Cisco ACI Network Centric vs Application Centric Deployment Models (2024)

Cisco ACI is designed and deployed with access policies encompassing switch and interface profiles, groups, VLAN pools, physical domains, and configuration constructs like VRFs, BDs, EPGs. The same network environment can be designed and implemented in multiple ways using those constructs. There are two approaches that can be used to design and deploy the Cisco ACI configuration—network and application-centric deployment model. The differences between the deployment models are which, how and where the Cisco ACI constructs are used.

Using a network- or application-centric deployment model is a choice that is made upon designing the Cisco ACI deployment. There is no config option in the APIC with which one or another model is turned on.

The differences between the two models are in which and how config constructs are used to describe the environment, the number of them used, where the default gateway is placed, where and how security policies are implemented, and so on.

The starting point for the Cisco ACI design and deployment is how the application logical topology that is used in the environment is seen and understood.

An application blueprint or logical topology is description of how deployed application should look like. The application logical topology therefore encompasses the following aspects of an application:

  • Application tiers that comprise a particular application
  • Network segments that are used in the logical topology
  • How and where the application tiers and their instances are connected to the network
  • What traffic flows are used between application tiers (that is, how application tiers communicate between themselves)

Cisco ACI Network Centric vs Application Centric Deployment Models (1)

An example shows a layout of an application logical topology for a deployment of a WebSphere Business Process Manager (BPM) application that is used for business process modeling (note that this blueprint is just a subset of the complete logical topology to serve as an example for the Cisco ACI deployment model discussion). Mind that such blueprint is not always available, that is, it may be more or less complete.

The application is composed of four application tiers:

  • Front-end tier is client facing part through which business users access the BPM application.
  • Process Servers tier is the middle tier that is used for application deployment and messaging. The processing in this tier is based on the input from Front-end tier.
  • BPM Managers tier encompasses the management services that are used to monitor, update, scale, and so on other tiers of the application.
  • BPM databases tier is the databases that are used to store all application-related data like information about the architecture of individual business process models, who created that model, what applications the business model requires, monitoring data for the BPM application, and so on.

The instances of application tiers are put in four separate network segments, that is, VLANs and IP subnets.

The traffic flows are defined with arrows indicating client and server part of the communication along with TCP port (for example the Process Servers listen at TCP ports 55025 and 55080).

The blueprint also indicates that the security policy should protect individual tier, allowing only defined communication.

Network-Centric Design

The network-centric design is based on a topology that is seen as number of network segments. All communication is defined based on VLANs, their respective subnets, and traffic flows between these VLANs. The granularity of communication policies is defined with network segments.

The network-centric approach is typically used as a first step in migrating existing network (that is, brownfield environment) to Cisco ACI because the network construct/topology such as flooding domain is the same as what’s already deployed in the existing network.

It includes connecting external switched segments to Cisco ACI fabric, existing firewall and load-balancing appliances, and little or no changes to the network layout.

Cisco ACI Network Centric vs Application Centric Deployment Models (2)

In the network-centric deployment model, the Cisco ACI fabric is deployed as a traditional switching fabric:

  • Individual VLAN (and optionally IP subnet) corresponds to a single BD encompassing single EPG. The endpoints that are part of EPG belong to a single VLAN/IP subnet. This can simply be described as 1 BD = 1 EPG = 1 VLAN.
  • Default gateway for individual IP subnet may be implemented on a routing device external to Cisco ACI fabric (for example, firewall) and not at the BD level.
  • BD may be configured with flooding enabled since existing switched networks are typically connected to Cisco ACI and the default gateway may be implemented there.
  • Layer 4 through Layer 7 services are integrated using bridging (for example, firewall that is implemented in a transparent mode) or routing.
  • Security policies are implemented at Layer 3 boundaries as ACLs that define which VLANs are allowed to communicate.

The implementation of security policies depends on where default gateway is defined:

  • When external device is used for default gateway (such as firewall), the ACLs between VLANs are defined as firewall rules between VLANs attached.
  • When default gateway is defined at the BD, ACI will be routing the traffic and contracts are required to allow the traffic between EPGs. Since 1 BD = 1 EPG = 1 VLAN, the contracts are actually used as ACLs between VLANs even though the filters that are used by contracts are defined only with ports and protocols.

The Cisco ACI deployment that is using a network-centric approach for the previously mentioned BPM application relies on the application blueprint that is presented earlier. Two design options are presented – the differences are in how ACI fabric is used and where security policies are implemented.

