Deploying and Troubleshooting the Nexus 1000v Virtual Switch on vsphere

Size: px
Start display at page:

Download "Deploying and Troubleshooting the Nexus 1000v Virtual Switch on vsphere"

Transcription

1

2 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on vsphere Matthew Wronkowski Technical Leader Virtualization Services

3 Agenda Current N1K Releases and New Features Licensing Virtual Supervisor Module (VSM) & VEM VSM High Availability Upgrades Port-Profiles & Port Channels VXLAN Cisco Cloud Services Platform / Nexus1x10 3

4 Cisco Nexus 1000V Virtual Switch Build & Price 4

5 Cisco Virtual Networking and Cloud Network Services Virtualized/Cloud Data Center WAN Switches Router Servers Imperva Cloud SecureSphere Services Router 1000V WAF Citrix NetScaler VPX Cloud Network Services vwaas Network Analysis Module (vnam) ASA 1000V Cloud Firewall Cisco Virtual Security Gateway Tenant A Zone A Physical Infrastructure vpath VXLAN Nexus 1000V Zone B Multi-Hypervisor (VMware, Microsoft, Ubuntu, RedHat*) Nexus 1000V VSG ASA 1000V vwaas CSR 1k vnam Ecosystem Distributed Switch NX-OS consistency VM-level controls Zonebased FW Edge firewall, VPN Protocol Inspection WAN optimization Application traffic WAN GW Routing & VPN App Visibility (L2-L7) Citrix NetScaler Imperva Web FW 5

6 Name a feature we will not implement on Nexus 1000V. Saravan Rajendran, Cisco CNSG VP 6

7 Current Releases and New Features

8 Current Nexus 1000V Releases ESX 5.2(1)SV3(1.1)* 256 VEMs, 12K veth count VXLAN 2.0 (BGP) N1K Management Center ESX 4.2(1)SV2(2.2) Dynamic Fabric Automation Leaf VDP VSI Discovery Protocol Universal Licensing ESX - 4.2(1)SV2(2.1a) Scalability Release 128 VEMs VXLAN 1.5, VXLAN GW Geographically Separated VSMs Removed ESX 4.1 support Hyper-V 5.2(1)SM1(5.2a) SCVMM 2012 SP1 & R2 Windows Server 2012 & R2 VSG VM and Custom Attributes Universal Licensing InterCloud 5.2(1)IC1(1.2) Simplified Platform Image Local License Server or Cisco PNSC Ubuntu KVM / OpenStack Initial Release *Next Release 8

9 Evolution of VXLAN to version 1.5 Unicast mode Simplifies VXLAN deployment Reduces network dependency (no multicast) Easier troubleshooting Flood directly to VXLAN Tunnel End Points (VTEP) Unicast Mac-address Distribution Mode Flooding is eliminated VSM learns all MACs and programs mappings to VEMs Faster response time Will not support VXLAN veth trunking(multi-mac) Requires static MACs (won t work with MS NLB) 9

10 vtracker Feature Provides intuitive virtualization perspective to the network-admin Pulls data from vcenter and VEM Gives cloud view of connected objects Enabled with feature vtracker There are 5 view options module-view upstream-view vlan-view vm-view vmotion-view SV2# show vtracker vm-view info vm win3 Module 5: VM Name: win3 Guest Os: Microsoft Windows Server 2003 Standard (32-bit) Power State: Powered On VM Uuid: 423ca4df-26d0-50c1-d531-1a49b3a83aed Virtual CPU Allocated: 1 CPU Usage: 0 % Memory Allocated: 1024 MB Memory Usage: 7 % VM FT State: Unknown Tools Running status: Running Tools Version status: current Data Store: datastore1 (2) VM Uptime: 25 days 3 hours 56 minutes 15s 10

11 Nexus 1000V Manager Installation Screenshot Install / Migrate / Upgrade / Monitor Zero CLI full GUI interface Auto Host Selection Deploy Redundant VSMs Best Practices Auto-Implemented Automated prompts with suggestion for alternatives Customize Installation for Advanced Users *Available Summer

12 Licensing Info

13 Licensing Essential Edition (No Expiration) Default mode for New Installs All features except Cisco TrustSec (CTS) DHCP Snooping IP Source Guard / Dynamic ARP Inspection Virtual Security Gateway (VSG) VXLAN Gateway 128 modules with 4096 virtual ports Support Options Pay Nothing support is through the communities site off cisco.com Pay for service contract 13

14 Licensing Advanced Edition For customers that want more security features Customers with existing licenses will be considered Advanced Upgrade process will migrate VSM to Advanced Edition Required for VXLAN Gateway and VSG Licensed customers can get Virtual Security Gateway(VSG) for free Cisco Account Team can submit request VSG will no longer be sold separately 256 modules with 12k virtual ports (SV3)* 60-day Trial after which Advanced FeatureSet is disabled 14

15 Universal Licensing A common license is shared for both N1k & VSG. Cross Hypervisor portability. The license name is NEXUS1000V_LAN_SERVICES_PKG. Following upgrade, request a new Permanent license within 60 days. 15

16 Licensing New Commands Display Current Edition switch# show switch edition To switch between Essential or Advanced switch(config)# svs switch edition [essential advanced] VEM Licenses are Sticky Removed & Offline VEMs hold a license switch# show module vem license-info Licenses are Sticky Mod Socket Count License Usage License Version License Status licensed VEM license transfer to pool: switch(config)# svs license transfer src-vem <module> license_pool 16

17 Licensing Overdraft Licenses Extra licenses to use in temporary situations 16 extra sockets Sometimes more depending on number of licenses you ve purchased Can only be used after a valid license is installed No penalty Full TAC Support for Overdraft Modules SV2# show license usage NEXUS1000V_LAN_SERVICES_PKG Feature Usage Info Installed Licenses : 16 Default Eval Licenses : 0 Max Overdraft Licenses : 16 <---- Installed Licenses in Use : 12 Overdraft Licenses in Use : 0 <---- Default Eval Lic in Use : 0 Default Eval days left : 0 Licenses Available : 20 < Shortest Expiry : 04 Feb

18 Virtual Supervisor Module Deployment and Troubleshooting

19 Back Plane Cisco Nexus 1000V Architecture Network Admin Virtual Appliance VSM-1 (active) VSM-2 (standby) NX-OS Control Plane Supervisor-1 (Active) Supervisor-2 (StandBy) Linecard-1 Linecard-2 Linecard-N NX-OS Data Plane Modular Switch VEM-1 VEM-2 VEM-N VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module Server Admin Hypervisor Hypervisor Hypervisor 19

20 Virtual Supervisor Module (VSM) VSM is a Virtual Machine On ESXi, Hyper-V, Ubuntu KVM / OpenStack On Nexus 1x10 / Cloud Services Platform Control plane for the Nexus 1000V solution VEM packet forwarding not impacted by reloads Responsible for Programming and Managing Virtual Ethernet Modules (VEM) Communicating with Management Applications VMware vcenter, SCVMM, Horizon Dashboard 1 VSM HA pair can manage 128 VEMs Coexist with VMware vswitch, vds, Microsoft Logical, Native Switches 20

21 Nexus 1000V VSM Interfaces Control L2/L3 VEM (AIPC) VSM-VEM Heartbeats (L2/L3) VSM-VSM Synchronization (L2) VSM-VSM HA Heartbeats (L2/L3) Packet CDP, IGMP, NetFlow, SNMP L3 Mode Collapsed Ctrl, Pkt into mgmt0 VSM-VEM flow from mgmt0 Dedicated Control: svs mode L3 interface [control mgmt0] Management SSH console access SNMP, HTTP vcenter Communication HA Heartbeat Backup Interface Order is always the same! VSM-P eth0: control eth1: mgmt0 eth2: packet 21

22 VSM Deployment Scenarios Supports the VSM on a VEM Supports the VSM on any hypervisor native, logical, or distributed switch Supports the VSM on any supported hypervisor (ESXi/Hyper-V/N1110) Keep VSMs on different physical hosts Use anti-affinity rules Storage wise we don t care. VSM can be hosted on network storage 22

23 Stretched Nexus 1000V Model VSMs and VEMs spread across Datacenters VSMs can be split across DCs Requires L2 connectivity across DCI 10ms latency across DCI Not supported with Hyper-V Supported in a future release VM VM VM VM VM VM VEM-3 VEM-4 Local DC hypervisor hypervisor Remote DC DCI VSM hypervisor VEM-1 hypervisor VEM-2 VM VM VM VM VM VM VSM 23

24 VSM Control Modes L3 Mode L3 is the recommended & default Easier to troubleshoot Flexible Requires an IP address be assigned to the VEM Uses UDP4785 for both source and destination Sourced from mgmt0 by default L2 mode Requires L2 connectivity through control0 interface to all VEM modules L2 still supported on ESX Not supported with Hyper-V or KVM 24

25 VSM L3 Configuration and Planning Two options for the L3 control interface mgmt0 (default) control0 Use Control0 to separate control and management traffic Mgmt and Control use different VRF mgmt0 uses VRF management control0 uses VRF default Primary and Secondary VSM still need to be L2 adjacent! Test with mping broadcast command. 0x201 is control between VSMs # mping broadcast 64 bytes from node 0x0201 (msg id = 0x030b1e 1) (time=0 sec, 1510 usec) 25

26 VSM Connectivity to VMware vcenter VSM connects to vcenter using SSL connection VC Extension contains the SSL cert Unique extension ID for the VSM Ability to generate own certificates VSM talks to vcenter using its API We push and pull data to/from vcenter VSMs get tied to a VMware Datacenter Multiple VSMs tied to same DC is allowed VSM can manage across clusters but not datacenters Can get confusing 26

27 VSM Connectivity Errors - ESXi If you get Extension key was not registered before it s use Re-register the Extension Key with VMware vcenter If you get Connection refused. connect failed in tcp_connect() Ping vcenter IP from VSM CLI VMware admin could have changed the http port API communication is through port 80 with VMware vcenter Find new port and change it on VSM 27

28 VSM and vmotion/live Migration Manual vmotion/live Migration is supported VMware DRS is NOT recommended for Primary & Secondary VSMs Aggressive settings could lead to excessive VSM-VEM heartbeat packet drops Best practice to keep Primary and Secondary VSM outside DRS control Use anti-affinity rules where possible 28

29 Backing up the VSM A running-config is not enough to restore VSM on ESXi Clone to a template You can restore from a template and saved-config Must be powered down VSM on Nexus 1x10 Export a VSM to a file Import the saved VSM to restore VSM on ESXi Snapshots Not officially supported I/O latency cost associated with expanding the differential file 29

