50
Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published: May 08, 2014 Last Modified: December 19, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

  • Upload
    others

  • View
    19

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Cisco Nexus 1000V for Microsoft Hyper-V Network SegmentationManager Configuration Guide, Release 5.xFirst Published: May 08, 2014

Last Modified: December 19, 2014

Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800 553-NETS (6387)Fax: 408 527-0883

Page 2: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITEDWARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITHTHE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain versionof the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDINGANYOTHERWARRANTYHEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS"WITH ALL FAULTS.CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSEANDNONINFRINGEMENTORARISING FROMACOURSEOFDEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUTLIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERSHAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, networktopology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentionaland coincidental.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnershiprelationship between Cisco and any other company. (1110R)

© 2014 Cisco Systems, Inc. All rights reserved.

Page 3: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

C O N T E N T S

P r e f a c e Preface v

Audience v

Document Conventions v

Related Documentation for Cisco Nexus 1000V for KVM Software vi

Related Documentation for Cisco Nexus 1000V for Microsoft Hyper-V Software vii

Documentation Feedback viii

Obtaining Documentation and Submitting a Service Request viii

C H A P T E R 1 Overview 1

Information About Microsoft System Center Virtual Machine Manager 2012 SP1 1

Microsoft Hyper-V Extensible Switch 2

Logical Switch 2

Creating a Switch Extension 2

Cisco Nexus 1000V for Microsoft SCVMM 3

Logical Networks and Network Segment Pools 3

VM Networks 4

Network Segments 6

IP Pool Templates 7

Port Profiles 7

Policy and Network Separation 7

Dynamic Port Profiles 7

Uplink Port Profile 8

Configuring PVLANs 8

C H A P T E R 2 Configuring Network Segmentation Manager 9

Information About Network Segmentation Manager 9

Prerequisites 9

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x iii

Page 4: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Guidelines and Limitations 9

Building Network Infrastructure for Microsoft SCVMM 10

Creating a Logical Network 10

Creating a Network Segment Pool 11

Creating an IP Pool Template 12

Creating a Network Segment 14

Creating an Ethernet Port Profile 16

Creating a vEthernet Port Profile 18

Configuring an Uplink Network 19

Workflows in Microsoft SCVMM 21

Configuring a Network Uplink in Access Mode 21

Configuring Uplink Profile in Port-Channel Mode 24

Configuring a vEthernet Profile with Features 26

Configuring System VLAN 27

Configuring PVLAN on vEthernet and Ethernet Interfaces 29

Configuring Secondary PVLAN Mode 32

Feature History for Network Segmentation Manager 33

C H A P T E R 3 Verifying the Configuration using Show Commands 35

Verifying the NSM Configuration 35

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.xiv

Contents

Page 5: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Preface

This preface contains the following sections:

• Audience, page v

• Document Conventions, page v

• Related Documentation for Cisco Nexus 1000V for KVM Software, page vi

• Related Documentation for Cisco Nexus 1000V for Microsoft Hyper-V Software, page vii

• Documentation Feedback, page viii

• Obtaining Documentation and Submitting a Service Request, page viii

AudienceThis publication is for network administrators who configure and maintain Cisco Nexus devices.

Document ConventionsCommand descriptions use the following conventions:

DescriptionConvention

Bold text indicates the commands and keywords that you enter literallyas shown.

bold

Italic text indicates arguments for which the user supplies the values.Italic

Square brackets enclose an optional element (keyword or argument).[x]

Square brackets enclosing keywords or arguments separated by a verticalbar indicate an optional choice.

[x | y]

Braces enclosing keywords or arguments separated by a vertical barindicate a required choice.

{x | y}

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x v

Page 6: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

DescriptionConvention

Nested set of square brackets or braces indicate optional or requiredchoices within optional or required elements. Braces and a vertical barwithin square brackets indicate a required choice within an optionalelement.

[x {y | z}]

Indicates a variable for which you supply values, in context where italicscannot be used.

variable

A nonquoted set of characters. Do not use quotation marks around thestring or the string will include the quotation marks.

string

Examples use the following conventions:

DescriptionConvention

Terminal sessions and information the switch displays are in screen font.screen font

Information you must enter is in boldface screen font.boldface screen font

Arguments for which you supply values are in italic screen font.italic screen font

Nonprinting characters, such as passwords, are in angle brackets.< >

Default responses to system prompts are in square brackets.[ ]

An exclamation point (!) or a pound sign (#) at the beginning of a lineof code indicates a comment line.

!, #

This document uses the following conventions:

Means reader take note. Notes contain helpful suggestions or references to material not covered in themanual.

Note

Means reader be careful. In this situation, you might do something that could result in equipment damageor loss of data.

Caution

Related Documentation for Cisco Nexus 1000V for KVM SoftwareThis section lists the documents used with the Cisco Nexus 1000V for KVM software:

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.xvi

PrefaceRelated Documentation for Cisco Nexus 1000V for KVM Software

Page 7: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

General Information

Cisco Nexus 1000V for KVM Release Notes

Install and Upgrade

Cisco Nexus 1000V for KVM Software Installation Guide

Configuration Guides

Cisco Nexus 1000V for KVM High-Availability Configuration Guide

Cisco Nexus 1000V for KVM Interface Configuration Guide

Cisco Nexus 1000V for KVM Layer 2 Configuration Guide

Cisco Nexus 1000V for KVM License Configuration Guide

Cisco Nexus 1000V for KVM Virtual Network Configuration Guide

Cisco Nexus 1000V for KVM Port Profile Configuration Guide

Cisco Nexus 1000V for KVM REST API Configuration Guide

Cisco Nexus 1000V for KVM Security Configuration Guide

Cisco Nexus 1000V for KVM System Management Configuration Guide

Cisco Nexus 1000V for KVM Verified Scalability Guide

Cisco Nexus 1000V for KVM VXLAN Configuration Guide

Reference Guides

Cisco Nexus 1000V for KVM Command Reference

Cisco Nexus 1000V for KVM OpenStack REST API Reference

Troubleshooting and Alerts

Cisco Nexus 1000V for KVM Troubleshooting Guide

Related Documentation for Cisco Nexus 1000V for MicrosoftHyper-V Software

This section lists the documents used with the Cisco Nexus 1000V for Microsoft Hyper-V software:

General Information

Cisco Nexus 1000V for Microsoft Hyper-V Release Notes

Install and Upgrade

Cisco Nexus 1000V for Microsoft Hyper-V Installation and Upgrade Guide

Configuration Guides

Cisco Nexus 1000V for Microsoft Hyper-V High Availability and Redundancy Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x vii

PrefaceRelated Documentation for Cisco Nexus 1000V for Microsoft Hyper-V Software

Page 8: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Cisco Nexus 1000V for Microsoft Hyper-V Interface Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V Layer 2 Switching Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V License Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V Port Profile Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V Quality of Service Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V Security Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V System Management Configuration Guide

Cisco Nexus 1000V for Microsoft Hyper-V Verified Scalability Guide

Reference Guides

Cisco Nexus 1000V for Microsoft Hyper-V Command Reference

Troubleshooting and Alerts

Cisco Nexus 1000V for Microsoft Hyper-V Troubleshooting Guide

Documentation FeedbackTo provide technical feedback on this document, or to report an error or omission, please send your commentsto:

We appreciate your feedback.

Obtaining Documentation and Submitting a Service RequestFor information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a servicerequest, and gathering additional information, seeWhat's New in Cisco Product Documentation, at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html.

Subscribe toWhat's New in Cisco Product Documentation, which lists all new and revised Cisco technicaldocumentation, as an RSS feed and deliver content directly to your desktop using a reader application. TheRSS feeds are a free service.

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.xviii

PrefaceDocumentation Feedback

Page 9: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

C H A P T E R 1Overview

This chapter contains the following sections:

• Information About Microsoft System Center Virtual Machine Manager 2012 SP1, page 1

• Microsoft Hyper-V Extensible Switch, page 2

• Logical Switch, page 2

• Creating a Switch Extension, page 2

• Cisco Nexus 1000V for Microsoft SCVMM, page 3

• Logical Networks and Network Segment Pools, page 3

• VM Networks, page 4

• Network Segments, page 6

• IP Pool Templates, page 7

• Port Profiles, page 7

• Policy and Network Separation, page 7

• Dynamic Port Profiles , page 7

• Uplink Port Profile, page 8

• Configuring PVLANs, page 8

Information About Microsoft System Center Virtual MachineManager 2012 SP1

Microsoft System Center Virtual Machine Manager 2012 SP1 is a comprehensive IT infrastructure,virtualization, and cloud management platform. With this platform, you can manage your applications andservices across multiple hyper visors and across public, hosted, and private cloud infrastructures to deliverflexible and cost-effective IT services. Microsoft SCVMM allows the administrators to configure and managethe servers, the network, and the storage resources.

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 1

Page 10: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Microsoft SCVMM 2012 SP1 introduces the following constructs to model and configure the networks onthe Hyper-V servers:

• Logical Network

• Network Site

• VM Network

• VM Subnet

• IP Pool

• Uplink Profile

• Port Classification

• Logical Switch

Microsoft Hyper-V Extensible SwitchMicrosoft Hyper-V supports an extensible switch architecture. The third party networking vendors can provideMonitoring, Filtering, and Forwarding extensions to the Microsoft Extensible Switch (native virtual switch).Cisco Nexus 1000V is a Forwarding extension to the Microsoft Extensible Switch. Because the Forwardingextensions can also be used to perform the filtering and capturing functionality, an Hyper-V Extensible Switchrunning the Cisco Nexus 1000V can perform the forwarding, filtering, and monitoring functions.

