SlideShare a Scribd company logo
1 of 121
Data Center Deployment Guide
August 2011 Series
PrefaceAugust 2011 Series
Preface
This guide is a Cisco® Smart Business Architecture (SBA) guide.
Who Should Read This Guide
This guide is written for people who fill a variety of roles:
•	 Systems engineers who need standard procedures for implementing
solutions
•	 Project managers who need reference material for creating statements
of work for SBA implementations
•	 Sales partners who want help with selling new technology or who create
their own implementation documentation
•	 Trainers who need material for classroom instruction or on-the-job
training
In general, you can also use SBA guides to improve consistency among
engineers, among deployments, and to improve scoping and costing of
deployment jobs.
Release Series
Cisco updates and enhances SBA guides twice a year. Before we release a
series of SBA guides, we test them together in the SBA lab, as a complete
system. To ensure the mutual compatibility of designs in SBA guides, you
should use guides that belong to the same SBA series.
All SBA guides include the series name on the cover and at the bottom left
of each page. The series are named as follows:
•	 February year Series
•	 August year Series
where year indicates the calendar year of the series.
You can find the most recent series of SBA guides at the following sites:
Customer access: http://www.cisco.com/go/sba
Partner access: http://www.cisco.com/go/sbachannel
How to Read Commands
Many SBA guides provide specific details about how to configure Cisco net-
work devices that run Cisco IOS, Cisco NX-OS, or other operating systems
that you configure at a command-line interface (CLI). This section describes
the conventions used to specify commands that you must enter.
Commands to enter at a CLI appear as follows:
configure terminal
Commands that specify a value for a variable appear as follows:
ntp server 10.10.48.17
Commands with variables that you must define appear as follows:
class-map [highest class name]
Commands shown in an interactive example, such as a script or when the
command prompt is included, appear as follows:
Router# enable
Long commands that line wrap are underlined. Enter them as one command:
wrr-queue random-detect max-threshold 1 100 100 100 100 100
100 100 100
Comments and Questions
If you would like to comment on a guide or ask questions, please use the
forum at the bottom of one of the following sites:
Customer access: http://www.cisco.com/go/sba
Partner access: http://www.cisco.com/go/sbachannel
An RSS feed is available if you would like to be notified when new comments
are posted.
Table of Contents
Table of ContentsAugust 2011 Series
What’s In This SBA Guide. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 1
About SBA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
About This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Introduction.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 2
Supporting Rapid Application Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Managing Growing Data Storage Requirements. . . . . . . . . . . . . . . . . . . . . . . . . 2
Optimizing the Investment in Server Processing Resources. . . . . . . . . . . . . 2
Securing the Organizations Critical Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Architecture Overview. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 4
Physical Environment.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 6
Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Power. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Cooling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Equipment Racking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Ethernet Infrastructure.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 7
Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Virtual Port Channel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Ethernet Fabric Extension. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Initial Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Configure Inter-Device Links. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  11
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  15
Storage Infrastructure.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 16
Business Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  16
Technology Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  16
Storage Array Tested . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  18
Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  18
Configuring the Cisco MDS 9148 Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  18
Configuring Cisco UCS Rack Mount Servers for FCoE. . . . . . . . . . . . . . . . . 26
Nexus 5000 configuration for FCoE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Network Security.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 35
Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Security Policy Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Configure Cisco ASA Firewall Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Evaluate and Deploy Security Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Deploying Cisco Intrusion Protection System (IPS) . . . . . . . . . . . . . . . . . . . . 43
Computing Resources.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 53
Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Cisco UCS Blade Chassis System Components. . . . . . . . . . . . . . . . . . . . . . . 54
Cisco UCS Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Cisco UCS C-Series Rack Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
UCS System Network Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Completing the Initial System Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Getting Started with UCS Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Creating an Initial Service Profile for Local Boot . . . . . . . . . . . . . . . . . . . . . . . 63
Applying Service Profiles to Physical Servers. . . . . . . . . . . . . . . . . . . . . . . . . .  72
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  75
Table of Contents
Table of ContentsAugust 2011 Series
ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, “DESIGNS”) IN THIS MANUAL ARE PRESENTED “AS IS,” WITH ALL FAULTS. CISCO AND ITS SUPPLIERS
DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITA-
TION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL
OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY
DEPENDING ON FACTORS NOT TESTED BY CISCO.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes
only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. © 2011 Cisco Systems, Inc. All rights reserved.
Virtual Switching. .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 76
Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  76
Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  76
Nexus 1000V VEM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Virtual Supervisor Module. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Nexus 1000V Port Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  78
Nexus 1010 Virtual Services Appliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  78
Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  78
Install and Set Up the Nexus 1010. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  78
Deploying the Nexus 1000V on a ESXi host as a virtual machine. . . . . . . 88
Configure Virtualized Hosts to Use the Nexus 1000v. . . . . . . . . . . . . . . . . 100
Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  110
Application Resiliency.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 111
Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  111
Inflexible Application Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  111
Server Availability and Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  111
Application Security and Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  111
Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  111
Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  112
Configuring ACE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  113
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  115
Appendix A: Product List.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 116
What’s In This SBA Guide
About SBA
Cisco SBA helps you design and quickly deploy a full-service business
network. A Cisco SBA deployment is prescriptive, out-of-the-box, scalable,
and flexible.
Cisco SBA incorporates LAN, WAN, wireless, security, data center, application
optimization, and unified communication technologies—tested together as a
complete system. This component-level approach simplifies system integration
of multiple technologies, allowing you to select solutions that solve your
organization’s problems—without worrying about the technical complexity.
About This Guide
This guide is a foundation deployment guide that is organized in modules.
Each module in this guide includes the following sections:
•	 Business Overview—Describes the business use case for the solution
presented in the module. Business decision makers may find this section
especially useful.
•	 Technology Overview—Describes the technical solution for the
business use case, including an introduction to the Cisco products that
make up the solution. Technical decision makers can use this section to
understand how the solution works.
•	 Deployment Details—Provides step-by-step instructions for deploying
and configuring the portion of the foundation that the module addresses.
Systems engineers can use this section to get the solution up and
running quickly and reliably.
A foundation deployment guide always follows a foundation design overview
on the Route to Success, shown below.
1What’s In This SBA GuideAugust 2011 Series
Route to Success
To ensure your success when implementing the designs in this guide,
you should read any guides that this guide depends upon—shown to
the left of this guide on the route above. Any guides that depend upon
this guide are shown to the right of this guide.
For customer access to all SBA guides: http://www.cisco.com/go/sba
For partner access: http://www.cisco.com/go/sbachannel
Data Center
Design Overview
Data Center
Deployment Guide
Additional
Deployment Guides
DC
You are Here Dependent GuidesPrerequisite Guides
2IntroductionAugust 2011 Series
Introduction
Midsize organizations encounter many challenges as they work to scale
their information-processing capacity to keep up with demand. In a new
organization, a small group of server resources may be sufficient to provide
necessary applications such as file sharing, e-mail, database applications,
and web services. Over time, demand for increased processing capacity,
storage capacity, and distinct operational control over specific servers can
cause a growth explosion commonly known as “server sprawl”. A midsize
organization can then use some of the same data center technologies that
larger organizations use to meet expanding business requirements in a
way that keeps capital and operational expenses in check. This deployment
guide provides reference architecture to facilitate rapid adoption of these
data center technologies by using a common, best-practices configuration.
The Cisco SBA Data Center for Midsize Organizations architecture provides
an evolution from the basic “server room” infrastructure illustrated in the
SBA Midsize Foundation Deployment Guide. The Data Center for Midsize
Organizations is designed to address four primary business challenges:
•	 Supporting rapid application growth
•	 Managing growing data storage requirements
•	 Optimizing the investment in server processing resources
•	 Securing the organizations’ critical data
Supporting Rapid Application Growth
As applications scales to support a larger number of users, or new applica-
tions are deployed, the number of servers required to meet the needs of the
organization often increases. The first phase of the server room evolution is
often triggered when the organization outgrows the capacity of the existing
server room network. Many factors can limit the capacity of the existing
facility, including rack space, power, cooling, switching throughput, or basic
network port count to attach new servers. The architecture outlined in this
guide is designed to allow the organization to smoothly scale the size of the
server environment and network topology as business requirements grow.
Managing Growing Data Storage Requirements
As application requirements grow, the need for additional data storage
capacity also increases. This can initially cause issues when storage
requirements for a given server increase beyond the physical capacity of
the server hardware platform in use. As the organization grows, the invest-
ment in additional storage capacity is most efficiently managed by moving
to a centralized storage model. A centralized storage system can provide
disk capacity across multiple applications and servers providing greater
scalability and flexibility in storage provisioning.
A dedicated storage system provides multiple benefits beyond raw disk
capacity. Centralized storage systems can increase the reliability of disk
storage, which improves application availability. Storage systems allow
increased capacity to be provided to a given server over the network without
needing to physically attach new devices to the server itself. More sophisti-
cated backup and data replication technologies are available in centralized
storage systems, which helps protect the organization against data loss and
application outages.
Optimizing the Investment in Server Processing Re-
sources
As a midsize organization grows, physical servers are often dedicated to sin-
gle applications to increase stability and simplify troubleshooting. However,
these servers do not operate at high levels of processor utilization for much
of the day. Underutilized processing resources represent an investment by
the organization that is not being leveraged to its full potential.
Server virtualization technologies allow a single physical server to run
multiple virtual instances of a “guest” operating system, creating virtual
machines (VMs). Running multiple VMs on server hardware helps to more
fully utilize the organization’s investment in processing capacity, while still
allowing each VM to be viewed independently from a security, configuration,
and troubleshooting perspective.
Server virtualization and centralized storage technologies complement one
another, allowing rapid deployment of new servers and reduced downtime
in the event of server hardware failures. Virtual machines can be stored
completely on the centralized storage system, which decouples the identity
of the VM from any single physical server. This allows the organization great
flexibility when rolling out new applications or upgrading server hardware.
The architecture defined in this guide is designed to facilitate easy deploy-
ment of server virtualization, while still providing support for the existing
installed base of equipment.
3IntroductionAugust 2011 Series
Securing the Organizations Critical Data
With communication and commerce in the world becoming increasingly
Internet-based, network security quickly becomes a primary concern of
a growing organization. Often organizations will begin by securing their
Internet edge connection, considering the internal network a trusted entity.
However, an Internet firewall is only one component of building security into
the network infrastructure.
Frequently, threats to an organization’s data may come from within the inter-
nal network. This may come in the form of on-site vendors, contaminated
employee laptops, or existing servers that have already become compro-
mised and may be used as a platform to launch further attacks. With the
centralized repository of the organizations most critical data typically being
the data center, security is no longer considered an optional component of a
complete data center architecture plan.
The SBA Midsize Data Center Architecture illustrates how to cleanly
integrate network security capabilities such as firewall and intrusion preven-
tion, protecting areas of the network housing critical server and storage
resources. The architecture provides the flexibility to secure specific
portions of the data center or insert firewall capability between tiers of a
multi-tier application according to the security policy agreed upon by the
organization.
4Architecture OverviewAugust 2011 Series
Architecture Overview
The SBA Midsize Data Center Architecture is designed to allow organizations to take an existing server room environment to the next level of performance,
flexibility, and security. Figure 1 provides a high-level overview of this architecture.
Figure 1. SBA Midsize Data Center Architecture
5Architecture OverviewAugust 2011 Series
The SBA Midsize Data Center Architecture is designed to connect to one of
the SBA Layer-3 Ethernet core solutions, as documented in the SBA Midsize
Foundation Deployment Guide. The following technology areas are included
within this reference architecture:
•	 Ethernet Infrastructure—Resilient Layer-2 Ethernet networking to sup-
port 10 Gigabit and 1 Gigabit Ethernet connectivity.
•	 Storage Networking—Take advantage of IP-based storage access,
Fibre Channel over Ethernet, or a full Fibre Channel SAN solution
depending on your requirements.
•	 Network Security—Integrate firewall and intrusion prevention services
into the data center to protect critical application data.
•	 Computing Resources—Leverage powerful computing platforms in
both blade server and rack mount formats.
•	 Virtual Switching—Deploy a centrally managed distributed virtual
switching system for your VMware environment.
•	 Application Resiliency—Server load balancing solutions providing high
availability, scalability and security for your key applications.
This architecture is designed to allow a midsize organization to position its
network for growth while controlling both equipment costs and operational
costs. The deployment processes documented in this guide provide
concise step-by-step instructions for completing basic configuration of the
components of the architecture. This approach allows you to take advantage
of some of the newer technologies being used in the data centers of very
large organizations without encountering a steep learning curve for the
IT staff. Although this architecture has been designed and validated as a
whole, the modular nature of this guide allows you to perform a gradual
migration by choosing specific elements of the architecture to implement
first.
The remaining sections of this guide detail the various technologies that
comprise this architecture.
6Physical EnvironmentAugust 2011 Series
Physical Environment
Business Overview
When building or changing a network, you have to carefully consider the
location where you will install the equipment. When building a server room,
a switch closet, or even a midsize data center, take three things into con-
sideration: power, cooling, and racking. Know your options in each of these
categories, and you will minimize surprises and moving of equipment later
on.
Power
Know what equipment will be installed in the area. You cannot plan electrical
work if you do not know what equipment is going to be used. Some equip-
ment requires standard 110v outlets that may already be available. Other
equipment can require great power needs.
Does the power need to be on all the time? In most cases this answer will be
yes if there are servers and storage involved. Applications don’t react very
well when the power goes out, so to prevent this a uninterruptable power
supply (UPS) is needed. The UPS will switch over the current load to a set of
internal or external batteries. Some UPSs are online, which means the power
is filtered through the batteries all the time; others are switchable, meaning
they use batteries only during power losses. UPSs vary by how much load
they can carry and for how long. Careful planning is required to make sure
the correct UPS is purchased, installed, and managed correctly. Most UPSs
provide for remote monitoring and the ability to trigger a graceful server
shutdown for critical servers if the UPS is going to run out of battery.
Distributing the power to the equipment can change the power require-
ments as well. There are many options available to distribute the power from
the outlet or UPS to the equipment. One example would be using a power
strip that resides vertically in a cabinet that usually has an L6-30 input and
then C13/C19 outlets with the output voltage in the 200-240 range. These
strips should be at a minimum metered so one does not overload the cir-
cuits. The meter provides a current reading of the load on the circuit. This is
critical as a circuit breaker tripping due to being overloaded will bring down
everything plugged into it with no warning causing business downtime and
possible data loss. For complete remote control, power strips are available
with full remote control of each individual outlet from a web browser. These
vertical strips also assist in proper cable management of the power cords.
Short C13/C14 and C19/C20 power cords can be used instead of much
longer cords to multiple 110 volt outlets or multiple 110volt power strips.
Cooling
With power comes the inevitable conversion of power into heat. Without
going into great detail, power in equals heat out. Planning for cooling of one
or two servers and a switch with standard building air may work. Multiple
servers and blade servers (along with storage, switches, etc.) need more
than building air for proper cooling. Be sure to at least plan with your facili-
ties team what the options are for current and future cooling. Many options
are available, in-row cooling, overhead cooling, raised floor with underfloor
cooling, and wall mounted cooling.
Equipment Racking
Where to put the equipment is a very important detail not to overlook. Proper
placement and planning allow for easy growth. With the power and cooling
properly evaluated racking or cabinets need to be installed. Most servers
are fairly deep and, with network connections and power connections, take
up even more space. Most servers will fit in a 42-inch deep cabinet, and
deeper cabinets give more flexibility for cable and power management
within the cabinet. Be aware of what rails are required by your servers. Most
servers now come with rack mounts that use the square-hole style vertical
cabinet rails. Not having the proper rails can mean having to use adapters
or shelves and making management of servers and equipment difficult if
not sometimes impossible without removing other equipment or sacrificing
space. Data center racks should use the square rail mounting options in
the cabinets. Cage nuts can be used to provide threaded mounts for such
things as routers, switches, shelves, etc. that may be needed.
Summary
The physical environmental requirements for a data center require careful
planning to provide for efficient use of space, scalability, and ease of opera-
tional maintenance. Working towards deployment of the Smart Business
Architecture allows you to plan the physical space for your data center with
a vision towards the equipment you will be installing over time, even if you
begin with a smaller scale. For additional information on data center power,
cooling and equipment racking, contact Cisco partners in the area of data
center environmental products such as Panduit and APC.
7Ethernet InfrastructureAugust 2011 Series
Ethernet Infrastructure
Business Overview
As your midsize organization grows, you may outgrow the capacity of the
basic “server-room” Ethernet switching stack illustrated in the SBA Midsize
Foundation Architecture. It is important to be prepared for the ongoing
transition of available server hardware from 1 gigabit Ethernet attachment to
10 gigabit. Multi-tier applications often divide browser-based client services,
business logic, and database layers into multiple servers, increasing the
amount of server-to-server traffic and driving performance requirements
higher. As the physical environment housing the organization’s servers
grows to multiple racks, it also becomes more challenging to elegantly
manage the cabling required to attach servers to the network. 10 Gigabit
Ethernet connections help to improve overall network performance, while
reducing the number of physical links required to provide the bandwidth.
Technology Overview
The foundation of the Ethernet network in the SBA Midsize Data Center
Architecture is a resilient pair of Cisco Nexus 5000 Series switches. These
switches offer the ideal platform for building a scalable, high-performance
data center supporting both 10 gigabit and 1 gigabit Ethernet attached serv-
ers. Optional Fibre Channel modules are available to allow integration with a
Fibre-Channel based Storage Area Network (SAN). The Cisco Nexus 5000
Series also supports the Cisco Nexus 2000 Series Fabric Extenders. Fabric
Extenders allow the switching fabric of the resilient switching pair to be
physically extended to provide port aggregation in the top of multiple racks,
reducing cable management issues as the server environment expands.
The Fabric Extenders are all managed centrally from the Cisco Nexus 5000
Series switch pair, where they appear as “remote linecards” to the primary
data center switches. This centralized management provides easy port
provisioning and keeps operational costs down for the growing organization.
The SBA Midsize Data Center Architecture leverages many advanced
features of the Cisco Nexus 5000 Series switch family to provide a central
switching fabric for the data center environment that is easy to deploy. This
section provides an overview of the key features used in this topology and
illustrates the specific physical connectivity that applies to the example
configurations provided in the deployment section.
Virtual Port Channel
The Cisco Nexus 5000 Series switch pair providing the central Ethernet
switching fabric for the SBA Midsize Data Center Architecture is configured
using the Virtual Port Channel (vPC) feature. This capability allows the two
switches to be used to build resilient, loop-free topologies that forward
on all connected links instead of requiring Spanning Tree Protocol (STP)
blocking for loop prevention. This feature enhances ease-of-use and simpli-
fies configuration for the data center-switching environment. Neighboring
devices such as the SBA Midsize core switches can leverage a Port Channel
configuration, which bundles multiple links into a single logical link, with all
available physical bandwidth being used to forward traffic. Allowing all links
to forward traffic instead of requiring spanning tree to block the parallel
paths for loop prevention provides greater bandwidth capacity to increase
application performance.
Ethernet Fabric Extension
The Cisco Nexus 2000 Series Fabric Extender (FEX) delivers cost-effective
and highly scalable 1 gigabit and 10 gigabit Ethernet environments. Fabric
extension allows you to aggregate a group of physical switch ports at the top
of each server rack, without needing to manage these ports as a separate
logical switch. You can provide network resiliency by dual-homing servers
into two separate fabric extenders, each of which is single homed to one
member of the Cisco Nexus 5000 Series switch pair. To provide high avail-
ability for servers that only support single-homed network attachment, the
FEX itself may instead be dual-homed into the two members of the central
switch pair.
Our reference architecture example shown in Figure 2. illustrates single-
homed and dual-homed FEX configurations. Each FEX includes dedicated
fabric uplink ports that are designed to connect to upstream Cisco Nexus
5000 Series switches for data communication and management; these are
shown as ports F1 and F2 in the illustration. The port designations on the
Cisco Nexus 5000 side reflect the example ports used for reference con-
figurations contained in this guide; any 10 gigabit Ethernet port on the Cisco
Nexus 5000 switch may be used for FEX connection.
8Ethernet InfrastructureAugust 2011 Series
The first 8 ports of a Cisco Nexus 5010 and the first 16 ports of a
Cisco Nexus 5020 switch may be configured at either 10 Gigabit
or 1 Gigabit Ethernet speeds. If you have requirements for 1
Gigabit Ethernet connections directly to the switch, ensure that
you are reserving the correct ports and apply the speed com-
mand to control this setting. As of NX-OS 5.0(2)N1(1), all Ethernet
ports of the Nexus 5548 switch support 10 Gigabit Ethernet
connection speed. If 1-Gigabit Ethernet connections are required,
fabric extender ports on Nexus 2148 or 2248 may be used.
10-Gigabit Ethernet connections will be supported directly to the
Nexus 5548 in a future software release.
Tech Tip
Figure 2. Ethernet Switching Fabric Physical Connections
Deployment Details
The following configuration procedures are required to configure the
Ethernet switching fabric for the SBA Midsize Data Center Architecture.
•	 Establish physical connectivity
•	 Perform Initial device configuration
•	 Complete vPC configuration
•	 Create port channel to SBA core
•	 Configure fabric extender connections
9Ethernet InfrastructureAugust 2011 Series
Initial Setup
1.	 Establish Physical Connectivity
2.	 Perform Initial Device Configuration
Process
Procedure 1	 Establish Physical Connectivity
Complete the physical connectivity of the Cisco Nexus 5000 Series switch
pair according to the illustration in Figure 2. (or according to the specific
requirements of your implementation).
Step 1: Connect ports Ethernet 1/17 and 1/18 or other available Ethernet
ports between the two Cisco Nexus 5000 Series switches. This link will be
used as the vPC peer-link, which allows the peer connection to form and
supports forwarding of traffic between the switches if necessary during a
partial link failure of one of the vPC port channels.
Step 2: Connect the Management 0 ports to the SBA core switch pair (or an
alternate location where they can be connected to the data center manage-
ment VLAN). In our example configurations, the data center management
VLAN is 163.
Step 3: Connect ports Ethernet 1/19 and 1/20 or other available Ethernet
ports on each Cisco Nexus 5000 Series switch to the SBA core to build the
port channel which will carry production data traffic. Four 10 gigabit Ethernet
connections will provide an aggregate throughput of 40 Gbps to carry data
back and forth to client machines, or to be Layer-3 switched between serv-
ers by the SBA core if required.
Step 4: To support a dual-homed FEX with single-homed servers, connect
fabric uplink ports 1 and 2 on the FEX to port Ethernet 1/13 or other available
Ethernet ports, one on each Cisco Nexus 5000 Series switch. These ports
will operate as a port channel to support the dual-homed FEX configuration.
Step 5: Support single-homed FEX attachment by connecting fabric uplink