30 VSM Best Practices - Summary L3 control is the preferred method Use mgmt0 for control traffic Primary and Standby VSM in same L2 domain!!! Required even if VSMs are split between datacenters VSM on VEM is supported 10ms Latency between components: VSM-VSM, VSM-VEM 10ms even for VSMs split between datacenters For VEMs at branch locations 100ms Backup your config!!! 30

31 Nexus 1000V High Availability

32 VSM Redundancy Manager HA had to evolve to support split datacenter VSMs New Redundancy Manager process polls: VEM Manager polls for number of active VEMs attached to VSM VMS process retrieves which VSM has active VC connectivity SNMP Library gets the last configuration time Runs on both primary and secondary VSM Heartbeats VSM-VSM every second. Drop after 6 missed VSM-VEM every second. Drop after 15 missed SV2# show system internal redundancy trace 1 0s START_THREAD ST_NP ST_NP ST_INVALID 2 0s CP_STATUS_CHG ST_INIT ST_NP ST_INIT 3 0s SET_VER_RCVD ST_INIT ST_NP ST_INIT 4 0s STATE_TRANS ST_INIT ST_INIT ST_INIT EV_OS_INIT ST_AC_INIT 5 0s CP_STATUS_CHG ST_AC ST_INIT ST_AC_INIT 6 0s STATE_TRANS ST_AC ST_SB ST_AC_INIT EV_OS_SB ST_AC_SB 32

33 VSM Split Brain Recovery for ESXi Redundancy Manager in SV2(2.2) Module Count vcenter Status Last Configuration Time Last Standby-Active Switch(VSM with longer primary active time) Out-of-Sync / Split-Brain causes VSM to reload 33

34 When does a VEM switch VSMs? What if we have two active VSMs? What causes a VEM to switch? Standby VSM becomes active and broadcasts to all VEMs VEM will attach depending on Connectivity between VEM and VSM VEM receives the request to switch VEM goes into headless mode after 15 seconds If a VEM is headless traffic forwarding continues! vmotion/live Migration is blocked 34

35 Upgrades

36 Upgrades First always read and follow the upgrade guides Go in order Take a backup of the VSMs On ESXi use the clone to template option On Nexus 1x10s use the export function Backup the running-config Generate a Tech-Support before the upgrade If something goes wrong STOP and call TAC Use a maintenance window VEM upgrades require ESXi hosts to be in Maintenance Mode 36

37 Supported Upgrades Starting Version Combined VMware Upgrade Notes 1.3 Yes 1.4 first* 1.4 first* 1.4 first* No 1.4 Yes Yes Yes No 1.5 Yes Yes Yes 2.1 Yes Yes 1.4 last version supporting ESX for combined 2.1 last version supporting ESX 4.1 Upgrade matrix: * Must upgrade to 1.4b first 37

38 Upgrades to 2.2 Scalability limits may require changes to the VM settings For full scalability support: CPU reservation to 2GHz Memory to 3GB VSMs do NOT support multiple vcpus Steps Shutdown Secondary VSM Make VM changes Power Secondary on System Switchover Repeat steps on Primary VSM API can be upgraded individually now show plugin status 38

39 Upgrading the VSM Changes from 2.1 VSMs can run newer software than VEMs. New features disabled until VEMs upgraded. ISSU upgrade is similar to other Nexus switches Copy new kickstart and system images to bootflash Run install all command Verifies software compatibility Copies images to secondary s bootflash. Upgrade/Reboot the Secondary VSM Switchover to Secondary VSM It s now the active VSM with VEMs attached Upgrade/Reboot the old-primary VSM Requires no outage of the VSM Change CPU/Memory after the SV2(2.2) upgrade is complete 39

40 Troubleshooting VSM Upgrades If something is wrong after the VSM upgrade STOP Call TAC Rollback using backup method Shutdown the VSM VMs Power-on the Clones (ESXi), Import the backup (Nexus 1x10) Changing boot variables to older image is not supported but often works Sometimes the VEM won t connect to the Standby VSM Try a system switchover once the old primary is upgraded Might want to verify Standby VSM before upgrade Make sure VEMs can connect to standby Use system switchover command 40

41 Upgrading the VEMs VEM module upgrade kicked off on VSM If VUM is installed everything is automatic VSM communicates with vcenter to manage the upgrade Host is placed in maintenance mode(if DRS is installed VMs are migrated off) VEM is upgraded and host exits maintenance mode Moves on to the next host If VUM is not installed Still initiate the process on the VSM User manually places ESXi hosts in maintenance mode Upgrade the VEM with esxcli command Exit maintenance mode and move to the next host Always complete the upgrade Issue the vmware vem upgrade complete command Signals vcenter to use the new VEM VIB when hosts are added 41

42 Troubleshooting VEM Upgrades Remember the VMware admin has to acknowledge upgrade in vcenter Don t upgrade the VEMs by pushing a baseline Make sure you have DRS capacity Need to be able to handle one ESXi host in maintenance mode If a particular ESXi host fails It s usually because the host cannot go into maintenance mode From vcenter attempt to put the host in maintenance mode Troubleshoot any issues that prevent it If an ESXi host is running a vcenter VM this can cause problems You can restart the VEM upgrade after it fails It will only upgrade hosts that did not succeed 42

43 Virtual Ethernet Module Deployment and Troubleshooting

44 VEM Deployment Best Practices Again we recommend L3 Control L3 control requires a VMKernel NIC on N1K DVS We need an L3 interface to forward control traffic 10/100ms latency for local vs. branch office Recommend using the ESXi management VMKernel NIC Requires management interface to the VEM Doesn t require static routes on ESXi hosts Don t create an L3 vmk on same subnet as mgmt vmk Don t use UCS Dynamic vnics in Service-Profiles VEM and VM-FEX are mutually exclusive 44

45 VEM Deployment veth Port-Profile vmk0 interface needs to be migrated to this port-profile It must have capability l3control and system VLAN Each VMKernel VLAN needs a different port-profile VSM only permits VMKs to connect to this port-profile port-profile type vethernet vmk-l3 capability l3control vmware port-group switchport mode access switchport access vlan 119 capability vxlan no shutdown system vlan 119 state enabled 45

46 VEM Deployment Uplink Port-Profile Typically a trunk Verify upstream switch allowed VLAN list matches Must have system vlans & a port-channel defined MTU must match. Especially important when using OTV. port-profile type ethernet system-uplink vmware port-group switchport mode trunk switchport trunk allowed vlan 119,199,219,319 mtu 9000 channel-group auto mode on mac-pinning no shutdown system vlan 119,319 state enabled 46

47 VEM L3 Troubleshooting 1. VMK migrated behind VEM? 2. VSM-ESXi connectivity? Static route needed? 3. L3 veth Port-Profile correct? 4. Uplink Port-Profile correct? 5. Check the Opaque Data 6. Check Heartbeats 47

48 VEM Troubleshooting VSM Connectivity VEM adds in vcenter but does not show up on VSM show module With L3 its usually an IP routing problem If you can ping from VSM to VMK interface then VEM should connect. Troubleshoot as you would all VMware L3 issues With L2 most of the time its a Control VLAN issue Verify Control VLAN connectivity in upstream network Check upstream switches for VEM AIPC MAC address Additional Information in Appendix 2 48

49 VEM Deployment VMKs on same subnet Don t use multiple VMKs on the same subnet on different virtual switches VMware uses a single TCP/IP stack for all VMK interfaces No way to pin traffic to an uplink interface. One interface gets picked for all traffic on that subnet Check out VMware KB article Only one gateway per host VMK VEM-1 VMware ESX VMK vswitch 50

50 VSM Setting Verification Verify the VRF SV2# show ip route vrf management /0, ubest/mbest: 1/0 *via , mgmt0, [1/0], 6d20h, static Can the VSM ping the VEM Check SVS domain SV2# sh svs domain SVS domain config: Domain id: 1919 Control vlan: NA Packet vlan: L2/L3 Control mode: L3 L3 control interface: mgmt0 Status: Config push to SV2# ping VC successful. PING ( ): 56 data bytes 64 bytes from : icmp_seq=0 ttl=62 time=1.254 ms 64 bytes from : icmp_seq=1 ttl=62 time=1.057 ms 64 bytes from : icmp_seq=2 ttl=62 time=1.055 ms NA 52

51 Check Opaque Data Opaque data is bootstrap information for the VEM Pushed via SCVMM or vcenter during Host Add to DVS Is the right Opaque data getting pushed to the ESXi host? ~ # vemcmd show card Card UUID type 2: 9aed7c30-84f8-11e ff f Card name: Switch name: SV2 Switch alias: DvsPortset-0 Switch uuid: b2 40 3c e 15 f5-6a 3c 7f d1 c cd Card domain: 1919 Card slot: 3 VEM Tunnel Mode: L3 Mode L3 Ctrl Index: 49 L3 Ctrl VLAN: 119 VEM Control (AIPC) MAC: 00:02:3d:17:7f:02 VEM Packet (Inband) MAC: 00:02:3d:27:7f:02 VEM Control Agent (DPA) MAC: 00:02:3d:47:7f:02 VEM SPAN MAC: 00:02:3d:37:7f:02 Primary VSM MAC : 00:02:3d:70:1f:07 Primary VSM PKT MAC : 00:02:3d:70:1f:08 Primary VSM MGMT MAC : 00:02:3d:70:1f:06 53 Should match VLAN defined in veth Port-Profile Should match MAC of control 0 or mgmt 0

52 View Heartbeat Messages on VEM Use vempkt on the ESXi host vempkt capture [egress ingress] vlan 119 ltl 50 Run for 10s to capture several heartbeat cycles vempkt cancel capture all vempkt display detail all vempkt can now export to a pcap file vempkt pcap export <filename> Look for heartbeat messages on VSM SV2# show module vem counters Mod InNR OutMI InMI OutHBeats InHBeats InsCnt RemCnt Crit Tx Errs

53 VEM Troubleshooting - vemlog Used for detailed debugging of programming and packet flows Executed on the Hypervisor Host Enable different debug options to help troubleshoot LACP QOS VXLAN IGMP VSM<-->VEM Data ~ # vemlog show debug grep lacp Module Available Printing sflacp ENWID PL (223) ( 0) sf_lacp_pdu_utils ENWID PL (223) ( 0) sflacp_hostdata ENWID PL (223) ( 0) ~ # vemlog debug sflacp all ~ # vemlog show debug grep lacp sflacp ENWID PL (223) ENWIDTPL (255) sf_lacp_pdu_utils ENWID PL (223) ( 0) sflacp_hostdata ENWID PL (223) ( 0) ed119.shtml 55

