Upload
cisco-public-sector
View
975
Download
4
Embed Size (px)
Citation preview
Brenden Buresh
DC TSA – CCIE #2073
March 3rd, 2016
Network Programmability & DevOps with Open NX-OS
Agenda
• Open NX-OS Introduction & Level Set
• Open NX-OS Linux Architecture & Capabilities
• Open NX-OS DevOps Tool Integration
• Open NX-OS Programmability Options
Architectural Choice Across All Market SegmentsSDN with Automation and Programmability
Cisco ACI Programmable NetworkProgrammable Fabric
DB DB
Web Web App Web App
NEWACI APIC Support for Nexus 7K / ASR 9K
CY‘Q2 Software Upgrade
Nexus 3000 Series: Tomahawk T2+ Portfolio
Nexus 9000 Series: Cisco Cloud Scale Technology Portfolio
NEWNexus Fabric Manager for network-centric operational model and fabric automation
Shipping now
NEWNX-OS Enhancements: DevOps Automation, Segment Routing, Unified Fabric, ISSU
Shipping now
NEW
NEW
POAP
BootStrap and Provisioning
PXE
NX-API
CLI
Programmability Tools
Package and Application Management
Native Agent
SDK
Extensibility Server Management Tools
Standard Open Interfaces
Ease of
OperationsModular Open 3rd Party Apps Programmable
Ready for
DevOps
Cisco NX-OS – Programmable – Extensible – Open
NX-API
REST
What Problem Are We Trying To Solve?
“I can spin up servers in minutes with my Configuration Management
Tool workflows, why does it take orders of magnitude more to spin
up and affect change on my Network Elements?”
IT Organizations adopting DevOps processes and tools deploy 30x
more frequently with 200x shorter lead times; they have 60x fewer
failures and recover 168x faster.
Services
CMT
NetworkApplications
CMT
Compute
CMTApplication
Requirements
Configuration Management
Tool (CM Tools)/ Open API’s
Data Center Automation and IT CollaborationToday: Serialized Configuration and Management
SUCCESSFUL
DEPLOYMENT
Slow Manual
Error Prone – Bottle Neck!
Agenda
• Open NX-OS Introduction & Level Set
• Open NX-OS Linux Architecture & Capabilities
• Open NX-OS DevOps Tool Integration
• Open NX-OS Programmability Options
Off the shelf Applications without modifications
Leverage ability to install third party packages in Secure Guestshell or natively in NX-OS kernel
• Install all third party applications (Puppet/Chef, Splunk/Nagios/Ganglia) as RPMs
Daemon managed via standard Linux interfaces
Built-in support for YUM package manager
Patching and upgrade using standardrpm/yum workflows
• NX-OS processes(BGP) can be upgraded/patched via “yum update”
Open NX-OS Linux Based Architecture
C app with
standard Linux
constructs
Open Embedded
64 bit Build
Environment
RPM
Upload
Linux Daemon
Linux Kernel
Raw Socket NetdevsLibpcap
init.d
Monitoring
server
ASIC
Target Switch
Package as RPM
Build Server
Cisco/Local
Repository
RPM Local
Repository
Open NX-OS Linux Interfaces
• Leverage Linux command toolkit for monitoring configuration and troubleshooting
• # tcpdump –i Eth1-1
• Use ethtool to display detailed interface statistics:
• # ethtool –S Eth2-1
• Use ifconfig to change mtu for an interface to jumbo MTU:
• # ifconfig Eth2-1 mtu 9000
• Use ip route to add a static route for a given interface:
• # ip route add 203.0.113.0/24 via 198.51.100.2 dev Eth2-1
• Leverage bash for NX-OS scripting automation
• # vsh –c “show interface brief | json” | grep up | awk/sed
https://opennxos.cisco.com
Built on Flexible and Modular LinuxReduce OPEX and Enable Rapid Application Deployment using DevOps Model
Shipped
Q3CY15
OPEN
NXOS
KEY BENEFITS
Reduced maintenance windows, higher availability
enabled by non-disruptive RPM-based live patching and
process restart
Choice of DevOps automation and monitoring tools,
enabling rapid application deployment and enhanced
visibility
Integrate natively and securely using common DevOps
configuration management tools – Chef/Puppet/Ansible
Enable greater network visibility using industry standard
analytics tools – Splunk/Ganglia/Nagios
Flexibility to integrate off-the-shelf and custom
applications using the Linux SDK
Kernel (cgroup, LSM)
NX-OS root file system
Native Linux
Processes
Native Linux
ProcessesBash Bash
Native Linux
Processes
Native Linux
Processes
Native Linux
Processes
Guest root file systemPkg-1.rpm Pkg-2.rpm
Pkg-2.rpm Pkg-3.rpm
Ns=globalNs=global Ns=guestshell Ns=guestshell Ns=guestshellNs=global Ns=guestshell
Native Shell, RPM +
Containers
