Nexus Dashboard Orchestrator Intersite Transit Routing with PBR for ACI Fabrics, Release 4.3.x

 
Updated March 28, 2024
PDF
Is this helpful? Feedback

Intersite Transit Routing with PBR

The following sections describe the guidelines, limitations, and configuration steps for the Intersite Transit Routing with Policy-Based Redirect (PBR) use case in your Multi-Site domain.

note.svg

The following sections apply to the intersite transit routing (L3Out-to-L3Out) with PBR use case only. For information on L3Out-to-EPG intersite communication with PBR, see the chapter Intersite L3Out with PBR instead; and for simple intersite L3Out use cases without PBR, see Intersite L3Out.
The intersite transit routing with PBR use case described in the following sections is supported for both inter-VRF and intra-VRF scenarios.


Configuration Workflow

The use case described in the following sections is an extension of a basic intersite L3Out PBR use case which is in turn an extension on basic intersite L3Out (without PBR) configuration. To configure this feature:

  1. Configure basic external connectivity (L3Out) for each site.

    The intersite L3Out with PBR configuration described in the following sections is built on top of existing external connectivity (L3Out) in each site. If you have not configured an L3Out in each site, create and deploy one as described in the External Connectivity (L3Out) chapter before proceeding with the following sections.

  2. Create a contract between two external EPGs associated to the L3Outs deployed in different sites, as you typically would for the use case without PBR.

  3. Add service chaining to the previously created contract as described in the following sections, which includes:

    • Creating a Service Device template and assigning it to sites.

      The service device template must be assigned to the sites for which you want to enable intersite transit routing with PBR.

    • Providing site-level configurations for the Service Device template.

      Each site can have its own service device configuration including different high-availability models (such as active/active, active/standby, or independent service nodes).

    • Associating the service device you defined to the contract used for the intersite L3Out use case you deployed in the previous step.

note.svg

Please refer ACI Contract Guide and ACI PBR White Paper to understand Cisco ACI contract and PBR terminologies.


Traffic Flow

This section summarizes the traffic flow between two external EPGs in different sites.

note.svg

In this case, the traffic flow in both directions is redirected through both firewalls in order to avoid asymmetric traffic flows due to independent FW services deployed in the two sites.


Consumer-to-Provider Traffic Flow

Because any IP prefix associated with the destination external EPG for classification purposes is automatically programmed (with its Class-ID) on the consumer leaf switch, the leaf switch can always resolve the class-ID of the destination external EPG and apply the PBR policy redirecting the traffic to the local FW.

After the firewall on the consumer site has applied its security policy, the traffic is sent back into the fabric and forwarded across sites towards the provider border leaf nodes connecting to the external destination. The border leaf node receiving the traffic originated from Site1 applies the PBR policy and redirects the traffic to the local firewall node. After the firewall applies its local security policy, the traffic is sent back to the border leaf nodes, which can now simply forward it toward the external destination.

505117.jpg
Figure 1. Consumer-to-Provider Traffic Flow

Provider-to-Consumer Traffic Flow

Similarly to the consumer-to-provider, the provider leaf switch can always resolve the class-ID of the destination external EPG and apply the PBR policy redirecting the traffic to the local FW in the other direction as well.

The traffic is then sent to the consumer site, where it is steered towards the local firewall before being forwarded to the external destination.

505118.jpg
Figure 2. Provider-to-Consumer Traffic Flow

Intersite Transit Routing with PBR Guidelines and Limitations

The following guidelines and limitations apply when deploying intersite transit routing in vzAny with PBR with Multi-Site:

  • Intersite transit routing with vzAny PBR is supported exclusively for single-node firewall on a one-arm interface.

    note.svg

    This use case is supported for sites running Cisco APIC release 6.0(4) or later.


  • While you can use your existing Service Graph objects defined in Application templates for these use cases, we recommend using the new service chaining workflow introduced in release 4.2(3) and implicitly creating new service graphs by defining the policies in Service Device templates and associating them to contracts.

