





{"id":6117,"date":"2024-07-05T16:00:43","date_gmt":"2024-07-05T08:00:43","guid":{"rendered":"http:\/\/www.killtest.hk\/?p=6117"},"modified":"2024-07-05T16:00:43","modified_gmt":"2024-07-05T08:00:43","slug":"%e4%bb%80%e4%b9%88%e6%98%af%e6%80%9d%e7%a7%91-aci","status":"publish","type":"post","link":"https:\/\/www.killtest.hk\/index.php\/killtest\/%e4%bb%80%e4%b9%88%e6%98%af%e6%80%9d%e7%a7%91-aci\/","title":{"rendered":"\u4ec0\u4e48\u662f\u601d\u79d1 ACI"},"content":{"rendered":"<p>\u539f\u521b Luke \u7f51\u5de5\u7b14\u8bb0\u672c<br \/>\n\u548c\u5927\u5b66\u540c\u5b66\u5728\u804a\u5929\u65f6\u5019\u53d1\u73b0\uff0c\u5373\u4f7f\u5927\u5bb6\u90fd\u662f\u4ece\u7f51\u7edc\u5de5\u7a0b\u4e13\u4e1a\u6bd5\u4e1a\uff0c\u6709\u7740\u76f8\u4f3c\u7684\u80cc\u666f\uff0c\u4e0d\u8fc7\u7531\u4e8e\u5de5\u4f5c\u7ecf\u9a8c\u5dee\u522b\u8f83\u5927\uff0c\u5728\u8ba8\u8bba\u95ee\u9898\u65f6\u5019\u65f6\u5e38\u4e5f\u4f1a\u5148\u95ee\u4e00\u4e9b\u57fa\u7840\u7684\u95ee\u9898\uff0c\u6bd4\u5982\u8bf4\uff1a\u4ec0\u4e48\u662f\u601d\u79d1 ACI \uff1f <\/p>\n<p>\u4e4b\u524d\u5199\u8fc7\u4e0d\u5c11\u5173\u4e8e ACI \u7684\u6280\u672f\u5206\u4eab\uff0c\u4e0d\u8fc7\u786e\u5b9e\u662f\u5fd8\u4e86\u5199\u8fd9\u4e2a\u57fa\u7840\u7684\u4fe1\u606f\u4ecb\u7ecd\u3002\u4e3a\u4e86\u66f4\u597d\u7684\u89e3\u91ca ACI\uff0c\u6211\u6574\u7406\u4e86\u4e00\u4e9b\u4fe1\u606f\u4ec5\u4f9b\u5927\u5bb6\u53c2\u8003\u3002<\/p>\n<p>\u4e2d\u82f1\u6587\u5bf9\u7167\uff0c\u770b\u4e0d\u61c2\u4e2d\u6587\u65f6\u5019\uff0c\u8bfb\u82f1\u6587\u6587\u6863\u53cd\u800c\u66f4\u5bb9\u6613\u7406\u89e3\u3002<\/p>\n<p>(hardware based) SDN<br \/>\nCisco Application Centric Infrastructure (ACI) is Cisco&#8217;s software-defined networking (SDN) solution for data centers. It aims to simplify, optimize, and accelerate the deployment and management of applications in a highly scalable and agile network environment. ACI achieves this by providing a holistic architecture with centralized automation and policy-driven application profiles.<\/p>\n<p>\u601d\u79d1\u4ee5\u5e94\u7528\u4e3a\u4e2d\u5fc3\u7684\u57fa\u7840\u8bbe\u65bd \uff08ACI\uff09 \u662f\u601d\u79d1\u9762\u5411<a href=\"https:\/\/www.killtest.net\/s_CCNP-Data-Center\">\u6570\u636e\u4e2d\u5fc3<\/a>\u7684\u8f6f\u4ef6\u5b9a\u4e49\u7f51\u7edc \uff08SDN\uff09 \u89e3\u51b3\u65b9\u6848\u3002\u5e02\u573a\u5b9a\u4f4d\u662f\u201c\u7b80\u5316\u3001\u4f18\u5316\u548c\u52a0\u901f\u5728\u9ad8\u5ea6\u53ef\u6269\u5c55\u548c\u654f\u6377\u7684\u7f51\u7edc\u73af\u5883\u4e2d\u90e8\u7f72\u548c\u7ba1\u7406\u5e94\u7528\u201d\u3002<\/p>\n<p>ACI \u901a\u8fc7\u63d0\u4f9b\u5177\u6709\u96c6\u4e2d\u81ea\u52a8\u5316 (centralized automation) \u548c\u7b56\u7565\u9a71\u52a8\u578b\u5e94\u7528\u7a0b\u5e8f (policy-driven application