Logical SwitchALogical Switch, created onMicrosoft SCVMM2012 SP1, is a switch template. It contains a set of parameters(for example, switch extensions, uplink port profiles, and port classifications that are introduced later in thisdocument) that you can use to create Hyper-V Virtual Switches on Windows Server 2012 host computers. ALogical Switch helps to configure a consistent network policy across many Hyper-V hosts.

Creating a Switch ExtensionTo use the Cisco Nexus 1000V as a Forwarding extension in a Logical Switch (an Hyper-V extensible switchon a Hyper-V host) on Microsoft SCVMM, the SCVMM administrator should first register the Cisco Nexus1000V by creating a Virtual Switch Extension Manager (VSEM). The VSEM connects to the Cisco Nexus1000V VSM using an IP address and the administrator credentials of the Cisco Nexus 1000V. See the CiscoNexus 1000V for Microsoft Hyper-V Installation and Upgrade Guide for information on creating a switchextension.

Changing the administrator password requires a corresponding change in the Run As Account that theVSEM uses to connect to the Cisco Nexus 1000V VSM.

Note

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x2

OverviewMicrosoft Hyper-V Extensible Switch

Page 11: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Cisco Nexus 1000V for Microsoft SCVMMMicrosoft SCVMM SP1 models the physical networks as a fabric. As part of this approach, a number of newabstractions have been introduced. To aid the network administrator managing the virtual access layer, CiscoNexus 1000V has introduced a capability to configure and edit the following new objects based on MicrosoftSCVMM SP1 network object model:

• Logical Networks

• Network Segment Pools (results in the creation of Network Sites on VMM)

• Network Segments (results in the creation of VM Network and VM Subnet)

• IP Pools

See the Microsoft SCVMM SP1 networking object model for reference.

Figure 1: Microsoft SCVMM SP1 Networking Object Model

Logical Networks and Network Segment PoolsA logical network models distinct networks managed by an enterprise. The logical network abstraction hidesthe VLANs and IP Subnets that make the network from all the users (the VM network administrators, thetenant administrators, and the server administrators) other than the fabric administrator managing the physicalfabric. In other words, a logical network is composed of one or more network segment pools and each networksegment pool is a group of VLANS, IP subnets, or VLAN/IP subnet pairs.

Consider an hypothetical enterprise that operates two data centers, one in San Francisco and one in NewYork.The enterprise has two subnets at each site:

• The San Francisco site uses subnet 10.0.0.0/8 to provide an Intranet network. The subnet 20.0.0.0/8 isused to create a DMZ network.

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 3

OverviewCisco Nexus 1000V for Microsoft SCVMM

Page 12: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

• The New York site uses subnet 30.0.0.0/8 to provide an Intranet network. The subnet 40.0.0.0/8 is usedto create a DMZ network.

Figure 2: Logical Networks

To model the network fabric, the SCVMM administrator creates two logical networks: Intranet and DMZ.The Intranet logical network has two network sites, 10.0.0.0/8 and 30.0.0.0/8 and two VLANs . The DMZlogical network has two network sites, 20.0.0.0/8 and 40.0.0.0/8 and two VLANs. The server administratordeploys the host to the Intranet logical network.

VM NetworksVM networks allow the Microsoft SCVMM administrator to create an isolated virtual Layer 3 network. EachVM network can have one or more VM subnets (virtual Layer 2 domain). The Microsoft SCVMM SP1supports VLAN-backed andNetwork Virtualization (NVGRE)-backedVMnetworks. The Cisco Nexus 1000Vallows the network administrators to create the VLAN-backed VM networks only.

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x4

OverviewVM Networks

Page 13: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

TheMicrosoft SCVMMSP1 allows creatingmultiple VM subnets under a VMnetwork only whenNVGREis used. A VLAN-backed VM network always contains only one VM subnet.

Note

Figure 3: VM Networks and VM Subnets

In the example, the San Francisco datacenter has two IP subnets each of which is associated with a VLAN.In San Francisco datacenter, the subnet 10.0.0.0/8 is associated with VLAN 100. The subnet 20.0.0.0/8 isassociated with VLAN 200. To deploy the VMs to VLAN 100 and VLAN 200, the network administratorcreates two network segments, for example, VMNetworkA andVMNetworkB. After the network administratorcreates a network segment VMNetworkA, the Microsoft SCVMM administrator has to create a VM networkthat uses the network segment, VMNetworkA. This is a prerequisite for the VMs to be deployed to the

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 5

OverviewVM Networks

Page 14: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

VLAN/network segment. To deploy the VMs to VLAN300 andVLAN400, the network administrator createstwo network segments, for example, VMNetworkC and VMNetworkD as illustrated in the following example.

Figure 4: VM Networks in a Logical Network

Network SegmentsA network segment is associated with a unique broadcast domain. A network segment facilitates the availabilityof the network resources to a virtual machine. OpenStack controller uses the VM networks and the VM subnetsto provide the isolated virtual machine networks. When Cisco Nexus 1000V is used to manage the virtualnetwork, the OpenStack controller creates the VM networks that use an external isolation. An external isolationis provided by creating the network segments on the Cisco Nexus 1000V by the network administrator. Thenetwork administrator provides the isolated networks using the VLANs and the private VLANs.

In OpenStack controller, a VLAN is not created to define a bridge domain. Instead, a network segment iscreated on the VSM. Creating a network segment triggers an auto-creation of VLANs.

Note

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x6

OverviewNetwork Segments

Page 15: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

IP Pool TemplatesThe server administrators can manage the IP addresses for the virtual environment using an IP pool template.You can assign a range of IP addresses to the hosts and to the virtual machines that are running inside theOpenStack environment using the IP pool templates. When you create an IP pool template for a VM network,you can define a range of IP addresses that are used by the VMs that are managed by OpenStack controller.

In an IP pool template, the maximum number of reserved IP addresses is 128.Note

The IP pool templates are the address templates that are applied to the network segments.

Port ProfilesA port profile is a collection of the interface-level configuration attributes. The network administrator createsa consistent network policy across the similar VM interfaces by defining the Virtual Ethernet port profiles.The network administrator can also create a port profile for the VM hosts adapters. The profile defines thepolicy to be applied on the physical Ethernet adapters on the servers.

Policy and Network SeparationIn the Cisco Nexus 1000V for OpenStack environment, features and network segments are independentlyassociated with the interfaces. The independent association allows you to assign the same set of features onthe interfaces that are spread across multiple dynamically-allocated network segments. With this capability,a network administrator can define the policy profiles and export policy profiles to the OpenStack environment.The OpenStack cloud administrator can allocate the network segments from the network pools dynamically,and associate the virtual machine (VM) interfaces to the policy profile and the allocated network segment.This decoupling provides the flexibility to allocate network segments dynamically while grouping the networkfeatures to be applied on the interfaces.

Dynamic Port ProfilesA virtual machine (VM) is deployed to the virtual access layer by choosing the Port Classification, the VMNetwork, and the VM subnet. When a VM is deployed, a port profile is dynamically created on the CiscoNexus 1000V for each unique combination of the network segment and policy port profile. All other VMsdeployed with the same policy to this network reuse this dynamic port profile. This dynamic port profile is acombination of network isolation and network policy.

The auto-generated profile should neither be modified nor inherited in any other port profiles.Note

The port-attach notification carries a port UUID. The VSM looks up the port UUID and retrieves the associatedcombination of policy port profile and network segment. This combination is represented by a dynamic portprofile that is inherited on the interface. If more than one port uses the same combination of policy port profile

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 7

OverviewIP Pool Templates

Page 16: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

and the network segment, the dynamic port profile is shared. Dynamic port profiles are auto-created in theVSM as a result of configuration steps executed using SCVMM.

Uplink Port ProfileAn uplink port profile is essentially a template in which you define the list of network segment pools thatshould be associated with any (physical) network adaptors that it is applied to. It also allows you to specifythe protocols and the port policy for the uplink adapter using an Ethernet port profile.

Configuring PVLANsEach network segment is associated with one broadcast domain. In case of PVLAN, each secondary VLANis considered as one broadcast domain and a network segment is created to represent that. All secondaryVLAN network segments for a particular primary VLAN are bundled into one network segment pool and thenetwork segment pool defines which primary VLAN it represents.

For every primary VLAN, a network segment pool is created. The primary VLAN is also represented as anetwork segment. All secondary network segments and the corresponding primary network segments arebundled into one network segment pool. There can be only one primary VLAN network segment in a givennetwork segment pool. This bundle can also have the normal VLAN network segments.

A network segment identifies whether it represents a community, isolated, or promiscuous port. The secondaryVLAN network segments can either be in a community, isolated, or promiscuous mode. When the mode ispromiscuous, it can specify which secondary VLANs are allowed. A port attaching to the secondary VLANnetwork segment becomes a part of a community, or stand isolated, or be in a promiscuous mode and is ableto listen on the specified secondary VLANs. A VM port also can be a promiscuous port.

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x8

OverviewUplink Port Profile

Page 17: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

C H A P T E R 2Configuring Network Segmentation Manager

This chapter contains the following sections:

• Information About Network Segmentation Manager, page 9

Information About Network Segmentation Manager

PrerequisitesNetwork Segmentation Manager has the following prerequisites:

• You have installed the Cisco Nexus 1000V software and configured the VSM using the Cisco Nexus1000V for Microsoft Hyper-V Installation and Upgrade Guide.

Guidelines and LimitationsThe network segmentation manager feature has the following configuration guidelines and limitations:

• The network-segmentation-manager feature is enabled on the VSM by default. Verify the output ofthe show feature command on the VSM tomake sure that the network-segmentation-manager featureis enabled by default.

