55
Brenden Buresh DC TSA CCIE #2073 [email protected] March 3 rd , 2016 Network Programmability & DevOps with Open NX-OS

Us navy network programmability 030316

Embed Size (px)

Citation preview

Brenden Buresh

DC TSA – CCIE #2073

[email protected]

March 3rd, 2016

Network Programmability & DevOps with Open NX-OS

Agenda

• Open NX-OS Introduction & Level Set

• Open NX-OS Linux Architecture & Capabilities

• Open NX-OS DevOps Tool Integration

• Open NX-OS Programmability Options

Architectural Choice Across All Market SegmentsSDN with Automation and Programmability

Cisco ACI Programmable NetworkProgrammable Fabric

DB DB

Web Web App Web App

NEWACI APIC Support for Nexus 7K / ASR 9K

CY‘Q2 Software Upgrade

Nexus 3000 Series: Tomahawk T2+ Portfolio

Nexus 9000 Series: Cisco Cloud Scale Technology Portfolio

NEWNexus Fabric Manager for network-centric operational model and fabric automation

Shipping now

NEWNX-OS Enhancements: DevOps Automation, Segment Routing, Unified Fabric, ISSU

Shipping now

NEW

NEW

POAP

BootStrap and Provisioning

PXE

NX-API

CLI

Programmability Tools

Package and Application Management

Native Agent

SDK

Extensibility Server Management Tools

Standard Open Interfaces

Ease of

OperationsModular Open 3rd Party Apps Programmable

Ready for

DevOps

Cisco NX-OS – Programmable – Extensible – Open

NX-API

REST

What Problem Are We Trying To Solve?

“I can spin up servers in minutes with my Configuration Management

Tool workflows, why does it take orders of magnitude more to spin

up and affect change on my Network Elements?”

IT Organizations adopting DevOps processes and tools deploy 30x

more frequently with 200x shorter lead times; they have 60x fewer

failures and recover 168x faster.

Services

CMT

NetworkApplications

CMT

Compute

CMTApplication

Requirements

Configuration Management

Tool (CM Tools)/ Open API’s

Data Center Automation and IT CollaborationToday: Serialized Configuration and Management

SUCCESSFUL

DEPLOYMENT

Slow Manual

Error Prone – Bottle Neck!

Cisco Open NX-OS

Agenda

• Open NX-OS Introduction & Level Set

• Open NX-OS Linux Architecture & Capabilities

• Open NX-OS DevOps Tool Integration

• Open NX-OS Programmability Options

Off the shelf Applications without modifications

Leverage ability to install third party packages in Secure Guestshell or natively in NX-OS kernel

• Install all third party applications (Puppet/Chef, Splunk/Nagios/Ganglia) as RPMs

Daemon managed via standard Linux interfaces

Built-in support for YUM package manager

Patching and upgrade using standardrpm/yum workflows

• NX-OS processes(BGP) can be upgraded/patched via “yum update”

Open NX-OS Linux Based Architecture

C app with

standard Linux

constructs

Open Embedded

64 bit Build

Environment

RPM

Upload

Linux Daemon

Linux Kernel

Raw Socket NetdevsLibpcap

init.d

Monitoring

server

ASIC

Target Switch

Package as RPM

Build Server

Cisco/Local

Repository

RPM Local

Repository

Open NX-OS Linux Interfaces

• Leverage Linux command toolkit for monitoring configuration and troubleshooting

• # tcpdump –i Eth1-1

• Use ethtool to display detailed interface statistics:

• # ethtool –S Eth2-1

• Use ifconfig to change mtu for an interface to jumbo MTU:

• # ifconfig Eth2-1 mtu 9000

• Use ip route to add a static route for a given interface:

• # ip route add 203.0.113.0/24 via 198.51.100.2 dev Eth2-1

• Leverage bash for NX-OS scripting automation

• # vsh –c “show interface brief | json” | grep up | awk/sed

https://opennxos.cisco.com

Built on Flexible and Modular LinuxReduce OPEX and Enable Rapid Application Deployment using DevOps Model

