SlideShare a Scribd company logo
1 of 24
Download to read offline
VMware Virtual SAN
Layer 2 and Layer 3
Network Topologies
Deployments
T E C H N I C A L W H I T E P A P E R
T E C H N I C A L W H I T E P A P E R / 1
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Table of Contents
Introduction.........................................................................................................................................2
Network and vSphere Technologies ............................................................................................2
Networking Related Technologies........................................................................................................... 2
IP Multicast....................................................................................................................................................... 2
Internet Group Management Protocol (IGMP).............................................................................. 2
Protocol-Independent Multicast (PIM).............................................................................................. 3
vSphere Related Technologies ..................................................................................................................4
vSphere Virtual Switch ..............................................................................................................................4
VMkernel Network Interface................................................................................................................... 5
Static Routes................................................................................................................................................... 7
Hosts Profiles..................................................................................................................................................8
Supported Network Topologies ....................................................................................................9
Layer 2 Network Topologies.......................................................................................................................9
Layer 2 Physical Network Configuration ..............................................................................................9
Cisco Hardware Devices...........................................................................................................................11
Brocade Hardware Devices.....................................................................................................................11
Layer 3 Network Topologies......................................................................................................................12
Layer 3 Physical Network Configuration.............................................................................................13
Virtual Network Configuration..................................................................................................... 18
Creating vSphere Distributed Switch....................................................................................................18
Creating vSphere Distributed Port Groups ........................................................................................18
Creating VMkernel Network Interface for Virtual SAN.................................................................18
Host Configuration Information................................................................................................................19
Adding Host Static Routes .........................................................................................................................19
Enable and Configure Virtual SAN........................................................................................................ 20
Validating Virtual SAN Configuration and Health .................................................................. 21
Summary ........................................................................................................................................... 23
Acknowledgments.......................................................................................................................... 23
Author ................................................................................................................................................ 23
T E C H N I C A L W H I T E P A P E R / 2
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Introduction
VMware Virtual SAN is a distributed object storage platform that depends on IP Network connectivity to provide
access to storage resources and storage management infrastructure services. Virtual SAN requires that all of the
participating hosts can communicate over an IP network and are members of the same vSphere Cluster.
The locally attached storage devices from all of the hosts are pooled and presented as a single datastore to all
members of the cluster once they have established IP connectivity and can communicate on the same Ethernet
Layer 2 domain.
Virtual SAN clusters can also be formed with hosts that are connected to different Layer 3 network segments.
The network Layer 3 segments must first be configured with IP Multicast in order to make all segments reachable
by all the members of the cluster.
Although the Virtual SAN network traffic and Virtual Machine traffic can coexist on the same networks, this paper
will not cover the configuration semantics and tuning of Virtual Machine network traffic.
The focus of this paper is based on the physical network and vSphere related technologies that are required to
deploy Virtual SAN across Layer 2 and Layer 3 topologies.
This paper will help virtualization, network, and storage implementation engineers, administrators, and architects
interested in deploying Virtual SAN on Layer 2 and across Layer 3 network topologies.
Network and vSphere Technologies
This section provides an overview and description of the different physical network and vSphere technologies
that are required for deployments of Virtual SAN across Layer 2 and Layer 3 IP network topologies.
Networking Related Technologies
IP Multicast
IP Multicast is an IP Network communication mechanism used to efficiently send communications to many
recipients. The communication can be in the form of one source to many recipients (one-to-many) or many
sources to many recipients (many-to-many).
The recipients may be located in the same Layer 3 segment or distributed across multiple Layer 3 segments. In
the case where the recipients are in the same Layer 3 segment, the recipients will also share the same Ethernet
Layer 2 domain.
An IP Multicast address is called a Multicast Group (MG). IP Multicast relies on communication protocols used by
hosts, clients, and network devices to participate in multicast-based communications.
Communication protocols such as Internet Group Management Protocol (IGMP) and Protocol Independent
Multicast (PIM) are integral components and dependencies for the use IP multicast communications.
IP Multicast is a fundamental requirement of Virtual SAN. Virtual SAN depends on IP multicast communication for
the process of joining and leaving cluster groups as well as other intra-cluster communication services. IP
multicast must be enabled and configured in the IP Network segments that will carry the Virtual SAN traffic
service.
Internet Group Management Protocol (IGMP)
IGMP is a communication protocol used to dynamically add receivers to IP Multicast group memberships. The
IGMP operations are restricted within individual Layer 2 domains. IGMP allows receivers to send requests to the
Multicast Groups they would like to join.
Becoming a member of Multicast Groups allows the routers to know to forward traffic that is destined for the
T E C H N I C A L W H I T E P A P E R / 3
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Multicast Groups on the Layer 3 segment where the receiver is connected. This allows the switch to keep a table
of the individual receivers that need a copy of the Multicast Group traffic.
The participating hosts in a Virtual SAN cluster will negotiate for IGMP version 3. If the network does not support
IGMP version 3, the hosts will fall back to IGMP version 2. VMware recommends that the same version of IGMP be
used in all Layer 3 segments.
Protocol-Independent Multicast (PIM)
Protocol-Independent Multicast (PIM) is a family of Layer 3 multicast routing protocols that provide different
communication techniques for IP Multicast traffic to reach receivers that are in different Layer 3 segments from
the Multicast Groups sources. There are different versions of PIM, each of which is best suited for different IP
Multicast topologies. The main four versions of PIM are these:
โ€ข PIM Dense Mode (PIM-DM) โ€“ Dense Mode works by building a unidirectional shortest-path tree from each
Multicast Groups source to the Multicast Groups receivers, by flooding multicast traffic over the entire Layer 3
Network and then pruning back branches of the tree where no receivers are present. Dense Mode is
straightforward to implement and it is best suited for small Multicast deployments of one-to-many.
โ€ข PIM Sparse Mode (PIM-SM) โ€“ Sparse Mode avoids the flooding issues of Dense Mode by assigning a root
entity for the unidirectional Multicast Groups shortest-path tree called a rendezvous point (RP). The
rendezvous point is selected in a per Multicast Group basis.
Figure 1: Layer 3 Network PIM Sparse Mode Communication Flow
Sparse Mode scales fairly well for larger Layer 3 Networks and is best suited for one-to-many Multicast
topologies. If the network only supports IGMP version 2, VMware recommends the use of PIM-SM for Virtual SAN
deployments over Layer 3.
โ€ข Bidirectional PIM (Bi-PIM) โ€“ Bidirectional PIM assumes that there are many MGs that have many sources
and many receivers (many-to-many). Whereas Sparse Mode can manage many-to-many Multicast
topologies, Bidirectional PIM does it by reducing the load on the Multicast routers as compared to Sparse
Mode.
Bidirectional PIM does not build a shortest-path tree, so MG data paths may have longer end-to-end delays
than Sparse Mode, however Bidirectional PIM allows for a Multicast Group traffic to flow both ways over the
same data path.
โ€ข PIM Source-Specific Multicast (PIM-SSM) โ€“ Source Specific Multicast is similar to Sparse Mode but it carries
information about the IP of the source. Receivers join Multicast Groups based on the source of the Multicast
Groups.
T E C H N I C A L W H I T E P A P E R / 4
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Figure 2: Layer 3 Network PIM Source Specific Mode Communication Flow
With Source Specific Multicast, shortest-path trees are built and are rooted in just one source, offering a more
secure and scalable model for a limited amount of applications (mostly broadcasting of content).
If the networks are configured with IGMP version 3, then Source Specific Multicast requires the receivers to
support IGMP version 3.
vSphere Related Technologies
vSphere Virtual Switch
VMware Virtual SAN supports the use of both the vSphere Standard Switch and vSphere Distributed Switch.
However, VMware recommends the use of the vSphere Distributed Switch to take advantage of its centralized
management capabilities as well as advanced network features.
Figure 3: VMware Distributed Switched - QoS with Network I/O Control
The Virtual SAN network configuration can be implemented with vSphere standard or distributed switches. In
either case, the networking configuration requirements and behavior remain relatively the same.
vSphere Distributed switches provide several advantages around management, advanced network features, and
scalability capabilities that are all conducive the benefits and values of VMware Virtual SAN.
vSphere Distributed Switches facilitate large scale deployments with the support of up to 500 hosts per switch.
They also provide access to advanced network features such as Network I/O Control and IP Multicast Filtering.
For scenarios where different network traffic services share physical network adapters, VMware recommends the
T E C H N I C A L W H I T E P A P E R / 5
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
use of Network I/O Control as mechanism for bandwidth allocation control for traffic management optimization
(QoS).
Note: While the use of the vSphere Distributed Switch and the Network I/O Control feature are typically part of
the vSphere Enterprise Plus licensing SKU, their use is also exclusively included as part of the VMware Virtual
SAN license agreement.
VMkernel Network Interface
The VMkernel networking layer provides network connectivity to hosts and also handles the standard system
traffic of multiple vSphere network services such as vSphere vMotion, IP storage, Fault Tolerance, Virtual SAN,
and others.
Figure 4: Creating a VMkernel network Interface associated with Virtual SAN Traffic Service
Any host that is going to participate as a member of a Virtual SAN cluster must have the Virtual SAN traffic
service associated with a VMkernel network interface.
The Virtual SAN traffic service will automatically assign the default multicast address settings to each host which
will then make them eligible to send frames to a default Multicast Group, and Multicast Group Agent.
โ€ข Virtual SAN Default Multicast Group address 224.1.2.3
โ€ข Virtual SAN Default Multicast Group Agent address 224.2.3.4
The physical uplinks used by the Virtual SAN network interfaces should be connected to physical switches that
are configured with IGMP and IGMP Snooping version 2 or version 3 on a common network segment that will