• Microsoft SCVMM should be able to communicate with the Cisco Nexus 1000V using HTTP.

• The http-server feature is enabled by default on the Cisco Nexus 1000V to allow web servicecommunication.

• To modify the association of a published network segment to a network segment pool, you must deleteand re-create the network segment with the new association. This rule is applicable for the networksegment pool, the network uplink, and the virtual port-profiles.

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 9

Page 18: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Building Network Infrastructure for Microsoft SCVMM

Creating a Logical NetworkYou can create a logical network for the host connectivity using the following steps:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)# nsm logical network <name>3. (Optional) switch(config-logical-net)# description <description >4. (Optional) switch(config-logical-net)# no description5. switch(config-logical-net)# end6. switch(config-logical-net)# exit

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Creates a logical network.switch(config)# nsm logical network <name>Step 2

(Optional)Configures the description for the logical network. Themaximum size of the characters is 256.

switch(config-logical-net)# description<description>

Step 3

(Optional)Negates a command or sets its defaults.

switch(config-logical-net)# no descriptionStep 4

Navigates to the execution mode.switch(config-logical-net)# endStep 5

Exits the logical network.switch(config-logical-net)# exitStep 6

This example shows how to create a logical network named IntranetSFO. Use the show nsm logical networkname <name> command to display the configuration details of the logical network.switch# configure terminalswitch(config)# nsm logical network IntranetSFOswitch(config-logical-net)# description Network for external Internet connectivityswitch(config-logical-net)# exit

switch(config)# show nsm logical network name IntranetSFOName: IntranetSFODescription: Network for external Internet connectivity

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x10

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 19: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Creating a Network Segment PoolYou can create a network segment pool for the host connectivity using the following steps:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)#nsm network segment pool <name>3. switch(config-net-seg-pool)#member-of logical network name4. (Optional) switch(config-net-seg-pool)#no [intraportcom | member-of]5. (Optional) switch(config-net-seg-pool)#this config6. switch(config-net-seg-pool)# end7. switch(config-net-seg-pool)# exit

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Configures the name of the network segment pool. Themaximum size of the characters is 64.

switch(config)#nsmnetwork segment pool<name>Step 2

Configures a logical network for the network segment pool.switch(config-net-seg-pool)#member-of logicalnetwork name

Step 3

(Optional)Negates a command or sets its defaults.

switch(config-net-seg-pool)#no [intraportcom |member-of]

Step 4

(Optional)Shows the running configuration for the current object(mode's instance).

switch(config-net-seg-pool)#this configStep 5

Goes to the configuration mode.switch(config-net-seg-pool)# endStep 6

Exits the configuration mode.switch(config-net-seg-pool)# exitStep 7

This example shows how to configure a network segment pool named IntranetSJ. Use the show nsm networksegment pool name <name> to view the configuration.switch# configure terminalswitch(config)# nsm network segment pool IntranetSJswitch(config-net-seg-pool)# member-of logical network IntranetSFOswitch(config-net-seg-pool)# exit

switch(config)# show nsm network segment pool name IntranetSJName: IntranetSJGUID: 5e4cb505-3255-4ef8-8480-685904fc9685Logical network Name: IntranetSFOIntra Port Communication: DisabledPublish-name: IntranetSJ

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 11

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 20: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Creating an IP Pool TemplateYou can create an IP pool template using the following steps:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)#nsm ip pool template <name>3. switch(config-ip-pool-template)#ip [address | reserved]4. switch(config-ip-pool-template)#network <A.B.C.D> <a.b.c.d>5. (Optional) switch(config-ip-pool-template)#default-router <A.B.C.D>6. (Optional) switch(config-ip-pool-template)#description7. (Optional) switch(config-ip-pool-template)#dhcp8. (Optional) switch(config-ip-pool-template)#dns-server <A.B.C.D>9. (Optional) switch(config-ip-pool-template)#dns-suffix10. (Optional) switch(config-ip-pool-template)#netbios-name-server <A.B.C.D>11. (Optional) switch(config-ip-pool-template)#netbt12. (Optional) switch(config-ip-pool-template)#no <description>13. switch(config-ip-pool-template)#end14. switch(config-ip-pool-template)#exit

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Configures the name of the NSM IP pool template. Themaximum size of the characters is 64.

switch(config)#nsm ip pool template <name>Step 2

Configures an IP address or a reserved IP address for the IPpool template.

switch(config-ip-pool-template)#ip [address | reserved]Step 3

You cannot configure the IP address range startingwith an IP address x.x.x.0 or x.x.x.1. The range ofthe IP address should start with an IP address x.x.x.2and onwards.

Note

You can modify the IP pool range after the IP poolis part of the network segment. Use the ip addresscommand under nsm ip pool template to specify thenew ip pool range.

Note

Configures the network address range for the IP pooltemplate, where <A.B.C.D> is the range of the IP addressand <a.b.c.d> is the subnet.

switch(config-ip-pool-template)#network<A.B.C.D><a.b.c.d>

Step 4

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x12

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 21: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

PurposeCommand or Action

(Optional)Configures a gateway for the IP pool template.

switch(config-ip-pool-template)#default-router<A.B.C.D>

Step 5

(Optional)Configures the description of the IP pool template.

switch(config-ip-pool-template)#descriptionStep 6

(Optional)Configures DHCP support of the IP pool template.

This command is not supported for the currentrelease.

Note

switch(config-ip-pool-template)#dhcpStep 7

(Optional)Configures the DNS server IP address of the IP pooltemplate.

switch(config-ip-pool-template)#dns-server<A.B.C.D>

Step 8

(Optional)Configures DNS suffix for the IP pool template.

switch(config-ip-pool-template)#dns-suffixStep 9

(Optional)Configures the IP address of the netbios name server for theIP pool template.

switch(config-ip-pool-template)#netbios-name-server<A.B.C.D>

Step 10

(Optional)Enables netbios over TCP/IP for the IP pool template.

switch(config-ip-pool-template)#netbtStep 11

(Optional)Negates a command or sets its defaults.

switch(config-ip-pool-template)#no <description>Step 12

Goes to the execution mode.switch(config-ip-pool-template)#endStep 13

Exits the logical network.switch(config-ip-pool-template)#exitStep 14

The following example displays how to create an IP pool template named pool10. Add a description andconfigure a range of the IP address, subnet mask, and gateway for the IP pool template using the commandsin the example. Use the show nsm ip pool template name <name> command to view the configuration.switch# configure terminalswitch(config)# nsm ip pool template pool10switch(config-ip-pool-template)# description poolswitch(config-ip-pool-template)# ip address 172.16.10.7 172.16.10.100switch(config-ip-pool-template)# network 172.16.10.10 255.255.255.0switch(config-ip-pool-template)# exit

switch(config)# show nsm ip pool template name pool10Name: pool10Description: poolIP-address-range: 172.16.10.7-172.16.10.100Network: 172.16.10.10Subnet mask: 255.255.255.0Default router:Netbios: DisabledDHCP: DisabledReserved-ip-list:Netbios-name-server-list:DNS-server-list:

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 13

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 22: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

DNS-suffix-list:switch(config)# show nsm ip pool template usage network segmentIp-pool: pool10VMNetworkAswitch(config)#//Modify the IP pool rangeswitch(config)# nsm ip pool template pool10switch(config-ip-pool-template)# ip address 172.16.10.7 172.16.10.150switch(config)# show nsm ip pool template name pool10Name: pool10Description: poolIP-address-range: 172.16.10.7-172.16.10.150Network: 172.16.10.10Subnet mask: 255.255.255.0Default router:Netbios: DisabledDHCP: DisabledReserved-ip-list:Netbios-name-server-list:DNS-server-list:DNS-suffix-list:

Creating a Network SegmentYou can create a network segment for the VM connectivity using the following steps:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)#nsm network segment <name>3. (Optional) switch(config-net-seg)#description <name>4. switch(config-net-seg)# ip pool import template <template-name>5. switch(config-net-seg)#member-of network segment pool <name>6. (Optional) switch(config-net-seg)#no [description | ip | network | publish | switchport | system ]7. switch(config-net-seg)#switchport [ access | private-vlan ]8. (Optional) switch(config-net-seg)#system network segment9. switch(config-net-seg)#publish network segment <name>10. switch(config-net-seg)#end11. switch(config-net-seg)#exit

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Creates a network segment.switch(config)#nsm network segment <name>Step 2

(Optional)Enters the description of the network segment.

switch(config-net-seg)#description <name>Step 3

Import an IP pool template.switch(config-net-seg)# ip pool import template<template-name>

Step 4

You can modify the IP pool range after the IP poolis part of the network segment.

