Cisco Cloud Network Controller For AWS User Guide, Release 25.1 (X)
Cisco Cloud Network Controller For AWS User Guide, Release 25.1 (X)
1(x)
First Published: 2021-09-20
Last Modified: 2022-08-15
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© Cisco Systems, Inc. All rights reserved.
Trademarks
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS REFERENCED IN THIS
DOCUMENTATION ARE SUBJECT TO CHANGE WITHOUT NOTICE. EXCEPT AS MAY OTHERWISE
BE AGREED BY CISCO IN WRITING, ALL STATEMENTS, INFORMATION, AND
RECOMMENDATIONS IN THIS DOCUMENTATION ARE PRESENTED WITHOUT WARRANTY OF
ANY KIND, EXPRESS OR IMPLIED.
The Cisco End User License Agreement and any supplemental license terms govern your use of any Cisco
software, including this product documentation, and are located at:
http://www.cisco.com/go/softwareterms.Cisco product warranty information is available at
http://www.cisco.com/go/warranty. US Federal Communications Commission Notices are found here
http://www.cisco.com/c/en/us/products/us-fcc-notice.html.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL,
CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST
PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE
THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES.
Any products and features described herein as in development or available at a future date remain in varying
stages of development and will be offered on a when-and if-available basis. Any such product or feature
roadmaps are subject to change at the sole discretion of Cisco and Cisco will have no liability for delay in the
delivery or failure to deliver any products or feature roadmap items that may be set forth in this document.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual
addresses and phone numbers. Any examples, command display output, network topology diagrams, and
other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses
or phone numbers in illustrative content is unintentional and coincidental.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation
set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial
identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be
present in the documentation due to language that is hardcoded in the user interfaces of the product software,
language used based on RFP documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and
other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com go trademarks. Third-party
trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1721R)
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
iii
Trademarks
Trademarks
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
iv
CONTENTS
Overview 3
External Network Connectivity 4
Understanding Supported Routing and Security Policies 5
Routing and Security Policies: Releases Prior to 25.0(1) 5
Routing and Security Policies: Release 25.0(1) 5
Routing Policies: Release 25.0(2) 7
Source Interface Selection for Tunnels 9
General Guidelines and Limitations for Cisco Cloud Network Controller 9
About the Cisco Cloud Network Controller GUI 12
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
v
Contents
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
vi
Contents
Specifying Consumer and Provider EPGs Using the Cisco Cloud Network Controller 74
Creating a Filter Using the Cisco Cloud Network Controller GUI 75
Creating a Cloud Context Profile Using the Cisco Cloud Network Controller GUI 77
Configuring Instances in AWS 78
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI 80
Creating a Tech Support Policy Using the Cisco Cloud Network Controller GUI 84
Creating a Trigger Scheduler Using the Cisco Cloud Network Controller GUI 85
Creating a Remote Location Using the Cisco Cloud Network Controller GUI 87
Creating a Login Domain Using the Cisco Cloud Network Controller GUI 88
Creating a Provider Using the Cisco Cloud Network Controller GUI 91
Creating a Security Domain Using the Cisco Cloud Network Controller GUI 95
Creating a Role Using the Cisco Cloud Network Controller GUI 96
Creating an RBAC Rule Using the Cisco Cloud Network Controller GUI 101
Creating a Certificate Authority Using the Cisco Cloud Network Controller GUI 102
Creating a Key Ring Using the Cisco Cloud Network Controller GUI 103
Creating a Local User Using the Cisco Cloud Network Controller GUI 105
Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud Network Controller
GUI 107
Configuring Cisco Cloud Network Controller Using the REST API 109
Creating a Tenant Using the REST API 109
Creating a Contract Using the REST API 110
Creating a Cloud Context Profile Using the REST API 110
Managing a Cloud Region Using the REST API 111
Creating a Filter Using the REST API 112
Creating an Application Profile Using the REST API 113
Creating a Cloud EPG Using the REST API 113
Creating an External Cloud EPG Using the REST API 114
Creating a Cloud Template Using the REST API 115
Configuring VRF Leak Routes Using the REST API 117
Configuring the Source Interface Selection for Tunnels Using the REST API 118
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
vii
Contents
Overview 131
About Application Load Balancers 131
Dynamic Server Attachment to Server Pool 133
About Service Graphs 134
About Function Nodes 135
About Terminal Nodes 135
Deploying a Service Graph 135
Deploying the Service Graph Using the Cisco Cloud Network Controller GUI 135
Creating a Load Balancer Using the Cisco Cloud Network Controller GUI 135
Creating a Service Graph Template Using the Cisco Cloud Network Controller GUI 137
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI 138
Deploying a Service Graph Using the REST API 143
Creating an Internal-Facing Load Balancer Using the REST API 143
Configuring an Internet-Facing Load Balancer Using the REST API 143
Creating a Service Graph Using the REST API 144
Attaching a Service Graph Using the REST API 144
Configuring an HTTP Service Policy Using the REST API 145
Configuring a Key Ring Using the REST API 145
Creating an HTTPS Service Policy Using the REST API 147
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
viii
Contents
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
ix
Contents
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
x
CHAPTER 1
New and Changed Information
• New and Changed Information, on page 1
Table 1: New Features and Changed Behavior in Cisco Cloud Network Controller for Release 25.1(1)
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
1
New and Changed Information
New and Changed Information
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
2
CHAPTER 2
About Cisco Cloud Network Controller
• Overview, on page 3
• External Network Connectivity, on page 4
• Understanding Supported Routing and Security Policies, on page 5
• Source Interface Selection for Tunnels, on page 9
• General Guidelines and Limitations for Cisco Cloud Network Controller, on page 9
• About the Cisco Cloud Network Controller GUI, on page 12
Overview
Cisco Cloud Network Controller is a software deployment of Cisco APIC that you deploy on a cloud-based
virtual machine (VM). Amazon Web Services (AWS), Azure, and Google Cloud are the cloud providers
supported with the Cisco Cloud Network Controller.
When deployed, the Cisco Cloud Network Controller:
• Provides an interface that is similar to the existing Cisco APIC to interact with the AWS public cloud
• Automates the deployment and configuration of cloud constructs
• Configures the cloud router control plane
• Configures the data path between the on-premises Cisco ACI fabric and the cloud site
• Translates Cisco ACI policies to cloud native construct
• Discovers endpoints
• Provides a consistent policy, security, and analytics for workloads deployed either on or across on-premises
data centers and the public cloud
• Provides an automated connection between on-premises data centers and the public cloud with easy
provisioning and monitoring
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
3
About Cisco Cloud Network Controller
External Network Connectivity
• Policies are pushed by Cisco Nexus Dashboard Orchestrator to the on-premises and cloud sites, and
Cisco Cloud Network Controller translates the policies to the cloud to keep the policies consistent with
the on-premises site
For more information about extending Cisco ACI to the public cloud, see the Cisco Cloud Network Controller
Installation Guide.
When the Cisco Cloud Network Controller is up and running, you can begin adding and configuring Cisco
Cloud Network Controller components. This document describes the Cisco Cloud Network Controller policy
model and explains how to manage (add, configure, view, and delete) the Cisco Cloud Network Controller
components using the GUI and the REST API.
External VRF
An external VRF is a unique VRF that does not have any presence in the cloud but is associated with one or
more external networks. As opposed to an internal VRF, which is a VRF that is used to host the VPCs and is
associated with a cloud context profile, an external VRF is not referred to in any cloud context profile used
by Cisco Cloud Network Controller.
An external VRF represents an external network that is connected to other cloud sites or to on-premises branch
offices. Multiple cloud VRFs can leak routes to an external VRF or can get the routes from an external VRF.
When an external network is created on an external VRF, inter-VRF routing is set up so that routes received
and advertised on the external network are received or advertised on the external VRF.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
4
About Cisco Cloud Network Controller
Understanding Supported Routing and Security Policies
In other words, contracts inherently serve the dual purpose of configuring both security policies and routing
policies. This means that tearing down contracts not only tears down the security policies that govern which
traffic to allow and which to deny, it also tears down any policies used to route that traffic. Prior to release
25.0(1), there is no way to configure routing policies without also configuring security policies, and vice
versa.
Note The routing and security policies described in this section are specifically for the 25.0(1) release and
apply only between internal and external VRFs. For changes in the routing and security policies in the
25.0(2) release, see Routing Policies: Release 25.0(2), on page 7.
The procedures for configuring the routing and security policies are here:
• Routing policy: You will use the inter-VRF routing feature introduced in release 25.0(1) to configure
the routing policy separately. See Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network
Controller GUI, on page 58 for those procedures.
• Security policy: After you have configured the routing policy, you will continue to use contracts as you
did previously to configure the security policy separately:
• First create an external EPG. See Creating an EPG Using the Cisco Cloud Network Controller GUI,
on page 67 for those procedures.
• Then create a contract between the external EPG and the cloud EPG. See Creating a Contract Using
the Cisco Cloud Network Controller GUI, on page 72 for those procedures.
Using inter-VRF routing, you can configure an independent routing policy to specify which routes to leak
between a pair of internal and external VRFs when you are setting up routing between a cloud site and a
non-ACI site.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
5
About Cisco Cloud Network Controller
Routing and Security Policies: Release 25.0(1)
The following figure shows an example topology of this sort of configuration. This example topology shows
how you can connect to a remote endpoint (vpn-1) behind an external device (Ext-1) which might be located
in an non-ACI site. This non-ACI site could be a branch office, co-located or cloud site, or anywhere in the
internet that has the capability of BGP IPv4 and IPSec.
In this example, the infra:Ext-V1 is the external VRF on the CCRs in the infra VPC, with BGP IPv4 sessions
over IPSec tunnels to the remote devices. The remote endpoint routes are received over these sessions in the
infra:Ext-V1 VRF, which are then leaked into the internal VRFs displayed on the right side of the graphic
(for example, the T1:VRF10 in VPC10). The reverse leaking routes are also configured.
Route leaking occurs between internal and external VRFs using route maps. Cisco Cloud Network Controller
supports using route maps to configure routing policies independent of security policies only from internal
VRFs to external VRFs, and from external VRF to internal VRFs. You will continue to use contracts when
configuring routing between a pair of internal VRFs, so routing and security policies are tied together in the
configuration process when routing between internal VRFs.
The following list provides more information on situations when you can use route maps to configure routing
policies independent of security policies, and when you have to use contracts where the routing and security
policies are tied together.
• Routing situations that use contracts-based routing:
• Intra-site routing (within and across regions)
• Inter-site routing (cloud-to-ACI on-premises using EVPN)
• Cloud-to-cloud routing
• Route leaking between internal VRFs
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
6
About Cisco Cloud Network Controller
Routing Policies: Release 25.0(2)
Guidelines and Restrictions for Security and Routing Policies in Release 25.0(1)
The following guidelines apply when using inter-VRF routing to leak routes between a pair of VRFs using
route maps:
• Routes are always leaked bi-directionally between an internal VRF and the external VRF.
For example, assume there is a user tenant (t1) with an internal VRF (V1) and external VRF (Ext-V1).
The route leak must be configured for both of these VRFs bi-directionally.
• You cannot configure "smaller" prefixes to be leaked while a "larger" prefix is already being leaked. For
example, configuring the 10.10.10.0/24 prefix will be rejected if you already have the 10.10.0.0/16 prefix
configured to be leaked. Similarly, if you configure the 0.0.0.0/0 (leak all) prefix, no other prefix will
be allowed to be configured.
• Contracts are not allowed between cloud external EPGs (cloudExtEpgs).
• An external VRF cannot be used for creating cloud EPGs.
• An external VRF always belongs to the infra tenant.
• Leak routing is not supported between external VRFs.
Note The routing and security policies described in this section are specifically for the 25.0(2) release. For
changes in the routing and security policies in the previous release, see Routing and Security Policies:
Release 25.0(1), on page 5.
For release 25.0(2), the routing and security policies continue to be split as described in Routing and Security
Policies: Release 25.0(1), on page 5, but with these additional changes specifically for the routing policies:
• Route Leaking Between Internal VRFs, on page 7
• Global Inter-VRF Route Leak Policy, on page 8
• Guidelines and Limitations, on page 9
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
7
About Cisco Cloud Network Controller
Routing Policies: Release 25.0(2)
The internal VRF route leak policy is a global policy that is configured in the First Time Setup screen under
the infra tenant, where a Boolean flag is used to indicate whether contracts can drive routes in the absence of
route maps:
• Off: Default setting. Routes are not leaked based on contracts, and are leaked based on route maps instead.
• On: Routes are leaked based on contracts in the absence of route maps. When enabled, contracts drive
routing when route maps are not configured. When route maps exist, route maps always drives routing.
You can toggle this Boolen flag back and forth. Following are the general recommended steps for toggling
this global VRF route leak policy, with more detailed instructions provided in Configuring Leak Routes for
Internal VRFs Using the Cisco Cloud Network Controller GUI, on page 61.
• You should enable contract-based routing in Cisco Cloud Network Controller for multi-cloud and
hybrid-cloud deployments with EVPN.
• For multi-cloud and hybrid-cloud deployments without EVPN, routing is driven through route maps only
and not through contracts.
• If you want to disable contract-based routing by toggling from contract-based routing to route map-based
routing (toggling to the Off setting), this action can be disruptive if route map-based routing is not
configured before you've toggled this setting to Off.
You should make the following configuration changes before toggling to route map-based routing:
1. Enable route map-based route leaking between all pairs of VRFs that have existing contracts.
2. Disable contract-based routing policy in the global policy.
At that point, you can change the routing policy to route map-based routing, and you can then change
the routing to reflect any granularity that is required with the new route map-based routing.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
8
About Cisco Cloud Network Controller
Source Interface Selection for Tunnels
• If you want to enable contract-based routing by toggling from route map-based routing to contract-based
routing (toggling to the On setting), you do not have to make any configuration changes before toggling
to contract-based routing. That's because this setting is an additive operation. In other words, both
contract-based and route map-based routing can be enabled between a pair of VRFs. Route maps take
precedence over contracts when enabling routing. With route map-based routing enabled, adding
contract-based routing should be non-disruptive.
The following example shows a situation where only interface 3 is used as the originating interface:
The following example shows a situation where both interfaces 2 and 3 are used as the originating interfaces:
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
9
About Cisco Cloud Network Controller
General Guidelines and Limitations for Cisco Cloud Network Controller
• VRF-1 is stretched across different sites (Azure and AWS). In the AWS site, VRF-1 is in VRF
group 1.
• VRF-2 is present in a different VRF group (VRF group 2).
In this scenario, traffic from VRF-2 to VRF-1 across sites is not supported, since the contracts between
the VRFs will be implicitly allowing traffic between different VRF groups as well. Traffic across different
VRF groups (hub networks) is not supported.
• You cannot stretch more than one VRF between on-prem and the cloud while using inter-VRF route
leaking in the CCRs (cloud routers). For example, in a situation where VRF1 with EPG1 is stretched and
VRF2 with EPG2 is also stretched, EPG1 cannot have a contract with EPG2. However, you can have
multiple VRFs in the cloud, sharing one or more contracts with one on-premises VRF.
• Set the BD subnet for on-premises sites as advertised externally to advertise to the CSR1kv on the cloud.
• The default AWS security group (SG) rules limit only permits 2 CCRs per region and only 2 regions can
deploy CCRs (a total maximum of 4 CCRs). To deploy more CCRs, increase the AWS SG rule limit to
120 or more. We recommend increasing the rule limit to 500.
• When configuring an object for a tenant, first check for any stale cloud resources in AWS. A stale
configuration might be present if it was not cleaned properly from the previous Cisco Cloud Network
Controller instances that managed the account.
Note It takes some time for Cisco Cloud Network Controller to detect the stale
cloud resources after adding the tenant account ID.
Note To disable the automatic cleanup, follow steps 1 - 4 and click the
Automatically Clean Up Stale Cloud Objects check box to remove the
check mark.
• Cisco Cloud Network Controller tries to manage the AWS resources that it created. It does not attempt
to manage resources created by other applications, other than listing existing resources as inventory. At
the same time, it is also expected that AWS IAM users in the AWS infra tenant account, and the other
tenant accounts, do not disturb the resources that Cisco Cloud Network Controller creates. For this
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
10
About Cisco Cloud Network Controller
General Guidelines and Limitations for Cisco Cloud Network Controller
purpose, all resources Cisco Cloud Network Controller creates on AWS has at least one of these two
tags:
• AciDnTag
• AciOwnerTag
Cisco Cloud Network Controller must prevent AWS IAM users who have access to create, delete, or
update EC2, or any other resources, from accessing or modifying the resources that Cisco Cloud Network
Controller created and manages. Such restrictions should apply on both the infra tenant and other user
tenant accounts. AWS account administrators should utilize the above two tags to prevent their
unintentional access and modifications. For example, you can have an access policy like the following
to prevent access to resources managed by Cisco Cloud Network Controller:
{
"Effect": "Deny",
"Action": [
"ec2:*"
],
"Resource": "*",
"Condition": {
"StringLike": {"ec2:ResourceTag/AciDnTag": "*"}
}
}
• The external subnet that is marked in the on-premises external EPG should have been learned through
the routing protocol in the L3Out or created as a static route.
• When mapping availability zones, choose only a or b in Cisco Cloud Network Controller. Internally, the
zone-mapping function maps this to actual availability zones in AWS.
Note The mapping works in alphabetical order. The availability zones are sorted
alphabetically and then the function picks the first two and associates them
to a zone a and b in Cisco Cloud Network Controller.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
11
About Cisco Cloud Network Controller
About the Cisco Cloud Network Controller GUI
• Configuring ASN 64512 for cloud routers causes BGP sessions to not work between cloud routers and
AWS virtual private gateways.
• For the total supported scale, see the following Scale Supported table:
Note With the scale that is specified in the Scale Supported table:
• You can have only 4 total managed regions.
• You can have only CCRs in 2 regions, 2 * 2 CCRs. This is irrespective
of AWS SG rule limit.
Tenants 20
Applications 500
EPGs 500
VRFs 20
Contracts 1000
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
12
About Cisco Cloud Network Controller
About the Cisco Cloud Network Controller GUI
a search box and a drop-down list. When you click the drop-down list and choose Application Management,
a list of options, including the Tenant option, appears. When you click the Tenant option, the Create Tenant
dialog appears displaying a group of fields that are required for creating the tenant.
For more information about configuring Cisco Cloud Network Controller components, see Configuring Cisco
Cloud Network Controller Components, on page 41
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
13
About Cisco Cloud Network Controller
About the Cisco Cloud Network Controller GUI
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
14
CHAPTER 3
Cisco Cloud Network Controller Policy Model
• About the ACI Policy Model, on page 15
• Policy Model Key Characteristics, on page 15
• Logical Constructs, on page 16
• The Cisco ACI Policy Management Information Model, on page 17
• Tenants, on page 19
• Cloud Context Profile, on page 20
• VRFs, on page 29
• Cloud Application Profiles, on page 30
• Cloud Endpoint Groups, on page 30
• Contracts, on page 32
• About the Cloud Template, on page 34
• Managed Object Relations and Policy Resolution, on page 37
• Default Policies, on page 38
• Shared Services, on page 39
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
15
Cisco Cloud Network Controller Policy Model
Logical Constructs
out against concrete entities. Concrete entities are configured implicitly as a side effect of the changes
to the Cisco Cloud policy model.
• The system prohibits communications with newly connected endpoints until the policy model is updated
to include the new endpoint.
• Network administrators do not configure logical system resources directly. Instead, they define logical
(hardware-independent) configurations and the Cisco Cloud Network Controller policies that control
different aspects of the system behavior.
Managed object manipulation in the model relieves engineers from the task of administering isolated, individual
component configurations. These characteristics enable automation and flexible workload provisioning that
can locate any workload anywhere in the infrastructure. Network-attached services can be easily deployed,
and the Cisco Cloud Network Controller provides an automation framework to manage the lifecycle of those
network-attached services.
Logical Constructs
The policy model manages the entire cloud infrastructure, including the infrastructure, authentication, security,
services, applications, cloud infrastructure, and diagnostics. Logical constructs in the policy model define
how the cloud infrastructure meets the needs of any of the functions of the cloud infrastructure. The following
figure provides an overview of the ACI policy model logical constructs.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
16
Cisco Cloud Network Controller Policy Model
The Cisco ACI Policy Management Information Model
cloud infrastructure-wide or tenant administrators create predefined policies that contain application or shared
resource requirements. These policies automate the provisioning of applications, network-attached services,
security policies, and tenant subnets, which puts administrators in the position of approaching the resource
pool in terms of applications rather than infrastructure building blocks. The application needs to drive the
networking behavior, not the other way around.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
17
Cisco Cloud Network Controller Policy Model
The Cisco ACI Policy Management Information Model
The hierarchical structure starts with the policy universe at the top (Root) and contains parent and child nodes.
Each node in the tree is an MO and each object in the cloud infrastructure has a unique distinguished name
(DN) that describes the object and locates its place in the tree.
The following managed objects contain the policies that govern the operation of the system:
• A tenant is a container for policies that enable an administrator to exercise role-based access control.
The system provides the following four kinds of tenants:
• The administrator defines user tenants according to the needs of users. They contain policies that
govern the operation of resources such as applications, databases, web servers, network-attached
storage, virtual machines, and so on.
• Although the system provides the common tenant, it can be configured by the cloud infrastructure
administrator. It contains policies that govern the operation of resources accessible to all tenants,
such as firewalls, load balancers, Layer 4 to Layer 7 services, intrusion detection appliances, and
so on.
Note The Cisco Cloud Network Controller only supports load balancers as a
Layer 4 to Layer 7 service.
• The infrastructure tenant is provided by the system but can be configured by the cloud infrastructure
administrator. It contains policies that govern the operation of infrastructure resources. It also enables
a cloud infrastructure provider to selectively deploy resources to one or more user tenants.
Infrastructure tenant policies are configurable by the cloud infrastructure administrator.
• The cloud infra policies enable you to manage on-premises and inter-region connectivity when setting
up the Cisco Cloud Network Controller. For more information, see the Cisco Cloud Network Controller
Installation Guide.
• Cloud inventory is a service that enables you to view different aspects of the system using the GUI. For
example, you can view the regions that are deployed from the aspect of an application or the applications
that are deployed from the aspect of a region. You can use this information for cloud resource planning
and troubleshooting.
• Layer 4 to Layer 7 service integration lifecycle automation framework enables the system to dynamically
respond when a service comes online or goes offline. For more information, see Deploying Layer 4 to
Layer 7 Services, on page 131
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
18
Cisco Cloud Network Controller Policy Model
Tenants
• Access, authentication, and accounting (AAA) policies govern user privileges, roles, and security domains
of the Cisco Cloud Network Controller cloud infrastructure. For more information, see Cisco Cloud
Network Controller Security, on page 159
The hierarchical policy model fits well with the REST API interface. When invoked, the API reads from or
writes to objects in the MIT. URLs map directly into distinguished names that identify objects in the MIT.
Any data in the MIT can be described as a self-contained structured tree text document encoded in XML or
JSON.
Tenants
A tenant (fvTenant) is a logical container for application policies that enable an administrator to exercise
domain-based access control. A tenant represents a unit of isolation from a policy perspective, but it does not
represent a private network. Tenants can represent a customer in a service provider setting, an organization
or domain in an enterprise setting, or just a convenient grouping of policies. The following figure provides
an overview of the tenant portion of the management information tree (MIT).
Figure 3: Tenants
Tenants can be isolated from one another or can share resources. The primary elements that the tenant contains
are filters, contracts, Virtual Routing and Forwarding (VRF) instances, cloud context profiles, AWS provider
configurations, and cloud application profiles that contain cloud endpoint groups (cloud EPGs). Entities in
the tenant inherit its policies. VRFs are also known as contexts; each VRF can be associated with multiple
cloud context profiles. A cloud context profile in conjunction with a VRF and a region represents the AWS
VPC in that region.
Tenants are logical containers for application policies. The cloud infrastructure can contain multiple tenants.
You must configure a tenant before you can deploy any Layer 4 to Layer 7 services. The ACI cloud
infrastructure supports IPv4 and dual-stack configurations for tenant networking.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
19
Cisco Cloud Network Controller Policy Model
Cloud Context Profile
The following sections provide additional information on some of the components that are part of the cloud
context profile.
CCR
The CCR is a virtual router that delivers comprehensive WAN gateway and network services into virtual and
cloud environments. The CCR enables enterprises to extend their WANs into provider-hosted clouds. Two
CCRs are required for Cisco Cloud Network Controller solution.
The Cisco Catalyst 8000V is used with the Cisco Cloud Network Controller. For more information on this
type of CCR, see the Cisco Catalyst 8000V Edge software documentation.
Licensing
The Cisco Catalyst 8000V on Cisco Cloud Network Controller supports the following licensing models:
1. Bring Your Own License (BYOL) Licensing Model
2. Pay As You Go (PAYG) Licensing Model
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
20
Cisco Cloud Network Controller Policy Model
About the Cisco Catalyst 8000V
Cisco Cloud Network Controller makes use of the “Cisco DNA Advantage” subscription. For features supported
by the “Cisco DNA Advantage” subscription, see Cisco DNA Software SD-WAN and Routing Matrices.
PAYG Licensing Model
Beginning with the 25.0(4) release, Cisco Cloud Network Controller supports Pay-As-You-Go (PAYG)
Licensing Model on Cisco Catalyst 8000V which allows users to deploy a Catalyst 8000V instance in the
cloud based on the VM size and purchase the usage on an hourly basis.
As you completely depend on the VM size to get the throughput, the PAYG licensing model can be enabled
only by first un-deploying the current Cisco Catalyst 8000V and then re-deploying it using the First Time Set
Up with the new VM size. For more information, see the chapter "Configuring Cisco Cloud Network Controller
Using the Setup Wizard" in the Cisco Cloud Network Controller for AWS Installation Guide
Note The procedure for switching between licenses can also be used if you would like to switch between the
two licensing types available.
Note There are two PAYG options for consuming licenses in the AWS marketplace: Catalyst 8000V Cisco
DNA Essentials and Catalyst 8000V Cisco DNA Advantage . Cisco Cloud Network Controller will
make use of Catalyst 8000V Cisco DNA Advantage. For features supported by the “Cisco DNA
Advantage” subscription, see Cisco DNA Software SD-WAN and Routing Matrices
Throughput
The Cisco Catalyst 8000V on Cisco Cloud Network Controller supports the following licensing models:
1. Bring Your Own License (BYOL) Licensing Model
2. Pay As You Go (PAYG) Licensing Model
Tier2 (T2) is the default throughput supported by Cisco Cloud Network Controller.
2. Pay-As-You-Go Licensing Model
For this model, Cisco Cloud Network Controller supports a range of AWS EC2 instances for cloud networking
needs powered by Cisco’s Catalyst 8000V virtual router.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
21
Cisco Cloud Network Controller Policy Model
Private IP Address Support for Cisco Cloud Network Controller and CCR in AWS
The table below shows the cloud instance type supported by Cisco Cloud Network Controller on AWS. -
Private IP Address Support for Cisco Cloud Network Controller and CCR in AWS
By default, CCR interfaces are assigned private IP addresses only and assignment of public IP addresses to
CCR interfaces is optional. Private IP addresses are always assigned to all the interfaces of a CCR. The private
IP address of GigabitEthernet1 of a CCR is used as BGP and OSPF router IDs.
To enable CCR private IP addresses for inter-site connectivity, where you are disabling public IP addresses
for the CCR interfaces, see the Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud
Network Controller GUI, on page 107 procedure.
By default, a private IP address is assigned to the management interface of the Cisco Cloud Network Controller
and assigning a public IP address is optional. To disable public IP to the Cisco Cloud Network Controller so
that a private IP address is used for connectivity, see the Deploying the Cisco Cloud Network Controller in
AWS procedure in the Cisco Cloud Network Controller for AWS Installation Guide.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
22
Cisco Cloud Network Controller Policy Model
Communicating to External Sites From Regions Without a CCR
The following figure shows an example scenario where traffic is rerouted automatically when the system
recognizes that external traffic is egressing from a region without a CCR.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
23
Cisco Cloud Network Controller Policy Model
Communicating to External Sites From Regions Without a CCR
The following occurs when the Cisco Cloud Network Controller recognizes that Region 2 does not have a
CCR, but traffic is egressing out to an external site (shown with the green arrow and circles):
1. Traffic flow begins egressing out from the CIDR in App-1 in Region 2 to a remote site. Note that the
endpoint is configured with the appropriate outbound rule to allow the remote site CIDR.
2. The VPC 2 egress route table has the remote site CIDR, which then has the AWS Transit Gateway as the
next hop. The AWS Transit Gateway information is programmed automatically based on the configured
contracts.
3. A 0.0.0.0/0 route is inserted in the AWS Transit Gateway route table, which essentially tells the system
to take the AWS Transit Gateway peering attachment if traffic is egressing out to an external site but there
is no CCR in this region. In this situation, the AWS Transit Gateway peering attachment goes to another
region that does have a CCR (Region 1 in the example scenario). The region with a CCR that will be used
is chosen based on geographical proximity to the region that does not have a CCR.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
24
Cisco Cloud Network Controller Policy Model
Communicating to External Sites From Regions Without a CCR
4. The packet is first forwarded to the infra VPC in the region with the CCR (Region 1), and is then forwarded
to the gigabit ethernet network interface on the CCR that is associated with the appropriate VRF group.
5. The gigabit 2 inbound security group on the CCR in Region 1 is configured to allow traffic from the
remote region VPC.
The following figure shows an example scenario where traffic is rerouted automatically when the system
recognizes that external traffic is ingressing to a region without a CCR.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
25
Cisco Cloud Network Controller Policy Model
Communicating to External Sites From Regions Without a CCR
The following occurs when the Cisco Cloud Network Controller recognizes that Region 2 does not have a
CCR, but traffic is ingressing in from an external site to a CIDR in App-1 in Region 2 (shown with the blue
arrow and circles):
1. Normally, the CCR in Region 1 would only advertise the CIDRs that are local to that region. However,
with this enhancement that is part of release 5.2(1), all CCRs in all regions now advertise CIDRs from
all remote regions. Therefore, in this example, the CCR in Region 1 will also advertise the CIDRs that
are in Region 2 (assuming AWS Transit Gateway peering is configured between both regions and the
contracts are configured correctly). In this situation, the traffic ingresses in from an external site to the
CCR in Region 1, where the CCR in Region 1 advertises the static route for the remote region VPC CIDRs.
2. The infra route table (the AWS Transit Gateway route table in Region 1) has the next hop to the AWS
Transit Gateway peering attachment to Region 2.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
26
Cisco Cloud Network Controller Policy Model
Support for ECMP Forwarding from Remote Sites for CCRs
• Both steps (steps 1 and 2) in the ingress example shown above are new and unique to this feature in
release 5.2(1).
• Step 1 in the ingress example shows configurations programmed on the CCR.
• Step 2 in the ingress example occurs on the AWS cloud.
Availability Zones
Two types of availability zones are supported for Cisco Cloud Network Controller:
• Virtual availability zones: Cisco Cloud Network Controller supports only two virtual availability zones
per region in AWS, where Cisco Cloud Network Controller creates two virtual availability zones for
each region using the format <region-name>a and <region-name>b. For example, under the us-west-1
region, Cisco Cloud Network Controller creates the two virtual availability zones us-west-1a and
us-west-1b.
To view the virtual availability zones for your Cisco Cloud Network Controller, navigate to Cloud
Resources > Availability Zones, then click the Virtual Availability Zones tab.
• Cloud availability zones: This type of availability zone allows for multiple availability zones in each
AWS region with Cisco Cloud Network Controller.
To view the cloud availability zones for your Cisco Cloud Network Controller, navigate to Cloud
Resources > Availability Zones, then click the Cloud Availability Zones tab.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
27
Cisco Cloud Network Controller Policy Model
Migrating from Virtual Availability Zones to Cloud Availability Zones
Note The following steps describe how to migrate from virtual availability zones to cloud availability zones
through the cloud context profile, but you can also migrate availability zones by clicking the Intent icon
( ) and selecting Availability Zone Configuration Migration.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
28
Cisco Cloud Network Controller Policy Model
Guidelines and Limitations
VRFs
A Virtual Routing and Forwarding (VRF) object (fvCtx) or context is a tenant network (called a private
network in the Cisco Cloud Network Controller GUI. A tenant can have multiple VRFs. A VRF is a unique
Layer 3 forwarding and application policy domain. The following figure shows the location of VRFs in the
management information tree (MIT) and their relation to other objects in the tenant.
Figure 4: VRFs
A VRF defines a Layer 3 address domain. One or more cloud context profiles are associated with a VRF. You
can only associate one cloud context profile with a VRF in a given region. All the endpoints within the Layer
3 domain must have unique IP addresses because it is possible to forward packets directly between these
devices if the policy allows it. A tenant can contain multiple VRFs. After an administrator creates a logical
device, the administrator can create a VRF for the logical device, which provides a selection criteria policy
for a device cluster. A logical device can be selected based on a contract name, a graph name, or the function
node name inside the graph.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
29
Cisco Cloud Network Controller Policy Model
Cloud Application Profiles
Cloud application profiles contain one or more cloud EPGs. Modern applications contain multiple components.
For example, an e-commerce application could require a web server, a database server, data located in a
storage service, and access to outside resources that enable financial transactions. The cloud application profile
contains as many (or as few) cloud EPGs as necessary that are logically related to providing the capabilities
of an application.
Cloud EPGs can be organized according to one of the following:
• The application they provide, such as a DNS server or SAP application (see Tenant Policy Example in
Cisco APIC REST API Configuration Guide).
• The function they provide (such as infrastructure)
• Where they are in the structure of the data center (such as DMZ)
• Whatever organizing principle that a cloud infrastructure or tenant administrator chooses to use
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
30
Cisco Cloud Network Controller Policy Model
Cloud Endpoint Groups
A cloud EPG is a managed object that is a named logical entity that contains a collection of endpoints. Endpoints
are devices that are connected to the network directly or indirectly. They have an address (identity), a location,
attributes (such as version or patch level), and are virtual. Knowing the address of an endpoint also enables
access to all its other identity details. Cloud EPGs are fully decoupled from the physical and logical topology.
Endpoint examples include servers, virtual machines, storage services, or clients on the Internet. Endpoint
membership in a cloud EPG can be dynamic or static.
The ACI cloud infrastructure can contain the following types of cloud EPGs:
• Cloud endpoint group (cloudEPg)
• Cloud external endpoint group (cloudExtEPg)
Cloud EPGs contain endpoints that have common policy requirements such as security or Layer 4 to Layer
7 services. Rather than configure and manage endpoints individually, they are placed in a cloud EPG and are
managed as a group.
Policies apply to cloud EPGs, never to individual endpoints.
Regardless of how a cloud EPG is configured, cloud EPG policies are applied to the endpoints they contain.
WAN router connectivity to the cloud infrastructure is an example of a configuration that uses a static cloud
EPG. To configure WAN router connectivity to the cloud infrastructure, an administrator configures a
cloudExtEPg cloud EPG that includes any endpoints within an associated WAN subnet. The cloud infrastructure
learns of the cloud EPG endpoints through a discovery process as the endpoints progress through their
connectivity life cycle. Upon learning of the endpoint, the cloud infrastructure applies the cloudExtEPg cloud
EPG policies accordingly. For example, when a WAN connected client initiates a TCP session with a server
within an application (cloudEPg) cloud EPG, the cloudExtEPg cloud EPG applies its policies to that client
endpoint before the communication with the (cloudExtEPg) cloud EPG web server begins. When the client
server TCP session ends, and communication between the client and server terminates, the WAN endpoint
no longer exists in the cloud infrastructure.
The Cisco Cloud Network Controller uses endpoint selectors to assign endpoints to Cloud EPGs. The endpoint
selector is essentially a set of rules that are run against the cloud instances that are assigned to the AWS VPC
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
31
Cisco Cloud Network Controller Policy Model
Contracts
managed by Cisco ACI. Any endpoint selector rules that match endpoint instances assign that endpoint to the
Cloud EPG. The endpoint selector is similar to the attribute-based microsegmentation available in Cisco ACI.
Contracts
In addition to cloud EPGs, contracts (vzBrCP) are key objects in the policy model. Cloud EPGs can only
communicate with other cloud EPGs according to contract rules. The following figure shows the location of
contracts in the management information tree (MIT) and their relation to other objects in the tenant.
Figure 7: Contracts
An administrator uses a contract to select one or more types of traffic that can pass between cloud EPGs,
including the protocols and ports allowed. If there is no contract, inter-EPG communication is disabled by
default. There is no contract required for intra-EPG communication; intra-EPG communication is always
implicitly allowed.
Contracts govern the following types of cloud EPG communications:
• Between cloud EPGs (cloudEPg), both intra-tenant and inter-tenant
Note In the case of a shared service mode, a contract is required for inter-tenant
communication. A contract is used to specify static routes across VRFs,
although the tenant VRF does not enforce a policy.
Contracts govern the communication between cloud EPGs that are labeled providers, consumers, or both. The
relationship between a cloud EPG and a contract can be either a provider or consumer. When a cloud EPG
provides a contract, communication with that cloud EPG can be initiated from other cloud EPGs as long as
the communication complies with the provided contract. When a cloud EPG consumes a contract, the cloud
endpoints in the consuming cloud EPG may initiate communication with any cloud endpoint in a cloud EPG
that is providing that contract.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
32
Cisco Cloud Network Controller Policy Model
Filters and Subjects Govern Cloud EPG Communications
Note A cloud EPG can both provide and consume the same contract. A cloud EPG can also provide and
consume multiple contracts simultaneously.
Contracts can contain multiple communication rules and multiple cloud EPGs can both consume and provide
multiple contracts. A policy designer can compactly represent complex communication policies and re-use
these policies across multiple instances of an application.
Note Subjects are hidden in Cisco Cloud Network Controller and not configurable. For rules installed in AWS,
source port provided in the filter entry s not taken into account.
Subjects and filters define cloud EPG communications according to the following options:
• Filters are Layer 2 to Layer 4 fields, TCP/IP header fields such as Layer 3 protocol type, Layer 4 ports,
and so forth. According to its related contract, a cloud EPG provider dictates the protocols and ports in
both the in and out directions. Contract subjects contain associations to the filters (and their directions)
that are applied between cloud EPGs that produce and consume the contract.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
33
Cisco Cloud Network Controller Policy Model
About the Cloud Template
Note When a contract filter match type is All, best practice is to use the VRF
unenforced mode. Under certain circumstances, failure to follow these
guidelines results in the contract not allowing traffic among cloud EPGs in
the VRF.
• Subjects are contained in contracts. One or more subjects within a contract use filters to specify the type
of traffic that can be communicated and how it occurs. For example, for HTTPS messages, the subject
specifies the direction and the filters that specify the IP address type (for example, IPv4), the HTTP
protocol, and the ports allowed. Subjects determine if filters are unidirectional or bidirectional. A
unidirectional filter is used in one direction. Unidirectional filters define in or out communications but
not the same for both. Bidirectional filters are the same for both; they define both in and out
communications.
Note For rules that are installed in AWS, the source port provided in the filter
entry is not taken into account.
• ACI contracts rendered in AWS constructs are always stateful, allowing return traffic.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
34
Cisco Cloud Network Controller Policy Model
About the Cloud Template
The cloud template generates and manages a huge number of MOs in the cloudCtxProfile subtree including,
but not limited to, the following:
• Subnets
• Association of subnets to AWS availability zones
• Cloud routers
• IP address allocation for the cloud router interfaces
• IP address allocation and configuration for tunnels
• IP address allocation and configuration for loopbacks
Without the cloud template, you would be responsible for configuring and managing these.
The Cisco Cloud Template MO table contains a brief summary of the inputs (MOs) to the cloud template.
MO Purpose
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
35
Cisco Cloud Network Controller Policy Model
About the Cloud Template
MO Purpose
In Cisco Cloud Network Controller, the layering of MOs is slightly different from a regular Cisco APIC due
to the cloud template. In a regular Cisco APIC, you post logical MOs that go through two layers of translation:
1. Logical MO to resolved MO
2. Resolved MO to concrete MO
In Cisco Cloud Network Controller, there is an additional layer of translation for the infra network. This
additional layer is where the cloud template translates logical MOs in the cloudtemplate namespace to logical
MOs in the cloud namespace. For configurations outside of the infra network, you post logical MOs in the
cloud namespace. In this case, the MOs go through the usual two-layer translation as in the regular Cisco
APIC.
Figure 9: Cloud and Cloud Template MO Conversion
Note For information about configuring the cloud template, see Configuring Cisco Cloud Network Controller
Components, on page 41
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
36
Cisco Cloud Network Controller Policy Model
Managed Object Relations and Policy Resolution
The dotted lines in the following figure show several common MO relations.
Figure 10: MO Relations
For example, the dotted line between the cloud EPG and the VRF defines the relation between those two
MOs. In this figure, the cloud EPG (cloudEPg) contains a relationship MO (cloudRsCloudEPgCtx) that is
named with the name of the target VRF MO (fvCtx). For example, if production is the VRF name
(fvCtx.name=production), then the relation name is production
(cloudRsCloudEPgCtx.tnFvCtxName=production).
In the case of policy resolution based on named relations, if a target MO with a matching name is not found
in the current tenant, the ACI cloud infrastructure tries to resolve in the common tenant. For example, if the
user tenant cloud EPG contained a relationship MO targeted to a VRF that did not exist in the tenant, the
system tries to resolve the relationship in the common tenant. If a named relation cannot be resolved in either
the current tenant or the common tenant, the ACI cloud infrastructure attempts to resolve to a default policy.
If a default policy exists in the current tenant, it is used. If it does not exist, the ACI cloud infrastructure looks
for a default policy in the common tenant. Cloud context profile, VRF, and contract (security policy) named
relations do not resolve to a default.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
37
Cisco Cloud Network Controller Policy Model
Default Policies
Default Policies
Warning Default policies can be modified or deleted. Deleting a default policy can result in a policy resolution
process to complete abnormally.
The ACI cloud infrastructure includes default policies for many of its core functions. Examples of default
policies include the following:
• Cloud AWS provider (for the infra tenant)
• Monitoring and statistics
Note To avoid confusion when implementing configurations that use default policies, document changes
made to default policies. Be sure that there are no current or future configurations that rely on a default
policy before deleting a default policy. For example, deleting a default firmware update policy could
result in a problematic future firmware update.
• A configuration does not refer to any policy name: if a default policy exists in the current tenant, it is
used. Otherwise, the default policy in tenant common is used.
The policy model specifies that an object is using another policy by having a relation-managed object (MO)
under that object and that relation MO refers to the target policy by name. If this relation does not explicitly
refer to a policy by name, then the system tries to resolve a policy that is called default. Cloud context profiles
and VRFs are exceptions to this rule.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
38
Cisco Cloud Network Controller Policy Model
Shared Services
Shared Services
Cloud EPGs in one tenant can communicate with cloud EPGs in another tenant through a contract interface
that is contained in a shared tenant. Within the same tenant, a cloud EPG in one VRF can communicate with
another cloud EPG in another VRF through a contract defined in the tenant. The contract interface is an MO
that can be used as a contract consumption interface by the cloud EPGs that are contained in different tenants.
By associating to an interface, a cloud EPG consumes the subjects that are represented by the interface to a
contract contained in the shared tenant. Tenants can participate in a single contract, which is defined at some
third place. More strict security requirements can be satisfied by defining the tenants, contract, subjects, and
filter directions so that tenants remain isolated from one another.
Follow these guidelines when configuring shared services contracts:
• A shared service is supported only with non-overlapping and non-duplicate CIDR subnets. When
configuring CIDR subnets for shared services, follow these guidelines:
• CIDR subnets leaked from one VRF to another must be disjointed and must not overlap.
• CIDR subnets advertised from multiple consumer networks into a VRF or vice versa must be
disjointed and must not overlap.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
39
Cisco Cloud Network Controller Policy Model
Shared Services
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
40
CHAPTER 4
Configuring Cisco Cloud Network Controller
Components
• About Configuring the Cisco Cloud Network Controller, on page 41
• Configuring the Cisco Cloud Network Controller Using the GUI, on page 41
• Configuring Cisco Cloud Network Controller Using the REST API, on page 109
Note • For information about configuring a load balancer and service graph, see Deploying Layer 4 to
Layer 7 Services, on page 131.
• For information about the GUI, such as navigation and a list of configurable components, see About
the Cisco Cloud Network Controller GUI, on page 12.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
41
Configuring Cisco Cloud Network Controller Components
Configure a Tenant AWS Provider For Release 4.2(2) and Earlier
Step 3 From the Application Management list in the Intent menu, click Create Tenant. The Create Tenant dialog box
appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Tenant Dialog Box Fields table then continue.
Properties Description
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
42
Configuring Cisco Cloud Network Controller Components
Configure a Tenant AWS Provider For Release 4.2(2) and Earlier
account. For security reasons, public access to this S3 bucket is not allowed, so the S3 bucket owner
needs to download this file and use it in the tenant account.
• Untrusted tenants - use the account access and secret keys. The access and secret keys being used must
be for an IAM user having these permissions at a minimum. The IAM role created must be named
ApicTenantRole.
Note Cisco Cloud Network Controller does not disturb AWS resources created
by other applications or users. It only manages the AWS resources created
by itself.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"s3:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"events:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"logs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudtrail:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudwatch:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"resource-groups:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"sqs:*"
],
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
43
Configuring Cisco Cloud Network Controller Components
Configure a Tenant AWS Provider For Release 4.2(2) and Earlier
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "elasticloadbalancing:*",
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"config:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "iam:PassRole",
"Resource": "arn:aws:iam::<account-id>:role/ApicTenantRole",
"Effect": "Allow"
}
]
}
• Cisco Cloud Network Controller enforces ownership checks to prevent deployment of policies in the
same tenant-region combination done either intentionally or by mistake. For example, assume that Cisco
Cloud Network Controller is deployed in AWS account IA1 in region R1. Now you want to deploy a
tenant TA1 in region R2. This tenant deployment i.e. account-region combination TA1-R2 is now owned
by IA1-R1. If another Cisco Cloud Network Controller attempts to manage the same tenant-region
combination later (say Capic2 in AWS account IA2 deployed in region R3), this will not be allowed
because the current owner for the deployment TA1-R2 is IA1-R1. In other words, only one account in
one region can be managed by one Cisco Cloud Network Controller. Example below shows some valid
and wrong deployment combinations.
Capic1:
IA1-R1: TA1-R1 - ok
TA1-R2 - ok
Capic2:
IA1-R2: TA1-R1 - not allowed
TA1-R3 - ok
Capic3:
IA2-R1: TA1-R1 - not allowed
TA1-R4 - ok
TA2-R4 - ok
• Ownership enforcement is done using AWS Resource Groups. When a new tenant in account TA1 in
region R2 is managed by Cisco Cloud Network Controller, a Resource Group CAPIC_TA1_R2 (e.g.
CAPIC_123456789012_us-east-2) is created in the tenant account. This Resource Group has a resource
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
44
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider
tag AciOwnerTag with value IA1_R1_TA1_R2, assuming it was managed by Cisco Cloud Network
Controller in account IA1 and deployed in region R1. If the AciOwnerTag mismatch happens, tenant-region
management is aborted.
Here is a summary of AciOwnerTag mismatch cases:
• Initially Cisco Cloud Network Controller is installed in an account, and then taken down and Cisco
Cloud Network Controller is installed in a different account. All existing tenant-region deployment
will fail.
• Another Cisco Cloud Network Controller is managing the same tenant-region.
In ownership mismatch cases, retry (to setup tenant-region again) is not currently supported. As a
workaround, if you are certain that no other Cisco Cloud Network Controller is managing the same
tenant-region combination, logon to the tenant's AWS account and manually remove the affected Resource
Group (e.g. CAPIC_123456789012_us-east-2). Next, reload Cisco Cloud Network Controller or delete
and add the tenant again.
Step 1 In the Cisco Cloud Network Controller, configure the AWS Provider.
a) On the Intent menu, choose Tenants > tenant_name from the drop-down.
b) In the Intent pane, choose Application Management > tenant_name .
Step 2 Perform the following actions:
a) Confirm there is a check in the Trusted Tenant checkbox.
The AWS account must be a Trusted account for the user tenant using the cloud.
b) In the Cloud Account ID field, provide the Cloud account ID.
c) Run the tenant role cloud-formation template available at the URL
https://capic-common-<infraAccountId>-data.s3.amazonaws.com/tenant-cft.json which is in a s3 bucket in the infra
tenant’s AWS account.
Note Alternatively, keep the trusted flag unchecked and provide the access and secret keys as done normally for
any tenant.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
45
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider
For a trusted tenant, establish the trust relationship first with the account in which Cisco Cloud Network
Controller is deployed (the account for the infra tenant). To establish the trust relation and give all the
required permissions to the Cisco Cloud Network Controller for accessing the tenant account, first create
a tenant and assign the Trusted tag to that tenant as the Access Type. Then, bring up that new trusted
tenant again by clicking on the tenant name in the Tenants page, and in the AWS Account area in the
tenant window, click the Run the CloudFormation template link.
• Organization tenants are for adding tenant accounts that are part of the organization. This requires
deploying the Cisco Cloud Network Controller in the master account of the organization.
• Untrusted tenants use the account access and secret keys. The access and secret keys being used must
be for an IAM user having these permissions at a minimum. The IAM role created must be named
ApicTenantRole.
Note Cisco Cloud Network Controller does not disturb AWS resources created
by other applications or users. It only manages the AWS resources created
by itself.
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"s3:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"events:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"logs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudtrail:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudwatch:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
46
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider
"Action": [
"resource-groups:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"sqs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "elasticloadbalancing:*",
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"config:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "iam:PassRole",
"Resource": "arn:aws:iam::<account-id>:role/ApicTenantRole",
"Effect": "Allow"
}
]
}
• The Cisco Cloud Network Controller uses the OrganizationAccountAccessRole IAM role to manage
policies for AWS Organization tenants.
• If you created an AWS account within the existing organization in the master account, the
OrganizationAccountAccessRole IAM role is automatically assigned to that created AWS account.
You do not have to manually configure the OrganizationAccountAccessRole IAM role in AWS in
this case.
• If the master account invited an existing AWS account to join the organization, then you must
manually configure the OrganizationAccountAccessRole IAM role in AWS. Configure the
OrganizationAccountAccessRole IAM role in AWS for the organization tenant and verify that it
has Cisco Cloud Network Controller-related permissions available.
The OrganizationAccountAccessRole IAM role, together with the SCP (Service Control Policy)
used for the organization or the account, must have the minimum permissions that are required by
the Cisco Cloud Network Controller to manage policies for the tenants. The access policy requirement
is the same as the requirement for the trusted or untrusted tenants.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
47
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"s3:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"events:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"logs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudtrail:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"cloudwatch:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"resource-groups:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"sqs:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "elasticloadbalancing:*",
"Resource": "*",
"Effect": "Allow"
}, {
"Action": [
"config:*"
],
"Resource": "*",
"Effect": "Allow"
}, {
"Action": "iam:PassRole",
"Resource": "*",
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
48
Configuring Cisco Cloud Network Controller Components
Configuring a Tenant AWS Provider
"Effect": "Allow"
}
]
}
• Cisco Cloud Network Controller enforces ownership checks to prevent deployment of policies in the
same tenant-region combination done either intentionally or by mistake. For example, assume that Cisco
Cloud Network Controller is deployed in AWS account IA1 in region R1. Now you want to deploy a
tenant TA1 in region R2. This tenant deployment i.e. account-region combination TA1-R2 is now owned
by IA1-R1. If another Cisco Cloud Network Controller attempts to manage the same tenant-region
combination later (say CNC2 in AWS account IA2 deployed in region R3), this will not be allowed
because the current owner for the deployment TA1-R2 is IA1-R1. In other words, only one account in
one region can be managed by one Cisco Cloud Network Controller. Example below shows some valid
and wrong deployment combinations.
CNC1:
IA1-R1: TA1-R1 - ok
TA1-R2 - ok
CNC2:
IA1-R2: TA1-R1 - not allowed
TA1-R3 - ok
CNC3:
IA2-R1: TA1-R1 - not allowed
TA1-R4 - ok
TA2-R4 - ok
• Ownership enforcement is done using AWS Resource Groups. When a new tenant in account TA1 in
region R2 is managed by Cisco Cloud Network Controller, a Resource Group CNC_TA1_R2 (e.g.
CNC_123456789012_us-east-2) is created in the tenant account. This Resource Group has a resource
tag AciOwnerTag with value IA1_R1_TA1_R2, assuming it was managed by Cisco Cloud Network
Controller in account IA1 and deployed in region R1. If the AciOwnerTag mismatch happens, tenant-region
management is aborted.
Here is a summary of AciOwnerTag mismatch cases:
• Initially Cisco Cloud Network Controller is installed in an account, and then taken down and Cisco
Cloud Network Controller is installed in a different account. All existing tenant-region deployment
will fail.
• Another Cisco Cloud Network Controller is managing the same tenant-region.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
49
Configuring Cisco Cloud Network Controller Components
Creating an Application Profile Using the Cisco Cloud Network Controller GUI
In ownership mismatch cases, retry (to setup tenant-region again) is not currently supported. As a
workaround, if you are certain that no other Cisco Cloud Network Controller is managing the same
tenant-region combination, logon to the tenant's AWS account and manually remove the affected Resource
Group (e.g. CAPIC_123456789012_us-east-2). Next, reload Cisco Cloud Network Controller or delete
and add the tenant again.
Step 1 In the Cisco Cloud Network Controller, configure the AWS Provider.
a) On the Intent menu, choose Tenants > tenant_name from the drop-down.
b) In the Intent pane, choose Application Management > tenant_name .
Step 2 Perform the following actions:
a) In the AWS Account ID field, provide the cloud account ID.
b) In the Access Type area, choose Trusted.
The AWS account must be a Trusted account for the user tenant that is using the cloud.
c) Click Save.
d) Bring up the new trusted tenant again by clicking on the tenant name in the Tenants page.
In the AWS Account area in the tenant Overview page, you will see the following message: "In order to deploy any
configuration from this tenant, you must create a trusted role in the tenant AWS account which will establish trust
with the AWS infra account. To do so, open the link below to run the CloudFormation template."
e) Click the Run the CloudFormation template link.
This returns you to the AWS sign in page, which should be pre-populated with the necessary AWS account information
that you entered earlier in these procedures in the Cisco Cloud Network Controller GUI.
f) Click Next in the AWS sign in page after verifying that the sign-in information is correct.
g) Run the tenant role cloud-formation template in the tenant account.
Note Alternatively, keep the trusted flag unchecked and provide the access and secret keys as done normally for
any tenant.
Creating an Application Profile Using the Cisco Cloud Network Controller GUI
This section explains how to create an application profile using the Cisco Cloud Network Controller GUI.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
50
Configuring Cisco Cloud Network Controller Components
Creating a VRF Using the Cisco Cloud Network Controller GUI
Step 3 From the Application Management list in the Intent menu, click Create Application Profile. The Create Application
Profile dialog box appears.
Step 4 Enter a name in the Name field.
Step 5 Choose a tenant:
a) Click Select Tenant.
The Select Tenant dialog box appears.
b) From the Select Tenant dialog, click to choose a tenant in the left column then click Select.
You return to the Create Application Profile dialog box.
Step 3 From the Application Management list in the Intent menu, click Create VRF. The Create VRF dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create VRF Dialog Box Fields table then continue.
Properties Description
General
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
51
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties Description
Add Filter a. Click the Add Route Target option for the unicast
address family BGP target you want to configure.
b. Click to choose the following options for the Type field:
• Export—The route target can be exported to other
VRFs
• Import—The route target is imported from other
VRFs
• Enter the route target that can be exported from
the current VRF or imported into the current VRF
in the Route Target text box.
Creating an External Network Using the Cisco Cloud Network Controller GUI
This procedure describes how to create an external network. You can have a single external network that can
connect to multiple routers on the on-premises site, or you can have multiple external networks with multiple
VRFs that you can use to connect to CCRs.
Step 1 In the left navigation bar, navigate to Application Management > External Networks.
The configured external networks are displayed.
Step 2 Click Actions, then choose Create External Network.
The Create External Network window appears.
Step 3 Enter the appropriate values in each field as listed in the following Create External Network Dialog Box Fields table then
continue.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
52
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties Description
General
VRF This external VRF will be used for external connectivity with external non-ACI devices. You can create
multiple external VRFs for this purpose.
This VRF will be identified as an external VRF if the VRF has all three of the following characteristics:
• Configured under the infra tenant
• Associated with an external network
• Not associated with a cloud context profile
Any VRF that is associated with an external network becomes an external VRF. The external VRF is not
allowed to be associated with a cloud context profile or subnet.
To choose an external VRF:
a. Click Select VRF.
The Select VRF dialog box appears.
b. From the Select VRF dialog, click to choose a VRF in the left column.
You can also create a VRF using the + Create VRF option.
c. Click Select.
You return to the Create External Network dialog box.
Host Router Name This field appears if you select CCR as the Router Type.
This field is not editable. The default host router is automatically selected.
Hub Network This field appears if you select TGW as the Router Type.
To choose a hub network:
a. Click Select Hub Network.
The Select Hub Network dialog box appears.
b. In the Select Hub Network dialog box, click the desired hub network from the list and then click
Select.
You are returned to the Create External Network page.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
53
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties Description
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
54
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties Description
VPN Networks
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
55
Configuring Cisco Cloud Network Controller Components
Creating an External Network Using the Cisco Cloud Network Controller GUI
Properties Description
The VPN networks entries are used for external connectivity. All configured VPN networks will be
applied to all the selected regions.
To add a VPN network:
a. Click Add VPN Network.
The Add VPN Network dialog box appears.
b. In the Name field, enter a name for the VPN network.
c. Click + Add IPsec Peer.
The Add IPsec Tunnel Destination window appears.
d. Enter values for the following fields for the IPsec tunnel destination that you want to add:
• Public IP of IPSec Tunnel Peer
• Pre-Shared Key
• IKE Version: Select ikev1 or ikev2 for IPsec tunnel connectivity
• BGP Peer ASN
• Subnet Pool Name: Click Select Subnet Pool Name.
The Select Subnet Pool Name dialog box appears. Select one of the available subnet pools that
are listed, then click Select.
Note Additional IPsec tunnel subnet pools can be added in the External Networks page,
or through the Cloud Network Controller First Time Set Up, if necessary. For more
information on adding additional subnet pools through the Cloud Network Controller
First Time Set Up, see the chapter "Configuring Cisco Cloud Network Controller
Using the Setup Wizard" in the Cisco Cloud Network Controller for AWS Installation
Guide, Release 25.1(x). The subnet pool size should be large enough to accommodate
the number of IPsec tunnels that will get created.
• IPsec Tunnel Source Interfaces: Using the entries in this field, the Cisco Cloud Network
Controller creates one IPsec tunnel from each selected source interface to the destination IP
address.
Note ikev2 is the default option in this field. The IPsec tunnel source interfaces feature is
supported only with the IKEv2 configuration.
gig3 is selected by default. Choose one or more from the following interfaces:
• gig2: The GigabitEthernet2 interface
• gig3: The GigabitEthernet3 interface
• gig4: The GigabitEthernet4 interface
Note After you have configured the IPsec tunnel source interfaces in this external network,
you can then configure IPsec tunnel source interfaces in additional networks where
tunnels to the same destination can be formed, as described in Routing Policies:
Release 25.0(2), on page 7.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
56
Configuring Cisco Cloud Network Controller Components
Configuring the Global Inter-VRF Route Leak Policy
Properties Description
e. Click Add to add this IPsec tunnel destination.
You return to the Add VPN Network window.
Click + Add IPsec Peer if you want to add another IPsec tunnel destination.
f. Click Add in the Add VPN Network dialog box.
You return to the Create External Network dialog box.
Step 4 When you have finished creating the external network, click Save.
After you click Save in the Create External Network window, cloud routers are then configured in AWS.
Step 3 From the Configuration list in the Intent menu, click Cisco Cloud Network Controller Setup.
The Set up - Overview dialog box appears.
Step 4 In the Contract Based Routing area, note the current setting for the Contract Based Routing field.
The Contract Based Routing setting reflects the current internal VRF route leak policy, which is a global policy under
the infra tenant where a Boolean flag is used to indicate whether contracts can drive routes in the absence of route maps:
• Off: Default setting. Indicates that routes are not leaked based on contracts, and are leaked based on route maps
instead.
• On: Indicates that routes are leaked based on contracts in the absence of route maps. When enabled, contracts drive
routing when route maps are not configured. When route maps exist, route maps always drives routing.
Step 5 Determine if you want to change the current setting for the Contract Based Routing field.
Follow these procedures if you toggle from one setting to another:
• Toggling from On setting to Off (disabling contract-based routing): In this situation, the assumption is that you
have contract-based routing configured currently and you want to toggle over to route map-based routing. This can
be disruptive if the route map-based routing is not configured before you toggle from contract-based routing to route
map-based routing.
Before toggling from the On setting to the Off setting in this situation, make the following changes:
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
57
Configuring Cisco Cloud Network Controller Components
Configuring Leak Routes Using the Cisco Cloud Network Controller GUI
a. Between all pairs of VRFs that have existing contracts, enable route map-based route leaking.
Follow the procedures provided in Configuring Leak Routes Using the Cisco Cloud Network Controller GUI,
on page 58.
b. Disable the contract-based route policy in the global policy.
Toggle the switch in the Contract Based Routing field from the On setting to the Off setting to toggle from
contract-based routing to route map-based routing.
c. Change the routing to reflect any granularity that is required based on the new route map-based routing that you
enabled.
• Toggling from Off setting to On (enabling contract-based routing): In this situation, the assumption is that you
have route map-based routing configured currently and you want to toggle over to contract-based routing. This is
not a disruptive operation, but rather is an additive operation, since both contracts and route maps can be enabled
between a pair of VRFs. In that situation, route maps take precedence over contracts when enabling routing. With
route map-based routing enabled, adding contract-based routing should be non-disruptive.
For that reason, you do not have to make any changes before toggling from the Off setting to the On setting in this
situation. However, if you do not want to have both contracts and route maps enabled between a pair of VRFs, and
you want to move completely to contract-based routing, you should completely set up contracts between the VRFs
and delete the route maps between the VRFs before toggling to the On setting in the Contract Based Routing field.
Step 6 If you want to change the current setting for the Contract Based Routing area, toggle the setting based on the type of
routing that you want.
Step 7 Click Done when you have finished the Cisco Cloud Network Controller Setup configurations.
Configuring Leak Routes Using the Cisco Cloud Network Controller GUI
The procedures for configuring leak routes using the Cisco Cloud Network Controller GUI will vary slightly,
depending on the release:
• For releases prior to 25.0(2), you can configure an independent routing policy to specify which routes
to leak between internal and external VRFs when you are setting up routing between an ACI cloud site
and an external destination using the external connectivity feature. See Configuring Inter-VRF Route
Leaking Using the Cisco Cloud Network Controller GUI, on page 58 for those procedures.
• For releases 25.0(2) and later, support is available for route maps-based route leaking between a pair of
internal VRFs. See Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller
GUI, on page 61 for those procedures.
Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network Controller GUI
Configuring leak routes is part of the release 25.0(1) update where routing and security policies are configured
separately. Using inter-VRF routing, you can configure an independent routing policy to specify which routes
to leak between internal and external VRFs when you are setting up routing between an ACI cloud site and
an external destination using the external connectivity feature. See Understanding Supported Routing and
Security Policies, on page 5 for more information.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
58
Configuring Cisco Cloud Network Controller Components
Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network Controller GUI
The external destination must be configured manually using the Enabling Connectivity From the AWS Site
to External Devices, on page 63 procedures. The external destination could be another cloud site, an ACI
on-premises site or a branch office.
Note • Use these procedures to configure routing policies independent of security policies only between
internal and external VRFs, based on updates provided in release 25.0(1).
• Do not use these procedures to configure routing between a pair of internal VRFs; use contracts as
you normally would prior to release 25.0(1) in that case.
Step 1 In the left navigation bar, navigate to Application Management > VRFs.
The configured VRFs are displayed.
Step 2 Click the Leak Routes tab.
Any already-configured leak routes are displayed.
Step 3 Click Actions, then choose Create Leak Route.
The Create Leak Route window appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Leak Routes Dialog Box Fields table then
continue.
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
59
Configuring Cisco Cloud Network Controller Components
Configuring Inter-VRF Route Leaking Using the Cisco Cloud Network Controller GUI
Properties Description
Type Choose the type of leaked route that you want to configure:
• Leak All: Select to configure all routes to leak from the source VRF to the destination VRF.
The entry 0.0.0.0/0 is entered automatically in the subnet IP area by default in this case.
• Subnet IP: Select to configure a specific subnet IP address as the route to leak from the source VRF
to the destination VRF. The Subnet IP box appears.
In the Subnet IP box, enter a subnet IP address as the route to leak between VRFs.
Then click the Add Reverse Leak Route option in the Success window.
You are returned to the Add Leak Route window. Repeat Step 4, on page 59 through Step 5, on page 60 to
configure another route, but this time:
• In the Source VRF field, select the VRF that you had selected as a destination VRF in the previous
configuration.
• In the Destination VRF field, select the VRF that you had selected as a source VRF in the previous
configuration.
Step 7 When you have finished configuring leak routes, click Done.
The Leak Routes tab in the main VRFs page is displayed again, with the newly configured leak route displayed.
Step 8 To get more information on a source or destination VRF, or to make changes to a configured leak route, double-click
the VRF in the Leak Routes tab in the main VRFs page.
The Overview page for that VRF is displayed.
Step 9 Click the Application Management tab at the top of the VRF page, then click the Leak Routes tab in the left nav bar.
The leak routes associated with this particular VRF are displayed.
Step 10 Configure additional leak routes associated with this VRF, if necessary.
• To add a leak route from this VRF, click Actions, then choose Add Leak Route from <VRF_name>.
The Add Leak Route window appears. Enter the necessary information as you did previously using the information
in Step 4, on page 59. Note that the entry in the Source VRF is pre-selected and cannot be changed in this situation.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
60
Configuring Cisco Cloud Network Controller Components
Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller GUI
• To add a leak route to this VRF, click Actions, then choose Add Leak Route to <VRF_name>.
The Add Leak Route window appears. Enter the necessary information as you did previously using the information
in Step 4, on page 59. Note that the entry in the Destination VRF is pre-selected and cannot be changed in this
situation.
What to do next
You have now configured the routing policy. Since the routing and security policies are separate, you now
need to configure the security policy separately:
• Creating an EPG Using the Cisco Cloud Network Controller GUI, on page 67: Use these procedures to
create an external EPG.
• Creating a Contract Using the Cisco Cloud Network Controller GUI, on page 72: Use these procedures
to create a contract between the external EPG and the cloud EPG.
Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller GUI
Beginning with release 25.0(2), support is available for route maps-based route leaking between a pair of
internal VRFs, as described in Route Leaking Between Internal VRFs, on page 7. This feature is an extension
of the routing and security split update provided in release 25.0(1), where routing and security policies are
configured separately.
Step 1 In the left navigation bar, navigate to Application Management > VRFs.
The configured VRFs are displayed.
Step 2 Click the Leak Routes tab.
Any already-configured leak routes are displayed.
Step 3 Click Actions, then choose Create Leak Route.
The Create Leak Route window appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Leak Routes Dialog Box Fields table then
continue.
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
61
Configuring Cisco Cloud Network Controller Components
Configuring Leak Routes for Internal VRFs Using the Cisco Cloud Network Controller GUI
Properties Description
Type Choose the type of leaked route that you want to configure:
• Leak All: Select to configure all routes to leak from the source VRF to the destination VRF.
The entry 0.0.0.0/0 is entered automatically in the subnet IP area by default in this case.
• Subnet IP: Select to configure a specific subnet IP address as the route to leak from the source VRF
to the destination VRF. The Subnet IP box appears.
In the Subnet IP box, enter a subnet IP address as the route to leak between VRFs.
Then click the Add Reverse Leak Route option in the Success window.
You are returned to the Add Leak Route window. Repeat Step 4, on page 61 through Step 5, on page 62 to
configure another route, but this time:
• In the Source VRF field, select the VRF that you had selected as a destination VRF in the previous
configuration.
• In the Destination VRF field, select the VRF that you had selected as a source VRF in the previous
configuration.
Step 7 When you have finished configuring leak routes, click Done.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
62
Configuring Cisco Cloud Network Controller Components
Enabling Connectivity From the AWS Site to External Devices
The Leak Routes tab in the main VRFs page is displayed again, with the newly configured leak route displayed.
Step 8 To get more information on a source or destination VRF, or to make changes to a configured leak route, double-click
the VRF in the Leak Routes tab in the main VRFs page.
The Overview page for that VRF is displayed.
Step 9 Click the Application Management tab at the top of the VRF page, then click the Leak Routes tab in the left nav bar.
The leak routes associated with this particular VRF are displayed.
Step 10 Configure additional leak routes associated with this VRF, if necessary.
• To add a leak route from this VRF, click Actions, then choose Add Leak Route from <VRF_name>.
The Add Leak Route window appears. Enter the necessary information as you did previously using the information
in Step 4, on page 61. Note that the entry in the Source VRF is pre-selected and cannot be changed in this situation.
• To add a leak route to this VRF, click Actions, then choose Add Leak Route to <VRF_name>.
The Add Leak Route window appears. Enter the necessary information as you did previously using the information
in Step 4, on page 61. Note that the entry in the Destination VRF is pre-selected and cannot be changed in this
situation.
Step 1 Gather the necessary information that you will need to manually enable IPv4 connectivity from the infra VPC CCRs to
any external device without EVPN.
Step 2 Log into the external device.
Step 3 Enter the configuration information to connect an external networking device.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
63
Configuring Cisco Cloud Network Controller Components
Enabling Connectivity From the AWS Site to External Devices
If you downloaded the external device configuration files using the instructions in Downloading the External Device
Configuration Files, on page 63, locate the configuration information for the first tunnel and enter that configuration
information.
Following is an example of what the external device configuration file might look like for the first tunnel:
! The following file contains configuration recommendation to connect an external networking device
with the cloud ACI Fabric
! The configurations here are provided for an IOS-XE based device. The user is expected to understand
the configs and make any necessary amends before using them
! on the external device. Cisco does not assume any responsibility for the correctness of the config.
address-family ipv4
route-target export 64550:1
route-target import 64550:1
exit-address-family
exit
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
64
Configuring Cisco Cloud Network Controller Components
Enabling Connectivity From the AWS Site to External Devices
interface Tunnel100
vrf forwarding infra:externalvrf1
ip address 5.16.1.10 255.255.255.252
ip mtu 1400
ip tcp adjust-mss 1400
tunnel source GigabitEthernet2
tunnel mode ipsec ipv4
tunnel destination 13.88.168.176
tunnel protection ipsec profile ikev2-100
exit
The following figures provide more information on what each set of fields is used for in the external device configuration
file:
• The fields shown in the following figure are used to configure these areas:
• VRF definition
• IPSec global configurations
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
65
Configuring Cisco Cloud Network Controller Components
Enabling Connectivity From the AWS Site to External Devices
• The fields shown in the following figure are used to configure these areas:
• IPSec and ikev1 per tunnel configurations
• BGP configurations for the VRF neighbor
• The fields shown in the following figure are used to configure these areas:
• Ikev2 global configurations
• IPSec and ikev2 per tunnel configurations
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
66
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Step 3 From the Application Management list in the Intent menu, click Create EPG. The Create EPG dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create EPG Dialog Box Fields table then continue.
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
67
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Properties Description
Settings
Route Reachability (Visible when creating an external EPG) Click the Route
Reachability drop-down list and choose:
• On Premises
• Internet
• Unspecified
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
68
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Properties Description
Endpoint Selectors
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
69
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Properties Description
Note See Configuring Instances in AWS, on page 78
for instructions on configuring instances in AWS
as part of the endpoint selector configuration
process.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
70
Configuring Cisco Cloud Network Controller Components
Creating an EPG Using the Cisco Cloud Network Controller GUI
Properties Description
• does not have key: Used if the expression contains
only a key.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
71
Configuring Cisco Cloud Network Controller Components
Creating a Contract Using the Cisco Cloud Network Controller GUI
Properties Description
i. Click the check mark after every additional expression
that you want to create under this endpoint selector then
click Add when finished.
If you create more than one endpoint selector under an
EPG, a logical OR exists between those endpoint
selectors. For example, assume you had created
endpoint selector 1 as described in the previous step,
and then you created a second endpoint selector as
described below:
• Endpoint selector 2, expression 1:
• Key: Region
• Operator: in
• Value: us-east-1, us-east-2
In this case:
• If the availability zone is us-west-1a AND the IP
address belongs to the 192.0.2.1/24 subnet
(endpoint selector 1 expressions)
OR
• If the region is either us-east-1 or us-east-2
(endpoint selector 2 expression)
Step 3 From the Application Management list in the Intent menu, click Create Contract. The Create Contract dialog box
appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
72
Configuring Cisco Cloud Network Controller Components
Creating a Contract Using the Cisco Cloud Network Controller GUI
Step 4 Enter the appropriate values in each field as listed in the following Create Contract Dialog Box Fields table then continue.
Properties Description
Settings
Scope The scope limits the contract to any endpoint groups within
the same application profile, within the same VRF instance,
throughout the fabric (globally), or within the same tenant.
Note Shared services enables communication between
EPGs in different tenants and between EPGs in
different VRFs.
To enable EPGs in one tenant to communicate
with EPGs in another tenant, choose Global
scope.
To enable an EPG in one VRF to communicate
with another EPG in a different VRF, choose
Global or Tenant scope.
For more information about shared services, see
Shared Services, on page 39
Apply Filter in Both Directions Put a check in the box to apply the same filters to traffic
from consumer-to-provider and provider-to-consumer. Do
not put a check in the box if you want to apply different
filters for each direction of traffic.
The check box is enabled by default.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
73
Configuring Cisco Cloud Network Controller Components
Specifying Consumer and Provider EPGs Using the Cisco Cloud Network Controller
Properties Description
Specifying Consumer and Provider EPGs Using the Cisco Cloud Network
Controller
This section explains how to specify an EPG as a consumer or a provider.
Step 3 From the Configuration list in the Intent menu, click EPG Communication. The EPG Communication dialog box
appears with the Consumer EPGs, Contract, and Provider EPGs information.
Step 4 To choose a contract:
a) Click Select Contract. The Select Contract dialog appears.
b) In the pane on the left side of the Select Contract dialog, click to choose a contract then click Select. The Select
Contract dialog box closes.
Step 5 To add a consumer EPG:
a) Click Add Consumer EPGs. The Select Consumer EPGs dialog appears.
b) In the pane on the left side of the Select Consumer EPGs dialog, click to place a check in a check box to choose an
EPG.
Step 6 To add a provider EPG:
a) Click Add Provider EPGs. The Select Provider EPGs dialog appears.
b) In the pane on the left side of the Select Provider EPGs dialog, click to place a check in a check box to choose a
provider EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
74
Configuring Cisco Cloud Network Controller Components
Creating a Filter Using the Cisco Cloud Network Controller GUI
c) When finished, click Select. The Select Provider EPGs dialog box closes.
Step 3 From the Application Management list in the Intent menu, click Create Filter. The Create Filter dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Filter Dialog Box Fields table then continue.
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
75
Configuring Cisco Cloud Network Controller Components
Creating a Filter Using the Cisco Cloud Network Controller GUI
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
76
Configuring Cisco Cloud Network Controller Components
Creating a Cloud Context Profile Using the Cisco Cloud Network Controller GUI
Creating a Cloud Context Profile Using the Cisco Cloud Network Controller
GUI
This section explains how to create a cloud context profile using the Cisco Cloud Network Controller GUI.
Step 3 Enter the appropriate values in each field as listed in the following Cloud Context Profile Dialog Box Fields table then
continue.
Properties Description
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
77
Configuring Cisco Cloud Network Controller Components
Configuring Instances in AWS
Properties Description
Add CIDR Note The following subnets are reserved and should not be used in this Add CIDR
field:
• 169.254.0.0/16 (reserved for VPN tunnel to the transit gateway)
• 192.168.100.0/24 (reserved by the CCR for the bridge domain interface)
To add a CIDR:
a. Click Add CIDR. The Add CIDR dialog box appears.
b. Enter the address in the Address field.
c. Click Add Subnet and enter the subnet address in the Address field.
d. To add availability zones:
1. Click Select Availability Zone. The Select Availability Zone dialog box appears.
2. From the Select Availability Zone dialog box, click to choose an availability zone
in the left column.
The type of availability zone shown in this window varies depending on the type
of tenant that you selected for this cloud context profile.
Note If you are creating a cloud context profile in a user tenant, you are
restricted to only cloud availability zones in this window.
VPN Gateway Router (Optional) Click to check (enabled) or uncheck (disabled) in the VPN Gateway Router
check box.
TGW Attachment (Optional) Click to check (enabled) or uncheck (disabled) in the TGW Attachment check
box.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
78
Configuring Cisco Cloud Network Controller Components
Configuring Instances in AWS
This topic provides the instructions for configuring the instances in AWS. You can use these procedures to
configure the instances in AWS either before you configure the endpoint selectors for Cisco Cloud Network
Controller or afterward. For example, you might go to your account in AWS and create a custom tag or label
in AWS first, then create an endpoint selector using a custom tag or label in Cisco Cloud Network Controller
afterward. Or you might create an endpoint selector using a custom tag or label in Cisco Cloud Network
Controller first, then go to your account in AWS and create a custom tag or label in AWS afterward.
Step 1 Review your cloud context profile configuration settings and determine which settings you will use with your AWS
instance.
You must configure a cloud context profile as part of the AWS instance configuration process. When you configure a
cloud context profile, the configurations, such as the VRF and region settings, are pushed out to AWS afterward.
a) From the Navigation menu, choose the Application Management tab.
When the Application Management tab expands, a list of subtab options appear.
b) Choose the Cloud Context Profiles subtab option.
A list of the cloud context profiles that you have created for your Cisco Cloud Network Controller are displayed.
c) Select the cloud context profile that you will use as part of this AWS instance configuration process.
Various configuration parameters are displayed for this cloud context profile, such as the region, VRF, IP address
and subnets. Use the information displayed in this window when you configure the AWS instance.
Step 2 Log in to the Amazon Web Services account for the Cisco Cloud Network Controller user tenant, if you are not logged
in already.
Step 3 Go to Services > EC2 > Instances > Launch Instance.
Step 4 In the Choose an Amazon Machine Image (AMI) page, select an Amazon Machine Image (AMI).
Step 5 In the Choose an Instance Type page, select an instance type, then click Configure Instance Details.
Step 6 In the Configure Instance Details page, enter the necessary information in the appropriate fields.
• In the Network field, select your Cisco Cloud Network Controller VRF.
This would be the VRF that is associated with the cloud context profile that you are using as part of this AWS
instance configuration process.
• In the Subnet field, select the subnet.
• In the Auto-assign Public IP field, if you want to have a public IP, select Enable from the scroll-down menu.
Step 7 When you have finished entering the necessary information into the Configure Instance Details page, click Add
Storage.
Step 8 In the Add Storage page, accept the default values or configure the storage in this page, if necessary, and click Add
Tags.
Step 9 In the Add Tags page, click Add Tag and enter the necessary information in the appropriate fields in this page.
Note If you will be using IP Address, Region or Zone for the type of endpoint selector later in these procedures,
you do not have to enter any information in this page. In those situations, when you start the instance in AWS,
the IP address, region or zone will be discovered by the Cisco Cloud Network Controller and the endpoint
will be assigned to the EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
79
Configuring Cisco Cloud Network Controller Components
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI
• Key: Enter the key that you will use when you create a custom tag for the type of endpoint selector that you are
adding later in these procedures.
• Value: Enter the value that you will be using for this key.
• Instances: Check the box for this field.
• Volumes: Check the box for this field.
For example, if you are planning on creating a custom tag for a specific building for your endpoint selector later in
these procedures (such as building6), you might enter the following values in these fields on this page:
• Key: Location
• Value: building6
Step 3 From the Operations list in the Intent menu, click Create Backup Configuration. The Create Backup Configuration
dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Backup Configuration Dialog Box Fields table
then continue.
Properties Description
General
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
80
Configuring Cisco Cloud Network Controller Components
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
81
Configuring Cisco Cloud Network Controller Components
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI
Properties Description
Backup Object
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
82
Configuring Cisco Cloud Network Controller Components
Creating a Backup Configuration Using the Cisco Cloud Network Controller GUI
Properties Description
Choose the root hierarchical content to consider for the
backup
• Policy Universe
• Selector Object—When chosen, this option adds the
Object Type drop-down list and Object DN field.
a. From the Object Type drop-down list, choose
from the following options:
• Tenant—When chosen the Select Tenant
option appears.
• Application Profile—When chosen the
Select Application Profile option appears.
• EPG—When chosen the Select EPG option
appears.
• Contract—When chosen the Select Contract
option appears.
• Filter—When chosen the Select Filter option
appears.
• VRF—When chosen the Select VRFoption
appears.
• Device—When chosen the Select
fvcloudLBCtxoption appears.
• Service Graph—When chosen the Select
Service Graph option appears.
• Cloud Context Profile—When chosen the
Select Cloud Context Profile option appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
83
Configuring Cisco Cloud Network Controller Components
Creating a Tech Support Policy Using the Cisco Cloud Network Controller GUI
Properties Description
specific object to use as the root of the object tree
to backup.
Creating a Tech Support Policy Using the Cisco Cloud Network Controller GUI
This section explains how to create a tech support policy.
Step 3 From the Operations list in the Intent menu, click Create Tech Support. The Create Tech Support dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Tech Support Dialog Box Fields table then
continue.
Properties Description
General
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
84
Configuring Cisco Cloud Network Controller Components
Creating a Trigger Scheduler Using the Cisco Cloud Network Controller GUI
Properties Description
Include Pre-Upgrade Logs Click to place a check in the Enabled check box if you
want to include pre-upgrade logs in the tech support policy.
Trigger After Creation Click to place a check in the Enabled (the default) check
box if you want to create the tech support policy after the
policy creation. To disable, click the check box to uncheck.
Creating a Trigger Scheduler Using the Cisco Cloud Network Controller GUI
This section explains how to create a trigger scheduler.
Step 3 From the Operations list in the Intent menu, click Create Scheduler. The Create Trigger Scheduler dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Trigger Scheduler Dialog Box Fields table
then continue.
Properties Description
General
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
85
Configuring Cisco Cloud Network Controller Components
Creating a Trigger Scheduler Using the Cisco Cloud Network Controller GUI
Properties Description
Add One Time Window Click Add One Time Window. The Add One Time
Window dialog appears.
a. From the Start Time field, enter a date and time.
b. From the Maximum Concurrent Tasks field, enter a
number or leave the field blank to specify unlimited.
c. From the Maximum Running Time, click to choose
Unlimited or Custom.
d. Click Add when finished.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
86
Configuring Cisco Cloud Network Controller Components
Creating a Remote Location Using the Cisco Cloud Network Controller GUI
Creating a Remote Location Using the Cisco Cloud Network Controller GUI
This section explains how to create a remote location using the Cisco Cloud Network Controller.
Step 3 From the Operations list in the Intent menu, click Create Remote Location. The Create Remote Location dialog box
appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Remote Location Dialog Box Fields table then
continue.
Properties Description
General
Settings
Authentication Type When using SFTP or SCP, choose the authentication type:
• Password
• SSH Key
Confirm Password Reenter the password for accessing the remote location.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
87
Configuring Cisco Cloud Network Controller Components
Creating a Login Domain Using the Cisco Cloud Network Controller GUI
Properties Description
Creating a Login Domain Using the Cisco Cloud Network Controller GUI
This section explains how to create a login domain using the Cisco Cloud Network Controller GUI.
Step 3 From the Administrative list in the Intent menu, click Create Login Domain. The Create Login Domain dialog box
appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table then
continue.
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
88
Configuring Cisco Cloud Network Controller Components
Creating a Login Domain Using the Cisco Cloud Network Controller GUI
Properties Description
Advanced Settings Displays the Authentication Type and LDAP Group Map
Rules fields.
Authentication Type When LDAP is chosen for realm option, choose one of the
following authentication types:
• Cisco AV Pairs—(Default)
• LDAP Group Map Rules—Requires adding LDAP
group map rules.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
89
Configuring Cisco Cloud Network Controller Components
Creating a Login Domain Using the Cisco Cloud Network Controller GUI
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
90
Configuring Cisco Cloud Network Controller Components
Creating a Provider Using the Cisco Cloud Network Controller GUI
Step 3 From the Administrative list in the Intent menu, click Create Provider. The Create Provider dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Provider Dialog Box Fields table then continue.
Properties Description
Type Click the Type drop-down list and choose one of the
following types:
• LDAP
• RADIUS
• TACACS+
• SAML
[LDAP] Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
91
Configuring Cisco Cloud Network Controller Components
Creating a Provider Using the Cisco Cloud Network Controller GUI
Properties Description
SSL To enable SSL, click to place a check in the SSL check box.
To disable SSL, click to remove the check from the SSL
check box. The default is enabled.
Filter Enter an LDAP filter in the text box. This option only
appears when the Custom filter type is chosen.
[RADIUS] Settings
Port Enter the port number for the RADIUS settings. The default
is 1812.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
92
Configuring Cisco Cloud Network Controller Components
Creating a Provider Using the Cisco Cloud Network Controller GUI
Properties Description
[TACACS+] Settings
Port Enter the port number for the TACACS+ settings. The
default is 1812.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
93
Configuring Cisco Cloud Network Controller Components
Creating a Provider Using the Cisco Cloud Network Controller GUI
Properties Description
[SAML] Settings
Identity Provider Metadata URL Enter the metatdata URL provided by the identity provider.
HTTPS Proxy for Metadata URL Enter the HTTPS proxy used to reach the identity provider's
metadata URL.
GUI Redirect Banner Message (URL) Enter the GUI redirect banner message.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
94
Configuring Cisco Cloud Network Controller Components
Creating a Security Domain Using the Cisco Cloud Network Controller GUI
Properties Description
Signature Algorithm Authentication User Requests* Click the Signature Algorithm for Requests drop-down
list and choose one of the following:
• RSA SHA1
• RSA SHA224
• RSA SHA256
(Default)
• RSA SHA384
• RSA SHA512
Sign SAML Authentication Requests To enable, click to place a check in the check box. To
disable, click to remove the check from the check box. The
default is enabled.
Sign SAML Response Message To enable, click to place a check in the check box. To
disable, click to remove the check from the check box. The
default is enabled.
Sign Assertions in SAML Response To enable, click to place a check in the check box. To
disable, click to remove the check from the check box. The
default is enabled.
Encrypt SAML Assertions To enable, click to place a check in the check box. To
disable, click to remove the check from the check box. The
default is enabled.
Creating a Security Domain Using the Cisco Cloud Network Controller GUI
A security domain restricts the tenant to the security domains that you add. If you do not add a security domain,
all security domains will have access to this tenant. This section explains how to create a security domain
using the GUI.
Step 3 From the Administrative list in the Intent menu, click Create Security Domain. The Create Security Domain dialog
box appears.
Step 4 In the Name field, enter the name of the security domain.
Step 5 In the Description field, enter a description of the security domain.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
95
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Step 3 From the Administrative list in the Intent menu, click Create Role. The Create Role dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Role Dialog Box Fields table then continue.
Properties Description
General
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
96
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Properties Description
Privilege
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
97
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Properties Description
Click to place a check mark in the check boxes of the
privileges you want to assign the user. The privileges are:
• aaa—Used for configuring authentication,
authorization, accouting and import/export policies.
• access-connectivity-l1Used for Layer 1 configuration
under infra. Example: selectors and port Layer 1 policy
configurations.
• access-connectivity-l2—Used for Layer 2
configuration under infra. Example: Encap
configurations on selectors, and attachable entity.
• access-connectivity-l3—Used for Layer 3
configuration under infra and static route
configurations under a tenant's L3Out.
• access-connectivity-mgmt—Used for management
infra policies.
• access-connectivity-util—Used for tenant ERSPAN
policies.
• access-equipment—Used for access port
configuration.
• access-protocol-l1—Used for Layer 1 protocol
configurations under infra.
• access-protocol-l2—Used for Layer 2 protocol
configurations under infra.
• access-protocol-l3—Used for Layer 3 protocol
configurations under infra.
• access-protocol-mgmt—Used for fabric-wide policies
for NTP, SNMP, DNS, and image management.
• access-protocol-ops—Used for operations-related
access policies such as cluster policy and firmware
policies.
• access-protocol-util—Used for tenant ERSPAN
policies.
• access-qos—Used for changing CoPP and QoS-related
policies.
• admin—Complete access to everything (combine ALL
roles)
• fabric-connectivity-l1—Used for Layer 1
configuration under the fabric. Example: selectors and
port Layer 1 policy and vPC protection.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
98
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Properties Description
• fabric-connectivity-l2—Used in firmware and
deployment policies for raising warnings for estimating
policy deployment impact.
• fabric-connectivity-l3—Used for Layer 3
configuration under the fabric. Example: Fabric IPv4
and MAC protection groups.
• fabric-connectivity-mgmt—Used for atomic counter
and diagnostic policies on leaf switches and spine
switches.
• fabric-connectivity-util—Used for atomic counter,
diagnostic, and image management policies on leaf
switches and spine switches.
• fabric-equipment—Used for atomic counter,
diagnostic, and image management policies on leaf
switches and spine switches.
• fabric-protocol-l1—Used for Layer 1 protocol
configurations under the fabric.
• fabric-protocol-l2—Used for Layer 2 protocol
configurations under the fabric.
• fabric-protocol-l3—Used for Layer 3 protocol
configurations under the fabric.
• fabric-protocol-mgmt—Used for fabric-wide policies
for NTP, SNMP, DNS, and image management.
• fabric-protocol-ops—Used for ERSPAN and health
score policies.
• fabric-protocol-util—Used for firmware management
traceroute and endpoint tracking policies.
• none—No privilege.
• nw-svc-device—Used for managing Layer 4 to Layer
7 service devices.
• nw-svc-devshare—Used for managing shared Layer
4 to Layer 7 service devices.
• nw-svc-params—Used for managing Layer 4 to Layer
7 service policies.
• nw-svc-policy—Used for managing Layer 4 to Layer
7 network service orchestration.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
99
Configuring Cisco Cloud Network Controller Components
Creating a Role Using the Cisco Cloud Network Controller GUI
Properties Description
• ops—Used for operational policies including
monitoring and troubleshooting policies such as atomic
counter, SPAN, TSW, tech support, traceroute,
analytics, and core policies.
• tenant-connectivity-l1—Used for Layer 1 connectivity
changes, including bridge domains and subnets.
• tenant-connectivity-l2—Used for Layer 2 connectivity
changes, including bridge domains and subnets.
• tenant-connectivity-l3—Used for Layer 3 connectivity
changes, including VRFs.
• tenant-connectivity-mgmt—Used for tenant in-band
and out-of-band management connectivity
configurations and for debugging/monitoring policies
such as atomic counters and health score.
• tenant-connectivity-util—Used for atomic counter,
diagnostic, and image management policies on leaf
switches and spine switches.
• tenant-epg—Used for managing tenant configurations
such as deleting/creating endpoint groups, VRFs, and
bridge domains.
• tenant-ext-connectivity-l2—Used for managing tenant
L2Out configurations.
• tenant-ext-connectivity-l3—Used for managing tenant
L3Out configurations.
• tenant-ext-connectivity-mgmt—Used as write access
for firmware policies.
• tenant-ext-connectivity-util—Used for
debugging/monitoring/observer policies such as
traceroute, ping, oam, and eptrk.
• tenant-ext-protocol-l1—Used for managing tenant
external Layer 1 protocols. Generally only used for
write access for firmware policies.
• tenant-ext-protocol-l2—Used for managing tenant
external Layer 2 protocols. Generally only used for
write access for firmware policies.
• tenant-ext-protocol-l3—Used for managing tenant
external Layer 3 protocols such as BGP, OSPF, PIM,
and IGMP.
• tenant-ext-protocol-mgmt—Used as write access for
firmware policies.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
100
Configuring Cisco Cloud Network Controller Components
Creating an RBAC Rule Using the Cisco Cloud Network Controller GUI
Properties Description
• tenant-ext-protocol-util—Used for
debugging/monitoring/observer policies such as
traceroute, ping, oam, and eptrk.
• tenant-network-profile—Used for managing tenant
configurations, such as deleting and creating network
profiles, and deleting and creating endpoint groups.
• tenant-protocol-l1—Used for managing
configurations for Layer 1 protocols under a tenant.
• tenant-protocol-l2—Used for managing
configurations for Layer 2 protocols under a tenant.
• tenant-protocol-l3—Used for managing
configurations for Layer 3 protocols under a tenant.
• tenant-protocol-mgmt—Only used as write access
for firmware policies.
• tenant-protocol-ops—Used for tenant traceroute
policies.
• tenant-protocol-util—Used for
debugging/monitoring/observer policies such as
traceroute, ping, oam, and eptrk.
• tenant-qos—Only used as Write access for firmware
policies.
• tenant-security—Used for Contract related
configurations for a tenant.
• vmm-connectivity—Used to read all the objects in
APIC's VMM inventory required for VM connectivity.
• vmm-ep—Used to read VM and Hypervisor endpoints
in the APIC's VMM inventory.
• vmm-policy—Used for managing policies for VM
networking.
• vmm-protocol-ops—Not used by VMM policies.
• vmm-security—Used for Contract related
configurations for a tenant.
Creating an RBAC Rule Using the Cisco Cloud Network Controller GUI
This section explains how to create an RBAC rule using the GUI.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
101
Configuring Cisco Cloud Network Controller Components
Creating a Certificate Authority Using the Cisco Cloud Network Controller GUI
Step 3 From the Administrative list in the Intent menu, click Create RBAC Rule. The Create RBAC Rule dialog box appears.
Step 4 In the DN field, enter the DN for the rule.
Step 5 Choose a security domain:
a) Click Select Security Domain. The Select Security Domain dialog box appears.
b) From the Select Security Domain dialog box, click to choose a security domain from the column on the left then
click Select. You return to the Create RBAC Rule dialog box.
Step 6 From the Allow Writes field, click Yes to allow writes or No to not allow writes.
Step 7 Click Save when finished.
Creating a Certificate Authority Using the Cisco Cloud Network Controller GUI
This section explains how to create a certificate authority using the GUI.
Step 3 From the Administrative list in the Intent menu, click Create Certificate Authority. The Create Certificate Authority
dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Certificate Authority Dialog Box Fields table
then continue.
Properties Description
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
102
Configuring Cisco Cloud Network Controller Components
Creating a Key Ring Using the Cisco Cloud Network Controller GUI
Properties Description
Certificate Chain Enter the certificate chain in the Certificate Chain text
box.
Note Add the certificates for a chain in the following
order:
a. CA
b. Sub-CA
c. Subsub-CA
d. Server
Creating a Key Ring Using the Cisco Cloud Network Controller GUI
This section explains how to create a key ring using the Cisco Cloud Network Controller GUI.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
103
Configuring Cisco Cloud Network Controller Components
Creating a Key Ring Using the Cisco Cloud Network Controller GUI
Step 3 From the Administrative list in the Intent menu, click Create Key Ring. The Create Key Ring dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Key Ring Dialog Box Fields table then continue.
Properties Description
Settings
Private Key Enter an existing key in the Private Key text box (for the
Import Existing Key option).
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
104
Configuring Cisco Cloud Network Controller Components
Creating a Local User Using the Cisco Cloud Network Controller GUI
Properties Description
Creating a Local User Using the Cisco Cloud Network Controller GUI
This section explains how to create a local user using the Cisco Cloud Network Controller GUI.
Step 3 From the Administrative list in the Intent menu, click Create Local User. The Create Local User dialog box appears.
Step 4 Enter the appropriate values in each field as listed in the following Create Local User Dialog Box Fields table then
continue.
Properties Description
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
105
Configuring Cisco Cloud Network Controller Components
Creating a Local User Using the Cisco Cloud Network Controller GUI
Properties Description
Step 5 Click Advanced Settings and enter the appropriate values in each field as listed in the following Create Local User
Dialog Box Fields: Advanced Settings table then continue.
Table 23: Create Local User Dialog Box Fields: Advanced Settings
Property Description
Account Expires If you choose Yes, the account is set to expire at the time
that you choose.
Password Update Required If you choose Yes, the user must change the password upon
the next login.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
106
Configuring Cisco Cloud Network Controller Components
Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud Network Controller GUI
Property Description
Step 3 From the Configuration list in the Intent menu, click Cisco Cloud Network Controller Setup.
The Set up - Overview dialog box appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
107
Configuring Cisco Cloud Network Controller Components
Managing Regions (Configuring a Cloud Template) Using the Cisco Cloud Network Controller GUI
Step 10 Enter a value in the BGP Autonomous System Number for CCRs field.
The BGP ASN can be in the range of 1 - 65534.
Step 11 In the Assign Public IP to CCR Interface field, determine if you want to assign public IP addresses to the Catalyst
8000V interfaces.
Private IP addresses are assigned to the Catalyst 8000V interfaces by default. The Assign Public IP to CCR Interface
option determines whether public IP addresses will also be assigned to the Catalyst 8000V interfaces or not.
By default, the Enabled check box is checked. This means that public IP addresses can be assigned to the Catalyst
8000Vs.
• If you want public IP addresses assigned to the Catalyst 8000Vs in addition to the private IP addresses, leave the
check in the box next to Enabled.
• If you want only private IP addresses assigned to the Catalyst 8000Vs, remove the check in the box next to Enabled
to disable this option.
Note that changing the Catalyst 8000V connectivity from private to public, or vice versa, may cause disruption in your
network.
Note Both the public and private IP addresses assigned to a CCR are displayed with the other details of the router
in the Cloud Resources area. If public IP addresses are not assigned to a CCR, only the private IP addresses
are displayed.
Step 12 To chose the number of routers per region, click the Number of Routers Per Region drop-down list and click 2, 3, or
4.
Step 13 Enter a username in the Username text box.
Step 14 Enter a password in the Password and Confirm Password text boxes.
Step 15 To choose the throughput value, click the Throughput of the routers drop-down list.
Note • Cloud routers should be undeployed from all regions before changing the throughput or login credentials.
• For information on the throughput values for the Cisco Catalyst 8000V, see About the Cisco Catalyst
8000V, on page 20.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
108
Configuring Cisco Cloud Network Controller Components
Configuring Cisco Cloud Network Controller Using the REST API
Step 16 (Optional) To specify the license token, enter the product instance registration token in the License Token text box.
Note • For licensing information for the Cisco Catalyst 8000V, see About the Cisco Catalyst 8000V, on page
20.
• If no token is entered, the CCR will be in EVAL mode.
• If the public IP addresses are disabled to the CCRs in Step 11, on page 108, the only supported option
is AWS Direct Connect or Azure Express Route to Cisco Smart Software Manager (CSSM) when
registering smart licensing for CCRs with private IP addresses (available by navigating to
Administrative > Smart Licensing). You must provide reachability to the CSSM through AWS Direct
Connect or Azure Express Route in this case. When the public IP addresses are disabled, public internet
cannot be used because private IP addresses are being used. The connectivity should therefore use Private
Connection, which is AWS Direct Connect or Azure Express Route.
Step 18 To enter a peer public IP address of the IPsec Tunnel peer on-premises in the text box, click Add Public IP of IPSec
Tunnel Peer.
Step 19 Enter the OSPF area ID in the OSPF Area Id text box.
Step 20 To add an external subnet pool, click Add External Subnet and enter a subnet pool in the text box.
Step 21 When you have configured all the connectivity options, click Next at the bottom of the page.
Step 22 Click Save and Continue when finished.
To create a tenant:
<polUni>
<fvTenant name="infra">
<cloudAwsProvider region="us-east-1" accessKeyId="123" secretAccessKey="ABCDE" providerId="admin"
status=""/>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
109
Configuring Cisco Cloud Network Controller Components
Creating a Contract Using the REST API
</fvTenant>
</polUni>
To create a contract:
Example:
<polUni>
<fvTenant name="t2" status="">
<vzFilter descr="" name="http-family-destination" ownerKey="" ownerTag="">
<vzEntry name="http" prot="tcp" etherT="ip" dFromPort="http" dToPort="http"/>
<vzEntry name="https" prot="tcp" etherT="ip" dFromPort="https" dToPort="https"/>
</vzFilter>
<vzBrCP name="httpFamily">
<vzSubj name="default" revFltPorts="yes" targetDscp="unspecified">
<vzRsSubjFiltAtt action="permit" directives="" tnVzFilterName="http-family-destination"/>
</vzSubj>
</vzBrCP>
</fvTenant>
</polUni>
To create a cloud context profile using the cloud availability zones, enter a post such as the following example.
If you are creating a cloud context profile in a user tenant, you are restricted to only cloud availability zones. The cloud
availability zones are created through the zone field highlighted below. For more information on the cloud availability
zones, see Availability Zones, on page 27.
Example:
<polUni>
<fvTenant name="Corp1" status="">
<cloudAwsProvider accessKeyId="" secretAccessKey="" providerId="aws" status="" accountId=""/>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
110
Configuring Cisco Cloud Network Controller Components
Managing a Cloud Region Using the REST API
<bgpRtTargetP af="ipv4-ucast">
<bgpRtTarget rt="route-target:as4-nn2:400:400" type="export"/>
<bgpRtTarget rt="route-target:as4-nn2:400:400" type="import"/>
</bgpRtTargetP>
</fvCtx>
<cloudCtxProfile name="prod-web-east-1">
<cloudRsCtxProfileToRegion tDn="uni/clouddomp/provp-aws/region-us-east-1"/>
<cloudRsToCtx tnFvCtxName="prod-1"/>
<cloudRouterP name="RouterP1" type="vpn-gw">
<cloudRsToVpnGwPol tnCloudVpnGwPolName="VgwPol"/>
<cloudIntNetworkP name="IntNetworkP1"/>
</cloudRouterP>
<cloudCidr addr="10.10.0.0/16" primary="yes">
<cloudSubnet ip="10.10.1.0/24" usage="gateway" scope="public" zone=”us-west-1a"/>
<cloudSubnet ip="10.10.2.0/24" scope="public" zone=”us-west-1b"/>
</cloudCidr>
</cloudCtxProfile>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
111
Configuring Cisco Cloud Network Controller Components
Creating a Filter Using the REST API
<polUni>
<cloudDomP name="dom-us-east-2">
<cloudBgpAsP asn="64513"/>
<cloudProvP vendor="aws">
<cloudRegion name="us-east-2" adminSt="managed">
<cloudZone name="us-east-2a"/>
<cloudZone name="us-east-2b"/>
</cloudRegion>
</cloudProvP>
</cloudDomP>
</polUni>
To create a filter:
https://<IP_Address>/api/node/mo/.xml
<polUni>
<fvTenant name="intervpc" >
<fvCtx name="VRF1"/>
<cloudApp name="CloudAP1" >
<cloudEPg name="CloudEPG1" >
<cloudRsCloudEPgCtx tnFvCtxName="VRF1"/>
<fvRsProv tnVzBrCPName="Contract2” > </fvRsProv>
<cloudEPSelector name="sel1" matchExpression="custom:epgtag=='cloudepg1'" />
</cloudEPg>
</cloudApp>
</vzFilter>
</vzSubj>
</vzBrCP>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
112
Configuring Cisco Cloud Network Controller Components
Creating an Application Profile Using the REST API
https://<IP_Address>/api/node/mo/.xml
<polUni>
<fvTenant name="intervpc" >
<fvCtx name="VRF1"/>
<cloudApp name="CloudAP1" >
</cloudApp>
</vzFilter>
<vzBrCP name="Contract2" scope="global">
<vzSubj name="test-subj" >
<vzRsSubjFiltAtt action="permit" tnVzFilterName="http" directives="none" />
</vzSubj>
</vzBrCP>
</fvTenant>
</polUni>
<polUni>
<fvTenant name="t2" status="">
<!-- Tenant provide AWS credentials -->
<cloudAwsProvider region="us-east-2" accessKeyId="123" secretAccessKey="ABCDE" providerId="admin"/>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
113
Configuring Cisco Cloud Network Controller Components
Creating an External Cloud EPG Using the REST API
<polUni>
<fvTenant name="t2" status="">
<!-- Tenant provide AWS credentials -->
<cloudAwsProvider region="us-east-2" accessKeyId="123" secretAccessKey="ABCDE" providerId="admin"/>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
114
Configuring Cisco Cloud Network Controller Components
Creating a Cloud Template Using the REST API
Step 1 To create a cloud template for the BYOL Licensing Model Cisco Catalyst 8000V:
<polUni>
<fvTenant name="infra">
<cloudtemplateInfraNetwork name="default" vrfName="overlay-1">
<cloudtemplateProfile name="default" routerUsername="admin" routerPassword="rtpssw"
routerThroughput="15"
routerLicenseToken="hYjZhYjItYTg0mrtrL15ocStS%0AUzRSZz0%3"
routerMgmtInterfacePublicIp="yes" routerDataInterfacePublicIp="yes"/>
<cloudtemplateExtSubnetPool subnetpool="10.20.0.0/16"/>
<cloudtemplateIntNetwork name="default">
<cloudRegionName provider="aws" region="us-west-1"/>
<cloudRegionName provider="aws" region="us-west-2"/>
</cloudtemplateIntNetwork>
<cloudtemplateExtNetwork name="default">
<cloudRegionName provider="aws" region="us-west-2"/>
<cloudtemplateVpnNetwork name="default">
<cloudtemplateOspf area="0.0.0.1"/>
</cloudtemplateVpnNetwork>
</cloudtemplateExtNetwork>
</cloudtemplateInfraNetwork>
</fvTenant>
</polUni>
Note Tier2 (T2) is the default throughput supported by Cisco Cloud Network Controller, which is indicated by the
property routerThroughput in the cloudtemplateProfile managed object above.
Step 2 To create a cloud template for the PAYG Licensing Model Cisco Catalyst 8000V:
<polUni>
<fvTenant name="infra">
<cloudtemplateInfraNetwork name="default" vrfName="overlay-1">
<cloudtemplateProfile name="default" routerUsername="admin" routerPassword="rtpssw"
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
115
Configuring Cisco Cloud Network Controller Components
Creating a Cloud Template Using the REST API
routerThroughput="PAYG"
vmName="c5.4xlarge" routerMgmtInterfacePublicIp="yes" routerDataInterfacePublicIp="yes"/>
<cloudtemplateExtSubnetPool subnetpool="10.20.0.0/16"/>
<cloudtemplateIntNetwork name="default">
<cloudRegionName provider="aws" region="us-west-1"/>
<cloudRegionName provider="aws" region="us-west-2"/>
</cloudtemplateIntNetwork>
<cloudtemplateExtNetwork name="default">
<cloudRegionName provider="aws" region="us-west-2"/>
<cloudtemplateVpnNetwork name="default">
<cloudtemplateOspf area="0.0.0.1"/>
</cloudtemplateVpnNetwork>
</cloudtemplateExtNetwork>
</cloudtemplateInfraNetwork>
</fvTenant>
</polUni>
On selecting PAYG throughput user must also select the vmName from a list of vmName which is already created by
Cisco Cloud Network Controller, and is represented by a managed object cloudProvVmType.
The following table lists the vmNamesTypes that are indicated by the property vmName in the cloudtemplateProfile
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
116
Configuring Cisco Cloud Network Controller Components
Configuring VRF Leak Routes Using the REST API
Step 1 Enter a post similar to the following to enable or disable contract-based routing.
<fvTenant name=”infra”>
<cloudVrfRouteLeakPol name="default" allowContractBasedRouting=”true”/>
</fvTenant>
Step 2 Enter a post similar to the following to use the leakInternalPrefix field to configure route leaking for all cloud CIDRs
associated with the VRFs.
<fvTenant name=”t1”>
<fvCtx name="v1">
<leakRoutes>
<leakInternalPrefix ip="0.0.0.0/0" le="32">
<leakTo tenantName="t2" ctxName="v2" scope="public"/>
</leakInternalPrefix>
</leakRoutes>
</fvCtx>
</fvTenant>
<fvTenant name=”t2”>
<fvCtx name="v2">
<leakRoutes>
<leakInternalPrefix ip="0.0.0.0/0" le="32">
<leakTo tenantName="t1" ctxName="v1" scope="public"/>
</leakInternalPrefix>
</leakRoutes>
</fvCtx>
</fvTenant>
Step 3 Enter a post similar to the following to use the leakInternalSubnet field to leak specific routes between a pair of VRFs.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
117
Configuring Cisco Cloud Network Controller Components
Configuring the Source Interface Selection for Tunnels Using the REST API
Configuring the Source Interface Selection for Tunnels Using the REST API
Before you begin
Review the information provided in Source Interface Selection for Tunnels, on page 9 before proceeding
with these instructions.
Enter a post similar to the following to configure the source interface selection for tunnels.
<cloudtemplateIntNetwork name="default">
<cloudRegionName provider="aws" region="us-west-1"/>
<cloudRegionName provider="aws" region="us-west-2"/>
</cloudtemplateIntNetwork>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
118
CHAPTER 5
Viewing System Details
• Monitoring VM Host Metrics, on page 119
• Viewing Application Management Details, on page 122
• Viewing Cloud Resource Details, on page 123
• Viewing Operations Details, on page 124
• Viewing Infrastructure Details, on page 126
• Viewing Administrative Details, on page 126
• Viewing Health Details Using the Cisco Cloud Network Controller GUI, on page 128
Step 1 In the Cisco Cloud Network Controller GUI, navigate to Infrastructure > System Configuration, then click on the
Management Access tab.
Step 2 In the HTTPS area to the right of the window, note the entry in the Node Exporter field.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
119
Viewing System Details
Monitoring VM Host Metrics Using the GUI
• Enabled: The Prometheus Node Exporter has already been enabled. You do not have to continue with these
instructions in that case.
