<div> Foreword by Yusuf Bhaiji xxviii </div> <div> <br> </div> <div> Foreword by Ronak Desai xxix </div> <div> <br> </div> <div> Introduction xxx </div> <div> <br> </div> <div> PART I: INTRODUCTION TO ACI </div> <div> <br> </div> <div> Chapter 1 Fundamental Functions and Components of Cisco ACI 1 </div> <div> <br> </div> <div> ACI Building Blocks 8 </div> <div> <br> </div> <div> Hardware Specifications 8 </div> <div> <br> </div> <div> ACI Key Concepts 14 </div> <div> <br> </div> <div> Control Plane 15 </div> <div> <br> </div> <div> Data Plane 17 </div> <div> <br> </div> <div> VXLAN 17 </div> <div> <br> </div> <div> Tenant 18 </div> <div> <br> </div> <div> VRF 19 </div> <div> <br> </div> <div> Application Profile 20 </div> <div> <br> </div> <div> Endpoint Group 21 </div> <div> <br> </div> <div> Contracts 22 </div> <div> <br> </div> <div> Bridge Domain 24 </div> <div> <br> </div> <div> External Routed or Bridged Network 25 </div> <div> <br> </div> <div> Summary 26 </div> <div> <br> </div> <div> Review Key Topics 26 </div> <div> <br> </div> <div> Review Questions 27 </div> <div> <br> </div> <div> Chapter 2 Introduction to the ACI Policy Model 31 </div> <div> <br> </div> <div> Key Characteristics of the Policy Model 32 </div> <div> <br> </div> <div> Management Information Tree (MIT) 33 </div> <div> <br> </div> <div> Benefits of a Policy Model 37 </div> <div> <br> </div> <div> Logical Constructs 37 </div> <div> <br> </div> <div> Tenant Objects 38 </div> <div> <br> </div> <div> VRF Objects 39 </div> <div> <br> </div> <div> Application Profile Objects 40 </div> <div> <br> </div> <div> Endpoint Group Objects 41 </div> <div> <br> </div> <div> Bridge Domain and Subnet Objects 43 </div> <div> <br> </div> <div> Bridge Domain Options 45 </div> <div> <br> </div> <div> Contract Objects 46 </div> <div> <br> </div> <div> Labels, Filters, and Aliases 48 </div> <div> <br> </div> <div> Contract Inheritance 49 </div> <div> <br> </div> <div> Contract Preferred Groups 49 </div> <div> <br> </div> <div> vzAny 50 </div> <div> <br> </div> <div> Outside Network Objects 51 </div> <div> <br> </div> <div> Physical Construct 52 </div> <div> <br> </div> <div> Access Policies 52 </div> <div> <br> </div> <div> Switch Policies 53 </div> <div> <br> </div> <div> Interface Policies 54 </div> <div> <br> </div> <div> Global Policies 55 </div> <div> <br> </div> <div> Managed Object Relationships and Policy Resolution 57 </div> <div> <br> </div> <div> Tags 58 </div> <div> <br> </div> <div> Default Policies 58 </div> <div> <br> </div> <div> How a Policy Model Helps in Diagnosis 60 </div> <div> <br> </div> <div> Summary 63 </div> <div> <br> </div> <div> Review Key Topics 63 </div> <div> <br> </div> <div> Review Questions 64 </div> <div> <br> </div> <div> Chapter 3 ACI Command-Line Interfaces 67 </div> <div> <br> </div> <div> APIC CLIs 68 </div> <div> <br> </div> <div> NX-OS–Style CLI 68 </div> <div> <br> </div> <div> Bash CLI 74 </div> <div> <br> </div> <div> ACI Fabric Switch CLIs 78 </div> <div> <br> </div> <div> iBash CLI 78 </div> <div> <br> </div> <div> VSH CLI 81 </div> <div> <br> </div> <div> VSH_LC CLI 83 </div> <div> <br> </div> <div> Summary 84 </div> <div> <br> </div> <div> Reference 84 </div> <div> <br> </div> <div> Chapter 4 ACI Fabric Design Options 85 </div> <div> <br> </div> <div> Physical Design 