Professional Documents
Culture Documents
Virtual Support Day Best Practices Virtual Networking June 2012 PDF
Virtual Support Day Best Practices Virtual Networking June 2012 PDF
Karim Elatov
Technical Support Engineer, GSS
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
2
Virtual Network Overview - Physical to Virtual
Physical Virtual
Physical
Physical
Switch
Virtual Switch
Physical
Switch
Conventional access, distribution, core design Under the covers, virtual network same as physical
Design with redundancy for enhanced availability Access layer implemented as virtual switches
3
Virtual Switch Options
4
ESX Virtual Switch: Capabilities
MAC
address
NIC Teaming of Physical NIC(s) [uplink(s)] associated
assigned to
vnic
with vSwitches
VM0 VM1
Layer 2 - only forward frames VM <-> VM and VM <-
5
Distributed Virtual Switch
6
Port Groups
Template for one or more ports with a common
configuration
VLAN Assignment
Security
7
NIC Teaming for Availability and Load Sharing
NIC Team
algorithm)
Requirements:
Two or more NICs on same vSwitch
8
NIC Teaming Options
9
Cisco Nexus 1000v Overview
Things to remember:
10
Cisco Nexus 1000v Modules
VMware
VEMvSwitch Nexus VEM
VMware1000V vDS
vSwitch VMware
VEMvSwitch
VMware ESX VMware ESX VMware ESX
Nexus 1000V
Virtual Supervisor Module (VSM) Virtual Ethernet Module (VEM) Cisco Nexus 1000V Enables:
Virtual or Physical appliance running
Cisco OS (supports HA) Enables advanced networking Policy Based VM Connectivity
capability on the hypervisor Mobility of Network & Security
Performs management, monitoring, &
configuration Provides each VM with dedicated Properties
Tight integration with VMware Virtual switch port Non-Disruptive Operational Model
Center Collection of VEMs = 1 DVS
11
vSwitch Configurations
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
12
Cisco show run and show tech-support
interface Port-channel1
show tech-support switchport
switchport access vlan 100
switchport mode access
no ip address
!
interface GigabitEthernet1/1
switchport
switchport access vlan 100
switchport mode access
no ip address
channel-group 1 mode on
!
KB - Troubleshooting network issues with the Cisco show tech-support command (1015437)
13
Traffic Types on a Virtual Network
Virtual Machine Traffic
Traffic sourced and received from virtual machine(s)
Isolate from each other based on service level
vMotion Traffic
Traffic sent when moving a virtual machine from one ESX host to
another
Should be isolated
Management Traffic
Should be isolated from VM traffic (one or two Service Consoles)
If VMware HA is enabled, includes heartbeats
IP Storage TrafficNFS and/or iSCSI via vmkernel interface
Should be isolated from other traffic types
Fault Tolerance (FT) Logging Traffic
Low latency, high bandwidth
Should be isolated from other traffic types
How do we maintain traffic isolation without proliferating NICs? VLANs
14
Traffic Types on a Virtual Network, cont.
production management
vMotion storage
15
VLAN Tagging Options
EST External Switch Tagging VGT Virtual Guest Tagging VST Virtual Switch Tagging
VLAN
assigned in
Port Group
policy
External Physical
switch applies
VLAN tags VST is the best practice and
most common method
17
PVLAN Cost Benefit
W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B
PG PG PG PG PG PG PG PG PG PG PG PG
EtherChannel
Port trunking between two to eight
Active Fast Ethernet, Gigabit Ethernet, or 10 Gigabit Ethernet ports
19
Sample Link Aggregation Configuration
20
Failover Configurations
21
Spanning Tree Protocol (STP) Considerations
vSwitch
ESX vSwitch does not participate in Spanning Tree
and will not create loops with uplinks
ESX Uplinks will not block, always active (full use
vSwitch drops
BPDUs of all links)
Physical
Switches
Recommendations for Physical Network Config:
1. Leave Spanning Tree enabled on physical network
and ESX facing ports (i.e. leave it as is!)
