Professional Documents
Culture Documents
Preso - Web Series - Technical Track - Session2 - Nexus - 1010 PDF
Preso - Web Series - Technical Track - Session2 - Nexus - 1010 PDF
a
vSph re Switch
ere an
fo
d vClo r VMware
ud Dir
ector
Business Sessions
Date
Technical Sessions
22-Mar
29-Mar
5-Apr
12-Apr
19-Apr
26-Apr
3-May
10-May
17-May
24-May
N1K
Cisco Confidential
N1K
Cisco Confidential
N1K
Cisco Confidential
N1K
Cisco Confidential
N1K
Cisco Confidential
N1K
Cisco Confidential
Cisco Confidential
Modular Switch
Supervisor-1
Back Plane
Supervisor-2
Linecard-1
Linecard-2
Linecard-N
Server 1
N1K
Server 2
Server 3
2011 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
Modular Switch
Supervisor-1
Back Plane
Supervisor-2
Linecard-1
Linecard-2
Linecard-N
ESX
N1K
ESX
Cisco Confidential
ESX
10
VSM2
Modular Switch
Supervisor-1
Back Plane
Supervisor-2
Linecard-1
Linecard-2
Linecard-N
ESX
N1K
ESX
Cisco Confidential
ESX
11
VSM2
Modular Switch
Supervisor-1
Back Plane
Supervisor-2
Linecard-1
Linecard-2
Linecard-N
N1K
VEM-1
VEM-2
ESX
ESX
Cisco Confidential
VEM-N
ESX
12
VSM2
L2 Mode
L3 Mode
(connected by L2 or L3)
VEM-1
VEM-2
ESX
ESX
VEM-N
ESX
N1K
Cisco Confidential
13
Virtual Appliance
VSM1
L3 Mode
L2 Mode
VSM2
VEM-1
VEM-2
ESX
ESX
VEM-N
ESX
N1K
Cisco Confidential
14
Nexus 1010
VSM-A1
VSM-A4
VSM-B1
VSM-B4
L2 Mode
redundant pair
L3 Mode
VEM-1
VEM-2
ESX
ESX
VEM-N
ESX
N1K
Cisco Confidential
15
VSG
VSM
L2 Mode
L3 Mode
vPath
vPath
Virtual WAAS
Traffic Steering
VEM-1
VEM-2
vPath
vPath
ESX
ESX
& above
N1K
Cisco Confidential
16
Nexus 1010
VSG
VSM-A1
VSM-A4
NAM
VSM-B1
VSM-B4
NAM
L2 Mode
L3 Mode
vPath
Virtual WAAS
VEM-1
VEM-2
vPath
vPath
ESX
ESX
N1K
Cisco Confidential
17
Agenda
Nexus 1010 Hardware and Software
Nexus 1000V VSM connectivity on Nexus 1010
Nexus 1010 Network Integration and Data Center Design
Nexus 1010 Virtual Service Blade Configuration and Verification
Nexus 1010 Upgrade Process
N1K
Cisco Confidential
19
N1K
Cisco Confidential
20
N1K
Cisco Confidential
21
1
3
5
7
N1K
2
4
6
8
Cisco Confidential
22
Cisco Confidential
23
Network Analysis
Module
Cisco Confidential
24
Feature Comparison
VSM as VM
VSM on
Nexus 1010
N1K
Cisco Confidential
25
N1K
Cisco Confidential
26
N1K
Cisco Confidential
27
N1K
Cisco Confidential
28
VM
VM
VM
L2 Network
Control VLAN
Packet VLAN
N1K
Control VLAN
Extend the usual backplane of the switch
over the network
Carries low level messages to ensure proper
configuration of the VEM.
