Cisco Cloud Application Policy Infrastructure Controller User Guide

Cisco Cloud Application Policy Infrastructure Controller User Guide | Manualzz
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
First Published: 2021-09-20
Last Modified: 2022-08-15
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© Cisco Systems, Inc. All rights reserved.
Trademarks
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS REFERENCED IN THIS
DOCUMENTATION ARE SUBJECT TO CHANGE WITHOUT NOTICE. EXCEPT AS MAY OTHERWISE
BE AGREED BY CISCO IN WRITING, ALL STATEMENTS, INFORMATION, AND
RECOMMENDATIONS IN THIS DOCUMENTATION ARE PRESENTED WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED.
The Cisco End User License Agreement and any supplemental license terms govern your use of any Cisco
software, including this product documentation, and are located at:
http://www.cisco.com/go/softwareterms.Cisco product warranty information is available at
http://www.cisco.com/go/warranty. US Federal Communications Commission Notices are found here
http://www.cisco.com/c/en/us/products/us-fcc-notice.html.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL,
CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST
PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE
THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES.
Any products and features described herein as in development or available at a future date remain in varying
stages of development and will be offered on a when-and if-available basis. Any such product or feature
roadmaps are subject to change at the sole discretion of Cisco and Cisco will have no liability for delay in the
delivery or failure to deliver any products or feature roadmap items that may be set forth in this document.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual
addresses and phone numbers. Any examples, command display output, network topology diagrams, and
other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses
or phone numbers in illustrative content is unintentional and coincidental.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation
set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial
identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be
present in the documentation due to language that is hardcoded in the user interfaces of the product software,
language used based on RFP documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and
other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party
trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1721R)
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
iii
Trademarks
Trademarks
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
iv
CONTENTS
PREFACE
Trademarks
CHAPTER 1
New and Changed Information
iii
1
New and Changed Information 1
CHAPTER 2
About Cisco Cloud Network Controller
3
Overview 3
External Network Connectivity 4
Understanding Supported Routing and Security Policies 5
Routing and Security Policies: Releases Prior to 25.0(1) 5
Routing and Security Policies: Release 25.0(1) 5
Routing Policies: Release 25.0(2) 7
Source Interface Selection for Tunnels 9
General Guidelines and Limitations for Cisco Cloud Network Controller 9
About the Cisco Cloud Network Controller GUI 12
CHAPTER 3
Cisco Cloud Network Controller Policy Model
15
About the ACI Policy Model 15
Policy Model Key Characteristics 15
Logical Constructs 16
The Cisco ACI Policy Management Information Model 17
Tenants 19
Cloud Context Profile 20
CCR 20
About the Cisco Catalyst 8000V 20
Private IP Address Support for Cisco Cloud Network Controller and CCR in AWS 22
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
v
Contents
Communicating to External Sites From Regions Without a CCR 23
Support for ECMP Forwarding from Remote Sites for CCRs 27
Preference For Routes to CCRs in Regions with Local CIDRs 27
Availability Zones 27
Migrating from Virtual Availability Zones to Cloud Availability Zones 28
Guidelines and Limitations 29
VRFs 29
Cloud Application Profiles 30
Cloud Endpoint Groups 30
Contracts 32
Filters and Subjects Govern Cloud EPG Communications 33
About the Cloud Template 34
Managed Object Relations and Policy Resolution 37
Default Policies 38
Shared Services 39
CHAPTER 4
Configuring Cisco Cloud Network Controller Components
41
About Configuring the Cisco Cloud Network Controller 41
Configuring the Cisco Cloud Network Controller Using the GUI 41
Creating a Tenant Using the Cisco Cloud Network Controller GUI For Release 4.2(2) and Earlier 41
Creating a Tenant Using the Cisco Cloud Network Controller GUI For Release 4.2(3) and Later 42
Configure a Tenant AWS Provider For Release 4.2(2) and Earlier 43
Configuring a Tenant AWS Provider For Release 4.2(3) and Later 46
Creating an Application Profile Using the Cisco Cloud Network Controller GUI 51
Creating a VRF Using the Cisco Cloud Network Controller GUI 52
Creating an External Network Using the Cisco Cloud Network Controller GUI 53
Configuring the Global Inter-VRF Route Leak Policy 58
Configuring Leak Routes Using the Cisco Cloud Network Controller GUI 59
Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network Controller GUI 59
Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller GUI 62
Enabling Connectivity From the AWS Site to External Devices 64
Downloading the External Device Configuration Files 64
Enabling Connectivity From the AWS Site to External Devices 64
Creating an EPG Using the Cisco Cloud Network Controller GUI 68
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
vi
Contents
Creating a Contract Using the Cisco Cloud Network Controller GUI 73
Specifying Consumer and Provider EPGs Using the Cisco Cloud Network Controller 75
Creating a Filter Using the Cisco Cloud Network Controller GUI 76
Creating a Cloud Context Profile Using the Cisco Cloud Network Controller GUI 78
Configuring Instances in AWS 79
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI 81
Creating a Tech Support Policy Using the Cisco Cloud Network Controller GUI 85
Creating a Trigger Scheduler Using the Cisco Cloud Network Controller GUI 86
Creating a Remote Location Using the Cisco Cloud Network Controller GUI 88
Creating a Login Domain Using the Cisco Cloud Network Controller GUI 89
Creating a Provider Using the Cisco Cloud Network Controller GUI 92
Creating a Security Domain Using the Cisco Cloud Network Controller GUI 96
Creating a Role Using the Cisco Cloud Network Controller GUI 97
Creating an RBAC Rule Using the Cisco Cloud Network Controller GUI 102
Creating a Certificate Authority Using the Cisco Cloud Network Controller GUI 103
Creating a Key Ring Using the Cisco Cloud Network Controller GUI 104
Creating a Local User Using the Cisco Cloud Network Controller GUI 106
Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud Network Controller
GUI 108
Configuring Cisco Cloud Network Controller Using the REST API 110
Creating a Tenant Using the REST API 110
Creating a Contract Using the REST API 111
Creating a Cloud Context Profile Using the REST API 111
Managing a Cloud Region Using the REST API 112
Creating a Filter Using the REST API 113
Creating an Application Profile Using the REST API 114
Creating a Cloud EPG Using the REST API 114
Creating an External Cloud EPG Using the REST API 115
Creating a Cloud Template Using the REST API 116
Configuring VRF Leak Routes Using the REST API 118
Configuring the Source Interface Selection for Tunnels Using the REST API 119
CHAPTER 5
Viewing System Details
121
Monitoring VM Host Metrics 121
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
vii
Contents
Monitoring VM Host Metrics Using the GUI 121
Monitoring VM Host Metrics Using the REST API 123
Viewing Application Management Details 124
Viewing Cloud Resource Details 125
Viewing Operations Details 126
Viewing Infrastructure Details 128
Viewing Administrative Details 128
Viewing Health Details Using the Cisco Cloud Network Controller GUI 130
CHAPTER 6
Deploying Layer 4 to Layer 7 Services
133
Overview 133
About Application Load Balancers 133
Dynamic Server Attachment to Server Pool 135
About Service Graphs 136
About Function Nodes 137
About Terminal Nodes 137
Deploying a Service Graph 137
Deploying the Service Graph Using the Cisco Cloud Network Controller GUI 137
Creating a Load Balancer Using the Cisco Cloud Network Controller GUI 137
Creating a Service Graph Template Using the Cisco Cloud Network Controller GUI 139
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI 140
Deploying a Service Graph Using the REST API 145
Creating an Internal-Facing Load Balancer Using the REST API 145
Configuring an Internet-Facing Load Balancer Using the REST API 145
Creating a Service Graph Using the REST API 146
Attaching a Service Graph Using the REST API 146
Configuring an HTTP Service Policy Using the REST API 147
Configuring a Key Ring Using the REST API 147
Creating an HTTPS Service Policy Using the REST API
CHAPTER 7
Cisco Cloud Network Controller Statistics
149
151
About Cisco Cloud Network Controller Statistics 151
AWS Networking Interface Statistics Collection 151
Cisco Cloud Network Controller Endpoints and cloudEPg Statistics Processing 152
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
viii
Contents
Cisco Cloud Network Controller Statistics Filters 152
AWS Transit Gateway Statistics 153
Enabling VPC Flow Logs 154
Enabling VPC Flow Logs Using the Cisco Cloud Network Controller GUI 154
Enabling VPC Flow Logs Using the REST API 156
Cloud Router Statistics 157
CHAPTER 8
Cisco Cloud Network Controller Security
161
Access, Authentication, and Accounting 161
Configuration 161
Configuring TACACS+, RADIUS, LDAP and SAML Access 162
Overview 162
Configuring Cisco Cloud Network Controller for TACACS+ Access 162
Configuring Cisco Cloud Network Controller for RADIUS Access 163
Configuring a Cisco Secure Access Control Server for RADIUS and TACACS+ Access to the Cisco
Cloud Network Controller 165
Configuring LDAP Access 165
Configuring Windows Server 2008 LDAP for APIC Access with Cisco AVPair 165
Configuring Cisco Cloud Network Controller for LDAP Access 165
Configuring Cisco Cloud Network Controller for SAML Access 167
About SAML 167
Configuring Cisco Cloud Network Controller for SAML Access 168
Setting Up a SAML Application in Okta 169
Setting Up a Relying Party Trust in AD FS 169
Configuring HTTPS Access 169
About HTTPS Access 170
Guidelines for Configuring Custom Certificates 170
Configuring a Custom Certificate for Cisco ACI HTTPS Access Using the GUI 170
CHAPTER 9
Configuration Drifts
173
Configuration Drift Notifications and Faults 173
Accessing the Main Configuration Drift Page 174
Checking for Missing Contracts Configuration 176
Checking for Missing EPGs Configuration 178
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
ix
Contents
Checking for Missing VRFs Configuration 179
Configuration Drift Troubleshooting 181
CHAPTER 10
AWS Transit Gateway on Cisco Cloud Network Controller
183
AWS Transit Gateway on Cisco Cloud Network Controller 183
APPENDIX A
Cisco Cloud Network Controller Error Codes
185
Cisco Cloud Network Controller Error Codes 185
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
x
CHAPTER
1
New and Changed Information
• New and Changed Information, on page 1
New and Changed Information
The following table provides an overview of the significant changes to the organization and features in this
guide up to this current release. The table does not provide an exhaustive list of all changes made to the guide
or of the new features up to this release.
Table 1: New Features and Changed Behavior in Cisco Cloud Network Controller for Release 25.0(5)
Feature or Change
Description
Where Documented
Change in name of Cisco Cloud
APIC
Beginning with release 25.0(5),
Cisco Cloud APIC is renamed as
Cisco Cloud Network Controller.
Entire document
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
1
New and Changed Information
New and Changed Information
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
2
CHAPTER
2
About Cisco Cloud Network Controller
• Overview, on page 3
• External Network Connectivity, on page 4
• Understanding Supported Routing and Security Policies, on page 5
• Source Interface Selection for Tunnels, on page 9
• General Guidelines and Limitations for Cisco Cloud Network Controller, on page 9
• About the Cisco Cloud Network Controller GUI, on page 12
Overview
Cisco Cloud Network Controller is a software deployment of Cisco APIC that you deploy on a cloud-based
virtual machine (VM). Amazon Web Services (AWS), Azure, and Google Cloud are the cloud providers
supported with the Cisco Cloud Network Controller.
When deployed, the Cisco Cloud Network Controller:
• Provides an interface that is similar to the existing Cisco APIC to interact with the AWS public cloud
• Automates the deployment and configuration of cloud constructs
• Configures the cloud router control plane
• Configures the data path between the on-premises Cisco ACI fabric and the cloud site
• Translates Cisco ACI policies to cloud native construct
• Discovers endpoints
• Provides a consistent policy, security, and analytics for workloads deployed either on or across on-premises
data centers and the public cloud
Note
• Cisco Nexus Dashboard Orchestrator pushes the MP-BGP EVPN
configuration to the on-premises spine switches
• On-premises VPN routers require a manual configuration for IPsec
• Provides an automated connection between on-premises data centers and the public cloud with easy
provisioning and monitoring
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
3
About Cisco Cloud Network Controller
External Network Connectivity
• Policies are pushed by Cisco Nexus Dashboard Orchestrator to the on-premises and cloud sites, and
Cisco Cloud Network Controller translates the policies to the cloud to keep the policies consistent with
the on-premises site
For more information about extending Cisco ACI to the public cloud, see the Cisco Cloud Network Controller
Installation Guide.
When the Cisco Cloud Network Controller is up and running, you can begin adding and configuring Cisco
Cloud Network Controller components. This document describes the Cisco Cloud Network Controller policy
model and explains how to manage (add, configure, view, and delete) the Cisco Cloud Network Controller
components using the GUI and the REST API.
External Network Connectivity
External network connectivity for Cisco Cloud Network Controller with AWS is available by using EVPN
connectivity from the CCRs in the infra VPC. Support is also available for IPv4 connectivity from the infra
VPC CCRs to any external device with IPSec/BGP. This IPSec/BGP external connectivity allows Cisco Cloud
Network Controller to connect to branch offices.
The following sections provide more information on the components that allow for external network
connectivity.
External VRF
An external VRF is a unique VRF that does not have any presence in the cloud but is associated with one or
more external networks. As opposed to an internal VRF, which is a VRF that is used to host the VPCs and is
associated with a cloud context profile, an external VRF is not referred to in any cloud context profile used
by Cisco Cloud Network Controller.
An external VRF represents an external network that is connected to other cloud sites or to on-premises branch
offices. Multiple cloud VRFs can leak routes to an external VRF or can get the routes from an external VRF.
When an external network is created on an external VRF, inter-VRF routing is set up so that routes received
and advertised on the external network are received or advertised on the external VRF.
Connections to Non-ACI External Devices
Support is also available for connectivity from AWS CCRs to any non-ACI external device. IPv4 sessions
are created on an external VRF from the infra VPC CCRs to these non-ACI external devices, and inter-VRF
routing is set up between the external VRF and the site local VRFs.
Following are the guidelines and limitations for this type of connectivity:
• You cannot use both EVPN and IPv4 IPSec/BGP to connect from the cloud to the same remote site.
Guidelines and Limitations
Instead of manually selecting all the regions, you have to set allRegion to true for the external network
connectivity.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
4
About Cisco Cloud Network Controller
Understanding Supported Routing and Security Policies
Understanding Supported Routing and Security Policies
Routing and security policies are handled differently, depending on the release that is running on your Cisco
Cloud Network Controller.
Routing and Security Policies: Releases Prior to 25.0(1)
Prior to release 25.0(1), routing and security policies are tightly coupled together. To allow communication
between two endpoints that are across EPGs, you must configures contracts. These contracts are used for the
following:
• Routing policies: Policies used to define routes to establish traffic flow.
• Security policies: Rules used for security purposes, such as security group rules or network security
group rules.
In other words, contracts inherently serve the dual purpose of configuring both security policies and routing
policies. This means that tearing down contracts not only tears down the security policies that govern which
traffic to allow and which to deny, it also tears down any policies used to route that traffic. Prior to release
25.0(1), there is no way to configure routing policies without also configuring security policies, and vice
versa.
Routing and Security Policies: Release 25.0(1)
Beginning with release 25.0(1), support is now available for configuring routing separately, independent of
the security policies.
Note
The routing and security policies described in this section are specifically for the 25.0(1) release and apply
only between internal and external VRFs. For changes in the routing and security policies in the 25.0(2)
release, see Routing Policies: Release 25.0(2), on page 7.
The procedures for configuring the routing and security policies are here:
• Routing policy: You will use the inter-VRF routing feature introduced in release 25.0(1) to configure
the routing policy separately. See Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network
Controller GUI, on page 59 for those procedures.
• Security policy: After you have configured the routing policy, you will continue to use contracts as you
did previously to configure the security policy separately:
• First create an external EPG. See Creating an EPG Using the Cisco Cloud Network Controller GUI,
on page 68 for those procedures.
• Then create a contract between the external EPG and the cloud EPG. See Creating a Contract Using
the Cisco Cloud Network Controller GUI, on page 73 for those procedures.
Using inter-VRF routing, you can configure an independent routing policy to specify which routes to leak
between a pair of internal and external VRFs when you are setting up routing between a cloud site and a
non-ACI site.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
5
About Cisco Cloud Network Controller
Routing and Security Policies: Release 25.0(1)
The following figure shows an example topology of this sort of configuration. This example topology shows
how you can connect to a remote endpoint (vpn-1) behind an external device (Ext-1) which might be located
in an non-ACI site. This non-ACI site could be a branch office, co-located or cloud site, or anywhere in the
internet that has the capability of BGP IPv4 and IPSec.
In this example, the infra:Ext-V1 is the external VRF on the CCRs in the infra VPC, with BGP IPv4 sessions
over IPSec tunnels to the remote devices. The remote endpoint routes are received over these sessions in the
infra:Ext-V1 VRF, which are then leaked into the internal VRFs displayed on the right side of the graphic
(for example, the T1:VRF10 in VPC10). The reverse leaking routes are also configured.
Route leaking occurs between internal and external VRFs using route maps. Cisco Cloud Network Controller
supports using route maps to configure routing policies independent of security policies only from internal
VRFs to external VRFs, and from external VRF to internal VRFs. You will continue to use contracts when
configuring routing between a pair of internal VRFs, so routing and security policies are tied together in the
configuration process when routing between internal VRFs.
The following list provides more information on situations when you can use route maps to configure routing
policies independent of security policies, and when you have to use contracts where the routing and security
policies are tied together.
• Routing situations that use contracts-based routing:
• Intra-site routing (within and across regions)
• Inter-site routing (cloud-to-ACI on-premises using EVPN)
• Cloud-to-cloud routing
• Route leaking between internal VRFs
• Routing situations that use route map-based routing:
• Cloud-to-non-ACI on-premises site using L3Out external VRF (no EVPN)
• Leak specific or all routes from an internal VRF to an external VRF
• Leak specific or all routes from an external VRF to an internal VRF
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
6
About Cisco Cloud Network Controller
Routing Policies: Release 25.0(2)
Guidelines and Restrictions for Security and Routing Policies in Release 25.0(1)
The following guidelines apply when using inter-VRF routing to leak routes between a pair of VRFs using
route maps:
• Routes are always leaked bi-directionally between an internal VRF and the external VRF.
For example, assume there is a user tenant (t1) with an internal VRF (V1) and external VRF (Ext-V1).
The route leak must be configured for both of these VRFs bi-directionally.
• You cannot configure "smaller" prefixes to be leaked while a "larger" prefix is already being leaked. For
example, configuring the 10.10.10.0/24 prefix will be rejected if you already have the 10.10.0.0/16 prefix
configured to be leaked. Similarly, if you configure the 0.0.0.0/0 (leak all) prefix, no other prefix will
be allowed to be configured.
• Contracts are not allowed between cloud external EPGs (cloudExtEpgs).
• An external VRF cannot be used for creating cloud EPGs.
• An external VRF always belongs to the infra tenant.
• Leak routing is not supported between external VRFs.
Routing Policies: Release 25.0(2)
Note
The routing and security policies described in this section are specifically for the 25.0(2) release. For changes
in the routing and security policies in the previous release, see Routing and Security Policies: Release 25.0(1),
on page 5.
For release 25.0(2), the routing and security policies continue to be split as described in Routing and Security
Policies: Release 25.0(1), on page 5, but with these additional changes specifically for the routing policies:
• Route Leaking Between Internal VRFs, on page 7
• Global Inter-VRF Route Leak Policy, on page 8
• Guidelines and Limitations, on page 9
Route Leaking Between Internal VRFs
In the previous 25.0(1) release, the inter-VRF route map-based routing feature was introduced, where you
can configure an independent routing policy to specify which routes to leak between a pair of internal and
external VRFs. This route map-based routing feature applied specifically between internal and external VRFs;
when configuring routing between a pair of internal VRFs, you could only use contract-based routing in that
situation, as described in Routing and Security Policies: Release 25.0(1), on page 5.
Beginning with release 25.0(2), support is now available for route map-based route leaking between a pair of
internal VRFs. You will specify how routes are leaked using one of the following options:
• Leak all CIDRS or specific subnet IP addresses associated with the VRF by using:
• Leak All option through the GUI
• leakInternalPrefix field through the REST API
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
7
About Cisco Cloud Network Controller
Routing Policies: Release 25.0(2)
• Leak between a pair of VRFs by using:
• Subnet IP option through the GUI
• leakInternalSubnet field through the REST API
Global Inter-VRF Route Leak Policy
In addition to the support that is now available for route map-based route leaking between a pair of internal
VRFs, the internal VRF route leak policy also allows you to choose whether you want to use contract-based
routing or route map-based routing between a pair of internal VRFs. This is a global mode configuration
available in the First Time Setup to allow a contract-based or route map-based model. Note that when you
enable contract-based routing in this global mode, the routes between a pair of internal VRFs can be leaked
using contracts only in the absence of route maps.
This policy has the following characteristics:
• This policy is associated with every internal VRF.
• This is a Cisco Cloud Network Controller-created policy.
• Contracts-based routing is disabled by default (turned off) for greenfield cases (when you are configuring
a Cisco Cloud Network Controller for the first time). For upgrades, where you have a Cisco Cloud
Network Controller that was already configured prior to release 25.0(2), contract-based routing is enabled
(turned on).
The internal VRF route leak policy is a global policy that is configured in the First Time Setup screen under
the infra tenant, where a Boolean flag is used to indicate whether contracts can drive routes in the absence of
route maps:
• Off: Default setting. Routes are not leaked based on contracts, and are leaked based on route maps instead.
• On: Routes are leaked based on contracts in the absence of route maps. When enabled, contracts drive
routing when route maps are not configured. When route maps exist, route maps always drives routing.
You can toggle this Boolen flag back and forth. Following are the general recommended steps for toggling
this global VRF route leak policy, with more detailed instructions provided in Configuring Leak Routes for
Internal VRFs Using the Cisco Cloud Network Controller GUI, on page 62.
• You should enable contract-based routing in Cisco Cloud Network Controller for multi-cloud and
hybrid-cloud deployments with EVPN.
• For multi-cloud and hybrid-cloud deployments without EVPN, routing is driven through route maps only
and not through contracts.
• If you want to disable contract-based routing by toggling from contract-based routing to route map-based
routing (toggling to the Off setting), this action can be disruptive if route map-based routing is not
configured before you've toggled this setting to Off.
You should make the following configuration changes before toggling to route map-based routing:
1. Enable route map-based route leaking between all pairs of VRFs that have existing contracts.
2. Disable contract-based routing policy in the global policy.
At that point, you can change the routing policy to route map-based routing, and you can then change
the routing to reflect any granularity that is required with the new route map-based routing.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
8
About Cisco Cloud Network Controller
Source Interface Selection for Tunnels
• If you want to enable contract-based routing by toggling from route map-based routing to contract-based
routing (toggling to the On setting), you do not have to make any configuration changes before toggling
to contract-based routing. That's because this setting is an additive operation. In other words, both
contract-based and route map-based routing can be enabled between a pair of VRFs. Route maps take
precedence over contracts when enabling routing. With route map-based routing enabled, adding
contract-based routing should be non-disruptive.
Guidelines and Limitations
The following guidelines and limitations apply for release 25.0(2):
• Routing between external and internal VRFs continues to use route map-based routing only.
• The leakExternalPrefix should not overlap with the route to the internet gateway (the external endpoint
selector configured for external EPG to perform SSH), otherwise SSH will be broken.
Source Interface Selection for Tunnels
Support is available for having more than one tunnel across different external networks to the same destination.
This is done in the GUI by using different source interfaces (2,3, or 4) or through the REST API using
cloudtemplateIpseTunnlSourceInterface.
The following example shows a situation where only interface 3 is used as the originating interface:
<cloudtemplateIpSecTunnel peeraddr="173.36.19.2" preSharedKey="def" poolname="pool1">
<cloudtemplateIpSecTunnelSourceInterface sourceInterfaceId=”3” />
</cloudtemplateIpSecTunnel>
The following example shows a situation where both interfaces 2 and 3 are used as the originating interfaces:
<cloudtemplateIpSecTunnel peeraddr="173.36.19.2" preSharedKey="def" poolname="pool1">
<cloudtemplateIpSecTunnelSourceInterface sourceInterfaceId=”2” />
<cloudtemplateIpSecTunnelSourceInterface sourceInterfaceId=”3” />
</cloudtemplateIpSecTunnel>
Guidelines and Limitations
• Increasing the number of interfaces increases the demand of tunnel inner local IP addresses.
• The IPsec tunnel source interfaces feature is supported only with the IKEv2 configuration.
General Guidelines and Limitations for Cisco Cloud Network
Controller
This section contains the guidelines and limitations for Cisco Cloud Network Controller.
• Inter-site (VRF-to-VRF) traffic is not supported if one of the VRFs is present as an attachment in a
different VRF group (hub network). For example, consider the following scenario:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
9
About Cisco Cloud Network Controller
General Guidelines and Limitations for Cisco Cloud Network Controller
• VRF-1 is stretched across different sites (Azure and AWS). In the AWS site, VRF-1 is in VRF
group 1.
• VRF-2 is present in a different VRF group (VRF group 2).
In this scenario, traffic from VRF-2 to VRF-1 across sites is not supported, since the contracts between
the VRFs will be implicitly allowing traffic between different VRF groups as well. Traffic across different
VRF groups (hub networks) is not supported.
• You cannot stretch more than one VRF between on-prem and the cloud while using inter-VRF route
leaking in the CCRs (cloud routers). For example, in a situation where VRF1 with EPG1 is stretched and
VRF2 with EPG2 is also stretched, EPG1 cannot have a contract with EPG2. However, you can have
multiple VRFs in the cloud, sharing one or more contracts with one on-premises VRF.
• Set the BD subnet for on-premises sites as advertised externally to advertise to the CSR1kv on the cloud.
• The default AWS security group (SG) rules limit only permits 2 CCRs per region and only 2 regions can
deploy CCRs (a total maximum of 4 CCRs). To deploy more CCRs, increase the AWS SG rule limit to
120 or more. We recommend increasing the rule limit to 500.
• When configuring an object for a tenant, first check for any stale cloud resources in AWS. A stale
configuration might be present if it was not cleaned properly from the previous Cisco Cloud Network
Controller instances that managed the account.
Note
It takes some time for Cisco Cloud Network Controller to detect the stale cloud
resources after adding the tenant account ID.
To check for and clean up stale cloud resources:
1. Click the Navigation menu > Application Management > Tenants. The Tenants summary table
appears in the work pane with a list of tenants as rows in a summary table.
2. Double click the tenant you are creating objects for. The Overview, Cloud Resources, Application
Management, Statistics, and Event Analytics tabs appear.
3. Click the Cloud Resources > Actions > View Stale Cloud Objects. The Stale Cloud Objects
dialog box appears.
4. If you see any stale objects, click to place a check mark in the Automatically Clean Up Stale Cloud
Objects check box.
5. Click Save. The Cisco Cloud Network Controller automatically cleans up stale cloud objects.
Note
To disable the automatic cleanup, follow steps 1 - 4 and click the Automatically
Clean Up Stale Cloud Objects check box to remove the check mark.
• Cisco Cloud Network Controller tries to manage the AWS resources that it created. It does not attempt
to manage resources created by other applications, other than listing existing resources as inventory. At
the same time, it is also expected that AWS IAM users in the AWS infra tenant account, and the other
tenant accounts, do not disturb the resources that Cisco Cloud Network Controller creates. For this
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
10
About Cisco Cloud Network Controller
General Guidelines and Limitations for Cisco Cloud Network Controller
purpose, all resources Cisco Cloud Network Controller creates on AWS has at least one of these two
tags:
• AciDnTag
• AciOwnerTag
Cisco Cloud Network Controller must prevent AWS IAM users who have access to create, delete, or
update EC2, or any other resources, from accessing or modifying the resources that Cisco Cloud Network
Controller created and manages. Such restrictions should apply on both the infra tenant and other user
tenant accounts. AWS account administrators should utilize the above two tags to prevent their
unintentional access and modifications. For example, you can have an access policy like the following
to prevent access to resources managed by Cisco Cloud Network Controller:
{
"Effect": "Deny",
"Action": [
"ec2:*"
],
"Resource": "*",
"Condition": {
"StringLike": {"ec2:ResourceTag/AciDnTag": "*"}
}
}
• When configuring shared L3Out:
• An on-premises L3Out and cloud EPGs cannot be in tenant common.
• If an on-premises L3Out and a cloud EPG are in different tenants, define a contract in tenant common.
The contract cannot be in the on-premises site or the cloud tenant.
• Specify the CIDR for the cloud EPG in the on-premises L3Out external EPGs (l3extInstP).
• When an on-premises L3Out has a contract with a cloud EPG in a different VRF, the VRF in which
the cloud EPG resides cannot be stretched to the on-premises site and cannot have a contract with
any other VRF in the on-premises site.
• When configuring an external subnet in an on-premises external EPG:
• Specify the external subnet as a non-zero subnet.
• The external subnet cannot overlap with another external subnet.
• Mark the external subnet with a shared route-control flag to have a contract with a cloud EPG.
• The external subnet that is marked in the on-premises external EPG should have been learned through
the routing protocol in the L3Out or created as a static route.
• When mapping availability zones, choose only a or b in Cisco Cloud Network Controller. Internally, the
zone-mapping function maps this to actual availability zones in AWS.
Note
The mapping works in alphabetical order. The availability zones are sorted
alphabetically and then the function picks the first two and associates them to a
zone a and b in Cisco Cloud Network Controller.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
11
About Cisco Cloud Network Controller
About the Cisco Cloud Network Controller GUI
• Configuring ASN 64512 for cloud routers causes BGP sessions to not work between cloud routers and
AWS virtual private gateways.
• For the total supported scale, see the following Scale Supported table:
Note
With the scale that is specified in the Scale Supported table:
• You can have only 4 total managed regions.
• You can have only CCRs in 2 regions, 2 * 2 CCRs. This is irrespective of
AWS SG rule limit.
Table 2: Scale Supported
Component
Number Supported
Tenants
20
Applications
500
EPGs
500
Cloud Endpoints
1000
VRFs
20
Cloud Context Profiles
40
Contracts
1000
Service Graphs
200
Service Devices
100
About the Cisco Cloud Network Controller GUI
The Cisco Cloud Network Controller GUI is categorized into groups of related windows. Each window enables
you to access and manage a particular component. You move between the windows using the Navigation
menu that is located on the left side of the GUI. When you hover your mouse over any part of the menu, the
following list of tab names appear: Dashboard, Topology, Application Management, Cloud Resources,
Operations, Infrastructure, and Administrative.
Each tab contains a different list of subtabs, and each subtab provides access to a different component-specific
window. For example, to view the tenant-specific window, hover your mouse over the Navigation menu and
click Application Management > Tenants. From there, you can use the Navigation menu to view the details
of another component. For example, you can navigate to the Availability Zones window from Tenants by
clicking Cloud Resources > Availability Zones.
The Intent menu bar icon enables you to create a component from anywhere in the GUI. For example, to
create a tenant while viewing the Availability Zones window, click the Intent icon. A dialog appears with
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
12
About Cisco Cloud Network Controller
About the Cisco Cloud Network Controller GUI
a search box and a drop-down list. When you click the drop-down list and choose Application Management,
a list of options, including the Tenant option, appears. When you click the Tenant option, the Create Tenant
dialog appears displaying a group of fields that are required for creating the tenant.
For more information about configuring Cisco Cloud Network Controller components, see Configuring Cisco
Cloud Network Controller Components, on page 41
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
13
About Cisco Cloud Network Controller
About the Cisco Cloud Network Controller GUI
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
14
CHAPTER
3
Cisco Cloud Network Controller Policy Model
• About the ACI Policy Model, on page 15
• Policy Model Key Characteristics, on page 15
• Logical Constructs, on page 16
• The Cisco ACI Policy Management Information Model, on page 17
• Tenants, on page 19
• Cloud Context Profile, on page 20
• VRFs, on page 29
• Cloud Application Profiles, on page 30
• Cloud Endpoint Groups, on page 30
• Contracts, on page 32
• About the Cloud Template, on page 34
• Managed Object Relations and Policy Resolution, on page 37
• Default Policies, on page 38
• Shared Services, on page 39
About the ACI Policy Model
The ACI policy model enables the specification of application requirements policies. The Cisco Cloud Network
Controller automatically renders policies in the cloud infrastructure. When you or a process initiates an
administrative change to an object in the cloud infrastructure, the Cisco Cloud Network Controller first applies
that change to the policy model. This policy model change then triggers a change to the actual managed item.
This approach is called a model-driven framework.
Policy Model Key Characteristics
Key characteristics of the policy model include the following:
• As a model-driven architecture, the software maintains a complete representation of the administrative
and operational state of the system (the model). The model applies uniformly to cloud infrastructure,
cloud infrastructure, services, system behaviors, and virtual devices attached to the network.
• The logical and concrete domains are separated; the logical configurations are rendered into concrete
configurations by applying the policies in relation to the available resources. No configuration is carried
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
15
Cisco Cloud Network Controller Policy Model
Logical Constructs
out against concrete entities. Concrete entities are configured implicitly as a side effect of the changes
to the Cisco Cloud policy model.
• The system prohibits communications with newly connected endpoints until the policy model is updated
to include the new endpoint.
• Network administrators do not configure logical system resources directly. Instead, they define logical
(hardware-independent) configurations and the Cisco Cloud Network Controller policies that control
different aspects of the system behavior.
Managed object manipulation in the model relieves engineers from the task of administering isolated, individual
component configurations. These characteristics enable automation and flexible workload provisioning that
can locate any workload anywhere in the infrastructure. Network-attached services can be easily deployed,
and the Cisco Cloud Network Controller provides an automation framework to manage the lifecycle of those
network-attached services.
Logical Constructs
The policy model manages the entire cloud infrastructure, including the infrastructure, authentication, security,
services, applications, cloud infrastructure, and diagnostics. Logical constructs in the policy model define
how the cloud infrastructure meets the needs of any of the functions of the cloud infrastructure. The following
figure provides an overview of the ACI policy model logical constructs.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
16
Cisco Cloud Network Controller Policy Model
The Cisco ACI Policy Management Information Model
Figure 1: ACI Policy Model Logical Constructs Overview
cloud infrastructure-wide or tenant administrators create predefined policies that contain application or shared
resource requirements. These policies automate the provisioning of applications, network-attached services,
security policies, and tenant subnets, which puts administrators in the position of approaching the resource
pool in terms of applications rather than infrastructure building blocks. The application needs to drive the
networking behavior, not the other way around.
The Cisco ACI Policy Management Information Model
The cloud infrastructure comprises the logical components as recorded in the Management Information Model
(MIM), which can be represented in a hierarchical management information tree (MIT). The Cisco Cloud
Network Controller runs processes that store and manage the information model. Similar to the OSI Common
Management Information Protocol (CMIP) and other X.500 variants, the Cisco Cloud Network Controller
enables the control of managed resources by presenting their manageable characteristics as object properties
that can be inherited according to the location of the object within the hierarchical structure of the MIT.
Each node in the tree represents a managed object (MO) or group of objects. MOs are abstractions of cloud
infrastructure resources. An MO can represent a concrete object, such as a cloud router, adapter, or a logical
object, such as an application profile, cloud endpoint group, or fault. The following figure provides an overview
of the MIT.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
17
Cisco Cloud Network Controller Policy Model
The Cisco ACI Policy Management Information Model
Figure 2: Cisco ACI Policy Management Information Model Overview
The hierarchical structure starts with the policy universe at the top (Root) and contains parent and child nodes.