    The steps that are described in the following sections use the new Service Device templates to enable the supported use cases but will call out the specific differences when applicable.

    note.svg

    Configuration of Service Graph objects in Application templates will be deprecated in a future release.


  • The L3Out VRF can be stretched (for intra-VRF use case) or site local (for inter-VRF cases).

    The following sections assume that you already have a VRF and L3Out already configured for each site.

    Note that the "Site-aware policy enforcement" and "L3 Multicast" options must be enabled for the vzAny VRF to enable the L3Out-toL3Out use cases discussed in this chapter.

    If you do not already have a VRF, you can create one in an Application template as you typically would. VRF configuration is described in detail in Configuring VRFs.

  • You must enable the Site-aware Policy Enforcement Mode setting on the VRF to enable the new L3Out-toL3Out use cases. Enabling or disabling the Site-aware Policy Enforcement Mode option will cause a brief traffic disruption (including the already existing contracts between EPGs) because the zoning rules must be updated on the leaf switches. We recommend that you perform this operation during a maintenance window. Enabling Site-aware Policy Enforcement Mode increases TCAM usage on the leaf switches for the existing contracts and contracting permit logging cannot be used in conjunction with this option.

  • The service BD to which you want to attach the service device interface must be configured as L2 Stretched (BUM forwarding is optional and should be disabled).

    If you do not already have a service BD, you can create one in an Application template. BD configuration is described in detail in Configuring Bridge Domains.

  • The consumer, provider, and the service BDs must be configured in Hardware proxy-mode.

  • The vzAny PBR destination must be connected to a stretched service BD, not to an L3Out.

  • Only threshold down deny action and sip-dip-protocol hash is supported .

  • The PBR destination must be in either the consumer or provider VRF instance. For example see Cisco Application Centric Infrastructure Policy-Based Redirect Service Graph Design White Paper.

The following is not supported for this use case:

  • Specific Remote leaf switch configurations.

    Specific considerations apply for Multi-Site deployments leveraging Remote Leaf nodes. Intersite transit routing with PBR is not supported on vzAny PBR and L3Out-to-L3Out for communication between endpoints (consumer or provider) deployed on remote leaf nodes that belongs to different sites.

  • Each VRF is limited to utilizing only one device in a one-arm configuration for vzAny-to-vzAny, L3OutEPG-to-L3OutEPG, and vzAny-To-L3OutEPG PBR. This restriction is enforced due to special ACL in APIC.

  • We must use different firewall VLAN interfaces for redirection for vzAny-to-vzAny/L3OutEPG-to-L3OutEPG, and other use cases such as vzAny-to-EPG, EPG-to-EPG and EPG-to-L3OutEPG if they are in the same VRF.

  • When vzAny with PBR is applied to north-south communication for any of the newly supported use cases (vzAny-to-vzAny, vzAny-to-L3OutEPG, L3OutEPG-to-L3OutEPG), ingress traffic optimization needs to be enabled for stretched subnets.

  • Only one node service chain with L3 PBR destination is supported.

  • Contract Permit logging is not supported on the VRF that has Site-aware Policy Enforcement Mode is enabled, which is required for vzAny PBR and L3OutEPG-to-L3OutEPG PBR.

  • Pod-aware vzAny with PBR is not supported.

Create Service Device Template

Before you begin:
  • Ensure that you have read and completed the requirements described in Intersite Transit Routing with PBR Guidelines and Limitation.

  • You must have created a stretched service bridge domain (BD) to use with the service nodes you will define in this section.

    If you do not already have a service BD, you can create one in an Application template as you typically would. BD configuration is described in detail in Configuring Bridge Domains.

The following steps describe how to create a Service Device template with a service node and its settings which you will use for the intersite transit routing use cases.

  1. Log in to the Nexus Dashboard Orchestrator GUI.

  2. From the left navigation pane, select Configure > Tenant Templates.

  3. (Optional) Create a Tenant Policies template and an IP SLA monitoring policy.

