- Preface
- Overview
- Prerequisites
- Importing a Device Package
- Configuring a Device (Logical Device)
- Configuring Connectivity to Devices
- Using a Device
- Configuring a Service Graph
- Configuration Parameters
- Using a Service Graph Template
- Monitoring a Service Graph
- Configuring Administrator Roles for Managing a Service Configuration
- Developing Automation
- Using the GUI Wizards
- About Device Clusters
- About Concrete Devices
- About Trunking
- Creating a Layer 4 to Layer 7 Device Using the GUI
- Creating a Layer 4 to Layer 7 Device Using the NX-OS-Style CLI
- Enabling Trunking on a Layer 4 to Layer 7 Virtual ASA device Using the GUI
- Enabling Trunking on a Layer 4 to Layer 7 Virtual ASA device Using the REST APIs
- Using an Imported Device with the REST APIs
- Importing a Device From Another Tenant Using the NX-OS-Style CLI
- Verifying the Import of a Device Using the GUI
Defining a Logical
Device
- About Device Clusters
- About Concrete Devices
- About Trunking
- Creating a Layer 4 to Layer 7 Device Using the GUI
- Creating a Layer 4 to Layer 7 Device Using the NX-OS-Style CLI
- Enabling Trunking on a Layer 4 to Layer 7 Virtual ASA device Using the GUI
- Enabling Trunking on a Layer 4 to Layer 7 Virtual ASA device Using the REST APIs
- Using an Imported Device with the REST APIs
- Importing a Device From Another Tenant Using the NX-OS-Style CLI
- Verifying the Import of a Device Using the GUI
About Device Clusters
A device cluster (also known as a logical device) is one or more concrete devices that act as a single device. A device cluster has cluster (logical) interfaces, which describe the interface information for the device cluster. During service graph template rendering, function node connectors are associated with cluster (logical) interfaces. The Application Policy Infrastructure Controller (APIC) allocates the network resources (VLAN or Virtual Extensible Local Area Network [VXLAN]) for a function node connector during service graph template instantiation and rendering and programs the network resources onto the cluster (logical) interfaces.
The service graph template uses a specific device that is based on a device selection policy (called a logical device context) that an administrator defines.
An administrator can set up a maximum of two concrete devices in active-standby mode.
To set up a device cluster, you must perform the following tasks:
-
Connect the concrete devices to the fabric.
-
Assign the management IP address to the device cluster.
-
Register the device cluster with the APIC. The APIC validates the device using the device specifications from the device package.
![]() Note | The APIC does not validate a duplicate IP address that is assigned to two device clusters. The APIC can provision the wrong device cluster when two device clusters have the same management IP address. If you have duplicate IP addresses for your device clusters, delete the IP address configuration on one of the devices and ensure there are no duplicate IP addresses that are provisioned for the management IP address configuration. |
About Managed Device Clusters
A device cluster can be configured as a managed device cluster. In managed mode, the Application Policy Infrastructure Controller (APIC) programs the devices during graph instantiation using the configuration provided to the APIC by an APIC administrator. For a managed device cluster, the APIC requires the device package for managing the devices in the device cluster.
By default, a device cluster is configured as a managed device cluster.
The following settings are needed when a device cluster is configured as managed:
-
Device package
-
Connectivity information for the logical device (vnsLDevViP) and devices (CDev)-management IP address, credentials, and in-band connectivity information
-
Information about supported function types (go-through, go-to)
-
Information about context awareness (single context or multi-context)
The APIC needs to know the topology information (logical interface and concrete interface) for the device cluster and devices. This information is needed so that the APIC can program the appropriate ports on the leaf, and the APIC can also use this information for troubleshooting wizard purposes. The APIC also needs to know the relation to DomP, which is used for allocating the encapsulation.
About Unmanaged Device Clusters
A device cluster can be configured as an unmanaged device cluster. For an unmanaged device cluster, the Application Policy Infrastructure Controller (APIC) allocates only the network resources for the service graph and program on only the fabric side during graph instantiation. This might be useful if your environment already has an existing orchestrator or a dev-op tool that programs the devices in a device cluster. In some other cases, the device package for the service appliance is not available. Unmanaged mode enables the APIC to work with service devices without needing to have a device package.
