Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Understanding the Cisco ACI Policy Model

Автор: Tech Field Day

Загружено: 2015-02-15

Просмотров: 72038

Описание:

Carly Stoughton, a Technical Marketing Engineer at Cisco, presented an in-depth look at the Cisco ACI policy model during a Tech Field Day session on February 13, 2015. She emphasized the unique aspects of the ACI policy model, which focuses on the needs of applications rather than the traditional method of configuring individual network devices. Stoughton illustrated how ACI simplifies network management by defining who is on the network, who can communicate with whom, and what they are allowed to discuss. This approach contrasts with the traditional method of configuring multiple routers, switches, firewalls, and load balancers individually. The ACI policy model uses endpoint groups (EPGs) to categorize network entities that require similar treatment, and it employs a whitelist model where no communication is allowed until explicitly permitted through policies known as contracts.

Stoughton explained that an application typically consists of a front-end web tier, application servers, and a backend database, along with shared services like Active Directory, DHCP, and DNS. These components are grouped into EPGs, which are collections of endpoints needing similar network treatment. The ACI policy model is different from traditional Ethernet networks, as it does not allow any communication by default. Instead, it requires explicit policies, or contracts, to be defined to permit communication between EPGs. These contracts can specify actions such as permit, deny, redirect, log, or copy, and can be unidirectional or bidirectional. The policies are enforced at the leaf switches, which tag packets with source EPG information to ensure proper policy enforcement across the network fabric.

The session also covered the technical aspects of how ACI handles traffic and policy enforcement. Stoughton discussed various methods for defining EPGs, including VLANs, VXLAN tags, physical ports, and virtual ports. She highlighted the flexibility of the ACI policy model in integrating with existing network environments and its ability to support stateful and stateless filtering. The ACI fabric uses a spine-leaf architecture, ensuring predictable latency and bandwidth. Stoughton also touched on the role of the APIC controller cluster, which manages policy configurations and can be interacted with through a GUI or API. The APIC supports automated backups and the export of configurations for version control. Overall, the presentation showcased how the ACI policy model brings a new level of simplicity and efficiency to network management by aligning network configurations with application requirements.

Recorded at Networking Field Day 9 on February 13, 2015. For more information, please visit http://Cisco.com/go/ACI/ or http://TechFieldDay.com/event/nfd9/

Understanding the Cisco ACI Policy Model

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(20) { ["_iQvoC9zQ_A"]=> object(stdClass)#7837 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "_iQvoC9zQ_A" ["related_video_title"]=> string(66) "How Devices Connect to the Fabric: Understanding Cisco ACI Domains" ["posted_time"]=> string(20) "10 лет назад" ["channelName"]=> NULL } ["7CTqCJ8ZD3E"]=> object(stdClass)#7848 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "7CTqCJ8ZD3E" ["related_video_title"]=> string(38) "Configuring the Cisco ACI Policy Model" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> NULL } ["Imdipzb3IH4"]=> object(stdClass)#7835 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "Imdipzb3IH4" ["related_video_title"]=> string(53) "Cisco ACI Часть 1 | Что такое Cisco ACI?" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["taZyB4nWwW0"]=> object(stdClass)#7845 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "taZyB4nWwW0" ["related_video_title"]=> string(69) "Introduction to Cisco Application Centric Infrastructure - What It Is" ["posted_time"]=> string(20) "11 лет назад" ["channelName"]=> NULL } ["GWaon8uP5gA"]=> object(stdClass)#7829 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "GWaon8uP5gA" ["related_video_title"]=> string(87) "Cisco SD-Access - Campus Fabric with DNA Center Automation & Assurance with Shawn Wargo" ["posted_time"]=> string(19) "8 лет назад" ["channelName"]=> NULL } ["RSbbIMwgUys"]=> object(stdClass)#7846 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "RSbbIMwgUys" ["related_video_title"]=> string(54) "VXLAN Часть 1 | Инкапсуляция сети" ["posted_time"]=> string(21) "4 года назад" ["channelName"]=> NULL } ["3RrMynkqeSk"]=> object(stdClass)#7833 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "3RrMynkqeSk" ["related_video_title"]=> string(61) "Brocade Volumetric Traffic Management SDN Application Preview" ["posted_time"]=> string(20) "10 лет назад" ["channelName"]=> NULL } ["eoj1_MjECbQ"]=> object(stdClass)#7844 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "eoj1_MjECbQ" ["related_video_title"]=> string(52) "INE Live Webinar: Understanding ACI Object Workflows" ["posted_time"]=> string(19) "5 лет назад" ["channelName"]=> NULL } ["bJ7UuZ2-64A"]=> object(stdClass)#7823 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "bJ7UuZ2-64A" ["related_video_title"]=> string(27) "Cisco ACI Fabric Forwarding" ["posted_time"]=> string(20) "11 лет назад" ["channelName"]=> NULL } ["Z9eZYM7J33s"]=> object(stdClass)#7840 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "Z9eZYM7J33s" ["related_video_title"]=> string(87) "Understanding How Traffic Flows Through the Cisco ACI Fabric | ACI Networking Explained" ["posted_time"]=> string(20) "11 лет назад" ["channelName"]=> NULL } ["2wdrQzaF5e8"]=> object(stdClass)#7836 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "2wdrQzaF5e8" ["related_video_title"]=> string(78) "Part One: Cisco ACI Design and Deployment Session - Multi-Vendor Internet Edge" ["posted_time"]=> string(19) "9 лет назад" ["channelName"]=> NULL } ["O8wU1qNlsyI"]=> object(stdClass)#7842 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "O8wU1qNlsyI" ["related_video_title"]=> string(25) "Cisco VXLAN EVPN Overview" ["posted_time"]=> string(19) "9 лет назад" ["channelName"]=> NULL } ["36Q_3Yw2FLw"]=> object(stdClass)#7830 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "36Q_3Yw2FLw" ["related_video_title"]=> string(75) "Cisco ACI vs. VMware NSX: Which Software-Defined Solution is Right for You?" ["posted_time"]=> string(19) "8 лет назад" ["channelName"]=> NULL } ["uOLlkjTR6VQ"]=> object(stdClass)#7828 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "uOLlkjTR6VQ" ["related_video_title"]=> string(134) "КОМУ НУЖНЕЕ ПЕРЕГОВОРЫ В СТАМБУЛЕ? БЕСЕДА С ВИТАЛИЙ ПОРТНИКОВ @portnikov.argumenty" ["posted_time"]=> string(63) "Трансляция закончилась 1 час назад" ["channelName"]=> NULL } ["8mG505mWE0Y"]=> object(stdClass)#7826 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "8mG505mWE0Y" ["related_video_title"]=> string(53) "Cisco ACI Overview with Soni Jiandani and Joe Onisick" ["posted_time"]=> string(20) "10 лет назад" ["channelName"]=> NULL } ["vXszKYaZbm0"]=> object(stdClass)#7827 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "vXszKYaZbm0" ["related_video_title"]=> string(100) "Episode 2 - Introduction to ACI Tenants, VRFs, Bridge Domains, Application Profiles, EPGs and Contra" ["posted_time"]=> string(19) "7 лет назад" ["channelName"]=> NULL } ["lYuZqz3ehX8"]=> object(stdClass)#7824 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "lYuZqz3ehX8" ["related_video_title"]=> string(22) "The Story of Cisco ACI" ["posted_time"]=> string(19) "9 лет назад" ["channelName"]=> NULL } ["AGQXKFHaros"]=> object(stdClass)#7825 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "AGQXKFHaros" ["related_video_title"]=> string(13) "Why Cisco ACI" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> NULL } ["0e0DxxjZ3ro"]=> object(stdClass)#7813 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "0e0DxxjZ3ro" ["related_video_title"]=> string(59) "Gemini 3 и Antigravity – РЕЛИЗ года от Google" ["posted_time"]=> string(23) "7 часов назад" ["channelName"]=> NULL } ["cOwcHlTQhQc"]=> object(stdClass)#7814 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "cOwcHlTQhQc" ["related_video_title"]=> string(49) "Defining Applications Using Policy with Cisco ACI" ["posted_time"]=> string(20) "11 лет назад" ["channelName"]=> NULL } }
How Devices Connect to the Fabric: Understanding Cisco ACI Domains

