11-06-2024 09:34 AM
In our production tenant we have two vrfs;
vrf-1 with multiple related bridge domains associated to L3out-1, which handles intertenant, and WAN traffic..
vrf-2 with one (larger subnet - Advertised Externally) bridge domain; BD-2, associated to L3out-2, which handles traffic between the two vrfs
(A very inefficiënt cumbersome way to get traffic flows through the firewall, which demanded changing server IP addresses.. 🤮)
We now have a PBR/ ServiceGraph configured, which removes need for changing server IP-addresses, potentially gets get rid of this complexity with the unnecessary extra L3out, and enables us to use consistent policies throughout the entire tenant..
Especially if we can get the one large bridge domain into the same vrf.. Then we can be consistent in contract scope as well..
So..
Is there a way to associate the Bridge Domain BD-2 on Vrf-2, to Vrf-1, without much impact?
Can I associate a second L3out; L3out-1, to BD-2, (currently associated to L3out-2), without screwing up my routing?
My hope is that ACI has the intelligence to recognize that the BD/ Subnet is associated to only one of the two Vrfs, and therefore Advertises the route correctly, in the current situation, AND after I change the associated VRF to Vrf-1..
Without causing an outage due to routing loops..
Please assist
Best regards,
Rick Roersma
11-07-2024 03:33 AM
Hello @netwerkbeheer would it be possible for you to draw the logical diagram of your above mentioned setup and share for a better understanding.
11-08-2024 10:06 AM
Hi
I hope this diagram helps.
https://rickroersma.stackstorage.com/s/puSlR8d3natJq5Px
Less complexity;
Currently, one part of EPG to EPG traffic within this tenant, [all BD's in VRF-1 <---> BD-144 in VRF-2] uses only firewall rules, because of the L3out..
Everything within VRF-1 needs contracts with Service Graph for the same FW treatment.
Unfortunately, they placed all EPG's from both VRFs in one big, (horrible...) application profile, so it's not clear what is on one VRF, what is on the other VRF..
Hence, the need for consistency, which prompted this plan of mine..
(Second stage of my project is creating proper Application-Based Application Profiles, and rearranging al servers into these profiles)
In the desired situation, Traffic can still be looped through FW using Service Graph/ Policy Based redirect contracts between the EPG's attached to the different Bridge Domains..
The only thing is that it's our production environment and I prefer to minimize any disruptions.
So if the BD-144 can temporarily associate to both L3Outs, without causing problems, and making the shift from VRF2 to VRF1 (almost) seamless, I will be a very happy camper indeed.
Best regards,
Rick
11-11-2024 03:39 AM
Hey Rick,
Check the below diagram based on your's, and please answer few questions for better clarity:
Current Setup:
Desired Setup:
Questions:
Feel free to specify Tenant, VRF (dummy) names.
Happy configuration!!
11-15-2024 01:31 AM
Hi,
Thanks for the input so far.
I could leave it like this, but as mentioned in my answer to question 1, that would leave me and colleagues with a very confusing situation, causing all kinds of hard to figure out security configuration. All because of an odd-ball set of EPG's living on another vrf.
Best regards,
Rick
11-24-2024 01:50 PM
Hey @netwerkbeheer
with regards to the below:
- It is a single tenant, with all EPG's in both VRF's currently having intertenant / WAN connectivity.
Apologies, I am getting confused with the usage of L3Out inside a single tenant to allow communication between two VRFs.
11-11-2024 10:43 PM
Hey Rick, Based on your inputs, pfb my understanding of your logical diagram (Please validate/correct):
I have couple of questions to you, before penning down the solution:
Please confirm:
Feel free if you would like to share some more details for better understanding and solution sharing.
All the best and Do your best!!
11-17-2024 09:07 PM
Hey @netwerkbeheer , please check my diagram, and give reply to my queries.
Btw, please help me to understand the logic of using L3Out-2 between VRF-1 and VRF-2.
Have a good one!
11-20-2024 03:03 AM
Hi,
It was an ugly and cumbersome way thought up to get some insights into traffic flows within this open, any-any-allow, "spray-and-pray" tenant.
The previous head of IT probably still had the fully managed service graph seared into his conscience from when we were the first in holland to implement ACI, that's why he never allowed implementation of ServiceGraph/ PBR, chosing this cumbersome option instead.
I do understand his disliking for that firewall device-package "interface" with the neverending expanding menu's, but this L3out+VRF_2 idea never really took off, because who likes re-IP-addressing his perfectly working server setup in production? no one..
Best regards,
Rick
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide