SlideShare a Scribd company logo
1 of 55
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 1
DC Design for Small and
Mid-Size Data Center
Višnja Milovanović, CSE
Data Center and Virtualization
South East Europe
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 2
We will focus on:
•  The recommended N5K/N2K design scenarios for SMB customer
(from 100 to 300 ports)
•  L2 and L3 capabilities (vPC, first-hop redundancy in N5K)
•  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA)
scenarios
•  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios
•  DC Services insertion (ACE appliance, WAAS, ASA, VSG, IPS,
NAM ...etc)
•  Server Access layer security for virtual machines
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Catalyst 4507
Sup7E
L3
Campus
Access WAN
L2
•  Rack Mount Servers
Self contained Virtualized Data Center
•  Leverage Campus Core (Small
Modular) as Collapsed Core &
Backbone
•  Differentiation – FCoE, FEX, EvPC,
Adapter-FEX, Unified Port, N1KV,
vPATH, VXLAN, FabricPath
•  Dependent on ASR WAN router for
DCI and other transport services
VM
#4
VM
#3
VM
#2
Scale Solution Pricing
HighLowHighHighLow Low
Nexus/NX-OS Features
Nexus 5548UP
with L3 module
Nexus 2232 and
2248TP-E
FCoEFC
NAS
iSCSI
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Scale Solution Pricing
HighLowHighHighLow Low
•  2 x Nexus 5548 + Nexus 2200
access switches
2 x Nexus 5548
2 x L3 Module
L3 License & Storage License
2 x Nexus 2232
4 x Nexus 2248TP-E
Nexus/NX-OS Features
Catalyst 4507
Sup7E
L3
Campus
Access WAN
L2
VM
#4
VM
#3
VM
#2
Nexus 5548UP
with L3 module
Nexus 2232 and
2248TP-E
FCoEFC
NAS
iSCSI
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Catalyst 4507
Sup7E
L3
Campus
Access WAN
L2
•  Core Design Criteria
Server NIC teaming requirements
(Single NIC, ALB/TLB, 802.3ad, …)
•  Design Options
Straight Through FEX
Dual Homed FEX
EvPC (new capability supported
with 5.1(3)N1)
•  Considerations
FCoE (isolation of SAN ‘A’ & SAN
‘B’)
•  Design Strengths
EvPC enables all server NIC
redundancy options simultaneously
VM
#4
VM
#3
VM
#2
Nexus 5548UP
with L3 module
Nexus 2232 and
2248TP-E
FCoEFC
NAS
iSCSI
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  Redundancy model – Dual Switch with redundant
fabric
  Provides isolation for Storage topologies (SAN
‘A’ and ‘B’)
  Redundancy model – Single switch with dual
‘supervisor’ for fabric, data control & management
planes
  No SAN ‘A’ and ‘B’ isolation
vPC Supported
with up to 2 x 8
links
Local
Etherchannel
with up to 8
links
FCoE Adapters
supported on 10G
N2K interfaces
Straight Through Dual Homed
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Straight Through Dual Homed
•  A vPC orphan port is an non-vPC interface on a switch where other ports in the same VLAN are
configured as vPC interfaces
•  With the NX-OS release 5.0(3)N2 the orphan ports on the vPC secondary peer will also be shut
down triggering NIC teaming recovery for all teaming configurations
•  Configuration is applied to the physical port
N5K-2(config)# int eth 100/1/1
N5K-2(config-if)# vpc orphan-ports suspend
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
•  In an Enhanced vPC (EvPC)
configuration any and all server NIC
teaming configurations will be
supported on any port
•  Requires NX-OS 5.1(3)N1 (shipping Q4
CY11)
•  No ‘orphan ports’ in the design
•  All components fully redundant in a
MCEC environment
•  Supported with Nexus 5500 only
•  Not required to support a mixed NIC
teaming environment, use case is
restricted to a mix of all three server
NIC configurations (single NIC, ALB/
TLB and 802.3ad)
Dual NIC
802.3ad
Dual NIC
Active/
Standby
Single NIC
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
•  In an Enhanced vPC
(EvPC) SAN ‘A/B’ isolation
is configured by associating
each FEX with either SAN
‘A’ or SAN ‘B’ Nexus 5500
•  FCoE & FIP traffic is
forwarded only over the
links connected to the
specific parent swicth
•  Ethernet is hashed over ‘all’
FEX fabric links
FCoE enabled server
(dual CNA)
FCoEFC
N5K-A(config)# fex 100
N5K-A(config-fex)# fcoe
N5K-A(config)# fex 101
N5K-B(config)# fex 101
N5K-B(config-fex)# fcoe
N5K-B(config)# fex 100
FEX 101
FEX 100
N5K-B
N5K-A
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 10
This update to this section will focus on:
•  The recommended N5K/N2K design scenarios for SMB customer
(from 100 to 300 ports)
•  L2 and L3 capabilities (vPC, first-hop redundancy in N5K)
•  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA)
scenarios
•  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios
•  DC Services insertion (ACE appliance, WAAS, ASA, VSG, IPS,
NAM ...etc)
•  Server Access layer security for virtual machines
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Catalyst 4507
Sup7E
L3
Campus
Access
WAN
L2
VM
#4
VM
#3
VM
#2
Nexus 5548 with
L3 module
Nexus 2232
and 2248
FCoEFC
NAS
iSCSI
•  Core Design Considerations
Support for a maximum of 8 x
FEX connected to a Nexus 5500
with an L3 daughter-card
•  Key Support Considerations
vPC configuration for L3
interfaces needs to be
consistent between peers
ISSU is not currently supported
with Layer 3 enabled
•  Key Design Strengths
Cisco NX-OS routing
capabilities (EIGRP, OSPF,
RIPv2, MBGP, HSRP, VRRP)
VRF Support
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Standard vPC Enhanced vPC
  8 FEX attached to ‘each’ Nexus 5548
  16 total FEX in the fabric
  Maximum of 768 x 1G ports
  8 FEX are attached to ‘both’ Nexus 5548
  8 total FEX in the fabric
  Maximum of 384 x 1G ports
NOTE: In a dual homed (EvPC) FEX configuration the FEX is counted against the maximum supported
FEX count on ‘both’ parent switches
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Campus
Access
WAN
VM
#4
VM
#3
VM
#2
•  HSRP tuning not required with vPC
dual active default gateway
•  Remember to configure L3 peering
between vPC peers
•  Passive all SVI other than this L3
peering and the routed uplink
interfaces
•  EIGRP stub requires some tuning to
compatible with vPC L3 design
Need to provide failover to a secondary
stub (vPC peer) – Leverage floating static
default to point to loopback on peer
switch
•  Layer 3 + FEX + vPC designs are
limited to 1K multicast groups
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Campus
Access
WAN
VM
#4
VM
#3
VM
#2
•  QoS policy ‘must’ use a set cos value to
ensure that queueing is correctly
performed for traffic passing to and from
the L3 daughter-card
•  Leverage vPC enhancements
“peer-gateway” – 5.0(2)N1
“arp table sync” – 5.1(3)N1
“auto-recovery” – 5.0(2)N1
•  Leverage vPC+ if PIM-SSM support is
required (FabricPath license)
Layer 3 Design Guide: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/
ps9670/guide_c07-673997.html
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 15
This update to this section will focus on:
•  The recommended N5K/N2K design scenarios for SMB customer
(from 100 to 300 ports)
•  L2 and L3 capabilities (vPC, first-hop redundancy in N5K)
•  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA)
scenarios
•  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios
•  DC Services insertion (ACE appliance, WAAS, ASA, VSG, IPS,
NAM ...etc)
•  Server Access layer security for virtual machines
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Catalyst 4507
Sup7E
L3
Campus
Access
WAN
L2
VM
#4
VM
#3
VM
#2
Nexus 5548 with
L3 module
Nexus 2232
and 2248
FCoEFC
NAS
iSCSI
•  Core Design Considerations
•  Power Allocated Per Rack
•  Server NIC Density
•  Migration from 1G to 10G
•  Cisco Nexus and NX-OS
Infrastructure Strengths:
•  FEX provides migration to 10G
and cost effective 1G (cable
reduction)
•  B22 or pass-thru options
support 3rd party Blade chassis
•  FCoE, Adapter-FEX
•  Issues to be aware of
•  10GBaseT FEX (2232TM)
does ‘not’ support FCoE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
FEX Model Servers/
Rack
Ports/
Server
2224TP 4 6
2248TP-E 8 6
2232TM 6 6
FEX Model Servers/
Rack
Ports/
Server
2224TP 8 2
2248TP-E 16 2
2232TM 12 2
Two racks configured as a
redundancy pair - FEX ‘A’ & ‘B’
split between 2 racks
Three racks configured as a
redundancy pair - FEX ‘A’ & ‘B’
racked in common center rack
Example Rack/Server layouts
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Source: Crehan Research (Q4CY10)
10GBaseT Key Benefits:
• 10 Gigabit bandwidth requirements
for 1 Gig NIC consolidation at the
server access and virtual
environments
• Ease of 1GBASE-T to 10GBASE-T
migration
• Flexible, scalable cabling with
standard RJ-45 connector, at
distances up to 100m
• Reuse of existing structured cabling
• Economics of 1Gigabit Ethernet
versus 10 Gigabit Ethernet
• Prepare for Server LOM
• Investment protection with 1/10G
capabilities
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Nexus 2248TP
List Price: $9,000
List Price w/ FET: $11,000
GE to 10GE
premium/port 92%
Deep-Buffer GE
11% premium/port
GE to 10GE
premium/port 73%
Nexus 2248TP-E
List Price: $10,000
List Price w/ FET: $12,000
Nexus 2232TM
List Price: $11,500
List Price w/ FET: $15,500
New
New
•  Nexus 2000 provides an option for a per ‘line card’ migration of 1G and 10G
•  Nexus 2232TM and 2232PP provide a per ‘port’ migration path for 1G to 10G
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  Undesired coupling of signal between adjacent
cables
  Main electrical parameter limiting the
performance of 10G
  Cannot be cancelled
  Re-Training is the major barrier to use of
10GBaseT for block level storage (FCoE)
  Can be prevented or mitigated by:
  Space (Cat6a solution)