Shipped

Q3CY15

OPEN

NXOS

KEY BENEFITS

Reduced maintenance windows, higher availability

enabled by non-disruptive RPM-based live patching and

process restart

Choice of DevOps automation and monitoring tools,

enabling rapid application deployment and enhanced

visibility

Integrate natively and securely using common DevOps

configuration management tools – Chef/Puppet/Ansible

Enable greater network visibility using industry standard

analytics tools – Splunk/Ganglia/Nagios

Flexibility to integrate off-the-shelf and custom

applications using the Linux SDK

Kernel (cgroup, LSM)

NX-OS root file system

Native Linux

Processes

Native Linux

ProcessesBash Bash

Native Linux

Processes

Native Linux

Processes

Native Linux

Processes

Guest root file systemPkg-1.rpm Pkg-2.rpm

Pkg-2.rpm Pkg-3.rpm

Ns=globalNs=global Ns=guestshell Ns=guestshell Ns=guestshellNs=global Ns=guestshell

Native Shell, RPM +

Containers

• Secure common distribution CentOS7 environment in which customer may install their own custom

applications

• Use “guestshell resize” command to restrict CPU/memory/rootfs resources available to Guest

Shell

Open NX-OS: Third Party Application IntegrationSecure Guest Shell

Pkg-4.rpm

• Open NX-OS Introduction & Level Set

• Open NX-OS Linux Architecture & Capabilities

• Open NX-OS DevOps Tool Integration

• Open NX-OS Programmability Options

Agenda

Automating Device Operational Lifecycle

Day 0

Install

Day 1

Configure & Operate

Day 2

Optimize

Day N

Upgrade

GOAL:

Get a device/s into an

operational state?

CHALLENGE:

“I can bring up a server in

5 minutes, but a switch takes

2 days…”

GOAL:

Get the network into an

operational state?

CHALLENGE: Automation of configuration

for servers and applications

is relatively easy how can my

network be as easy?

GOAL:

Continuously upgrade

features within my network,

incrementally and safely?

CHALLENGE:

I can dynamically patch Linux

with automated tools; why

can’t I do the same with my

network devices?

GOAL:

Add dynamic services, optimize

behavior and trouble shooting?

(Includes information from

applications and the network

correlated).

CHALLENGE:

My compute and application

platforms are open and

extensible why is my network

not?

Ignite &

POAP/PXE

Ansible,

Puppet and Chef

NX-API REST

Ansible

Puppet and Chef

and

Guestshell

Modular NxOS

Patachablity,

ISSU

Puppet/Chef/Ansible

NX-API REST ensure

model compliance

Guestshell,

Splunk/Nagios

https://opennxos.cisco.com

Enable Day Zero Provisioning with Open Source Tools Simplify Operations, Eliminate Provisioning Errors, Reduce Costs with

Shipped

Q3CY15

OPEN

NXOS

PXE/iPXE

Automate day zero provisioning with open source,

standards-based tools

Provides GUI for topology and configuration

design packaged as an OVA, support for KVM or

VMware

Acts as an image and configuration template store

for POAP

Use python script extensions for third party

application installation and post boot

customizations

Operational Choice: Supported across Nexus 3K

& 9K, bootstrap NX-OS using existing compute

PXE/iPXE servers for switching infrastructure

• All CM tools enforce model compliance and eliminate

configuration drift

• All CM tools provide audit logging of change

• All CM tools support concept of no-op runs

Configuration Managements ToolsAgent vs Agent-less Architecture

• Agent based CM are “pull based”

• Agent on managed device connects with master for config information periodically

• Changes made on master are pulled down and executed

• Operations are Idempotent

• Puppet and Chef are agent based

• Agent-less CM are “push based”

• CM scripts are run on the master

• Scripts connect to the managed device and execute the tasks

• No timer, control lies with the master

• Operations are Idempotent

• Ansible is agent-less

Puppet/Chef Master Server

Native Linux Service

/etc/init.d/puppet.d & chef.d

NX-OS

Cisco Puppet/Chef Agent

NX-APICisco Puppet/Chef

Module(Incl Utility

GEMs)

