SlideShare a Scribd company logo
1 of 47
How to Deploy VMware NSX with Cisco Infrastructure
Ron Fuller, VMware
Paul Mancuso, VMware
NET8364R
#NET8364R
Growing NSX Momentum
A rapid journey of customer adoption across industries
1700+ Customers
8 out of VMware’s
top 10 deals in Q216
included NSX
100% YoY
growth
Consistent year-to-year Q216
Security
Inherently secure infrastructure
Automation
IT at the speed of business
Application continuity
Data center anywhere
NSX customer use cases
Micro-segmentation
DMZ anywhere
Secure end user
IT automating IT
Multi-tenant infrastructure
Developer cloud
Disaster recovery
Cross cloud
Multi data center pooling
• This presentation may contain product features that are currently under development.
• This overview of new technology represents no commitment from VMware to deliver these
features in any generally available product.
• Features are subject to change, and must not be included in contracts, purchase orders, or
sales agreements of any kind.
• Technical feasibility and market demand will affect final delivery.
• Pricing and packaging for any new technologies or features discussed or presented have not
been determined.
Disclaimer
CONFIDENTIAL 4
Session Abstract
Many enterprises rely on both VMware vSphere and Cisco Nexus/UCS to build the foundation of
their data center infrastructure. While VMware NSX brings advanced network automation and
security capabilities to vSphere on any network infrastructure, this session will cover the NSX
design considerations specific to environments using Cisco Nexus switches for the physical
network, and Cisco UCS for the vSphere compute resources. This session will also show how to
run NSX while utilizing the underlay functionality of Cisco ACI. The session will provide a review
of the most important topics from the two VMware NSX + Cisco Nexus/ACI design guides already
published, while adding additional “lessons learned” from real deployments in the field since
those publications.
CONFIDENTIAL 5
Session Goals
• Session is a complement to the NSX & Cisco Design Guide available here and the
Deploying NSX with Cisco ACI design guide available here
• Understand how to implement a Nexus and ACI based design with NSX
• Covers both Cisco Nexus 9K in NX-OS mode and ACI mode
CONFIDENTIAL 6
Ron Fuller
• Staff Systems Engineer – NSBU
• Cisco Certified Internetwork Expert (CCIE)
#5851 Emeritus (R&S/Storage)
• More than 20 years of networking experience
• 9 Years at Cisco – SE/CSE/Data Center
TSA/TME
• CiscoPress Published Author
• VMwarePress Published Author
CONFIDENTIAL 7
Paul Mancuso
Technical Product Manager – NSBU
• VCDX#159
• VCIX-NV
• VCI
• CCSI
• CCNP; CCNP Data Center
• MCSE
• CISSP
• 25 years of networking experience
• Author of 5 books
• Author of over 3 dozen courses on Cisco and Microsoft
CONFIDENTIAL 8
Agenda
9
1 NSX Architecture
2 NSX Connectivity Requirements
3 Nexus Switching Connectivity
4 ACI Fabric Connectivity
5 Deep Dive on NSX Cluster Connectivity
6 Summary & Question
CONFIDENTIAL
Provides
11
A Faithful Reproduction of Network & Security Services in Software
Management
APIs, UI
Load
Balancing
Policies,
Groups, Tags
Activity Monitoring
Switching ECMP Connectivity to
Physical Networks
DLR
Reference Architecture NET7857R & NET7858R
VPN ServicesFirewall
CONFIDENTIAL
Cloud Consumption
Data Plane
ESXi Hypervisor Kernel Modules
Distributed Services
• High – Performance Data Plane
• Scale-out Distributed Forwarding Model
Management Plane
NSX Manager
• Single configuration portal
• REST API entry-point
Control Plane
NSX Controller
• Manages Logical networks
• Control-Plane Protocol
• Separation of Control and Data Plane
…
…
FirewallDistributed
Logical Router
Logical
Switch
Edge
• Self Service Portal
• vRealize Automation, OpenStack, Custom
NSX Logical Router
Control VM
NSX Architecture and Components
CONFIDENTIAL 12
Agenda
CONFIDENTIAL 13
1 NSX Architecture
2 NSX Connectivity Requirements
3 Nexus Switching Connectivity
4 ACI Fabric Connectivity
5 Deep Dive on NSX Cluster Connectivity
6 Summary & Question
14
Compute Cluster Consolidated