ports 1 and 2 on each FEX to ports Ethernet 1/15 and 1/16 or other available
Ethernet ports on only one member of the Cisco Nexus 5000 Series switch
pair. These ports will be a port-channel, but will not be configured as a vPC
port-channel, because they have physical ports connected to only one
member of the switch pair.
Procedure 2	 Perform Initial Device Configuration
Step 1: Connect a terminal cable to the console port of the first Cisco
Nexus 5000 Series switch, and power on the system to enter the initial
configuration dialog.
Step 2: Follow the Basic System Configuration Dialog for initial device
configuration of the first Cisco Nexus 5000 Series switch, as shown in the
terminal capture below:
Do you want to enforce secure password standard (yes/no): y
Enter the password for “admin”:
Confirm the password for “admin”:
---- Basic System Configuration Dialog ----
This setup utility will guide you through the basic
configuration of the system. Setup configures only enough
connectivity for management of the system.
Please register Cisco Nexus 5000 Family devices promptly with
your supplier. Failure to register may affect response times
for initial service calls. Nexus devices must be registered to
receive entitled support services.
Press Enter at anytime to skip a dialog. Use ctrl-c at anytime
to skip the remaining dialogs.
Would you like to enter the basic configuration dialog (yes/
no): y
Create another login account (yes/no) [n]: n
Configure read-only SNMP community string (yes/no) [n]: n
Configure read-write SNMP community string (yes/no) [n]: n
Enter the switch name : dc3-5k-1
Continue with Out-of-band (mgmt0) management configuration?
(yes/no) [y]: y
10Ethernet InfrastructureAugust 2011 Series
Mgmt0 IPv4 address : 10.10.63.10
Mgmt0 IPv4 netmask : 255.255.255.0
Configure the default gateway? (yes/no) [y]: y
IPv4 address of the default gateway : 10.10.63.1
Enable the telnet service? (yes/no) [n]: y
Enable the http-server? (yes/no) [y]: y
Enable the ssh service? (yes/no) [y]: y
Type of ssh key you would like to generate (dsa/rsa) : rsa
Number of key bits <768-2048> : 2048
Configure the ntp server? (yes/no) [n]: y
NTP server IPv4 address : 10.10.48.17
Enter basic FC configurations (yes/no) [n]: n
The following configuration will be applied:
switchname dc2-5k-1
interface mgmt0
ip address 10.10.63.10 255.255.255.0
no shutdown
exit
vrf context management
ip route 0.0.0.0/0 10.10.63.1
exit
telnet server enable
feature http-server
ssh key rsa 768 force
ssh server enable
ntp server 10.10.48.17 use-vrf management
Would you like to edit the configuration? (yes/no) [n]: n
Use this configuration and save it? (yes/no) [y]: y
[########################################] 100%
Nexus 5000 Switch
dc2-5k-1 login:
Step 3: Enable common required features in the NXOS software. The
example configurations shown in this guide use the following features:
feature telnet
feature private-vlan
feature udld
feature interface-vlan
feature lacp
feature vpc
feature lldp
feature fex
feature npv
If Fibre Channel–specific features such as Fibre Channel over
Ethernet (FCoE) or N-Port Virtualization (NPV) are required, they
should be enabled prior to applying any additional configura-
tion to the switch. The NPV feature requires you to re-apply any
existing configuration commands to the switch if it is added or
removed.
Tech Tip
Step 4: Create required VLANs. For our example configuration, we are
using VLANS 148-163 for various roles within the data center, and VLAN 999
as a “dummy” VLAN to define as native on trunks to mitigate the risk of any
VLAN hopping by untagged traffic. It is helpful to assign names to VLANs as
they are created; this makes the switch configuration more self-documenting
and can assist later if troubleshooting is required.
vlan 148
name servers1
vlan 149
name servers2
vlan 163
name dc-management
vlan 999
name native
11Ethernet InfrastructureAugust 2011 Series
Step 5: Enable jumbo frame support. Jumbo frames can improve data
throughput between key end nodes in the data center that are able to
negotiate larger packet sizes, such as iSCSI based storage systems and
their associated servers.
policy-map type network-qos jumbo
class type network-qos class-default
mtu 9216
system qos
service-policy type network-qos jumbo
Step 6: On the second Cisco Nexus 5000 Series switch, repeat all of the
steps of the Initial Device Configuration procedure. Use a unique device
name (dc3-5k-2) and IP address (10.10.63.11) for the mgmt0 interface.
Otherwise, all configuration details are identical.
Configure Inter-Device Links
1.	 Complete vPC Configuration
2.	 Create Port Channel to SBA Core
3.	 Configure Fabric Extender Connections
4.	 Configure End Node Ports
Process
Procedure 1	 Complete vPC Configuration
Before you can add port channels to the switch in vPC mode, basic vPC
peering must be established between the two Cisco Nexus 5000 Series
switches.
Step 1: Define a vPC domain number to identify the vPC domain to be
shared between the switches in the pair. The value “10” is shown in the
example.
vpc domain 10
Step 2: Define a lower role priority for the vPC primary switch:
role priority 16000
The vPC secondary switch will be left at the default value of 32667. The
switch with lower priority will be elected as the vPC primary switch. If the
vPC primary switch is alive, the vPC secondary switch will suspend its vPC
member ports to prevent potential looping while the vPC primary switch
keeps all its vPC member ports active. If the peer link fails, the vPC peer
will detect the peer switch’s failure through the vPC peer keepalive link.
Step 3: On the first Nexus 5000, configure the peer-keepalive destination
and source addresses:
peer-keepalive destination 10.10.63.11 source 10.10.63.10
peer-config-check-bypass
The example configuration uses the management (mgmt0) interfaces on
each switch in the pair for the peer-keepalive link. The peer-keepalive is an
alternate physical path between the two vPC switches to ensure that they
are aware of one another’s health even in the case where the main peer
link fails. The peer-keepalive source IP address should be the address
being used on the mgmt0 port of the switch currently being configured, the
destination address is that being used on the vPC peer. Apply the peer-
config-check-bypass command so that newly configured vPCs or existing
vPCs that flap will be brought up even when a peer link is down and the vPC
switch role has been determined to be primary. This can ensure connectivity
is maintained in certain partial-outage scenarios such as unstable power
facilities.
Step 4: Create a port channel interface to be used as the peer link between
the two vPC switches. The peer link is the primary link for communications
and for forwarding of data traffic to the peer switch if required.
interface port-channel10
switchport mode trunk
vpc peer-link
spanning-tree port type network
12Ethernet InfrastructureAugust 2011 Series
Step 5: Add physical interfaces to the trunk and connect the two Nexus
5000s’ ports together. A minimum of two physical interfaces is recom-
mended for link resiliency. Different 10 gigabit Ethernet ports (as required
by your specific implementation) may replace the interfaces shown in the
example.
interface Ethernet1/17
description vpc peer link
switchport mode trunk
channel-group 10 mode active
interface Ethernet1/18
description vpc peer link
switchport mode trunk
channel-group 10 mode active
Step 6: Repeat ste 151 a 153 throug515 for the secondary Nexus 5000. In
st 153, be sure to swap the destination and source addresses.
Step 7: Before moving on to the next procedure, ensure that the vPC peer
relationship has formed successfully using the “show vpc” command.
dc3-5k-1# show vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id : 10
Peer status : peer adjacency formed ok
vPC keep-alive status : peer is alive
Configuration consistency status: success
vPC role : secondary
Number of vPCs configured : 86
Peer Gateway : Disabled
Dual-active excluded VLANs : -
vPC Peer-link status
--------------------------------------------------------------
id Port Status Active vlans
-- ---- ------ -------------------------------------------
1 Po10 up 1,148-163,520,999
Look for the peer status of “peer adjacency formed ok” and the keep-alive
status of “peer is alive” to verify successful configuration. If the status
does not indicate success, double-check the IP addressing assigned for
the keep-alive destination and source addresses, as well as the physical
connections.
Do not be concerned about the “(*) - local vPC is down, forwarding
via vPC peer-link” statement at the top of the command output.
Once you have vPC port channels defined, this is a legend to
show the meaning of an asterisk next to your port channel in the
listing if one of its member links is down.
Tech Tip
Procedure 2	 Create Port Channel to SBA Core
A port-channel interface needs to be created to carry traffic back and forth
to the network core, which provides forwarding to client machines and
layer-3 forwarding between the different IP subnets carried on different
VLANs. We recommend at least two physical interfaces from each vPC peer
switch connected to the network core, for a total port channel of four resilient
physical 10 gigabit Ethernet links and 40Gbps of throughput. Defining a vPC
port channel is identical to defining a standard port channel interface, with
the addition of the “vpc [port-channel no.]” command added to the interface
configuration.
Step 1: On both of the Data Center Nexus 5000 vPC members, define
EtherChannel configuration:
interface port-channel60
description link to core
switchport mode trunk
vpc 60
switchport trunk native vlan 999
switchport trunk allowed vlan 148-153,156-163
interface Ethernet1/19
description link to core
switchport mode trunk
switchport trunk native vlan 999
switchport trunk allowed vlan 148-153,156-163
channel-group 60 mode active
13Ethernet InfrastructureAugust 2011 Series
interface Ethernet1/20
description link to core
switchport mode trunk
switchport trunk native vlan 999
switchport trunk allowed vlan 148-153,156-163
channel-group 60 mode active
Step 2: On the SBA Midsize Core Switch, define an equivalent
EtherChannel configuration:
vlan 153
name Secure-DC-outside
!
vlan 154
name Secure-DC-inside-1
!
vlan 155
name Secure-DC-inside-2
!
vlan 159
name 1kv-packet
!
vlan 160
name 1kv-control
!
vlan 161
name vmotion
!
vlan 162
name iscsi
!
vlan 163
name dc-management
!
interface Port-channel60
description Connection to DC-5K-2K
switchport
switchport trunk encapsulation dot1q
switchport trunk native vlan 999
switchport trunk allowed vlan 148-153,156-163
switchport mode trunk
!
interface TenGigabitEthernet1/4/15
description Connection to DC-5K-2K
switchport
switchport trunk native vlan 999
switchport trunk allowed vlan 148-153,156-163
switchport mode trunk
channel-group 60 mode active
macro apply EgressQoS
!
interface TenGigabitEthernet1/4/16
[same as TenGigabitEthernet1/4/15]
!
interface TenGigabitEthernet2/4/15
[same as TenGigabitEthernet1/4/15]
!
interface TenGigabitEthernet2/4/16
[same as TenGigabitEthernet1/4/15]
!
interface Vlan153
description Secure DC outside
ip address 10.10.53.1 255.255.255.128
!
interface Vlan154
description DC Secure VLAN: Assign no IP Address
no ip address
!
interface Vlan155
description DC Secure VLAN: Assign no IP Address
no ip address
!
interface Vlan163
description DC Management
ip address 10.10.63.1 255.255.255.0
14Ethernet InfrastructureAugust 2011 Series
Procedure 3	 Configure Fabric Extender Connections
Fabric extender connections are also configured as port channel connec-
tions on the Cisco Nexus 5000 Series. If the FEX is to be single-homed
to only one member of the switch pair, it is configured as a standard port
channel. If the FEX is to be dual-homed to both members of the vPC switch
pair to support single-homed servers, it is configured as a vPC port channel.
Dual- and single-homed examples are illustrated in Figure 2 with configura-
tion examples as shown below.
When assigning FEX numbering, you have the flexibility to use
a numbering scheme (different from the example) that maps to
some other identifier, such as a rack number that is specific to
your environment.
Tech Tip
Step 1: Configure port channel interfaces to support FEX attachment.
interface port-channel100
description single-homed 2248
switchport mode fex-fabric
fex associate 100
interface port-channel102
description dual-homed 2248
switchport mode fex-fabric
vpc 102
fex associate 102
Step 2: Assign physical interfaces to the port channels supporting FEX
attachment. The switchport mode fex-fabric command informs the Cisco
Nexus 5000 Series switch that a fabric extender should be at the other end
of this link.
interface Ethernet1/13
switchport mode fex-fabric
fex associate 102
channel-group 102
interface Ethernet1/15
switchport mode fex-fabric
fex associate 100
channel-group 100
interface Ethernet1/16
switchport mode fex-fabric
fex associate 100
channel-group 100
Once these configuration steps are completed, you can verify the status of
the fabric extender modules by using the show fex command, looking for the
state of “online” for each unit:
dc2-5k-1# sh fex
FEX FEX FEX FEX
Number Description State Model Serial
-------------------------------------------------------------
100 FEX0100 Online N2K-C2148T-1GE JAF1313AFEM
102 FEX0102 Online N2K-C2148T-1GE JAF1319BDPJ
Procedure 4	 Configure End Node Ports
Step 1: Assign physical interfaces to support servers or devices that
belong in a single VLAN as access ports. Setting the spanning-tree port
type to edge allows the port to provide immediate connectivity on the con-
nection of a new device.
interface Ethernet102/1/1
switchport access vlan 163
spanning-tree port type edge
15Ethernet InfrastructureAugust 2011 Series
Step 2: Assign physical interfaces to support servers or devices that
require a VLAN trunk interface to communicate with multiple VLANs. Most
virtualized servers will require trunk access to support management access,
plus user data for multiple virtual machines. Setting the spanning-tree port
type to edge allows the port to provide immediate connectivity on the con-
nection of a new device.
interface Ethernet100/1/1
switchport mode trunk
switchport trunk allowed vlan 148-151,154-163
spanning-tree port type edge trunk
Summary
The configuration procedures provided in this section allow you to get
a resilient Ethernet switching fabric up and running for your data center
environment. This allows you to immediately take advantage of the high
performance, low latency, and high availability characteristics inherent in the
Cisco Nexus 5000 and 2000 Series products. To investigate more advanced
features for your configuration, please refer to the Cisco Nexus 5000 Series
configuration guide series on cisco.com.
16Storage InfrastructureAugust 2011 Series
Storage Infrastructure
Business Overview
There is a constant demand for more storage in organizations today. Storage
for servers can be physically attached directly to the server or connected
over a network. Direct Attached Storage (DAS) is physically attached to a
single server and is difficult to use efficiently because it can only be used
by the host attached to it. Storage Area Networks (SANs) allow multiple
servers to share a pool of storage over a Fibre Channel or Ethernet network.
This capability allows storage administrators to easily expand capacity for
servers supporting data-intensive applications.
Technology Overview
IP-based Storage Options
Many storage systems provide the option for access using IP over the
Ethernet network. This approach allows a growing organization to gain the
advantages of centralized storage without needing to deploy and administer
a separate Fibre Channel network. Options for IP-based storage connectiv-
ity include Internet Small Computer System Interface (iSCSI) and Network
Attached Storage (NAS).
iSCSI is a protocol that enables servers to connect to storage over an IP
connection and is a lower-cost alternative to Fibre Channel. iSCSI services
on the server must contend for CPU and bandwidth along with other
network applications, so you need to ensure that the processing require-
ments and performance are suitable for a specific application. iSCSI has
become a storage technology that is supported by most server, storage,
and application vendors. iSCSI provides block-level storage access to
raw disk resources, similar to Fibre Channel. Network interface cards also
can provide support to offload iSCSI to a separate processor to increase
performance.
Network Attached Storage (NAS) is a general term used to refer to a group
of common file access protocols, the most common implementations use
Common Internet File System (CIFS) or Network File System (NFS). CIFS
originated in the Microsoft network environment and is a common desktop
file sharing protocol. NFS is a multi-platform protocol that originated in the
UNIX environment and is a protocol that can be used for shared hypervisor
storage. Both NAS protocols provide file-level access to shared storage
resources.
Most organizations will have applications for multiple storage access tech-
nologies. For example, Fibre Channel for the high performance database
and production servers and NAS for desktop storage access.
Fibre Channel Storage
Fibre Channel allows servers to connect to storage across a fiber-optic
network, across a data center or even a WAN. Multiple servers can share a
single storage array.
This SBA Data Center design uses the Cisco 9148 Multilayer Fabric Switch
for Fibre Channel connectivity. The Cisco MDS 9148 Multilayer Fabric Switch
is ideal for a small SAN fabric with up to 48 Fibre Channel ports, providing
48 line-rate 8-Gbps Fibre Channel ports and cost-effective scalability.
In a SAN, a fabric consists of servers and storage connected to a Fibre
Channel switch (Figure 3). It is standard practice in SANs to create two
completely separate physical fabrics, providing two distinct paths to the
storage Fibre Channel fabric services operate independently on each fabric
so when a server needs resilient connections to a storage array, it connects
to two separate fabrics. This design prevents failures or misconfigurations in
one fabric from affecting the other fabric.
17Storage InfrastructureAugust 2011 Series
Figure 3. Dual Fabric SAN with a Single Disk Array
Each server or host on a SAN connects to the Fibre Channel switch with a
multi-mode fiber cable from a Host Bus Adapter (HBA). For resilient connec-
tivity, each host connects a port to each of the fabrics.
Each port has a port worldwide name (pWWN), which is the port’s address
that uniquely identifies it on the network. An example of a pWWN is:
10:00:00:00:c9:87:be:1c. In data networking this would compare to a MAC
address for an Ethernet adapter.
Virtual Storage Area Networks (VSANs)
The VSAN is a technology created by Cisco that is modeled after the Virtual
Local Area Network (VLAN) concept in Ethernet networks. VSANs provide
the ability to create many logical SAN fabrics on a single Cisco MDS 9100
Family switch. Each VSAN has its own set of services and address space,
which prevents an issue in one VSAN from affecting other VSANs. In the
past, it was a common practice to build physically separate fabrics for
production, backup, lab, and departmental environments. VSANs allow all of
these fabrics to be created on a single physical switch with the same amount
of protection provided by separate switches.
Zoning
The terms target and initiator will be used throughout this section. Targets
are disk or tape devices. Initiators are servers or devices that initiate access
to disk or tape.
Zoning provides a means of restricting visibility and connectivity between
devices connected to a SAN. The use of zones allows an administrator to
control which initiators can see which targets. It is a service that is common
throughout the fabric and any changes to a zoning configuration are disrup-
tive to the entire connected fabric.
Initiator-based zoning allows for zoning to be port-independent by using
the World Wide Name (WWN) of the end host. If a host’s cable is moved to a
different port, it will still work if the port is a member of the same VSAN.
Device Aliases
When configuring features such as zoning, quality of service (QoS), and
port security on a Cisco MDS 9000 Family switch, WWNs must be speci-
fied. The WWN naming format is cumbersome and manually typing WWNs
is error prone. Device aliases provide a user-friendly naming format for
WWNs in the SAN fabric (for example: “p3-c210-1-hba0-a” instead of
“10:00:00:00:c9:87:be:1c”).
18Storage InfrastructureAugust 2011 Series
Use a naming convention that makes initiator and target identification easy.
An example is below.
p3-c210-1-hba0-a in this setup identifies
Rack location P3
Host type C210
Host number 1
HBA number hba0
Port on HBA a
Storage Array Tested
The storage arrays used in the testing and validation of this deployment
guide are the EMC™ CX4-120 and the NetApp™ FAS3140. The specific stor-
age array configuration may vary. Please consult the installation instructions
from the specific storage vendor. The Cisco interopability support matrix
can be found here: http://www.cisco.com/en/US/docs/switches/datacen-
ter/mds9000/interoperability/matrix/intmatrx.html
Specific interfaces, addresses, and device aliases are examples
from the lab. Your WWN addresses, interfaces, and device aliases
will likely be different.
Tech Tip
Deployment Details
Deployment examples documented in this section include:
•	 Configuration of a Cisco MDS-based SAN network to support Fibre-
Channel based storage.
•	 Fibre Channel over Ethernet FCoE access to storage from Cisco UCS
C-Series servers using the Nexus 5000.
Configuring the Cisco MDS 9148 Switch
1.	 Complete the Initial Setup
2.	 Configuring VSANs
3.	 Configure Fibre Channel Ports
4.	 Configure Device Aliases
5.	 Configure Zoning
6.	 Troubleshoot the Configuration
Process
Complete each of the following procedures to configure the Cisco MDS
9148 switch.
Procedure 1	 Complete the Initial Setup
The following is required to complete this procedure:
•	 Set Management IP address
•	 Define Management upstream port an dEthernet/IP coonectivity
•	 Configure console access
•	 Configure a Secure Password
The characteristics for strong passwords included the following:
◦◦ At least 8 characters long
◦◦ Does not contain many consecutive characters (such as abcd)
◦◦ Does not contain many repeating characters (such as aaabb)
◦◦ Does not contain dictionary words
◦◦ Does not contain proper names
◦◦ Contains both uppercase and lowercase characters
◦◦ Contains numbers
The following are examples of strong passwords:
◦◦ If2COM18
◦◦ 2004AsdfLkj30
19Storage InfrastructureAugust 2011 Series
When initially powered on, a new Cisco MDS 9148 switch starts a setup
script when accessed from the console.
Step 1: Follow the prompts in the setup script to configure login, out-of-
band management, Telnet, SSH, clock, time zone, Network Time Protocol,
switch port modes, and default zone policies.
When the administrative login is configured, a Simple Network
Management Protocol Version 3 (SNMPv3) user is created auto-
matically. This login is used by Cisco Fabric Manager to manage
the switch. Also note, you will want to configure the secure pass-
word standard. The secure password standard does not allow
for creation of insecure passwords and should be used for all
production Cisco MDS switches.
Tech Tip
---- System Admin Account Setup ----
Do you want to enforce secure password standard (yes/no) [y]:
Enter the password for “admin”:
Confirm the password for “admin”:
---- Basic System Configuration Dialog ----
This setup utility will guide you through the basic
configuration of the system. Setup configures only enough
connectivity for management of the system.
Please register Cisco MDS 9000 Family devices promptly with
your supplier. Failure to register may affect response times
for initial service calls. MDS devices must be registered to
receive entitled support services.
Press Enter at anytime to skip a dialog. Use ctrl-c at anytime
to skip the remaining dialogs.
Would you like to enter the basic configuration dialog (yes/
no): y
Create another login account (yes/no) [n]:
Configure read-only SNMP community string (yes/no) [n]:
Configure read-write SNMP community string (yes/no) [n]:
Enter the switch name : p3-mds9148-1
Continue with Out-of-band (mgmt0) management configuration?
(yes/no) [y]:
Mgmt0 IPv4 address : 10.10.63.12
Mgmt0 IPv4 netmask : 255.255.255.0
Configure the default gateway? (yes/no) [y]:
IPv4 address of the default gateway : 10.10.63.1
Configure advanced IP options? (yes/no) [n]:
Enable the ssh service? (yes/no) [y]:
Type of ssh key you would like to generate (dsa/rsa) [rsa]:
Number of rsa key bits <768-2048> [1024]:
Enable the telnet service? (yes/no) [n]: y
Enable the http-server? (yes/no) [y]:
Configure clock? (yes/no) [n]:
Configure timezone? (yes/no) [n]:
Configure summertime? (yes/no) [n]:
Configure the ntp server? (yes/no) [n]: y
NTP server IPv4 address : 10.10.48.17
Configure default switchport interface state (shut/noshut)
[shut]: noshut
Configure default switchport trunk mode (on/off/auto) [on]:
Configure default switchport port mode F (yes/no) [n]:
Configure default zone policy (permit/deny) [deny]:
Enable full zoneset distribution? (yes/no) [n]:
Configure default zone mode (basic/enhanced) [basic]:
The following configuration will be applied:
switchname p3-mds9148-1
interface mgmt0
ip address 10.10.63.12 255.255.255.0
no shutdown
ip default-gateway 10.10.63.1
ssh key rsa 1024 force
feature ssh
feature telnet
feature http-server
ntp server 10.10.48.17
no system default switchport shutdown
20Storage InfrastructureAugust 2011 Series
system default switchport trunk mode on
no system default zone default-zone permit
no system default zone distribute full
no system default zone mode enhanced
Would you like to edit the configuration? (yes/no) [n]: n
Use this configuration and save it? (yes/no) [y]: y
[########################################] 100%
Network Time Protocol (NTP) is critical to troubleshooting and
should not be overlooked.
Tech Tip
Step 2: The Cisco MDS Device Manager provides a graphical interface to
configure a Cisco MDS 9100 Family switch. To access the Device Manager,
connect to the management address via HTTP or access it directly through
Cisco Fabric Manager. The CLI can also be used to configure the MDS 9100
Family switch.
Java runtime environment (JRE) is required to run Cisco Fabric
Manager and Device Manager and should be installed before
accessing either application.
Tech Tip
Cisco Fabric Manager is a Java application available for download
from Cisco.com or from the CD that ships with the Cisco MDS
9100 Family switch. Managing more than one switch at the same
time requires licensing.
Tech Tip
Procedure 2	 Configuring VSANs
By default, all ports are assigned to VSAN 1 at initialization of the switch. It is
a best practice to create a separate VSAN for production and to leave VSAN
1 for unused ports. By not using VSAN 1, you can avoid future problems
with merging of VSANs when combining other existing switches that may be
set to VSAN 1. To create a VSAN, use the command-line interface (CLI) or
Device Manager.
Step 1: To create VSAN 4 and add it to port FC1/4 with the name General-
Storage, enter the following from the command line:
vsan database
vsan 4 name “General-Storage”
vsan 4 interface fc1/4
Using Device Manager, select FC->VSANS.
21Storage InfrastructureAugust 2011 Series
The Create VSAN General window appears. Select the VSAN id as 4 and
enter the name General-Storage in the Name field. Select the interface
members by clicking … after Interface Members.
Select the interface members.
.
Step 2: Click Create to create the VSAN. You can add additional VSAN
members in the Membership tab of the main VSAN window.
A separate VSAN should be created for each fabric. Example:
Fabric A has the General-Storage VSAN with the VSAN number 4,
Fabric B would have the General-Storage VSAN number config-
ured as VSAN 5.
Tech Tip
Procedure 3	 Configure Fibre Channel Ports
By default, the ports are configured for port mode Auto and this setting
should not need to be changed for most devices that are connected to the
fabric.
Step 1: To change the port mode via Device Manager, right-click the port
you want to configure.
22Storage InfrastructureAugust 2011 Series
The General tab appears:
Step 2: Connect devices to the Fibre Channel ports and activate the ports.
When the initiator or target starts up, it automatically logs into the fabric.
Upon login, the initiator or target WWN is made known to the fabric. To
display this fabric login database, enter the following command through the
Cisco MDS 9000 switch CLI:
p3-mds9148-1# show flogi database
-----------------------------------------------------------------------------
INTERFACE VSAN FCID PORT NAME NODE NAME
-----------------------------------------------------------------------------
fc1/1 4 0x050000 50:06:01:60:3c:e0:60:e2 50:06:01:60:bc:e0:60:e2
fc1/3 4 0x050100 10:00:00:00:c9:92:80:1c 20:00:00:00:c9:92:80:1c
fc1/4 4 0x050200 10:00:00:00:c9:91:d5:6c 20:00:00:00:c9:91:d5:6c
fc1/5 4 0x050300 10:00:00:00:c9:8c:60:b4 20:00:00:00:c9:8c:60:b4
fc1/6 4 0x050400 10:00:00:00:c9:86:44:80 20:00:00:00:c9:86:44:80
fc1/7 4 0x050500 10:00:00:00:c9:87:be:1c 20:00:00:00:c9:87:be:1c
fc1/15 4 0x050600 20:41:00:05:9b:76:b2:80 20:04:00:05:9b:76:b2:81
fc1/16 4 0x050700 20:42:00:05:9b:76:b2:80 20:04:00:05:9b:76:b2:81
Procedure 4	 Configure Device Aliases
Device aliases map the long WWNs for easier zoning and identification of
initiators and targets. An incorrect device name may cause unexpected
results. Device aliases can be used for zoning, port-security, QOS, and show
commands.
There are two ways to configure device aliases: CLI or Device Manager.
To configure device aliases using the CLI, complete the following steps:
Step 1: Apply the following configuration:
device-alias database
device-alias name emc-a0 pwwn 50:06:01:60:3c:e0:60:e2
device-alias name p3-3rd-1-hba0-a pwwn 10:00:00:00:c9:8c:60:b4
device-alias name p3-3rd-2-hba0-a pwwn 10:00:00:00:c9:86:44:80
device-alias name p3-3rd-3-hba0-a pwwn 10:00:00:00:c9:87:be:1c
device-alias name p3-c210-1-cna-a pwwn 21:00:00:c0:dd:11:28:29
device-alias name p3-dc-6100-fc-1 pwwn 20:41:00:05:9b:76:b2:80
device-alias name p3-dc-6100-fc-2 pwwn 20:42:00:05:9b:76:b2:80
device-alias name p3-c200-1-hba0-a pwwn 10:00:00:00:c9:92:80:1c
device-alias name p3-c210-1-hba0-a pwwn 10:00:00:00:c9:91:d5:6c
exit
device-alias commit
Step 2: Aliases are now visible when you enter the show flogi database
command.
p3-mds9148-1# show flogi database
-----------------------------------------------------------------------------
INTERFACE VSAN FCID PORT NAME NODE NAME
-----------------------------------------------------------------------------
fc1/1 4 0x050000 50:06:01:60:3c:e0:60:e2 50:06:01:60:bc:e0:60:e2
[emc-a0]
fc1/3 4 0x050100 10:00:00:00:c9:92:80:1c 20:00:00:00:c9:92:80:1c
[p3-c200-1-hba0-a]