54 Port-Profiles Deploying and Troubleshooting

55 Port-Profiles Port-Profile Port-profiles <type> vethernet Ethernet Usage VM vmk l3control / vservice UPLINK vethernet PP (default) -Virtual Interfaces (veth x/) (VMs, VMK) -Typically Access Ports -Configuration: VLAN, ACL, Pinning, QoS Ethernet PP -Physical Interfaces (Eth x/y) -Typically Trunk (could also be access) -Configuration: Port-Channel, ACLs, QoS 57

56 Switch Interface Types Ethernet Port (eth) Correspond to the physical NIC interfaces leaving the server Specific to each module or VEM VMware s vmnicx == Cisco ethx/y Up to 32 physical ports supported per host Port Channel (port-channel) Aggregation of physical Ethernet ports Up to eight Port Channels per host Virtual Ethernet Port (veth) One per virtual NIC interface (vnic) including service console / vmknic Notation is VethX No module number is assigned to keep naming persistent as VMs move between modules (hosts/vems) Eth3/1 Veth1 VM1 Po1 Eth3/2 VM2 Veth2 58

57 Loop Prevention without STP Cisco VEM Eth4/1 Cisco VEM Eth4/2 X Cisco VEM X VM1 VM2 VM3 VM4 BPDUs are Dropped VM5 VM6 VM7 VM7 No Switching from Physical NIC to NIC VM9 VM10 VM11 VM12 déjà vu check Frames with local MAC Dropped on Ingress 59

58 Spanning-tree and BPDU Best Practice Mandatory Spanning-Tree settings per port IOS set STP portfast cat65k-1(config-if)# spanning-tree portfast trunk NXOS set port type edge n5k-1(config-if)# spanning-tree port type edge trunk Highly Recommended Global BPDUFilter/BPDUGuard IOS cat65k(config)# spanning-tree portfast bpdufilter cat65k(config)# spanning-tree portfast bpduguard NXOS n5k-1(config)# spanning-tree port type edge bpduguard default n5k-1(config)# spanning-tree port type edge bpdufilter default BPDU Filter is mandatory for LACP port-channels Set per-port BPDU Guard when Global is not possible 60

59 Ethernet (uplink) Port-Profile Troubleshooting Port-Profiles with multiple NICs need a port-channel Causes duplicate packets Kicks in déjà vu driver Requires extra CPU processing Fills the logs When in doubt, use mac-pinning Also same issue if you overlap VLANs in different Port-Profiles on same host WRONG port-profile type ethernet uplink-nopc vmware port-group switchport mode trunk switchport trunk allowed vlan , no shutdown system vlan 11 state enabled RIGHT port-profile type ethernet uplink-nopc vmware port-group switchport mode trunk switchport trunk allowed vlan , channel-group auto mode on mac-pinning no shutdown system vlan 11 state enabled 61

60 Cisco Nexus 1000V System VLANs System VLANs enable interface connectivity before an interface is programmed System port-profiles become part of the opaque data VEM will load system port-profiles and pass traffic even if VSM is not up Unprotected (No ACLs, VSG) before module registers for first time Addresses chicken and egg issue VEM needs to be programmed, but it needs a working network for this to happen Port profiles that contain system VLANs are system port profiles Allowed 32 port-profiles with system VLAN 62

61 System VLAN Guidelines The system VLAN must be a subset of the allowed VLAN list on trunk ports Only one system VLAN on an access port The no system vlan command only when no interface is using the profile Once a system profile is in use by at least one interface Can add to the list of system VLANs Cannot delete VLANs from the list reason to limit usage System vlans must be set on egress and ingress port-profiles Required System VLANs Control, Packet, IP Storage, VMKernel, vcenter, any Management Networks 63

62 VMware DVS Max-Port Issues Default to 32 max-ports per port-profile Counts toward the maximum number of VMware DVS ports 8192 by default Pre-Provisioned Some ports are consumed when you add an ESX host to the DVS Two methods to remedy: Max-ports under svs connection <name> Allows you to increase the ports of the VMware DVS Port-binding auto expand in veth port-profiles N1KV dynamically adds ports as VMs are added Set port-binding as default with port-profile default port-binding static auto expand 64

63 Microsoft Network Load Balancing Support Unicast mode is officially supported method no mac auto-static-learn in veth port-profile Multicast Mode NLB virtual cluster address requires a static ARP entry on the edge router Works through flooding Multicast Mode IGMP Disable IGMP snooping on the N1KV Upstream switches enable IGMP snooping Enable IGMP Querier in the environment NLB virtual cluster address requires a static ARP entry on the edge router CSCue Add support for Microsoft NLB - Multicast+IGMP 65

64 Jumbo Frames Support System jumbo mtu 9000 Enabled globally by default in SV1(4)+ Sets the systemwide jumbo MTU size Generally do not need to change vethernet ports are 9000 by default MTU setting for ethernet type port-profile Simply use mtu size in port-profile and nothing else Still need to configure upstream network devices UCS System QoS Class UCS vnic QoS Policy Nexus 5k / 7k / etc 66

65 Port-Profile Using Weighted QOS Configuration Steps to limit vmotion traffic n1kv-l3(config)# class-map type queuing match-all vmotion-class n1kv-l3(config-cmap-que)# match protocol? n1k_control N1K control traffic n1k_mgmt N1K management traffic n1k_packet N1K inband traffic vmw_ft VMware fault tolerance traffic vmw_iscsi VMware iscsi traffic vmw_mgmt VMware management traffic vmw_nfs VMware NFS traffic vmw_vmotion VMware vmotion traffic n1kv-l3(config-cmap-que)# match protocol vmw_vmotion n1kv-l3(config-cmap-que)# policy-map type queuing vmotion-policy n1kv-l3(config-pmap-que)# class type queuing vmotion-class n1kv-l3(config-pmap-c-que)# bandwidth percent 50 n1kv-l3(config)# port-profile type eth uplink-vpc n1kv-l3(config-port-prof)# service-policy type queuing output vmotion-policy 68

66 Port Channels

67 Port Channels LACP Port-Channels Requires upstream switch support and configuration VPC MAC Pinning Works with any upstream switch Allows for pinning of veths (VM) to specific links VPC Host Mode CDP/Manual (deprecated) NIC association is either Manual or CDP 70

68 Port Channels Best Practice Configuration Guide 080c1ee1e.shtml All Ethernet Port-Profiles must be configured in a Port-Channel LACP & MAC-Pinning are recommended modes Use Manual/Static Pin Group for granular traffic steering Use Manual/Static Pin Groups with multiple vmotion VMKs in ESX 5.x Same link-speed for all members. No mixing 1G+10GE+40GE interfaces. 71

69 Port Channels Best Practice If the upstream switch can be clustered (VPC, VBS Stack, VSS) use LACP If you are using LACP also use LACP Offload UCS-B must use MAC-Pinning If the upstream switch can NOT be clustered use MAC-PINNING Create channel-groups in port-profile Let VSM build the interface port-channel & add physical NICs All physical switch ports in port-channel configured identical 72

70 Port Channels MAC Pinning MAC Pinning provides the dynamism of vpc Host-Mode without requiring CDP to be configured on the upstream switch VM VM VM VM The VM MAC address is used to select link. sys-uplink vsphere port-profile type ethernet uplink vmware port-group switchport mode trunk switchport trunk allowed vlan 1-10 channel-group auto mode on mac-pinning no shut state enable system vlan 10 73

71 Port Channels MAC Pinning (Link Failure) If a failover occurs, all the traffic pinned to an interface will be migrated to the other interfaces. VEM sends GARP to flush upstream CAM tables. VM VM VM VM The VM MAC address is used to select link. sys-uplink vsphere port-profile type ethernet uplink vmware port-group switchport mode trunk switchport trunk allowed vlan 1-10 channel-group auto mode on mac-pinning no shut state enable system vlan 10 74

72 Port Channels MAC Pinning Use Network State Tracking (NST) to detect non-link failures Each Eth interface added is a unique Service Group SGID # assigned based off vmnic# Use pinning id command under vethernet Port-Profile Pins the VM to a particular uplink Ordered list for backup n1kv(config-port-prof)# pinning id 0 backup 1 2 Default assignment is Round Robin to an SGID New command to make SGID # relative n1kv(config-port-prof)# channel-group auto mode on mac-pinning relative 75

73 MAC Pinning (Host Pinning Tables) n1kv# sh port-channel summary 1 Po1(SU) Eth NONE Eth5/1(P) Eth5/2(P) 2 Po2(SU) Eth LACP Eth6/1(P) Eth6/2(P) 3 Po3(SD) Eth NONE Eth3/3(r) [root@mw-esx15 ~]# vemcmd show channel type LTL Channel_Type MAC Pinning 18 MAC Pinning 76

74 MAC Pinning (Host Pinning Tables) ~]# vemcmd show port LTL VSM Port Admin Link State PC-LTL SGID Vem Port Type 17 Eth3/1 UP UP F/B* vmnic0 18 Eth3/2 UP UP F/B* vmnic1 49 Veth1 UP UP FWD 0 1 vmk0 [root@mw-esx15 ~]# vemcmd show pc pce_ind chan pc_ltl pce_in_pc LACP SG_ID NumVethsPinned mbrs N , 1* 3 18, [root@mw-esx15 ~]# vemcmd show pinning LTL IfIndex PC_LTL VSM_SGID Eff_SGID iscsi_ltl* Name c0000a vmk0 50 1c0000d vmk1 77

75 Port Channels How to Tell Pinning Can run from the VSM now No need to run command on the VEM n1kv-l3# show int virtual pinning module Veth Pinned Associated PO List of Sub Group id interface Eth interface(s) Veth2 0 Po5 Eth5/1 Veth4 2 Po5 Eth5/3 Veth5 0 Po5 Eth5/1 Veth6 2 Po5 Eth5/3 Veth7 0 Po5 Eth5/1 78

76 Static Pinning to Sub-Group Static Pinning is similar to VMware s vswitch active/standby design. port-profile type ethernet uplink channel-group auto mode on macpinning relative port-profile vmkernel pinning sub-group id 0 backup 2 1 port-profile vmkernel pinning sub-group id 0 backup 2 1 port-profile type ethernet vmotion pinning sub-group id 2 vmk0 VMotion vmk0 VMotion P C After failover P C Port-channel Sub-group 1 Port-channel Sub-group 1 Sub-group 0 Sub-group 2 Sub-group 2 79

