Friday 13 December 2019

The Power of Multi-Domain Integration for Your Network

Cisco Enterprise Networks, Cisco Guides, Cisco Tutorial and Materials, Cisco Learning, Cisco Certifications, Cisco Online Exam, Cisco Study Materials

End-user expectations for digital experiences have never been higher. Cisco is meeting the demand to have an unplugged and uninterrupted experience with its multi-domain integration across the data center, campus, and branch.

Cisco Enterprise Networks, Cisco Guides, Cisco Tutorial and Materials, Cisco Learning, Cisco Certifications, Cisco Online Exam, Cisco Study Materials
But what does this mean in practicality? Application access must be secure regardless of location. Everything must be connected. And the connection must always be on. These expectations are driving the digital transformation happening all around us today.

Today’s workforce is mobile, unplugged, and expects a high-quality application experience, The office is wherever you are, whether it be in the office, at home, or at a café. Such connected mobility is critical, but how well you’re able to interact with your applications is perhaps even more critical for productivity.

For businesses, the need for user segmentation is growing, while also ensuring a completely secure environment. Businesses must provide what users have come to expect when it comes to infrastructure availability, flexibility, and performance. Every organization needs to deliver this unplugged and uninterrupted experience. Business outcomes are driven by connected devices that must be always-on. Network downtime means missed opportunities and the halt of growth.

Finding the right balance


The challenge of balancing these requirements for an unparalleled digital experience falls on the shoulders of IT. When considering how varying the types of needs in different campus environments are today, you can understand the need for multi-domain integration that brings together network visibility, access, and always-on security:

◉ Medical campuses, with life-saving devices connected and relying on the network.

◉ Facilities management, with a vast array of IoT that includes HVAC, security imaging, and lighting control systems.

◉ Retail operations, with internet-connected robotic systems fulfilling orders and restocking returns.

Marriott’s 2018 data breach is the perfect example of the delicate balance between user experience and security that IT must manage. While the focus was on users and the ease of its reservation-booking experience, the hotel chain was unaware that a security breach in the reservation database had taken place over a four-year period, which involved over 380 million guest records and cost the organization more than $120 million to mitigate.

On the one hand, IT is tasked with providing the best digital experience for users and the organization. But at the same time, an equal importance must be placed on compliance requirements and mitigating business risk.

Multi-domain integration for your network


In response to this need, Cisco introduced Intent-Based Networking (IBN) in 2017, which delivers a secure, end-to-end digital experience, with its intuitive, self-optimizing, always-secure network that takes the guesswork out of network management through the power of multi-domain integration.

Cisco Enterprise Networks, Cisco Guides, Cisco Tutorial and Materials, Cisco Learning, Cisco Certifications, Cisco Online Exam, Cisco Study Materials

For the campus, Cisco has delivered the IBN vision through SD-Access. For the branch, it’s SD-WAN. And our Application Centric Infrastructure (ACI) encompasses both the data center and cloud. Multi-domain integration enables these three components to complete our IBN vision, which is a solution only Cisco can provide.

Enhancing your business outcomes, multi-domain provides the expected user interactions with all applications across these interconnected domains, while simultaneously driving down costs, complexity, and risk.

Users and devices can log on from anywhere, while applications can also reside anywhere. Whether you’re using cellular, wireless, or a wired connection from any campus, branch, or remote location, the end-user is provided a seamless, secure experience regardless the means of connection.

The support of built-in security


Built-in security is a key component to reducing the attack surface and mitigating risk, while continuing to provide a fully connected, uninterrupted service. And there are three fundamental pieces of the end-to-end security that multi-domain integration provides.

The first is continuous network visibility. Traditional perimeter-based security, or even a standalone endpoint security solution, isn’t able to address the network communications flow between users, applications, and devices.

Next is Zero Trust. Bad actors are becoming more sophisticated in avoiding detection. Logical end-to-end segmentation—where we contextually group all endpoints, users, devices, and applications—enables the network to isolate only those assets and resources where access is authorized at any given time.