  Shield (Cat6/Ca6a/Cat7 shielded solutions)
Cable
Transceiver
Latency
Power
(each side)DistanceTechnology
Twinax ~0.25ms~0.1 - 1W1-10m
SFP+ CU
Copper
Cat6/6a/7
Cat6/6a/7
~3ms
~3ms
~6W
~4-5W
100m
30m
10GBASE-T –
65nm
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Catalyst 4507
Sup7E
L3
Campus
Access
WAN
L2
Nexus 5548 with
L3 module
FCoEFC
NAS
iSCSI
  Blade Chassis
  Migration to 2 x 10G NIC/CNAs per
blade
  Typical Sizing: SMB for HP is up to 4 x
c7000 enclosures (64 blade servers)
  2 to 4 x 10G uplinks per chassis
  Cisco Strengths:
  FEX + Pass Thru enables a Nexus
capable host
  FCoE capabilities & Adapter-FEX
  B22-HP and Nexus 4000 (IBM)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Nexus 5500 + B22 (HP FEX)
•  B22 extends FEX connectivity into the HP
blade chassis
•  Cisco Nexus 5000 Switch is a single
management point for all the blade chassis
I/O modules
•  66% decrease in blade management points*
•  Blade & rack networking consistency
•  Interoperable with Nexus 2000 Fabric
Extenders in the same Nexus parent switch
•  End-to-end FCoE support
•  Support for 1G & 10G, LOM and Mez
•  Dell supports Pass-Thru as an alternative
option to directly attaching Blade Servers to
FEX ports
Cisco Nexus B22 Series
Blade FEX
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 23
•  Consolidation for all servers both rack and blade onto the same
virtual switch
•  Support for 1G, migration to 10G, FC and migration to FCoE
10G server racks are supported by
the addition of a new 10G FEX
(2232PP or 2232TM)
1G, 10G and FCoE connectivity for
HP Blade Chassis
1G server racks are supported by 1G FEX
(2248TP, 2224TP) or future proofed with
1/10G FEX (2232PP or 2232TM)
Support for direct connection of
HBA to Unified Ports on Nexus
5500UP
Support for NPV attached blade
switches during FC to FCoE migration
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
vNIC vNIC vNIC
vHBA vHBA
PCIe
x16
10GbE/
FCoE
User
Definable
vNICs
Eth
0
FC
1 2
FC
3
Eth
127
  Adapter-FEX presents standard PCIe
virtual NICs (vNICs) to servers
  Adapter-FEX virtual NICs are
configured and managed via Nexus
5500
  Forwarding, Queuing, and Policy
enforcement for vNIC traffic by Nexus
5500
  Adapter-FEX connected to Nexus
2000 Fabric Extender - Cascaded
FEX-Link deployment
  Forwarding, Queuing, and Policy
enforcement for vNIC traffic still done
by Nexus 5500
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
•  vNICs are presented to the host like standard PCIe devices
•  In A-FEX mode: supports up to 16 Eth vNIC and 2 FC vHBA
•  Adapter Failover feature: in failure scenarios, the vNIC is
mapped to the other port transparently to the OS
•  In VM-FEX mode: supports up to 96 Virtual Interfaces ( vNICs +
vHBAs)
•  No need of trunking all VLANs to the server interface (improving
security and scalability)
•  3rd Party adapter supporting VN-TAG
•  vNICs are presented to the host like standard PCIe
devices
•  In A-FEX mode supports up to 8 Virtual Interfaces total
•  Max of 8 vEth
•  Max of 2 vHba
•  No adapter failover
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Scale Solution Pricing
HighLowHighHighLow Low
•  5500 providing support for disjoint
L2 domains and/or L3
•  2 x Nexus 5548 Data Center Core
Virtualized Switch
•  Fabric Differentiation – FCoE,
FEX, Adapter-FEX, VM-FEX,
Unified Port, N1KV, vPATH,
VXLAN, FabricPath, UCSM
•  iSCSI Boot supported Q1CY12
targeted at SMB customer base
migrating to NFS/CIFS
•  Dependent on ASR WAN router
for DCI and other transport
services (WCCP, LISP, MPLS,
OTV)
slot 1
slot 2
slot 3
slot 4
slot 5
slot 6
slot 7
slot 8
blade1
blade2
blade3
blade4
blade5
blade6
blade7
blade8
slot 1
slot 2
slot 3
slot 4
slot 5
slot 6
slot 7
slot 8
blade1
blade2
blade3
blade4
blade5
blade6
blade7
blade8
slot 1
slot 2
slot 3
slot 4
slot 5
slot 6
slot 7
slot 8
blade1
blade2
blade3
blade4
blade5
blade6
blade7
blade8
slot 1
slot 2
slot 3
slot 4
slot 5
slot 6
slot 7
slot 8
blade1
blade2
blade3
blade4
blade5
blade6
blade7
blade8
slot 1
slot 2
slot 3
slot 4
slot 5
slot 6
slot 7
slot 8
blade1
blade2
blade3
blade4
blade5
blade6
blade7
blade8
slot 1
slot 2
slot 3
slot 4
slot 5
slot 6
slot 7
slot 8
blade1
blade2
blade3
blade4
blade5
blade6
blade7
blade8
FCoEFC
Nexus/NX-OS Features
Catalyst 4507
Sup7E
L3
Campus
Access
WAN
Nexus 5548 with
L3 module
NAS
iSCSI
L2
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 27
This update to this section will focus on:
•  The recommended N5K/N2K design scenarios for SMB customer
(from 100 to 300 ports)
•  L2 and L3 capabilities (vPC, first-hop redundancy in N5K)
•  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA)
scenarios
•  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios
•  DC Services insertion (ACE appliance, WAAS, ASA, VSG, IPS,
NAM ...etc)
•  Server Access layer security for (virtual machines and bare-metal
servers)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Catalyst 4507
Sup7E
L3
Campus
Access
WAN
L2
VM
#4
VM
#3
VM
#2
Nexus 5548 with
L3 module
Nexus 2232
and 2248
FCoEFC
NAS
iSCSI
•  Core Design Considerations
•  Storage I/O capacity required per
server
•  Storage protocol(s) required
•  Boot from FC/FCoE/iSCSI
•  Cisco Nexus and NX-OS
Infrastructure Strengths:
QoS capabilities to support iSCSI,
NFS, NAS
Nexus 5500 supports FC and FCoE
fabric services
•  Issues to be aware of
•  10GBaseT FEX (2232TM) does
‘not’ support FCoE
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Catalyst 4507
Sup7E
L3
Campus
Access
WAN
L2
Nexus 5548 with
L3 module
Nexus
2232PP &
B22
FCoEFC
NAS
iSCSI
•  Unified Ports supported on
Nexus 5548UP and 5596UP
•  Nexus 5500 supports FC and
FCoE fabric services
•  Co-existence with layer 3 and
layer 2 IP forwarding (vPC, STP
or FabricPath)
•  FCoE Supported on Nexus
5000/5500 and 2232PP and B22
FEX ports
•  Issues to be aware of
•  10GBaseT FEX (2232TM)
does ‘not’ support FCoE
•  IVR is not supported on Nexus
5500
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
VM
#4
VM
#3
VM
#2
•  EvPC supports FCoE with dual homed FEX
as of NX-OS 5.1(3)N1
•  Boot from SAN with over an 802.3ad port
channel using LACP is supported with NX-
OS 5.1(3)N1
•  The ‘vfc’ is bound directly to physical port
that is a member of the vPC port channel
•  Prior to 5.1(3)N1 the ‘vfc’ was bound to the
port channel which could result in a race
condition on boot from SAN
•  The FCoE VLAN must not be configured as
a native VLAN
•  Ports with CNA must be configured as trunk
ports and STP edge ports
FCoEFC
interface vfc 1
bind interface eth 101/1/1
N5K-B(config)# fex 101
N5K-B(config-fex)# fcoe
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Catalyst 4507
Sup7E
L3
Campus
Access
WAN
L2
VM
#4
VM
#3
VM
#2
Nexus 5548 with
L3 module
Nexus 2232
and 2248
FCoEFC
NAS
iSCSI
•  Core iSCSI Design Considerations
Reserved fabric capacity is
fundamental design consideration
FC and FCoE networks tend towards
very low levels of over-subscription
(4:1 to 12:1 are common)
QoS configuration for iSCSI needs to
be considered in context of the
oversubscription, topology and
capabilities of attached devices
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
DCBX Switch
DCBX CNA
Adapter
•  Negotiates Ethernet capability’s : PFC, ETS, CoS
values between DCB capable peer devices
•  Simplifies Management : allows for configuration and
distribution of parameters from one node to another
•  Responsible for Logical Link Up/Down signaling of
Ethernet and Fibre Channel
•  DCBX is LLDP with new TLV fields
•  The original pre-standard CIN (Cisco, Intel, Nuova)
DCBX utilized additional TLV’s
•  DCBX negotiation failures result in:
•  per-priority-pause not enabled on CoS values
•  vfc not coming up – when DCBX is being used in
FCoE environment
dc11-5020-3# sh lldp dcbx interface eth 1/40
Local DCBXP Control information:
Operation version: 00 Max version: 00 Seq no: 7 Ack no: 0
Type/
Subtype Version En/Will/Adv Config
006/000 000 Y/N/Y 00
<snip>
https://www.cisco.com/en/US/netsol/ns783/index.html
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Transmit Queues Ethernet Link
Receive Buffers
Eight
Virtual
Lanes
One One
Two Two
Three Three
Four Four
Five Five
Seven Seven
Eight Eight
Six Six
STOP
PAUSE
Offered Traffic
t1 t2 t3
10 GE Link Realized Traffic Utilization
3G/s HPC Traffic
3G/s
2G/s
3G/sStorage Traffic
3G/s
3G/s
LAN Traffic
4G/s
5G/s3G/s
t1 t2 t3
3G/s 3G/s
3G/s 3G/s 3G/s
2G/s
3G/s 4G/s 6G/s
•  Nexus 5000/5500 and F1/
F2 line cards support DCB
(PFC, ETS and DCBX)
•  Which mechanisms are
beneficial for iSCSI
•  Core requirement is
ensuring capacity (ETS)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
•  Speed mismatch between 10G NAS and 1G
server requires QoS tuning
•  Nexus 2248TP-E utilizes a 32MB shared buffer
to handle larger traffic bursts
•  Hadoop, NAS, AVID are examples of bursty
applications
•  You can control the queue limit for a specified
Fabric Extender for egress direction (from the
network to the host)
•  You can use a lower queue limit value on the
Fabric Extender to prevent one blocked receiver
from affecting traffic that is sent to other non-
congested receivers ("head-of-line blocking”)
N5548-L3(config)# fex 100
N5548-L3(config-fex)# hardware N2248T queue-limit 356000
N5548-L3(config-fex)# hardware N2248TPE queue-limit 4000000 rx
N5548-L3(config-fex)# hardware N2248TPE queue-limit 4000000 tx
N5548-L3(config)#interface e110/1/1
N5548-L3(config-if)# hardware N2348TP queue-limit 4096000 tx
VM
#4
VM
#3
VM
#2
NAS
iSCSI
10G Attached Source (NAS Array)
1G Attached Server
Tune 2248TP to support a larger burst