77 LACP Port Channels Use when single upstream or clustered (vpc,vss, Catalyst Stack) switch Use channel-group auto mode active on N1KV Use channel-group # mode active/passive on upstream switch Switchports must be configured with spanning-tree portfast trunk spanning-tree bpdufilter enable Not compatible with Network State Tracking(NST) with LACP 80

78 Port-Channels - LACP VM VM VM VM vsphere LACP Port-channel Upstream switch clustered (vpc,vss,vbs,stack ) LACP allows traffic from each VM to fully utilize multiple links simultaneously. Allows faster VMotion and faster VM connectivity by using flow based hashing port-profile type ethernet uplink vmware port-group switchport mode trunk switchport trunk allowed vlan 1-10 channel-group auto mode active no shut state enable 81

79 LACP Troubleshooting Do not use Network State Tracking(NST) with LACP LACP Port-Channel configured on the upstream switches Port-profile created with channel-group auto mode active On the VEM vemcmd show lacp On the VSM and Upstream Switch show port-channel summary show lacp counters/neighbor Are you seeing LACP PDUs? 82

80 LACP Debugging ~ # vemcmd show lacp LACP Offload is Enabled LACP Offload Config for LTL Channel No : 8 Channel Mode : Active Port Priority : 0x8000 LACP Bit Set : Yes SV2# show lacp counters LACPDUs Marker Marker Response LACPDUs Port Sent Recv Sent Recv Sent Recv Pkts Err port-channel8 Ethernet10/ Ethernet10/

81 LACP Debugging ~ # vemlog show debug grep lacp sflacp ENWID P ( 95) ENW ( 7) sf_lacp_pdu_utils ENWID P ( 95) ENW ( 7) sflacp_hostdata ENWID P ( 95) ENW ( 7) Debug (LTL 16, DIR TX) : Actorstate=7 agg=1 insync=0 coll=0 dis=0 active=1 short_timeout=1 Port ID (0x8000.0x602), Key (7) Debug (LTL 16, DIR TX) :Partnerstate=2 agg=0 insync=0 coll=0 dis=0 active=0 short_timeout=1 Port ID (0x0.0x0), Key (0) Debug sf_lacp_tx_pdu_to_upstream: LTL = 18 Debug sf_lacp_tx_pdu_to_upstream, NEW LACP PKT : Src(1), Dst(18), VLAN(1), FLAGS(1) [ ] Debug (LTL 18, DIR RX) :Partnerstate=3d agg=1 insync=1 coll=1 dis=1 active=1 short_timeout=0 Port ID (0x8000.0x602), Key (7) Debug (LTL 16, DIR TX) : Actorstate=3d agg=1 insync=1 coll=1 dis=1 active=1 short_timeout=0 Port ID (0x8000.0x602), Key (7) 84

82 Virtual Extensible LAN (VXLAN)

83 Virtual Extensible Local Area Network (VXLAN) Ethernet in IP overlay network Entire L2 frame encapsulated in UDP (port 4789) 50 bytes of overhead Include 24-bit VXLAN Identifier 16 M logical networks Mapped into local bridge domains Unique multicast group per segment VXLAN can cross Layer 3 Tunnel between VEMs VMs do NOT see VXLAN ID Egress to Non-VXLAN network Outer MAC DA Outer MAC SA Outer 802.1Q Outer IP DA Outer IP SA Outer UDP VXLAN ID (24 bits) Inner MAC DA InnerM AC SA Optional Inner 802.1Q Original Ethernet Payload CRC VXLAN Encapsulation Original Ethernet Frame 87

84 Virtual Extensible Local Area Network (VXLAN) Each overlay network is known as a VXLAN segment Each VXLAN segment identified by a 24-bit segment ID (VNI) VXLAN traffic carried between VXLAN Tunnel Endpoints (VTEP) VEM module acts as the VTEP VM traffic is carried over point to point tunnels between VTEPs VM to VM traffic is encapsulated in a VXLAN header 1550 MTU for encapsulation overhead Encapsulated multicast is always flooded No IGMP in VXLAN 88

85 Deployment Modes: Multicast or Unicast? Multicast used to be required for unknown broadcast/unicast on VXLAN N1KV 2.2 introduced Unicast Mode and Unicast Mac Distribution Mode Multicast (VXLAN 1.0) Needs Multicast configured throughout complete network IGMP Querier in VLAN Multicast routing and proxy ARP across subnets VTEPs all join multicast group Interoperates with N9K, CSR1K, other Nexus products Unicast Mode (VXLAN 1.5) VEMs flood each other directly for unknown broadcast/unicast Keep a list of other VEMs in each VXLAN 89

86 Deployment Modes: When to use MAC Distribution? MAC distribution will provide best performance No Flooding & Learning Full MAC table distributed to each VEM VEMs report local MACs to VSM VSM distributes {MAC,VTEP} mapping to each VEM VXLAN traffic cannot span multiple Nexus 1000V switches* Two caveats No veth VXLAN trunk mode support with MAC distribution Won t work with Microsoft NLB 90

87 VXLAN Forwarding Basics Forwarding mechanisms similar to Layer 2 bridge: Flood & Learn VEM learns VM s Source (MAC, Host VXLAN IP) tuple Broadcast, Multicast, and Unknown Unicast Traffic VM broadcast & unknown unicast traffic are sent as multicast Unicast Traffic Unicast packets are encapsulated and sent directly (not via multicast) to destination host VXLAN IP (Destination VEM) VM VM VM VM VEM 1 VEM 2 92

88 Enhanced VXLAN VXLAN (multicast mode) Enhanced VXLAN (unicast mode) Enhanced VXLAN MAC Distribution Enhanced VXLAN ARP Termination Broadcast / Multicast Multicast Encapsulation Replication plus Unicast Encap Replication plus Unicast Encap Replication plus Unicast Encap Unknown Unicast Multicast Encapsulation Replication plus Unicast Encap Drop Drop Known Unicast Unicast Encapsulation Unicast Encap Unicast Encap Unicast Encap ARP Unicast Encapsulation Replication plus Unicast Encap Replication plus Unicast Encap VEM ARP Reply 96

89 VXLAN Configuration: Unicast VMkernel interface acts as VTEP VSM Control Mode should be L3 Bridge domain is configured as Unicast or Unicast Mac Distribution feature segmentation feature vxlan-gateway port-profile type vethernet vmk-l3-vxlan-vtep capability l3control vmware port-group switchport mode access switchport access vlan 119 capability vxlan no shutdown system vlan 119 state enabled 97

90 Bridge Domain Configuration: Unicast Create a bridge-domain in unicast mode Scenario 1: Scenario 2: switch(config)# segment mode unicast-only (Global) switch(config)# bridge-domain segment-cisco switch(config-bd)# segment id 5000 switch(config-bd)# segment distribution mac switch(config)# bridge-domain segment-cisco switch(config-bd)# segment id 5000 switch(config-bd)# segment mode unicast-only (Per BD override) switch(config-bd)# segment distribution mac 98

91 Port-Profile Configuration Create an Access Port-Profile with the VXLAN Bridge Domain Assign to VM s in vcenter port-profile type vethernet bd-5000 vmware port-group switchport mode access switchport access bridge-domain bd-5000 no shutdown state enabled 99

92 VXLAN Debugging SV2# show bridge-domain bd-5000 Bridge-domain bd-5000 (2 ports in all) Segment ID: 5000 (Manual/Active) Mode: Unicast-only (override) MAC Distribution: Disable (override) Group IP: NULL State: UP Mac learning: Enabled Veth9, Veth45 SV2# show bridge-domain bd-5000 vteps Bridge-domain: bd-5000 VTEP Table Version: 21 Port Module VTEP-IP Address VTEP-Flags Veth (D) <---Designated VTEP (vmk) Veth (D) Veth (DI) <---VXGW Veth (DI*)<---VXGW (Standby) 100

93 VXLAN Debugging ~ # vemcmd show vxlan-vteps Bridge-Domain: bd-5000 Segment ID: 5000 Designated Remote VTEP IPs (*=forwarding publish incapable): (DSN: 1), (DSN: 1)* ~ # vemcmd show bd bd-name bd-5000 BD 31, vdc 1, segment id 5000, segment group IP , encap VXLAN, vff_mode Anycast,swbd 4096, VLAN 0, 1 ports, "bd-5000" Segment Mode: Unicast VTEP DSN: 1, MAC DSN: 0 Portlist: 52 win2k.eth0 Virtual Machine in VXLAN

94 VXLAN Debugging ~ # vemcmd show l2 segment 5000 Bridge domain 31 brtmax 4096, brtcnt 3, timeout 300 Segment ID 5000, swbd 4096, "bd-5000" Flags: P - PVLAN S - Secure D - Drop Type MAC Address LTL timeout PVLAN Remote IP DSN Dynamic 00:50:56:bc:73:1a Static 00:50:56:a9:00:2e Dynamic 54:7f:ee:2f:33: ESXi Host #2 VXLAN Gateway 102

95 Nexus 1010 and 1110

96 VSM Deployment Scenarios Nexus 1110 Cisco Cloud Services Platform VSM on a Nexus 1010/X or 1110-S/X It s still a Virtual Machine Up to 14 VSM pairs on one 1110-X cluster Always deploy in the appliance pairs! N110 allows for Network team to own the virtualization platform N110s should go in the Aggregation Layer Stretched Model requires L2 Connectivity 10ms latency 104 *Next Release

97 1110-S/X Deployment Scenario 105

98 Cisco Cloud Services Platform (CSP) Nexus 1010/1010-X/1110-S/1110-X Based off UCS C2x0 M3 server Same CIMC/BIOS/firmware Provide 6 x 1G network connections 1110-X 2 x 10G - SP1(7) 10G available only on purchase. No upgrade available. Encryption Accelerator Card for Citrix VPX SP1(7) Virtual Service Blade (VSB) Support 1010/1110-S supports up to /1110-X supports up to

99 Cisco Cloud Services Platform (CSP) Current supported VSBs Nexus 1000V VSM (ESX/HyperV/KVM) Virtual Security Gateway (VSG) Network Analysis Module (NAM) Data Center Network Manager (DCNM) Citrix NetScaler VPX VSB HyperV VXLAN GW Citrix Netscaler Minimum Version SP(6.1) SP1(6.1) SP1(6.2) 107