• Secure common distribution CentOS7 environment in which customer may install their own custom
applications
• Use “guestshell resize” command to restrict CPU/memory/rootfs resources available to Guest
Shell
Open NX-OS: Third Party Application IntegrationSecure Guest Shell
Pkg-4.rpm
• Open NX-OS Introduction & Level Set
• Open NX-OS Linux Architecture & Capabilities
• Open NX-OS DevOps Tool Integration
• Open NX-OS Programmability Options
Agenda
Automating Device Operational Lifecycle
Day 0
Install
Day 1
Configure & Operate
Day 2
Optimize
Day N
Upgrade
GOAL:
Get a device/s into an
operational state?
CHALLENGE:
“I can bring up a server in
5 minutes, but a switch takes
2 days…”
GOAL:
Get the network into an
operational state?
CHALLENGE: Automation of configuration
for servers and applications
is relatively easy how can my
network be as easy?
GOAL:
Continuously upgrade
features within my network,
incrementally and safely?
CHALLENGE:
I can dynamically patch Linux
with automated tools; why
can’t I do the same with my
network devices?
GOAL:
Add dynamic services, optimize
behavior and trouble shooting?
(Includes information from
applications and the network
correlated).
CHALLENGE:
My compute and application
platforms are open and
extensible why is my network
not?
Ignite &
POAP/PXE
Ansible,
Puppet and Chef
NX-API REST
Ansible
Puppet and Chef
and
Guestshell
Modular NxOS
Patachablity,
ISSU
Puppet/Chef/Ansible
NX-API REST ensure
model compliance
Guestshell,
Splunk/Nagios
https://opennxos.cisco.com
Enable Day Zero Provisioning with Open Source Tools Simplify Operations, Eliminate Provisioning Errors, Reduce Costs with
Shipped
Q3CY15
OPEN
NXOS
PXE/iPXE
Automate day zero provisioning with open source,
standards-based tools
Provides GUI for topology and configuration
design packaged as an OVA, support for KVM or
VMware
Acts as an image and configuration template store
for POAP
Use python script extensions for third party
application installation and post boot
customizations
Operational Choice: Supported across Nexus 3K
& 9K, bootstrap NX-OS using existing compute
PXE/iPXE servers for switching infrastructure
• All CM tools enforce model compliance and eliminate
configuration drift
• All CM tools provide audit logging of change
• All CM tools support concept of no-op runs
Configuration Managements ToolsAgent vs Agent-less Architecture
• Agent based CM are “pull based”
• Agent on managed device connects with master for config information periodically
• Changes made on master are pulled down and executed
• Operations are Idempotent
• Puppet and Chef are agent based
• Agent-less CM are “push based”
• CM scripts are run on the master
• Scripts connect to the managed device and execute the tasks
• No timer, control lies with the master
• Operations are Idempotent
• Ansible is agent-less
Puppet/Chef Master Server
Native Linux Service
/etc/init.d/puppet.d & chef.d
NX-OS
Cisco Puppet/Chef Agent
NX-APICisco Puppet/Chef
Module(Incl Utility
GEMs)
Linux Software
Repository
Server
Yum/RPM install
puppet/chef.rpm
• Support for Puppet, Chef and Ansible
• Cisco Puppet Agent RPM/software package posted
to Puppet forge and Open Sourced to Github
• Install Cisco Puppet Module on Puppet Master
• Yum install Puppet Agent rpm on switches
• Switch Agent periodically will poll Puppet/Chef
Master for updated catalog/cookbooks and attempt
to converge switch to desired state
CM Agent Based Tool Architecture – Chef/Puppet
Open NX-OS Puppet/ChefCisco Chef & Puppet Agent Types/Provider Support
Type/Provider Roadmap:
VXLAN EVPN – Q1CY16
Virtual Port Channel – Q2CY16
Segment Routing – Q3CY16
Chef/Puppet Agent Types/Providers
cisco_vtp
cisco_tacacs_server
cisco_tacacs_server_host
cisco_snmp_server
cisco_snmp_community
cisco_snmp_group
cisco_ospf
cisco_ospf_vrf
cisco_vlan
cisco_bgp
cisco_bgp_vrf
cisco_interface
cisco_interface_ospf
cisco_interface_vlan
• Agents RPM installed natively on switch, using agent RPM or
within isolated guestshell environment
• Supported Agent Types/Providers for Camden
• Cisco Network Element Chef/Puppet module code published on
Git and Forge/Supermarket
• Agent is extensible beyond what we support by default by
using the utility classes OR:
• Agent is also extensible by embedding CLI using
cisco_command_config resource construct
Ansible Enterprise
Automation
Simple. Agentless. Powerful.
