Starting with ACI release 6.1.2, AppCenter and its applications can no longer be hosted on Cisco APIC. For any questions or support, feel free to reach out to us at aciappcenter-support@external.cisco.com.

ACI Endpoint Update
Company: Cisco
Details
Cisco Application Centric Infrastructure (ACI) is a software-defined network solution and application-intelligent fabric that brings application, security, and infrastructure together in the data center. The Cisco Application Policy Infrastructure Controller (APIC) provides single-click access to all Cisco ACI fabric information, helping enable network automation, programmability, and centralized management. The Endpoint Update app periodically retrieves endpoint information from the APIC and pushes it to FMC/ASA. This helps when configuring access rule/policy on FMC or ACL/ACE on ASA.
Changes in 2.6 since 2.5:
CSCwe47470: IP mappings of a referenced dynamic object remains zero.
CSCwe57875: Need to remove deprecated command sent to ASA version 9.18 or later.
To configure the app installed on the APIC, complete the following procedure:
Step 1: In the APIC, navigate to Apps > Apps > ACI Endpoint Update.
Step 2: The Update Interval value is user configurable. The default interval is every 60 seconds. The minimum interval is 10 seconds.
Step 3: Click "Config Devices" (the toolset icon) to add Secure Firewall Management Center/Secure Firewall ASA login credentials.
Note:
The app supports NAT port forwarding in cases where the Secure Firewall Management Center/Secure Firewall ASA is behind a NAT device. Append the port number to the IP address. For example, 10.2.0.42:5001.
Step 4: After you’ve configured all your Tenant/Secure Firewall Management Centers/Secure Firewall ASAs, click Test Connectivity icon to verify target devices are reachable.
Changes in 2.6 since 2.5:
CSCwe47470: IP mappings of a referenced dynamic object remains zero.
CSCwe57875: Need to remove deprecated command sent to ASA version 9.18 or later.
To configure the app installed on the APIC, complete the following procedure:
Step 1: In the APIC, navigate to Apps > Apps > ACI Endpoint Update.
Step 2: The Update Interval value is user configurable. The default interval is every 60 seconds. The minimum interval is 10 seconds.
Step 3: Click "Config Devices" (the toolset icon) to add Secure Firewall Management Center/Secure Firewall ASA login credentials.
Note:
The app supports NAT port forwarding in cases where the Secure Firewall Management Center/Secure Firewall ASA is behind a NAT device. Append the port number to the IP address. For example, 10.2.0.42:5001.
Step 4: After you’ve configured all your Tenant/Secure Firewall Management Centers/Secure Firewall ASAs, click Test Connectivity icon to verify target devices are reachable.