ACI Single Pods

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
L4 Transporter
No ratings

Brief Description

This skillet will automatically configure panorama and plugin for a state-of-the-art integration into an ACI Single Pod environment with PBR for traffic redirection as a “one click ready” POC. That skillet will also configure your cluster of VM-Series in A/P in the Pod, managed by panorama to be ready to receive traffic from that fabric through the PBR interface.

 

Target Audience

This skillet is designed to be used by SEs and Partners.

 

Skillet Details

Authoring Group: Private Cloud CE
Documentation: Readme file on github repository does explain things

Github Location:  https://github.com/ceskillets/DCV-skillet-ACI-SinglePod.git

Github Branchesmaster

PAN-OS Supported: 8.1.X and higher releases with NSX plugin version 2.0.X
Cloud Provider(s) Supported: VMWARE ESXi
Type of Skillet: Multiple XML files to configure panorama and an A/P VM cluster entirely

Purpose: Config ready for POCs

 

 

Detail Description

Automated configuration of a cluster of A/P VM-Series managed by Panorama

Single Pod PBR insertion

 

Pre-Requisite

  • Panorama 8.1.X and 2 VM-Series 8.1.X connected to Panorama but not attached to any template nor device group yet.

  • Each of your VM-Series must have a minimum of 3 vNics for that setup and vNic must be defined as describe below:
    - eth0 (vNic1) connected to the management network
    - eth1 (vNic2) connected to a dedicated port group of your DVS and it will be used for HA2
    - eth2 (vNic3) connected to a dedicated port group of your DVS and it will be used for HA3
    - eth3 (vNic4) connected to a dedicated port group of your DVS and it will be used for PBR connection to the fabric

  • A PBR policy MUST be configured in parallel in the Fabric for your pod with filters on a Service Graph and that Service Graph must be applied to a contract to start redirecting some traffic to our VM-Series located on each Pods.

  • You must have a Multi Pods (2 pods) with "Enable Pod Aware redirection" option checked and a functional IP SLA option (icmp) for the heath check in your L4-L7 Policy-Based Redirect configuration for the setup to work as expected

 

Automation on Panorama 

  • create a Template Stack and a Template dedicated for each of your 2 VM-Series all Network and Device policies configured with webpage variables.

  • create a Device Group dedicated for that specific cluster of VM-Series configured for a Multi Pods PBR insertion.

  • move and attach your 2 VM-Series to these respective Template Stack and Device Group and trigger a commit to have a fully functional setup.

  • configure ACI plugin to connect into APIC controller in order to collect metadata to be able to create DAGs in your firewall policy.

 

Variables

  • STACK_DEVICE_A (Template Stack name Device A)
  • STACK_DEVICE_B (Template Stack name Device B)
  • DEVICEGROUP (Device Group name for your VM-Series for ACI)
  • HA2_DEVICE_A (Device A IP address for HA2)
  • HA2_DEVICE_B (Device B IP address for HA2)
  • MGT_DEVICE_A (MGT IP address of Device A)
  • MGT_DEVICE_B (MGT IP address of Device B)
  • DNS (DNS Server IP address)
  • NTP (NTP Server IP address)
  • SN_DEVICE_A (Serial Number of Device A)
  • SN_DEVICE_B (Serial Number of Device B)
  • ZONE (Zone creation for PBR interconnection)
  • TARGET_IP_PBR_POD_A (Target IP of the fabric for PBR in POD A without Netmask)
  • TARGET_IP_PBR_POD_B (Target IP of the fabric for PBR in POD B without Netmask)
  • LOCAL_IP_PBR_POD_A (Local IP of your VM interface connected to the the fabric for PBR in POD A with Netmask)
  • LOCAL_IP_PBR_POD_B (Local IP of your VM interface connected to the the fabric for PBR in POD A with Netmask)
  • APIC_IP (IP address of APIC controller)
  • APIC_LOGIN (Login of APIC controller)
  • APIC_PASSWORD (Password of APIC controller)
  • HYPERVISOR_MAC (Hypervisor Assigned MAC option for VM-Series)
  • TAGCOLOR (Color of the TAG for your Zone)

 

Caution

  • That skillet will not configure ACI Fabric to redirect traffic. That step must be done in parallel.
  • Promiscuous mode is not mandatory on vNIC4 port group to have a functional cluster A/A if you select hypervisor assigned MAC option
  • That skillet should work with physical devices instead of VM-Series but it has not been tested.
  • Panorama must be able to reach APIC controller without any proxy to retrieve metadata. DAGs must be created manually after you apply the skillet.
Rate this article: