Click here to load reader

Cisco Nexus 1010 Overview and Deployment€¦ · VEM-1 VEM-2 VEM-N Nexus 1000V Architecture VSMs hosted on a Physical Appliance: Nexus 1010

  • View
    0

  • Download
    0

Embed Size (px)

Text of Cisco Nexus 1010 Overview and Deployment€¦ · VEM-1 VEM-2 VEM-N Nexus 1000V Architecture VSMs...

  • Sal Lopez Technical Marketing Engineer SAVBU

    Cisco Nexus 1010 Overview and Deployment

    Software Switch for VMware vSphere and vCloud Director

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 2

    Date   Business  Sessions    22-‐Mar   Nexus  1000V  Family  Overview  and  Update  

    5-‐Apr   Virtual Network Services (vPath, NAM, vWAAS) 19-‐Apr   Virtual Security Gateway Introduction

    3-‐May   Journey  to  the  Cloud  w/  N1KV:  vCloud  Director  &  Long  Distance  vMoNon  17-‐May   Secure  VDI  with  Nexus1000V  &  VSG  

    Date   Technical  Sessions    29-‐Mar   Nexus  1000V  New  Features  and  InstallaNon  Overview  12-‐Apr   Nexus1010  InstallaNon  &  Upgrade  

    26-‐Apr   Virtual  Security  Gateway  InstallaNon  and  Basic  ConfiguraNon    10-‐May   Nexus  1000V  Advanced  ConfiguraNon  

    24-‐May   Nexus  1000V  TroubleshooNng  

    Nexus 1000V Public Webinar Series

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 3

    Nexus 1000V “My Community”

    www.cisco.com/go/1000vcommunity

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 4

    Nexus 1000V “My Community”

    www.cisco.com/go/1000vcommunity

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 5

    Nexus 1000V “My Community”

    www.cisco.com/go/1000vcommunity

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 6

    Nexus 1000V Screencasts

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 7

    Nexus 1000V Screencasts

  • Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved.

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 9

    Modular Switch

    …Linecard-N

    Supervisor-1

    Supervisor-2

    Linecard-1

    Linecard-2

    Bac

    k P

    lane

    Server 1 Server 2 Server 3

    Nexus 1000V Architecture Comparison to a Physical Switch

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 10

    ESX ESX ESX

    Modular Switch

    …Linecard-N

    Supervisor-1

    Supervisor-2

    Linecard-1

    Linecard-2

    Bac

    k P

    lane

    Nexus 1000V Architecture Moving to a Virtual Environment

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 11

    ESX ESX ESX

    Modular Switch

    …Linecard-N

    Supervisor-1

    Supervisor-2

    Linecard-1

    Linecard-2

    Bac

    k P

    lane

    Nexus 1000V Architecture Supervisors Virtual Supervisor Modules (VSMs)

    VSM1

    VSM2

    Virtual Appliance

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 12

    ESX ESX ESX

    Modular Switch

    …Linecard-N

    Supervisor-1

    Supervisor-2

    Linecard-1

    Linecard-2

    Bac

    k P

    lane

    VSM1

    VSM2

    Virtual Appliance

    Nexus 1000V Architecture Linecards Virtual Ethernet Modules (VEMs)

    VEM-N VEM-1 VEM-2

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 13

    ESX ESX ESX

    VSM1

    VSM2

    Virtual Appliance

    Nexus 1000V Architecture VSM + VEMs = Nexus 1000V Virtual Chassis

    VEM-N VEM-1 VEM-2

    VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module

    •  64 VEMs per 1000V (connected by L2 or L3)

    •  200+ vEth ports per VEM •  2K vEths per 1000V •  Multiple 1000Vs can be created per vCenter

    L2 M

    ode

    L3 M

    ode

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 14

    ESX ESX ESX

    VSM1

    VSM2

    Virtual Appliance

    Nexus 1000V Architecture Customer Request: Host VSMs on a Physical Appliance

    VEM-N VEM-1 VEM-2

    VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module

    L2 M

    ode

    L3 M

    ode

    •  200+ vEth ports per VEM •  64 VEMs per 1000V •  2K vEths per 1000V •  Multiple 1000Vs can be created per vCenter

    Physical Appliance?

