Fabric Policies:
These are policies used for how the internal policies of the fabric system of the spine and
leaf interact with each other, which is under the fabric tap as shown below, with that said I will
move on and show how to create fabric policies and use it and verify.
Creating fabric policies
we will create an NTP policy and assign it to our pod. NTP is a good place to start, as having
a common and synced time source is critical for third-party authentication, such as LDAP and
logging.
1. From the Fabric menu, select/click on Fabric Policies then the Quick Start menu,
select Create an NTP Policy
(Alternate methodistoclickon PodPolicies>>Policies>>Date andTime rightclickandclickcreate as
shownbelow)
But we will use the quickstartmenufor our sample asshow below,clicktocreate a new NTPPolicy
2. A new window will pop up, and here we'll give our new policy a name and (optional)
description and enable it. We can also define any authentication keys, if the servers use
them. Clicking on Next takes us to the next page, where we specify our NTP servers.
3. Click on the plus sign on the right-hand side, and enter the IP address or Fully Qualified
Domain Name (FQDN) of the NTP server(s):
4. We can also select a management EPG, which is useful if the NTP servers are outside of
our network. Then, click on OK
5. Click on Finish.
We can now see our custom policy under Pod Policies:
Creating Cisco ACI Fabric Policy
6. At the moment, though, the policy is not being used, Clicking on Show Usage at the
bottom of the screen shows that no nodes or policies are using the policy.
7. To use the policy, we must assign it to a pod, as we can see from the Quick Start menu:
To use it We need to go into the policy groups under Pod Policies and create a new Pod policy
and call the NTP policy into it
To create the policy, click on the Actions menu, and select Create Pod Policy Group as shown
below
8. Name the new policy PoD-Policy. From here, we can attach our NTP-POLICY to the PoD-
Policy. To attach the policy, click on the drop-down next to Date Time Policy, and
select NTP-POLICY from the list of options:
Creating Cisco ACI Fabric Policy
9. NextWe have to create a PodProfile andassignthe PodPolicytoit, the process is similar as
before: we go to Profiles (under the Pod Policies menu), select Actions, and then Create
Pod Profile:
give it a name and associate the Pod policy to it as shown below
The resultsare shownbelow
To verifyif APICisusingthe NTPPolicydothis from the APIC CLI, using the command show ntp
Note : If DNSis notfullyconfiguredonyournetworkthenuse IPaddressesforthe NTPserverandnot
an FQDN.
apic1# showntp
nodeid remote refid st t when poll reach delay offset jitter
-------- - --------------- ------------- -- ------ ------ ------- --------------- --------
1 216.239.35.4 .INIT. 16 u - 16 0 0.000 0.000 0.000
apic1#
Steps :
We created:
1. An NTPPolicy (Youcouldhave createdSNMP,BGPPolicyinsame wayfor APIC)
2. Attacheditto a Policygroup.
3. Attachedthe Policygroupto a PodProfile
4. The APICwill consume/usethe PodProfile whichwill be pusheddowntothe spine andleaves.
SummaryPicture Below
ENJOYUNTIL NEXTTIME……………>> AccessPolicyCreationanduse.
Creating Cisco ACI Fabric Policy

More Related Content

PPTX
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
PDF
How To Set Up Insightly CRM
PDF
Group Policy
ODP
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
PDF
Setting up Filters & Layouts in P6
DOC
Window 2003 server group policy AD
DOCX
Rewriting the rules
PPTX
AD Lab Doc
Presentation On Group Policy in Windows Server 2012 R2 By Barek-IT
How To Set Up Insightly CRM
Group Policy
Connect 2014: ID112: Domino Policies: Deep Dive and Best Practices
Setting up Filters & Layouts in P6
Window 2003 server group policy AD
Rewriting the rules
AD Lab Doc

Similar to Creating Cisco ACI Fabric Policy (20)

DOCX
IPSec Tunnels with GPO
DOCX
Digitised and Decentralized Block Chain Technology Python Project
DOCX
Digitised and Decentralized Blockchain Technology Screenshots
PPTX
Security Policies MuleSoft API Manager Mule4
DOCX
Collaborative policy administration
DOCX
Documentiation
PDF
Defining sql server 2008 policies tech republic
PPTX
Useful Group Policy Concepts
PPTX
3. policy enforcement
PDF
Collaborative policy administration
PPTX
How to Configure Field Cleaning Rules in Odoo 17
DOCX
Submission task # 02
PDF
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
PDF
CPQ Deployment Tips & Tricks
PDF
YouTube Content ID Handbook - Google
PDF
How to make a developer’s life easier – strategy pattern with the help of Gra...
PDF
Alfresco : Implementing Business Rules
PDF
SharePoint - Empower People and Stay in Control - Atidan
ODP
LS11 Show101
DOCX
AI Builder - Text Classification
IPSec Tunnels with GPO
Digitised and Decentralized Block Chain Technology Python Project
Digitised and Decentralized Blockchain Technology Screenshots
Security Policies MuleSoft API Manager Mule4
Collaborative policy administration
Documentiation
Defining sql server 2008 policies tech republic
Useful Group Policy Concepts
3. policy enforcement
Collaborative policy administration
How to Configure Field Cleaning Rules in Odoo 17
Submission task # 02
GDPR ASAP: A Seven-Step Guide to Prepare for the General Data Protection Regu...
CPQ Deployment Tips & Tricks
YouTube Content ID Handbook - Google
How to make a developer’s life easier – strategy pattern with the help of Gra...
Alfresco : Implementing Business Rules
SharePoint - Empower People and Stay in Control - Atidan
LS11 Show101
AI Builder - Text Classification
Ad