fc1/4 4 0x050200 10:00:00:00:c9:91:d5:6c 20:00:00:00:c9:91:d5:6c
[p3-c210-1-hba0-a]
fc1/5 4 0x050300 10:00:00:00:c9:8c:60:b4 20:00:00:00:c9:8c:60:b4
[p3-3rd-1-hba0-a]
23Storage InfrastructureAugust 2011 Series
fc1/6 4 0x050400 10:00:00:00:c9:86:44:80 20:00:00:00:c9:86:44:80
[p3-3rd-2-hba0-a]
fc1/7 4 0x050500 10:00:00:00:c9:87:be:1c 20:00:00:00:c9:87:be:1c
[p3-3rd-3-hba0-a]
fc1/15 4 0x050600 20:41:00:05:9b:76:b2:80 20:04:00:05:9b:76:b2:81
[p3-dc-6100-fc-1]
fc1/16 4 0x050700 20:42:00:05:9b:76:b2:80 20:04:00:05:9b:76:b2:81
[p3-dc-6100-fc-2]
To configure device aliases using Device Manager, complete the following
steps:
Step 3: Access the Device Alias window, FC->Advanced->Device Alias.
Step 4: Click Create.
Step 5: Enter a device alias name and paste in or type the WWN of the host.
Step 6: Click CFS->Commit when complete.
Procedure 5	 Configure Zoning
•	 Zoning can be configured from the CLI (23) and from Fabric Manager
(24). Both will be shown.
•	 Leading practices for zoning:
•	 Configure zoning between a single initiator and a single target per zone.
•	 A single initiator can also be configured to multiple targets in the same
zone.
•	 Zone naming should follow a simple naming convention of
initiator_x_target_x.
•	 p3-c100-1-hba0-a_SAN-A
•	 p3-c210-1-hba0-a_SAN-A
•	 Limiting zoning to a single initiator with a single or multiple target helps
prevent disk corruption and data loss.
Option 1. To create a zone with the CLI, complete the follow-
ing steps:
Step 1: In configuration mode, enter zone name and vsan number.
zone name p3-c210-1-hba0-a-SAN-A vsan 4
24Storage InfrastructureAugust 2011 Series
Device members can be specified by WWN or device alias.
member device-alias p3-c210-1-hba0-a
member pwwn 10:00:00:00:c9:91:d5:6c
Figure 4. Zoning Example With Two Fabrics
Create a zoneset. A zoneset is a collection of zones (see the preceding
figure). Zones are members of a zoneset. After you add all the zones as
members, you must activate the zoneset.
There can only be one active zoneset per VSAN.
zoneset name Zoneset1 vsan 4
Step 2: To add members to the zoneset, enter the following commands.
member p3-c210-1-hba0-a-SAN-A
member p3-c200-1-hba0-a-SAN-A
Step 3: Once all the zones for VSAN 4 are created and added to the zone-
set, activate the configuration.
zoneset activate name Zoneset1 vsan 4
Option 2. Configure Zoning with Cisco Fabric Manager
Step 1: Fabric Manager comes on a CD provided with the MDS 9148 switch.
For more information on installing Fabric Manager please refer to http://
www.cisco.com/en/US/docs/storage/san_switches/mds9000/sw/fm/
quick/guide/fm.html
Step 2: Log into Fabric Manager, the default username and password is
admin/password.
Step 3: Select a seed switch by entering the IP address of the MDS,
example 10.10.63.12. Once discovered , select the MDS from the list and
proceed.
Step 4: Select Zone Edit Local Full Zone Database in the Cisco Fabric
Manager menu.
25Storage InfrastructureAugust 2011 Series
Step 5: On the left side of the zone database window are two sections,
Zonesets and Zones. Across the top, the current VSAN and switch are
displayed. The two sections on the right side list zones and zone members.
Click on Insert to create a new zone.
Step 6: Highlight the new zone. On the bottom of the right hand side of the
database window targets and initiators that have logged in the fabric for the
selected VSAN are available to be added to the new zone. Highlight initiator
or targets to add to the zone and click Add to Zone.
Step 7: Right-click Zoneset to insert a new zoneset. Drag zones just created
from the zone box to the zoneset folder just created.
Step 8: When finished, to activate the configured zoneset, click Activate in
the bottom right of the window.
Procedure 6	 Troubleshoot the Configuration
Step 1: To check the fabric configuration for proper zoning, use the show
zoneset active command to display the active zoneset. Each zone that is a
member of the active zoneset is displayed with an asterisk (*) to the left of
the member. If there is not an asterisk to the left, the host is either down and
not logged into the fabric or there is a misconfiguration of the port VSAN or
zoning. Use the show zone command to display all configured zones on the
Cisco MDS 9000 Family switch.
Step 2: In a Fibre Channel fabric, each host or disk requires a Fibre Channel
ID (FC ID). When a fabric login (FLOGI) is received from the device, this ID is
assigned by the fabric. If the required device is displayed in the FLOGI table,
the fabric login is successful.
p3-mds9148-1# show zoneset active
zoneset name Zoneset1 vsan 4
zone name p3-c210-1-hba0-a-SAN-A vsan 4
* fcid 0x050200 [pwwn 10:00:00:00:c9:91:d5:6c] [p3-c210-1-
hba0-a]
* fcid 0x050000 [pwwn 50:06:01:60:3c:e0:60:e2] [emc-a0]
zone name p3-c200-1-hba0-a-SAN-A vsan 4
* fcid 0x050000 [pwwn 50:06:01:60:3c:e0:60:e2] [emc-a0]
* fcid 0x050100 [pwwn 10:00:00:00:c9:92:80:1c] [p3-c200-1-
hba0-a]
26Storage InfrastructureAugust 2011 Series
Step 3: Test Fibre Channel reachability using the fcping command and
trace the routes to the host using the fctrace command.
Cisco created these commands to provide storage networking trouble-
shooting tools that are familiar to individuals who use ping and traceroute.
Examples are below:
fcping device-alias p3-c210-1-hba0-a vsan 4
28 bytes from 10:00:00:00:c9:91:d5:6c time = 714 usec
28 bytes from 10:00:00:00:c9:91:d5:6c time = 677 usec
28 bytes from 10:00:00:00:c9:91:d5:6c time = 700 usec
28 bytes from 10:00:00:00:c9:91:d5:6c time = 705 usec
28 bytes from 10:00:00:00:c9:91:d5:6c time = 699 usec
5 frames sent, 5 frames received, 0 timeouts
Round-trip min/avg/max = 677/699/714 usec
fctrace device-alias p3-c210-1-hba0-a vsan 4
Performing path discovery.
Route present for : 10:00:00:00:c9:91:d5:6c
20:00:00:05:9b:70:40:20(0xfffc05)
Configuring Cisco UCS Rack Mount Servers for FCoE
1.	 Enable FCOE
2.	 Enable NPV Mode
3.	 Configure VSAN
4.	 Enable F-Port-Channels and Trunk Protocol
5.	 Configure a Trunking Port Channel
6.	 FCoE QOS with the Cisco Nexus 5548
7.	 Configure Host Facing FCoE Ports
8.	 Verify FCoE Connectivity
Process
Physical Setup and Connectivity
Cisco UCS rack servers ship with onboard 10/100/1000 Ethernet adapters
and a Cisco Integrated Management Controller (CIMC) with a 10/100 port.
To get the most out of the rack servers and minimize cabling in the SBA
Unified Computing architecture, the Cisco UCS C210 rack-mount server is
connected to a unified fabric. The Cisco Nexus 5000 Series switch that con-
nects the Cisco UCS 5100 Series Blade Server Chassis to the network can
also be used to extend Fibre Channel traffic over 10 gigabit Ethernet. The
Cisco Nexus 5000 Series switch consolidates I/O onto one set of cables,
eliminating redundant adapters, cables, and ports. A single card and set of
cables connects servers to the Ethernet and Fibre Channel networks and
also allows the use of a single cabling infrastructure within server racks.
In the SBA Midsize Data Center architecture, the Cisco UCS C210 rack-
mount server is configured with a dual-port CNA. Cabling the Cisco UCS
C210 with a CNA limits the cables to three, one for each port on the CNA
and the CIMC connection. A standard server without a CNA could have a
few Ethernet connections or multiple Ethernet and Fibre Channel connec-
tions. The following figure shows a topology with mixed unified fabric and
standard Ethernet and Fibre Channel connections.
27Storage InfrastructureAugust 2011 Series
Figure 5. Unified Fabric and Non Unified Fabric
28Storage InfrastructureAugust 2011 Series
The Cisco UCS C210 is connected to both Cisco Nexus 5000 Series
switches from the CNA with twinax cabling. The CIMC 10/100 management
port connects to an Ethernet port on the Cisco Nexus 2248 fabric extender.
The Cisco Nexus 5548 switch has one available expansion slot, which can
be used to add Fibre Channel or to add 10 gigabit Ethernet ports. The avail-
able options for Fibre Channel are:
•	 Split 8-port 10 gigabit Ethernet/8-port 8 Gbs Fibre Channel card
•	 16-port 10 gigabit Ethernet card
The Cisco Nexus 5548 with a Fibre Channel expansion card acts a standard
Fiber Channel switch or it can act as a Fibre Channel switch in host mode.
In N-port Virtualization (NPV) mode, all traffic is managed at the upstream
MDS. NPV allows for the storage to be configured the same as in the
previous Cisco UCS chassis configuration. In the SBA Unified Computing
architecture, all the Fiber Channel zoning and switching occurs upstream on
the Cisco MDS 9148 switches. The Fibre Channel connectivity is configured
as shown, with two connections from each Cisco Nexus 5000 Series switch
to each SAN fabric.
Figure 6. Cisco MDS 9148 and Cisco Nexus 5548 Connectivity
Two new features will be introduced, F-port trunking and N-port-channeling.
F-port trunking allows for future expansion of VSANs across the link and
prepares for expansion to the Nexus 5548. If there is a need for more than
a single VSAN to a virtualized host for example, the VSAN can just be
added to the trunk without disrupting other traffic or requiring new physical
connections.
F-Port Channeling now allows for Fibre Channel ports between the Nexus
5548 and the Cisco MDS 9148 to be put into a port channel allowing for
redundancy and for added bandwidth. This example shows a 2 port 16 Gb
fiber channel port channel.
The Cisco MDS 9148 switch will need to be configured for NPIV when the
Cisco Nexus 5000 Series switches are configured for N-port Virtualization
mode.
29Storage InfrastructureAugust 2011 Series
Nexus 5000 configuration for FCoE
The Cisco Nexus 5000 Series switch supports FCoE. To configure it for
unified fabrics and support of the 2nd generation CNAs, you must configure
the following items:
•	 FCoE functionality
•	 NPV (optional)
•	 Fibre Channel VSAN creation
•	 Fibre Channel Uplink
•	 Create Trunking Port Channel
•	 VLAN association to Fibre Channel VSAN
•	 Creation of a virtual Fibre Channel interface
•	 Assign VSAN to virtual Fibre Channel interface
•	 Configure Ethernet port and trunking
Note: Configuration will be similar across both of the Cisco Nexus 5000
Series switches with the exception of the VSAN configured for SAN fabric A
and for SAN fabric B. You must perform this procedure once for each of the
two Cisco Nexus 5000 Series switches.
Procedure 1	 Enable FCOE
Step 1: Enable FCoE on each Cisco Nexus 5000 Series switch.
feature fcoe
A temporary 180-day license is activated when you enter the feature fcoe
command. For long-term use, you must install a permanent license. For
more information, please see the Cisco NX-OS Licensing Guide at http://
www.cisco.com/en/US/docs/switches/datacenter/sw/nx-os/licensing/
guide/b_Cisco_NX-OS_Licensing_Guide.html.
Procedure 2	 Enable NPV Mode
Note: Enabling NPV erases the working configuration and reboots the
switch. You must then reconfigure the switch over the console interface. The
only information that remains is the admin username and password. Please
understand the impact of this change on a production network device.
If you do not enable NPV, the Cisco Nexus 5000 Series switches are used
as a switch. All zoning and Fibre Channel configuration of the Cisco Nexus
5000 Series switches is similar to the Cisco MDS 9100 Series switch zoning
and configuration in the storage section of this guide.
Step 1: Enable NPIV on the Cisco Nexus 5548 switches.
feature npv
Step 2: Enable NPIV on the Cisco MDS 9148 SAN switches.
feature npiv
Step 3: Verify NPIV status:
p3-mds9148-1# sh npiv status
NPIV is enabled
Procedure 3	 Configure VSAN
Step 1: Configure the VSAN on the Cisco Nexus 5548 switch and assign it
to the interface connected to the MDS
vsan database
vsan 4 name General-Storage
vsan 4 interface fc2/1-2
exit
Step 2: Configure and bring up the Fibre Channel port that is connected to
the Cisco MDS 9100 Series switch.
interface fc 2/1
no shut
exit
interface fc 2/2
no shut
exit
The ports will need to be enabled on the MDS and have the correct VSAN
assigned. Please refer Smart Business Architecture for Midsize Networks for
more information on configuring the Cisco MDS 9100.
30Storage InfrastructureAugust 2011 Series
Step 3: Use the show interface brief command on the Cisco Nexus 5000
Series switch to view the operating mode of the interface. For example, in
the output below, the operating mode is NP (proxy N-Port). Because the
default port configuration on the Cisco MDS 9148 Series switch is auto
and NPIV feature has previously been enabled in the Cisco UCS Fabric
Configuration, the switch negotiates as an NP port.
DC-5000a# show interface brief
------------------------------------------------------------------------
Interface Vsan Admin Admin Status SFP Oper Oper Port
Mode Trunk Mode Speed Channel
Mode (Gbps)
------------------------------------------------------------------------
fc2/1 4 NP off up swl NP 4 --
fc2/2 4 NP off up swl NP 4 --
Step 4: Check the Fibre Channel interface on the corresponding Cisco
MDS 9148 switch.
Procedure 4	 Enable F-Port-Channels and Trunk Protocol
Step 1: Configure F-Port-Channeling on the Cisco MDS 9148. This can also
be turned on with Device Manager.
feature fport-channel-trunk
Step 2: Configure Trunk Protocol on the Cisco Nexus 5548.
trunk protocol enable
Procedure 5	 Configure a Trunking Port Channel
For added resilience, a port channel will be set up between the Cisco
Nexus 5548 and Cisco MDS 9148 Fibre Channel ports. Trunking will also be
enabled.
Step 1: Run Fabric Manager’s Port Channel wizard.
31Storage InfrastructureAugust 2011 Series
Step 2: Select the Radio button for NPV enabled switches, and then select
the Cisco MDS9148 and Cisco Nexus 5548 pair.
Step 3: Select the correct ports between the switches and click Next.Select
Switch Ports
32Storage InfrastructureAugust 2011 Series
Step 4: Select a port channel ID for both sides of the link (in this example
it is 256). Select the trunk radio button. Select the port vsan as 4 for this
example in fabric A. Click Finish.
Step 5: This port-channel creation may be disruptive if there is traffic
across the link. This configuration assumes traffic is not configured yet. Click
Yes to continue.
Step 6: Verify with a show interface brief on both the MDS and the Nexus.
dc3-5k-1# show interface brief
--------------------------------------------------------------------
Interface Vsan Admin Admin Status SFP Oper Oper Port
Mode Trunk Mode Speed Channel
Mode (Gbps)
--------------------------------------------------------------------
fc2/1 4 NP on trunking swl TNP 8 256
fc2/2 4 NP on trunking swl TNP 8 256
--------------------------------------------------------------------
Interface Vsan Admin Status Oper Oper IP
Trunk Mode Speed Address
Mode (Gbps)
--------------------------------------------------------------------
san-port-channel 256 4 on trunking TNP 16 --
--------------------------------------------------------------------
With Fibre Channel configuration complete between the Cisco Nexus 5000
Series switch and the Cisco MDS 9148 Series switch, connectivity to the
host can begin.
33Storage InfrastructureAugust 2011 Series
Procedure 6	 FCoE QOS with the Cisco Nexus 5548
The Cisco Nexus 5548, unlike the Cisco Nexus 5510, does not preconfigure
QOS for FCoE traffic.
Step 1: There are four lines of QOS statements that map the existing
system QOS policies for FCoE. Without these commands, the virtual Fibre
Channel interface will not come up when activated. Enter the following in
global configuration mode:
system qos
service-policy type qos input fcoe-default-in-policy
service-policy type queuing input fcoe-default-in-policy
service-policy type queuing output fcoe-default-out-policy
service-policy type network-qos fcoe-default-nq-policy
Procedure 7	 Configure Host Facing FCoE Ports
On the Cisco Nexus 5548 switch, configure the Ethernet ports connected to
the CNA in the host.
Step 1: Create a VLAN that will carry FCoE traffic to the host. In this exam-
ple, VLAN 304 is mapped to VSAN 4. VLAN 304 carries all VSAN 4 traffic to
the CNA over the trunk.
vlan 304
fcoe vsan 4
exit
Step 2: Create a virtual Fibre Channel (vfc) interface for Fiber Channel
traffic and bind it to the corresponding host Ethernet interface.
interface vfc1
bind interface Ethernet 1/3
no shutdown
exit
Step 3: Add the virtual Fibre Channel interface to the VSAN database
vsan database
vsan 4 interface vfc 1
exit
Step 4: Configure the Ethernet interface to operate in trunk mode. Also
configure the interface with the FCoE VSAN and any data VLANs required
by the host. Configure the spanning-tree port type as trunk edge.
interface Ethernet 1/3
switchport mode trunk
switchport trunk allowed vlan 148,304
spanning-tree port type edge trunk
no shut
Procedure 8	 Verify FCoE Connectivity
Step 1: Use the show interface command to verify the status of the virtual
Fibre Channel interface. The interface should now be up as seen below if
the host is properly configured to support the CNA. Host configuration is
beyond the scope of this guide. Please see CNA documentation for specific
host drivers and configurations.
dc3-5k-1# show interface vfc 1
vfc1 is trunking (Not all VSANs UP on the trunk)
Bound interface is Ethernet1/3
Hardware is Virtual Fibre Channel
Port WWN is 20:00:00:05:73:ab:27:3f
Admin port mode is F, trunk mode is on
snmp link state traps are enabled
Port mode is TF
Port vsan is 4
Trunk vsans (admin allowed and active) (1,4)
Trunk vsans (up) (4)
Trunk vsans (isolated) ()
Trunk vsans (initializing) (1)
1 minute input rate 0 bits/sec, 0 bytes/sec, 0 frames/sec
1 minute output rate 0 bits/sec, 0 bytes/sec, 0 frames/sec
28 frames input, 3552 bytes
0 discards, 0 errors
28 frames output, 3456 bytes
0 discards, 0 errors
last clearing of “show interface” counters never
Interface last changed at Thu Oct 21 03:34:44 2010
34Storage InfrastructureAugust 2011 Series
Step 2: On the Cisco Nexus 5500 Series switches, display the FCoE
addresses.
dc3-5k-1# sh fcoe database
---------------------------------------------------------------------
INTERFACE FCID PORT NAME MAC ADDRESS
---------------------------------------------------------------------
vfc1 0x050b00 21:00:00:c0:dd:11:28:29 00:c0:dd:11:28:29
Step 3: The addresses appear in the current Fiber Channel login database
on the Cisco MDS 9100 Series switch. The first line below is the Cisco Nexus
5548 Series switch. The second ID is the host on the vfc 1 interface.
p3-mds9148-1# sh flogi da
------------------------------------------------------------------------
INTERFACE VSAN FCID PORT NAME NODE NAME
------------------------------------------------------------------------
port-channel 256 1 0xb41300 25:00:00:05:73:ab:27:00 20:01:00:05:73:ab:27:01
port-channel 256 4 0x050b00 21:00:00:c0:dd:11:28:29 20:00:00:c0:dd:11:28:29
Step 4: The Fiber Channel name server database differentiates the Cisco
Nexus 5548 Series switch WWN from the actual host WWN. The switch
appears as type NPV and the host as expected will show up as an initiator.
p3-mds9148-1# show fcns database
VSAN 4:
------------------------------------------------------------------------
FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE
0x050600 N 0x050b00 N 21:00:00:c0:dd:11:28:29 (Qlogic) scsi-fcp:init
[p3-c210-1-cna-a]
Zoning and device aliases are configured as in the Fibre Channel section.
Note: Much of the configuration of the Cisco Nexus 5000 Series switch can
also be done from within Device Manager; however, Device Manager cannot
be used to configure VLANs or Ethernet Trunks on the Cisco Nexus 5000
Series switches.
35Network SecurityAugust 2011 Series
Network Security
Business Overview
In today’s business environment, the data center contains some of the
organization’s most valuable assets. Customer and personnel records,
financial data, email stores, and intellectual property must be maintained in
a secure environment to assure confidentiality and availability. Additionally,
portions of networks in specific business sectors may be subject to industry
or government regulations that mandate specific security controls to protect
customer or client information.
To protect the valuable electronic assets located in the data center, network
security ensures the facility is protected from automated or human-
operated snooping and tampering, and it prevents compromise of hosts by
resource-consuming worms, viruses, or botnets.
Technology Overview
While worms, viruses, and botnets pose a substantial threat to centralized
data, particularly from the perspective of host performance and availability,
servers must also be protected from employee snooping and unauthorized
access. Statistics have consistently shown that the majority of data loss and
network disruptions have occurred as the result of human-initiated activity
(intentional or accidental) carried out within the boundaries of the business’s
network. To minimize the impact of unwanted network intrusions, firewalls
and intrusion prevention systems (IPSs) should be deployed between clients
and centralized data resources.
Figure 7. Secure Data Center Overview and Logical Topology
The Data Center Security design employs a pair of Cisco Adaptive Security
Appliance (ASA) 5585-X with SSP-20 firewall modules and matching IPS
Security Service Processors (SSP) installed. This configuration provides up
to 10 Gbps of firewall throughput. The IPS and firewall SSPs deliver 3 Gbps
of concurrent throughput.
All of the ports on modules installed in the ASA chassis are available to
the Firewall SSP, which offers a very flexible configuration. One 10-Gbps
link offers connectivity to the LAN-facing side of the firewall, and a second
10-Gbps link offers connectivity to the DC-facing side of the firewall The
second link is configured as a VLAN trunk in order to support access to
multiple secure VLANs in the data center.
The pair of ASAs is configured for firewall active-standby high availability
to ensure that access to the data center is minimally impacted by outages
caused by software maintenance or hardware failure. When ASA appli-
ances are configured in active-standby mode, the standby appliance does
not handle traffic, so the primary device must be sized to provide enough
throughput to address connectivity requirements between the core and the
data center. While the IPS modules do not actively exchange state traffic,
they participate in the firewall appliances’ active/standby status by way of
reporting their status to the firewall’s status monitor. A firewall failover will
occur if the IPS module becomes unavailable.
36Network SecurityAugust 2011 Series
The Cisco ASAs are configured in routing mode; as a result, the secure
network must be in a separate subnet from the client subnets. IP subnet
allocation would be simplified if the Cisco ASA were deployed in transparent
mode; however, hosts might inadvertently be connected to the wrong VLAN,
where they would still be able to communicate with the network, incurring an
unwanted security exposure.
The data center IPSs monitor for and mitigate potential malicious activ-
ity that is otherwise allowed by the security policy defined on the ASAs.
The IPS sensors are deployed in promiscuous intrusion detection system
(IDS) mode so that they only monitor and log abnormal traffic. As a more
advanced option, they can be deployed in line to fully engage their intrusion
prevention capabilities, wherein they mitigate traffic that violates the config-
ured policy.
Security Topology Design
The SBA secure data center design provides two secure VLANs in the data
center. The number of secure VLANs is arbitrary; the design is an example
of how to create multiple secured networks to host services that require
separation. High-value applications, such as Enterprise Resource Planning
and Customer Relationship Management, may need to be separated from
other applications in their own VLAN.
Figure 8. Deploy Multiple Secure Data Center VLANs
As another example, services that are indirectly exposed to the Internet (via
a web server or other application servers in the Internet Demilitarized Zone)
should be separated from other services, if possible, to prevent Internet-
borne compromise of some servers from spreading to other services that
are not exposed. Traffic between VLANs should be kept to a minimum,
unless your security policy dictates service separation. Keeping traffic
between servers intra-VLAN will improve performance and reduce load on
network devices.
Security Policy Development
A business should have an IT security policy as a starting point in defining
its firewall policy. If there is no companywide security policy, it will be very
difficult to define an effective policy for the business while maintaining a
secure computing environment.
To effectively deploy security between the various functional segments of
a business’s network, you should seek the highest level of detail possible
regarding the expected network behaviors. If you have greater detail of the
expectations, you will be better positioned to define a security policy that
enables a business’s application traffic and performance requirements while
optimizing security.
37Network SecurityAugust 2011 Series
A detailed examination of regulatory compliance considerations
exceeds the scope of this document; you should include industry
regulation in your network security design. Noncompliance may
result in regulatory penalties such as fines or business-activity
suspension.
Reader Tip
Network security policies can be broken down into two basic categories:
“whitelist” policies and “blacklist” policies. A whitelist security policy offers
a higher implicit security posture, blocking all traffic except that which must
be allowed (at a sufficiently granular level) to enable applications. Whitelist
policies are generally better positioned to meet regulatory requirements
because only traffic that must be allowed to conduct business is allowed.
Other traffic is blocked and does not need to be monitored to assure that
unwanted activity is not occurring, reducing the volume of data that will be
forwarded to an IDS or IPS, as well as minimizing the number of log entries
that must be reviewed in the event of an intrusion or data loss.
Figure 9. Whitelist Security Policy
Inversely, a blacklist policy only denies traffic that specifically poses the
greatest risk to centralized data resources. A blacklist policy is simpler to
maintain and less likely to interfere with network applications; a whitelist
policy is the best-practice option if you have the opportunity to examine
the network’s requirements and adjust the policy to avoid interfering with
desired network activity.
Figure 10. Blacklist Security Policy
Cisco ASA Firewalls implicitly end access-lists with a deny-all rule. Blacklist
policies include an explicit rule, prior to the implicit deny-all rule, to allow any
traffic that is not explicitly allowed or denied.
Whether you choose a whitelist or blacklist policy basis, consider IDS or IPS
deployment for controlling malicious activity on otherwise trustworthy appli-
cation traffic. At a minimum, IDS or IPS can aid with forensics to determine
the origin of a data breach. In the best circumstances, IPS may be able to
detect and prevent attacks as they occur and provide detailed information to
track the malicious activity to its source. IDS or IPS may also be required by
the regulatory oversight to which a network is subject (for example, PCI 2.0).
A blacklist policy that blocks high-risk traffic offers a lower-impact but
less-secure option (compared to a whitelist policy) in cases where a detailed
study of the network’s application activity is impractical, or if the network
availability requirements prohibit application troubleshooting. If identifying
all of the application requirements is not practical, you can apply a blacklist
policy with logging enabled, so that a detailed history of the policy is gener-
ated. With network-behavior details in hand, development of a whitelist
policy is much easier and more effective.
38Network SecurityAugust 2011 Series
Deployment Details
Data Center Security Deployment is addressed in three discrete processes:
•	 Cisco ASA Firewall connectivity, which establishes network connections
between the Cisco ASA Firewalls and the Cisco Catalyst core.
•	 Cisco ASA Firewall policy discussion and configuration, which outlines
the process needed to identify security policy needs and apply a
configuration to meet requirements.
•	 Cisco IPS connectivity and policy configuration, which integrates con-
nectivity and policy configuration in one process.
Configure Cisco ASA Firewall Connectivity
1.	 Configure LAN-facing connectivity
2.	 Configure Data Center-facing connectivity
3.	 Configure Cisco ASA Dynamic Routing
4.	 Configure the ASAs for High Availability
Process
Complete the following procedures to configure connectivity between the
Cisco ASA chassis and the core. Note that this design describes a configu-
ration wherein both sides (LAN-side and DC-side) of the firewall connect
to the core, to provide a central VLAN fanout point for all of the Data Center
VLANs.
Procedure 1	 Configure LAN-facing connectivity
One 10-Gigabit Ethernet link connects the LAN-facing interface of each ASA
chassis to the core Cisco Catalyst VSS. This interface is then assigned an
active or standby IP address (respective to the active or standby firewall).
All interfaces on Cisco ASA have a security-level setting. The higher the
number, the more secure the interface, relative to other interfaces. Inside
interfaces are typically assigned 100, the highest security level. Outside
interfaces are generally assigned 0. By default, traffic can pass from a
high-security interface to a lower-security interface. In other words, traf-
fic from an inside network is permitted to an outside network, but not
conversely.
Step 1: Configure the LAN-side Cisco ASA interfaces to connect to the
Cisco Catalyst VSS and assign a security level of ‘0’, as the LAN-facing side
of the firewall is the outside, lower-security interface:
interface TenGigabitEthernet0/9
description LAN-side core-c6504 T*/4/6
nameif DCVLAN153
security-level 0
ip address 10.10.53.126 255.255.255.128 standby 10.10.53.125
no shutdown
Step 2: Define the LAN-side VLAN on the Cisco Catalyst VSS core switch:
vlan 153
name Secure-DC-outside
no shutdown
Step 3: For the LAN-side connectivity to the Cisco ASA chassis, configure
the Cisco Catalyst VSS Switch Virtual Interface (SVI) :
interface Vlan153
description Secure DC outside
ip address 10.10.53.1 255.255.255.128
Step 4: Add the LAN-side configuration to the Cisco Catalyst VSS ports
that connect to the Cisco ASA security appliances. Define the switchports
as access ports, and assign the appropriate QoS behavior:
interface TenGigabitEthernet1/4/6
description Access port for DC-5585a
switchport
switchport access vlan 153
switchport mode access
spanning-tree portfast edge
mls qos trust dscp
macro apply EgressQoS-Gig
!
interface TenGigabitEthernet2/4/6
description Access port for DC-5585b
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide
Presentation   data center deployment guide