Linux Software

Repository

Server

Yum/RPM install

puppet/chef.rpm

• Support for Puppet, Chef and Ansible

• Cisco Puppet Agent RPM/software package posted

to Puppet forge and Open Sourced to Github

• Install Cisco Puppet Module on Puppet Master

• Yum install Puppet Agent rpm on switches

• Switch Agent periodically will poll Puppet/Chef

Master for updated catalog/cookbooks and attempt

to converge switch to desired state

CM Agent Based Tool Architecture – Chef/Puppet

Open NX-OS Puppet/ChefCisco Chef & Puppet Agent Types/Provider Support

Type/Provider Roadmap:

VXLAN EVPN – Q1CY16

Virtual Port Channel – Q2CY16

Segment Routing – Q3CY16

Chef/Puppet Agent Types/Providers

cisco_vtp

cisco_tacacs_server

cisco_tacacs_server_host

cisco_snmp_server

cisco_snmp_community

cisco_snmp_group

cisco_ospf

cisco_ospf_vrf

cisco_vlan

cisco_bgp

cisco_bgp_vrf

cisco_interface

cisco_interface_ospf

cisco_interface_vlan

• Agents RPM installed natively on switch, using agent RPM or

within isolated guestshell environment

• Supported Agent Types/Providers for Camden

• Cisco Network Element Chef/Puppet module code published on

Git and Forge/Supermarket

• Agent is extensible beyond what we support by default by

using the utility classes OR:

• Agent is also extensible by embedding CLI using

cisco_command_config resource construct

Ansible Enterprise

Automation

Simple. Agentless. Powerful.

Control. Security. Delegation.

/Uses OpenSSH & NX-

API

/No extra code to manage

/Ready for cloud-scale

/Uses YAML for playbooks

/No special coding skills

needed

/Fast learning curve

/Tasks in playbooks executed

in order

/App deployment

/Orchestration

/Configuration

management

/Eliminates Config Drift

/Role-Based Access Control

/Delegation of

credentials/keys

/Audit trail for automation

/Centralized job runs

/Job scheduling

/Automation dashboard

/Push-button job execution

/Portal mode for delegation

/REST API for integration

AnsibleOpen Source

AnsibleTower

Ansible 2.0 Release

with Tower in Q1CY16

includes complete

support for Nexus

platforms

Configuration Management

Continuous Development

/Source Control

CI Test Simulation

Environment

Continuous Integration/Build

The Platform

DevOps: Tooling Categories

Open NX-OS Virtual Nexus 9000

• Use with Beaker/KitchenCI for ongoing

application integration testing

• Test more often and catch errors early and

often prior to live deployment

• Integrated support for Vmware Fusion,

ESX 5.1/5.5 and KVM(QCOW2),

VMDK(Virtual Box)

• Available under controlled availability –

email [email protected] with CCO ids

for access

• Targeting Public Release CY16 of v9K,

with ViRL integration

• Feature Parity 7.0(3)I2(2)

v9k Test Fabric

CI Tools

• Open NX-OS Introduction & Level Set

• Open NX-OS Linux Architecture & Capabilities

• Open NX-OS Devops Tool Integration

• Open NX-OS Programmability Options

Agenda

https://opennxos.cisco.com

Customized Automation with NX-API Rest Shorten Network Deployment Times, Reduce Human Error, Build Flexible, Responsive Automation Architecture

Shipped

Q3CY15

OPEN

NXOS

KEY BENEFITS

Model Based – Provides a scalable, object model based

architecture for custom automation tool development

Secure - Access to all network objects is authenticated,

encrypted and authorized with AAA (Tacacs+, Radius)

Change Based Notifications - NX-API REST

applications can subscribe to events from network

objects without redundant polling, providing:

Application performance benefits

Application processing time reduction

NX-API contains a modeled representation of critical NX-

OS features in a tree based hierarchical model

Objects are modified and queried using HTTP REST API

calls

System

Router-IDPeersEth1/1

Eth1/2..

ARP Entries

Physical BGP

Object Store• class• dn: distinguished name(url)• statistics• Properties(xml/json)

• object prop1• object prop2

MIT

ARP

Publisher

Subscribe

Any Updates –BGP Object

Push Notification – BGP Peer Down!

What are We Trying to Solve with NX-API REST?Limitation with CLI Modeled Automation

Screen Scraping:

• With NX-API REST and the object model you send objects in XML/JSON not CLI’s to the switch, and receive objects back from the switch, removing the need for manipulation of strings in automation tools.

