Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Blade Servers
July 2008
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 2
Key Requirements in Blade ServerEnvironments
Reduce the Proliferation of Blade Switches for Ethernetand Fibrechannel environments
More VMs per Blade Servers, means more need forbandwidth => Provide more uplink bandwidth capacity(less oversubscription)
Being able to swap blades with minimal changes to theEthernet configuration and minimal changes to the LUNmasking and Fibrechannel Zoning
Preserve Granularity of Zoning when using VMWARErunning on top of Blade Servers
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 3
Agenda
Problem Statement
Cisco Solution for LAN
Cisco Solution for SAN
Cisco Solution to Server Mobility
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 4
Cisco Solution forCable Reduction andmanageability
Catalyst Blade SwitchCBS3120 for LAN
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 5
Feedback from Ethernet Blade Server Customers
Switch Proliferation
Increases Network Complexity - Larger L2 and L3 domains where convergenceand stability are concerns
Increases operational Management Headaches
Growing Bandwidth needs
Server virtualization and multi-core CPUs are driving more bandwidth fromeach server and out of the rack.
Uplink cost
Each Blade Switch needs at least one 10GE Uplink or multiple GE Uplinks
Feature Consistency with DC Catalyst Products
2 switches per row
2 switches per rack
8 switches per rack
Ethernet Data Center access architectures
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6
Introducing Cisco Virtual Blade Switch (VBS)Overview of Concept and Benefits
Management Simplification– Operational simplification
• Single switch per rack to manage
• True Plug-n-Play of switches
– Design Simplification:
• Sharing Uplinks helps reduce cables
• Reduction in # of logical nodes in L2/L3 network helpsimprove network convergence
– Operational Consistency
• Familiar IOS CLI, MIBs and management tools likeCiscoWorks
• Consistent End-to-end features and functionality
Performance & Scalability
– Up to 160G configurable bandwidth out of rack
– Rack switch allows server to double bandwidth with noadditional cost
Reduce CAPEX– Mix-n-match of GE & 10G uplink switches
– Sharing of uplinks reduces overall network infrastructurecost
Virtual BladeSwitch
TraditionalBlade Switch
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7
Cisco Catalyst BladeSwitch 3120 for HPProduct Overview
2x10GE X2uplinks
10G Virtual Blade Switch (CBS3120X)
GE Virtual Blade Switch (CBS3120G)
4xRJ45ports
Up to 4 SFP 4xRJ45ports
Key Customer Value Prop
Management Simplification– Operational simplification
• Single switch per rack
• True Plug-n-Play of switches
– Design Simplification:
• Share Uplinks to reduce cables
• Reduce # of nodes for L2/L3
– Operational Consistency
• Familiar IOS CLI, MIBs and tools
• Consistent End-to-end features
Performance & Scalability
– Up to 160G bandwidth out of rack
– Double bandwidth from each server
Reduce CAPEX– Mix-n-match of GE & 10G switches
– Share uplinks to reduce overall cost
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 8
With VSL on Cat 6K,all links utilized
Topology showing Benefits of Cisco NG Rack Switch
Distribution Layer
GreaterServer BW –via Active-
Active ServerConnectivity
HigherResiliency
withEtherchannel
Local Traffic doesn’t go todistribution switch
Mix-n-match GE & 10GEswitches
Single Switch / Node (forSpanning Tree or Layer 3)
AccessLayer
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9
“Multiple Deployment Options for Customers”Caters to Different Customer Needs
Common Scenario
Single VirtualBlade switch
Cost Effective
Separate Rings
Separate VBS
More resilient
4 NIC server Scenario
More Server Bandwidth– VMware
Creates smaller Rings
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10
Too many switches?Solution: 3 switches to manage
Cisco director-class -- 336 downlinks
336 servers
1 switch to manage
Cisco 3120 -- 16 downlinks
(336/16)/8
4 switches to manage for the same
number of downlinks!