carry the Virtual SAN network traffic.
When deploying on a Layer 2 network, one of the switches on that network segment (VLAN) should be
configured as the IGMP Querier.
Alternatively, when the deployment is being performed across Layer 3 network segments, a Layer 3 capable
device (router or switch) with a connection and access to the same Layer 3 network segments can be configured
as the IGMP Querier.
T E C H N I C A L W H I T E P A P E R / 6
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
At this point, the hosts will establish their method of communication by joining the Virtual SAN default Multicast
Group addresses, 224.1.2.3 and default Multicast Group Agent addresses 224.2.3.4.
In order to avoid unnecessary IP multicast floods within the Layer 2 segments, VMware recommends configuring
IGMP snooping with an IGMP Querier in order to control the number of physical ports on the switches that will
receive IP multicast frames.
For optimal network communication and efficiency, Virtual SAN multicast frames should be exclusively
forwarded to the ports that are associated with the uplinks of the VMkernel network interfaces that are
configured to carry the Virtual SAN traffic.
Figure 5: Multiple Virtual SAN Clusters
In scenarios with multiple Virtual SAN clusters, VMware recommends changing the default Multicast Group
address and the default Multicast Group Agent address when the different clusters will share the same Layer 2
network segment.
This will prevent the clusters from receiving unnecessary multicast frames from one another.
In scenarios where members of a cluster have been deployed across different network segments (Layer 3),
VMware recommends changing the default Multicast Group address and default Multicast Group Agent address.
VMware recommends the use of the Multicast Address range of 239.0.0.0/8 when changing the default
addresses. Also, consult with members of the network team in order to identify the adequate Multicast Group
addresses to use in order to comply with any potential Multicast Addressing policies that may exist.
For detailed instruction on how to change the default multicast address for Virtual SAN, please refer to the
VMware Knowledge Base article 2075451.
http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2075451
TCP/IP Stacks
vSphere 6.0 introduced a new TCP/IP Stack architecture where multiple TPC/IP stacks can be utilized to manage
different VMkernel network interfaces and their associated traffic.
As a result, the new architecture provides the ability to configure traffic services such vMotion, Management,
Fault Tolerance, etc. on completely isolated TCP/IP stacks with the ability to use multiple default gateways.
For network traffic isolation and security requirements, VMware recommends deploying the different traffic
services onto different network segments in an order to prevent the different traffic services from traversing
through the same default gateway.
T E C H N I C A L W H I T E P A P E R / 7
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Figure 6: vSphere Multiple TCP/IP Stack Architecture
In order to configure the traffic services onto separate TCP/IP stacks, each traffic service type needs to be
deployed onto their own network segments.
The network segments will be accessed through a physical network adapter with VLAN segmentation and
individually mapped to dissimilar VMkernel network interfaces with the respective traffic services (Virtual SAN,
vMotion, Management, etc.) enabled.
Built-in TCP/IP stacks available in vSphere:
โ€ข Default TCP/IP Stack โ€“ multi-purpose stack that can be used to manage any of the host related traffic
services. Shares a single default gateway between all configured network services.
โ€ข vMotion TCP/IP Stack โ€“ utilized to isolate vMotion traffic onto its own stack. The use of this stack
completely removes or disable vMotion traffic from the default TCP/IP stack.
โ€ข Provisioning TCP/IP Stack โ€“ utilized to isolate some virtual machine related operations such as cold
migrations, cloning, snapshot, NFC related traffic.
It is assumed that environments with isolated network requirements for the vSphere traffic services will not be
able to use the same default gateway to direct traffic.
The use of the different TCP/IP stacks facilitates the management for traffic isolation with the ability to use
different default gateways.
Currently, vSphere 6.0 does not include a dedicated TCP/IP stack for the Virtual SAN traffic service nor the
supportability for the creation of custom Virtual SAN TCP/IP stack.
To ensure Virtual SAN traffic in Layer 3 network topologies leaves over the Virtual SAN VMkernel network
interface, add the Virtual SAN VMkernel network interface to the Default TCP/IP Stack and define static routes for
all of the Virtual SAN cluster members.
Static Routes
The use of static routes is required by traffic services for which vSphere does not provide a non-Default TCP/IP
stack.
In the VMware recommended deployment scenario where the Management and Virtual SAN traffic services are
configured to use different Layer 3 network segments, they will share the Default TCP/IP Stack but be configured
in different Layer 2 domains.
The default route for the Default TCP/IP Stack should remain with the Management VMkernel network interface.
Static routes will be added for the Virtual SAN traffic to egress of the Virtual SAN VMkernel network interface.
T E C H N I C A L W H I T E P A P E R / 8
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
It is only necessary to configure a single static route per host for each remote Virtual SAN Layer 3 segment or a
single summary static route if the Virtual SAN Layer 3 segment addressing plan allows it.
Figure 7: Static Route Logical Diagram
Hosts Profiles
Consider the use of Host Profiles as a management option to deal with the operating management functions of
the communications paths that are established with the use of static routes.
Host Profiles provide an automated and centrally managed mechanism for host configuration and compliance.
The use of Host Profiles reduces configuration risks, and can improve efficiency by reducing reliance on
repetitive, manual tasks.
Host Profiles provide the ability to capture the configuration of a pre-configured host, and store the configuration
as a managed object and use the catalog of parameters contained within to configure networking, storage,
security and other host-level parameters.
Figure 8: Host Profiles to Storing Static Routes
T E C H N I C A L W H I T E P A P E R / 9
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Static routes are stored within the Hosts Profiles as part of their catalog parameters. Host Profiles can be applied
to either individual hosts or a cluster; applying a Host Profile to a cluster will affect all hosts in the cluster and
result in a consistent configuration across all hosts in that cluster.
Host Profiles can also be used to validate the system configuration by checking compliance for any host or
cluster against an associated standardized Host Profile.
Supported Network Topologies
This section covers the different supported network topologies and the impact they introduce to the overall
deployment and management of Virtual SAN in different network scenarios.
Layer 2 Network Topologies
Layer 2 network topologies are defined as networking architectures that are composed of devices that operate at
the Data Link layer (Layer 2) of the OSI model.
This network topology is responsible for forwarding packets through intermediate Layer 2 devices such as hosts,
bridge, or switches.
It is required that all of the hosts participating in a Virtual SAN cluster are able to establish communication
through the VMkernel interface connected to a common Layer 2 network segment.
The Layer 2 network topology offers the least complex implementation and management of the IP Multicast
requirements for Virtual SAN while constraining the radius of the cluster.
All cluster members will send IGMP join requests over the VMkernel network interfaces that are used for the
Virtual SAN traffic service.
By default, the hosts will negotiate their communication for IGMP version 3 and failback to IGMP version 2
whenever the physical network device does not support IGMP version 3.
For maximum Layer 2 traffic efficiency, VMware recommends the use and configuration of IGMP Snooping in all
the switches configured in the Layer 2 network segment where Virtual SAN is present.
IGMP Snooping allows physical network devices to forward Multicast frames to only the interfaces where IGMP
Join requests are being observed.
Layer 2 Physical Network Configuration
This section covers the physical network configuration procedures to enable IP Multicast for Virtual SAN. The
configuration is focused on IGMP snooping and IGMP snooping Querier.
We will assume all members of the cluster are in the same Layer 2 network segment, represented by VLAN 10. In
this scenario the role of IGMP Querier will be performed by a physical switches and not a router.
T E C H N I C A L W H I T E P A P E R / 1 0
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Figure 9: Virtual SAN Layer 2 Network Topology
For this scenario we will provide two different configuration examples that will be based on two different vendor
platforms. The first example is based on the configuration of Cisco Nexus switch devices operating with the Cisco
Nexus platform OS with IGMP version 3.
The second example is based on the configuration of Brocade VDX switch devices with IGMP version 2. Currently,
Brocade VDX switch devices do not support IGMP version 3 and therefore the configuration will be based on
IGMP version 2.
The configuration procedures for IP Multicast varies between different vendors and their respective network
devices. Consult the network device vendor documentation for in-depth details and specific advanced
procedures that go beyond the scope of this document.
T E C H N I C A L W H I T E P A P E R / 1 1
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Cisco Hardware Devices
The following a sample configuration of IGMP version 3 (enabled by default per VLAN) in Nexus 6000 running
NX-OS 7.0(3):
Cisco Switch 1
configure terminal
ip igmp snooping
interface vlan 10
ip igmp snooping
Cisco Switch 2
configure terminal
ip igmp snooping
interface vlan 10
ip igmp snooping
ip igmp snooping querier 172.16.10.253
Cisco Switch 3
configure terminal
ip igmp snooping
interface vlan 10
ip igmp snooping
Brocade Hardware Devices
The following is a sample configuration of IGMP version 2 in VDX 6740s running NOS 7.0.0:
Brocade Switch 1
configure terminal
ip igmp snooping enable
interface vlan 10
ip igmp snooping enable
Brocade Switch 2
configure terminal
ip igmp snooping enable
interface vlan 10
ip igmp snooping enable
ip igmp snooping querier enable
Brocade Switch 3
configure terminal
ip igmp snooping enable
interface vlan 10
ip igmp snooping enable
T E C H N I C A L W H I T E P A P E R / 1 2
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Layer 3 Network Topologies
Layer 3 network topologies are defined as networking architectures that are composed of devices that are
capable of operating at the network layer (Layer 3) of the OSI model.
This network topology is responsible for routing packets through intermediate Layer 3 capable devices such as
routers and Layer 3 capable switches.
All Virtual SAN cluster members are required to join the clusterโ€™s Multicast Group by sending IGMP Join requests
over the VMkernel network interfaces that are being used for the Virtual SAN traffic service.
Whenever hosts are deployed across different Layer 3 network segments, the result is a routed network
topology.
Figure 10: Virtual SAN Over a Layer 3 Network Topology
However, since there is a need for those requests to be sent by each Layer 3 segment Default Gateway, the IGMP
Querier has to be the Default Gateway itself.
The Default Gateway will use the Multicast Group memberships from the IGMP Joins to update the PIM protocol
running.
In Layer 3 Network topologies, VMware recommends the use and configuration of IGMP Snooping in all the
switches configured in the Layer 2 domains where hosts participating in the Virtual SAN cluster will be present.
T E C H N I C A L W H I T E P A P E R / 1 3
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Layer 3 Physical Network Configuration
This section covers the configuration procedures for IGMP snooping, IGMP Querier and PIM. We will assume that
there are three Layer 2 domains, each with its own Layer 3 segment. The Layer 2 domains will be represented by
VLANs 10, 172 and 192, as shown in the figure below.
Two configuration examples are provided: one based on the Cisco Nexus platform (with IGMP version 3 and
Source Specific Multicast) and the Brocade VDX (with IGMP version 2 and Sparse Mode).
Configuration procedures are typically different based on hardware vendorโ€™s implementation. Consult the
hardware vendor documentation for in-depth and specific procedures that are beyond the scope of this
document.
Figure 11: Layer 3 Network Logical Design
NETW OR KS SU BNE TS VLAN ROUTE R LO0 MGM AGM RP
VSAN1 172.16.10.0/24 172 R1 1.1.1.1 224.1.2.3 224.2.3.4 2.2.2.2
VSAN2 192.16.10.0/24 192 R2 2.2.2.2 224.1.2.3 224.2.3.4 2.2.2.2
VSAN3 10.16.10.0/24 10 R3 3.3.3.3 224.1.2.3 224.2.3.4 2.2.2.2
Table 1: Network Information Configuration Table
MGM - Master Group Multicast Lo0 - Loopback Interface 0
AGM - Agent Group Multicast RP - Rendezvous Point
T E C H N I C A L W H I T E P A P E R / 1 4
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Cisco Hardware Devices
The following a sample configuration of IGMP version 3 (enabled by default per VLAN) and Sparse Mode in Nexus