Control. Security. Delegation.
/Uses OpenSSH & NX-
API
/No extra code to manage
/Ready for cloud-scale
/Uses YAML for playbooks
/No special coding skills
needed
/Fast learning curve
/Tasks in playbooks executed
in order
/App deployment
/Orchestration
/Configuration
management
/Eliminates Config Drift
/Role-Based Access Control
/Delegation of
credentials/keys
/Audit trail for automation
/Centralized job runs
/Job scheduling
/Automation dashboard
/Push-button job execution
/Portal mode for delegation
/REST API for integration
AnsibleOpen Source
AnsibleTower
Ansible 2.0 Release
with Tower in Q1CY16
includes complete
support for Nexus
platforms
Configuration Management
Continuous Development
/Source Control
CI Test Simulation
Environment
Continuous Integration/Build
The Platform
DevOps: Tooling Categories
Open NX-OS Virtual Nexus 9000
• Use with Beaker/KitchenCI for ongoing
application integration testing
• Test more often and catch errors early and
often prior to live deployment
• Integrated support for Vmware Fusion,
ESX 5.1/5.5 and KVM(QCOW2),
VMDK(Virtual Box)
• Available under controlled availability –
email [email protected] with CCO ids
for access
• Targeting Public Release CY16 of v9K,
with ViRL integration
• Feature Parity 7.0(3)I2(2)
v9k Test Fabric
CI Tools
• Open NX-OS Introduction & Level Set
• Open NX-OS Linux Architecture & Capabilities
• Open NX-OS Devops Tool Integration
• Open NX-OS Programmability Options
Agenda
https://opennxos.cisco.com
Customized Automation with NX-API Rest Shorten Network Deployment Times, Reduce Human Error, Build Flexible, Responsive Automation Architecture
Shipped
Q3CY15
OPEN
NXOS
KEY BENEFITS
Model Based – Provides a scalable, object model based
architecture for custom automation tool development
Secure - Access to all network objects is authenticated,
encrypted and authorized with AAA (Tacacs+, Radius)
Change Based Notifications - NX-API REST
applications can subscribe to events from network
objects without redundant polling, providing:
Application performance benefits
Application processing time reduction
NX-API contains a modeled representation of critical NX-
OS features in a tree based hierarchical model
Objects are modified and queried using HTTP REST API
calls
System
Router-IDPeersEth1/1
Eth1/2..
ARP Entries
Physical BGP
Object Store• class• dn: distinguished name(url)• statistics• Properties(xml/json)
• object prop1• object prop2
…
MIT
ARP
Publisher
Subscribe
Any Updates –BGP Object
Push Notification – BGP Peer Down!
What are We Trying to Solve with NX-API REST?Limitation with CLI Modeled Automation
Screen Scraping:
• With NX-API REST and the object model you send objects in XML/JSON not CLI’s to the switch, and receive objects back from the switch, removing the need for manipulation of strings in automation tools.