Infrastructure & Mgmt.
Cluster
Nexus Leaf
Edge Leaf
DC Core
Internet/DMZ
Nexus
Spine
L3
L2
L3
L2
Edge Cluster
UCS C-Series
95xx 95xx 95xx95xx
93xx 93xx 93xx 93xx 93xx 93xx 93xx 93xx
NSX Connectivity with Cisco UCS and Nexus Switches
CONFIDENTIAL
vSphere Host (ESXi)
15
Layer 2 or Layer 3 Uplinks
based on topology
VLAN Trunk (802.1Q)
VLAN 66
Mgmt
10.66.1.2/26
DGW: 10.66.1.1
VLAN 77
vMotion
10.77.1.2/26
DGW: 10.77.1.1
VLAN 88
VXLAN
10.88.1.2/26
DGW: 10.88.1.1
VLAN 99
Storage
10.99.1.2/26
DGW: 10.99.1.1
SVI 66: 10.66.1.1/26
SVI 77: 10.77.1.1/26
SVI 88: 10.88.1.1/26
SVI 99: 10.99.1.1/26
SpanofVLANs
SpanofVLANs
VMkernel Networking – L2 OR L3 Topology
CONFIDENTIAL
VLANs Requirements for NSX
• At minimum 4 VLANs for compute
• Minimum two additional VLANs for
N-S traffic for edge hosts only
• P-V bridging VLANs as needed
• VLAN ID for VXLAN needs to be
consistent across transport zone
• The dedicated TCP/IP stack
for VXLAN and vMotion
– “Default” used for everything else
• Starting with vSphere 6.0, routed
vmkernel network for vMotion no
longer requires RPQ
CONFIDENTIAL 16
Traffic Type Function
VLAN
ID
Management
ESXi and NSX
Management
100
vMotion VM Mobility 101
IP Storage
VLAN
Application and
infrastructure DS
connectivity
102
VXLAN Guest VM Traffic 103
N-S Traffic Route Peering 105/106
Bridging
Optional
Migration and non
IP traffic
107
ComputeCluster
EdgeCluster
VLAN values shown are for example use
NSX VXLAN Capability – No Multicast Required
• Standard VXLAN requires multicast on
physical network
– L2 network – relatively easy IGMP
Snooping & Querier
– L3 network – additionally requires PIM
• NSX offers a choice in which multicast
configuration is not required
• L2 frame is encapsulated at the
hypervisor – reducing complex
configuration on physical network
• VTEP (VXLAN Tunnel EndPoint)
is a logical interface (VMkernel)
connects to TZ for encap/decap
VXLAN traffic
17
VM Sends a
standard L2
Frame
Source Hypervisor (VTEP)
encapsulates VXLAN, UDP
& IP Headers
Destination Hypervisor
(VTEP) decapsulate
headers
Physical Network
forwards frame as
standard IP frame
Original L2 Frame
delivered to VM
VXLAN
VTEP
VXLAN
VTEP
IP FrameL2 Frame L2 Frame
1
2 43 5
L2 IP UDP VXLAN PayloadL2
1
2
3
4
3
UDP VXLAN PayloadL2
5
Nexus 93XX
NX-OS Mode
Nexus 93XX
NX-OS Mode
CONFIDENTIAL
Transport Zone, VTEP, Logical Networks and VDS
• Transport Zone: Collection of VXLAN prepared
ESXi clusters
• VTEP is a VMkernel interface created dynamically
during the cluster VXLAN preparation
– Belongs to a specific VLAN backed port-group
– vDS uplink configuration requires consistency
for the vDS
– VLAN ID for the VXLAN Transport must be
the same
• Only 1 vDS per ESXi cluster can be enabled for VXLAN
• Logical Switch is represented as a dvPortgroup may
span multiple vDS
• vDS is licensed with NSX on any vSphere version
– Enterprise+ is required for Non-NSX use of vSphere hosts
• vDS is the ONLY vSwitch that supports NSX
– MUST be managed by vSphere
• N1Kv is not supported but may co-exist for non-NSX cluster usage
18
vSphere
Host
VXLAN Transport
Network
10.20.10.10
Host 1
10.20.10.11
VTEP1 VTEP2
VM
VXLAN 5002
MAC2
vSphere
Host
10.20.10.12
Host 2
10.20.10.13
VM
MAC4
VM
MAC1
VM
MAC3
VTEP3 VTEP4
Compute VDS Edge VDS
CONFIDENTIAL
VDS Uplink Design
• NSX create dvUplink port-groups for VXLAN
enabled hosts. This uplink connectivity carrying
VXLAN traffic.
• Must be consistent for all hosts belonging to the VDS
• Must carry same teaming policy
– For the VXLAN traffic, the choice in teaming
mode depends on
• Simplicity
• Bandwidth requirement
– Recommended teaming mode with standard rack
servers
• Dependent upon functional goals as listed in table
– Recommended teaming mode with UCS Blade
System is “route Based on Originating Port”
• LACP is not possible from UCS blade
– Having multiple VDS for compute and Edge allow
flexibility of teaming mode for uplink configuration
19
Teaming and
Failover Mode
NSX
Supp
ort
Multi-
VTEP
Support
Uplink
Behavior
2 x 10G
Nexus Port
Configuration
Route based on
Originating Port
✓ ✓ Both Active Standard
Route based on
Source MAC
hash
✓ ✓ Both Active Standard
LACP ✓ ×
Flow based –
both active
vPC Port-Channel -
LACP
Route based on
IP Hash (Static
EtherChannnel)
✓
×
Flow based –
both active
vPC Port-Channel –
LACP mode OFF
Explicit Failover
Order
✓ ×
Only one link is
active
Standard
Route based on
Physical NIC
Load (LBT)
×
× × Standard
CONFIDENTIAL
Agenda
20
1 NSX Architecture
2 NSX Connectivity Requirements
3 Nexus Switching Connectivity
4 ACI Fabric Connectivity
5 Deep Dive on NSX Cluster Connectivity
6 Summary & Question
CONFIDENTIAL
NSX is AGNOSTIC to Underlay Network Topology
L2 or L3 or Any Combination
Regardless of switched infrastructure
Only Two Requirements
2) IP Connectivity
1) MTU of 1600
NSX Switching Overview and Requirements
21CONFIDENTIAL
Jumbo MTU Considerations
• VXLAN encap traffic is >= 1600 UDP frame
• VDS Max MTU is 9000 Byte
• Nexus 7xxx, 9xxx Series
– L2 only requires global configuration
– L3 requires per interface MTU change
• Nexus 5xxx, 56xx and 6xxx requires
– MTU to be changed with Policy-Map
– L3 requires per interface MTU change
• All links belonging to fabric must be
enabled with Jumbo MTU
22
Layer 2 Interface Layer 3 Interface
system jumbomtu 9216  Global configurations
interface Ethernet1/9
description to esx-vmnic3-VMK
switchport mode trunk
switchport trunk allowed vlan 22-25
spanning-tree port type edge trunk
mtu 9216  Layer 2 MTU
channel-group 9 mode active
interface Vlan151  SVI Interface
no ip redirects
ip address 10.114.221.34/27
hsrp 1
ip 10.114.221.33
description VXLAN Transport Zone
no shutdown
mtu 9216
interface Ethernet2/12  Layer 3 Interface
description L3 Link to Spine
no switchport
speed 40000
duplex full
mtu 9216
ip address 10.114.211.117/31
no shutdown
Nexus 7000 / 9000 series
CONFIDENTIAL
• VXLAN encap traffic is >= 1600 UDP frame
• VDS Max MTU is 9000 Byte
• Nexus 7xxx, 9xxx Series
– L2 only requires global configuration
– L3 requires per interface MTU change
• Nexus 5xxx, 56xx and 6xxx requires
– MTU to be changed with Policy-Map
– L3 requires per interface MTU change
• All links belonging to fabric must be
enabled with Jumbo MTU
23
All L2 interfaces Layer 3 Interface
Only global configurations
Create policy-map:
policy-map type network-qos jumbo
class type network-qos class-default
mtu 9216
Apply policy-map:
system qos
service-policy type network-qos jumbo
interface Vlan151  SVI Interface
no ip redirects
ip address 10.114.221.34/27
hsrp 1
ip 10.114.221.33
description VXLAN Transport Zone
no shutdown
mtu 9216
interface Ethernet2/12  Layer 3 Interface
description L3 Link to Spine
no switchport
speed 40000
duplex full
mtu 9216
ip address 10.114.211.117/31
no shutdown
Nexus 5xxx and 6xxx series
Jumbo MTU Considerations
CONFIDENTIAL
24
VLANs & IP Subnet Defined at each
ToR
SVI Interface VLAN ID IP Subnet
Management 100 10.100.R_ID.x/24
vMotion 101 10.101.R_ID.x/24
Storage 102 10.102.R_ID.x/24
VXLAN 103 10.103.R_ID.x/24
VLANs & IP Subnet Defined at 95xx for
POD A
SVI Interface VLAN ID IP Subnet
Management 100 10.100.A.x/24
vMotion 101 10.101.A.x/24
Storage 102 10.102.A.x/24
VXLAN 103 10.103.A.x/24
VLANs & IP Subnet Defined at 95xx for
POD B
SVI Interface VLAN ID IP Subnet
Management 200 10.200.B.x/24
vMotion 201 10.201.B.x/24
Storage 202 10.202.B.x/24
VXLAN 103 10.103.B.x/24
VXLAN VLAN ID 103 - Transport Zone Scope (extends across ALL PODs/clusters)
Compute
Cluster A
Compute
Cluster B
VLAN ID 100, 101 & 102 Scope VLAN ID 200, 201 and 203 Scope
POD A
L3
L2
UCS B-Series
95xx95xx
93xx 93xx 93xx 93xx
95xx 95xx
93xx93xx93xx93xx
POD B
UCS B-Series
L3 Core
L3
L2
Compute
Cluster A
Compute
Cluster B
VLAN ID 100, 101 & 102 Scope VLAN ID 200, 201 and 203 Scope
L3
L2
UCS B-Series
95xx95xx
93xx 93xx 93xx 93xx
95xx 95xx
93xx93xx93xx93xx
UCS B-Series
L3 Core
Rack 1 Rack N Rack 1 Rack N
VXLAN VLAN ID 103 - Transport Zone Scope (extends across ALL PODs/clusters)
POD A POD B
L3
L2
95xx95xx
95xx95xx
Cisco DC Topologies – Pod design – NSX is Agnostic
CONFIDENTIAL
Cisco DC Topologies – Fabric Path / DFA
NSX is Agnostic
25
VLAN ID 100, 101 and 102 Scope – VXLAN VLAN ID 103 - Transport Zone Scope (extends across ALL PODs/clusters)