(NAS, …)
Tune 2248TP-E to support a extremely
large burst (Hadoop, AVID, …)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
SONET/SDH
Network
DWDM
Network
Metro
Ethernet
DC Interconnect
WAN
MDS 9222i MDS 9222i
• 1/2/4/8 FC interfaces
• Up to 4095 BB_credits
on a FC port
• Integrated FCIP
• Traffic Engineering with
VSANs
SAN Services:
• Encryption (FCIP)
• Compression (FCIP)
• I/O Acceleration (FC and FCIP)
• Remote Site Data Migration
(DMM)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Speed
(Gbps)
Distance
(Km)
1 128
2 64
4 32
8 16
Speed
(Gbps)
Distance
(Km)
1 250
2 125
4 62
8 31
Nexus 5000/5500 Fibre Channel
Ports
MDS 9148 Fibre Channel Ports
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
FC
oE
FC
VM
#4
VM
#3
VM
#2
NAS
iSCSI
FC
oE
FC
VM
#4
VM
#3
VM
#2
NAS
iSCSI
FCoE – 3km
•  Converged Fabric, sharing a common 10G wire (or non vPC port channel)
for FCOE and IP traffic is supported in a square topology (FCoE links can
be up to 3 km on Nexus 5500)
•  vPC not currently certified for the ‘DCI’ links
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 38
This update to this section will focus on:
•  The recommended N5K/N2K design scenarios for SMB customer
(from 100 to 300 ports)
•  L2 and L3 capabilities (vPC, first-hop redundancy in N5K)
•  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA)
scenarios
•  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios
•  DC Services insertion (ACE appliance, WAAS, ASA, IPS,
NAM ...etc)
•  Server Access layer security for (virtual machines and bare-metal
servers)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
•  Updated twice a year
(last one was August
2011)
•  Tested in SBA labs as a
complete architecture
•  Overview, configuration
files and deployment
guides
http://www.cisco.com/en/US/netsol/ns982/networking_solutions_program_home.html
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
STP
ACE ACE
One Armed (straight
through)
ACE ACE
• Bridge contexts use IEEE 802.3d (“slow” STP)
• ACE 4710 won't allow configuring the same vlan on two trunks
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Pros
• Layer 2 adjacency with the real
servers is not required
• Allows direct server traffic to
bypass ACE when load-
balancing is not required
Cons
• Client source IP address is
masked by ACE due to Source
NAT (no PBR on 5500-L3)
• Requires HTTP header insert
as workaround to preserve client
source IP address
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Routed is more common
Bridged if IP address can´t be
changed easily
Pros
• Simple topology
• Easy configuration
Cons
• ACE does not support any
dynamic routing protocols (static
only)
• All server traffic must pass
through ACE, whether or not
load-balancing is required
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
•  Inline cluster works independent of the
WAN router and/or Nexus switching
•  Mostly used on Small and Mid-size DCs
•  SP owned WAN router (unable to get
WCCP or PBR services from carrier)
•  Two inline cards supported on WAE-7371,
WAE-7341, and WAE-674 (up to 4 router
connections per inline cluster)
•  WAE-7371, WAE-7341, WAE-674, and
WAVE-574 with one inline card support 2
router connections
•  Supports asymmetric traffic
http://www.cisco.com/en/US/docs/app_ntwk_services/waas/waas/v421/release/notes/ws421xrn.html#wp90802
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
WAASWAAS
WCCP L3
•  WCCP
Needs configuration on edge
routers (ASR)
Up to 32 WAE/WAVE
Supports asymmetric traffic
N5K has its WAAS and router
ports running in Layer 2 with
routing deployed through
SVIs (peering to ASR via SVI
peering over L2)
Layer 2 is necessary to make the
routers and WAE/WAVE discover
their WCCP services
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
peer link
vPC vPC
EC EC
Active Standby
•  Support for 802.3ad port channels
•  Compatible with Nexus vPC
•  New Feature in ASA 8.4(1)/ASDM 6.4(1)
•  EtherChannel support (ASA 5510 and higher)
up to 48 x 802.3ad EtherChannels of eight
active interfaces each.
http://www.cisco.com/en/US/netsol/ns982/networking_solutions_program_home.html
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 46
This update to this section will focus on:
•  The recommended N5K/N2K design scenarios for SMB customer
(from 100 to 300 ports)
•  L2 and L3 capabilities (vPC, first-hop redundancy in N5K)
•  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA)
scenarios
•  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios
•  DC Services insertion (ACE appliance, WAAS, ASA, IPS,
NAM ...etc)
•  Server Access layer security for virtual machines
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Catalyst 4507
Sup7E
L3
Campus
Access
WAN
L2
VM
#4
VM
#3
VM
#2
Nexus 5548 with
L3 module
Nexus 1010
FCoEFC
NAS
iSCSI
•  Provisioning and Security Policy
for virtual machines tightly
coupled with the Nexus 1000v
Nexus 1000v provides for NX-OS
port features at the connection of
the Virtual Machine
vPath provides a port level
redirection capability to service
appliances (VSG, vASA, vWAAS)
VXLAN defines secure closed
user groups amongst virtual
machines
VM
#4
VM
#3
VM
#2
VMware ESXi Server / MSFT HyperV
Nexus 1000V vPATH & VXLAN
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
VM VM VM VM
Nexus
1000V
VEM
VM VM VM VM
Nexus
1000V
VEM
Nexus 1000V
VSM
Windows 8 Hyper-VNexus 1000V
VSM
VMware vSphere
VMware vCenter SCVMM
Consistent architecture, feature-set, network services & Nexus 1010
ensures operational transparency across multiple hypervisors.
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 49
Upstream
Switch
VSM
VEM
VPATH
Interception
In/Out
VMware ESX/ESXi Server
Nexus 1000V vPATH
•  Intelligence build into Virtual Ethernet Module
(VEM) of Cisco Nexus 1000V virtual switch (version
1.4 and above);
•  vPATH has the following main functions:
•  Intelligent Traffic interception for Virtual
Service Nodes (VSN): vWAAS & VSG;
•  Offload the processing of Pass-through
traffic (from vWAAS, for instance);
•  ARP based health check;
•  Maintain Flow entry table.
•  vPATH is Multitenant Aware
•  Leveraging vPATH can enhance the service
performance by moving the processing to
hypervisor
•  The VSN interested packets are redirected by
vPATH by encapsulating the original frame and
forwarding to service appliance
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 50
Packet Flow
Packet destined towards the Server entering the Physical Switch.
Physical Switch forwards the packet to VMWare ESX1 (where the destination Server Virtual Machine resides)
VEM determines that the packet has to be forwarded to Server VM
But the Server VM’s Port Profile has vPATH interception. The incoming L2 frame is encapsulated with vPATH header which says redirect the
packet to VSN 1. The interception packet is sent in different VLAN (Nexus 1000v Service VLAN)
Since the VSN is located in another ESX host, the encapsulated VPATH packet is switched from ESX 1 to ESX2.
VSN 1 receives vPATH encapsulated packet, decapsulates the outer vPATH header, processes the inner frame and sends the “services
processed “packet out with vPATH encapsulation (with dest mac as ESX1 Nexus1000v vSwitch vPATH MAC Addr) in Service VLAN.
The vPATH Encapsulated return packet switched from ESX2 to ESX1. The vPATH Header is decapsulated by VEM and inner packet is
forwarded to the specified destination without further vPATH interception (in the Server VLAN)
Server VM receives the packet.
2
3
4
5
6
VMware ESX 1
VPATH
VMware ESX 2
VPATH
Nexus 1000V VEMs
Nexus 1000V
VSM
vCenter Server
VEM: Virtual Ethernet Module
VSM: Virtual Supervisor Module
VSN: Virtual Service Node
2
1
4
1
3
8
6
Server
5
7
7
8
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
VM 1 VM n
VSG 1.0
vASA 1.0
VNMC
VM 1
VM
n
VSG 1.0
vASA 1.0
NAT
IPSecVPN (Site-to-Site)
Default Gateway
DHCP
Static Routing
Basic Stateful Protocol
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
  Ethernet in IP overlay network
  Entire L2 frame encapsulated in
UDP
  50 bytes of overhead
  Include 24 bit VXLAN Identifier
  16 Million logical networks
  VXLAN can cross Layer 3 (IPv4
currently)
  Tunnel between VEMs
  VMs do NOT see VXLAN ID
  IP multicast used for L2 broadcast/
multicast, unknown unicast
  Technology submitted to IETF for
standardization (Cisco, VMware,
Citrix, Red Hat, Broadcom, Arista,
and Others)
Outer
MAC
DA
Outer
MAC
SA
Outer
802.1Q
Outer
IP DA
Outer
IP SA
Outer
UDP
VXLAN
Header (8
bytes)
Inner
MAC
DA
Inner
MAC
SA
Optional
Inner
802.1Q
Original
Ethernet
Payload
CRC
VXLAN Encapsulation Original Ethernet Frame
Flags
8 bits
Res.
8 bits
Reserved
24 bits
VXLAN
Networker
Identifier (VIN)
24 bits
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 53
Server
VM VM VM VM
Cisco UCS
VM-FEX
VMWare ESX
Server
VM VM VM VM
Cisco UCS
VM-FEX
Red Hat KVM
Server
VM VM VM VM
Cisco UCS
VM-FEX
Microsoft Hyper-V
Virtual Ethernet ports
(vEth)
Virtual Ethernet ports
(vEth)
vCenter
Cisco Nexus 5500 or
UCS Fabric Interconnect
RHEV-M MSFT SCVMM
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Opt A
Server form factor Rack/Blade
FEX & FET 
Adapter-FEX & VM-FEX 
vPC 
Multi-hop FCoE, iSCSI, NAS 
Unified Ports & FC Targets 
Virtualized Security (vPath, VXLAN) 
Services (ACE, ASA, WAAS) Compatible
MPLS, OTV & LISP ASR1000
•  Design Strengths: Leverages a single Data Center switch to
support ‘all’ storage and compute connectivity
•  Considerations: May need to consolidate the LAN and Data Center
L3 into a Nexus 5596 if budget constraints exist
Presentation   dc design for small and mid-size data center