Centralized Database:

• Direct access to our centralized database(object store), resulting in automation tool performance improvements, no more need to go through CLI software layers

Sequencing:

• With NX-API REST there is less need to be aware of command sequencing when configuring something (conf t ; router bgp ; neighbor…)

• Want to remove or update something? Re-do potentially have to redo the whole CLI sequence with a “no” to the last command and re-configuration, so you need to build this intelligence into your automation.

NX-API REST - Object Model

• Contains a modeled representation of most important features on the switch

• Objects have defined parent and child relationships in a tree like structure

• Everything associated with the feature is an object, not just configuration –faults, events, statistics AND configuration

System

Physical

eth1/1, eth1/2…

BGP

BGP router ID, peers…

ARP

ARP entries

VRF

VRF instances

Referencing an Object in NX-API REST Distinguished Name

• Globally unique identifier for an object in the database

• For example:

• Adding a peer address to BGP default domain:

• DN: sys/bgp/inst/dom-default/peer-[192.168.0.2]

• Viewing a physical ethernet interface’s port capabilities:

• DN: sys/phys-[eth1/1]/phys/portcap

• Object Definition or naming rule will be posted to http://developer.cisco.com

System

BgpEntity BgpInstance BgpDomain BgpPeer

BgpLocalASN

BgpPeerAf

BgpPeerEntry

L1PhysIf

ethpmPhysIf ethpmPortCap

L1Load

L1StormControl

How do I Utilize NX-API REST?

• To configure or update something: push an new object to the switch via the HTTP POST REST API call

• To check status of something: read the relevant object using HTTP GET REST API call

• To monitor something:

• Subscribe to an object for events related to that particular object

• The switch will send you a push notification when this object changes

Open-NXOS Reference Links

Software Link

Chef Agent (Supermarket)

Chef Cookbook

http://supermarket.chef.io

https://github.com/cisco/cisco-network-chef-cookbook

NX-API REST Model https://opennxos.cisco.com/public/api/nxapi-rest/

Puppet Agent (Puppetforge)

Puppet Module

http://forge.puppetlabs.com

https://github.com/cisco/cisco-network-puppet-module

Native 3rd Party Agent Repository

(Cisco Repository)

http://developer.cisco.com/opennxos

Nexus 3/9K GiT Repository (Scripting

Examples, etc)

http://github.com/datacenter/nexus9000

Ignite Open Source Toolkit

NX Toolkit

https://github.com/datacenter/ignite

https://github.com/datacenter/nxtoolkit

SDK for developing native application

RPMs

www.yocto.org

SW Update – NX-OS Dublin

Release Timelines – Nexus 9000 Standalone

Ash2.1 Ash2.2

Ash2.2a

Ash2.3

Bronte 1.1

Camden

Bronte1.2

Mar’14 Apr’14

Jun’14

Jun’14

Sept’14

Jan’15

Sept’15

Jul’14

Shipped

To be Shipped

Ash2.2b

Ash3.1 Dublin

Feb’16

Apr’15

N3K Train

“Dublin” Release aka 7.0(3)I3(1)

SoftwareHardware

New ToR• N9K-C9272Q – 72x40G

• N9K-C92160YC-X – 48x10G + 4x100G• Features for above two platforms

postponed to future release - ISSU, FEX,

FCOE-NPV, PVLAN, VXLAN PV, GRE for

v6ov4, PBR, ITD, SFLOW

• N9K-9372TX-E – 48x10GT + 6x40G

• N3K-C3132Q-40GX-E – 32x40G

• N3K-3232C – 32x100G

• N3K-3264P – 64x40G

New Modular • N9K-X9432C-S – 32x100G Line card

• N9K-X9464TX2 – 48x10GT + 4x40G

• N9K-C9508-FM-S - 8 slot Fabric Module

• Power Supply (-48Vdc 3KW)

Support for 2248 TP/TP-E/PQ FEX with N9332

Unified Fabric`

• FCOE NPV (vPC & FEX support in

future release)

