Sie sind auf Seite 1von 56

Softw a vSph re Switch ere an fo d vClo r VMware ud Dir ector

Cisco Nexus 1010 Overview and Deployment


Sal Lopez Technical Marketing Engineer SAVBU

Nexus 1000V Public Webinar Series


Date
22-Mar 5-Apr 19-Apr 3-May 17-May

Business Sessions
Nexus 1000V Family Overview and Update Virtual Network Services (vPath, NAM, vWAAS) Virtual Security Gateway Introduction Journey to the Cloud w/ N1KV: vCloud Director & Long Distance vMoNon Secure VDI with Nexus1000V & VSG

Date
29-Mar 12-Apr 26-Apr 10-May 24-May

Technical Sessions
Nexus 1000V New Features and InstallaNon Overview Nexus1010 InstallaNon & Upgrade Virtual Security Gateway InstallaNon and Basic ConguraNon Nexus 1000V Advanced ConguraNon Nexus 1000V TroubleshooNng

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Nexus 1000V My Community


www.cisco.com/go/1000vcommunity

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Nexus 1000V My Community


www.cisco.com/go/1000vcommunity

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Nexus 1000V My Community


www.cisco.com/go/1000vcommunity

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Nexus 1000V Screencasts

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Nexus 1000V Screencasts

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Nexus 1000V Architecture


Comparison to a Physical Switch

Modular Switch
Supervisor-1 Back Plane Supervisor-2 Linecard-1 Linecard-2

Linecard-N

Server 1
N1K

Server 2

Server 3
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Nexus 1000V Architecture


Moving to a Virtual Environment

Modular Switch
Supervisor-1 Back Plane Supervisor-2 Linecard-1 Linecard-2

Linecard-N

ESX

ESX

ESX

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

10

Nexus 1000V Architecture


Supervisors Virtual Supervisor Modules (VSMs)
Virtual Appliance
VSM1

VSM2

Modular Switch
Supervisor-1 Back Plane Supervisor-2 Linecard-1 Linecard-2

Linecard-N

ESX

ESX

ESX

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

11

Nexus 1000V Architecture


Linecards Virtual Ethernet Modules (VEMs)
Virtual Appliance
VSM1

VSM2

Modular Switch
Supervisor-1 Back Plane Supervisor-2 Linecard-1 Linecard-2

Linecard-N
VEM-1 VEM-2 VEM-N

ESX

ESX

ESX

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

12

Nexus 1000V Architecture


VSM + VEMs = Nexus 1000V Virtual Chassis
Virtual Appliance
VSM1

VSM2

64 VEMs per 1000V

(connected by L2 or L3)
L2 Mode
VEM-1

2K vEths per 1000V Multiple 1000Vs can be

created per vCenter

VEM-2

L3 Mode

200+ vEth ports per VEM

VEM-N

ESX
VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module

ESX

ESX

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

13

Nexus 1000V Architecture


Customer Request: Host VSMs on a Physical Appliance
Virtual Appliance
VSM1

Physical Appliance?

VSM2

L2 Mode
200+ vEth ports per VEM 64 VEMs per 1000V 2K vEths per 1000V Multiple 1000Vs can be created per vCenter

VEM-1

VEM-2

L3 Mode

VEM-N

ESX

ESX

ESX

VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

14

Nexus 1000V Architecture


VSMs hosted on a Physical Appliance: Nexus 1010
Virtual Appliance Nexus 1010
VSM-A1

VSM-A4
VSM-B4

Up to 4 VSMs per Nexus 1010 Nexus 1010s deployed in


L2 Mode L3 Mode

VSM-B1

redundant pair

200+ vEth ports per VEM 64 VEMs per 1000V 2K vEths per 1000V Multiple 1000Vs can be created per vCenter

VEM-1

VEM-2

VEM-N

ESX

ESX

ESX

VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

15

Embedding Intelligence for Virtual Services


vPath Virtual Service Datapath
Virtual Appliance vWAAS VSG VSM

vPath L2 Mode
VSG Virtual Security Gateway for 1000v vWAAS Virtual WAAS

L3 Mode

Virtual Service Datapath

vPath
Traffic Steering
VEM-2
vPath

VEM-1
vPath

Fast -Path Offload Nexus 1000V ver 1.4

ESX

ESX

& above

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

16

Nexus 1010 Hosting Platform for Services


Virtual Appliance
vWAAS VSG
VSM-A1

Nexus 1010
VSM-A4 NAM

VSM-B1

VSM-B4

NAM

vPath L2 Mode
VEM-1
vPath

VSG Virtual Security Gateway for 1000v vWAAS Virtual WAAS

L3 Mode
VEM-2
vPath

Virtual Service Datapath

ESX
*VSG on 1010 target: 2Q CY11

ESX

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

17

Cisco Nexus 1010 Overview and Deployment


Sal Lopez Technical Marketing Engineer SAVBU

Agenda
Nexus 1010 Hardware and Software Nexus 1000V VSM connectivity on Nexus 1010 Nexus 1010 Network Integration and Data Center Design Nexus 1010 Virtual Service Blade Configuration and Verification Nexus 1010 Upgrade Process

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

19

Nexus 1010 Hardware and Software


Software Switch fo r vSphere 4.0 and 4 .1

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

20

Nexus 1010 Hardware Configuration


Based on UCS Physical Appliance 2 x Intel X5650- 2.66GHz, 6 core 16 GB RAM 2 x 500GB SATA-II HDD 1 x Quadport GE NIC Card 1 x Serial Port 1 x Rail-Kit

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

21

Nexus 1010 Ports and Components


Cisco Integrated Management Controller for lights out, out of band management (use KVM cable to setup), similar to CMP for other NX-OS switches 6 Gigabit Ethernet ports (2 LOM for management/control, 4 on PCIe card)

1 3 5 7

Power supply (one) USB 2.0 connectors (two) Video connector (15-pin VGA) Gigabit Ethernet ports (3 to 6)

2 4 6 8

CIMC port (RJ-45) 10/100 Mbps Serial connector (DB9) Gigabit Ethernet Ports (1 and 2) Standard-profile PCIe card slot (not used)

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

22

Nexus 1010 Virtual Service Blade


The Nexus 1010 comes with a new concept of Virtual Services called Virtual Service Blade (VSB) Shipping today: VSM virtual service blade NAM virtual service blade VSG, DCNM in future releases
Network Analysis Module*

Nexus 1000V VSM

Nexus 1010 Manager


N1K 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

* Optional virtual service blade add-on

23

Nexus 1010 Scalability

Network Analysis Module

Nexus 1000V VSM

Nexus 1000V VSM

Nexus 1000V VSM

Nexus 1000V VSM

Nexus 1010 Manager


Nexus 1010 Manager: Cisco management experience Manages a total of 5 virtual service blades (ie. 4 VSMs and 1 NAM) Each VSM can manage up to 64 VEMs (256 total VEMs)
N1K 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

24

Feature Comparison

VSM as VM Nexus 1000V features and scalability VEM running on vSphere 4 Enterprise Plus NX-OS high availability of VSM Software-only deployment Installation like a standard Cisco switch Network Team owns/manages the VSM VSM Isolation from production VM environment in case of outage Least number of steps to deploy VSM

VSM on Nexus 1010

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

25

Nexus 1010 Managed By Network Team


VSM planned and deployed on networking equipment Access to console consistent with existing network gear (no additional software needed) Troubleshoot via Cisco NX-OS CLI Nexus 1010 platform can be managed via SNMP Secured by AAA

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

26

Nexus 1010 High Availability


Process HA at NX-OS level
Modular OS based on Linux

Virtual Service Blade redundancy


Nexus 1010 automation and state synchronization Create primary VSM once and secondary VSM gets created for you

Chassis Level Redundancy


Deployed in pairs Same mechanisms used as redundant supervisors on switches Prevent split brain scenario with CIMC as backup connection

Network Level Redundancy


Flexible network integration options with traffic isolation, trunking and LACP

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

27

Nexus 1000V VSM connectivity on Nexus 1010


Software Switch fo r vSphere 4.0 and 4 .1

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

28

VSM to VEM Communications


Two virtual interfaces are used to communicate between the VSM and VEM
VM VM VM VM