Compute
Cluster A
Compute
Cluster B
77xx 77xx
UCS B-Series
55xx55xx 55xx 55xx
UCS B-Series
56xx 56xx 60xx 60xx
70xx 70xxSpine
Leaf
UCS B-Series UCS B-Series
Border Leaf
Mgt / Edge
Cluster
VLANs & IP Subnet Defined at each
ToR
SVI Interface VLAN ID IP Subnet
Management 100 10.100.100.x/24
vMotion 101 10.101.101.x/24
Storage 102 10.102.102.x/24
VXLAN 103 10.103.103.x/24
L3 Spine
Management
Cluster
DC Core
Internet/DMZ
CONFIDENTIAL
Cisco DC Topologies – ACI
NSX is Agnostic
26
VLAN ID 100, 101 and 102 Scope – VXLAN VLAN ID 103 - Transport Zone Scope (extends across ALL PODs/clusters)
Compute
Cluster A
Compute
Cluster B
UCS B-Series UCS B-Series
Spine
Leaf
UCS B-Series UCS B-Series
Border Leaf
Mgt / Edge
Cluster
VLANs & IP Subnet Defined at each
ToR
SVI Interface VLAN ID IP Subnet
Management 100 10.100.100.x/24
vMotion 101 10.101.101.x/24
Storage 102 10.102.102.x/24
VXLAN 103 10.103.103.x/24
DC Core
Internet/DMZ
CONFIDENTIAL
NSX Component Mapping
• Separation of compute, management and Edge
function with following design advantage
• Management Cluster
– Can co-exist with Edge Cluster in same
UCS Chassis
– Minimum three hosts – more if needed
– LACP can be used on rack-mount
• Edge Cluster
– Should be independent UCS C series
– Edge VM for North-south traffic
– Active-standby Control-VM
– Can hold NSX Controller is optimization of
resources is desired
• Compute Cluster
– VXLAN is enabled per cluster
– Can co-exist with physical bare-metal compute
27
Function NSX Components
Recommended
Cluster Designation
Management Plane NSX Manager & VC Management Cluster
Control Plane
NSX Controller Cluster
Management or
Edge Cluster
Logical Router Control
VM
Edge Cluster
Data Plane
East-West
VXLAN forwarding -
compute and edge
VDS kernel
components &
DLR(Distributed
Logical Routers)
Compute and Edge
Cluster
Data Plane
North-South
ECMP Edge or Edge
Services
Edge Cluster
Bridging Traffic DLR Control VM Edge Cluster
CONFIDENTIAL
Agenda
28
1 NSX Architecture
2 NSX Connectivity Requirements
3 Nexus Switching Connectivity
4 ACI Fabric Connectivity
5 Deep Dive on NSX Cluster Connectivity
6 Summary & Question
CONFIDENTIAL
NSX + Cisco ACI for the physical network
underlay functions
• ACI EPG’s will map to VLANs
• NSX to create overlay network and provide
all network virtualization functions
Customer Benefits
• Customer can use APIC to program all
switches and perform tasks like config,
upgrades, etc. from APIC
• Leverage fabric for enforcing infrastructure
traffic isolation via EPG
• Full SDDC capabilities are available
Customer Proof Points
• Some deployments of ACI and NSX
29
NSX provides the VXLAN overlay networks
ACI EPG maps to a VLAN to enforce the overlay
NSX with Cisco Underlay in ACI Mode
CONFIDENTIAL
NSX Using Cisco Nexus Switches as Underlay
• Full NSX Stack over ACI to leverage
– Core network use case
– Security
• Cisco ACI Specific Design Highlights
– L2 fabric underlay with min 1600 MTU
– EPG = BD = VLAN
– 4 EPGs for fabric (compute and edge)
– 2 EPG for Edge ECMP connectivity
– NSX Edge maps to border leaf
– BGP to ACI Border Leaf, active-active design
• Design Guide: Deploying NSX on ACI Underlay
– https://communities.vmware.com/docs/DOC-30849
30
Recommended Design
CONFIDENTIAL
32
Web DB
DLR
E1
Border Leaf
App
ECMP
E8
EPG/VLAN 20
Transit VXLAN
Active Standby
Routing
Adjacency
…
EPG/VLAN 10
L3
L2
DC Core
ACI Spine
Edge Cluster
Host 1
Host 2
Host 3
L3
L2
ACI Border
Leaf
Host 4
DC CoreACI Spine
NSX Edge Mapping to ACI Border Leaf
CONFIDENTIAL
Active-active Deployment
Application active on both sides
VIP-active
APP
A
APP
B
APP
C
GSLB
VIP-active
APP
A
APP
B
APP
E
vCenter-A vCenter-B
Active-active application pair
Active-active
application pair
CONFIDENTIAL 33
Site A
Host 1
Host 2
Host 3
L3
L2
ACI Border
Leaf
Host 4
DC Core
ACI Spine
Site B
Host 1
Host 2
Host 3
L3
L2
Non ACI
Network
Host 4
Even with Multi-DC:
• NSX is always agnostic to the
underlay
• Zero requirement for identical
hardware infrastructure at
each site
• Use non-proprietary L3
connectivity between sites
• Still require the same few
