In any operational data center, it is critical to have the highest degree of visibility on network traffic for operations and application troubleshooting.
In this white paper, we discuss how to achieve optimal visibility of any type of application traffic with Cisco Application Centric Architecture, or ACI.
This whitepaper includes:
- ACI Hardware
- ACI Tenants
- Deny List vs Allow List Security Model
- Creating an Allow List model
- Cisco SPAN
- Configuring ACI SPAN
- ACI Span Wireshark Packet Decode
- About the author