L2 Network
Control VLAN Packet VLAN

Control VLAN Extend the usual backplane of the switch over the network Carries low level messages to ensure proper configuration of the VEM. Maintains a 1 sec heartbeat with the VSM to the VEM (timeout of 6 seconds) Maintains syncronization between primary and secondary VSMs Packet VLAN For control plane processing like CDP, IGMP snooping, or stat collections like SNMP, Netflow
Cisco Confidential

N1K

Nexus 1000V VSM On Nexus 100

2011 Cisco and/or its affiliates. All rights reserved.

29

Layer 2 connectivity of the VSM and VEM

VM

VM

VM

VM

For L2 deployment, Control and Packet VLAN needs to be configured end to end to allow communication between the VSM and the VEM If those VLANs are not configured end to end the VEM will not show up even if it looks like it is in vCenter

L2 Network
Control VLAN Packet VLAN

Control VLAN and Packet VLAN needs to be configured as system VLAN on the uplink port-profile Can use 1 or 2 VLANs for Control/Packet traffic

Nexus 1000V VSM On Nexus 100


N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

30

Layer 3 connectivity of the VSM and VEM


VM VM VM VM

For L3 Control, L2 adjacency for Control and Packet not required

L3 Network

VSM uses a svs mode type layer 3 using either the control0 Interface or the mgmt0 interface
User can specify an IP address for control0 to use a separate network for VEM VSM communication svs-domain svs mode L3 interface (control0 | mgmt0)

Nexus 1000V VSM On Nexus 100


N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

31

Nexus 1010 Network Integration and Data Center Design


Software Switch fo r vSphere 4.0 and 4 .1

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

32

Nexus 1010 Network Integration Design

There are 4 uplink options to connect the Nexus 1010 to the Network This will influence how the control, packet, management and data information will be connected to rest of the network

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

33

Nexus 1010 Network Integration Uplink Type 1


Nexus 1010 uplink type 1:Ports 1 and 2 carry Management, Control and Data traffic

Sample Topology: Common L2 Network with upstream switch N5K/N2K


Upstream Switch Access Ports:

Setup 1

Setup 2

interface ethernet 101/1/1-2 !-- multiple vlans trunked across link switchport mode trunk !--only allow mgmt, control and data vlans switchport trunk allowed vlan 170,250-251 !-- enable portfast edge spanning-tree port type edge trunk
Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 Eth2 Eth1

Active VSM

HA-Standby VSM

Active VSM

HA-Standby VSM

Nexus 1010 Eth1: active (forwarding) Eth2: standby (not forwarding) Total Bandwidth per device is 1Gbps
N1K

N1010-1 Active Chassis

N1010-2 HA-Standby Chassis

N1010-1 Active Chassis

N1010-2 HA-Standby Chassis

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

34

Nexus 1010 Network Integration Uplink Type 2


Nexus 1010 uplink type 2:Ports 1 and 2 carry Management and Control; Ports 3-6 carry Data traffic Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth
Sample Topology: Common L2 Network, upstream switch N5K/N2K with vPC
Upstream LACP Ports (both switches):

interface ethernet 101/1/2, 101/1/4 !-- multiple vlans trunked across link switchport mode trunk !-- only allow mgmt, control and data vlans switchport trunk allowed vlan 251 !-- enable portfast edge spanning-tree port type edge trunk !-- add interface to port-channel, this is a vpc channel-group 1010 mode active !-- this is a unique vpc for N1010-1 interface port-channel 1010 vpc 1010 **Config must be repeated for N1010-2 on interfaces 101/1/5-6
E1

1 6 5 1 2 3 4 2 3 4 5 6

E2 E3 E4

E5

E6

E1

E2 E3 E4

E5

E6

Active VSM

HA-Standby VSM

Nexus 1010 Eth1: active (forwarding) Eth2: standby (not forwarding) Eth3-6:forwarding in LACP bundle Total Bandwidth per device is 5Gbps
N1K 2011 Cisco and/or its affiliates. All rights reserved.

