Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2026 Sponsors
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Videos / Understanding the Cisco ACI Policy Model

Understanding the Cisco ACI Policy Model



Networking Field Day 9

Carly Stoughton presented for Cisco at NFD9




This video is part of the appearance, “Cisco Presents At Networking Field Day 9“. It was recorded as part of Networking Field Day 9 at 8:00 - 10:00 on February 13, 2015.


Watch on YouTube
Watch on Vimeo

Carly Stoughton, a Technical Marketing Engineer at Cisco, presented an in-depth look at the Cisco ACI policy model during a Tech Field Day session on February 13, 2015. She emphasized the unique aspects of the ACI policy model, which focuses on the needs of applications rather than the traditional method of configuring individual network devices. Stoughton illustrated how ACI simplifies network management by defining who is on the network, who can communicate with whom, and what they are allowed to discuss. This approach contrasts with the traditional method of configuring multiple routers, switches, firewalls, and load balancers individually. The ACI policy model uses endpoint groups (EPGs) to categorize network entities that require similar treatment, and it employs a whitelist model where no communication is allowed until explicitly permitted through policies known as contracts.

Stoughton explained that an application typically consists of a front-end web tier, application servers, and a backend database, along with shared services like Active Directory, DHCP, and DNS. These components are grouped into EPGs, which are collections of endpoints needing similar network treatment. The ACI policy model is different from traditional Ethernet networks, as it does not allow any communication by default. Instead, it requires explicit policies, or contracts, to be defined to permit communication between EPGs. These contracts can specify actions such as permit, deny, redirect, log, or copy, and can be unidirectional or bidirectional. The policies are enforced at the leaf switches, which tag packets with source EPG information to ensure proper policy enforcement across the network fabric.

The session also covered the technical aspects of how ACI handles traffic and policy enforcement. Stoughton discussed various methods for defining EPGs, including VLANs, VXLAN tags, physical ports, and virtual ports. She highlighted the flexibility of the ACI policy model in integrating with existing network environments and its ability to support stateful and stateless filtering. The ACI fabric uses a spine-leaf architecture, ensuring predictable latency and bandwidth. Stoughton also touched on the role of the APIC controller cluster, which manages policy configurations and can be interacted with through a GUI or API. The APIC supports automated backups and the export of configurations for version control. Overall, the presentation showcased how the ACI policy model brings a new level of simplicity and efficiency to network management by aligning network configurations with application requirements.

Personnel: Carly Stoughton

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Nov 5-Nov 6 — Networking Field Day 39
  • Nov 11-Nov 12 — Tech Field Day at KubeCon North America 2025
  • Jan 28-Jan 29 — AI Infrastructure Field Day 4
  • Mar 11-Mar 12 — Cloud Field Day 25
  • Apr 29-Apr 30 — Security Field Day 15
  • May 6-May 8 — Mobility Field Day 14
  • May 13-May 14 — AI Field Day 8

Latest Coverage

  • Pure Storage Fusion V2: Shifting From Siloed to Cloud-Focused Storage
  • Beyond the Hype: The Promise and Practicality of NetApp’s New AI Strategy
  • HPE: Optimizing Hybrid Cloud For Success
  • Bridging the Trust Gap with 1Password
  • Storage’s Evolution: Pure Storage Highlights AI and Automation at Cloud Field Day 24

Tech Field Day News

  • Exploring How AI Transforms the Enterprise Network at Networking Field Day 39
  • Exploring the Future of Enterprise AI Deployment and Innovation at AI Field Day 7

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in