Maintains a 1 sec heartbeat with the VSM to
the VEM (timeout of 6 seconds)
Maintains syncronization between primary
and secondary VSMs
Packet VLAN
For control plane processing like CDP, IGMP
snooping, or stat collections like SNMP,
Netflow
Cisco Confidential
29
VM
VM
VM
VM
L2 Network
Control VLAN
Packet VLAN
Cisco Confidential
30
VM
VM
L3 Network
VM
svs-domain
svs mode L3 interface (control0 | mgmt0)
Cisco Confidential
31
N1K
Cisco Confidential
32
N1K
Cisco Confidential
33
Sample Topology:
Common L2 Network with
upstream switch N5K/N2K
Setup 1
Setup 2
Eth2
Active VSM
Nexus 1010
Eth1: active (forwarding)
Eth2: standby (not forwarding)
Total Bandwidth per device is 1Gbps
N1K
N1010-1
Active Chassis
Eth1
Eth2
HA-Standby
VSM
N1010-2
HA-Standby Chassis
Cisco Confidential
Eth1
Active VSM
N1010-1
Active Chassis
Eth2
Eth2
Eth1
HA-Standby
VSM
N1010-2
HA-Standby Chassis
34
1
6
1
E1
E2 E3 E4
E5
Active VSM
Nexus 1010
Eth1: active (forwarding)
Eth2: standby (not forwarding)
Eth3-6:forwarding in LACP bundle
Total Bandwidth per device is 5Gbps
N1K
N1010-1
Active Chassis
Cisco Confidential
E6
E1
E2 E3 E4
E5
E6
HA-Standby
VSM
N1010-2
HA-Standby Chassis
35
Nexus 1010 uplink type 3:Ports 1 and 2 carry Management; Ports 3-6 carry Control and
Data traffic
Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth
Sample Topology:
Common L2 Network, upstream switch N5K/N2K with vPC
Upstream LACP Ports (both switches):
1
6
2
5
1
E1
E2 E3 E4
E5
Active VSM
E6
E1
E2 E3 E4
E5
E6
HA-Standby
VSM
Nexus 1010
Eth1: active (forwarding)
Eth2: standby (not forwarding)
Eth3-6:forwarding in LACP bundle
Total Bandwidth per device is 5Gbps
N1K
N1010-1
Active Chassis
Cisco Confidential
N1010-2
HA-Standby Chassis
36
Sample Topology:
Common L2 Network with
upstream switch N5K/N2K
Upstream Switch Access Ports:
interface ethernet 101/1/1
!-- multiple vlans trunked across link
switchport mode trunk
!-- only allow mgmt, control and data vlans
switchport trunk allowed vlan 170
!-- enable portfast edge
spanning-tree port type edge trunk
E1
Nexus 1010
Eth1: active (forwarding)
Eth2: standby (not forwarding)
Eth3: active (forwarding)
Eth4: standby (not forwarding)
Eth5: active (forwarding)
Eth6: standby (not forwarding)
Total Bandwidth per device is 3Gbps
N1K
E2 E3 E4
E5
Active VSM
N1010-1
Active Chassis
Cisco Confidential
E6
E1
E2 E3 E4
E5
E6
HA-Standby
VSM
N1010-2
HA-Standby Chassis
37
Description
Option 1
Option 2
Option 3
Option 4
N1K
Cisco Confidential
38
Aggregation
L3
L2
Access
Compute/Virtual Access
Nexus
1000V
VEM
ESXi
N1K
Cisco Confidential
39
N1K
Core
Aggregation
L3
L2
Access
Compute/Virtual Access
Nexus
1000V
VEM
ESXi
Cisco Confidential
40
N1K
Cisco Confidential
41
N1K
Cisco Confidential
42
3
Enter control vlan <1-3967, 4048-4093>: 250
Cisco Confidential
43
N1K
Cisco Confidential
44
Cisco Confidential
45
Host Name:
AV2-VSM-1
Management IP:
10.29.170.254
VSM-1.0
Interface:
control
vlan:
254
Interface:
management
vlan:
170
Interface:
packet
vlan:
255
Interface:
internal
vlan:
NA
Ramsize:
2048
Disksize:
Heartbeat:
132670
VSB POWERED ON
Location:
PRIMARY
SW version:
4.0(4)SV1(3a)
VSB POWERED ON
Location:
SECONDARY
SW version:
4.0(4)SV1(3a)
VSB Info:
Domain ID : 401
N1K
Cisco Confidential
46
----------------------------------------------------------------------Port
State
Speed
MTU
-----------------------------------------------------------------------
N1K
GigabitEthernet1
up
1000
1500
GigabitEthernet2
up
1000
1500
GigabitEthernet3
up
1000
1500
GigabitEthernet4
up
1000
1500
GigabitEthernet5
up
1000
1500
GigabitEthernet6
up
1000
1500
PortChannel1
up
1000
1500
PortChannel2
up
1000
1500
VbEthernet1/1
up
1000
1500
VbEthernet1/2
up
1000
1500
VbEthernet1/3
up
1000
1500
Cisco Confidential
47
VM
VM
VM
Nexus
1000V
VEM
ERSPAN
vCenter
N1K
Nexus 1000V
VSM
2011 Cisco and/or its affiliates. All rights reserved.
NetFlow
Cisco Confidential
NAM
Virtual
Blade on
Nexus
1010
48
N1K
Cisco Confidential
49
N1K
Cisco Confidential
50
N1K
Cisco Confidential
51
Save configuration
Log into VSM VSB
Switch over HA active VSM VSBs to active N1010
N1K
Cisco Confidential
52
N1K
Cisco Confidential
53
N1K
Cisco Confidential
54
Date
Business Sessions
Technical Sessions
22-Mar
29-Mar
5-Apr
12-Apr
19-Apr
26-Apr
3-May
10-May
17-May
24-May
Web Sites
www.cisco.com/go/1000v
www.cisco.com/go/nexus1010
www.cisco.com/go/vsg
www.cisco.com/go/vnmc
www.cisco.com/go/1000vcommunity
(Preso and Q&A posted here)
N1K
Cisco Confidential
55
Thank you.