High Availability• ISSU support for Nexus 9300, 9500,

N31xx – L2/L3 features• ISSU support for NAT, FEX, VXLAN,

Segment Routing, & Openflow

postponed to future release

Routing & Switching• OSPFv3 authentication IAW RFC 4552

• OSPFv2 Authentication - RFC 5709

• IP Unnumbered support for ISIS/OSPF/BGP

Segment Routing• Label pop/swap/strip/imposition for

LER/LSR functionality

• Node-SID / PeerAdj-SID

• BGP LU

• Multihop & multipath support

Intelligent Traffic Director• Include feature to filter and load-balance

based on src & dst ip

• Non-disruptive add/delete for a node in ITD service

• Multiple device group in the same ITD service

• IP SLA based TCP/UDP/ICMP/DNS probes

• Peer-sync for fate sharing between ITD service in same switch

• 40G port support

Cisco ACIProgrammable Network Programmable Fabric

VxLAN-BGP EVPN standard-based

Automation of provisioning underlay and overlay networks

Automation of DCI/WAN

REST APIs to integrate with orchestrators

Turnkey solution with full automation: plug-and-play

Automated L4-7 services stitching

Open APIs and toolkit for broad ecosystem integration

3rd party DevOps automation tools (Puppet, Chef, Ansible)

Object-based, model driven APIs (RESTful XML/JSON)

POAP for zero touch provisioning

Choice of Network ArchitectureFlexibility for the Way our Customers Operate

Open NX-OS VTS & 3rd Party Controllers APIC

Nexus 9000 Storage SolutionsEnable Converged Storage Architecture

Architectural

Flexibility

Operational

Efficiency

Lower Overall

TCO

Ecosystem

Solution Support

FCoE or IP Based

Solutions

Increased Asset

Utilization

Lower CapEx and

OpEx with FCoE

Traditional SAN

Management Model

Unified Fabric Switching with Nexus 9000 FCoE NPV Mode

Provides a Secure Method to Connect FCoE-capable Hosts to a FCoE-Capable FCoE Forwarder (FCF) Device

Fibre Channel Configuration and

Control Applied at the Edge Port

FCoEFC

• FCoE NPV implements FIP snooping

as an extension to the NPV function

while retaining the traffic-engineering,

vsan-management, administration and

trouble-shooting aspects of NPV

• FCoE server connectivity with both

FCoE NPV and FC NPV edge

switches provides a smoother

transition of servers from legacy FC

network to FCoE network

Benefits

FCF

N9K in NPV

VFF

NP VNP

Intelligent Traffic DirectorHighly Scalable and Flexible Solution for Hardware-Based L4 Load Balancing and Traffic Steering/Redirection

New Features

• Include feature to filter and load-balance based on src & dst ip

• Non-disruptive add/delete for a node in ITD service

• Multiple device group in the same ITD service

• IP SLA based TCP/UDP/ICMP/DNS probes

• Peer-sync for fate sharing between ITD service in same switch

• 40G port support

Embedded solution in the switching platform removes

the complexities of similar external appliances

Simplified provisioning benefits operational capabilities

Provides investment protection by integrating new

services devices with old one

Embedded on Nexus Platforms

Application/

Services

scaling

Significant

CAPEX

and OPEX

reduction

Multi-Tbps

Scale

Web-cache,

video-cache,

WAE

Multi-Tbps

firewall

cluster

L3/L4

server

load-

balancing

Nexus

9000

Efficient Networks with Segment RoutingSimple, Agile, Secure, Scalable and Programmable

Reduce

Complexity

Simplify

Operations

Scale Security

Simplified Control

Plane

Programmatic Access With

NX-API and XML CLI

Flexible, Scalable Framework

Combines ECMP

and Explicit Path

Application State Now

in Packet, Not Router

Single Forwarding Paradigm

Across DC and WAN

Centralized Model for

Adaptive Traffic Engineering

Industry’s

FIRST

DC Solution!

