This document discusses a data center network design using Cisco Nexus switches in a leaf-spine topology with virtual port channels (vPCs) between the core, aggregation, and access layers for high availability. It includes configuration details for Cisco Nexus 5000 and 9500 series switches in the core and access layers with Cisco Nexus 2000 Fabric Extenders providing top-of-rack connectivity to bare-metal servers. vPCs are configured between the core switches, down to the access switches, and to the server ports for redundancy and load distribution.
A novel way of creating overlay networks for OpenNebula is presented here. Using BGP Ethernet VPN (EVPN) with VXLAN data-plane encapsulation. This provides scalable Layer 2 over IP networks.
A novel way of creating overlay networks for OpenNebula is presented here. Using BGP Ethernet VPN (EVPN) with VXLAN data-plane encapsulation. This provides scalable Layer 2 over IP networks.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
VXLAN is a point to point, UDP-based "tunneling" protocol, that enables L2 encapsulation over an L3 "undernet", while also allowing up to 16 million Virtual Networks. One challenge with deploying VXLAN is that by default VXLAN requires multicast support for Broadcast, Unknown and Multi-cast packets. Often this is not possible in customer networks. An alternative approach is to use the Service Node concept where dedicated node(s)/process(es) are responsible for flooding Broadcast, Unknown, and Multicast packets throughout a network.
This removes the need for multi-cast, and greatly simplifies network configuration. However, it does require a scalable, and highly available implementation.
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLANCisco Canada
This presentation will discuss the evolving Data Centre Fabric, FabricPath, VXLAN, LISP, LISP Host Mobility, OTV LAN Extension, Mobility with Extended Subnets and Nexus Fabric.
Demystifying EVPN in the data center: Part 1 in 2 episode seriesCumulus Networks
Network operators are slowly but surely embracing L3-based leaf-spine designs. However, either due to legacy applications or certain multi-tenancy requirements, the need for L2 across racks is still present. How do you solve the problem of providing L2 across multiple racks? EVPN is quickly emerging as the best answer to this question.
In this episode of our 2-part series on EVPN, we start with a discussion of the use cases, a review of the technologies EVPN competes with, and dive into an evaluation of the pros and cons of each.
For a recording of the live event, go to http://go.cumulusnetworks.com/l/32472/2017-09-22/95t27t
Infrastructure as a Service (IaaS) for cloud environments provides compute processing, storage, networks, and other fundamental computing resources. To support multi-tenant cloud environments, IaaS utilizes the various advantages of the virtualization, but con-ventional virtual (overlay) network architectures for IaaS have been a direct cause of scalability limitations in multi-tenant cloud environments. In other words, IaaS’s virtual networks have the limitations due to the problems of high availability and load bal-ancing, etc. To solve these problems, we present EYWA, a virtual network architecture that scales to support huge data centers with high availability, load balancing and large layer-2 semantics. The design of EYWA overcomes the limitations by accommodating (1)a large number of tenants (about 224 = 16,777,216) by using virtual LANs such as logically isolated network with its own IP range in the cloud service providers’ view, and providing (2)public network service per tenant without throughput bottleneck and single point of failure (SPOF) on Source and Destination Network Address Translation (SNAT/DNAT) and (3)a single large IP subnet per tenant by using large layer-2 semantics in the consumers’ view. EYWA combines existing techniques into a decentralized scale-out control and data plane. The only component of EYWA is an agent in every hypervisor host that can control packets and the agents act as distributed controller. As a result, EYWA can be deployed into all the multi-tenant cloud environments today.
Operationalizing EVPN in the Data Center: Part 2Cumulus Networks
In the second of our two-part series on EVPN, Cumulus Networks Chief Scientist Dinesh Dutt dives into more technical details of network routing, EVPN use cases, and best practices for operationalizing EVPN in the data center.
To view the recording of this webinar, visit http://go.cumulusnetworks.com/l/32472/2017-09-23/95t7xh
Network Configuration Example: Configuring CoS to Support an MC-LAG on an FCo...Juniper Networks
This NCE provides a step-by-step procedure for configuring class of service (CoS) for Fibre Channel over Ethernet (FCoE) transit switch traffic across a multichassis link aggregation group (MC-LAG) that connects two QFX Series switches.
Architecting data center networks in the era of big data and cloudbradhedlund
Brad Hedlund's speaking session at Interop Las Vegas 2012.
Big Data clusters and SDN enabled clouds invite a new approach to data center networking. This session for data center architects will explore the transition from traditional scale-up chassis based Layer 2 centric networking, to the next generation of scale-out Layer 3 CLOS based fabrics of fixed switches.