The first design option is defined in the following way:

  • Cisco ACI fabric is implemented as a regular Layer 2 switched fabric.
  • There are four separate BDs using arbitrary names incorporating VLAN number (BD 100 – BD 103).
  • All BDs are put into a single VRF.
  • Each BD is configured with a single EPG (EPG 100—EPG 103) also using arbitrary names incorporating VLAN numbers.
  • The default gateway functionality for all segments is implemented on the external central firewall.
  • All routing and security policies between the VLANs 100 to 103 are implemented via external central firewall.

Cisco ACI Network Centric vs Application Centric Deployment Models (4)

The second design is defined with using ACI fabric for all functionality:

  • Cisco ACI fabric is implemented as Layer 3 routed fabric.
  • The same four separate BDs using arbitrary names incorporating VLAN number (BD 100–BD 103) are used.
  • All BDs are put into a single VRF.
  • Each BD is also configured with a single EPG (EPG 100–EPG 103) also using arbitrary names incorporating VLAN numbers.
  • The default gateway functionality for individual segment is implemented at the BD level.
  • Routing between the VLANs 100 to 103 is implemented at ACI fabric.
  • Security policies defining allowed traffic are defined with contracts that are applied to EPGs, which equal to VLANs.

Application-Centric Design

The application-centric design is based on the layout and requirements of applications. The communication is defined by the endpoint EPG membership and relationships between these EPGs. VLANs and IP subnets are not relevant from the perspective of defining these relationships. The granularity of communication policies is defined with the EPGs.

In the application-centric deployment model, all endpoints will typically be connected directly to the Cisco ACI fabric (note that this is recommended and not required). The approach may be used in new data center implementations or as a second step in implementing Cisco ACI when migration of existing environments needs to be done.

Cisco ACI Network Centric vs Application Centric Deployment Models (5)

In the application-centric deployment model, the Cisco ACI fabric is deployed following the application architecture and relationships between application tiers:

  • There will be a single or just few BDs that can be optimized from the forwarding perspective since flooding and extending to the external switched networks is not required.
  • A single BD will be implemented with multiple EPGs.
  • Endpoints will be grouped into EPGs based on their communication requirements (that is, typically the endpoints of particular EPG will belong to the same application tier).
  • An individual subnet may be split into multiple EPGs.
  • Default gateway for individual IP subnet is implemented at the Cisco ACI fabric—single BD will be configured with multiple IP subnets.
  • Security policies are implemented with contracts that are applied to EPGs.

With application-centric mode, the security policies are not limited with VLAN/subnet boundaries as EPGs do not equal IP subnets. The contracts using filters that are based on ports and protocols that are applied to EPGs are used to control the traffic between application tiers regardless of the IP subnet they belong to.

In the application-centric approach, the topology of the previously mentioned BPM application is seen as several application tiers as presented in the application blueprint.

Cisco ACI Network Centric vs Application Centric Deployment Models (6)

The design may be defined in the following way:

  • All endpoints are connected directly to the Cisco ACI fabric.
  • A single BD is defined for the BPM application.
  • Four distinct EPGs are defined individual application tier.

  1. EPG-frontend encompasses all servers that are used by users for accessing the BPM application.
  2. EPG-mngr encompasses all BPM manager servers that are used to monitor and manage BPM application.
  3. EPG-procsrv encompasses all BPM process servers that provide messaging and application deployment services.
  4. EPG-DB encompasses all BPM DB servers that are used to store application data and are accessed by the other application tiers.

  • All four default gateways and IP subnets are defined at the BD-BPM level providing pervasive gateway functionality at the Cisco ACI fabric.
  • Three contracts are defined and applied to allow traffic as defined in the application blueprint:

  1. ctr-front is consumed by EPG-mngr and provided by EPG-frontend to allow BPM manager servers to monitor and manage BPM front-end servers
  2. ctr-psrv is used to allow BPM manager servers and front-end servers to access BPM process servers. It is provided by EPG-procsrv and consumed by both EPG-frontend and EPG-mngr.
  3. ctr-db is used to allow BPM manager, process, and front-end servers to access BPM DB servers. It is provided by EPG-DB and consumed by EPG-frontend, EPG-mngr, and EPG-procsrv.