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 15

    Virtual Appliance

    ESX ESX ESX

    Nexus 1010

    VSM-A1 VSM-A4

    VSM-B1 VSM-B4

    VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module

    •  200+ vEth ports per VEM •  64 VEMs per 1000V •  2K vEths per 1000V •  Multiple 1000Vs can be created per vCenter

    VEM-N VEM-1 VEM-2

    Nexus 1000V Architecture VSMs hosted on a Physical Appliance: Nexus 1010

    •  Up to 4 VSMs per Nexus 1010

    • Nexus 1010s deployed in redundant pair

    L2 M

    ode

    L3 M

    ode

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 16

    Embedding Intelligence for Virtual Services vPath – Virtual Service Datapath

    Virtual Appliance

    VSM

    VEM-1 vPath

    VEM-2 vPath

    L2 M

    ode

    L3 M

    ode

    ESX ESX

    vPath •  Virtual Service Datapath VSG •  Virtual Security Gateway for 1000v vWAAS •  Virtual WAAS

    vWAAS VSG

    vPath •  Traffic Steering •  Fast -Path Offload

    • Nexus 1000V ver 1.4 & above

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 17

    Nexus 1010 – Hosting Platform for Services

    Virtual Appliance Nexus 1010

    VSM-A1 VSM-A4

    VSM-B1 VSM-B4

    NAM

    NAM

    L2 M

    ode

    L3 M

    ode

    *VSG on 1010 target: 2Q CY11

    vPath •  Virtual Service Datapath VSG •  Virtual Security Gateway for 1000v vWAAS •  Virtual WAAS

    VEM-1 vPath

    VEM-2 vPath

    ESX ESX

    vWAAS VSG

  • Sal Lopez Technical Marketing Engineer SAVBU

    Cisco Nexus 1010 Overview and Deployment

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 19

    Agenda

    §  Nexus 1010 Hardware and Software

    §  Nexus 1000V VSM connectivity on Nexus 1010

    §  Nexus 1010 Network Integration and Data Center Design

    §  Nexus 1010 Virtual Service Blade Configuration and Verification

    §  Nexus 1010 Upgrade Process

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 20

    Nexus 1010 Hardware and Software

    Software Switch for vSphere 4.0 and 4.1

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 21

    Nexus 1010 Hardware Configuration

    Based on UCS Physical Appliance §  2 x Intel X5650- 2.66GHz, 6 core §  16 GB RAM §  2 x 500GB SATA-II HDD §  1 x Quadport GE NIC Card §  1 x Serial Port §  1 x Rail-Kit

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 22

    Nexus 1010 Ports and Components §  Cisco Integrated Management Controller for lights out, out of band

    management (use KVM cable to setup), similar to CMP for other NX-OS switches

    §  6 Gigabit Ethernet ports (2 LOM for management/control, 4 on PCIe card)

    1 Power supply (one) 2 CIMC port (RJ-45) 10/100 Mbps3 USB 2.0 connectors (two) 4 Serial connector (DB9)5 Video connector (15-pin VGA) 6 Gigabit Ethernet Ports (1 and 2)7 Gigabit Ethernet ports (3 to 6) 8 Standard-profile PCIe card slot (not used)

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 23

    Nexus 1010 Virtual Service Blade

    §  The Nexus 1010 comes with a new concept of Virtual Services called Virtual Service Blade (VSB)

    § Shipping today: VSM virtual service blade NAM virtual service blade

    § VSG, DCNM in future releases

    Nexus 1000V VSM

    Nexus 1010 Manager

    Network Analysis Module*

    * Optional virtual service blade add-on

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 24

    Nexus 1010 Scalability

    Nexus 1000V VSM Nexus 1000V VSM Nexus 1000V VSM Nexus 1000V VSM

    Nexus 1010 Manager

    Network Analysis Module

    Nexus 1010 Manager: Cisco management experience

    Manages a total of 5 virtual service blades (ie. 4 VSMs and 1 NAM)

    Each VSM can manage up to 64 VEMs (256 total VEMs)

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 25

    Feature Comparison

    VSM as VM VSM on Nexus 1010

    Nexus 1000V features and scalability VEM running on vSphere 4 Enterprise Plus NX-OS high availability of VSM Software-only deployment Installation like a standard Cisco switch Network Team owns/manages the VSM VSM Isolation from production VM environment in case of outage Least number of steps to deploy VSM

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 26

    Nexus 1010 Managed By Network Team

    § VSM planned and deployed on networking equipment

    § Access to console consistent with existing network gear (no additional software needed)

    §  Troubleshoot via Cisco NX-OS CLI § Nexus 1010 platform can be managed via SNMP § Secured by AAA