Finally, constant protection is the final piece of our security puzzle. The network transformation afforded by multi-domain integrated architecture means your entire infrastructure becomes dynamic. To provide total security, Cisco embeds hundreds of thousands of control points with every network device—from the campus across the branch, and into the data center and cloud.

Multi-domain integration brings all the pieces of the IBN puzzle together. And Cisco invites you to unlock the potential of your network and take the next step in your organization’s digital transformation.

Watch for a future blog that dives deeper into the multi-domain integration story and how it works for your network.

Thursday 12 December 2019

ONE Silicon, ONE Experience, MULTIPLE Roles

Cisco Study Materials, Cisco Tutorial and Material, Cisco Guides, Cisco Learning, Cisco Study Material, Cisco Online Exam

Wherever you are, you likely have devices containing a semiconductor chip around you – computers, phones, television sets, printers, cars, trains, airplanes, and more. It’s almost hard to believe that this tiny electronic component unleashed the same magnitude of change as the Industrial Revolution by making the computer revolution and the digital age a reality. And these semiconductor chips are everywhere; today, there are more chips in existence than people on earth.

As a critical building block of networking devices, silicon chipset design primarily addressed routing use cases, and chipsets were optimized for programmability, deep buffering, and scale. When enterprises and cloud providers needed higher bandwidth, silicon designs emerged optimized explicitly for high-bandwidth and low power consumption. They met an immediate need, but at the expense of programmability, buffering, and scale.

Cisco Study Materials, Cisco Tutorial and Material, Cisco Guides, Cisco Learning, Cisco Study Material, Cisco Online Exam

Different silicon chipset requirements pushed the industry down a trajectory of two separate markets – the switching and routing markets – each of them defined by unique architectures, systems, and software. Despite several attempts to converge these into a single architecture, they have remained separate. Until today, switching silicon has always been faster than routing silicon.

While the industry searched for a convergence point, it grappled with the slowdown of “laws” that governed the development of silicon chipsets. For decades, the economics of silicon have been guided by 1) Moore’s Law – the number of transistors on a single silicon chip would double every two years and 2) Dennard Scaling’s Law – as transistor dimensions shrank, each transistor would operate faster and use less power. These two laws drove the golden age of silicon chipsets, but they are showing signs of weakness. As a result, silicon designs – for both routing and switching – have diverged as companies tried to overcome the limitations of Moore’s and Dennard’s Laws in their own way.

As innovators, and despite the mounting challenges, we never stopped dreaming of a single chipset architecture that could serve the needs of routing and switching. Could we build one architecture to solve multiple market needs, form factors, roles within the system, and that could scale, as needed? And could we do it all without making any compromises?

If we could build it, it would mean a fundamental shift in the industry.

Today, I’m thrilled to announce Cisco Silicon One™- a ground-breaking, new silicon architecture that has achieved these lofty goals.

For the first time, not only are we elevating routing silicon’s performance to the same level as switching silicon’s performance – both from a bandwidth and power efficiency perspective – but we are also paving the way to faster performance gains in the near future.

Cisco Silicon One is the first architecture that serves several different market segments – service provider and web-scale. And with future product lines built on a consistent silicon architecture, customers can enjoy ONE experience across the entire network, across all network functions and covering all form factors. With Cisco Silicon One, customers can significantly reduce OpEx – as network engineers save time on testing functionality, qualifying new hardware, and deploying new services with greater consistency and faster time-to-market.

Cisco Silicon One Q100, the first generation of this architecture, is twice the network capacity of all other high-scale routing ASICs. It is the first routing silicon to break through the 10Tbps benchmark for network bandwidth, without compromising carrier-class capabilities, e.g., feature richness, large queue set, deep buffers, large NPU tables, and advanced programmability.

It also demonstrates many architectural advantages. It can support a fixed switch or router with 10.8T worth of network ports up to large non-blocking distributed routers with Petabit scales. All of them with non-blocking performance, deep buffering with rich QoS, and programmable forwarding.

Another important innovation of the Cisco Silicon One Q100 is its unprecedented versatility. Up until now, networking vendors were using different and specific silicon chipsets for standalone processors, line card processors, and fabric elements.