More Related Content

What's hot

ScreenOS Idp policy creation en
ScreenOS Idp policy creation enScreenOS Idp policy creation en
ScreenOS Idp policy creation enMohamed Al-Natour
 
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOSCONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOSJohnson Liu
 
Newfies dialer Auto dialer Software
Newfies dialer Auto dialer SoftwareNewfies dialer Auto dialer Software
Newfies dialer Auto dialer SoftwareAreski Belaid
 
Grundfos Wincaps Manual Guide
Grundfos Wincaps Manual GuideGrundfos Wincaps Manual Guide
Grundfos Wincaps Manual GuideSERDAR BELBAĞ
 
Newfies-Dialer : Autodialer software - Documentation version 1.1.0
Newfies-Dialer : Autodialer software - Documentation version 1.1.0Newfies-Dialer : Autodialer software - Documentation version 1.1.0
Newfies-Dialer : Autodialer software - Documentation version 1.1.0Areski Belaid
 
AdvFS ACLs and Property Lists
AdvFS ACLs and Property ListsAdvFS ACLs and Property Lists
AdvFS ACLs and Property ListsJustin Goldberg
 
Sybase Adaptive Server Anywhere for Linux
Sybase Adaptive Server Anywhere for LinuxSybase Adaptive Server Anywhere for Linux
Sybase Adaptive Server Anywhere for Linuxmarcorinco
 
Smart dsp os_user_guide
Smart dsp os_user_guideSmart dsp os_user_guide
Smart dsp os_user_guideeng_basemm
 
Laravel 4 Documentation
Laravel 4 DocumentationLaravel 4 Documentation
Laravel 4 DocumentationHoHoangKha
 
Xi3 ds administrators_guide_en
Xi3 ds administrators_guide_enXi3 ds administrators_guide_en
Xi3 ds administrators_guide_enSarat Reddy
 
Net app v-c_tech_report_3785
Net app v-c_tech_report_3785Net app v-c_tech_report_3785
Net app v-c_tech_report_3785ReadWrite
 
ISSU A PLANNED UPGRADE TOOL
ISSU A PLANNED UPGRADE TOOLISSU A PLANNED UPGRADE TOOL
ISSU A PLANNED UPGRADE TOOLJohnson Liu
 
Na vsc install
Na vsc installNa vsc install
Na vsc installAccenture
 
41450 04 rev-b_6gbs_megaraid_sas_raid_controllers_ug
41450 04 rev-b_6gbs_megaraid_sas_raid_controllers_ug41450 04 rev-b_6gbs_megaraid_sas_raid_controllers_ug
41450 04 rev-b_6gbs_megaraid_sas_raid_controllers_ugsopan sonar
 
Plesk 8.1 for Linux/UNIX
Plesk 8.1 for Linux/UNIXPlesk 8.1 for Linux/UNIX
Plesk 8.1 for Linux/UNIXwebhostingguy
 
ZebraNet Bridge Enterprise - Manual do Software
ZebraNet Bridge Enterprise - Manual do SoftwareZebraNet Bridge Enterprise - Manual do Software
ZebraNet Bridge Enterprise - Manual do SoftwareUseZ
 

What's hot (20)

ScreenOS Idp policy creation en
ScreenOS Idp policy creation enScreenOS Idp policy creation en
ScreenOS Idp policy creation en
 
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOSCONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
CONTINUOUS SYSTEMS, NONSTOP OPERATIONS WITH JUNOS
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 
Newfies dialer Auto dialer Software
Newfies dialer Auto dialer SoftwareNewfies dialer Auto dialer Software
Newfies dialer Auto dialer Software
 
Grundfos Wincaps Manual Guide
Grundfos Wincaps Manual GuideGrundfos Wincaps Manual Guide
Grundfos Wincaps Manual Guide
 
Newfies-Dialer : Autodialer software - Documentation version 1.1.0
Newfies-Dialer : Autodialer software - Documentation version 1.1.0Newfies-Dialer : Autodialer software - Documentation version 1.1.0
Newfies-Dialer : Autodialer software - Documentation version 1.1.0
 
AdvFS ACLs and Property Lists
AdvFS ACLs and Property ListsAdvFS ACLs and Property Lists
AdvFS ACLs and Property Lists
 
Sybase Adaptive Server Anywhere for Linux
Sybase Adaptive Server Anywhere for LinuxSybase Adaptive Server Anywhere for Linux
Sybase Adaptive Server Anywhere for Linux
 
Smart dsp os_user_guide
Smart dsp os_user_guideSmart dsp os_user_guide
Smart dsp os_user_guide
 
Adsl Trabelshooting Guide
Adsl Trabelshooting GuideAdsl Trabelshooting Guide
Adsl Trabelshooting Guide
 
Laravel 4 Documentation
Laravel 4 DocumentationLaravel 4 Documentation
Laravel 4 Documentation
 
Xi3 ds administrators_guide_en
Xi3 ds administrators_guide_enXi3 ds administrators_guide_en
Xi3 ds administrators_guide_en
 
Net app v-c_tech_report_3785
Net app v-c_tech_report_3785Net app v-c_tech_report_3785
Net app v-c_tech_report_3785
 
ISSU A PLANNED UPGRADE TOOL
ISSU A PLANNED UPGRADE TOOLISSU A PLANNED UPGRADE TOOL
ISSU A PLANNED UPGRADE TOOL
 
Na vsc install
Na vsc installNa vsc install
Na vsc install
 
41450 04 rev-b_6gbs_megaraid_sas_raid_controllers_ug
41450 04 rev-b_6gbs_megaraid_sas_raid_controllers_ug41450 04 rev-b_6gbs_megaraid_sas_raid_controllers_ug
41450 04 rev-b_6gbs_megaraid_sas_raid_controllers_ug
 