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11
Cisco Network Assistant (CNA 5.0) on EthernetBlade Switch
Benefit:Manage multiple bladeswitches easily
Cost:Free Tool
What:• Mgmt Tool to allow InteractiveConfiguration, Topology/FrontPanel View, Monitoring,Troubleshooting and NetworkMaintenance• Supports up to 40 switches• Examples:
• Apply multiple port configs onmultiple switches• Health Monitoring• OS upgrades
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
Agenda
Problem Statement
Cisco Solution for LAN
Cisco Solution for SAN
Cisco Solution to Server Mobility
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13
Domain ID scalability:
Catalyst Blade Switch9124e for SAN
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14
Domain ID ScalabilityCisco Solution
F-Port
MDS Switch orNon-Cisco Switch
NPIV enabled
Server 1
Server 2
Server N
FC BladeSwitch 1…
…
FC BladeSwitch 2…
N-Ports
Blade Chassis
F-Ports
…
…
NP ports
SAN
Fabric
F-Ports
F-Port
Eliminates Domain ID for MDS FC switch in BladeCenter – HBA model.
Server ports automatically assigned to NP ports (load balancingalgorithm).
Need to configure the same VSAN between NP ports and core F-ports
In SANOS 3.2 one VSAN per uplink. When F-trunking will be availablethe limitation will go away.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
N-Port ID Virtualization (NPIV)
Mechanism to assign multiple N_Port_IDs to a single N_Port
Allows all the Access control, Zoning, Port Security (PSM)be implemented on application level
Multiple N_Port_IDs are allocated in the same VSAN
Support for NESTED NPIV
Application Server FC Switch
Web
File Services
Email I/O
N_Port_ID 1
Web I/O
N_Port_ID 2
File Services I/O
N_Port_ID 3
F_Port
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16
Agenda
Problem Statement
Cisco Solution for LAN
Cisco Solution for SAN
Cisco Solution to Server Mobility
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
Cisco Solutions forServer Mobility
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18
SANOS 3.2(2): Flex AttachFlexAttach Port (virtual PWWN)
– Creation of virtual PWWN on NPV switch F-port
– Zone vPWWN to storage
– LUN masking is done on vPWWN
– Can swap Blade Server or replace physical HBA (equivalent to HP VC)
• No need for zoning modification
• No LUN masking change required
– Automatic link to new PWWN
• Unlike SDV, which is manual re-linking to new PWWN
FC1/1
PW
WN
1
Server 1
vPWWN1 FC1/1
PW
WN
2Server 1
vPWWN1
Before After
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19
Cisco VFrame Data Center Support
Cisco VFrame Data CenterNetwork-Driven Service Orchestration
SOI ControlLayer
Storage Pool
SANNAS
Server Pool Network Pool
Data Center Networked Infrastructure
MonitoringIBM Tivoli, HP Openview,
BMC Patrol, CA Unicenter
Business ServiceManagement
Mercury,Tideway, BMC
Management and Monitoring
Element ManagersCisco Fabric Manager, VMS,
CiscoWorks, ANM
Virtualization
ManagersVMware VirtualCenter
Orchestrate acrossinfrastructure resources
Platform for serviceabstraction
Integrate with othermanagement systems
VFrame DC 1.2 (Q1CY08) supports Ethernet/FC Blade Switches
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20
Server Virtualization
July 2008
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21
Virtualization
CPU
mem
ory
Mofied Stripped Down OS with
Hypervisor
Guest OS
App
VM
CPU
mem
ory
Host OS
VM
Hypervisor
VMware Microsoft
CPU
mem
ory
Modified OS
App
VM
Mofied Stripped Down OS with
Hypervisor
XEN akaParavirtualization
Guest OS
App
Guest OS
App
Guest OS
App
Modified OS
App
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22
VMware Virtualization Layer
Migration
VMotion, aka VM Migration allows aVM to be reallocated on a differentHardware without having tointerrupt service.
Downtime in the order of fewmilliseconds to few minutes,not hours or days
Can be used to performMaintenance on a server,
Can be used to shift workloadsmore efficiently
2 types of Migration:
VMotion Migration
Regular Migration
VMware Virtualization LayerOS OS C
on
so
leO
S
OS
App. App. App.
CPUm
emory
CPUm
emory
Co
ns
ole
OS
Hypervisor Hypervisor
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23
VMware Architecture in a Nutshell
ESX Server Host
VirtualMachines
…
ProductionNetwork
MgmtNetwork
VM KernelNetwork
OS OS OS
ConsoleOS
App. App. App.