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
The session specifically covers the requirements and approaches for deploying the Underlay, Overlay as well as the inter-Fabric connectivity of Data Center Networks or Fabrics. Within the VXLAN BGP-EVPN based Overlay, we focus on the insights like forwarding and control plane functions which are critical to the simplicity operation of the architecture in achieving scale, small failure domains and consistent configuration. To complete the overlay view on VXLAN BGP-EVPN, we are going to the insides of BGP and its EVPN address-familiy and extend to about how multiple DC Fabric can be interconnected within, either as stretched Fabrics or with true DCI. The session concludes with a brief overview of manageability functions, network orchestration capabilities and multi-tenancy details. This Advanced session is intended for network, design and operation engineers from Enterprises to Service Providers.
VXLAN is a point to point, UDP-based "tunneling" protocol, that enables L2 encapsulation over an L3 "undernet", while also allowing up to 16 million Virtual Networks. One challenge with deploying VXLAN is that by default VXLAN requires multicast support for Broadcast, Unknown and Multi-cast packets. Often this is not possible in customer networks. An alternative approach is to use the Service Node concept where dedicated node(s)/process(es) are responsible for flooding Broadcast, Unknown, and Multicast packets throughout a network.
This removes the need for multi-cast, and greatly simplifies network configuration. However, it does require a scalable, and highly available implementation.
Flexible Data Centre Fabric - FabricPath/TRILL, OTV, LISP and VXLANCisco Canada
This presentation will discuss the evolving Data Centre Fabric, FabricPath, VXLAN, LISP, LISP Host Mobility, OTV LAN Extension, Mobility with Extended Subnets and Nexus Fabric.
Demystifying EVPN in the data center: Part 1 in 2 episode seriesCumulus Networks
Network operators are slowly but surely embracing L3-based leaf-spine designs. However, either due to legacy applications or certain multi-tenancy requirements, the need for L2 across racks is still present. How do you solve the problem of providing L2 across multiple racks? EVPN is quickly emerging as the best answer to this question.
In this episode of our 2-part series on EVPN, we start with a discussion of the use cases, a review of the technologies EVPN competes with, and dive into an evaluation of the pros and cons of each.
For a recording of the live event, go to http://go.cumulusnetworks.com/l/32472/2017-09-22/95t27t
Infrastructure as a Service (IaaS) for cloud environments provides compute processing, storage, networks, and other fundamental computing resources. To support multi-tenant cloud environments, IaaS utilizes the various advantages of the virtualization, but con-ventional virtual (overlay) network architectures for IaaS have been a direct cause of scalability limitations in multi-tenant cloud environments. In other words, IaaS’s virtual networks have the limitations due to the problems of high availability and load bal-ancing, etc. To solve these problems, we present EYWA, a virtual network architecture that scales to support huge data centers with high availability, load balancing and large layer-2 semantics. The design of EYWA overcomes the limitations by accommodating (1)a large number of tenants (about 224 = 16,777,216) by using virtual LANs such as logically isolated network with its own IP range in the cloud service providers’ view, and providing (2)public network service per tenant without throughput bottleneck and single point of failure (SPOF) on Source and Destination Network Address Translation (SNAT/DNAT) and (3)a single large IP subnet per tenant by using large layer-2 semantics in the consumers’ view. EYWA combines existing techniques into a decentralized scale-out control and data plane. The only component of EYWA is an agent in every hypervisor host that can control packets and the agents act as distributed controller. As a result, EYWA can be deployed into all the multi-tenant cloud environments today.
Operationalizing EVPN in the Data Center: Part 2Cumulus Networks
In the second of our two-part series on EVPN, Cumulus Networks Chief Scientist Dinesh Dutt dives into more technical details of network routing, EVPN use cases, and best practices for operationalizing EVPN in the data center.
To view the recording of this webinar, visit http://go.cumulusnetworks.com/l/32472/2017-09-23/95t7xh
Network Configuration Example: Configuring CoS to Support an MC-LAG on an FCo...Juniper Networks
This NCE provides a step-by-step procedure for configuring class of service (CoS) for Fibre Channel over Ethernet (FCoE) transit switch traffic across a multichassis link aggregation group (MC-LAG) that connects two QFX Series switches.
Architecting data center networks in the era of big data and cloudbradhedlund
Brad Hedlund's speaking session at Interop Las Vegas 2012.
Big Data clusters and SDN enabled clouds invite a new approach to data center networking. This session for data center architects will explore the transition from traditional scale-up chassis based Layer 2 centric networking, to the next generation of scale-out Layer 3 CLOS based fabrics of fixed switches.
