> Review Questions&nbsp; &nbsp; &nbsp;769 </div> <div> <br> </div> <div> Chapter 14&nbsp; The ACI Visibility &amp; Troubleshooting Tool&nbsp; &nbsp; &nbsp;771 </div> <div> <br> </div> <div> Visibility &amp; Troubleshooting Tool Overview&nbsp; &nbsp; &nbsp;771 </div> <div> <br> </div> <div> Faults Tab&nbsp; &nbsp; &nbsp;772 </div> <div> <br> </div> <div> Drop/Stats Tab&nbsp; &nbsp; &nbsp;773 </div> <div> <br> </div> <div> &nbsp; &nbsp; Ingress/Egress Buffer Drop Packets&nbsp; &nbsp; &nbsp;774 </div> <div> <br> </div> <div> &nbsp; &nbsp; Ingress Error Drop Packets Periodic&nbsp; &nbsp; &nbsp;774 </div> <div> <br> </div> <div> &nbsp; &nbsp; Storm Control&nbsp; &nbsp; &nbsp;774 </div> <div> <br> </div> <div> &nbsp; &nbsp; Ingress Forward Drop Packets&nbsp; &nbsp; &nbsp;775 </div> <div> <br> </div> <div> &nbsp; &nbsp; Ingress Load Balancer Drop Packets&nbsp; &nbsp; &nbsp;776 </div> <div> <br> </div> <div> Contract Drops Tab&nbsp; &nbsp; &nbsp;777 </div> <div> <br> </div> <div> &nbsp; &nbsp; Contracts&nbsp; &nbsp; &nbsp;777 </div> <div> <br> </div> <div> &nbsp; &nbsp; Contract Considerations&nbsp; &nbsp; &nbsp;778 </div> <div> <br> </div> <div> Events and Audits Tab&nbsp; &nbsp; &nbsp;779 </div> <div> <br> </div> <div> Traceroute Tab&nbsp; &nbsp; &nbsp;780 </div> <div> <br> </div> <div> Atomic Counter Tab&nbsp; &nbsp; &nbsp;782 </div> <div> <br> </div> <div> Latency Tab&nbsp; &nbsp; &nbsp;785 </div> <div> <br> </div> <div> SPAN Tab&nbsp; &nbsp; &nbsp;786 </div> <div> <br> </div> <div> Network Insights Resources (NIR) Overview&nbsp; &nbsp; &nbsp;787 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;790 </div> <div> <br> </div> <div> Chapter 15&nbsp; Troubleshooting Use Cases&nbsp; &nbsp; &nbsp;791 </div> <div> <br> </div> <div> Troubleshooting Fabric Discovery: Leaf Discovery&nbsp; &nbsp; &nbsp;792 </div> <div> <br> </div> <div> Troubleshooting APIC Controllers and Clusters: Clustering&nbsp; &nbsp; &nbsp;795 </div> <div> <br> </div> <div> Troubleshooting Management Access: Out-of-Band EPG&nbsp; &nbsp; &nbsp;799 </div> <div> <br> </div> <div> Troubleshooting Contracts: Traffic Not Traversing a Firewall as Expected&nbsp; &nbsp; &nbsp;801 </div> <div> <br> </div> <div> Troubleshooting Contracts: Contract Directionality&nbsp; &nbsp; &nbsp;804 </div> <div> <br> </div> <div> Troubleshooting End Host Connectivity: Layer 2 Traffic Flow Through ACI&nbsp; &nbsp; &nbsp;807 </div> <div> <br> </div> <div> Troubleshooting External Layer 2 Connectivity: Broken Layer 2 Traffic Flow Through ACI&nbsp; &nbsp; &nbsp;812 </div> <div> <br> </div> <div> Troubleshooting External Layer 3 Connectivity: Broken Layer 3 Traffic Flow Through ACI&nbsp; &nbsp; &nbsp;814 </div> <div> <br> </div> <div> Troubleshooting External Layer 3 Connectivity: Unexpected Layer 3 Traffic Flow Through ACI&nbsp; &nbsp; &nbsp;816 </div> <div> <br> </div> <div> Troubleshooting Leaf and Spine Connectivity: Leaf Issue&nbsp; &nbsp; &nbsp;821 </div> <div> <br> </div> <div> Troubleshooting VMM Domains: VMM Controller Offline&nbsp; &nbsp; &nbsp;826 </div> <div> <br> </div> <div> Troubleshooting VMM Domains: VM Connectivity Issue After Deploying the VMM Domain&nbsp; &nbsp; &nbsp;829 </div> <div> <br> </div> <div> Troubleshooting L4–L7: Deploying an L4–L7 Device&nbsp; &nbsp; &nbsp;832 </div> <div> <br> </div> <div> Troubleshooting L4–L7: Control Protocols Stop Working After Service Graph Deployment&nbsp; &nbsp; &nbsp;834 </div> <div> <br> </div> <div> Troubleshooting Multi-Pod: BUM Traffic Not Reaching Remote Pods&nbsp; &nbsp; &nbsp;837 </div> <div> <br> </div> <div> Troubleshooting Multi-Pod: Remote L3Out Not Reachable&nbsp; &nbsp; &nbsp;839 </div> <div> <br> </div> <div> Troubleshooting Multi-Site: Using Consistency Checker to Verify State at Each Site&nbsp; &nbsp; &nbsp;841 </div> <div> <br> </div> <div> Troubleshooting Programmability Issues: JSON Script Generates Error&nbsp; &nbsp; &nbsp;844 </div> <div> <br> </div> <div> Troubleshooting Multicast Issues: PIM Sparse Mode Any-Source Multicast (ASM)&nbsp; &nbsp; &nbsp;846 </div> <div> <br> </div> <div> Summary&nbsp; &nbsp; &nbsp;860 </div> <div> <br> </div> <div> Appendix A&nbsp; Answers to Chapter Review Questions&nbsp; &nbsp; &nbsp;861 </div> <div> <br> </div> <div> Index&nbsp; &nbsp; &nbsp;873 </div> <div> <br> </div>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        ACI Advanced Monitoring and Troubleshooting