The Admin Domain
feature enables you to partition the data center and define data center pods to
group hardware and software VTEPs, Layer 3 gateways, and DCI gateways into
administrative domains with similar properties. Admin Domains are independent
of each other. You can create an admin domain, and specify certain functional
roles within the admin domain. Admin domains are logical groups you create,
based on the functional roles, which makes centralized L3 or Distributed L2/L3
deployments flexible and extendable.
Cisco VTS provides the
functional roles, which you can use as desired to create the admin domains. You
can set the system mode, control protocols, other parameters like replication
mode (multicast/ingress), for each admin domain , and also assign devices to
each of the functional roles. For example, you can pick certain leafs and put
it in one group, and associate certain functional parameters to that group. The
following functional roles are available:
-
L2 Gateway
-
L3 Gateway
-
DC Gateway
-
DCI
For the L2 Gateway
group you can pick the desired leafs and associate certain functional
parameters to that group. Similarly, you can define another L3 gateway group,
and you can link between these two groups. All L2 configuration can be pushed
into the L2 gateway group; and all L3 configuration can be pushed into L3
gateway group.
You can create an L3
gateway group and can link from the L3 group to the DC gateway. You can have
the DCI at the top, and this can be linked to the DC gateway.
The DC gateway can be
outside the Admin Domain, and more than one Admin Domains may connect to this.
You can have the DC gateway inside an Admin Domain, and connect it to an
external DCI.
See for detailed
information about creating Admin Domains.
The design validated
in this release has:
-
L2/L3 gateway
groups in all Admin Domain-Each Admin Domain can have its own L2 / L3 gateway.
-
DC Gateway outside
the Admin Domain
-
DCI outside the
Admin Domain.