    We recommend that you configure an IP SLA policy for traffic redirection as it simplifies the configuration of the PBR policy described in Step 7 below. If you have an IP SLA policy already defined, you can skip this step, otherwise:

    1. Choose the Tenant Policies tab.

    2. On the Tenant Policies page, click Create Tenant Policy Template.

    3. In the Tenant Policies page’s right properties sidebar, provide the Name for the template and Select a Tenant.

    4. In the Template Properties page, choose Actions > Add/Remove Sites and associate the template with both sites.

    5. In the main pane, choose Create Object > IP SLA Monitoring Policy.

    6. Provide the Name for the policy, and define its settings.

    7. Click Save to save the template.

    8. Click Deploy Template to deploy it.

  4. Create a Service Device template and associate it with a tenant and with the sites.

    1. From Configure > Tenant Templates, choose the Service Device tab.

    2. Click Create Service Device Template.

    3. In the template properties sidebar that opens, provide the Name for the template and Select a Tenant.

    4. In the Template Properties page, choose Actions > Add/Remove Sites and associate the template with both sites.

    5. Click Save to save the template.

  5. Create and configure the device cluster.

    1. In the Template Properties page (template-level configuration), choose Create ObjectService Device Cluster.

      The device cluster defines the service to which you want to redirect traffic. This release supports redirection to a firewall service node that can be deployed with three different redundancy models: active/standby, active/active, or a cluster of multiple independent nodes. The provisioning for those different options is covered in Step 7 below. Note that you can choose the firewall deployment model at the site level and different options can be deployed across different fabrics that are part of the same Multi-Site domain.

    2. In the <cluster-name> sidebar, provide the Name for the cluster.

      The Device Location and Device Mode are pre-populated based on the currently supported use case. Device Location should be pre-configured as ACI On-Prem and Device Mode as L3.

    3. For the Device Type, choose Firewall.

    4. For Device Mode, choose L3.

    5. For Connectivity Mode, choose One Arm.

      This release supports a service device connected in one arm mode only.

      note.svg

      When changing the device connectivity mode between one arm, two arm and advanced mode, the name of the device interface might change in the process. A warning message will alert the user, and any attempt to modify the interface will be restricted if the interface is currently in use by a contract. If the user wishes to preserve the previously used interface name and avoid disrupting the deployed configuration, they may choose to override the name change during the modification process.


      note.svg

      Validations are conducted only for one-arm and two-arm modes. In Advanced mode, no validations are performed, and it is assumed that the user is an expert when choosing this mode.


    6. Provide the Interface Name.

    7. For the Interface Type, choose BD.

    8. Click Select BD > to choose the service bridge domain to which you want to attach this device.

      This is the stretched service BD you created as part of the Intersite Transit Routing with PBR Guidelines and Limitations, for example FW-external.

    9. For the Redirect option, choose Yes.

      You must choose to enable redirect for the PBR use case. After choosing Yes, the IP SLA Monitoring Policy option becomes available.

    10. (Optional) Click Select IP SLA Monitoring Policy and choose the IP SLA policy you have created in a previous step.

    11. (Optional) In the Advanced Settings area, choose Enable if you want to provide additional settings for the service cluster.

      You can configure the following advanced settings:

      • QoS Policy - allows you assign a specific QoS level within the ACI fabrics for the redirected traffic.

      • Preferred Group - specifies whether or not this service device interface is part of the preferred group.

      • Load Balancing Hashing - allows you to specify the hashing algorithm for PBR load balancing.

        note.svg

        You must keep the default value for the vzAny-to-vzAny, vzAny-to-ExtEPG, and ExtEPG-to-ExtEPG use cases as they support only the default configuration. You can change the load balancing hashing for other use cases: EPG-to-EPG, ExtEPG-to-EPG and vzAny-to-EPG.


        For additional information, see ACI Policy-Based Redirect Service Graph Design.

      • Pod Aware Redirection - can be configured in Multi-Pod configuration if you want to specify the preferred PBR node. When you enable Pod-aware redirection, you can specify the Pod ID and redirection is programmed only in the leaf switches located in the specified Pod.