In Application-Centric design, a single BD can have multiple EPGs. It is recommended to use different VLANs for different EPGs. You could reuse a VLAN ID on a different EPG if it is on a different leaf. You could reuse the same VLAN in different EPGs on the same leaf with a feature called VLAN scope "local" or per Port VLAN, but it must be on different BDs.

Guidance for Application-centric per Port VLAN design:

Cisco ACI Network Centric vs Application Centric Deployment Models (7)

Source: DCACIA Course

Cisco ACI Network Centric vs Application Centric Deployment Models (2024)

FAQs

Cisco ACI Network Centric vs Application Centric Deployment Models? ›

Network Centric approach allows existing network architecture and flows to remain the same, henceforth allowing IT resources enough period to get acclimatized with the new terminologies of ACI fabric. Application Centric approach is comparatively a new approach model where application tiers are defined by EPGs .

What is the difference between ACI app centric and network-centric? ›

Network-centric design simply means having 1 bridge-domain per subnet and strives for 1 EPG per BD, so having many small BDs each mapped to a small subnet. So many BDs. Application-centric design strives for 1 large supernet mapped to 1 BD. So just 1 BD or comparatively very few BDs.

What is network-centric approach in ACI? ›

Network-Centric Approach

The network-centric is the preferred approach for legacy migration scenarios. This could ensure that during applications migration unknown traffic types are not blocked. In the Network-centric approach the EPG mapping will be equivalent to the following: ACI EPG-A mapped to VLAN 10.

What are the two characteristics of network-centric design in Cisco ACI? ›

The network-centric design is based on a topology that is seen as number of network segments. All communication is defined based on VLANs, their respective subnets, and traffic flows between these VLANs. The granularity of communication policies is defined with network segments.

What is Cisco's application centric infrastructure ACI )? ›

Cisco Application Centric Infrastructure (ACI) is a software-defined networking (SDN) solution designed for data centers. Cisco ACI allows network infrastructure to be defined based upon network policies – simplifying, optimizing, and accelerating the application deployment lifecycle.

What is the difference between traditional network and ACI? ›

Key Differences: 1. Centralized Control: Traditional Cisco Architecture relies on individual device configuration, while ACI centralizes control with the APIC, simplifying network management. 2.

What is an example of a network-centric application? ›

Facebook would be a perfect example. Sure it falls under the category of social network as well, but from a tech standpoint it's a very large network-centric application.

What are the three components of ACI architecture? ›

ACI consists of three key components: the Application Policy Infrastructure Controller (APIC), the leaf switches, and the spine switches. The APIC is a centralized controller that manages all aspects of the ACI fabric. The leaf switches are ToR switches that provide connectivity between servers and external networks.

What is network-centric model? ›

The network-centric approach aims to tap into the hidden resources of knowledge workers supported and enabled by ICT, in particular the social technologies associated with Web 2.0 and Enterprise 2.0. Essentially though, a network-centric organization is more about people and culture than technology.

What architectural model is used with Cisco ACI? ›

The Cisco Application Policy Infrastructure Controller (APIC) is the main architectural component of the Cisco ACI solution. It is the unified point of automation and management for the Cisco ACI fabric, policy enforcement, and health monitoring.

Which two are key Cisco ACI features? ›

Key characteristics of ACI include:
  • Simplified automation by an application-driven policy model.
  • Application Velocity. ...
  • Centralized visibility with real-time, application health monitoring.
  • Open software flexibility for DevOps teams and ecosystem partner integration.

What is an application-centric approach? ›

Focusing on the application as the foundation or starting point. In an application-centric system, the program is loaded first, which in turn is used to create or edit a particular data structure (text document, spreadsheet, image, etc.). Contrast with document centric.

What is the difference between Cisco ACI and NSX? ›

ACI: Key Differences. Both Cisco ACI and VMware NSX have similar qualities and features. The main difference is that VMware NSX focuses on virtualized networks, while Cisco ACI can connect to both physical and virtual networks.

What are the benefits of ACI network? ›

By deploying Cisco ACI, organizations can benefit from simplified network management, increased security, automation, scalability, and improved application performance, ultimately driving operational efficiency and innovation in their data centers.

What is the difference between app centric and network centric ACI? ›

While Network Centric mode considers traditional approach of retaining concept of Sub netting and using VLANs and VRFs. In contrast Application Centric approach hides traditional network related terminologies (such as VRFs, VLANs, and subnets).

Is Cisco ACI a SDN? ›

Cisco ACI - software defined networking (SDN) for your data center - Cisco Video Portal.