underlay features
• Jumbo MTU
• Stabile L2/L3 IP
infrastructure
Multi-DC Heterogeneous DR
CONFIDENTIAL 34
Agenda
35
1 NSX Architecture
2 NSX Connectivity Requirements
3 Nexus Switching Connectivity
4 ACI Fabric Connectivity
5 Deep Dive on NSX Cluster Connectivity
6 Summary & Question
CONFIDENTIAL
95xx
UCS and NSX
• Fabric Connectivity
• The Cisco Fabric Interconnect runs in end-host mode
• The uplinks from Cisco UCS Fabric Interconnects have vPC
connectivity to Nexus switches to provide loop-free topology
• Network Connectivity
• vNICs (UCS logical interface) are either dedicated or shared based
on bandwidth and isolation requirements
• VDS uplinks are equal to the number of VMNIC exposed per UCS
blade for each VDS
• Cisco UCS Blade Server multiple VTEPs are recommended with
each VTEP mapping to different vNICs
• The VDS uplink teaming mode cannot use LACP (its an orphaned
connection) since fabric interconnect does not support server side
LACP nor pass-through
– vSphere Teaming Mode of Src ID
• Fabric Connectivity for Edge Cluster (N-S Traffic) is a separate
straight through connection
UCS
Edge Leaf
L3
L2
95xx
93xx
Edge Cluster
UCS C-Series
DC Core
Internet/DMZ
DC Fabric
93xx
VPN
VPN
VPN
VPN
CONFIDENTIAL 36
VXLAN dvPortgroup (VTEP)
UCS Network Adapter & VXLAN
• Assumes single UCS adaptor *
• Two VTEPs per blade is recommended
– VXLAN VDS is exposed with two uplinks vNICs
– Improves VXLAN throughput
– Each VTEP is mapped to unique vNIC which then
maps to fabric A and B
• VXLAN traffic can be shared with other traffic on
single VDS
• On UCS B-Series, recommend a dedicated VDS
for the non-VPC transit VLAN used for routing
N-S traffic
• * If more then one UCS network adaptor employed,
recommendation is to expose two uplinks for the
VDS that carries VXLAN traffic which will utilize two
VTEPs when using vSphere Src ID Teaming
VMNIC 0 VMNIC 1
UCS
B-Series
Blade
vNIC 1
Teaming
Mode
VMkernel
VXLAN VTEP – 1
Traffic
Type
SRC_ID
vNIC 0
dvUplink
VMkernel
VXLAN VTEP – 2
SRC_ID
VDS - 1 MGMT, vMotion, NFS, VXLAN & Bridging
CONFIDENTIAL 37
Routing
Adjacency
Uplink Teaming
Mode
Non-VPC
VXLAN 5020
Transit Link
VXLAN 5020
Transit Link
Routing
Adjacency
vSphere
Host
vSphere
Host
Uplink Teaming
Mode
VPC
Peering over VPC
Not Supported on Cisco Nexus
Few exception
Nexus 7K with Release 7.2
Nexus 3K – BGP
Peering over non-VPC
Non-LACP Teaming
UCS C Series
Peering over non-VPC
Parallel Links
UCS FI vPC
L3
L2
L3
L2
vPC and Routing Peer Termination
NSX Edge Routing Design with
UCS C Series & Intel NICs
39
• 1:1 mapping is created between Edge uplinks
(VLAN backed networks) and routing neighbors
on the ToR A/B
– Map each of these VLANs (portgroups) to a different
dvUplink on Edge VDS to ensures distribution of N/S
traffic across dvUplinks
– The VLANs used for dynamic routing are local to
each router
– Edge Uplink = Host Uplink = VLAN = Adjacency
– Avoid using VPC to ToR for route peering due to
vendor dependencies
– Teaming mode is “route Based on Originating Port”
• Redundancy is handled by Dynamic Routing as
Edges have adjacencies with both routers
• eBGP is used between NSX ESG and routers A/B
• Equally applicable to OSPF
• Default route must follow the uplink status
NSX Edge Gateway
(all ESGs use same uplink configuration)
VLAN 10 SVI
(9K-A Only)
VLAN 20 SVI
(9K-B Only)
Uplink A
VLAN 10
vNIC1
Uplink A
Uplink B
VLAN20
vNIC2
Uplink B
Edge Uplink Int 1 from
VLAN 10 dvPortgroup
(vmnicX active
vmnicY unused)
Edge Uplink Int 1 from
VLAN 10 dvPortgroup
(vmnicX active
vmnicY unused)
eBGP
Peering
Default route
advertised downstream
to 9K ToRs. Loss of
both uplinks should
withdraw all routes
9K-B9K-A
95xx 95xx
VDS-Edge
CONFIDENTIAL
NSX Edge Routing Design with
UCS B Series
40
• Dedicated non-VPC links from FI to ToR
(pinned) VLANs used for Edge peering
with N9Ks
• Port-Channel is used to maintain redundancy
and scaling BW based on number of Edge
VMs deployed
• 1:1 mapping between Edge uplinks (VLAN
backed networks) and BGP neighbors on N9Ks.
• Redundancy with Dynamic Routing as Edges
have adjacencies with both N9Ks