More from David kankam (13)

DOCX
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
DOCX
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
DOCX
Resolve a Palo Alto firewall blocking oracle application.
DOCX
Upcoming Topics To Be Covered On NSX Deployment.
DOCX
Deploying The NSX Manager Virtual Appliance
DOCX
Converting From Nexus NX-OS Mode to ACI Mode.
DOCX
ACI HIGH LEVEL DESIGN OVERVIEW
DOCX
SDN THE CISCO WAY
PPTX
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
PPTX
Nexus lan switching configuration
PPTX
Cisco virtual port channel high level over view
PPTX
Nexus Virtual Device Context high Level Explanation.
PPTX
Nexus Virtual Device Context high Level Explanation.
How to Create an AWS VPC from Beginning to End and deploy a Windows Instance ...
Palo Alto U turn NAT for inside user's to access Web Server in a different Zo...
Resolve a Palo Alto firewall blocking oracle application.
Upcoming Topics To Be Covered On NSX Deployment.
Deploying The NSX Manager Virtual Appliance
Converting From Nexus NX-OS Mode to ACI Mode.
ACI HIGH LEVEL DESIGN OVERVIEW
SDN THE CISCO WAY
Integration of pola alto and v mware nsx to protect virtual and cloud environ...
Nexus lan switching configuration
Cisco virtual port channel high level over view
Nexus Virtual Device Context high Level Explanation.
Nexus Virtual Device Context high Level Explanation.
Ad

Recently uploaded (20)

PDF
Getting Started with Data Integration: FME Form 101
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
The various Industrial Revolutions .pptx
PPT
Geologic Time for studying geology for geologist
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Five Habits of High-Impact Board Members
PPTX
Modernising the Digital Integration Hub
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
DOCX
search engine optimization ppt fir known well about this
Getting Started with Data Integration: FME Form 101
Assigned Numbers - 2025 - Bluetooth® Document
Web Crawler for Trend Tracking Gen Z Insights.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
The various Industrial Revolutions .pptx
Geologic Time for studying geology for geologist
A contest of sentiment analysis: k-nearest neighbor versus neural network
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Tartificialntelligence_presentation.pptx
WOOl fibre morphology and structure.pdf for textiles
O2C Customer Invoices to Receipt V15A.pptx
Architecture types and enterprise applications.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Five Habits of High-Impact Board Members
Modernising the Digital Integration Hub
Hindi spoken digit analysis for native and non-native speakers
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
search engine optimization ppt fir known well about this

Creating Cisco ACI Fabric Policy

  • 1. Fabric Policies: These are policies used for how the internal policies of the fabric system of the spine and leaf interact with each other, which is under the fabric tap as shown below, with that said I will move on and show how to create fabric policies and use it and verify. Creating fabric policies we will create an NTP policy and assign it to our pod. NTP is a good place to start, as having a common and synced time source is critical for third-party authentication, such as LDAP and logging.
  • 2. 1. From the Fabric menu, select/click on Fabric Policies then the Quick Start menu, select Create an NTP Policy (Alternate methodistoclickon PodPolicies>>Policies>>Date andTime rightclickandclickcreate as shownbelow)
  • 3. But we will use the quickstartmenufor our sample asshow below,clicktocreate a new NTPPolicy 2. A new window will pop up, and here we'll give our new policy a name and (optional) description and enable it. We can also define any authentication keys, if the servers use them. Clicking on Next takes us to the next page, where we specify our NTP servers.
  • 4. 3. Click on the plus sign on the right-hand side, and enter the IP address or Fully Qualified Domain Name (FQDN) of the NTP server(s):
  • 5. 4. We can also select a management EPG, which is useful if the NTP servers are outside of our network. Then, click on OK
  • 6. 5. Click on Finish. We can now see our custom policy under Pod Policies:
  • 8. 6. At the moment, though, the policy is not being used, Clicking on Show Usage at the bottom of the screen shows that no nodes or policies are using the policy. 7. To use the policy, we must assign it to a pod, as we can see from the Quick Start menu:
  • 9. To use it We need to go into the policy groups under Pod Policies and create a new Pod policy and call the NTP policy into it To create the policy, click on the Actions menu, and select Create Pod Policy Group as shown below 8. Name the new policy PoD-Policy. From here, we can attach our NTP-POLICY to the PoD- Policy. To attach the policy, click on the drop-down next to Date Time Policy, and select NTP-POLICY from the list of options:
  • 11. 9. NextWe have to create a PodProfile andassignthe PodPolicytoit, the process is similar as before: we go to Profiles (under the Pod Policies menu), select Actions, and then Create Pod Profile: give it a name and associate the Pod policy to it as shown below The resultsare shownbelow
  • 12. To verifyif APICisusingthe NTPPolicydothis from the APIC CLI, using the command show ntp Note : If DNSis notfullyconfiguredonyournetworkthenuse IPaddressesforthe NTPserverandnot an FQDN. apic1# showntp nodeid remote refid st t when poll reach delay offset jitter -------- - --------------- ------------- -- ------ ------ ------- --------------- -------- 1 216.239.35.4 .INIT. 16 u - 16 0 0.000 0.000 0.000 apic1# Steps : We created: 1. An NTPPolicy (Youcouldhave createdSNMP,BGPPolicyinsame wayfor APIC) 2. Attacheditto a Policygroup. 3. Attachedthe Policygroupto a PodProfile 4. The APICwill consume/usethe PodProfile whichwill be pusheddowntothe spine andleaves.