Note

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x14

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 23: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

PurposeCommand or Action

Configures a network segment pool for the VM networksegment pool.

switch(config-net-seg)#member-of networksegment pool <name>

Step 5

(Optional)Negates a command or sets its defaults.

switch(config-net-seg)#no [description | ip | network| publish | switchport | system ]

Step 6

Configures the switchport mode as access or private-vlanfor the network segment pool. The default mode is access.

switch(config-net-seg)#switchport [ access |private-vlan ]

Step 7

(Optional)Configures the segment as a system segment.

switch(config-net-seg)#system network segmentStep 8

Publishes the VM network segment to SCVMM. The nameoption is used to publish the segment with a different name.The default published name is same as the segment name.

switch(config-net-seg)#publish network segment<name>

Step 9

Goes to the configuration mode.switch(config-net-seg)#endStep 10

Exits the configuration.switch(config-net-seg)#exitStep 11

The following example shows how to configure a network segment named VMNetworkA. Configure theswitchport mode as access and associate a network segment pool named IntranetSJ to the network segment.Use the show nsm network segment name <name>, show nsm network segment brief, and show nsmnetwork segment virtual usage commands to view the network segment configuration.switch# configure terminalswitch(config)# nsm network segment VMNetworkAswitch(config-net-seg)# switchport access vlan 100switch(config-net-seg)# member-of network segment pool IntranetSJswitch(config-net-seg)# ip pool import template pool10switch(config-net-seg)# publish network segment VMNetworkAswitch(config-net-seg)# end

switch(config)# show nsm network segment name VMNetworkAName: VMNetworkAVM Network Name: VMNetworkAVM Network GUID: 584d510b-0eba-485d-9262-a78c0a1fcfe3Description:GUID: 68f827e8-247d-4f3d-bebf-73d14d0a613aNetwork segment pool: IntranetSJVlan: 100System Network Segment: FALSEip pool template: pool10ip pool template GUID: fb05d8b0-724d-478b-a550-bf75f0a646adPublish-name: VMNetworkA

switch(config)# show nsm network segment brief

--------------------------------------------------------------------------------Network segment Mode VLAN Pub Sys--------------------------------------------------------------------------------VMNetworkA access 100 1 0

--------------------------------------------------------------------------------Total Total Pub Total Sys--------------------------------------------------------------------------------1 1 0

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 15

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 24: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

switch(config)# show nsm network segment virtual usage

-------------------------------------------------------------------------------Network segment Port Profile Port Owner-------------------------------------------------------------------------------VMNetworkA dynpp_34417837-ae75-4360-87e8-3c33d9f59370_

3fb0ef6f-2b0e-47c8-b226-2da2dbc1bbe2Veth2 ABC_VM_02

Veth3 ABC_VM_03

net-seg-101 dynpp_34417837-ae75-4360-87e8-3c33d9f59370_60b14436-6cc6-45df-8071-082b2e2e5652

Veth1 XYZ_VM_01

Creating an Ethernet Port ProfileEthernet port profiles define a template that can be applied on physical Ethernet (uplink) ports on Hyper-Vhosts. Unlike Virtual Ethernet profiles which are published to SCVMM, Ethernet port profiles are not publishedto SCVMM. Instead, Ethernet port profiles are imported by the uplink-network that is defined on the CiscoNexus 1000V VSM.

The auto-generated profile will have all the contents derived from the uplink network and it should notbe modified.

Note

Complete the following steps to configure an Ethernet port profile:

Before You Begin

• Log in to the CLI in EXEC mode.

• You know whether the ports need to be initialized with system settings.

• You have identified the characteristics needed for this port profile.

SUMMARY STEPS

1. switch# configure terminal2. switch(config)# port-profile type ethernet name3. (Optional) switch(config-port-prof)# channel-group auto mode on [mac-pinning |sub-group ]4. switch(config-port-prof)# no shutdown5. switch(config-port-prof)# state enabled

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Enters the port profile configurationmode for the named Ethernet port profile.If the port profile does not already exist, it is created using the followingcharacteristics:

switch(config)# port-profile typeethernet name

Step 2

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x16

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 25: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

PurposeCommand or Action

• name—Port profile name that can be up to 80 characters and must beunique for each port profile.

• type—(Optional) Specifies the port profile type can be Ethernet orvEthernet. Once configured, the type cannot be changed. The defaultis the vEthernet type.

Defining a port profile type as Ethernet allows the port profile to beused for physical (Ethernet) ports.

If a port profile is configured as an Ethernet type, it cannot beused to configure the virtual ports.

Note

(Optional)Configure the ports and channels in the port profile using a mac-pinning orsub-group mode.

switch(config-port-prof)#channel-group auto mode on[mac-pinning |sub-group ]

Step 3

This command can be used only for the Ethernetports.

Note

Enables all ports in the port profile.switch(config-port-prof)# no shutdownStep 4

Enables the operational state of the port profile.switch(config-port-prof)# state enabledStep 5

The following example shows how to create an Ethernet port profile named UplinkNoPortChannel. Use theshow port-profile name UplinkNoPortChannel and show running-config port-profileUplinkNoPortChannel commands to view the port profile configuration.switch# configure terminalswitch(config)# port-profile type ethernet UplinkNoPortChannelswitch(config-port-prof)# no shutdownswitch(config-port-prof)# state enabledswitch(config-port-prof)# end

switch(config)# show port-profile name UplinkNoPortChannelport-profile UplinkNoPortChanneltype: Ethernetdescription:status: enabledmax-ports: 512min-ports: 1inherit:config attributes:no shutdownevaluated config attributes:no shutdownassigned interfaces:port-group:system vlans: nonecapability l3control: nocapability iscsi-multipath: nocapability vxlan: nocapability l3-vn-service: noport-profile role: noneport-binding: static

switch(config)# show running-config port-profile UplinkNoPortChannel!Command: show running-config port-profile UplinkNoPortChannel!Time: Fri Feb 15 12:56:33 2013

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 17

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 26: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

version 5.2(1)SM1(5.1)port-profile type ethernet UplinkNoPortChannelno shutdownguid 38b1aff5-5fc4-4086-87d5-1a19fb3fde60max-ports 512state enabled

switch(config)#

Creating a vEthernet Port ProfileComplete the following steps to configure a vEthernet port profile:

Before You Begin

• Log in to the CLI in EXEC mode.

• You know whether the ports need to be initialized with system settings.

• You have identified the characteristics needed for this port profile.

SUMMARY STEPS

1. switch# configure terminal2. switch(config)# port-profile type vethernet name3. switch(config-port-prof)# no shutdown4. switch(config-port-prof)# state enabled5. switch(config-port-prof)# publish port-profile name

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Enters the port profile configuration mode for the namedvEthernet port profile.

switch(config)# port-profile type vethernet nameStep 2

Enables all ports in the port profile.switch(config-port-prof)# no shutdownStep 3

Enables the operational state of the port profile.switch(config-port-prof)# state enabledStep 4

Changes the published name to the Microsoft SCVMM.switch(config-port-prof)# publish port-profile nameStep 5

This example shows how to create a vEthernet port profile:switch# configure terminalswitch(config)# port-profile type vethernet AllAccess1switch(config-port-prof)# no shutdownswitch(config-port-prof)# state enabledswitch(config-port-prof)# publish port-profileswitch(config-port-prof)# show port-profile name AllAccess1port-profile AllAccess1

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x18

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 27: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

type: Vethernetdescription:status: enabledmax-ports: 32min-ports: 1inherit:config attributes:no shutdownevaluated config attributes:no shutdownassigned interfaces:port-group: AllAccess1system vlans: nonecapability l3control: nocapability iscsi-multipath: nocapability vxlan: nocapability l3-vn-service: noport-profile role: noneport-binding: staticswitch(config-port-prof)#

switch(config)# show running-config port-profile AllAccess1!Command: show running-config port-profile AllAccess1!Time: Wed Feb 13 14:38:38 2013

version 5.2(1)SM1(5.1)port-profile type vethernet AllAccess1no shutdownguid f7adc9ea-19c0-4e96-995c-04c6dfd85112publish port-profilestate enabled

switch(config)#

Configuring an Uplink NetworkThe uplink network is a combination of an Ethernet port profile and one or more network segment pools.When applied to the physical adapter on a server, the uplink network defines the policy and the VLANs thatare allowed on the physical adapter.

The switchport mode trunk and switch port mode private-vlan trunk commands are not supportedunder the nsm network uplink command.

Note

For an uplink network mode access functionality, create an uplink network with trunk mode and allowa native VLAN to achieve the same result.

Note

Complete the following steps to configure an uplink network:

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 19

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 28: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)#nsm network uplink <name>3. (Optional) switch(config-uplink-net)#allow network segment pool <name>4. (Optional) switch(config-uplink-net)#import port-profile name5. (Optional) switch(config-uplink-net)#native network segment <name>6. switch(config-uplink-net)#system network uplink7. switch(config-uplink-net)#publish network uplink <name>

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Configures the uplink network.switch(config)#nsmnetwork uplink<name>Step 2

(Optional)Configures the allowed network segment pools.

switch(config-uplink-net)#allow networksegment pool <name>

Step 3

For more than one network segment pools, repeat the samecommand with more than one name for the pool.

Note

(Optional)Imports the Ethernet port profile that gives the policy for the uplink.

switch(config-uplink-net)#import port-profilename

Step 4

(Optional)Configures the network segment to be a native network segment.

switch(config-uplink-net)#native networksegment <name>

Step 5

The VLAN of the network segment must be defined in orderto be defined as a native network segment.

Note

Enables system VLAN on the network uplinks.switch(config-uplink-net)#system networkuplink

Step 6

Publishes the uplink network to the Microsoft SCVMM. Adding thename of the network uplink, for example, the variable <name> in the

switch(config-uplink-net)#publish networkuplink <name>

Step 7

command is optional. When the network uplink is published toMicrosoft SCVMM, it is published as an uplink port profile.