How Devices Connect to the Fabric: Understanding Cisco ACI Domains

Configuring the Cisco ACI Policy Model

Configuring the Cisco ACI Policy Model

Cisco ACI Часть 1 | Что такое Cisco ACI?

Cisco ACI Часть 1 | Что такое Cisco ACI?

Introduction to Cisco Application Centric Infrastructure - What It Is

Introduction to Cisco Application Centric Infrastructure - What It Is

Cisco SD-Access - Campus Fabric with DNA Center Automation & Assurance with Shawn Wargo

Cisco SD-Access - Campus Fabric with DNA Center Automation & Assurance with Shawn Wargo

VXLAN Часть 1 | Инкапсуляция сети

VXLAN Часть 1 | Инкапсуляция сети

Brocade Volumetric Traffic Management SDN Application Preview

Brocade Volumetric Traffic Management SDN Application Preview

INE Live Webinar: Understanding ACI Object Workflows

INE Live Webinar: Understanding ACI Object Workflows

Cisco ACI Fabric Forwarding

Cisco ACI Fabric Forwarding

Understanding How Traffic Flows Through the Cisco ACI Fabric | ACI Networking Explained

Understanding How Traffic Flows Through the Cisco ACI Fabric | ACI Networking Explained

Part One: Cisco ACI Design and Deployment Session - Multi-Vendor Internet Edge

Part One: Cisco ACI Design and Deployment Session - Multi-Vendor Internet Edge

Cisco VXLAN EVPN Overview

Cisco VXLAN EVPN Overview

Cisco ACI vs. VMware NSX: Which Software-Defined Solution is Right for You?

Cisco ACI vs. VMware NSX: Which Software-Defined Solution is Right for You?

КОМУ НУЖНЕЕ ПЕРЕГОВОРЫ В СТАМБУЛЕ? БЕСЕДА С ВИТАЛИЙ ПОРТНИКОВ @portnikov.argumenty

КОМУ НУЖНЕЕ ПЕРЕГОВОРЫ В СТАМБУЛЕ? БЕСЕДА С ВИТАЛИЙ ПОРТНИКОВ @portnikov.argumenty

Cisco ACI Overview with Soni Jiandani and Joe Onisick

Cisco ACI Overview with Soni Jiandani and Joe Onisick

Episode 2 - Introduction to ACI Tenants, VRFs, Bridge Domains, Application Profiles, EPGs and Contra

Episode 2 - Introduction to ACI Tenants, VRFs, Bridge Domains, Application Profiles, EPGs and Contra

The Story of Cisco ACI

The Story of Cisco ACI

Why Cisco ACI

Why Cisco ACI

Gemini 3 и Antigravity – РЕЛИЗ года от Google

Gemini 3 и Antigravity – РЕЛИЗ года от Google

Defining Applications Using Policy with Cisco ACI

Defining Applications Using Policy with Cisco ACI

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]