6000 running NX-OS 7.0(3)
Cisco Switch 1 (S1)
configure terminal
ip igmp snooping
vlan configuration 172
ip igmp snooping
Cisco Switch 2 (S2)
configure terminal
ip igmp snooping
vlan configuration 192
ip igmp snooping
Cisco Switch 3 (S3)
configure terminal
ip igmp snooping
vlan configuration 10
ip igmp snooping
Cisco Router 1 (R1)
configure terminal
feature pim
ip pim rp-address 2.2.2.2 group-list 224.1.2.3/32
ip pim rp-address 2.2.2.2 group-list 224.2.3.4/32
interface vlan 201
description Network Uplink
ip address 20.1.1.1/30
ip pim sparse-mode
interface vlan 172
ip address 172.16.10.253/24
ip router ospf 9 area 0.0.0.0
ip igmp snooping
ip igmp snooping querier 172.16.10.253
interface Loopback 1
ip address 1.1.1.1/32
ip router ospf 9 area 0.0.0.0
Cisco Router 2 (R2)
configure terminal
feature pim
ip pim rp-address 2.2.2.2 group-list 224.1.2.3/32
ip pim rp-address 2.2.2.2 group-list 224.2.3.4/32
interface vlan 202
description Network Uplink
ip address 20.1.2.1/30
ip pim sparse-mode
interface vlan 192
ip address 192.16.10.253/24
ip router ospf 9 area 0.0.0.0
ip igmp snooping
ip igmp snooping querier 192.16.10.253
interface Loopback 2
ip address 2.2.2.2/32
ip router ospf 9 area 0.0.0.0
T E C H N I C A L W H I T E P A P E R / 1 5
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Cisco Router 3 (R3)
configure terminal
feature pim
ip pim rp-address 2.2.2.2 group-list 224.1.2.3/32
ip pim rp-address 2.2.2.2 group-list 224.2.3.4/32
interface vlan 203
description Network Uplink
ip address 20.1.3.1/30
ip pim sparse-mode
interface vlan 10
ip address 10.16.10.253/24
ip router ospf 9 area 0.0.0.0
ip igmp snooping
ip igmp snooping querier 10.16.10.253
interface Loopback 3
ip address 3.3.3.3/32
ip router ospf 9 area 0.0.0.0
T E C H N I C A L W H I T E P A P E R / 1 6
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Brocade Hardware Devices
The following a sample configuration of IGMP version 2 and Sparse Mode in VDX 6740s running NOS 7.0.0.
Brocade Switch 1 (S1)
configure terminal
ip igmp snooping enable
interface vlan 172
ip igmp snooping enable
Brocade Switch 2 (S2)
configure terminal
ip igmp snooping enable
interface vlan 192
ip igmp snooping enable
Brocade Switch 3 (S3)
configure terminal
ip igmp snooping enable
interface vlan 10
ip igmp snooping enable
Brocade Router 1 (R1)
configure terminal
interface vlan 201
interface vlan 172
ip igmp snooping enable
ip igmp snooping querier enable
rbridge-id 101
router pim
rp-address 2.2.2.2
router ospf
area 0.0.0.0
interface loopback 1
ip address 1.1.1.1/32
ip ospf area 0.0.0.0
no shutdown
interface ve 201
description Network Uplink
ip address 20.1.1.1/30
ip ospf area 0.0.0.0
ip pim-sparse
no shutdown
interface ve 172
ip address 172.16.10.1/24
ip ospf area 0.0.0.0
no shutdown
T E C H N I C A L W H I T E P A P E R / 1 7
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Brocade Router 2 (R2)
configure terminal
interface vlan 202
interface vlan 192
ip igmp snooping enable
ip igmp snooping querier enable
rbridge-id 102
router pim
rp-address 2.2.2.2
router ospf
area 0.0.0.0
interface loopback 2
ip address 2.2.2.2/32
ip ospf area 0.0.0.0
no shutdown
interface ve 202
description Network Uplink
ip address 20.1.2.1/30
ip ospf area 0.0.0.0
ip pim-sparse
no shutdown
interface ve 192
ip address 192.16.10.1/24
ip ospf area 0.0.0.0
no shutdown
Brocade Router 3 (R3)
configure terminal
interface vlan 203
interface vlan 10
ip igmp snooping enable
ip igmp snooping querier enable
rbridge-id 103
router pim
rp-address 2.2.2.2
router ospf
area 0.0.0.0
interface loopback 3
ip address 3.3.3.3/32
ip ospf area 0.0.0.0
no shutdown
interface ve 203
description Network Uplink
ip address 20.1.3.1/30
ip ospf area 0.0.0.0
ip pim-sparse
no shutdown
interface ve 10
ip address 10.16.10.1/24
ip ospf area 0.0.0.0
no shutdown
T E C H N I C A L W H I T E P A P E R / 1 8
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Virtual Network Configuration
This section details the configuration procedures for the virtual network components and features such as
vSphere Distributed Switch, vSphere Distributed Port Groups, VMkernel Network Interfaces, Virtual SAN Traffic
service, and hosts static routes.
Creating vSphere Distributed Switch
Create a vSphere distributed switch on a data center to manage the networking configuration of multiple hosts at
a time from a central place.
โ€ข From the vSphere Web Client, navigate to a data center.
โ€ข In the navigator, right-click the data center and select Distributed Switch > New Distributed Switch.
โ€ข In Name and Location, type a name for the new distributed switch and click Next.
โ€ข Select version, select the compatible with ESXi 6.0 and later and click Next
โ€ข In Edit Settings configure the distributed switch settings according to environment requirements. Click next,
then Finish.
Creating vSphere Distributed Port Groups
Add a distributed port group to a vSphere Distributed Switch to create a distributed switch network to associate
with VMkernel adapters.
โ€ข From the vSphere Web Client, navigate to the distributed switch.
โ€ข Right-click the distributed switch and select Distributed port group > New distributed port group.
โ€ข In the Select name and location section, type the name of the new distributed port group, VSAN1, and click
Next.
โ€ข In the Configure settings section, configure VLAN (172), and Failover Order. Set one uplink to active, and the
other to standby, then keep the default settings beyond that and click Next, and then Finish.
Creating VMkernel Network Interface for Virtual SAN
Create a VMkernel adapter on a host that is associated with a distributed switch to provide network connectivity
to the host and to handle the traffic for Virtual SAN. Dedicate a single distributed port group per VMkernel
adapter. For better isolation, you should configure one VMkernel adapter with one traffic type.
โ€ข From the vSphere Web Client, navigate to the host
โ€ข Under Manage, select Networking and then select VMkernel adapters.
โ€ข Click Add host networking.
โ€ข On the Select connection type page, select VMkernel Network Adapter and click Next.
โ€ข From the Select an existing network option, select a distributed port group and click Next.
โ€ข On the Port properties page, configure the settings for the VMkernel adapter based on the network
information listed on table 2. Enable the Virtual SAN traffic service, then click Next, then Finish.
T E C H N I C A L W H I T E P A P E R / 1 9
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Host Configuration Information
N E T W O R K S H O S T S V S A N V M K I P S U B N E T S V L A N
VSAN1 octo.vsan.a.01 172.16.10.9/24 172.16.10.0/24 172
VSAN1 octo.vsan.a.02 172.16.10.10/24 172.16.10.0/24 172
VSAN1 octo.vsan.a.03 172.16.10.11/24 172.16.10.0/24 172
VSAN1 octo.vsan.a.04 172.16.10.12/24 172.16.10.0/24 172
VSAN2 octo.vsan.b.01 192.16.10.9/24 192.16.10.0/24 192
VSAN2 octo.vsan.b.02 192.16.10.10/24 192.16.10.0/24 192
VSAN2 octo.vsan.b.03 192.16.10.11/24 192.16.10.0/24 192
VSAN2 octo.vsan.b.04 192.16.10.12/24 192.16.10.0/24 192
VSAN3 octo.vsan.c.01 10.16.10.9/24 10.16.10.0/24 10
VSAN3 octo.vsan.c.02 10.16.10.10/24 10.16.10.0/24 10
VSAN3 octo.vsan.c.03 10.16.10.11/24 10.16.10.0/24 10
VSAN3 octo.vsan.c.04 10.16.10.12/24 10.16.10.0/24 10
Table 2: Host Network Information Configuration Table
Adding Host Static Routes
Static routes are used to instruct the Default TCP/IP Stack to use a different default gateway to direct the Virtual
SAN traffic through the necessary paths to reach the remote Virtual SAN networks.
Static routes are required by all the hosts between all the different individual Virtual SAN networks.
N E T W O R K S S U B N E T S G A T E W A Y S V L A N S R O U T E R S
VSAN1 172.16.10.0/24 172.16.10.253 172 R1
VSAN2 192.16.10.0/24 192.16.10.253 192 R2
VSAN3 10.16.10.0/24 10.16.10.253 10 R3
Table 3: Virtual SAN Network Addresses
โ€ข Static Routes for hosts on VSAN 1 Network:
esxcli network ip route ipv4 add โ€“g 172.16.10.253 -n 192.168.10.0/24
esxcli network ip route ipv4 add โ€“g 172.16.10.253 -n 10.16.10.0/24
โ€ข Static Routes for hosts on VSAN 2 Network:
esxcli network ip route ipv4 add โ€“g 192.168.10.253 -n 172.16.10.0/24
esxcli network ip route ipv4 add โ€“g 192.168.10.253 -n 10.16.10.0/24
โ€ข Static Routes for hosts on VSAN 3 Network:
esxcli network ip route ipv4 add โ€“g 10.16.10.253 -n 172.16.10.0/24
esxcli network ip route ipv4 add โ€“g 10.16.10.253 -n 10.16.10.0/24
After adding the static routes, the Virtual SAN traffic connectivity should be available across all networks.
Use the vmkping command test and confirm communication between the different networks by pinging the
different default gateway from all three networks.
โ€ข Test connectivity to remote hosts from VSAN 1 Network:
vmkping โ€“I vmk3 192.168.10.253
vmkping โ€“I vmk3 10.16.10.253
โ€ข Test connectivity to remote hosts from VSAN 2 Network:
vmkping โ€“I vmk3 172.16.10.253
vmkping โ€“I vmk3 10.16.10.253
T E C H N I C A L W H I T E P A P E R / 2 0
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
โ€ข Test connectivity to remote hosts from VSAN 2 Network:
vmkping โ€“I vmk3 192.168.10.253
vmkping โ€“I vmk3 172.16.10.253
Note: Use vmkping to validate the connectivity across all hosts in all three networks after the VMkernel network
interfaces have been created on each host.
Enable and Configure Virtual SAN
Once all the necessary physical and virtual networking configurations have been successfully implemented, it is
time to enable Virtual SAN. Virtual SAN can be enabled during or after a vSphere Cluster is created.
โ€ข From the vSphere Web Client, navigate to a data center.
โ€ข In the navigator, right-click the data center and select right click > New cluster.
โ€ข Click Turn On Virtual SAN
Figure 12: Enable Virtual SAN
After enabling Virtual SAN, the Virtual SAN storage provider is automatically registered with the vCenter Server
and the Virtual SAN datastore is created across the Layer 3 fabric.
T E C H N I C A L W H I T E P A P E R / 2 1
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Validating Virtual SAN Configuration and Health
Once Virtual SAN has been enabled, the clusterโ€™s communication and membership can be validated in multiple
ways ranging from the vSphere Web Client to multiple command line interface tools available in vSphere.
The vSphere Web Client offers multiple locations in the UI that offer overall configuration status as well as the
health and validation of the network configuration.
Overall Network Status โ€“ navigate to the cluster management view and general settings. If all the members of the
cluster are successfully communicating via the assigned multicast group and address, the network status is
displayed as normal.
Figure 13: Virtual SAN Network Communication Status
Detailed Network Health and Multicast Assessment โ€“ navigate to the clusters monitoring view for Virtual SAN.
Review the Network health section that contains several checkpoints for network health and configuration
validation points.
T E C H N I C A L W H I T E P A P E R / 2 2
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Figure 14: Virtual SAN Network Configuration Health
We recommend re-testing the network health and multicast assessment after making any future network
changes by clicking the Retest button.
Regardless of the deployment model of choice, Virtual SAN supported hardware options are based on industry
standard storage components.
T E C H N I C A L W H I T E P A P E R / 2 3
VMware Virtual SAN Layer 2 and Layer 3
Network Topologies Deployments
Summary
VMware Virtual SAN is the next evolution in Storage Virtualization. Virtual SAN implementations leverage the
already existing IP Network infrastructure to maximize return on investment while reducing OPEX.
From a deployment perspective, the Virtual SAN network stack is flexible and supported over Layer 2 and Layer
3 network topologies.
Virtual SAN implementations over Layer 2 network topologies present the least amount of network complexity to
implement and simplest option to manage and maintain when compared to Layer 3 network topology
deployments.
Either way, VMware Virtual SAN deployments can be performed on Layer 2 as well as Layer 3 networking
topologies right out-of-the box.
Acknowledgments
I would like to thank: Christos Karamanolis, CTO of the Storage and Availability Business Unit at VMware; Duncan
Epping, Chief Architect; Cormac Hogan, Senior Staff Engineer in the Office of the CTO of the Storage and
Availability Business Unit; Madhu Nalamati, Staff Network Engineer; Ken Werneburg, Manager of the Storage and
Availability Technical marketing team at VMware for reviewing this paper.
I would also like to extend a special thanks to Elver Sena Sosa, CCIE 7321 and VCDX 154 Network Virtualization for
his time and contributing to this paper.
Author
Rawlinson Rivera is a Principal Architect in the Office of the CTO of the Storage and Availability Business Unit at
VMware, Inc. He specializes in cloud enterprise architectures, Hyper-converged Infrastructures (HCI).
Primarily focused on Software-Defined Storage such as Virtual SAN, vSphere Virtual Volumes, as well as storage
related solutions for OpenStack and Cloud-Native Applications. He serves as a trusted adviser to VMware's
customers primarily in the US.
Rawlinson is among the few VMware Certified Design Experts (VCDX #86) in the world, and author of multiple
books based on VMware and other technologies. He is the owner and main author of virtualization blog
punchingclouds.com. โ€จโ€จ
โ€ข Follow Rawlinsonโ€™s blogs:
http://blogs.vmware.com/virtualblocks/
http://www.punchingclouds.com/
โ€ข Follow Rawlinson on Twitter: @PunchingClouds

