Experience reading like never before
Read in your favourite format - print, digital or both. The choice is yours.
Track the shipping status of your print orders.
Discuss with other readersSign in to continue reading.

"It was a wonderful experience interacting with you and appreciate the way you have planned and executed the whole publication process within the agreed timelines.”
Subrat SaurabhAuthor of Kuch Woh Pal
Configuration tasks in the Cisco ACI are often done using a built-in GUI in APIC (Application Infrastructure Controller) or REST API Client. Both methods use REST API calls with JSON or XML data formats. Using REST calls, we can create a new object, modify an existing one, get information about the object, or delete the object. So how do we define an Object? Each object represents an individual setting (policy), a set of settings (policy group), or a set of se
Configuration tasks in the Cisco ACI are often done using a built-in GUI in APIC (Application Infrastructure Controller) or REST API Client. Both methods use REST API calls with JSON or XML data formats. Using REST calls, we can create a new object, modify an existing one, get information about the object, or delete the object. So how do we define an Object? Each object represents an individual setting (policy), a set of settings (policy group), or a set of settings bind to an interface or group of interfaces (profile + selector) as an example. Object, in turn, is created under the class. As an example, objects which define interface settings such as speed and CDP Policy, belong to the infrastructure class. Classes, in turn, are organized by Packages. As an example, classes Tenant, Ctx (VRF), and BD (Bridge Domain) all belong to Fabric Virtualization (fv) Packages. The relationship between classes depends on their location in the Management Information Model (MIM) structure.
The first chapter explains the initial ACI installation process. The rest of the book explains how to create a logical overlay network for the application using Web and App servers including filters, and external Layer-2 connections as well as Layer-3 connections using BGP. The last two chapters introduce VMware vCenter and APIC integration and Multi-Pod architecture.
Chapters 1-2 explain how to set up a test environment. You learn how to install certificates to vBond, vManage, vSmart, and vEdge and how to set up underlay and Out-of-Band management network connections. Chapter 3 introduces a centralized control plane with the Overlay Management Protocol (OMP) running between vEdges and vSmart. Chapter 4 introduces the end-to-end control-plane processes and data-plane encapsulation over the SR-MPLS transport network. You als
Chapters 1-2 explain how to set up a test environment. You learn how to install certificates to vBond, vManage, vSmart, and vEdge and how to set up underlay and Out-of-Band management network connections. Chapter 3 introduces a centralized control plane with the Overlay Management Protocol (OMP) running between vEdges and vSmart. Chapter 4 introduces the end-to-end control-plane processes and data-plane encapsulation over the SR-MPLS transport network. You also learn some of the basic concepts of the IS-IS Segment-Routing extension. Chapter 5 teaches how you can implement Hub and Spoke overlay topology by filtering TLOC routes using Centralized Policy. Chapter 6 discusses Feature Templates in which you set protocol and feature-specific values. Chapter 7 shows how to use TLOC Extension for transport network connection in dual-homed sites. Chapter eight discusses LAN side BGP routing. It also explains how you can build a Centralized Policy to filter out unnecessary OMP routes. Chapter 9 discusses how to do preference-based traffic engineering, again with Centralized Policy. Chapter 10 introduces Application-Aware Routing. The last chapter explains how to build a Direct Cloud Access (DCA), where the remote-sites user can access applications hosted in Cloud provider networks using the local Internet connection while all other traffic is sent over SD-WAN overlay tunnels. You will also learn how to filter DCA traffic with a centrally managed Zone-Based Firewall.
The first quarter of the book focuses on VXLAN fabric's Underlay Network. It starts by explaining the operation of OSPF, the Dijkstra algorithm, and the Shortest Path Tree calculation process. Then it discusses the differences between the OSPF and IS-IS routing protocols from the Underlay Network perspective. The first part also introduces Underlay Network routing solutions with Single-AS solution, Dual-AS solution, and Multi-AS solution. After the Unicast Rou
The first quarter of the book focuses on VXLAN fabric's Underlay Network. It starts by explaining the operation of OSPF, the Dijkstra algorithm, and the Shortest Path Tree calculation process. Then it discusses the differences between the OSPF and IS-IS routing protocols from the Underlay Network perspective. The first part also introduces Underlay Network routing solutions with Single-AS solution, Dual-AS solution, and Multi-AS solution. After the Unicast Routing section, this book explains the Multicast Routing solution used for L2VNI specific L2BUM traffic forwarding by introducing the Anycast-RP with PIM and the PIM BiDir solutions. The focus of the second quarter is VXLAN with BGP EVPN Control Plane. It explains the basic building blocks and configurations needed for both Layer2 and Layer3 services. It also discusses the BGP EVPN Control Plane operation by showing how a BGP EVPN NLRI information is advertised within a VXLAN fabric and how information is used in Data Plane. The third quarter discusses a multi-homing solution with vPC by explaining the vPC Multi-homing, vPC, GIR, and vPC Peer-Link as an Underlay Network Backup Path. In addition, this section starts by explaining the standard-based EVPN ESI Multi-homing solution. It also introduces an EVPN Multi-Site Data Center Interconnect (DCI) solution. In addition, this part explains Tenant Routed Multicast (TRM).
Each chapter includes various configuration and verification examples as well as traffic captures.
AWS consists of interconnected Regions, each having multiple Availability Zones (AZ). AZ is an isolated area that consists of one or more physical Datacenters. Virtual Private Cloud (VPC) within a Region is your Virtual Datacenter. AZ-specific subnets in your VPC are either Public with Internet GW or Private with or without NAT GW. You can build a VPN between your on-prem DC to AWS VPC using a Virtual Private GW, or Transit GW. Using AWS Direct Connect,
AWS consists of interconnected Regions, each having multiple Availability Zones (AZ). AZ is an isolated area that consists of one or more physical Datacenters. Virtual Private Cloud (VPC) within a Region is your Virtual Datacenter. AZ-specific subnets in your VPC are either Public with Internet GW or Private with or without NAT GW. You can build a VPN between your on-prem DC to AWS VPC using a Virtual Private GW, or Transit GW. Using AWS Direct Connect, you can establish a dedicated connection from on-prem to VPC. You can Inter-connect VPCs with VPC Peering, Private Link, or Transit GW. NACL and Network FW protect your Subnets while Security Groups guard your EC2 instances. This book is your guide to AWS Networking.
Are you sure you want to close this?
You might lose all unsaved changes.
India
Malaysia
Singapore
UAE
The items in your Cart will be deleted, click ok to proceed.