Skip to Content

This browser is no longer supported.

For the best WWT.com experience, please use one of our supported browsers.

Safari Logo Safari Chrome Logo Chrome Firefox Logo Firefox Edge Logo Edge
Search wwt.com...
Top page results

See all search results

Featured Solutions
What's trending
Help Center
Home
Solutions & Services
Solutions
AI and Data
Automation & Orchestration
Cloud
Data Center
Digital
Digital Workspace
ESG
Mobility
Networking
Security Transformation
See all Solutions
See all Solutions
Services
Application Services
ATC Lab Services
Consulting Services
Customer Success
Infrastructure Services
Mergers & Acquisitions
Strategic Resourcing
Supply Chain & Integration
See all Services
See all Services
Industries
Utilities
Financial Services
Global Service Provider
Healthcare
Life Sciences
Manufacturing
Oil & Gas
Public Sector
Retail
See all Industries
See all Industries
Partners
Cisco
Dell Technologies
HPE
NetApp
VMware
f5
Intel
Microsoft
Palo Alto
See all Partners
See all Partners
Learning & Support
ATC
Communities
Events
Labs
Learning Paths
Research
About
Footer Links
Blog
Careers
Contact Us
Diversity & Inclusion
Locations
News
Sustainability
Cisco Network Security Cisco Security ATC Cisco ACI Cisco Zero Trust Data Center Networking Networking Security Transformation
Video
•
300
views
•
19:21
•

January 10, 2023

Cisco ACI Segmentation Migration Video

Implementing an application-centric mode to specifically meet a segmentation strategy and zone architecture requires a different approach — one referred to as the hybrid model.

Features of Cisco Application Centric Infrastructure (ACI) can be designed to implement a zone architecture through the hybrid model. This video demonstration outlines the step-by-step process for placing endpoints into a logical endpoint group (EPG) and applying security enforcement for the entire group to ensure consistency. This video highlights a design model that allows easier segmentation of applications while ensuring mobility of endpoints.

Technologies

Contributors

User Profile Picture
Steve Brodson
Cybersecurity Architect
User Profile Picture
Peter Zhang
Architect
© World Wide Technology. All Rights Reserved
  • About
  • Blog
  • Careers
  • Locations
  • News
  • Press Kit
  • Contact Us
  • Privacy Policy
  • Acceptable Use Policy
  • Quality
  • Information Security
  • Supplier Management
  • Cookies