Each node in the tree is an MO and each object in the cloud infrastructure has a unique distinguished name
(DN) that describes the object and locates its place in the tree.
The following managed objects contain the policies that govern the operation of the system:
• A tenant is a container for policies that enable an administrator to exercise role-based access control.
The system provides the following four kinds of tenants:
• The administrator defines user tenants according to the needs of users. They contain policies that
govern the operation of resources such as applications, databases, web servers, network-attached
storage, virtual machines, and so on.
• Although the system provides the common tenant, it can be configured by the cloud infrastructure
administrator. It contains policies that govern the operation of resources accessible to all tenants,
such as firewalls, load balancers, Layer 4 to Layer 7 services, intrusion detection appliances, and
so on.
Note
The Cisco Cloud Network Controller only supports load balancers as a Layer 4
to Layer 7 service.
• The infrastructure tenant is provided by the system but can be configured by the cloud infrastructure
administrator. It contains policies that govern the operation of infrastructure resources. It also enables
a cloud infrastructure provider to selectively deploy resources to one or more user tenants.
Infrastructure tenant policies are configurable by the cloud infrastructure administrator.
• The cloud infra policies enable you to manage on-premises and inter-region connectivity when setting
up the Cisco Cloud Network Controller. For more information, see the Cisco Cloud Network Controller
Installation Guide.
• Cloud inventory is a service that enables you to view different aspects of the system using the GUI. For
example, you can view the regions that are deployed from the aspect of an application or the applications
that are deployed from the aspect of a region. You can use this information for cloud resource planning
and troubleshooting.
• Layer 4 to Layer 7 service integration lifecycle automation framework enables the system to dynamically
respond when a service comes online or goes offline. For more information, see Deploying Layer 4 to
Layer 7 Services, on page 133
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
18
Cisco Cloud Network Controller Policy Model
Tenants
• Access, authentication, and accounting (AAA) policies govern user privileges, roles, and security domains
of the Cisco Cloud Network Controller cloud infrastructure. For more information, see Cisco Cloud
Network Controller Security, on page 161
The hierarchical policy model fits well with the REST API interface. When invoked, the API reads from or
writes to objects in the MIT. URLs map directly into distinguished names that identify objects in the MIT.
Any data in the MIT can be described as a self-contained structured tree text document encoded in XML or
JSON.
Tenants
A tenant (fvTenant) is a logical container for application policies that enable an administrator to exercise
domain-based access control. A tenant represents a unit of isolation from a policy perspective, but it does not
represent a private network. Tenants can represent a customer in a service provider setting, an organization
or domain in an enterprise setting, or just a convenient grouping of policies. The following figure provides
an overview of the tenant portion of the management information tree (MIT).
Figure 3: Tenants
Tenants can be isolated from one another or can share resources. The primary elements that the tenant contains
are filters, contracts, Virtual Routing and Forwarding (VRF) instances, cloud context profiles, AWS provider
configurations, and cloud application profiles that contain cloud endpoint groups (cloud EPGs). Entities in
the tenant inherit its policies. VRFs are also known as contexts; each VRF can be associated with multiple
cloud context profiles. A cloud context profile in conjunction with a VRF and a region represents the AWS
VPC in that region.
Tenants are logical containers for application policies. The cloud infrastructure can contain multiple tenants.
You must configure a tenant before you can deploy any Layer 4 to Layer 7 services. The ACI cloud
infrastructure supports IPv4 and dual-stack configurations for tenant networking.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
19
Cisco Cloud Network Controller Policy Model
Cloud Context Profile
Cloud Context Profile
The cloud context profile contains information on the following Cisco Cloud Network Controller components:
• Availability zones and regions
• CIDRs
• CCRs
• Endpoints
• EPGs
• Virtual Networks
• VRFs
The following sections provide additional information on some of the components that are part of the cloud
context profile.
CCR
The CCR is a virtual router that delivers comprehensive WAN gateway and network services into virtual and
cloud environments. The CCR enables enterprises to extend their WANs into provider-hosted clouds. Two
CCRs are required for Cisco Cloud Network Controller solution.
The type of CCR used with the Cisco Cloud Network Controller varies depending on the release:
• For releases prior to release 25.0(3), the Cisco Cloud Services Router 1000v is used with the Cisco
Cloud Network Controller. For more information on this type of CSR, see the Cisco Cloud Services
Router 1000v documentation.
• For release 25.0(3) and later, the Cisco Catalyst 8000V is used with the Cisco Cloud Network Controller.
For more information on this type of CCR, see the Cisco Catalyst 8000V Edge software documentation.
About the Cisco Catalyst 8000V
Beginning with release 25.0(3), Cisco Cloud Network Controller moves from the Cisco Cloud Services Router
1000v to the Cisco Catalyst 8000V. Following are updates that are specific to the Cisco Catalyst 8000V.
• Licensing, on page 20
• Throughput, on page 21
Licensing
Beginning with release 25.0(4), the Cisco Catalyst 8000V on Cisco Cloud Network Controller supports the
following licensing models:
1. Bring Your Own License (BYOL) Licensing Model
2. Pay As You Go (PAYG) Licensing Model
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
20
Cisco Cloud Network Controller Policy Model
About the Cisco Catalyst 8000V
Note
For releases prior to 25.0(4), the Cisco Catalyst 8000V on Cisco Cloud Network Controller supports only the
Bring Your Own License (BYOL) licensing model.
BYOL Licensing Model
The BYOL licensing model on Cisco Catalyst 8000V which requires you to purchase your Catalyst 8000V
Cisco DNA license from Cisco and deploy it in the cloud.
• For instructions on subscribing to one of the tier-based Cisco Catalyst 8000V licenses, see Cisco Catalyst
8000V Edge Software.
• For more information on different throughputs based on the tiers, see Throughput, on page 21.
Cisco Cloud Network Controller makes use of the “Cisco DNA Advantage” subscription. For features supported
by the “Cisco DNA Advantage” subscription, see Cisco DNA Software SD-WAN and Routing Matrices.
PAYG Licensing Model
Beginning with the 25.0(4) release, Cisco Cloud Network Controller supports Pay-As-You-Go (PAYG)
Licensing Model on Cisco Catalyst 8000V which allows users to deploy a Catalyst 8000V instance in the
cloud based on the VM size and purchase the usage on an hourly basis.
As you completely depend on the VM size to get the throughput, the PAYG licensing model can be enabled
only by first un-deploying the current Cisco Catalyst 8000V and then re-deploying it using the First Time Set
Up with the new VM size. For more information, see the chapter "Configuring Cisco Cloud Network Controller
Using the Setup Wizard" in the Cisco Cloud Network Controller for AWS Installation Guide
Note
The procedure for switching between licenses can also be used if you would like to switch between the two
licensing types available.
Note
There are two PAYG options for consuming licenses in the AWS marketplace: Catalyst 8000V Cisco DNA
Essentials and Catalyst 8000V Cisco DNA Advantage . Cisco Cloud Network Controller will make use of
Catalyst 8000V Cisco DNA Advantage. For features supported by the “Cisco DNA Advantage” subscription,
see Cisco DNA Software SD-WAN and Routing Matrices
Throughput
Beginning with release 25.0(4), the Cisco Catalyst 8000V on Cisco Cloud Network Controller supports the
following licensing models:
1. Bring Your Own License (BYOL) Licensing Model
2. Pay As You Go (PAYG) Licensing Model
Note
For releases prior to 25.0(4), the Cisco Catalyst 8000V on Cisco Cloud Network Controller supports only the
Bring Your Own License (BYOL) licensing model.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
21
Cisco Cloud Network Controller Policy Model
Private IP Address Support for Cisco Cloud Network Controller and CCR in AWS
1. Bring Your Own License (BYOL)
For this model, the Cisco Catalyst 8000V supports tier-based (T0/T1/T2/T3) throughput options. The following
table lists what AWS EC2 instance is used for different router throughput settings for the Cisco Catalyst
8000V:
CCR Throughput
AWS EC2 Instance
T0 (up to 15M throughput)
c5.xlarge
T1 (up to 100M throughput)
c5.xlarge
T2 (up to 1G throughput)
c5.xlarge
T3 (up to 10G throughput)
c5.9xlarge
Tier2 (T2) is the default throughput supported by Cisco Cloud Network Controller.
2. Pay-As-You-Go Licensing Model
For this model, Cisco Cloud Network Controller supports a range of AWS EC2 instances for cloud networking
needs powered by Cisco’s Catalyst 8000V virtual router.
The table below shows the cloud instance type supported by Cisco Cloud Network Controller on AWS. AWS EC2 Instance
CCR Throughput
vCPUs
Memory
c5.xlarge
up to 5 Gigabit throughput 4
8 GiB
c5.2xlarge
up to 10 Gigabit
throughput
8
16 GiB
c5.4xlarge
up to 10 Gigabit
throughput
16
32 GiB
c5.9xlarge
up to 10 Gigabit
throughput
36
72 GiB
c5n.xlarge
up to 25 Gigabit
throughput
4
10.5 GiB
c5n.2xlarge
up to 25Gigabit
throughput
8
21 GiB
c5n.4xlarge
up to 25 Gigabit
throughput
16
42 GiB
c5n.9xlarge
up to 50 Gigabit
throughput
36
96 GiB
Private IP Address Support for Cisco Cloud Network Controller and CCR in AWS
By default, CCR interfaces are assigned private IP addresses only and assignment of public IP addresses to
CCR interfaces is optional. Private IP addresses are always assigned to all the interfaces of a CCR. The private
IP address of GigabitEthernet1 of a CCR is used as BGP and OSPF router IDs.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
22
Cisco Cloud Network Controller Policy Model
Communicating to External Sites From Regions Without a CCR
To enable CCR private IP addresses for inter-site connectivity, where you are disabling public IP addresses
for the CCR interfaces, see the Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud
Network Controller GUI, on page 108 procedure.
By default, a private IP address is assigned to the management interface of the Cisco Cloud Network Controller
and assigning a public IP address is optional. To disable public IP to the Cisco Cloud Network Controller so
that a private IP address is used for connectivity, see the Deploying the Cisco Cloud Network Controller in
AWS procedure in the Cisco Cloud Network Controller for AWS Installation Guide.
Restrictions for CCR with Private IP Address
When public IP is disabled, the underlay inter-site connectivity cannot be Public internet because Public
Internet requires a public IP address. The underlay inter-site connectivity can only be one of the following:
• Private connection for connecting to an on-premise ACI site, which is through AWS Direct Connect or
Azure Express Route
• Cloud backbone for connecting to a Cisco Cloud Network Controller site of the same cloud provider,
which is through AWS VPC Peering or Azure Vnet Peering
Communicating to External Sites From Regions Without a CCR
Support is available for communication with an external site from regions without a CCR. This is accomplished
by making use of the AWS Transit Gateway feature. When you enable the AWS Transit Gateway feature on
Cisco Cloud Network Controller, you also enable peering between all managed regions on AWS. In this way,
the AWS Transit Gateway peering feature allows the Cisco Cloud Network Controller to address the issue of
communicating with external sites from regions without a CCR. It addresses this issue by having traffic
rerouted to a region with a CCR.
Using the AWS Transit Gateway feature, when traffic from a region without a CCR tries to egress out of a
site, this traffic will be routed to the infra VPC for the closest region with a CCR. After the traffic is rerouted
to that region's infra VPC, that CCR is used to egress out the packet. For ingress traffic, packets coming from
an external site can reach any region's CCR and then be routed to the destination region using the AWS Transit
Gateway peering in the ingress data path.
In these situations, traffic is rerouted automatically when the system recognizes that external traffic is egressing
or ingressing through a region without a CCR. However, you must have the following components configured
in order for the system to automatically perform this rerouting task:
• AWS Transit Gateway must be configured. If AWS Transit Gateway is not already configured, see
Increasing Bandwidth Between VPCs by Using AWS Transit Gateway for those instructions.
• CCRs must be deployed in at least one region. Even though this enhancement allows you to communicate
with an external site from a region that does not contain a CCR, in order to do this, you must have another
separate region that does contain a CCR so that traffic can be rerouted from the region without a CCR
to the region with a CCR.
The following figure shows an example scenario where traffic is rerouted automatically when the system
recognizes that external traffic is egressing from a region without a CCR.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
23
Cisco Cloud Network Controller Policy Model
Communicating to External Sites From Regions Without a CCR
The following occurs when the Cisco Cloud Network Controller recognizes that Region 2 does not have a
CCR, but traffic is egressing out to an external site (shown with the green arrow and circles):
1. Traffic flow begins egressing out from the CIDR in App-1 in Region 2 to a remote site. Note that the
endpoint is configured with the appropriate outbound rule to allow the remote site CIDR.
2. The VPC 2 egress route table has the remote site CIDR, which then has the AWS Transit Gateway as the
next hop. The AWS Transit Gateway information is programmed automatically based on the configured
contracts.
3. A 0.0.0.0/0 route is inserted in the AWS Transit Gateway route table, which essentially tells the system
to take the AWS Transit Gateway peering attachment if traffic is egressing out to an external site but there
is no CCR in this region. In this situation, the AWS Transit Gateway peering attachment goes to another
region that does have a CCR (Region 1 in the example scenario). The region with a CCR that will be used
is chosen based on geographical proximity to the region that does not have a CCR.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
24
Cisco Cloud Network Controller Policy Model
Communicating to External Sites From Regions Without a CCR
4. The packet is first forwarded to the infra VPC in the region with the CCR (Region 1), and is then forwarded
to the gigabit ethernet network interface on the CCR that is associated with the appropriate VRF group.
5. The gigabit 2 inbound security group on the CCR in Region 1 is configured to allow traffic from the
remote region VPC.
It's useful to note that in the egress example shown above:
• For steps 1 and 2, there is no change from pre-release 5.2(1) behavior.
• Step 3 is behavior that is new and unique to this feature in release 5.2(1), where the redirect occurs to
the TGW peering attachment from the region without a CCR to the region with a CCR. In addition, step
3 occurs on the AWS cloud.
• Steps 4 and 5 would normally occur in Region 2 before release 5.2(1), but only if Region 2 had a CCR.
However, because Region 2 does not have a CCR, with this feature in release 5.2(1), these steps are
taking place in Region 1 where a CCR is present.
The following figure shows an example scenario where traffic is rerouted automatically when the system
recognizes that external traffic is ingressing to a region without a CCR.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
25
Cisco Cloud Network Controller Policy Model
Communicating to External Sites From Regions Without a CCR
The following occurs when the Cisco Cloud Network Controller recognizes that Region 2 does not have a
CCR, but traffic is ingressing in from an external site to a CIDR in App-1 in Region 2 (shown with the blue
arrow and circles):
1. Normally, the CCR in Region 1 would only advertise the CIDRs that are local to that region. However,
with this enhancement that is part of release 5.2(1), all CCRs in all regions now advertise CIDRs from
all remote regions. Therefore, in this example, the CCR in Region 1 will also advertise the CIDRs that
are in Region 2 (assuming AWS Transit Gateway peering is configured between both regions and the
contracts are configured correctly). In this situation, the traffic ingresses in from an external site to the
CCR in Region 1, where the CCR in Region 1 advertises the static route for the remote region VPC CIDRs.
2. The infra route table (the AWS Transit Gateway route table in Region 1) has the next hop to the AWS
Transit Gateway peering attachment to Region 2.
It's useful to note that in the ingress example shown above:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
26
Cisco Cloud Network Controller Policy Model
Support for ECMP Forwarding from Remote Sites for CCRs
• Both steps (steps 1 and 2) in the ingress example shown above are new and unique to this feature in
release 5.2(1).
• Step 1 in the ingress example shows configurations programmed on the CCR.
• Step 2 in the ingress example occurs on the AWS cloud.
Support for ECMP Forwarding from Remote Sites for CCRs
Support is available for ECMP with CCRs, where traffic from CCRs will be forwarded to all ECMP paths
received from a destination site. This support is automatically enabled and requires no manual configuration
to enable.
Preference For Routes to CCRs in Regions with Local CIDRs
Every CIDR that is configured is local to a specific region. With multiple regions in a cloud, CCRs from all
regions advertise the CIDRs for redundancy. However, rather than have CCRs from all regions advertise the
CIDRs with the same preference, support is available for having CCRs advertise with a higher preference
from the region where the CIDR is local. This causes the on-premises site or the remote cloud site to direct
traffic directly to the region where the CIDR is local. If the CCRs in the local region fail, the paths from the
other regions can be used for data forwarding.
Availability Zones
Two types of availabilty zones are supported for Cisco Cloud Network Controller:
• Virtual availability zones: Cisco Cloud Network Controller supports only two virtual availability zones
per region in AWS, where Cisco Cloud Network Controller creates two virtual availability zones for
each region using the format <region-name>a and <region-name>b. For example, under the us-west-1
region, Cisco Cloud Network Controller creates the two virtual availability zones us-west-1a and
us-west-1b.
• Cloud availability zones: This type of availability zone allows for multiple availability zones in each
AWS region with Cisco Cloud Network Controller.
• To view the virtual availability zones for your Cisco Cloud Network Controller, navigate to Cloud
Resources > Availability Zones, then click the Virtual Availability Zones tab.
• To view the cloud availability zones for your Cisco Cloud Network Controller, navigate to Cloud
Resources > Availability Zones, then click the Cloud Availability Zones tab.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
27
Cisco Cloud Network Controller Policy Model
Migrating from Virtual Availability Zones to Cloud Availability Zones
Migrating from Virtual Availability Zones to Cloud Availability Zones
If you have deployments where you have virtual availability zones configured, we recommend that you migrate
from the virtual availability zones to the cloud availability zones.
• You can migrate individual subnets or all of the subnets in a CIDR block range as part of the availability
zone migration.
• Migrating from older virtual availability zones to the newer cloud availability zones will not cause have
any functional impact, such as a traffic drop, in the cloud resources in AWS.
Note
The following steps describe how to migrate from virtual availability zones to cloud availability zones through
the cloud context profile, but you can also migrate availability zones by clicking the Intent icon (
selecting Availability Zone Configuration Migration.
) and
To migrate from virtual availability zones to cloud availability zones:
1. Navigate to the cloud context profile that was configured previously with the older virtual availability
zones.
In the left nav pane, navigate to Application Management > Cloud Context Profiles, then locate the
cloud context profile that was configured previously with the older virtual availability zones.
2. Double-click on that cloud context profile.
The details panel for that cloud context profile appears with the Overview tab selected automatically.
View the entries in the Availability Zone column in the Overview tab to determine if you have virtual
availability zones in this cloud context profile that you can migrate to cloud availability zones.
3. Click Actions > Migrate Subnet Configuration.
The Availability Zone Configuration Migration window appears.
4. Select the subnets associated with the virtual availability zones that you want to migrate to cloud availability
zones.
• All of the subnets listed in this window that are associated with virtual availability zones will be
selected by default. Manually deselect any subnets associated with virtual availability zones that you
do not want to migrate to cloud availability zones.
• For each virtual availability zone that will be migrated over to cloud availability zones, make a note
of the entry in the Cloud Availability Zones column to determine the new availability zone value for
that subnet, if necessary.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
28
Cisco Cloud Network Controller Policy Model
Guidelines and Limitations
5. Click Migrate Subnet Configuration.
The selected virtual availability zones are migrated to cloud availability zones.
Guidelines and Limitations
Following are the guidelines and limitations for support of multiple availability zones:
• Support for cloud availability zones, where you can have more than two availability zones, is available
for user tenants only. Infra tenants will continue to use virtual availability zones which have a limit of
two availability zones.
VRFs
A Virtual Routing and Forwarding (VRF) object (fvCtx) or context is a tenant network (called a private
network in the Cisco Cloud Network Controller GUI. A tenant can have multiple VRFs. A VRF is a unique
Layer 3 forwarding and application policy domain. The following figure shows the location of VRFs in the
management information tree (MIT) and their relation to other objects in the tenant.
Figure 4: VRFs
A VRF defines a Layer 3 address domain. One or more cloud context profiles are associated with a VRF. You
can only associate one cloud context profile with a VRF in a given region. All the endpoints within the Layer
3 domain must have unique IP addresses because it is possible to forward packets directly between these
devices if the policy allows it. A tenant can contain multiple VRFs. After an administrator creates a logical
device, the administrator can create a VRF for the logical device, which provides a selection criteria policy
for a device cluster. A logical device can be selected based on a contract name, a graph name, or the function
node name inside the graph.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
29
Cisco Cloud Network Controller Policy Model
Cloud Application Profiles
Cloud Application Profiles
A cloud application profile (cloudAp) defines the policies, services and relationships between cloud EPGs.
The following figure shows the location of cloud application profiles in the management information tree
(MIT) and their relation to other objects in the tenant.
Figure 5: Cloud Application Profiles
Cloud application profiles contain one or more cloud EPGs. Modern applications contain multiple components.
For example, an e-commerce application could require a web server, a database server, data located in a
storage service, and access to outside resources that enable financial transactions. The cloud application profile
contains as many (or as few) cloud EPGs as necessary that are logically related to providing the capabilities
of an application.
Cloud EPGs can be organized according to one of the following:
• The application they provide, such as a DNS server or SAP application (see Tenant Policy Example in
Cisco APIC REST API Configuration Guide).
• The function they provide (such as infrastructure)
• Where they are in the structure of the data center (such as DMZ)
• Whatever organizing principle that a cloud infrastructure or tenant administrator chooses to use
Cloud Endpoint Groups
The cloud endpoint group (cloud EPG) is the most important object in the policy model. The following figure
shows where application cloud EPGs are located in the management information tree (MIT) and their relation
to other objects in the tenant.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
30
Cisco Cloud Network Controller Policy Model
Cloud Endpoint Groups
Figure 6: Cloud Endpoint Groups
A cloud EPG is a managed object that is a named logical entity that contains a collection of endpoints. Endpoints
are devices that are connected to the network directly or indirectly. They have an address (identity), a location,
attributes (such as version or patch level), and are virtual. Knowing the address of an endpoint also enables
access to all its other identity details. Cloud EPGs are fully decoupled from the physical and logical topology.
Endpoint examples include servers, virtual machines, storage services, or clients on the Internet. Endpoint
membership in a cloud EPG can be dynamic or static.
The ACI cloud infrastructure can contain the following types of cloud EPGs:
• Cloud endpoint group (cloudEPg)
• Cloud external endpoint group (cloudExtEPg)
Cloud EPGs contain endpoints that have common policy requirements such as security or Layer 4 to Layer
7 services. Rather than configure and manage endpoints individually, they are placed in a cloud EPG and are
managed as a group.
Policies apply to cloud EPGs, never to individual endpoints.
Regardless of how a cloud EPG is configured, cloud EPG policies are applied to the endpoints they contain.
WAN router connectivity to the cloud infrastructure is an example of a configuration that uses a static cloud
EPG. To configure WAN router connectivity to the cloud infrastructure, an administrator configures a
cloudExtEPg cloud EPG that includes any endpoints within an associated WAN subnet. The cloud infrastructure
learns of the cloud EPG endpoints through a discovery process as the endpoints progress through their
connectivity life cycle. Upon learning of the endpoint, the cloud infrastructure applies the cloudExtEPg cloud
EPG policies accordingly. For example, when a WAN connected client initiates a TCP session with a server
within an application (cloudEPg) cloud EPG, the cloudExtEPg cloud EPG applies its policies to that client
endpoint before the communication with the (cloudExtEPg) cloud EPG web server begins. When the client
server TCP session ends, and communication between the client and server terminates, the WAN endpoint
no longer exists in the cloud infrastructure.
The Cisco Cloud Network Controller uses endpoint selectors to assign endpoints to Cloud EPGs. The endpoint
selector is essentially a set of rules that are run against the cloud instances that are assigned to the AWS VPC
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
31
Cisco Cloud Network Controller Policy Model
Contracts
managed by Cisco ACI. Any endpoint selector rules that match endpoint instances assign that endpoint to the
Cloud EPG. The endpoint selector is similar to the attribute-based microsegmentation available in Cisco ACI.
Contracts
In addition to cloud EPGs, contracts (vzBrCP) are key objects in the policy model. Cloud EPGs can only
communicate with other cloud EPGs according to contract rules. The following figure shows the location of
contracts in the management information tree (MIT) and their relation to other objects in the tenant.
Figure 7: Contracts
An administrator uses a contract to select one or more types of traffic that can pass between cloud EPGs,
including the protocols and ports allowed. If there is no contract, inter-EPG communication is disabled by
default. There is no contract required for intra-EPG communication; intra-EPG communication is always
implicitly allowed.
Contracts govern the following types of cloud EPG communications:
• Between cloud EPGs (cloudEPg), both intra-tenant and inter-tenant
Note
In the case of a shared service mode, a contract is required for inter-tenant
communication. A contract is used to specify static routes across VRFs, although
the tenant VRF does not enforce a policy.
• Between cloud EPGs and cloud external EPGs (cloudExtEPg)
Contracts govern the communication between cloud EPGs that are labeled providers, consumers, or both. The
relationship between a cloud EPG and a contract can be either a provider or consumer. When a cloud EPG
provides a contract, communication with that cloud EPG can be initiated from other cloud EPGs as long as
the communication complies with the provided contract. When a cloud EPG consumes a contract, the cloud
endpoints in the consuming cloud EPG may initiate communication with any cloud endpoint in a cloud EPG
that is providing that contract.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
32
Cisco Cloud Network Controller Policy Model
Filters and Subjects Govern Cloud EPG Communications
Note
A cloud EPG can both provide and consume the same contract. A cloud EPG can also provide and consume
multiple contracts simultaneously.
Filters and Subjects Govern Cloud EPG Communications
Subject and filter managed-objects enable mixing and matching among cloud EPGs and contracts so as to
satisfy various applications or service delivery requirements. The following figure shows the location of
application subjects and filters in the management information tree (MIT) and their relation to other objects
in the tenant.
Figure 8: Subjects and Filters
Contracts can contain multiple communication rules and multiple cloud EPGs can both consume and provide
multiple contracts. A policy designer can compactly represent complex communication policies and re-use
these policies across multiple instances of an application.
Note
Subjects are hidden in Cisco Cloud Network Controller and not configurable. For rules installed in AWS,
source port provided in the filter entry s not taken into account.
Subjects and filters define cloud EPG communications according to the following options:
• Filters are Layer 2 to Layer 4 fields, TCP/IP header fields such as Layer 3 protocol type, Layer 4 ports,
and so forth. According to its related contract, a cloud EPG provider dictates the protocols and ports in
both the in and out directions. Contract subjects contain associations to the filters (and their directions)
that are applied between cloud EPGs that produce and consume the contract.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
33
Cisco Cloud Network Controller Policy Model
About the Cloud Template
Note
When a contract filter match type is All, best practice is to use the VRF
unenforced mode. Under certain circumstances, failure to follow these guidelines
results in the contract not allowing traffic among cloud EPGs in the VRF.
• Subjects are contained in contracts. One or more subjects within a contract use filters to specify the type
of traffic that can be communicated and how it occurs. For example, for HTTPS messages, the subject
specifies the direction and the filters that specify the IP address type (for example, IPv4), the HTTP
protocol, and the ports allowed. Subjects determine if filters are unidirectional or bidirectional. A
unidirectional filter is used in one direction. Unidirectional filters define in or out communications but
not the same for both. Bidirectional filters are the same for both; they define both in and out
communications.
Note
For rules that are installed in AWS, the source port provided in the filter entry is
not taken into account.
• ACI contracts rendered in AWS constructs are always stateful, allowing return traffic.
About the Cloud Template
The cloud template provides a template that configures and manages the Cisco Cloud Network Controller
infra network. The template requires only the most essential elements for the configuration. From these
elements, the cloud template generates a detailed configuration necessary for setting up the Cisco Cloud
Network Controller infra network. However, it is not a one-time configuration generation—it is possible to
add, modify, or remove elements of the template input. The cloud template updates the resulting configuration
accordingly.
One of the central things in the AWS network configuration is the Virtual Private Cloud (VPC). AWS supports
many regions worldwide and one VPC is specific to one region.
The cloud template accepts one or more region names and generates the entire configuration for the infra
VPCs in those regions. They are the infra VPCs. The Cisco Cloud Network Controller-managed object (MO)
corresponding to the AWS VPC is cloudCtxProfile. For every region specified in the cloud template, it
generates the cloudCtxProfile configuration. A cloudCtxProfile is the topmost MO for all the configuration
corresponding to a region. Underneath, it has many of other MOs organized as a tree to capture a specific
configuration. A cloudCtxProfile MO generated by the cloud template carries ctxProfileOwner == SYSTEM.
For the non-infra network, it is possible to configure cloudCtxProfile directly; in this case, cloudCtxProfile
carries ctxProfileOwner == USER.
A primary property of an AWS VPC is the CIDR. Every region needs a unique CIDR. In Cisco Cloud Network
Controller, you can provide the CIDRs for the infra VPCs. The CIDRs for the first two regions come from
the Cloud Formation Template (CFT) that deploys the Cisco Cloud Network Controller AMI on the AWS.
The cloudApicSubnetPool MO provides CIDRs for the additional regions directly to the Cisco Cloud Network
Controller. In the Cisco Cloud Network Controller configuration, the cloudCidr MO, which is a child of
cloudCtxProfile, models the CIDR.
The cloud template generates and manages a huge number of MOs in the cloudCtxProfile subtree including,
but not limited to, the following:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
34
Cisco Cloud Network Controller Policy Model
About the Cloud Template
• Subnets
• Association of subnets to AWS availability zones
• Cloud routers
• IP address allocation for the cloud router interfaces
• IP address allocation and configuration for tunnels
• IP address allocation and configuration for loopbacks
Without the cloud template, you would be responsible for configuring and managing these.
The Cisco Cloud Template MO table contains a brief summary of the inputs (MOs) to the cloud template.
Table 3: Cloud Template MOs
MO
Purpose
cloudtemplateInfraNetwork
The root of the cloud template configuration.
Attributes include:
numRoutersPerRegion—The number of cloud routers
for each cloudRegionName specified under
cloudtemplateIntNetwork.
cloudtemplateProfile
Configuration profile for all the cloud routers.
Attributes include:
• routerUsername
• routerPassword
• routerThroughput
• routerLicenseToken
• routeDataInterfacePublicIP
• routerMgmtInterfacePublicIP
cloudtemplateIntNetwork
Contains a list of regions, which specify where you
deploy the cloud routers. Each region is captured
through a cloudRegionName child MO
cloudtemplateExtNetwork
Contains infra network configuration input that is
external of the cloud.
Contains a list of regions where cloud routers are
configured for external networking.
Each region is captured through a cloudRegionName
child MO
cloudtemplateVpnNetwork
Contains information for setting up a VPN with an
ACI on-premises site or another Cisco Cloud Network
Controller site.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
35
Cisco Cloud Network Controller Policy Model
About the Cloud Template
MO
Purpose
cloudtemplateIpSecTunnel
Captures the IP address of the IPSec peer in the ACI
on-premises site.
cloudtemplateOspf
Captures the OSPF area to be used for the VPN
connections.
cloudtemplateBgpEvpn
Captures the peer IP address, ASN, and so forth, for
setting up the BGP session with the on-premises site.
In Cisco Cloud Network Controller, the layering of MOs is slightly different from a regular Cisco APIC due
to the cloud template. In a regular Cisco APIC, you post logical MOs that go through two layers of translation:
1. Logical MO to resolved MO
2. Resolved MO to concrete MO
In Cisco Cloud Network Controller, there is an additional layer of translation for the infra network. This
additional layer is where the cloud template translates logical MOs in the cloudtemplate namespace to logical
MOs in the cloud namespace. For configurations outside of the infra network, you post logical MOs in the
cloud namespace. In this case, the MOs go through the usual two-layer translation as in the regular Cisco
APIC.
Figure 9: Cloud and Cloud Template MO Conversion
Note
For information about configuring the cloud template, see Configuring Cisco Cloud Network Controller
Components, on page 41
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
36
Cisco Cloud Network Controller Policy Model
Managed Object Relations and Policy Resolution
Managed Object Relations and Policy Resolution
Relationship-managed objects express the relation between managed object instances that do not share
containment (parent-child) relations. MO relations are established between the source MO and a target MO
in one of the following two ways:
• An explicit relation, such as with cloudRsZoneAttach and cloudRsCloudEPgCtx, defines a relationship
that is based on the target MO distinguished name (DN).
• A named relation defines a relationship that is based on the target MO name.
The dotted lines in the following figure show several common MO relations.
Figure 10: MO Relations
For example, the dotted line between the cloud EPG and the VRF defines the relation between those two
MOs. In this figure, the cloud EPG (cloudEPg) contains a relationship MO (cloudRsCloudEPgCtx) that is
named with the name of the target VRF MO (fvCtx). For example, if production is the VRF name
(fvCtx.name=production), then the relation name is production
(cloudRsCloudEPgCtx.tnFvCtxName=production).
In the case of policy resolution based on named relations, if a target MO with a matching name is not found
in the current tenant, the ACI cloud infrastructure tries to resolve in the common tenant. For example, if the
user tenant cloud EPG contained a relationship MO targeted to a VRF that did not exist in the tenant, the
system tries to resolve the relationship in the common tenant. If a named relation cannot be resolved in either
the current tenant or the common tenant, the ACI cloud infrastructure attempts to resolve to a default policy.
If a default policy exists in the current tenant, it is used. If it does not exist, the ACI cloud infrastructure looks
for a default policy in the common tenant. Cloud context profile, VRF, and contract (security policy) named
relations do not resolve to a default.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
37
Cisco Cloud Network Controller Policy Model
Default Policies
Default Policies
Warning
Default policies can be modified or deleted. Deleting a default policy can result in a policy resolution process
to complete abnormally.
The ACI cloud infrastructure includes default policies for many of its core functions. Examples of default
policies include the following:
• Cloud AWS provider (for the infra tenant)
• Monitoring and statistics
Note
To avoid confusion when implementing configurations that use default policies, document changes made to
default policies. Be sure that there are no current or future configurations that rely on a default policy before
deleting a default policy. For example, deleting a default firmware update policy could result in a problematic
future firmware update.
A default policy serves multiple purposes:
• Allows a cloud infrastructure administrator to override the default values in the model.
• If an administrator does not provide an explicit policy, the Cisco Cloud Network Controller applies the
default policy. An administrator can create a default policy and the Cisco Cloud Network Controller uses
that unless the administrator provides any explicit policy.
The following scenarios describe common policy resolution behavior:
• A configuration explicitly refers to the default policy: if a default policy exists in the current tenant, it is
used. Otherwise, the default policy in tenant common is used.
• A configuration refers to a named policy (not default) that does not exist in the current tenant or in tenant
common: if the current tenant has a default policy, it is used. Otherwise, the default policy in tenant
common is used.
Note
The scenario above does not apply to a VRF in a tenant.
• A configuration does not refer to any policy name: if a default policy exists in the current tenant, it is
used. Otherwise, the default policy in tenant common is used.
The policy model specifies that an object is using another policy by having a relation-managed object (MO)
under that object and that relation MO refers to the target policy by name. If this relation does not explicitly
refer to a policy by name, then the system tries to resolve a policy that is called default. Cloud context profiles
and VRFs are exceptions to this rule.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
38
Cisco Cloud Network Controller Policy Model
Shared Services
Shared Services
Cloud EPGs in one tenant can communicate with cloud EPGs in another tenant through a contract interface
that is contained in a shared tenant. Within the same tenant, a cloud EPG in one VRF can communicate with
another cloud EPG in another VRF through a contract defined in the tenant. The contract interface is an MO
that can be used as a contract consumption interface by the cloud EPGs that are contained in different tenants.
By associating to an interface, a cloud EPG consumes the subjects that are represented by the interface to a
contract contained in the shared tenant. Tenants can participate in a single contract, which is defined at some
third place. More strict security requirements can be satisfied by defining the tenants, contract, subjects, and
filter directions so that tenants remain isolated from one another.
