Introduction
Overview
The Cisco Application Policy Infrastructure Controller (APIC) is a single point of control for centralized functions on the Cisco Application Centric Infrastructure (ACI). The APIC can automate the insertion of services such as a Cisco Adaptive Security Appliance (ASA) northbound between applications, also called endpoint groups (EPGs). The APIC uses northbound Application Programming Interfaces (APIs) for configuring the network and services. You use these APIs to create, delete, and modify a configuration using managed objects.
To configure and monitor service devices, the APIC requires software running on the device known as a device package. The device package manages a class of service device and provides the APIC with information about the device so that the APIC knows what the device can do. By using a device package, you can insert and configure network service functions on a service device such as an ASA.
This document describes how to integrate an ASA with the ACI and configure the APIC to utilize capabilities of the ASA.
Note | If you try to create a configuration that is not supported on your current ASA version, an error similar to the following could appear on the APIC: *Major script error: Configuration error: …. ERROR: % Invalid input detected at '^' marker. See your ASA version documentation for supported features. |
Service Function Insertion
When a service function is inserted in the service graph between applications, traffic from these applications is classified by the APIC and identified using a tag in the overlay network. Service functions use the tag to apply policies to the traffic. For the ASA integration with the APIC, the service function forwards traffic using either routed or transparent firewall operation.
Available APIC Products
Starting with release 1.2(7.8), there are two versions of the Cisco ASA Device Package software for ACI:
-
Cisco ASA Device Package software for ACI. This version allows you to configure many important features of the ASA from the APIC, including (but not limited to) the following:
-
Interface
-
Routing
-
Access-list
-
NAT
-
TrustSec
-
Application inspection
-
NetFlow
-
High availability
-
Site-to-site VPN
-
-
Cisco ASA Device Package Fabric Insertion software for ACI. This version contains the following subset of features of the original version:
-
Interface
-
Dynamic routing
-
Static routing
-
Supported Versions
Cisco ASA Device Package software supports only the version of APIC that it is shipped with.
The following table lists the supported versions of the Cisco ASA software for each of the supported platforms.
Platform |
Software Version |
---|---|
Cisco ASA 5500-X (5512 through 5555) |
ASA 8.4(x) and newer |
Cisco ASA 5585-X (SSP 10 through SSP 60) |
|
Cisco Firepower 9300 Security Appliance |
ASA 9.6(1) and newer |
Cisco Firepower 41xx Security Appliance |
|
Cisco Firepower 21xx Security Appliance |
ASA 9.8(1) and newer |
Cisco ASAv |
ASA 9.2(x) and newer |
Supported Features
The following table lists the supported features for the ASAv and the ASA 5585-X. For releases that support BGP and OSPF, see the Cisco ASA Device Package Software, Version 1.2(1) Release Notes.
Feature |
ASAv Support |
ASA 5500-X/5585-X Support |
---|---|---|
Access lists and access groups |
Yes |
Yes |
Application inspection |
Yes |
Yes |
BGP |
Yes |
Yes |
Clustering |
No |
Yes |
Connection limits |
Yes |
Yes |
DNS clients |
Yes |
Yes |
EtherChannels |
No |
Yes |
High availability (active/active, active/standby) |
Active/standby only |
Active/standby only |
Interface configuration |
Yes |
Yes |
IP audit |
Yes |
Yes |
IPv6 |
Yes |
Yes |
Logging |
Yes |
Yes |
Multiple contexts |
No |
Yes |
NAT and Twice NAT |
Yes |
Yes |
Netflow |
Yes |
Yes |
Network and service objects and groups |
Yes |
Yes |
NTP |
Yes |
Yes |
OSPF |
Yes |
Yes |
Protocol timeouts |
Yes |
Yes |
Service policies |
Yes |
Yes |
Shared AnyConnect premium licenses |
No |
Yes |
Site-to-site VPN |
Yes |
Yes |
Smart Call Home enable |
Yes |
Yes |
Static routing |
Yes |
Yes |
TCP Intercept (embryonic connection limits) |
Yes |
Yes |
Threat detection |
Yes |
Yes |
TrustSec |
Yes |
Yes |