Cisco
Cisco ACI Multi-Pod vs. Multi-Site: Architecture Choices in 2026
The choice between Cisco ACI Multi-Pod and Multi-Site is a defining architectural decision with consequences that extend far beyond the data sheet. Too often, this decision is framed as a simple matter of latency or scale. In reality, the correct choice for 2026 hinges on a sober assessment of failure domains, operational complexity, and total cost of ownership. Multi-Pod offers seductive simplicity at the cost of a monolithic failure domain, while Multi-Site provides true fault isolation but demands a higher level of engineering skill and a significantly larger budget. Choosing incorrectly leads not just to technical debt, but to career-defining outages.
Core Architectural Constructs: Pods and Sites
Before comparing the multi-fabric extensions, it is critical to have a precise understanding of the baseline components. The entire ACI portfolio is built upon a spine-leaf Clos topology, but how these topologies are managed and interconnected dictates the architecture.
The Single ACI Fabric: A Baseline Failure Domain
A standard ACI fabric consists of a cluster of at least three Application Policy Infrastructure Controllers (APICs), a set of spine switches (e.g., Nexus 9508 with Gen3 -FX3 line cards), and a set of leaf switches (e.g., Nexus 93180YC-FX3). This entire construct forms a single administrative and control plane domain. A fundamental ACI principle is that all endpoints within the fabric are a single hop away from each other from a policy and reachability perspective, enabled by the VXLAN overlay. Critically, this single fabric is a single failure domain. A catastrophic bug in the APIC software (running ACI version 6.0+) or a control plane meltdown of the Council of Oracle Protocol (COOP) can and will impact the entire fabric.
ACI Multi-Pod: The Stretched Single Fabric
ACI Multi-Pod can be thought of as taking a standard ACI fabric and "stretching" it across multiple physical locations, or "pods." Each pod is its own spine-leaf topology. However, all pods are managed by a *single* APIC cluster, which resides in one of the pods. The pods are connected via an IP-based Inter-Pod Network (IPN). From a management perspective, it’s one fabric. All configuration objects—tenants, EPGs, Bridge Domains (BDs)—are synchronized across all pods. This means you have a single pane of glass for management, but it also means you have a single, geographically distributed failure domain. A fault in the APIC cluster can render the entire multi-pod infrastructure unstable.
ACI Multi-Site: A Federation of Independent Fabrics
ACI Multi-Site presents a fundamentally different paradigm. Each "site" is a complete, independent ACI fabric with its own dedicated APIC cluster. These sites are fully autonomous; a failure in Site1 has zero operational impact on Site2. The sites are interconnected via a standard IP/MPLS or VXLAN EVPN network. The magic happens with the Nexus Dashboard Orchestrator (NDO), formerly Multi-Site Orchestrator (MSO). Running on a separate Nexus Dashboard cluster, NDO (version 4.2+) acts as a federation and policy orchestration engine. An administrator defines templates and policies in NDO, which then pushes the corresponding configurations down to each site’s local APIC cluster. It does not manage the fabrics in real-time; it is an orchestration layer, not a control plane component.
The Interconnect: IPN vs. ISN Detail
The network that connects your pods or sites is not a trivial implementation detail; it is a core component of the architecture with specific, rigid requirements.
Multi-Pod IPN Design Requirements
The IPN is a Layer 3 network connecting the spine switches of each pod. The spines establish OSPF adjacencies with the IPN devices and BGP EVPN sessions with spines in other pods. Key requirements include:
- High MTU: The IPN must support an MTU of at least 9150 bytes to accommodate the VXLAN-encapsulated traffic (50-byte overhead) without fragmentation. Non-negotiable. Using devices like the Catalyst 9500-48UXM for the IPN requires careful end-to-end MTU validation.
- Multicast: PIM-Bidir is the required routing protocol to efficiently handle Broadcast, Unknown Unicast, and Multicast (BUM) traffic that must be flooded between pods. While other PIM modes can work, Bidir is the standard design.
- DHCP Relay: The APIC uses DHCP to assign TEP addresses to nodes, including spines in remote pods. The IPN must be configured with DHCP relay agents pointing to the TEP pool subnet defined in the APIC.
- Latency: The official supported round-trip time (RTT) is 50ms. However, any design stretching L2 Bridge Domains over an IPN with latency greater than 10ms is courting disaster. High latency amplifies the impact of broadcast storms and can cause severe performance degradation for applications like vMotion. For L3-only routed connectivity between pods, 50ms is more realistic.