More Related Content

What's hot

Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolMehedi
ย 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackMehedi
ย 
CCNP Security SIMOS 300-209=vpn 642-648
CCNP Security SIMOS 300-209=vpn 642-648CCNP Security SIMOS 300-209=vpn 642-648
CCNP Security SIMOS 300-209=vpn 642-648Mohmed Abou Elenein Attia
ย 
Frame relay design
Frame relay designFrame relay design
Frame relay designBhargav Amin
ย 
01 08 ciphering
01 08 ciphering01 08 ciphering
01 08 cipheringEricsson Saudi
ย 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCPVishal Tandel
ย 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodvjournal ijrtem
ย 
SIGTRAN - An Introduction
SIGTRAN - An IntroductionSIGTRAN - An Introduction
SIGTRAN - An IntroductionTareque Hossain
ย 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
ย 
Ss7 Introduction Li In
Ss7 Introduction Li InSs7 Introduction Li In
Ss7 Introduction Li Inmhaviv
ย 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksresearcherchennai
ย 
Wireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explainedWireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explainedDavid Sweigert
ย 
Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinalsangusajjan
ย 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking ProtocolNetwax Lab
ย 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relayjuliusbangaw
ย 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
ย 
Cluster control protocol_reference
Cluster control protocol_referenceCluster control protocol_reference
Cluster control protocol_referenceSwarup Hait
ย 
Remote VPN
Remote VPNRemote VPN
Remote VPNNetwax Lab
ย 

What's hot (20)

Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocol
ย 
Multicast IP addresses Part 1
Multicast IP addresses Part 1Multicast IP addresses Part 1
Multicast IP addresses Part 1
ย 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
ย 
CCNP Security SIMOS 300-209=vpn 642-648
CCNP Security SIMOS 300-209=vpn 642-648CCNP Security SIMOS 300-209=vpn 642-648
CCNP Security SIMOS 300-209=vpn 642-648
ย 
Frame relay design
Frame relay designFrame relay design
Frame relay design
ย 
01 08 ciphering
01 08 ciphering01 08 ciphering
01 08 ciphering
ย 
Mobile transport layer - traditional TCP
Mobile transport layer - traditional TCPMobile transport layer - traditional TCP
Mobile transport layer - traditional TCP
ย 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
ย 
SIGTRAN - An Introduction
SIGTRAN - An IntroductionSIGTRAN - An Introduction
SIGTRAN - An Introduction
ย 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
ย 
Ss7 Introduction Li In
Ss7 Introduction Li InSs7 Introduction Li In
Ss7 Introduction Li In
ย 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
ย 
Wireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explainedWireless Deauth and Disassociation Attacks explained
Wireless Deauth and Disassociation Attacks explained
ย 
Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
ย 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
ย 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
ย 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
ย 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
ย 
Cluster control protocol_reference
Cluster control protocol_referenceCluster control protocol_reference
Cluster control protocol_reference
ย 
Remote VPN
Remote VPNRemote VPN
Remote VPN
ย 