The following example shows how to create a new uplink network named NexusUplink, how to import a portprofile named UplinkNoPortChannel that gives the policy for the uplink, how to associate the uplink networkto a network segment pool, and publish the uplink network. Use the show nsm network uplink name <name>command to view the network uplink configuration.switch(config)# configure terminalswitch(config)# nsm network uplink NexusUplinkswitch(config-uplink-net)# allow network segment pool IntranetSJswitch(config-uplink-net)# import port-profile UplinkNoPortChannelswitch(config-uplink-net)# native network segment VMNetworkAswitch(config-uplink-net)# system network uplinkswitch(config-uplink-net)# publish network uplink NexusUplink

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x20

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 29: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

switch(config-uplink-net)# exit

switch# show nsm network uplink name NexusUplinkuplink network: NexusUplinkPublish-name: NexusUplinkimport port-profile: UplinkNoPortChannelnetwork segment pool:IntranetSJ

System Uplink-Network: TRUENative network segment: VMNetworkAport-profile config:switchport mode private-vlan trunk promiscuousswitchport private-vlan trunk allowed vlan 100,200switchport private-vlan trunk native vlan 101

switch# show nsm network uplink brief

--------------------------------------------------------------------------------network uplink Pub Sys--------------------------------------------------------------------------------NexusUplink 1 1

--------------------------------------------------------------------------------Total Total Pub Total Sys--------------------------------------------------------------------------------1 1 1

Workflows in Microsoft SCVMM

Configuring a Network Uplink in Access Mode

You can create the network segments with VLANs that are carried by a network uplink:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)# nsm logical network <name>3. switch(config-logical-net)# description <name>4. switch(config-logical-net)# exit5. switch(config)# nsm network segment pool <name>6. switch(config-net-seg-pool)#member-of logical network <name>7. switch(config-net-seg-pool)# exit8. switch(config)# nsm network segment <name>9. switch(config-net-seg)# switchport access vlan <number>10. switch(config-net-seg)#member-of network segment pool <name>11. switch(config-net-seg)# ip pool import template <name>12. switch(config-net-seg)# publish network segment <name>13. switch(config-net-seg)# exit14. switch(config)# nsm network uplink <name>15. switch(config-uplink-net)# allow network segment pool <name>16. switch(config-uplink-net)# native network segment <name>17. switch(config-uplink-net)# import port-profile <name>18. switch(config-uplink-net)# publish network uplink

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 21

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 30: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Creates a logical network with a given name.switch(config)# nsm logical network <name>Step 2

Describes the logical network.switch(config-logical-net)# description <name>Step 3

Exits the configuration.switch(config-logical-net)# exitStep 4

Creates a network segment pool with a given name.switch(config)# nsm network segment pool<name>Step 5

Associates the logical network to the network segmentpool.

switch(config-net-seg-pool)#member-of logicalnetwork <name>

Step 6

Exits the configuration.switch(config-net-seg-pool)# exitStep 7

Creates a network segment with a given name.switch(config)# nsm network segment <name>Step 8

Sets the VLAN ID for the segment. It automaticallycreates a VLAN if it does not exist.

switch(config-net-seg)# switchport access vlan<number>

Step 9

Associates the network segment to the network segmentpool.

switch(config-net-seg)#member-of network segmentpool <name>

Step 10

Associates the IP pool template to the network segment.switch(config-net-seg)# ip pool import template<name>

Step 11

Publishes the network segment to the MicrosoftSCVMM. Adding a name of the network segment, for

switch(config-net-seg)# publish network segment<name>

Step 12

example, the variable <name> in the command isoptional.

Exits the configuration.switch(config-net-seg)# exitStep 13

Creates a network uplink object.switch(config)# nsm network uplink <name>Step 14

Associates the network uplink object with networksegment pool that is carrying one or more segments.

switch(config-uplink-net)# allow network segmentpool <name>

Step 15

Declares a network segment to be native.switch(config-uplink-net)# native network segment<name>

Step 16

Inherits the profile that you created.switch(config-uplink-net)# import port-profile<name>

Step 17

Publishes the network uplink to theMicrosoft SCVMM.switch(config-uplink-net)# publish network uplinkStep 18

Refer to the following example to create the network segments with VLANs that are carried by an uplink,associate each network segment to a network segment pool, create an uplink network named trunk with the

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x22

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 31: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

required network segment pool under it, and publish the uplink network to the Microsoft SCVMM. Use theshow run port-profile <name> command to view the configuration.switch(config)# nsm logical network IntranetSFOswitch(config-logical-net)# description network for host connectivityswitch(config-logical-net)# exit

switch(config)# nsm network segment pool IntranetSJswitch(config-net-seg-pool)# member-of logical network IntranetSFOswitch(config-net-seg-pool)# exit

switch(config)# nsm network segment VMNetworkBswitch(config-net-seg)# switchport access vlan 100switch(config-net-seg)# member-of network segment pool IntranetSJswitch(config-net-seg)# ip pool import template pool10switch(config-net-seg)# publish network segment VMNetworkBswitch(config-net-seg)# exit

switch(config-uplink-net)# nsm network uplink NexusUplinkswitch(config-uplink-net)# allow network segment pool IntranetSJswitch(config-uplink-net)# native network segment VMNetworkBswitch(config-uplink-net)# import port-profile UplinkNoPortChannelswitch(config-uplink-net)# publish network uplinkswitch(config-net-seg)# end

switch# show nsm network segment name VMNetworkBName: VMNetworkBVM Network Name: VMNetworkBVM Network GUID: 3248a6f9-30ca-4cc5-b925-ef0bf6994b75Description:GUID: 65a6d0de-c666-448b-a912-60cc960f11ccNetwork segment pool: IntranetSJVlan: 100System Network Segment: FALSEip pool template: pool10ip pool template GUID: 3ea151c8-ab80-47b1-8491-88a5fb651fe7Publish-name: VMNetworkB

switch# show nsm network segment pool name IntranetSJName: IntranetSJGUID: 39362fa4-7ae2-47ee-8f64-1f8ecceda867Logical network Name: IntranetSFOIntra Port Communication: DisabledPublish-name: IntranetSJ

switch# show nsm network uplink name NexusUplinkuplink network: NexusUplinkPublish-name: NexusUplinkimport port-profile: UplinkNoPortChannelnetwork segment pool:IntranetSJ

System Uplink-Network: TRUESwitchport mode override: autoNative network segment: VMNetworkBport-profile config:switchport mode trunkswitchport trunk allowed vlan 100switchport trunk native vlan 100

switch# show nsm logical network name IntranetSFOName: IntranetSFODescription: Intranet network

switch(config)# show run port-profile UplinkNoPortChannel

!Command: show running-config port-profile UplinkNoPortChannel!Time: Sun Apr 28 14:08:50 2013

version 5.2(1)SM1(5.1)port-profile type ethernet UplinkNoPortChannelguid d7ebe0d0-9152-4415-815d-36ec25deece6max-ports 512

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 23

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 32: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Configuring Uplink Profile in Port-Channel Mode

You can configure an uplink profile in port-channel mode:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)#nsm logical network <name>3. switch(config-log-net)# description <name>4. switch(config-log-net)#exit5. switch(config)#nsm network segment pool <name>6. switch(config-net-seg-pool)#member-of logical network <name>7. switch(config-net-seg-pool)#exit8. switch(config)#nsm network segment <name>9. switch(config-net-seg)#switchport access vlan <number>10. switch(config-net-seg)#member-of network segment pool <name>11. switch(config-net-seg)# publish network segment <name>12. switch(config-net-seg)# exit13. switch(config)# port-profile type ethernet <name>14. switch(config-port-prof)#channel-group auto mode on15. switch(config-port-prof)#state enabled16. switch(config-port-prof)#no shut17. switch(config-net-seg)# exit18. switch(config)#nsm network uplink <name>19. switch(config-uplink-net)# allow network segment pool <name>20. switch(config-uplink-net)#import port-profile <name>21. switch(config-uplink-net)#publish network uplink <name>

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Enters a name for the logical network.switch(config)#nsm logical network <name>Step 2

Describes the logical network.switch(config-log-net)# description <name>Step 3

Exits the configuration.switch(config-log-net)#exitStep 4

Enters a name for the network segment pool.switch(config)#nsm network segment pool <name>Step 5

Associates the logical network to the network segmentpool.

switch(config-net-seg-pool)#member-of logicalnetwork <name>

Step 6

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x24

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 33: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

PurposeCommand or Action

Exits the configuration.switch(config-net-seg-pool)#exitStep 7

Creates a network segment.switch(config)#nsm network segment <name>Step 8

Creates a network segment for access VLAN that iscarried by an uplink.

switch(config-net-seg)#switchport access vlan<number>

Step 9

Associates the network segment to the network segmentpool.

switch(config-net-seg)#member-of network segmentpool <name>

Step 10

Publishes the network segment to the MicrosoftSCVMM.

switch(config-net-seg)# publish network segment<name>

Step 11

Exits the configuration.switch(config-net-seg)# exitStep 12

Enters a name for the Ethernet port profile.switch(config)# port-profile type ethernet <name>Step 13

Creates a classification profile carrying thechannel-group command.

switch(config-port-prof)#channel-group auto modeon

Step 14

Configure the state as enabled.switch(config-port-prof)#state enabledStep 15

Configure no shutdown command.switch(config-port-prof)#no shutStep 16

Exits the configuration.switch(config-net-seg)# exitStep 17

Creates a network uplink object.switch(config)#nsm network uplink <name>Step 18

Associates the network uplink object with the networksegment pool.

switch(config-uplink-net)# allow network segmentpool <name>

Step 19

Imports the port profile.switch(config-uplink-net)#import port-profile<name>

Step 20

Publishes the network uplink object to the MicrosoftSCVMM. The name parameter is optional and it can be

switch(config-uplink-net)#publish network uplink<name>

Step 21

used to change the name with which the uplink objectis published. By default, the uplink is published with theuplink object name.