85 </div> <div> <br> </div> <div> Single- Versus Multiple-Fabric Design 87 </div> <div> <br> </div> <div> Multi-Pod 97 </div> <div> <br> </div> <div> Multi-Site 116 </div> <div> <br> </div> <div> Remote Leaf 131 </div> <div> <br> </div> <div> Hardware and Software Support 134 </div> <div> <br> </div> <div> ACI Multi-Pod and Remote Leaf Integration 143 </div> <div> <br> </div> <div> Logical Design 149 </div> <div> <br> </div> <div> Design 1: Container-as-a-Service Using the OpenShift Platform and Calico CNI 149 </div> <div> <br> </div> <div> Design 2: Vendor-Based ERP/SAP Hana Design with ACI 165 </div> <div> <br> </div> <div> Design 3: vBrick Digital Media Engine Design with ACI 175 </div> <div> <br> </div> <div> Summary 180 </div> <div> <br> </div> <div> Review Key Topics 181 </div> <div> <br> </div> <div> Review Questions 181 </div> <div> <br> </div> <div> Chapter 5 End Host and Network Connectivity 185 </div> <div> <br> </div> <div> End Host Connectivity 185 </div> <div> <br> </div> <div> VLAN Pool 186 </div> <div> <br> </div> <div> Domain 186 </div> <div> <br> </div> <div> Attachable Access Entity Profiles (AAEPs) 186 </div> <div> <br> </div> <div> Switch Policies 187 </div> <div> <br> </div> <div> Interface Policies 188 </div> <div> <br> </div> <div> Virtual Port Channel (VPC) 191 </div> <div> <br> </div> <div> Port Channel 197 </div> <div> <br> </div> <div> Access Port 201 </div> <div> <br> </div> <div> Best Practices in Configuring Access Policies 206 </div> <div> <br> </div> <div> Compute and Storage Connectivity 207 </div> <div> <br> </div> <div> L4/L7 Service Device Connectivity 210 </div> <div> <br> </div> <div> Network Connectivity 213 </div> <div> <br> </div> <div> Connecting an External Bridge Network 213 </div> <div> <br> </div> <div> Connecting an External Routed Network 218 </div> <div> <br> </div> <div> Diagnosing Connectivity Problems 242 </div> <div> <br> </div> <div> Summary 245 </div> <div> <br> </div> <div> Review Questions 245 </div> <div> <br> </div> <div> Chapter 6 VMM Integration 249 </div> <div> <br> </div> <div> Virtual Machine Manager (VMM) 249 </div> <div> <br> </div> <div> VMM Domain Policy Model 250 </div> <div> <br> </div> <div> VMM Domain Components 250 </div> <div> <br> </div> <div> VMM Domains 250 </div> <div> <br> </div> <div> VMM Domain VLAN Pool Association 252 </div> <div> <br> </div> <div> VMware Integration 257 </div> <div> <br> </div> <div> Prerequisites for VMM Integration with AVS or VDS 257 </div> <div> <br> </div> <div> Guidelines and Limitations for VMM Integration with AVS or VDS 257 </div> <div> <br> </div> <div> ACI VMM Integration Workflow 258 </div> <div> <br> </div> <div> Publishing EPGs to a VMM Domain 258 </div> <div> <br> </div> <div> Connecting Virtual Machines to the Endpoint Group Port Groups on vCenter 259 </div> <div> <br> </div> <div> Verifying VMM Integration with the AVS or VDS 259 </div> <div> <br> </div> <div> Microsoft SCVMM Integration 260 </div> <div> <br> </div> <div> Mapping ACI and SCVMM Constructs 261 </div> <div> <br> </div> <div> Mapping Multiple SCVMMs to an APIC 262 </div> <div> <br> </div> <div> Verifying That the OpFlex Certificate Is Deployed for a Connection from the SCVMM to the APIC 262 </div> <div> <br> </div> <div> Verifying VMM Deployment from the APIC to the SCVMM 263 </div> <div> <br> </div> <div> OpenStack Integration 263 </div> <div> <br> </div> <div> Extending OpFlex to the Compute Node 264 </div> <div> <br> </div> <div> ACI with OpenStack Physical Architecture 264 </div> <div> <br> </div> <div> OpFlex Software Architecture 265 </div> <div> <br> </div> <div> OpenStack Logical Topology 265 </div> <div> <br> </div> <div> Mapping OpenStack and ACI Constructs 266 </div> <div> <br> </div> <div> Kubernetes Integration 272 </div> <div> <br> </div> <div> Planning for Kubernetes Integration 272 </div> <div> <br> </div> <div> Prerequisites for Integrating Kubernetes with Cisco ACI 273 </div> <div> <br> </div> <div> Provisioning Cisco ACI to Work with Kubernetes 274 </div> <div> <br> </div> <div> Preparing the Kubernetes Nodes 277 </div> <div> <br> </div> <div> Installing Kubernetes and Cisco ACI Containers 279 </div> <div> <br> </div> <div> Verifying the Kubernetes Integration 280 </div> <div> <br> </div> <div> OpenShift Integration 281 </div> <div> <br> </div> <div> Planning for OpenShift Integration 282 </div> <div> <br> </div> <div> Prerequisites for Integrating OpenShift with Cisco ACI 283 </div> <div> <br> </div> <div> Provisioning Cisco ACI to Work with OpenShift 284 </div> <div> <br> </div> <div> Preparing the OpenShift Nodes 287 </div> <div> <br> </div> <div> Installing OpenShift and Cisco ACI Containers 290 </div> <div> <br> </div> <div> Updating the OpenShift Router to Use the ACI Fabric 291 </div> <div> <br> </div> <div> Verifying the OpenShift Integration 291 </div> <div> <br> </div> <div> VMM Integration with ACI at Multiple Locations 292 </div> <div> <br> </div> <div> Multi-Site 292 </div> <div> <br> </div> <div> Remote Leaf 295 </div> <div> <br> </div> <div> Summary 298 </div> <div> <br> </div> <div> Chapter 7 L4/L7 Service Integration 299 </div> <div> <br> </div> <div> Service Insertion 299 </div> <div> <br> </div> <div> The Service Graph 300 </div> <div> <br> </div> <div> Managed Mode Versus Un-Managed Mode 301 </div> <div> <br> </div> <div> L4–L7 Integration Use Cases 302 </div> <div> <br> </div> <div> How Contracts Work in ACI 303 </div> <div> <br> </div> <div> The Shadow EPG 306 </div> <div> <br> </div> <div> Configuring the Service Graph 307 </div> <div> <br> </div> <div> Service Graph Design and Deployment Options 312 </div> <div> <br> </div> <div> Policy-Based Redirect (PBR) 322 </div> <div> <br> </div> <div> PBR Design Considerations 323 </div> <div> <br> </div> <div> PBR Design Scenarios 324 </div> <div> <br> </div> <div> Configuring the PBR Service Graph 325 </div> <div> <br> </div> <div> Service Node Health Check 326 </div> <div> <br> </div> <div> Common Issues in the PBR Service Graph 328 </div> <div> <br> </div> <div> L4/L7 Service Integration in Multi-Pod and Multi-Site 332 </div> <div> <br> </div> <div> Multi-Pod 332 </div> <div> <br> </div> <div> Multi-Site 338 </div> <div> <br> </div> <div> Review Questions 342 </div> <div> <br> </div> <div> Chapter 8 Automation and Orchestration 343 </div> <div> <br> </div> <div> The Difference Between Automation and Orchestration 343 </div> <div> <br> </div> <div> Benefits of Automation and Orchestration 344 </div> <div> <br> </div> <div> REST API 349 </div> <div> <br> </div> <div> Automating Tasks Using the Native REST API: JSON and XML 351 </div> <div> <br> </div> <div> API