In the last chapter of this module, we'll cover some best practices to help you along the way. We'll start with Snapshots and Rollbacks to protect your configuration from unwanted changes and complicated troubleshooting, restoring the network in seconds. Then we'll move to how ACI works in terms of deployment and resolution immediacy plus a few ways to optimize TCAM utilization with concepts such as Unenforced VRF, vzAny and Preferred Groups. We will also take a glimpse into Contract Inheritance and Policy Compression as well as the new End-Point Security Groups (ESGs) which became available in ACI 5.0. Last, we will compare static EPG binding versus L2 Out as methods to integrate external L2 connectivity into ACI