Follow these guidelines when configuring shared services contracts:
• A shared service is supported only with non-overlapping and non-duplicate CIDR subnets. When
configuring CIDR subnets for shared services, follow these guidelines:
• CIDR subnets leaked from one VRF to another must be disjointed and must not overlap.
• CIDR subnets advertised from multiple consumer networks into a VRF or vice versa must be
disjointed and must not overlap.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
39
Cisco Cloud Network Controller Policy Model
Shared Services
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
40
CHAPTER
4
Configuring Cisco Cloud Network Controller
Components
• About Configuring the Cisco Cloud Network Controller, on page 41
• Configuring the Cisco Cloud Network Controller Using the GUI, on page 41
• Configuring Cisco Cloud Network Controller Using the REST API, on page 110
About Configuring the Cisco Cloud Network Controller
You create the Cisco Cloud Network Controller components using either the Cisco Cloud Network Controller
GUI or the REST API. This section explains how to create configuration, application management, operations,
and administrative components.
Note
• For information about configuring a load balancer and service graph, see Deploying Layer 4 to Layer 7
Services, on page 133.
• For information about the GUI, such as navigation and a list of configurable components, see About the
Cisco Cloud Network Controller GUI, on page 12.
Configuring the Cisco Cloud Network Controller Using the GUI
Creating a Tenant Using the Cisco Cloud Network Controller GUI For Release
4.2(2) and Earlier
This section explains how to create a tenant using the Cisco Cloud Network Controller GUI.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Application Management.
A list of Application Management options appear in the Intent menu.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
41
Configuring Cisco Cloud Network Controller Components
Creating a Tenant Using the Cisco Cloud Network Controller GUI For Release 4.2(3) and Later
Step 3
From the Application Management list in the Intent menu, click Create Tenant. The Create Tenant dialog box
appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Tenant Dialog Box Fields table then continue.
Table 4: Create Tenant Dialog Box Fields
Properties
Description
Name
Enter the name of the tenant.
Description
Enter a description of the tenant.
Settings
Add Security Domain
To add a security domain:
a. Click Add Security Domain. The Select Security
Domains dialog appears with a list of security domains
in the left pane.
b. Click to choose a security domain.
c. Click Select to add the security domain to the tenant.
Step 5
Trusted Tenant
Click to check (default) or uncheck the Enabled check box.
Trusted Tenant is enabled when checked.
Cloud Account ID
Enter the cloud account ID.
Click Save when finished.
Creating a Tenant Using the Cisco Cloud Network Controller GUI For Release
4.2(3) and Later
This section explains how to create a tenant using the Cisco Cloud Network Controller GUI.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Application Management.
A list of Application Management options appear in the Intent menu.
Step 3
From the Application Management list in the Intent menu, click Create Tenant. The Create Tenant dialog box
appears.
Enter the appropriate values in each field as listed in the following Create Tenant Dialog Box Fields table then continue.
Step 4
Table 5: Create Tenant Dialog Box Fields
Properties
Description
Name
Enter the name of the tenant.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
42
Configuring Cisco Cloud Network Controller Components
Configure a Tenant AWS Provider For Release 4.2(2) and Earlier
Properties
Description
Description
Enter a description of the tenant.
Settings
Add Security Domain
To add a security domain:
a. Click Add Security Domain. The Select Security
Domains dialog appears with a list of security domains
in the left pane.
b. Click to choose a security domain.
c. Click Select to add the security domain to the tenant.
AWS Account ID
Enter the cloud account ID.
Access Type
Click to enable the tenant type:
• Untrusted
• Trusted
• Organization
Step 5
Click Save when finished.
Configure a Tenant AWS Provider For Release 4.2(2) and Earlier
Before you begin
• AWS Provider is auto-configured for Infra tenant. You do not need to do anything to configure the AWS
provider for the infra tenant.
• For all non-infra tenants, the AWS provider is configured either as a trusted tenant or as untrusted tenant.
Our recommendation is to use trusted tenants because managing credentials is not easy. Also, each tenant
must be in a separate AWS account. Sharing the same AWS account for multiple tenants is not allowed.
For a trusted tenant, establish the trust relationship first with the account in which Cisco Cloud Network
Controller is deployed (the account for the infra tenant). To establish the trust relation and give all the
required permissions to the Cisco Cloud Network Controller for accessing the tenant account, run the
tenant role cloud-formation template in the tenant account. This template is available as a tenant-cft.json
object in the S3 bucket that is named capic-common-[capicAccountId]-data in the infra tenant’s AWS
account. For security reasons, public access to this S3 bucket is not allowed, so the S3 bucket owner
needs to download this file and use it in the tenant account.
• Untrusted tenants - use the account access and secret keys. The access and secret keys being used must
be for an IAM user having these permissions at a minimum. The IAM role created must be named
ApicTenantRole.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
43
Configuring Cisco Cloud Network Controller Components
Configure a Tenant AWS Provider For Release 4.2(2) and Earlier
Note
Cisco Cloud Network Controller does not disturb AWS resources created by
other applications or users. It only manages the AWS resources created by itself.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"s3:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"events:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"logs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudtrail:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudwatch:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"resource-groups:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"sqs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "elasticloadbalancing:*",
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"config:*"
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
44
Configuring Cisco Cloud Network Controller Components
Configure a Tenant AWS Provider For Release 4.2(2) and Earlier
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "iam:PassRole",
"Resource": "arn:aws:iam::<account-id>:role/ApicTenantRole",
"Effect": "Allow"
}
]
}
• Add trust relationship:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "vpc-flow-logs.amazonaws.com",
"AWS": "arn:aws:iam::<account-d>:root"
},
"Action": "sts:AssumeRole"
}
]
}
• Cisco Cloud Network Controller enforces ownership checks to prevent deployment of policies in the
same tenant-region combination done either intentionally or by mistake. For example, assume that Cisco
Cloud Network Controller is deployed in AWS account IA1 in region R1. Now you want to deploy a
tenant TA1 in region R2. This tenant deployment i.e. account-region combination TA1-R2 is now owned
by IA1-R1. If another Cisco Cloud Network Controller attempts to manage the same tenant-region
combination later (say Capic2 in AWS account IA2 deployed in region R3), this will not be allowed
because the current owner for the deployment TA1-R2 is IA1-R1. In other words, only one account in
one region can be managed by one Cisco Cloud Network Controller. Example below shows some valid
and wrong deployment combinations.
Capic1:
IA1-R1: TA1-R1 - ok
TA1-R2 - ok
Capic2:
IA1-R2: TA1-R1 - not allowed
TA1-R3 - ok
Capic3:
IA2-R1: TA1-R1 - not allowed
TA1-R4 - ok
TA2-R4 - ok
• Ownership enforcement is done using AWS Resource Groups. When a new tenant in account TA1 in
region R2 is managed by Cisco Cloud Network Controller, a Resource Group CAPIC_TA1_R2 (e.g.
CAPIC_123456789012_us-east-2) is created in the tenant account. This Resource Group has a resource
tag AciOwnerTag with value IA1_R1_TA1_R2, assuming it was managed by Cisco Cloud Network
Controller in account IA1 and deployed in region R1. If the AciOwnerTag mismatch happens, tenant-region
management is aborted.
Here is a summary of AciOwnerTag mismatch cases:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
45
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider For Release 4.2(3) and Later
• Initially Cisco Cloud Network Controller is installed in an account, and then taken down and Cisco
Cloud Network Controller is installed in a different account. All existing tenant-region deployment
will fail.
• Another Cisco Cloud Network Controller is managing the same tenant-region.
In ownership mismatch cases, retry (to setup tenant-region again) is not currently supported. As a
workaround, if you are certain that no other Cisco Cloud Network Controller is managing the same
tenant-region combination, logon to the tenant's AWS account and manually remove the affected Resource
Group (e.g. CAPIC_123456789012_us-east-2). Next, reload Cisco Cloud Network Controller or delete
and add the tenant again.
Step 1
In the Cisco Cloud Network Controller, configure the AWS Provider.
a) On the Intent menu, choose Tenants > tenant_name from the drop-down.
b) In the Intent pane, choose Application Management > tenant_name .
Step 2
Perform the following actions:
a) Confirm there is a check in the Trusted Tenant checkbox.
The AWS account must be a Trusted account for the user tenant using the cloud.
b) In the Cloud Account ID field, provide the Cloud account ID.
c) Run the tenant role cloud-formation template available at the URL
https://capic-common-<infraAccountId>-data.s3.amazonaws.com/tenant-cft.json which is in a s3 bucket in the infra
tenant’s AWS account.
Alternatively, keep the trusted flag unchecked and provide the access and secret keys as done normally for
any tenant.
Note
Step 3
Click Save.
Configuring a Tenant AWS Provider For Release 4.2(3) and Later
Before you begin
• AWS Provider is auto-configured for Infra tenant. You do not need to do anything to configure the AWS
provider for the infra tenant.
• For all non-infra tenants, the AWS provider is configured either as a trusted tenant, untrusted tenant, or
organization tenant. Our recommendation is to use trusted tenants because managing credentials is not
easy. Also, each tenant must be in a separate AWS account. Sharing the same AWS account for multiple
tenants is not allowed.
For a trusted tenant, establish the trust relationship first with the account in which Cisco Cloud Network
Controller is deployed (the account for the infra tenant). To establish the trust relation and give all the
required permissions to the Cisco Cloud Network Controller for accessing the tenant account, first create
a tenant and assign the Trusted tag to that tenant as the Access Type. Then, bring up that new trusted
tenant again by clicking on the tenant name in the Tenants page, and in the AWS Account area in the
tenant window, click the Run the CloudFormation template link.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
46
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider For Release 4.2(3) and Later
• Organization tenants are for adding tenant accounts that are part of the organization. This requires
deploying the Cisco Cloud Network Controller in the master account of the organization.
• Untrusted tenants use the account access and secret keys. The access and secret keys being used must
be for an IAM user having these permissions at a minimum. The IAM role created must be named
ApicTenantRole.
Note
Cisco Cloud Network Controller does not disturb AWS resources created by
other applications or users. It only manages the AWS resources created by itself.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"s3:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"events:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"logs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudtrail:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudwatch:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"resource-groups:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"sqs:*"
],
"Resource": "*",
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
47
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider For Release 4.2(3) and Later
"Effect": "Allow"
}, {
"Action": "elasticloadbalancing:*",
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"config:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "iam:PassRole",
"Resource": "arn:aws:iam::<account-id>:role/ApicTenantRole",
"Effect": "Allow"
}
]
}
• Add trust relationship:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "vpc-flow-logs.amazonaws.com",
"AWS": "arn:aws:iam::<infra-account-id>:root"
},
"Action": "sts:AssumeRole"
}
]
}
• The Cisco Cloud Network Controller uses the OrganizationAccountAccessRole IAM role to manage
policies for AWS Organization tenants.
• If you created an AWS account within the existing organization in the master account, the
OrganizationAccountAccessRole IAM role is automatically assigned to that created AWS account.
You do not have to manually configure the OrganizationAccountAccessRole IAM role in AWS in
this case.
• If the master account invited an existing AWS account to join the organization, then you must
manually configure the OrganizationAccountAccessRole IAM role in AWS. Configure the
OrganizationAccountAccessRole IAM role in AWS for the organization tenant and verify that it
has Cisco Cloud Network Controller-related permissions available.
The OrganizationAccountAccessRole IAM role, together with the SCP (Service Control Policy)
used for the organization or the account, must have the minimum permissions that are required by
the Cisco Cloud Network Controller to manage policies for the tenants. The access policy requirement
is the same as the requirement for the trusted or untrusted tenants.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
48
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider For Release 4.2(3) and Later
"Action": [
"s3:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"events:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"logs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudtrail:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudwatch:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"resource-groups:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"sqs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "elasticloadbalancing:*",
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"config:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "iam:PassRole",
"Resource": "*",
"Effect": "Allow"
}
]
}
To add a trust relationship for an Organization tenant:
{
"Version": "2012-10-17",
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
49
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider For Release 4.2(3) and Later
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "vpc-flow-logs.amazonaws.com",
"AWS": "arn:aws:iam::<infra-account-id>:root"
},
"Action": "sts:AssumeRole"
}
]
}
• Cisco Cloud Network Controller enforces ownership checks to prevent deployment of policies in the
same tenant-region combination done either intentionally or by mistake. For example, assume that Cisco
Cloud Network Controller is deployed in AWS account IA1 in region R1. Now you want to deploy a
tenant TA1 in region R2. This tenant deployment i.e. account-region combination TA1-R2 is now owned
by IA1-R1. If another Cisco Cloud Network Controller attempts to manage the same tenant-region
combination later (say Capic2 in AWS account IA2 deployed in region R3), this will not be allowed
because the current owner for the deployment TA1-R2 is IA1-R1. In other words, only one account in
one region can be managed by one Cisco Cloud Network Controller. Example below shows some valid
and wrong deployment combinations.
Capic1:
IA1-R1: TA1-R1 - ok
TA1-R2 - ok
Capic2:
IA1-R2: TA1-R1 - not allowed
TA1-R3 - ok
Capic3:
IA2-R1: TA1-R1 - not allowed
TA1-R4 - ok
TA2-R4 - ok
• Ownership enforcement is done using AWS Resource Groups. When a new tenant in account TA1 in
region R2 is managed by Cisco Cloud Network Controller, a Resource Group CAPIC_TA1_R2 (e.g.
CAPIC_123456789012_us-east-2) is created in the tenant account. This Resource Group has a resource
tag AciOwnerTag with value IA1_R1_TA1_R2, assuming it was managed by Cisco Cloud Network
Controller in account IA1 and deployed in region R1. If the AciOwnerTag mismatch happens, tenant-region
management is aborted.
Here is a summary of AciOwnerTag mismatch cases:
• Initially Cisco Cloud Network Controller is installed in an account, and then taken down and Cisco
Cloud Network Controller is installed in a different account. All existing tenant-region deployment
will fail.
• Another Cisco Cloud Network Controller is managing the same tenant-region.
In ownership mismatch cases, retry (to setup tenant-region again) is not currently supported. As a
workaround, if you are certain that no other Cisco Cloud Network Controller is managing the same
tenant-region combination, logon to the tenant's AWS account and manually remove the affected Resource
Group (e.g. CAPIC_123456789012_us-east-2). Next, reload Cisco Cloud Network Controller or delete
and add the tenant again.
Step 1
In the Cisco Cloud Network Controller, configure the AWS Provider.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
50
Configuring Cisco Cloud Network Controller Components
Creating an Application Profile Using the Cisco Cloud Network Controller GUI
a) On the Intent menu, choose Tenants > tenant_name from the drop-down.
b) In the Intent pane, choose Application Management > tenant_name .
Step 2
Perform the following actions:
a) In the AWS Account ID field, provide the cloud account ID.
b) In the Access Type area, choose Trusted.
The AWS account must be a Trusted account for the user tenant that is using the cloud.
c) Click Save.
d) Bring up the new trusted tenant again by clicking on the tenant name in the Tenants page.
In the AWS Account area in the tenant Overview page, you will see the following message: "In order to deploy any
configuration from this tenant, you must create a trusted role in the tenant AWS account which will establish trust
with the AWS infra account. To do so, open the link below to run the CloudFormation template."
e) Click the Run the CloudFormation template link.
This returns you to the AWS sign in page, which should be pre-populated with the necessary AWS account information
that you entered earlier in these procedures in the Cisco Cloud Network Controller GUI.
f) Click Next in the AWS sign in page after verifying that the sign-in information is correct.
g) Run the tenant role cloud-formation template in the tenant account.
Alternatively, keep the trusted flag unchecked and provide the access and secret keys as done normally for
any tenant.
Note
Step 3
Click Save.
Creating an Application Profile Using the Cisco Cloud Network Controller GUI
This section explains how to create an application profile using the Cisco Cloud Network Controller GUI.
Before you begin
Create a tenant.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Application Management.
A list of Application Management options appear in the Intent menu.
Step 3
From the Application Management list in the Intent menu, click Create Application Profile. The Create Application
Profile dialog box appears.
Step 4
Enter a name in the Name field.
Step 5
Choose a tenant:
a) Click Select Tenant.
The Select Tenant dialog box appears.
b) From the Select Tenant dialog, click to choose a tenant in the left column then click Select.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
51
Configuring Cisco Cloud Network Controller Components
Creating a VRF Using the Cisco Cloud Network Controller GUI
You return to the Create Application Profile dialog box.
Step 6
Enter a description in the Description field.
Step 7
Click Save when finished.
Creating a VRF Using the Cisco Cloud Network Controller GUI
This section explains how to create a VRF using the Cisco Cloud Network Controller GUI.
Before you begin
Create a tenant.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Application Management.
A list of Application Management options appear in the Intent menu.
Step 3
From the Application Management list in the Intent menu, click Create VRF. The Create VRF dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create VRF Dialog Box Fields table then continue.
Table 6: Create VRF Dialog Box Fields
Properties
Description
General
Enter a name for the VRF in the Name field.
Name
All VRFs are assigned a vrfEncoded value. If the Tenant
and VRF name combination has more than 32 characters,
then, a VRF name (which also contains the tenant name) is
identified in the cloud router using the vrfEncoded value.
To see the vrfEncoded value, navigate to Application
Management > VRFs subtab. Click a VRF on the right
hand pane and look for Encoded VRF Name in Cloud
Router.
Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog box
appears.
b. From the Select Tenant dialog, click to choose a tenant
in the left column then click Select. You return to the
Create VRF dialog box.
Description
Enter a description of the VRF.
Settings > IPv4 unicast address family BGP targets
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
52
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties
Description
Add Filter
a. Click the Add Route Target option for the unicast
address family BGP target you want to configure.
b. Click to choose the following options for the Type field:
• Export—The route target can be exported to other
VRFs
• Import—The route target is imported from other
VRFs
• Enter the route target that can be exported from
the current VRF or imported into the current VRF
in the Route Target text box.
Step 5
When finished, click Save.
Creating an External Network Using the Cisco Cloud Network Controller GUI
This procedure describes how to create an external network. You can have a single external network that can
connect to multiple routers on the on-premises site, or you can have multiple external networks with multiple
VRFs that you can use to connect to CCRs.
Before you begin
You must have a hub network created before you can create an external network.
Step 1
In the left navigation bar, navigate to Application Management > External Networks.
The configured external networks are displayed.
Step 2
Click Actions, then choose Create External Network.
The Create External Network window appears.
Step 3
Enter the appropriate values in each field as listed in the following Create External Network Dialog Box Fields table then
continue.
Table 7: Create External Network Dialog Box Fields
Properties
Description
General
Name
Enter the name for the external network.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
53
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties
Description
VRF
This external VRF will be used for external connectivity with external non-ACI devices. You can create
multiple external VRFs for this purpose.
This VRF will be identified as an external VRF if the VRF has all three of the following characteristics:
• Configured under the infra tenant
• Associated with an external network
• Not associated with a cloud context profile
Any VRF that is associated with an external network becomes an external VRF. The external VRF is not
allowed to be associated with a cloud context profile or subnet.
To choose an external VRF:
a. Click Select VRF.
The Select VRF dialog box appears.
b. From the Select VRF dialog, click to choose a VRF in the left column.
You can also create a VRF using the + Create VRF option.
c. Click Select.
You return to the Create External Network dialog box.
Choose the router type:
Router Type
• CCR:
• Cisco Catalyst 8000V
• TGW: An AWS transit gateway router
Host Router Name
This field appears if you select CCR as the Router Type.
This field is not editable. The default host router is automatically selected.
Hub Network
This field appears if you select TGW as the Router Type.
To choose a hub network:
a. Click Select Hub Network.
The Select Hub Network dialog box appears.
b. In the Select Hub Network dialog box, click the desired hub network from the list and then click
Select.
You are returned to the Create External Network page.
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
54
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties
Description
Regions
To choose a region:
a. Click Add Regions.
The Select Regions dialog box appears.
The regions that you selected as part of the First Time Setup are displayed here.
b. From the Select Regions dialog, click to choose a region in the left column then click Select.
You return to the Create External Network dialog box.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
55
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties
Description
VPN Networks
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
56
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties
Description
The VPN networks entries are used for external connectivity. All configured VPN networks will be
applied to all the selected regions.
To add a VPN network:
a. Click Add VPN Network.
The Add VPN Network dialog box appears.
b. In the Name field, enter a name for the VPN network.
c. Click + Add IPsec Peer.
The Add IPsec Tunnel Destination window appears.
d. Enter values for the following fields for the IPsec tunnel destination that you want to add:
• Public IP of IPSec Tunnel Peer
• Pre-Shared Key
• IKE Version: Select ikev1 or ikev2 for IPsec tunnel connectivity
• BGP Peer ASN
• Subnet Pool Name: Click Select Subnet Pool Name.
The Select Subnet Pool Name dialog box appears. Select one of the available subnet pools that
are listed, then click Select.
• IPsec Tunnel Source Interfaces: Using the entries in this field, the Cisco Cloud Network
Controller creates one IPsec tunnel from each selected source interface to the destination IP
address.
Note
ikev2 is the default option in this field. The IPsec tunnel source interfaces feature is
supported only with the IKEv2 configuration.
gig3 is selected by default. Choose one or more from the following interfaces:
• gig2: The GigabitEthernet2 interface
• gig3: The GigabitEthernet3 interface
• gig4: The GigabitEthernet4 interface
Note
After you have configured the IPsec tunnel source interfaces in this external network,
you can then configure IPsec tunnel source interfaces in additional networks where
tunnels to the same destination can be formed, as described in Routing Policies:
Release 25.0(2), on page 7.
e. Click Add to add this IPsec tunnel destination.
You return to the Add VPN Network window.
Click + Add IPsec Peer if you want to add another IPsec tunnel destination.
f.
Click Add in the Add VPN Network dialog box.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
57
Configuring Cisco Cloud Network Controller Components
Configuring the Global Inter-VRF Route Leak Policy
Properties
Description
You return to the Create External Network dialog box.
Step 4
When you have finished creating the external network, click Save.
After you click Save in the Create External Network window, cloud routers are then configured in AWS.
Configuring the Global Inter-VRF Route Leak Policy
The global inter-VRF route leak policy feature is introduced in release 25.0(2).
Before you begin
Review the information provided in Global Inter-VRF Route Leak Policy, on page 8 before making any
changes in the Contract Based Routing area in the Cisco Cloud Network Controller Setup window.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Configuration.
A list of options appear in the Intent menu.
Step 3
From the Configuration list in the Intent menu, click Cisco Cloud Network Controller Setup.
The Set up - Overview dialog box appears.
Step 4
In the Contract Based Routing area, note the current setting for the Contract Based Routing field.
The Contract Based Routing setting reflects the current internal VRF route leak policy, which is a global policy under
the infra tenant where a Boolean flag is used to indicate whether contracts can drive routes in the absence of route maps:
• Off: Default setting. Indicates that routes are not leaked based on contracts, and are leaked based on route maps
instead.
• On: Indicates that routes are leaked based on contracts in the absence of route maps. When enabled, contracts drive
routing when route maps are not configured. When route maps exist, route maps always drives routing.
Step 5
Determine if you want to change the current setting for the Contract Based Routing field.
Follow these procedures if you toggle from one setting to another:
• Toggling from On setting to Off (disabling contract-based routing): In this situation, the assumption is that you
have contract-based routing configured currently and you want to toggle over to route map-based routing. This can
be disruptive if the route map-based routing is not configured before you toggle from contract-based routing to route
map-based routing.
Before toggling from the On setting to the Off setting in this situation, make the following changes:
a. Between all pairs of VRFs that have existing contracts, enable route map-based route leaking.
Follow the procedures provided in Configuring Leak Routes Using the Cisco Cloud Network Controller GUI,
on page 59.
b. Disable the contract-based route policy in the global policy.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
58
Configuring Cisco Cloud Network Controller Components
Configuring Leak Routes Using the Cisco Cloud Network Controller GUI
Toggle the switch in the Contract Based Routing field from the On setting to the Off setting to toggle from
contract-based routing to route map-based routing.
c. Change the routing to reflect any granularity that is required based on the new route map-based routing that you
enabled.
• Toggling from Off setting to On (enabling contract-based routing): In this situation, the assumption is that you
have route map-based routing configured currently and you want to toggle over to contract-based routing. This is
not a disruptive operation, but rather is an additive operation, since both contracts and route maps can be enabled
between a pair of VRFs. In that situation, route maps take precedence over contracts when enabling routing. With
route map-based routing enabled, adding contract-based routing should be non-disruptive.
For that reason, you do not have to make any changes before toggling from the Off setting to the On setting in this
situation. However, if you do not want to have both contracts and route maps enabled between a pair of VRFs, and
you want to move completely to contract-based routing, you should completely set up contracts between the VRFs
and delete the route maps between the VRFs before toggling to the On setting in the Contract Based Routing field.
Step 6
If you want to change the current setting for the Contract Based Routing area, toggle the setting based on the type of
routing that you want.
Step 7
Click Done when you have finished the Cisco Cloud Network Controller Setup configurations.
Configuring Leak Routes Using the Cisco Cloud Network Controller GUI
The procedures for configuring leak routes using the Cisco Cloud Network Controller GUI will vary slightly,
depending on the release:
• For releases prior to 25.0(2), you can configure an independent routing policy to specify which routes
to leak between internal and external VRFs when you are setting up routing between an ACI cloud site
and an external destination using the external connectivity feature. See Configuring Inter-VRF Route
Leaking Using the Cisco Cloud Network Controller GUI, on page 59 for those procedures.
• For releases 25.0(2) and later, support is available for route maps-based route leaking between a pair of
internal VRFs. See Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller
GUI, on page 62 for those procedures.
Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network Controller GUI
Configuring leak routes is part of the release 25.0(1) update where routing and security policies are configured
separately. Using inter-VRF routing, you can configure an independent routing policy to specify which routes
to leak between internal and external VRFs when you are setting up routing between an ACI cloud site and
an external destination using the external connectivity feature. See Understanding Supported Routing and
Security Policies, on page 5 for more information.
The external destination must be configured manually using the Enabling Connectivity From the AWS Site
to External Devices, on page 64 procedures. The external destination could be another cloud site, an ACI
on-premises site or a branch office.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
59
Configuring Cisco Cloud Network Controller Components
Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network Controller GUI
Note
• Use these procedures to configure routing policies independent of security policies only between internal
and external VRFs, based on updates provided in release 25.0(1).
• Do not use these procedures to configure routing between a pair of internal VRFs; use contracts as you
normally would prior to release 25.0(1) in that case.
Step 1
In the left navigation bar, navigate to Application Management > VRFs.
The configured VRFs are displayed.
Step 2
Click the Leak Routes tab.
Any already-configured leak routes are displayed.
Step 3
Click Actions, then choose Create Leak Route.
The Create Leak Route window appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Leak Routes Dialog Box Fields table then
continue.
Table 8: Create Leak Routes Dialog Box Fields
Properties
Description
Source VRF
To choose a source VRF:
a. Click Select a Source VRF.
The Select a VRF dialog box appears.
b. From the Select a VRF dialog, click to choose a VRF in the left column to use for the source VRF.
Note that the source VRF can be an internal or an external VRF.
c. Click Select to select this source VRF.
You return to the Create Leak Route dialog box.
Destination VRF
To choose a destination VRF:
a. Click Select a Destination VRF.
The Select a VRF dialog box appears.
b. From the Select a VRF dialog, click to choose a VRF in the left column to use for the destination
VRF.
Note that the destination VRF cannot be an internal VRF if the source VRF is also internal VRF.
c. Click Select to select this destination VRF.
You return to the Create Leak Route dialog box.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
60
Configuring Cisco Cloud Network Controller Components
Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network Controller GUI
Properties
Description
Type
Choose the type of leaked route that you want to configure:
• Leak All: Select to configure all routes to leak from the source VRF to the destination VRF.
The entry 0.0.0.0/0 is entered automatically in the subnet IP area by default in this case.
• Subnet IP: Select to configure a specific subnet IP address as the route to leak from the source VRF
to the destination VRF. The Subnet IP box appears.
In the Subnet IP box, enter a subnet IP address as the route to leak between VRFs.
Step 5
When finished, click Save.
The Success window appears.
Step 6
Determine if you want to configure additional inter-VRF route leaking.
• If you want to add another route to leak between a pair of VRFs, click the Add Another Leak Route option in
the Success window.
You are returned to the Add Leak Route window. Repeat Step 4, on page 60 through Step 5, on page 61 to
configure another route to leak between a pair of VRFs.
• If you want to add a reverse route, where:
• The destination VRF from the previous configuration now becomes the source VRF, and
• The source VRF from the previous configuration now becomes the destination VRF
Then click the Add Reverse Leak Route option in the Success window.
You are returned to the Add Leak Route window. Repeat Step 4, on page 60 through Step 5, on page 61 to
configure another route, but this time:
• In the Source VRF field, select the VRF that you had selected as a destination VRF in the previous
configuration.
• In the Destination VRF field, select the VRF that you had selected as a source VRF in the previous
configuration.
Step 7
When you have finished configuring leak routes, click Done.
The Leak Routes tab in the main VRFs page is displayed again, with the newly configured leak route displayed.
Step 8
To get more information on a source or destination VRF, or to make changes to a configured leak route, double-click
the VRF in the Leak Routes tab in the main VRFs page.
The Overview page for that VRF is displayed.
Step 9
Click the Application Management tab at the top of the VRF page, then click the Leak Routes tab in the left nav bar.
The leak routes associated with this particular VRF are displayed.
Step 10
Configure additional leak routes associated with this VRF, if necessary.
• To add a leak route from this VRF, click Actions, then choose Add Leak Route from <VRF_name>.
The Add Leak Route window appears. Enter the necessary information as you did previously using the information
in Step 4, on page 60. Note that the entry in the Source VRF is pre-selected and cannot be changed in this situation.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
61
Configuring Cisco Cloud Network Controller Components
Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller GUI
• To add a leak route to this VRF, click Actions, then choose Add Leak Route to <VRF_name>.
The Add Leak Route window appears. Enter the necessary information as you did previously using the information
in Step 4, on page 60. Note that the entry in the Destination VRF is pre-selected and cannot be changed in this
situation.
What to do next
You have now configured the routing policy. Since the routing and security policies are separate, you now
need to configure the security policy separately:
• Creating an EPG Using the Cisco Cloud Network Controller GUI, on page 68: Use these procedures to
create an external EPG.
• Creating a Contract Using the Cisco Cloud Network Controller GUI, on page 73: Use these procedures
to create a contract between the external EPG and the cloud EPG.
Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller GUI
Beginning with release 25.0(2), support is available for route maps-based route leaking between a pair of
internal VRFs, as described in Route Leaking Between Internal VRFs, on page 7. This feature is an extension
of the routing and security split update provided in release 25.0(1), where routing and security policies are
configured separately.
Step 1
In the left navigation bar, navigate to Application Management > VRFs.
The configured VRFs are displayed.
Step 2
Click the Leak Routes tab.
Any already-configured leak routes are displayed.
Step 3
Click Actions, then choose Create Leak Route.
The Create Leak Route window appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Leak Routes Dialog Box Fields table then
continue.
Table 9: Create Leak Routes Dialog Box Fields
Properties
Description
Source VRF
To choose a source VRF:
a. Click Select a Source VRF.
The Select a VRF dialog box appears.
b. From the Select a VRF dialog, click to choose a VRF in the left column to use for the source VRF.
Because this procedure is for route maps-based route leaking between a pair of internal VRFs, choose
an internal VRF for the source VRF.
c. Click Select to select this source VRF.
You return to the Create Leak Route dialog box.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
62
Configuring Cisco Cloud Network Controller Components
Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller GUI
Properties
Description
Destination VRF
To choose a destination VRF:
a. Click Select a Destination VRF.
The Select a VRF dialog box appears.
b. From the Select a VRF dialog, click to choose a VRF in the left column to use for the destination
VRF.
Because this procedure is for route maps-based route leaking between a pair of internal VRFs, choose
an internal VRF for the destination VRF.
c. Click Select to select this destination VRF.
You return to the Create Leak Route dialog box.
Type
Choose the type of leaked route that you want to configure:
• Leak All: Select to configure all routes to leak from the source VRF to the destination VRF.
The entry 0.0.0.0/0 is entered automatically in the subnet IP area by default in this case.
• Subnet IP: Select to configure a specific subnet IP address as the route to leak from the source VRF
to the destination VRF. The Subnet IP box appears.
In the Subnet IP box, enter a subnet IP address as the route to leak between VRFs.
Step 5
When finished, click Save.
The Success window appears.
Step 6
Determine if you want to configure additional inter-VRF route leaking.
• If you want to add another route to leak between a pair of VRFs, click the Add Another Leak Route option in
the Success window.
You are returned to the Add Leak Route window. Repeat Step 4, on page 62 through Step 5, on page 63 to
configure another route to leak between a pair of VRFs.
• If you want to add a reverse route, where:
• The destination VRF from the previous configuration now becomes the source VRF, and
• The source VRF from the previous configuration now becomes the destination VRF
Then click the Add Reverse Leak Route option in the Success window.
You are returned to the Add Leak Route window. Repeat Step 4, on page 62 through Step 5, on page 63 to
configure another route, but this time:
• In the Source VRF field, select the VRF that you had selected as a destination VRF in the previous
configuration.
• In the Destination VRF field, select the VRF that you had selected as a source VRF in the previous
configuration.
Step 7
When you have finished configuring leak routes, click Done.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
63
Configuring Cisco Cloud Network Controller Components
Enabling Connectivity From the AWS Site to External Devices
The Leak Routes tab in the main VRFs page is displayed again, with the newly configured leak route displayed.
Step 8
To get more information on a source or destination VRF, or to make changes to a configured leak route, double-click
the VRF in the Leak Routes tab in the main VRFs page.
The Overview page for that VRF is displayed.
Step 9
Click the Application Management tab at the top of the VRF page, then click the Leak Routes tab in the left nav bar.
The leak routes associated with this particular VRF are displayed.
Step 10
Configure additional leak routes associated with this VRF, if necessary.
• To add a leak route from this VRF, click Actions, then choose Add Leak Route from <VRF_name>.
The Add Leak Route window appears. Enter the necessary information as you did previously using the information
in Step 4, on page 62. Note that the entry in the Source VRF is pre-selected and cannot be changed in this situation.
• To add a leak route to this VRF, click Actions, then choose Add Leak Route to <VRF_name>.
The Add Leak Route window appears. Enter the necessary information as you did previously using the information
in Step 4, on page 62. Note that the entry in the Destination VRF is pre-selected and cannot be changed in this
situation.
Enabling Connectivity From the AWS Site to External Devices
Follow these procedures to manually enable IPv4 connectivity from the infra VPC CCRs to any external
device with IPSec/BGP.
Downloading the External Device Configuration Files
Step 1
In the Cisco Cloud Network Controller GUI, click on Dashboard.
The Dashboard view for the Cisco Cloud Network Controller appears.
Step 2
Navigate to Infrastructure > External Connectivity.
The External Connectivity window appears.
Step 3
Click Actions > Download External Device Configuration Files.
The Download External Device Configuration Files pop-up appears.
Step 4
Select the external device configuration files to download and click Download.
This action downloads a zip file that contains configuration information that you will use to manually configure the
external device for IPv4 connectivity to the CCRs.
Enabling Connectivity From the AWS Site to External Devices
Step 1
Gather the necessary information that you will need to manually enable IPv4 connectivity from the infra VPC CCRs to
any external device without EVPN.
Step 2
Log into the external device.
