SlideShare a Scribd company logo
Fabric Policies:
These are policies used for how the internal policies of the fabric system of the spine and
leaf interact with each other, which is under the fabric tap as shown below, with that said I will
move on and show how to create fabric policies and use it and verify.
Creating fabric policies
we will create an NTP policy and assign it to our pod. NTP is a good place to start, as having
a common and synced time source is critical for third-party authentication, such as LDAP and
logging.
1. From the Fabric menu, select/click on Fabric Policies then the Quick Start menu,
select Create an NTP Policy
(Alternate methodistoclickon PodPolicies>>Policies>>Date andTime rightclickandclickcreate as
shownbelow)
But we will use the quickstartmenufor our sample asshow below,clicktocreate a new NTPPolicy
2. A new window will pop up, and here we'll give our new policy a name and (optional)
description and enable it. We can also define any authentication keys, if the servers use
them. Clicking on Next takes us to the next page, where we specify our NTP servers.
3. Click on the plus sign on the right-hand side, and enter the IP address or Fully Qualified
Domain Name (FQDN) of the NTP server(s):
4. We can also select a management EPG, which is useful if the NTP servers are outside of
our network. Then, click on OK
5. Click on Finish.
We can now see our custom policy under Pod Policies:
6. At the moment, though, the policy is not being used, Clicking on Show Usage at the
bottom of the screen shows that no nodes or policies are using the policy.
7. To use the policy, we must assign it to a pod, as we can see from the Quick Start menu:
To use it We need to go into the policy groups under Pod Policies and create a new Pod policy
and call the NTP policy into it
To create the policy, click on the Actions menu, and select Create Pod Policy Group as shown
below
8. Name the new policy PoD-Policy. From here, we can attach our NTP-POLICY to the PoD-
Policy. To attach the policy, click on the drop-down next to Date Time Policy, and
select NTP-POLICY from the list of options:
9. NextWe have to create a PodProfile andassignthe PodPolicytoit, the process is similar as
before: we go to Profiles (under the Pod Policies menu), select Actions, and then Create
Pod Profile:
give it a name and associate the Pod policy to it as shown below
The resultsare shownbelow
To verifyif APICisusingthe NTPPolicydothis from the APIC CLI, using the command show ntp
Note : If DNSis notfullyconfiguredonyournetworkthenuse IPaddressesforthe NTPserverandnot
an FQDN.
apic1# showntp
nodeid remote refid st t when poll reach delay offset jitter
-------- - --------------- ------------- -- ------ ------ ------- --------------- --------
1 216.239.35.4 .INIT. 16 u - 16 0 0.000 0.000 0.000
apic1#
Steps :
We created:
1. An NTPPolicy (Youcouldhave createdSNMP,BGPPolicyinsame wayfor APIC)
2. Attacheditto a Policygroup.
3. Attachedthe Policygroupto a PodProfile
4. The APICwill consume/usethe PodProfile whichwill be pusheddowntothe spine andleaves.
SummaryPicture Below
ENJOYUNTIL NEXTTIME……………>> AccessPolicyCreationanduse.
Creating Cisco ACI Fabric Policy

More Related Content

Similar to Creating Cisco ACI Fabric Policy

Digitised and Decentralized Blockchain Technology Screenshots
Digitised and Decentralized Blockchain Technology ScreenshotsDigitised and Decentralized Blockchain Technology Screenshots
Digitised and Decentralized Blockchain Technology Screenshots
Venkat Projects
 
Digitised and Decentralized Block Chain Technology Python Project
Digitised and Decentralized Block Chain Technology Python ProjectDigitised and Decentralized Block Chain Technology Python Project
Digitised and Decentralized Block Chain Technology Python Project
Venkat Projects
 
Defining sql server 2008 policies tech republic
Defining sql server 2008 policies   tech republicDefining sql server 2008 policies   tech republic
Defining sql server 2008 policies tech republicKaing Menglieng
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
Rob Dunn
 