N1010-1 Active Chassis

N1010-2 HA-Standby Chassis

Cisco Confidential

35

Nexus 1010 Network Integration Uplink Type 3


(Most Common for VSM Deployment)
Nexus 1010 uplink type 3:Ports 1 and 2 carry Management; Ports 3-6 carry Control and Data traffic Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth
Sample Topology: Common L2 Network, upstream switch N5K/N2K with vPC
Upstream LACP Ports (both switches):

interface ethernet 101/1/2, 101/1/4 !-- multiple vlans trunked across link switchport mode trunk !-- only allow mgmt, control and data vlans switchport trunk allowed vlan 250-251 !-- enable portfast edge spanning-tree port type edge trunk !-- add interface to port-channel, this is a vpc channel-group 1010 mode active !-- this is a unique vpc for N1010-1 interface port-channel 1010 vpc 1010
**Config must be repeated for N1010-2 on interfaces 101/1/5-6
E1

1 6 5 1 2 3 4 2 3 4 5 6

E2 E3 E4

E5

E6

E1

E2 E3 E4

E5

E6

Active VSM

HA-Standby VSM

Nexus 1010 Eth1: active (forwarding) Eth2: standby (not forwarding) Eth3-6:forwarding in LACP bundle Total Bandwidth per device is 5Gbps
N1K 2011 Cisco and/or its affiliates. All rights reserved.

N1010-1 Active Chassis

N1010-2 HA-Standby Chassis

Cisco Confidential

36

Nexus 1010 Network Integration Uplink Type 4


Nexus 1010 uplink type 4:Ports 1 and 2 carry Management; Ports 3 and 4 carry Control, Ports 5 and 6 carry Data traffic

Sample Topology: Common L2 Network with upstream switch N5K/N2K Upstream Switch Access Ports: interface ethernet 101/1/1 !-- multiple vlans trunked across link switchport mode trunk !-- only allow mgmt, control and data vlans switchport trunk allowed vlan 170 !-- enable portfast edge spanning-tree port type edge trunk
E1 E2 E3 E4 E5 E6 E1 E2 E3 E4 E5 E6

Nexus 1010 Eth1: active (forwarding) Eth2: standby (not forwarding) Eth3: active (forwarding) Eth4: standby (not forwarding) Eth5: active (forwarding) Eth6: standby (not forwarding) Total Bandwidth per device is 3Gbps
N1K 2011 Cisco and/or its affiliates. All rights reserved.

Active VSM

HA-Standby VSM

N1010-1 Active Chassis

N1010-2 HA-Standby Chassis

Cisco Confidential

37

Nexus 1010 Network Connectivity Summary


Uplink Option 1 Description Ports 1-2 Carry All Management, Control, and Data Traffic Really easy to deploy Ports 1-2 Carry Management and Control, Ports 3-6 Carry Data Traffic Most of the bandwidth available for other Virtual Service Blades (ie. NAM) Ports 1-2 Carry Management, Ports 3-6 Carry Control and Data Traffic Most bandwidth for VSM Virtual Service Blades and other VSBs Ports 1-2 Carry Management, Ports 3-4 Carry Control, Ports 5-6 Carry Data Traffic Clear separation of all the different types of traffic
2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Option 2

Option 3

Option 4

N1K

38

Nexus 1010 in the Access Layer


Core

L2 Control for VSM to VEM is easier here


All servers/switches below need Control/Packet VLANs L2 Network Services such as VSG (future)
Aggregation

L3 L2

Access

Nexus 1000V VSM VSB

L3 Control for VSM possible HA pair can be dedicated per POD or customer
More VSBs available per POD or customer
Compute/Virtual Access

Nexus 1000V VEM

ESXi

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

39

Nexus 1010 in the Aggregation Layer


L3 Control for VSM to VEM is more flexible here
IP routing should be robust Suitable for long distance (future)
Core

Aggregation

Nexus 1000V VSM VSB

L3 L2

L2 Control for VSM possible HA pair can be shared among PODs or customers
If using L3, there should be IP connectivity to VSM VSB from each POD

