For site-to-site VPN, remote access, and firewall services, you create security policies to then use in ISC service requests. For site-to-site VPN, remote access, NAT, and firewall services, you create a service request, which bundles together the service policy (as applicable) and the list of CPE devices for which they are intended. You then deploy the service request, which creates the device-level configurations (called configlets) and pushes them down to provision all security devices in your network at the same time.
This document will provide screenshots to outline the steps to setup
TACACS+ configuration to ACI and also the configuration required on
Cisco ACS server. Please find the official Cisco guide for configuring
TACACS+ Authentication to ACI:
Is it supported or NOT supported? It's a frequently asked question.
Before APIC, release 2.3(1f), transit routing was not supported within a
single L3Out profile. In APIC, release 2.3(1f) and later, you can
configure transit routing with a single L3Out pr...
Cisco Documents are usually accurate, but when it came to the document
on Cisco APIC Signature-Based Transactions it was slightly off the mark.
This document is for those novices to API like me who cant seem to
figure out how to go about performing signat...