• Dedicated vNICs are created in UCS so
that traffic for these VLANs is pinned to the
FI uplinks
• eBGP is used between NSX ESG and N9Ks
• Default route must follow the uplink status
VLAN 10 SVI
(9K-A Only)
VLAN 20 SVI
(9K-B Only)
Dedicated non-
vPC pinned for
VLAN 10
1 vNIC maps to
Fabric A
Edge Uplink Int 1
from VLAN 10
dvPortgroup
(vmnicX active
vmnicY unused)
Dedicated non-
vPC pinned for
VLAN 20
1 vNIC maps to
Fabric B
Default route
advertised downstream
to 9K ToRs. Loss of
both uplinks should
withdraw all routes
UCS
FI-A
UCS
FI-B
NSX Edge Gateway
(all ESGs use same uplink configuration)
eBGP
Peering
Edge Uplink Int 2
from VLAN 20
dvPortgroup
(vmnicX active
vmnicY unused)
95xx 95xx
9K-A 9K-B
VDS-Edge
CONFIDENTIAL
VMNIC 0 VMNIC 1 VMNIC 2 VMNIC 3
UCS
B-Series
Blade
vNIC 3vNIC 1
2204 FEX2204 FEX
6248 (A) 6248 (B)
Teaming
Mode
VMkernel
VXLAN
VTEP – 1
Traffic
Type
VMkernel
VXLAN
VTEP - 2
VMkernel
vMotion
VMkernel
Mgmt
VMkernel
IP
Storage
LBT SRC_ID SRC_ID Explicit
Failover
LBT
Nexus 93XX
NX-OS Mode
Nexus 93XX
NX-OS Mode
vNIC 4vNIC 2
VDS – 2 Routing
Routing
VLAN PG
2
Bridging
PG
dvUplink
Routing
VLAN PG
1
VXLAN
dvPg
VDS - 1 MGMT, vMotion, NFS, VXLAN & Bridging
VDS Design, Uplink & Traffic Mapping
• Recommend a minimum of two vDS for Edge Cluster
• VDS 1 – All traffic except N-S routing
• VDS 2 – N-S Traffic Routing VLANs
– External Connectivity requires
dedicated non-VPC Links
– Recommend a VDS for routing
VLAN pinned on dedicated straight
through links
– Dual VTEP – each VTEP active on
Fabric A and B respectively
– The teaming recommendation for
VTEP is SRC_ID
– For the rest of the traffic teaming
is based on local requirements
– For UCS C-series Edge cluster,
a single VDS would suffice
CONFIDENTIAL 41
• MTU: 9K – For line rate performance
– 9000 MTU on the Fabric, VDS and pNIC
– 8900 MTU on the VM – vNIC
– Disable VXLAN Offload
– Enable NetQueue
– Number of VTEPs: Two
– 2 Policies
• VMQ Connection Policy
• Adapter Policy
Settings for B-Series
• Regardless of VLAN or VXLAN
Tuning Guideline for B-Series Blade
42
Adapter Policy
VMQ Connection
Policy
CONFIDENTIAL
NSX Design Guides
• Reference Design: Deploying NSX with Cisco UCS
and Nexus 9000 Infrastructure
https://communities.vmware.com/docs/DOC-29373
• Design Guide for Vmware NSX running with a Cisco
ACI Underlay Fabric
https://communities.vmware.com/docs/DOC-30849
• VMware® NSX for vSphere Network Virtualization
Design Guide version 3.0
https://communities.vmware.com/docs/DOC-27683
• More design documents
https://www.vmware.com/support/pubs/vmware-
validated-design-pubs.html
CONFIDENTIAL 43
Related VMworld Sessions
• Introduction to Vmware NSX [NET7834]
• Vmware NSX Deep Dive [9152]
• Practical Path to NSX [8675]
• NSX on ACI Customer Panel [8729]
• Explore NSX Feature Labs
– Vmware NSX Feature Tour [SPL-1703-SDC-1]
• Self Paced Labs
– Vmware NSX Feature Tour [ELW-1703-SDC-1]
• Expert Led Workshop
44CONFIDENTIAL
NSX partner ecosystem
Physical Infrastructure
Security
Application Delivery
Operations and Visibility
DYNAMIC INSERTION OF
PARTNER SERVICES
Learn
Connect & Engage
communities.vmware.com
NSX Product Page & Technical Resources
vmware.com/products/nsx
Network Virtualization Blog
blogs.vmware.com/networkvirtualization
VMware NSX on YouTube
youtube.com/user/vmwarensx
Where to get started
Experience
70+ Unique NSX Sessions
Spotlights, breakouts, quick talks & group discussions
Visit the VMware Booth
Use case demos, chat with NSX experts
Visit NSX Technical Partner Booths
Integration demos – EPSec & NetX, Hardware VTEP,
Ops & Visibility
Test Drive NSX with free Hands-on Labs
Expert-led or Self-paced. labs.hol.vmware.com
Use
NSX Proactive Support Service
Optimize performance based on data monitoring
and analytics to help resolve problems, mitigate
risk and improve operational efficiency.
vmware.com/consulting
Take
Training and Certification
Several paths to professional certifications. Learn
more at the Education & Certification Lounge.
vmware.com/go/nsxtraining
How to Deploy VMware NSX with Cisco Infrastructure
Ron Fuller, VMware
Paul Mancuso, VMware
NET8364R
#NET8364R

