Configure
Background
The ACI fabric provides for integration of L4-L7 services as an integral part of an application. This is accomplished through the use of an APIC-managed service graph, which requires a L4-L7 device package. The imported device package exposes configuration parameters in APIC, and allows it to orchestrate a given configuration onto the device.
To install the L4-L7 service graph, register a L4-L7 device with the APIC, add its configuration as part of a Function Profile or L4-L7 Service Parameters, and link those two with a service graph. Once you apply this L4-L7 service graph to a contract, the APIC renders it in the fabric by tagging device interfaces and stitching them to appropriate consumer and provider EPGs. The APIC then applies a given configuration to the registered device in an automated fashion. Once all of the configuration is applied to the ACI fabric and the L4-L7 device, the ACI fabric directs traffic defined by the contract to a given device for inspection. The ACI also allows you to chain multiple services together under a single service graph.
Configure Management Access to the ASA
Configure management access to the ASA so that the APIC can manage the ASA.
-
To configure management access to an ASAv, see the respective Quick Start Guide:
-
To configure management access to an ASA 5585-X, follow the steps in this section.
Step 1 | Remove any existing configuration.
ciscoasa(config)# clear configure all |
Step 2 | (Optional) Set the firewall mode to transparent firewall mode.
ciscoasa(config)# firewall transparent |
Step 3 | Configure the IP address and subnet mask on the management interface. The ASA needs to be on the same subnet as the APIC.
ciscoasa(config)# interface management {0/0 | 0/1} ciscoasa(config-subif)# ip address ip_address subnet_mask |
Step 4 | Name the interface "management."
ciscoasa(config-subif)# nameif management |
Step 5 | Enable the interface.
ciscoasa(config-subif)# no shutdown |
Step 6 | Enable the ASA HTTPS server.
ciscoasa(config)# http server enable |
Step 7 | Enable an APIC to access the ASA. Repeat this step for each APIC in the APIC cluster.
ciscoasa(config)# http apic_address 255.255.255.255 management |
Step 8 | Create the user which the APIC uses to access the ASA. The user is not required to be the management user. Any user is acceptable.
ciscoasa(config)# username username password password privilege 15 |
Step 9 | Create an AAA authentication that allows APIC to have access to the HTTP console using LOCAL authentication.
ciscoasa(config)# aaa authentication http console LOCAL |
Step 10 | Verify that there is crypto key. If it doesn't exist, generate one using:
ciscoasa(config)# show crypto key mypubkey rsa ciscoasa(config)# crypto key generate rsa |
Step 11 | Verify that Encryption-DES and Encryption-3DES-AES are enabled. If they're disabled, generate a new license.
ciscoasa(config)# show version |
Configure Jumbo Frame Support
To use Ethernet packets larger than 1500 bytes, configure jumbo frame support.
Step 1 | Enable jumbo frames.
ciscoasa(config)# jumbo-frame reservation |
Step 2 | Save the running configuration.
ciscoasa(config)# write memory |
Step 3 | Reboot the ASA.
ciscoasa(config)# reload |
Configure Multiple Context Mode
To configure multi-context mode, see the High Availability and Scalability chapter in the Cisco ASA Series General Operations CLI Configuration Guide for instructions.
The instructions describe how to configure interfaces in system mode, assign them to contexts, and configure the interfaces in each context. Those are all steps that will be done by the device package.
The device package is responsible for allocating and configuring interfaces used in each service graph in multi-context mode. However, the system administrator is responsible for provisioning a multi-context ASA before registering it to the APIC.
Configure an ASA Cluster
To configure an ASA cluter, see the ASA Cluster chapter of the Cisco ASA Series General Operations CLI Configuration Guide for instructions.
Configure the ASA From the APIC
Use the northbound API to configure the security policy, specifically for service graphs.
For information about how to use the APIC northbound APIs, see the Cisco APIC Management Information Model Reference.
Refer to the APIC documentation for more information.