Similar to Vmware vsan-layer2-and-layer3-network-topologies

Implementing multicast communication system making use of an existing data ne...
Implementing multicast communication system making use of an existing data ne...Implementing multicast communication system making use of an existing data ne...
Implementing multicast communication system making use of an existing data ne...iosrjce
ย 
Switching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networksSwitching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networksEditor Jacotech
ย 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksReliance Comm
ย 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Sasank Chaitanya
ย 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Prince Mishra
ย 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...Tarun Khaneja
ย 
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCPDesign and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCPAssociate Professor in VSB Coimbatore
ย 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01amit singh
ย 
V P N
V P NV P N
V P Nbhathiji
ย 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013RoHit VashIsht
ย 
IP multicast
IP multicastIP multicast
IP multicastAqique Kazi
ย 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers EssayJennifer Letterman
ย 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportJatin Singh
ย 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
ย 

Similar to Vmware vsan-layer2-and-layer3-network-topologies (20)

J017246677
J017246677J017246677
J017246677
ย 
Implementing multicast communication system making use of an existing data ne...
Implementing multicast communication system making use of an existing data ne...Implementing multicast communication system making use of an existing data ne...
Implementing multicast communication system making use of an existing data ne...
ย 
Switching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networksSwitching and multicast schemes in asynchronous transfer mode networks
Switching and multicast schemes in asynchronous transfer mode networks
ย 
Basics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networksBasics of multicasting and its implementation on ethernet networks
Basics of multicasting and its implementation on ethernet networks
ย 
Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks Basicsofmulticastinganditsimplementationonethernetnetworks
Basicsofmulticastinganditsimplementationonethernetnetworks
ย 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
ย 
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...ccna summer training ppt ( Cisco certified network analysis) ppt.  by Traun k...
ccna summer training ppt ( Cisco certified network analysis) ppt. by Traun k...
ย 
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCPDesign and Implementation of Network Security using Inter-VLAN-Routing and DHCP
Design and Implementation of Network Security using Inter-VLAN-Routing and DHCP
ย 
Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01Introduction 140318015826-phpapp01
Introduction 140318015826-phpapp01
ย 
Network & security startup
Network & security startupNetwork & security startup
Network & security startup
ย 
Router vs Switch layer3
Router vs Switch layer3Router vs Switch layer3
Router vs Switch layer3
ย 
V P N
V P NV P N
V P N
ย 
ccna presentation 2013
ccna presentation 2013ccna presentation 2013
ccna presentation 2013
ย 
IP multicast
IP multicastIP multicast
IP multicast
ย 
CCNA 1
CCNA 1CCNA 1
CCNA 1
ย 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
ย 
Implementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- reportImplementation of intelligent wide area network(wan)- report
Implementation of intelligent wide area network(wan)- report
ย 
Virtual lan
Virtual lanVirtual lan
Virtual lan
ย 
MadgeOne
MadgeOneMadgeOne
MadgeOne
ย 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
ย 

Recently uploaded

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLimonikaupta
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.soniya singh
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...SUHANI PANDEY
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
ย 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
ย 

Recently uploaded (20)

Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
ย 
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRLLucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
Lucknow โคCALL GIRL 88759*99948 โคCALL GIRLS IN Lucknow ESCORT SERVICEโคCALL GIRL
ย 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
ย 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
ย 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
ย 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
ย 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
ย 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
ย 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
ย 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
ย 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
ย 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
ย 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
ย 
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
VVVIP Call Girls In Connaught Place โžก๏ธ Delhi โžก๏ธ 9999965857 ๐Ÿš€ No Advance 24HRS...
ย 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
ย 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
ย 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
ย 
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
Call Girls In Pratap Nagar Delhi ๐Ÿ’ฏCall Us ๐Ÿ”8264348440๐Ÿ”
ย 
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now โ˜Ž 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
ย 