Use the following example to create a network uplink named NexusUplink in port-channel mode. Use theshow nsm network uplink name <name> command to view the configuration.switch# configure terminalswitch(config)# port-profile type ethernet UplinkNoPortChannelswitch(config-port-prof)# channel-group auto mode onswitch(config-port-prof)# state enabledswitch(config-port-prof)# no shutdownswitch(config-port-prof)# exit

switch(config)# nsm network uplink NexusUplinkswitch(config-uplink-net)# allow network segment pool IntranetSJswitch(config-uplink-net)# import port-profile UplinkNoPortChannelswitch(config-uplink-net)# publish network uplink NexusUplink

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 25

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 34: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

switch(config-uplink-net)# exit

switch(config)# show nsm network uplink name NexusUplink

uplink network: NexusUplinkPublish-name: NexusUplinkimport port-profile: UplinkNoPortChannelnetwork segment pool:IntranetSJ

System Uplink-Network: TRUENative network segment:port-profile config:switchport mode trunkswitchport trunk allowed vlan 100switchport trunk native vlan 100

Configuring a vEthernet Profile with Features

You can configure a vEthernet profile with features:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)# port-profile type vethernet <name>3. switch(config-port-prof)# service-policy input <name>4. switch(config-port-prof)# ip port access-group <name> in5. switch(config-port-prof)# publish port-profile6. switch(config-port-prof)# state enabled7. switch(config-port-prof)# no shut

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Creates a vEthernet port profile with a given name.switch(config)# port-profile type vethernet<name>

Step 2

Attaches a QoS policy to the port profile.switch(config-port-prof)# service-policy input<name>

Step 3

Attaches an ACL policy to the port profile.switch(config-port-prof)# ip port access-group<name> in

Step 4

Publishes the port profile to the Microsoft SCVMM.Associates both the network segment and the profile to avEthernet interface on the Microsoft SCVMM.

switch(config-port-prof)# publish port-profileStep 5

Enables the port profile for the server administrator usage.switch(config-port-prof)# state enabledStep 6

Configures the no shutdown command.switch(config-port-prof)# no shutStep 7

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x26

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 35: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

See the following example to configure a service policy on the vEthernet port profile named ACL_POLICY.Use the show run port-profile ACL_policy command to view the configured policy on the port profile.switch# config tswitch(config)# port-profile type vethernet ACL_policyswitch(config-port-prof)# service-policy input policy1switch(config-port-prof)# ip port access-group acl-test inswitch(config-port-prof)# publish port-profileswitch(config-port-prof)# state enabledswitch(config-port-prof)# no shutswitch(config-port-prof)# end

switch(config)# show run port-profile ACL_policy!Command: show running-config port-profile ACL_POLICY!Time: Sun Feb 24 20:33:56 2013

version 5.2(1)SM1(5.1)port-profile type vethernet ACL_POLICYservice-policy input policy1ip port access-group acl-test inno shutdownguid be85760a-e01d-4417-b7a7-6cf5ffb83423publish port-profilestate enabled

For more information on configuring port profiles, seeCisco Nexus 1000V for Microsoft Hyper-V Port ProfileConfiguration Guide.

Configuring System VLAN

You can configure a system VLAN after completing the following steps:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)#nsm logical network <name>3. switch(config-logical-net)# description <name>4. switch(config-logical-net)#exit5. switch(config)#nsm network segment pool <name>6. switch(config-net-seg-pool)#member-of logical network <name>7. switch(config-net-seg-pool)#exit8. switch(config)#nsm network segment name9. switch(config-net-seg)#switchport access vlan <number>10. switch(config-net-seg)#allow network segment pool <name>11. switch(config-net-seg)#system network segment12. switch(config-net-seg)# publish network segment13. switch(config-net-seg)# exit14. switch(config)#nsm network uplink <name>15. switch(config-uplink-net)#allow network segment pool <name>16. switch(config-uplink-net)#system network uplink

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 27

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 36: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Enters a name for the logical network.switch(config)#nsm logical network <name>Step 2

Describes the logical network.switch(config-logical-net)# description <name>Step 3

Exits the configuration.switch(config-logical-net)#exitStep 4

Enters a name for the network segment pool.switch(config)#nsm network segment pool<name>Step 5

Associates the logical network to the network segmentpool.

switch(config-net-seg-pool)#member-of logicalnetwork <name>

Step 6

Exits the configuration.switch(config-net-seg-pool)#exitStep 7

Creates a network segment.switch(config)#nsm network segment nameStep 8

Creates a network segment with access VLAN that willbe carried by an uplink.

switch(config-net-seg)#switchport access vlan<number>

Step 9

Associates the network segment to the network segmentpool.

switch(config-net-seg)#allow network segment pool<name>

Step 10

Enables system VLANs.switch(config-net-seg)#system network segmentStep 11

Publishes the network segment to theMicrosoft SCVMM.switch(config-net-seg)# publish network segmentStep 12

Exits the configuration.switch(config-net-seg)# exitStep 13

Creates a network uplink object. System VLANs on theuplink port profile are enabled by creating an uplink

switch(config)#nsm network uplink <name>Step 14

network object with a network segment pool carryingthe system network segments.

Associates the network uplink object with networksegment pool.

switch(config-uplink-net)#allow network segmentpool <name>

Step 15

Enables the system VLANs on the uplink object.switch(config-uplink-net)#system network uplinkStep 16

See the following example to create a network segment with access VLAN that will be carried by a networkuplink named Channel. Use the show nsm network uplink name <name> command to view the systemVLAN configuration.switch(config)# configure terminalswitch(config)# nsm logical network IntranetSFOswitch(config-logical-net)# description network for host connectivityswitchM(config-logical-net)# exit

switch(config)# nsm network segment pool IntranetSJswitch(config-net-seg-pool)# member-of logical network IntranetSFOswitch(config-net-seg-pool)# exit

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x28

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 37: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

switch(config)# nsm network segment VMNetworkBswitch(config-net-seg)# switchport access vlan 101switch(config-net-seg)# network segment pool IntranetSJswitch(config-net-seg)# system network segmentswitch(config-net-seg)# publish network segmentswitch(config-net-seg)# exit

switch(config)# nsm network uplink Channelswitch(config-uplink-net)# allow network segment pool IntranetSJswitch(config-uplink-net)# publish network uplink

switch(config-uplink-net)# show nsm network uplink name Channeluplink-network: ChannelPublish-name: Channelimport port-profile: uplink_network_default_policynetwork-segment-pool:IntranetSJ

port-profile config:switchport mode trunkswitchport trunk allowed vlan 101

switch(config)# show run port-profile Channel!Command: show running-config port-profile channel!Time: Mon Feb 25 10:02:43 2013

version 5.2(1)SM1(5.1)port-profile type ethernet channelinherit port-profile uplink_network_default_policyswitchport mode trunkguid 6fe46002-5a4d-4d6f-949c-12eb41ee7ae3max-ports 512description NSM created profile. Do not delete.system vlan 101state enabled

Configuring PVLAN on vEthernet and Ethernet Interfaces

You can configure a PVLAN on vEthernet and Ethernet interfaces:

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 29

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 38: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)#feature private-vlan3. switch(config)#nsm logical network <name>4. switch(config-logical-net)#description <description>5. switch(config-logical-net)#exit6. switch(config)#nsm network segment pool <name>7. switch(config-net-seg-pool)#member-of logical network <name>8. switch(config-net-seg-pool)#exit9. switch(config)#nsm network segment <name>10. switch(config-net-seg)#member-of network segment pool <name>11. switch(config-net-seg)#switchport mode private-vlan primary12. switch(config-net-seg)#switchport private-vlan primary "primary vlan"13. switch(config-net-seg)#exit14. switch(config)#nsm network segment <name>15. switch(config-net-seg)#member-of network segment pool <name>16. switch(config-net-seg)#switchport mode private-vlan host [ isolated | community | promiscuous ]17. switch(config-net-seg)#switchport private-vlan host association "primary vlan" "secondary vlan"

OR switchport private-vlan mapping "primary vlan" "list of secondary vlan"18. switch(config-net-seg)#publish network segment19. switch(config-net-seg)#exit20. switch(config)#nsm network uplink name21. switch(config-uplink-net)#allow network segment pool <name>22. switch(config-uplink-net)# publish network uplink

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Enables the PVLAN feature on the VSM.switch(config)#feature private-vlanStep 2

Enters a name for the logical network.switch(config)#nsm logical network <name>Step 3

Describes the logical network.switch(config-logical-net)#description<description>

Step 4

Exits the configuration.switch(config-logical-net)#exitStep 5

Enters a name for the network segment pool.switch(config)#nsmnetwork segment pool<name>Step 6

Associates the logical network to the network segment pool.switch(config-net-seg-pool)#member-of logicalnetwork <name>

Step 7

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x30

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 39: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

PurposeCommand or Action

Exits the configuration.switch(config-net-seg-pool)#exitStep 8

Creates a network segment.switch(config)#nsm network segment <name>Step 9

Associates the network segment to the network segment pool.switch(config-net-seg)#member-of networksegment pool <name>

Step 10

Configures the network segment to be type private-vlanprimary.

switch(config-net-seg)#switchport modeprivate-vlan primary

Step 11

Make sure that feature private vlan is enabled onthe VSM.

Note

Sets primary VLAN on a network segment. The primaryVLAN segment is used as an anchor segment for creatingthe secondary VLAN segment.

switch(config-net-seg)#switchport private-vlanprimary "primary vlan"

Step 12

Exits the configuration.switch(config-net-seg)#exitStep 13

Configures a secondary VLAN.switch(config)#nsm network segment <name>Step 14

Associates the network segment to the network segment poolwhich was used in step 10.

switch(config-net-seg)#member-of networksegment pool <name>

Step 15

Create a network segment for secondary VLANwith the portmode as private-vlan host and configure the PVLANmapping.

switch(config-net-seg)#switchport modeprivate-vlan host [ isolated | community |promiscuous ]

Step 16

The host mode can be isolated or community orpromiscuous.