But with the Cisco Silicon One Q100, all of these roles, including standalone network processor (optional deep buffers), traditional line card network processor (optional deep buffers), oversubscribed line card network processor (optional deep buffers), and fabric element in a distributed router can be met by a single chipset. All accomplished with a common and unified P4 programmable forwarding code and SDK.

Cisco Study Materials, Cisco Tutorial and Material, Cisco Guides, Cisco Learning, Cisco Study Material, Cisco Online Exam

And networks built with Cisco Silicon One Q100 will deliver greater consistency in features, services, and telemetry across multiple network locations because it unifies and streamlines operations by eliminating parity problems, upgrades, and other issues associated to different silicon.

The innovations in Cisco Silicon One represent years of investment and are vital for the future of the Internet. Legacy designs that rely simply on CMOS densities will suffer from the slowdowns inherent in Moore’s Law. With Cisco Silicon One, Cisco opens up a fast lane to future innovation that will outpace traditional methods while development cycles for silicon iterations will be dramatically shorter.

Wednesday 11 December 2019

Drag and drop your way to network segmentation

I can understand if you dread configuring network segmentation. Not only is it hard to configure the many different switches and routers, creating VLANs, using ACLs to create lists of permit or deny IP addresses, it is also easy to make mistakes and risk shutting down parts of the network. And with users and devices moving around, you must continuously modify these configurations. Is it any surprise that many of today’s networks are not optimally segmented?

In this blog we discuss how Cisco Digital Network Architecture (Cisco DNA) makes it easy to segment your campus and branch networks. This blog is the second in a series focusing on aspects of intent-based networking, the first being on controller-led architecture.

Before digging into the solution, let’s understand why you may want to segment your network in the first place.

Cisco Study Materials, Cisco Tutorial and Material, Cisco Guides, Cisco Certifications, Cisco Learning

◉ Enhanced security: Isolate and filter network traffic to limit communications between users and devices

◉ Better access control: Allow users and devices to access only authorized resources

◉ Improved monitoring: Log events, monitor connection attempts, and detect suspicious behavior

◉ Faster containment: Minimize the scope of a network breach


Group-based access control



Recognizing that segmenting the network is a security must-have, we set about making it easy to do in Cisco DNA – the access network for campus and branch. Those of you who have experienced the Cisco DNA Center – the controller for a Cisco DNA based network – know that it provides a highly intuitive and easy to use graphical interface to manage the network and is the ideal platform to define segmentation. For those who haven’t, we encourage them to attend one of our monthly demo sessions where we explain what Cisco DNA can do for you.

Cisco DNA Center allows you to easily manage security policies through policy-based abstractions called scalable groups.  Scalable groups are used to represent connected users and devices based upon attributes, like role, function, location, etc. rather than IP addresses. These groups then form the basis of security policies, centrally managed on Cisco DNA Center and enforced across the network fabric.

Cisco DNA Center enables simplified management of access control between the different groups, and dynamically configures the access control policy in the fabric consisting of switches, routers, and wireless network devices that make up the fabric.

As people and things connect to the network using either a wired or wireless interface, Cisco DNA identifies them and automatically assigns them to their rightful group and places them in the appropriate segment. We call the creation of these Virtual Networks (VN), macro-segmenting.

The two levels of network segmentation


But what about the communications between members within a VN? We need to control that too for a deeper level of security. We call this micro-segmenting. So, while macro-segmenting isolates traffic between VNs, micro-segmenting controls communications between different groups or members of the same group within the VN.

For example, you might define two VNs – an ‘Employee’ VN with management, HR, security staff, and financial analysts, and an ‘IoT’ VN with security cameras, door locks, and digital signage. With SD-Access macro-segmentation you can ensure that a compromised camera will not let the attacker access HR resources. While with micro-segmentation, you can prevent lateral spread of malware between say HR and security staff or between two financial analysts.