Multi-Site Inter-Site Network (ISN)
The ISN for Multi-Site is simpler in its ACI-specific requirements but assumes a more sophisticated underlying network. The ISN is typically a carrier-provided MPLS L3VPN or, increasingly, a self-managed dark fiber network running VXLAN BGP EVPN. The data plane connection is from spine to spine, which leverages BGP EVPN sessions to exchange endpoint reachability information between sites. NDO orchestrates the establishment of these BGP sessions, but the underlying network transport is independent of ACI. This is a crucial distinction: Multi-Site doesn't dictate *how* your sites are connected, only that they *can* exchange routed traffic with appropriate MTU.
Failure Domains and Blast Radius
This is the most important consideration. A larger failure domain simplifies management but increases risk. Multi-Pod and Multi-Site sit at opposite ends of this spectrum.
With Multi-Pod, a bug in ACI, a flawed configuration push, or an APIC control-plane failure is a global event. A change made through the APIC GUI or API is propagated to all pods simultaneously. Imagine a scenario where a bug in COOP leads to a fabric-wide endpoint learning issue. In a Multi-Pod design, this issue would instantly span all your data centers. Your disaster recovery site would be impacted by the same fault as your primary site, rendering it useless. This is an unacceptable risk for most enterprise-grade deployments aiming for true business continuity.
Multi-Site, by contrast, offers robust fault isolation. Each site is a self-contained ACI fabric. The Nexus Dashboard Orchestrator is an out-of-band orchestration platform. If the NDO cluster fails, inter-site policy *changes* can no longer be made, but the existing data plane and control planes of each site continue to function perfectly. Data traffic between sites is unaffected. A bug in the ACI version running in Site1 does not propagate to Site2. This allows for staggered, controlled upgrades (e.g., upgrade Site2 to ACI 6.1, validate, then upgrade Site1 weeks later), a critical operational safety net that Multi-Pod lacks.
Sizing Example: Inter-Site Bandwidth and NDO Resources
Let's model a typical two-site scenario: two data centers 80km apart, needing to support active/active application clusters and database replication.
- Sites: 2
- Total Leafs: 300 (150 per site)
- Tenants: 50
- EPGs: 3,000
- Peak Inter-Site Replication Traffic: 150 Gbps
Multi-Pod Sizing Approach
For Multi-Pod, the primary concern is the IPN. You need IPN devices capable of forwarding 150 Gbps of line-rate, large-packet traffic. A pair of Juniper SRX5800s or Cisco Catalyst 9606R chassis with sufficient 100G port density would be required. The bigger issue is L2 BUM traffic. If you stretch 500 VLANs (as BDs) between pods, and each generates just 10 Mbps of BUM traffic on average, that's 5 Gbps of constant multicast traffic consuming IPN bandwidth and CPU on the IPN routers. This calculation is frequently overlooked. (Number of Stretched BDs) * (Avg BUM traffic per BD) = IPN constant load. This load is always present and must be factored into your bandwidth planning.
Multi-Site Sizing Approach
For Multi-Site, you provision a 200Gbps (150 Gbps + 33% headroom) L3VPN/EVPN Wave service from a carrier. The focus shifts to sizing the Nexus Dashboard cluster. Based on the Cisco NDO 4.2 sizing guide, managing 2 sites, 3000 EPGs, and 50 tenants requires a 3-node NDO cluster where each node is a virtual machine with approximately 16 vCPUs, 64GB RAM, and 1TB of disk space. This is a non-trivial virtualization footprint. The cost is not in the data path bandwidth calculation (which is a simple carrier circuit cost) but in the compute and software licensing for NDO and the redundant APIC cluster in the second site.
Common Pitfall: Stretching L2 Over DCI
The single most dangerous capability offered by both Multi-Pod and Multi-Site is the ability to stretch a Layer 2 Bridge Domain between geographically separate locations. While technically possible, it is almost always an architectural mistake. Stretching L2 creates a single broadcast domain, meaning a broadcast storm in one site will flood the DCI/IPN links and impact the other site (fate-sharing). It complicates troubleshooting and often serves as a crutch to avoid modernizing legacy applications that have hard-coded IP addresses. While Multi-Site is more elegant in how it tunnels the L2 traffic with VXLAN, the fundamental problem remains. The best practice in 2026 is to keep L2 domains local to a single site and use L3-only routed connectivity between sites for all traffic. Do not stretch.