Inspector 351 </div> <div> <br> </div> <div> Object (Save As) 353 </div> <div> <br> </div> <div> Visore (Object Store Browser) 355 </div> <div> <br> </div> <div> MOQuery 357 </div> <div> <br> </div> <div> Automation Use Cases 364 </div> <div> <br> </div> <div> Automating Tasks Using Ansible 372 </div> <div> <br> </div> <div> Ansible Support in ACI 375 </div> <div> <br> </div> <div> Installing Ansible and Ensuring a Secure Connection 378 </div> <div> <br> </div> <div> APIC Authentication in Ansible 382 </div> <div> <br> </div> <div> Automation Use Cases 384 </div> <div> <br> </div> <div> Orchestration Through UCS Director 392 </div> <div> <br> </div> <div> Management Through Cisco UCS Director 392 </div> <div> <br> </div> <div> Automation and Orchestration with Cisco UCS Director 393 </div> <div> <br> </div> <div> Automation Use Cases 395 </div> <div> <br> </div> <div> Summary 402 </div> <div> <br> </div> <div> Review Questions 402 </div> <div> <br> </div> <div> PART II: MONITORING AND MANAGEMENT BEST PRACTICES </div> <div> <br> </div> <div> Chapter 9 Monitoring ACI Fabric 405 </div> <div> <br> </div> <div> Importance of Monitoring 405 </div> <div> <br> </div> <div> Faults and Health Scores 407 </div> <div> <br> </div> <div> Faults 407 </div> <div> <br> </div> <div> Health Scores 411 </div> <div> <br> </div> <div> ACI Internal Monitoring Tools 415 </div> <div> <br> </div> <div> SNMP 415 </div> <div> <br> </div> <div> Syslog 420 </div> <div> <br> </div> <div> NetFlow 426 </div> <div> <br> </div> <div> ACI External Monitoring Tools 430 </div> <div> <br> </div> <div> Network Insights 430 </div> <div> <br> </div> <div> Network Assurance Engine 437 </div> <div> <br> </div> <div> Tetration 453 </div> <div> <br> </div> <div> Monitoring Through the REST API 473 </div> <div> <br> </div> <div> Monitoring an APIC 475 </div> <div> <br> </div> <div> Monitoring Leafs and Spines 482 </div> <div> <br> </div> <div> Monitoring Applications 499 </div> <div> <br> </div> <div> Summary 505 </div> <div> <br> </div> <div> Review Questions 506 </div> <div> <br> </div> <div> Chapter 10 Network Management and Monitoring Configuration 509 </div> <div> <br> </div> <div> Out-of-Band Management 509 </div> <div> <br> </div> <div> Creating Static Management Addresses 510 </div> <div> <br> </div> <div> Creating the Management Contract 510 </div> <div> <br> </div> <div> Choosing the Node Management EPG 513 </div> <div> <br> </div> <div> Creating an External Management Entity EPG 513 </div> <div> <br> </div> <div> Verifying the OOB Management Configuration 515 </div> <div> <br> </div> <div> In-Band Management 517 </div> <div> <br> </div> <div> Creating a Management Contract 517 </div> <div> <br> </div> <div> Creating Leaf Interface Access Policies for APIC INB Management 518 </div> <div> <br> </div> <div> Creating Access Policies for the Border Leaf(s) Connected to L3Out 520 </div> <div> <br> </div> <div> Creating INB Management External Routed Networks (L3Out) 522 </div> <div> <br> </div> <div> Creating External Management EPGs 524 </div> <div> <br> </div> <div> Creating an INB BD with a Subnet 527 </div> <div> <br> </div> <div> Configuring the Node Management EPG 529 </div> <div> <br> </div> <div> Creating Static Management Addresses 530 </div> <div> <br> </div> <div> Verifying the INB Management