Segment Routing Use CasesNetwork Segmentation, SLA Delivery and Traffic Engineering

Network

Segmentation

SLA Delivery Traffic

Engineering

Isolate Traffic Provide Optimal Paths for

Differentiated TrafficSteer Traffic on Prescribed Paths

Assign Specific Classes

Industry’s 1st

DC Solution

Superior Convergence Without

Operational OverheadLeverage All Available Paths to

Maximize Bandwidth

Features in 7.0(3)13(1) – Node/Prefix SID, BGP-LU, Multihop, Multipath/ECMP, NX-API support

Workload Optimization Through Microburst Detection Better Distribution of Latency Sensitive Applications, Real-Time Insight for Capacity Planning

Traffic burst

detection

Real-time

notification

Redistribute

workloads

Detect buffer threshold violations

with micro second granularity

Set thresholds on all ports or

selected business critical ports

Redistribute your critical workloads

intelligently across ToRs

Buffer utilization visibility in

real-time

Notification when threshold is

exceeded

Use buffer utilization details for

longer term capacity planning

HW Update – Gen2 NX-9K/3K

Driving Innovation to Deliver Choice

Operational Choice Expanded ACI Ecosystem

Next Gen Nexus 9K Portfolio with Cloud Scale Technology

Software Innovations and Automation

Lead the Transition To 1/10/25/40/50/100G

25/50/100G at Cost of 10/40GIndustry’s Only 36 Port

Wire Rate 100G in 1RU

Investment Protection

5X Endpoint Scale50% More Performance

Nexus Fabric Manager Fabric Lifecycle Management

NX-OS EnhancementsSegment Routing, FCOE,

Microburst Detection, ISSU Support

ACI APIC Support for Nexus 7K / ASR 9K

Real-time Telemetry Pervasive NetFlow at Scale

Hyper-Converged Fabric

One Generation Ahead

With ASIC Innovations 2 Year Time to Market Advantage

Data Center Switch Products for the Cloud

Applications Are Changing1

Data Center Architectures Change2

Security/Compliance Solutions Must Adjust3

Data Center Switches Evolve:

Cloud Scale Technology4

• Micro-services &

Containers

• Cloud w/ IP based

storage

• Shared Infrastructure w/

self-service

• Scale & Multi-speed

• Smart Buffer &

Queuing

• Security & Visibility

Cisco

Cloud Scale

Technology

Unmatched investment protection for the next decade

• Widest range of multi-speed ports (100M -100G)

• IP storage, FCOE/FC

Pervasive visibility at line rate across the entire network

Security with segmentation at cloud scale

Scale

• 2x MAC, 4x LPM, 6x host routes, 15x IPv6 routes

• Support for 1+ million containers per rack

Adaptive capacity and congestion control for hyper-converged fabric

• Improved application completion time by 50%

Getting ready for containers, micro-services, distributed apps and IP storage

Powered by Cisco ASIC innovation using 16nm technology

Evolved Next Gen Data Center Switches

Many

Servers

Single

Application

Fortune 500 Customer(s) Deploying LINUX Containers

Requirement

20x more endpoints

Distribution of IPC traffic across much wider

scope

Migration to IPv6

Challenge

Scaling of hosts, networks and policy associated

with distributed processes (micro-servers)

Mix of inter process and distributed storage

traffic

Containers and Cloud Based

Apps

Aggregation / Spine: Nexus 9500/ X9736C-EX

TOR/ Leaf: Nexus 9200X/ Nexus 9300EX

New York Financial Services CustomersSecurity and Application Monitoring Needs

Requirement

Understand the relationship of transactions

and network flows

Granular compliance and security monitoring

capabilities

Challenge

Costs associated with supporting full flow

collection (Full flow at the cost points of

sampled flow)

Data Export and Collection Rates

Full Flow and Telemetry

Aggregation / Spine: Nexus 9500/ X9736C-EX

TOR/ Leaf: Nexus 9200X/ Nexus 9300EX

Large Enterprise and SP Cloud Infrastructure

Requirement

Engineering Cloud

Increased scale for tenants (e.g. Openstack

projects and Neutron networks)