      • Rewrite Source MAC - updates the source MAC address if the PBR node uses "source MAC based forwarding" instead of IP based forwarding.

        For additional information, see ACI Policy-Based Redirect Service Graph Design.

      • Advanced Tracking Options - allows you to configure a number of advanced settings for the service node tracking. For additional information, see Policy-Based Redirect and Threshold Settings for Tracking Service Nodes

    12. Click Ok to save.

      Note that after you create the Service Device Cluster, it is highlighted in red in the Template Properties (template-level configuration) page. At this point, you have defined redirection to a firewall service, but you must still provide the firewall information and the redirect policy you want to use at the site-local level.

  6. Provide site-local configuration for the Service Device Cluster you created in the previous step.

    1. In the Service Device Template screen, choose the <site-name> tab.

    2. At the site level, choose the Service Device Cluster you created.

    3. In the properties sidebar, choose the Domain Type.

      You can choose whether the firewall device in this site is Physical or VMM (virtual and hosted by a hypervisor that is part of a VMM domain).

    4. Click Select Domain to choose the domain to which this firewall device belongs.

      You can choose either a physical or a virtual domain.

      • If you choose a physical domain, provide the following information:

        • VLAN - you must provide the VLAN ID used for traffic between the fabric and the firewall device.

        • Fabric to Device Connectivity - provide the switch node and interface information for the fabric’s connectivity to the firewall device.

      • If you choose a VMM domain, provide the additional options:

        • Trunking Port - used to enable tagged traffic for the L4-L7 VM.

          By default, the ACI service graph configuration creates access-mode port groups and attaches them to the vNIC of the L4-L7 VM automatically.

        • Promiscuous Mode - required if the L4-L7 virtual appliance must receive traffic destined to a MAC address that is not the vNIC MAC owned by the VM.

        • VLAN - optional configuration for VMM domains and will be allocated from the dynamic VLAN pool associated with the domain if not specified.

        • Enhanced LAG Option - if you are using enhanced LACP for the port channel between the hypervisor and the fabric.

        • VM Name - choose the firewall’s VM from the list of all VMs available in this VMM domain and the interface (VNIC) used for the firewall traffic.

          Depending on the kind of device cluster you are deploying, click +Add VM information to provide additional cluster nodes.

  7. Provide the FW device information and PBR destination IP addresses.

    As previously mentioned, this release supports 3 deployment options for high-availability FW clusters: active/standby clusters, active/active clusters, and independent active nodes. In all three deployment options, the use of an IP SLA policy (mentioned in Step 3) allows to specify only the IP address of the firewall nodes, and the corresponding MAC address will be automatically discovered.

    note.svg

    You can deploy different designs in different sites.


    • Active/standby clusters are identified by a single MAC/IP pair.

      505111.jpg

      In this case, you need to provide a single PBR destination IP address identifying the active firewall node and also include information about every node in the cluster.

      For example, for a 2-nodes active/standby cluster, you would provide the following:

      • For a virtual firewall cluster, the VMs representing the active and standby firewall nodes and the IP address of the active firewall as PBR destination.

      • For a physical firewall cluster, the interfaces used to connect the active and standby firewall nodes to the leaf switches of the fabric (vPC interfaces in the specific example below) and the IP address of the active firewall as PBR destination.

        505114.jpg
    • Active/active clusters are also identified by a single MAC/IP pair.

      505112.jpg

      For Cisco Firewalls (ASA or FTD models), the Active/Active cluster with a single MAC/IP pair is only supported for physical form factors, and all the cluster nodes own the same MAC/IP address and must be connected to the same vPC logical connection deployed on a pair of ACI leaf switches. As a result, the figure below shows how a single vPC interface and a single PBR Destination IP address should be configured on NDO, where the MAC address is dynamically discovered when using an IP SLA policy mentioned for the previous use case.

      505115.jpg
    • For independent active nodes configuration, each active node is identified by a unique MAC/IP addresses pair.

      Note that symmetric PBR ensures that the traffic is handled by the same active node in both directions.