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 27

    Nexus 1010 High Availability § Process HA at NX-OS level

    • Modular OS based on Linux

    § Virtual Service Blade redundancy • Nexus 1010 automation and state synchronization • Create primary VSM once and secondary VSM gets created for you

    § Chassis Level Redundancy • Deployed in pairs • Same mechanisms used as redundant supervisors on switches • Prevent split brain scenario with CIMC as backup connection

    § Network Level Redundancy • Flexible network integration options with traffic isolation, trunking and LACP

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 28

    Nexus 1000V VSM connectivity on Nexus 1010

    Software Switch for vSphere 4.0 and 4.1

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 29

    VSM to VEM Communications

    VM VM VM VM

    Nexus 1000V VSM On Nexus 100

    L2 Network

    Control VLAN • Extend the usual backplane of the switch over the network • Carries low level messages to ensure proper configuration of the VEM. • Maintains a 1 sec heartbeat with the VSM to the VEM (timeout of 6 seconds) • Maintains syncronization between primary and secondary VSMs Packet VLAN For control plane processing like CDP, IGMP snooping, or stat collections like SNMP, Netflow

    Control VLAN Packet VLAN

    Two virtual interfaces are used to communicate between the VSM and VEM

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 30

    Layer 2 connectivity of the VSM and VEM

    VM VM VM VM

    L2 Network

    Control VLAN Packet VLAN

    § For L2 deployment, Control and Packet VLAN needs to be configured end to end to allow communication between the VSM and the VEM If those VLANs are not configured end to end the VEM will not show up even if it looks like it is in vCenter Control VLAN and Packet VLAN needs to be configured as system VLAN on the uplink port-profile Can use 1 or 2 VLANs for Control/Packet traffic Nexus 1000V VSM

    On Nexus 100

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 31

    Layer 3 connectivity of the VSM and VEM

    VM VM VM VM

    L3 Network

    For L3 Control, L2 adjacency for Control and Packet not required

    VSM uses a svs mode type layer 3 using either the control0 Interface or the mgmt0 interface User can specify an IP address for control0 to use a separate network for VEM – VSM communication svs-domain svs mode L3 interface (control0 | mgmt0)

    Nexus 1000V VSM On Nexus 100

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 32

    Nexus 1010 Network Integration and Data Center Design

    Software Switch for vSphere 4.0 and 4.1

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 33

    Nexus 1010 Network Integration Design

    There are 4 uplink options to connect the Nexus 1010 to the Network

    This will influence how the control, packet, management and data information will be connected to rest of the network

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 34

    Nexus 1010 Network Integration – Uplink Type 1

    §  Nexus 1010 uplink type 1:Ports 1 and 2 carry Management, Control and Data traffic

    N1010-1 Active Chassis

    N1010-2 HA-Standby Chassis

    Eth1 Eth2 Eth1 Eth2

    Sample Topology: Common L2 Network with upstream switch N5K/N2K

    Active VSM HA-Standby VSM

    Upstream Switch Access Ports: interface ethernet 101/1/1-2 !-- multiple vlans trunked across link switchport mode trunk !--only allow mgmt, control and data vlans switchport trunk allowed vlan 170,250-251 !-- enable portfast edge spanning-tree port type edge trunk

    Nexus 1010 Eth1: active (forwarding) Eth2: standby (not forwarding) Total Bandwidth per device is 1Gbps

    N1010-1 Active Chassis

    Eth1 Eth2 Eth2 Eth1

    Active VSM HA-Standby VSM

    N1010-2 HA-Standby Chassis

    Setup 2 Setup 1

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 35

    Nexus 1010 Network Integration – Uplink Type 2

    §  Nexus 1010 uplink type 2:Ports 1 and 2 carry Management and Control; Ports 3-6 carry Data traffic

    §  Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth Sample Topology: Common L2 Network, upstream switch N5K/N2K with vPC

    Nexus 1010 Eth1: active (forwarding) Eth2: standby (not forwarding) Eth3-6:forwarding in LACP bundle Total Bandwidth per device is 5Gbps