Centralized Database:
• Direct access to our centralized database(object store), resulting in automation tool performance improvements, no more need to go through CLI software layers
Sequencing:
• With NX-API REST there is less need to be aware of command sequencing when configuring something (conf t ; router bgp ; neighbor…)
• Want to remove or update something? Re-do potentially have to redo the whole CLI sequence with a “no” to the last command and re-configuration, so you need to build this intelligence into your automation.
NX-API REST - Object Model
• Contains a modeled representation of most important features on the switch
• Objects have defined parent and child relationships in a tree like structure
• Everything associated with the feature is an object, not just configuration –faults, events, statistics AND configuration
System
Physical
eth1/1, eth1/2…
BGP
BGP router ID, peers…
ARP
ARP entries
VRF
VRF instances
Referencing an Object in NX-API REST Distinguished Name
• Globally unique identifier for an object in the database
• For example:
• Adding a peer address to BGP default domain:
• DN: sys/bgp/inst/dom-default/peer-[192.168.0.2]
• Viewing a physical ethernet interface’s port capabilities:
• DN: sys/phys-[eth1/1]/phys/portcap
• Object Definition or naming rule will be posted to http://developer.cisco.com
System
BgpEntity BgpInstance BgpDomain BgpPeer
BgpLocalASN
BgpPeerAf
BgpPeerEntry
L1PhysIf
ethpmPhysIf ethpmPortCap
L1Load
L1StormControl
How do I Utilize NX-API REST?
• To configure or update something: push an new object to the switch via the HTTP POST REST API call
• To check status of something: read the relevant object using HTTP GET REST API call
• To monitor something:
• Subscribe to an object for events related to that particular object
• The switch will send you a push notification when this object changes
Open-NXOS Reference Links
Software Link
Chef Agent (Supermarket)
Chef Cookbook
http://supermarket.chef.io
https://github.com/cisco/cisco-network-chef-cookbook
NX-API REST Model https://opennxos.cisco.com/public/api/nxapi-rest/
Puppet Agent (Puppetforge)
Puppet Module
http://forge.puppetlabs.com
https://github.com/cisco/cisco-network-puppet-module
Native 3rd Party Agent Repository
(Cisco Repository)
http://developer.cisco.com/opennxos
Nexus 3/9K GiT Repository (Scripting
Examples, etc)
http://github.com/datacenter/nexus9000
Ignite Open Source Toolkit
NX Toolkit
https://github.com/datacenter/ignite
https://github.com/datacenter/nxtoolkit
SDK for developing native application
RPMs
www.yocto.org
Release Timelines – Nexus 9000 Standalone
Ash2.1 Ash2.2
Ash2.2a
Ash2.3
Bronte 1.1
Camden
Bronte1.2
Mar’14 Apr’14
Jun’14
Jun’14
Sept’14
Jan’15
Sept’15
Jul’14
Shipped
To be Shipped
Ash2.2b
Ash3.1 Dublin
Feb’16
Apr’15
N3K Train
“Dublin” Release aka 7.0(3)I3(1)
SoftwareHardware
New ToR• N9K-C9272Q – 72x40G
• N9K-C92160YC-X – 48x10G + 4x100G• Features for above two platforms
postponed to future release - ISSU, FEX,
FCOE-NPV, PVLAN, VXLAN PV, GRE for
v6ov4, PBR, ITD, SFLOW
• N9K-9372TX-E – 48x10GT + 6x40G
• N3K-C3132Q-40GX-E – 32x40G
• N3K-3232C – 32x100G
• N3K-3264P – 64x40G
New Modular • N9K-X9432C-S – 32x100G Line card
• N9K-X9464TX2 – 48x10GT + 4x40G
• N9K-C9508-FM-S - 8 slot Fabric Module
• Power Supply (-48Vdc 3KW)
Support for 2248 TP/TP-E/PQ FEX with N9332
Unified Fabric`
• FCOE NPV (vPC & FEX support in
future release)
High Availability• ISSU support for Nexus 9300, 9500,
N31xx – L2/L3 features• ISSU support for NAT, FEX, VXLAN,