Vmware vsan-layer2-and-layer3-network-topologies

  • 1. VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments T E C H N I C A L W H I T E P A P E R
  • 2. T E C H N I C A L W H I T E P A P E R / 1 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Table of Contents Introduction.........................................................................................................................................2 Network and vSphere Technologies ............................................................................................2 Networking Related Technologies........................................................................................................... 2 IP Multicast....................................................................................................................................................... 2 Internet Group Management Protocol (IGMP).............................................................................. 2 Protocol-Independent Multicast (PIM).............................................................................................. 3 vSphere Related Technologies ..................................................................................................................4 vSphere Virtual Switch ..............................................................................................................................4 VMkernel Network Interface................................................................................................................... 5 Static Routes................................................................................................................................................... 7 Hosts Profiles..................................................................................................................................................8 Supported Network Topologies ....................................................................................................9 Layer 2 Network Topologies.......................................................................................................................9 Layer 2 Physical Network Configuration ..............................................................................................9 Cisco Hardware Devices...........................................................................................................................11 Brocade Hardware Devices.....................................................................................................................11 Layer 3 Network Topologies......................................................................................................................12 Layer 3 Physical Network Configuration.............................................................................................13 Virtual Network Configuration..................................................................................................... 18 Creating vSphere Distributed Switch....................................................................................................18 Creating vSphere Distributed Port Groups ........................................................................................18 Creating VMkernel Network Interface for Virtual SAN.................................................................18 Host Configuration Information................................................................................................................19 Adding Host Static Routes .........................................................................................................................19 Enable and Configure Virtual SAN........................................................................................................ 20 Validating Virtual SAN Configuration and Health .................................................................. 21 Summary ........................................................................................................................................... 23 Acknowledgments.......................................................................................................................... 23 Author ................................................................................................................................................ 23
  • 3. T E C H N I C A L W H I T E P A P E R / 2 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Introduction VMware Virtual SAN is a distributed object storage platform that depends on IP Network connectivity to provide access to storage resources and storage management infrastructure services. Virtual SAN requires that all of the participating hosts can communicate over an IP network and are members of the same vSphere Cluster. The locally attached storage devices from all of the hosts are pooled and presented as a single datastore to all members of the cluster once they have established IP connectivity and can communicate on the same Ethernet Layer 2 domain. Virtual SAN clusters can also be formed with hosts that are connected to different Layer 3 network segments. The network Layer 3 segments must first be configured with IP Multicast in order to make all segments reachable by all the members of the cluster. Although the Virtual SAN network traffic and Virtual Machine traffic can coexist on the same networks, this paper will not cover the configuration semantics and tuning of Virtual Machine network traffic. The focus of this paper is based on the physical network and vSphere related technologies that are required to deploy Virtual SAN across Layer 2 and Layer 3 topologies. This paper will help virtualization, network, and storage implementation engineers, administrators, and architects interested in deploying Virtual SAN on Layer 2 and across Layer 3 network topologies. Network and vSphere Technologies This section provides an overview and description of the different physical network and vSphere technologies that are required for deployments of Virtual SAN across Layer 2 and Layer 3 IP network topologies. Networking Related Technologies IP Multicast IP Multicast is an IP Network communication mechanism used to efficiently send communications to many recipients. The communication can be in the form of one source to many recipients (one-to-many) or many sources to many recipients (many-to-many). The recipients may be located in the same Layer 3 segment or distributed across multiple Layer 3 segments. In the case where the recipients are in the same Layer 3 segment, the recipients will also share the same Ethernet Layer 2 domain. An IP Multicast address is called a Multicast Group (MG). IP Multicast relies on communication protocols used by hosts, clients, and network devices to participate in multicast-based communications. Communication protocols such as Internet Group Management Protocol (IGMP) and Protocol Independent Multicast (PIM) are integral components and dependencies for the use IP multicast communications. IP Multicast is a fundamental requirement of Virtual SAN. Virtual SAN depends on IP multicast communication for the process of joining and leaving cluster groups as well as other intra-cluster communication services. IP multicast must be enabled and configured in the IP Network segments that will carry the Virtual SAN traffic service. Internet Group Management Protocol (IGMP) IGMP is a communication protocol used to dynamically add receivers to IP Multicast group memberships. The IGMP operations are restricted within individual Layer 2 domains. IGMP allows receivers to send requests to the Multicast Groups they would like to join. Becoming a member of Multicast Groups allows the routers to know to forward traffic that is destined for the
  • 4. T E C H N I C A L W H I T E P A P E R / 3 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Multicast Groups on the Layer 3 segment where the receiver is connected. This allows the switch to keep a table of the individual receivers that need a copy of the Multicast Group traffic. The participating hosts in a Virtual SAN cluster will negotiate for IGMP version 3. If the network does not support IGMP version 3, the hosts will fall back to IGMP version 2. VMware recommends that the same version of IGMP be used in all Layer 3 segments. Protocol-Independent Multicast (PIM) Protocol-Independent Multicast (PIM) is a family of Layer 3 multicast routing protocols that provide different communication techniques for IP Multicast traffic to reach receivers that are in different Layer 3 segments from the Multicast Groups sources. There are different versions of PIM, each of which is best suited for different IP Multicast topologies. The main four versions of PIM are these: โ€ข PIM Dense Mode (PIM-DM) โ€“ Dense Mode works by building a unidirectional shortest-path tree from each Multicast Groups source to the Multicast Groups receivers, by flooding multicast traffic over the entire Layer 3 Network and then pruning back branches of the tree where no receivers are present. Dense Mode is straightforward to implement and it is best suited for small Multicast deployments of one-to-many. โ€ข PIM Sparse Mode (PIM-SM) โ€“ Sparse Mode avoids the flooding issues of Dense Mode by assigning a root entity for the unidirectional Multicast Groups shortest-path tree called a rendezvous point (RP). The rendezvous point is selected in a per Multicast Group basis. Figure 1: Layer 3 Network PIM Sparse Mode Communication Flow Sparse Mode scales fairly well for larger Layer 3 Networks and is best suited for one-to-many Multicast topologies. If the network only supports IGMP version 2, VMware recommends the use of PIM-SM for Virtual SAN deployments over Layer 3. โ€ข Bidirectional PIM (Bi-PIM) โ€“ Bidirectional PIM assumes that there are many MGs that have many sources and many receivers (many-to-many). Whereas Sparse Mode can manage many-to-many Multicast topologies, Bidirectional PIM does it by reducing the load on the Multicast routers as compared to Sparse Mode. Bidirectional PIM does not build a shortest-path tree, so MG data paths may have longer end-to-end delays than Sparse Mode, however Bidirectional PIM allows for a Multicast Group traffic to flow both ways over the same data path. โ€ข PIM Source-Specific Multicast (PIM-SSM) โ€“ Source Specific Multicast is similar to Sparse Mode but it carries information about the IP of the source. Receivers join Multicast Groups based on the source of the Multicast Groups.
  • 5. T E C H N I C A L W H I T E P A P E R / 4 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Figure 2: Layer 3 Network PIM Source Specific Mode Communication Flow With Source Specific Multicast, shortest-path trees are built and are rooted in just one source, offering a more secure and scalable model for a limited amount of applications (mostly broadcasting of content). If the networks are configured with IGMP version 3, then Source Specific Multicast requires the receivers to support IGMP version 3. vSphere Related Technologies vSphere Virtual Switch VMware Virtual SAN supports the use of both the vSphere Standard Switch and vSphere Distributed Switch. However, VMware recommends the use of the vSphere Distributed Switch to take advantage of its centralized management capabilities as well as advanced network features. Figure 3: VMware Distributed Switched - QoS with Network I/O Control The Virtual SAN network configuration can be implemented with vSphere standard or distributed switches. In either case, the networking configuration requirements and behavior remain relatively the same. vSphere Distributed switches provide several advantages around management, advanced network features, and scalability capabilities that are all conducive the benefits and values of VMware Virtual SAN. vSphere Distributed Switches facilitate large scale deployments with the support of up to 500 hosts per switch. They also provide access to advanced network features such as Network I/O Control and IP Multicast Filtering. For scenarios where different network traffic services share physical network adapters, VMware recommends the
  • 6. T E C H N I C A L W H I T E P A P E R / 5 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments use of Network I/O Control as mechanism for bandwidth allocation control for traffic management optimization (QoS). Note: While the use of the vSphere Distributed Switch and the Network I/O Control feature are typically part of the vSphere Enterprise Plus licensing SKU, their use is also exclusively included as part of the VMware Virtual SAN license agreement. VMkernel Network Interface The VMkernel networking layer provides network connectivity to hosts and also handles the standard system traffic of multiple vSphere network services such as vSphere vMotion, IP storage, Fault Tolerance, Virtual SAN, and others. Figure 4: Creating a VMkernel network Interface associated with Virtual SAN Traffic Service Any host that is going to participate as a member of a Virtual SAN cluster must have the Virtual SAN traffic service associated with a VMkernel network interface. The Virtual SAN traffic service will automatically assign the default multicast address settings to each host which will then make them eligible to send frames to a default Multicast Group, and Multicast Group Agent. โ€ข Virtual SAN Default Multicast Group address 224.1.2.3 โ€ข Virtual SAN Default Multicast Group Agent address 224.2.3.4 The physical uplinks used by the Virtual SAN network interfaces should be connected to physical switches that are configured with IGMP and IGMP Snooping version 2 or version 3 on a common network segment that will carry the Virtual SAN network traffic. When deploying on a Layer 2 network, one of the switches on that network segment (VLAN) should be configured as the IGMP Querier. Alternatively, when the deployment is being performed across Layer 3 network segments, a Layer 3 capable device (router or switch) with a connection and access to the same Layer 3 network segments can be configured as the IGMP Querier.