    N1010-1 Active Chassis

    E1 E2 E2 E1

    Active VSM HA-Standby VSM

    N1010-2 HA-Standby Chassis

    E3 E4 E5 E6 E3 E4 E5 E6

    1 2

    6 1

    2 3 4

    5 3 4 5 6

    Upstream LACP Ports (both switches): interface ethernet 101/1/2, 101/1/4 !-- multiple vlans trunked across link switchport mode trunk !-- only allow mgmt, control and data vlans switchport trunk allowed vlan 251 !-- enable portfast edge spanning-tree port type edge trunk !-- add interface to port-channel, this is a vpc channel-group 1010 mode active !-- this is a unique vpc for N1010-1 interface port-channel 1010 vpc 1010

    **Config must be repeated for N1010-2 on interfaces 101/1/5-6

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 36

    Nexus 1010 Network Integration – Uplink Type 3 (Most Common for VSM Deployment)

    §  Nexus 1010 uplink type 3:Ports 1 and 2 carry Management; Ports 3-6 carry Control and Data traffic

    §  Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth Sample Topology: Common L2 Network, upstream switch N5K/N2K with vPC

    Upstream LACP Ports (both switches): interface ethernet 101/1/2, 101/1/4 !-- multiple vlans trunked across link switchport mode trunk !-- only allow mgmt, control and data vlans switchport trunk allowed vlan 250-251 !-- enable portfast edge spanning-tree port type edge trunk !-- add interface to port-channel, this is a vpc channel-group 1010 mode active !-- this is a unique vpc for N1010-1 interface port-channel 1010 vpc 1010

    **Config must be repeated for N1010-2 on interfaces 101/1/5-6 Nexus 1010 Eth1: active (forwarding) Eth2: standby (not forwarding) Eth3-6:forwarding in LACP bundle Total Bandwidth per device is 5Gbps

    N1010-1 Active Chassis

    E1 E2 E2 E1

    Active VSM HA-Standby VSM

    N1010-2 HA-Standby Chassis

    E3 E4 E5 E6 E3 E4 E5 E6

    1 2

    6 1

    2 3 4

    5 3 4 5 6

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 37

    Nexus 1010 Network Integration – Uplink Type 4

    §  Nexus 1010 uplink type 4:Ports 1 and 2 carry Management; Ports 3 and 4 carry Control, Ports 5 and 6 carry Data traffic

    Upstream Switch Access Ports: interface ethernet 101/1/1 !-- multiple vlans trunked across link switchport mode trunk !-- only allow mgmt, control and data vlans switchport trunk allowed vlan 170 !-- enable portfast edge spanning-tree port type edge trunk

    Nexus 1010 Eth1: active (forwarding) Eth2: standby (not forwarding) Eth3: active (forwarding) Eth4: standby (not forwarding) Eth5: active (forwarding) Eth6: standby (not forwarding) Total Bandwidth per device is 3Gbps

    N1010-1 Active Chassis

    E1 E2 E2 E1

    Active VSM HA-Standby VSM

    N1010-2 HA-Standby Chassis

    E3 E4 E5 E6 E3 E4 E5 E6

    Sample Topology: Common L2 Network with upstream switch N5K/N2K

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 38

    Nexus 1010 Network Connectivity Summary

    Uplink Description

    Option 1 Ports 1-2 Carry All Management, Control, and Data Traffic • Really easy to deploy

    Option 2 Ports 1-2 Carry Management and Control, Ports 3-6 Carry Data Traffic • Most of the bandwidth available for other Virtual Service Blades (ie. NAM)

    Option 3 Ports 1-2 Carry Management, Ports 3-6 Carry Control and Data Traffic • Most bandwidth for VSM Virtual Service Blades and other VSBs

    Option 4 Ports 1-2 Carry Management, Ports 3-4 Carry Control, Ports 5-6 Carry Data Traffic • Clear separation of all the different types of traffic

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 39

    Nexus 1010 in the Access Layer Core

    Access

    Compute/Virtual Access

    Nexus 1000V VEM ESXi

    Aggregation

    L3

    L2

    Nexus 1000V VSM VSB

    §  L2 Control for VSM to VEM is easier here

    All servers/switches below need Control/Packet VLANs L2 Network Services such as VSG (future)

    §  L3 Control for VSM possible

    §  HA pair can be dedicated per POD or customer

    More VSBs available per POD or customer

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 40

    Nexus 1010 in the Aggregation Layer Core

    Access

    Compute/Virtual Access

    Nexus 1000V VEM ESXi

    Aggregation

    L3

    L2

    Nexus 1000V VSM VSB

    §  L3 Control for VSM to VEM is more flexible here

    IP routing should be robust Suitable for long distance(future)