Cisco Study Materials, Cisco Tutorial and Material, Cisco Guides, Cisco Certifications, Cisco Learning

Cisco DNA Center makes it easy to micro-segment the network. The Access Control Application within Cisco DNA Center works with Cisco Identity Services Engine (ISE) to let you define contracts. Contracts are statements that permit or deny specific types of interactions. For example, if you are concerned about malware attacks that spread using well-known TCP ports of 22, 80, and 443, you can simply create a contract that would disallow such communications between members of the same group.

Once you define the contracts, you use a simple matrix within Cisco DNA Center and activate them between source and destination groups. This matrix visually describes policies that the Cisco DNA Center consistently applies and enforces through the network fabric.

Segmentation that extends from access to apps


Just like Cisco DNA Center segments the access network and creates groups of users, Cisco ACI segments data center and cloud networks and creates groups of applications. Cisco’s multidomain architecture lets these networking domains exchange and map these groups. Now, thanks to this integrated segmentation, users can only run applications they are authorized for. For example, only accounting staff may access point-of-sale systems in keeping with PCI regulations.

Tuesday 10 December 2019

How Wi-Fi 6 overcame one of the toughest wireless environments on the planet

Metal and heat. Since ancient times, these two foundational elements have continuously been used to create a variety of tools. In medieval times, metallurgy technology spawned swords and armor unlike any before it and, in the early 19th century, it vitalized the Industrial Revolution. Nowadays, high-tech metallurgical processes are giving rise to advanced materials and products.

In today’s industrial plants, manufacturers are streamlining processes to create better products, free of defects, that meet exact tolerances. Mettis Aerospace has been at the forefront of metallurgical innovation for over 80 years, specializing in forging, machining and sub assembly for the aerospace and defense sectors. The company uses powerful presses to forge a variety of metals into highly sophisticated products for the aerospace industry. As a technology driven company, Mettis also relies on network connected sensors, cameras, and robotics to manufacture their products. This is where Cisco, its technology, and partnerships comes in to play.

Electromagnetism and Wi-Fi


Cisco Study Materials, Cisco Guides, Cisco Tutorial and Material, Cisco Certifications, Cisco Online Exam

While metal and heat are needed for the forging of aerospace products, they are also detrimental to Wi-Fi. As a conductor of electricity and magnetism, metal directly affects radio waves, including those from Wi-Fi. This means that in a building made mostly of steel, where people are working with various metals on massive steel and iron presses, such as Mettis’ forging facilities, radio waves are reflected and diffracted in all directions. More metal means more degradation and interference, resulting in an unacceptable Wi-Fi experience. Add in high-heat (1000+ degrees Fahrenheit) and its effect on the electrical equipment and you have the worst possible situation for Wi-Fi.

Interesting fact: Mettis is home to some of the most powerful forging presses in the UK, one in particular weighs the equivalent of over 200 small cars.

Wi-Fi 6 drives industrial applications with ease


With that in mind, Cisco, along with its partners from the Wireless Broadband Alliance, set out to test Wi-Fi 6 at the Mettis manufacturing plant in Midlands, England. For the above reasons, previous attempts to use Wi-Fi failed in this environment. However, with Wi-Fi 6 come new technologies that enable it to perform in less than optimal conditions.

◉ First and most important, Wi-Fi 6 offers a new radio channel structure, allowing narrower but longer data symbols. Additionally, flexible orthogonal frequency division multiplexing (OFDM) guard interval ensures that Wi-Fi signals do not interfere with one another and cause overlapping transmission issues. This longer symbol duration (Ts) and guard interval (Gi) is better able to resist harsh multi-path environments, such as those found in the Mettis plant.

◉ Second, OFDM access (OFDMA) multiplexes multiple users on the same channel at the same time increasing network efficiency and providing lower latency for both uplink and downlink traffic. This is important for business critical, delay-sensitive applications used in manufacturing environments.

◉ Third, WiFi6 offers significant co-channel-interference (CCI) mitigation via Basic Service Set (BSS) color techniques that allow the operator to selectively ignore interference; boosting reliability and reducing delay. This is critical in open-space high-ceiling environments such as those found in the Mettis plant.