Access

Compute/Virtual Access

Nexus 1000V VEM

ESXi

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

40

Nexus 1010 and VSB Configuration


Software Switch fo r vSphere 4.0 and 4 .1

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

41

Nexus 1010 Initial Setup - CIMC

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

42

Nexus 1010 Initial Configuration


Access Console via Telnet or Serial over LAN Setup System Admin Account and Basic System Configuration
telnet 172.25.182.99 2005 Trying 172.25.182.99... Connected to 172.25.182.99. Escape character is '^]' ---- System Admin Account Setup ---Enter the password for "admin": Confirm the password for "admin": Enter HA role[primary/secondary]: primary Enter network-uplink type <1-4>: 1. Ports 1-2 carry all management, control and data vlans 2. Ports 1-2 management and control, ports 3-6 data 3. Ports 1-2 management, ports 3-6 control and data 4. Ports 1-2 management, ports 3-4 control, ports 5-6 data 3 Enter control vlan <1-3967, 4048-4093>: 250 Enter the domain id<1-4095>: 201 Enter management vlan <1-3967, 4048-4093>: 170 Saving boot configuration. Please wait... [########################################] 100%
N1K 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

HA Role for each chassis

Network uplink type for network integration

Domain ID must be unique Mgmt VLAN is shared with VSM


43

VSM VSB Installation Steps on Nexus 1010


Create VSM as VSB on N1010 Register certificate as plug-in in vCenter Define ethernet and vethernet port-profile
Includes VLANs and physical settings to upstream switch For mac-pinning, upgrade feature level

Install VEM using vCenter

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

44

Creating and Configuring a VSM VSB


tme-1010-1(config)# virtual-service-blade VSM-1010-1

Create and name the VSB

tme-1010-1(config-vsb-config)# virtual-service-blade-type new nexus-1000v.4.0.4.SV1.3a.iso tme-1010-1(config-vsb-config)# interface control vlan 251 tme-1010-1(config-vsb-config)# interface packet vlan 252 tme-1010-1(config-vsb-config)# enable Enter vsb image: [nexus-1000v.4.0.4.SV1.3.iso] Enter domain id[1-4095]: 203 Management IP version [V4/V6]: [V4] Enter Management IP address: 10.29.170.84 Enter Management subnet mask: 255.255.255.0 IPv4 address of the default gateway: 10.29.170.1 Enter HostName: VSM-1010-1 Enter the password for 'admin': P@ssw0rd1 tme-1010-1(config-vsb-config)#no shut
N1K 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

One command deploys both Primary and Secondary VSM This is done only for HA aware VSBs

45

VSB Control and HA Verification


The Network Admin has total control over the VSB deployment
tme-1010-1# show virtual-service-blade virtual-service-blade AV2-1010-VSM Description: Slot id: Host Name: Management IP: VSB Type Name : Interface: Interface: Interface: Interface: Ramsize: Disksize: Heartbeat: 3 132670 2048 2 AV2-VSM-1 10.29.170.254 VSM-1.0 control management packet internal vlan: vlan: vlan: vlan: 254 170 255 NA

Verify VSB IP address and Control, Mgmt and Packet VLANs

HA Admin role: Primary HA Oper role: ACTIVE Status: Location: SW version: VSB POWERED ON PRIMARY 4.0(4)SV1(3a)

HA Admin role: Secondary HA Oper role: STANDBY Status: Location: SW version: VSB Info: Domain ID : 401
N1K 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

VSB POWERED ON SECONDARY 4.0(4)SV1(3a)

VSBs deployed in an HA pair by default (result of enable command).

46

Nexus 1010 and VSB Network Verification


tme-1010-1# show network-uplink type Administrative topology id: 3 Operational topology id: 3 tme-1010-1# show network summary ----------------------------------------------------------------------Port State Speed MTU

Configured and actual operating topology are shown

----------------------------------------------------------------------GigabitEthernet1 GigabitEthernet2 GigabitEthernet3 GigabitEthernet4 GigabitEthernet5 GigabitEthernet6 PortChannel1 PortChannel2 VbEthernet1/1 VbEthernet1/2 VbEthernet1/3
N1K

up up up up up up up up up up up

1000 1000 1000 1000 1000 1000 1000 1000 1000 1000 1000

1500 1500 1500 1500 1500 1500 1500 1500 1500 1500 1500
Cisco Confidential

Po1 represents active/standby bundle between E1 and E2 Po2 represents the LACP bundle between E3-E6