The APIC needs to know the topology information (logical interface and concrete interface) for the device cluster and devices. This information is needed so that the APIC can program the appropriate ports on the leaf, and the APIC can also use this information for troubleshooting wizard purposes. The APIC also needs to know the relation to DomP, which is used for allocating the encapsulation.
About Concrete Devices
A concrete device has concrete interfaces. When a concrete device is added to a logical device, concrete interfaces are mapped to the logical interfaces. During service graph template instantiation, VLANs and VXLANs are programmed on concrete interfaces that are based on their association with logical interfaces.
About Trunking
You can enable trunking for a Layer 4 to Layer 7 virtual ASA device, which uses trunk port groups to aggregate the traffic of endpoint groups. Without trunking, a virtual service device can have only 1 VLAN per interface and up to 10 service graphs. With trunking enabled, the virtual service device can have an unlimited number of service graphs.
For more information about trunk port groups, see the Cisco ACI Virtualization Guide.
Trunking is supported only on a virtual ASA device. The ASA device package must be version 1.2.7.8 or later.
Creating a Layer 4 to Layer 7 Device Using the GUI
When you create a Layer 4 to Layer 7 device, you can connect to either a physical device or a virtual machine. The fields are slightly different depending on the type to which you are connecting. When you connect to a physical device, you specify the physical interface. When you connect to a virtual machine, you specify the VMM domain, the virtual machine, and the virtual interfaces. Additionally, you can select an unknown model, which allows you to configure the connections manually.
![]() Note | When you configure a Layer 4 to Layer 7 device that is a load balancer, the context aware parameter is not used. The context aware parameter has a default value of single context, which can be ignored. |
Creating a Layer 4 to Layer 7 Device Using the NX-OS-Style CLI
When you create a Layer 4 to Layer 7 device, you can connect to either a physical device or a virtual machine. When you connecting to a physical device, you specify the physical interface. When you connect to a virtual machine, you specify the VMM domain, the virtual machine, and the virtual interfaces.
![]() Note | When you configure a Layer 4 to Layer 7 device that is a load balancer, the context aware parameter is not used. The context aware parameter has a default value of single context, which can be ignored. |
| Step 1 | Enter the
configure mode.
Example: apic1# configure | ||||||||||||
| Step 2 | Enter the
configure mode for a tenant.
tenant tenant_name Example: apic1(config)# tenant t1 | ||||||||||||
| Step 3 | Add a Layer 4
to Layer 7 device cluster.
l4l7 cluster name cluster_name type cluster_type vlan-domain domain_name [function function_type] [service service_type]
Example: For a physical device, enter: apic1(config-tenant)# l4l7 cluster name D1 type physical vlan-domain phys function go-through service ADC For a virtual device, enter: apic1(config-tenant)# l4l7 cluster name ADCCluster1 type virtual vlan-domain mininet | ||||||||||||
| Step 4 | Add one or
more cluster devices in the device cluster.
cluster-device device_name [vcenter vcenter_name] [vm vm_name]
Example: For a physical device, enter: apic1(config-cluster)# cluster-device C1 apic1(config-cluster)# cluster-device C2 For a virtual device, enter: apic1(config-cluster)# cluster-device C1 vcenter vcenter1 vm VM1 apic1(config-cluster)# cluster-device C2 vcenter vcenter1 vm VM2 | ||||||||||||
| Step 5 | Add one or
more cluster interfaces in the device cluster.
cluster-interface interface_name [vlan static_encap]
Example: For a physical device, enter: apic1(config-cluster)# cluster-interface consumer vlan 1001 For a virtual device, enter: apic1(config-cluster)# cluster-interface consumer | ||||||||||||
| Step 6 | Add one or
more members in the cluster interface.
member device device_name device-interface interface_name
Example: apic1(config-cluster-interface)# member device C1 device-interface 1.1 | ||||||||||||
| Step 7 | Add an
interface to a member.
interface {ethernet ethernet_port | port-channel port_channel_name [fex fex_ID] |
vpc vpc_name [fex fex_ID]} leaf leaf_ID
If you want to add a vNIC instead of an interface, then skip this step.