Mettis tested 4k live streaming video from cameras mounted on robotic arms, augmented reality to support equipment status and repairs, large file uploads, and Wi-Fi video calling on smartphones. Cisco Catalyst 9100 Wi-Fi 6 capable access points met all trial expectations with very low latency across a variety of partner devices throughout the manufacturing floor to prove out the success of the technology. Speeds reached 700Mbps which was our benchmark for this trial using the 80Mhz channel. Future trials will include the 160Mhz channel with a benchmark of gigabit speeds.

This was a huge success for all, especially Mettis. The pilot highlighted that industrial applications go beyond typical use cases and require the latest Wi-Fi 6 technology at both the network and device level to ensure consistent and reliable access and connectivity.

Cisco Study Materials, Cisco Guides, Cisco Tutorial and Material, Cisco Certifications, Cisco Online Exam

Sunday 8 December 2019

Putting the Enterprise in the 5G Driver’s Seat

Cisco Study Materials, Cisco Guides, Cisco Learning, Cisco Online Exam, Cisco Tutorial and Material

The enterprise offers boundless opportunities as we move into and through the 5G era. 90% of Service Provider CXOs said the most important new revenue streams in 5G are going to come from enterprise.

But what are the business models for 5G where the enterprise is concerned? And did anyone actually ask the enterprise if they’re even interested in 5G?

We did and they are. Cisco surveyed our enterprise customers and asked them what they wanted to receive from a 5G experience, and these are just some of the things they told us they expect:

· More flexibility, control and visibility from their Service Providers.
· A network that’s easy to operate and deploy.
· The ability to drive their network, based on policy (intent-based networking).

Wi-Fi 6 or 5G?


Cisco Study Materials, Cisco Guides, Cisco Learning, Cisco Online Exam, Cisco Tutorial and Material

So, does the enterprise want Wi-Fi 6 or 5G? Is it a binary decision? The answer that came back from our enterprise customers is that they want the right tool for the job, whatever the job may be. We’ve been working to break down the characteristics of each access type to understand what the right tool is for each job, so that we can advise our enterprise customers accordingly, and put them on the road to success.

Enterprises are digitizing completely, and new applications will require pervasive compute and connectivity. On one hand, Wi-Fi 6 offers mass availability, less cost and ease of deployment. On the other, 5G is stronger in terms of handoffs, low latency and determinism.

To enable the enterprise to capture new revenues, we’re putting them in the driver’s seat with bundles, verticals and new channels. In some places, Wi-Fi 6 makes sense. In others, 5G is the right tool for the job. Often, the enterprise will benefit from both technologies. It all comes down to the specific needs in a given vertical, the associated policy and service requirements, and how we package the services and bring them to market in new and intelligent ways. This service creation, combined with our unmatched end-to-end portfolio, makes Cisco the most important 5G vendor out there.

Saturday 7 December 2019

Configuring Cisco Security with Amazon VPC Ingress Routing

Today, Amazon Web Services (AWS) announced a new capability in Virtual Private Cloud (VPC) networking that is designed to make it easier and more efficient for Cisco Security customers to deploy advanced security controls in the cloud. This new capability is called Amazon VPC Ingress Routing. It allows users to specify routes for traffic flowing between a VPC and the internet or from a VPN connection, such as a private datacenter.

Amazon VPC Ingress Routing is a service that helps customers simplify the integration of network and security appliances within their network topology. With Amazon VPC Ingress Routing, customers can define routing rules at the Internet Gateway (IGW) and Virtual Private Gateway (VGW) to redirect ingress traffic to third-party appliances, before it reaches the final destination. This makes it easier for customers to deploy production-grade applications with the networking and security services they require within their Amazon VPC.

While the remainder of this post focuses on Cisco’s NGFWv and ASAv products, this capability can also be used to deploy a number of other network-based security solutions into the AWS traffic path. This includes services such as the following:

◉ Firewall policy enforcement
◉ Network traffic visibility
◉ Malware detection
◉ URL filtering
◉ Intrusion Prevention
◉ DNS security

This is a big win for Cisco customers deploying our security products in AWS, and we are pleased to have been an early adopter and Integration Partner with AWS on this launch.