100 Cisco Cloud Services Platform (CSP) Must be deployed in pairs No option for standalone Deploy in the Aggregation Layer Must be in the same L2 domain for management and control Can be geographically diverse Uses same HA mechanism as VSM with domain-id and control vlan Do not overlap the domain-id between a 1x10 and a VSM What s not supported? Primary and Secondary VSM on same 1x10 Primary VSM on ESX and Secondary VSM on 1x10 or vice versa 108

101 VSB Backups using Import/Export Works with VSM, NAM, and VSG Can Import/Export both primary and secondary Export requires that VSB be shutdown Images are stored in export-import/ dir on bootflash Can be manually copied off to remote storage n1010-1# copy bootflash:export-import vrf management n1010-1(config)# virtual-service-blade training n1010-1(config-vsb-config)# import primary Vdisk4.img.tar.00 Note: import started.. Note: please be patient.. Note: Import cli returns check VSB status for completion 109

102 Network Classes and Topologies Management Carries the mgmt0 interface of the 1x10 Carries the mgmt0 traffic for all VSMs installed Control Carries all the control and packet traffic for the VSMs installed on the 1x10 Carries control traffic for HA between primary and secondary 1x10 Data Used by Virtual Service Blades other than VSM Passthrough Binds physical NIC to VSB 5 Network Topologies choices 110

103 Network Topologies Uplink Type Management VLAN Control VLAN Data VLAN 1 Ports 1 and 2 Ports 1 and 2 Ports 1 and 2 2 Ports 1 and 2 Ports 1 and 2 (HA) Ports 3-6 (LACP) 3 Ports 1 and 2 Ports 3-6 (LACP) Ports 3-6 (LACP) 4 Ports 1 and 2 Ports 3 and 4 Ports 5 and 6 Flexible There is no traffic segregation based on traffic class. *Must use for VXGW deployements. 111

104 Recommendations If you are not planning on using other VSBs Topology 3 gives best bandwidth and redundancy for control VLAN Negative is that is harder to configure If using VXGW, Netscaler, or shared between production / lab network Topology 5 is Flexible Flexible allows any configuration Recommend port-channels Remember VSM latency is key over bandwidth Use VPC or VSS upstream if you have it 112

105 Participate in the My Favorite Speaker Contest Promote Your Favorite Speaker and You Could be a Winner Promote your favorite speaker through Twitter and you could win $200 of Cisco Press products (@CiscoPress) Send a tweet and include Your favorite speaker s Twitter Two hashtags: #CLUS #MyFavoriteSpeaker You can submit an entry for more than one of your favorite speakers Don t forget to View the official rules at 113

106 Complete Your Online Session Evaluation Give us your feedback and you could win fabulous prizes. Winners announced daily. Complete your session evaluation through the Cisco Live mobile app or visit one of the interactive kiosks located throughout the convention center. Don t forget: Cisco Live sessions will be available for viewing on-demand after the event at CiscoLive.com/Online 114

107 Continue Your Education Demos in the Cisco Campus Walk-in Self-Paced Labs Table Topics Moscone Center West 3 rd Floor Lobby Discuss Experiences with Cisco Services with Distinguished Service Engineers Meet the Engineer 1:1 meetings 115

108

109

110 Appendix A L2 Troubleshooting

111 L2 Control VEM VSM Troubleshooting Steps 1. VSM MAC address 2. VSM is connected to vcenter 3. VSM has Control VLAN on right interface 4. Uplink port-profile has Control vlan 5. VEM sees control VLAN 6. VEM and VSM see each others MAC 7. Physical network sees VEM and VSM MAC 8. VSM sees heartbeat messages from VEM 119

112 Step 1: VSM MAC Need for L2 troubleshooting On VSM run show svs neighbors Its the AIPC Interface MAC n1kv-l2# show svs neighbors Active Domain ID: 422 AIPC Interface MAC: a Inband Interface MAC: a

113 Step 2: VSM vcenter Connectivity Verify VSM is connected to vcenter n1kv-l2# show svs connections connection VC: ip address: remote port: 80 protocol: vmware-vim https certificate: default datacenter name: Harrington admin: max-ports: 8192 DVS uuid: 3e ad 9f f9 7f-43 d6 9b 6d a2 af cb 3e config status: Enabled operational status: Connected 121

114 Step 3: Verify VSM VM Control interface 1 st interface listed is Control Interface Interface connected? 122

115 Step 4: Verify Uplink Port-Profile The first ESX interface added to the N1KV must have Control VLAN Verify uplink port-profile has Control VLAN defined and system VLAN n1kv-l2# show run port-profile uplink version 4.2(1)SV1(5.1) port-profile type ethernet uplink vmware port-group switchport mode trunk switchport trunk allowed vlan , no shutdown system vlan 2 state enabled 123

116 Step 5: Verify VEM Sees Control VLAN Verify VEM sees control VLAN with commands vemcmd show card vemcmd show port vemcmd show trunk 124

117 Vemcmd show card Control, packet vlans and domain-id match with VSM [~ # vemcmd show card Card UUID type 2: e Card name: cae-esx-154 Switch name: n1kv-l2 Switch alias: DvsPortset-0 Switch uuid: 3e ad 9f f9 7f-43 d6 9b 6d a2 af cb 3e Card domain: 422 Card slot: 5 VEM Tunnel Mode: L2 Mode VEM Control (AIPC) MAC: 00:02:3d:11:a6:04 VEM Packet (Inband) MAC: 00:02:3d:21:a6:04 VEM Control Agent (DPA) MAC: 00:02:3d:41:a6:04.. MAC the VSM should learn for VEM.. Card control VLAN: 2 Card packet VLAN: 2 125

118 Vemcmd show port-old Ports with LTLs 8, 9,10 are UP and CBL states are 1. ESX Physical ports are UP and CBL states 1. ~ # vemcmd show port-old LTL IfIndex Vlan/ Bndl SG_ID Pinned_SGID Type Admin State CBL Mode Name SegId T VIRT UP UP 1 Trunk vns VIRT UP UP 1 Access VIRT UP UP 1 Access VIRT UP UP 1 Access VIRT UP UP 1 Access VIRT UP UP 1 Access VIRT UP UP 0 Access VIRT UP UP 1 Access VIRT UP UP 1 Access T VIRT UP UP 1 Trunk ar T PHYS UP UP 1 Trunk vmnic0 Local Target Logic (LTL) is an index to address a port, or group of ports. Data path lookup engine takes LTL as input, and gives LTL as output. LTL scheme: [0-14: internal ports] [15-271: pnics,vms, etc ] 126

119 Vemcmd show trunk Control and packet are CBL states 1 on the physical ports. ~ # vemcmd show trunk Trunk port 6 native_vlan 1 CBL 1 vlan(1) cbl 1, vlan(3970) cbl 1, vlan(3969) cbl 1, vlan(3968) cbl 1, vlan(3971) cbl 1, vlan(11) cbl 1, vlan(10) cbl 1, vlan(150) cbl 1, vlan(2) cbl 1, vlan(151) cbl 1, vlan(152) cbl 1, vlan(153) cbl 1, vlan(154) cbl 1, vlan(155) cbl 1, Trunk port 16 native_vlan 1 CBL 1 vlan(1) cbl 1, vlan(3970) cbl 1, vlan(3969) cbl 1, vlan(3968) cbl 1, vlan(3971) cbl 1, vlan(11) cbl 1, vlan(10) cbl 1, vlan(150) cbl 1, vlan(2) cbl 1, vlan(151) cbl 1, vlan(152) cbl 1, vlan(153) cbl 1, vlan(154) cbl 1, vlan(155) cbl 1, Trunk port 17 native_vlan 1 CBL 1 vlan(1) cbl 1, vlan(11) cbl 1, vlan(10) cbl 1, vlan(150) cbl 1, vlan(2) cbl 1, vlan(151) cbl 1, vlan(152) cbl 1, vlan(153) cbl 1, vlan(154) cbl 1, vlan(155) cbl 1, vemcmd show port vlans ~ # vemcmd show port vlans Native VLAN Allowed LTL VSM Port Mode VLAN State Vlans 17 Eth5/1 T 1 FWD 2,10-11, ~ # 127

120 Step 6: VEM and VSM See Each Other s MAC Is the VEM learning the MAC of the VSM? On VEM vemcmd show l2 <control-vlan> do you see the mac of the VSM? ~ # vemcmd show l2 2 Bridge domain 9 brtmax 4096, brtcnt 32, timeout 300 VLAN 2, swbd 2, "" Flags: P - PVLAN S - Secure D - Drop Type MAC Address LTL timeout Flags PVLAN Static 00:02:3d:21:a6: Dynamic 00:50:56:a9:25:

121 VEM and VSM See Each Other s MAC Is the VSM learning the MAC of the VEM? n1kv-l2# show mac address-table vlan 2 VLAN MAC Address Type Age Port Mod d21.a604 static 0 N1KV Internal Port d41.a604 static 0 N1KV Internal Port 5 129

122 Step 7: Physical Switch Mac Table Check the physical switch MAC address table Are the MACs of the VEM and VSM getting learned by the physical switches in the right VLANs? cae-cat6k-1#show mac-address-table vlan 2 Legend: * - primary entry age - seconds since last seen n/a - not available vlan mac address type learn age ports * dynamic Yes 360 Gi3/48 * a dynamic Yes 0 Gi4/9 * static Yes - Switch,Stby-Switch * d41.a604 dynamic Yes 0 Gi1/4 130

123 Step 8: VEM VSM Heartbeat One Heartbeat per second per VEM from VSM Timeout for VEM from VSM is 6 seconds of missed heartbeats After 6 seconds VSM will drop VEM Use vempkt capture to view heartbeats SPAN physical switch ports for heartbeats 131

124 Appendix B Miscellaneous Commands

125 Appendix C VXLAN Multicast

126 VXLAN Configuration: Multicast VMkernel interface to act as VTEP VSM Control Mode should be L3 Multicast for Broadcast traffic IP Multicast forwarding is required Multicast addresses Multiple segments can be mapped to a single multicast group If VXLAN transport is contained to a single VLAN, IGMP Querier must be enabled on that VLAN If VXLAN transport is traversing routers Multicast routing must be enabled. Proxy ARP must also be enabled 1550 MTU for VXLAN encapsulation overhead 134

127 VXLAN Configuration: Multicast Upstream Switch Configuration Enable IGMP Querier Set physical switch port MTU to 1550 Enable proxy-arp on upstream SVI ESXi Host Create VMK interface for VXLAN Nexus 1000V Enable feature segmentation Create a Bridge Domain Create a port-profile for VTEP VMK interface Create a veth port-profile for the VMs 135

128 VXLAN Configuration: Multicast Increase the MTU on your eth port-profile n1kv-l3(config)# port-profile type eth uplink n1kv-l3(config-port-prof)# mtu 1550 Create veth port-profile for VXLAN VMK interface n1kv-l3(config)# port-profile type vethernet VXLAN-VMK n1kv-l3(config-port-prof)# switchport mode access n1kv-l3(config-port-prof)# switchport access vlan 11 n1kv-l3(config-port-prof)# no shutdown n1kv-l3(config-port-prof)# system vlan 11 n1kv-l3(config-port-prof)# vmware port-group n1kv-l3(config-port-prof)# capability vxlan n1kv-l3(config-port-prof)# state enabled 136

129 VXLAN Configuration: Multicast Configure the Bridge Domain Maps a segment ID to a multicast address Segment ID >4096 n1kv-l3(config)# bridge-domain vxlan-1 n1kv-l3(config-bd)# segment id 5000 n1kv-l3(config-bd)# group Create VM port-profile n1kv-l3(config)# port-profile type veth vm-vxlan-1 n1kv-l3(config-port-prof)# vmware port-group n1kv-l3(config-port-prof)# switchport mode access n1kv-l3(config-port-prof)# switchport access bridge-domain vxlan-1 n1kv-l3(config-port-prof)# no shut n1kv-l3(config-port-prof)# state enabled 137

130 VXLAN Troubleshooting Tips Verify your Bridge Domains, VM port-profiles, and VXLAN VMK port-profiles Verify multicast on your upstream switches show ip igmp snooping Do you see the VTEPs Use vmkping on the ESXi host to verify network and MTU Use 1542 to cover the addition of the ICMP header ~ # vmkping -s d Verify the VEM has the right VXLAN capability ~ # vemcmd show vxlan interfaces LTL IP

131 VXLAN Troubleshooting Tips ~ # vemcmd show port vlans LTL VSM Port Mode VLAN/ State Vlans/SegID 17 Eth4/1 T 1 FWD 25, Eth4/2 T 1 FWD 25, Veth19 A 6000 FWD 6000 Verify the VEM was programmed correctly ~ # vemcmd show segment 6000 BD 23, vdc 1, segment id 6000, segment group IP , swbd 4096, 2 ports, "dvs.vcdvsvcdni-6-26-vl634-backed-b69c1d1d-02bf b7e-fa06c64e8c18" Portlist: 53 vse-vcdni-6-26-vl634-backed (b6 68 vcdni-2 (5ac7d73c-d1d ef 139

132 VXLAN Other Useful Commands vemcmd show port vemcmd show igmp <vlan> vemcmd show l2 segment <segment-id> vemcmd show vxlan-encap [ltl/mac] <ltl/mac address> vemcmd show vlxan-stats all Detailed slides in the Appendix 140

133 Appendix D - Additional VXLAN TShoot

Deploying and Troubleshooting the Nexus 1000v Virtual Switch

Deploying and Troubleshooting the Nexus 1000v Virtual Switch Deploying and Troubleshooting the Nexus 1000v Virtual Switch Louis Watta lwatta@cisco.com Twitter @mc68881rc Agenda Current Nexus 1000V Releases and New Features Licensing Virtual Supervisor Module (VSM)

More information

Installing and Configuring VXLAN Gateway

Installing and Configuring VXLAN Gateway Installing and Configuring VXLAN Gateway This chapter contains the following sections: Information About the VXLAN Gateway Deployment, page 1 Guidelines and Limitations, page 2 Configuring VSMs, page 3

More information

Send document comments to Information About Layer 2 Ethernet Switching

Send document comments to Information About Layer 2 Ethernet Switching CHAPTER 8 This chapter describes how to identify and resolve problems that relate to Layer 2 switching. This chapter includes the following sections: Information About Layer 2 Ethernet Switching, page

More information

Deploying and Troubleshooting the Nexus 1000V Virtual Switch

Deploying and Troubleshooting the Nexus 1000V Virtual Switch Deploying and Troubleshooting the Nexus 1000V Virtual Switch 2 Agenda Session Prerequisites Current Nexus 1000V Releases Virtual Supervisor Module (VSM) Virtual Ethernet Module (VEM) Port-Profiles Port

More information

Virtual Security Gateway Overview

Virtual Security Gateway Overview This chapter contains the following sections: Information About the Cisco Virtual Security Gateway, page 1 Cisco Virtual Security Gateway Configuration for the Network, page 10 Feature History for Overview,

More information

Cisco Virtual Networking Solution for OpenStack

Cisco Virtual Networking Solution for OpenStack Data Sheet Cisco Virtual Networking Solution for OpenStack Product Overview Extend enterprise-class networking features to OpenStack cloud environments. A reliable virtual network infrastructure that provides

More information

Virtuální firewall v ukázkách a příkladech

Virtuální firewall v ukázkách a příkladech Praha, hotel Clarion 10. 11. dubna 2013 Virtuální firewall v ukázkách a příkladech T-SEC3 / L2 Tomáš Michaeli Cisco 2013 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 1 Agenda VXLAN

More information

Architecting Scalable Clouds using VXLAN and Nexus 1000V

Architecting Scalable Clouds using VXLAN and Nexus 1000V Architecting Scalable Clouds using VXLAN and Nexus 1000V Lawrence Kreeger Principal Engineer Agenda Session Is Broken Into 3 Main Parts Part 1: VXLAN Overview What is a VXLAN? Why VXLANs? What is VMware

More information

Cisco HyperFlex Systems

Cisco HyperFlex Systems White Paper Cisco HyperFlex Systems Converting to Cisco Nexus 1000V Distributed Switches for Cisco HyperFlex Virtual Machine Guest and VMware vmotion Networks Author: Hui Chen October 2016 2016 Cisco and/or

More information

Cisco Virtual Networking Solution Nexus 1000v and Virtual Services. Abhishek Mande Engineer

Cisco Virtual Networking Solution Nexus 1000v and Virtual Services. Abhishek Mande Engineer Cisco Virtual Networking Solution Nexus 1000v and Virtual Services Abhishek Mande Engineer mailme@cisco.com Agenda Application requirements in virtualized DC The Anatomy of Nexus 1000V Virtual Services

More information

Nexus 7000 F3 or Mx/F2e VDC Migration Use Cases

Nexus 7000 F3 or Mx/F2e VDC Migration Use Cases Nexus 7000 F3 or Mx/F2e VDC Migration Use Cases Anees Mohamed Network Consulting Engineer Session Goal M1 VDC M1/M2 VDC M2/F3 VDC M1/F1 VDC M1/M2/F2e VDC F2/F2e/F3 VDC F2 VDC F3 VDC You are here This Session

More information

Nexus 1000V in Context of SDN. Martin Divis, CSE,

Nexus 1000V in Context of SDN. Martin Divis, CSE, Nexus 1000V in Context of SDN Martin Divis, CSE, mdivis@cisco.com Why Cisco Nexus 1000V Losing the Edge Server Admin Host Host Host Host Server Admin manages virtual switching! vswitch vswitch vswitch

More information

Network Services in Virtualized Data Center

Network Services in Virtualized Data Center Network Services in Virtualized Data Center Tomáš Michaeli Consulting Systems Engineer, DCV Central / Czech republic 21 Mar 2012 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 Almost

More information

Hypervisors networking: best practices for interconnecting with Cisco switches

Hypervisors networking: best practices for interconnecting with Cisco switches Hypervisors networking: best practices for interconnecting with Cisco switches Ramses Smeyers Customer Support Engineer Agenda What is this session about? Networking virtualization concepts Hypervisor

More information

Deploying and Troubleshooting the Nexus 1000v Virtual Switch on vsphere

Deploying and Troubleshooting the Nexus 1000v Virtual Switch on vsphere Deploying and Troubleshooting the Nexus 1000v Virtual Switch on vsphere 2 3 4 Agenda Implement The Deployment Optimise and Sustain HA Best Practices Tools Operate Troubleshooting 5 Session Prerequisites

More information

Inside the Nexus 1000V Virtual Switch

Inside the Nexus 1000V Virtual Switch Inside the Nexus 1000V Virtual Switch BRKVIR-2012 www.ciscolivevirtual.com Agenda Nexus 1000V Why Nexus 1000V? VSMs, VEMs, and Port Profiles VMotion Physical Host Connectivity Port Channels and Upstream

More information

Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4)

Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4) Cisco Nexus 1000V Installation and Upgrade Guide, Release 5.2(1)SV3(1.4) First Published: April 17, 2015 Last Modified: August 27, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Table of Contents HOL-PRT-1305

Table of Contents HOL-PRT-1305 Table of Contents Lab Overview... 2 - Abstract... 3 Overview of Cisco Nexus 1000V series Enhanced-VXLAN... 5 vcloud Director Networking and Cisco Nexus 1000V... 7 Solution Architecture... 9 Verify Cisco

More information

Cisco Virtual Security Gateway Deployment Guide VSG 1.4

Cisco Virtual Security Gateway Deployment Guide VSG 1.4 Deployment Guide Cisco Virtual Security Gateway Deployment Guide VSG 1.4 Deployment Guide 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 33

More information

Cisco Nexus 1000V for VMware vsphere VDP Configuration Guide, Release 5.x

Cisco Nexus 1000V for VMware vsphere VDP Configuration Guide, Release 5.x Cisco Nexus 1000V for VMware vsphere VDP Configuration Guide, Release 5.x First Published: August 12, 2014 Last Modified: November 10, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive

More information

Layer 2 Implementation

Layer 2 Implementation CHAPTER 3 In the Virtualized Multiservice Data Center (VMDC) 2.3 solution, the goal is to minimize the use of Spanning Tree Protocol (STP) convergence and loop detection by the use of Virtual Port Channel

More information

Cisco Nexus 1100 Series Virtual Services Appliances

Cisco Nexus 1100 Series Virtual Services Appliances Deployment Guide Cisco Nexus 1100 Series Virtual Services Appliances Deployment Guide Version 1.0 June 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

More information

Dell EMC. VxBlock Systems for VMware NSX 6.2 Architecture Overview

Dell EMC. VxBlock Systems for VMware NSX 6.2 Architecture Overview Dell EMC VxBlock Systems for VMware NSX 6.2 Architecture Overview Document revision 1.6 December 2018 Revision history Date Document revision Description of changes December 2018 1.6 Remove note about

More information

CCIE Data Center Written Exam ( ) version 1.0

CCIE Data Center Written Exam ( ) version 1.0 CCIE Data Center Written Exam (350-080) version 1.0 Exam Description: The Cisco CCIE Data Center Written Exam (350-080) version 1.0 is a 2-hour test with 80 110 questions that will validate that a data