profiles) \u914d\u7f6e\u6587\u4ef6\u7684\u6574\u4f53\u67b6\u6784\u6765\u5b9e\u73b0\u8fd9\u4e00\u76ee\u6807\u3002<\/p>\n<p>\u601d\u79d1 ACI \u7684\u4eae\u70b9\uff1a<br \/>\nCentralized Management and Automation: <\/p>\n<p>\u96c6\u4e2d\u7ba1\u7406\u548c\u81ea\u52a8\u5316\uff1a<\/p>\n<p>ACI uses the Application Policy Infrastructure Controller (APIC) as the centralized management console. APIC enables network administrators to automate and centrally manage the entire data center network. <\/p>\n<p>ACI \u4f7f\u7528\u5e94\u7528\u7a0b\u5e8f\u7b56\u7565\u57fa\u7840\u7ed3\u6784\u63a7\u5236\u5668 \uff08APIC\uff09 \u4f5c\u4e3a\u96c6\u4e2d\u5f0f\u7ba1\u7406\u63a7\u5236\u53f0\u3002APIC \u4f7f\u7f51\u7edc\u7ba1\u7406\u5458\u80fd\u591f\u81ea\u52a8\u5316\u548c\u96c6\u4e2d\u7ba1\u7406\u6574\u4e2a\u6570\u636e\u4e2d\u5fc3\u7f51\u7edc\u3002<\/p>\n<p>\u4ece\u5b9e\u9645\u4f7f\u7528\u4f53\u9a8c\u6765\u8bf4\uff0c\u56fe\u5f62\u5316\u7ba1\u7406\u5f88\u53cb\u597d\uff0c\u5e76\u4e14\u5e94\u8be5\u662f\u672a\u6765\u7684\u8d8b\u52bf\u3002\u5355\u7eaf\u7684\u5f92\u624b\u6572\u547d\u4ee4\u884c\u5df2\u7ecf\u65e0\u6cd5\u5f88\u597d\u7684\u7ba1\u7406\u5927\u89c4\u6a21\u7684\u7f51\u7edc\u8bbe\u5907\u4e86\u3002<\/p>\n<p>Policy-Driven Architecture: <\/p>\n<p>\u7b56\u7565\u9a71\u52a8\u67b6\u6784\uff1a<\/p>\n<p>ACI allows the definition of policies that specify how applications interact with the network. These policies are abstracted from the underlying hardware, enabling easier management and consistency across different environments. <\/p>\n<p>ACI \u5141\u8bb8\u5b9a\u4e49\u6307\u5b9a\u5e94\u7528\u7a0b\u5e8f\u5982\u4f55\u4e0e\u7f51\u7edc\u4ea4\u4e92\u7684\u7b56\u7565\u3002\u8fd9\u4e9b\u7b56\u7565\u662f\u4ece\u5e95\u5c42\u786c\u4ef6\u4e2d\u62bd\u8c61\u51fa\u6765\u7684\uff0c\u4ece\u800c\u53ef\u4ee5\u66f4\u8f7b\u677e\u5730\u8de8\u4e0d\u540c\u73af\u5883\u8fdb\u884c\u7ba1\u7406\u548c\u4e00\u81f4\u6027\u3002 \u4ece\u5b9e\u9645\u5e94\u7528\u6765\u770b\uff0c\u8fd9\u90e8\u5206\u53ef\u4ee5\u53c2\u8003\u601d\u79d1 ACI \u7684 managed objects<\/p>\n<p>Scalability and Flexibility: <\/p>\n<p>\u53ef\u6269\u5c55\u6027\u548c\u7075\u6d3b\u6027\uff1a<\/p>\n<p>The ACI architecture can scale to accommodate thousands of devices and millions of endpoints. It supports a wide range of physical and virtual devices, providing flexibility in deployment. <\/p>\n<p>ACI \u67b6\u6784\u53ef\u4ee5\u6269\u5c55\u4ee5\u5bb9\u7eb3\u6570\u5343\u53f0\u8bbe\u5907\u548c\u6570\u767e\u4e07\u4e2a\u7aef\u70b9\u3002\u5b83\u652f\u6301\u5404\u79cd\u7269\u7406\u548c\u865a\u62df\u8bbe\u5907\uff0c\u63d0\u4f9b\u90e8\u7f72\u7075\u6d3b\u6027\u3002<\/p>\n<p>ACI \u80fd\u591f\u652f\u6301\u6570\u767e\u4e07\u4e2a endpoint \u7684\u539f\u56e0\uff0c\u53ef\u4ee5\u4ece ACI Endpoint Manager \/ EPM \u4ecb\u7ecd \u91cc\u9762\u4e86\u89e3\u4e00\u4e0b\uff0cACI \u662f\u5982\u4f55\u5b66\u4e60\/\u540c\u6b65 endpoints\uff0c\u5982\u4f55\u8282\u7701 TCAM \u7a7a\u95f4\u3002<\/p>\n<p>Security and Micro-Segmentation: <\/p>\n<p>\u5b89\u5168\u548c\u5fae\u5206\u6bb5\uff1a<\/p>\n<p>ACI provides built-in security features, including micro-segmentation, which allows fine-grained control over network traffic between application components. This enhances security by isolating workloads and limiting the attack surface. <\/p>\n<p>ACI \u63d0\u4f9b\u5185\u7f6e\u7684\u5b89\u5168\u529f\u80fd\uff0c\u5305\u62ec\u5fae\u5206\u6bb5\uff0c\u5141\u8bb8\u5bf9\u5e94\u7528\u7a0b\u5e8f\u7ec4\u4ef6\u4e4b\u95f4\u7684\u7f51\u7edc\u6d41\u91cf\u8fdb\u884c\u7ec6\u7c92\u5ea6\u63a7\u5236\u3002\u8fd9\u901a\u8fc7\u9694\u79bb\u5de5\u4f5c\u8d1f\u8f7d\u548c\u9650\u5236\u653b\u51fb\u9762\u6765\u589e\u5f3a\u5b89\u5168\u6027\u3002 <\/p>\n<p>ACI \u8981\u6c42\u4e0d\u540c EPG \u4e4b\u95f4\u901a\u4fe1\u5fc5\u987b\u914d\u7f6e contract\uff0c\u540c\u65f6\u5bf9\u4e8e\u76f8\u540c EPG \u7684 endpoints \u5982\u679c\u9700\u8981\u9694\u79bb\uff0c\u4e5f\u53ef\u4ee5\u6253\u5f00 Intra-EPG contract \u529f\u80fd\u3002<\/p>\n<p>Multi-Cloud and Hybrid Cloud Support: <\/p>\n<p>\u591a\u4e91\u548c\u6df7\u5408\u4e91\u652f\u6301\uff1a<\/p>\n<p>ACI extends its policy-driven model to multi-cloud and hybrid cloud environments. This ensures consistent networking and security policies across on-premises data centers and public cloud services. <\/p>\n<p>ACI \u5c06\u5176\u7b56\u7565\u9a71\u52a8\u578b\u6a21\u578b\u6269\u5c55\u5230\u591a\u4e91\u548c\u6df7\u5408\u4e91\u73af\u5883\u3002\u8fd9\u53ef\u786e\u4fdd\u8de8\u672c\u5730\u6570\u636e\u4e2d\u5fc3\u548c\u516c\u6709\u4e91\u670d\u52a1\u5b9e\u73b0\u4e00\u81f4\u7684\u7f51\u7edc\u548c\u5b89\u5168\u7b56\u7565\u3002<\/p>\n<p>Simplified Troubleshooting and Monitoring: <\/p>\n<p>\u7b80\u5316\u7684\u6545\u969c\u6392\u9664\u548c\u76d1\u63a7\uff1a<\/p>\n<p>With tools like Cisco Network Assurance Engine and Telemetry, ACI provides advanced monitoring, troubleshooting, and analytics capabilities. These tools help in identifying and resolving issues proactively. <\/p>\n<p>\u501f\u52a9\u601d\u79d1\u7f51\u7edc\u611f\u77e5\u5f15\u64ce\u548c\u9065\u6d4b\u7b49\u5de5\u5177\uff0cACI \u53ef\u63d0\u4f9b\u9ad8\u7ea7\u76d1\u63a7\u3001\u6545\u969c\u6392\u9664\u548c\u5206\u6790\u529f\u80fd\u3002\u8fd9\u4e9b\u5de5\u5177\u6709\u52a9\u4e8e\u4e3b\u52a8\u8bc6\u522b\u548c\u89e3\u51b3\u95ee\u9898\u3002<\/p>\n<p>Integration with DevOps Tools: <\/p>\n<p>\u4e0e DevOps \u5de5\u5177\u96c6\u6210\uff1a<\/p>\n<p>ACI integrates with various DevOps tools and platforms, such as Kubernetes, OpenStack, and VMware. This enables seamless deployment and management of containerized and virtualized workloads. <\/p>\n<p>ACI \u4e0e\u5404\u79cd DevOps \u5de5\u5177\u548c\u5e73\u53f0\u96c6\u6210\uff0c\u4f8b\u5982 Kubernetes\u3001OpenStack \u548c VMware\u3002\u8fd9\u6837\u53ef\u4ee5\u65e0\u7f1d\u90e8\u7f72\u548c\u7ba1\u7406\u5bb9\u5668\u5316\u548c\u865a\u62df\u5316\u5de5\u4f5c\u8d1f\u8f7d\u3002<\/p>\n<p>Enhanced Performance and Efficiency: <\/p>\n<p>\u589e\u5f3a\u7684\u6027\u80fd\u548c\u6548\u7387\uff1a<\/p>\n<p>The architecture of ACI optimizes network performance by dynamically adjusting to the needs of applications. This results in improved resource utilization and lower operational costs. <\/p>\n<p>ACI \u7684\u67b6\u6784\u901a\u8fc7\u52a8\u6001\u8c03\u6574\u5e94\u7528\u9700\u6c42\u6765\u4f18\u5316\u7f51\u7edc\u6027\u80fd\u3002\u8fd9\u6837\u53ef\u4ee5\u63d0\u9ad8\u8d44\u6e90\u5229\u7528\u7387\u5e76\u964d\u4f4e\u8fd0\u8425\u6210\u672c\u3002<\/p>\n<p>Support for Open Standards: <\/p>\n<p>\u652f\u6301\u5f00\u653e\u6807\u51c6\uff1a<\/p>\n<p>ACI is built on open standards, which ensures interoperability with third-party solutions and protects against vendor lock-in. This provides flexibility in choosing the best-of-breed components for the network.<\/p>\n<p>ACI \u5efa\u7acb\u5728\u5f00\u653e\u6807\u51c6\u4e4b\u4e0a\uff0c\u53ef\u786e\u4fdd\u4e0e\u7b2c\u4e09\u65b9\u89e3\u51b3\u65b9\u6848\u7684\u4e92\u64cd\u4f5c\u6027\uff0c\u5e76\u9632\u6b62\u4f9b\u5e94\u5546\u9501\u5b9a\u3002\u8fd9\u4e3a\u4e3a\u7f51\u7edc\u9009\u62e9\u540c\u7c7b\u6700\u4f73\u7ec4\u4ef6\u63d0\u4f9b\u4e86\u7075\u6d3b\u6027\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u539f\u521b Luke \u7f51\u5de5\u7b14\u8bb0\u672c \u548c\u5927\u5b66\u540c\u5b66\u5728\u804a\u5929\u65f6\u5019\u53d1\u73b0\uff0c\u5373\u4f7f\u5927\u5bb6\u90fd\u662f\u4ece\u7f51\u7edc\u5de5\u7a0b\u4e13\u4e1a\u6bd5\u4e1a\uff0c\u6709\u7740\u76f8\u4f3c\u7684\u80cc\u666f\uff0c\u4e0d\u8fc7\u7531\u4e8e [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[3357,3392],"class_list":["post-6117","post","type-post","status-publish","format-standard","hentry","category-killtest","tag-300-610","tag-350-601"],"_links":{"self":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts\/6117","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/comments?post=6117"}],"version-history":[{"count":1,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts\/6117\/revisions"}],"predecessor-version":[{"id":6118,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/posts\/6117\/revisions\/6118"}],"wp:attachment":[{"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/media?parent=6117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/categories?post=6117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.killtest.hk\/index.php\/wp-json\/wp\/v2\/tags?post=6117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}