~40 min read · updated 2026-05-16

Access policies and static paths

How VLAN pools, domains, AEPs, interface policy groups, and static bindings connect endpoints to EPGs.

Access policy is where many ACI beginners get stuck. Tenant policy says what the application model should be. Access policy says how physical or virtual interfaces can carry that application policy.

The chain

The usual mental chain is:

LayerObject examplesPurpose
VLAN allocationVLAN poolDefines which VLAN IDs can be used
Attachment typePhysical domain or VMM domainSays where those VLANs are valid
Access entityAEPConnects domains to interface policy groups
Interface behaviorPolicy group, interface profile, switch profileDefines how ports behave
Tenant bindingStatic path binding on EPGMaps an EPG to a path and VLAN

It feels like many objects because ACI separates reusable infrastructure policy from tenant application policy.

Static path binding

Static path binding is the place where an EPG is attached to a specific path.

For example:

EPGPathEncapsulation
webleaf 101 interface 1/10VLAN 110
appleaf 101 interface 1/11VLAN 120
dbleaf 102 interface 1/12VLAN 130

The simulator can show these relationships, but it will not give you the same traffic validation as a real fabric.

What to practice

Create a small access policy model:

  1. VLAN pool lab-vlans with VLANs 110-130.
  2. Physical domain lab-phys.
  3. AEP lab-aep associated with the physical domain.
  4. Interface policy group lab-access-pg.
  5. Interface profile for one simulated leaf.
  6. Static bindings from your EPGs to simulated paths.

After each step, check faults. Most ACI access policy mistakes are missing links in this chain.

Common mistakes

SymptomLikely cause
EPG binding faultMissing domain association
VLAN faultVLAN not in the pool or wrong allocation mode
Path does not appearWrong switch or interface profile
Policy exists but does nothingObject created but not attached to the chain

Do not memorize clicks. Draw the chain and verify each object has a reason to exist.