<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ACI Integration in Cloud Networking Platform</title>
    <link>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454565#M12631</link>
    <description>&lt;P&gt;APart from that: I have never heard of an ACI device package for Meraki MX. So I'd guess the answer is "no".&lt;/P&gt;</description>
    <pubDate>Mon, 19 Aug 2019 07:55:57 GMT</pubDate>
    <dc:creator>Christian_Ney</dc:creator>
    <dc:date>2019-08-19T07:55:57Z</dc:date>
    <item>
      <title>Cisco ACI Integration</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454563#M12629</link>
      <description>We're in the midst of migrating from our traditional network to Cisco ACI. We have 2 MX250s configured as a warm-pair. Has anyone had experience connecting their Security Appliances into the Cisco ACI Fabric/Topology? Thank you. Don</description>
      <pubDate>Thu, 15 Aug 2019 18:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454563#M12629</guid>
      <dc:creator>navajocountyIT</dc:creator>
      <dc:date>2019-08-15T18:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI Integration</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454564#M12630</link>
      <description>&lt;P&gt;Hi Don,&lt;/P&gt;&lt;P&gt;Any MX HA pair relies on the &lt;A href="https://documentation.meraki.com/MX/Deployment_Guides/MX_Warm_Spare_-_High_Availability_Pair#VRRP_Heartbeats" target="_self" rel="nofollow noopener noreferrer"&gt;VRRP heartbeat&lt;/A&gt; for successful communication. This is regardless of other technologies in play in the deployment. As long as the MX can send and receive VRRP traffic form the peer it will operate as expected. &lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2019 17:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454564#M12630</guid>
      <dc:creator>TWoz</dc:creator>
      <dc:date>2019-08-16T17:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI Integration</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454565#M12631</link>
      <description>&lt;P&gt;APart from that: I have never heard of an ACI device package for Meraki MX. So I'd guess the answer is "no".&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2019 07:55:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454565#M12631</guid>
      <dc:creator>Christian_Ney</dc:creator>
      <dc:date>2019-08-19T07:55:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI Integration</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454566#M12632</link>
      <description>&lt;P&gt;That seems like a bit of a misstep by Cisco since they own both technologies. You'd think that they'd want to create an ACI Device Package for integrating their own L4-L7 Service Appliances.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 22:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454566#M12632</guid>
      <dc:creator>navajocountyIT</dc:creator>
      <dc:date>2019-08-22T22:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI Integration</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454567#M12633</link>
      <description>&lt;P&gt;You don't need a device package and this should work fine...device package is certainly nice but can introduce some complexity as well depending on your use case.  If you are generally static without a ton of change (spinning workloads up and down etc.) then you can just use it as you would any other firewall and leverage policy in the ACI fabric to direct traffic to it.  Here's a good example of how:&lt;A href="https://community.cisco.com/t5/data-center-documents/aci-unmanaged-mode-configuration-example-using-asav-in-routed/ta-p/3313318" target="_blank" rel="nofollow noopener noreferrer"&gt;https://community.cisco.com/t5/data-center-documents/aci-unmanaged-mode-configuration-example-using-asav-in-routed/ta-p/3313318&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2019 23:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454567#M12633</guid>
      <dc:creator>timander</dc:creator>
      <dc:date>2019-08-22T23:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI Integration</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454568#M12634</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/28309"&gt;@timander&lt;/A&gt; wrote:&lt;BR /&gt;&lt;P&gt;You don't need a device package and this should work fine...device package is certainly nice but can introduce some complexity as well depending on your use case.  If you are generally static without a ton of change (spinning workloads up and down etc.) then you can just use it as you would any other firewall and leverage policy in the ACI fabric to direct traffic to it.  Here's a good example of how:&lt;A href="https://community.cisco.com/t5/data-center-documents/aci-unmanaged-mode-configuration-example-using-asav-in-routed/ta-p/3313318" target="_blank" rel="noopener nofollow noreferrer"&gt;https://community.cisco.com/t5/&lt;/A&gt;&lt;A href="https://scdownloader.io" target="_blank" rel="nofollow noopener noreferrer"&gt;soundcloud downloader&lt;/A&gt;&lt;A href="https://community.cisco.com/t5/data-center-documents/aci-unmanaged-mode-configuration-example-using-asav-in-routed/ta-p/3313318" target="_blank" rel="noopener nofollow noreferrer"&gt; data-center-documents/aci-unmanaged-mode-configuration-example-using-asav-in-routed/ta-p/3313318&lt;/A&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Thanks for the thorough explanations, I appreciate it.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 02:28:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454568#M12634</guid>
      <dc:creator>leorobbins</dc:creator>
      <dc:date>2019-09-06T02:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ACI Integration</title>
      <link>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454569#M12635</link>
      <description>After further discovery, The L4-L7 integration in ACI functions much like many 'API type' GUI interface for firewall management. A familiar example for everyone would be ASDM in ASA management. However, the ACI integration is not as effective as using ASDM, which lacks even some control only available via CLI.&lt;BR /&gt;Short story, the package does not exist because it is unnecessary and would be less effective than the existing Cloud Management or API Dashboard that is already available.&lt;BR /&gt;&lt;BR /&gt;Hopefully this saves someone else the time it took to understand the relationship. Thanks to all with their insights!&lt;BR /&gt;&lt;BR /&gt;Don</description>
      <pubDate>Mon, 10 Feb 2020 18:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-networking-platform/cisco-aci-integration/m-p/5454569#M12635</guid>
      <dc:creator>navajocountyIT</dc:creator>
      <dc:date>2020-02-10T18:46:36Z</dc:date>
    </item>
  </channel>
</rss>