Support for increased tunnel and overlay scale

Gateway between DC VXLAN and Backbone

MPLS Tags

Challenge

Single Pass full VXLAN and forwarding

between VXLAN and Segment Routing

domains

NAT and PAT scale for floating IP

Multi-Tenancy

Spine: Nexus 9500/ X9736C-EX

Leaf: Nexus 9200

TOR: Nexus 9200X/ Nexus 9300EX

48p 10G & 4p 40G

VXLAN routing option

36p 40G ACI

32p 40G NX-OS

Nexus 9300

Nexus 9504 Nexus 9508 Nexus 9516

Nexus 9500

Existing Cisco Nexus 9000 Portfolio10/40G Optimized, Over 6000 Customers

N9300 & N9500 – Same Hardware for NX-OS and ACI

36p 40/100G ACI & NX-OS

Existing Chassis

Delivering on Investment Protection

Promise

36p wire rate100G

56p 40G + 8p 40/100G

72p 40G

48p 10/25G SFP & 4p 100G/ 6p 40G

48p 10/25G SFP & 6p 100G

48p 10GT & 6p 100G

Nexus 9300EX

Nexus 9200

Industry

First

Industry

First

Industry

First

Nexus 9000 Portfolio Extension1/10/25/40/50/100G

48p 10G & 6p 40G

96p 10G & 6p 40G

32p 40G

Continuous Leverage of Broadcom SiliconNexus 3000: 10 Million Ports Shipped

Nexus 3100

64p 40G Single Chip 48p 10G & 6p 100G

Shipping for 3+ months

Nexus 3100V Nexus 3200

VXLAN routing, 100G uplinks, No 25G VXLAN bridging, 25/100G

Consistent NX-OS Image Between Nexus 3000 & Nexus 9000

32p 40G 32p 100G

32p 40G

64p 40G

48p 10G & 6p 40G

48p 1G & 4p 10G

Portfolio Mapping (1/2)

Nexus 3100

N3172PNexus 9200X

N92160YC-X

Nexus 2200/2300

N2348UPQ*

N2248PQ

Nexus 5600

N5624Q

N5648Q

N5696Q

Nexus 9200**

N9236C

N92304QC

N9272Q

40/100G

10/25G & 40/100G

40/100G

10/40G

* N9200X is a fit for data/ IP storage architectures

** Nexus 9200 FEX support coming in Dublin+ release

N9200X + N9200: Upsell from N2k + N5K

leveraging

a) 1/10/25G access & 40/100G uplink

b) Flow table in access

Portfolio Mapping (2/2)

Nexus 9500 – 40G

X9400 for NX-OS

X9700 for ACI

Nexus 9500 – 40/100G

X9700-EX for NX-OS & ACI

Nexus 9300

N9372PX

N9372TX

Nexus 5600*

N5672UP

Nexus 9300EX

N93180YC-EX

N93108TC-EX

* N9300EX is a fit for data/ IP storage architectures

40/100G

10/25G & 40/100G

New Software Innovations

ACIAutomation NX-OSFor Programmable Fabric

Nexus Fabric ManagerFor Programmable Fabric Automation

DevOps Automation With Ignite and Puppet/Ansible

Segment RoutingFor More Efficient Networks

Converged Storage Architectures

Microburst DetectionIdentify Network Capacity Issues in Real-Time

ISSU Support

100G ACI Fabric Support

Allows all customers a path to speed

well into the next decade

Cisco Nexus Fabric Manager (NFM)Intelligent Fabric Automation Manager

• Builds and self-manages VXLAN-based fabric

• Fully deploy in three steps

• Zero touch provisioning

• Dynamically configure switches based on simplified user-based actions

• Automates complete fabric management lifecycle

• Automated snapshots and rollback of configurations

• Seamless fabric scaling and upgrades

• Simplifies management with point and click user interface and live actionable topologies

Fabric Management Lifecycle

Creation Expansion

Fault MgmtReporting

Connection

NFM

Programmable Fabric Automation for DevOpsOpen NX-OS Provides Flexibility and Choice

Day Zero Automation: Ongoing Change Automation:

Enforce Consistency

& Eliminate Error

Audit Logging for

Compliance

Lower Opex &

Capex CostsIncreased

Datacenter Agility

Ansible 2.0

Nexus

Plug-in

Industry’s 1st VXLAN-EVPN Provider Types

Best Density and Cost

Points for Multi-Speed

• 1/10/25/50G server connectivity

• 40/100G switch aggregation

• 1st 36p 100G in single rack unit

1st 100G EVPN

Programmable Fabric1st Data Center

Segment Routing

Advanced Cloud Scale Technology

Delivers for Cloud infrastructure:

• Leading route scale

• Line-rate visibility

• Right-sized buffers

Only Common Automation

Model Across Entire Portfolio:

• Programmable Networks

• Programmable Fabric

• ACI

Industry Leading Innovations