Switches sending 2. Use portfast or portfast trunk on ESX facing
BPDUs every 2s to
construct and
ports (puts ports in forwarding state immediately)
maintain Spanning 3. Use bpduguard to enforce STP boundary
Blocked link Tree Topology
KB - STP may cause temporary loss of network connectivity when a failover or failback event occurs (1003804)
22
Tips & Tricks
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
23
Tips & Tricks
24
Tips & Tricks
Tip #2 NLB Multicast needs physical switch Manual ARP resolution of NLB
cluster. (KB 1006525)
Tip #4 - Beacon Probing and IP Hash DO NOT MIX (duplicate packets and port
flapping) (KB 1017612 & KB 1012819)
25
Tips & Tricks
Using 10GigE Ingress (into switch)
traffic shaping policy
control on Port Group
Variable/high High
b/w 2Gbps+ 1-2G b/w Low b/w
2x 10GigE common/expected
SC#2 10GigE CNAs or NICs
Possible Deployment Method
vSwitch Active/Standby on all Portgroups
Gbps
FCoE
10GE 10GE
FCoE
VMs sticky to one vmnic
10
SC/vmk ports sticky to other
Use Ingress Traffic Shaping
FCoE
to control traffic type per
Port Group
FCoE Priority Group
If FCoE, use
Best Practice: Ensure Drivers and Firmware are compatible forPriority
success
bandwidth reservation
Group
(in CNA config utility)
vSphere 4.1 supports up to (4) 10GigE NICs; 5.0 supports (8) reservation
bandwidth 10GigE NICs (on CNA
utility)
26
Troubleshooting Virtual Networks
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
27
Network Troubleshooting Tips
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
30
Whats New in vSphere 5?
NetFlow V5
LLDP (standard based link layer discovery protocol) support simplifies the
network configuration and management in non-Cisco switch environment.
Enhancements to the network I/O control (NIOC)
Support for vSphere replication traffic type; a new system traffic type that
carries replication traffic from one host to another.
31
Network Design Considerations
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
32
Network Design Considerations
How do you design the virtual network for
performance and availability but maintain isolation
between the various traffic types
(e.g. VM traffic, VMotion, and Management)?
Starting point depends on:
Number of available physical ports on server
Required traffic types
2 NIC minimum for availability, 4+ NICs
per server preferred
33
Example 1: Blade Server with 2 NIC Ports
Candidate Design:
SC vmkernel Team both NIC ports
Create one virtual switch
Create three port groups:
Portgroup3 Portgroup1 Portgroup2
VLAN 30 VLAN 10 VLAN 20
34
Example 2: Server with 4 NIC Ports
Candidate Design:
Create two virtual switches
Team two NICs to each vSwitch
SC vmkernel
vSwitch0 (use active/standby
Portgroup4
VLAN 40
Portgroup3
VLAN 30
Portgroup1
VLAN 10
Portgroup2
VLAN 20
for each portgroup):
vSwitch1 vSwitch0 Portgroup1: Service Console (SC)
Portgroup4: VM traffic #2
Active
Standby Use VLAN trunking
Note: Team over dvUplinks with vDS vmnic1 and vmnic3: Trunk VLANs 10, 20
35
Example 3: Server with 4 NIC Ports (Slight Variation)
Candidate Design:
Create one virtual switch
Create two NIC teams
SC vmkernel
vSwitch0 (use active/standby
Portgroup4
VLAN 40
Portgroup3
VLAN 30
Portgroup1
VLAN 10
Portgroup2
VLAN 20
for portgroups 1 & 2):
Portgroup1: Service Console (SC)
vSwitch0
Portgroup2: Vmotion
vmnic0 vmnic2 vmnic1 vmnic3
Portgroup4: VM traffic #2
Active
Standby
Use VLAN trunking
vmnic1 and vmnic3: Trunk VLANs 10, 20
Note: Team over dvUplinks with vDS
vmnic0 and vmnic2: Trunk VLANs 30, 40
36
Questions
37