Cisco ASA Integration with the APIC
Supported ASA Models and Features
The Cisco Application Policy Infrastructure Controller (APIC) automates insertion of services (such as an ASA firewall) northbound between applications, also called End Point Groups (EPGs). The APIC uses northbound APIs for configuring the network and services. You use these APIs to create, delete, and modify a configuration using managed objects.
When configuration is controlled through the APIC, you cannot change the configuration through the ASA CLI. This means that the CLIs for any feature that you configure through the APIC are disabled on the ASA. However, you may use the CLI to configure management access to the ASA. Operational and status commands, such as troubleshooting commands and show commands, are also available through the CLI.
Note With APIC integration, you can only use ASDM for monitoring purposes. You cannot change the configuration using ASDM.
For information about how to use ASDM for monitoring, see the Cisco ASA Series General Operations ASDM Configuration Guide for the specified feature and release that you are using.
When a service function is inserted in the service graph between applications, traffic from these applications is classified by the APIC and identified using a tag in the overlay network. Service functions use the tag to apply policies to the traffic. For the ASA integration with the APIC, the service function forwards traffic using either routed or transparent firewall operation.
For information about the APIC, see the “Cisco Application Centric Infrastructure” chapter of the ACI Fundamentals guide.
For information about service graphs, see the “Configuring a Service Graph” chapter of the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide.
For information about the insertion of Layer 4 to Layer 7 services, see the “Overview” chapter of the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide.
http://www.cisco.com/c/en/us/support/security/virtual-adaptive-security-appliance-firewall/products-installation-guides-list.html
Note During ASAv deployment, you must define the value of the nameif property for the management interface as management. If you define the interface name as anything other than management, the device cluster will be stuck in AuditRequested/AuditPending state, and the fault will indicate that the read operation timed out. The management interface and default gateway configuration are deleted from the ASAv, and the interface is shut down.
You must configure management access to the ASA so that the APIC can manage the ASA.
To configure management access to the ASAv, see Deploy the ASA.
To configure management access to the ASA 5585-X, see the following procedure:
Step 1 Remove any existing configuration:
Step 2 (Optional) Set the firewall mode to transparent firewall mode:
Step 3 Configure the IP address and subnet mask on the management interface. The ASA needs to be on the same subnet as the APIC:
Step 4 Name the interface “management:”
Step 6 Enable the ASA HTTPS server:
Step 7 Enable an APIC to access the ASA. Repeat this step for each APIC in the APIC cluster:
Step 8 Create the user, “management-user,” which the APIC uses to access the ASA:
Each service node type must provide a device package, which includes two parts: a device specification and a device script. Service nodes of the same type are bound to a single device package.
The ASA device package enables you to perform the following tasks:
Step 1 Review the prerequisites for installing device packages.
See the “Overview” chapter and the “Prerequisites” chapter of the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide.
Step 2 Download the ASA device package, a.zip file that is available from Cisco.com, at the following URL:
http://www.cisco.com/go/asa-software
Step 3 Install the ASA device package.
See the “Importing a Device Package” chapter of the Cisco APIC Layer 4 to Layer 7 Services Deployment Guide.
Step 4 Register the ASA with the APIC.
See the “Fabric Connectivity” chapter of the Cisco APIC Layer 4 to Layer 7 Device Package Development Guide.
Use the northbound API to configure the security policy, specifically for service graphs.
For information about how to use northbound APIs, see the Cisco APIC Management Information Model Reference.
For XML samples of ASA-specific northbound APIs, see the Cisco ASA API Reference for APIC Integration.
For APIC documentation, see http://www.cisco.com/c/en/us/support/cloud-systems-management/application-policy-infrastructure-controller-apic/tsd-products-support-series-home.html .