More Related Content

What's hot

Cisco nexus-5000-series-architecture-whitepaper
Cisco nexus-5000-series-architecture-whitepaperCisco nexus-5000-series-architecture-whitepaper
Cisco nexus-5000-series-architecture-whitepaper
chrisnciss
 
Data sheet c78-618603
Data sheet c78-618603Data sheet c78-618603
Data sheet c78-618603
ravi kumar
 

What's hot (20)

Cisco UCS Solution EMC World 2015
Cisco UCS Solution EMC World 2015Cisco UCS Solution EMC World 2015
Cisco UCS Solution EMC World 2015
 
Cisco UCS vs HP Virtual Connect
Cisco UCS vs HP Virtual ConnectCisco UCS vs HP Virtual Connect
Cisco UCS vs HP Virtual Connect
 
Cisco nexus series
Cisco nexus seriesCisco nexus series
Cisco nexus series
 
Cisco nexus-5000-series-architecture-whitepaper
Cisco nexus-5000-series-architecture-whitepaperCisco nexus-5000-series-architecture-whitepaper
Cisco nexus-5000-series-architecture-whitepaper
 
Cisco nx os
Cisco nx os Cisco nx os
Cisco nx os
 
Designing Scalable SAN using MDS 9396S
Designing Scalable SAN using MDS 9396SDesigning Scalable SAN using MDS 9396S
Designing Scalable SAN using MDS 9396S
 
Cisco nexus 7000, nexus 5000 and 2000 fa qs
Cisco nexus 7000, nexus 5000 and 2000 fa qsCisco nexus 7000, nexus 5000 and 2000 fa qs
Cisco nexus 7000, nexus 5000 and 2000 fa qs
 
Router and Switches Cisco
Router and Switches CiscoRouter and Switches Cisco
Router and Switches Cisco
 
Emc vmax3 technical deep workshop
Emc vmax3 technical deep workshopEmc vmax3 technical deep workshop
Emc vmax3 technical deep workshop
 
Cisco Nexus Family Platform Overview
Cisco Nexus Family Platform OverviewCisco Nexus Family Platform Overview
Cisco Nexus Family Platform Overview
 
Cisco mds 9148 s training workshop
Cisco mds 9148 s training workshopCisco mds 9148 s training workshop
Cisco mds 9148 s training workshop
 
Presentation comparing server io consolidation solution with i scsi, infini...
Presentation   comparing server io consolidation solution with i scsi, infini...Presentation   comparing server io consolidation solution with i scsi, infini...
Presentation comparing server io consolidation solution with i scsi, infini...
 
Storage Area Networking: SAN Technology Update & Best Practice Deep Dive for ...
Storage Area Networking: SAN Technology Update & Best Practice Deep Dive for ...Storage Area Networking: SAN Technology Update & Best Practice Deep Dive for ...
Storage Area Networking: SAN Technology Update & Best Practice Deep Dive for ...
 
Summit x460
Summit x460Summit x460
Summit x460
 
Cisco A9K-8T-L
Cisco A9K-8T-LCisco A9K-8T-L
Cisco A9K-8T-L
 
Shortest path bridging 802.1 aq
Shortest path bridging 802.1 aqShortest path bridging 802.1 aq
Shortest path bridging 802.1 aq
 
Eliminating SAN Congestion Just Got Much Easier- webinar - Nov 2015
Eliminating SAN Congestion Just Got Much Easier-  webinar - Nov 2015 Eliminating SAN Congestion Just Got Much Easier-  webinar - Nov 2015
Eliminating SAN Congestion Just Got Much Easier- webinar - Nov 2015
 
Cisco 3850 scalable stack wise-480
Cisco 3850 scalable stack wise-480Cisco 3850 scalable stack wise-480
Cisco 3850 scalable stack wise-480
 
Ixp switches 1000322 en
Ixp switches 1000322 enIxp switches 1000322 en
Ixp switches 1000322 en
 
Data sheet c78-618603
Data sheet c78-618603Data sheet c78-618603
Data sheet c78-618603
 

Viewers also liked

12.) fabric (your next data center)
12.) fabric (your next data center)12.) fabric (your next data center)
12.) fabric (your next data center)
Jeff Green
 
Final Charter
Final CharterFinal Charter
Final Charter
lneut03
 
ACO Data Center Proposal
ACO Data Center ProposalACO Data Center Proposal
ACO Data Center Proposal
Jeff4459
 

Viewers also liked (16)

POWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTERPOWER POINT PRESENTATION ON DATA CENTER
POWER POINT PRESENTATION ON DATA CENTER
 
Data center Building & General Specification
Data center Building & General Specification Data center Building & General Specification
Data center Building & General Specification
 
12.) fabric (your next data center)
12.) fabric (your next data center)12.) fabric (your next data center)
12.) fabric (your next data center)
 
The Next Generation Datacenter
The Next Generation DatacenterThe Next Generation Datacenter
The Next Generation Datacenter
 
Networking is NOT Free: Lessons in Network Design
Networking is NOT Free: Lessons in Network DesignNetworking is NOT Free: Lessons in Network Design
Networking is NOT Free: Lessons in Network Design
 
Network Configuration Example: Configuring CoS to Support an MC-LAG on an FCo...
Network Configuration Example: Configuring CoS to Support an MC-LAG on an FCo...Network Configuration Example: Configuring CoS to Support an MC-LAG on an FCo...
Network Configuration Example: Configuring CoS to Support an MC-LAG on an FCo...
 