Configuration 530 </div> <div> <br> </div> <div> AAA 533 </div> <div> <br> </div> <div> Configuring Cisco Secure ACS 533 </div> <div> <br> </div> <div> Configuring Cisco ISE 542 </div> <div> <br> </div> <div> Configuring AAA in ACI 547 </div> <div> <br> </div> <div> Recovering with the Local Fallback User 550 </div> <div> <br> </div> <div> Verifying the AAA Configuration 550 </div> <div> <br> </div> <div> Syslog 551 </div> <div> <br> </div> <div> Verifying the Syslog Configuration and Functionality 555 </div> <div> <br> </div> <div> SNMP 556 </div> <div> <br> </div> <div> Verifying the SNMP Configuration and Functionality 562 </div> <div> <br> </div> <div> SPAN 566 </div> <div> <br> </div> <div> Access SPAN 567 </div> <div> <br> </div> <div> Fabric SPAN 571 </div> <div> <br> </div> <div> Tenant SPAN 572 </div> <div> <br> </div> <div> Ensuring Visibility and Troubleshooting SPAN 575 </div> <div> <br> </div> <div> Verifying the SPAN Configuration and Functionality 576 </div> <div> <br> </div> <div> NetFlow 577 </div> <div> <br> </div> <div> NetFlow with Access Policies 580 </div> <div> <br> </div> <div> NetFlow with Tenant Policies 582 </div> <div> <br> </div> <div> Verifying the NetFlow Configuration and Functionality 585 </div> <div> <br> </div> <div> Summary 587 </div> <div> <br> </div> <div> PART III: ADVANCED FORWARDING AND TROUBLESHOOTING TECHNIQUES </div> <div> <br> </div> <div> Chapter 11 ACI Topology 589 </div> <div> <br> </div> <div> Physical Topology 589 </div> <div> <br> </div> <div> APIC Initial Setup 593 </div> <div> <br> </div> <div> Fabric Access Policies 595 </div> <div> <br> </div> <div> Switch Profiles, Switch Policies, and Interface Profiles 595 </div> <div> <br> </div> <div> Interface Policies and Policy Groups 596 </div> <div> <br> </div> <div> Pools, Domains, and AAEPs 597 </div> <div> <br> </div> <div> VMM Domain Configuration 601 </div> <div> <br> </div> <div> VMM Topology 601 </div> <div> <br> </div> <div> Hardware and Software Specifications 603 </div> <div> <br> </div> <div> Logical Layout of EPGs, BDs, VRF Instances, and Contracts 605 </div> <div> <br> </div> <div> L3Out Logical Layout 606 </div> <div> <br> </div> <div> Summary 608 </div> <div> <br> </div> <div> Review Key Topics 608 </div> <div> <br> </div> <div> References 609 </div> <div> <br> </div> <div> Chapter 12 Bits and Bytes of ACI Forwarding 611 </div> <div> <br> </div> <div> Limitations of Traditional Networks and the Evolution of Overlay Networks 611 </div> <div> <br> </div> <div> High-Level VXLAN Overview 613 </div> <div> <br> </div> <div> IS-IS, TEP Addressing, and the ACI Underlay 615 </div> <div> <br> </div> <div> IS-IS and TEP Addressing 615 </div> <div> <br> </div> <div> FTags and the MDT 618 </div> <div> <br> </div> <div> Endpoint Learning in ACI 626 </div> <div> <br> </div> <div> Endpoint Learning in a Layer 2–Only Bridge Domain 627 </div> <div> <br> </div> <div> Endpoint Learning in a Layer 3–Enabled Bridge Domain 635 </div> <div> <br> </div> <div> Fabric Glean 640 </div> <div> <br> </div> <div> Remote Endpoint Learning 641 </div> <div> <br> </div> <div> Endpoint Mobility 645 </div> <div> <br> </div> <div> Anycast Gateway 647 </div> <div> <br> </div> <div> Virtual Port Channels in ACI 649 </div> <div> <br> </div> <div> Routing in ACI 651 </div> <div> <br> </div> <div> Static