Step 3
Enter the configuration information to connect an external networking device.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
64
Configuring Cisco Cloud Network Controller Components
Enabling Connectivity From the AWS Site to External Devices
If you downloaded the external device configuration files using the instructions in Downloading the External Device
Configuration Files, on page 64, locate the configuration information for the first tunnel and enter that configuration
information.
Following is an example of what the external device configuration file might look like for the first tunnel:
! The following file contains configuration recommendation to connect an external networking device
with the cloud ACI Fabric
! The configurations here are provided for an IOS-XE based device. The user is expected to understand
the configs and make any necessary amends before using them
! on the external device. Cisco does not assume any responsibility for the correctness of the config.
! Tunnel to 128.107.72.122 1.100 [ikev2] for
hctunnIf.acct-[infra]/region-[westus]/context-[overlay-1]-addr-[10.115.9.128/25]/csr-[ct_routerp_westus_0:0]/tunn-34
! USER-DEFINED: please define gig-gateway: GIG-GATEWAY
! USER-DEFINED: please define GigabitEthernet2 if required
! USER-DEFINED: please define tunnel-id: 100 if required
! USER-DEFINED: please define vrf-name: infra:externalvrf1 if required
! USER-DEFINED: please define gig3-public-ip: 13.88.168.176 if 0.0.0.0 ip still not provided by AWS.
! Device:
128.107.72.122
! Tunnel ID:
100
! Tunnel counter:
1
! Tunnel address:
5.16.1.9
! Tunnel Dn:
acct-[infra]/region-[westus]/context-[overlay-1]-addr-[10.115.9.128/25]/csr-[ct_routerp_westus_0:0]/tunn-34
! VRF name:
infra:externalvrf1
! ikev:
ikev2
! Bgp Peer addr:
5.16.1.10
! Bgp Peer asn:
65015
! Gig3 Public ip:
13.88.168.176
! PreShared key:
device1azure
! ikev profile name: ikev2-100
vrf definition infra:externalvrf1
rd 1:1
address-family ipv4
route-target export 64550:1
route-target import 64550:1
exit-address-family
exit
crypto ikev2 proposal ikev2-infra:externalvrf1
encryption aes-cbc-256 aes-cbc-192 aes-cbc-128
integrity sha512 sha384 sha256 sha1
group 24 21 20 19 16 15 14 2
exit
crypto ikev2 policy ikev2-infra:externalvrf1
proposal ikev2-infra:externalvrf1
exit
crypto ikev2 keyring keyring-ikev2-100
peer peer-ikev2-keyring
address 13.88.168.176
pre-shared-key device1azure
exit
exit
crypto ikev2 profile ikev2-100
match address local interface GigabitEthernet2
match identity remote address 13.88.168.176 255.255.255.255
identity local address 128.107.72.122
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
65
Configuring Cisco Cloud Network Controller Components
Enabling Connectivity From the AWS Site to External Devices
authentication remote pre-share
authentication local pre-share
keyring local keyring-ikev2-100
lifetime 3600
dpd 10 5 on-demand
exit
crypto ipsec transform-set ikev2-100 esp-gcm 256
mode tunnel
exit
crypto ipsec profile ikev2-100
set transform-set ikev2-100
set pfs group14
set ikev2-profile ikev2-100
exit
interface Tunnel100
vrf forwarding infra:externalvrf1
ip address 5.16.1.10 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1400
tunnel source GigabitEthernet2
tunnel mode ipsec ipv4
tunnel destination 13.88.168.176
tunnel protection ipsec profile ikev2-100
exit
ip route 13.88.168.176 255.255.255.255 GigabitEthernet2 GIG-GATEWAY
router bgp 65015
address-family ipv4 vrf infra:externalvrf1
redistribute connected
maximum-paths eibgp 32
neighbor
neighbor
neighbor
neighbor
5.16.1.9
5.16.1.9
5.16.1.9
5.16.1.9
remote-as 65008
ebgp-multihop 255
activate
send-community both
distance bgp 20 200 20
exit-address-family
The following figures provide more information on what each set of fields is used for in the external device configuration
file:
• The fields shown in the following figure are used to configure these areas:
• VRF definition
• IPSec global configurations
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
66
Configuring Cisco Cloud Network Controller Components
Enabling Connectivity From the AWS Site to External Devices
• The fields shown in the following figure are used to configure these areas:
• IPSec and ikev1 per tunnel configurations
• BGP configurations for the VRF neighbor
• The fields shown in the following figure are used to configure these areas:
• Ikev2 global configurations
• IPSec and ikev2 per tunnel configurations
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
67
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Step 4
Repeat the previous step to configure additional tunnels.
Creating an EPG Using the Cisco Cloud Network Controller GUI
This section explains how to create an EPG using the Cisco Cloud Network Controller GUI. Each service
needs at least one consumer EPG and one provider EPG.
Before you begin
Create an application profile and a VRF.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Application Management.
A list of Application Management options appear in the Intent menu.
Step 3
From the Application Management list in the Intent menu, click Create EPG. The Create EPG dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create EPG Dialog Box Fields table then continue.
Table 10: Create EPG Dialog Box Fields
Properties
Description
Name
Enter the name of the EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
68
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Properties
Description
Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog box
appears.
b. From the Select Tenant dialog, click to choose a tenant
in the left column then click Select. You return to the
Create EPG dialog box.
Application Profile
To choose an application profile:
a. Click Select Application Profile. The Select
Application Profile dialog box appears.
b. From the Select Application Profile dialog, click to
choose an application profile in the left column then
click Select. You return to the Create EPG dialog box.
Description
Enter a description of the EPG.
Settings
Type
Choose the EPG type:
• Cloud - Click to create the EPG in the cloud.
• External - Click to create an external EPG.
Route Reachability
(Visible when creating an external EPG) Click the Route
Reachability drop-down list and choose:
• On Premises
• Internet
• Unspecified
VRF
To choose a VRF:
a. Click Select VRF. The Select VRF dialog box appears.
b. From the Select VRF dialog, click to choose a VRF in
the left column then click Select. You return to the
Create EPG dialog box.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
69
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Properties
Description
Endpoint Selectors
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
70
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Properties
Description
Note
See Configuring Instances in AWS, on page 79
for instructions on configuring instances in AWS
as part of the endpoint selector configuration
process.
To add an endpoint selector:
a. Click Add Endpoint Selector to open the Add
Endpoint Selector dialog.
b. In the Add Endpoint Selector dialog, enter a name in
the Name field.
c. Click Selector Expression. The Key, Operator, and
Value fields are enabled.
d. Click the Key drop-down list to choose a key. The
options are:
• Choose IP if you want to use an IP address or
subnet for the endpoint selector.
• Choose Zone if you want to use an availability
zone for the endpoint selector.
• Choose Region if you want to use the Amazon
Web Services region for the endpoint selector.
• Choose Custom if you want to create a custom
key for the endpoint selector.
Note
When choosing the Custom option, the
drop-down list becomes a text box. You
need to enter a name for the key in the
spaces after custom: (for example,
custom: Location).
e. Click the Operator drop-down list to choose an
operator. The options are:
• equals: Used when you have a single value in the
Value field.
• not equals: Used when you have a single value in
the Value field.
• in: Used when you have multiple comma-separated
values in the Value field.
• not in: Used when you have multiple
comma-separated values in the Value field.
• has key: Used if the expression contains only a
key.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
71
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Properties
Description
• does not have key: Used if the expression contains
only a key.
f.
Enter a value in the Value field then click the check
mark to validate the entries. The value you enter
depends on the choices you made for the Key and
Operator fields. For example, if the Key field is set to
IP and the Operator field is set to equals, the Value
field must be an IP address or subnet. However, if the
Operator field is set to has key, the Value field is
disabled.
g. When finished, click the check mark to validate the
selector expression.
h. Determine if you want to create additional endpoint
selector expressions to the endpoint selector. If you
create more than one expression under a single endpoint
selector, a logical AND exists between those
expressions.
For example, assume you created two sets of
expressions under a single endpoint selector:
• Endpoint selector 1, expression 1:
• Key: Zone
• Operator: equals
• Value: us-west-1a
• Endpoint selector 1, expression 2:
• Key: IP
• Operator: equals
• Value: 192.0.2.1/24
In this case, if both of these expressions are true (if the
availability zone is us-west-1a AND if the IP address
belongs to subnet 192.0.2.1/24), then that endpoint is
assigned to the Cloud EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
72
Configuring Cisco Cloud Network Controller Components
Creating a Contract Using the Cisco Cloud Network Controller GUI
Properties
Description
i.
Click the check mark after every additional expression
that you want to create under this endpoint selector then
click Add when finished.
If you create more than one endpoint selector under an
EPG, a logical OR exists between those endpoint
selectors. For example, assume you had created
endpoint selector 1 as described in the previous step,
and then you created a second endpoint selector as
described below:
• Endpoint selector 2, expression 1:
• Key: Region
• Operator: in
• Value: us-east-1, us-east-2
In this case:
• If the availability zone is us-west-1a AND the IP
address belongs to the 192.0.2.1/24 subnet
(endpoint selector 1 expressions)
OR
• If the region is either us-east-1 or us-east-2
(endpoint selector 2 expression)
Then that end point is assigned to the Cloud EPG.
Step 5
Click Save when finished.
Creating a Contract Using the Cisco Cloud Network Controller GUI
This section explains how to create a contract using the Cisco Cloud Network Controller GUI.
Before you begin
Create filters.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Application Management.
A list of Application Management options appear in the Intent menu.
Step 3
From the Application Management list in the Intent menu, click Create Contract. The Create Contract dialog box
appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
73
Configuring Cisco Cloud Network Controller Components
Creating a Contract Using the Cisco Cloud Network Controller GUI
Step 4
Enter the appropriate values in each field as listed in the following Create Contract Dialog Box Fields table then continue.
Table 11: Create Contract Dialog Box Fields
Properties
Description
Name
Enter the name of the contract.
Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog box
appears.
b. From the Select Tenant dialog, click to choose a tenant
in the left column then click Select. You return to the
Create Contract dialog box.
Description
Enter a description of the contract.
Settings
The scope limits the contract to any endpoint groups within
the same application profile, within the same VRF instance,
throughout the fabric (globally), or within the same tenant.
Scope
Note
Shared services enables communication between
EPGs in different tenants and between EPGs in
different VRFs.
To enable EPGs in one tenant to communicate
with EPGs in another tenant, choose Global
scope.
To enable an EPG in one VRF to communicate
with another EPG in a different VRF, choose
Global or Tenant scope.
For more information about shared services, see
Shared Services, on page 39
Click the drop-down arrow to choose from the following
scope options:
• Application Profile
• VRF
• Global
• Tenant
Apply Filter in Both Directions
Put a check in the box to apply the same filters to traffic
from consumer-to-provider and provider-to-consumer. Do
not put a check in the box if you want to apply different
filters for each direction of traffic.
The check box is enabled by default.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
74
Configuring Cisco Cloud Network Controller Components
Specifying Consumer and Provider EPGs Using the Cisco Cloud Network Controller
Properties
Description
Add Filter
To choose a filter:
a. Click Add Filter. The filter row appears with a Select
Filter option.
b. Click Select Filter. The Select Filter dialog box
appears.
c. From the Select Filter dialog, click to choose a filter
in the left column then click Select. You return to the
Create Contract dialog box.
Step 5
Click Save when finished.
Specifying Consumer and Provider EPGs Using the Cisco Cloud Network
Controller
This section explains how to specify an EPG as a consumer or a provider.
Before you begin
• You have configured a contract.
• You have configured an EPG.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Configuration.
A list of Configuration options appears in the Intent menu.
Step 3
From the Configuration list in the Intent menu, click EPG Communication. The EPG Communication dialog box
appears with the Consumer EPGs, Contract, and Provider EPGs information.
Step 4
To choose a contract:
a) Click Select Contract. The Select Contract dialog appears.
b) In the pane on the left side of the Select Contract dialog, click to choose a contract then click Select. The Select
Contract dialog box closes.
Step 5
To add a consumer EPG:
a) Click Add Consumer EPGs. The Select Consumer EPGs dialog appears.
b) In the pane on the left side of the Select Consumer EPGs dialog, click to place a check in a check box to choose an
EPG.
Step 6
To add a provider EPG:
a) Click Add Provider EPGs. The Select Provider EPGs dialog appears.
b) In the pane on the left side of the Select Provider EPGs dialog, click to place a check in a check box to choose a
provider EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
75
Configuring Cisco Cloud Network Controller Components
Creating a Filter Using the Cisco Cloud Network Controller GUI
c) When finished, click Select. The Select Provider EPGs dialog box closes.
Creating a Filter Using the Cisco Cloud Network Controller GUI
This section explains how to create a filter using the Cisco Cloud Network Controller GUI.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Application Management.
A list of Application Management options appear in the Intent menu.
Step 3
From the Application Management list in the Intent menu, click Create Filter. The Create Filter dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Filter Dialog Box Fields table then continue.
Table 12: Create Filter Dialog Box Fields
Properties
Description
Name
Enter a name for the filter in the Name field.
Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog box
appears.
b. From the Select Tenant dialog, click to choose a tenant
in the left column then click Select. You return to the
Create Filter dialog box.
Description
Enter a description of the filter.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
76
Configuring Cisco Cloud Network Controller Components
Creating a Filter Using the Cisco Cloud Network Controller GUI
Properties
Description
Add Filter
To add a filter:
a. Click Add Filter Entry. The Create Filter Entry
dialog box appears.
b. Enter a name for the filter entry in the Name field.
c. From the Select Filter dialog, click to choose a filter
in the left column then click Select. You return to the
Create Contract dialog box.
d. Click the Ethernet Type drop-down list to choose an
ethernet type. The options are:
• IP
• Unspecified
Note
When Unspecified is chosen, the
remaining fields are disabled.
e. Click the IP Protocol drop-down menu to choose a
protocol. The options are:
• icmp
• tcp
• udp
• Unspecified
Note
f.
The remaining fields are enabled only
when tcp or udp is chosen.
Enter the appropriate port information in the Origin
Port from and to fields.
g. Enter the appropriate port information in the
Destination Port from and to fields.
h. When finished entering filter entry information, click
Add. You return to the Create Filter dialog box where
you can repeat the steps to add another filter entry.
Step 5
When finished, click Save.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
77
Configuring Cisco Cloud Network Controller Components
Creating a Cloud Context Profile Using the Cisco Cloud Network Controller GUI
Creating a Cloud Context Profile Using the Cisco Cloud Network Controller
GUI
This section explains how to create a cloud context profile using the Cisco Cloud Network Controller GUI.
Before you begin
Create a VRF.
Step 1
Navigate to Application Management > Cloud Context Profiles.
The list of configure cloud context profiles appears.
Step 2
Click Actions > Create Cloud Context Profile.
The Create Cloud Context Profile dialog box appears.
Step 3
Enter the appropriate values in each field as listed in the following Cloud Context Profile Dialog Box Fields table then
continue.
Table 13: Create Cloud Context Profile Dialog Box Fields
Properties
Description
Name
Enter the name of the cloud context profile.
Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog box appears.
b. From the Select Tenant dialog, click to choose a tenant in the left column then click
Select. You return to the Create Cloud Context Profile dialog box.
Description
(Optional) Enter a description of the cloud context profile.
Settings
Select Region
To choose a region:
a. Click Select Region. The Select Region dialog box appears.
b. From the Select Region dialog, click to choose a region in the left column then click
Select. You return to the Create Cloud Context Profile dialog box.
Select VRF
To choose a VRF:
a. Click Select VRF. The Select VRF dialog box appears.
b. From the Select VRF dialog box, click to choose a VRF in the left column then click
Select. You return to the Create Cloud Context Profile dialog box.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
78
Configuring Cisco Cloud Network Controller Components
Configuring Instances in AWS
Properties
Description
Add CIDR
Note
The following subnets are reserved and should not be used in this Add CIDR
field:
• 169.254.0.0/16 (reserved for VPN tunnel to the transit gateway)
• 192.168.100.0/24 (reserved by the CCR for the bridge domain interface)
To add a CIDR:
a. Click Add CIDR. The Add CIDR dialog box appears.
b. Enter the address in the Address field.
c. Click Add Subnet and enter the subnet address in the Address field.
d. To add availability zones:
1. Click Select Availability Zone. The Select Availability Zone dialog box appears.
2. From the Select Availability Zone dialog box, click to choose an availability zone
in the left column.
Beginning with release 25.0(2), the type of availability zone shown in this window
varies depending on the type of tenant that you selected for this cloud context profile.
Note
If you are creating a cloud context profile in a user tenant, you are
restricted to only cloud availability zones in this window.
See Availability Zones, on page 27 for more information.
3. Click Select
You return to the Create Cloud Context Profile dialog box.
e. Click to check (enabled) or uncheck (disabled) the Primary check box.
f.
When finished, click Add.
VPN Gateway Router
(Optional) Click to check (enabled) or uncheck (disabled) in the VPN Gateway Router
check box.
TGW Attachment
(Optional) Click to check (enabled) or uncheck (disabled) in the TGW Attachment check
box.
Step 4
Click Save when finished.
Configuring Instances in AWS
When you configure endpoint selectors for Cisco Cloud Network Controller, you will also need to configure
the instances that you will need in AWS that will correspond with the endpoint selectors that you configure
for Cisco Cloud Network Controller.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
79
Configuring Cisco Cloud Network Controller Components
Configuring Instances in AWS
This topic provides the instructions for configuring the instances in AWS. You can use these procedures to
configure the instances in AWS either before you configure the endpoint selectors for Cisco Cloud Network
Controller or afterward. For example, you might go to your account in AWS and create a custom tag or label
in AWS first, then create an endpoint selector using a custom tag or label in Cisco Cloud Network Controller
afterward. Or you might create an endpoint selector using a custom tag or label in Cisco Cloud Network
Controller first, then go to your account in AWS and create a custom tag or label in AWS afterward.
Step 1
Review your cloud context profile configuration settings and determine which settings you will use with your AWS
instance.
You must configure a cloud context profile as part of the AWS instance configuration process. When you configure a
cloud context profile, the configurations, such as the VRF and region settings, are pushed out to AWS afterward.
a) From the Navigation menu, choose the Application Management tab.
When the Application Management tab expands, a list of subtab options appear.
b) Choose the Cloud Context Profiles subtab option.
A list of the cloud context profiles that you have created for your Cisco Cloud Network Controller are displayed.
c) Select the cloud context profile that you will use as part of this AWS instance configuration process.
Various configuration parameters are displayed for this cloud context profile, such as the region, VRF, IP address
and subnets. Use the information displayed in this window when you configure the AWS instance.
Step 2
Log in to the Amazon Web Services account for the Cisco Cloud Network Controller user tenant, if you are not logged
in already.
Step 3
Go to Services > EC2 > Instances > Launch Instance.
Step 4
In the Choose an Amazon Machine Image (AMI) page, select an Amazon Machine Image (AMI).
Step 5
In the Choose an Instance Type page, select an instance type, then click Configure Instance Details.
Step 6
In the Configure Instance Details page, enter the necessary information in the appropriate fields.
• In the Network field, select your Cisco Cloud Network Controller VRF.
This would be the VRF that is associated with the cloud context profile that you are using as part of this AWS
instance configuration process.
• In the Subnet field, select the subnet.
• In the Auto-assign Public IP field, if you want to have a public IP, select Enable from the scroll-down menu.
Step 7
When you have finished entering the necessary information into the Configure Instance Details page, click Add
Storage.
Step 8
In the Add Storage page, accept the default values or configure the storage in this page, if necessary, and click Add
Tags.
Step 9
In the Add Tags page, click Add Tag and enter the necessary information in the appropriate fields in this page.
Note
If you will be using IP Address, Region or Zone for the type of endpoint selector later in these procedures,
you do not have to enter any information in this page. In those situations, when you start the instance in AWS,
the IP address, region or zone will be discovered by the Cisco Cloud Network Controller and the endpoint
will be assigned to the EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
80
Configuring Cisco Cloud Network Controller Components
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI
• Key: Enter the key that you will use when you create a custom tag for the type of endpoint selector that you are
adding later in these procedures.
• Value: Enter the value that you will be using for this key.
• Instances: Check the box for this field.
• Volumes: Check the box for this field.
For example, if you are planning on creating a custom tag for a specific building for your endpoint selector later in
these procedures (such as building6), you might enter the following values in these fields on this page:
• Key: Location
• Value: building6
Step 10
Click Review and Launch.
The Select an existing key pair or create a new key pair page appears. Use the information in this page if you want
to ssh to the instance later on.
Creating a Backup Configuration Using the Cisco Cloud Network Controller
GUI
This section explains how to create a backup configuration.
Before you begin
Create a remote location and a scheduler, if needed.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Operations.
A list of Operations options appear in the Intent menu.
Step 3
From the Operations list in the Intent menu, click Create Backup Configuration. The Create Backup Configuration
dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Backup Configuration Dialog Box Fields table
then continue.
Table 14: Create Backup Configuration Dialog Box Fields
Properties
Description
General
Name
Enter the name of the backup configuration.
Description
Enter a description of the backup configuration.
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
81
Configuring Cisco Cloud Network Controller Components
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI
Properties
Description
Backup Destination
Choose a backup destination.
• Local
• Remote
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
82
Configuring Cisco Cloud Network Controller Components
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI
Properties
Description
Backup Object
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
83
Configuring Cisco Cloud Network Controller Components
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI
Properties
Description
Choose the root hierarchical content to consider for the
backup
• Policy Universe
• Selector Object—When chosen, this option adds the
Object Type drop-down list and Object DN field.
a. From the Object Type drop-down list, choose
from the following options:
• Tenant—When chosen the Select Tenant
option appears.
• Application Profile—When chosen the
Select Application Profile option appears.
• EPG—When chosen the Select EPG option
appears.
• Contract—When chosen the Select Contract
option appears.
• Filter—When chosen the Select Filter option
appears.
• VRF—When chosen the Select VRFoption
appears.
• Device—When chosen the Select
fvcloudLBCtxoption appears.
• Service Graph—When chosen the Select
Service Graph option appears.
• Cloud Context Profile—When chosen the
Select Cloud Context Profile option appears.
b. Click the Select <object_name>. The Select
<object_name> dialog appears.
c. From the Select <object_name> dialog, click to
choose from the options in the left column then
click Select. You return to the Create Backup
Configuration dialog box.
Note
The Object DN field is automatically
populated with the DN of the object it
will use as root of the object tree to
backup
• Enter DN—When chosen, this option displays the
Object DN field.
a. From the Object DN field, enter the DN of a
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
84
Configuring Cisco Cloud Network Controller Components
Creating a Tech Support Policy Using the Cisco Cloud Network Controller GUI
Properties
Description
specific object to use as the root of the object tree
to backup.
a. Click Select Scheduler to open the Select Scheduler
dialog and choose a scheduler from the left-side column.
Scheduler
b. Click the Select button at the bottom-right corner when
finished.
Choose one of the following:
Trigger Backup After Creation
• Yes—(Default) Trigger a backup after creating the
backup configuration.
• No—Do not trigger a backup after creating the backup
configuration.
Step 5
Click Save when finished.
Creating a Tech Support Policy Using the Cisco Cloud Network Controller GUI
This section explains how to create a tech support policy.
Before you begin
When creating a tech support policy for a remote location, you must first create the remote location.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Operations.
A list of Operations options appear in the Intent menu.
Step 3
From the Operations list in the Intent menu, click Create Tech Support. The Create Tech Support dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Tech Support Dialog Box Fields table then
continue.
Table 15: Create Tech Support Dialog Box Fields
Properties
Description
General
Name
Enter the name of the tech support policy.
Description
Enter a description of the tech support.
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
85
Configuring Cisco Cloud Network Controller Components
Creating a Trigger Scheduler Using the Cisco Cloud Network Controller GUI
Properties
Description
Export Destination
Choose an export destination.
• Controller
• Remote Location—When chosen the Select Remote
Location option appears.
a. Click Select Remote Location. The Select
Remote Location dialog box appears.
b. From the Select Remote Location dialog, click
to choose a remote location in the left column then
click Select. You return to the Create Tech
Suport dialog box.
Step 5
Include Pre-Upgrade Logs
Click to place a check in the Enabled check box if you
want to include pre-upgrade logs in the tech support policy.
Trigger After Creation
Click to place a check in the Enabled (the default) check
box if you want to create the tech support policy after the
policy creation. To disable, click the check box to uncheck.
Click Save when finished.
Creating a Trigger Scheduler Using the Cisco Cloud Network Controller GUI
This section explains how to create a trigger scheduler.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Operations.
A list of Operations options appear in the Intent menu.
Step 3
From the Operations list in the Intent menu, click Create Scheduler. The Create Trigger Scheduler dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Trigger Scheduler Dialog Box Fields table
then continue.
Table 16: Create Trigger Scheduler Dialog Box Fields
Properties
Description
General
Name
Enter the name of the trigger scheduler policy.
Description
Enter a description of the trigger scheduler.
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
86
Configuring Cisco Cloud Network Controller Components
Creating a Trigger Scheduler Using the Cisco Cloud Network Controller GUI
Properties
Description
Recurring Windows
Click Add Recurring Window. The Add Recurring
Window dialog appears.
a. From the Schedule drop-down list, choose from the
following.
• every-day
• Monday
• Tuesday
• Wednesday
• Thursday
• Friday
• Saturday
• Sunday
• odd-day
• even-day
b. From the Start Time field, enter a time.
c. From the Maximum Concurrent Tasks field, enter a
number or leave the field empty to specify unlimited.
d. From the Maximum Running Time, click to choose
Unlimited or Custom.
e. Click Add when finished.
Add One Time Window
Click Add One Time Window. The Add One Time
Window dialog appears.
a. From the Start Time field, enter a date and time.
b. From the Maximum Concurrent Tasks field, enter a
number or leave the field blank to specify unlimited.
c. From the Maximum Running Time, click to choose
Unlimited or Custom.
d. Click Add when finished.
Step 5
Click Save when finished.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
87
Configuring Cisco Cloud Network Controller Components
Creating a Remote Location Using the Cisco Cloud Network Controller GUI
Creating a Remote Location Using the Cisco Cloud Network Controller GUI
This section explains how to create a remote location using the Cisco Cloud Network Controller.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Operations.
A list of Operations options appear in the Intent menu.
Step 3
From the Operations list in the Intent menu, click Create Remote Location. The Create Remote Location dialog box
appears.
Enter the appropriate values in each field as listed in the following Create Remote Location Dialog Box Fields table then
continue.
Step 4
Table 17: Create Remote Location Dialog Box Fields
Properties
Description
General
Name
Enter the name of the remote location policy.
Description
Enter a description of the remote location policy.
Settings
Hostname/IP Address
Enter the hostname or IP address of the remote location
Protocol
Choose a protocol:
• FTP
• SFTP
• SCP
Path
Enter the path for the remote location.
Port
Enter the port for the remote location.
Username
Enter a username for the remote location.
Authentication Type
When using SFTP or SCP, choose the authentication type:
• Password
• SSH Key
SSH Key Content
Enter the SSH key content.
SSH Key Passphrase
SSH key passphrase.
Password
Enter a password for accessing the remote location.
Confirm Password
Reenter the password for accessing the remote location.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
88
Configuring Cisco Cloud Network Controller Components
Creating a Login Domain Using the Cisco Cloud Network Controller GUI
Properties
Description
Management EPG
a. Click Select Management EPG. The Select
Management EPG dialog appears.
b. From the column on the left, click to choose a
management EPG.
c. Click Select.
Step 5
Click Save when finished.
Creating a Login Domain Using the Cisco Cloud Network Controller GUI
This section explains how to create a login domain using the Cisco Cloud Network Controller GUI.
Before you begin
Create a provider before creating a non-local domain.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Administrative.
A list of Administrative options appear in the Intent menu.
Step 3
From the Administrative list in the Intent menu, click Create Login Domain. The Create Login Domain dialog box
appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table then
continue.
Table 18: Create Login Domain Dialog Box Fields
Properties
Description
Name
Enter the name of the login domain.
Description
Enter a description of the login domain.
Realm
Choose a realm:
• Local
• LDAP—Requires adding providers and choosing an
authenication type.
• RADIUS—Requires adding providers.
• TACACS+—Requires adding providers.
• SAML—Requires adding providers.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
89
Configuring Cisco Cloud Network Controller Components
Creating a Login Domain Using the Cisco Cloud Network Controller GUI
Properties
Description
Providers
To add a provider:
a. Click Add Providers. The Select Providers dialog
appears with a list of providers in the left pane.
b. Click to choose a provider.
c. Click Select to add the provider.
Advanced Settings
Displays the Authentication Type and LDAP Group Map
Rules fields.
Authentication Type
When LDAP is chosen for realm option, choose one of the
following authentication types:
• Cisco AV Pairs—(Default)
• LDAP Group Map Rules—Requires adding LDAP
group map rules.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
90
Configuring Cisco Cloud Network Controller Components
Creating a Login Domain Using the Cisco Cloud Network Controller GUI
Properties
Description
LDAP Group Map Rules
To add an LDAP group map rule:
a. Click Add LDAP Group Map Rule. The Add LDAP
Group Map Rule dialog appears with a list of providers
in the left pane.
b. Enter a name for the rule in the Name field.
c. Enter a description for the rule in the Description field.
d. Enter a group DN for the rule in the Group DN field.
e. Add security domains:
1. Click Add Security Domain. The Add Security
Domain dialog box appears.
2. Click Select Security Domain. The Select Security
Domain dialog box appears with a list of security
domains in the left pane.
3. Click to choose a security domain.
4. Click Select to add the security domain. You return
to the Add Security Domain dialog box.
5. Add a user role:
a. From the Add Security Domain dialog box,
click Select Role. The Select Role dialog box
appears with a list of roles in the left pane.
b. Click to choose a role.
c. Click Select to add the role. You retun to the
Add Security Domain dialog box.
d. From the Add Security Domain dialog box,
click the Privilege Type drop-down list and
choose Read Privilege or Write Privilege.
e. Click the check mark on the right side of the
Privilege Type drop-down list to confirm.
f.
Step 5
Click Add when finished. You return to the
Add LDAP Group Map Rule dialog box
where you can add another security domain.
Click Save when finished.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
91
Configuring Cisco Cloud Network Controller Components
Creating a Provider Using the Cisco Cloud Network Controller GUI
Creating a Provider Using the Cisco Cloud Network Controller GUI
This section explains how to create a provider using the Cisco Cloud Network Controller GUI.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Administrative.
A list of Administrative options appear in the Intent menu.
Step 3
From the Administrative list in the Intent menu, click Create Provider. The Create Provider dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Provider Dialog Box Fields table then continue.
Table 19: Create Provider Dialog Box Fields
Properties
Description
Hostname/IP Address
Enter the hostname or IP address of the provider.
Description
Enter a description of the provider.
Type
Click the Type drop-down list and choose one of the
following types:
• LDAP
• RADIUS
• TACACS+
• SAML
Note
A set of fields will appear based on the type that
you choose.
[LDAP] Settings
Bind DN
Enter the LDAP bind DN.
Base DN
Enter the LDAP base DN.
Password
Enter a password for the LDAP settings.
Confirm Password
Reenter the password for the LDAP settings.
Port
Enter the port number for the provider type.
Advanced Settings
Displays additional fields in the Settings section of the
provider dialog box.
Timeout (sec)
Enter the number of seconds allowed before a timeout
occurs. The default is 30.
Retries
Enter the number of allowed retries. The default is 1.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
92
Configuring Cisco Cloud Network Controller Components
Creating a Provider Using the Cisco Cloud Network Controller GUI
Properties
Description
SSL
To enable SSL, click to place a check in the SSL check box.
To disable SSL, click to remove the check from the SSL
check box. The default is enabled.
SSL Certificate Validation Level
Choose one of the following:
• Permissive
• Strict
Attribute
Enter an LDAP attribute in the Attribute text box.
Filter Type
Choose a filter type:
• Default
• Microsoft AD
• Custom
Filter
Enter an LDAP filter in the text box. This option only
appears when the Custom filter type is chosen.
Select Management EPG
To add a management EPG:
a. Click Select Management EPG. The Select
Management EPG dialog appears with a list of EPGs
in the left pane.
b. Click to choose an EPG.
c. Click Select to add the management EPG to the LDAP.
Server Monitoring
To enable server monitoring, click to place a check in the
Enabled check box. To disable server monitoring, click to
remove the check from the Enabled check box. The default
is disabled.
[RADIUS] Settings
Key
Enter the RADIUS key.
Confirm Key
Reenter the RADIUS key.
Advanced Settings
Displays additional fields in the Settings section of the
provider dialog box.
Port
Enter the port number for the RADIUS settings. The default
is 1812.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
93
Configuring Cisco Cloud Network Controller Components
Creating a Provider Using the Cisco Cloud Network Controller GUI
Properties
Description
Authentication Protocol
Choose from the following:
• PAP—(Default)
• CHAP
• MS-CHAP
Timeout (sec)
Enter the number of seconds allowed before a timeout
occurs. The default is 5.
Retries
Enter the number of allowed retries. The default is 1.
Select Management EPG
To add a management EPG:
a. Click Select Management EPG. The Select
Management EPG dialog appears with a list of EPGs
in the left pane.
b. Click to choose an EPG.
c. Click Select to add the management EPG to the
RADIUS.
Server Monitoring
To enable server monitoring, click to place a check in the
Enabled check box. To disable server monitoring, click to
remove the check from the Enabled check box. The default
is disabled.
[TACACS+] Settings
Key
Enter the TACACS+ key.
Confirm Key
Reenter the TACACS+ key.
Advanced Settings
Displays additional fields in the Settings section of the
provider dialog box.
Port
Enter the port number for the TACACS+ settings. The
default is 1812.
Authentication Protocol
Choose from the following:
• CHAP
• MS-CHAP
• PAP—(Default)
Timeout (sec)
Enter the number of seconds allowed before a timeout
occurs. The default is 5.
Retries
Enter the number of allowed retries. The default is 1.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
94
Configuring Cisco Cloud Network Controller Components
Creating a Provider Using the Cisco Cloud Network Controller GUI
Properties
Description
Select Management EPG
To add a management EPG:
a. Click Select Management EPG. The Select
Management EPG dialog appears with a list of EPGs
in the left pane.
b. Click to choose an EPG.
c. Click Select to add the management EPG to the
TACACS+.
Server Monitoring
To enable server monitoring, click to place a check in the
Enabled check box. To disable server monitoring, click to
remove the check from the Enabled check box. The default
is disabled.
[SAML] Settings
Identity Provider
Choose from the following identity providers:
• ADFS—(default)
• OKTA
• PING IDENTITY
Identity Provider Metadata URL
Enter the metatdata URL provided by the identity provider.
Entity ID
Enter a unique ID as the SAML entity identifier.
HTTPS Proxy for Metadata URL
Enter the HTTPS proxy used to reach the identity provider's
metadata URL.
Advanced Settings
Displays additional fields in the Settings section of the
provider dialog box.
GUI Redirect Banner Message (URL)
Enter the GUI redirect banner message.
Certificate Authority
To choose a certificate authority:
a. Click Select Certificate Authoriy. The Select
Certificate Authoriy dialog appears with a list of
certificates in the left pane.
b. Click to choose a certificate.
c. Click Select to add the certificate. You return to the
Create Provider dialog box.
Timeout (sec)
Enter the number of seconds allowed before a timeout
occurs. The default is 5.
Retries
Enter the number of allowed retries. The default is 1.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
95
Configuring Cisco Cloud Network Controller Components
Creating a Security Domain Using the Cisco Cloud Network Controller GUI
Properties
Description
Signature Algorithm Authentication User Requests*
Click the Signature Algorithm for Requests drop-down
list and choose one of the following:
• RSA SHA1
• RSA SHA224
• RSA SHA256
(Default)
• RSA SHA384
• RSA SHA512
Step 5
Sign SAML Authentication Requests
To enable, click to place a check in the check box. To
disable, click to remove the check from the check box. The
default is enabled.