Segment Routing, & Openflow
postponed to future release
Routing & Switching• OSPFv3 authentication IAW RFC 4552
• OSPFv2 Authentication - RFC 5709
• IP Unnumbered support for ISIS/OSPF/BGP
Segment Routing• Label pop/swap/strip/imposition for
LER/LSR functionality
• Node-SID / PeerAdj-SID
• BGP LU
• Multihop & multipath support
Intelligent Traffic Director• Include feature to filter and load-balance
based on src & dst ip
• Non-disruptive add/delete for a node in ITD service
• Multiple device group in the same ITD service
• IP SLA based TCP/UDP/ICMP/DNS probes
• Peer-sync for fate sharing between ITD service in same switch
• 40G port support
Cisco ACIProgrammable Network Programmable Fabric
VxLAN-BGP EVPN standard-based
Automation of provisioning underlay and overlay networks
Automation of DCI/WAN
REST APIs to integrate with orchestrators
Turnkey solution with full automation: plug-and-play
Automated L4-7 services stitching
Open APIs and toolkit for broad ecosystem integration
3rd party DevOps automation tools (Puppet, Chef, Ansible)
Object-based, model driven APIs (RESTful XML/JSON)
POAP for zero touch provisioning
Choice of Network ArchitectureFlexibility for the Way our Customers Operate
Open NX-OS VTS & 3rd Party Controllers APIC
Nexus 9000 Storage SolutionsEnable Converged Storage Architecture
Architectural
Flexibility
Operational
Efficiency
Lower Overall
TCO
Ecosystem
Solution Support
FCoE or IP Based
Solutions
Increased Asset
Utilization
Lower CapEx and
OpEx with FCoE
Traditional SAN
Management Model
Unified Fabric Switching with Nexus 9000 FCoE NPV Mode
Provides a Secure Method to Connect FCoE-capable Hosts to a FCoE-Capable FCoE Forwarder (FCF) Device
Fibre Channel Configuration and
Control Applied at the Edge Port
FCoEFC
• FCoE NPV implements FIP snooping
as an extension to the NPV function
while retaining the traffic-engineering,
vsan-management, administration and
trouble-shooting aspects of NPV
• FCoE server connectivity with both
FCoE NPV and FC NPV edge
switches provides a smoother
transition of servers from legacy FC
network to FCoE network
Benefits
FCF
N9K in NPV
VFF
NP VNP
Intelligent Traffic DirectorHighly Scalable and Flexible Solution for Hardware-Based L4 Load Balancing and Traffic Steering/Redirection
New Features
• Include feature to filter and load-balance based on src & dst ip
• Non-disruptive add/delete for a node in ITD service
• Multiple device group in the same ITD service
• IP SLA based TCP/UDP/ICMP/DNS probes
• Peer-sync for fate sharing between ITD service in same switch
• 40G port support
Embedded solution in the switching platform removes
the complexities of similar external appliances
Simplified provisioning benefits operational capabilities
Provides investment protection by integrating new
services devices with old one
Embedded on Nexus Platforms
Application/
Services
scaling
Significant
CAPEX
and OPEX
reduction
Multi-Tbps
Scale
Web-cache,
video-cache,
WAE
Multi-Tbps
firewall
cluster
L3/L4
server
load-
balancing
Nexus
9000
Efficient Networks with Segment RoutingSimple, Agile, Secure, Scalable and Programmable
Reduce
Complexity
Simplify
Operations
Scale Security
Simplified Control
Plane
Programmatic Access With
NX-API and XML CLI
Flexible, Scalable Framework
Combines ECMP
and Explicit Path
Application State Now
in Packet, Not Router
Single Forwarding Paradigm
Across DC and WAN
Centralized Model for
Adaptive Traffic Engineering
Industry’s
FIRST
DC Solution!