3. policy enforcement
3. policy enforcement3. policy enforcement
3. policy enforcement
JudePragashVedam
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
shanofa sanu
 
Submission task # 02
Submission   task # 02Submission   task # 02
Submission task # 02
MuhammadUmerAsghar1
 
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
ObservePoint
 
0417 HK AWS Hands-on Lab Series 2019 for Enterprise Data Protection in Enterp...
0417 HK AWS Hands-on Lab Series 2019 for Enterprise Data Protection in Enterp...0417 HK AWS Hands-on Lab Series 2019 for Enterprise Data Protection in Enterp...
0417 HK AWS Hands-on Lab Series 2019 for Enterprise Data Protection in Enterp...
Amazon Web Services
 
CPQ Deployment Tips & Tricks
CPQ Deployment Tips & Tricks CPQ Deployment Tips & Tricks
CPQ Deployment Tips & Tricks
Mark Keenan
 
YouTube Content ID Handbook - Google
YouTube Content ID Handbook - GoogleYouTube Content ID Handbook - Google
YouTube Content ID Handbook - Google
Carlos Pacheco
 
How to make a developer’s life easier – strategy pattern with the help of Gra...
How to make a developer’s life easier – strategy pattern with the help of Gra...How to make a developer’s life easier – strategy pattern with the help of Gra...
How to make a developer’s life easier – strategy pattern with the help of Gra...
OCoderFest
 
Alfresco : Implementing Business Rules
Alfresco : Implementing Business RulesAlfresco : Implementing Business Rules
Alfresco : Implementing Business RulesWildan Maulana
 
SharePoint - Empower People and Stay in Control - Atidan
SharePoint - Empower People and Stay in Control - AtidanSharePoint - Empower People and Stay in Control - Atidan
SharePoint - Empower People and Stay in Control - AtidanDavid J Rosenthal
 
LS11 Show101
LS11 Show101LS11 Show101
LS11 Show101
Darren Duke
 
AI Builder - Text Classification
AI Builder - Text ClassificationAI Builder - Text Classification
AI Builder - Text Classification
Cheah Eng Soon
 
Mobile trend marketing
Mobile trend marketingMobile trend marketing
Mobile trend marketing
MoMoRelaxing
 

Similar to Creating Cisco ACI Fabric Policy (20)

IPSec Tunnels with GPO
IPSec Tunnels with GPOIPSec Tunnels with GPO
IPSec Tunnels with GPO
 
Digitised and Decentralized Blockchain Technology Screenshots
Digitised and Decentralized Blockchain Technology ScreenshotsDigitised and Decentralized Blockchain Technology Screenshots
Digitised and Decentralized Blockchain Technology Screenshots
 
Digitised and Decentralized Block Chain Technology Python Project
Digitised and Decentralized Block Chain Technology Python ProjectDigitised and Decentralized Block Chain Technology Python Project
Digitised and Decentralized Block Chain Technology Python Project
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Documentiation
DocumentiationDocumentiation
Documentiation
 
Defining sql server 2008 policies tech republic
Defining sql server 2008 policies   tech republicDefining sql server 2008 policies   tech republic
Defining sql server 2008 policies tech republic
 
Useful Group Policy Concepts
Useful Group Policy ConceptsUseful Group Policy Concepts
Useful Group Policy Concepts
 
3. policy enforcement
3. policy enforcement3. policy enforcement
3. policy enforcement
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Submission task # 02
Submission   task # 02Submission   task # 02
Submission task # 02
 
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
 
0417 HK AWS Hands-on Lab Series 2019 for Enterprise Data Protection in Enterp...
0417 HK AWS Hands-on Lab Series 2019 for Enterprise Data Protection in Enterp...0417 HK AWS Hands-on Lab Series 2019 for Enterprise Data Protection in Enterp...
0417 HK AWS Hands-on Lab Series 2019 for Enterprise Data Protection in Enterp...
 
CPQ Deployment Tips & Tricks
CPQ Deployment Tips & Tricks CPQ Deployment Tips & Tricks
CPQ Deployment Tips & Tricks
 
YouTube Content ID Handbook - Google
YouTube Content ID Handbook - GoogleYouTube Content ID Handbook - Google
YouTube Content ID Handbook - Google
 
How to make a developer’s life easier – strategy pattern with the help of Gra...
How to make a developer’s life easier – strategy pattern with the help of Gra...How to make a developer’s life easier – strategy pattern with the help of Gra...
How to make a developer’s life easier – strategy pattern with the help of Gra...
 
Alfresco : Implementing Business Rules
Alfresco : Implementing Business RulesAlfresco : Implementing Business Rules
Alfresco : Implementing Business Rules
 
SharePoint - Empower People and Stay in Control - Atidan
SharePoint - Empower People and Stay in Control - AtidanSharePoint - Empower People and Stay in Control - Atidan
SharePoint - Empower People and Stay in Control - Atidan
 
LS11 Show101
LS11 Show101LS11 Show101
LS11 Show101
 
AI Builder - Text Classification
AI Builder - Text ClassificationAI Builder - Text Classification
AI Builder - Text Classification
 
Mobile trend marketing
Mobile trend marketingMobile trend marketing
Mobile trend marketing
 

More from David kankam

How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
David kankam
 
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
David kankam
 
Resolve a Palo Alto firewall blocking oracle application.
Resolve a Palo Alto firewall blocking oracle application.Resolve a Palo Alto firewall blocking oracle application.
Resolve a Palo Alto firewall blocking oracle application.
David kankam
 
Upcoming Topics To Be Covered On NSX Deployment.
Upcoming Topics To Be Covered On NSX Deployment.Upcoming Topics To Be Covered On NSX Deployment.
Upcoming Topics To Be Covered On NSX Deployment.
David kankam
 
Deploying The NSX Manager Virtual Appliance
Deploying The NSX Manager Virtual ApplianceDeploying The NSX Manager Virtual Appliance
Deploying The NSX Manager Virtual Appliance
David kankam
 
Converting From Nexus NX-OS Mode to ACI Mode.
Converting From Nexus NX-OS Mode to ACI Mode.Converting From Nexus NX-OS Mode to ACI Mode.
Converting From Nexus NX-OS Mode to ACI Mode.
David kankam
 
ACI HIGH LEVEL DESIGN OVERVIEW
ACI HIGH LEVEL DESIGN OVERVIEWACI HIGH LEVEL DESIGN OVERVIEW
ACI HIGH LEVEL DESIGN OVERVIEW
David kankam
 
SDN THE CISCO WAY
SDN THE CISCO WAYSDN THE CISCO WAY
SDN THE CISCO WAY
David kankam
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
David kankam
 
Nexus lan switching configuration
Nexus lan switching configurationNexus lan switching configuration
Nexus lan switching configuration
David kankam
 
Cisco virtual port channel high level over view
Cisco virtual port channel high level over viewCisco virtual port channel high level over view
Cisco virtual port channel high level over view
David kankam
 
Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.
David kankam
 
Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.
David kankam
 

More from David kankam (13)

How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
 
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
 
Resolve a Palo Alto firewall blocking oracle application.
Resolve a Palo Alto firewall blocking oracle application.Resolve a Palo Alto firewall blocking oracle application.
Resolve a Palo Alto firewall blocking oracle application.
 
Upcoming Topics To Be Covered On NSX Deployment.
Upcoming Topics To Be Covered On NSX Deployment.Upcoming Topics To Be Covered On NSX Deployment.
Upcoming Topics To Be Covered On NSX Deployment.
 
Deploying The NSX Manager Virtual Appliance
Deploying The NSX Manager Virtual ApplianceDeploying The NSX Manager Virtual Appliance
Deploying The NSX Manager Virtual Appliance
 
Converting From Nexus NX-OS Mode to ACI Mode.
Converting From Nexus NX-OS Mode to ACI Mode.Converting From Nexus NX-OS Mode to ACI Mode.
Converting From Nexus NX-OS Mode to ACI Mode.
 