Sign SAML Response Message
To enable, click to place a check in the check box. To
disable, click to remove the check from the check box. The
default is enabled.
Sign Assertions in SAML Response
To enable, click to place a check in the check box. To
disable, click to remove the check from the check box. The
default is enabled.
Encrypt SAML Assertions
To enable, click to place a check in the check box. To
disable, click to remove the check from the check box. The
default is enabled.
Click Save when finished.
Creating a Security Domain Using the Cisco Cloud Network Controller GUI
A security domain restricts the tenant to the security domains that you add. If you do not add a security domain,
all security domains will have access to this tenant. This section explains how to create a security domain
using the GUI.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Administrative.
A list of Administrative options appear in the Intent menu.
Step 3
From the Administrative list in the Intent menu, click Create Security Domain. The Create Security Domain dialog
box appears.
Step 4
In the Name field, enter the name of the security domain.
Step 5
In the Description field, enter a description of the security domain.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
96
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Step 6
Click Save when finished.
Creating a Role Using the Cisco Cloud Network Controller GUI
This section explains how to create a role using the Cisco Cloud Network Controller GUI.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Administrative.
A list of Administrative options appear in the Intent menu.
Step 3
From the Administrative list in the Intent menu, click Create Role. The Create Role dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Role Dialog Box Fields table then continue.
Table 20: Create Role Dialog Box Fields
Properties
Description
General
Name
Enter a name for the role in the Name field.
Description
Enter a description of the role.
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
97
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Properties
Description
Privilege
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
98
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Properties
Description
Click to place a check mark in the check boxes of the
privileges you want to assign the user. The privileges are:
• aaa—Used for configuring authentication,
authorization, accouting and import/export policies.
• access-connectivity-l1Used for Layer 1 configuration
under infra. Example: selectors and port Layer 1 policy
configurations.
• access-connectivity-l2—Used for Layer 2
configuration under infra. Example: Encap
configurations on selectors, and attachable entity.
• access-connectivity-l3—Used for Layer 3
configuration under infra and static route
configurations under a tenant's L3Out.
• access-connectivity-mgmt—Used for management
infra policies.
• access-connectivity-util—Used for tenant ERSPAN
policies.
• access-equipment—Used for access port
configuration.
• access-protocol-l1—Used for Layer 1 protocol
configurations under infra.
• access-protocol-l2—Used for Layer 2 protocol
configurations under infra.
• access-protocol-l3—Used for Layer 3 protocol
configurations under infra.
• access-protocol-mgmt—Used for fabric-wide policies
for NTP, SNMP, DNS, and image management.
• access-protocol-ops—Used for operations-related
access policies such as cluster policy and firmware
policies.
• access-protocol-util—Used for tenant ERSPAN
policies.
• access-qos—Used for changing CoPP and QoS-related
policies.
• admin—Complete access to everything (combine ALL
roles)
• fabric-connectivity-l1—Used for Layer 1
configuration under the fabric. Example: selectors and
port Layer 1 policy and vPC protection.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
99
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Properties
Description
• fabric-connectivity-l2—Used in firmware and
deployment policies for raising warnings for estimating
policy deployment impact.
• fabric-connectivity-l3—Used for Layer 3
configuration under the fabric. Example: Fabric IPv4
and MAC protection groups.
• fabric-connectivity-mgmt—Used for atomic counter
and diagnostic policies on leaf switches and spine
switches.
• fabric-connectivity-util—Used for atomic counter,
diagnostic, and image management policies on leaf
switches and spine switches.
• fabric-equipment—Used for atomic counter,
diagnostic, and image management policies on leaf
switches and spine switches.
• fabric-protocol-l1—Used for Layer 1 protocol
configurations under the fabric.
• fabric-protocol-l2—Used for Layer 2 protocol
configurations under the fabric.
• fabric-protocol-l3—Used for Layer 3 protocol
configurations under the fabric.
• fabric-protocol-mgmt—Used for fabric-wide policies
for NTP, SNMP, DNS, and image management.
• fabric-protocol-ops—Used for ERSPAN and health
score policies.
• fabric-protocol-util—Used for firmware management
traceroute and endpoint tracking policies.
• none—No privilege.
• nw-svc-device—Used for managing Layer 4 to Layer
7 service devices.
• nw-svc-devshare—Used for managing shared Layer
4 to Layer 7 service devices.
• nw-svc-params—Used for managing Layer 4 to Layer
7 service policies.
• nw-svc-policy—Used for managing Layer 4 to Layer
7 network service orchestration.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
100
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Properties
Description
• ops—Used for operational policies including
monitoring and troubleshooting policies such as atomic
counter, SPAN, TSW, tech support, traceroute,
analytics, and core policies.
• tenant-connectivity-l1—Used for Layer 1 connectivity
changes, including bridge domains and subnets.
• tenant-connectivity-l2—Used for Layer 2 connectivity
changes, including bridge domains and subnets.
• tenant-connectivity-l3—Used for Layer 3 connectivity
changes, including VRFs.
• tenant-connectivity-mgmt—Used for tenant in-band
and out-of-band management connectivity
configurations and for debugging/monitoring policies
such as atomic counters and health score.
• tenant-connectivity-util—Used for atomic counter,
diagnostic, and image management policies on leaf
switches and spine switches.
• tenant-epg—Used for managing tenant configurations
such as deleting/creating endpoint groups, VRFs, and
bridge domains.
• tenant-ext-connectivity-l2—Used for managing tenant
L2Out configurations.
• tenant-ext-connectivity-l3—Used for managing tenant
L3Out configurations.
• tenant-ext-connectivity-mgmt—Used as write access
for firmware policies.
• tenant-ext-connectivity-util—Used for
debugging/monitoring/observer policies such as
traceroute, ping, oam, and eptrk.
• tenant-ext-protocol-l1—Used for managing tenant
external Layer 1 protocols. Generally only used for
write access for firmware policies.
• tenant-ext-protocol-l2—Used for managing tenant
external Layer 2 protocols. Generally only used for
write access for firmware policies.
• tenant-ext-protocol-l3—Used for managing tenant
external Layer 3 protocols such as BGP, OSPF, PIM,
and IGMP.
• tenant-ext-protocol-mgmt—Used as write access for
firmware policies.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
101
Configuring Cisco Cloud Network Controller Components
Creating an RBAC Rule Using the Cisco Cloud Network Controller GUI
Properties
Description
• tenant-ext-protocol-util—Used for
debugging/monitoring/observer policies such as
traceroute, ping, oam, and eptrk.
• tenant-network-profile—Used for managing tenant
configurations, such as deleting and creating network
profiles, and deleting and creating endpoint groups.
• tenant-protocol-l1—Used for managing
configurations for Layer 1 protocols under a tenant.
• tenant-protocol-l2—Used for managing
configurations for Layer 2 protocols under a tenant.
• tenant-protocol-l3—Used for managing
configurations for Layer 3 protocols under a tenant.
• tenant-protocol-mgmt—Only used as write access
for firmware policies.
• tenant-protocol-ops—Used for tenant traceroute
policies.
• tenant-protocol-util—Used for
debugging/monitoring/observer policies such as
traceroute, ping, oam, and eptrk.
• tenant-qos—Only used as Write access for firmware
policies.
• tenant-security—Used for Contract related
configurations for a tenant.
• vmm-connectivity—Used to read all the objects in
APIC's VMM inventory required for VM connectivity.
• vmm-ep—Used to read VM and Hypervisor endpoints
in the APIC's VMM inventory.
• vmm-policy—Used for managing policies for VM
networking.
• vmm-protocol-ops—Not used by VMM policies.
• vmm-security—Used for Contract related
configurations for a tenant.
Step 5
Click Save when finished.
Creating an RBAC Rule Using the Cisco Cloud Network Controller GUI
This section explains how to create an RBAC rule using the GUI.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
102
Configuring Cisco Cloud Network Controller Components
Creating a Certificate Authority Using the Cisco Cloud Network Controller GUI
Before you begin
Create a security domain.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Administrative.
A list of Administrative options appears in the Intent menu.
Step 3
From the Administrative list in the Intent menu, click Create RBAC Rule. The Create RBAC Rule dialog box appears.
Step 4
In the DN field, enter the DN for the rule.
Step 5
Choose a security domain:
a) Click Select Security Domain. The Select Security Domain dialog box appears.
b) From the Select Security Domain dialog box, click to choose a security domain from the column on the left then
click Select. You return to the Create RBAC Rule dialog box.
Step 6
From the Allow Writes field, click Yes to allow writes or No to not allow writes.
Step 7
Click Save when finished.
Creating a Certificate Authority Using the Cisco Cloud Network Controller GUI
This section explains how to create a certificate authority using the GUI.
Before you begin
• Have the certificate chain.
• If the certificate authority is for a tenant, create the tenant.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Administrative.
A list of Administrative options appears in the Intent menu.
Step 3
From the Administrative list in the Intent menu, click Create Certificate Authority. The Create Certificate Authority
dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Certificate Authority Dialog Box Fields table
then continue.
Table 21: Create Certificate Authority Dialog Box Fields
Properties
Description
Name
Enter the name of the certificate authority.
Description
Enter a description of the certificate authority.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
103
Configuring Cisco Cloud Network Controller Components
Creating a Key Ring Using the Cisco Cloud Network Controller GUI
Properties
Description
Used for
Choose from the following options:
• Tenant—Choose if the certificate authority is for a
specific tenant. When chosen, the Select Tenant option
appears in the GUI.
• System—Choose if the certificate authority is for the
system.
Select Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog box
appears.
b. From the Select Tenant dialog, click to choose a tenant
in the left column then click Select. You return to the
Create Certificate Authority dialog box.
Certificate Chain
Enter the certificate chain in the Certificate Chain text
box.
Note
Add the certificates for a chain in the following
order:
a. CA
b. Sub-CA
c. Subsub-CA
d. Server
Step 5
Click Save when finished.
Creating a Key Ring Using the Cisco Cloud Network Controller GUI
This section explains how to create a key ring using the Cisco Cloud Network Controller GUI.
Before you begin
• Create a certificate authority.
• Have a certificate.
• If the key ring is for a specific tenant, create the tenant.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Administrative.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
104
Configuring Cisco Cloud Network Controller Components
Creating a Key Ring Using the Cisco Cloud Network Controller GUI
A list of Administrative options appear in the Intent menu.
Step 3
From the Administrative list in the Intent menu, click Create Key Ring. The Create Key Ring dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Key Ring Dialog Box Fields table then continue.
Table 22: Create Key Ring Dialog Box Fields
Properties
Description
Name
Enter the name of the key ring.
Description
Enter a description of the key ring.
Used for
• System—The key ring is for the system.
• Tenant—The key ring is for a specific tenant. Displays
a Tenant field for specifying the tenant.
Select Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog box
appears.
b. From the Select Tenant dialog, click to choose a tenant
in the left column then click Select. You return to the
Create Key Ring dialog box.
Settings
Certificate Authority
To choose a certificate authority:
a. Click Select Certificate Authority. The Select
Certificate Authority dialog appears.
b. Click to choose a certificate authority in the column on
the left.
c. Click Select. You return to the Create Key Ring dialog
box.
Private Key
Choose one of the following:
• Generate New Key—Generates a new key.
• Import Existing Key—Displays the Private Key text
box and enables you to use an existing key.
Private Key
Enter an existing key in the Private Key text box (for the
Import Existing Key option).
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
105
Configuring Cisco Cloud Network Controller Components
Creating a Local User Using the Cisco Cloud Network Controller GUI
Properties
Description
Modulus
Click the Modulus drop-down list to choose from the
following:
• MOD 512
• MOD 1024
• MOD 1536
• MOD 2048—(Default)
Certificate
Step 5
Enter the certificate information in the Certificate text box.
Click Save when finished.
Creating a Local User Using the Cisco Cloud Network Controller GUI
This section explains how to create a local user using the Cisco Cloud Network Controller GUI.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Administrative.
A list of Administrative options appear in the Intent menu.
Step 3
From the Administrative list in the Intent menu, click Create Local User. The Create Local User dialog box appears.
Step 4
Enter the appropriate values in each field as listed in the following Create Local User Dialog Box Fields table then
continue.
Table 23: Create Local User Dialog Box Fields
Properties
Description
Name
Enter the username of the local user.
Password
Enter the password for the local user.
Confirm Password
Reenter the password for the local user.
Description
Enter a description of the local user.
Settings
Account Status
To choose the account status:
• Active—Activates the local user account.
• Inactive—Deactivates the local user account.
First Name
Enter the first name of the local user.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
106
Configuring Cisco Cloud Network Controller Components
Creating a Local User Using the Cisco Cloud Network Controller GUI
Properties
Description
Last Name
Enter the last name of the local user.
Email Address
Enter the email address of the local user.
Phone Number
Enter the phone number of the local user.
Security Domains
To add a security domain:
a. Click Add Security Domain. The Add Security
Domain dialog box appears.
b. Click Select Security Domain. The Select Security
Domain dialog box appears with a list of security
domains in the left pane.
c. Click to choose a security domain.
d. Click Select to add the security domain. You return to
the Add Security Domain dialog box.
e. Add a user role:
1. From the Add Security Domain dialog box, click
Select Role. The Select Role dialog box appears
with a list of roles in the left pane.
2. Click to choose a role.
3. Click Select to add the the role. You retun to the
Add Security Domain dialog box.
4. From the Add Security Domain dialog box, click
the Privilege Type drop-down list and choose Read
Privilege or Write Privilege.
5. Click the check mark on the right side of the
Privilege Type drop-down list to confirm.
6. Click Add when finished. You return to the Create
Local User dialog box where you can add another
security domain.
Step 5
Click Advanced Settings and enter the appropriate values in each field as listed in the following Create Local User
Dialog Box Fields: Advanced Settings table then continue.
Table 24: Create Local User Dialog Box Fields: Advanced Settings
Property
Description
Account Expires
If you choose Yes, the account is set to expire at the time
that you choose.
Password Update Required
If you choose Yes, the user must change the password upon
the next login.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
107
Configuring Cisco Cloud Network Controller Components
Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud Network Controller GUI
Property
Description
OTP
Put a check in the box to enable the one-time password
feature for the user.
User Certificates
To add a user certificate:
a. Click Add X509 Certificate. The Add X509
Certificate dialog box appears.
b. Enter a name in the Name field.
c. Enter the X509 certificate in the User X509 Certificate
text box.
d. Click Add. The X509 certificate in the User X509
Certificate dialog box closes. You return to the Local
User dialog box.
To add a an SSH key:
SSH Keys
a. Click Add SSH Key. The Add SSH Key dialog box
appears.
b. Enter a name in the Name field.
c. Enter the SSH key in the Key text box.
d. Click Add. The Add SSH Key dialog box closes. You
return to the Local User dialog box.
Step 6
Click Save when finished.
Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud
Network Controller GUI
Regions are configured during the first-time setup. When configured, you specify the regions that are managed
by Cisco Cloud Network Controller and the region's inter-site and inter-region connectivity. This section
explains how to manage regions with the cloud template using the Cisco Cloud Network Controller GUI after
the initial installation.
For more information about cloud templates, see About the Cloud Template, on page 34.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Configuration.
A list of options appear in the Intent menu.
Step 3
From the Configuration list in the Intent menu, click Cisco Cloud Network Controller Setup.
The Set up - Overview dialog box appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
108
Configuring Cisco Cloud Network Controller Components
Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud Network Controller GUI
Step 4
In the Region Management area, click Edit Configuration.
The Setup - Region Management dialog box appears. and the first step in the Setup - Region Management series of
steps appears, Regions to Manage, with a list of managed regions.
Step 5
If you want inter-site connectivity, click to place a check mark in the Enabled box in the Inter-Site Connectivity area.
The Inter-Site Connectivity step is added in the Setup - Region Management steps at the top of the page.
Step 6
To choose a region that you want to be managed by the Cisco Cloud Network Controller, click to place a check mark
in check box of that region.
Step 7
To deploy cloud routers locally to this region, click to place a check mark in the Cloud Routers check box for that
region.
Step 8
To configure the fabric infra connectivity for the cloud site, click Next.
The next step in the Setup - Region Management series of steps appears, General Connectivity
Step 9
To add a subnet pool for the CCRs, click Add Subnet Pool for Cloud Router and enter the subnet in the text box.
Note
Step 10
The /24 subnet provided during the Cisco Cloud Network Controller deployment would be sufficient for up
to two cloud sites. If you need to manage more than two cloud sites, you need to add more subnets.
Enter a value in the BGP Autonomous System Number for CCRs field.
The BGP ASN can be in the range of 1 - 65534.
Step 11
In the Assign Public IP to CCR Interface field, determine if you want to assign public IP addresses to the Catalyst
8000V interfaces.
Private IP addresses are assigned to the Catalyst 8000V interfaces by default. The Assign Public IP to CCR Interface
option determines whether public IP addresses will also be assigned to the Catalyst 8000V interfaces or not.
By default, the Enabled check box is checked. This means that public IP addresses can be assigned to the Catalyst
8000Vs.
• If you want public IP addresses assigned to the Catalyst 8000Vs in addition to the private IP addresses, leave the
check in the box next to Enabled.
• If you want only private IP addresses assigned to the Catalyst 8000Vs, remove the check in the box next to Enabled
to disable this option.
Note that changing the Catalyst 8000V connectivity from private to public, or vice versa, may cause disruption in your
network.
Note
Both the public and private IP addresses assigned to a CCR are displayed with the other details of the router
in the Cloud Resources area. If public IP addresses are not assigned to a CCR, only the private IP addresses
are displayed.
Step 12
To chose the number of routers per region, click the Number of Routers Per Region drop-down list and click 2, 3, or
4.
Step 13
Enter a username in the Username text box.
Step 14
Enter a password in the Password and Confirm Password text boxes.
Step 15
To choose the throughput value, click the Throughput of the routers drop-down list.
Note
• Cloud routers should be undeployed from all regions before changing the throughput or login credentials.
• For information on the throughput values for the Cisco Catalyst 8000V, see About the Cisco Catalyst
8000V, on page 20.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
109
Configuring Cisco Cloud Network Controller Components
Configuring Cisco Cloud Network Controller Using the REST API
Step 16
(Optional) To specify the license token, enter the product instance registration token in the License Token text box.
• For licensing information for the Cisco Catalyst 8000V, see About the Cisco Catalyst 8000V, on page
20.
Note
• If no token is entered, the CCR will be in EVAL mode.
• If the public IP addresses are disabled to the CCRs in Step 11, on page 109, the only supported option
is AWS Direct Connect or Azure Express Route to Cisco Smart Software Manager (CSSM) when
registering smart licensing for CCRs with private IP addresses (available by navigating to
Administrative > Smart Licensing). You must provide reachability to the CSSM through AWS Direct
Connect or Azure Express Route in this case. When the public IP addresses are disabled, public internet
cannot be used because private IP addresses are being used. The connectivity should therefore use Private
Connection, which is AWS Direct Connect or Azure Express Route.
Step 17
Click Next.
• If you placed a check mark in the Enabled box in the Inter-Site Connectivity area earlier in these procedures,
Inter-Site Connectivity appears as the next step in the Setup - Region Management series of steps. Go to Step 18,
on page 110.
• If you did not place a check mark in the Enabled box in the Inter-Site Connectivity area earlier in these procedures,
go to Step 22, on page 110.
Step 18
To enter a peer public IP address of the IPsec Tunnel peer on-premises in the text box, click Add Public IP of IPSec
Tunnel Peer.
Step 19
Enter the OSPF area ID in the OSPF Area Id text box.
Step 20
To add an external subnet pool, click Add External Subnet and enter a subnet pool in the text box.
Step 21
When you have configured all the connectivity options, click Next at the bottom of the page.
Step 22
Click Save and Continue when finished.
Configuring Cisco Cloud Network Controller Using the REST
API
Creating a Tenant Using the REST API
This section demonstrates how to create a tenant and assigns using the REST API.
To create a tenant:
<polUni>
<fvTenant name="infra">
<cloudAwsProvider region="us-east-1" accessKeyId="123" secretAccessKey="ABCDE" providerId="admin"
status=""/>
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
110
Configuring Cisco Cloud Network Controller Components
Creating a Contract Using the REST API
</fvTenant>
</polUni>
Creating a Contract Using the REST API
This example demonstrates how to create a contract for the Cisco Cloud Network Controller using the REST
API.
Before you begin
Create filters.
To create a contract:
Example:
<polUni>
<fvTenant name="t2" status="">
<vzFilter descr="" name="http-family-destination" ownerKey="" ownerTag="">
<vzEntry name="http" prot="tcp" etherT="ip" dFromPort="http" dToPort="http"/>
<vzEntry name="https" prot="tcp" etherT="ip" dFromPort="https" dToPort="https"/>
</vzFilter>
<vzBrCP name="httpFamily">
<vzSubj name="default" revFltPorts="yes" targetDscp="unspecified">
<vzRsSubjFiltAtt action="permit" directives="" tnVzFilterName="http-family-destination"/>
</vzSubj>
</vzBrCP>
</fvTenant>
</polUni>
Creating a Cloud Context Profile Using the REST API
This section demonstrates how to create a cloud context profile.
Before you begin
Create a VRF.
To create a cloud context profile using the cloud availability zones, enter a post such as the following example.
If you are creating a cloud context profile in a user tenant, you are restricted to only cloud availability zones. The cloud
availability zones are created through the zone field highlighted below. For more information on the cloud availability
zones, see Availability Zones, on page 27.
Example:
<polUni>
<fvTenant name="Corp1" status="">
<cloudAwsProvider accessKeyId="" secretAccessKey="" providerId="aws" status="" accountId=""/>
<fvCtx name="prod-1" status="">
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
111
Configuring Cisco Cloud Network Controller Components
Managing a Cloud Region Using the REST API
<bgpRtTargetP af="ipv4-ucast">
<bgpRtTarget rt="route-target:as4-nn2:400:400" type="export"/>
<bgpRtTarget rt="route-target:as4-nn2:400:400" type="import"/>
</bgpRtTargetP>
</fvCtx>
<fvCtx name="prod-2" status="">
<bgpRtTargetP af="ipv4-ucast">
<bgpRtTarget rt="route-target:as4-nn2:500:500" type="export"/>
<bgpRtTarget rt="route-target:as4-nn2:500:500" type="import"/>
</bgpRtTargetP>
</fvCtx>
<cloudVpnGwPol name="VgwPol" status=""/>
<cloudApp name="payment" status="">
<cloudEPg name="web" status="">
<cloudRsCloudEPgCtx tnFvCtxName="prod-1" />
</cloudEPg>
</cloudApp>
<cloudApp name="billing">
<cloudEPg name="app">
<cloudRsCloudEPgCtx tnFvCtxName="prod-2" />
</cloudEPg>
</cloudApp>
<cloudCtxProfile name="prod-web-east-1">
<cloudRsCtxProfileToRegion tDn="uni/clouddomp/provp-aws/region-us-east-1"/>
<cloudRsToCtx tnFvCtxName="prod-1"/>
<cloudRouterP name="RouterP1" type="vpn-gw">
<cloudRsToVpnGwPol tnCloudVpnGwPolName="VgwPol"/>
<cloudIntNetworkP name="IntNetworkP1"/>
</cloudRouterP>
<cloudCidr addr="10.10.0.0/16" primary="yes">
<cloudSubnet ip="10.10.1.0/24" usage="gateway" scope="public" zone=”us-west-1a"/>
<cloudSubnet ip="10.10.2.0/24" scope="public" zone=”us-west-1b"/>
</cloudCidr>
</cloudCtxProfile>
<cloudCtxProfile name="prod-payment-east-1" status="">
<cloudRsCtxProfileToRegion tDn="uni/clouddomp/provp-aws/region-us-east-1"/>
<cloudRsToCtx tnFvCtxName="prod-2" status=""/>
<cloudRouterP name="RouterP1" type="vpn-gw">
<cloudRsToVpnGwPol tnCloudVpnGwPolName="VgwPol"/>
<cloudIntNetworkP name="IntNetworkP1" status=""/>
</cloudRouterP>
<cloudCidr addr="20.10.0.0/16" primary="yes">
<cloudSubnet ip="20.10.1.0/24" scope="public" zone=”us-west-1a"/>
</cloudCidr>
</cloudCtxProfile>
</fvTenant>
</polUni>
Managing a Cloud Region Using the REST API
This section demonstrates how to manage a cloud region using the REST API.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
112
Configuring Cisco Cloud Network Controller Components
Creating a Filter Using the REST API
To create a cloud region:
<polUni>
<cloudDomP name="dom-us-east-2">
<cloudBgpAsP asn="64513"/>
<cloudProvP vendor="aws">
<cloudRegion name="us-east-2" adminSt="managed">
<cloudZone name="us-east-2a"/>
<cloudZone name="us-east-2b"/>
</cloudRegion>
</cloudProvP>
</cloudDomP>
</polUni>
Creating a Filter Using the REST API
This section demonstrates how to create a filter using the REST API.
To create a filter:
https://<IP_Address>/api/node/mo/.xml
<polUni>
<fvTenant name="intervpc" >
<fvCtx name="VRF1"/>
<cloudApp name="CloudAP1" >
<cloudEPg name="CloudEPG1" >
<cloudRsCloudEPgCtx tnFvCtxName="VRF1"/>
<fvRsProv tnVzBrCPName="Contract2” > </fvRsProv>
<cloudEPSelector name="sel1" matchExpression="custom:epgtag=='cloudepg1'" />
</cloudEPg>
</cloudApp>
<vzFilter name="http" annotation="orchestrator:msc" >
<vzEntry name="Entry3" prot="tcp" etherT="ipv4" arpOpc="unspecified" stateful="no"
applyToFrag="no" sFromPort="unspecified" sToPort="unspecified" dFromPort="80" dToPort="80" > </vzEntry>
</vzFilter>
<vzBrCP name="Contract2" scope="global">
<vzSubj name="test-subj" >
<vzRsSubjFiltAtt action="permit" tnVzFilterName="http" directives="none" />
</vzSubj>
</vzBrCP>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
113
Configuring Cisco Cloud Network Controller Components
Creating an Application Profile Using the REST API
Creating an Application Profile Using the REST API
This section demonstrates how to create an application profile using the REST API.
Before you begin
Create a tenant.
To create an application profile:
https://<IP_Address>/api/node/mo/.xml
<polUni>
<fvTenant name="intervpc" >
<fvCtx name="VRF1"/>
<cloudApp name="CloudAP1" >
<cloudEPg name="CloudEPG1" >
<cloudRsCloudEPgCtx tnFvCtxName="VRF1"/>
<fvRsProv tnVzBrCPName="Contract2” > </fvRsProv>
<cloudEPSelector name="sel1" matchExpression="custom:epgtag=='cloudepg1'" />
</cloudEPg>
</cloudApp>
<vzFilter name="http" annotation="orchestrator:msc" >
<vzEntry name="Entry3" prot="tcp" etherT="ipv4" arpOpc="unspecified" stateful="no"
applyToFrag="no" sFromPort="unspecified" sToPort="unspecified" dFromPort="80" dToPort="80" > </vzEntry>
</vzFilter>
<vzBrCP name="Contract2" scope="global">
<vzSubj name="test-subj" >
<vzRsSubjFiltAtt action="permit" tnVzFilterName="http" directives="none" />
</vzSubj>
</vzBrCP>
</fvTenant>
</polUni>
Creating a Cloud EPG Using the REST API
This example demonstrates how to create a cloud EPG using the REST API.
Before you begin
Create an application profile and a VRF.
To create a cloud EPG:
Example:
<polUni>
<fvTenant name="t2" status="">
<!-- Tenant provide AWS credentials -->
<cloudAwsProvider region="us-east-2" accessKeyId="123" secretAccessKey="ABCDE" providerId="admin"/>
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
114
Configuring Cisco Cloud Network Controller Components
Creating an External Cloud EPG Using the REST API
<fvCtx name="v1" status=""/>
<cloudApp name="ap">
<cloudEPg name="provEPG" status="">
<cloudRsCloudEPgCtx tnFvCtxName="v1"/>
<cloudEPSelector name="1" matchExpression="custom:tag=='provfoo'"/>
<cloudEPSelector name="2" matchExpression="custom:tag=='provbaz'"/>
<fvRsProv tnVzBrCPName="httpFamily"/>
</cloudEPg>
<cloudEPg name="consEPG">
<cloudRsCloudEPgCtx tnFvCtxName="v1"/>
<cloudEPSelector name="1" matchExpression="custom:tag=='consfoo'"/>
<cloudEPSelector name="2" matchExpression="custom:tag=='consbaz'"/>
<fvRsCons tnVzBrCPName="httpFamily"/>
</cloudEPg>
</cloudApp>
</fvTenant>
</polUni>
Creating an External Cloud EPG Using the REST API
This example demonstrates how to create an external cloud EPG using the REST API.
Before you begin
Create an application profile and a VRF.
To create an external cloud EPG:
Example:
<polUni>
<fvTenant name="t2" status="">
<!-- Tenant provide AWS credentials -->
<cloudAwsProvider region="us-east-2" accessKeyId="123" secretAccessKey="ABCDE" providerId="admin"/>
<fvCtx name="v1" status=""/>
<cloudApp name="ap">
<cloudEPg name="provEPGInternet" status="">
<cloudRsCloudEPgCtx tnFvCtxName="v1"/>
<cloudEPSelector name="1" matchExpression="custom:tag=='provfoo'"/>
<cloudEPSelector name="2" matchExpression="custom:tag=='provbaz'"/>
<fvRsProv tnVzBrCPName="httpFamily"/>
</cloudEPg>
<cloudExtEPg name="consInternetEPG">
<cloudRsCloudEPgCtx tnFvCtxName="v1"/>
<cloudExtEPSelector name="1" subnet="0.0.0.0/0"/>
<fvRsCons tnVzBrCPName="httpFamily"/>
</cloudExtEPg>
</cloudApp>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
115
Configuring Cisco Cloud Network Controller Components
Creating a Cloud Template Using the REST API
Creating a Cloud Template Using the REST API
This section demonstrates how to create a cloud template using the REST API. For more information about
cloud templates, see About the Cloud Template, on page 34.
The REST API will change depending on the type of Licensing model selected. The license type of the Cisco
Catalyst 8000V is captured by the property routerThroughput in the cloudtemplateProfile managed object
.
If the routerThroughput value belongs to T0/T1/T2/T3 then BYOL Cisco Catalyst 8000V is deployed on
Cisco Cloud Network Controller. If routerThroughput value is PAYG then PAYG Cisco Catalyst 8000V
is deployed on Cisco Cloud Network Controller.
Step 1
To create a cloud template for the BYOL Licensing Model Cisco Catalyst 8000V:
<polUni>
<fvTenant name="infra">
<cloudtemplateInfraNetwork name="default" vrfName="overlay-1">
<cloudtemplateProfile name="default" routerUsername="admin" routerPassword="rtpssw"
routerThroughput="15"
routerLicenseToken="hYjZhYjItYTg0mrtrL15ocStS%0AUzRSZz0%3"
routerMgmtInterfacePublicIp="yes" routerDataInterfacePublicIp="yes"/>
<cloudtemplateExtSubnetPool subnetpool="10.20.0.0/16"/>
<cloudtemplateIntNetwork name="default">
<cloudRegionName provider="aws" region="us-west-1"/>
<cloudRegionName provider="aws" region="us-west-2"/>
</cloudtemplateIntNetwork>
<cloudtemplateExtNetwork name="default">
<cloudRegionName provider="aws" region="us-west-2"/>
<cloudtemplateVpnNetwork name="default">
<cloudtemplateIpSecTunnel peeraddr="23.2.1.1/32" />
<cloudtemplateIpSecTunnel peeraddr="23.0.1.1/32" />
<cloudtemplateIpSecTunnel peeraddr="23.1.1.1/32" />
<cloudtemplateOspf area="0.0.0.1"/>
</cloudtemplateVpnNetwork>
<cloudtemplateBgpEvpn peeraddr="34.1.1.1/32" asn="63000" siteId="123" password="abcd1234" />
</cloudtemplateExtNetwork>
</cloudtemplateInfraNetwork>
</fvTenant>
</polUni>
Note
Step 2
Beginning with release 25.0(3), tier2 (T2) is the default throughput supported by Cisco Cloud Network Controller,
which is indicated by the property routerThroughput in the cloudtemplateProfile managed object above.
To create a cloud template for the PAYG Licensing Model Cisco Catalyst 8000V:
<polUni>
<fvTenant name="infra">
<cloudtemplateInfraNetwork name="default" vrfName="overlay-1">
<cloudtemplateProfile name="default" routerUsername="admin" routerPassword="rtpssw"
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
116
Configuring Cisco Cloud Network Controller Components
Creating a Cloud Template Using the REST API
routerThroughput="PAYG"
vmName="c5.4xlarge" routerMgmtInterfacePublicIp="yes" routerDataInterfacePublicIp="yes"/>
<cloudtemplateExtSubnetPool subnetpool="10.20.0.0/16"/>
<cloudtemplateIntNetwork name="default">
<cloudRegionName provider="aws" region="us-west-1"/>
<cloudRegionName provider="aws" region="us-west-2"/>
</cloudtemplateIntNetwork>
<cloudtemplateExtNetwork name="default">
<cloudRegionName provider="aws" region="us-west-2"/>
<cloudtemplateVpnNetwork name="default">
<cloudtemplateIpSecTunnel peeraddr="23.2.1.1/32" />
<cloudtemplateIpSecTunnel peeraddr="23.0.1.1/32" />
<cloudtemplateIpSecTunnel peeraddr="23.1.1.1/32" />
<cloudtemplateOspf area="0.0.0.1"/>
</cloudtemplateVpnNetwork>
<cloudtemplateBgpEvpn peeraddr="34.1.1.1/32" asn="63000" siteId="123" password="abcd1234" />
</cloudtemplateExtNetwork>
</cloudtemplateInfraNetwork>
</fvTenant>
</polUni>
On selecting PAYG throughput user must also select the vmName from a list of vmName which is already created by
Cisco Cloud Network Controller, and is represented by a managed object cloudProvVmType.
The following table lists the vmNamesTypes that are indicated by the property vmName in the cloudtemplateProfile
AWS EC2 Instance
CCR Throughput
vCPUs
Memory
c5.xlarge
up to 5 Gigabit throughput
4
8 GiB
c5.2xlarge
up to 10 Gigabit throughput 8
16 GiB
c5.4xlarge
up to 10 Gigabit throughput 16
32 GiB
c5.9xlarge
up to 10 Gigabit throughput 36
72 GiB
c5n.xlarge
up to 25 Gigabit throughput 4
10.5 GiB
c5n.2xlarge
up to 25Gigabit throughput
21 GiB
c5n.4xlarge
up to 25 Gigabit throughput 16
42 GiB
c5n.9xlarge
up to 50 Gigabit throughput 36
96 GiB
8
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
117
Configuring Cisco Cloud Network Controller Components
Configuring VRF Leak Routes Using the REST API
Configuring VRF Leak Routes Using the REST API
Before you begin
Review the information provided in Route Leaking Between Internal VRFs, on page 7 and Global Inter-VRF
Route Leak Policy, on page 8 before proceeding with the instructions in this section.
Step 1
Enter a post similar to the following to enable or disable contract-based routing.
<fvTenant name=”infra”>
<cloudVrfRouteLeakPol name="default" allowContractBasedRouting=”true”/>
</fvTenant>
Where the allowContractBasedRouting field has either of the following settings:
• true: Indicates that routes are leaked based on contracts in the absence of route maps. When enabled, contracts drive
routing when route maps are not configured. When route maps exist, route maps always drives routing.
