Lets say I wanted to set up a server farm with about 20-30 servers, not much in terms of growth. The servers can be seperated by what application is running on them. App1 has 3 web servers plus 1 database server, App2 has 1 web server plus 1 database server, etc.
I would imagine that it would be wise to seperate the applications out into lans/vlans for performance and security reasons, correct? If so what is the best approach? One multilayer switch to handle the routing and switching? What model? Furthermore, does anyone know any good documentation that can help shed light on the subject?
It seems that this documentation is geared towards the enterprise data center via the 6500 series. This is a very expensive solution. I dont think it is neccesary to have cisco equipment deal with ssl offloading and load balancing. These tasks can be done with cheap third party solutions.
The one thing I liked was the firewall virtualization with the fwsm. Can't you do the same thing with vlans and access lists on a 3560 with exteral firwalls. I attached an example. Recommendations on the design? Thoughts?
This document will provide screenshots to outline the steps to setup
TACACS+ configuration to ACI and also the configuration required on
Cisco ACS server. Please find the official Cisco guide for configuring
TACACS+ Authentication to ACI:
Is it supported or NOT supported? It's a frequently asked question.
Before APIC, release 2.3(1f), transit routing was not supported within a
single L3Out profile. In APIC, release 2.3(1f) and later, you can
configure transit routing with a single L3Out pr...
Cisco Documents are usually accurate, but when it came to the document
on Cisco APIC Signature-Based Transactions it was slightly off the mark.
This document is for those novices to API like me who cant seem to
figure out how to go about performing signat...