Does Cisco ACI use Spanning Tree? ›

The main difference between ACI and Legacy switches, is that ACI switches do not run the Spanning-tree Protocol (not 802.1d, not 802.1w, not RPVST+, none of the above).

What is the topology of Cisco ACI? ›

Standard ACI Topology. An ACI fabric forms a Clos-based spine-and-leaf topology and is usually depicted using two rows of switches. Depending on the oversubscription and overall network throughput requirements, the number of spines and leaf switches will be different in each ACI fabric.

What protocol does Cisco ACI use? ›

ACI uses Multi-Protocol BGP (MP-BGP) with VPNv4 in the ACI infra VRF (overlay-1 VRF) to distribute external routes from a border leaf to other leaf switches.

What is the difference between APIC and ACI? ›

APIC is a software control centre to configure and run this infrastructure. Because ACI follows the SDN paradigm of de-coupling control plane functions from forwarding plane, the devices that build the fabric don't have intelligence required to make independent decisions on forwarding the packets.

What is the meaning of network-centric? ›

Meaning of net-centric in English

depending on the internet, for example, to sell products, manage services, or get information: Security within a net-centric environment has its own challenges for the business user. (Definition of net-centric from the Cambridge Business English Dictionary © Cambridge University Press)

What is App Centric? ›

App-centric refers to a view that provides visibility into an application's need in terms of resource requirements. It can be for example memory, CPU or bandwidth. This view is allows to capture the metrics that help ensure applications have the optimal resource level to run seamlessly.

What does ACI network stand for? ›

Cisco ACI - Application Centric Infrastructure - Cisco.

Top Articles
Danny DeVito Says He and Arnold Schwarzenegger Are Making Another Movie Together 35 Years After 'Twins'
Tesla Stock: Capital Structure Analysis
Fernald Gun And Knife Show
Netr Aerial Viewer
Minooka Channahon Patch
Palm Coast Permits Online
Login Page
Combat level
La connexion à Mon Compte
Ventura Craigs List
Slapstick Sound Effect Crossword
Swimgs Yung Wong Travels Sophie Koch Hits 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Springs Cow Dog Pig Hollywood Studios Beach House Flying Fun Hot Air Balloons, Riding Lessons And Bikes Pack Both Up Away The Alpha Baa Baa Twinkle
Garrick Joker'' Hastings Sentenced
Red Heeler Dog Breed Info, Pictures, Facts, Puppy Price & FAQs
Culos Grandes Ricos
Summoners War Update Notes
Amc Flight Schedule
Bank Of America Financial Center Irvington Photos
Acts 16 Nkjv
Espn Horse Racing Results
Understanding Gestalt Principles: Definition and Examples
Apartments / Housing For Rent near Lake Placid, FL - craigslist
Albertville Memorial Funeral Home Obituaries
Mchoul Funeral Home Of Fishkill Inc. Services
Jail Roster Independence Ks
Street Fighter 6 Nexus
Used 2 Seater Go Karts
Boneyard Barbers
How To Make Infinity On Calculator
Whas Golf Card
Newcardapply Com 21961
De beste uitvaartdiensten die goede rituele diensten aanbieden voor de laatste rituelen
Iban's staff
Devin Mansen Obituary
Edict Of Force Poe
Cbs Fantasy Mlb
Sunrise Garden Beach Resort - Select Hurghada günstig buchen | billareisen.at
Riverton Wyoming Craigslist
Lake Andes Buy Sell Trade
Birmingham City Schools Clever Login
5A Division 1 Playoff Bracket
Alpha Labs Male Enhancement – Complete Reviews And Guide
Costco Gas Foster City
Love Words Starting with P (With Definition)
Ehc Workspace Login
Lesly Center Tiraj Rapid
Rocket League Tracker: A useful tool for every player
Who Is Nina Yankovic? Daughter of Musician Weird Al Yankovic
Texas 4A Baseball
Latest Posts
Article information

Author: Chrissy Homenick

Last Updated:

Views: 5984

Rating: 4.3 / 5 (54 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Chrissy Homenick

Birthday: 2001-10-22

Address: 611 Kuhn Oval, Feltonbury, NY 02783-3818

Phone: +96619177651654

Job: Mining Representative

Hobby: amateur radio, Sculling, Knife making, Gardening, Watching movies, Gunsmithing, Video gaming

Introduction: My name is Chrissy Homenick, I am a tender, funny, determined, tender, glorious, fancy, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.