• false: Default setting. Indicates that routes are not leaked based on contracts, and are leaked based on route maps
instead.
Step 2
Enter a post similar to the following to use the leakInternalPrefix field to configure route leaking for all cloud CIDRs
associated with the VRFs.
<fvTenant name=”t1”>
<fvCtx name="v1">
<leakRoutes>
<leakInternalPrefix ip="0.0.0.0/0" le="32">
<leakTo tenantName="t2" ctxName="v2" scope="public"/>
</leakInternalPrefix>
</leakRoutes>
</fvCtx>
</fvTenant>
<fvTenant name=”t2”>
<fvCtx name="v2">
<leakRoutes>
<leakInternalPrefix ip="0.0.0.0/0" le="32">
<leakTo tenantName="t1" ctxName="v1" scope="public"/>
</leakInternalPrefix>
</leakRoutes>
</fvCtx>
</fvTenant>
Step 3
Enter a post similar to the following to use the leakInternalSubnet field to leak specific routes between a pair of VRFs.
<fvTenant name=”anyTenant" status="">
<fvCtx name="VRF1" >
<leakRoutes status="">
<leakInternalSubnet ip="110.110.1.0/24" >
<leakTo ctxName=”VRF2" scope="public" tenantName=" anyTenant " />
</leakInternalSubnet>
</leakRoutes>
</fvCtx>
<fvCtx name="VRF2" status="" >
<leakRoutes status="">
<leakInternalSubnet ip="110.110.2.0/24" >
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
118
Configuring Cisco Cloud Network Controller Components
Configuring the Source Interface Selection for Tunnels Using the REST API
<leakTo ctxName=”VRF1" scope="public" tenantName=" anyTenant " />
</leakInternalSubnet>
</leakRoutes>
</fvCtx>
</fvTenant>
Configuring the Source Interface Selection for Tunnels Using the REST API
Before you begin
Review the information provided in Source Interface Selection for Tunnels, on page 9 before proceeding
with these instructions.
Enter a post similar to the following to configure the source interface selection for tunnels.
<cloudtemplateInfraNetwork name="default" vrfName="overlay-1">
<cloudtemplateProfile name="defaultxyz" routerUsername="james" routerPassword="bond@@7" />
<cloudtemplateIpSecTunnelSubnetPool subnetpool="10.20.0.0/16" poolname="pool1" />
<cloudtemplateIntNetwork name="default">
<cloudRegionName provider="aws" region="us-west-1"/>
<cloudRegionName provider="aws" region="us-west-2"/>
</cloudtemplateIntNetwork>
<cloudtemplateExtNetwork name="something” vrfName=”xyz” >
<cloudRegionName provider="aws" region="us-west-2"/>
<cloudtemplateVpnNetwork name="default">
<cloudtemplateIpSecTunnel peeraddr="23.2.1.1/32" poolname="" presharedkey=”abcd”
ikeVersion=”v1|v2”>
<cloudtemplateIpSecTunnelSourceInterface sourceInterfaceId="2" />
</cloudtemplateIpSecTunnel>
</cloudtemplateVpnNetwork>
</cloudtemplateExtNetwork>
</cloudtemplateInfraNetwork>
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
119
Configuring Cisco Cloud Network Controller Components
Configuring the Source Interface Selection for Tunnels Using the REST API
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
120
CHAPTER
5
Viewing System Details
• Monitoring VM Host Metrics, on page 121
• Viewing Application Management Details, on page 124
• Viewing Cloud Resource Details, on page 125
• Viewing Operations Details, on page 126
• Viewing Infrastructure Details, on page 128
• Viewing Administrative Details, on page 128
• Viewing Health Details Using the Cisco Cloud Network Controller GUI, on page 130
Monitoring VM Host Metrics
Beginning with release 25.0(1), support is available for monitoring metrics for the VM host where the Cisco
Cloud Network Controller is deployed using the Prometheus Node Exporter. The Prometheus Node Exporter
provides visibility to a wide variety of hardware and kernel-related metrics, where it collects technical
information from Linux nodes, such as CPU, disk, and memory statistics. For overview information on the
Prometheus Node Exporter, see:
https://prometheus.io/docs/introduction/overview/
If your Cisco Cloud Network Controller is running on release 25.0(1) or later, the Prometheus Node Exporter
is automatically available by default.
Guidelines and Limitations
HTTP is not supported for monitoring metrics using the Prometheus Node Exporter. Only HTTPS is supported
for monitoring metrics using the Prometheus Node Exporter.
Monitoring VM Host Metrics Using the GUI
These procedures describe how to enable the Prometheus Node Exporter to monitor VM host metrics using
the GUI.
Step 1
In the Cisco Cloud Network Controller GUI, navigate to Infrastructure > System Configuration, then click on the
Management Access tab.
Step 2
In the HTTPS area to the right of the window, note the entry in the Node Exporter field.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
121
Viewing System Details
Monitoring VM Host Metrics Using the GUI
• Enabled: The Prometheus Node Exporter has already been enabled. You do not have to continue with these
instructions in that case.
• Disabled: The Prometheus Node Exporter is not enabled yet. Proceed with these instructions to enable the Prometheus
Node Exporter.
Step 3
Click the pencil icon in the HTTPS area to edit the HTTPS settings.
The HTTPS Settings window appears.
Step 4
Locate the Node Exporter field and click Enable.
A warning message appears, telling you that saving these settings will restart the web service, and that it will take a
moment for it to resume responding to requests. Click OK to confirm these changes.
Step 5
At the bottom of the window, click Save.
You are returned to the System Configuration/Management Access window. The web service reboots and comes back
online in a few seconds.
Step 6
In the HTTPS area to the right of the window, verify that the entry in the Node Exporter field is set to Enabled.
This verifies that the Prometheus Node Exporter is enabled.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
122
Viewing System Details
Monitoring VM Host Metrics Using the REST API
Step 7
Click the link under the Enabled text in the Node Exporter area.
Another tab in your browser appears, showing the metrics for the VM host where the Cisco Cloud Network Controller
is deployed.
Monitoring VM Host Metrics Using the REST API
These procedures describe how to enable the Prometheus Node Exporter to monitor VM host metrics using
the REST API.
Step 1
To determine if the Prometheus Node Exporter is enabled or not, send the following GET call:
GET https://<cloud-network-controller-ip-address>/api/mo/uni/fabric/comm-default/https.xml
Locate the nodeExporter field to determine if it is set to enabled or disabled.
Step 2
To monitor VM host metrics, send the following post to enable the Prometheus Node Exporter:
POST https://<cloud-network-controller-ip-address>/api/mo/uni/fabric/comm-default/https.xml
<commHttps nodeExporter="enabled" />
The metrics are displayed for the VM host where the Cisco Cloud Network Controller is deployed.
Step 3
To view the metrics using REST API, send the following GET call:
GET https://<cloud-network-controller-ip-address>/nodeexporter/metrics
Step 4
To disable the Prometheus Node Exporter, send the following post:
POST https://<cloud-network-controller-ip-address>/api/mo/uni/fabric/comm-default/https.xml
<commHttps nodeExporter="disabled" />
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
123
Viewing System Details
Viewing Application Management Details
Viewing Application Management Details
This section explains how to view application management details using the Cisco Cloud Network Controller
GUI. The application management details include the information of a specific tenant, application profile,
EPG, contract, filter, VRF, service, or cloud context profile.
Step 1
From the Navigation menu, choose the Application Management tab.
When the Application Management tab expands, a list of subtab options appear. See the Application Management
Options table for more information.
Table 25: Application Management Subtabs
Subtab Name
Description
Tenants
Displays tenants as rows in a summary table.
Application Profiles
Displays application profiles as rows in a summary table.
EPGs
Displays an EPGs as rows in a summary table.
Contracts
Displays a contracts as rows in a summary table.
Filters
Displays filters as rows in a summary table.
VRFs
Displays VRFs as rows in a summary table.
Services
Contains the following two subtabs and information:
• Devices—Displays the devices as rows in a summary
table.
• Service Graphs—Displays service graphs as rows in
a summary table.
Cloud Context Profiles
Step 2
Displays cloud context profiles as rows in a summary table.
Click the tab that represents the component with the details you want to view.
A summary table appears with items as rows in the table. For example, if you chose the Tenants subtab, a list of tenants
appear as rows in a summary table
You can filter the rows by clicking the Filter by Attributes bar. Choose the attribute, operator and filter-value. For example,
for filtering based on a tenant, choose Tenant == T1 (where T1 is the name of a tenant).
Step 3
To view a summary pane, click the row that represents the specific component you want to view.
Step 4
For more information, double-click the summary table row that represents the specific component you want to view.
A new dialog box appears over the work pane with any of the following tabs:
Note
The tabs that appear differ between components and configurations.
• Overview—Provides a general overview of cloud resources, configuration relationships, and settings of the component.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
124
Viewing System Details
Viewing Cloud Resource Details
• Cloud Resources—Contains a list of subtabs that display the cloud resource information related to the component.
• Configuration—Contains one or more subtabs that display the configuration information related to the component.
• Statistics—Enables you to view statistics based on a chosen sampling interval and statistics type. The Statistics tab
may contain subtabs, depending on the component you are viewing.
• Event Analytics—Contains a list of subtabs that display faults, events, and audit logs.
Note
The dialog box that appears over the work pane contains an edit button in the top-right corner between the
refresh button and the Actions button. When clicked, the edit button enables you to edit the chosen component.
Viewing Cloud Resource Details
This section explains how to view cloud resource details using the Cisco Cloud Network Controller GUI. The
cloud resource details include the information about a specific region, availability zone, VPC, router, security
group, endpoint, instance, and cloud service.
Step 1
From the Navigation menu, choose the Cloud Resources tab.
When the Cloud Resources tab expands, a list of subtab options appear. See the Cloud Resource Options table for more
information.
Table 26: Cloud Resource Subtabs
Subtab Name
Description
Regions
Displays regions as rows in a summary table.
Availability Zones
Displays the availability zones as rows in a summary table.
VPCs
Displays VPCs as rows in a summary table.
Routers
Displays routers as rows in a summary table.
Security Groups
Displays security groups as rows in a summary table.
Endpoints
Displays endpoints as rows in a summary table.
Instances
Displays the instances as rows in a summary table.
Cloud Services
Contains the following subtabs:
• Cloud Services Tab—Displays cloud services as rows
in a summary table.
• Target Groups Tab—Displays target groups as rows
in a summary table.
Step 2
Click the tab that represents the component with the details you want to view.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
125
Viewing System Details
Viewing Operations Details
A summary table appears with items as rows in the table. For example, if you chose the Endpoints subtab, a list of
endpoints appear as rows in a summary table
You can filter the rows by selecting an attribute from the drop-down menu when you click the Filter by attributes bar.
The attributes displayed in the drop-down menu depend on the selected subtab.
Step 3
To view a summary pane, click the row that represents the specific component you want to view.
Step 4
For more information, double-click the summary table row that represents the specific component you want to view.
A new dialog box appears over the work pane with any of the following tabs:
Note
The tabs that appear differ between components and configurations.
• Overview—Provides a general overview of cloud resources, configuration relationships, and settings of the component.
• Cloud Resources—Contains a list of subtabs that display the cloud resource information related to the component.
• Application Management—Contains a list of subtabs that display the ACI relation information related to the
component.
• Statistics—Enables you to view statistics based on a chosen sampling interval and statistics type. The Statistics tab
may contain subtabs, depending on the component you are viewing.
• Event Analytics—Contains a list of subtabs that display faults, events, and audit logs.
Viewing Operations Details
This section explains how to view operations details using the Cisco Cloud Network Controller GUI. The
operations details include the information of a specific fault, event, audit log, active sessions, backup and
restore policies, tech support policies, firmware management, scheduler policies, and remote locations.
Step 1
From the Navigation menu, choose the Operations tab.
When the Operations tab expands, a list of subtab options appear. See the Operations Options table for more information.
Table 27: Operations Subtabs
Subtab Name
Description
Event Analytics
Contains the following subtabs:
• Faults Tab—Displays faults as rows in a summary
table.
• Events Tab—Displays events as rows in a summary
table.
• Audit Logs Tab—Displays audit logs as rows in a
summary table.
Active Sessions
Displays a list of active users as rows in a summary table.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
126
Viewing System Details
Viewing Operations Details
Subtab Name
Description
Backup & Restore
Contains the following subtabs:
• Backups Tab—Displays backups as rows in a
summary table.
• Backup Policies Tab—Displays backup policies as
rows in a summary table.
• Job Status Tab—Displays the job status as rows in a
summary table.
• Event Analytics Tab—Contains the following subtabs:
• Faults Tab—Displays faults as rows in a
summary table.
• Events Tab—Displays events as rows in a
summary table.
• Audit Logs Tab—Displays audit logs as rows in
a summary table.
Tech Support
Contains the following subtabs:
• Tech SupportTab—Displays tech support policies as
rows in a summary table.
• Core Logs Tab—Displays core logs as rows in a
summary table.
• Per-Feature Containers Tab—Displays the
per-feature containers as rows in a summary table.
Firmware Management
Contains the following subtabs:
• General Tab—Displays general firmware management
information.
• Images Tab—Displays a list of images.
• Event Analytics Tab—Contains the following subtabs:
• Faults Tab—Displays faults as rows in a
summary table.
• Events Tab—Displays events as rows in a
summary table.
• Audit Logs Tab—Displays audit logs as rows in
a summary table.
Schedulers
Displays scheduler policies as rows in a summary table.
Remote Locations
Displays remote locations as rows in a summary table.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
127
Viewing System Details
Viewing Infrastructure Details
Step 2
Click the tab that represents the component you want to view.
A summary table appears with items as rows in the table. For example, if you chose the Active Sessions subtab, a list of
active sessions appear as rows in a summary table.
You can filter the rows by clicking the Filter by Attributes bar. Choose the attribute, operator and filter-value. For example,
for filtering based on a username, choose username == user1 (where user1 is a user logged into Cisco Cloud Network
Controller).
Step 3
To view a summary pane, click the row that represents the specific component you want to view.
Step 4
For more information, double-click the summary table row that represents the specific item you want to view.
A new dialog box appears over the work pane that displays additional information about the item you chose from the
summary table.
Viewing Infrastructure Details
This section explains how to view infrastructure details using the Cisco Cloud Network Controller GUI. The
infrastructure details include information about system configuration, inter-region connectivity, and external
connectivity.
Step 1
From the Navigation menu, choose the Infrastructure tab.
When the Infrastructure tab expands, a list of subtab options appear. See the Infrastructure Options table for more
information.
Table 28: Infrastructure Subtabs
Step 2
Subtab Name
Description
System Configuration
Displays General system configuration information,
Management Access information, Controllers, and Event
Analytics.
Inter-Region Connectivity
Displays one pane with a map that contains the inter-region
connectivity view and additional panes for each region.
Inter-Site Connectivity
Displays one pane with a map that contains the inter-site
connectivity view and additional panes for each region.
Click the tab that represents the component with the details you want to view.
Viewing Administrative Details
This section explains how to view administrative details using the Cisco Cloud Network Controller GUI. The
administrative details include the information about authentication, security, users, and smart licensing..
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
128
Viewing System Details
Viewing Administrative Details
Step 1
From the Navigation menu, choose the Administrative tab.
When the Administrative tab expands, a list of subtab options appear. See the Administrative Options table for more
information.
Table 29: Administrative Subtabs
Subtab Name
Description
Authentication
Displays the Authentication Default Settings, Login
Domains, and Providers subtabs, which contain the
information described below:
• Authentication Default Settings Tab—Displays
settings information.
• Login Domains Tab—Displays the login domains as
rows in a summary table.
• Providers Tab—Displays the providers as rows in a
summary table.
• Event Analytics Tab—Displays the Faults, Events,
and Audit Logs subtabs, each with the corresponding
information displayed as rows in a summary table.
Security
Contains the following list of subtabs:
• Security Default Settings Tab—Enables you to view
the default security settings information.
• Security Domains Tab—Enables you to view security
domain information in a summary table.
• Roles Tab—Enables you to view the role information
in a summary table.
• RBAC Rules Tab—Enables you to view RBAC rule
information in a summary table.
• Certificate Authorities Tab—Enables you to view the
certificate authority information in a summary table.
• Key Ring Tab—Enables you to view key ring
information in a summary table.
Users
Contains the following subtabs:
• Local Tab—Displays local users as rows in a summary
table.
• Remote Tab—Displays remote users as rows in a
summary table.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
129
Viewing System Details
Viewing Health Details Using the Cisco Cloud Network Controller GUI
Subtab Name
Description
Smart Licensing
Contains the following subtabs:
• General Tab—Displays the licenses as rows in a
summary table.
• Faults Tab—Displays faults as rows in a summary
table.
Step 2
Click the tab that represents the component you want to view.
For some options, a summary table appears with items as rows in the table (For example, if you choose the Users tab, a
list of users appear as rows in a summary table). To view a summary pane, click the row that represents the specific
component you want to view. To view more information, double-click the summary table row that represents the specific
item you want to view. A new dialog box appears over the work pane that displays additional information about the item
you chose from the summary table.
Note
You can filter the rows by entering an attribute in the Filter by Attributes bar.
Viewing Health Details Using the Cisco Cloud Network
Controller GUI
This section explains how to view health details using the Cisco Cloud Network Controller GUI. You can
view health details for any object that you can see in the Cloud Resources area in the Cisco Cloud Network
Controller GUI, such as the following:
• Regions
• Availability Zones (for AWS cloud sites)
• VPCs (for AWS cloud sites)
• VNETs (for Azure cloud sites)
• Routers
• Security Groups
• Endpoints
• Instances
• Cloud Services
Step 1
From the Navigation menu, choose the Dashboard tab.
The Dashboard window for the Cisco Cloud Network Controller system appears. From this window, you can view the
overall health status of your system.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
130
Viewing System Details
Viewing Health Details Using the Cisco Cloud Network Controller GUI
Step 2
Click within the Fault Summary area in the Dashboard window.
The Event Analytics window appears, showing more detailed information for the specific fault level that you clicked.
The following screen shows an example Event Analytics window for the faults listed with critical severity.
Step 3
Click the X next to the Severity level to display Event Analytics information for all faults.
The information provided in the Event Analytics window changes to show the events with critical, major, and warning
levels of severity.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
131
Viewing System Details
Viewing Health Details Using the Cisco Cloud Network Controller GUI
Step 4
From the Navigation menu, choose the Cloud Resources tab.
When the Cloud Resources tab expands, a list of subtab options appear. See the Administrative Options table for more
information.
Step 5
Choose any item under the Cloud Resources tab to display health information for that component.
For example, the following figure shows health information that might be displayed when you click on Cloud Resources >
Regions, then you select a specific region.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
132
CHAPTER
6
Deploying Layer 4 to Layer 7 Services
• Overview, on page 133
• Deploying a Service Graph, on page 137
Overview
The Cisco Cloud Network Controller enables you to deploy Layer 4 to Layer 7 service devices to the public
cloud. This initial release supports application load balancer (ALB) deployments in Amazon Web Services
(AWS).
About Application Load Balancers
An application load balancer (ALB) is a Layer 7 load balancer that inspects packets and creates access points
to HTTP and HTTPS headers. It also identifies the load and spreads it out to the targets with higher efficiency.
You deploy an ALB using a service graph, which enables you to define how you want traffic to come into
the network, the devices that the traffic passes through, and how the traffic leaves the network. You specify
these actions by configuring one or more listeners.
Listeners enable you to specify the ports and protocols (HTTP or HTTPS) that the ALB accepts traffic on.
When specifying HTTPS, you also choose a security policy and an SSL certificate.
Note
A listener can have multiple certificates.
All listeners require you to configure at least one rule (a default rule, which does not have a condition). Rules
enable you to specify the action that the load balancer takes when a condition is met. For example, you can
create a rule that redirects traffic to a specified URL when a request is made to a specified hostname or path.
There are two deployment types: internet-facing and internal-facing. An internet-facing deployment inserts
the ALB as a service between the consumer external EPG and the provider cloud EPG. The following figure
shows the contract configuration within the VRF and the ALB as a service inserted between the consumer
external EPG and the provider cloud EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
133
Deploying Layer 4 to Layer 7 Services
About Application Load Balancers
Figure 11: Internet-Facing Deployment
An internal-facing deployment inserts the ALB as a service between the consumer cloud EPG and the provider
cloud EPG. The following figure shows the contract configuration within the VRF and the ALB as a service
inserted between the consumer cloud EPG and provider cloud EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
134
Deploying Layer 4 to Layer 7 Services
Dynamic Server Attachment to Server Pool
Figure 12: Internal-Facing Deployment
Note
You can find more information about ALBs in the documentation on the AWS website.
Dynamic Server Attachment to Server Pool
Servers in the server pool or target group are dynamically added. You do not need to specify the IP addresses
or instance Ids for the targets. The relation from a listener rule to a provider cloud EPG is used for the dynamic
selection of endpoints. The relation is also used for adding the endpoints to the target group. By default, the
endpoints are registered with the port number 80.
Based on the target group-to-security group association that is provided in the ALB, and the EPG (security
group) of the endpoint, the EC2 instance (server) is associated to the target group dynamically on the target
group's default port. Alternatively, instead of registering the EC2 instance on the target group port, you can
attach the custom port by specifying the ports in the following table:
Table 30: Custom Port-Based Attachment
Provider EPG
Ports
EPGMap:<Epg1DN>
9090
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
135
Deploying Layer 4 to Layer 7 Services
About Service Graphs
Provider EPG
Ports
EPGMap:<Epg2DN>
9091, 9099
You can specify EPGMap:<EpgDN> as the tag and the list of ports to be registered on the target group as a
list separated by commas.
About Service Graphs
The Cisco Application Centric Infrastructure (ACI) treats services as a part of an application. Any services
that are required are treated as a service graph that is instantiated on the Cisco ACI fabric from the Cisco
APIC. You define the service for the application while service graphs identify the set of network or service
functions that the application needs.
A service graph represents the network using the following elements:
• Function node—A function node represents a function that is applied to the traffic, such as a load balancer.
A function within the service graph might require one or more parameters and have one or more
connectors.
• Terminal node—A terminal node enables input and output from the service graph.
• Connector—A connector enables input and output from a node.
After the graph is configured, the Cisco APIC automatically configures the services according to the service
function requirements that are specified in the service graph. The Cisco APIC also automatically configures
the network according to the needs of the service function that is specified in the service graph, which does
not require any change in the service device.
A service graph is represented as two or more tiers of an application with the appropriate service function
inserted between them.
A service appliance (device) performs a service function within the graph. One or more service appliances
might be required to render the services required by a graph. A single-service device can perform one or more
service functions.
Service graphs and service functions have the following characteristics:
• Traffic sent from specific endpoint groups can be redirected based on a policy.
• Service graph redirection is directional. In other words, redirection can be applied to both traffic directions
or either one of them.
• Logical functions can be rendered on the appropriate device, based on the policy.
• The service graph supports splits and joins of edges, and it does not restrict the administrator to linear
service chains.
• Traffic can be reclassified again in the network after a service appliance emits it.
By using a service graph, you can install a service, a load balancer, once and deploy it multiple times in
different logical topologies. Each time the graph is deployed, Cisco ACI takes care of changing the configuration
on the service device to enable the forwarding in the new logical topology.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
136
Deploying Layer 4 to Layer 7 Services
About Function Nodes
About Function Nodes
A function node represents a single service function. A function node has function node connectors, which
represent the network requirement of a service function.
A function node within a service graph requires the following parameters:
• A tenant
• A cloud context profile with subnets in two availability zones
Function parameters can be specified when the service graph is rendered. For example, if the function node
is a load balancer, the listener and its rule can be specified for the function node at the time the graph is
rendered.
About Terminal Nodes
Terminal nodes connect a service graph with the contracts. You can insert a service graph for the traffic
between two application cloud EPGs by connecting the terminal node to a contract. Once connected, traffic
between the consumer cloud EPG and provider cloud EPG of the contract is redirected to the service graph.
Deploying a Service Graph
The service graph enables you to define how traffic flows between devices, how the traffic comes into the
network, which devices the traffic passes through, and how the traffic leaves the network.
Before you can configure a service graph, you must first configure the following:
1. A tenant
2. A cloud context profile
3. Subnets
4. An application profile
5. A consumer EPG
6. A provider EPG
7. A contract
Deploying the Service Graph Using the Cisco Cloud Network Controller GUI
Creating a Load Balancer Using the Cisco Cloud Network Controller GUI
This section explains how to create a load balancer using the Cisco Cloud Network Controller GUI.
Step 1
Click Application Management > Services.
The Services page appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
137
Deploying Layer 4 to Layer 7 Services
Creating a Load Balancer Using the Cisco Cloud Network Controller GUI
Step 2
Click the Devices tab, then click Actions > Create Device.
The Create Device page appears.
Step 3
Enter the appropriate values in each field as listed in the following Create Device Dialog Box Fields table then continue.
Table 31: Create Device Dialog Box Fields
Properties
Description
General
Name
Enter the name of the load balancer.
Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog appears.
b. From the column on the left, click to choose a tenant.
c. Click Select. You return to the Create Device dialog box.
Settings
Service Type
Choose Application Load Balancer.
Scheme
Choose Internal or Internet Facing.
Subnets
You can specify only one subnet per availabilty zone. You must specifiy subnets from
at least two availability zones to increase the availability of your load balancer.
a. Click Add Subnet.
The Add Subnet dialog box appears.
b. In the Add Subnet dialog box, click Select Cloud Context Profile.
The Select Cloud Context Profile dialog box appears.
c. In the Select Cloud Context Profile dialog box, select a cloud context profile,
then click Select.
You are returned to the Add Subnet dialog box.
d. In the Add Subnet dialog box, click Select Subnet.
The Select Subnet dialog box appears.
e. In the Select Subnet dialog box, select a subnet, then click Select.
You are returned to the Add Subnet dialog box.
f.
In the Add Subnet dialog box, click Add.
You are returned to the Create Device page.
Step 4
Click Save when finished.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
138
Deploying Layer 4 to Layer 7 Services
Creating a Service Graph Template Using the Cisco Cloud Network Controller GUI
Creating a Service Graph Template Using the Cisco Cloud Network Controller GUI
This section explains how to configure a service graph template using the Cisco Cloud Network Controller
GUI.
Before you begin
You have already created a device.
Step 1
Click Application Management > Services.
The Services page appears.
Step 2
Click the Service Graphs tab, then click Actions > Create Service Graph.
The Create Service Graph page appears.
Step 3
Enter the appropriate values in each field as listed in the following Create Service Graph Dialog Box Fields table then
continue.
Table 32: Create Service Graph Dialog Box Fields
Properties
Description
General
Name
Enter the name of service graph template.
Tenant
To choose a tenant:
a. Click Select Tenant. The Select Tenant dialog appears.
b. From the column on the left, click to choose a tenant.
c. Click Select. You return to the Create Service Graph
dialog box.
Description
Enter a description of the service graph template.
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
139
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Properties
Description
Select a Device
To choose a device:
a. Drag and drop the Application Load Balancer icon to
the Drop Device area in the service graph.
The Service Node dialog box appears.
b. Click Select Application Load Balancer.
The Select Application Load Balancer dialog appears.
c. From the column on the left, click to choose a device.
d. Click Select.
You return to the Service Node dialog box.
e. Click Add.
You return to the Create Service Graph window.
Step 4
Click Save when finished.
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
This section explains how to deploy Layer 4 to Layer 7 services.
Before you begin
• You have configured a device.
• You have configured a service graph.
Step 1
Click the Intent icon. The Intent menu appears.
Step 2
Click the drop-down arrow below the Intent search box and choose Configuration.
A list of Configuration options appear in the Intent menu.
Step 3
From the Configuration list in the Intent menu, click EPG Communication. The EPG Communication dialog box
appears with the Consumer EPGs, Contract, and Provider EPGs information.
Step 4
To choose a contract:
a) Click Select Contract. The Select Contract dialog appears.
b) In the pane on the left side of the Select Contract dialog, click to choose a contract then click Select. The Select
Contract dialog box closes.
Step 5
To add a consumer EPG:
a) Click Add Consumer EPGs. The Select Consumer EPGs dialog appears.
b) In the pane on the left side of the Select Consumer EPGs dialog, click to place a check in a check box to choose
a cloud EPG (for an internal facing load balancer) or a cloud external EPG (for an internet facing load balancer)
then click Select. The Select Consumer EPGs dialog box closes.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
140
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Step 6
To add a provider EPG:
a) Click Add Provider EPGs. The Select Provider EPGs dialog appears.
b) In the pane on the left side of the Select Provider EPGs dialog, click to place a check in a check box to choose a
provider EPG then click Select. The Select Provider EPGs dialog box closes.
Step 7
To choose a service graph:
a) From the EPG Communication Configuration dialog, click Select Service Graph. The Select Service Graph
dialog box appears.
b) In the pane on the left side of the Select Service Graph dialog, click to choose a service graph then click Select.
The Select Service Graph dialog box closes.
Step 8
Under Service Graph Preview, click Add Cloud Load Balancer Listener. The Add Cloud Load Balancer Listener
dialog appears that enables you to add listeners.
Listeners are the ports and protocols that the device will work on.
Step 9
Enter the appropriate values in each field as listed in the following Add Cloud Load Balancer Listener Dialog Box
Fields table then continue.
Table 33: Add Cloud Load Balancer Listener Dialog Box Fields
Properties
Description
Name
Enter the name of the listener.
Port
Enter the port that the device will accept traffic on.
Protocol
Click to choose HTTP or HTTPS.
Security Policy
Click the drop-down list and choose a security policy (only
available when HTTPS is chosen).
SSL Certificate
To choose an SSL certificate(only available when HTTPS
is chosen):
a. Click Add SSL Certificates.
b. Click to place a check mark in the check box of the
certificates you want to add.
c. Choose a key ring:
1. Click Select Key Ring. The Select Key Ring
dialog appears.
2. From the Select Key Ring dialog, click to choose
a key ring in the left column then click Select. The
Select Key Ring dialog box closes.
d. Click the Certificate Store drop-down list and choose
a certificate.
Note
A listener can have multiple certificates.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
141
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Properties
Description
Add Rule
To add rule settings to the device listener, click Add Rule.
A new row appears in the Rules list an the Rules Settings
fields are enabled.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
142
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Properties
Description
Rule Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
143
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Properties
Description
The Rule Settings pane contains the following options:
• Name—Enter a name for the rule.
• Host—Enter a hostname to create a host-based
condition. When a request is made for this hostname,
the action you specify is taken.
• Path—Enter a path to create a path-based condition.
When a request is made for this path, the action you
specify is taken.
• Type—The action type tells the device which action
to take. The action type options:
• Return fixed response—Returns a response
using the following options:
• Fixed Response Body—Enter a response
message.
• Fixed Response Code—Enter a response
code.
• Fixed response Content-Type—Choose
a content type.
• Forward—Forwards traffic using the following
options:
• Port—Enter the port that the device will
accept traffic on.
• Protocol—Click to choose HTTP or
HTTPS.
• Provider EPG—The EPG with the web
server that handles the traffic.
• EPG—To choose an EPG:
a. Click Select EPG. The Select EPG
dialog box appears.
b. From the Select EPG dialog ox, click
to choose an EPG in the left column
then click Select. The Select EPG
dialog box closes.
• Redirect—Redirects requests to another location
using the following options:
• Redirect Code—Click the Redirect Code
drop-down list and choose a code.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
144
Deploying Layer 4 to Layer 7 Services
Deploying a Service Graph Using the REST API
Properties
Description
• Redirect Hostname—Enter a hostname
for the redirect.
• Redirect Path—Enter a redirect path.
• Redirect Port—Enter the port that the
device will accept traffic on.
• Redirect Protocol—Click to the Redirect
Protocol drop-down list and choose HTTP,
HTTPS, or Inherit.
• Redirect Query—Enter a redirect query.
Click Add Rule when finished.
Step 10
Click Add when finished.
The service graph is deployed.
Deploying a Service Graph Using the REST API
Creating an Internal-Facing Load Balancer Using the REST API
This example demonstrates how to create an internal-facing load balancer using the REST API.
To create an internal-facing load balancer:
Example:
<polUni>
<fvTenant name="t2" status="">
<cloudLB name="ALB1" type="application" scheme="internal" status="">
<cloudRsLDevToCloudSubnet tDn="uni/tn-t2/ctxprofile-c1/cidr-[10.33.0.0/16]/subnet-[10.33.7.0/24]"
status=""/>
<cloudRsLDevToCloudSubnet tDn="uni/tn-t2/ctxprofile-c1/cidr-[10.33.0.0/16]/subnet-[10.33.8.0/24]"
status=""/>
</cloudLB>
</fvTenant>
</polUni>
Configuring an Internet-Facing Load Balancer Using the REST API
This example demonstrates how to create an internet-facing load balancer using the REST API.
To create an internet-facing load balancer:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
145
Deploying Layer 4 to Layer 7 Services
Creating a Service Graph Using the REST API
Example:
<polUni>
<fvTenant name="t2" status="">
<cloudLB name="ALB1" type="application" scheme="internet" status="">
<cloudRsLDevToCloudSubnet tDn="uni/tn-t2/ctxprofile-c1/cidr-[10.33.0.0/16]/subnet-[10.33.5.0/24]"
status=""/>
<cloudRsLDevToCloudSubnet tDn="uni/tn-t2/ctxprofile-c1/cidr-[10.33.0.0/16]/subnet-[10.33.6.0/24]"
status=""/>
</cloudLB>
</fvTenant>
</polUni>
Creating a Service Graph Using the REST API
This example demonstrates how to create a service graph using the REST API.
To create a service graph:
<polUni>
<fvTenant name="t2">
<vnsAbsGraph name="CloudGraph" type="cloud" status="">
<vnsAbsTermNodeProv name="Input1">
<vnsAbsTermConn name="C1"/>
</vnsAbsTermNodeProv>
<vnsAbsTermNodeCon name="Output1">
<vnsAbsTermConn name="C2"/>
</vnsAbsTermNodeCon>
<vnsAbsNode funcType="GoTo" name="N1" managed="yes">
<vnsRsNodeToCloudLDev tDn="uni/tn-t2/clb-ALB1" status=""/>
<vnsAbsFuncConn name="provider"/>
<vnsAbsFuncConn name="consumer"/>
</vnsAbsNode>
<vnsAbsConnection connDir="consumer" connType="external" name="CON2">
<vnsRsAbsConnectionConns tDn="uni/tn-t2/AbsGraph-CloudGraph/AbsTermNodeCon-Output1/AbsTConn"/>
<vnsRsAbsConnectionConns tDn="uni/tn-t2/AbsGraph-CloudGraph/AbsNode-N1/AbsFConn-consumer"/>
</vnsAbsConnection>
<vnsAbsConnection connDir="provider" connType="internal" name="CON1">
<vnsRsAbsConnectionConns tDn="uni/tn-t2/AbsGraph-CloudGraph/AbsTermNodeProv-Input1/AbsTConn"/>
<vnsRsAbsConnectionConns tDn="uni/tn-t2/AbsGraph-CloudGraph/AbsNode-N1/AbsFConn-provider"/>
</vnsAbsConnection>
</vnsAbsGraph>
</fvTenant>
</polUni>
Attaching a Service Graph Using the REST API
This example demonstrates how to attach a service graph using the REST API.