How to Use Amazon VPC Ingress Routing with Cisco Firewalls


The configuration is achieved by creating a custom route table and associating subnet routes with the private Elastic Network Interface (ENI) of the security appliance, and then associating the public ENI with an IGW and VGW. A single firewall instance can protect multiple subnets; however, a separate instance is needed per VPC. Below are some details on the testing we performed as well as sample use cases and configuration guidance.

Use Cases / Deployment Scenarios


Cisco NGFWv/ASAv can be deployed in a VPC to protect the following traffic flows:

◉ Traffic Traversing an Internet Gateway (IGW) To/From the Internet
◉ Traffic Traversing a VPN Gateway (VGW) To/From a Remote VPN Peer

Benefits of Using Amazon VPC Ingress Routing with Cisco’s NGFWv and ASAv


◉ Offload NAT from the firewall to AWS network address translation (NAT) gateway or instance
◉ Simplify protection of multi-tier applications spanning subnets and VPCs
◉ The scalable design makes it easy to add new subnets, and more of them
◉ Enables bi-directional, threat-centric protection for traffic bound for private networks and the internet

POC Deployment Scenario


Enable outbound Internet connectivity and offload NAT function to AWS NAT gateway

In this scenario, the Cisco Firewall (NGFWv or ASAv) is deployed between internal services in the AWS VPC and the internet. The route table for the Internet Gateway (igw-rt) has a specific route for the Inside subnet which directs inbound traffic to the Cisco Firewall for inspection. Prior to this enhancement, the users had to NAT egress traffic on the firewall to bring back the reply packet to the same virtual appliance. This new configuration eliminates the need for an ENI on the firewall and removes the requirement to perform NAT on the firewall, thus improving performance.

Cisco Security, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Online Exam

Cisco NGFW/ASA with AWS IGW (routable attached to IGW) and AWS NGW to NAT outbound traffic

Cisco NGFW/ASA with Multiple Subnets, Three-tier Architecture Using IGW and Amazon VPC Ingress Routing

This topology expands on the previous​, demonstrating how multiple subnets can be protected by a single firewall. By utilizing the AWS NAT Gateway service, the number of protected subnets behind a single firewall can be scaled significantly beyond what was previously possible.

As with the previous architecture, the ​Cisco Firewall is deployed at the edge in routed mode, forwarding outbound traffic to the IGW. Multiple routes are configured in the IGW’s route table to direct the traffic back to the appropriate subnet while the protected subnets forward their traffic to the internal firewall interface via the NAT gateway.

Cisco Security, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Online Exam

Cisco NGFW/ASA three-tier Architecture with AWS IGW and VPC Ingress Routing

Cisco NGFW/ASA with Multiple Subnets, Three-tier Architecture Using VGW and Amazon VPC Ingress Routing 

Cisco Firewalls can also be deployed in an Amazon VPC to inspect traffic flowing through a VPN tunnel. In this case, the ​Cisco Firewall is deployed at the edge in routed mode, forwarding outbound traffic to the to a VGW. In this example, the local and remote networks are routable; therefore, the NAT gateway can be eliminated, further improving efficiency and reducing cost.

Cisco Security, Cisco Learning, Cisco Tutorial and Material, Cisco Guides, Cisco Online Exam

Cisco NGFW/ASA three-tier Architecture with AWS IGW and VPC Ingress Routing

In Addition to Support for Amazon Ingress Routing, we are adding AWS Security Group management to Cisco Defense Orchestrator (CDO). We are also extending the existing ACI policy-based automation for L4-7 services insertion to the AWS cloud by leveraging Amazon VPC ingress routing. These integrations will make deploying L4-7 services in a hybrid cloud as well as Cisco Security at scale in AWS easier than ever.

Thursday 5 December 2019

Automated Cloud Infrastructure: Extending ACI and AWS integration

It’s the time of the year – AWS re:invent 2019 is happening this week. Cisco and AWS customers deploy workloads and applications in both their own data centers and the AWS cloud today and look forward to even better integration to achieve their infrastructure automation goals while maintaining a consistent operational model.