  • 7. T E C H N I C A L W H I T E P A P E R / 6 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments At this point, the hosts will establish their method of communication by joining the Virtual SAN default Multicast Group addresses, 224.1.2.3 and default Multicast Group Agent addresses 224.2.3.4. In order to avoid unnecessary IP multicast floods within the Layer 2 segments, VMware recommends configuring IGMP snooping with an IGMP Querier in order to control the number of physical ports on the switches that will receive IP multicast frames. For optimal network communication and efficiency, Virtual SAN multicast frames should be exclusively forwarded to the ports that are associated with the uplinks of the VMkernel network interfaces that are configured to carry the Virtual SAN traffic. Figure 5: Multiple Virtual SAN Clusters In scenarios with multiple Virtual SAN clusters, VMware recommends changing the default Multicast Group address and the default Multicast Group Agent address when the different clusters will share the same Layer 2 network segment. This will prevent the clusters from receiving unnecessary multicast frames from one another. In scenarios where members of a cluster have been deployed across different network segments (Layer 3), VMware recommends changing the default Multicast Group address and default Multicast Group Agent address. VMware recommends the use of the Multicast Address range of 239.0.0.0/8 when changing the default addresses. Also, consult with members of the network team in order to identify the adequate Multicast Group addresses to use in order to comply with any potential Multicast Addressing policies that may exist. For detailed instruction on how to change the default multicast address for Virtual SAN, please refer to the VMware Knowledge Base article 2075451. http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=2075451 TCP/IP Stacks vSphere 6.0 introduced a new TCP/IP Stack architecture where multiple TPC/IP stacks can be utilized to manage different VMkernel network interfaces and their associated traffic. As a result, the new architecture provides the ability to configure traffic services such vMotion, Management, Fault Tolerance, etc. on completely isolated TCP/IP stacks with the ability to use multiple default gateways. For network traffic isolation and security requirements, VMware recommends deploying the different traffic services onto different network segments in an order to prevent the different traffic services from traversing through the same default gateway.
  • 8. T E C H N I C A L W H I T E P A P E R / 7 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Figure 6: vSphere Multiple TCP/IP Stack Architecture In order to configure the traffic services onto separate TCP/IP stacks, each traffic service type needs to be deployed onto their own network segments. The network segments will be accessed through a physical network adapter with VLAN segmentation and individually mapped to dissimilar VMkernel network interfaces with the respective traffic services (Virtual SAN, vMotion, Management, etc.) enabled. Built-in TCP/IP stacks available in vSphere: โ€ข Default TCP/IP Stack โ€“ multi-purpose stack that can be used to manage any of the host related traffic services. Shares a single default gateway between all configured network services. โ€ข vMotion TCP/IP Stack โ€“ utilized to isolate vMotion traffic onto its own stack. The use of this stack completely removes or disable vMotion traffic from the default TCP/IP stack. โ€ข Provisioning TCP/IP Stack โ€“ utilized to isolate some virtual machine related operations such as cold migrations, cloning, snapshot, NFC related traffic. It is assumed that environments with isolated network requirements for the vSphere traffic services will not be able to use the same default gateway to direct traffic. The use of the different TCP/IP stacks facilitates the management for traffic isolation with the ability to use different default gateways. Currently, vSphere 6.0 does not include a dedicated TCP/IP stack for the Virtual SAN traffic service nor the supportability for the creation of custom Virtual SAN TCP/IP stack. To ensure Virtual SAN traffic in Layer 3 network topologies leaves over the Virtual SAN VMkernel network interface, add the Virtual SAN VMkernel network interface to the Default TCP/IP Stack and define static routes for all of the Virtual SAN cluster members. Static Routes The use of static routes is required by traffic services for which vSphere does not provide a non-Default TCP/IP stack. In the VMware recommended deployment scenario where the Management and Virtual SAN traffic services are configured to use different Layer 3 network segments, they will share the Default TCP/IP Stack but be configured in different Layer 2 domains. The default route for the Default TCP/IP Stack should remain with the Management VMkernel network interface. Static routes will be added for the Virtual SAN traffic to egress of the Virtual SAN VMkernel network interface.
  • 9. T E C H N I C A L W H I T E P A P E R / 8 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments It is only necessary to configure a single static route per host for each remote Virtual SAN Layer 3 segment or a single summary static route if the Virtual SAN Layer 3 segment addressing plan allows it. Figure 7: Static Route Logical Diagram Hosts Profiles Consider the use of Host Profiles as a management option to deal with the operating management functions of the communications paths that are established with the use of static routes. Host Profiles provide an automated and centrally managed mechanism for host configuration and compliance. The use of Host Profiles reduces configuration risks, and can improve efficiency by reducing reliance on repetitive, manual tasks. Host Profiles provide the ability to capture the configuration of a pre-configured host, and store the configuration as a managed object and use the catalog of parameters contained within to configure networking, storage, security and other host-level parameters. Figure 8: Host Profiles to Storing Static Routes
  • 10. T E C H N I C A L W H I T E P A P E R / 9 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Static routes are stored within the Hosts Profiles as part of their catalog parameters. Host Profiles can be applied to either individual hosts or a cluster; applying a Host Profile to a cluster will affect all hosts in the cluster and result in a consistent configuration across all hosts in that cluster. Host Profiles can also be used to validate the system configuration by checking compliance for any host or cluster against an associated standardized Host Profile. Supported Network Topologies This section covers the different supported network topologies and the impact they introduce to the overall deployment and management of Virtual SAN in different network scenarios. Layer 2 Network Topologies Layer 2 network topologies are defined as networking architectures that are composed of devices that operate at the Data Link layer (Layer 2) of the OSI model. This network topology is responsible for forwarding packets through intermediate Layer 2 devices such as hosts, bridge, or switches. It is required that all of the hosts participating in a Virtual SAN cluster are able to establish communication through the VMkernel interface connected to a common Layer 2 network segment. The Layer 2 network topology offers the least complex implementation and management of the IP Multicast requirements for Virtual SAN while constraining the radius of the cluster. All cluster members will send IGMP join requests over the VMkernel network interfaces that are used for the Virtual SAN traffic service. By default, the hosts will negotiate their communication for IGMP version 3 and failback to IGMP version 2 whenever the physical network device does not support IGMP version 3. For maximum Layer 2 traffic efficiency, VMware recommends the use and configuration of IGMP Snooping in all the switches configured in the Layer 2 network segment where Virtual SAN is present. IGMP Snooping allows physical network devices to forward Multicast frames to only the interfaces where IGMP Join requests are being observed. Layer 2 Physical Network Configuration This section covers the physical network configuration procedures to enable IP Multicast for Virtual SAN. The configuration is focused on IGMP snooping and IGMP snooping Querier. We will assume all members of the cluster are in the same Layer 2 network segment, represented by VLAN 10. In this scenario the role of IGMP Querier will be performed by a physical switches and not a router.
  • 11. T E C H N I C A L W H I T E P A P E R / 1 0 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Figure 9: Virtual SAN Layer 2 Network Topology For this scenario we will provide two different configuration examples that will be based on two different vendor platforms. The first example is based on the configuration of Cisco Nexus switch devices operating with the Cisco Nexus platform OS with IGMP version 3. The second example is based on the configuration of Brocade VDX switch devices with IGMP version 2. Currently, Brocade VDX switch devices do not support IGMP version 3 and therefore the configuration will be based on IGMP version 2. The configuration procedures for IP Multicast varies between different vendors and their respective network devices. Consult the network device vendor documentation for in-depth details and specific advanced procedures that go beyond the scope of this document.
  • 12. T E C H N I C A L W H I T E P A P E R / 1 1 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Cisco Hardware Devices The following a sample configuration of IGMP version 3 (enabled by default per VLAN) in Nexus 6000 running NX-OS 7.0(3): Cisco Switch 1 configure terminal ip igmp snooping interface vlan 10 ip igmp snooping Cisco Switch 2 configure terminal ip igmp snooping interface vlan 10 ip igmp snooping ip igmp snooping querier 172.16.10.253 Cisco Switch 3 configure terminal ip igmp snooping interface vlan 10 ip igmp snooping Brocade Hardware Devices The following is a sample configuration of IGMP version 2 in VDX 6740s running NOS 7.0.0: Brocade Switch 1 configure terminal ip igmp snooping enable interface vlan 10 ip igmp snooping enable Brocade Switch 2 configure terminal ip igmp snooping enable interface vlan 10 ip igmp snooping enable ip igmp snooping querier enable Brocade Switch 3 configure terminal ip igmp snooping enable interface vlan 10 ip igmp snooping enable
  • 13. T E C H N I C A L W H I T E P A P E R / 1 2 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Layer 3 Network Topologies Layer 3 network topologies are defined as networking architectures that are composed of devices that are capable of operating at the network layer (Layer 3) of the OSI model. This network topology is responsible for routing packets through intermediate Layer 3 capable devices such as routers and Layer 3 capable switches. All Virtual SAN cluster members are required to join the clusterโ€™s Multicast Group by sending IGMP Join requests over the VMkernel network interfaces that are being used for the Virtual SAN traffic service. Whenever hosts are deployed across different Layer 3 network segments, the result is a routed network topology. Figure 10: Virtual SAN Over a Layer 3 Network Topology However, since there is a need for those requests to be sent by each Layer 3 segment Default Gateway, the IGMP Querier has to be the Default Gateway itself. The Default Gateway will use the Multicast Group memberships from the IGMP Joins to update the PIM protocol running. In Layer 3 Network topologies, VMware recommends the use and configuration of IGMP Snooping in all the switches configured in the Layer 2 domains where hosts participating in the Virtual SAN cluster will be present.
  • 14. T E C H N I C A L W H I T E P A P E R / 1 3 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Layer 3 Physical Network Configuration This section covers the configuration procedures for IGMP snooping, IGMP Querier and PIM. We will assume that there are three Layer 2 domains, each with its own Layer 3 segment. The Layer 2 domains will be represented by VLANs 10, 172 and 192, as shown in the figure below. Two configuration examples are provided: one based on the Cisco Nexus platform (with IGMP version 3 and Source Specific Multicast) and the Brocade VDX (with IGMP version 2 and Sparse Mode). Configuration procedures are typically different based on hardware vendorโ€™s implementation. Consult the hardware vendor documentation for in-depth and specific procedures that are beyond the scope of this document. Figure 11: Layer 3 Network Logical Design NETW OR KS SU BNE TS VLAN ROUTE R LO0 MGM AGM RP VSAN1 172.16.10.0/24 172 R1 1.1.1.1 224.1.2.3 224.2.3.4 2.2.2.2 VSAN2 192.16.10.0/24 192 R2 2.2.2.2 224.1.2.3 224.2.3.4 2.2.2.2 VSAN3 10.16.10.0/24 10 R3 3.3.3.3 224.1.2.3 224.2.3.4 2.2.2.2 Table 1: Network Information Configuration Table MGM - Master Group Multicast Lo0 - Loopback Interface 0 AGM - Agent Group Multicast RP - Rendezvous Point
