Click here to load reader

Cisco Nexus 1000V

  • View
    65

  • Download
    3

Embed Size (px)

DESCRIPTION

Cisco Nexus 1000V. Ralf Eberhardt [email protected] Legal Disclaimer. - PowerPoint PPT Presentation

Text of Cisco Nexus 1000V

Server VirtualizationCisco Confidential
Cisco Confidential
Legal Disclaimer
*
Cisco Confidential
Cisco VN-Link Introduction
Cisco Nexus 1000V
Cisco Confidential
With virtualization, VMs have a transparent view of their resources…
Transparency in the Eye of the Beholder
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
*
…but its difficult to correlate network and storage back to virtual machines
Transparency in the Eye of the Beholder
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Transparency in the Eye of the Beholder
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Security and Policy Enforcement
Inefficient management model and inability to effectively troubleshoot
Operations and
Organizational
Structure
Higher % of virtual workloads are mission critical
Disparate operation models are inefficient
Lack of visibility impacts problem resolution
Security & Compliance enforcement is missing
*
Cisco Confidential
Abstract physical and logical infrastructure
Virtual machines are the new data center building block
Cisco Virtual Network Link – VN-Link
Virtualizing the Network Domain
Cisco Confidential
Problems:
VN-Link:
Consistent services
VMotion may move VMs across physical ports—policy must follow
Impossible to view or apply policy to locally switched traffic
Cannot correlate traffic on physical links—from multiple VMs
VLAN
101
Cisco Confidential
Nexus 1000V provides enhanced VM switching for VMW ESX environments
Features VN-Link capabilities:
Policy-based VM connectivity
Non-disruptive operational model
Enabling Acceleration of Server Virtualization Benefits
VMW ESX
Server 1
VMware vSwitch
VMW ESX
VMware vSwitch
Server 2
Cisco Confidential
What is a Virtual Distributed Switch?
A Virtual Distributed Switch, is a concept developed by VMware and Cisco to allow a single vSwitch to span multiple hosts.
VMW calls this a vNetwork Distributed Switch.
The Cisco Nexus 1000V, a 3rd party virtual distributed switch, will be supported in VMware ESX and Virtual Infrastructure in the 1st half of 2009
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Performs management, monitoring, & configuration
Virtual Ethernet Module (VEM)
Collection of VEMs = 1 Distributed Switch
Cisco Nexus 1000V Enables:
Policy Based VM Connectivity
Non-Disruptive Operational Model
Performs management, monitoring, & configuration
Virtual Ethernet Module (VEM)
Collection
Cisco Confidential
Policy-Based
*
*
VM Connection Policy = Defined in the network, applied in Virtual Center
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
VMW ESX
*
*
VM Connection Policy = Defined in the network, applied in Virtual Center
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Virtual Center
VMW ESX
Improves operational security
*
*
VM Connection Policy = Defined in the network, applied in Virtual Center
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Cisco Confidential
Collaborative Deployment Model
Network Admin configures Nexus
1000V to support new ESX hosts
Server Admin plugs new ESX host into network & adds host to Cisco switch in Virtual Center
2.
Cisco Confidential
Collaborative Deployment Model
Network Admin configures Nexus 1000V to support new ESX hosts
Server Admin plugs new ESX host into network & adds host to Cisco switch in Virtual Center
Repeat step three to add another host and extend switch configuration
Virtual Center
VMW ESX
Server 1
Cisco Confidential
Nexus 1000V automatically enables port groups in Virtual Center
Server Admin uses Virtual Center to assign vnic policy from available port groups
Nexus 1000V automatically enables VM connectivity at VM power-on
1.
Rate Limit = 100 Mbps
Cisco Confidential
VMW ESX
Cisco TrustSec (SGT)
Cisco Confidential
Following Your VMs Around
Virtual Center kicks off a Vmotion (manual/DRS) and notifies Nexus 1000V
During VM replication, Nexus 1000V copies VM port state to new host
VMW ESX
Server 2
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Following Your VMs Around
Virtual Center kicks off a Vmotion (manual/DRS) & notifies Nexus 1000V
During VM replication, Nexus 1000V copies VM port state to new host
Once VMotion completes, port on new ESX host is brought up & VM’s MAC address is announced to the network
VMW ESX
Server 2
*
1. Prevents disparate vSwitch configs from impacting DRS or live VM migration
2. Enables security setting, network policy & connectivity state to move with Vmotion
3. Offers continuous traffic mirroring as VMs move between servers
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Cisco Confidential
Encapsulated Remote SPAN (ERSPAN)
Identify root cause for connectivity issues
No host-based sniffer virtual appliance to maintain
Follows your VM with VMotion or DRS
NetFlow v.9
Captures multi-tiered app traffic inside a single ESX host
Export aggregate stats to dedicated collector for DC-wide VM view
Follows your VM with VMotion or DRS
Private VLANs
Supports isolated, community and promiscuous trunk ports
Follows your VM with VMotion or DRS
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Server
*
VM Connection Policy = Defined in the network, applied in Virtual Center
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Switching
IGMP Snooping, QoS Marking/Queuing
Policy Mobility, PVLAN, ACL (L2–4 w/ Redirect), Port Security
Cisco TrustSec—Authentication, Admission, Access Control
Provisioning
Optimized NIC Teaming
Historical VMotion Tracking, ERSPAN, NetFlow v.9 w/ NDE, CDP v.2
VM-Level Interface Statistics, Wireshark
Cisco CLI, XML API, SNMP (v.1, 2, 3)
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
Pick Your Flavor
Works with all types of servers (rack optimized, blade servers, etc.)
Works with any type of upstream switch (Blade,
Top or Rack, Modular)
Works at any speed
(1G or 10G)
Nexus 1000V VSM can be deployed as a VM or a physical appliance
Blade Servers
Rack Optimized
Cisco Confidential
Scale the use of VMotion and DRS
Operation & Management
Scale with automated server & network provisioning
Organizational Structure
Cisco Confidential
http://www.cisco.com/go/datacenter
Cisco Confidential
Cisco Confidential
Cisco switch for VMW ESX
Compatible with any switching platform
Leverages Virtual Center for server admin; Cisco CLI for network admin
Scalable, hardware based, high performance solution
Standards driven approach to delivering hardware based VM networking
Combines VM & physical network operations into 1 managed node
Nexus 5000 with VN-Link
Mobility of Network
Cisco Confidential
Built on Cisco NX-OS
Compatible with switching platforms
Policy-Based
Cisco Confidential
Allows scalable hardware-based implementations through hardware switches
Standards-based initiative: Cisco & VMware proposal in IEEE 802 to specify “Network Interface Virtualization”
Combines VM and physical network operations into one managed node
VN-Link with Network Interface Virtualization
VMW ESX