Note

The host association is used for creating a private-vlan hostsegment in either isolated or community mode. The mapping

switch(config-net-seg)#switchport private-vlanhost association "primary vlan" "secondary vlan"

Step 17

option is used for creating the private-vlan host segment inpromiscuous mode.

OR switchport private-vlan mapping "primaryvlan" "list of secondary vlan"

Publishes the secondary network segments to the MicrosoftSCVMM. The vEthernet interfaces can be attached to thesesegments on the Microsoft SCVMM.

switch(config-net-seg)#publish network segmentStep 18

Exits the configuration.switch(config-net-seg)#exitStep 19

Creates a network uplink with the network segment pool thatcarries the primary and secondary VLAN network segments.

switch(config)#nsm network uplink nameStep 20

Associates the network uplink with the network segmentpool.

switch(config-uplink-net)#allow network segmentpool <name>

Step 21

Publishes the network segments and the network uplinks tothe Microsoft SCVMM.

switch(config-uplink-net)# publish network uplinkStep 22

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 31

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 40: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Use the following example to configure the network segments as primary and secondary PVLANs that willbe carried by an uplink network named Channel. Use the show feature | inc private-vlan command to verifythat the PVLAN feature is enabled. Use the show vlan private-vlan command to verify PVLAN mappings.

switch# configure terminalswitch(config)# feature private vlanswitch# show feature | inc private-vlan

private-vlan 1 enabled

switch(config)# nsm logical network IntranetSFOswitch(config-logical-net)# description network for host connectivityswitch(config-logical-net)# exit

switch(config)# nsm network segment pool IntranetSJswitch(config-net-seg-pool)#member-of logical network IntranetSFOswitch(config-net-seg-pool)#exit

switch(config)# nsm network segment Pvlan_Primary_Segmentswitch(config-net-seg)# member-of network segment pool IntranetSJswitch(config-net-seg)# switchport mode private-vlan primaryswitch(config-net-seg)# switchport private-vlan primary 100switch(config-net-seg)# exit

switch(config)# nsm network segment VMNetworkBswitch(config-net-seg)# member-of network segment pool IntranetSJswitch(config-net-seg)# switchport mode private-vlan host communityswitch(config-net-seg)# switchport private-vlan host-association 100 200switch(config-net-seg)# publish network segmentswitch(config-net-seg)# exit

switch(config)# nsm network uplink Channelswitch(config-uplink-net)# allow network segment pool IntranetSJswitch(config-uplink-net)# publish network uplinkswitch(config-uplink-net)# exit

switch# show vlan private-vlanPrimary Secondary Type Ports------- --------- --------------- -------------------------------------------101 200 primary Po1, Po3, Po5, Po7, Po9, Po11400 402 community Po1, Po3, Po5, Po7, Po9, Po11

Configuring Secondary PVLAN Mode

You can change the secondary PVLAN mode from community to isolated and vice versa:

SUMMARY STEPS

1. switch# configure terminal2. switch(config)#nsm network segment sec -21693. switch(config-net-seg)#no switch port private host-association4. switch(config-net-seg)#switchport mode private-vlan host isolated5. switch(config-net-seg)#switchport private-vlan host-association 2167 2169

DETAILED STEPS

PurposeCommand or Action

Enters global configuration mode.switch# configure terminalStep 1

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x32

Configuring Network Segmentation ManagerBuilding Network Infrastructure for Microsoft SCVMM

Page 41: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

PurposeCommand or Action

Creates a network segment.switch(config)#nsm network segment sec -2169Step 2

switch(config-net-seg)#no switch port private host-associationStep 3

.switch(config-net-seg)#switchport mode private-vlan host isolatedStep 4

switch(config-net-seg)#switchport private-vlan host-association 21672169

Step 5

.

Here sec-2169 is orignally a community network segment as follows:Name: sec-2169VM Network Name: sec-2169VM Network GUID: 188a9da2-3685-4dfd-b42e-14594256ee37Description:GUID: 45fbeb2c-9c51-497f-94e4-43b922bb412eNetwork segment pool: hypervMode: switchport mode private-vlan host community.Vlan: 0PVLAN Host-Association: primary {2167} secondary {2169}System Network Segment: FALSEip pool template: ip-poolip pool template GUID: 420a9b02-d4eb-42da-ba42-9dfc699ddcffPublish-name: sec169

Feature History for Network Segmentation ManagerThis table includes only the updates for those releases that have resulted in additions or changes to the feature.

Feature InformationReleaseFeature Name

Introduced the NetworkSegmentation Manager (NSM)feature.

5.2(1)SK1(2.1)Network Segmentation Manager

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 33

Configuring Network Segmentation ManagerFeature History for Network Segmentation Manager

Page 42: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x34

Configuring Network Segmentation ManagerFeature History for Network Segmentation Manager

Page 43: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

C H A P T E R 3Verifying the Configuration using ShowCommands

This chapter contains the following sections:

• Verifying the NSM Configuration, page 35

Verifying the NSM ConfigurationUse one of the following commands to verify the configuration:

• show nsm ip pool template name <name>

• show nsm ip pool template usage network segment

• show nsm logical network name <name>

• show nsm network segment brief

• show nsm network segment filter network segment pool name <name>

• show nsm network segment filter vlan <vlan_ID>

• show nsm network segment filter pvlan host <vlan_ID>

• show nsm network segment filter pvlan primary <vlan_ID>

• show nsm network segment filter pvlan promiscuous <vlan_ID>

• show nsm network segment filter pvlan secondary <vlan_ID>

• show nsm network segment filter network segment pool <name>

• show nsm network segment name <name>

• show nsm network segment pool name <name>

• show nsm network uplink brief

• show nsm network uplink filter import Ethernet Port-Profile name

• show dynamic-port-profile

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 35

Page 44: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

• show dynamic-port-profile <name>name

• show dynamic-port-profile inherit <name>

• show dynamic-port-profile network segment <name>

show nsm ip pool template name <name>

This show command displays an IP pool template of a given name.

switch# show nsm ip pool template name pool10Name: pool10Description:IP-address-range: 30.0.0.2-30.0.0.100Network: 30.0.0.2Subnet mask: 255.255.255.0Default router:Netbios: EnabledDHCP: DisabledReserved-ip-list:Netbios-name-server-list:DNS-server-list:DNS-suffix-list:switch#

show nsm ip pool template usage network segment

The following show command displays the network using an IP pool template.

switch# show nsm ip pool template usage network segmentIp-pool: pool10VMNetworkAswitch#

show nsm logical network name <name>

This command displays the Logical Network of a given name.

switch# show nsm logical network name <name>Name: IntranetSFODescription: Intranet network

show nsm network segment brief

This command displays information about mode, VLAN, publish status, and the system segment status forall the network segments.

switch# show nsm network segment brief

--------------------------------------------------------------------------------Network segment Mode VLAN Pub Sys--------------------------------------------------------------------------------VMNetworkA access 100 1 0VMNetworkB pvlan primary 101(P) 1 0VMNetworkC pvlan promiscu 0(P) (S) 0 0VMNetworkD pvlan promiscu 0(P) (S) 0 0

--------------------------------------------------------------------------------Total Total Pub Total Sys--------------------------------------------------------------------------------4 2 0

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x36

Verifying the Configuration using Show CommandsVerifying the NSM Configuration

Page 45: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

show nsm network segment filter network segment pool <name>

This command displays all network segments that are part of a given network segment pool.

switch# show nsm network segment filter network segment pool IntranetSJName: VMNetworkBVM Network Name: VMNetworkBVM Network GUID: 3248a6f9-30ca-4cc5-b925-ef0bf6994b75Description:GUID: 65a6d0de-c666-448b-a912-60cc960f11ccNetwork segment pool: IntranetSJMode: switchport mode private-vlan primaryPrimary Private-VLAN: 101System Network Segment: FALSEip pool template: pool10ip pool template GUID: 3ea151c8-ab80-47b1-8491-88a5fb651fe7Publish-name: VMNetworkB

show nsm network segment filter vlan <vlan_ID>

This command displays the network segment that is using a given VLAN ID.switch# show nsm network segment filter vlan 312Name: VMNetworkAVM Network Name: VMNetworkAVM Network GUID: e5120491-9948-4147-8923-19b748c204c3Description:GUID: c8cef5c6-0550-489b-b55c-6f3fb162da47Network segment pool: IntranetSJVlan: 312System Network Segment: FALSEip pool template: pool10ip pool template GUID: 06359032-9ff5-436e-8560-da6bdfa13abePublish-name: VMNetworkA

switch#

show nsm network segment filter pvlan host <vlan_ID>

This command displays all the PVLAN host network segments that are using the a given primary VLAN.switch# show nsm network segment filter pvlan host 264Name: VMNetworkDVM Network Name: VMNetworkDVM Network GUID: 3e7724f5-ab85-441d-a7e2-53f57902a8c7Description:GUID: 1fa0229d-70a4-4931-bd96-259a8338961cNetwork segment pool: IntranetSJMode: switchport mode private-vlan host communityVlan: 0PVLAN Host-Association: primary {264} secondary {10}System Network Segment: FALSEip pool template: pool10ip pool template GUID: df25ee13-5cf7-4c26-a926-d99bf04d86e5Publish-name: VMNetworkD

switch#

show nsm network segment filter pvlan primary <vlan_ID>

This command displays primary VLAN network segment for a given primary VLAN.switch# show nsm network segment filter pvlan primary 264Name: VMNetworkCVM Network Name: VMNetworkCVM Network GUID: 5def43e9-1a84-4273-a235-84ebf066c971Description:GUID: 0037b276-cd32-46ce-9c64-eb1e8c1bc53dNetwork segment pool: IntranetSJMode: switchport mode private-vlan primaryPrimary Private-VLAN: 264