VM Virtualization Layer
Physical Hardware
CPU
mem
ory
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 24
VMware HA Clustering
CPU
mem
ory
ESX Host 2
Hypervisor
CPU
mem
ory
ESX Host 1
Hypervisor
Guest OS
App1
Guest OS
App2
CPU
mem
ory
ESX Host 3
Hypervisor
Guest OS
App3
Guest OS
App4
Guest OS
App5Guest OS
App1
Guest OS
App2
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 25
Application-level HA clustering(Provided by MSCS, Veritas etc…)
CPU
mem
ory
ESX Host 2
Hypervisor
CPU
mem
ory
ESX Host 1
Hypervisor
Guest OS
App1
Guest OS
App2
CPU
mem
ory
ESX Host 3
Hypervisor
Guest OS
App3
Guest OS
App4
Guest OS
App5
Guest OS
App1
Guest OS
App2
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 26
Agenda
VMware Networking
vSwitch Basics
NIC Teaming
vSwitch vs LAN Switch
Cisco/VMware DC DESIGNS
SAN Designs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 27
VMware Networking ComponentsPer ESX-server configuration
VMNICS = uplinksvSwitchVMs
vmnic0
vmnic1
vNIC
vNIC
Virtual Ports
VM_LUN_0007
VM_LUN_0005
vSwitch0
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 28
vNIC MAC Address
VM’s MAC addressautomatically generated
Mechanisms to avoid MACcollision
VM’s MAC address doesn’tchange with migration
VM’s MAC addresses can bemade static by modifying theconfiguration files
ethernetN.address =00:50:56:XX:YY:ZZ
/vmfs/volumes/46b9d79a-2de6e23e-929d-001b78bb5a2c/VM_LUN_0005/VM_LUN_0005.vmx
ethernet0.addressType = "vpx"
ethernet0.generatedAddress ="00:50:56:b0:5f:24„
ethernet0.addressType =„static“
ethernet0.address ="00:50:56:00:00:06„
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 29
vSwitch Forwarding Characteristics
Forwarding based on MAC address (No Learning):If traffic doesn’t match a VM MAC is sent out to vmnic
VM-to-VM traffic stays local
Vswitches TAG traffic with 802.1q VLAN ID
vSwitches are 802.1q Capable
vSwitches can create Etherchannels
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 30
vSwitch Creation
YOU DON’T HAVE TO SELECT A NIC
This is just a name
vswitch
Select the Port-Group by specifying theNETWORK LABEL
vNICs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 31
VM Port-Group vSwitch
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 32
VLAN’s - External Switch Tagging - EST
PhysicalSwitches
VLAN tagging andstripping is done by thephysical switch
No ESX configurationrequired as the server isnot tagging
The number of VLAN’ssupported is limited tothe number of physicalNIC’s in the server
VM1 VM2ServiceConsole
VMkernel
VMkernelNIC
VSwitch AVSwitch B ESX
Server
Virtual NIC’s
VLAN 100 VLAN 200
Physical NIC’s
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 33
VLAN’s - Virtual Switch Tagging - VST
PhysicalSwitches
The vSwitch tagsoutgooing frames withthe VLAN Id
The vSwitch strips anydot1Q tags beforedelivering to the VM
Physical NIC’s andswitch port operate as atrunk
Number of VLAN’s arelimited to the number ofvNIC’s
No VTP or DTP. Allstatic config. PruneVLAN’s so ESX doesn’tprocess broadcasts
VM1 VM2ServiceConsole
VMkernel
VMkernelNIC
VSwitch AESXServer
Virtual NIC’s
VLAN 100 VLAN 200
Physical NIC’sdot1Q
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 34
VLAN’s - Virtual Guest Tagging - VGT
PhysicalSwitches
Portgroup VLAN Id setto 4095
Tagging and stripping ofVLAN id’s happens inthe guest VM – requiresan 802.1Q driver
Guest can send/receiveany tagged VLAN frame
Number of VLAN’s perguest are not limited tothe number of VNIC’s
VMware does not shipwith the driver:Windows E1000Linux dot1q module
VM1 VM2ServiceConsole
VMkernel
VMkernelNIC VSwitch A ESX
Server
Virtual NIC’s
VLAN 100 VLAN 200
Physical NIC’sdot1Q
dot1QVM applied
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 35
Agenda
VMware Networking
vSwitch Basics
NIC Teaming
vSwitch vs LAN Switch
Cisco/VMware DC DESIGNS
SAN Designs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 36
Meaning of NIC Teaming in VMware (1)
