ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (2024)

Let’s open with a question: "How are you handling security and segmentation requirements in your Cisco Application Centric Infrastructure (#ACI) fabric?"

I expect most answers will relate to constructs of Endpoint Groups (EPGs), contracts and filters. These have been a part of ACI since its initial launch. But when it comes to any infrastructure capabilities, designs and customers’ requirements are constantly evolving. That is why I would like to introduce a relatively recent and powerful option called Endpoint Security Groups (ESGs). Although ESGs were introduced in Cisco ACI a while back (at version 5.0(1) released in May 2020), there is still ample opportunity to spread this functionality to a broader audience.

For those who have not explored the topic yet, ESGs offer an alternate way of handling segmentation with the added flexibility of decoupling this from the earlier concepts of forwarding and security associated with Endpoint Groups. This is to say that ESGs handle segmentation separately from the forwarding aspects, thereby allowing more flexibility and possibility with each.

EPG and ESG - Highlights and Differences

The easiest way to manage endpoints with common security requirements is to put them into groups and control communication between them. In ACI, these groups have been traditionally represented by EPGs. Contracts attached to EPGs are used to control communication and other policies between groups with different postures. Although EPG primarily provides network security, it must be married to a single bridge domain (BD). This is because EPGs define both forwarding policy and security segmentation simultaneously. This direct relationship between BD and an EPG prevents the possibility of an EPG to span more than one bridge domain.

This design requirement can be alleviated by the ESG concept. With ESGs, networking (i.e., forwarding policy) happens on the EPG/BD level, and security enforcement is moved to the ESG level.

Operationally, the ESG concept is similar to, and more straightforward than the original EPG approach. Just like EPGs, communication is allowed among any endpoints within the same group, but in the case of ESGs this is independent of the subnet or BD they are associated with. For communication between different ESGs, we need contracts. That sounds familiar, doesn’t it? ESGs use the same contract constructs we have been using in ACI since inception.

So, what are the benefits of ESGs then? In a nutshell, where EPGs are bound to a single BD, ESGs allow you to define a security policy that spans across multiple bridge domains. This is to say you can group and apply policy to any number of endpoints across any number of BDs under a given VRF.At the same time, ESGs decouple the forwarding policy, allowing you to do things like VRF route leaking in a much simpler and more intuitive manner.

ESG. A Simple Use Case Example

To give an example of where ESGs could be useful, consider a brownfield ACI deployment that has been in operation for years. Over time things tend to grow organically. You might find you have created more and more EPG/BD combinations but later realize that many of these EPGs actually share the same security profile. With EPGs, you would be deploying and consuming more contract resources to achieve what you want, plus potentially adding to your management burden with more objects to keep an eye on. With ESGs, you can now simply group all these brownfield EPGs and their endpoints and apply the common security policies only once. What is important is that you can do this without changing anything with IP addressing or BD settings they are using to communicate.

So how do I assign an endpoint to an ESG? You do this with a series of matching criteria. In the first release of ESGs, you were limited in the kinds of matching criteria, but things have evolved in a positive manner in the past year. Starting from ACI 5.2(1), Cisco has added a wider range of matching criteria for endpoint classification. Among them: Tag Selectors (based on MAC, IP, VM tag, subnet), whole EPG Selectors, and IP Subnet Selectors.

All the details about different selectors can be found here: https://www.cisco.com/c/en/us/td/docs/dcn/aci/apic/6x/security-configuration/cisco-apic-security-configuration-guide-60x/endpoint-security-groups-60x.html

EPG to ESG Migration Simplified

In case when your infrastructure is diligently segmented with EPGs and contracts that reflect application tiers’ dependencies, ESGs are designed to allow you to migrate your policy with just a little effort.

The first question that most probably comes to your mind is how to achieve that? An EPG Selector, one of the new methods of classifying endpoints into ESGs, enables a seamless migration to the new grouping concept by inheriting contracts from the EPG level. This is an easy way to quickly move all your endpoints within one or more EPGs into your new ESGs.

For a better understanding, let’s evaluate the below example. See Figure 1. We have a simple two EPGs setup. The communication between them is achieved with contract Ctr-1. High-level migration steps are as follows:

  1. Migrate EPG 1 to ESG 1
  2. Migrate EPG 2 to ESG 2
  3. Replace the existing contract with the one applied between newly created ESGs.

ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (1)

The first step is to create a new ESG 1 where EPG 1 is matched using the EPG Selector. It means that all endpoints that belong to this EPG become part of a newly created ESG all at once. These endpoints still communicate with the other EPG(s) because of an automatic contract inheritance (Note. You cannot configure an explicit contract between ESG and EPG).

This state, depicted in Figure 2, is considered as an intermediate step of a migration, which the APIC reports with F3602 fault until you migrate outstanding EPG(s) and contracts. This fault is a way to encourage you to continue with a migration process so that ESGs maintain all security configurations. This will keep the configuration and design simple and maintainable. However, you do not have to do it all at once. You can progress according to your project schedule.

ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (2)

As a next step, with EPG Selector, you migrate EPG 2 to ESG 2, respectively. Keep in mind that nothing stands in the way of placing other EPGs into the same ESG (even if these EPGs refer to different BDs). Communication between ESGs is still allowed with contract inheritance.

Recommended by LinkedIn

Comparison of SD-WAN Solutions: Fortinet Secure SD-WAN… Prabuddha Hettiwatta 1 year ago
From Cisco to Fortinet: Cost Savings, Performance… Josef Fernandez 4 months ago
June 08, 2023 Kannan Subbiah 1 year ago

To complete the migration, as a final step, configure a new contract with the same filters as the original one – Ctr-1-1. Assign one ESG as a provider and the second as a consumer, which takes precedence over contract inheritance. Finally, remove the original Ctr-1 contract between EPG 1 and EPG 2. This step is shown in Figure 3.

ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (6)

Easy Migration to ACI

The previous example is mainly applicable when segmentation at the EPG level is already applied according to the application dependencies. However, not everyone may realize that ESG also simplifies brownfield migrations from existing environments to Cisco ACI.

A starting point for many new ACI customers is how EPG designs are implemented.Typically, the most common choice is to implement such that one subnet is mapped to one BD and one EPG to reflect old VLAN-based segmentation designs (Figure 4). So far, moving from such a state to a more application-oriented approach where an application is broken up into tiers based on function has not been trivial. It has often been associated with the need to transfer some workloads between EPGs, or re-addressing servers/services, which typically leads to disruptions.

ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (7)

Introducing application-level segmentation in such a deployment model is challenging unless you use ESGs. So how do I make this migration from pure EPG to using ESG? With the new selectors available, you can start very broadly and then, when ready, begin to define additional detail and policy. It is a multi-stage process that allows endpoints to communicate without disruption as we gracefully make the transition. In general, steps can be defined as follows:

  1. Classify all endpoints into one "catch-all" ESG
  2. Define new segmentation group(s) and seamlessly take out endpoints from a "catch-all" ESG to newly created ESGs.
  3. Continue until all endpoints are assigned to new security groups.

In the first step (Figure 5), we can enable free communication between EPGs by classifying all of them using EPG selectors and putting them (temporarily) into one "catch-all" ESG. This is conceptually similar to any "permit-all" solutions you may have used prior to ESGs (e.g. vzAny, Preferred Groups).

ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (8)

In the second step (Figure 6), you can begin to shape and refine our security policy by seamlessly taking out endpoints from the catch-all ESG and putting them into other newly created ESGs that meet your security policy and desired outcome. For that, you can use other endpoint selector methods available – in our example – tag selectors. Keep in mind that there is no need to change any networking constructs related to these endpoints. VLAN binding to interfaces with EPGs remains the same. No need for re-addressing or moving between BDs or EPGs.

ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (9)

As you continue to refine your security policies, you will end up in a state where all of your endpoints are now using the ESG model. As your data center fabric grows, you do not have to spend any time worrying about which EPG or which BD subnet is needed because ESG frees us of that tight coupling. In addition, you will gain detailed visibility into endpoints that are part of an ESG that represent a department (like IT or Sales in the above example) or application suite. This makes management, auditing, and other operational aspects easier.

Intuitive route-leaking

It is well understood that getting Cisco ACI to interconnect two VRFs in the same or different tenants is possible without any external router. However, two additional aspects must be ensured for this type of communication to happen. First is regular routing reachability and the second is security permission.

In this very blog, I stated that ESG decouples forwarding from security policy. This is also clearly visible when you need to configure inter-VRF connectivity. Refer to Figure 7 for high-level, intuitive configuration steps.

ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (10)

At the VRF level, configure the subnet to be leaked and its destined VRF to establish routing reachability. A leaked subnet must be equal to or be a subset of a BD subnet. Next, attach a contract between the ESGs in different VRFs to allow desired communication to happen. Finally, you can put aside the need to configure subnets under the provider EPG (instead of under the BD only), and make adjustments to define the correct bridge domain scope. These are not required anymore. The end result is a much easier way to set up route leaking with none of the sometimes confusing and cumbersome steps that were necessary when using the traditional EPG approach.

To explore more details of this concept that the networking industry has dubbed "route leaking", refer to the Endpoint Security Groups chapter in the Cisco APIC Security Configuration Guide.

Summary

Thanks to the concept of ESGs, the security and segmentation capabilities of Cisco ACI became more flexible and powerful. Particularly using ESGs in the migration path from a model where 1 EPG equals 1 BD, to a more sophisticated network policy is something that seems to be often overlooked.

There are still few ESG-related limitations that may delay the broader adoption of this functionality, so Cisco’s work is not yet done. The most anticipated feature that will be coming soon is ESG support with Nexus Dashboard Orchestrator (NDO) for those who have chosen to deploy Multi-Site across ACI data centers and locations. If you are not a Multi-Site user, this is a non-issue and ESGs can be deployed right now. If you use a Multi-Site already, the good news is that Cisco has near-term plans to address this in CY23. Stay tuned!

ACI Segmentation and Migrations made easier with Endpoint Security Groups (ESG) (2024)
Top Articles
Solidus Ai Tech (AI-TECH) Price Prediction 2024, 2025–2030 | CoinCodex
BDO - Global news - Accounting | Consultancy.eu
Ups Stores Near
Froedtert Billing Phone Number
Regal Amc Near Me
Couchtuner The Office
Bin Stores in Wisconsin
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Don Wallence Auto Sales Vehicles
Gabrielle Abbate Obituary
Horoscopes and Astrology by Yasmin Boland - Yahoo Lifestyle
Www Craigslist Louisville
Soap2Day Autoplay
Florida (FL) Powerball - Winning Numbers & Results
Tokioof
Learn2Serve Tabc Answers
Inter-Tech IM-2 Expander/SAMA IM01 Pro
Ally Joann
TBM 910 | Turboprop Aircraft - DAHER TBM 960, TBM 910
What Is Vioc On Credit Card Statement
Maxpreps Field Hockey
Amazing Lash Studio Casa Linda
Slim Thug’s Wealth and Wellness: A Journey Beyond Music
Sherburne Refuge Bulldogs
Defending The Broken Isles
Piedmont Healthstream Sign In
Geico Car Insurance Review 2024
Trinket Of Advanced Weaponry
Ordensfrau: Der Tod ist die Geburt in ein Leben bei Gott
Select The Best Reagents For The Reaction Below.
Helpers Needed At Once Bug Fables
Rush County Busted Newspaper
Pfcu Chestnut Street
35 Boba Tea & Rolled Ice Cream Of Wesley Chapel
Wcostream Attack On Titan
Vitals, jeden Tag besser | Vitals Nahrungsergänzungsmittel
Daily Journal Obituary Kankakee
What Time Is First Light Tomorrow Morning
Top-ranked Wisconsin beats Marquette in front of record volleyball crowd at Fiserv Forum. What we learned.
Msnl Seeds
How to play Yahoo Fantasy Football | Yahoo Help - SLN24152
Lovein Funeral Obits
Anhedönia Last Name Origin
Questions answered? Ducks say so in rivalry rout
RECAP: Resilient Football rallies to claim rollercoaster 24-21 victory over Clarion - Shippensburg University Athletics
Electric Toothbrush Feature Crossword
Pink Runtz Strain, The Ultimate Guide
Pixel Gun 3D Unblocked Games
Port Huron Newspaper
Craigslist Pet Phoenix
Identogo Manahawkin
Tamilyogi Cc
Latest Posts
Article information

Author: Terrell Hackett

Last Updated:

Views: 6489

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Terrell Hackett

Birthday: 1992-03-17

Address: Suite 453 459 Gibson Squares, East Adriane, AK 71925-5692

Phone: +21811810803470

Job: Chief Representative

Hobby: Board games, Rock climbing, Ghost hunting, Origami, Kabaddi, Mushroom hunting, Gaming

Introduction: My name is Terrell Hackett, I am a gleaming, brainy, courageous, helpful, healthy, cooperative, graceful person who loves writing and wants to share my knowledge and understanding with you.