Plesk 8.1 for Linux/UNIX
Plesk 8.1 for Linux/UNIXPlesk 8.1 for Linux/UNIX
Plesk 8.1 for Linux/UNIX
 
Logger quick start_hyperv_5.3
Logger quick start_hyperv_5.3Logger quick start_hyperv_5.3
Logger quick start_hyperv_5.3
 
Punchout
PunchoutPunchout
Punchout
 
ZebraNet Bridge Enterprise - Manual do Software
ZebraNet Bridge Enterprise - Manual do SoftwareZebraNet Bridge Enterprise - Manual do Software
ZebraNet Bridge Enterprise - Manual do Software
 

Similar to Presentation data center deployment guide

Presentation data center design overview
Presentation   data center design overviewPresentation   data center design overview
Presentation data center design overviewxKinAnx
 
software-eng.pdf
software-eng.pdfsoftware-eng.pdf
software-eng.pdffellahi1
 
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...Juniper Networks
 
Intel Cloud Builder : Siveo
Intel Cloud Builder : SiveoIntel Cloud Builder : Siveo
Intel Cloud Builder : SiveoOdinot Stanislas
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXAngel Villar Garea
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Błażej Matusik
 
Configuring a highly available Microsoft Lync Server 2013 environment on Dell...
Configuring a highly available Microsoft Lync Server 2013 environment on Dell...Configuring a highly available Microsoft Lync Server 2013 environment on Dell...
Configuring a highly available Microsoft Lync Server 2013 environment on Dell...Principled Technologies
 
Ref arch for ve sg248155
Ref arch for ve sg248155Ref arch for ve sg248155
Ref arch for ve sg248155Accenture
 
Optimizing oracle-on-sun-cmt-platform
Optimizing oracle-on-sun-cmt-platformOptimizing oracle-on-sun-cmt-platform
Optimizing oracle-on-sun-cmt-platformSal Marcus
 
REPORT IBM (1)
REPORT IBM (1)REPORT IBM (1)
REPORT IBM (1)Hamza Khan
 
Cisco routers for the small business a practical guide for it professionals...
Cisco routers for the small business   a practical guide for it professionals...Cisco routers for the small business   a practical guide for it professionals...
Cisco routers for the small business a practical guide for it professionals...Mark Smith
 
VMware Networking 5.0
VMware Networking 5.0VMware Networking 5.0
VMware Networking 5.0rashedmasood
 
Youwe sap-ecc-r3-hana-e commerce-with-magento-mb2b-100717-1601-206
Youwe sap-ecc-r3-hana-e commerce-with-magento-mb2b-100717-1601-206Youwe sap-ecc-r3-hana-e commerce-with-magento-mb2b-100717-1601-206
Youwe sap-ecc-r3-hana-e commerce-with-magento-mb2b-100717-1601-206Dennis Reurings
 
Ws deployment guide
Ws deployment guideWs deployment guide
Ws deployment guideKunKun Ng
 
irmpg_3.7_python_202301.pdf
irmpg_3.7_python_202301.pdfirmpg_3.7_python_202301.pdf
irmpg_3.7_python_202301.pdfFernandoBello39
 

Similar to Presentation data center deployment guide (20)

Presentation data center design overview
Presentation   data center design overviewPresentation   data center design overview
Presentation data center design overview
 
software-eng.pdf
software-eng.pdfsoftware-eng.pdf
software-eng.pdf
 
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
MetaFabric™ Architecture Virtualized Data Center: Design and Implementation G...
 
Intel Cloud Builder : Siveo
Intel Cloud Builder : SiveoIntel Cloud Builder : Siveo
Intel Cloud Builder : Siveo
 
Business and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSXBusiness and Economic Benefits of VMware NSX
Business and Economic Benefits of VMware NSX
 
Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...Network Virtualization and Security with VMware NSX - Business Case White Pap...
Network Virtualization and Security with VMware NSX - Business Case White Pap...
 
hci10_help_sap_en.pdf
hci10_help_sap_en.pdfhci10_help_sap_en.pdf
hci10_help_sap_en.pdf
 
Sap setup guide
Sap setup guideSap setup guide
Sap setup guide
 
SAP CPI-DS.pdf
SAP CPI-DS.pdfSAP CPI-DS.pdf
SAP CPI-DS.pdf
 
Configuring a highly available Microsoft Lync Server 2013 environment on Dell...
Configuring a highly available Microsoft Lync Server 2013 environment on Dell...Configuring a highly available Microsoft Lync Server 2013 environment on Dell...
Configuring a highly available Microsoft Lync Server 2013 environment on Dell...
 
Ref arch for ve sg248155
Ref arch for ve sg248155Ref arch for ve sg248155
Ref arch for ve sg248155
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
IBM Streams - Redbook
IBM Streams - RedbookIBM Streams - Redbook
IBM Streams - Redbook
 
Optimizing oracle-on-sun-cmt-platform
Optimizing oracle-on-sun-cmt-platformOptimizing oracle-on-sun-cmt-platform
Optimizing oracle-on-sun-cmt-platform
 
REPORT IBM (1)
REPORT IBM (1)REPORT IBM (1)
REPORT IBM (1)
 
Cisco routers for the small business a practical guide for it professionals...
Cisco routers for the small business   a practical guide for it professionals...Cisco routers for the small business   a practical guide for it professionals...
Cisco routers for the small business a practical guide for it professionals...
 
VMware Networking 5.0
VMware Networking 5.0VMware Networking 5.0
VMware Networking 5.0
 
Youwe sap-ecc-r3-hana-e commerce-with-magento-mb2b-100717-1601-206
Youwe sap-ecc-r3-hana-e commerce-with-magento-mb2b-100717-1601-206Youwe sap-ecc-r3-hana-e commerce-with-magento-mb2b-100717-1601-206
Youwe sap-ecc-r3-hana-e commerce-with-magento-mb2b-100717-1601-206
 
Ws deployment guide
Ws deployment guideWs deployment guide
Ws deployment guide
 
irmpg_3.7_python_202301.pdf
irmpg_3.7_python_202301.pdfirmpg_3.7_python_202301.pdf
irmpg_3.7_python_202301.pdf
 

More from xKinAnx

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep divexKinAnx
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudxKinAnx
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 xKinAnx
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...xKinAnx
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directionsxKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...xKinAnx
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...xKinAnx
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloudxKinAnx
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...xKinAnx
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...xKinAnx
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rolloutxKinAnx
 

More from xKinAnx (20)

Engage for success ibm spectrum accelerate 2
Engage for success   ibm spectrum accelerate 2Engage for success   ibm spectrum accelerate 2
Engage for success ibm spectrum accelerate 2
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep diveAccelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive
 
Software defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloudSoftware defined storage provisioning using ibm smart cloud
Software defined storage provisioning using ibm smart cloud
 
Ibm spectrum virtualize 101
Ibm spectrum virtualize 101 Ibm spectrum virtualize 101
Ibm spectrum virtualize 101
 
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...Accelerate with ibm storage  ibm spectrum virtualize hyper swap deep dive dee...
Accelerate with ibm storage ibm spectrum virtualize hyper swap deep dive dee...
 
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions04 empalis -ibm_spectrum_protect_-_strategy_and_directions
04 empalis -ibm_spectrum_protect_-_strategy_and_directions
 
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
Ibm spectrum scale fundamentals workshop for americas part 1 components archi...
 
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
Ibm spectrum scale fundamentals workshop for americas part 2 IBM Spectrum Sca...
 
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
Ibm spectrum scale fundamentals workshop for americas part 3 Information Life...
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
 
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
Ibm spectrum scale fundamentals workshop for americas part 4 spectrum scale_r...
 
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
Ibm spectrum scale fundamentals workshop for americas part 5 spectrum scale_c...
 
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 6 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
Ibm spectrum scale fundamentals workshop for americas part 7 spectrumscale el...
 
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
Ibm spectrum scale fundamentals workshop for americas part 8 spectrumscale ba...
 
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
Ibm spectrum scale fundamentals workshop for americas part 5 ess gnr-usecases...
 
Presentation disaster recovery in virtualization and cloud
Presentation   disaster recovery in virtualization and cloudPresentation   disaster recovery in virtualization and cloud
Presentation disaster recovery in virtualization and cloud
 
Presentation disaster recovery for oracle fusion middleware with the zfs st...
Presentation   disaster recovery for oracle fusion middleware with the zfs st...Presentation   disaster recovery for oracle fusion middleware with the zfs st...
Presentation disaster recovery for oracle fusion middleware with the zfs st...
 
Presentation differentiated virtualization for enterprise clouds, large and...
Presentation   differentiated virtualization for enterprise clouds, large and...Presentation   differentiated virtualization for enterprise clouds, large and...
Presentation differentiated virtualization for enterprise clouds, large and...
 
Presentation desktops for the cloud the view rollout
Presentation   desktops for the cloud the view rolloutPresentation   desktops for the cloud the view rollout
Presentation desktops for the cloud the view rollout
 

Recently uploaded

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Presentation data center deployment guide