ESX Server Host
vSwitch Uplinks
vmnic0 vmnic1 vmnic2 vmnic3
vNIC vNICvNIC
vNIC
vNIC
ESX server NIC cards
NIC Teaming NIC Teaming
THIS IS NOT NIC Teaming
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 37
Meaning of NIC Teaming in VMware (2)T
his
is
NO
T T
ea
min
g
Teaming is Configured at The vmnic Level
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 38
vSwitch0
VM1
vmnic0 vmnic1
Service ConsoleVM2
Port-Group 1
VLAN 2
Port-Group 2
VLAN 1
802.1q
Vlan 1,2
802.1q
Vlan 1,2
ESX Server
Design Example2 NICs, VLAN 1 and 2, Active/Standby
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 39
Active/Standby per-Port-Group
VM5
VMNIC0
VM7 VM4 VM6
VMNIC1
.5 .7 .4 .6
CBS-rightCBS-left
Port-Group2Port-Group1
ESX Server
vSwitch0
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 40
Port-Group Overrides vSwitch GlobalConfiguration
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 41
Active/Active
vmnic0 vmnic1
ESX server NIC cards
vSwitch
ESX server
VM1 VM2 VM3 VM4 VM5
Port-Group
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 42
Active/ActiveIP-Based Load Balancing
Works with Channel-Groupmode ON
LACP is not supported(see below):
9w0d: %LINK-3-UPDOWN: InterfaceGigabitEthernet1/0/14, changed stateto up
9w0d: %LINK-3-UPDOWN: InterfaceGigabitEthernet1/0/13, changed stateto up
9w0d: %EC-5-L3DONTBNDL2:Gi1/0/14 suspended: LACP currentlynot enabled on the remote port.
9w0d: %EC-5-L3DONTBNDL2:Gi1/0/13 suspended: LACP currentlynot enabled on the remote port.
vmnic0 vmnic1
vSwitch
ESX server
VM1 VM2 VM3 VM4
Port-Group
Port-channeling
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 43
Agenda
VMware Networking
vSwitch Basics
NIC Teaming
vSwitch vs LAN Switch
Cisco/VMware DC DESIGNS
SAN Designs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 44
All Links Active, No Spanning-TreeIs There a Loop?
VM5
NIC1 NIC2
VM7 VM4 VM6
vSwitch1
NIC3 NIC4
.5 .7 .4 .6
CBS-rightCBS-left
Port-Group2
Port-Group1
ESX Server
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 45
Broadcast/Multicast/Unknown UnicastForwarding in Active/Active (1)
vSwitch0
VM1
vmnic0 vmnic1
VM2
Port-Group 1
VLAN 2
802.1q
Vlan 1,2
802.1q
Vlan 1,2
ESX Server
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 46
Broadcast/Multicast/Unknown UnicastForwarding in Active/Active (2)
vSwitch
VM1
NIC1 NIC2
VM2
ESX Host
802.1q
Vlan 1,2
802.1q
Vlan 1,2
VM3
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 47
Can the vSwitch Pass Traffic Through?
vSwitch
VM1
NIC1 NIC2
VM2
E.g. HSRP?
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 48
Is This Design Possible?
vSwitch
VM5 VM7
802.1q
802.1q
.5 .7
ESX server1
VMNIC1 VMNIC2
12
Catalyst1 Catalyst2
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 49
vSwitch Security
Promiscuous mode Rejectprevents a port fromcapturing traffic whoseaddress is not the VM’saddress
MAC Address Change,prevents the VM frommodifying the vNICaddress
Forget Transmits preventsthe VM from sending outtraffic with a different MAC(e.g NLB)
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 50
vSwitch vs LAN Switch
Similarly to a LAN Switch:
Forwarding based on MACaddress
Vswitches TAG traffic with802.1q VLAN ID
vSwitches are 802.1q Capable
vSwitches can createEtherchannels
Preemption Configuration(similar to Flexlinks, but nodelay preemption)
Differently from a LAN Switch
No Learning
No Spanning-Tree protocol
No Dynamic trunk negotiation(DTP)
No 802.3ad LACP
2 Etherchannel backing up eachother is not possible
No SPAN/mirroring capabilities:Port Security different
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 51
Agenda
VMware Networking
vSwitch Basics
NIC Teaming
vSwitch vs LAN Switch
Cisco/VMware DC DESIGNS
SAN Designs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 52
vSwitch and NIC Teaming Best Practices
Q: Should I use multiple vSwitches ormultiple Port-Groups to isolate traffic?