2011 Cisco and/or its affiliates. All rights reserved.

47

NAM Virtual Blade on Nexus 1010


VM VM VM VM

Optimize Application Performance and Network Resources


Application Performance Monitoring Traffic Analysis and Reporting
Nexus 1000V VEM vSphere

Applications, Host, Conversations, VLAN, QoS, etc. Per-application, per-user traffic analysis

View VM-level Interface Statistics Packet Capture and Decodes Historical Reporting and Trending

ERSPAN
NAM Virtual Blade on Nexus 1010

vCenter

Nexus 1000V VSM


2011 Cisco and/or its affiliates. All rights reserved.

NetFlow

N1K

Cisco Confidential

48

Creating and Configuring a NAM VSB


N1010-1(config)# virtual-service-blade NAM-VSB N1010-1(config-vsb-config)# virtual-service-blade-type name NAM-1.0 N1010-1(config-vsb-config)# interface data vlan 180 N1010-1(config-vsb-config)# enable Enter vsb image: nam-app-x86_64.4-2-1-fc5.iso Enter Management IPV4 address: 10.29.180.99 Enter Management subnet mask: 255.255.255.0 IPv4 address of the default gateway: 10.29.180.1 Enter HostName: vNAM-1 Setting Web user/passwd will enable port 80. Enter[y|n]: [n] y Web User name: [admin] Web User password: P@ssw0rd N1010-1(config-vsb-config)# no shut

Data VLAN for Non-VSM VSBs

IP address for Web GUI administration

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

49

Access NAM VSB via Web GUI


Use the previously defined IP address and credentials

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

50

Nexus 1010 Upgrade Process


Software Switch fo r vSphere 4.0 and 4 .1

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

51

Upgrading the Nexus 1010 Appliance Software (1 of 2)


Download new ISO image from CCO Log into active N1010 via console Copy new image over to bootflash Use the install command
install nexus1010 bootflash:nexus-1010.4.2.1.SP1.2.iso

Save configuration Log into VSM VSB Switch over HA active VSM VSBs to active N1010

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

52

Upgrading the Nexus 1010 Appliance Software (2 of 2)

From N1010 CLI, reload standby when all active VSM VSBs are switched over to active
ie. reload module 2 if Secondary is standby

From withing VSM VSB CLI, switchover HA active VSBs to newly upgraded N1010 (originally standby from above) Reload the original active N1010
Non HA VSBs may experience disruption (NAM)

To upgrade VSM NX-OS, please follow N1KV upgrade procedure


Note: Must make Secondary VSM the active first

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

53

For More Information


See the following Resources Nexus 1010 Virtual Services Appliance Hardware Installation Guide Nexus 1010 Software Installation and Upgrade Guide Nexus 1010 Deployment Guide Nexus 1000V Configuration, Installation and Upgrade Guides NAM VSB Configuration Guide Nexus 1000V Webinar Series

N1K

2011 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

54

Sign up at: http://tinyurl.com/1000v-webinar


Date
22-Mar 5-Apr 19-Apr 3-May 17-May

Business Sessions
Nexus 1000V Family Overview and Update Virtual Network Services (vPath, vWAAS, NAM) Virtual Security Gateway Introduction Journey to the Cloud w/ N1KV: vCloud Director & Long Distance vMoNon Secure VDI with Nexus1000V & VSG

Date
29-Mar 12-Apr 26-Apr 10-May 24-May Web Sites

Technical Sessions
Nexus 1000V New Features and InstallaNon Overview Nexus1010 InstallaNon & Upgrade Virtual Security Gateway InstallaNon and Basic ConguraNon Overview Nexus 1000V Advanced ConguraNon Nexus 1000V TroubleshooNng

www.cisco.com/go/1000v www.cisco.com/go/nexus1010 www.cisco.com/go/vsg www.cisco.com/go/vnmc www.cisco.com/go/1000vcommunity (Preso and Q&A posted here)
N1K 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

55

Thank you.

Das könnte Ihnen auch gefallen