Segment Routing Use CasesNetwork Segmentation, SLA Delivery and Traffic Engineering
Network
Segmentation
SLA Delivery Traffic
Engineering
Isolate Traffic Provide Optimal Paths for
Differentiated TrafficSteer Traffic on Prescribed Paths
Assign Specific Classes
Industry’s 1st
DC Solution
Superior Convergence Without
Operational OverheadLeverage All Available Paths to
Maximize Bandwidth
Features in 7.0(3)13(1) – Node/Prefix SID, BGP-LU, Multihop, Multipath/ECMP, NX-API support
Workload Optimization Through Microburst Detection Better Distribution of Latency Sensitive Applications, Real-Time Insight for Capacity Planning
Traffic burst
detection
Real-time
notification
Redistribute
workloads
Detect buffer threshold violations
with micro second granularity
Set thresholds on all ports or
selected business critical ports
Redistribute your critical workloads
intelligently across ToRs
Buffer utilization visibility in
real-time
Notification when threshold is
exceeded
Use buffer utilization details for
longer term capacity planning
Driving Innovation to Deliver Choice
Operational Choice Expanded ACI Ecosystem
Next Gen Nexus 9K Portfolio with Cloud Scale Technology
Software Innovations and Automation
Lead the Transition To 1/10/25/40/50/100G
25/50/100G at Cost of 10/40GIndustry’s Only 36 Port
Wire Rate 100G in 1RU
Investment Protection
5X Endpoint Scale50% More Performance
Nexus Fabric Manager Fabric Lifecycle Management
NX-OS EnhancementsSegment Routing, FCOE,
Microburst Detection, ISSU Support
ACI APIC Support for Nexus 7K / ASR 9K
Real-time Telemetry Pervasive NetFlow at Scale
Hyper-Converged Fabric
One Generation Ahead
With ASIC Innovations 2 Year Time to Market Advantage
Data Center Switch Products for the Cloud
Applications Are Changing1
Data Center Architectures Change2
Security/Compliance Solutions Must Adjust3
Data Center Switches Evolve:
Cloud Scale Technology4
• Micro-services &
Containers
• Cloud w/ IP based
storage
• Shared Infrastructure w/
self-service
• Scale & Multi-speed
• Smart Buffer &
Queuing
• Security & Visibility
Cisco
Cloud Scale
Technology
Unmatched investment protection for the next decade
• Widest range of multi-speed ports (100M -100G)
• IP storage, FCOE/FC
Pervasive visibility at line rate across the entire network
Security with segmentation at cloud scale
Scale
• 2x MAC, 4x LPM, 6x host routes, 15x IPv6 routes
• Support for 1+ million containers per rack
Adaptive capacity and congestion control for hyper-converged fabric
• Improved application completion time by 50%
Getting ready for containers, micro-services, distributed apps and IP storage
Powered by Cisco ASIC innovation using 16nm technology
Evolved Next Gen Data Center Switches
Many
Servers
Single
Application
Fortune 500 Customer(s) Deploying LINUX Containers
Requirement
20x more endpoints
Distribution of IPC traffic across much wider
scope
Migration to IPv6
Challenge
Scaling of hosts, networks and policy associated
with distributed processes (micro-servers)
Mix of inter process and distributed storage
traffic
Containers and Cloud Based
Apps
Aggregation / Spine: Nexus 9500/ X9736C-EX
TOR/ Leaf: Nexus 9200X/ Nexus 9300EX
New York Financial Services CustomersSecurity and Application Monitoring Needs
Requirement
Understand the relationship of transactions
and network flows
Granular compliance and security monitoring
capabilities
Challenge
Costs associated with supporting full flow
collection (Full flow at the cost points of
sampled flow)
Data Export and Collection Rates
Full Flow and Telemetry
Aggregation / Spine: Nexus 9500/ X9736C-EX
TOR/ Leaf: Nexus 9200X/ Nexus 9300EX
Large Enterprise and SP Cloud Infrastructure
Requirement
Engineering Cloud
Increased scale for tenants (e.g. Openstack
projects and Neutron networks)