To attach a service graph:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
146
Deploying Layer 4 to Layer 7 Services
Configuring an HTTP Service Policy Using the REST API
<polUni>
<fvTenant name="t2">
<vzBrCP name="httpFamily">
<vzSubj name="default" revFltPorts="yes" targetDscp="unspecified">
<vzRsSubjGraphAtt tnVnsAbsGraphName="CloudGraph"/>
</vzSubj>
</vzBrCP>
</fvTenant>
</polUni>
Configuring an HTTP Service Policy Using the REST API
This example demonstrates how to create an HTTP service policy using the REST API.
To create an HTTP service policy:
<polUni>
<fvTenant name="t2">
<vnsAbsGraph name="CloudGraph" type="cloud" status="">
<vnsAbsNode funcType="GoTo" name="N1" managed="yes">
<cloudSvcPolicy tenantName="t2" contractName="httpFamily" subjectName="consubj">
<cloudListener name="http_listener1" port="80" protocol="http" status="">
<cloudListenerRule name="rule1" priority="10" default="yes" status="">
<cloudRuleAction type="forward" port="80" protocol="http"
epgdn="uni/tn-t2/cloudapp-ap/cloudepg-provEPG"/>
</cloudListenerRule>
<cloudListenerRule name="redirectRule" priority="20">
<cloudRuleCondition type="path" value="/img/*"/>
<cloudRuleAction type="redirect" RedirectPort="8080"/>
</cloudListenerRule>
<cloudListenerRule name="FixedRspRule" priority="30">
<cloudRuleCondition type="host" value="example.com"/>
<cloudRuleAction type="fixedResponse" FixedResponseCode="200"/>
</cloudListenerRule>
<cloudListenerRule name="redirectHPRule" priority="40" status="">
<cloudRuleCondition type="host" value="example.com"/>
<cloudRuleCondition type="path" value="/img/*"/>
<cloudRuleAction type="forward" port="80" protocol="http"
epgdn="uni/tn-t2/cloudapp-ap/cloudepg-provEPG"/>
</cloudListenerRule>
</cloudListener>
</cloudSvcPolicy>
</vnsAbsNode>
</vnsAbsGraph>
</fvTenant>
</polUni>
Configuring a Key Ring Using the REST API
This example demonstrates how to configure a key ring using the REST API. For more information about
key ring configuration, see the Cisco APIC Basic Configuration Guide.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
147
Deploying Layer 4 to Layer 7 Services
Configuring a Key Ring Using the REST API
To configure a key ring:
<polUni>
<fvTenant name="t2">
<cloudCertStore>
<pkiKeyRing status="" name="lbCert" tp="lbTP" key="-----BEGIN RSA PRIVATE KEY----MIIEpQIBAAKCAQEA4DGxaK+RHv/nToHLnmDBq2BfLimgX/zNJQC9bGuzr8Mj7dm0
XuHfQYGv0h1PtL4Pdxf5qjB0NbHjAVB1Gw8cDiErEgAXy9Km27ySo2foKryNqCRe
Ginn/CgF75QPIed568eScNDZPt/eMeHAuRX/PykKUatWWncGanjvHqc+SOLPF6TD
gQ5nwOHHFvyM2DY8bfdYWrWmGsO7JqZzbPMptA2QWblILsSoIrdkIIgf6ZfYy/EN
bH+nYN2rJT8lzYsxz0YmR0oRQHTiN2NiDY/ZV63yxCXfLg9qpNZCuD8KOfdCZPEq
8takiWBxiR5/HRPscWAdWQsoiKgG1k4NEbFA9QIDAQABAoIBAQDQqA9IslYrdtqN
q6mZ3s2BNfF/4kgb7gn0DWs+9EJJLCJNZVhFEo2ZxxyfPp6HRnjYS50W83/E1anD
+GD1bSucTuxqFWIQVh7r1ebYZIWk+NYSjr5yNVxux8U2hCNNV8WWVqkJjKcUqICB
Bm47FKj53LV46zE0gyCaibFrYxZJ9+farGneyBdnoV+3thmez7534KCi0t3J3Eri
lgSY3ql6hPXB2ZXAP4jdAoLgWDU4I1M6OqOiWopZM/QYIE/WtPYyJ0QzNCXObtc5
FboDcvedsgd4x5GlfV2A4xTBQMCTZUZJ9fYAcFogTZXD+UVqxorh47tf/mz+1fjq
f1XphEDlAoGBAPVlvKfGW46qqRnYovfryxxz4OMlsVSgcJpQTQtBQi2koJ8OwEZJ
2s+CX0r+oDqwP23go/QEVYVkcic9RGkJBNge1+dm/bTjzgMQYtqSCNtecTsZD5JN
y1jkciizznDkjcjReSZ2kh3dGXIbRiYk7ezp2z7EKfDrHe5x5ouGMgCnAoGBAOnh
buDEohv8KJaB+DiUfhtoa3aKNPBO+zWPCHp0HFGjPXshJcIYZc1GcycmuDKVNnDd
MxhE/yOnQHowi4T9FMLpz5yh5zuCUVqOBgB1P6MzbC5t5MtLrEYr/AqFN11CqyXQ
cVcT6iCW1OAFJRw3c/OiESwLMzchsl8RnbwOi6kDAoGBANVlzmPb07zB3eGTCU0t
KGiqwFLncUkVaDZZRFZYPpNwiRkoe73j9brkNbgCqxW+NLp5UjoeFry0N6y106q/
ZA4I7FnXryLBw2HYuw41Vixl+XOZ/HeO3RmFN1z717dGmaGbv43aKIB9x+X5n8wF
6z1NtBHmBk7yNwom1IRag1sbAoGAX0p4cJ/tJNXSe7AswHDQCL68uimJdDfZ5nKG
k83nE+Qc0qQozDJAmCiSFmuSNRnSep3FiafjBFXK0X4h+mdbJCc7bagRnI92Mh0X
mOwsp4P2GdywkZwdbuHQ6UBp1Ferf9aztzTn+as6xKOUATEezy9DK9zMWzQhhtaY
m9yZTp0CgYEA1UtcpWjAzQbXODJGmxGdAAakPpeiKw/Da3MccrTdGJt88ezM1Oej
Pdoab0G2PcfgJZoTSGk7N4XArVKeq7pgZ0kwcYAshO6A2Hal+D1z/bGoZP+kmD/x
Ny82phxYOXCnEc5Vv92lU59+j7e067UFLAYJe6fu+oFImvofRnP4DIQ= -----END RSA PRIVATE KEY-----" cert="-----BEGIN
CERTIFICATE----- MIIElTCCA32gAwIBAgIJAKWNjp//arBsMA0GCSqGSIb3DQEBCwUAMIGNMQswCQYD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 qopM6et5ZKqShX4T87BsgZIoiquzXqsuHg==
-----END CERTIFICATE-----">
</pkiKeyRing>
<pkiTP status="" name="lbTP" certChain="-----BEGIN CERTIFICATE----MIIElTCCA32gAwIBAgIJAKWNjp//arBsMA0GCSqGSIb3DQEBCwUAMIGNMQswCQYD
VQQGEwJVUzELMAkGA1UECBMCQ0ExETAPBgNVBAcTCFNhbiBKb3NlMRIwEAYDVQQK
EwlNeUNvbXBhbnkxDjAMBgNVBAsTBU15T3JnMRgwFgYDVQQDFA8qLmFtYXpvbmF3
cy5jb20xIDAeBgkqhkiG9w0BCQEWEXJhbXNoYWhAY2lzY28uY29tMB4XDTE4MTAw
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
148
Deploying Layer 4 to Layer 7 Services
Creating an HTTPS Service Policy Using the REST API
MjIwNTMwNVoXDTE5MTAwMjIwNTMwNVowgY0xCzAJBgNVBAYTAlVTMQswCQYDVQQI
EwJDQTERMA8GA1UEBxMIU2FuIEpvc2UxEjAQBgNVBAoTCU15Q29tcGFueTEOMAwG
A1UECxMFTXlPcmcxGDAWBgNVBAMUDyouYW1hem9uYXdzLmNvbTEgMB4GCSqGSIb3
DQEJARYRcmFtc2hhaEBjaXNjby5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
ggEKAoIBAQDgMbFor5Ee/+dOgcueYMGrYF8uKaBf/M0lAL1sa7OvwyPt2bRe4d9B
ga/SHU+0vg93F/mqMHQ1seMBUHUbDxwOISsSABfL0qbbvJKjZ+gqvI2oJF4aKef8
KAXvlA8h53nrx5Jw0Nk+394x4cC5Ff8/KQpRq1ZadwZqeO8epz5I4s8XpMOBDmfA
4ccW/IzYNjxt91hataYaw7smpnNs8ym0DZBZuUguxKgit2QgiB/pl9jL8Q1sf6dg
3aslPyXNizHPRiZHShFAdOI3Y2INj9lXrfLEJd8uD2qk1kK4Pwo590Jk8Sry1qSJ
YHGJHn8dE+xxYB1ZCyiIqAbWTg0RsUD1AgMBAAGjgfUwgfIwHQYDVR0OBBYEFBYq
K3b39+1oOr4IBSsePwcOpML7MIHCBgNVHSMEgbowgbeAFBYqK3b39+1oOr4IBSse
PwcOpML7oYGTpIGQMIGNMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExETAPBgNV
BAcTCFNhbiBKb3NlMRIwEAYDVQQKEwlNeUNvbXBhbnkxDjAMBgNVBAsTBU15T3Jn
MRgwFgYDVQQDFA8qLmFtYXpvbmF3cy5jb20xIDAeBgkqhkiG9w0BCQEWEXJhbXNo
YWhAY2lzY28uY29tggkApY2On/9qsGwwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0B
AQsFAAOCAQEAe/RuzCheLIbHbrurGet6eaVx9DPYydNiKVBSAKO+5iuR84mQzhoT
nx5CN109xu5ml5baCYZZsSnn6D7usC092bPA/kRCGxt29gkjpWA74tJHqIhVWgbM
mOrLiSHoelewv+wRl0oVRChlTfKtXO68TUk6vrqpw76hKfOHIa7b2h1IIMdq6VA/
+A5FQ0xqYfqKdVd2RaINpzI8mqZiszqw+7E6j1PL5k4tftWEaYpfGPlVesFEyJEL
gHBUiPt8TIbaMYI8qUQmB/emnLXeKQ5PRxdRnleA3h8jfq3D1CQRTLjmDL3tpFwg qopM6et5ZKqShX4T87BsgZIoiquzXqsuHg==
-----END CERTIFICATE-----">
</pkiTP>
</cloudCertStore>
</fvTenant>
</polUni>
Creating an HTTPS Service Policy Using the REST API
This section demonstrates how to create an HTTPS service policy using the REST API.
Note
A listener can have multiple certificates. The certificate options are:
• ELBSecurityPolicy-2016-08 – The default when no security policy is chosen.
• ELBSecurityPolicy-FS-2018-06
• ELBSecurityPolicy-TLS-1-2-2017-01
• ELBSecurityPolicy-TLS-1-2-Ext-2018-06
• ELBSecurityPolicy-TLS-1-1-2017-01
• ELBSecurityPolicy-2015-05
• ELBSecurityPolicy-TLS-1-0-2015-04
If you use multiple certificates, you must specify the default certificate. The default is specified using the
defaultCert property in cloudRsListenerToCert.
Before you begin
You have already configured a key ring certificate.
To create an HTTPS service policy:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
149
Deploying Layer 4 to Layer 7 Services
Creating an HTTPS Service Policy Using the REST API
<polUni>
<fvTenant name="t2">
<vnsAbsGraph name="CloudGraph" type="cloud" status="">
<vnsAbsNode funcType="GoTo" name="N1" managed="yes">
<cloudSvcPolicy tenantName="t2" contractName="httpFamily" subjectName="consubj">
<cloudListener name="https_listener" port="443" protocol="https"
secPolicy="eLBSecurityPolicy-2016-08" status="">
<cloudRsListenerToCert defaultCert="yes" certStore="iam"
tDn="uni/tn-t2/certstore/keyring-lbCert" status=""/>
<cloudListenerRule name="defaultRule" default="yes" priority="100" status="">
<cloudRuleAction type="forward" port="80" protocol="http"
epgdn="uni/tn-t1/cloudapp-ap/cloudepg-ep1">
</cloudRuleAction>
</cloudListenerRule>
</cloudListener>
</cloudSvcPolicy>
</vnsAbsNode>
</vnsAbsGraph>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
150
CHAPTER
7
Cisco Cloud Network Controller Statistics
• About Cisco Cloud Network Controller Statistics, on page 151
• AWS Networking Interface Statistics Collection, on page 151
• Cisco Cloud Network Controller Endpoints and cloudEPg Statistics Processing, on page 152
• Cisco Cloud Network Controller Statistics Filters, on page 152
• AWS Transit Gateway Statistics, on page 153
• Enabling VPC Flow Logs, on page 154
• Cloud Router Statistics, on page 157
About Cisco Cloud Network Controller Statistics
Cisco Cloud Network Controller supports statistics that are collected from the cloud routers. Additionally, it
supports statistics that are derived by processing Amazon Web Services (AWS) flow logs. Because AWS
flow logs is not a free service, the Cisco Cloud Network Controller provides a policy that allows you to control
this feature. This feature is not enabled by default.
For more information about CloudWatch and flow logs, see "VPC Flow Logs" for Amazon Virtual Private
Cloud on the AWS website.
Beginning in Cisco Cloud Network Controller Release 5.0(1), you can do the following:
• You can use filters to see specific information from the AWS flow logs. You can define up to eight filters
for a given flow log policy (or VPC) at the same time. You can filter for a combination of source or
destination IP address, port and protocol. See Cisco Cloud Network Controller Statistics Filters, on page
152 for more information.
• You can collect statistics for traffic to and from AWS Transit Gateways. See the section AWS Transit
Gateway Statistics, on page 153 in this guide.
AWS Networking Interface Statistics Collection
AWS provides the nonreal-time IP traffic information per network interface through flow logs. Cisco Cloud
Network Controller provides a policy for enabling flow logs per cloudCtxProfile. Because the
cloudCtxProfile maps to a VPC in AWS, enabling flow logs per cloudCtxProfile or VPC means that you
enabled flow logs for each interface belonging to that VPC. Once flow logs are enabled, flow records are
periodically pushed to AWS Cloudwatch. The Cisco Cloud Network Controller then periodically polls AWS
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
151
Cisco Cloud Network Controller Statistics
Cisco Cloud Network Controller Endpoints and cloudEPg Statistics Processing
CloudWatch for these flow records and parses these records to extract statistics. Because it can take up to 15
minutes to publish flow records to CloudWatch, the Cisco Cloud Network Controller delays its flow logs
query to CloudWatch by 15 minutes too. This means that there is a lag between the flow logs being present
in CloudWatch and the corresponding statistics showing up on the Cisco Cloud Network Controller. Cisco
Cloud Network Controller does not process flow records that take longer than 15 minutes to publish to
CloudWatch.
Cisco Cloud Network Controller Endpoints and cloudEPg
Statistics Processing
The Cisco Cloud Network Controller extracts the following statistics for each AWS networking endpoint that
has flow logs present in CloudWatch:
• Number of bytes or packets sent (egress)
• Number of bytes or packets received (ingress)
• Number of bytes or packets rejected (egress drop)
• Number of bytes or packets dropped (ingress drop)
These statistics are associated with the cloudEpInfoHolder observable.
Also, the Cisco Cloud Network Controller maps the flow log records to one or more per region cloudEPg
objects. This is because a cloudEPg can be present in multiple regions. These statistics are associated with
the cloudRgInfoHolder observable. This observable is a child of cloudEPg and the accumulation of statistics
for the cloudRgInfoHolder children results in statistics for cloudEPg. The cloudEPg supports the following
statistics:
• Number of bytes or packets sent (egress)
• Number of bytes or packets received (ingress)
• Number of bytes or packets rejected (egress drop)
• Number of bytes or packets dropped (ingress drop)
The cloudEPg statistics are aggregated up fvApp and then up fvTenant.
Cisco Cloud Network Controller Statistics Filters
Beginning in Cisco Cloud Network Controller Release 5.0(1), you can use filters to see specific information
from the Amazon Web Services (AWS) flow logs.
Statistics are collected for each endpoint on which the filter is deployed. The filters enable you to see information
about a flow, filtered by a combination of source or destination IP address, port, and protocol. You can define
up to eight filters for a given AWS log group at the same time.
A statistics filter has the following three attributes:
• PeerIP: The IPv4 address to filter
• PeerPort: The port number to listen to
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
152
Cisco Cloud Network Controller Statistics
AWS Transit Gateway Statistics
• Protocol: The protocol number to listen to
Note
We recommend that you configure statistics filters using the Cisco Cloud Network Controller GUI. You can
alternatively use REST API; however, if you do and then switch to the GUI, the feature will appear incomplete.
You should stick to the method that you choose.
Use of statistics filters depend on enabling Virtual Private Cloud (VPC) flow log; you must enable the logs
before you configure the statistics filters.
Flow logs, which are stored in AWS CloudWatch, consist of flow log records. Cisco Cloud Network Controller
extracts statistics by parsing the flow log records.
It can take up to 15 minutes from the occurrence of a particular flow record to its being present in AWS
CloudWatch. Cisco Cloud Network Controller polls for flow records that occurred 15 minutes or more in the
past. It does not process flow records that take longer than 15 minutes to appear in AWS CloudWatch.
AWS Transit Gateway Statistics
You can collect statistics for traffic going through Amazon Web Services (AWS) Transit Gateways on both
the infra tenant and the user tenant. Statistics reported for user tenant represent the traffic of an attachment
between an user VPC and an AWS Transit Gateway. Statistics reported from infra tenant represents the traffic
of an attachment between an infra VPC and a Transit Gateway.
The following statistics are collected for AWS Transit Gateway:
• Ingress packets
• Ingress packet bytes
• Ingress packet drops
• Ingress packet drop bytes
• Egress packets
• Egress packet bytes
• Egress packet drops
• Egress packet drop bytes
You can enable infra tenant Transit Gateway statistics collection from the Cisco Cloud Network Controller
Setup - Region Management page. See the section "Set Up the Cloud Site to Use AWS Transit Gateway"
in Increasing Bandwidth Between VPCs by Using AWS Transit Gateway.
You can enable user tenant Transit Gateway statistics collection by enabling flow logs on the user VPC. See
the sections Enabling VPC Flow Logs, on page 154 and Enabling VPC Flow Logs Using the Cisco Cloud
Network Controller GUI, on page 154 in this guide.
To view AWS Transit Gateway statistics, in the Cisco Cloud Network Controller GUI, click the Statistics
tab and then click AWS Transit Gateway in the left navigation pane. The central pane displays the information.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
153
Cisco Cloud Network Controller Statistics
Enabling VPC Flow Logs
Enabling VPC Flow Logs
Steps to enable VPC Flow Logs:
1. Define a log group policy.
2. Define a flow log policy and associate the log group that you defined in the first step.
3. Associate the flow log policy to one or more cloudCtxProfile.
Log group properties:
• name—The location in CloudWatch where flow logs are sent.
Note
The actual log group name that is programmed in AWS is the concatenation of
<tenant name><cloudCtxProfile name><log group name>.
• retention—The length of duration for storing the logs in CloudWatch. The default is 5-days.
Flow log properties:
• trafficType—The type of traffic to collect. Supported types are all, accepted only, and rejected only.
The default is all.
Enabling VPC Flow Logs Using the Cisco Cloud Network Controller GUI
This section explains how to enable VPC flow logs using the Cisco Cloud Network Controller GUI.
Note
Step 1
If you want to use filters to see specific information from AWS flow logs, perform the optional steps in this
procedure.
Click the Navigation menu and choose Application Management > Tenants.
The Tenants window appears with the tenants listed as rows in a summary table.
Step 2
Double-click on a tenant.
The tenant dialog box appears over the Work pane. The tenant dialog box displays the Overview, Cloud Resources,
Application Management, Statistics, and Event Analytics tabs.
Step 3
Click the Statistics tab.
The EPGs, CCRs, and Flow Log Collection subtabs appear.
Step 4
Click Flow Log Collection.
The Flow Log Collection Settings information appears at the top of the dialog box with the edit icon in the top-right
corner.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
154
Cisco Cloud Network Controller Statistics
Enabling VPC Flow Logs Using the Cisco Cloud Network Controller GUI
Step 5
Click the edit icon.
The Flow Log Collection Settings dialog box appears.
Step 6
Enter the appropriate values in each field as listed in the following Flow Log Collection Settings Dialog Box Fields table
then continue.
Table 34: Flow Log Collection Settings Dialog Box Fields
Properties
Description
Type of Traffic to be Logged
Click the Type of Traffic to be Logged drop-down list and
choose one of the following options:
• All Traffic (default)
• Accepted Only Traffic
• Rejected Only Traffic
Destination
Click the Destination drop-down list and choose
CloudWatch (default).
Retention
Click the Retention drop-down list and chose from the
following options:
• 1 day
• 3 days
• 5 days (default)
• 1 month
• 13 months
• 18 months
• 2 months
• 3 months
• 4 months
• 5 months
• 6 months
• 1 week
• 2 weeks
• 1 year
• 10 years
• 2 years
• 5 years
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
155
Cisco Cloud Network Controller Statistics
Enabling VPC Flow Logs Using the REST API
Step 7
(Optional) Add flow filters to get information about source and destination IP addresses, ports, or protocols by completing
the following tasks:
For information about statistics filters, see the section Cisco Cloud Network Controller Statistics Filters, on page 152.
a) Click Add Flow Filters at the bottom of the Flow Log Collection Settings dialog box.
Fields for the filter attributes appear.
After you click on the Add Flow Filters button, you will see a new filter being created; fill out the attributes.
b) In the Peer IP field, enter the IPv4 IP address of the peer.
The address needs to be in the format x.x.x.x/x. It tells the filter which network to monitor. An address of 0.0.0.0/0
will match all.
c) (Optional) From the Protocol drop-down list, choose a protocol to listen to.
The choices are integers from 0 to 255. Entering 255 will match any protocol. Well-known protocols are translated
when text format is given:
• "icmp": 1
• "igp": 9
• "eigrp": 88
• "igmp": 2
• "l2tp": 115
• "ospfigp": 89
• "tcp": 6
• "udp": 17
• "pim": 103
• "egp": 8
• "icmpv6": 58
d) (Optional) In the Peer Port field, enter the port number to listen to.
This number must be an integer from 0 to 65535 or text input for a well-known port number. Entering 0 will match
any port. Well-known protocols are translated when text format is given:
• "dns": 53
• "http": 80
• "rtsp": 554
• "ftpData": 20
• "https": 443
• "pop3": 110
• "smtp": 25
e) (Optional) Check the Active check box and then click the check icon.
Step 8
Click Save.
Enabling VPC Flow Logs Using the REST API
This section demonstrates how to enable VPC flow logs using the REST API.
Step 1
Create a log group:
<cloudAwsLogGroup name="lg1" retention="days-3" status="">
</cloudAwsLogGroup>
Step 2
Create a flow log policy:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
156
Cisco Cloud Network Controller Statistics
Cloud Router Statistics
<cloudAwsFlowLogPol name="flowLog1" trafficType="ALL" status="">
<cloudRsToLogGrp tDn="uni/tn-t20/loggrp-lg1" status=""/>
</cloudAwsFlowLogPol>
Step 3
Create a relationship from a CtxProfile to a flow log policy:
<cloudCtxProfile name=" vrf1" status="">
<cloudRsCtxToFlowLog tnCloudAwsFlowLogPolName="flowLog1" status=""/>
</cloudCtxProfile>
Cloud Router Statistics
These statistics are available for the cloud router:
• Ingress packets
• Egress packets
• Ingress bytes
• Egress bytes
The Cisco Cloud Network Controller collects and stores the cloud router statistics by the following granularities:
• 15-minutes
• 1-hour
• 1-month
• 1-year
Collection Mechanism
Each cloud router instance captures and stores the previously mentioned 4-stat values for each physical and
tunnel interface.
The Cisco Cloud Network Controller queries the cloud routers for these statistics and maps the response to
cloud router statistics on the Cisco Cloud Network Controller. The statistics query repeats every 5 minutes
for as long as the tunnel is up and operational.
Raw Statistics
The raw statistics are stored under 2 Dns:
• uni/tn-<infraTenant>/ctx-<infraCtx>/region-<infraRegion>/router-<csrname>/to-<ip
or
user-region>/tunn-<tunnel-id>
• uni/tn-<userTenant>/ctx-<userCtx>/region-<userRegion>/region-<infraRegion>/router-<csrname>/tunn-<tunnel-id>
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
157
Cisco Cloud Network Controller Statistics
Cloud Router Statistics
Note
• The second Dn holder is the statistics as seen from the user endpoints
connected to the cloud router. These statistics are hence flipped (Ingress on
the CCR becomes egress on the user region)
• Not all tunnels have a corresponding user dn. This is only applicable to
internal tunnels. External tunnels statistics are only available on the 1st Dn.
In the following figure, internal tunnels are between the user VPC and infra VPC. The infra VPC contains
the CCR router. The user VPC can contain the CCR or VGW router. Cisco Cloud Network Controller creates
these tunnels. As a result, statistics are available for both the infra side and the user side. External tunnels are
between infra VPC and an external IP address. Statistics are only available on the infra side (Dn-1).
In the logical model diagram, a tenant can be infra or a user tenant. You configure a VRF (or fvCtx) to be
inside a tenant (per tenant). A VRF can be within one region or span across multiple regions.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
158
Cisco Cloud Network Controller Statistics
Cloud Router Statistics
Aggregated Statistics
Statistics are aggregated at each parent level of the DN. For the preceding case, statistics on tunnel, statistics
are aggregated on to the destination IP, cloud router, region, vrf (ctx), and tenant.
For example, if you want to find the egress packets from the infra cloud router to a user region, it is available
under uni/tn-<infraTenant>/ctx-<infraCtx>/region-<infraRegion>/router-<csrname>/to-<ip or
user-region>/
If you want to get all the packets between user region1 and infra region2, it is available under
uni/tn-<userTenant>/ctx-<userCtx>/region-<userRegion>/region-<infraRegion>/
Also, if you want to find statistics per cloudCtxProfile, it is available under
uni/tn-<userTenant>/ctx-<userCtx>/region-<userRegion>/ or
uni/tn-<infraTenant>/ctx-<infraCtx>/region-<infraRegion>/.
Cloud Router GUI Statistics
In the Cisco Cloud Network Controller GUI, statistics are visible available under the tenant, VRF, infra region,
and cloud context profile.
For Amazon Web Services (AWS) Transit Gateway stats, in the Cloud Context Profile work pane, click
AWS Transit Gateway For all other stats, in the Cloud Context Profile work pane, click Endpoints.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
159
Cisco Cloud Network Controller Statistics
Cloud Router Statistics
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
160
CHAPTER
8
Cisco Cloud Network Controller Security
This chapter contains the following sections:
• Access, Authentication, and Accounting, on page 161
• Configuring TACACS+, RADIUS, LDAP and SAML Access, on page 162
• Configuring HTTPS Access, on page 169
Access, Authentication, and Accounting
Cisco Cloud Network Controller policies manage the authentication, authorization, and accounting (AAA)
functions. The combination of user privileges, roles, and domains with access rights inheritance enables
administrators to configure AAA functions at the managed object level in a granular fashion. These
configurations can be implemented using the REST API or the GUI.
Note
There is a known limitation where you cannot have more than 32 characters for the login domain name. In
addition, the combined number of characters for the login domain name and the user name cannot exceed 64
characters.
For more access, authentication, and accounting configuration information, see Cisco APIC Security
Configuration Guide, Release 4.0(1) at https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/
sw/4-x/security/Cisco-APIC-Security-Configuration-Guide-401.html.
Configuration
The admin account is configured in the initial configuration script, and the admin is the only user when the
system starts.
Configuring a Local User
Refer to Creating a Local User Using the Cisco Cloud Network Controller GUI, on page 106 to configure a
Local User and associate it to the OTP, SSH Public Key, and X.509 User Certificate using the Cisco Cloud
Network Controller GUI.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
161
Cisco Cloud Network Controller Security
Configuring TACACS+, RADIUS, LDAP and SAML Access
Configuring TACACS+, RADIUS, LDAP and SAML Access
The following topics describe how to configure TACACS+, RADIUS, LDAP and SAML access for the Cisco
Cloud Network Controller.
Overview
This topic provides step-by-step instructions on how to enable access to the Cisco Cloud Network Controller
for RADIUS, TACACS+, LDAP, and SAML users, including ADFS, Okta, and PingID.
For additional TACACS+, RADIUS, LDAP, and SAML information, see Cisco APIC Security Configuration
Guide, Release 4.0(1) at https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/
Cisco-APIC-Security-Configuration-Guide-401.html.
Configuring Cisco Cloud Network Controller for TACACS+ Access
Before you begin
• The Cisco Cloud Network Controller is online.
• The TACACS+ server host name or IP address, port, and key are available.
• The Cisco Cloud Network Controller management endpoint group is available.
Step 1
In the Cisco Cloud Network Controller, create the TACACS+ Provider.
a) Click the Global Create icon.
The Global Create menu appears.
b) Scroll down until you see the Administrative area, then click Create Provider under the Administrative area.
The Create Provider dialog box appears.
c)
d)
e)
f)
Step 2
In the Host Name/IP Address field, enter the Host Name/IP Address of the provider.
In the Description field, enter a description of the provider.
Click the Type drop-down list and choose TACACS+.
In Settings section, specify the Key, Port, Authentication Protocol, Timeout, Retries, Management EPG. Select
either Enabled or Disabled for Server Monitoring.
Create the Login Domain for TACACS+.
a) Click the Global Create icon.
The Global Create menu appears.
b) Click the drop-down arrow below the Global Create search box and choose Administrative.
A list of Administrative options appear in the Global Create menu.
c) From the Administrative list in the Global Create menu, click Create Login Domain.
The Create Login Domain dialog box appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
162
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for RADIUS Access
d) Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table
then continue.
Properties
Description
General
Name
Enter the name of the Login Domain
Description
Enter the description of the Login Domain.
Settings
Realm
Choose TACACS+ from the dropdown menu
Providers
To choose a Provider(s):
1. Click Add Providers. The Select Providers dialog
appears.
2. Click to choose a provider(s) in the column on the
left.
3. Click Select. You return to the Create Login Domain
dialog box.
e) Click Save to save the configuration.
What to do next
This completes the APIC TACACS+ configuration steps. Next, if a RADIUS server will also be used, configure
the APIC for RADIUS.
Configuring Cisco Cloud Network Controller for RADIUS Access
Before you begin
• The Cisco Cloud Network Controller is online.
• The RADIUS server host name or IP address, port, and key are available.
• The Cisco Cloud Network Controller management endpoint group is available.
Step 1
In the Cisco Cloud Network Controller, create the RADIUS Provider.
a) Click the Global Create icon.
The Global Create menu appears.
b) Scroll down until you see the Administrative area, then click Create Provider under the Administrative area.
The Create Provider dialog box appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
163
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for RADIUS Access
c)
d)
e)
f)
Step 2
In the Host Name/IP Address field, enter the Host Name/IP Address of the provider.
In the Description field, enter a description of the provider.
Click the Type drop-down list and choose RADIUS.
In the Settings section, specify the Key, Port, Authentication Protocol, Timeout, Retries, Management EPG.
Select either Enabled or Disabled for Server Monitoring.
Create the Login Domain for RADIUS.
a) Click the Global Create icon.
The Global Create menu appears.
b) Click the drop-down arrow below the Global Create search box and choose Administrative
A list of Administrative options appear in the Global Create menu.
c) From the Administrative list in the Global Create menu, click Create Login Domain.
The Create Login Domain dialog box appears.
d) Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table
then continue.
Properties
Description
General
Name
Enter the name of the Login Domain
Description
Enter the description of the Login Domain.
Settings
Realm
Choose RADIUS from the dropdown menu
Providers
To choose a Provider(s):
1. Click Add Providers. The Select Providers dialog
appears.
2. Click to choose a provider(s) in the column on the
left.
3. Click Select. You return to the Create Login Domain
dialog box.
e) Click Save to save the configuration.
What to do next
This completes the Cisco Cloud Network Controller RADIUS configuration steps. Next, configure the RADIUS
server.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
164
Cisco Cloud Network Controller Security
Configuring a Cisco Secure Access Control Server for RADIUS and TACACS+ Access to the Cisco Cloud Network Controller
Configuring a Cisco Secure Access Control Server for RADIUS and TACACS+
Access to the Cisco Cloud Network Controller
Refer to the section Configuring a Cisco Secure Access Control Server for RADIUS and TACACS+ Access to the APICin
the Cisco APIC Security Configuration Guide, Release 4.0(1) at
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/Cisco-APIC-Security-Configuration-Guide-401.html.
Configuring LDAP Access
There are two options for LDAP configurations:
• Configure a Cisco AVPair
• Configure LDAP group maps in the Cisco Cloud Network Controller
The following sections contain instructions for both configuration options.
Configuring Windows Server 2008 LDAP for APIC Access with Cisco AVPair
Refer to the section Configuring Windows Server 2008 LDAP for APIC Access with Cisco AVPair in the Cisco APIC
Security Configuration Guide, Release 4.0(1) at
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/Cisco-APIC-Security-Configuration-Guide-401.html.
Configuring Cisco Cloud Network Controller for LDAP Access
Before you begin
• The Cisco Cloud Network Controller is online.
• The LDAP server host name or IP address, port, bind DN, Base DN, and password are available.
• The Cisco Cloud Network Controller management endpoint group is available.
Step 1
In the Cisco Cloud Network Controller, create the LDAP Provider.
a)
b)
c)
d)
e)
f)
On the menu bar, choose Administrative > Authentication.
In the Work pane, click on Providers tab and then click on the Actions drop-down and select Create Provider.
In the Host Name/IP Address field, enter the Host Name/IP Address of the provider.
In the Description field, enter a description of the provider.
Click the Type drop-down list and choose LDAP.
Specify the Bind DN, Base DN, Password, Port, Attribute, Filter Type and Management EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
165
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for LDAP Access
Note
• The bind DN is the string that the Cisco Cloud Network Controller uses to log in to the LDAP server.
The Cisco Cloud Network Controller uses this account to validate the remote user attempting to log
in. The base DN is the container name and path in the LDAP server where the Cisco Cloud Network
Controller searches for the remote user account. This is where the password is validated. Filter is used
to locate the attribute that the Cisco Cloud Network Controller requests to use for the cisco-av-pair.
This contains the user authorization and assigned RBAC roles for use on the Cisco Cloud Network
Controller. The Cisco Cloud Network Controller requests the attribute from the LDAP server.
• Attribute field—Enter one of the following:
• For LDAP server configurations with a Cisco AVPair, enter CiscoAVPair.
• For LDAP server configurations with an LDAP group map, enter memberOf.
Step 2
Create the Login Domain for LDAP.
a) On the menu bar, choose Administrative > Authentication.
b) In the Work pane, click on Login Domains tab and then click on the Actions drop-down and select Create Login
Domain.
c) Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table
then continue.
Properties
Description
General
Name
Enter the name of the Login Domain
Description
Enter the description of the Login Domain.
Settings
Realm
Choose LDAP from the dropdown menu
Providers
To choose a Provider(s):
1. Click Add Providers. The Select Providers dialog
appears.
2. Click to choose a provider(s) in the column on the
left.
3. Click Select. You return to the Create Login Domain
dialog box.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
166
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for SAML Access
Properties
Description
Authentication Type
1. Select Cisco AV Pairs, if provider(s) was configured
with CiscoAVPair as the Attribute.
2. Select LDAP Group Map Rules, if provider(s) was
configured with memberOf as the Attribute.
a. Click Add LDAP Group Map Rule. The dialog
box appears.
b. Specify the map rule Name, Description
(optional), and Group DN.
c. Click the + next to Add Security Domain. The
dialog box appears.
d. Click the + to access the Role name and Role
Privilege Type (Read or Write) fields. Click
check mark.
e. Repeat step 4 to add more roles. Then click Add.
f.