IP Infusion Application Note for 4G LTE Fixed Wireless AccessDhiman Chowdhury
SKY Brazil is one of the largest Pay TV provider in Brazil with 5Million+ subscribers created world’s first disaggregated 5G-ready Fixed Wireless Access (FWA) network using IPInfusion’s disaggregated Cell Site Gateway Solution to serve 35K broadband subscribers.
Learn how the deployment was done, read this application note to know more about the usecase and OcNOS configurations.
W trakcie sesji przedstawione zostaną różne sposoby budowania rozproszonych punktów wymiany ruchu internetowego. Zaprezentowane zostanie również jak w praktyce wykorzystano protokół TRILL w Slovak Internet Exchange.
Slawomir Janukowicz, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
vPC techonology for full ha from dc core to baremetel server.
1. I had designed the Leaf-Spine with core deployment in Openstack Cloud Infrastructure. In a vPC topology, all
links between the aggregation and access layers are forwarding and are part of a vPC.
Gigabit Ethernet connectivity makes use of the FEX concept. Spanning Tree Protocol does not run between the
Cisco Nexus 5000 Series Switches and the Cisco Nexus 2000 Series FEXs. Instead, proprietary technology
keeps the topology between the Cisco Nexus 5000 Series Switches and the fabric extenders free of loops.
Adding vPC to the Cisco Nexus 5000 Series Switches in the access layer allows additional load distribution from
the server to the fabric extenders to the Cisco Nexus 5000 Series Switches.
An existing Cisco Nexus 7000 Series Switch can be replaced with a Cisco Nexus 9500 platform switch with one
exception: Cisco Nexus 9000 Series Switches do not support vPC active-active or two-layer vPC (eVPC)
designes.
In This Design have full HA from Core to Baremetel Server for cloud Enviorment and weIn This Design have full HA from Core to Baremetel Server for cloud Enviorment and we
need to also NICs Bond in Baremetel server ends for vPC.need to also NICs Bond in Baremetel server ends for vPC.
vPC Design with Cisco Nexus 9500 Platform in the Core OpenStack Cloud Data CentervPC Design with Cisco Nexus 9500 Platform in the Core OpenStack Cloud Data Center
2K 2K
CORE CORE
9508 9508
5K 5K
vPCvPC
vPCvPC
vPC
BaremetelBaremetel
2. ConsolidationConsolidation:-:-
Most data centers are the result of aconsolidation process that
was facilitated by the availability of bandwidth to
connect remote locations to centralized data centers.
During the consolidation process, enterprises and service
providers simplified the network and the storage infrastructure by
adopting topologies that take advantage of virtuallocal area
networks (VLANs) and the virtual storage area network (VSAN)
technology.The same process of simplification is currently
happening on the computing nodes. It involves both physical
consolidation by means of blade enclosures and server
virtuallization at the operating system(OS) level, which makes it
possible to run multiple instances of variouss operating systems
on the same physical machine.
●● End of the Row and Top of the Rack :-End of the Row and Top of the Rack :-
Most existing data centers are deployed according to two design
philosophies:
End-of-the-row topologies:This topology consists of large,
director-class switching devices at the end of each row of servers.
End-of-the-row topologies require significant cabling bulk to be
carried from all server racks to the network rack. The main
advantage of end-of-the-row topologies is the fact that fewer
configuration points (switches) control a large number of server
port.
●● Top-of-the-rack topologies:-Top-of-the-rack topologies:-
This topology consists of one-rack unit (1RU) or 2RU devices at
the top or bottom of each server rack, providing server (or blade
server) connectivity within each rack and aggregated ba switch at
the aggregation layer. Top-of-the-rack topologies are more
efficient in terms of cabling because fewer cables are required
from each rack to the end-of-the-row switch.
3. On the other hand, top-of-the-rack topologies require more
switches than end-of-the-row topologies require for the same
number of switch ports,which increases the management
Burden.
Layer 2
Layer 2 has been well known for its flexibility in providing VLAN
access anywhere in the data center. Layer 2 is alsoknown for
the potential impact of Layer2 loops. Overall, the benefits of
Layer 2 largely outweigh the risk of loops, somost environments
today consist of Layer 2 pods or even have multiple pods that
are part of the same Layer 2 domain.A Layer 3 boundary is always
recommended to connect servers to clients. The placement of the
Layer 3 boundarydefines the scale of the Layer2 domain, with the
result that the size of Layer 2 domains varies enormously between
Customers.
●● All Links Forwarding:-All Links Forwarding:-
The next-generation data center provides the ability to use all links
in the LAN topology by taking advantage of technologies such as
virtual PortChannels (vPCs). VPCs enable full, cross-sectional
bandwidth utilization among LANswitches, as well as between
servers and LAN switches.