  • 1. Data Center Deployment Guide August 2011 Series
  • 2. PrefaceAugust 2011 Series Preface This guide is a Cisco® Smart Business Architecture (SBA) guide. Who Should Read This Guide This guide is written for people who fill a variety of roles: • Systems engineers who need standard procedures for implementing solutions • Project managers who need reference material for creating statements of work for SBA implementations • Sales partners who want help with selling new technology or who create their own implementation documentation • Trainers who need material for classroom instruction or on-the-job training In general, you can also use SBA guides to improve consistency among engineers, among deployments, and to improve scoping and costing of deployment jobs. Release Series Cisco updates and enhances SBA guides twice a year. Before we release a series of SBA guides, we test them together in the SBA lab, as a complete system. To ensure the mutual compatibility of designs in SBA guides, you should use guides that belong to the same SBA series. All SBA guides include the series name on the cover and at the bottom left of each page. The series are named as follows: • February year Series • August year Series where year indicates the calendar year of the series. You can find the most recent series of SBA guides at the following sites: Customer access: http://www.cisco.com/go/sba Partner access: http://www.cisco.com/go/sbachannel How to Read Commands Many SBA guides provide specific details about how to configure Cisco net- work devices that run Cisco IOS, Cisco NX-OS, or other operating systems that you configure at a command-line interface (CLI). This section describes the conventions used to specify commands that you must enter. Commands to enter at a CLI appear as follows: configure terminal Commands that specify a value for a variable appear as follows: ntp server 10.10.48.17 Commands with variables that you must define appear as follows: class-map [highest class name] Commands shown in an interactive example, such as a script or when the command prompt is included, appear as follows: Router# enable Long commands that line wrap are underlined. Enter them as one command: wrr-queue random-detect max-threshold 1 100 100 100 100 100 100 100 100 Comments and Questions If you would like to comment on a guide or ask questions, please use the forum at the bottom of one of the following sites: Customer access: http://www.cisco.com/go/sba Partner access: http://www.cisco.com/go/sbachannel An RSS feed is available if you would like to be notified when new comments are posted.
  • 3. Table of Contents Table of ContentsAugust 2011 Series What’s In This SBA Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 About SBA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 About This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Supporting Rapid Application Growth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Managing Growing Data Storage Requirements. . . . . . . . . . . . . . . . . . . . . . . . . 2 Optimizing the Investment in Server Processing Resources. . . . . . . . . . . . . 2 Securing the Organizations Critical Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Architecture Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Physical Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Power. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Cooling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Equipment Racking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Ethernet Infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Virtual Port Channel. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Ethernet Fabric Extension. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Initial Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Configure Inter-Device Links. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Storage Infrastructure. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Business Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Technology Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Storage Array Tested . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Configuring the Cisco MDS 9148 Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Configuring Cisco UCS Rack Mount Servers for FCoE. . . . . . . . . . . . . . . . . 26 Nexus 5000 configuration for FCoE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Network Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Security Policy Development . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Configure Cisco ASA Firewall Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Evaluate and Deploy Security Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Deploying Cisco Intrusion Protection System (IPS) . . . . . . . . . . . . . . . . . . . . 43 Computing Resources. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Cisco UCS Blade Chassis System Components. . . . . . . . . . . . . . . . . . . . . . . 54 Cisco UCS Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54 Cisco UCS C-Series Rack Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 UCS System Network Connectivity. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 Completing the Initial System Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Getting Started with UCS Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Creating an Initial Service Profile for Local Boot . . . . . . . . . . . . . . . . . . . . . . . 63 Applying Service Profiles to Physical Servers. . . . . . . . . . . . . . . . . . . . . . . . . . 72 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Table of Contents
  • 4. Table of ContentsAugust 2011 Series ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, “DESIGNS”) IN THIS MANUAL ARE PRESENTED “AS IS,” WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITA- TION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO. Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. © 2011 Cisco Systems, Inc. All rights reserved. Virtual Switching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 Nexus 1000V VEM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Virtual Supervisor Module. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Nexus 1000V Port Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Nexus 1010 Virtual Services Appliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Install and Set Up the Nexus 1010. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Deploying the Nexus 1000V on a ESXi host as a virtual machine. . . . . . . 88 Configure Virtualized Hosts to Use the Nexus 1000v. . . . . . . . . . . . . . . . . 100 Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Application Resiliency. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Business Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Inflexible Application Infrastructure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Server Availability and Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Application Security and Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Technology Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Deployment Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112 Configuring ACE. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Appendix A: Product List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
  • 5. What’s In This SBA Guide About SBA Cisco SBA helps you design and quickly deploy a full-service business network. A Cisco SBA deployment is prescriptive, out-of-the-box, scalable, and flexible. Cisco SBA incorporates LAN, WAN, wireless, security, data center, application optimization, and unified communication technologies—tested together as a complete system. This component-level approach simplifies system integration of multiple technologies, allowing you to select solutions that solve your organization’s problems—without worrying about the technical complexity. About This Guide This guide is a foundation deployment guide that is organized in modules. Each module in this guide includes the following sections: • Business Overview—Describes the business use case for the solution presented in the module. Business decision makers may find this section especially useful. • Technology Overview—Describes the technical solution for the business use case, including an introduction to the Cisco products that make up the solution. Technical decision makers can use this section to understand how the solution works. • Deployment Details—Provides step-by-step instructions for deploying and configuring the portion of the foundation that the module addresses. Systems engineers can use this section to get the solution up and running quickly and reliably. A foundation deployment guide always follows a foundation design overview on the Route to Success, shown below. 1What’s In This SBA GuideAugust 2011 Series Route to Success To ensure your success when implementing the designs in this guide, you should read any guides that this guide depends upon—shown to the left of this guide on the route above. Any guides that depend upon this guide are shown to the right of this guide. For customer access to all SBA guides: http://www.cisco.com/go/sba For partner access: http://www.cisco.com/go/sbachannel Data Center Design Overview Data Center Deployment Guide Additional Deployment Guides DC You are Here Dependent GuidesPrerequisite Guides
  • 6. 2IntroductionAugust 2011 Series Introduction Midsize organizations encounter many challenges as they work to scale their information-processing capacity to keep up with demand. In a new organization, a small group of server resources may be sufficient to provide necessary applications such as file sharing, e-mail, database applications, and web services. Over time, demand for increased processing capacity, storage capacity, and distinct operational control over specific servers can cause a growth explosion commonly known as “server sprawl”. A midsize organization can then use some of the same data center technologies that larger organizations use to meet expanding business requirements in a way that keeps capital and operational expenses in check. This deployment guide provides reference architecture to facilitate rapid adoption of these data center technologies by using a common, best-practices configuration. The Cisco SBA Data Center for Midsize Organizations architecture provides an evolution from the basic “server room” infrastructure illustrated in the SBA Midsize Foundation Deployment Guide. The Data Center for Midsize Organizations is designed to address four primary business challenges: • Supporting rapid application growth • Managing growing data storage requirements • Optimizing the investment in server processing resources • Securing the organizations’ critical data Supporting Rapid Application Growth As applications scales to support a larger number of users, or new applica- tions are deployed, the number of servers required to meet the needs of the organization often increases. The first phase of the server room evolution is often triggered when the organization outgrows the capacity of the existing server room network. Many factors can limit the capacity of the existing facility, including rack space, power, cooling, switching throughput, or basic network port count to attach new servers. The architecture outlined in this guide is designed to allow the organization to smoothly scale the size of the server environment and network topology as business requirements grow. Managing Growing Data Storage Requirements As application requirements grow, the need for additional data storage capacity also increases. This can initially cause issues when storage requirements for a given server increase beyond the physical capacity of the server hardware platform in use. As the organization grows, the invest- ment in additional storage capacity is most efficiently managed by moving to a centralized storage model. A centralized storage system can provide disk capacity across multiple applications and servers providing greater scalability and flexibility in storage provisioning. A dedicated storage system provides multiple benefits beyond raw disk capacity. Centralized storage systems can increase the reliability of disk storage, which improves application availability. Storage systems allow increased capacity to be provided to a given server over the network without needing to physically attach new devices to the server itself. More sophisti- cated backup and data replication technologies are available in centralized storage systems, which helps protect the organization against data loss and application outages. Optimizing the Investment in Server Processing Re- sources As a midsize organization grows, physical servers are often dedicated to sin- gle applications to increase stability and simplify troubleshooting. However, these servers do not operate at high levels of processor utilization for much of the day. Underutilized processing resources represent an investment by the organization that is not being leveraged to its full potential. Server virtualization technologies allow a single physical server to run multiple virtual instances of a “guest” operating system, creating virtual machines (VMs). Running multiple VMs on server hardware helps to more fully utilize the organization’s investment in processing capacity, while still allowing each VM to be viewed independently from a security, configuration, and troubleshooting perspective. Server virtualization and centralized storage technologies complement one another, allowing rapid deployment of new servers and reduced downtime in the event of server hardware failures. Virtual machines can be stored completely on the centralized storage system, which decouples the identity of the VM from any single physical server. This allows the organization great flexibility when rolling out new applications or upgrading server hardware. The architecture defined in this guide is designed to facilitate easy deploy- ment of server virtualization, while still providing support for the existing installed base of equipment.
  • 7. 3IntroductionAugust 2011 Series Securing the Organizations Critical Data With communication and commerce in the world becoming increasingly Internet-based, network security quickly becomes a primary concern of a growing organization. Often organizations will begin by securing their Internet edge connection, considering the internal network a trusted entity. However, an Internet firewall is only one component of building security into the network infrastructure. Frequently, threats to an organization’s data may come from within the inter- nal network. This may come in the form of on-site vendors, contaminated employee laptops, or existing servers that have already become compro- mised and may be used as a platform to launch further attacks. With the centralized repository of the organizations most critical data typically being the data center, security is no longer considered an optional component of a complete data center architecture plan. The SBA Midsize Data Center Architecture illustrates how to cleanly integrate network security capabilities such as firewall and intrusion preven- tion, protecting areas of the network housing critical server and storage resources. The architecture provides the flexibility to secure specific portions of the data center or insert firewall capability between tiers of a multi-tier application according to the security policy agreed upon by the organization.
  • 8. 4Architecture OverviewAugust 2011 Series Architecture Overview The SBA Midsize Data Center Architecture is designed to allow organizations to take an existing server room environment to the next level of performance, flexibility, and security. Figure 1 provides a high-level overview of this architecture. Figure 1. SBA Midsize Data Center Architecture
  • 9. 5Architecture OverviewAugust 2011 Series The SBA Midsize Data Center Architecture is designed to connect to one of the SBA Layer-3 Ethernet core solutions, as documented in the SBA Midsize Foundation Deployment Guide. The following technology areas are included within this reference architecture: • Ethernet Infrastructure—Resilient Layer-2 Ethernet networking to sup- port 10 Gigabit and 1 Gigabit Ethernet connectivity. • Storage Networking—Take advantage of IP-based storage access, Fibre Channel over Ethernet, or a full Fibre Channel SAN solution depending on your requirements. • Network Security—Integrate firewall and intrusion prevention services into the data center to protect critical application data. • Computing Resources—Leverage powerful computing platforms in both blade server and rack mount formats. • Virtual Switching—Deploy a centrally managed distributed virtual switching system for your VMware environment. • Application Resiliency—Server load balancing solutions providing high availability, scalability and security for your key applications. This architecture is designed to allow a midsize organization to position its network for growth while controlling both equipment costs and operational costs. The deployment processes documented in this guide provide concise step-by-step instructions for completing basic configuration of the components of the architecture. This approach allows you to take advantage of some of the newer technologies being used in the data centers of very large organizations without encountering a steep learning curve for the IT staff. Although this architecture has been designed and validated as a whole, the modular nature of this guide allows you to perform a gradual migration by choosing specific elements of the architecture to implement first. The remaining sections of this guide detail the various technologies that comprise this architecture.
  • 10. 6Physical EnvironmentAugust 2011 Series Physical Environment Business Overview When building or changing a network, you have to carefully consider the location where you will install the equipment. When building a server room, a switch closet, or even a midsize data center, take three things into con- sideration: power, cooling, and racking. Know your options in each of these categories, and you will minimize surprises and moving of equipment later on. Power Know what equipment will be installed in the area. You cannot plan electrical work if you do not know what equipment is going to be used. Some equip- ment requires standard 110v outlets that may already be available. Other equipment can require great power needs. Does the power need to be on all the time? In most cases this answer will be yes if there are servers and storage involved. Applications don’t react very well when the power goes out, so to prevent this a uninterruptable power supply (UPS) is needed. The UPS will switch over the current load to a set of internal or external batteries. Some UPSs are online, which means the power is filtered through the batteries all the time; others are switchable, meaning they use batteries only during power losses. UPSs vary by how much load they can carry and for how long. Careful planning is required to make sure the correct UPS is purchased, installed, and managed correctly. Most UPSs provide for remote monitoring and the ability to trigger a graceful server shutdown for critical servers if the UPS is going to run out of battery. Distributing the power to the equipment can change the power require- ments as well. There are many options available to distribute the power from the outlet or UPS to the equipment. One example would be using a power strip that resides vertically in a cabinet that usually has an L6-30 input and then C13/C19 outlets with the output voltage in the 200-240 range. These strips should be at a minimum metered so one does not overload the cir- cuits. The meter provides a current reading of the load on the circuit. This is critical as a circuit breaker tripping due to being overloaded will bring down everything plugged into it with no warning causing business downtime and possible data loss. For complete remote control, power strips are available with full remote control of each individual outlet from a web browser. These vertical strips also assist in proper cable management of the power cords. Short C13/C14 and C19/C20 power cords can be used instead of much longer cords to multiple 110 volt outlets or multiple 110volt power strips. Cooling With power comes the inevitable conversion of power into heat. Without going into great detail, power in equals heat out. Planning for cooling of one or two servers and a switch with standard building air may work. Multiple servers and blade servers (along with storage, switches, etc.) need more than building air for proper cooling. Be sure to at least plan with your facili- ties team what the options are for current and future cooling. Many options are available, in-row cooling, overhead cooling, raised floor with underfloor cooling, and wall mounted cooling. Equipment Racking Where to put the equipment is a very important detail not to overlook. Proper placement and planning allow for easy growth. With the power and cooling properly evaluated racking or cabinets need to be installed. Most servers are fairly deep and, with network connections and power connections, take up even more space. Most servers will fit in a 42-inch deep cabinet, and deeper cabinets give more flexibility for cable and power management within the cabinet. Be aware of what rails are required by your servers. Most servers now come with rack mounts that use the square-hole style vertical cabinet rails. Not having the proper rails can mean having to use adapters or shelves and making management of servers and equipment difficult if not sometimes impossible without removing other equipment or sacrificing space. Data center racks should use the square rail mounting options in the cabinets. Cage nuts can be used to provide threaded mounts for such things as routers, switches, shelves, etc. that may be needed. Summary The physical environmental requirements for a data center require careful planning to provide for efficient use of space, scalability, and ease of opera- tional maintenance. Working towards deployment of the Smart Business Architecture allows you to plan the physical space for your data center with a vision towards the equipment you will be installing over time, even if you begin with a smaller scale. For additional information on data center power, cooling and equipment racking, contact Cisco partners in the area of data center environmental products such as Panduit and APC.
  • 11. 7Ethernet InfrastructureAugust 2011 Series Ethernet Infrastructure Business Overview As your midsize organization grows, you may outgrow the capacity of the basic “server-room” Ethernet switching stack illustrated in the SBA Midsize Foundation Architecture. It is important to be prepared for the ongoing transition of available server hardware from 1 gigabit Ethernet attachment to 10 gigabit. Multi-tier applications often divide browser-based client services, business logic, and database layers into multiple servers, increasing the amount of server-to-server traffic and driving performance requirements higher. As the physical environment housing the organization’s servers grows to multiple racks, it also becomes more challenging to elegantly manage the cabling required to attach servers to the network. 10 Gigabit Ethernet connections help to improve overall network performance, while reducing the number of physical links required to provide the bandwidth. Technology Overview The foundation of the Ethernet network in the SBA Midsize Data Center Architecture is a resilient pair of Cisco Nexus 5000 Series switches. These switches offer the ideal platform for building a scalable, high-performance data center supporting both 10 gigabit and 1 gigabit Ethernet attached serv- ers. Optional Fibre Channel modules are available to allow integration with a Fibre-Channel based Storage Area Network (SAN). The Cisco Nexus 5000 Series also supports the Cisco Nexus 2000 Series Fabric Extenders. Fabric Extenders allow the switching fabric of the resilient switching pair to be physically extended to provide port aggregation in the top of multiple racks, reducing cable management issues as the server environment expands. The Fabric Extenders are all managed centrally from the Cisco Nexus 5000 Series switch pair, where they appear as “remote linecards” to the primary data center switches. This centralized management provides easy port provisioning and keeps operational costs down for the growing organization. The SBA Midsize Data Center Architecture leverages many advanced features of the Cisco Nexus 5000 Series switch family to provide a central switching fabric for the data center environment that is easy to deploy. This section provides an overview of the key features used in this topology and illustrates the specific physical connectivity that applies to the example configurations provided in the deployment section. Virtual Port Channel The Cisco Nexus 5000 Series switch pair providing the central Ethernet switching fabric for the SBA Midsize Data Center Architecture is configured using the Virtual Port Channel (vPC) feature. This capability allows the two switches to be used to build resilient, loop-free topologies that forward on all connected links instead of requiring Spanning Tree Protocol (STP) blocking for loop prevention. This feature enhances ease-of-use and simpli- fies configuration for the data center-switching environment. Neighboring devices such as the SBA Midsize core switches can leverage a Port Channel configuration, which bundles multiple links into a single logical link, with all available physical bandwidth being used to forward traffic. Allowing all links to forward traffic instead of requiring spanning tree to block the parallel paths for loop prevention provides greater bandwidth capacity to increase application performance. Ethernet Fabric Extension The Cisco Nexus 2000 Series Fabric Extender (FEX) delivers cost-effective and highly scalable 1 gigabit and 10 gigabit Ethernet environments. Fabric extension allows you to aggregate a group of physical switch ports at the top of each server rack, without needing to manage these ports as a separate logical switch. You can provide network resiliency by dual-homing servers into two separate fabric extenders, each of which is single homed to one member of the Cisco Nexus 5000 Series switch pair. To provide high avail- ability for servers that only support single-homed network attachment, the FEX itself may instead be dual-homed into the two members of the central switch pair. Our reference architecture example shown in Figure 2. illustrates single- homed and dual-homed FEX configurations. Each FEX includes dedicated fabric uplink ports that are designed to connect to upstream Cisco Nexus 5000 Series switches for data communication and management; these are shown as ports F1 and F2 in the illustration. The port designations on the Cisco Nexus 5000 side reflect the example ports used for reference con- figurations contained in this guide; any 10 gigabit Ethernet port on the Cisco Nexus 5000 switch may be used for FEX connection.
  • 12. 8Ethernet InfrastructureAugust 2011 Series The first 8 ports of a Cisco Nexus 5010 and the first 16 ports of a Cisco Nexus 5020 switch may be configured at either 10 Gigabit or 1 Gigabit Ethernet speeds. If you have requirements for 1 Gigabit Ethernet connections directly to the switch, ensure that you are reserving the correct ports and apply the speed com- mand to control this setting. As of NX-OS 5.0(2)N1(1), all Ethernet ports of the Nexus 5548 switch support 10 Gigabit Ethernet connection speed. If 1-Gigabit Ethernet connections are required, fabric extender ports on Nexus 2148 or 2248 may be used. 10-Gigabit Ethernet connections will be supported directly to the Nexus 5548 in a future software release. Tech Tip Figure 2. Ethernet Switching Fabric Physical Connections Deployment Details The following configuration procedures are required to configure the Ethernet switching fabric for the SBA Midsize Data Center Architecture. • Establish physical connectivity • Perform Initial device configuration • Complete vPC configuration • Create port channel to SBA core • Configure fabric extender connections
  • 13. 9Ethernet InfrastructureAugust 2011 Series Initial Setup 1. Establish Physical Connectivity 2. Perform Initial Device Configuration Process Procedure 1 Establish Physical Connectivity Complete the physical connectivity of the Cisco Nexus 5000 Series switch pair according to the illustration in Figure 2. (or according to the specific requirements of your implementation). Step 1: Connect ports Ethernet 1/17 and 1/18 or other available Ethernet ports between the two Cisco Nexus 5000 Series switches. This link will be used as the vPC peer-link, which allows the peer connection to form and supports forwarding of traffic between the switches if necessary during a partial link failure of one of the vPC port channels. Step 2: Connect the Management 0 ports to the SBA core switch pair (or an alternate location where they can be connected to the data center manage- ment VLAN). In our example configurations, the data center management VLAN is 163. Step 3: Connect ports Ethernet 1/19 and 1/20 or other available Ethernet ports on each Cisco Nexus 5000 Series switch to the SBA core to build the port channel which will carry production data traffic. Four 10 gigabit Ethernet connections will provide an aggregate throughput of 40 Gbps to carry data back and forth to client machines, or to be Layer-3 switched between serv- ers by the SBA core if required. Step 4: To support a dual-homed FEX with single-homed servers, connect fabric uplink ports 1 and 2 on the FEX to port Ethernet 1/13 or other available Ethernet ports, one on each Cisco Nexus 5000 Series switch. These ports will operate as a port channel to support the dual-homed FEX configuration. Step 5: Support single-homed FEX attachment by connecting fabric uplink ports 1 and 2 on each FEX to ports Ethernet 1/15 and 1/16 or other available Ethernet ports on only one member of the Cisco Nexus 5000 Series switch pair. These ports will be a port-channel, but will not be configured as a vPC port-channel, because they have physical ports connected to only one member of the switch pair. Procedure 2 Perform Initial Device Configuration Step 1: Connect a terminal cable to the console port of the first Cisco Nexus 5000 Series switch, and power on the system to enter the initial configuration dialog. Step 2: Follow the Basic System Configuration Dialog for initial device configuration of the first Cisco Nexus 5000 Series switch, as shown in the terminal capture below: Do you want to enforce secure password standard (yes/no): y Enter the password for “admin”: Confirm the password for “admin”: ---- Basic System Configuration Dialog ---- This setup utility will guide you through the basic configuration of the system. Setup configures only enough connectivity for management of the system. Please register Cisco Nexus 5000 Family devices promptly with your supplier. Failure to register may affect response times for initial service calls. Nexus devices must be registered to receive entitled support services. Press Enter at anytime to skip a dialog. Use ctrl-c at anytime to skip the remaining dialogs. Would you like to enter the basic configuration dialog (yes/ no): y Create another login account (yes/no) [n]: n Configure read-only SNMP community string (yes/no) [n]: n Configure read-write SNMP community string (yes/no) [n]: n Enter the switch name : dc3-5k-1 Continue with Out-of-band (mgmt0) management configuration? (yes/no) [y]: y