Support for increased tunnel and overlay scale
Gateway between DC VXLAN and Backbone
MPLS Tags
Challenge
Single Pass full VXLAN and forwarding
between VXLAN and Segment Routing
domains
NAT and PAT scale for floating IP
Multi-Tenancy
Spine: Nexus 9500/ X9736C-EX
Leaf: Nexus 9200
TOR: Nexus 9200X/ Nexus 9300EX
48p 10G & 4p 40G
VXLAN routing option
36p 40G ACI
32p 40G NX-OS
Nexus 9300
Nexus 9504 Nexus 9508 Nexus 9516
Nexus 9500
Existing Cisco Nexus 9000 Portfolio10/40G Optimized, Over 6000 Customers
N9300 & N9500 – Same Hardware for NX-OS and ACI
36p 40/100G ACI & NX-OS
Existing Chassis
Delivering on Investment Protection
Promise
36p wire rate100G
56p 40G + 8p 40/100G
72p 40G
48p 10/25G SFP & 4p 100G/ 6p 40G
48p 10/25G SFP & 6p 100G
48p 10GT & 6p 100G
Nexus 9300EX
Nexus 9200
Industry
First
Industry
First
Industry
First
Nexus 9000 Portfolio Extension1/10/25/40/50/100G
48p 10G & 6p 40G
96p 10G & 6p 40G
32p 40G
Continuous Leverage of Broadcom SiliconNexus 3000: 10 Million Ports Shipped
Nexus 3100
64p 40G Single Chip 48p 10G & 6p 100G
Shipping for 3+ months
Nexus 3100V Nexus 3200
VXLAN routing, 100G uplinks, No 25G VXLAN bridging, 25/100G
Consistent NX-OS Image Between Nexus 3000 & Nexus 9000
32p 40G 32p 100G
32p 40G
64p 40G
48p 10G & 6p 40G
48p 1G & 4p 10G
Portfolio Mapping (1/2)
Nexus 3100
N3172PNexus 9200X
N92160YC-X
Nexus 2200/2300
N2348UPQ*
N2248PQ
Nexus 5600
N5624Q
N5648Q
N5696Q
Nexus 9200**
N9236C
N92304QC
N9272Q
40/100G
10/25G & 40/100G
40/100G
10/40G
* N9200X is a fit for data/ IP storage architectures
** Nexus 9200 FEX support coming in Dublin+ release
N9200X + N9200: Upsell from N2k + N5K
leveraging
a) 1/10/25G access & 40/100G uplink
b) Flow table in access
Portfolio Mapping (2/2)
Nexus 9500 – 40G
X9400 for NX-OS
X9700 for ACI
Nexus 9500 – 40/100G
X9700-EX for NX-OS & ACI
Nexus 9300
N9372PX
N9372TX
Nexus 5600*
N5672UP
Nexus 9300EX
N93180YC-EX
N93108TC-EX
* N9300EX is a fit for data/ IP storage architectures
40/100G
10/25G & 40/100G
New Software Innovations
ACIAutomation NX-OSFor Programmable Fabric
Nexus Fabric ManagerFor Programmable Fabric Automation
DevOps Automation With Ignite and Puppet/Ansible
Segment RoutingFor More Efficient Networks
Converged Storage Architectures
Microburst DetectionIdentify Network Capacity Issues in Real-Time
ISSU Support
100G ACI Fabric Support
Allows all customers a path to speed
well into the next decade
Cisco Nexus Fabric Manager (NFM)Intelligent Fabric Automation Manager
• Builds and self-manages VXLAN-based fabric
• Fully deploy in three steps
• Zero touch provisioning
• Dynamically configure switches based on simplified user-based actions
• Automates complete fabric management lifecycle
• Automated snapshots and rollback of configurations
• Seamless fabric scaling and upgrades
• Simplifies management with point and click user interface and live actionable topologies
Fabric Management Lifecycle
Creation Expansion
Fault MgmtReporting
Connection
NFM
Programmable Fabric Automation for DevOpsOpen NX-OS Provides Flexibility and Choice
Day Zero Automation: Ongoing Change Automation:
Enforce Consistency
& Eliminate Error
Audit Logging for
Compliance
Lower Opex &
Capex CostsIncreased
Datacenter Agility
Ansible 2.0
Nexus
Plug-in
Industry’s 1st VXLAN-EVPN Provider Types
Best Density and Cost
Points for Multi-Speed
• 1/10/25/50G server connectivity
• 40/100G switch aggregation
• 1st 36p 100G in single rack unit
1st 100G EVPN
Programmable Fabric1st Data Center
Segment Routing
Advanced Cloud Scale Technology
Delivers for Cloud infrastructure:
• Leading route scale
• Line-rate visibility
• Right-sized buffers
Only Common Automation
Model Across Entire Portfolio:
• Programmable Networks
• Programmable Fabric
• ACI
Industry Leading Innovations