    §  L2 Control for VSM possible

    § HA pair can be shared among PODs or customers

    If using L3, there should be IP connectivity to VSM VSB from each POD

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 41

    Nexus 1010 and VSB Configuration

    Software Switch for vSphere 4.0 and 4.1

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 42

    Nexus 1010 Initial Setup - CIMC

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 43

    Nexus 1010 Initial Configuration §  Access Console via Telnet or Serial over LAN §  Setup System Admin Account and Basic System Configuration

    telnet 172.25.182.99 2005 Trying 172.25.182.99... Connected to 172.25.182.99. Escape character is '^]' ---- System Admin Account Setup ---- Enter the password for "admin": Confirm the password for "admin": Enter HA role[primary/secondary]: primary Enter network-uplink type : 1. Ports 1-2 carry all management, control and data vlans 2. Ports 1-2 management and control, ports 3-6 data 3. Ports 1-2 management, ports 3-6 control and data 4. Ports 1-2 management, ports 3-4 control, ports 5-6 data 3 Enter control vlan : 250 Enter the domain id: 201 Enter management vlan : 170 Saving boot configuration. Please wait... [########################################] 100%

    HA Role for each chassis

    Network uplink type for network integration

    Domain ID must be unique Mgmt VLAN is shared with VSM

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 44

    VSM VSB Installation Steps on Nexus 1010

    § Create VSM as VSB on N1010 § Register certificate as plug-in in vCenter § Define ethernet and vethernet port-profile

    Includes VLANs and physical settings to upstream switch For mac-pinning, upgrade feature level

    §  Install VEM using vCenter

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 45

    Creating and Configuring a VSM VSB

    tme-1010-1(config)# virtual-service-blade VSM-1010-1

    tme-1010-1(config-vsb-config)# virtual-service-blade-type new nexus-1000v.4.0.4.SV1.3a.iso

    tme-1010-1(config-vsb-config)# interface control vlan 251

    tme-1010-1(config-vsb-config)# interface packet vlan 252

    tme-1010-1(config-vsb-config)# enable

    Enter vsb image: [nexus-1000v.4.0.4.SV1.3.iso]

    Enter domain id[1-4095]: 203

    Management IP version [V4/V6]: [V4]

    Enter Management IP address: 10.29.170.84

    Enter Management subnet mask: 255.255.255.0

    IPv4 address of the default gateway: 10.29.170.1

    Enter HostName: VSM-1010-1

    Enter the password for 'admin': [email protected]

    tme-1010-1(config-vsb-config)#no shut

    One command deploys both Primary and Secondary VSM This is done only for HA aware VSBs

    Create and name the VSB

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 46

    VSB Control and HA Verification §  The Network Admin has total control over the VSB deployment tme-1010-1# show virtual-service-blade

    virtual-service-blade AV2-1010-VSM

    Description:

    Slot id: 2

    Host Name: AV2-VSM-1

    Management IP: 10.29.170.254

    VSB Type Name : VSM-1.0

    Interface: control vlan: 254

    Interface: management vlan: 170

    Interface: packet vlan: 255

    Interface: internal vlan: NA

    Ramsize: 2048

    Disksize: 3

    Heartbeat: 132670

    HA Admin role: Primary

    HA Oper role: ACTIVE

    Status: VSB POWERED ON

    Location: PRIMARY

    SW version: 4.0(4)SV1(3a)

    HA Admin role: Secondary

    HA Oper role: STANDBY

    Status: VSB POWERED ON

    Location: SECONDARY

    SW version: 4.0(4)SV1(3a)

    VSB Info:

    Domain ID : 401

    VSBs deployed in an HA pair by default (result of enable command).

    Verify VSB IP address and Control, Mgmt and Packet VLANs

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 47

    Nexus 1010 and VSB Network Verification tme-1010-1# show network-uplink type

    Administrative topology id: 3

    Operational topology id: 3

    tme-1010-1# show network summary

    -----------------------------------------------------------------------

    Port State Speed MTU

    -----------------------------------------------------------------------

    GigabitEthernet1 up 1000 1500

    GigabitEthernet2 up 1000 1500

    GigabitEthernet3 up 1000 1500

    GigabitEthernet4 up 1000 1500

    GigabitEthernet5 up 1000 1500

    GigabitEthernet6 up 1000 1500

    PortChannel1 up 1000 1500

    PortChannel2 up 1000 1500

    VbEthernet1/1 up 1000 1500

    VbEthernet1/2 up 1000 1500

    VbEthernet1/3 up 1000 1500

    Po1 represents active/standby bundle between E1 and E2 Po2 represents the LACP bundle between E3-E6

