Professional Documents
Culture Documents
Virtual Support Day Best Practices Virtual Networking June 2012 PDF
Virtual Support Day Best Practices Virtual Networking June 2012 PDF
Karim Elatov
Technical Support Engineer, GSS
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
2
Virtual Network Overview - Physical to Virtual
Physical Virtual
Physical
Physical
Switch
Virtual Switch
Physical
Switch
Conventional access, distribution, core design Under the covers, virtual network same as physical
Design with redundancy for enhanced availability Access layer implemented as virtual switches
3
Virtual Switch Options
4
ESX Virtual Switch: Capabilities
MAC
address
NIC Teaming of Physical NIC(s) [uplink(s)] associated
assigned to
vnic
with vSwitches
VM0 VM1
Layer 2 - only forward frames VM <-> VM and VM <-
5
Distributed Virtual Switch
6
Port Groups
Template for one or more ports with a common
configuration
• VLAN Assignment
• Security
7
NIC Teaming for Availability and Load Sharing
NIC Team
algorithm)
Requirements:
• Two or more NICs on same vSwitch
8
NIC Teaming Options
9
Cisco Nexus 1000v Overview
Things to remember:
10
Cisco Nexus 1000v Modules
VMware
VEMvSwitch Nexus VEM
VMware1000V vDS
vSwitch VMware
VEMvSwitch
VMware ESX VMware ESX VMware ESX
Nexus 1000V
Virtual Supervisor Module (VSM) Virtual Ethernet Module (VEM) Cisco Nexus 1000V Enables:
• Virtual or Physical appliance running
Cisco OS (supports HA) • Enables advanced networking • Policy Based VM Connectivity
capability on the hypervisor • Mobility of Network & Security
• Performs management, monitoring, &
configuration • Provides each VM with dedicated Properties
• Tight integration with VMware Virtual “switch port” • Non-Disruptive Operational Model
Center • Collection of VEMs = 1 DVS
11
vSwitch Configurations
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
12
Cisco ‘show run’ and ‘show tech-support’
interface Port-channel1
•‘show tech-support’ switchport
switchport access vlan 100
switchport mode access
no ip address
!
interface GigabitEthernet1/1
switchport
switchport access vlan 100
switchport mode access
no ip address
channel-group 1 mode on
!
KB - Troubleshooting network issues with the Cisco show tech-support command (1015437)
13
Traffic Types on a Virtual Network
Virtual Machine Traffic
• Traffic sourced and received from virtual machine(s)
• Isolate from each other based on service level
vMotion Traffic
• Traffic sent when moving a virtual machine from one ESX host to
another
• Should be isolated
Management Traffic
• Should be isolated from VM traffic (one or two Service Consoles)
• If VMware HA is enabled, includes heartbeats
IP Storage Traffic—NFS and/or iSCSI via vmkernel interface
• Should be isolated from other traffic types
Fault Tolerance (FT) Logging Traffic
• Low latency, high bandwidth
• Should be isolated from other traffic types
How do we maintain traffic isolation without proliferating NICs? VLANs
14
Traffic Types on a Virtual Network, cont.
production management
vMotion storage
15
VLAN Tagging Options
EST – External Switch Tagging VGT – Virtual Guest Tagging VST – Virtual Switch Tagging
VLAN
assigned in
Port Group
policy
External Physical
switch applies
VLAN tags VST is the best practice and
most common method
17
PVLAN Cost Benefit
W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B W2003EE-32-A W2003EE-32-B
PG PG PG PG PG PG PG PG PG PG PG PG
EtherChannel
•Port trunking between two to eight
•Active Fast Ethernet, Gigabit Ethernet, or 10 Gigabit Ethernet ports
19
Sample Link Aggregation Configuration
20
Failover Configurations
21
Spanning Tree Protocol (STP) Considerations
vSwitch
ESX vSwitch does not participate in Spanning Tree
and will not create loops with uplinks
• ESX Uplinks will not block, always active (full use
vSwitch drops
BPDUs of all links)
Physical
Switches
Recommendations for Physical Network Config:
1. Leave Spanning Tree enabled on physical network
and ESX facing ports (i.e. leave it as is!)