When NOT to Use ACI Multi-Site
Despite its technical superiority in fault isolation, Multi-Site is not a universal solution. There are specific scenarios where Multi-Pod is the more pragmatic choice.
First is cost. A Multi-Site deployment requires a full APIC cluster (at least 3 nodes) for *each site*, plus a Nexus Dashboard cluster (physical or virtual), plus NDO software licensing (e.g., N-D-ADV-S-GF). This can easily double the controller and software cost compared to a Multi-Pod design which uses a single APIC cluster. If your two "sites" are merely two floors in the same building, the cost of Multi-Site is unjustifiable.
Second is scale and latency. For a small deployment (e.g., <80 leaf switches total) across two metro locations with dark fiber and <5ms RTT, Multi-Pod offers a unified management plane that is simpler to operate than NDO. The risk of a single failure domain can be a calculated, acceptable trade-off for operational simplicity when the physical proximity and low latency limit the potential for network-induced issues.
Finally, consider your team's skillset. Multi-Pod is a direct extension of single-fabric ACI knowledge. Multi-Site, with NDO, schema templates, and the need to manage an underlying BGP EVPN inter-site network, represents a significant step up in complexity. If your team is not ready for that operational leap, implementing Multi-Site can introduce more risk from misconfiguration than it solves through fault isolation.
Ultimately, the decision rests on a clear-eyed evaluation of risk. Multi-Pod prioritizes simplified operations within a single, stretched failure domain, making it suitable for metro-area deployments where cost and simplicity are paramount and the risk is deemed acceptable. Multi-Site prioritizes fault isolation and scalability above all else, making it the required choice for large-scale, geographically dispersed networks where business continuity is non-negotiable. Choose the architecture that aligns with your operational reality and budget, not just the one that is technically possible.
At TechLeague, our certified experts can help you model the TCO and operational impact of both architectures for your specific environment. Contact us to start the conversation. Read our related posts on VXLAN EVPN design and the Nexus Dashboard ecosystem to learn more.
Frequently asked questions
What is the real-world latency limit for an ACI Multi-Pod IPN?+
Cisco officially supports up to 50ms RTT for the IPN. However, for any design that stretches Layer 2 Bridge Domains, a practical limit of 10ms should be enforced. Latency above this level dramatically increases the risk of application performance issues for traffic within the stretched broadcast domain.
Does Nexus Dashboard Orchestrator (NDO) sit in the data path?+
No. NDO is a purely out-of-band orchestration and policy management platform. It configures the APIC clusters in each site, but all data traffic flows directly between the spine switches of the respective sites over the Inter-Site Network (ISN). An NDO failure does not impact existing data traffic.
Can I run Multi-Pod and Multi-Site simultaneously?+
Yes, this is a supported, albeit complex, topology. A Multi-Pod fabric can be configured to act as a single 'site' within a larger ACI Multi-Site architecture. This is typically used to consolidate management of two close-proximity pods before connecting them as a single logical entity to a remote DR site.
How does licensing differ between Multi-Pod and Multi-Site?+
Multi-Pod only requires the standard ACI Premier or Advantage licenses for the leaf switches; there's no extra license for Multi-Pod itself. Multi-Site requires ACI licenses for each site's leaves PLUS Nexus Dashboard licensing and a specific NDO application license (e.g., N-D-ADV-S-GF) which is tiered based on the number of sites and/or leaf switches being managed.
What happens to inter-site traffic if NDO goes down?+
Existing data traffic is completely unaffected. The BGP EVPN sessions between sites remain active and endpoints learned via the overlay are maintained. The only impact of an NDO failure is the inability to make administrative changes to inter-site policies until the NDO cluster is restored.
Is PIM-Bidir a hard requirement for the Multi-Pod IPN?+
It is the Cisco-validated and recommended design for handling BUM traffic efficiently. While you can technically make it work with other multicast modes like PIM Sparse-Mode, it complicates the design with Rendezvous Point placement and potential traffic trombones. For any greenfield deployment, PIM-Bidir should be considered a firm requirement.
Can I use dark fiber for the Multi-Pod IPN?+
Absolutely. Dark fiber is an ideal transport for an IPN, especially for metro-area connections. You would place a pair of routers or Layer 3 switches (like Catalyst 9500s) at each end of the fiber to serve as the IPN devices, and then build the required OSPF/PIM/BGP peering over that link.