  • 14. 10Ethernet InfrastructureAugust 2011 Series Mgmt0 IPv4 address : 10.10.63.10 Mgmt0 IPv4 netmask : 255.255.255.0 Configure the default gateway? (yes/no) [y]: y IPv4 address of the default gateway : 10.10.63.1 Enable the telnet service? (yes/no) [n]: y Enable the http-server? (yes/no) [y]: y Enable the ssh service? (yes/no) [y]: y Type of ssh key you would like to generate (dsa/rsa) : rsa Number of key bits <768-2048> : 2048 Configure the ntp server? (yes/no) [n]: y NTP server IPv4 address : 10.10.48.17 Enter basic FC configurations (yes/no) [n]: n The following configuration will be applied: switchname dc2-5k-1 interface mgmt0 ip address 10.10.63.10 255.255.255.0 no shutdown exit vrf context management ip route 0.0.0.0/0 10.10.63.1 exit telnet server enable feature http-server ssh key rsa 768 force ssh server enable ntp server 10.10.48.17 use-vrf management Would you like to edit the configuration? (yes/no) [n]: n Use this configuration and save it? (yes/no) [y]: y [########################################] 100% Nexus 5000 Switch dc2-5k-1 login: Step 3: Enable common required features in the NXOS software. The example configurations shown in this guide use the following features: feature telnet feature private-vlan feature udld feature interface-vlan feature lacp feature vpc feature lldp feature fex feature npv If Fibre Channel–specific features such as Fibre Channel over Ethernet (FCoE) or N-Port Virtualization (NPV) are required, they should be enabled prior to applying any additional configura- tion to the switch. The NPV feature requires you to re-apply any existing configuration commands to the switch if it is added or removed. Tech Tip Step 4: Create required VLANs. For our example configuration, we are using VLANS 148-163 for various roles within the data center, and VLAN 999 as a “dummy” VLAN to define as native on trunks to mitigate the risk of any VLAN hopping by untagged traffic. It is helpful to assign names to VLANs as they are created; this makes the switch configuration more self-documenting and can assist later if troubleshooting is required. vlan 148 name servers1 vlan 149 name servers2 vlan 163 name dc-management vlan 999 name native
  • 15. 11Ethernet InfrastructureAugust 2011 Series Step 5: Enable jumbo frame support. Jumbo frames can improve data throughput between key end nodes in the data center that are able to negotiate larger packet sizes, such as iSCSI based storage systems and their associated servers. policy-map type network-qos jumbo class type network-qos class-default mtu 9216 system qos service-policy type network-qos jumbo Step 6: On the second Cisco Nexus 5000 Series switch, repeat all of the steps of the Initial Device Configuration procedure. Use a unique device name (dc3-5k-2) and IP address (10.10.63.11) for the mgmt0 interface. Otherwise, all configuration details are identical. Configure Inter-Device Links 1. Complete vPC Configuration 2. Create Port Channel to SBA Core 3. Configure Fabric Extender Connections 4. Configure End Node Ports Process Procedure 1 Complete vPC Configuration Before you can add port channels to the switch in vPC mode, basic vPC peering must be established between the two Cisco Nexus 5000 Series switches. Step 1: Define a vPC domain number to identify the vPC domain to be shared between the switches in the pair. The value “10” is shown in the example. vpc domain 10 Step 2: Define a lower role priority for the vPC primary switch: role priority 16000 The vPC secondary switch will be left at the default value of 32667. The switch with lower priority will be elected as the vPC primary switch. If the vPC primary switch is alive, the vPC secondary switch will suspend its vPC member ports to prevent potential looping while the vPC primary switch keeps all its vPC member ports active. If the peer link fails, the vPC peer will detect the peer switch’s failure through the vPC peer keepalive link. Step 3: On the first Nexus 5000, configure the peer-keepalive destination and source addresses: peer-keepalive destination 10.10.63.11 source 10.10.63.10 peer-config-check-bypass The example configuration uses the management (mgmt0) interfaces on each switch in the pair for the peer-keepalive link. The peer-keepalive is an alternate physical path between the two vPC switches to ensure that they are aware of one another’s health even in the case where the main peer link fails. The peer-keepalive source IP address should be the address being used on the mgmt0 port of the switch currently being configured, the destination address is that being used on the vPC peer. Apply the peer- config-check-bypass command so that newly configured vPCs or existing vPCs that flap will be brought up even when a peer link is down and the vPC switch role has been determined to be primary. This can ensure connectivity is maintained in certain partial-outage scenarios such as unstable power facilities. Step 4: Create a port channel interface to be used as the peer link between the two vPC switches. The peer link is the primary link for communications and for forwarding of data traffic to the peer switch if required. interface port-channel10 switchport mode trunk vpc peer-link spanning-tree port type network
  • 16. 12Ethernet InfrastructureAugust 2011 Series Step 5: Add physical interfaces to the trunk and connect the two Nexus 5000s’ ports together. A minimum of two physical interfaces is recom- mended for link resiliency. Different 10 gigabit Ethernet ports (as required by your specific implementation) may replace the interfaces shown in the example. interface Ethernet1/17 description vpc peer link switchport mode trunk channel-group 10 mode active interface Ethernet1/18 description vpc peer link switchport mode trunk channel-group 10 mode active Step 6: Repeat ste 151 a 153 throug515 for the secondary Nexus 5000. In st 153, be sure to swap the destination and source addresses. Step 7: Before moving on to the next procedure, ensure that the vPC peer relationship has formed successfully using the “show vpc” command. dc3-5k-1# show vpc Legend: (*) - local vPC is down, forwarding via vPC peer-link vPC domain id : 10 Peer status : peer adjacency formed ok vPC keep-alive status : peer is alive Configuration consistency status: success vPC role : secondary Number of vPCs configured : 86 Peer Gateway : Disabled Dual-active excluded VLANs : - vPC Peer-link status -------------------------------------------------------------- id Port Status Active vlans -- ---- ------ ------------------------------------------- 1 Po10 up 1,148-163,520,999 Look for the peer status of “peer adjacency formed ok” and the keep-alive status of “peer is alive” to verify successful configuration. If the status does not indicate success, double-check the IP addressing assigned for the keep-alive destination and source addresses, as well as the physical connections. Do not be concerned about the “(*) - local vPC is down, forwarding via vPC peer-link” statement at the top of the command output. Once you have vPC port channels defined, this is a legend to show the meaning of an asterisk next to your port channel in the listing if one of its member links is down. Tech Tip Procedure 2 Create Port Channel to SBA Core A port-channel interface needs to be created to carry traffic back and forth to the network core, which provides forwarding to client machines and layer-3 forwarding between the different IP subnets carried on different VLANs. We recommend at least two physical interfaces from each vPC peer switch connected to the network core, for a total port channel of four resilient physical 10 gigabit Ethernet links and 40Gbps of throughput. Defining a vPC port channel is identical to defining a standard port channel interface, with the addition of the “vpc [port-channel no.]” command added to the interface configuration. Step 1: On both of the Data Center Nexus 5000 vPC members, define EtherChannel configuration: interface port-channel60 description link to core switchport mode trunk vpc 60 switchport trunk native vlan 999 switchport trunk allowed vlan 148-153,156-163 interface Ethernet1/19 description link to core switchport mode trunk switchport trunk native vlan 999 switchport trunk allowed vlan 148-153,156-163 channel-group 60 mode active
  • 17. 13Ethernet InfrastructureAugust 2011 Series interface Ethernet1/20 description link to core switchport mode trunk switchport trunk native vlan 999 switchport trunk allowed vlan 148-153,156-163 channel-group 60 mode active Step 2: On the SBA Midsize Core Switch, define an equivalent EtherChannel configuration: vlan 153 name Secure-DC-outside ! vlan 154 name Secure-DC-inside-1 ! vlan 155 name Secure-DC-inside-2 ! vlan 159 name 1kv-packet ! vlan 160 name 1kv-control ! vlan 161 name vmotion ! vlan 162 name iscsi ! vlan 163 name dc-management ! interface Port-channel60 description Connection to DC-5K-2K switchport switchport trunk encapsulation dot1q switchport trunk native vlan 999 switchport trunk allowed vlan 148-153,156-163 switchport mode trunk ! interface TenGigabitEthernet1/4/15 description Connection to DC-5K-2K switchport switchport trunk native vlan 999 switchport trunk allowed vlan 148-153,156-163 switchport mode trunk channel-group 60 mode active macro apply EgressQoS ! interface TenGigabitEthernet1/4/16 [same as TenGigabitEthernet1/4/15] ! interface TenGigabitEthernet2/4/15 [same as TenGigabitEthernet1/4/15] ! interface TenGigabitEthernet2/4/16 [same as TenGigabitEthernet1/4/15] ! interface Vlan153 description Secure DC outside ip address 10.10.53.1 255.255.255.128 ! interface Vlan154 description DC Secure VLAN: Assign no IP Address no ip address ! interface Vlan155 description DC Secure VLAN: Assign no IP Address no ip address ! interface Vlan163 description DC Management ip address 10.10.63.1 255.255.255.0
  • 18. 14Ethernet InfrastructureAugust 2011 Series Procedure 3 Configure Fabric Extender Connections Fabric extender connections are also configured as port channel connec- tions on the Cisco Nexus 5000 Series. If the FEX is to be single-homed to only one member of the switch pair, it is configured as a standard port channel. If the FEX is to be dual-homed to both members of the vPC switch pair to support single-homed servers, it is configured as a vPC port channel. Dual- and single-homed examples are illustrated in Figure 2 with configura- tion examples as shown below. When assigning FEX numbering, you have the flexibility to use a numbering scheme (different from the example) that maps to some other identifier, such as a rack number that is specific to your environment. Tech Tip Step 1: Configure port channel interfaces to support FEX attachment. interface port-channel100 description single-homed 2248 switchport mode fex-fabric fex associate 100 interface port-channel102 description dual-homed 2248 switchport mode fex-fabric vpc 102 fex associate 102 Step 2: Assign physical interfaces to the port channels supporting FEX attachment. The switchport mode fex-fabric command informs the Cisco Nexus 5000 Series switch that a fabric extender should be at the other end of this link. interface Ethernet1/13 switchport mode fex-fabric fex associate 102 channel-group 102 interface Ethernet1/15 switchport mode fex-fabric fex associate 100 channel-group 100 interface Ethernet1/16 switchport mode fex-fabric fex associate 100 channel-group 100 Once these configuration steps are completed, you can verify the status of the fabric extender modules by using the show fex command, looking for the state of “online” for each unit: dc2-5k-1# sh fex FEX FEX FEX FEX Number Description State Model Serial ------------------------------------------------------------- 100 FEX0100 Online N2K-C2148T-1GE JAF1313AFEM 102 FEX0102 Online N2K-C2148T-1GE JAF1319BDPJ Procedure 4 Configure End Node Ports Step 1: Assign physical interfaces to support servers or devices that belong in a single VLAN as access ports. Setting the spanning-tree port type to edge allows the port to provide immediate connectivity on the con- nection of a new device. interface Ethernet102/1/1 switchport access vlan 163 spanning-tree port type edge
  • 19. 15Ethernet InfrastructureAugust 2011 Series Step 2: Assign physical interfaces to support servers or devices that require a VLAN trunk interface to communicate with multiple VLANs. Most virtualized servers will require trunk access to support management access, plus user data for multiple virtual machines. Setting the spanning-tree port type to edge allows the port to provide immediate connectivity on the con- nection of a new device. interface Ethernet100/1/1 switchport mode trunk switchport trunk allowed vlan 148-151,154-163 spanning-tree port type edge trunk Summary The configuration procedures provided in this section allow you to get a resilient Ethernet switching fabric up and running for your data center environment. This allows you to immediately take advantage of the high performance, low latency, and high availability characteristics inherent in the Cisco Nexus 5000 and 2000 Series products. To investigate more advanced features for your configuration, please refer to the Cisco Nexus 5000 Series configuration guide series on cisco.com.
  • 20. 16Storage InfrastructureAugust 2011 Series Storage Infrastructure Business Overview There is a constant demand for more storage in organizations today. Storage for servers can be physically attached directly to the server or connected over a network. Direct Attached Storage (DAS) is physically attached to a single server and is difficult to use efficiently because it can only be used by the host attached to it. Storage Area Networks (SANs) allow multiple servers to share a pool of storage over a Fibre Channel or Ethernet network. This capability allows storage administrators to easily expand capacity for servers supporting data-intensive applications. Technology Overview IP-based Storage Options Many storage systems provide the option for access using IP over the Ethernet network. This approach allows a growing organization to gain the advantages of centralized storage without needing to deploy and administer a separate Fibre Channel network. Options for IP-based storage connectiv- ity include Internet Small Computer System Interface (iSCSI) and Network Attached Storage (NAS). iSCSI is a protocol that enables servers to connect to storage over an IP connection and is a lower-cost alternative to Fibre Channel. iSCSI services on the server must contend for CPU and bandwidth along with other network applications, so you need to ensure that the processing require- ments and performance are suitable for a specific application. iSCSI has become a storage technology that is supported by most server, storage, and application vendors. iSCSI provides block-level storage access to raw disk resources, similar to Fibre Channel. Network interface cards also can provide support to offload iSCSI to a separate processor to increase performance. Network Attached Storage (NAS) is a general term used to refer to a group of common file access protocols, the most common implementations use Common Internet File System (CIFS) or Network File System (NFS). CIFS originated in the Microsoft network environment and is a common desktop file sharing protocol. NFS is a multi-platform protocol that originated in the UNIX environment and is a protocol that can be used for shared hypervisor storage. Both NAS protocols provide file-level access to shared storage resources. Most organizations will have applications for multiple storage access tech- nologies. For example, Fibre Channel for the high performance database and production servers and NAS for desktop storage access. Fibre Channel Storage Fibre Channel allows servers to connect to storage across a fiber-optic network, across a data center or even a WAN. Multiple servers can share a single storage array. This SBA Data Center design uses the Cisco 9148 Multilayer Fabric Switch for Fibre Channel connectivity. The Cisco MDS 9148 Multilayer Fabric Switch is ideal for a small SAN fabric with up to 48 Fibre Channel ports, providing 48 line-rate 8-Gbps Fibre Channel ports and cost-effective scalability. In a SAN, a fabric consists of servers and storage connected to a Fibre Channel switch (Figure 3). It is standard practice in SANs to create two completely separate physical fabrics, providing two distinct paths to the storage Fibre Channel fabric services operate independently on each fabric so when a server needs resilient connections to a storage array, it connects to two separate fabrics. This design prevents failures or misconfigurations in one fabric from affecting the other fabric.
  • 21. 17Storage InfrastructureAugust 2011 Series Figure 3. Dual Fabric SAN with a Single Disk Array Each server or host on a SAN connects to the Fibre Channel switch with a multi-mode fiber cable from a Host Bus Adapter (HBA). For resilient connec- tivity, each host connects a port to each of the fabrics. Each port has a port worldwide name (pWWN), which is the port’s address that uniquely identifies it on the network. An example of a pWWN is: 10:00:00:00:c9:87:be:1c. In data networking this would compare to a MAC address for an Ethernet adapter. Virtual Storage Area Networks (VSANs) The VSAN is a technology created by Cisco that is modeled after the Virtual Local Area Network (VLAN) concept in Ethernet networks. VSANs provide the ability to create many logical SAN fabrics on a single Cisco MDS 9100 Family switch. Each VSAN has its own set of services and address space, which prevents an issue in one VSAN from affecting other VSANs. In the past, it was a common practice to build physically separate fabrics for production, backup, lab, and departmental environments. VSANs allow all of these fabrics to be created on a single physical switch with the same amount of protection provided by separate switches. Zoning The terms target and initiator will be used throughout this section. Targets are disk or tape devices. Initiators are servers or devices that initiate access to disk or tape. Zoning provides a means of restricting visibility and connectivity between devices connected to a SAN. The use of zones allows an administrator to control which initiators can see which targets. It is a service that is common throughout the fabric and any changes to a zoning configuration are disrup- tive to the entire connected fabric. Initiator-based zoning allows for zoning to be port-independent by using the World Wide Name (WWN) of the end host. If a host’s cable is moved to a different port, it will still work if the port is a member of the same VSAN. Device Aliases When configuring features such as zoning, quality of service (QoS), and port security on a Cisco MDS 9000 Family switch, WWNs must be speci- fied. The WWN naming format is cumbersome and manually typing WWNs is error prone. Device aliases provide a user-friendly naming format for WWNs in the SAN fabric (for example: “p3-c210-1-hba0-a” instead of “10:00:00:00:c9:87:be:1c”).
  • 22. 18Storage InfrastructureAugust 2011 Series Use a naming convention that makes initiator and target identification easy. An example is below. p3-c210-1-hba0-a in this setup identifies Rack location P3 Host type C210 Host number 1 HBA number hba0 Port on HBA a Storage Array Tested The storage arrays used in the testing and validation of this deployment guide are the EMC™ CX4-120 and the NetApp™ FAS3140. The specific stor- age array configuration may vary. Please consult the installation instructions from the specific storage vendor. The Cisco interopability support matrix can be found here: http://www.cisco.com/en/US/docs/switches/datacen- ter/mds9000/interoperability/matrix/intmatrx.html Specific interfaces, addresses, and device aliases are examples from the lab. Your WWN addresses, interfaces, and device aliases will likely be different. Tech Tip Deployment Details Deployment examples documented in this section include: • Configuration of a Cisco MDS-based SAN network to support Fibre- Channel based storage. • Fibre Channel over Ethernet FCoE access to storage from Cisco UCS C-Series servers using the Nexus 5000. Configuring the Cisco MDS 9148 Switch 1. Complete the Initial Setup 2. Configuring VSANs 3. Configure Fibre Channel Ports 4. Configure Device Aliases 5. Configure Zoning 6. Troubleshoot the Configuration Process Complete each of the following procedures to configure the Cisco MDS 9148 switch. Procedure 1 Complete the Initial Setup The following is required to complete this procedure: • Set Management IP address • Define Management upstream port an dEthernet/IP coonectivity • Configure console access • Configure a Secure Password The characteristics for strong passwords included the following: ◦◦ At least 8 characters long ◦◦ Does not contain many consecutive characters (such as abcd) ◦◦ Does not contain many repeating characters (such as aaabb) ◦◦ Does not contain dictionary words ◦◦ Does not contain proper names ◦◦ Contains both uppercase and lowercase characters ◦◦ Contains numbers The following are examples of strong passwords: ◦◦ If2COM18 ◦◦ 2004AsdfLkj30
  • 23. 19Storage InfrastructureAugust 2011 Series When initially powered on, a new Cisco MDS 9148 switch starts a setup script when accessed from the console. Step 1: Follow the prompts in the setup script to configure login, out-of- band management, Telnet, SSH, clock, time zone, Network Time Protocol, switch port modes, and default zone policies. When the administrative login is configured, a Simple Network Management Protocol Version 3 (SNMPv3) user is created auto- matically. This login is used by Cisco Fabric Manager to manage the switch. Also note, you will want to configure the secure pass- word standard. The secure password standard does not allow for creation of insecure passwords and should be used for all production Cisco MDS switches. Tech Tip ---- System Admin Account Setup ---- Do you want to enforce secure password standard (yes/no) [y]: Enter the password for “admin”: Confirm the password for “admin”: ---- Basic System Configuration Dialog ---- This setup utility will guide you through the basic configuration of the system. Setup configures only enough connectivity for management of the system. Please register Cisco MDS 9000 Family devices promptly with your supplier. Failure to register may affect response times for initial service calls. MDS devices must be registered to receive entitled support services. Press Enter at anytime to skip a dialog. Use ctrl-c at anytime to skip the remaining dialogs. Would you like to enter the basic configuration dialog (yes/ no): y Create another login account (yes/no) [n]: Configure read-only SNMP community string (yes/no) [n]: Configure read-write SNMP community string (yes/no) [n]: Enter the switch name : p3-mds9148-1 Continue with Out-of-band (mgmt0) management configuration? (yes/no) [y]: Mgmt0 IPv4 address : 10.10.63.12 Mgmt0 IPv4 netmask : 255.255.255.0 Configure the default gateway? (yes/no) [y]: IPv4 address of the default gateway : 10.10.63.1 Configure advanced IP options? (yes/no) [n]: Enable the ssh service? (yes/no) [y]: Type of ssh key you would like to generate (dsa/rsa) [rsa]: Number of rsa key bits <768-2048> [1024]: Enable the telnet service? (yes/no) [n]: y Enable the http-server? (yes/no) [y]: Configure clock? (yes/no) [n]: Configure timezone? (yes/no) [n]: Configure summertime? (yes/no) [n]: Configure the ntp server? (yes/no) [n]: y NTP server IPv4 address : 10.10.48.17 Configure default switchport interface state (shut/noshut) [shut]: noshut Configure default switchport trunk mode (on/off/auto) [on]: Configure default switchport port mode F (yes/no) [n]: Configure default zone policy (permit/deny) [deny]: Enable full zoneset distribution? (yes/no) [n]: Configure default zone mode (basic/enhanced) [basic]: The following configuration will be applied: switchname p3-mds9148-1 interface mgmt0 ip address 10.10.63.12 255.255.255.0 no shutdown ip default-gateway 10.10.63.1 ssh key rsa 1024 force feature ssh feature telnet feature http-server ntp server 10.10.48.17 no system default switchport shutdown
  • 24. 20Storage InfrastructureAugust 2011 Series system default switchport trunk mode on no system default zone default-zone permit no system default zone distribute full no system default zone mode enhanced Would you like to edit the configuration? (yes/no) [n]: n Use this configuration and save it? (yes/no) [y]: y [########################################] 100% Network Time Protocol (NTP) is critical to troubleshooting and should not be overlooked. Tech Tip Step 2: The Cisco MDS Device Manager provides a graphical interface to configure a Cisco MDS 9100 Family switch. To access the Device Manager, connect to the management address via HTTP or access it directly through Cisco Fabric Manager. The CLI can also be used to configure the MDS 9100 Family switch. Java runtime environment (JRE) is required to run Cisco Fabric Manager and Device Manager and should be installed before accessing either application. Tech Tip Cisco Fabric Manager is a Java application available for download from Cisco.com or from the CD that ships with the Cisco MDS 9100 Family switch. Managing more than one switch at the same time requires licensing. Tech Tip Procedure 2 Configuring VSANs By default, all ports are assigned to VSAN 1 at initialization of the switch. It is a best practice to create a separate VSAN for production and to leave VSAN 1 for unused ports. By not using VSAN 1, you can avoid future problems with merging of VSANs when combining other existing switches that may be set to VSAN 1. To create a VSAN, use the command-line interface (CLI) or Device Manager. Step 1: To create VSAN 4 and add it to port FC1/4 with the name General- Storage, enter the following from the command line: vsan database vsan 4 name “General-Storage” vsan 4 interface fc1/4 Using Device Manager, select FC->VSANS.
  • 25. 21Storage InfrastructureAugust 2011 Series The Create VSAN General window appears. Select the VSAN id as 4 and enter the name General-Storage in the Name field. Select the interface members by clicking … after Interface Members. Select the interface members. . Step 2: Click Create to create the VSAN. You can add additional VSAN members in the Membership tab of the main VSAN window. A separate VSAN should be created for each fabric. Example: Fabric A has the General-Storage VSAN with the VSAN number 4, Fabric B would have the General-Storage VSAN number config- ured as VSAN 5. Tech Tip Procedure 3 Configure Fibre Channel Ports By default, the ports are configured for port mode Auto and this setting should not need to be changed for most devices that are connected to the fabric. Step 1: To change the port mode via Device Manager, right-click the port you want to configure.
  • 26. 22Storage InfrastructureAugust 2011 Series The General tab appears: Step 2: Connect devices to the Fibre Channel ports and activate the ports. When the initiator or target starts up, it automatically logs into the fabric. Upon login, the initiator or target WWN is made known to the fabric. To display this fabric login database, enter the following command through the Cisco MDS 9000 switch CLI: p3-mds9148-1# show flogi database ----------------------------------------------------------------------------- INTERFACE VSAN FCID PORT NAME NODE NAME ----------------------------------------------------------------------------- fc1/1 4 0x050000 50:06:01:60:3c:e0:60:e2 50:06:01:60:bc:e0:60:e2 fc1/3 4 0x050100 10:00:00:00:c9:92:80:1c 20:00:00:00:c9:92:80:1c fc1/4 4 0x050200 10:00:00:00:c9:91:d5:6c 20:00:00:00:c9:91:d5:6c fc1/5 4 0x050300 10:00:00:00:c9:8c:60:b4 20:00:00:00:c9:8c:60:b4 fc1/6 4 0x050400 10:00:00:00:c9:86:44:80 20:00:00:00:c9:86:44:80 fc1/7 4 0x050500 10:00:00:00:c9:87:be:1c 20:00:00:00:c9:87:be:1c fc1/15 4 0x050600 20:41:00:05:9b:76:b2:80 20:04:00:05:9b:76:b2:81 fc1/16 4 0x050700 20:42:00:05:9b:76:b2:80 20:04:00:05:9b:76:b2:81 Procedure 4 Configure Device Aliases Device aliases map the long WWNs for easier zoning and identification of initiators and targets. An incorrect device name may cause unexpected results. Device aliases can be used for zoning, port-security, QOS, and show commands. There are two ways to configure device aliases: CLI or Device Manager. To configure device aliases using the CLI, complete the following steps: Step 1: Apply the following configuration: device-alias database device-alias name emc-a0 pwwn 50:06:01:60:3c:e0:60:e2 device-alias name p3-3rd-1-hba0-a pwwn 10:00:00:00:c9:8c:60:b4 device-alias name p3-3rd-2-hba0-a pwwn 10:00:00:00:c9:86:44:80 device-alias name p3-3rd-3-hba0-a pwwn 10:00:00:00:c9:87:be:1c device-alias name p3-c210-1-cna-a pwwn 21:00:00:c0:dd:11:28:29 device-alias name p3-dc-6100-fc-1 pwwn 20:41:00:05:9b:76:b2:80 device-alias name p3-dc-6100-fc-2 pwwn 20:42:00:05:9b:76:b2:80 device-alias name p3-c200-1-hba0-a pwwn 10:00:00:00:c9:92:80:1c device-alias name p3-c210-1-hba0-a pwwn 10:00:00:00:c9:91:d5:6c exit device-alias commit Step 2: Aliases are now visible when you enter the show flogi database command. p3-mds9148-1# show flogi database ----------------------------------------------------------------------------- INTERFACE VSAN FCID PORT NAME NODE NAME ----------------------------------------------------------------------------- fc1/1 4 0x050000 50:06:01:60:3c:e0:60:e2 50:06:01:60:bc:e0:60:e2 [emc-a0] fc1/3 4 0x050100 10:00:00:00:c9:92:80:1c 20:00:00:00:c9:92:80:1c [p3-c200-1-hba0-a] fc1/4 4 0x050200 10:00:00:00:c9:91:d5:6c 20:00:00:00:c9:91:d5:6c [p3-c210-1-hba0-a] fc1/5 4 0x050300 10:00:00:00:c9:8c:60:b4 20:00:00:00:c9:8c:60:b4 [p3-3rd-1-hba0-a]