Cisco and AWS are extending their partnership across multiple domains such as campus, WAN, branch, data center and cloud using a policy based, automated approach. This blog will focus on how customers can leverage the new AWS capabilities and enhancements to build a better Automated Cloud Infrastructure for their data centers.

Our customers started to deploy Application Centric Infrastructure in their own data centers using Nexus 9000 fabrics 5 years ago. Key tenets of the ACI operation model have been:

1. Intent based/ policy driven automation
2. Define policy once – deploy automatically when and where needed
3. Flexible and scalable multi-tenancy
4. Automated service insertion and traffic redirection
5. Open APIs to provide network connectivity between baremetal, hypervisor, container, and cloud environments

AWS announced multiple innovations and enhancements this week:

1. AWS Outposts – provide AWS services on-premises
2. AWS VPC Ingress Routing – Inbound routing control for more efficient service insertion
3. AWS Transit Gateway – Simple and high performance connectivity between AWS VPC’s

These innovation and enhancements map very well to the ACI operational model our customers have deployed today.

ACI extension to AWS Outposts


AWS Outposts are Amazon’s on-premise services for running applications that require the lowest possible latency or that have local data-processing requirements. Earlier this year, we announced availability of Cisco Cloud ACI on AWS for hybrid clouds. Therefore, extending ACI enterprise-grade networking to AWS Outposts becomes very easy. As Figure 1 shows customers can now leverage Cisco Multi-Site Orchestrator to manage ACI fabrics on premises, Cloud ACI instances in the AWS cloud, as well as AWS Outposts instances connected to ACI or NX-OS Nexus fabrics all at the same time.

Key benefits of using ACI with AWS Outposts for our customers are:

• Enterprise-grade network connectivity
• Consistent segmentation (e.g. zones, tenants)
• Automated service insertion and service chaining (more on this below)
• End-to-end visibility and troubleshooting

Data Center, Cisco Study Materials, Cisco Tutorial and Materials, Cisco Online Exam

Figure 1: ACI extension to AWS hybrid cloud and AWS Outposts
A more detailed solution brief discussing how to connect AWS Outposts to existing Cisco Nexus data center fabrics is available here.

ACI integration with AWS VPC Ingress Routing


Amazon VPC Ingress Routing is a service that helps customers simplify the integration of virtual network and security appliances within their AWS VPC network topology. ACI enables customers today to define policies for automated service insertion and chaining. Many customers are using that functionality in their on-premises data centers. With the availability of AWS VPC Ingress Routing they will be able to use the same policy based approach for their AWS network designs as well.

Key benefits of using ACI with AWS VPC Ingress Steering

• Enterprise-grade service chain functionality for hybrid cloud
• Consistent service insertion for cloud native and 3rd party L4-& service appliances in AWS cloud and on-premises
• Automated service insertion and service chaining

Data Center, Cisco Study Materials, Cisco Tutorial and Materials, Cisco Online Exam

Figure 2: ACI Automated Service Insertion in Hybrid Cloud

ACI Integration with AWS Transit Gateway


AWS Transit Gateway provides efficient and high performance interconnect between multiple AWS VPCs. The integration with Cisco ACI will provide customers the ability to maintain and manage their multi-tenant on-prem data center environment while automating connectivity to multiple AWS VPC instances in the cloud connected through AWS TGW.

Data Center, Cisco Study Materials, Cisco Tutorial and Materials, Cisco Online Exam
Figure 3: ACI Integration with AWS Transit Gateway

Key benefits of using ACI with AWS Transit Gateway

• Enterprise grade segmentation and multi-tenancy
• Enable higher inter-VPC throughput provided by AWS TGW
• Secure automated connectivity from on-premises to AWS TG

Cisco ACI and AWS integrations enable customers to also simplify their day2operations by providing a single pane of glass (Multi-Site Orchestrator) for visibility, troubleshooting their network connectivity and segmentation across on-premises and cloud environments.

In addition to enabling the above innovations, we are also helping customers to accelerate their automated cloud infrastructure deployments through a ‘Cisco Cloud ACI’ promotional offer.

Data Center, Cisco Study Materials, Cisco Tutorial and Materials, Cisco Online Exam