• Disabled: The Prometheus Node Exporter is not enabled yet. Proceed with these instructions to enable the Prometheus
Node Exporter.
Step 3 Click the pencil icon in the HTTPS area to edit the HTTPS settings.
The HTTPS Settings window appears.
A warning message appears, telling you that saving these settings will restart the web service, and that it will take a
moment for it to resume responding to requests. Click OK to confirm these changes.
Step 6 In the HTTPS area to the right of the window, verify that the entry in the Node Exporter field is set to Enabled.
This verifies that the Prometheus Node Exporter is enabled.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
120
Viewing System Details
Monitoring VM Host Metrics Using the REST API
Step 7 Click the link under the Enabled text in the Node Exporter area.
Another tab in your browser appears, showing the metrics for the VM host where the Cisco Cloud Network Controller
is deployed.
Step 1 To determine if the Prometheus Node Exporter is enabled or not, send the following GET call:
GET https://<cloud-network-controller-ip-address>/api/mo/uni/fabric/comm-default/https.xml
Step 2 To monitor VM host metrics, send the following post to enable the Prometheus Node Exporter:
POST https://<cloud-network-controller-ip-address>/api/mo/uni/fabric/comm-default/https.xml
The metrics are displayed for the VM host where the Cisco Cloud Network Controller is deployed.
Step 3 To view the metrics using REST API, send the following GET call:
GET https://<cloud-network-controller-ip-address>/nodeexporter/metrics
Step 4 To disable the Prometheus Node Exporter, send the following post:
POST https://<cloud-network-controller-ip-address>/api/mo/uni/fabric/comm-default/https.xml
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
121
Viewing System Details
Viewing Application Management Details
Step 1 From the Navigation menu, choose the Application Management tab.
When the Application Management tab expands, a list of subtab options appear. See the Application Management
Options table for more information.
Cloud Context Profiles Displays cloud context profiles as rows in a summary table.
Step 2 Click the tab that represents the component with the details you want to view.
A summary table appears with items as rows in the table. For example, if you chose the Tenants subtab, a list of tenants
appear as rows in a summary table
You can filter the rows by clicking the Filter by Attributes bar. Choose the attribute, operator and filter-value. For example,
for filtering based on a tenant, choose Tenant == T1 (where T1 is the name of a tenant).
Step 3 To view a summary pane, click the row that represents the specific component you want to view.
Step 4 For more information, double-click the summary table row that represents the specific component you want to view.
A new dialog box appears over the work pane with any of the following tabs:
Note The tabs that appear differ between components and configurations.
• Overview—Provides a general overview of cloud resources, configuration relationships, and settings of the component.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
122
Viewing System Details
Viewing Cloud Resource Details
• Cloud Resources—Contains a list of subtabs that display the cloud resource information related to the component.
• Configuration—Contains one or more subtabs that display the configuration information related to the component.
• Statistics—Enables you to view statistics based on a chosen sampling interval and statistics type. The Statistics tab
may contain subtabs, depending on the component you are viewing.
• Event Analytics—Contains a list of subtabs that display faults, events, and audit logs.
Note The dialog box that appears over the work pane contains an edit button in the top-right corner between the
refresh button and the Actions button. When clicked, the edit button enables you to edit the chosen component.
Step 1 From the Navigation menu, choose the Cloud Resources tab.
When the Cloud Resources tab expands, a list of subtab options appear. See the Cloud Resource Options table for more
information.
Step 2 Click the tab that represents the component with the details you want to view.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
123
Viewing System Details
Viewing Operations Details
A summary table appears with items as rows in the table. For example, if you chose the Endpoints subtab, a list of
endpoints appear as rows in a summary table
You can filter the rows by selecting an attribute from the drop-down menu when you click the Filter by attributes bar.
The attributes displayed in the drop-down menu depend on the selected subtab.
Step 3 To view a summary pane, click the row that represents the specific component you want to view.
Step 4 For more information, double-click the summary table row that represents the specific component you want to view.
A new dialog box appears over the work pane with any of the following tabs:
Note The tabs that appear differ between components and configurations.
• Overview—Provides a general overview of cloud resources, configuration relationships, and settings of the component.
• Cloud Resources—Contains a list of subtabs that display the cloud resource information related to the component.
• Application Management—Contains a list of subtabs that display the ACI relation information related to the
component.
• Statistics—Enables you to view statistics based on a chosen sampling interval and statistics type. The Statistics tab
may contain subtabs, depending on the component you are viewing.
• Event Analytics—Contains a list of subtabs that display faults, events, and audit logs.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
124
Viewing System Details
Viewing Operations Details
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
125
Viewing System Details
Viewing Infrastructure Details
Step 2 Click the tab that represents the component you want to view.
A summary table appears with items as rows in the table. For example, if you chose the Active Sessions subtab, a list of
active sessions appear as rows in a summary table.
You can filter the rows by clicking the Filter by Attributes bar. Choose the attribute, operator and filter-value. For example,
for filtering based on a username, choose username == user1 (where user1 is a user logged into Cisco Cloud Network
Controller).
Step 3 To view a summary pane, click the row that represents the specific component you want to view.
Step 4 For more information, double-click the summary table row that represents the specific item you want to view.
A new dialog box appears over the work pane that displays additional information about the item you chose from the
summary table.
Inter-Region Connectivity Displays one pane with a map that contains the inter-region
connectivity view and additional panes for each region.
Inter-Site Connectivity Displays one pane with a map that contains the inter-site
connectivity view and additional panes for each region.
Step 2 Click the tab that represents the component with the details you want to view.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
126
Viewing System Details
Viewing Administrative Details
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
127
Viewing System Details
Viewing Health Details Using the Cisco Cloud Network Controller GUI
Step 2 Click the tab that represents the component you want to view.
For some options, a summary table appears with items as rows in the table (For example, if you choose the Users tab, a
list of users appear as rows in a summary table). To view a summary pane, click the row that represents the specific
component you want to view. To view more information, double-click the summary table row that represents the specific
item you want to view. A new dialog box appears over the work pane that displays additional information about the item
you chose from the summary table.
Note You can filter the rows by entering an attribute in the Filter by Attributes bar.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
128
Viewing System Details
Viewing Health Details Using the Cisco Cloud Network Controller GUI
Step 2 Click within the Fault Summary area in the Dashboard window.
The Event Analytics window appears, showing more detailed information for the specific fault level that you clicked.
The following screen shows an example Event Analytics window for the faults listed with critical severity.
Step 3 Click the X next to the Severity level to display Event Analytics information for all faults.
The information provided in the Event Analytics window changes to show the events with critical, major, and warning
levels of severity.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
129
Viewing System Details
Viewing Health Details Using the Cisco Cloud Network Controller GUI
Step 4 From the Navigation menu, choose the Cloud Resources tab.
When the Cloud Resources tab expands, a list of subtab options appear. See the Administrative Options table for more
information.
Step 5 Choose any item under the Cloud Resources tab to display health information for that component.
For example, the following figure shows health information that might be displayed when you click on Cloud Resources >
Regions, then you select a specific region.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
130
CHAPTER 6
Deploying Layer 4 to Layer 7 Services
• Overview, on page 131
• Deploying a Service Graph, on page 135
Overview
The Cisco Cloud Network Controller enables you to deploy Layer 4 to Layer 7 service devices to the public
cloud. This initial release supports application load balancer (ALB) deployments in Amazon Web Services
(AWS).
All listeners require you to configure at least one rule (a default rule, which does not have a condition). Rules
enable you to specify the action that the load balancer takes when a condition is met. For example, you can
create a rule that redirects traffic to a specified URL when a request is made to a specified hostname or path.
There are two deployment types: internet-facing and internal-facing. An internet-facing deployment inserts
the ALB as a service between the consumer external EPG and the provider cloud EPG. The following figure
shows the contract configuration within the VRF and the ALB as a service inserted between the consumer
external EPG and the provider cloud EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
131
Deploying Layer 4 to Layer 7 Services
About Application Load Balancers
An internal-facing deployment inserts the ALB as a service between the consumer cloud EPG and the provider
cloud EPG. The following figure shows the contract configuration within the VRF and the ALB as a service
inserted between the consumer cloud EPG and provider cloud EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
132
Deploying Layer 4 to Layer 7 Services
Dynamic Server Attachment to Server Pool
Note You can find more information about ALBs in the documentation on the AWS website.
EPGMap:<Epg1DN> 9090
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
133
Deploying Layer 4 to Layer 7 Services
About Service Graphs
You can specify EPGMap:<EpgDN> as the tag and the list of ports to be registered on the target group as a
list separated by commas.
After the graph is configured, the Cisco APIC automatically configures the services according to the service
function requirements that are specified in the service graph. The Cisco APIC also automatically configures
the network according to the needs of the service function that is specified in the service graph, which does
not require any change in the service device.
A service graph is represented as two or more tiers of an application with the appropriate service function
inserted between them.
A service appliance (device) performs a service function within the graph. One or more service appliances
might be required to render the services required by a graph. A single-service device can perform one or more
service functions.
Service graphs and service functions have the following characteristics:
• Traffic sent from specific endpoint groups can be redirected based on a policy.
• Service graph redirection is directional. In other words, redirection can be applied to both traffic directions
or either one of them.
• Logical functions can be rendered on the appropriate device, based on the policy.
• The service graph supports splits and joins of edges, and it does not restrict the administrator to linear
service chains.
• Traffic can be reclassified again in the network after a service appliance emits it.
By using a service graph, you can install a service, a load balancer, once and deploy it multiple times in
different logical topologies. Each time the graph is deployed, Cisco ACI takes care of changing the configuration
on the service device to enable the forwarding in the new logical topology.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
134
Deploying Layer 4 to Layer 7 Services
About Function Nodes
Function parameters can be specified when the service graph is rendered. For example, if the function node
is a load balancer, the listener and its rule can be specified for the function node at the time the graph is
rendered.
Deploying the Service Graph Using the Cisco Cloud Network Controller GUI
Creating a Load Balancer Using the Cisco Cloud Network Controller GUI
This section explains how to create a load balancer using the Cisco Cloud Network Controller GUI.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
135
Deploying Layer 4 to Layer 7 Services
Creating a Load Balancer Using the Cisco Cloud Network Controller GUI
Step 2 Click the Devices tab, then click Actions > Create Device.
The Create Device page appears.
Step 3 Enter the appropriate values in each field as listed in the following Create Device Dialog Box Fields table then continue.
Properties Description
General
Settings
Subnets You can specify only one subnet per availabilty zone. You must specifiy subnets from
at least two availability zones to increase the availability of your load balancer.
a. Click Add Subnet.
The Add Subnet dialog box appears.
b. In the Add Subnet dialog box, click Select Cloud Context Profile.
The Select Cloud Context Profile dialog box appears.
c. In the Select Cloud Context Profile dialog box, select a cloud context profile,
then click Select.
You are returned to the Add Subnet dialog box.
d. In the Add Subnet dialog box, click Select Subnet.
The Select Subnet dialog box appears.
e. In the Select Subnet dialog box, select a subnet, then click Select.
You are returned to the Add Subnet dialog box.
f. In the Add Subnet dialog box, click Add.
You are returned to the Create Device page.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
136
Deploying Layer 4 to Layer 7 Services
Creating a Service Graph Template Using the Cisco Cloud Network Controller GUI
Creating a Service Graph Template Using the Cisco Cloud Network Controller GUI
This section explains how to configure a service graph template using the Cisco Cloud Network Controller
GUI.
Step 2 Click the Service Graphs tab, then click Actions > Create Service Graph.
The Create Service Graph page appears.
Step 3 Enter the appropriate values in each field as listed in the following Create Service Graph Dialog Box Fields table then
continue.
Properties Description
General
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
137
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Properties Description
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
This section explains how to deploy Layer 4 to Layer 7 services.
Step 3 From the Configuration list in the Intent menu, click EPG Communication. The EPG Communication dialog box
appears with the Consumer EPGs, Contract, and Provider EPGs information.
Step 4 To choose a contract:
a) Click Select Contract. The Select Contract dialog appears.
b) In the pane on the left side of the Select Contract dialog, click to choose a contract then click Select. The Select
Contract dialog box closes.
Step 5 To add a consumer EPG:
a) Click Add Consumer EPGs. The Select Consumer EPGs dialog appears.
b) In the pane on the left side of the Select Consumer EPGs dialog, click to place a check in a check box to choose
a cloud EPG (for an internal facing load balancer) or a cloud external EPG (for an internet facing load balancer)
then click Select. The Select Consumer EPGs dialog box closes.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
138
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Step 9 Enter the appropriate values in each field as listed in the following Add Cloud Load Balancer Listener Dialog Box
Fields table then continue.
Table 32: Add Cloud Load Balancer Listener Dialog Box Fields
Properties Description
Port Enter the port that the device will accept traffic on.
Security Policy Click the drop-down list and choose a security policy (only
available when HTTPS is chosen).
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
139
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Properties Description
Add Rule To add rule settings to the device listener, click Add Rule.
A new row appears in the Rules list an the Rules Settings
fields are enabled.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
140
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Properties Description
Rule Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
141
Deploying Layer 4 to Layer 7 Services
Deploying Layer 4 to Layer 7 Services Using the Cisco Cloud Network Controller GUI
Properties Description
The Rule Settings pane contains the following options:
• Name—Enter a name for the rule.
• Host—Enter a hostname to create a host-based
condition. When a request is made for this hostname,
the action you specify is taken.
• Path—Enter a path to create a path-based condition.
When a request is made for this path, the action you
specify is taken.
• Type—The action type tells the device which action
to take. The action type options:
• Return fixed response—Returns a response
using the following options:
• Fixed Response Body—Enter a response
message.
• Fixed Response Code—Enter a response
code.
• Fixed response Content-Type—Choose
a content type.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
142
Deploying Layer 4 to Layer 7 Services
Deploying a Service Graph Using the REST API
Properties Description
• Redirect Hostname—Enter a hostname
for the redirect.
• Redirect Path—Enter a redirect path.
• Redirect Port—Enter the port that the
device will accept traffic on.
• Redirect Protocol—Click to the Redirect
Protocol drop-down list and choose HTTP,
HTTPS, or Inherit.
• Redirect Query—Enter a redirect query.
<polUni>
<fvTenant name="t2" status="">
<cloudLB name="ALB1" type="application" scheme="internal" status="">
<cloudRsLDevToCloudSubnet tDn="uni/tn-t2/ctxprofile-c1/cidr-[10.33.0.0/16]/subnet-[10.33.7.0/24]"
status=""/>
<cloudRsLDevToCloudSubnet tDn="uni/tn-t2/ctxprofile-c1/cidr-[10.33.0.0/16]/subnet-[10.33.8.0/24]"
status=""/>
</cloudLB>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
143
Deploying Layer 4 to Layer 7 Services
Creating a Service Graph Using the REST API
Example:
<polUni>
<fvTenant name="t2" status="">
<cloudLB name="ALB1" type="application" scheme="internet" status="">
<cloudRsLDevToCloudSubnet tDn="uni/tn-t2/ctxprofile-c1/cidr-[10.33.0.0/16]/subnet-[10.33.5.0/24]"
status=""/>
<cloudRsLDevToCloudSubnet tDn="uni/tn-t2/ctxprofile-c1/cidr-[10.33.0.0/16]/subnet-[10.33.6.0/24]"
status=""/>
</cloudLB>
</fvTenant>
</polUni>
<polUni>
<fvTenant name="t2">
<vnsAbsGraph name="CloudGraph" type="cloud" status="">
<vnsAbsTermNodeProv name="Input1">
<vnsAbsTermConn name="C1"/>
</vnsAbsTermNodeProv>
<vnsAbsTermNodeCon name="Output1">
<vnsAbsTermConn name="C2"/>
</vnsAbsTermNodeCon>
<vnsAbsNode funcType="GoTo" name="N1" managed="yes">
<vnsRsNodeToCloudLDev tDn="uni/tn-t2/clb-ALB1" status=""/>
<vnsAbsFuncConn name="provider"/>
<vnsAbsFuncConn name="consumer"/>
</vnsAbsNode>
<vnsAbsConnection connDir="consumer" connType="external" name="CON2">
<vnsRsAbsConnectionConns tDn="uni/tn-t2/AbsGraph-CloudGraph/AbsTermNodeCon-Output1/AbsTConn"/>
<vnsRsAbsConnectionConns tDn="uni/tn-t2/AbsGraph-CloudGraph/AbsNode-N1/AbsFConn-consumer"/>
</vnsAbsConnection>
<vnsAbsConnection connDir="provider" connType="internal" name="CON1">
<vnsRsAbsConnectionConns tDn="uni/tn-t2/AbsGraph-CloudGraph/AbsTermNodeProv-Input1/AbsTConn"/>
<vnsRsAbsConnectionConns tDn="uni/tn-t2/AbsGraph-CloudGraph/AbsNode-N1/AbsFConn-provider"/>
</vnsAbsConnection>
</vnsAbsGraph>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
144
Deploying Layer 4 to Layer 7 Services
Configuring an HTTP Service Policy Using the REST API
<polUni>
<fvTenant name="t2">
<vzBrCP name="httpFamily">
<vzSubj name="default" revFltPorts="yes" targetDscp="unspecified">
<vzRsSubjGraphAtt tnVnsAbsGraphName="CloudGraph"/>
</vzSubj>
</vzBrCP>
</fvTenant>
</polUni>
<polUni>
<fvTenant name="t2">
<vnsAbsGraph name="CloudGraph" type="cloud" status="">
<vnsAbsNode funcType="GoTo" name="N1" managed="yes">
<cloudSvcPolicy tenantName="t2" contractName="httpFamily" subjectName="consubj">
<cloudListener name="http_listener1" port="80" protocol="http" status="">
<cloudListenerRule name="rule1" priority="10" default="yes" status="">
<cloudRuleAction type="forward" port="80" protocol="http"
epgdn="uni/tn-t2/cloudapp-ap/cloudepg-provEPG"/>
</cloudListenerRule>
<cloudListenerRule name="redirectRule" priority="20">
<cloudRuleCondition type="path" value="/img/*"/>
<cloudRuleAction type="redirect" RedirectPort="8080"/>
</cloudListenerRule>
<cloudListenerRule name="FixedRspRule" priority="30">
<cloudRuleCondition type="host" value="example.com"/>
<cloudRuleAction type="fixedResponse" FixedResponseCode="200"/>
</cloudListenerRule>
<cloudListenerRule name="redirectHPRule" priority="40" status="">
<cloudRuleCondition type="host" value="example.com"/>
<cloudRuleCondition type="path" value="/img/*"/>
<cloudRuleAction type="forward" port="80" protocol="http"
epgdn="uni/tn-t2/cloudapp-ap/cloudepg-provEPG"/>
</cloudListenerRule>
</cloudListener>
</cloudSvcPolicy>
</vnsAbsNode>
</vnsAbsGraph>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
145
Deploying Layer 4 to Layer 7 Services
Configuring a Key Ring Using the REST API
<polUni>
<fvTenant name="t2">
<cloudCertStore>
<pkiKeyRing status="" name="lbCert" tp="lbTP" key="-----BEGIN RSA PRIVATE KEY-----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 -----END RSA PRIVATE KEY-----" cert="-----BEGIN
CERTIFICATE----- MIIElTCCA32gAwIBAgIJAKWNjp//arBsMA0GCSqGSIb3DQEBCwUAMIGNMQswCQYD
VQQGEwJVUzELMAkGA1UECBMCQ0ExETAPBgNVBAcTCFNhbiBKb3NlMRIwEAYDVQQK
EwlNeUNvbXBhbnkxDjAMBgNVBAsTBU15T3JnMRgwFgYDVQQDFA8qLmFtYXpvbmF3
cy5jb20xIDAeBgkqhkiG9w0BCQEWEXJhbXNoYWhAY2lzY28uY29tMB4XDTE4MTAw
MjIwNTMwNVoXDTE5MTAwMjIwNTMwNVowgY0xCzAJBgNVBAYTAlVTMQswCQYDVQQI
EwJDQTERMA8GA1UEBxMIU2FuIEpvc2UxEjAQBgNVBAoTCU15Q29tcGFueTEOMAwG
A1UECxMFTXlPcmcxGDAWBgNVBAMUDyouYW1hem9uYXdzLmNvbTEgMB4GCSqGSIb3
DQEJARYRcmFtc2hhaEBjaXNjby5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
ggEKAoIBAQDgMbFor5Ee/+dOgcueYMGrYF8uKaBf/M0lAL1sa7OvwyPt2bRe4d9B
ga/SHU+0vg93F/mqMHQ1seMBUHUbDxwOISsSABfL0qbbvJKjZ+gqvI2oJF4aKef8
KAXvlA8h53nrx5Jw0Nk+394x4cC5Ff8/KQpRq1ZadwZqeO8epz5I4s8XpMOBDmfA
4ccW/IzYNjxt91hataYaw7smpnNs8ym0DZBZuUguxKgit2QgiB/pl9jL8Q1sf6dg
3aslPyXNizHPRiZHShFAdOI3Y2INj9lXrfLEJd8uD2qk1kK4Pwo590Jk8Sry1qSJ
YHGJHn8dE+xxYB1ZCyiIqAbWTg0RsUD1AgMBAAGjgfUwgfIwHQYDVR0OBBYEFBYq
K3b39+1oOr4IBSsePwcOpML7MIHCBgNVHSMEgbowgbeAFBYqK3b39+1oOr4IBSse
PwcOpML7oYGTpIGQMIGNMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExETAPBgNV
BAcTCFNhbiBKb3NlMRIwEAYDVQQKEwlNeUNvbXBhbnkxDjAMBgNVBAsTBU15T3Jn
MRgwFgYDVQQDFA8qLmFtYXpvbmF3cy5jb20xIDAeBgkqhkiG9w0BCQEWEXJhbXNo
YWhAY2lzY28uY29tggkApY2On/9qsGwwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0B
AQsFAAOCAQEAe/RuzCheLIbHbrurGet6eaVx9DPYydNiKVBSAKO+5iuR84mQzhoT
nx5CN109xu5ml5baCYZZsSnn6D7usC092bPA/kRCGxt29gkjpWA74tJHqIhVWgbM
mOrLiSHoelewv+wRl0oVRChlTfKtXO68TUk6vrqpw76hKfOHIa7b2h1IIMdq6VA/
+A5FQ0xqYfqKdVd2RaINpzI8mqZiszqw+7E6j1PL5k4tftWEaYpfGPlVesFEyJEL
gHBUiPt8TIbaMYI8qUQmB/emnLXeKQ5PRxdRnleA3h8jfq3D1CQRTLjmDL3tpFwg qopM6et5ZKqShX4T87BsgZIoiquzXqsuHg==
-----END CERTIFICATE-----">
</pkiKeyRing>
<pkiTP status="" name="lbTP" certChain="-----BEGIN CERTIFICATE-----
MIIElTCCA32gAwIBAgIJAKWNjp//arBsMA0GCSqGSIb3DQEBCwUAMIGNMQswCQYD
VQQGEwJVUzELMAkGA1UECBMCQ0ExETAPBgNVBAcTCFNhbiBKb3NlMRIwEAYDVQQK
EwlNeUNvbXBhbnkxDjAMBgNVBAsTBU15T3JnMRgwFgYDVQQDFA8qLmFtYXpvbmF3
cy5jb20xIDAeBgkqhkiG9w0BCQEWEXJhbXNoYWhAY2lzY28uY29tMB4XDTE4MTAw
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
146
Deploying Layer 4 to Layer 7 Services
Creating an HTTPS Service Policy Using the REST API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 qopM6et5ZKqShX4T87BsgZIoiquzXqsuHg==
-----END CERTIFICATE-----">
</pkiTP>
</cloudCertStore>
</fvTenant>
</polUni>
Note A listener can have multiple certificates. The certificate options are:
• ELBSecurityPolicy-2016-08 – The default when no security policy is chosen.