A: We didn’t see any advantage in usingmultiple vSwitches, multiple Port-Groupswith different VLANs give you enoughflexibility to isolate servers
Q: Should I use EST or VST?
A: Always use VST, i.e. assign the VLANfrom the vSwitch
Q: Can I use native VLAN for VMs?
A: Yes you can, but to make it simple don’t.If you do, do not TAG VMs with the nativeVLAN
Q: Which NIC Teaming configuration shouldI use?
A: Active/Active, Virtual Port-ID based
Q: Do I have to attach all NICs in the teamto the same switch or to differentswitches?
A: with Active/Active Virtual Port-ID based, itdoesn’t matter
Q: Should I use Rolling Failover (i.e. nopreemption)
A: No, default is good, just enabletrunkfast on the Cisco switch
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 53
Cisco Switchport Configuration
Make it a Trunk
Enable Trunkfast
Can the Native VLAN be used forVMs?
Yes, but IF you do, you have 2options
Configure VLAN ID = 0 for the VMsthat are going to use the native VLAN(preferred)
Configure “vlan dot1q tag native” onthe 6k (not recommended)
Do not enable Port Security(see next slide)
Make sure that “teamed” NICs are inthe same Layer 2 domain
Provide a Redundant Layer 2 path
interface GigabitEthernetX/X
description <<** VM Port **>>
no ip address
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan <id>
switchport trunk allowed vlan xx,yy-zz
switchport mode trunk
switchport nonegotiate
no cdp enable
spanning-tree portfast trunk
!
Typically: SC, VMKernel, VM Production
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 54
Configuration with 2 NICSuboptimal Configuration
Trunks
VM1
VMNIC1 VMNIC2
VM2
802.1q: Production VLANs,
Service Console, VM Kernel 802.1q
Service
Console VM Kernel
ESX Server
vSwitch 0
Port-Group
2
Port-Group
3Port-Group
1
HBA1 HBA2
NIC teamingActive/Active
VST
Global Active/Active
Active/StandbyVmnic1/vmnic2
Active/StandbyVmnic2/vmnic1
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 55
Configuration with 2 NICsRecommended Configuration
Trunks
VM1
VMNIC1 VMNIC2
VM2
802.1q: Production VLANs,
Service Console, VM Kernel 802.1q
Service
Console VM Kernel
ESX Server
vSwitch 0
Port-Group
2
Port-Group
3Port-Group
1
HBA1 HBA2
NIC teamingActive/Active
VST
Global Active/StandbyVmnic1/vmnic2
Active/StandbyVmnic2/vmnic1
Active/StandbyVmnic2/vmnic1
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 56
Network Attachment (1)
802.1q
802.1q:
Production,
SC, VMKernel
ESX server1 ESX server 2
VMNIC1 VMNIC2
12 3
4
Catalyst1 Catalyst2
VMNIC1 VMNIC2
No Blocked Port,No Loop
All NICs are usedTraffic distributed
On all links
802.1q:
Production,
SC, VMKernel
root
Secondaryroot
TrunkfastBPDU guard
vSwitch vSwitch
Rapid PVST+
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 57
Network Attachment (2)
802.1q
802.1q:
Production,
SC, VMKernel
ESX server1 ESX server 2
VMNIC1 VMNIC2
12 3
4
VMNIC1 VMNIC2
All NICs are usedTraffic distributed