More information

Configuring Virtual Service Blades

Configuring Virtual Service Blades CHAPTER 4 This chapter describes how to create and configure virtual service blades and includes the following sections: Information About Virtual Service Blades, page 4-1 Guidelines and Limitations, page

More information

vsphere Networking Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 EN

vsphere Networking Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 EN Update 2 VMware vsphere 5.5 VMware ESXi 5.5 vcenter Server 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels Configuring Virtual Port Channels This chapter describes how to configure virtual port channels (vpcs) on Cisco Nexus 5000 Series switches. It contains the following sections: Information About vpcs, page

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 642-999 EXAM QUESTIONS & ANSWERS Number: 642-999 Passing Score: 800 Time Limit: 90 min File Version: 32.5 http://www.gratisexam.com/ Sections 1. Questions 2. Drag & Drop 3. Hot Spot CISCO 642-999

More information

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN

vsphere Networking Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 EN Update 1 ESXi 5.1 vcenter Server 5.1 vsphere 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check

More information

Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a)

Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a) Cisco Nexus 1000V Getting Started Guide, Release 4.2(1) SV1(4a) October 18, 2011 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Installing and Configuring Licenses

Installing and Configuring Licenses This chapter contains the following sections: Information About Installing and Upgrading s, page 1 Licensing Guidelines and Limitations, page 2 Default Configuration Settings, page 3 Obtaining and Installing

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme NET1350BUR Deploying NSX on a Cisco Infrastructure Jacob Rapp jrapp@vmware.com Paul A. Mancuso pmancuso@vmware.com #VMworld #NET1350BUR Disclaimer This presentation may contain product features that are

More information

Integration of Hypervisors and L4-7 Services into an ACI Fabric. Azeem Suleman, Principal Engineer, Insieme Business Unit

Integration of Hypervisors and L4-7 Services into an ACI Fabric. Azeem Suleman, Principal Engineer, Insieme Business Unit Integration of Hypervisors and L4-7 Services into an ACI Fabric Azeem Suleman, Principal Engineer, Insieme Business Unit Agenda Introduction to ACI Review of ACI Policy Model Hypervisor Integration Layer

More information

Cisco Nexus 1000V InterCloud

Cisco Nexus 1000V InterCloud Deployment Guide Cisco Nexus 1000V InterCloud Deployment Guide (Draft) June 2013 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 49 Contents

More information

Configuring VM-FEX. Information About VM-FEX. VM-FEX Overview. VM-FEX Components. This chapter contains the following sections:

Configuring VM-FEX. Information About VM-FEX. VM-FEX Overview. VM-FEX Components. This chapter contains the following sections: This chapter contains the following sections: Information About VM-FEX, page 1 Licensing Requirements for VM-FEX, page 3 Default Settings for VM-FEX, page 3, page 4 Verifying the VM-FEX Configuration,

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme NET1927BU vsphere Distributed Switch Best Practices for NSX Gabriel Maciel VMware, Inc. @gmaciel_ca #VMworld2017 #NET1927BU Disclaimer This presentation may contain product features that are currently

More information

Page 2

Page 2 Page 2 Mgmt-B, vmotion-a vmotion-b VMM-Pool-B_ Connection-B -Set-A Uplink-Set-A Uplink-Set-B ACI-DC Standard Aggregation L3 Switch Configuration for existing Layer 2 : Nexus 6K-01 switch is

More information

Cisco ACI with Cisco AVS

Cisco ACI with Cisco AVS This chapter includes the following sections: Cisco AVS Overview, page 1 Cisco AVS Installation, page 6 Key Post-Installation Configuration Tasks for the Cisco AVS, page 43 Distributed Firewall, page 62

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

VMware vsphere Administration Training. Course Content

VMware vsphere Administration Training. Course Content VMware vsphere Administration Training Course Content Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Fast Track Course Duration : 10 Days Class Duration : 8 hours

More information

Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d)

Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d) Cisco Nexus 1000V Software Upgrade Guide, Release 4.0(4)SV1(3d) Revised: May 21, 2011 This document describes how to upgrade the Cisco Nexus 1000V software on a Virtual Supervisor Module (VSM) virtual

More information

Configuring the Software Using the GUI

Configuring the Software Using the GUI CHAPTER 3 This chapter describes how to use the GUI application to complete the Cisco Nexus 1000V configuration, and includes the following sections. GUI Software Configuration Process, page 3-2 Guidelines

More information

Cisco HyperFlex Systems

Cisco HyperFlex Systems White Paper Cisco HyperFlex Systems Install and Manage Cisco HyperFlex Systems in a Cisco ACI Environment Original Update: January 2017 Updated: March 2018 Note: This document contains material and data

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 642-995 Exam Questions & Answers Number: 642-995 Passing Score: 800 Time Limit: 120 min File Version: 36.9 http://www.gratisexam.com/ Exam Code: 642-995 Exam Name: Unified Computing Troubleshoot

More information

Nexus 1000v ERSPAN. - Original version

Nexus 1000v ERSPAN. - Original version Document Number Based on Template Created By EDCS-XXXXXX EDCS-XXXX Rev X Matthew Wronkowski mwronkow@cisco.com Nexus 1000v ERSPAN This document describes the configuration for ERSPAN sessions created on

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Configuring vpcs, page 11 Verifying the vpc Configuration, page 25 vpc Default

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme STO1193BU A Closer Look at vsan Networking Design and Configuration Considerations Cormac Hogan Andreas Scherr VMworld 2017 Content: Not for publication #VMworld #STO1193BU Disclaimer This presentation

More information

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing

More information

Troubleshooting Licensing Issues

Troubleshooting Licensing Issues 4 CHAPTER This chapter describes how to troubleshoot issues that are related to firewall licensing on the Virtual Supervisor Module (VSM). This chapter includes the following sections: Information About

More information

Virtualization Design

Virtualization Design VMM Integration with UCS-B, on page 1 VMM Integration with AVS or VDS, on page 3 VMM Domain Resolution Immediacy, on page 6 OpenStack and Cisco ACI, on page 8 VMM Integration with UCS-B About VMM Integration

More information

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV.

Enterprise. Nexus 1000V. L2/L3 Fabric WAN/PE. Customer VRF. MPLS Backbone. Service Provider Data Center-1 Customer VRF WAN/PE OTV OTV. 2 CHAPTER Cisco's Disaster Recovery as a Service (DRaaS) architecture supports virtual data centers that consist of a collection of geographically-dispersed data center locations. Since data centers are

More information

"Charting the Course... Troubleshooting Cisco Data Center Infrastructure v6.0 (DCIT) Course Summary

Charting the Course... Troubleshooting Cisco Data Center Infrastructure v6.0 (DCIT) Course Summary Description Troubleshooting Cisco Data Center Infrastructure v6.0 (DCIT) Course Summary v6.0 is a five-day instructor-led course that is designed to help students prepare for the Cisco CCNP Data Center

More information

Configuring SPAN. About SPAN. SPAN Sources

Configuring SPAN. About SPAN. SPAN Sources This chapter describes how to configure an Ethernet switched port analyzer (SPAN) to analyze traffic between ports on Cisco NX-OS devices. This chapter contains the following sections: About SPAN, page

More information

vsphere Networking 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vsphere Networking 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

Access Policies configured and interfaces up and in service EPG, Bridge Domain (BD) and Virtual Routing and Forwarding (VRF) already configured

Access Policies configured and interfaces up and in service EPG, Bridge Domain (BD) and Virtual Routing and Forwarding (VRF) already configured Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configurations Verify Troubleshoot Related Information Introduction This document decribes how to deploy an Application

More information

vsphere Networking Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5

vsphere Networking Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 Update 1 Modified on 04 OCT 2017 VMware vsphere 6.5 VMware ESXi 6.5 vcenter Server 6.5 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs vpc Overview Information About vpcs, on page 1 Guidelines and Limitations for vpcs, on page 11 Verifying the vpc Configuration, on page

More information

Upgrading the Cisco VSG and the Cisco Prime NSC

Upgrading the Cisco VSG and the Cisco Prime NSC Upgrading the Cisco VSG and the Cisco Prime NSC This chapter contains the following sections: Complete Upgrade Procedure, page 1 Upgrade Guidelines and Limitations, page 2 VSG Environment Upgrade Matrix

More information

Cisco ACI and Cisco AVS

Cisco ACI and Cisco AVS This chapter includes the following sections: Cisco AVS Overview, page 1 Installing the Cisco AVS, page 5 Key Post-Installation Configuration Tasks for the Cisco AVS, page 14 Distributed Firewall, page

More information

Configuring Virtual Port Channels

Configuring Virtual Port Channels This chapter contains the following sections: Information About vpcs, page 1 Guidelines and Limitations for vpcs, page 10 Verifying the vpc Configuration, page 11 vpc Default Settings, page 16 Configuring

More information

Configuring L3 Forwarding

Configuring L3 Forwarding This chapter contains the following sections: Layer 3 Forwarding Overview, page 1 Enabling and Verifying Layer 3 Forwarding, page 3 Viewing Layer 3 Forwarding Information, page 4 Monitoring Layer 3 Forwarding

More information

CISCO EXAM QUESTIONS & ANSWERS

CISCO EXAM QUESTIONS & ANSWERS CISCO 642-999 EXAM QUESTIONS & ANSWERS Number: 642-999 Passing Score: 800 Time Limit: 90 min File Version: 32.5 http://www.gratisexam.com/ Sections 1. Questions 2. Drag & Drop 3. Hot Spot CISCO 642-999

More information

Dell EMC. VxBlock Systems for VMware NSX 6.3 Architecture Overview

Dell EMC. VxBlock Systems for VMware NSX 6.3 Architecture Overview Dell EMC VxBlock Systems for VMware NSX 6.3 Architecture Overview Document revision 1.1 March 2018 Revision history Date Document revision Description of changes March 2018 1.1 Updated the graphic in Logical

More information

Service Graph Design with Cisco Application Centric Infrastructure

Service Graph Design with Cisco Application Centric Infrastructure White Paper Service Graph Design with Cisco Application Centric Infrastructure 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 101 Contents Introduction...

