A floating static route is a static route with a higher administrative distance than the primary route, so it only takes over if the primary route becomes unavailable.
Example
ip route 10.10.10.0 255.255.255.0 192.168.2.1 200
I am a network professional with over 18 years of experience in enterprise and data‑center networking. I am a CCIE Data Center certified engineer with strong hands‑on expertise in Cisco Nexus and Cisco ACI design, deployment, troubleshooting, and operations. I work on production ACI fabrics and am available for Cisco ACI and Nexus freelancing or consulting work. Contact: rockingoa@gmail.com
A floating static route is a static route with a higher administrative distance than the primary route, so it only takes over if the primary route becomes unavailable.
Example
ip route 10.10.10.0 255.255.255.0 192.168.2.1 200
The standard order
of accessing modes on a Cisco device (like a router or switch)
running IOS or IOS XE is:
✅ User EXEC mode → Privileged EXEC mode →
Global Configuration mode → Specific Configuration modes
📘 Detailed Order:
✅ Summary of Command Flow:
plaintext
CopyEdit
User EXEC Mode →
enable
Router> ─────────►
Router#
Privileged EXEC Mode
Privileged EXEC
Mode →
configure terminal
Router# ─────────► Router(config)#
Global
Configuration Mode
Global Config
Mode → interface Gig1/0
Router(config)# ─────────►
Router(config-if)#
Specific
Config Mode
Creating a "match
all" contract in Cisco ACI means defining a contract that
allows all traffic types (all protocols, all ports) between
EPGs (Endpoint Groups). This is often used in lab environments or for initial
testing, but should be used with caution in production due to its
permissiveness.
🔧 Steps to Create a Match-All Contract in Cisco
ACI (via GUI):
BGP route aggregation
is a powerful feature that helps reduce the size of routing tables by
summarizing multiple specific routes into a single, broader route. This is
especially useful in large-scale networks where route optimization and
scalability are critical.
In Cisco IOS,
the aggregate-address command provides flexible options to control
how and when summary routes are advertised. Whether you're looking to advertise
only the summary, retain specific routes, or apply custom attributes, this
command gives you granular control over BGP route announcements.
By default, when you use the aggregate-address command,
the router advertises both the aggregate route and the more specific routes
that fall under it
Let’s dive in and understand how each option can be used to fine-tune your BGP advertisements.
2. summary-only
3. suppress-map
<map-name>
4. advertise-map
<map-name>
5. attribute-map
<map-name>
Cisco ACI – Port
Channel (eth1/4 & eth1/5) Trunk Configuration for VLAN 420 – Complete Guide
In modern data center architectures, Cisco ACI (Application Centric Infrastructure) plays a vital role in automating and simplifying complex network configurations. One such common scenario is setting up a Port Channel trunk to carry specific VLAN traffic—like VLAN 420—across fabric leaf switches. This step-by-step guide walks you through the complete configuration of a Port Channel using interface eth1/4 and eth1/5 on Leaf 101, allowing VLANs 400–500, and deploying VLAN 420 in production.
Note - Multivlan on Same port on same switch in same EPG is not supported.
Configure a Port Channel (eth1/4 & eth1/5) on Leaf 101 in trunk mode to carry VLAN 420, using a static EPG binding, and associate it with the necessary ACI components like VLAN Pool, Physical Domain, AAEP, Bridge Domain, EPG, and Contract.
Cisco ACI Fabric running with APIC access.
Leaf 101 is discovered and operational.
End host (e.g., server or hypervisor) connected to eth1/4 and eth1/5.
Basic understanding of ACI policies and constructs.