On all links
Typical Spanning-TreeV-Shape Topology
802.1q:
Production, SC, VMKernelroot
Secondaryroot
TrunkfastBPDU guard
vSwitchvSwitch
Rapid PVST+
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 58
Configuration with 4 NICsSuboptimal Configuration
ESX Server
HBA1 HBA2
vswitch
Port-Group 1Service
Console VM Kernel
ProductionVLANs
Active/ActiveVmnic1/vmnic2
VMNIC4
VMNIC3VMNIC2VMNIC1
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 59
Configuration with 4 NICsRecommended Configuration
ESX Server
HBA1 HBA2
vswitch
Port-Group 1Service
Console VM Kernel
ProductionVLANs
SC, VMKernelVLANs
Active/StandbyVmnic2/vmnic4
Active/StandbyVmnic4/vmnic2
Active/ActiveVmnic1/vmnic3
VMNIC4
VMNIC3VMNIC2VMNIC1
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 60
Network Attachment (1)
vSwitch
802.1q:
Production
ESX server1 ESX server 2
1 2 7
Catalyst1 Catalyst2
vSwitch
No Blocked Port,No Loop
802.1q:
Production,
SC, VMKernel
root
Secondaryroot
TrunkfastBPDU guard
802.1q:
SC and VMKernel
3
4 5
68
Rapid PVST+
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 61
Network Attachment (2)
Typical Spanning-TreeV-Shape Topology
802.1q:
Production, SC, VMKernelroot
Secondaryroot
TrunkfastBPDU guard
vSwitch
802.1q:
Production
ESX server1 ESX server 2
1 27
Catalyst1 Catalyst2
vSwitch
802.1q:
SC and VMKernel
34 5
6 8
Rapid PVST+
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 62
How About?
Typical Spanning-TreeV-Shape Topology
802.1q:
Production, SC, VMKernelroot
Secondaryroot
TrunkfastBPDU guard
vSwitch
802.1q:
Production
ESX server1 ESX server 2
1 27
Catalyst1 Catalyst2
vSwitch
802.1q:
SC and VMKernel
34 5
6 8
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 63
4 NICs with Etherchannel
802.1q:
Production
ESX server1 ESX server 2
1
273
4 5
6 8
“Clustered” switches
802.1q:
SC, VMKernel
vSwitch vSwitch
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 64
VMotion Migration Requirements
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 65
VMKernel Network can be routed
ESX Server Host
VirtualMachines
…
ProductionNetwork
MgmtNetwork
VM KernelNetwork
VM KernelNetwork
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 66
VMotion L2 Design
VM4 VM5ESX Host 2 VM6
vSwitch0
vmnic0 vmnic1
vSwitch1 vSwitch2
vmnic2 vmnic3
vmkernel Serviceconsole
Rack10Rack1
ESX Host 1
vSwitch0
vmnic0
vSwitch2
vmnic2
vmkernel
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 67
HA clustering (1)
HA Agent runs in every host
Heartbeats Unicast UDP port~8042 (4 UDP ports opened)
Hearbeats run on the ServiceConsole ONLY
When a Failure Occurs, the ESXHost pings the gateway (on theSERVICE CONSOLE ONLY) toverify Network Connectivity
If ESX Host is isolated, it shutsdown the VMs thus releaseinglocks on the SAN
Recommendations:
Have 2 Service Console onredundant paths
Avoid losing SAN access (e.g. viaiSCSI)
Make sure you know before handif DRS is activated too!