More information

Implementing VXLAN in DataCenter

Implementing VXLAN in DataCenter Implementing VXLAN in DataCenter LTRDCT-1223 Lilian Quan Technical Marketing Engineering, INSBU Erum Frahim Technical Leader, ecats John Weston Technical Leader, ecats Why Overlays? Robust Underlay/Fabric

More information

Service Oriented Virtual DC Design

Service Oriented Virtual DC Design Dubrovnik, Croatia, South East Europe 20-22 May, 2013 Service Oriented Virtual DC Design Višnja Milovanović Consulting Systems Engineer Data Center & Virtualization 2011 2012 Cisco and/or its affiliates.

More information

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Cisco Nexus 1000V Switch for Microsoft Hyper-V Q&A Cisco Nexus 1000V Switch for Microsoft Hyper-V Overview Q. What are Cisco Nexus 1000V Switches? A. Cisco Nexus 1000V Switches provide a comprehensive and extensible architectural platform for virtual

More information

Hybrid Clouds: Integrating the Enterprise Data Center and the Public Cloud

Hybrid Clouds: Integrating the Enterprise Data Center and the Public Cloud Hybrid Clouds: Integrating the Enterprise Data Center and the Public Cloud Usha Ramachandran, Technical Marketing Engineer Session Abstract In this session, participants will learn how to create hybrid

More information

Provisioning Overlay Networks

Provisioning Overlay Networks This chapter has the following sections: Using Cisco Virtual Topology System, page 1 Creating Overlays, page 2 Creating Network using VMware, page 4 Creating Subnetwork using VMware, page 4 Creating Routers

More information

Configuring Port Channels

Configuring Port Channels CHAPTER 5 This chapter describes how to configure port channels and to apply and configure the Link Aggregation Control Protocol (LACP) for more efficient use of port channels in Cisco DCNM. For more information

More information

Configuring Q-in-Q VLAN Tunnels

Configuring Q-in-Q VLAN Tunnels Information About Q-in-Q Tunnels, page 1 Licensing Requirements for Interfaces, page 7 Guidelines and Limitations, page 7 Configuring Q-in-Q Tunnels and Layer 2 Protocol Tunneling, page 8 Configuring Q-in-Q

More information

Enabling vtracker. This chapter contains the following sections:

Enabling vtracker. This chapter contains the following sections: This chapter contains the following sections: Information About vtracker, page 2 Guidelines and Limitations, page 2 Default Settings for vtracker Parameters, page 3 Globally, page 3 Upstream View, page

More information

Using VM-FEX. Information About VM-FEX. VN-Link. Send comments to CHAPTER

Using VM-FEX. Information About VM-FEX. VN-Link. Send comments to CHAPTER CHAPTER 2 This chapter describes how to use the Cisco Virtual Machine Fabric Extender (VM-FEX). This chapter includes the following sections: Information About VM-FEX, page 2-1 Hardware and Software Requirements,

More information

Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV2(2.2)

Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV2(2.2) Cisco Nexus 1000V System Management Configuration Guide, Release 4.2(1)SV2(2.2) First Published: January 30, 2014 Last Modified: October 20, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Configuring SPAN. Finding Feature Information. About SPAN. SPAN Sources

Configuring SPAN. Finding Feature Information. About SPAN. SPAN Sources This chapter describes how to configure an Ethernet switched port analyzer (SPAN) to analyze traffic between ports on Cisco NX-OS devices. Finding Feature Information, on page 1 About SPAN, on page 1 Licensing

More information

Configuring Private VLANs Using NX-OS

Configuring Private VLANs Using NX-OS This chapter describes how to configure private VLANs on Cisco NX-OS devices. Private VLANs provide additional protection at the Layer 2 level. This chapter includes the following sections: Finding Feature

More information

Migration from Classic DC Network to Application Centric Infrastructure

Migration from Classic DC Network to Application Centric Infrastructure Migration from Classic DC Network to Application Centric Infrastructure Kannan Ponnuswamy, Solution Architect, Cisco Advanced Services Acronyms IOS vpc VDC AAA VRF STP ISE FTP ToR UCS FEX OTV QoS BGP PIM

More information

Cisco Nexus 1000V for KVM Interface Configuration Guide, Release 5.x

Cisco Nexus 1000V for KVM Interface Configuration Guide, Release 5.x Cisco Nexus 1000V for KVM Interface Configuration Guide, Release 5.x First Published: August 01, 2014 Last Modified: November 09, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San

More information

Configuring DHCP Snooping

Configuring DHCP Snooping This chapter contains the following sections: Information About DHCP Snooping, page 1 DHCP Overview, page 2 BOOTP Packet Format, page 4 Trusted and Untrusted Sources, page 6 DHCP Snooping Binding Database,

More information

Cisco Nexus 1000V Series Switches

Cisco Nexus 1000V Series Switches Cisco Nexus 1000V Series Switches Product Overview Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vsphere environments

More information

Configuring Virtual Ethernet Interfaces

Configuring Virtual Ethernet Interfaces CHAPTER 4 This chapter describes how to configure virtual Ethernet (vethernet or veth) interfaces. This chapter includes the following sections: Information About vethernet Interfaces, page 4-1 Guidelines

More information

Cisco ACI Virtual Machine Networking

Cisco ACI Virtual Machine Networking This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine

More information

Data Center Configuration. 1. Configuring VXLAN

Data Center Configuration. 1. Configuring VXLAN Data Center Configuration 1. 1 1.1 Overview Virtual Extensible Local Area Network (VXLAN) is a virtual Ethernet based on the physical IP (overlay) network. It is a technology that encapsulates layer 2

More information

New Features in VMware vsphere (ESX 4)

New Features in VMware vsphere (ESX 4) New Features in VMware vsphere (ESX 4) VMware vsphere Fault Tolerance FT VMware Fault Tolerance or FT is a new HA solution from VMware for VMs. It is only available in vsphere 4 and above and provides

More information

Network Virtualization

Network Virtualization Network Virtualization Petr Grygárek 1 Traditional Virtualization Techniques Network Virtualization Implementation of separate logical network environments (Virtual Networks, VNs) for multiple groups on

More information

Nexus 1000V on Hyper V Troubleshoot Guide

Nexus 1000V on Hyper V Troubleshoot Guide Nexus 1000V on Hyper V Troubleshoot Guide Document ID: 116402 Contributed by Louis Watta and Matthew Wronkowski, Cisco TAC Engineers. Oct 01, 2013 Contents Introduction Prerequisites Requirements Components

More information

vsphere Networking for the Network Admin Jason Nash, Varrow CTO

vsphere Networking for the Network Admin Jason Nash, Varrow CTO vsphere Networking for the Network Admin Jason Nash, Varrow CTO Agenda What is virtualization? How does virtualization impact the network team? How should you approach virtualization? vsphere 101 Where

More information

Cisco ACI Virtual Machine Networking

Cisco ACI Virtual Machine Networking This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine

More information

UCS with VMware ESXi End to End Jumbo MTU Configuration Example

UCS with VMware ESXi End to End Jumbo MTU Configuration Example UCS with VMware ESXi End to End Jumbo MTU Configuration Example Document ID: 117601 Contributed by Vishal Mehta, Cisco TAC Engineer. Apr 09, 2014 Contents Introduction Prerequisites Requirements Components

More information

Troubleshooting Licensing Issues

Troubleshooting Licensing Issues CHAPTER 4 This chapter describes how to identify and resolve problems related to firewall licensing on the Virtual Supervisor Module (VSM). This chapter includes the following sections: Information about

More information

VSB Backup and Recovery

VSB Backup and Recovery CHAPTER 6 This chapter describes how to backup and recover a VSB, and includes the following sections: Information About, page 6-1 Guidelines and Limitations, page 6-1 Configuring VSB Backup and Restoration,

More information

Network Design Considerations for VMware Deployments. Koo Juan Huat

Network Design Considerations for VMware Deployments. Koo Juan Huat Network Design Considerations for VMware Deployments Koo Juan Huat juanhuat@cisco.com 1 Agenda VMware Architecture and Components VMware LAN Networking vswitch Basics NIC Teaming vswitch vs LAN Switch

More information

Configuring Q-in-Q VLAN Tunnels

Configuring Q-in-Q VLAN Tunnels This chapter describes how to configure Q-in-Q VLAN tunnels. Finding Feature Information, page 1 Feature History for Q-in-Q Tunnels and Layer 2 Protocol Tunneling, page 1 Information About Q-in-Q Tunnels,

More information

VMware vsphere 5.5 VXLAN Networking and Emulex OneConnect OCe14000 Ethernet Adapters

VMware vsphere 5.5 VXLAN Networking and Emulex OneConnect OCe14000 Ethernet Adapters VMware vsphere 5.5 VXLAN Networking and Emulex OneConnect OCe14000 Ethernet Adapters Configuring VXLAN with Emulex OneConnect OCe14000 Adapters Emulex OneConnect Network Adapters Table of contents 1.0

More information

VXLAN Design with Cisco Nexus 9300 Platform Switches

VXLAN Design with Cisco Nexus 9300 Platform Switches Guide VXLAN Design with Cisco Nexus 9300 Platform Switches Guide October 2014 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 39 Contents What

More information

Cisco ACI Virtual Machine Networking

Cisco ACI Virtual Machine Networking This chapter contains the following sections: Cisco ACI VM Networking Supports Multiple Vendors' Virtual Machine Managers, page 1 Virtual Machine Manager Domain Main Components, page 2 Virtual Machine

More information

Questions & Answers

Questions & Answers 642-999 Questions & Answers Number: 642-999 Passing Score: 800 Time Limit: 90 min File Version: 36.6 http://www.gratisexam.com/ 642-999 Questions & Answers Exam Name: Implementing Cisco Data Center Unified

More information

2V0-642 vmware. Number: 2V0-642 Passing Score: 800 Time Limit: 120 min.

2V0-642 vmware. Number: 2V0-642 Passing Score: 800 Time Limit: 120 min. 2V0-642 vmware Number: 2V0-642 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 A network administrator has been tasked with deploying a 3-tier application across two data centers. Tier-1 and tier-2

More information

Cisco Certdumps Questions & Answers - Testing Engine

Cisco Certdumps Questions & Answers - Testing Engine Cisco Certdumps 642-996 Questions & Answers - Testing Engine Number: 642-996 Passing Score: 797 Time Limit: 120 min File Version: 16.8 http://www.gratisexam.com/ Sections 1. A 2. B 3. C 4. Exhibit Case

More information

VXLAN Deployment Use Cases and Best Practices

VXLAN Deployment Use Cases and Best Practices VXLAN Deployment Use Cases and Best Practices Azeem Suleman Solutions Architect Cisco Advanced Services Contributions Thanks to the team: Abhishek Saxena Mehak Mahajan Lilian Quan Bradley Wong Mike Herbert

More information