• ELBSecurityPolicy-FS-2018-06
• ELBSecurityPolicy-TLS-1-2-2017-01
• ELBSecurityPolicy-TLS-1-2-Ext-2018-06
• ELBSecurityPolicy-TLS-1-1-2017-01
• ELBSecurityPolicy-2015-05
• ELBSecurityPolicy-TLS-1-0-2015-04
If you use multiple certificates, you must specify the default certificate. The default is specified using
the defaultCert property in cloudRsListenerToCert.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
147
Deploying Layer 4 to Layer 7 Services
Creating an HTTPS Service Policy Using the REST API
<polUni>
<fvTenant name="t2">
<vnsAbsGraph name="CloudGraph" type="cloud" status="">
<vnsAbsNode funcType="GoTo" name="N1" managed="yes">
<cloudSvcPolicy tenantName="t2" contractName="httpFamily" subjectName="consubj">
<cloudListener name="https_listener" port="443" protocol="https"
secPolicy="eLBSecurityPolicy-2016-08" status="">
<cloudRsListenerToCert defaultCert="yes" certStore="iam"
tDn="uni/tn-t2/certstore/keyring-lbCert" status=""/>
<cloudListenerRule name="defaultRule" default="yes" priority="100" status="">
<cloudRuleAction type="forward" port="80" protocol="http"
epgdn="uni/tn-t1/cloudapp-ap/cloudepg-ep1">
</cloudRuleAction>
</cloudListenerRule>
</cloudListener>
</cloudSvcPolicy>
</vnsAbsNode>
</vnsAbsGraph>
</fvTenant>
</polUni>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
148
CHAPTER 7
Cisco Cloud Network Controller Statistics
• About Cisco Cloud Network Controller Statistics, on page 149
• AWS Networking Interface Statistics Collection, on page 149
• Cisco Cloud Network Controller Endpoints and cloudEPg Statistics Processing, on page 150
• Cisco Cloud Network Controller Statistics Filters, on page 150
• AWS Transit Gateway Statistics, on page 151
• Enabling VPC Flow Logs, on page 152
• Cloud Router Statistics, on page 155
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
149
Cisco Cloud Network Controller Statistics
Cisco Cloud Network Controller Endpoints and cloudEPg Statistics Processing
CloudWatch for these flow records and parses these records to extract statistics. Because it can take up to 15
minutes to publish flow records to CloudWatch, the Cisco Cloud Network Controller delays its flow logs
query to CloudWatch by 15 minutes too. This means that there is a lag between the flow logs being present
in CloudWatch and the corresponding statistics showing up on the Cisco Cloud Network Controller. Cisco
Cloud Network Controller does not process flow records that take longer than 15 minutes to publish to
CloudWatch.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
150
Cisco Cloud Network Controller Statistics
AWS Transit Gateway Statistics
Note We recommend that you configure statistics filters using the Cisco Cloud Network Controller GUI. You
can alternatively use REST API; however, if you do and then switch to the GUI, the feature will appear
incomplete. You should stick to the method that you choose.
Use of statistics filters depend on enabling Virtual Private Cloud (VPC) flow log; you must enable the logs
before you configure the statistics filters.
Flow logs, which are stored in AWS CloudWatch, consist of flow log records. Cisco Cloud Network Controller
extracts statistics by parsing the flow log records.
It can take up to 15 minutes from the occurrence of a particular flow record to its being present in AWS
CloudWatch. Cisco Cloud Network Controller polls for flow records that occurred 15 minutes or more in the
past. It does not process flow records that take longer than 15 minutes to appear in AWS CloudWatch.
You can enable infra tenant Transit Gateway statistics collection from the Cisco Cloud Network Controller
Setup - Region Management page. See the section "Set Up the Cloud Site to Use AWS Transit Gateway"
in Increasing Bandwidth Between VPCs by Using AWS Transit Gateway.
You can enable user tenant Transit Gateway statistics collection by enabling flow logs on the user VPC. See
the sections Enabling VPC Flow Logs, on page 152 and Enabling VPC Flow Logs Using the Cisco Cloud
Network Controller GUI, on page 152 in this guide.
To view AWS Transit Gateway statistics, in the Cisco Cloud Network Controller GUI, click the Statistics
tab and then click AWS Transit Gateway in the left navigation pane. The central pane displays the information.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
151
Cisco Cloud Network Controller Statistics
Enabling VPC Flow Logs
Note The actual log group name that is programmed in AWS is the concatenation
of <tenant name><cloudCtxProfile name><log group name>.
• retention—The length of duration for storing the logs in CloudWatch. The default is 5-days.
Enabling VPC Flow Logs Using the Cisco Cloud Network Controller GUI
This section explains how to enable VPC flow logs using the Cisco Cloud Network Controller GUI.
Note If you want to use filters to see specific information from AWS flow logs, perform the optional steps in
this procedure.
Step 1 Click the Navigation menu and choose Application Management > Tenants.
The Tenants window appears with the tenants listed as rows in a summary table.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
152
Cisco Cloud Network Controller Statistics
Enabling VPC Flow Logs Using the Cisco Cloud Network Controller GUI
Step 6 Enter the appropriate values in each field as listed in the following Flow Log Collection Settings Dialog Box Fields table
then continue.
Properties Description
Type of Traffic to be Logged Click the Type of Traffic to be Logged drop-down list and
choose one of the following options:
• All Traffic (default)
• Accepted Only Traffic
• Rejected Only Traffic
Retention Click the Retention drop-down list and chose from the
following options:
• 1 day
• 3 days
• 5 days (default)
• 1 month
• 13 months
• 18 months
• 2 months
• 3 months
• 4 months
• 5 months
• 6 months
• 1 week
• 2 weeks
• 1 year
• 10 years
• 2 years
• 5 years
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
153
Cisco Cloud Network Controller Statistics
Enabling VPC Flow Logs Using the REST API
Step 7 (Optional) Add flow filters to get information about source and destination IP addresses, ports, or protocols by completing
the following tasks:
For information about statistics filters, see the section Cisco Cloud Network Controller Statistics Filters, on page 150.
a) Click Add Flow Filters at the bottom of the Flow Log Collection Settings dialog box.
Fields for the filter attributes appear.
After you click on the Add Flow Filters button, you will see a new filter being created; fill out the attributes.
b) In the Peer IP field, enter the IPv4 IP address of the peer.
The address needs to be in the format x.x.x.x/x. It tells the filter which network to monitor. An address of 0.0.0.0/0
will match all.
c) (Optional) From the Protocol drop-down list, choose a protocol to listen to.
The choices are integers from 0 to 255. Entering 255 will match any protocol. Well-known protocols are translated
when text format is given:
d) (Optional) In the Peer Port field, enter the port number to listen to.
This number must be an integer from 0 to 65535 or text input for a well-known port number. Entering 0 will match
any port. Well-known protocols are translated when text format is given:
e) (Optional) Check the Active check box and then click the check icon.
Step 8 Click Save.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
154
Cisco Cloud Network Controller Statistics
Cloud Router Statistics
The Cisco Cloud Network Controller collects and stores the cloud router statistics by the following granularities:
• 15-minutes
• 1-hour
• 1-month
• 1-year
Collection Mechanism
Each cloud router instance captures and stores the previously mentioned 4-stat values for each physical and
tunnel interface.
The Cisco Cloud Network Controller queries the cloud routers for these statistics and maps the response to
cloud router statistics on the Cisco Cloud Network Controller. The statistics query repeats every 5 minutes
for as long as the tunnel is up and operational.
Raw Statistics
The raw statistics are stored under 2 Dns:
• uni/tn-<infraTenant>/ctx-<infraCtx>/region-<infraRegion>/router-<csrname>/to-<ip or
user-region>/tunn-<tunnel-id>
• uni/tn-<userTenant>/ctx-<userCtx>/region-<userRegion>/region-<infraRegion>/router-<csrname>/tunn-<tunnel-id>
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
155
Cisco Cloud Network Controller Statistics
Cloud Router Statistics
Note • The second Dn holder is the statistics as seen from the user endpoints
connected to the cloud router. These statistics are hence flipped (Ingress
on the CCR becomes egress on the user region)
• Not all tunnels have a corresponding user dn. This is only applicable
to internal tunnels. External tunnels statistics are only available on the
1st Dn.
In the following figure, internal tunnels are between the user VPC and infra VPC. The infra VPC contains
the CCR router. The user VPC can contain the CCR or VGW router. Cisco Cloud Network Controller creates
these tunnels. As a result, statistics are available for both the infra side and the user side. External tunnels are
between infra VPC and an external IP address. Statistics are only available on the infra side (Dn-1).
In the logical model diagram, a tenant can be infra or a user tenant. You configure a VRF (or fvCtx) to be
inside a tenant (per tenant). A VRF can be within one region or span across multiple regions.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
156
Cisco Cloud Network Controller Statistics
Cloud Router Statistics
Aggregated Statistics
Statistics are aggregated at each parent level of the DN. For the preceding case, statistics on tunnel, statistics
are aggregated on to the destination IP, cloud router, region, vrf (ctx), and tenant.
For example, if you want to find the egress packets from the infra cloud router to a user region, it is available
under uni/tn-<infraTenant>/ctx-<infraCtx>/region-<infraRegion>/router-<csrname>/to-<ip or
user-region>/
If you want to get all the packets between user region1 and infra region2, it is available under
uni/tn-<userTenant>/ctx-<userCtx>/region-<userRegion>/region-<infraRegion>/
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
157
Cisco Cloud Network Controller Statistics
Cloud Router Statistics
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
158
CHAPTER 8
Cisco Cloud Network Controller Security
This chapter contains the following sections:
• Access, Authentication, and Accounting, on page 159
• Configuring TACACS+, RADIUS, LDAP and SAML Access, on page 160
• Configuring HTTPS Access, on page 167
Note There is a known limitation where you cannot have more than 32 characters for the login domain name.
In addition, the combined number of characters for the login domain name and the user name cannot
exceed 64 characters.
For more access, authentication, and accounting configuration information, see Cisco Cloud Network Controller
Security Configuration Guide.
.
Configuration
The admin account is configured in the initial configuration script, and the admin is the only user when the
system starts.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
159
Cisco Cloud Network Controller Security
Configuring TACACS+, RADIUS, LDAP and SAML Access
Overview
This topic provides step-by-step instructions on how to enable access to the Cisco Cloud Network Controller
for RADIUS, TACACS+, LDAP, and SAML users, including ADFS, Okta, and PingID.
For additional TACACS+, RADIUS, LDAP, and SAML information, see Cisco Cloud Network Controller
Security Configuration Guide.
Step 1 In the Cisco Cloud Network Controller, create the TACACS+ Provider.
a) Click the Global Create icon.
The Global Create menu appears.
b) Scroll down until you see the Administrative area, then click Create Provider under the Administrative area.
The Create Provider dialog box appears.
c) In the Host Name/IP Address field, enter the Host Name/IP Address of the provider.
d) In the Description field, enter a description of the provider.
e) Click the Type drop-down list and choose TACACS+.
f) In Settings section, specify the Key, Port, Authentication Protocol, Timeout, Retries, Management EPG. Select
either Enabled or Disabled for Server Monitoring.
Step 2 Create the Login Domain for TACACS+.
a) Click the Global Create icon.
The Global Create menu appears.
b) Click the drop-down arrow below the Global Create search box and choose Administrative.
A list of Administrative options appear in the Global Create menu.
c) From the Administrative list in the Global Create menu, click Create Login Domain.
The Create Login Domain dialog box appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
160
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for RADIUS Access
d) Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table
then continue.
Properties Description
General
Settings
What to do next
This completes the APIC TACACS+ configuration steps. Next, if a RADIUS server will also be used, configure
the APIC for RADIUS.
Step 1 In the Cisco Cloud Network Controller, create the RADIUS Provider.
a) Click the Global Create icon.
The Global Create menu appears.
b) Scroll down until you see the Administrative area, then click Create Provider under the Administrative area.
The Create Provider dialog box appears.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
161
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for RADIUS Access
c) In the Host Name/IP Address field, enter the Host Name/IP Address of the provider.
d) In the Description field, enter a description of the provider.
e) Click the Type drop-down list and choose RADIUS.
f) In the Settings section, specify the Key, Port, Authentication Protocol, Timeout, Retries, Management EPG.
Select either Enabled or Disabled for Server Monitoring.
Step 2 Create the Login Domain for RADIUS.
a) Click the Global Create icon.
The Global Create menu appears.
b) Click the drop-down arrow below the Global Create search box and choose Administrative
A list of Administrative options appear in the Global Create menu.
c) From the Administrative list in the Global Create menu, click Create Login Domain.
The Create Login Domain dialog box appears.
d) Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table
then continue.
Properties Description
General
Settings
What to do next
This completes the Cisco Cloud Network Controller RADIUS configuration steps. Next, configure the RADIUS
server.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
162
Cisco Cloud Network Controller Security
Configuring a Cisco Secure Access Control Server for RADIUS and TACACS+ Access to the Cisco Cloud Network Controller
Configuring a Cisco Secure Access Control Server for RADIUS and TACACS+
Access to the Cisco Cloud Network Controller
Refer to the section Configuring a Cisco Secure Access Control Server for RADIUS and TACACS+ Access to the APICin
the Cisco Cloud Network Controller Security Configuration Guide.
Configuring Windows Server 2008 LDAP for APIC Access with Cisco AVPair
Refer to the section Configuring Windows Server 2008 LDAP for APIC Access with Cisco AVPair in the Cisco Cloud
Network Controller Security Configuration Guide.
Step 1 In the Cisco Cloud Network Controller, create the LDAP Provider.
a) On the menu bar, choose Administrative > Authentication.
b) In the Work pane, click on Providers tab and then click on the Actions drop-down and select Create Provider.
c) In the Host Name/IP Address field, enter the Host Name/IP Address of the provider.
d) In the Description field, enter a description of the provider.
e) Click the Type drop-down list and choose LDAP.
f) Specify the Bind DN, Base DN, Password, Port, Attribute, Filter Type and Management EPG.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
163
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for LDAP Access
Note • The bind DN is the string that the Cisco Cloud Network Controller uses to log in to the LDAP server.
The Cisco Cloud Network Controller uses this account to validate the remote user attempting to log
in. The base DN is the container name and path in the LDAP server where the Cisco Cloud Network
Controller searches for the remote user account. This is where the password is validated. Filter is used
to locate the attribute that the Cisco Cloud Network Controller requests to use for the cisco-av-pair.
This contains the user authorization and assigned RBAC roles for use on the Cisco Cloud Network
Controller. The Cisco Cloud Network Controller requests the attribute from the LDAP server.
• Attribute field—Enter one of the following:
• For LDAP server configurations with a Cisco AVPair, enter CiscoAVPair.
• For LDAP server configurations with an LDAP group map, enter memberOf.
Properties Description
General
Settings
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
164
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for SAML Access
Properties Description
About SAML
Refer to the section About SAML in the Cisco Cloud Network Controller Security Configuration Guide.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
165
Cisco Cloud Network Controller Security
Configuring Cisco Cloud Network Controller for SAML Access
Note SAML based Authentication is only for Cisco Cloud Network Controller GUI and not for REST.
Step 1 In the Cisco Cloud Network Controller, create the SAML Provider.
a) On the menu bar, choose Administrative > Authentication.
b) In the Work pane, click on Providers tab and then click on the Actions drop-down and select Create Provider.
c) In the Host Name/IP Address field, enter the Host Name/IP Address of the provider.
d) In the Description field, enter a description of the provider.
e) Click the Type drop-down list and choose SAML.
f) In Settings pane, perform following:
• Specify the IdP metadata URL:
• In case of AD FS, IdP Metadata URL is of the format https://<FQDN
ofADFS>/FederationMetadata/2007-06/FederationMetadata.xml.
• In case of Okta, to get the IdP Metadata URL, copy the link for Identity Provider Metadata in the Sign
On section of the corresponding SAML Application from the Okta server.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
166
Cisco Cloud Network Controller Security
Setting Up a SAML Application in Okta
c) Enter the appropriate values in each field as listed in the following Create Login Domain Dialog Box Fields table
then continue.
Properties Description
General
Settings
Refer to the section Setting Up a SAML Application in Okta of Cisco Cloud Network Controller Security Configuration
Guide.
Refer to the section Setting Up a Relying Party Trust in AD FS in the Cisco Cloud Network Controller Security
Configuration Guide.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
167
Cisco Cloud Network Controller Security
About HTTPS Access
Configuring a Custom Certificate for Cisco ACI HTTPS Access Using the GUI
Determine from which authority you will obtain the trusted certification so that you can create the appropriate
Certificate Authority.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
168
Cisco Cloud Network Controller Security
Configuring a Custom Certificate for Cisco ACI HTTPS Access Using the GUI
Step 2 In the Work pane, click on Certificate Authorities tab and then click on the Actions drop-down and select Create
Certificate Authority.
Step 3 In the Create Certificate Authority dialog box, in the Name field, enter a name for the certificate authority and in the
Description field, enter a description.
Step 4 Select System in the Used for field.
Step 5 In the Certificate Chain field, copy the intermediate and root certificates for the certificate authority that will sign the
Certificate Signing Request (CSR) for the Cloud Network Controller. The certificate should be in Base64 encoded
X.509 (CER) format. The intermediate certificate is placed before the root CA certificate. It should look similar to the
following example:
-----BEGIN CERTIFICATE-----
<Intermediate Certificate>
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
<Root CA Certificate>
-----END CERTIFICATE-----
Step 16 Double-click on the created Key Ring to open Key Ring key_ring_name dialog box from the Work pane.
Step 17 In the Work pane, click on Create Certificate Request.
Step 18 In the Subject field, enter the fully qualified domain name (FQDN) of the Cisco Cloud Network Controller.
Step 19 Fill in the remaining fields as appropriate.
Step 20 Click Save.
The Key Ring key_ring_name dialog box appears.
Step 21 Copy the contents from the field Request to submit to the Certificate Authority for signing.
Step 22 From the Key Ring key_ring_name dialog box, click on edit icon to display the Key Ring key_ring_name dialog box.
Step 23 In the Certificate field, paste the signed certificate that you received from the certificate authority.
Step 24 Click Save to return to the Key Rings work pane.
The key is verified, and in the Work pane, the Admin State changes to Completed and is now ready for use in the
HTTPs policy.
Step 25 Navigate to Infrastructure > System Configuration, then click the Management Access tab.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
169
Cisco Cloud Network Controller Security
Configuring a Custom Certificate for Cisco ACI HTTPS Access Using the GUI
Step 26 Click the edit icon on the HTTPS work pane to display the HTTPS Settings dialog box.
Step 27 Click on Admin Key Ring and associate the Key Ring that you created earlier.
Step 28 Click Save.
All web servers restart. The certificate is activated, and the non-default key ring is associated with HTTPS access.
What to do next
You must remain aware of the expiration date of the certificate and take action before it expires. To preserve
the same key pair for the renewed certificate, you must preserve the CSR, as it contains the public key that
pairs with the private key in the key ring. Before the certificate expires, the same CSR must be resubmitted.
Do not delete or create a new key ring, as deleting the key ring will delete the private key stored internally
on the Cisco Cloud Network Controller.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
170
CHAPTER 9
Configuration Drifts
• Configuration Drift Notifications and Faults, on page 171
• Accessing the Main Configuration Drift Page, on page 172
• Checking for Missing Contracts Configuration, on page 174
• Checking for Missing EPGs Configuration, on page 176
• Checking for Missing VRFs Configuration, on page 177
• Configuration Drift Troubleshooting, on page 179
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
171
Configuration Drifts
Accessing the Main Configuration Drift Page
See Accessing the Main Configuration Drift Page, on page 172 for more information.
There are two aspects to analyzing configuration drift:
• Have all the fabric elements configured in the Cloud Network Controller and intended to be deployed
in the cloud fabric been properly deployed?
This scenario can occur due to user configuration errors in Cloud Network Controller that could not be
deployed in the cloud, connection or API issues on the cloud provider end, or if a cloud administrator
manually deletes or modifies security rules directly in the cloud provider's UI. Any intended but missing
configurations may present an issue for the Cloud Network Controller fabric.
• Are there any additional configurations that exist in the cloud but were not intended to be deployed from
the Cloud Network Controller?
Similarly to the previous scenario, this can occur if there are connection or API issues or if a cloud
administrator manually creates additional security rules directly in the cloud provider's UI. Any existing
but not intended configuration may present issues.