    Configured and actual operating topology are shown

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 48

    NAM Virtual Blade on Nexus 1010 Optimize Application Performance and Network Resources

    §  Application Performance Monitoring

    §  Traffic Analysis and Reporting Applications, Host, Conversations, VLAN, QoS, etc. Per-application, per-user traffic analysis

    §  View VM-level Interface Statistics

    §  Packet Capture and Decodes

    §  Historical Reporting and Trending

    ERSPAN

    Nexus 1000V VSM

    vSphere

    Nexus 1000V VEM

    vCenter

    NetFlow

    NAM Virtual

    Blade on Nexus 1010

    VM VM VM VM

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 49

    Creating and Configuring a NAM VSB

    N1010-1(config)# virtual-service-blade NAM-VSB

    N1010-1(config-vsb-config)# virtual-service-blade-type name NAM-1.0

    N1010-1(config-vsb-config)# interface data vlan 180

    N1010-1(config-vsb-config)# enable

    Enter vsb image: nam-app-x86_64.4-2-1-fc5.iso

    Enter Management IPV4 address: 10.29.180.99

    Enter Management subnet mask: 255.255.255.0

    IPv4 address of the default gateway: 10.29.180.1

    Enter HostName: vNAM-1

    Setting Web user/passwd will enable port 80. Enter[y|n]: [n] y

    Web User name: [admin]

    Web User password: [email protected]

    N1010-1(config-vsb-config)# no shut

    IP address for Web GUI administration

    Data VLAN for Non-VSM VSBs

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 50

    Access NAM VSB via Web GUI

    § Use the previously defined IP address and credentials

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 51

    Nexus 1010 Upgrade Process

    Software Switch for vSphere 4.0 and 4.1

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 52

    Upgrading the Nexus 1010 Appliance Software (1 of 2)

    § Download new ISO image from CCO §  Log into active N1010 via console § Copy new image over to bootflash § Use the install command

    install nexus1010 bootflash:nexus-1010.4.2.1.SP1.2.iso

    § Save configuration §  Log into VSM VSB § Switch over HA active VSM VSBs to active N1010

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 53

    Upgrading the Nexus 1010 Appliance Software (2 of 2)

    §  From N1010 CLI, reload standby when all active VSM

    VSBs are switched over to active ie. reload module 2 if Secondary is standby

    §  From withing VSM VSB CLI, switchover HA active VSBs to newly upgraded N1010 (originally standby from above)

    §  Reload the original active N1010 Non HA VSBs may experience disruption (NAM)

    §  To upgrade VSM NX-OS, please follow N1KV upgrade procedure

    Note: Must make Secondary VSM the active first

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 54

    For More Information

    § Nexus 1010 Virtual Services Appliance Hardware Installation Guide

    § Nexus 1010 Software Installation and Upgrade Guide

    § Nexus 1010 Deployment Guide § Nexus 1000V Configuration, Installation and

    Upgrade Guides

    § NAM VSB Configuration Guide § Nexus 1000V Webinar Series

    See the following Resources

  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential N1K 55

    Date   Business  Sessions    22-‐Mar   Nexus  1000V  Family  Overview  and  Update  

    5-‐Apr   Virtual Network Services (vPath, vWAAS, NAM) 19-‐Apr   Virtual Security Gateway Introduction

    3-‐May   Journey  to  the  Cloud  w/  N1KV:  vCloud  Director  &  Long  Distance  vMoNon  17-‐May   Secure  VDI  with  Nexus1000V  &  VSG  

    Date   Technical  Sessions    29-‐Mar   Nexus  1000V  New  Features  and  InstallaNon    Overview  12-‐Apr   Nexus1010  InstallaNon  &  Upgrade  

    26-‐Apr   Virtual  Security  Gateway  InstallaNon  and  Basic  ConfiguraNon    Overview  10-‐May   Nexus  1000V  Advanced  ConfiguraNon  

    24-‐May   Nexus  1000V  TroubleshooNng  

    Web Sites www.cisco.com/go/1000v

    www.cisco.com/go/nexus1010

    www.cisco.com/go/vsg

    www.cisco.com/go/vnmc

    www.cisco.com/go/1000vcommunity (Preso and Q&A posted here)

    Sign up at: http://tinyurl.com/1000v-webinar

  • Thank you.