  • 27. 23Storage InfrastructureAugust 2011 Series fc1/6 4 0x050400 10:00:00:00:c9:86:44:80 20:00:00:00:c9:86:44:80 [p3-3rd-2-hba0-a] fc1/7 4 0x050500 10:00:00:00:c9:87:be:1c 20:00:00:00:c9:87:be:1c [p3-3rd-3-hba0-a] fc1/15 4 0x050600 20:41:00:05:9b:76:b2:80 20:04:00:05:9b:76:b2:81 [p3-dc-6100-fc-1] fc1/16 4 0x050700 20:42:00:05:9b:76:b2:80 20:04:00:05:9b:76:b2:81 [p3-dc-6100-fc-2] To configure device aliases using Device Manager, complete the following steps: Step 3: Access the Device Alias window, FC->Advanced->Device Alias. Step 4: Click Create. Step 5: Enter a device alias name and paste in or type the WWN of the host. Step 6: Click CFS->Commit when complete. Procedure 5 Configure Zoning • Zoning can be configured from the CLI (23) and from Fabric Manager (24). Both will be shown. • Leading practices for zoning: • Configure zoning between a single initiator and a single target per zone. • A single initiator can also be configured to multiple targets in the same zone. • Zone naming should follow a simple naming convention of initiator_x_target_x. • p3-c100-1-hba0-a_SAN-A • p3-c210-1-hba0-a_SAN-A • Limiting zoning to a single initiator with a single or multiple target helps prevent disk corruption and data loss. Option 1. To create a zone with the CLI, complete the follow- ing steps: Step 1: In configuration mode, enter zone name and vsan number. zone name p3-c210-1-hba0-a-SAN-A vsan 4
  • 28. 24Storage InfrastructureAugust 2011 Series Device members can be specified by WWN or device alias. member device-alias p3-c210-1-hba0-a member pwwn 10:00:00:00:c9:91:d5:6c Figure 4. Zoning Example With Two Fabrics Create a zoneset. A zoneset is a collection of zones (see the preceding figure). Zones are members of a zoneset. After you add all the zones as members, you must activate the zoneset. There can only be one active zoneset per VSAN. zoneset name Zoneset1 vsan 4 Step 2: To add members to the zoneset, enter the following commands. member p3-c210-1-hba0-a-SAN-A member p3-c200-1-hba0-a-SAN-A Step 3: Once all the zones for VSAN 4 are created and added to the zone- set, activate the configuration. zoneset activate name Zoneset1 vsan 4 Option 2. Configure Zoning with Cisco Fabric Manager Step 1: Fabric Manager comes on a CD provided with the MDS 9148 switch. For more information on installing Fabric Manager please refer to http:// www.cisco.com/en/US/docs/storage/san_switches/mds9000/sw/fm/ quick/guide/fm.html Step 2: Log into Fabric Manager, the default username and password is admin/password. Step 3: Select a seed switch by entering the IP address of the MDS, example 10.10.63.12. Once discovered , select the MDS from the list and proceed. Step 4: Select Zone Edit Local Full Zone Database in the Cisco Fabric Manager menu.
  • 29. 25Storage InfrastructureAugust 2011 Series Step 5: On the left side of the zone database window are two sections, Zonesets and Zones. Across the top, the current VSAN and switch are displayed. The two sections on the right side list zones and zone members. Click on Insert to create a new zone. Step 6: Highlight the new zone. On the bottom of the right hand side of the database window targets and initiators that have logged in the fabric for the selected VSAN are available to be added to the new zone. Highlight initiator or targets to add to the zone and click Add to Zone. Step 7: Right-click Zoneset to insert a new zoneset. Drag zones just created from the zone box to the zoneset folder just created. Step 8: When finished, to activate the configured zoneset, click Activate in the bottom right of the window. Procedure 6 Troubleshoot the Configuration Step 1: To check the fabric configuration for proper zoning, use the show zoneset active command to display the active zoneset. Each zone that is a member of the active zoneset is displayed with an asterisk (*) to the left of the member. If there is not an asterisk to the left, the host is either down and not logged into the fabric or there is a misconfiguration of the port VSAN or zoning. Use the show zone command to display all configured zones on the Cisco MDS 9000 Family switch. Step 2: In a Fibre Channel fabric, each host or disk requires a Fibre Channel ID (FC ID). When a fabric login (FLOGI) is received from the device, this ID is assigned by the fabric. If the required device is displayed in the FLOGI table, the fabric login is successful. p3-mds9148-1# show zoneset active zoneset name Zoneset1 vsan 4 zone name p3-c210-1-hba0-a-SAN-A vsan 4 * fcid 0x050200 [pwwn 10:00:00:00:c9:91:d5:6c] [p3-c210-1- hba0-a] * fcid 0x050000 [pwwn 50:06:01:60:3c:e0:60:e2] [emc-a0] zone name p3-c200-1-hba0-a-SAN-A vsan 4 * fcid 0x050000 [pwwn 50:06:01:60:3c:e0:60:e2] [emc-a0] * fcid 0x050100 [pwwn 10:00:00:00:c9:92:80:1c] [p3-c200-1- hba0-a]
  • 30. 26Storage InfrastructureAugust 2011 Series Step 3: Test Fibre Channel reachability using the fcping command and trace the routes to the host using the fctrace command. Cisco created these commands to provide storage networking trouble- shooting tools that are familiar to individuals who use ping and traceroute. Examples are below: fcping device-alias p3-c210-1-hba0-a vsan 4 28 bytes from 10:00:00:00:c9:91:d5:6c time = 714 usec 28 bytes from 10:00:00:00:c9:91:d5:6c time = 677 usec 28 bytes from 10:00:00:00:c9:91:d5:6c time = 700 usec 28 bytes from 10:00:00:00:c9:91:d5:6c time = 705 usec 28 bytes from 10:00:00:00:c9:91:d5:6c time = 699 usec 5 frames sent, 5 frames received, 0 timeouts Round-trip min/avg/max = 677/699/714 usec fctrace device-alias p3-c210-1-hba0-a vsan 4 Performing path discovery. Route present for : 10:00:00:00:c9:91:d5:6c 20:00:00:05:9b:70:40:20(0xfffc05) Configuring Cisco UCS Rack Mount Servers for FCoE 1. Enable FCOE 2. Enable NPV Mode 3. Configure VSAN 4. Enable F-Port-Channels and Trunk Protocol 5. Configure a Trunking Port Channel 6. FCoE QOS with the Cisco Nexus 5548 7. Configure Host Facing FCoE Ports 8. Verify FCoE Connectivity Process Physical Setup and Connectivity Cisco UCS rack servers ship with onboard 10/100/1000 Ethernet adapters and a Cisco Integrated Management Controller (CIMC) with a 10/100 port. To get the most out of the rack servers and minimize cabling in the SBA Unified Computing architecture, the Cisco UCS C210 rack-mount server is connected to a unified fabric. The Cisco Nexus 5000 Series switch that con- nects the Cisco UCS 5100 Series Blade Server Chassis to the network can also be used to extend Fibre Channel traffic over 10 gigabit Ethernet. The Cisco Nexus 5000 Series switch consolidates I/O onto one set of cables, eliminating redundant adapters, cables, and ports. A single card and set of cables connects servers to the Ethernet and Fibre Channel networks and also allows the use of a single cabling infrastructure within server racks. In the SBA Midsize Data Center architecture, the Cisco UCS C210 rack- mount server is configured with a dual-port CNA. Cabling the Cisco UCS C210 with a CNA limits the cables to three, one for each port on the CNA and the CIMC connection. A standard server without a CNA could have a few Ethernet connections or multiple Ethernet and Fibre Channel connec- tions. The following figure shows a topology with mixed unified fabric and standard Ethernet and Fibre Channel connections.
  • 31. 27Storage InfrastructureAugust 2011 Series Figure 5. Unified Fabric and Non Unified Fabric
  • 32. 28Storage InfrastructureAugust 2011 Series The Cisco UCS C210 is connected to both Cisco Nexus 5000 Series switches from the CNA with twinax cabling. The CIMC 10/100 management port connects to an Ethernet port on the Cisco Nexus 2248 fabric extender. The Cisco Nexus 5548 switch has one available expansion slot, which can be used to add Fibre Channel or to add 10 gigabit Ethernet ports. The avail- able options for Fibre Channel are: • Split 8-port 10 gigabit Ethernet/8-port 8 Gbs Fibre Channel card • 16-port 10 gigabit Ethernet card The Cisco Nexus 5548 with a Fibre Channel expansion card acts a standard Fiber Channel switch or it can act as a Fibre Channel switch in host mode. In N-port Virtualization (NPV) mode, all traffic is managed at the upstream MDS. NPV allows for the storage to be configured the same as in the previous Cisco UCS chassis configuration. In the SBA Unified Computing architecture, all the Fiber Channel zoning and switching occurs upstream on the Cisco MDS 9148 switches. The Fibre Channel connectivity is configured as shown, with two connections from each Cisco Nexus 5000 Series switch to each SAN fabric. Figure 6. Cisco MDS 9148 and Cisco Nexus 5548 Connectivity Two new features will be introduced, F-port trunking and N-port-channeling. F-port trunking allows for future expansion of VSANs across the link and prepares for expansion to the Nexus 5548. If there is a need for more than a single VSAN to a virtualized host for example, the VSAN can just be added to the trunk without disrupting other traffic or requiring new physical connections. F-Port Channeling now allows for Fibre Channel ports between the Nexus 5548 and the Cisco MDS 9148 to be put into a port channel allowing for redundancy and for added bandwidth. This example shows a 2 port 16 Gb fiber channel port channel. The Cisco MDS 9148 switch will need to be configured for NPIV when the Cisco Nexus 5000 Series switches are configured for N-port Virtualization mode.
  • 33. 29Storage InfrastructureAugust 2011 Series Nexus 5000 configuration for FCoE The Cisco Nexus 5000 Series switch supports FCoE. To configure it for unified fabrics and support of the 2nd generation CNAs, you must configure the following items: • FCoE functionality • NPV (optional) • Fibre Channel VSAN creation • Fibre Channel Uplink • Create Trunking Port Channel • VLAN association to Fibre Channel VSAN • Creation of a virtual Fibre Channel interface • Assign VSAN to virtual Fibre Channel interface • Configure Ethernet port and trunking Note: Configuration will be similar across both of the Cisco Nexus 5000 Series switches with the exception of the VSAN configured for SAN fabric A and for SAN fabric B. You must perform this procedure once for each of the two Cisco Nexus 5000 Series switches. Procedure 1 Enable FCOE Step 1: Enable FCoE on each Cisco Nexus 5000 Series switch. feature fcoe A temporary 180-day license is activated when you enter the feature fcoe command. For long-term use, you must install a permanent license. For more information, please see the Cisco NX-OS Licensing Guide at http:// www.cisco.com/en/US/docs/switches/datacenter/sw/nx-os/licensing/ guide/b_Cisco_NX-OS_Licensing_Guide.html. Procedure 2 Enable NPV Mode Note: Enabling NPV erases the working configuration and reboots the switch. You must then reconfigure the switch over the console interface. The only information that remains is the admin username and password. Please understand the impact of this change on a production network device. If you do not enable NPV, the Cisco Nexus 5000 Series switches are used as a switch. All zoning and Fibre Channel configuration of the Cisco Nexus 5000 Series switches is similar to the Cisco MDS 9100 Series switch zoning and configuration in the storage section of this guide. Step 1: Enable NPIV on the Cisco Nexus 5548 switches. feature npv Step 2: Enable NPIV on the Cisco MDS 9148 SAN switches. feature npiv Step 3: Verify NPIV status: p3-mds9148-1# sh npiv status NPIV is enabled Procedure 3 Configure VSAN Step 1: Configure the VSAN on the Cisco Nexus 5548 switch and assign it to the interface connected to the MDS vsan database vsan 4 name General-Storage vsan 4 interface fc2/1-2 exit Step 2: Configure and bring up the Fibre Channel port that is connected to the Cisco MDS 9100 Series switch. interface fc 2/1 no shut exit interface fc 2/2 no shut exit The ports will need to be enabled on the MDS and have the correct VSAN assigned. Please refer Smart Business Architecture for Midsize Networks for more information on configuring the Cisco MDS 9100.
  • 34. 30Storage InfrastructureAugust 2011 Series Step 3: Use the show interface brief command on the Cisco Nexus 5000 Series switch to view the operating mode of the interface. For example, in the output below, the operating mode is NP (proxy N-Port). Because the default port configuration on the Cisco MDS 9148 Series switch is auto and NPIV feature has previously been enabled in the Cisco UCS Fabric Configuration, the switch negotiates as an NP port. DC-5000a# show interface brief ------------------------------------------------------------------------ Interface Vsan Admin Admin Status SFP Oper Oper Port Mode Trunk Mode Speed Channel Mode (Gbps) ------------------------------------------------------------------------ fc2/1 4 NP off up swl NP 4 -- fc2/2 4 NP off up swl NP 4 -- Step 4: Check the Fibre Channel interface on the corresponding Cisco MDS 9148 switch. Procedure 4 Enable F-Port-Channels and Trunk Protocol Step 1: Configure F-Port-Channeling on the Cisco MDS 9148. This can also be turned on with Device Manager. feature fport-channel-trunk Step 2: Configure Trunk Protocol on the Cisco Nexus 5548. trunk protocol enable Procedure 5 Configure a Trunking Port Channel For added resilience, a port channel will be set up between the Cisco Nexus 5548 and Cisco MDS 9148 Fibre Channel ports. Trunking will also be enabled. Step 1: Run Fabric Manager’s Port Channel wizard.
  • 35. 31Storage InfrastructureAugust 2011 Series Step 2: Select the Radio button for NPV enabled switches, and then select the Cisco MDS9148 and Cisco Nexus 5548 pair. Step 3: Select the correct ports between the switches and click Next.Select Switch Ports
  • 36. 32Storage InfrastructureAugust 2011 Series Step 4: Select a port channel ID for both sides of the link (in this example it is 256). Select the trunk radio button. Select the port vsan as 4 for this example in fabric A. Click Finish. Step 5: This port-channel creation may be disruptive if there is traffic across the link. This configuration assumes traffic is not configured yet. Click Yes to continue. Step 6: Verify with a show interface brief on both the MDS and the Nexus. dc3-5k-1# show interface brief -------------------------------------------------------------------- Interface Vsan Admin Admin Status SFP Oper Oper Port Mode Trunk Mode Speed Channel Mode (Gbps) -------------------------------------------------------------------- fc2/1 4 NP on trunking swl TNP 8 256 fc2/2 4 NP on trunking swl TNP 8 256 -------------------------------------------------------------------- Interface Vsan Admin Status Oper Oper IP Trunk Mode Speed Address Mode (Gbps) -------------------------------------------------------------------- san-port-channel 256 4 on trunking TNP 16 -- -------------------------------------------------------------------- With Fibre Channel configuration complete between the Cisco Nexus 5000 Series switch and the Cisco MDS 9148 Series switch, connectivity to the host can begin.
  • 37. 33Storage InfrastructureAugust 2011 Series Procedure 6 FCoE QOS with the Cisco Nexus 5548 The Cisco Nexus 5548, unlike the Cisco Nexus 5510, does not preconfigure QOS for FCoE traffic. Step 1: There are four lines of QOS statements that map the existing system QOS policies for FCoE. Without these commands, the virtual Fibre Channel interface will not come up when activated. Enter the following in global configuration mode: system qos service-policy type qos input fcoe-default-in-policy service-policy type queuing input fcoe-default-in-policy service-policy type queuing output fcoe-default-out-policy service-policy type network-qos fcoe-default-nq-policy Procedure 7 Configure Host Facing FCoE Ports On the Cisco Nexus 5548 switch, configure the Ethernet ports connected to the CNA in the host. Step 1: Create a VLAN that will carry FCoE traffic to the host. In this exam- ple, VLAN 304 is mapped to VSAN 4. VLAN 304 carries all VSAN 4 traffic to the CNA over the trunk. vlan 304 fcoe vsan 4 exit Step 2: Create a virtual Fibre Channel (vfc) interface for Fiber Channel traffic and bind it to the corresponding host Ethernet interface. interface vfc1 bind interface Ethernet 1/3 no shutdown exit Step 3: Add the virtual Fibre Channel interface to the VSAN database vsan database vsan 4 interface vfc 1 exit Step 4: Configure the Ethernet interface to operate in trunk mode. Also configure the interface with the FCoE VSAN and any data VLANs required by the host. Configure the spanning-tree port type as trunk edge. interface Ethernet 1/3 switchport mode trunk switchport trunk allowed vlan 148,304 spanning-tree port type edge trunk no shut Procedure 8 Verify FCoE Connectivity Step 1: Use the show interface command to verify the status of the virtual Fibre Channel interface. The interface should now be up as seen below if the host is properly configured to support the CNA. Host configuration is beyond the scope of this guide. Please see CNA documentation for specific host drivers and configurations. dc3-5k-1# show interface vfc 1 vfc1 is trunking (Not all VSANs UP on the trunk) Bound interface is Ethernet1/3 Hardware is Virtual Fibre Channel Port WWN is 20:00:00:05:73:ab:27:3f Admin port mode is F, trunk mode is on snmp link state traps are enabled Port mode is TF Port vsan is 4 Trunk vsans (admin allowed and active) (1,4) Trunk vsans (up) (4) Trunk vsans (isolated) () Trunk vsans (initializing) (1) 1 minute input rate 0 bits/sec, 0 bytes/sec, 0 frames/sec 1 minute output rate 0 bits/sec, 0 bytes/sec, 0 frames/sec 28 frames input, 3552 bytes 0 discards, 0 errors 28 frames output, 3456 bytes 0 discards, 0 errors last clearing of “show interface” counters never Interface last changed at Thu Oct 21 03:34:44 2010
  • 38. 34Storage InfrastructureAugust 2011 Series Step 2: On the Cisco Nexus 5500 Series switches, display the FCoE addresses. dc3-5k-1# sh fcoe database --------------------------------------------------------------------- INTERFACE FCID PORT NAME MAC ADDRESS --------------------------------------------------------------------- vfc1 0x050b00 21:00:00:c0:dd:11:28:29 00:c0:dd:11:28:29 Step 3: The addresses appear in the current Fiber Channel login database on the Cisco MDS 9100 Series switch. The first line below is the Cisco Nexus 5548 Series switch. The second ID is the host on the vfc 1 interface. p3-mds9148-1# sh flogi da ------------------------------------------------------------------------ INTERFACE VSAN FCID PORT NAME NODE NAME ------------------------------------------------------------------------ port-channel 256 1 0xb41300 25:00:00:05:73:ab:27:00 20:01:00:05:73:ab:27:01 port-channel 256 4 0x050b00 21:00:00:c0:dd:11:28:29 20:00:00:c0:dd:11:28:29 Step 4: The Fiber Channel name server database differentiates the Cisco Nexus 5548 Series switch WWN from the actual host WWN. The switch appears as type NPV and the host as expected will show up as an initiator. p3-mds9148-1# show fcns database VSAN 4: ------------------------------------------------------------------------ FCID TYPE PWWN (VENDOR) FC4-TYPE:FEATURE 0x050600 N 0x050b00 N 21:00:00:c0:dd:11:28:29 (Qlogic) scsi-fcp:init [p3-c210-1-cna-a] Zoning and device aliases are configured as in the Fibre Channel section. Note: Much of the configuration of the Cisco Nexus 5000 Series switch can also be done from within Device Manager; however, Device Manager cannot be used to configure VLANs or Ethernet Trunks on the Cisco Nexus 5000 Series switches.
  • 39. 35Network SecurityAugust 2011 Series Network Security Business Overview In today’s business environment, the data center contains some of the organization’s most valuable assets. Customer and personnel records, financial data, email stores, and intellectual property must be maintained in a secure environment to assure confidentiality and availability. Additionally, portions of networks in specific business sectors may be subject to industry or government regulations that mandate specific security controls to protect customer or client information. To protect the valuable electronic assets located in the data center, network security ensures the facility is protected from automated or human- operated snooping and tampering, and it prevents compromise of hosts by resource-consuming worms, viruses, or botnets. Technology Overview While worms, viruses, and botnets pose a substantial threat to centralized data, particularly from the perspective of host performance and availability, servers must also be protected from employee snooping and unauthorized access. Statistics have consistently shown that the majority of data loss and network disruptions have occurred as the result of human-initiated activity (intentional or accidental) carried out within the boundaries of the business’s network. To minimize the impact of unwanted network intrusions, firewalls and intrusion prevention systems (IPSs) should be deployed between clients and centralized data resources. Figure 7. Secure Data Center Overview and Logical Topology The Data Center Security design employs a pair of Cisco Adaptive Security Appliance (ASA) 5585-X with SSP-20 firewall modules and matching IPS Security Service Processors (SSP) installed. This configuration provides up to 10 Gbps of firewall throughput. The IPS and firewall SSPs deliver 3 Gbps of concurrent throughput. All of the ports on modules installed in the ASA chassis are available to the Firewall SSP, which offers a very flexible configuration. One 10-Gbps link offers connectivity to the LAN-facing side of the firewall, and a second 10-Gbps link offers connectivity to the DC-facing side of the firewall The second link is configured as a VLAN trunk in order to support access to multiple secure VLANs in the data center. The pair of ASAs is configured for firewall active-standby high availability to ensure that access to the data center is minimally impacted by outages caused by software maintenance or hardware failure. When ASA appli- ances are configured in active-standby mode, the standby appliance does not handle traffic, so the primary device must be sized to provide enough throughput to address connectivity requirements between the core and the data center. While the IPS modules do not actively exchange state traffic, they participate in the firewall appliances’ active/standby status by way of reporting their status to the firewall’s status monitor. A firewall failover will occur if the IPS module becomes unavailable.
  • 40. 36Network SecurityAugust 2011 Series The Cisco ASAs are configured in routing mode; as a result, the secure network must be in a separate subnet from the client subnets. IP subnet allocation would be simplified if the Cisco ASA were deployed in transparent mode; however, hosts might inadvertently be connected to the wrong VLAN, where they would still be able to communicate with the network, incurring an unwanted security exposure. The data center IPSs monitor for and mitigate potential malicious activ- ity that is otherwise allowed by the security policy defined on the ASAs. The IPS sensors are deployed in promiscuous intrusion detection system (IDS) mode so that they only monitor and log abnormal traffic. As a more advanced option, they can be deployed in line to fully engage their intrusion prevention capabilities, wherein they mitigate traffic that violates the config- ured policy. Security Topology Design The SBA secure data center design provides two secure VLANs in the data center. The number of secure VLANs is arbitrary; the design is an example of how to create multiple secured networks to host services that require separation. High-value applications, such as Enterprise Resource Planning and Customer Relationship Management, may need to be separated from other applications in their own VLAN. Figure 8. Deploy Multiple Secure Data Center VLANs As another example, services that are indirectly exposed to the Internet (via a web server or other application servers in the Internet Demilitarized Zone) should be separated from other services, if possible, to prevent Internet- borne compromise of some servers from spreading to other services that are not exposed. Traffic between VLANs should be kept to a minimum, unless your security policy dictates service separation. Keeping traffic between servers intra-VLAN will improve performance and reduce load on network devices. Security Policy Development A business should have an IT security policy as a starting point in defining its firewall policy. If there is no companywide security policy, it will be very difficult to define an effective policy for the business while maintaining a secure computing environment. To effectively deploy security between the various functional segments of a business’s network, you should seek the highest level of detail possible regarding the expected network behaviors. If you have greater detail of the expectations, you will be better positioned to define a security policy that enables a business’s application traffic and performance requirements while optimizing security.
  • 41. 37Network SecurityAugust 2011 Series A detailed examination of regulatory compliance considerations exceeds the scope of this document; you should include industry regulation in your network security design. Noncompliance may result in regulatory penalties such as fines or business-activity suspension. Reader Tip Network security policies can be broken down into two basic categories: “whitelist” policies and “blacklist” policies. A whitelist security policy offers a higher implicit security posture, blocking all traffic except that which must be allowed (at a sufficiently granular level) to enable applications. Whitelist policies are generally better positioned to meet regulatory requirements because only traffic that must be allowed to conduct business is allowed. Other traffic is blocked and does not need to be monitored to assure that unwanted activity is not occurring, reducing the volume of data that will be forwarded to an IDS or IPS, as well as minimizing the number of log entries that must be reviewed in the event of an intrusion or data loss. Figure 9. Whitelist Security Policy Inversely, a blacklist policy only denies traffic that specifically poses the greatest risk to centralized data resources. A blacklist policy is simpler to maintain and less likely to interfere with network applications; a whitelist policy is the best-practice option if you have the opportunity to examine the network’s requirements and adjust the policy to avoid interfering with desired network activity. Figure 10. Blacklist Security Policy Cisco ASA Firewalls implicitly end access-lists with a deny-all rule. Blacklist policies include an explicit rule, prior to the implicit deny-all rule, to allow any traffic that is not explicitly allowed or denied. Whether you choose a whitelist or blacklist policy basis, consider IDS or IPS deployment for controlling malicious activity on otherwise trustworthy appli- cation traffic. At a minimum, IDS or IPS can aid with forensics to determine the origin of a data breach. In the best circumstances, IPS may be able to detect and prevent attacks as they occur and provide detailed information to track the malicious activity to its source. IDS or IPS may also be required by the regulatory oversight to which a network is subject (for example, PCI 2.0). A blacklist policy that blocks high-risk traffic offers a lower-impact but less-secure option (compared to a whitelist policy) in cases where a detailed study of the network’s application activity is impractical, or if the network availability requirements prohibit application troubleshooting. If identifying all of the application requirements is not practical, you can apply a blacklist policy with logging enabled, so that a detailed history of the policy is gener- ated. With network-behavior details in hand, development of a whitelist policy is much easier and more effective.
  • 42. 38Network SecurityAugust 2011 Series Deployment Details Data Center Security Deployment is addressed in three discrete processes: • Cisco ASA Firewall connectivity, which establishes network connections between the Cisco ASA Firewalls and the Cisco Catalyst core. • Cisco ASA Firewall policy discussion and configuration, which outlines the process needed to identify security policy needs and apply a configuration to meet requirements. • Cisco IPS connectivity and policy configuration, which integrates con- nectivity and policy configuration in one process. Configure Cisco ASA Firewall Connectivity 1. Configure LAN-facing connectivity 2. Configure Data Center-facing connectivity 3. Configure Cisco ASA Dynamic Routing 4. Configure the ASAs for High Availability Process Complete the following procedures to configure connectivity between the Cisco ASA chassis and the core. Note that this design describes a configu- ration wherein both sides (LAN-side and DC-side) of the firewall connect to the core, to provide a central VLAN fanout point for all of the Data Center VLANs. Procedure 1 Configure LAN-facing connectivity One 10-Gigabit Ethernet link connects the LAN-facing interface of each ASA chassis to the core Cisco Catalyst VSS. This interface is then assigned an active or standby IP address (respective to the active or standby firewall). All interfaces on Cisco ASA have a security-level setting. The higher the number, the more secure the interface, relative to other interfaces. Inside interfaces are typically assigned 100, the highest security level. Outside interfaces are generally assigned 0. By default, traffic can pass from a high-security interface to a lower-security interface. In other words, traf- fic from an inside network is permitted to an outside network, but not conversely. Step 1: Configure the LAN-side Cisco ASA interfaces to connect to the Cisco Catalyst VSS and assign a security level of ‘0’, as the LAN-facing side of the firewall is the outside, lower-security interface: interface TenGigabitEthernet0/9 description LAN-side core-c6504 T*/4/6 nameif DCVLAN153 security-level 0 ip address 10.10.53.126 255.255.255.128 standby 10.10.53.125 no shutdown Step 2: Define the LAN-side VLAN on the Cisco Catalyst VSS core switch: vlan 153 name Secure-DC-outside no shutdown Step 3: For the LAN-side connectivity to the Cisco ASA chassis, configure the Cisco Catalyst VSS Switch Virtual Interface (SVI) : interface Vlan153 description Secure DC outside ip address 10.10.53.1 255.255.255.128 Step 4: Add the LAN-side configuration to the Cisco Catalyst VSS ports that connect to the Cisco ASA security appliances. Define the switchports as access ports, and assign the appropriate QoS behavior: interface TenGigabitEthernet1/4/6 description Access port for DC-5585a switchport switchport access vlan 153 switchport mode access spanning-tree portfast edge mls qos trust dscp macro apply EgressQoS-Gig ! interface TenGigabitEthernet2/4/6 description Access port for DC-5585b