Repeat step 3 to add more security domains. Then
click Add.
d) Click Save on Create Login Domain dialog box.
Configuring Cisco Cloud Network Controller for SAML Access
The following sections provide detailed information on configuring Cisco Cloud Network Controller for
SAML access.
About SAML
Refer to the section About SAML in the Cisco APIC Security Configuration Guide, Release 4.0(1) at
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/Cisco-APIC-Security-Configuration-Guide-401.html.
Basic Elements of SAML
Refer to the section Basic Elements of SAML in the Cisco APIC Security Configuration Guide, Release
4.0(1) at
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/Cisco-APIC-Security-Configuration-Guide-401.html.
Supported IdPs and SAML Components
Refer to the section Supported IdPs and SAML Components in the Cisco APIC Security Configuration
Guide, Release 4.0(1) at
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/Cisco-APIC-Security-Configuration-Guide-401.html.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
167
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for SAML Access
Configuring Cisco Cloud Network Controller for SAML Access
Note
SAML based Authentication is only for Cisco Cloud Network Controller GUI and not for REST.
Before you begin
• The SAML server host name or IP address, and the IdP’s metadata URL are available.
• The Cisco Cloud Network Controller management endpoint group is available.
• Set up the following:
• Time Synchronization and NTP
• Configuring a DNS Provider Using the GUI
• Configuring a Custom Certificate for Cisco ACI HTTPS Access Using the GUI
Step 1
In the Cisco Cloud Network Controller, create the SAML Provider.
a)
b)
c)
d)
e)
f)
On the menu bar, choose Administrative > Authentication.
In the Work pane, click on Providers tab and then click on the Actions drop-down and select Create Provider.
In the Host Name/IP Address field, enter the Host Name/IP Address of the provider.
In the Description field, enter a description of the provider.
Click the Type drop-down list and choose SAML.
In Settings pane, perform following:
• Specify the IdP metadata URL:
• In case of AD FS, IdP Metadata URL is of the format https://<FQDN
ofADFS>/FederationMetadata/2007-06/FederationMetadata.xml.
• In case of Okta, to get the IdP Metadata URL, copy the link for Identity Provider Metadata in the Sign
On section of the corresponding SAML Application from the Okta server.
• Specify the Entity ID for the SAML-based service.
• Configure the HTTPS Proxy for Metadata URL if it is needed to access the IdP metadata URL.
• Select the Certificate Authority if IdP is signed by a Private CA.
• Select the Signature Algorithm Authentication User Requests from the drop-down.
• Select checkbox to enable Sign SAML Authentication Requests, Sign SAML Response Message, Sign
Assertions in SAML Response, Encrypt SAML Assertions.
g) Click Save to save the configuration.
Step 2
Create the login domain for SAML.
a) On the menu bar, choose Administrative > Authentication.
b) In the Work pane, click on the Login Domains tab and then click on the Actions drop-down and select Create Login
Domain.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
168
Cisco Cloud Network Controller Security
Setting Up a SAML Application in Okta
c) Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table
then continue.
Properties
Description
General
Name
Enter the name of the Login Domain
Description
Enter the description of the Login Domain.
Settings
Realm
Choose SAML from the dropdown menu
Providers
To choose a Provider(s):
1. Click Add Providers. The Select Providers dialog
appears.
2. Click to choose a provider(s) in the column on the
left.
3. Click Select. You return to the Create Login Domain
dialog box.
d) Click Save to save the configuration.
Setting Up a SAML Application in Okta
Refer to the section Setting Up a SAML Application in Okta of Cisco APIC Security Configuration Guide, Release
4.0(1) at
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/Cisco-APIC-Security-Configuration-Guide-401.html.
Setting Up a Relying Party Trust in AD FS
Refer to the section Setting Up a Relying Party Trust in AD FS in the Cisco APIC Security Configuration Guide, Release
4.0(1) at
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/Cisco-APIC-Security-Configuration-Guide-401.html.
Configuring HTTPS Access
The following sections describe how to configure HTTPS access.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
169
Cisco Cloud Network Controller Security
About HTTPS Access
About HTTPS Access
This article provides an example of how to configure a custom certificate for HTTPS access when using Cisco
ACI.
For more information, see the section HTTPS Access in the Cisco APIC Security Configuration Guide,
Release 4.0(1) at https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/security/
Cisco-APIC-Security-Configuration-Guide-401.html.
Guidelines for Configuring Custom Certificates
• Wild card certificates (such as *.cisco.com, which is used across multiple devices) and its associated
private key generated elsewhere are not supported on the Cisco Cloud Network Controller as there is no
support to input the private key or password in the Cisco Cloud Network Controller. Also, exporting
private keys for any certificates, including wild card certificates, is not supported.
• You must download and install the public intermediate and root CA certificates before generating a
Certificate Signing Request (CSR). Although a root CA Certificate is not technically required to generate
a CSR, Cisco requires the root CA certificate before generating the CSR to prevent mismatches between
the intended CA authority and the actual one used to sign the CSR. The Cisco Cloud Network Controller
verifies that the certificate submitted is signed by the configured CA.
• To use the same public and private keys for a renewed certificate generation, you must satisfy the following
guidelines:
• You must preserve the originating CSR as it contains the public key that pairs with the private key
in the key ring.
• The same CSR used for the originating certificate must be resubmitted for the renewed certificate
if you want to re-use the public and private keys on the Cisco Cloud Network Controller.
• Do not delete the original key ring when using the same public and private keys for the renewed
certificate. Deleting the key ring will automatically delete the associated private key used with
CSRs.
• Only one Certificate Based Root can be active per pod.
• Client Certificate based authentication is not supported for this release.
Configuring a Custom Certificate for Cisco ACI HTTPS Access Using the GUI
Determine from which authority you will obtain the trusted certification so that you can create the appropriate
Certificate Authority.
Before you begin
CAUTION: PERFORM THIS TASK ONLY DURING A MAINTENANCE WINDOW AS THERE IS A
POTENTIAL FOR DOWNTIME. Expect a restart of all web servers on Cisco Cloud Network Controller
during this operation.
Step 1
On the menu bar, choose Administrative > Security.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
170
Cisco Cloud Network Controller Security
Configuring a Custom Certificate for Cisco ACI HTTPS Access Using the GUI
Step 2
In the Work pane, click on Certificate Authorities tab and then click on the Actions drop-down and select Create
Certificate Authority.
Step 3
In the Create Certificate Authority dialog box, in the Name field, enter a name for the certificate authority and in the
Description field, enter a description.
Step 4
Select System in the Used for field.
Step 5
In the Certificate Chain field, copy the intermediate and root certificates for the certificate authority that will sign the
Certificate Signing Request (CSR) for the Cloud Network Controller. The certificate should be in Base64 encoded
X.509 (CER) format. The intermediate certificate is placed before the root CA certificate. It should look similar to the
following example:
-----BEGIN CERTIFICATE----<Intermediate Certificate>
-----END CERTIFICATE---------BEGIN CERTIFICATE----<Root CA Certificate>
-----END CERTIFICATE-----
Step 6
Click Save.
Step 7
On the menu bar, choose Administrative > Security.
Step 8
In the Work pane, click on the Key Rings tab, then click on the Actions drop-down and select Create Key Ring.
Step 9
In the Create Key Ring dialog box, in the Name field, enter a name for the certificate authority and in Description
enter description.
Step 10
Select System in the Used for field.
Step 11
For the Certificate Authority field, click on Select Certificate Authorityand select the Certificate Authority that you
created earlier.
Step 12
Select either Generate New Key or Import Existing Key for the field Private Key. If you select Import Existing
Key, enter a private key in the Private Key text box.
Step 13
Select modulus from the Modulus drop-down. menu
Step 14
In the Certificate field, do not add any content.
Step 15
Click Save.
In the Work pane, in the Key Rings area, the Admin State for the key ring created displays Started.
Step 16
Double-click on the created Key Ring to open Key Ring key_ring_name dialog box from the Work pane.
Step 17
In the Work pane, click on Create Certificate Request.
Step 18
In the Subject field, enter the fully qualified domain name (FQDN) of the Cisco Cloud Network Controller.
Step 19
Fill in the remaining fields as appropriate.
Step 20
Click Save.
The Key Ring key_ring_name dialog box appears.
Step 21
Copy the contents from the field Request to submit to the Certificate Authority for signing.
Step 22
From the Key Ring key_ring_name dialog box, click on edit icon to display the Key Ring key_ring_name dialog box.
Step 23
In the Certificate field, paste the signed certificate that you received from the certificate authority.
Step 24
Click Save to return to the Key Rings work pane.
The key is verified, and in the Work pane, the Admin State changes to Completed and is now ready for use in the
HTTPs policy.
Step 25
Navigate to Infrastructure > System Configuration, then click the Management Access tab.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
171
Cisco Cloud Network Controller Security
Configuring a Custom Certificate for Cisco ACI HTTPS Access Using the GUI
Step 26
Click the edit icon on the HTTPS work pane to display the HTTPS Settings dialog box.
Step 27
Click on Admin Key Ring and associate the Key Ring that you created earlier.
Step 28
Click Save.
All web servers restart. The certificate is activated, and the non-default key ring is associated with HTTPS access.
What to do next
You must remain aware of the expiration date of the certificate and take action before it expires. To preserve
the same key pair for the renewed certificate, you must preserve the CSR, as it contains the public key that
pairs with the private key in the key ring. Before the certificate expires, the same CSR must be resubmitted.
Do not delete or create a new key ring, as deleting the key ring will delete the private key stored internally
on the Cisco Cloud Network Controller.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
172
CHAPTER
9
Configuration Drifts
• Configuration Drift Notifications and Faults, on page 173
• Accessing the Main Configuration Drift Page, on page 174
• Checking for Missing Contracts Configuration, on page 176
• Checking for Missing EPGs Configuration, on page 178
• Checking for Missing VRFs Configuration, on page 179
• Configuration Drift Troubleshooting, on page 181
Configuration Drift Notifications and Faults
When you deploy Cisco ACI in a public cloud, you will perform most of the fabric configuration from the
Cloud Network Controller. However, there may be cases where you or another cloud administrator changes
the deployed configuration directly in the cloud provider's GUI using the tools provided by AWS or Azure.
In these cases, the intended configuration you deployed from the Cloud Network Controller and the actual
configuration in the cloud site may become out of sync, we call this a configuration drift.
Cloud Network Controller provides visibility into any security policy (contracts) configuration discrepancy
between what you deploy from the Cloud Network Controller and what is actually configured in the cloud
site. Configuration drift is enabled by default, and configuration drift information is available for EPGs, VRFs,
and contracts with or without Layer 4 to Layer 7 service graphs attached.
Configuration drift information is consolidated under a single page, located at Cloud Resources > Drifts.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
173
Configuration Drifts
Accessing the Main Configuration Drift Page
See Accessing the Main Configuration Drift Page, on page 174 for more information.
There are two aspects to analyzing configuration drift:
• Have all the fabric elements configured in the Cloud Network Controller and intended to be deployed
in the cloud fabric been properly deployed?
This scenario can occur due to user configuration errors in Cloud Network Controller that could not be
deployed in the cloud, connection or API issues on the cloud provider end, or if a cloud administrator
manually deletes or modifies security rules directly in the cloud provider's UI. Any intended but missing
configurations may present an issue for the Cloud Network Controller fabric.
• Are there any additional configurations that exist in the cloud but were not intended to be deployed from
the Cloud Network Controller?
Similarly to the previous scenario, this can occur if there are connection or API issues or if a cloud
administrator manually creates additional security rules directly in the cloud provider's UI. Any existing
but not intended configuration may present issues.
Accessing the Main Configuration Drift Page
Configuration drift information is consolidated under a single Drifts page.
The Drifts page is used to provide the following pieces of information:
• To identify if something has been deleted
• To ensure that anything that should be present is correctly shown as present
Step 1
Step 2
Log in to your Cisco Cloud Network Controller GUI.
Navigate to the main configuration drift page:
Cloud Resources > Drifts
The consolidated Drifts page appears.
In the Drifts page, you can see a summary of any configuration issues in your fabric.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
174
Configuration Drifts
Accessing the Main Configuration Drift Page
The Detection Summary area provides an overview of how many configuration drifts were detected with managed or
unmanaged objects, and the time when this information was last updated. If the inventory update timestamp is out of
date, you can refresh the information by clicking the Refresh icon in the top right corner of this screen.
Step 3
Use the information in the table below the Detection Summary area to find any configuration drifts.
• Object: Provides information on the object associated with the configuration drift.
• Status: Following are the different values that might appear in the Status column:
• Transient (low): Drifts that are likely due to recent configuration changes. We recommend waiting for the
fabric to stabilize and the drift will likely resolve on its own after the next configuration refresh.
• Presumed (medium): Drifts that may or may not be transient. We recommend monitoring the status and
troubleshoot the configuration should the drift persist.
• Raised (high): Critical drifts. We recommend verifying the configuration on Cloud Network Controller and
checking for any associated faults. Redeploying the configuration may help resolve communication issues
between the Cloud Network Controller and cloud services. If the issue persists, check the tech-support logs.
• Unmanaged: Configuration drifts related to extra inventory objects not created through the Cisco Cloud Network
Controller.
• Drift Type: Following are the different values that might appear in the Drift Type column:
• Configuration: External changes on the cloud providers site that could result in the intended configuration
and the actual configuration being out of sync. Used for configuration drifts related to EPGs or VRFs.
• Rule: External changes on the cloud providers site that could result in the intended security rules and the
expected rules that are established through a contract being out of sync. Used for configuration drifts related
to contracts.
• Extra Object: Used to show extra inventory objects that were not created through the Cisco Cloud Network
Controller. Cisco Cloud Network Controller does not perform drift detection on these objects.
• Last Configuration Update: Provides information on when the last configuration update occurred.
Step 4
Enter information in the filter line to filter the configuration drifts provided in the table, if necessary.
a) Click in the filter line below the Detection Summary area. The following filter types appear:
• Object
• Status
• Drift
• Last
Type
Configuration Update
• Parent
Path
Select the appropriate type for your filter.
b) Click the necessary operator.
The options are:
• ==: The equal-to operator
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
175
Configuration Drifts
Checking for Missing Contracts Configuration
• !=: The not-equal-to operator
c) Click the necessary drift type.
The options are Extra
more information.
Object, Rule,
and Configuration. See the explanations for the Drift Type field above for
The entries in the table are filtered based on your selections above.
Step 5
View additional information on a specific configuration drift, if necessary.
For any object listed in this page, you can bring up additional configuration drift information by clicking the appropriate
line in the Configuration Drifts table. A side panel appears with additional information on this particular configuration
drift; clicking the Details icon (
object.
) automatically brings you to the appropriate Cloud Mapping page for this particular
Refer to the following sections for additional configuration drift information for specific objects:
• Checking for Missing Contracts Configuration, on page 176
• Checking for Missing EPGs Configuration, on page 178
• Checking for Missing VRFs Configuration, on page 179
Checking for Missing Contracts Configuration
This section describes how to check for any contract settings you have configured from the Cisco Cloud
Network Controller, but which have not been properly deployed to the cloud fabric.
Step 1
Log in to your Cloud Network Controller GUI.
Step 2
Click Application Management > Contracts.
Step 3
Double-click the appropriate contract to bring up the Overview page for that contract.
Step 4
Note the service graph information provided in the Service Graph area, if applicable.
Contract drift information is available for contracts with or without Layer 4 to Layer 7 service graphs attached. See
Deploying Layer 4 to Layer 7 Services, on page 133 for more information.
Step 5
Click the Cloud Mapping tab.
The Cloud Mapping view displays all the information about the contract and the cloud resources it uses.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
176
Configuration Drifts
Checking for Missing Contracts Configuration
Note
You can also navigate to this page by navigating to Cloud Resources > Drifts, then clicking the appropriate
line in the Configuration Drifts table. A side panel appears with additional information on this particular
configuration drift; clicking the Details icon ( ) automatically brings you to the appropriate Cloud Mapping
page for this particular object. See Accessing the Main Configuration Drift Page, on page 174 for more
information.
The screen is divided into four sections: Detection Summary, Related Objects, Configuration Drifts, and Presented
Cloud Resources. Each section contains a table that lists the respective information about the contract you selected.
• The Detection Summary area provides an overview of how many configuration drifts were detected, number of
intended and actual cloud resources configured, and the time when this information was last updated. If the inventory
update timestamp is out of date, you can refresh the information by clicking the Refresh icon in the top right corner
of this screen.
• The Related Objects area shows any other objects that have a relation to the contract, such as consumer and provider
EPGs, and filters.
• The Configuration Drifts table lists all the issues with the contract rules. Specifically, all the contract rules that
were intended to be deployed but are missing in the actual fabric configuration.
The table contains detailed information, such as the protocol used, port ranges, source and destination IP or group,
consumer and provider EPGs, description of the issue, and the recommended action to resolve it. For each configuration
drift, the Status field will indicate the severity and recommended action:
• Transient (low): Drifts that are likely due to recent configuration changes. We recommend waiting for the
fabric to stabilize and the drift will likely resolve on its own after the next configuration refresh.
• Presumed (medium): Drifts that may or may not be transient. We recommend monitoring the status and
troubleshoot the configuration should the drift persist.
• Raised (high): Critical drifts. We recommend verifying the configuration on Cloud Network Controller and
checking for any associated faults. Redeploying the configuration may help resolve communication issues
between the Cloud Network Controller and cloud services. If the issue persists, check the tech-support logs.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
177
Configuration Drifts
Checking for Missing EPGs Configuration
• The Presented Cloud Resources table shows the information about all the resources that were properly configured
in your cloud. This table is designed to provide you with better visibility into what rules are configured in your cloud
for a specific contract.
Checking for Missing EPGs Configuration
This section describes how to check for any EPG settings you have configured from the Cloud Network
Controller, but which have not been properly deployed to the cloud fabric.
Step 1
Log in to your Cloud Network Controller GUI.
Step 2
Click Application Management > EPGs.
Step 3
Double-click the appropriate EPG to bring up the Overview page for that EPG.
Step 4
Click the Cloud Mapping tab.
The Cloud Mapping view displays all the information about the EPG and the cloud resources it uses.
Note
You can also navigate to this page by navigating to Cloud Resources > Drifts, then clicking the appropriate
line in the Configuration Drifts table. A side panel appears with additional information on this particular
configuration drift; clicking the Details icon ( ) automatically brings you to the appropriate Cloud Mapping
page for this particular object. See Accessing the Main Configuration Drift Page, on page 174 for more
information.
The screen is divided into four sections: Detection Summary, Related Objects, Configuration Drifts, and Presented
Cloud Resources. Each section contains a table that lists the respective information about the EPG you selected.
• The Detection Summary area provides an overview of how many configuration drifts were detected, number of
intended and actual cloud resources configured, and the time when this information was last updated. If the inventory
update timestamp is out of date, you can refresh the information by clicking the Refresh icon in the top right corner
of this screen.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
178
Configuration Drifts
Checking for Missing VRFs Configuration
• The Related Objects area shows any other objects that have a relation to the EPG, such as security groups and
contracts.
• The Configuration Drifts table lists all the issues with the security groups associated with the EPG. Specifically,
all the security groups that were intended to be deployed but are missing in the actual fabric configuration.
The table contains detailed information, such as the logical DN, cloud provider ID, drift type, description of the
issue, and the recommended action to resolve it. For each configuration drift, the Status field will indicate the
severity and recommended action:
• Transient (low): Drifts that are likely due to recent configuration changes. We recommend waiting for the
fabric to stabilize and the drift will likely resolve on its own after the next configuration refresh.
• Presumed (medium): Drifts that may or may not be transient. We recommend monitoring the status and
troubleshoot the configuration should the drift persist.
• Raised (high): Critical drifts. We recommend verifying the configuration on Cloud Network Controller and
checking for any associated faults. Redeploying the configuration may help resolve communication issues
between the Cloud Network Controller and cloud services. If the issue persists, check the tech-support logs.
• The Presented Cloud Resources table shows the information about all the resources that were properly configured
in your cloud. This table is designed to provide you with better visibility into what security groups are associated
with a specific EPG in your cloud.
Checking for Missing VRFs Configuration
This section describes how to check for any VRF settings you have configured from the Cloud Network
Controller, but which have not been properly deployed to the cloud fabric.
Step 1
Log in to your Cloud Network Controller GUI.
Step 2
Click Application Management > VRFs.
Step 3
Double-click the appropriate VRF to bring up the Overview page for that VRF.
Step 4
Click the Cloud Mapping tab.
The Cloud Mapping view displays all the information about the VRF and the cloud resources it uses.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
179
Configuration Drifts
Checking for Missing VRFs Configuration
Note
You can also navigate to this page by navigating to Cloud Resources > Drifts, then clicking the appropriate
line in the Configuration Drifts table. A side panel appears with additional information on this particular
configuration drift; clicking the Details icon ( ) automatically brings you to the appropriate Cloud Mapping
page for this particular object. See Accessing the Main Configuration Drift Page, on page 174 for more
information.
The screen is divided into four sections: Detection Summary, Related Objects, Configuration Drifts, and Presented
Cloud Resources. Each section contains a table that lists the respective information about the VRF you selected.
• The Detection Summary area provides an overview of how many configuration drifts were detected, number of
intended and actual cloud resources configured, and the time when this information was last updated. If the inventory
update timestamp is out of date, you can refresh the information by clicking the Refresh icon in the top right corner
of this screen.
• The Related Objects area shows any other objects that have a relation to the VRF, such as security groups, CIDRs,
and subnets.
• The Configuration Drifts table lists all the issues with the virtual networks, the CIDRs that are associated with the
virtual networks, and the subnets within those CIDRs. Specifically, all the virtual networks, CIDRs, and subnets
that were intended to be deployed but are missing in the actual fabric configuration.
Note that if there are configuration drifts at any one level, the table will show the configuration drift at that level
and not any configuration drifts at the levels below it. For example, if a configuration drift occurs at a CIDR level
and the corresponding subnets within that CIDR, the table will be display the configuration drifts in the CIDR area
but not the configuration drifts for the corresponding subnets within that CIDR.
The table contains detailed information in these areas:
• Virtual Networks: Provides information on logical DN, region, primary CIDR, drift type, description of the
issue, and the recommended action to resolve it.
• CIDRs: Provides information on logical DN, region, CIDR block range, whether it is a primary CIDR or not,
the subnets within the CIDR, drift type, description of the issue, and the recommended action to resolve it.
• Subnets: Provides information on logical DN, region, IP address, drift type, description of the issue, and the
recommended action to resolve it.
For each configuration drift, the Status field will indicate the severity and recommended action:
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
180
Configuration Drifts
Configuration Drift Troubleshooting
• Transient (low): Drifts that are likely due to recent configuration changes. We recommend waiting for the
fabric to stabilize and the drift will likely resolve on its own after the next configuration refresh.
• Presumed (medium): Drifts that may or may not be transient. We recommend monitoring the status and
troubleshoot the configuration should the drift persist.
• Raised (high): Critical drifts. We recommend verifying the configuration on Cloud Network Controller and
checking for any associated faults. Redeploying the configuration may help resolve communication issues
between the Cloud Network Controller and cloud services. If the issue persists, check the tech-support logs.
• The Presented Cloud Resources table shows the information about all the resources that were properly configured
in your cloud, split into the same hierarchies that is shown in the Configuration Drifts table (Virtual Networks,
CIDRs, and Subnets). This table is designed to provide you with better visibility into what virtual networks, CIDRs,
and subnets are associated with a specific VRF in your cloud.
Configuration Drift Troubleshooting
This section provides a few useful command to verify that the configuration drift processes are up and running
on your Cloud Network Controller, check the application logs, and if necessary generate tech support
information.
Step 1
Log in to the Cisco Cloud Network Controller via console as a root user.
Step 2
Check the status of the configuration drift application.
ACI-Cloud-Fabric-1# moquery -d pluginContr/plugin-Cisco_CApicDrift | egrep "dn |pluginSt |operSt
|version"
dn: pluginContr/plugin-Cisco_CApicDrift
operSt: active
pluginSt: active
Verison: 5.1.0
Step 3
Check the status of the application container.
ACI-Cloud-Fabric-1# docker ps | grep drift
CONTAINER ID
IMAGE
COMMAND
CREATED
NAMES
649af6feb72c
a5ea08bbf541
"/opt/bin/conit.bi..." 13 hours ago
hours
drift-api-b703e569-0aa6-859f-c538-a5fecbc5708f
Step 4
STATUS
Up 13
Check memory consumed by all Docker containers.
Total amount of memory consumed must be under 12GB.
ACI-Cloud-Fabric-1# systemctl status ifc-scheduler_allocations.slice| grep Memory
Step 5
If necessary, collect the tech support logs.
Logs will be saved in the /data/techsupport directory on the controller.
ACI-Cloud-Fabric-1# trigger techsupport controllers application CApicDrift
ACI-Cloud-Fabric-1# trigger techsupport controllers application CApicDrift vendorName Cisco
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
181
Configuration Drifts
Configuration Drift Troubleshooting
Step 6
Check the application logs.
The logs for configuration drift process are stored in the /data2/logs/Cisco_CApicDrift directory.
The runhist.log file provides information about each time the application was started, for example:
# cat runhist.log
1 - Thu Jun 11 23:55:59 UTC 2020
2 - Fri Jun 12 01:19:41 UTC 2020
The drift.log file is the application log file and can be used to view the number of times configuration drift was updated
and how long each update took.
# cat drift.log | grep ITER
{"file":"online_snapshot.go:178","func":"Wait","level":"info","msg":"ITER# 109
ENDED === RDFGEN TIME: 1m40.383751649s, MODEL UPLOAD TIME 5m54.245550374s; TOTAL
TIME:: 7m34.629447083s","time":"2020-06-12T19:53:13Z"}
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
182
CHAPTER
10
AWS Transit Gateway on Cisco Cloud Network
Controller
• AWS Transit Gateway on Cisco Cloud Network Controller, on page 183
AWS Transit Gateway on Cisco Cloud Network Controller
Beginning in Cisco Cloud Network Controller Release 5.0(1), you can use Amazon Web Services (AWS)
Transit Gateway with Cisco Cloud Network Controller. AWS Transit Gateway is a service that functions as
an internal router to automate connectivity between virtual private clouds (VPCs). The VPCs can be in different
AWS regions in a cloud site.
Virtual private clouds (VPC) can't communicate with each other without additional configuration. Without
using AWS Transit Gateway, you can configure inter-VPC communication by configuring VPC peering.
Alternatively, you can use VPN tunnels and CCRs.
However, when you use AWS Transit Gateway with Cisco Cloud Network Controller, you connect VPCs or
VRFs in the cloud site simply by associating the VPCs or VRFs to the same AWS Transit Gateways.
Using AWS Transit Gateway with Cisco Cloud Network Controller provides several benefits: higher
performance, simplicity, scalability and potential lower cost.
Note
You can attach a Cisco Cloud Network Controller user tenant’s VPC (CtxProfile) to an AWS Transit Gateway
(hub network) only if you have administrator privileges and the user is part of security domain “all". Without
such access, you cannot attach the user tenant’s VPC to an AWS Transit Gateway.
For detailed information about using AWS Transit Gateway with Cisco Cloud Network Controller, see
Increasing Bandwidth Between VPCs by Using AWS Transit Gateway.
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
183
AWS Transit Gateway on Cisco Cloud Network Controller
AWS Transit Gateway on Cisco Cloud Network Controller
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
184
APPENDIX
A
Cisco Cloud Network Controller Error Codes
• Cisco Cloud Network Controller Error Codes, on page 185
Cisco Cloud Network Controller Error Codes
This section describes the Cisco Cloud Network Controller error codes.
Table 35: Cisco Cloud Network Controller Error Codes
Component
Error Code
Constraint
cloud-template
CT_INFRANETWORK_COUNT
The count of the
cloudtemplateInfraNetwork
MO is at most 1
cloud-template
CT_INFRANETWORK_COUNT
The count of the
cloudtemplateInfraNetwork
MO is at most 1
cloud-template
CT_INFRANETWORK_VRF
In the
cloudtemplateInfraNetwork
MO, the vrfName must be
overlay-1
cloud-template
CT_INFRANETWORK_PARENT
For the
cloudtemplateInfraNetwork
MO, the parent MO must
be uni/tn-infra
cloud-template
CT_INFRANETWORK_NUMROUTERSPERREGION_ In the
MINIMUM
cloudtemplateInfraNetwork
MO, for the attribute
numRoutersPerRegion, the
minimum allowed value is
2
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
185
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Component
Error Code
Constraint
cloud-template
CT_INFRANETWORK_NUMROUTERSPERREGION_ In the
MAXIMUM
cloudtemplateInfraNetwork
MO, for the attribute
numRoutersPerRegion, the
maximum allowed value
is 4
cloud-template
CT_INFRANETWORK_NUMREMOTESITESUBNETPOOL_ In the
MINIMUM
cloudtemplateInfraNetwork
MO, for the attribute
numRemoteSiteSubnetPool,
the minimum allowed
value is 2
cloud-template
CT_INFRANETWORK_NUMREMOTESITESUBNETPOOL_ In the
MAXIMUM
cloudtemplateInfraNetwork
MO, for the attribute
numRemoteSiteSubnetPool,
the maximum allowed
value is 2
cloud-template
CT_INTNETWORK_COUNT
The count of the
cloudtemplateIntNework
MO is at most 1
cloud-template
CT_EXTNETWORK_COUNT
The count of the
cloudtemplateExtNework
MO is at most 1
cloud-template
CT_VPNNETWORK_COUNT
The count of the
cloudtemplateVpnNetwork
MO is at most 1
cloud-template
CT_OSPF_COUNT
The count of the
cloudtemplateOspf
MO
is at most 1
cloud-template
CT_INTNETWORK_REGION_MATCH
The regions specified by
cloudRegionName under
cloudtemplateIntNetwork
must have a corresponding
cloudRegion under
cloudProvP
cloud-template
CT_INTNETWORK_REGION_MANAGED
The regions specified by
the cloudRegionName
children of
cloudtemplateIntNetwork
must have corresponding
cloudRegion with
adminSt as managed
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
186
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Component
Error Code
Constraint
cloud-template
CT_INTNETWORK_REGION_MAXIMUM
The maximum number of
regions
(cloudRegionName)
specified under
cloudtemplateIntNetwork
is 4
cloud-template
CT_EXTNETWORK_REGION_SUBSET
The regions that are
specified by the
cloudRegionName children
of
cloudtemplateExtNetwork
must also be specified by
cloudRegionName children
under
cloudtemplateIntNetwork
cloud-template
CT_EXTSUBNETPOOL_COUNT
The count of the
cloudtemplateExtSubnetPool
is at most 1
cloud-template
CT_EXTSUBNETPOOL_SUBNETPOOL_ADDRESS
In
cloudtemplateExtSubnetPool,
the subnetpool must
contain a network address
cloud-template
CT_EXTSUBNETPOOL_SUBNETPOOL_IP_VERSION In
cloudtemplateExtSubnetPool,
the subnetpool must
contain a IPv4 address
cloud-template
CT_EXTSUBNETPOOL_SUBNETPOOL_ADDRESS_TYPE In
cloudtemplateExtSubnetPool,
the subnetpool IP address
must not from multicast or
loopback address space
cloud-template
CT_EXTSUBNETPOOL_SUBNETPOOL_MINIMUM_SIZE In
cloudtemplateExtSubnetPool,
the subnetpool must be at
least /22 (the netmask
must be 22 or less)
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
187
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Component
Error Code
Constraint
cloud-template
CT_INTNETWORK_MISSING_HOME
If there are any
cloudRegionName under
cloudtemplateIntNetwork,
then one of the
must be
associated to a region that
is the home region of the
Cisco Cloud Network
Controller
(capicDeployed)
cloudRegonName
cloud-template
CT_CLOUD_APICSUBNETPOOL_INSUFFICIENT
There must be enough
cloudApicSubnetPool
MOs to generate
cloudApicSubnet MOs so
that all the
cloudRegionName
MOs
specified under
cloudtemplateIntNetwork
can be associated to a
unique cloudApicSubnet
MO. The subnets from the
cloudApicSubnet MOs
are used as the CIDRs in
the cloudCtxProfile of
the corresponding region.
cloud-template
CT_IPSECTUNNEL_PEERADDR_IP_VERSION
In
cloudtemplateIpSecTunnel,
the peeraddr must contain
a IPv4 address
cloud-template
CT_IPSECTUNNEL_PEERADDR_IS_HOST
In
cloudtemplateIpSecTunnel,
the peeraddr must be host
address (i.e. /32)
cloud-template
CT_PROFILE_COUNT
The count of the
cloudtemplateProfile
MO is at most 1
cloud-template
CT_PROFILE_DELETE
The
cloudtemplateProfile
MO cannot be deleted
unless its parent
cloudtemplateInfraNetwork
is also deleted
cloud-template
CT_PROFILE_ROUTERUSERNAME_NONEMPTY
In
cloudtemplateProfile,
the routerUsername must
be non-empty
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
188
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Component
Error Code
Constraint
cloud-template
CT_PROFILE_ROUTERPASSWORD_NONEMPTY
In
cloudtemplateProfile,
the routerPassword must
be non-empty
cloud-template
CT_PROFILE_ROUTERUSERNAME_MODIFY
In
cloudtemplateProfile,
the routerUsername
cannot be modified when
there are routers deployed
in any region, i.e. any
cloudRegionName under
cloudtemplateIntNetwork
(The modification is
allowed when there are no
router deployments in any
region)
cloud-template
CT_PROFILE_ROUTERPASSWORD_MODIFY
In
cloudtemplateProfile,
the routerPassword
cannot be modified when
there are routers deployed
in any region, i.e. any
cloudRegionName under
cloudtemplateIntNetwork
(The modification is
allowed when there are no
router deployments in any
region)
cloud-template
CT_PROFILE_ROUTERTHROUGHPUT_MODIFY
In
cloudtemplateProfile,
the routerThroughput
cannot be modified when
there are routers deployed
in any region, i.e. any
cloudRegionName under
cloudtemplateIntNetwork
(The modification is
allowed when there are no
router deployments in any
region)
cloud
CT_APICSUBNET_INVALID_HOME_REGION
In a cloudApicSubnet
MO, the region marked for
capicDeployed must be a
valid region
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
189
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Component
Error Code
Constraint
cloud
CT_APICSUBNET_REPEATED_REGION
In a cloudApicSubnet
MO, a region can be
associated with at most 1
subnet
cloud
CT_APICSUBNET_MULTIPLE_HOME_REGION
In cloudApicSubnet MOs,
at most, 1 region may have
capicDeployed as true
cloud
CLOUD_APICSUBNETPOOL_CREATEDBY_USER
In cloudApicSubnetPool,
the createdBy attribute
must be USER
cloud
CLOUD_APICSUBNETPOOL_SUBNET_IP_VERSION In cloudApicSubnetPool,
the subnet must contain a
IPv4 address
cloud
CLOUD_APICSUBNETPOOL_SUBNET_SIZE
In cloudApicSubnetPool,
the subnet must be /24
cloud
CLOUD_APICSUBNETPOOL_DELETE_USAGE
A cloudApicSubnetPool
cannot be deleted if at
least one of its
cloudApicSubnet child is
in use by a region
cloud
CLOUD_APICSUBNETPOOL_DELETE_CREATEDBY A cloudApicSubnetPool
whose createdBy attribute
is not USER cannot be
deleted
Cisco Cloud Network Controller for AWS User Guide, Release 25.0(5)
190
Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Download PDF

advertisement