✅ Step-by-Step Summary
|
Step |
Task |
Navigation Path |
|
1 |
Create VLAN Pool
(400–500, static) |
Fabric > Access
Policies > Pools > VLAN |
|
2 |
Create Physical
Domain linked to VLAN Pool |
Fabric > Access
Policies > Physical and External Domains > Physical Domains |
|
3 |
Create Interface
Policies (Link Level, CDP, LLDP) |
Fabric > Access
Policies > Policies > Interface |
|
4 |
Create AAEP and
associate Physical Domain |
Fabric > Access
Policies > Policies > Global > Attachable Access Entity Profiles |
|
5 |
Create Leaf Port
Channel Policy Group |
Fabric > Access
Policies > Interfaces > Leaf Interfaces > Policy Groups > Port
Channel |
|
6 |
Create Leaf
Interface Profile and assign eth1/4 & eth1/5 |
Fabric > Access
Policies > Interfaces > Leaf Interfaces > Profiles |
|
7 |
Create Leaf Switch
Profile and assign Node 101 and Interface Profile |
Fabric > Access
Policies > Switches > Leaf Switch Profiles |
|
8 |
Create Tenant, VRF,
and Bridge Domain |
Tenants |
|
9 |
Create Application
Profile and EPG |
Tenants > Tenant
Name > Application Profiles |
|
10 |
Deploy Static EPG on
Port Channel (Trunk mode, VLAN 420) |
Tenants > Tenant
Name > Application Profile > EPG > Static Ports |
|
11 |
Associate EPG with
Physical Domain |
Tenants > Tenant
Name > Application Profile > EPG > Domains |
|
12 |
Create Contract, add
Subject, Filters, and associate with EPG |
Tenants > Tenant
> Contracts & Application Profile > EPG > Contracts |
|
13 |
Associate Contract
with EPG |
Tenants > Tenant
> Contracts & Application Profile > EPG |
✅ Step 1 – Create VLAN Pool (VLANs 400–500)
✅ Step 2 – Create Physical Domain
✅ Step 3 – Create Interface Policies
Ø Mode: LACP Active
Ø Click Submit
✅ Step 4 – Create AAEP
✅ Step 5 – Create Leaf Port Channel Policy Group
⚠️ Note: VLAN Trunking is controlled through Static
Binding and Domain VLAN Range, not inside the PC Policy Group.
✅ Step 6 – Create Leaf Interface Profile
✅ Step 7 – Create Leaf Switch Profile
Ø Name: LS101
Ø Blocks: 101
✅ Step 8 – Create Tenant, VRF, and Bridge Domain
Ø
Right
click on VRFs and Create VRF: VRF-T1, uncheck “Create A Bridge Domain” and
click Finish
Ø
Right
click on Bridge Domain > Create Bridge Domain: BD-420
Ø Associate with VRF-T1 and Next
Ø Click + on Subnets and Add Gateway IP:
192.168.42.1/24
✅ Step 9 – Create Application Profile and EPG
Ø
Name:
EPG-420
Ø
Associate
with Bridge Domain: BD-420
Ø
Click
Finish
✅ Step 10 – Deploy Static EPG on Port Channel
(Trunk, VLAN 420)
✅ Step 11 – Associate EPG with Physical Domain
Step 12 – Create
Contract and Associate with EPG
🔹 12.1 – Create Filter
🔹 12.2 – Create Contract
🔹 12.2 – Associate Contract with EPG
🧩 Understanding the Limitation: Single EPG, Single Port, Single VLAN in Cisco ACI
In Cisco ACI, static port binding is a powerful method to associate specific leaf switch ports to End Point Groups (EPGs) using VLAN encapsulation. However, there's a key design limitation to be aware of:
✅ One static port binding supports only one EPG with one VLAN encapsulation.
This means:
A single leaf port (e.g., eth1/1) can only be statically associated to one EPG.
That EPG can only use one encapsulation VLAN on that port.
Unlike traditional switching where a trunk port can carry multiple VLANs, in ACI's static binding model:
If you want to pass multiple VLANs on the same port, you must use multiple EPGs, each with a separate static binding.
But since a single port cannot be bound to multiple EPGs, this effectively blocks trunking behavior in static access port configuration.
To enable trunk-like behavior (multiple VLANs on a port), you must:
Configure a Port Channel or physical interface as trunk
Use multiple static EPG bindings with different VLAN encapsulations to the same trunk interface
It’s often assumed that a single static EPG can carry multiple VLANs on the same port—this is not possible. The design is intentionally strict to enforce segmentation and policy enforcement in the ACI fabric.