Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hello, Currently, I am designing ACI objects for ACI. For AAEP I was following best practice, one AAEP for each tenant with different domains for each tenant. In my network, I have about 10 tenants. Some of the physical interfaces are shared between...
Hello, I was reading about ACI fabric discovery process and want to make clear demarcation between IFM and OpFlex operations.From book i read: "In this discovery process, a fabric node is considered active when the APIC and node can exchange heartbe...
Hello, I have question regarding of MAC address spoofing vulnerability, of already authenticated clients. Lest say in my deployment I have, Cisco ISE and Cisco Cat2960X switches, and clients are authenticated by 802.1X EAP-TLS. And periodic re-authe...
Hello, I am looking for advice regarding ACI implementation in brownfield environment. Existing data center is build around Nexus3k switches, and vPC based fabric. Most of server vlans at layer 3 are terminated of FortiGate firewall. There are arou...