      505113.jpg

      In this case, you must provide individual PBR Destination IP addresses for each active node as well as each node’s information in your NDO configuration.

      For example, for a deployment of 3 independent firewall nodes, you would provide the following:

      • For a virtual firewall form factor, the VMs representing the 3 firewall nodes and their unique IP addresses as PBR destinations.

      • For a physical firewall form factor, the interfaces used to connect each firewall node to the leaf switches of the fabric (vPC interfaces in the specific example below) and the unique IP addresses of each firewall node as PBR destinations.

        504700.jpg
        1. Click Add Fabric To Device Connectivity (physical domain) or Add VM Information (VMM domain).

          Depending on whether you selected physical or VMM domain in the previous step, you will specify information for either the firewall VM or the physical fabric connectivity to the firewall device.

          For physical domains, provide the Pod, switch node, and the interface information.

          For VMM domains, provide the VM name and vNIC information.

        2. Click Add PBR Destination to provide the IP address of the interface on the firewall that is connected to the service bridge domain.

          Depending on the kind of device cluster you are deploying, you may need to provide one or more PBR destination IP addresses:

          note.svg

          This does not provision the IP address on the firewall’s interface, but simply configures redirection of traffic toward that IP address. The specific firewall configuration is not deployed from NDO, and you must provision it separately.


        3. Click Ok to save the provided configuration.

        4. Repeat this step for the other site with which you associated the template.

  8. Save and deploy the template.

    1. At the Service Device Template level, click Save to save the template configuration.

    2. Choose the Template Properties tab and click Deploy Template to push the configuration to the sites.

    3. (Optional) Verify that the configuration was created at the site level.

      You can verify that the L4-L7 device is configured in the APIC by navigating to <tenant-name> > Services > L4-L7 > Devices > <cluster-name> in the APIC GUI. This shows the device cluster along with all the configuration you have provided in the previous steps.

      To verify that the PBR policy is now configured on the APIC, navigate to <tenant-name> > Policies > Protocol > L4-L7 Policy-Based Redirect and you should see the <cluster-name>-one-arm redirect defined with the IP SLA monitoring policy you chose in Step 5j and the IP address you provided in Step 7d.

What to do next:

After you have deployed the service device configuration, create the application template, external EPGs, and a contract with which you will associate the service chaining as described in Create Contract and Add Service Chaining.

Create Contract and Add Service Chaining

Before you begin:

After you have created and deployed the service device templates and created the application template with the external EPGs for the L3Outs in each site, you can enable intersite transit routing with policy-based redirection by creating a contract between the external EPGs and associating the contract with the service devices you created in a previous section.

  1. Navigate to the application templates where you want to create the external EPGs for the L3Outs and a contract between the external EPGs. Typically you would define the external EPGs in different site local templates associated to each site.

  2. Create two external EPGs and associate the L3Outs in each site to the external EPG(s) at the site level.

    This is the same process as you typically use when creating external connectivity for a fabric. Detailed information about the L3Out templates and External EPGs is described in [External Connectivity (L3Out)].

  3. Create a contract in a stretched template associated to both sites, as you typically would and associate the contact with both external EPGs.

    In this case, one of the external EPGs will be the consumer and the other one is the provider.

  4. Choose the contract you created.

  5. In the Service Chaining area, click +Service Chaining.

    note.svg

    These steps assume that you have configured a brand new service device for this use case using the new Service Device template workflow introduced in release 4.2(3) as described in Create Service Device Template. If you already have a Service Graph defined in an application template, choose Service Graph instead and then select the existing service graph. However, keep in mind that the Service Graph option will be deprecated in a future release.


  6. For Device Type, choose Firewall.

    This release supports a service device connected in one arm mode only.

  7. From the Device dropdown, choose the FW device cluster you created in the previous step.

  8. Ensure that Consumer Connector Type Redirect is enabled.

  9. Ensure that Provider Connector Type Redirect is enabled.

  10. Click Add to continue.

  11. Click Save to save the template.

  12. Click Deploy Template to deploy it.


First Published: 2024-03-01
Last Modified: 2024-03-01

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883