Example: For an Ethernet interface, enter: apic1(config-member)# interface ethernet 1/23 leaf 101 apic1(config-member)# exit For a FEX Ethernet interface, enter: apic1(config-member)# interface ethernet 101/1/23 leaf 101 apic1(config-member)# exit For a port channel interface, enter: apic1(config-member)# interface port-channel pc1 leaf 101 apic1(config-member)# exit For a FEX port channel interface, enter: apic1(config-member)# interface port-channel pc1 leaf 101 fex 101 apic1(config-member)# exit For a virtual port channel interface, enter: apic1(config-member)# interface vpc vpc1 leaf 101 102 apic1(config-member)# exit For a FEX virtual port channel interface, enter: apic1(config-member)# interface vpc vpc1 leaf 101 102 fex 101 102 apic1(config-member)# exit | ||||||||||||
| Step 8 | Add a vNIC to
a member.
vnic "vnic_name" If you want to add an interface instead of a vNIC, then see the previous step.
Example: apic1(config-member)# vnic "Network adapter 2" apic1(config-member)# exit | ||||||||||||
| Step 9 | If you are
done creating the device, exit the configuration mode.
Example: apic1(config-cluster-interface)# exit apic1(config-cluster)# exit apic1(config-tenant)# exit apic1(config)# exit |
Enabling Trunking on a Layer 4 to Layer 7 Virtual ASA device Using the GUI
The following procedure enables trunking on a Layer 4 to Layer 7 virtual ASA device using the GUI.
-
You must have configured a Layer 4 to Layer 7 virtual ASA device.
Enabling Trunking on a Layer 4 to Layer 7 Virtual ASA device Using the REST APIs
The following procedure provides an example of enabling trunking on a Layer 4 to Layer 7 virtual ASA device using the REST APIs.
-
You must have configured a Layer 4 to Layer 7 virtual ASA device.
<polUni>
<fvTenant name="tenant1">
<vnsLDevVip name="InsiemeCluster" devtype=“VIRTUAL” trunking=“yes">
...
...
</vnsLDevVip>
</fvTenant>
</polUni>
|
Using an Imported Device with the REST APIs
<polUni>
<fvTenant dn="uni/tn-tenant1" name="tenant1">
<vnsLDevIf ldev="uni/tn-mgmt/lDevVip-ADCCluster1"/>
<vnsLDevCtx ctrctNameOrLbl="any" graphNameOrLbl="any" nodeNameOrLbl="any">
<vnsRsLDevCtxToLDev tDn="uni/tn-tenant1/lDevIf-[uni/tn-mgmt/lDevVip-ADCCluster1]"/>
<vnsLIfCtx connNameOrLbl="inside">
<vnsRsLIfCtxToLIf tDn="uni/tn-tenant1/lDevIf-[uni/tn-mgmt/lDevVip-ADCCluster1]/lDevIfLIf-inside"/>
<fvSubnet ip="10.10.10.10/24"/>
<vnsRsLIfCtxToBD tDn="uni/tn-tenant1/BD-tenant1BD1"/>
</vnsLIfCtx>
<vnsLIfCtx connNameOrLbl="outside">
<vnsRsLIfCtxToLIf tDn="uni/tn-tenant1/lDevIf-[uni/tn-mgmt/lDevVip-ADCCluster1]/lDevIfLIf-outside"/>
<fvSubnet ip="70.70.70.70/24"/>
<vnsRsLIfCtxToBD tDn="uni/tn-tenant1/BD-tenant1BD4"/>
</vnsLIfCtx>
</vnsLDevCtx>
</fvTenant>
</polUni>
Importing a Device From Another Tenant Using the NX-OS-Style CLI
You can import a device from another tenant for a shared services scenario.
| Step 1 | Enter the
configure mode.
Example: apic1# configure | ||||||
| Step 2 | Enter the
configure mode for a tenant.
tenant tenant_name Example: apic1(config)# tenant t1 | ||||||
| Step 3 | Import the
device.
l4l7 cluster import-from tenant_name device-cluster device_name
Example: apic1(config-tenant)# l4l7 cluster import-from common device-cluster d1 apic1(config-import-from)# end |
Verifying the Import of a Device Using the GUI
| Step 1 | On the menu bar, click the TENANTS tab. The Tenant window appears. |
| Step 2 | On the submenu bar, click the name of the tenant for which you want to import devices. |
| Step 3 | In the Navigation pane, expand the tenant's branch. |
| Step 4 | Expand the L4-L7 Services branch. |
| Step 5 | Expand the Imported Devices branch. |
| Step 6 | Choose the appropriate device. The device information appears in the Work pane. |

Feedback