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 37

Verifying the Configuration using Show CommandsVerifying the NSM Configuration

Page 46: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

System Network Segment: FALSEip pool template: pool10ip pool template GUID: 790d7b34-d23f-4000-8984-f30a9f733657Publish-name: <unpublished>

switch#

show nsm network segment filter pvlan promiscuous <vlan_ID>

The following show command displays the promiscuous mode host segment under a given primary VLAN.switch# show nsm network segment filter pvlan promiscuous 403Name: VMNetworkBVM Network Name: sec-promiscVM Network GUID: 4676a384-26e5-45f2-b6fe-6504e5db57cfDescription:GUID: 849adbd9-10a3-425d-b01b-0f188ee5ac71Network segment pool: IntranetSJMode: switchport mode private-vlan promiscuousVlan: 0PVLAN Mapping: primary {403} secondary {ALL}System Network Segment: FALSEip pool template: pool10ip pool template GUID: 17994236-8df9-4007-8628-767d55817fd9Publish-name: VMNetworkB

switch#

show nsm network segment filter pvlan secondary <vlan_ID>

This command displays PVLAN host network segment carrying the given secondary VLAN.switch# show nsm network segment filter pvlan secondary 256Name: sec-256VM Network Name: sec-256VM Network GUID: f802ab37-df8f-45f1-92d0-60a7661389f1Description:GUID: d50c9a94-6a5a-46a6-9a9c-476ca613f0c9Network segment pool: pvlan-nd1Mode: switchport mode private-vlan host communityVlan: 0PVLAN Host-Association: primary {255} secondary {256}System Network Segment: FALSEip pool template: defaultip pool template GUID: 3958c9c5-cb67-4cba-8684-6d4c545f073bPublish-name: sec-256switch#

show nsm network segment filter network segment pool <name>

The following show command displays a list of the network segments that are associated with a given networksegment pool.switch# show nsm network segment filter network segment pool IntranetSJName: VMNetworkBVM Network Name: VMNetworkBVM Network GUID: 3248a6f9-30ca-4cc5-b925-ef0bf6994b75Description:GUID: 65a6d0de-c666-448b-a912-60cc960f11ccNetwork segment pool: IntranetSJMode: switchport mode private-vlan primaryPrimary Private-VLAN: 101System Network Segment: FALSEip pool template: pool10ip pool template GUID: 3ea151c8-ab80-47b1-8491-88a5fb651fe7Publish-name: VMNetworkB

Name: VMNetworkCVM Network Name: VMNetworkCVM Network GUID: 70afb65b-3bdf-406d-810c-eebdb9c887f8Description:GUID: 4a1a2711-c0ad-4bd0-9e9b-93d3a012e9ca

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x38

Verifying the Configuration using Show CommandsVerifying the NSM Configuration

Page 47: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Network segment pool: IntranetSJMode: switchport mode private-vlan promiscuousVlan: 100System Network Segment: FALSEip pool template:ip pool template GUID:Publish-name: <unpublished>

Name: VMNetworkAVM Network Name: VMNetworkAVM Network GUID: 4f9e637c-cc31-47cc-ad6c-684bb3e381f4Description:GUID: 354c98a7-8ed1-4675-bdc5-402ad865807dNetwork segment pool: IntranetSJMode: switchport mode private-vlan promiscuousVlan: 100System Network Segment: FALSEip pool template:ip pool template GUID:Publish-name: <unpublished>

switch#

show nsm network segment name <name>

The following show command displays the details of the network segment.

switch# show nsm network segment name VMNetworkAName: VMNetworkAVM Network Name: VMNetworkAVM Network GUID: 584d510b-0eba-485d-9262-a78c0a1fcfe3Description:GUID: 68f827e8-247d-4f3d-bebf-73d14d0a613aNetwork segment pool: IntranetSFOVlan: 100System Network Segment: FALSEip pool template: pool10ip pool template GUID: fb05d8b0-724d-478b-a550-bf75f0a646adPublish-name: VMNetworkA

switch#

show nsm network segment pool name <name>

The following show command displays which network segments are used by a given network segment pool.switch# show nsm network segment pool name <name>WORD Name of the network segment pool (Max Size 64)switch# show nsm network segment pool name IntranetSJName: IntranetSJGUID: 39362fa4-7ae2-47ee-8f64-1f8ecceda867Logical network Name: IntranetSFOIntra Port Communication: DisabledPrimary Private-VLAN: 101Publish-name: IntranetSJ

switch#

show nsm network uplink brief

The following show command displays brief information about the network uplink.switch# show nsm network uplink brief

--------------------------------------------------------------------------------network uplink Pub Sys--------------------------------------------------------------------------------NexusUplink 1 1

--------------------------------------------------------------------------------Total Total Pub Total Sys--------------------------------------------------------------------------------

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 39

Verifying the Configuration using Show CommandsVerifying the NSM Configuration

Page 48: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

1 1 1switch#

show nsm network uplink filter import <name>

The following show command displays the list of the network uplinks that are filtered based on the Ethernetpolicy port profile.switch# show nsm network uplink filter import UplinkNoPortChanneluplink network: NexusUplinkPublish-name: NexusUplinkimport port-profile: UplinkNoPortChannelnetwork segment pool:IntranetSJ

System Uplink-Network: TRUESwitchport mode override:autoNative network segment: VMNetworkBport-profile config:switchport mode private-vlan trunk promiscuousswitchport private-vlan trunk allowed vlan 100,200switchport private-vlan trunk native vlan 101

switch#

show nsm network uplink filter network segment pool <name>

The following show command displays the list of the network uplinks that are filtered based on the networksegment pools used.switch# show nsm network uplink filter network segment pool IntranetSJuplink network: NexusUplinkPublish-name: NexusUplinkimport port-profile: UplinkNoPortChannelnetwork segment pool:IntranetSJ

System Uplink-Network: TRUESwitchport mode override:autoNative network segment: VMNetworkBport-profile config:switchport mode private-vlan trunk promiscuousswitchport private-vlan trunk allowed vlan 100,200switchport private-vlan trunk native vlan 101

switch#

show dynamic-port-profile

The following show command displays a list of all the dynamically created profiles.switch# show dynamic-port-profiledynamic-port-profile: dynpp_0f025c08-0e30-4c06-89ae-69b39d418121_90894e82-fac6-454d-8405-e62ddebd9a1binherit port-profile: veth-policynetwork segment: VMNetworkD

switch#

show dynamic-port-profile name <name>

The following show command displays a specific dynamic port profile.switch# show dynamic-port-profile name veth-policydynpp_ebdcbd8e-96ab-4f9a-8975-c71283d0adc7_0cf1a4ea-a6e0-4cdf-b4ec-fcfa95ced562dynamic-port-profile:dynpp_ebdcbd8e96ab-4f9a-8975-c71283d0adc7_0cf1a4ea-a6e0-4cdf-b4ec-fcfa95ced562inherit port-profile: defaultnetwork-segment: VMNetworkD

switch#

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x40

Verifying the Configuration using Show CommandsVerifying the NSM Configuration

Page 49: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

show dynamic-port-profile inherit <name>

The following show command displays the list of dynamic port profile inheriting a specific vEthernet policyprofile.switch# show dynamic-port-profile inherit default_policydynamic-port-profile:dynpp_ebdcbd8e-96ab-4f9a-8975-c71283d0adc7_0cf1a4ea-a6e0-4cdf-b4ec-fcfa95ced562inherit port-profile: defaultnetwork-segment: VMNetworkA

dynamic-port-profile:dynpp_ebdcbd8e-96ab-4f9a-8975-c71283d0adc7_1cb25b88-4a94-4dd6-9660-ee1ba12c60d8inherit port-profile: defaultnetwork-segment: VMNetworkB

dynamic-port-profile:dynpp_ebdcbd8e-96ab-4f9a-8975-c71283d0adc7_36c067a9-3d5c-42c0-a9cd-3ae6c6cc0f19inherit port-profile: defaultnetwork-segment: VMNetworkC

dynamic-port-profile:dynpp_ebdcbd8e-96ab-4f9a-8975-c71283d0adc7_6c59962d-b356-4c55-b8be-d2019f6965eainherit port-profile: defaultnetwork-segment: VMNetworkD

switch#

show dynamic-port-profile network-segment <name>

The following show command displays the list of dynamic port profile using a given network segment.switch# show dynamic-port-profile network segment ?WORD Name of the network-segment (Max Size 64)

switch# show dynamic-port-profile network segment B_vlan_342dynamic-port-profile:dynpp_ebdcbd8e-96ab-4f9a-8975-c71283d0adc7_1cb25b88-4a94-4dd6-9660-ee1ba12c60d8inherit port-profile: defaultnetwork-segment: VMNetworkC

switch#

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x 41

Verifying the Configuration using Show CommandsVerifying the NSM Configuration

Page 50: Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation … · Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x First Published:

Cisco Nexus 1000V for Microsoft Hyper-V Network Segmentation Manager Configuration Guide, Release 5.x42

Verifying the Configuration using Show CommandsVerifying the NSM Configuration