  • 15. T E C H N I C A L W H I T E P A P E R / 1 4 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Cisco Hardware Devices The following a sample configuration of IGMP version 3 (enabled by default per VLAN) and Sparse Mode in Nexus 6000 running NX-OS 7.0(3) Cisco Switch 1 (S1) configure terminal ip igmp snooping vlan configuration 172 ip igmp snooping Cisco Switch 2 (S2) configure terminal ip igmp snooping vlan configuration 192 ip igmp snooping Cisco Switch 3 (S3) configure terminal ip igmp snooping vlan configuration 10 ip igmp snooping Cisco Router 1 (R1) configure terminal feature pim ip pim rp-address 2.2.2.2 group-list 224.1.2.3/32 ip pim rp-address 2.2.2.2 group-list 224.2.3.4/32 interface vlan 201 description Network Uplink ip address 20.1.1.1/30 ip pim sparse-mode interface vlan 172 ip address 172.16.10.253/24 ip router ospf 9 area 0.0.0.0 ip igmp snooping ip igmp snooping querier 172.16.10.253 interface Loopback 1 ip address 1.1.1.1/32 ip router ospf 9 area 0.0.0.0 Cisco Router 2 (R2) configure terminal feature pim ip pim rp-address 2.2.2.2 group-list 224.1.2.3/32 ip pim rp-address 2.2.2.2 group-list 224.2.3.4/32 interface vlan 202 description Network Uplink ip address 20.1.2.1/30 ip pim sparse-mode interface vlan 192 ip address 192.16.10.253/24 ip router ospf 9 area 0.0.0.0 ip igmp snooping ip igmp snooping querier 192.16.10.253 interface Loopback 2 ip address 2.2.2.2/32 ip router ospf 9 area 0.0.0.0
  • 16. T E C H N I C A L W H I T E P A P E R / 1 5 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Cisco Router 3 (R3) configure terminal feature pim ip pim rp-address 2.2.2.2 group-list 224.1.2.3/32 ip pim rp-address 2.2.2.2 group-list 224.2.3.4/32 interface vlan 203 description Network Uplink ip address 20.1.3.1/30 ip pim sparse-mode interface vlan 10 ip address 10.16.10.253/24 ip router ospf 9 area 0.0.0.0 ip igmp snooping ip igmp snooping querier 10.16.10.253 interface Loopback 3 ip address 3.3.3.3/32 ip router ospf 9 area 0.0.0.0
  • 17. T E C H N I C A L W H I T E P A P E R / 1 6 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Brocade Hardware Devices The following a sample configuration of IGMP version 2 and Sparse Mode in VDX 6740s running NOS 7.0.0. Brocade Switch 1 (S1) configure terminal ip igmp snooping enable interface vlan 172 ip igmp snooping enable Brocade Switch 2 (S2) configure terminal ip igmp snooping enable interface vlan 192 ip igmp snooping enable Brocade Switch 3 (S3) configure terminal ip igmp snooping enable interface vlan 10 ip igmp snooping enable Brocade Router 1 (R1) configure terminal interface vlan 201 interface vlan 172 ip igmp snooping enable ip igmp snooping querier enable rbridge-id 101 router pim rp-address 2.2.2.2 router ospf area 0.0.0.0 interface loopback 1 ip address 1.1.1.1/32 ip ospf area 0.0.0.0 no shutdown interface ve 201 description Network Uplink ip address 20.1.1.1/30 ip ospf area 0.0.0.0 ip pim-sparse no shutdown interface ve 172 ip address 172.16.10.1/24 ip ospf area 0.0.0.0 no shutdown
  • 18. T E C H N I C A L W H I T E P A P E R / 1 7 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Brocade Router 2 (R2) configure terminal interface vlan 202 interface vlan 192 ip igmp snooping enable ip igmp snooping querier enable rbridge-id 102 router pim rp-address 2.2.2.2 router ospf area 0.0.0.0 interface loopback 2 ip address 2.2.2.2/32 ip ospf area 0.0.0.0 no shutdown interface ve 202 description Network Uplink ip address 20.1.2.1/30 ip ospf area 0.0.0.0 ip pim-sparse no shutdown interface ve 192 ip address 192.16.10.1/24 ip ospf area 0.0.0.0 no shutdown Brocade Router 3 (R3) configure terminal interface vlan 203 interface vlan 10 ip igmp snooping enable ip igmp snooping querier enable rbridge-id 103 router pim rp-address 2.2.2.2 router ospf area 0.0.0.0 interface loopback 3 ip address 3.3.3.3/32 ip ospf area 0.0.0.0 no shutdown interface ve 203 description Network Uplink ip address 20.1.3.1/30 ip ospf area 0.0.0.0 ip pim-sparse no shutdown interface ve 10 ip address 10.16.10.1/24 ip ospf area 0.0.0.0 no shutdown
  • 19. T E C H N I C A L W H I T E P A P E R / 1 8 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Virtual Network Configuration This section details the configuration procedures for the virtual network components and features such as vSphere Distributed Switch, vSphere Distributed Port Groups, VMkernel Network Interfaces, Virtual SAN Traffic service, and hosts static routes. Creating vSphere Distributed Switch Create a vSphere distributed switch on a data center to manage the networking configuration of multiple hosts at a time from a central place. โ€ข From the vSphere Web Client, navigate to a data center. โ€ข In the navigator, right-click the data center and select Distributed Switch > New Distributed Switch. โ€ข In Name and Location, type a name for the new distributed switch and click Next. โ€ข Select version, select the compatible with ESXi 6.0 and later and click Next โ€ข In Edit Settings configure the distributed switch settings according to environment requirements. Click next, then Finish. Creating vSphere Distributed Port Groups Add a distributed port group to a vSphere Distributed Switch to create a distributed switch network to associate with VMkernel adapters. โ€ข From the vSphere Web Client, navigate to the distributed switch. โ€ข Right-click the distributed switch and select Distributed port group > New distributed port group. โ€ข In the Select name and location section, type the name of the new distributed port group, VSAN1, and click Next. โ€ข In the Configure settings section, configure VLAN (172), and Failover Order. Set one uplink to active, and the other to standby, then keep the default settings beyond that and click Next, and then Finish. Creating VMkernel Network Interface for Virtual SAN Create a VMkernel adapter on a host that is associated with a distributed switch to provide network connectivity to the host and to handle the traffic for Virtual SAN. Dedicate a single distributed port group per VMkernel adapter. For better isolation, you should configure one VMkernel adapter with one traffic type. โ€ข From the vSphere Web Client, navigate to the host โ€ข Under Manage, select Networking and then select VMkernel adapters. โ€ข Click Add host networking. โ€ข On the Select connection type page, select VMkernel Network Adapter and click Next. โ€ข From the Select an existing network option, select a distributed port group and click Next. โ€ข On the Port properties page, configure the settings for the VMkernel adapter based on the network information listed on table 2. Enable the Virtual SAN traffic service, then click Next, then Finish.
  • 20. T E C H N I C A L W H I T E P A P E R / 1 9 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Host Configuration Information N E T W O R K S H O S T S V S A N V M K I P S U B N E T S V L A N VSAN1 octo.vsan.a.01 172.16.10.9/24 172.16.10.0/24 172 VSAN1 octo.vsan.a.02 172.16.10.10/24 172.16.10.0/24 172 VSAN1 octo.vsan.a.03 172.16.10.11/24 172.16.10.0/24 172 VSAN1 octo.vsan.a.04 172.16.10.12/24 172.16.10.0/24 172 VSAN2 octo.vsan.b.01 192.16.10.9/24 192.16.10.0/24 192 VSAN2 octo.vsan.b.02 192.16.10.10/24 192.16.10.0/24 192 VSAN2 octo.vsan.b.03 192.16.10.11/24 192.16.10.0/24 192 VSAN2 octo.vsan.b.04 192.16.10.12/24 192.16.10.0/24 192 VSAN3 octo.vsan.c.01 10.16.10.9/24 10.16.10.0/24 10 VSAN3 octo.vsan.c.02 10.16.10.10/24 10.16.10.0/24 10 VSAN3 octo.vsan.c.03 10.16.10.11/24 10.16.10.0/24 10 VSAN3 octo.vsan.c.04 10.16.10.12/24 10.16.10.0/24 10 Table 2: Host Network Information Configuration Table Adding Host Static Routes Static routes are used to instruct the Default TCP/IP Stack to use a different default gateway to direct the Virtual SAN traffic through the necessary paths to reach the remote Virtual SAN networks. Static routes are required by all the hosts between all the different individual Virtual SAN networks. N E T W O R K S S U B N E T S G A T E W A Y S V L A N S R O U T E R S VSAN1 172.16.10.0/24 172.16.10.253 172 R1 VSAN2 192.16.10.0/24 192.16.10.253 192 R2 VSAN3 10.16.10.0/24 10.16.10.253 10 R3 Table 3: Virtual SAN Network Addresses โ€ข Static Routes for hosts on VSAN 1 Network: esxcli network ip route ipv4 add โ€“g 172.16.10.253 -n 192.168.10.0/24 esxcli network ip route ipv4 add โ€“g 172.16.10.253 -n 10.16.10.0/24 โ€ข Static Routes for hosts on VSAN 2 Network: esxcli network ip route ipv4 add โ€“g 192.168.10.253 -n 172.16.10.0/24 esxcli network ip route ipv4 add โ€“g 192.168.10.253 -n 10.16.10.0/24 โ€ข Static Routes for hosts on VSAN 3 Network: esxcli network ip route ipv4 add โ€“g 10.16.10.253 -n 172.16.10.0/24 esxcli network ip route ipv4 add โ€“g 10.16.10.253 -n 10.16.10.0/24 After adding the static routes, the Virtual SAN traffic connectivity should be available across all networks. Use the vmkping command test and confirm communication between the different networks by pinging the different default gateway from all three networks. โ€ข Test connectivity to remote hosts from VSAN 1 Network: vmkping โ€“I vmk3 192.168.10.253 vmkping โ€“I vmk3 10.16.10.253 โ€ข Test connectivity to remote hosts from VSAN 2 Network: vmkping โ€“I vmk3 172.16.10.253 vmkping โ€“I vmk3 10.16.10.253
  • 21. T E C H N I C A L W H I T E P A P E R / 2 0 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments โ€ข Test connectivity to remote hosts from VSAN 2 Network: vmkping โ€“I vmk3 192.168.10.253 vmkping โ€“I vmk3 172.16.10.253 Note: Use vmkping to validate the connectivity across all hosts in all three networks after the VMkernel network interfaces have been created on each host. Enable and Configure Virtual SAN Once all the necessary physical and virtual networking configurations have been successfully implemented, it is time to enable Virtual SAN. Virtual SAN can be enabled during or after a vSphere Cluster is created. โ€ข From the vSphere Web Client, navigate to a data center. โ€ข In the navigator, right-click the data center and select right click > New cluster. โ€ข Click Turn On Virtual SAN Figure 12: Enable Virtual SAN After enabling Virtual SAN, the Virtual SAN storage provider is automatically registered with the vCenter Server and the Virtual SAN datastore is created across the Layer 3 fabric.
  • 22. T E C H N I C A L W H I T E P A P E R / 2 1 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Validating Virtual SAN Configuration and Health Once Virtual SAN has been enabled, the clusterโ€™s communication and membership can be validated in multiple ways ranging from the vSphere Web Client to multiple command line interface tools available in vSphere. The vSphere Web Client offers multiple locations in the UI that offer overall configuration status as well as the health and validation of the network configuration. Overall Network Status โ€“ navigate to the cluster management view and general settings. If all the members of the cluster are successfully communicating via the assigned multicast group and address, the network status is displayed as normal. Figure 13: Virtual SAN Network Communication Status Detailed Network Health and Multicast Assessment โ€“ navigate to the clusters monitoring view for Virtual SAN. Review the Network health section that contains several checkpoints for network health and configuration validation points.
  • 23. T E C H N I C A L W H I T E P A P E R / 2 2 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Figure 14: Virtual SAN Network Configuration Health We recommend re-testing the network health and multicast assessment after making any future network changes by clicking the Retest button. Regardless of the deployment model of choice, Virtual SAN supported hardware options are based on industry standard storage components.
  • 24. T E C H N I C A L W H I T E P A P E R / 2 3 VMware Virtual SAN Layer 2 and Layer 3 Network Topologies Deployments Summary VMware Virtual SAN is the next evolution in Storage Virtualization. Virtual SAN implementations leverage the already existing IP Network infrastructure to maximize return on investment while reducing OPEX. From a deployment perspective, the Virtual SAN network stack is flexible and supported over Layer 2 and Layer 3 network topologies. Virtual SAN implementations over Layer 2 network topologies present the least amount of network complexity to implement and simplest option to manage and maintain when compared to Layer 3 network topology deployments. Either way, VMware Virtual SAN deployments can be performed on Layer 2 as well as Layer 3 networking topologies right out-of-the box. Acknowledgments I would like to thank: Christos Karamanolis, CTO of the Storage and Availability Business Unit at VMware; Duncan Epping, Chief Architect; Cormac Hogan, Senior Staff Engineer in the Office of the CTO of the Storage and Availability Business Unit; Madhu Nalamati, Staff Network Engineer; Ken Werneburg, Manager of the Storage and Availability Technical marketing team at VMware for reviewing this paper. I would also like to extend a special thanks to Elver Sena Sosa, CCIE 7321 and VCDX 154 Network Virtualization for his time and contributing to this paper. Author Rawlinson Rivera is a Principal Architect in the Office of the CTO of the Storage and Availability Business Unit at VMware, Inc. He specializes in cloud enterprise architectures, Hyper-converged Infrastructures (HCI). Primarily focused on Software-Defined Storage such as Virtual SAN, vSphere Virtual Volumes, as well as storage related solutions for OpenStack and Cloud-Native Applications. He serves as a trusted adviser to VMware's customers primarily in the US. Rawlinson is among the few VMware Certified Design Experts (VCDX #86) in the world, and author of multiple books based on VMware and other technologies. He is the owner and main author of virtualization blog punchingclouds.com. โ€จโ€จ โ€ข Follow Rawlinsonโ€™s blogs: http://blogs.vmware.com/virtualblocks/ http://www.punchingclouds.com/ โ€ข Follow Rawlinson on Twitter: @PunchingClouds