or Dynamic Routes 651 </div> <div> <br> </div> <div> Learning External Routes in the ACI Fabric 656 </div> <div> <br> </div> <div> Transit Routing 659 </div> <div> <br> </div> <div> Policy Enforcement 661 </div> <div> <br> </div> <div> Shared Services 664 </div> <div> <br> </div> <div> L3Out Flags 668 </div> <div> <br> </div> <div> Quality of Service (QoS) in ACI 669 </div> <div> <br> </div> <div> Externally Set DSCP and CoS Markings 671 </div> <div> <br> </div> <div> CoS Preservation in ACI 672 </div> <div> <br> </div> <div> Multi-Pod 674 </div> <div> <br> </div> <div> Multi-Site 680 </div> <div> <br> </div> <div> Remote Leaf 684 </div> <div> <br> </div> <div> Forwarding Scenarios 686 </div> <div> <br> </div> <div> ARP Flooding 686 </div> <div> <br> </div> <div> Layer 2 Known Unicast 688 </div> <div> <br> </div> <div> ARP Optimization 690 </div> <div> <br> </div> <div> Layer 2 Unknown Unicast Proxy 690 </div> <div> <br> </div> <div> L3 Policy Enforcement When Going to L3Out 693 </div> <div> <br> </div> <div> L3 Policy Enforcement for External Traffic Coming into the Fabric 695 </div> <div> <br> </div> <div> Route Leaking/Shared Services 695 </div> <div> <br> </div> <div> Consumer to Provider 695 </div> <div> <br> </div> <div> Provider to Consumer 698 </div> <div> <br> </div> <div> Multi-Pod Forwarding Examples 698 </div> <div> <br> </div> <div> ARP Flooding 700 </div> <div> <br> </div> <div> Layer 3 Proxy Flow 700 </div> <div> <br> </div> <div> Multi-Site Forwarding Examples 703 </div> <div> <br> </div> <div> ARP Flooding 703 </div> <div> <br> </div> <div> Layer 3 Proxy Flow 705 </div> <div> <br> </div> <div> Remote Leaf 707 </div> <div> <br> </div> <div> ARP Flooding 707 </div> <div> <br> </div> <div> Layer 3 Proxy Flow 710 </div> <div> <br> </div> <div> Summary 713 </div> <div> <br> </div> <div> Review Key Topics 713 </div> <div> <br> </div> <div> References 714 </div> <div> <br> </div> <div> Review Questions 714 </div> <div> <br> </div> <div> Chapter 13 Troubleshooting Techniques 717 </div> <div> <br> </div> <div> General Troubleshooting 717 </div> <div> <br> </div> <div> Faults, Events, and Audits 718 </div> <div> <br> </div> <div> moquery 722 </div> <div> <br> </div> <div> iCurl 724 </div> <div> <br> </div> <div> Visore 726 </div> <div> <br> </div> <div> Infrastructure Troubleshooting 727 </div> <div> <br> </div> <div> APIC Cluster Troubleshooting 727 </div> <div> <br> </div> <div> Fabric Node Troubleshooting 734 </div> <div> <br> </div> <div> How to Verify Physical- and Platform-Related Issues 737 </div> <div> <br> </div> <div> Counters 737 </div> <div> <br> </div> <div> CPU Packet Captures 743 </div> <div> <br> </div> <div> SPAN 748 </div> <div> <br> </div> <div> Troubleshooting Endpoint Connectivity 751 </div> <div> <br> </div> <div> Endpoint Tracker and Log Files 752 </div> <div> <br> </div> <div> Enhanced Endpoint Tracker (EPT) App 756 </div> <div> <br> </div> <div> Rogue Endpoint Detection 758 </div> <div> <br> </div> <div> Troubleshooting Contract-Related Issues 759 </div> <div> <br> </div> <div> Verifying Policy Deny Drops 764 </div> <div> <br> </div> <div> Embedded Logic Analyzer Module (ELAM) 765 </div> <div> <br> </div> <div> Summary 769 </div> <div> <br> </div> <div> Review Key Topics 769 </div> <div> <br> </div> <div> Review Questions 769 </div> <div> <br> </div> <div> Chapter 14 The ACI Visibility & Troubleshooting Tool 771 </div> <div> <br> </div> <div> Visibility & Troubleshooting Tool Overview 771 </div> <div> <br> </div> <div> Faults Tab 772 </div> <div> <br> </div> <div> Drop/Stats Tab 773 </div> <div> <br> </div> <div> Ingress/Egress Buffer Drop Packets 774 </div> <div> <br> </div> <div> Ingress Error Drop Packets Periodic 774 </div> <div> <br> </div> <div> Storm Control 774 </div> <div> <br> </div> <div> Ingress Forward Drop Packets 775 </div> <div> <br> </div> <div> Ingress Load Balancer Drop Packets 776 </div> <div> <br> </div> <div> Contract Drops Tab 777 </div> <div> <br> </div> <div> Contracts 777 </div> <div> <br> </div> <div> Contract Considerations 778 </div> <div> <br> </div> <div> Events and Audits Tab 779 </div> <div> <br> </div> <div> Traceroute Tab 780 </div> <div> <br> </div> <div> Atomic Counter Tab 782 </div> <div> <br> </div> <div> Latency Tab 785 </div> <div> <br> </div> <div> SPAN Tab 786 </div> <div> <br> </div> <div> Network Insights Resources (NIR) Overview 787 </div> <div> <br> </div> <div> Summary 790 </div> <div> <br> </div> <div> Chapter 15 Troubleshooting Use Cases 791 </div> <div> <br> </div> <div> Troubleshooting Fabric Discovery: Leaf Discovery 792 </div> <div> <br> </div> <div> Troubleshooting APIC Controllers and Clusters: Clustering 795 </div> <div> <br> </div> <div> Troubleshooting Management Access: Out-of-Band EPG 799 </div> <div> <br> </div> <div> Troubleshooting Contracts: Traffic Not Traversing a Firewall as Expected 801 </div> <div> <br> </div> <div> Troubleshooting Contracts: Contract Directionality 804 </div> <div> <br> </div> <div> Troubleshooting End Host Connectivity: Layer 2 Traffic Flow Through ACI 807 </div> <div> <br> </div> <div> Troubleshooting External Layer 2 Connectivity: Broken Layer 2 Traffic Flow Through ACI 812 </div> <div> <br> </div> <div> Troubleshooting External Layer 3 Connectivity: Broken Layer 3 Traffic Flow Through ACI 814 </div> <div> <br> </div> <div> Troubleshooting External Layer 3 Connectivity: Unexpected Layer 3 Traffic Flow Through ACI 816 </div> <div> <br> </div> <div> Troubleshooting Leaf and Spine Connectivity: Leaf Issue 821 </div> <div> <br> </div> <div> Troubleshooting VMM Domains: VMM Controller Offline 826 </div> <div> <br> </div> <div> Troubleshooting VMM Domains: VM Connectivity Issue After Deploying the VMM Domain 829 </div> <div> <br> </div> <div> Troubleshooting L4–L7: Deploying an L4–L7 Device 832 </div> <div> <br> </div> <div> Troubleshooting L4–L7: Control Protocols Stop Working After Service Graph Deployment 834 </div> <div> <br> </div> <div> Troubleshooting Multi-Pod: BUM Traffic Not Reaching Remote Pods 837 </div> <div> <br> </div> <div> Troubleshooting Multi-Pod: Remote L3Out Not Reachable 839 </div> <div> <br> </div> <div> Troubleshooting Multi-Site: Using Consistency Checker to Verify State at Each Site 841 </div> <div> <br> </div> <div> Troubleshooting Programmability Issues: JSON Script Generates Error 844 </div> <div> <br> </div> <div> Troubleshooting Multicast Issues: PIM Sparse Mode Any-Source Multicast (ASM) 846 </div> <div> <br> </div> <div> Summary 860 </div> <div> <br> </div> <div> Appendix A Answers to Chapter Review Questions 861 </div> <div> <br> </div> <div> Index 873 </div> <div> <br> </div>