dcappcenter.cisco.com no longer supports IE 11.
For an optimal experience, please update to a modern browser .

Cookies policy

Like many companies, Cisco uses cookies and other technologies, some of which are essential to make our website work. Others help us improve services and the user experience or to advertise. In using our site, you consent to the use of these cookies and other technologies. Learn more about cookies and other technologies we use.

Starting with ACI release 6.1.2, AppCenter and its applications can no longer be hosted on Cisco APIC. For any questions or support, feel free to reach out to us at aciappcenter-support@external.cisco.com.

ACI Endpoint Update

Company: Cisco
1248 downloads
App checksum
md5 : fc3dff4e1fcbcb30323f69ff61206140

Details

Cisco Application Centric Infrastructure (ACI) is a software-defined network solution and application-intelligent fabric that brings application, security, and infrastructure together in the data center. The Cisco Application Policy Infrastructure Controller (APIC) provides single-click access to all Cisco ACI fabric information, helping enable network automation, programmability, and centralized management. The Endpoint Update app periodically retrieves endpoint information from the APIC and pushes it to FMC/ASA. This helps when configuring access rule/policy on FMC or ACL/ACE on ASA.

Changes in 2.6 since 2.5:

CSCwe47470: IP mappings of a referenced dynamic object remains zero.
CSCwe57875: Need to remove deprecated command sent to ASA version 9.18 or later.

To configure the app installed on the APIC, complete the following procedure:

Step 1: In the APIC, navigate to Apps > Apps > ACI Endpoint Update.

Step 2: The Update Interval value is user configurable. The default interval is every 60 seconds. The minimum interval is 10 seconds.

Step 3: Click "Config Devices" (the toolset icon) to add Secure Firewall Management Center/Secure Firewall ASA login credentials.

Note:
The app supports NAT port forwarding in cases where the Secure Firewall Management Center/Secure Firewall ASA is behind a NAT device. Append the port number to the IP address. For example, 10.2.0.42:5001.

Step 4: After you’ve configured all your Tenant/Secure Firewall Management Centers/Secure Firewall ASAs, click Test Connectivity icon to verify target devices are reachable.