More Related Content

What's hot

Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Insight
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16David Pasek
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFVCoreStack
 
VMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowVMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowAniekan Akpaffiong
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptxVMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptxBradLai3
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoMarcoTechnologies
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaCisco Canada
 
Disaster Recovery Planning using Azure Site Recovery
Disaster Recovery Planning using Azure Site RecoveryDisaster Recovery Planning using Azure Site Recovery
Disaster Recovery Planning using Azure Site RecoveryNitin Agarwal
 
Nsx t reference design guide 3-0
Nsx t reference design guide 3-0Nsx t reference design guide 3-0
Nsx t reference design guide 3-0MohamedAzizKandil1
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies
 
Juniper Corporate Presentation
Juniper Corporate PresentationJuniper Corporate Presentation
Juniper Corporate Presentationmauthay
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017Novosco
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack FundamentalsCenk Ersoy
 
VMware Overview
VMware OverviewVMware Overview
VMware OverviewMadhu Bala
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3Vepsun Technologies
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualizationxKinAnx
 

What's hot (20)

Hcx intro preso v2
Hcx intro preso v2Hcx intro preso v2
Hcx intro preso v2
 
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
VMware NSX 101: What, Why & How
VMware NSX 101: What, Why & HowVMware NSX 101: What, Why & How
VMware NSX 101: What, Why & How
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
Azure migration
Azure migrationAzure migration
Azure migration
 