Caveats:
Losing Production VLANconnectivity only, ISOLATESVMs (there’s no equivalent ofuplink tracking on the vswitch)
Solution:
NIC TEAMING
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 68
HA clustering (2)
COS 10.0.2.0
ESX2 Server Host
vmnic0
10.0.200.0
ESX1 Server Host
vmnic0
Prod 10.0.100.0
VM1 VM2
VM1 VM2
iSCSI access/VMkernel
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 69
Agenda
VMware Networking
vSwitch Basics
NIC Teaming
vSwitch vs LAN Switch
Cisco/VMware DC DESIGNS
SAN Designs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 70
VMware ESX Storage Options
80%+ of install baseuses FC storage
iSCSI is popular in SMBmarket
DAS is not popularbecause it prohibitsVMotion
SCSIFC
VM VM
FC
iSCSI/NFS
VM VM
DAS
VM VM
FC
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 71
Storage
Servers
ESX Server
ESX Server
ESX Server
ESX Server
Virtual Machines
A.vmdk
VMFS VMFS VMFSVMFS
VMFS
Stores the entire virtual machinestate in a central location
Supports heterogeneous storagearrays
Adds more storage to a VMFSvolume dynamically
Allows multiple ESX Servers toaccess the same virtual machinestorage concurrently
Enable virtualization-baseddistributed infrastructure servicessuch as VMotion, DRS, HA
VMFS Is High Performance Cluster File Systemfor Virtual Machines
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 72
Raw Device Mapping
RDM allows directread/write accessto disk
Block mapping is stillmaintained within aVMFS file
Rarely used butimportant for clustering(MSCS supported)
Used with NPIVenvironments
FC
VM1 VM2
FC
RDM
VMFS
Mapping
FC
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 73
FC
Storage Array
(LUN Mapping and Masking)MDS9000
Zone FC Name Server
pWWN-P
Single Login on a Single Point-to-Point Connection
Virtual Servers Share a Physical HBAA zone includes the physical hba andthe storage array
Access control is demanded to storagearray “LUN masking and mapping”, it isbased on the physical HBA pWWN andit is the same for all VMs
The hypervisor is in charge of themapping, errors may be disastrous
HW
Hyp
erv
iso
r
Vir
tua
l
Serv
ers
pWWN-P
Mapping
FC
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 74
NPIV Usage Examples‘Intelligent Pass-thru’Virtual Machine Aggregation
FC FC FC FC
NP_Port
F_PortF_Port
FC FC FC FC
FC
NPIV enabled HBA
Switch becomes an HBAconcentrator
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 75
Using Virtual Servers in Blade Chassiswith NPIV Proxy Switch
The individual blade servercan use NPIV to providethe virtual servers withvirtual HBAs
Disk Array
12 LUNs
Individually Mapped
NPIV (12 Virtual N Ports)
3 V
irtu
al N
Po
rt
3 V
irtu
al N
Po
rt
3 V
irtu
al N
Po
rt
3 V
irtu
al N
Po
rt
VM
04
VM
05
VM
06
VM
07
VM
08
VM
09
VM
10
VM
11
VM
12
FC FC FC FC
VM
01
VM
02
VM
03
Bla
de
Serv
ers
MDS9000
FCNPIV Proxy Switch Module
VM 1-12
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 76
VM creationincludes portcreation
VMwarecreates aunique node
Four ports formultipathingacross 4HBAs
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 77
Fabric Zoning For VMs Using Virtual HBA
1. All physical HBAs andarray ports must be in thesame zone
Physical Zone
2. Create a unique zone foreach VM that has a unique
Vport and array port
VM1 Zone
VM2 Zone
VM3 Zone
Zoning and VMotion:
No zone reconfiguration isrequired since the Vportaddress follows the VMduring migration
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 78
Unified I/O ( FCoE):Fewer HBA/NIC’s per Server
CNA
CNA
FC HBA
FC HBA
NIC
NIC
SAN (FC)
SAN (FC)
LAN (Ethernet)
LAN (Ethernet)
SAN (FCoE)
LAN (Ethernet)
CNA = Converged Network Adapter
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 79
N_Port Virtualizer
Nexus5000
F_Port F_Port F_Port
NP_PortNP_Port
N_Port Virtualizer in detail
NPIV Proxy captures alllogin associated packetsfrom the HBA and BorderInterfaces (BI)
Hosts pinned toBorder Interfaces
Support NPIV over ServerInterfaces (SI)
Relies on NPIV onBorder interfaces
Retry failed login requestsfrom one Border Interfaceon a different interface
SISI SI
N_Port Virtualizer
Mode
BI BI
MDS #1 MDS #2
HBA #1 (NPIV)
HBA #2(NPIV)
HBA #3
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 80
Cisco VFrame Data Center Support
Cisco VFrame Data CenterNetwork-Driven Service Orchestration
SOI ControlLayer
Storage Pool
SANNAS
Server Pool Network Pool
Data Center Networked Infrastructure
MonitoringIBM Tivoli, HP Openview,
BMC Patrol, CA Unicenter
Business ServiceManagement
Mercury,Tideway, BMC
Management and Monitoring
Element ManagersCisco Fabric Manager, VMS,
CiscoWorks, ANM
Virtualization
ManagersVMware VirtualCenter
Orchestrate acrossinfrastructure resources
Platform for serviceabstraction
Integrate with othermanagement systems
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 81