● Server Connectivity at 10 Gigabit Ethernet:-
Most rackable servers today include redundant LAN-on-motherboard
(LOM/iLO) interfaces for management, anintegrated-lights-out (iLO)
standard-based port, and one or more GigabitEthernet interfaces,
and redundant host busadapters (HBA). The adoption of 10 Gigabit
Ethernet on the server simplifies server configuration by reducing
The number of network adapters and providing enough bandwidth
for virtualized servers. The data center design can befurther
optimized with the use of Fibre Channelover Ethernet (FCoE) to
build a unified fabric.Cost-effective 10 Gigabit Ethernet connectivity
can be achieved by using copper twinax cabling with Small Form-
4. by using copper twinax cabling with Small Form-Factor Pluggable
Plus (SFP+) connectors.A rackable server configured for 10
Gigabit Ethernet connectivity may have an iLO port, a dual- LOM,
and a dual-port10 Gigabit Ethernet adapter (for example, a
converged network adapter). This adapter would replace multiple
QuadGigabit Ethernet adapters and, in case the adapter is also a
Cisco Network Adapter, it would also replace an HBA.
●Fabric Extender:-
Fabric extender technology simplifies the management of
the many LAN switches in the data center by aggregating
them in groups of 10 to 12 under the same management
entity. In its current implementation, Cisco Nexus 2000
Series Fabric Extenders can be used to provide connectivity
across 10 to 12 racks that are all managed from a single
switching configuration point, thus bringing together the benefit
s of top-of-the-rack and end-of-the-row topologies.
Guys Please follow the below config :-Guys Please follow the below config :-
version 7.0(2)N1(1)
hostname Nexus 5K(Primary)
feature telnet
cfs ipv4 distribute
cfs eth distribute
feature ospf
feature bgp
feature interface-vlan
feature hsrp
feature lacp
feature vpc
feature lldp
feature fex
5. banner motd #Nexus 6000 Switch
#
ip domain-lookup
ip access-list 10
10 permit ip any any
system qos
service-policy type qos input fcoe-default-in-policy
service-policy type queuing input fcoe-default-in-policy
service-policy type queuing output fcoe-default-out-policy
service-policy type network-qos fcoe-default-nq-policy
fex 1
pinning max-links 1
description "FEX01"
fex 2
pinning max-links 1
description "FEX02"
fex 3
pinning max-links 1
description "FEX03"
vlan 1
vlan7
name SW_MGMT
vlan10
name iLO
route-map Connected_Subnet permit 10
vrf context management
vpc domain 30
peer-switch
role priority 50
system-priority 100
peer-keepalive destination 10.x.x.y
delay restore 150
auto-recovery
6. interface Vlan1
interface Vlan7
description ****
no shutdown
ip address
ip router ospf 1 area 0.0.0.1
hsrp 50
preempt delay minimum 10
priority 50
timers 1 3
ip (ip Address)
interface Vlan10
description ****
no shutdown
ip address (a.b.c.d)
ip router ospf 1 area 0.0.0.1
hsrp 50
preempt delay minimum 10
priority 50
timers 1 3
ip (Floating ip)
interface port-channel1
description ***VPC-Peer_Link-***
switchport mode trunk
spanning-tree port type network
speed 10000
vpc peer-link
interface port-channel1
description ******
switchport mode fex-fabric
switchport trunk allowed vlan10
fex associate 1
vpc 1
12. interface Ethernet1/3
description ******
switchport mode fex-fabric
switchport trunk allowed vlan10
fex associate 3
Channel-group 3
interface Ethernet1/25
description ******
switchport mode trunk
channel-group 1 mode active
interface Ethernet1/26
description ******
switchport mode trunk
channel-group 1 mode active
interface Ethernet1/48
description ******
no switchport
ip address A>B>C>D/30
ip ospf network point-to-point
ip router ospf 1 area 0.0.0.1
interface mgmt0
vrf member management
line console
line vty
boot kickstart bootflash:/n6000-uk9-kickstart.7.0.1.N1.1.bin
boot system bootflash:/n6000-uk9.7.0.1.N1.1.bin
router ospf 1
redistribute direct route-map Connected_subnet
poap transit
13. Thank You Guys for Visit my refer GuideThank You Guys for Visit my refer Guide
Cheers,
Ajeet Singh
Contact No:- +91 992039357
Linkedin:-https://in.linkedin.com/pub/ajeet-singh/3a/b42/895
Twitter:-@ajeet0537
Blog:-https://ajeets1.blogspot.in
Facebook:-https://www.facebook.com/Technical.Rapiist