Knowledge Management as an ecosystem
Knowledge Management as an ecosystem Knowledge Management as an ecosystem
Knowledge Management as an ecosystem
 
EVPN for Cloud Builders
EVPN for Cloud BuildersEVPN for Cloud Builders
EVPN for Cloud Builders
 
EVPN & VXLAN for Cloud Builders
EVPN & VXLAN for Cloud BuildersEVPN & VXLAN for Cloud Builders
EVPN & VXLAN for Cloud Builders
 
Next Wave of Data Centers & Interconnects
Next Wave of Data Centers & InterconnectsNext Wave of Data Centers & Interconnects
Next Wave of Data Centers & Interconnects
 
The Evolving Data Center Network: Open and Software-Defined
The Evolving Data Center Network: Open and Software-DefinedThe Evolving Data Center Network: Open and Software-Defined
The Evolving Data Center Network: Open and Software-Defined
 
(ARC205) Creating Your Virtual Data Center: VPC Fundamentals and Connectivity...
(ARC205) Creating Your Virtual Data Center: VPC Fundamentals and Connectivity...(ARC205) Creating Your Virtual Data Center: VPC Fundamentals and Connectivity...
(ARC205) Creating Your Virtual Data Center: VPC Fundamentals and Connectivity...
 
Final Charter
Final CharterFinal Charter
Final Charter
 
ACO Data Center Proposal
ACO Data Center ProposalACO Data Center Proposal
ACO Data Center Proposal
 
Data Center Energy Efficiency Best Practices
Data Center Energy Efficiency Best PracticesData Center Energy Efficiency Best Practices
Data Center Energy Efficiency Best Practices
 
Mo ict 2013 new data center design proposal - pts-0813-004006 - ptsp-c-13-0...
Mo ict   2013 new data center design proposal - pts-0813-004006 - ptsp-c-13-0...Mo ict   2013 new data center design proposal - pts-0813-004006 - ptsp-c-13-0...
Mo ict 2013 new data center design proposal - pts-0813-004006 - ptsp-c-13-0...
 

Similar to Presentation dc design for small and mid-size data center

CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
Ameen Wayok
 
Isolated IntegrationISSConference2
Isolated IntegrationISSConference2Isolated IntegrationISSConference2
Isolated IntegrationISSConference2
Chris Ryan
 
NetBox as the Source of Truth for Cisco NSO Configurations
NetBox as the Source of Truth for Cisco NSO ConfigurationsNetBox as the Source of Truth for Cisco NSO Configurations
NetBox as the Source of Truth for Cisco NSO Configurations
Hank Preston
 

Similar to Presentation dc design for small and mid-size data center (20)

CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
vPC techonology for full ha from dc core to baremetel server.
vPC techonology for full ha from dc core to baremetel server.vPC techonology for full ha from dc core to baremetel server.
vPC techonology for full ha from dc core to baremetel server.
 
Designing and deploying converged storage area networks final
Designing and deploying converged storage area networks finalDesigning and deploying converged storage area networks final
Designing and deploying converged storage area networks final
 
Virtual Switch System.pdf
Virtual Switch System.pdfVirtual Switch System.pdf
Virtual Switch System.pdf
 
Network Function Virtualisation (NFV) BoF
Network Function Virtualisation (NFV) BoFNetwork Function Virtualisation (NFV) BoF
Network Function Virtualisation (NFV) BoF
 
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
Brkarc 3470 - cisco nexus 7000-7700 switch architecture (2016 las vegas) - 2 ...
 
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000
 
Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000
 
Isolated IntegrationISSConference2
Isolated IntegrationISSConference2Isolated IntegrationISSConference2
Isolated IntegrationISSConference2
 
#IBMEdge: "Not all Networks are Equal"
#IBMEdge: "Not all Networks are Equal" #IBMEdge: "Not all Networks are Equal"
#IBMEdge: "Not all Networks are Equal"
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsx
 
HP Virtual Connect technical fundamental101 v2.1
HP Virtual Connect technical fundamental101   v2.1HP Virtual Connect technical fundamental101   v2.1
HP Virtual Connect technical fundamental101 v2.1
 
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
PLNOG16: Automatyzacja kreaowania usług operatorskich w separacji od rodzaju ...
 
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...
Конференция Brocade. 4. Развитие технологии Brocade VCS, новое поколение комм...
 
NetBox as the Source of Truth for Cisco NSO Configurations
NetBox as the Source of Truth for Cisco NSO ConfigurationsNetBox as the Source of Truth for Cisco NSO Configurations
NetBox as the Source of Truth for Cisco NSO Configurations
 
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław BorekPLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
PLNOG14: Service orchestration in provider network, Tail-f - Przemysław Borek
 
Presentation cloud computing and the internet
Presentation   cloud computing and the internetPresentation   cloud computing and the internet
Presentation cloud computing and the internet
 

More from xKinAnx

More from xKinAnx (20)

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloud
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Presentation dc design for small and mid-size data center