Switches sending 2. Use “portfast” or “portfast trunk” on ESX facing
BPDUs every 2s to
construct and
ports (puts ports in forwarding state immediately)
maintain Spanning 3. Use “bpduguard” to enforce STP boundary
Blocked link Tree Topology
KB - STP may cause temporary loss of network connectivity when a failover or failback event occurs (1003804)
22
Tips & Tricks
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
23
Tips & Tricks
24
Tips & Tricks
Tip #2 – NLB Multicast needs physical switch Manual ARP resolution of NLB
cluster. (KB 1006525)
Tip #4 - Beacon Probing and IP Hash DO NOT MIX (duplicate packets and port
flapping) (KB 1017612 & KB 1012819)
25
Tips & Tricks
Using 10GigE Ingress (into switch)
traffic shaping policy
control on Port Group
Variable/high High
b/w 2Gbps+ 1-2G b/w Low b/w
2x 10GigE common/expected
SC#2 • 10GigE CNAs or NICs
Possible Deployment Method
vSwitch • Active/Standby on all Portgroups
Gbps
FCoE
10GE 10GE
FCoE
• VMs “sticky” to one vmnic
10
• SC/vmk ports sticky to other
• Use Ingress Traffic Shaping
FCoE
to control traffic type per
Port Group
FCoE Priority Group
• If FCoE, use
Best Practice: Ensure Drivers and Firmware are compatible forPriority
success
bandwidth reservation
Group
(in CNA config utility)
vSphere 4.1 supports up to (4) 10GigE NICs; 5.0 supports (8) reservation
bandwidth 10GigE NICs (on CNA
utility)
26
Troubleshooting Virtual Networks
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
27
Network Troubleshooting Tips
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
30
What’s New in vSphere 5?
• NetFlow V5
• LLDP (standard based link layer discovery protocol) support simplifies the
network configuration and management in non-Cisco switch environment.
Enhancements to the network I/O control (NIOC)
• Support for vSphere replication traffic type; a new system traffic type that
carries replication traffic from one host to another.
31
Network Design Considerations
vSwitch Configurations
Tips & Tricks
Troubleshooting Virtual Networks
32
Network Design Considerations
How do you design the virtual network for
performance and availability but maintain isolation
between the various traffic types
(e.g. VM traffic, VMotion, and Management)?
• Starting point depends on:
• Number of available physical ports on server
• Required traffic types
• 2 NIC minimum for availability, 4+ NICs
per server preferred
33
Example 1: Blade Server with 2 NIC Ports
Candidate Design:
SC vmkernel • Team both NIC ports
• Create one virtual switch
• Create three port groups:
Portgroup3 Portgroup1 Portgroup2
VLAN 30 VLAN 10 VLAN 20
34
Example 2: Server with 4 NIC Ports
Candidate Design:
• Create two virtual switches
• Team two NICs to each vSwitch
SC vmkernel
• vSwitch0 (use active/standby
Portgroup4
VLAN 40
Portgroup3
VLAN 30
Portgroup1
VLAN 10
Portgroup2
VLAN 20
for each portgroup):
vSwitch1 vSwitch0 • Portgroup1: Service Console (SC)
• Portgroup4: VM traffic #2
Active
Standby • Use VLAN trunking
Note: Team over dvUplinks with vDS • vmnic1 and vmnic3: Trunk VLANs 10, 20
35
Example 3: Server with 4 NIC Ports (Slight Variation)
Candidate Design:
• Create one virtual switch
• Create two NIC teams
SC vmkernel
• vSwitch0 (use active/standby
Portgroup4
VLAN 40
Portgroup3
VLAN 30
Portgroup1
VLAN 10
Portgroup2
VLAN 20
for portgroups 1 & 2):
• Portgroup1: Service Console (SC)
vSwitch0
• Portgroup2: Vmotion
vmnic0 vmnic2 vmnic1 vmnic3
• Portgroup4: VM traffic #2
Active
Standby
• Use VLAN trunking
• vmnic1 and vmnic3: Trunk VLANs 10, 20
Note: Team over dvUplinks with vDS
• vmnic0 and vmnic2: Trunk VLANs 30, 40
36
Questions
37