ACI HIGH LEVEL DESIGN OVERVIEW
ACI HIGH LEVEL DESIGN OVERVIEWACI HIGH LEVEL DESIGN OVERVIEW
ACI HIGH LEVEL DESIGN OVERVIEW
 
SDN THE CISCO WAY
SDN THE CISCO WAYSDN THE CISCO WAY
SDN THE CISCO WAY
 
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
 
Nexus lan switching configuration
Nexus lan switching configurationNexus lan switching configuration
Nexus lan switching configuration
 
Cisco virtual port channel high level over view
Cisco virtual port channel high level over viewCisco virtual port channel high level over view
Cisco virtual port channel high level over view
 
Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.
 
Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.
 

Recently uploaded

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

Creating Cisco ACI Fabric Policy

  • 1. Fabric Policies: These are policies used for how the internal policies of the fabric system of the spine and leaf interact with each other, which is under the fabric tap as shown below, with that said I will move on and show how to create fabric policies and use it and verify. Creating fabric policies we will create an NTP policy and assign it to our pod. NTP is a good place to start, as having a common and synced time source is critical for third-party authentication, such as LDAP and logging.
  • 2. 1. From the Fabric menu, select/click on Fabric Policies then the Quick Start menu, select Create an NTP Policy (Alternate methodistoclickon PodPolicies>>Policies>>Date andTime rightclickandclickcreate as shownbelow)
  • 3. But we will use the quickstartmenufor our sample asshow below,clicktocreate a new NTPPolicy 2. A new window will pop up, and here we'll give our new policy a name and (optional) description and enable it. We can also define any authentication keys, if the servers use them. Clicking on Next takes us to the next page, where we specify our NTP servers.
  • 4. 3. Click on the plus sign on the right-hand side, and enter the IP address or Fully Qualified Domain Name (FQDN) of the NTP server(s):
  • 5. 4. We can also select a management EPG, which is useful if the NTP servers are outside of our network. Then, click on OK
  • 6. 5. Click on Finish. We can now see our custom policy under Pod Policies:
  • 7.
  • 8. 6. At the moment, though, the policy is not being used, Clicking on Show Usage at the bottom of the screen shows that no nodes or policies are using the policy. 7. To use the policy, we must assign it to a pod, as we can see from the Quick Start menu:
  • 9. To use it We need to go into the policy groups under Pod Policies and create a new Pod policy and call the NTP policy into it To create the policy, click on the Actions menu, and select Create Pod Policy Group as shown below 8. Name the new policy PoD-Policy. From here, we can attach our NTP-POLICY to the PoD- Policy. To attach the policy, click on the drop-down next to Date Time Policy, and select NTP-POLICY from the list of options:
  • 10.
  • 11. 9. NextWe have to create a PodProfile andassignthe PodPolicytoit, the process is similar as before: we go to Profiles (under the Pod Policies menu), select Actions, and then Create Pod Profile: give it a name and associate the Pod policy to it as shown below The resultsare shownbelow
  • 12. To verifyif APICisusingthe NTPPolicydothis from the APIC CLI, using the command show ntp Note : If DNSis notfullyconfiguredonyournetworkthenuse IPaddressesforthe NTPserverandnot an FQDN. apic1# showntp nodeid remote refid st t when poll reach delay offset jitter -------- - --------------- ------------- -- ------ ------ ------- --------------- -------- 1 216.239.35.4 .INIT. 16 u - 16 0 0.000 0.000 0.000 apic1# Steps : We created: 1. An NTPPolicy (Youcouldhave createdSNMP,BGPPolicyinsame wayfor APIC) 2. Attacheditto a Policygroup. 3. Attachedthe Policygroupto a PodProfile 4. The APICwill consume/usethe PodProfile whichwill be pusheddowntothe spine andleaves.