  • 1. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 1 DC Design for Small and Mid-Size Data Center Višnja Milovanović, CSE Data Center and Virtualization South East Europe
  • 2. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 2 We will focus on: •  The recommended N5K/N2K design scenarios for SMB customer (from 100 to 300 ports) •  L2 and L3 capabilities (vPC, first-hop redundancy in N5K) •  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA) scenarios •  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios •  DC Services insertion (ACE appliance, WAAS, ASA, VSG, IPS, NAM ...etc) •  Server Access layer security for virtual machines
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Catalyst 4507 Sup7E L3 Campus Access WAN L2 •  Rack Mount Servers Self contained Virtualized Data Center •  Leverage Campus Core (Small Modular) as Collapsed Core & Backbone •  Differentiation – FCoE, FEX, EvPC, Adapter-FEX, Unified Port, N1KV, vPATH, VXLAN, FabricPath •  Dependent on ASR WAN router for DCI and other transport services VM #4 VM #3 VM #2 Scale Solution Pricing HighLowHighHighLow Low Nexus/NX-OS Features Nexus 5548UP with L3 module Nexus 2232 and 2248TP-E FCoEFC NAS iSCSI
  • 4. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Scale Solution Pricing HighLowHighHighLow Low •  2 x Nexus 5548 + Nexus 2200 access switches 2 x Nexus 5548 2 x L3 Module L3 License & Storage License 2 x Nexus 2232 4 x Nexus 2248TP-E Nexus/NX-OS Features Catalyst 4507 Sup7E L3 Campus Access WAN L2 VM #4 VM #3 VM #2 Nexus 5548UP with L3 module Nexus 2232 and 2248TP-E FCoEFC NAS iSCSI
  • 5. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Catalyst 4507 Sup7E L3 Campus Access WAN L2 •  Core Design Criteria Server NIC teaming requirements (Single NIC, ALB/TLB, 802.3ad, …) •  Design Options Straight Through FEX Dual Homed FEX EvPC (new capability supported with 5.1(3)N1) •  Considerations FCoE (isolation of SAN ‘A’ & SAN ‘B’) •  Design Strengths EvPC enables all server NIC redundancy options simultaneously VM #4 VM #3 VM #2 Nexus 5548UP with L3 module Nexus 2232 and 2248TP-E FCoEFC NAS iSCSI
  • 6. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6   Redundancy model – Dual Switch with redundant fabric   Provides isolation for Storage topologies (SAN ‘A’ and ‘B’)   Redundancy model – Single switch with dual ‘supervisor’ for fabric, data control & management planes   No SAN ‘A’ and ‘B’ isolation vPC Supported with up to 2 x 8 links Local Etherchannel with up to 8 links FCoE Adapters supported on 10G N2K interfaces Straight Through Dual Homed
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Straight Through Dual Homed •  A vPC orphan port is an non-vPC interface on a switch where other ports in the same VLAN are configured as vPC interfaces •  With the NX-OS release 5.0(3)N2 the orphan ports on the vPC secondary peer will also be shut down triggering NIC teaming recovery for all teaming configurations •  Configuration is applied to the physical port N5K-2(config)# int eth 100/1/1 N5K-2(config-if)# vpc orphan-ports suspend
  • 8. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 •  In an Enhanced vPC (EvPC) configuration any and all server NIC teaming configurations will be supported on any port •  Requires NX-OS 5.1(3)N1 (shipping Q4 CY11) •  No ‘orphan ports’ in the design •  All components fully redundant in a MCEC environment •  Supported with Nexus 5500 only •  Not required to support a mixed NIC teaming environment, use case is restricted to a mix of all three server NIC configurations (single NIC, ALB/ TLB and 802.3ad) Dual NIC 802.3ad Dual NIC Active/ Standby Single NIC
  • 9. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 •  In an Enhanced vPC (EvPC) SAN ‘A/B’ isolation is configured by associating each FEX with either SAN ‘A’ or SAN ‘B’ Nexus 5500 •  FCoE & FIP traffic is forwarded only over the links connected to the specific parent swicth •  Ethernet is hashed over ‘all’ FEX fabric links FCoE enabled server (dual CNA) FCoEFC N5K-A(config)# fex 100 N5K-A(config-fex)# fcoe N5K-A(config)# fex 101 N5K-B(config)# fex 101 N5K-B(config-fex)# fcoe N5K-B(config)# fex 100 FEX 101 FEX 100 N5K-B N5K-A
  • 10. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 10 This update to this section will focus on: •  The recommended N5K/N2K design scenarios for SMB customer (from 100 to 300 ports) •  L2 and L3 capabilities (vPC, first-hop redundancy in N5K) •  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA) scenarios •  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios •  DC Services insertion (ACE appliance, WAAS, ASA, VSG, IPS, NAM ...etc) •  Server Access layer security for virtual machines
  • 11. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Catalyst 4507 Sup7E L3 Campus Access WAN L2 VM #4 VM #3 VM #2 Nexus 5548 with L3 module Nexus 2232 and 2248 FCoEFC NAS iSCSI •  Core Design Considerations Support for a maximum of 8 x FEX connected to a Nexus 5500 with an L3 daughter-card •  Key Support Considerations vPC configuration for L3 interfaces needs to be consistent between peers ISSU is not currently supported with Layer 3 enabled •  Key Design Strengths Cisco NX-OS routing capabilities (EIGRP, OSPF, RIPv2, MBGP, HSRP, VRRP) VRF Support
  • 12. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Standard vPC Enhanced vPC   8 FEX attached to ‘each’ Nexus 5548   16 total FEX in the fabric   Maximum of 768 x 1G ports   8 FEX are attached to ‘both’ Nexus 5548   8 total FEX in the fabric   Maximum of 384 x 1G ports NOTE: In a dual homed (EvPC) FEX configuration the FEX is counted against the maximum supported FEX count on ‘both’ parent switches
  • 13. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Campus Access WAN VM #4 VM #3 VM #2 •  HSRP tuning not required with vPC dual active default gateway •  Remember to configure L3 peering between vPC peers •  Passive all SVI other than this L3 peering and the routed uplink interfaces •  EIGRP stub requires some tuning to compatible with vPC L3 design Need to provide failover to a secondary stub (vPC peer) – Leverage floating static default to point to loopback on peer switch •  Layer 3 + FEX + vPC designs are limited to 1K multicast groups
  • 14. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Campus Access WAN VM #4 VM #3 VM #2 •  QoS policy ‘must’ use a set cos value to ensure that queueing is correctly performed for traffic passing to and from the L3 daughter-card •  Leverage vPC enhancements “peer-gateway” – 5.0(2)N1 “arp table sync” – 5.1(3)N1 “auto-recovery” – 5.0(2)N1 •  Leverage vPC+ if PIM-SSM support is required (FabricPath license) Layer 3 Design Guide: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ ps9670/guide_c07-673997.html
  • 15. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 15 This update to this section will focus on: •  The recommended N5K/N2K design scenarios for SMB customer (from 100 to 300 ports) •  L2 and L3 capabilities (vPC, first-hop redundancy in N5K) •  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA) scenarios •  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios •  DC Services insertion (ACE appliance, WAAS, ASA, VSG, IPS, NAM ...etc) •  Server Access layer security for virtual machines
  • 16. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Catalyst 4507 Sup7E L3 Campus Access WAN L2 VM #4 VM #3 VM #2 Nexus 5548 with L3 module Nexus 2232 and 2248 FCoEFC NAS iSCSI •  Core Design Considerations •  Power Allocated Per Rack •  Server NIC Density •  Migration from 1G to 10G •  Cisco Nexus and NX-OS Infrastructure Strengths: •  FEX provides migration to 10G and cost effective 1G (cable reduction) •  B22 or pass-thru options support 3rd party Blade chassis •  FCoE, Adapter-FEX •  Issues to be aware of •  10GBaseT FEX (2232TM) does ‘not’ support FCoE
  • 17. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 FEX Model Servers/ Rack Ports/ Server 2224TP 4 6 2248TP-E 8 6 2232TM 6 6 FEX Model Servers/ Rack Ports/ Server 2224TP 8 2 2248TP-E 16 2 2232TM 12 2 Two racks configured as a redundancy pair - FEX ‘A’ & ‘B’ split between 2 racks Three racks configured as a redundancy pair - FEX ‘A’ & ‘B’ racked in common center rack Example Rack/Server layouts
  • 18. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Source: Crehan Research (Q4CY10) 10GBaseT Key Benefits: • 10 Gigabit bandwidth requirements for 1 Gig NIC consolidation at the server access and virtual environments • Ease of 1GBASE-T to 10GBASE-T migration • Flexible, scalable cabling with standard RJ-45 connector, at distances up to 100m • Reuse of existing structured cabling • Economics of 1Gigabit Ethernet versus 10 Gigabit Ethernet • Prepare for Server LOM • Investment protection with 1/10G capabilities
  • 19. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Nexus 2248TP List Price: $9,000 List Price w/ FET: $11,000 GE to 10GE premium/port 92% Deep-Buffer GE 11% premium/port GE to 10GE premium/port 73% Nexus 2248TP-E List Price: $10,000 List Price w/ FET: $12,000 Nexus 2232TM List Price: $11,500 List Price w/ FET: $15,500 New New •  Nexus 2000 provides an option for a per ‘line card’ migration of 1G and 10G •  Nexus 2232TM and 2232PP provide a per ‘port’ migration path for 1G to 10G
  • 20. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20   Undesired coupling of signal between adjacent cables   Main electrical parameter limiting the performance of 10G   Cannot be cancelled   Re-Training is the major barrier to use of 10GBaseT for block level storage (FCoE)   Can be prevented or mitigated by:   Space (Cat6a solution)   Shield (Cat6/Ca6a/Cat7 shielded solutions) Cable Transceiver Latency Power (each side)DistanceTechnology Twinax ~0.25ms~0.1 - 1W1-10m SFP+ CU Copper Cat6/6a/7 Cat6/6a/7 ~3ms ~3ms ~6W ~4-5W 100m 30m 10GBASE-T – 65nm