In the Drifts page, you can see a summary of any configuration issues in your fabric.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
172
Configuration Drifts
Accessing the Main Configuration Drift Page
The Detection Summary area provides an overview of how many configuration drifts were detected with managed or
unmanaged objects, and the time when this information was last updated. If the inventory update timestamp is out of
date, you can refresh the information by clicking the Refresh icon in the top right corner of this screen.
Step 3 Use the information in the table below the Detection Summary area to find any configuration drifts.
• Object: Provides information on the object associated with the configuration drift.
• Status: Following are the different values that might appear in the Status column:
• Transient (low): Drifts that are likely due to recent configuration changes. We recommend waiting for the
fabric to stabilize and the drift will likely resolve on its own after the next configuration refresh.
• Presumed (medium): Drifts that may or may not be transient. We recommend monitoring the status and
troubleshoot the configuration should the drift persist.
• Raised (high): Critical drifts. We recommend verifying the configuration on Cloud Network Controller and
checking for any associated faults. Redeploying the configuration may help resolve communication issues
between the Cloud Network Controller and cloud services. If the issue persists, check the tech-support logs.
• Unmanaged: Configuration drifts related to extra inventory objects not created through the Cisco Cloud Network
Controller.
• Drift Type: Following are the different values that might appear in the Drift Type column:
• Configuration: External changes on the cloud providers site that could result in the intended configuration
and the actual configuration being out of sync. Used for configuration drifts related to EPGs or VRFs.
• Rule: External changes on the cloud providers site that could result in the intended security rules and the
expected rules that are established through a contract being out of sync. Used for configuration drifts related
to contracts.
• Extra Object: Used to show extra inventory objects that were not created through the Cisco Cloud Network
Controller. Cisco Cloud Network Controller does not perform drift detection on these objects.
• Last Configuration Update: Provides information on when the last configuration update occurred.
Step 4 Enter information in the filter line to filter the configuration drifts provided in the table, if necessary.
a) Click in the filter line below the Detection Summary area. The following filter types appear:
• Object
• Status
• Drift Type
• Parent Path
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
173
Configuration Drifts
Checking for Missing Contracts Configuration
The entries in the table are filtered based on your selections above.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
174
Configuration Drifts
Checking for Missing Contracts Configuration
Note You can also navigate to this page by navigating to Cloud Resources > Drifts, then clicking the appropriate
line in the Configuration Drifts table. A side panel appears with additional information on this particular
configuration drift; clicking the Details icon ( ) automatically brings you to the appropriate Cloud Mapping
page for this particular object. See Accessing the Main Configuration Drift Page, on page 172 for more
information.
The screen is divided into four sections: Detection Summary, Related Objects, Configuration Drifts, and Presented
Cloud Resources. Each section contains a table that lists the respective information about the contract you selected.
• The Detection Summary area provides an overview of how many configuration drifts were detected, number of
intended and actual cloud resources configured, and the time when this information was last updated. If the inventory
update timestamp is out of date, you can refresh the information by clicking the Refresh icon in the top right corner
of this screen.
• The Related Objects area shows any other objects that have a relation to the contract, such as consumer and provider
EPGs, and filters.
• The Configuration Drifts table lists all the issues with the contract rules. Specifically, all the contract rules that
were intended to be deployed but are missing in the actual fabric configuration.
The table contains detailed information, such as the protocol used, port ranges, source and destination IP or group,
consumer and provider EPGs, description of the issue, and the recommended action to resolve it. For each configuration
drift, the Status field will indicate the severity and recommended action:
• Transient (low): Drifts that are likely due to recent configuration changes. We recommend waiting for the
fabric to stabilize and the drift will likely resolve on its own after the next configuration refresh.
• Presumed (medium): Drifts that may or may not be transient. We recommend monitoring the status and
troubleshoot the configuration should the drift persist.
• Raised (high): Critical drifts. We recommend verifying the configuration on Cloud Network Controller and
checking for any associated faults. Redeploying the configuration may help resolve communication issues
between the Cloud Network Controller and cloud services. If the issue persists, check the tech-support logs.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
175
Configuration Drifts
Checking for Missing EPGs Configuration
• The Presented Cloud Resources table shows the information about all the resources that were properly configured
in your cloud. This table is designed to provide you with better visibility into what rules are configured in your cloud
for a specific contract.
Note You can also navigate to this page by navigating to Cloud Resources > Drifts, then clicking the appropriate
line in the Configuration Drifts table. A side panel appears with additional information on this particular
configuration drift; clicking the Details icon ( ) automatically brings you to the appropriate Cloud Mapping
page for this particular object. See Accessing the Main Configuration Drift Page, on page 172 for more
information.
The screen is divided into four sections: Detection Summary, Related Objects, Configuration Drifts, and Presented
Cloud Resources. Each section contains a table that lists the respective information about the EPG you selected.
• The Detection Summary area provides an overview of how many configuration drifts were detected, number of
intended and actual cloud resources configured, and the time when this information was last updated. If the inventory
update timestamp is out of date, you can refresh the information by clicking the Refresh icon in the top right corner
of this screen.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
176
Configuration Drifts
Checking for Missing VRFs Configuration
• The Related Objects area shows any other objects that have a relation to the EPG, such as security groups and
contracts.
• The Configuration Drifts table lists all the issues with the security groups associated with the EPG. Specifically,
all the security groups that were intended to be deployed but are missing in the actual fabric configuration.
The table contains detailed information, such as the logical DN, cloud provider ID, drift type, description of the
issue, and the recommended action to resolve it. For each configuration drift, the Status field will indicate the
severity and recommended action:
• Transient (low): Drifts that are likely due to recent configuration changes. We recommend waiting for the
fabric to stabilize and the drift will likely resolve on its own after the next configuration refresh.
• Presumed (medium): Drifts that may or may not be transient. We recommend monitoring the status and
troubleshoot the configuration should the drift persist.
• Raised (high): Critical drifts. We recommend verifying the configuration on Cloud Network Controller and
checking for any associated faults. Redeploying the configuration may help resolve communication issues
between the Cloud Network Controller and cloud services. If the issue persists, check the tech-support logs.
• The Presented Cloud Resources table shows the information about all the resources that were properly configured
in your cloud. This table is designed to provide you with better visibility into what security groups are associated
with a specific EPG in your cloud.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
177
Configuration Drifts
Checking for Missing VRFs Configuration
Note You can also navigate to this page by navigating to Cloud Resources > Drifts, then clicking the appropriate
line in the Configuration Drifts table. A side panel appears with additional information on this particular
configuration drift; clicking the Details icon ( ) automatically brings you to the appropriate Cloud Mapping
page for this particular object. See Accessing the Main Configuration Drift Page, on page 172 for more
information.
The screen is divided into four sections: Detection Summary, Related Objects, Configuration Drifts, and Presented
Cloud Resources. Each section contains a table that lists the respective information about the VRF you selected.
• The Detection Summary area provides an overview of how many configuration drifts were detected, number of
intended and actual cloud resources configured, and the time when this information was last updated. If the inventory
update timestamp is out of date, you can refresh the information by clicking the Refresh icon in the top right corner
of this screen.
• The Related Objects area shows any other objects that have a relation to the VRF, such as security groups, CIDRs,
and subnets.
• The Configuration Drifts table lists all the issues with the virtual networks, the CIDRs that are associated with the
virtual networks, and the subnets within those CIDRs. Specifically, all the virtual networks, CIDRs, and subnets
that were intended to be deployed but are missing in the actual fabric configuration.
Note that if there are configuration drifts at any one level, the table will show the configuration drift at that level
and not any configuration drifts at the levels below it. For example, if a configuration drift occurs at a CIDR level
and the corresponding subnets within that CIDR, the table will be display the configuration drifts in the CIDR area
but not the configuration drifts for the corresponding subnets within that CIDR.
The table contains detailed information in these areas:
• Virtual Networks: Provides information on logical DN, region, primary CIDR, drift type, description of the
issue, and the recommended action to resolve it.
• CIDRs: Provides information on logical DN, region, CIDR block range, whether it is a primary CIDR or not,
the subnets within the CIDR, drift type, description of the issue, and the recommended action to resolve it.
• Subnets: Provides information on logical DN, region, IP address, drift type, description of the issue, and the
recommended action to resolve it.
For each configuration drift, the Status field will indicate the severity and recommended action:
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
178
Configuration Drifts
Configuration Drift Troubleshooting
• Transient (low): Drifts that are likely due to recent configuration changes. We recommend waiting for the
fabric to stabilize and the drift will likely resolve on its own after the next configuration refresh.
• Presumed (medium): Drifts that may or may not be transient. We recommend monitoring the status and
troubleshoot the configuration should the drift persist.
• Raised (high): Critical drifts. We recommend verifying the configuration on Cloud Network Controller and
checking for any associated faults. Redeploying the configuration may help resolve communication issues
between the Cloud Network Controller and cloud services. If the issue persists, check the tech-support logs.
• The Presented Cloud Resources table shows the information about all the resources that were properly configured
in your cloud, split into the same hierarchies that is shown in the Configuration Drifts table (Virtual Networks,
CIDRs, and Subnets). This table is designed to provide you with better visibility into what virtual networks, CIDRs,
and subnets are associated with a specific VRF in your cloud.
Step 1 Log in to the Cisco Cloud Network Controller via console as a root user.
Step 2 Check the status of the configuration drift application.
ACI-Cloud-Fabric-1# moquery -d pluginContr/plugin-Cisco_CApicDrift | egrep "dn |pluginSt |operSt
|version"
dn: pluginContr/plugin-Cisco_CApicDrift
operSt: active
pluginSt: active
Verison: 5.1.0
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
179
Configuration Drifts
Configuration Drift Troubleshooting
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
180
CHAPTER 10
AWS Transit Gateway on Cisco Cloud Network
Controller
• AWS Transit Gateway on Cisco Cloud Network Controller, on page 181
Note You can attach a Cisco Cloud Network Controller user tenant’s VPC (CtxProfile) to an AWS Transit
Gateway (hub network) only if you have administrator privileges and the user is part of security domain
“all". Without such access, you cannot attach the user tenant’s VPC to an AWS Transit Gateway.
For detailed information about using AWS Transit Gateway with Cisco Cloud Network Controller, see
Increasing Bandwidth Between VPCs by Using AWS Transit Gateway.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
181
AWS Transit Gateway on Cisco Cloud Network Controller
AWS Transit Gateway on Cisco Cloud Network Controller
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
182
APPENDIX A
Cisco Cloud Network Controller Error Codes
• Cisco Cloud Network Controller Error Codes, on page 183
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
183
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
184
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
185
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
186
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
cloud-template CT_PROFILE_ROUTERPASSWORD_NONEMPTY In
cloudtemplateProfile,
the routerPassword must
be non-empty
cloud-template CT_PROFILE_ROUTERUSERNAME_MODIFY In
cloudtemplateProfile,
the routerUsername
cannot be modified when
there are routers deployed
in any region, i.e. any
cloudRegionName under
cloudtemplateIntNetwork
(The modification is
allowed when there are no
router deployments in any
region)
cloud-template CT_PROFILE_ROUTERPASSWORD_MODIFY In
cloudtemplateProfile,
the routerPassword
cannot be modified when
there are routers deployed
in any region, i.e. any
cloudRegionName under
cloudtemplateIntNetwork
(The modification is
allowed when there are no
router deployments in any
region)
cloud-template CT_PROFILE_ROUTERTHROUGHPUT_MODIFY In
cloudtemplateProfile,
the routerThroughput
cannot be modified when
there are routers deployed
in any region, i.e. any
cloudRegionName under
cloudtemplateIntNetwork
(The modification is
allowed when there are no
router deployments in any
region)
cloud CT_APICSUBNET_INVALID_HOME_REGION In a cloudApicSubnet
MO, the region marked for
capicDeployed must be a
valid region
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
187
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller Error Codes
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
188
APPENDIX B
Security Group and Rules
• Security Group Rules, on page 189
Note The External Network comes from the "cloud formation template during cloud controller launch" and
this is the network from which you access Cloud Network Controller or Cisco Catalyst 8000Vs.
Security Group rules created in AWS after the Cloud Network Controller bringup
1. Security Group- uni/tn-infra/cloudapp-cloud-infra/cloudepg-controllers
Purpose- Attached to Cisco Cloud Network Controller management interface.
Inbound Rules
a. Rule 1: (HTTPS access to Cloud Network Controller)
Source: External Network
Destination: Cloud Network Controller
Protocol - TCP
Port – 443
b. Rule 2: (Default rule is to allow all traffic within the security group) ( This rule will be used for
multiple Cloud Network Controllers in the future as a cluster. Currently this rule is not used as there
is only one controller NIC is attached to the security group.)
Source: uni/tn-infra/cloudapp-cloud-infra/cloudepg-controllers
Destination: Cloud Network Controller
Protocol - All
Port - All
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
189
Security Group and Rules
Security Group and Rules
Note This rule is enabled for HTTP access to Cloud Network Controller. HTTP access can be disabled through
communication policy in Cloud Network Controller.
d. Rule 4:
Source: External Network
Destination: Cloud Network Controller
Protocol – ICMP
Port – All
e. Rule 5: (Kafka Rule)
Source: External Network
Destination: Cloud Network Controller
Protocol – TCP
Port – 9095
f. Rule 6: (ssh Access to Cloud Network Controller)
Source: External Network
Destination: Cloud Network Controller
Protocol – TCP
Port – 22
Outbound Rules
a. Rule 1: (Needed for outbound communication from Cloud Network Controller)
Source: Cloud Network Controller
Destination: 0/0
Protocol - All
Port –All
Note This rule is needed for Cloud Network Controller to access external services like Cisco license server,
DNS, NTP.
b. Rule 2: (Default rule to allow all traffic within the security group)
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
190
Security Group and Rules
Security Group and Rules
Note This rule is similar to Allow-all inbound rule within the security group as explained above. Currently it
is not used.
Note This infra interface is not exposed externally and no elastic IP is attached. All traffic is allowed only
within the security group and the VPC. This rule is currenlty not used.
Inbound Rules
a. Rule 1:
Source: 0/0
Destination: Cloud Network Controller
Protocol – All
Port – All
Outbound Rules
a. Rule 1:
Source: Cloud Network Controller
Destination: 0/0
Protocol – All
Port – All
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
191
Security Group and Rules
Security Group and Rules
Rules created for Cloud Network Controller in Home Region Security group - cloudepg-controllers after
deploying Cisco Catalyst 8000V in Home and Non Home Region
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
192
Security Group and Rules
Security Group and Rules
Port - 830
f. Rule 6:
Source: Cloud Network Controller
Destination: /uni/tn-infra/cloudapp-cloud-infra/cloudepg-infra- routers
Protocol - TCP
Port - 22
Note This interface is not exposed externally and no elastic IP is attached. All traffic is allowed only within
the security group and the VPC.
Inbound Rules
a. Rule 1: (Cloud Network Controller: Default rule)
Source: /uni/tn-infra/cloudapp-cloud-infra/cloudepg-controllers- infra -nic
Destination: Cloud Network Controller
Protocol – All
Port – All
Outbound Rules
a. Rule 1:
Source: Cloud Network Controller
Destination: /uni/tn-infra/cloudapp-cloud -infra/cloudepg-controllers-infra-nic
Protocol – All
Port – All
Security Group and rules created in Home Region for Cisco Catalyst 8000V
1. Security Group- uni/tn-infra/cloudapp-cloud-infra/cloudepg-infra-routers
Inbound Rules
a. Rule 1:
Source: /uni/ tn-infra/cloudapp-cloud-infra/cloudepg-controllers
Destination: Cisco Catalyst 8000V
Protocol – TCP
Port – 22
b. Rule 2: (Netconf)
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
193
Security Group and Rules
Security Group and Rules
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
194
Security Group and Rules
Security Group and Rules
Outbound Rules
a. Rule 1: (This rule is created for two interfaces with private IP per Cisco Catalyst 8000V in non home
region.)
Source: Cisco Catalyst 8000V
Destination: Remote (non home region) Cisco Catalyst 8000V private IP
Protocol - All
Port - All
b. Rule 2: (This rule is created one per Cisco Catalyst 8000V (both home and non home region) interface
3 - Gig4.)
Source: Cisco Catalyst 8000V
Destination: /uni/tn-infra/cloudapp-cloud/-infra/cloudepg-infra-csr: <CAT8KV_NAME>: interface:
3
Protocol – All
Port -All
c. Rule 3:
Source: Cisco Catalyst 8000V
Destination: /uni/tn-infra/cloudapp-cloud-infra/cloudepg-infra-routers
Protocol - All
Port - All
d. Rule 4:
Source: Cisco Catalyst 8000V
Destination: 0.0.0.0/0
Protocol - All
Port - All
e. Rule 5: (One rule is created for each gig4 interface private IP address of remote region Cisco Catalyst
8000Vs)
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
195
Security Group and Rules
Security Group and Rules
Note One security group is created per non home region Cisco Catalyst 8000V interface 2. This security group
is not being used currently and has been created for future purposes.
Inbound Rules
a. Rule 1:(One Per non home region Cisco Catalyst 8000V)
Source: Non home region Cisco Catalyst 8000V Interface 2private IP
Protocol - All
Port – All
b. Rule 2: (This is created one per Cisco Catalyst 8000V)
Source: uni/tn-infra /cloudapp -cloud- infra/ cloudepg- infra-csr :<CAT8KV_NAME>: interface: 2
Protocol - All
Port - All
Note One Security Group is created for each home region Catalyst 8000V interface3 (Gig4). It is attached to
the respective local region Cisco Catalyst 8000V interface 3(Gig4).
Inbound Rules
a. Rule 1:(There will be 8 such rules)
Source: Private IP of remote Cisco Catalyst 8000V (One per interface in each remote Cisco Catalyst
8000V)
Protocol - All
Port - All
b. Rule 2: (This is created one per Cisco Catalyst 8000V)( As there are two Cisco Catalyst 8000Vs per
interface, there will be 4 such rules.)
Source: uni/tn-infra /cloudapp -cloud- infra/ cloudepg- infra-csr :<HOME and NON HOME REGION
CAT8KV_NAME>: interface: 1
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
196
Security Group and Rules
Security Group and Rules
Protocol - All
Port - All
c. Rule 3: (This is created one per Cisco Catalyst 8000V)( As there are two Cisco Catalyst 8000Vs per
interface, there will be 4 such rules.)
Source: /uni/tn-infra/ cloudapp-cloud-infra/cloudepg-infra-csr<<HOME and NON HOME REGION
CAT8KV_NAME>>: interface: 2
Protocol - All
Port - All
d. Rule 4: (This is created one per Cisco Catalyst 8000V)( As there are two Cisco Catalyst 8000Vs per
interface, there will be 4 such rules.)
Source: /uni/tn-infra/cloudapp-cloud-infra/cloudepg-infra-csr<<HOME and NON HOME REGION
CAT8KV_NAME>: interface: 3
Protocol - All
Port - All
e. Rule 5:
Source: /uni/tn-infra/cloudapp-cloud-infra/cloudepg-infra-routers
Protocol - All
Port - All
f. Rule 6:
Source: /uni/tn-infra/cloudapp-cloud-infra/ cloudepg-controllers
Protocol - All
Port - All
Outbound Rules
a. Rule 1:
Destination: External Network
Protocol – All
Port - All
b. Rule 2:
Destination: Remote Cisco Catalyst 8000V private IP of Interface 3 (Gig4) (One per Cisco Catalyst
8000V in Non Home Region)
Protocol - All
Port - All
c. Rule 3: (Created one per Cisco Catalyst 8000V in both home and non home region)
Source: /uni/tn -infra/ cloudapp -cloud -infra/ cloudepg -infra -csr:<CAT8KV_NAME >: interface:
3
Protocol - All
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
197
Security Group and Rules
Security Group and Rules
Port - All
Outbound Rules
a. Rule 1:
Destination: Remote Cisco Catalyst 8000V of interface 2 (Gig3) and interface 3 (Gig4) private IP
Protocol – All
Port - All
b. Rule 2: (This rule will be added for both home region and non home region Cisco Catalyst 8000Vs.)
Destination: uni/tn-infra/ cloudapp-cloud -infra/ cloudepg-infra- csr:<CAT8KV_NAME> : interface:
2
Protocol - All
Port - All
c. Rule 3: (This rule will be added for both home region and non home region Cisco Catalyst 8000Vs.)
Destination: uni/tn-infra/ cloudapp-cloud -infra/ cloudepg-infra- csr:<CAT8KV_NAME> : interface:
3
Protocol - All
Port - All
d. Rule 4:
Destination: 0/0
Protocol - All
Port - All
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
198
Security Group and Rules
Security Group and Rules
a. Rule 1:(One rule is created for each Cisco Catalyst 8000V Interface 1 including home and non home
regions Cisco Catalyst 8000Vs.)
Source: /uni/tn-infra/ cloudapp-cloud-infra/cloudepg- infra-csr:<CAT8KV_NAME>:Interface: 1
Protocol - All
Port - All
b. Rule 2:(This is created one per remote region Cisco Catalyst 8000V)
Source: Remote Private IP of remote region Cisco Catalyst 8000V Interface1(Gig2)
Protocol - All
Port - All
Outbound Rules
a. Rule 1:
Destination: Remote region Cisco Catalyst 8000V private IP of interface 3 (Gig4) and interface 1
(Gig2)
Protocol – All
Port - All
b. Rule 2:
Destination: uni/tn-infra/ cloudapp-cloud -infra/ cloudepg-infra- csr:<CAT8KV_NAME> : interface:
1
Protocol - All
Port - All
c. Rule 3:
Destination: uni/tn-infra/ cloudapp-cloud -infra/ cloudepg-infra- csr:<CAT8KV_NAME> : interface:
3
Protocol - All
Port - All
d. Rule 4:
Destination: 0/0
Protocol - All
Port - All
In any non-home region Cisco Catalyst 8000V, Security Group and the rules are similar as described in the
above section for home region with the following exception - Instead of using security group as destination,
some rules would have specific IP address of Cloud Network Controller.
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
199
Security Group and Rules
Security Group and Rules
Cisco Cloud Network Controller for AWS User Guide, Release 25.1(x)
200









