Port Assignment
Location in GUI: Provision » SD-Access » Fabric Sites » [Site Name] » Port Assignment
Diagram
Section titled “Diagram”Classes
Section titled “Classes”devices (catalyst_center.inventory)
Section titled “devices (catalyst_center.inventory)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| port_assignments | List | [port_assignments] | No |
port_assignments (catalyst_center.inventory.devices)
Section titled “port_assignments (catalyst_center.inventory.devices)”| Name | Type | Constraint | Mandatory | Default Value |
|---|---|---|---|---|
| interface_name | String | No | ||
| interfaces_range | String | Regex: ^[A-Za-z]+\d+(/\d+)+-\d+(/\d+)+$ | No | |
| interface_description | String | No | ||
| connected_device_type | Choice | USER_DEVICE, ACCESS_POINT, TRUNKING_DEVICE, AUTHENTICATOR_SWITCH, SUPPLICANT_BASED_EXTENDED_NODE | Yes | |
| data_vlan_name | String | No | ||
| voice_vlan_name | String | No | ||
| security_group_name | String | No | ||
| authenticate_template_name | Choice | No Authentication, Open Authentication, Closed Authentication, Low Impact | No |
Examples
Section titled “Examples”Example-1: Single Interface Port Assignment
This example demonstrates how to configure a single port assignment on an SD-Access fabric edge node. Port assignments define how physical switch ports connect endpoints to the fabric, specifying the connected device type, VLAN assignment, security group, and authentication template.
---catalyst_center: inventory: devices: - name: EDGE01 fqdn_name: EDGE01.cisco.eu device_ip: 198.18.130.1 pid: C9KV-UADP-8P state: PROVISION device_role: ACCESS site: Global/Poland/Krakow/Bld A fabric_site: Global/Poland/Krakow fabric_roles: - EDGE_NODE port_assignments: - interface_name: GigabitEthernet1/0/2 interface_description: "User workstation port" connected_device_type: USER_DEVICE security_group_name: Employees data_vlan_name: "192_168_100_0-Campus" authenticate_template_name: "No Authentication"Example-2: Interface Range Port Assignment
This example shows how to configure port assignments using an interface range, which allows applying the same configuration to multiple consecutive ports efficiently. This is useful for bulk provisioning of access ports.
The interface range format follows the pattern InterfaceType<slot>/<module>/<start_port>-<slot>/<module>/<end_port> (e.g., GigabitEthernet1/0/3-1/0/5 covers ports 3, 4, and 5).
---catalyst_center: inventory: devices: - name: EDGE02 fqdn_name: EDGE02.cisco.eu device_ip: 198.18.130.2 pid: C9KV-UADP-8P state: PROVISION device_role: ACCESS site: Global/Poland/Krakow/Bld A fabric_site: Global/Poland/Krakow fabric_roles: - EDGE_NODE port_assignments: - interfaces_range: "GigabitEthernet1/0/3-1/0/5" interface_description: "Conference room ports" connected_device_type: USER_DEVICE security_group_name: Employees data_vlan_name: "192_168_100_0-Campus" authenticate_template_name: "No Authentication"Example-3: Comprehensive Port Assignments
This example demonstrates a comprehensive port assignment configuration with multiple port types on a single edge device, including user devices with voice and data VLANs, access points, and trunking devices.
---catalyst_center: inventory: devices: - name: EDGE03 fqdn_name: EDGE03.cisco.eu device_ip: 198.18.130.3 state: PROVISION device_role: ACCESS site: Global/Enterprise/Building_C fabric_site: Global/Enterprise fabric_roles: - EDGE_NODE port_assignments: # User workstation ports with voice and data - interfaces_range: "GigabitEthernet1/0/1-1/0/20" interface_description: "User workstations - Floor 3" connected_device_type: USER_DEVICE data_vlan_name: "EMPLOYEES" voice_vlan_name: "VOICE" security_group_name: Employees authenticate_template_name: "Closed Authentication" # Access Point ports - interface_name: GigabitEthernet1/0/21 interface_description: "Wireless AP - Floor 3" connected_device_type: ACCESS_POINT data_vlan_name: "AP_POOL" authenticate_template_name: "No Authentication" # Printer port - interface_name: GigabitEthernet1/0/23 interface_description: "Network printer" connected_device_type: USER_DEVICE data_vlan_name: "PRINTERS" security_group_name: Printers authenticate_template_name: "Open Authentication" # Uplink to legacy switch - interface_name: GigabitEthernet1/0/24 interface_description: "Legacy switch uplink" connected_device_type: TRUNKING_DEVICE data_vlan_name: "INFRASTRUCTURE" authenticate_template_name: "No Authentication"