  • 21. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 Catalyst 4507 Sup7E L3 Campus Access WAN L2 Nexus 5548 with L3 module FCoEFC NAS iSCSI   Blade Chassis   Migration to 2 x 10G NIC/CNAs per blade   Typical Sizing: SMB for HP is up to 4 x c7000 enclosures (64 blade servers)   2 to 4 x 10G uplinks per chassis   Cisco Strengths:   FEX + Pass Thru enables a Nexus capable host   FCoE capabilities & Adapter-FEX   B22-HP and Nexus 4000 (IBM)
  • 22. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 Nexus 5500 + B22 (HP FEX) •  B22 extends FEX connectivity into the HP blade chassis •  Cisco Nexus 5000 Switch is a single management point for all the blade chassis I/O modules •  66% decrease in blade management points* •  Blade & rack networking consistency •  Interoperable with Nexus 2000 Fabric Extenders in the same Nexus parent switch •  End-to-end FCoE support •  Support for 1G & 10G, LOM and Mez •  Dell supports Pass-Thru as an alternative option to directly attaching Blade Servers to FEX ports Cisco Nexus B22 Series Blade FEX
  • 23. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 23 •  Consolidation for all servers both rack and blade onto the same virtual switch •  Support for 1G, migration to 10G, FC and migration to FCoE 10G server racks are supported by the addition of a new 10G FEX (2232PP or 2232TM) 1G, 10G and FCoE connectivity for HP Blade Chassis 1G server racks are supported by 1G FEX (2248TP, 2224TP) or future proofed with 1/10G FEX (2232PP or 2232TM) Support for direct connection of HBA to Unified Ports on Nexus 5500UP Support for NPV attached blade switches during FC to FCoE migration
  • 24. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 vNIC vNIC vNIC vHBA vHBA PCIe x16 10GbE/ FCoE User Definable vNICs Eth 0 FC 1 2 FC 3 Eth 127   Adapter-FEX presents standard PCIe virtual NICs (vNICs) to servers   Adapter-FEX virtual NICs are configured and managed via Nexus 5500   Forwarding, Queuing, and Policy enforcement for vNIC traffic by Nexus 5500   Adapter-FEX connected to Nexus 2000 Fabric Extender - Cascaded FEX-Link deployment   Forwarding, Queuing, and Policy enforcement for vNIC traffic still done by Nexus 5500
  • 25. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 •  vNICs are presented to the host like standard PCIe devices •  In A-FEX mode: supports up to 16 Eth vNIC and 2 FC vHBA •  Adapter Failover feature: in failure scenarios, the vNIC is mapped to the other port transparently to the OS •  In VM-FEX mode: supports up to 96 Virtual Interfaces ( vNICs + vHBAs) •  No need of trunking all VLANs to the server interface (improving security and scalability) •  3rd Party adapter supporting VN-TAG •  vNICs are presented to the host like standard PCIe devices •  In A-FEX mode supports up to 8 Virtual Interfaces total •  Max of 8 vEth •  Max of 2 vHba •  No adapter failover
  • 26. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Scale Solution Pricing HighLowHighHighLow Low •  5500 providing support for disjoint L2 domains and/or L3 •  2 x Nexus 5548 Data Center Core Virtualized Switch •  Fabric Differentiation – FCoE, FEX, Adapter-FEX, VM-FEX, Unified Port, N1KV, vPATH, VXLAN, FabricPath, UCSM •  iSCSI Boot supported Q1CY12 targeted at SMB customer base migrating to NFS/CIFS •  Dependent on ASR WAN router for DCI and other transport services (WCCP, LISP, MPLS, OTV) slot 1 slot 2 slot 3 slot 4 slot 5 slot 6 slot 7 slot 8 blade1 blade2 blade3 blade4 blade5 blade6 blade7 blade8 slot 1 slot 2 slot 3 slot 4 slot 5 slot 6 slot 7 slot 8 blade1 blade2 blade3 blade4 blade5 blade6 blade7 blade8 slot 1 slot 2 slot 3 slot 4 slot 5 slot 6 slot 7 slot 8 blade1 blade2 blade3 blade4 blade5 blade6 blade7 blade8 slot 1 slot 2 slot 3 slot 4 slot 5 slot 6 slot 7 slot 8 blade1 blade2 blade3 blade4 blade5 blade6 blade7 blade8 slot 1 slot 2 slot 3 slot 4 slot 5 slot 6 slot 7 slot 8 blade1 blade2 blade3 blade4 blade5 blade6 blade7 blade8 slot 1 slot 2 slot 3 slot 4 slot 5 slot 6 slot 7 slot 8 blade1 blade2 blade3 blade4 blade5 blade6 blade7 blade8 FCoEFC Nexus/NX-OS Features Catalyst 4507 Sup7E L3 Campus Access WAN Nexus 5548 with L3 module NAS iSCSI L2
  • 27. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 27 This update to this section will focus on: •  The recommended N5K/N2K design scenarios for SMB customer (from 100 to 300 ports) •  L2 and L3 capabilities (vPC, first-hop redundancy in N5K) •  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA) scenarios •  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios •  DC Services insertion (ACE appliance, WAAS, ASA, VSG, IPS, NAM ...etc) •  Server Access layer security for (virtual machines and bare-metal servers)
  • 28. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Catalyst 4507 Sup7E L3 Campus Access WAN L2 VM #4 VM #3 VM #2 Nexus 5548 with L3 module Nexus 2232 and 2248 FCoEFC NAS iSCSI •  Core Design Considerations •  Storage I/O capacity required per server •  Storage protocol(s) required •  Boot from FC/FCoE/iSCSI •  Cisco Nexus and NX-OS Infrastructure Strengths: QoS capabilities to support iSCSI, NFS, NAS Nexus 5500 supports FC and FCoE fabric services •  Issues to be aware of •  10GBaseT FEX (2232TM) does ‘not’ support FCoE
  • 29. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Catalyst 4507 Sup7E L3 Campus Access WAN L2 Nexus 5548 with L3 module Nexus 2232PP & B22 FCoEFC NAS iSCSI •  Unified Ports supported on Nexus 5548UP and 5596UP •  Nexus 5500 supports FC and FCoE fabric services •  Co-existence with layer 3 and layer 2 IP forwarding (vPC, STP or FabricPath) •  FCoE Supported on Nexus 5000/5500 and 2232PP and B22 FEX ports •  Issues to be aware of •  10GBaseT FEX (2232TM) does ‘not’ support FCoE •  IVR is not supported on Nexus 5500
  • 30. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 VM #4 VM #3 VM #2 •  EvPC supports FCoE with dual homed FEX as of NX-OS 5.1(3)N1 •  Boot from SAN with over an 802.3ad port channel using LACP is supported with NX- OS 5.1(3)N1 •  The ‘vfc’ is bound directly to physical port that is a member of the vPC port channel •  Prior to 5.1(3)N1 the ‘vfc’ was bound to the port channel which could result in a race condition on boot from SAN •  The FCoE VLAN must not be configured as a native VLAN •  Ports with CNA must be configured as trunk ports and STP edge ports FCoEFC interface vfc 1 bind interface eth 101/1/1 N5K-B(config)# fex 101 N5K-B(config-fex)# fcoe
  • 31. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Catalyst 4507 Sup7E L3 Campus Access WAN L2 VM #4 VM #3 VM #2 Nexus 5548 with L3 module Nexus 2232 and 2248 FCoEFC NAS iSCSI •  Core iSCSI Design Considerations Reserved fabric capacity is fundamental design consideration FC and FCoE networks tend towards very low levels of over-subscription (4:1 to 12:1 are common) QoS configuration for iSCSI needs to be considered in context of the oversubscription, topology and capabilities of attached devices
  • 32. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 DCBX Switch DCBX CNA Adapter •  Negotiates Ethernet capability’s : PFC, ETS, CoS values between DCB capable peer devices •  Simplifies Management : allows for configuration and distribution of parameters from one node to another •  Responsible for Logical Link Up/Down signaling of Ethernet and Fibre Channel •  DCBX is LLDP with new TLV fields •  The original pre-standard CIN (Cisco, Intel, Nuova) DCBX utilized additional TLV’s •  DCBX negotiation failures result in: •  per-priority-pause not enabled on CoS values •  vfc not coming up – when DCBX is being used in FCoE environment dc11-5020-3# sh lldp dcbx interface eth 1/40 Local DCBXP Control information: Operation version: 00 Max version: 00 Seq no: 7 Ack no: 0 Type/ Subtype Version En/Will/Adv Config 006/000 000 Y/N/Y 00 <snip> https://www.cisco.com/en/US/netsol/ns783/index.html
  • 33. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Transmit Queues Ethernet Link Receive Buffers Eight Virtual Lanes One One Two Two Three Three Four Four Five Five Seven Seven Eight Eight Six Six STOP PAUSE Offered Traffic t1 t2 t3 10 GE Link Realized Traffic Utilization 3G/s HPC Traffic 3G/s 2G/s 3G/sStorage Traffic 3G/s 3G/s LAN Traffic 4G/s 5G/s3G/s t1 t2 t3 3G/s 3G/s 3G/s 3G/s 3G/s 2G/s 3G/s 4G/s 6G/s •  Nexus 5000/5500 and F1/ F2 line cards support DCB (PFC, ETS and DCBX) •  Which mechanisms are beneficial for iSCSI •  Core requirement is ensuring capacity (ETS)
  • 34. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 •  Speed mismatch between 10G NAS and 1G server requires QoS tuning •  Nexus 2248TP-E utilizes a 32MB shared buffer to handle larger traffic bursts •  Hadoop, NAS, AVID are examples of bursty applications •  You can control the queue limit for a specified Fabric Extender for egress direction (from the network to the host) •  You can use a lower queue limit value on the Fabric Extender to prevent one blocked receiver from affecting traffic that is sent to other non- congested receivers ("head-of-line blocking”) N5548-L3(config)# fex 100 N5548-L3(config-fex)# hardware N2248T queue-limit 356000 N5548-L3(config-fex)# hardware N2248TPE queue-limit 4000000 rx N5548-L3(config-fex)# hardware N2248TPE queue-limit 4000000 tx N5548-L3(config)#interface e110/1/1 N5548-L3(config-if)# hardware N2348TP queue-limit 4096000 tx VM #4 VM #3 VM #2 NAS iSCSI 10G Attached Source (NAS Array) 1G Attached Server Tune 2248TP to support a larger burst (NAS, …) Tune 2248TP-E to support a extremely large burst (Hadoop, AVID, …)
