Nexus 1000V: Ver 2.1 New Frontier in Virtual Maching Networking
 

Nexus 1000V: Ver 2.1 New Frontier in Virtual Maching Networking

on

  • 987 views

 

Statistics

Views

Total Views
987
Views on SlideShare
984
Embed Views
3

Actions

Likes
0
Downloads
21
Comments
0

2 Embeds 3

https://twitter.com 2
https://si0.twimg.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Nexus 1000V: Ver 2.1 New Frontier in Virtual Maching Networking Nexus 1000V: Ver 2.1 New Frontier in Virtual Maching Networking Presentation Transcript

  • Nexus 1000V – Ver 2.1New Frontier in Virtual MachingNetworkingUday GokarnProduct Manager, Data Center GroupOctober 11. 2012© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • • Architecture Overview• New in just released Nexus 1000V ver 1.5.2• Innovations in Nexus 1000V version 2.1© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Cisco Public
  • Virtual Appliance Nexus 1010 ASA 1000V vWAAS VSG VSM VSM NAM VSG Primary VSM NAM VSG Secondary VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module L3 Connectivity vPath: Virtual Service Data-path Virtual Service Blades Virtual Supervisor Module (VSM) VXLAN: Scalable Segmentation Network Analysis Module (NAM) VSG: Virtual Security Gateway Virtual Security Gateway (VSG) vWAAS: Virtual WAAS Data Center Network Manager (DCNM) ASA 1000V: Tenant-edge security vPath VXLAN VEM-1 VEM-2 VEM-3• Service Binding (Traffic Steering) • 16M address space for LAN vPath VXLAN vPath VXLAN vPath VXLAN segments• Fast-Path Offload VMware ESX Win Server 2012 Open Source Hyp • Network Virtualization (Mac-over-• Service Chaining UDP) © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Cisco Public 3
  • • True management control plane (Nexus 1000V Virtual Supervisor Module)• VXLAN – First in the industry to release VXLAN  Attend Break Out session – Today (5:00 to 6:00 PM) & Thursday August 30th (10:30AM to 11:30AM)• vPath 2.0  Intelligent Traffic Steering to Network Services and fast path offload  ASA 1000V & Virtual Security Gateway with service chaining – Now Shipping• Separation of duties• Supports vSphere 5.0, 5.0 U1 & 5.1 & vCloud Director v1.5 Nexus 1000V Release 1.5.2 now available for download© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Cisco Public
  • © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Cisco Public
  • “Further Simplify and Enrich the End-User Experience” • Essential and Advanced Edition support • vCenter Plug-in • vTracker • Enhanced upgrade process • Enhanced Installer App • Split VSMs across data centers • VEMs in remote branch offices • Cisco TrustSec SXP support Releasing soon© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Cisco Public
  • • N1KV Dashboard in vCenter presenting the VSM level and VEM level information• VSM level information: • VSM health status • License information • Limits information• VEM level information • Summary • PNIC information • Connected VM’s • Limits© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Cisco Public
  • vMotion ViewProviding added networkinformation at the fingertips:1. vMotion View2. VLAN View3. VM-Info View VLAN View4. VM vNIC View5. Module PNIC View6. Upstream network view© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Cisco Public
  • 1. Flexibility to schedule N1KV upgrades on a per-host basis  Enabling incremental upgrades even during short maintenance windows2. Simultaneously upgrade N1KV along with vSphere Hypervisor  Requires vSphere version 5.0 U1 & above  Supported in N1KV version – 1.5.2 and above3. Modify VSM configurations between the upgrade maintenance windows  VSM configuration changes allowed: Add/remove modules, port config, vlans, and other commands© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Cisco Public
  • • Single pane of glass – simplified installation process VSMs, VEMs, VSM HA VSM – VEM communication mode • Options: Standard or Custom Installation • The app supports: L3 (default) & L2 mode HA mode (default) Can load inputs from a config file • Recommended for clean installation only© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Cisco Public
  • Active and Standby VSMs across DCs  VSM can be split across two Datacenters  Max Latency of 10ms recommended Active VSM Nexus 1000V vSphere Standby VSM Cisco Nexus 7000 Series DC1 Nexus vSphere 1000V Cisco Nexus 7000 Series DC2© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Cisco Public
  • Extending VEMs to branch offices  VSM can be in a central location in the Head Quarter Datacenter  VEMs can be spread across in different branches  Use case: Centralized management for both DC and branch Central VSM VEM - Branch 1 VEM - Branch 2 VEM - Branch 3© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Cisco Public
  • SGT = “Marketing” WAN/ Campus Network Wireless User SXP Data Center segmentation and consistent security policy enforcement across physical and virtual workloads SXP SXP“Marketing Server” VM VM VM “Marketing VM” © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Cisco Public 13
  • Identity Services Engine 5 SGACL – Nexus -SGT assigned to SGFW - ASA vEthernet port SXP Hosted Virtual -IP/SGT learned and sent to vApp Desktops N7K/ASA via SXP (HVD) 6 vApp vApp VDI Endpoint Nexus 1000V 1 4 UCS B/C Series Role assigned based N7K on port profile or ASA UCS B/C Series Connection Brokers 0 Role-based access to AD Group to VM application server Pool Mapping groups 2 VM Pool Assignment0 (port group) vCenter 3 ActiveDirectory • Valid AD credentials and AD Group assignment enable the Connection Broker to assign the HVD from the Group VM Pool • N1KV enables SGT in the port profile for dynamic IP/SGT binding • SGACL/SGFW enforcement restricts the user’s access to only authorized application servers © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Cisco Public 14
  • “Further Simplify and Enrich the End-User Experience” • Essential and Advanced Edition support • vCenter Plug-in • vTracker • Enhanced upgrade process • Enhanced Installer App • Split VSMs across data centers (split VEMs across DCs is already supported) • VEMs in remote branch offices • Cisco TrustSec SXP support Currenty in Beta with overwhelming response© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Cisco Public
  • Thank you.