  • 35. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 SONET/SDH Network DWDM Network Metro Ethernet DC Interconnect WAN MDS 9222i MDS 9222i • 1/2/4/8 FC interfaces • Up to 4095 BB_credits on a FC port • Integrated FCIP • Traffic Engineering with VSANs SAN Services: • Encryption (FCIP) • Compression (FCIP) • I/O Acceleration (FC and FCIP) • Remote Site Data Migration (DMM)
  • 36. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Speed (Gbps) Distance (Km) 1 128 2 64 4 32 8 16 Speed (Gbps) Distance (Km) 1 250 2 125 4 62 8 31 Nexus 5000/5500 Fibre Channel Ports MDS 9148 Fibre Channel Ports
  • 37. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 FC oE FC VM #4 VM #3 VM #2 NAS iSCSI FC oE FC VM #4 VM #3 VM #2 NAS iSCSI FCoE – 3km •  Converged Fabric, sharing a common 10G wire (or non vPC port channel) for FCOE and IP traffic is supported in a square topology (FCoE links can be up to 3 km on Nexus 5500) •  vPC not currently certified for the ‘DCI’ links
  • 38. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 38 This update to this section will focus on: •  The recommended N5K/N2K design scenarios for SMB customer (from 100 to 300 ports) •  L2 and L3 capabilities (vPC, first-hop redundancy in N5K) •  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA) scenarios •  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios •  DC Services insertion (ACE appliance, WAAS, ASA, IPS, NAM ...etc) •  Server Access layer security for (virtual machines and bare-metal servers)
  • 39. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 •  Updated twice a year (last one was August 2011) •  Tested in SBA labs as a complete architecture •  Overview, configuration files and deployment guides http://www.cisco.com/en/US/netsol/ns982/networking_solutions_program_home.html
  • 40. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 STP ACE ACE One Armed (straight through) ACE ACE • Bridge contexts use IEEE 802.3d (“slow” STP) • ACE 4710 won't allow configuring the same vlan on two trunks
  • 41. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Pros • Layer 2 adjacency with the real servers is not required • Allows direct server traffic to bypass ACE when load- balancing is not required Cons • Client source IP address is masked by ACE due to Source NAT (no PBR on 5500-L3) • Requires HTTP header insert as workaround to preserve client source IP address
  • 42. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Routed is more common Bridged if IP address can´t be changed easily Pros • Simple topology • Easy configuration Cons • ACE does not support any dynamic routing protocols (static only) • All server traffic must pass through ACE, whether or not load-balancing is required
  • 43. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 •  Inline cluster works independent of the WAN router and/or Nexus switching •  Mostly used on Small and Mid-size DCs •  SP owned WAN router (unable to get WCCP or PBR services from carrier) •  Two inline cards supported on WAE-7371, WAE-7341, and WAE-674 (up to 4 router connections per inline cluster) •  WAE-7371, WAE-7341, WAE-674, and WAVE-574 with one inline card support 2 router connections •  Supports asymmetric traffic http://www.cisco.com/en/US/docs/app_ntwk_services/waas/waas/v421/release/notes/ws421xrn.html#wp90802
  • 44. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 WAASWAAS WCCP L3 •  WCCP Needs configuration on edge routers (ASR) Up to 32 WAE/WAVE Supports asymmetric traffic N5K has its WAAS and router ports running in Layer 2 with routing deployed through SVIs (peering to ASR via SVI peering over L2) Layer 2 is necessary to make the routers and WAE/WAVE discover their WCCP services
  • 45. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 peer link vPC vPC EC EC Active Standby •  Support for 802.3ad port channels •  Compatible with Nexus vPC •  New Feature in ASA 8.4(1)/ASDM 6.4(1) •  EtherChannel support (ASA 5510 and higher) up to 48 x 802.3ad EtherChannels of eight active interfaces each. http://www.cisco.com/en/US/netsol/ns982/networking_solutions_program_home.html
  • 46. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 46 This update to this section will focus on: •  The recommended N5K/N2K design scenarios for SMB customer (from 100 to 300 ports) •  L2 and L3 capabilities (vPC, first-hop redundancy in N5K) •  Servers connectivity: CNAs/FCoE, and classical (NIC+HBA) scenarios •  SAN (iSCSI, FCoE and FC) and NAS deployment scenarios •  DC Services insertion (ACE appliance, WAAS, ASA, IPS, NAM ...etc) •  Server Access layer security for virtual machines
  • 47. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 Catalyst 4507 Sup7E L3 Campus Access WAN L2 VM #4 VM #3 VM #2 Nexus 5548 with L3 module Nexus 1010 FCoEFC NAS iSCSI •  Provisioning and Security Policy for virtual machines tightly coupled with the Nexus 1000v Nexus 1000v provides for NX-OS port features at the connection of the Virtual Machine vPath provides a port level redirection capability to service appliances (VSG, vASA, vWAAS) VXLAN defines secure closed user groups amongst virtual machines VM #4 VM #3 VM #2 VMware ESXi Server / MSFT HyperV Nexus 1000V vPATH & VXLAN
  • 48. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48 VM VM VM VM Nexus 1000V VEM VM VM VM VM Nexus 1000V VEM Nexus 1000V VSM Windows 8 Hyper-VNexus 1000V VSM VMware vSphere VMware vCenter SCVMM Consistent architecture, feature-set, network services & Nexus 1010 ensures operational transparency across multiple hypervisors.
  • 49. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 49 Upstream Switch VSM VEM VPATH Interception In/Out VMware ESX/ESXi Server Nexus 1000V vPATH •  Intelligence build into Virtual Ethernet Module (VEM) of Cisco Nexus 1000V virtual switch (version 1.4 and above); •  vPATH has the following main functions: •  Intelligent Traffic interception for Virtual Service Nodes (VSN): vWAAS & VSG; •  Offload the processing of Pass-through traffic (from vWAAS, for instance); •  ARP based health check; •  Maintain Flow entry table. •  vPATH is Multitenant Aware •  Leveraging vPATH can enhance the service performance by moving the processing to hypervisor •  The VSN interested packets are redirected by vPATH by encapsulating the original frame and forwarding to service appliance
  • 50. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 50 Packet Flow Packet destined towards the Server entering the Physical Switch. Physical Switch forwards the packet to VMWare ESX1 (where the destination Server Virtual Machine resides) VEM determines that the packet has to be forwarded to Server VM But the Server VM’s Port Profile has vPATH interception. The incoming L2 frame is encapsulated with vPATH header which says redirect the packet to VSN 1. The interception packet is sent in different VLAN (Nexus 1000v Service VLAN) Since the VSN is located in another ESX host, the encapsulated VPATH packet is switched from ESX 1 to ESX2. VSN 1 receives vPATH encapsulated packet, decapsulates the outer vPATH header, processes the inner frame and sends the “services processed “packet out with vPATH encapsulation (with dest mac as ESX1 Nexus1000v vSwitch vPATH MAC Addr) in Service VLAN. The vPATH Encapsulated return packet switched from ESX2 to ESX1. The vPATH Header is decapsulated by VEM and inner packet is forwarded to the specified destination without further vPATH interception (in the Server VLAN) Server VM receives the packet. 2 3 4 5 6 VMware ESX 1 VPATH VMware ESX 2 VPATH Nexus 1000V VEMs Nexus 1000V VSM vCenter Server VEM: Virtual Ethernet Module VSM: Virtual Supervisor Module VSN: Virtual Service Node 2 1 4 1 3 8 6 Server 5 7 7 8
  • 51. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 VM 1 VM n VSG 1.0 vASA 1.0 VNMC VM 1 VM n VSG 1.0 vASA 1.0 NAT IPSecVPN (Site-to-Site) Default Gateway DHCP Static Routing Basic Stateful Protocol
  • 52. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52   Ethernet in IP overlay network   Entire L2 frame encapsulated in UDP   50 bytes of overhead   Include 24 bit VXLAN Identifier   16 Million logical networks   VXLAN can cross Layer 3 (IPv4 currently)   Tunnel between VEMs   VMs do NOT see VXLAN ID   IP multicast used for L2 broadcast/ multicast, unknown unicast   Technology submitted to IETF for standardization (Cisco, VMware, Citrix, Red Hat, Broadcom, Arista, and Others) Outer MAC DA Outer MAC SA Outer 802.1Q Outer IP DA Outer IP SA Outer UDP VXLAN Header (8 bytes) Inner MAC DA Inner MAC SA Optional Inner 802.1Q Original Ethernet Payload CRC VXLAN Encapsulation Original Ethernet Frame Flags 8 bits Res. 8 bits Reserved 24 bits VXLAN Networker Identifier (VIN) 24 bits
  • 53. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 53 Server VM VM VM VM Cisco UCS VM-FEX VMWare ESX Server VM VM VM VM Cisco UCS VM-FEX Red Hat KVM Server VM VM VM VM Cisco UCS VM-FEX Microsoft Hyper-V Virtual Ethernet ports (vEth) Virtual Ethernet ports (vEth) vCenter Cisco Nexus 5500 or UCS Fabric Interconnect RHEV-M MSFT SCVMM
  • 54. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54 Opt A Server form factor Rack/Blade FEX & FET  Adapter-FEX & VM-FEX  vPC  Multi-hop FCoE, iSCSI, NAS  Unified Ports & FC Targets  Virtualized Security (vPath, VXLAN)  Services (ACE, ASA, WAAS) Compatible MPLS, OTV & LISP ASR1000 •  Design Strengths: Leverages a single Data Center switch to support ‘all’ storage and compute connectivity •  Considerations: May need to consolidate the LAN and Data Center L3 into a Nexus 5596 if budget constraints exist