Zero Downtime Schema Changes in Galera Cluster
Zero Downtime Schema Changes in Galera ClusterZero Downtime Schema Changes in Galera Cluster
Zero Downtime Schema Changes in Galera Cluster
 
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptxVMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
VMware Cloud Foundation - PnP presentation 8_6_18 EN.pptx
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - Cisco
 
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with ViptelaUnderstanding Cisco’s Next Generation SD-WAN Solution with Viptela
Understanding Cisco’s Next Generation SD-WAN Solution with Viptela
 
Disaster Recovery Planning using Azure Site Recovery
Disaster Recovery Planning using Azure Site RecoveryDisaster Recovery Planning using Azure Site Recovery
Disaster Recovery Planning using Azure Site Recovery
 
Nsx t reference design guide 3-0
Nsx t reference design guide 3-0Nsx t reference design guide 3-0
Nsx t reference design guide 3-0
 
Dell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 MinutesDell Technologies - The Portfolio in 20+9 Minutes
Dell Technologies - The Portfolio in 20+9 Minutes
 
Juniper Corporate Presentation
Juniper Corporate PresentationJuniper Corporate Presentation
Juniper Corporate Presentation
 
VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017VMware vSAN - Novosco, June 2017
VMware vSAN - Novosco, June 2017
 
Azure Stack Fundamentals
Azure Stack FundamentalsAzure Stack Fundamentals
Azure Stack Fundamentals
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
 
Presentation citrix desktop virtualization
Presentation   citrix desktop virtualizationPresentation   citrix desktop virtualization
Presentation citrix desktop virtualization
 

Similar to VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure

VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaVMUG IT
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG IT
 
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_AliNET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Alishezy22
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsxsolarisyougood
 
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld
 
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld
 
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud
 
Presentation cisco nexus 1010 overview and deployment
Presentation   cisco nexus 1010 overview and deploymentPresentation   cisco nexus 1010 overview and deployment
Presentation cisco nexus 1010 overview and deploymentxKinAnx
 
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationVMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationBayu Wibowo
 
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld
 
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld
 
VMworld 2013: An Introduction to Network Virtualization
VMworld 2013: An Introduction to Network Virtualization VMworld 2013: An Introduction to Network Virtualization
VMworld 2013: An Introduction to Network Virtualization VMworld
 
Cisco deploying openstack with UCS
Cisco deploying openstack with UCSCisco deploying openstack with UCS
Cisco deploying openstack with UCSsolarisyougood
 
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld
 
Citrix Day 2014: NetScaler Cisco ACE
Citrix Day 2014: NetScaler Cisco ACECitrix Day 2014: NetScaler Cisco ACE
Citrix Day 2014: NetScaler Cisco ACEDigicomp Academy AG
 

Similar to VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure (20)

VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep Dive
 
VMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep DiveVMworld 2015: VMware NSX Deep Dive
VMworld 2015: VMware NSX Deep Dive
 
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della SicurezzaNSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
NSX: La Virtualizzazione di Rete e il Futuro della Sicurezza
 
VMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSXVMworld 2015: The Future of Network Virtualization with VMware NSX
VMworld 2015: The Future of Network Virtualization with VMware NSX
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e Design
 
Inf net2227 heath
Inf net2227 heathInf net2227 heath
Inf net2227 heath
 
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_AliNET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
NET4933_vDS_Best_Practices_For_NSX_Francois_Tallet_Shahzad_Ali
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsx
 
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
VMworld 2014: Advanced Topics & Future Directions in Network Virtualization w...
 
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
 
VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture VMworld 2013: Advanced VMware NSX Architecture
VMworld 2013: Advanced VMware NSX Architecture
 
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
 
Presentation cisco nexus 1010 overview and deployment
Presentation   cisco nexus 1010 overview and deploymentPresentation   cisco nexus 1010 overview and deployment
Presentation cisco nexus 1010 overview and deployment
 
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationVMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
 
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
VMworld 2013: Bringing Network Virtualization to VMware Environments with NSX
 
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
VMworld 2013: vSphere Networking and vCloud Networking Suite Best Practices a...
 
VMworld 2013: An Introduction to Network Virtualization
VMworld 2013: An Introduction to Network Virtualization VMworld 2013: An Introduction to Network Virtualization
VMworld 2013: An Introduction to Network Virtualization
 
Cisco deploying openstack with UCS
Cisco deploying openstack with UCSCisco deploying openstack with UCS
Cisco deploying openstack with UCS
 
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
VMworld 2013: Designing Network Virtualization for Data-Centers: Greenfield D...
 
Citrix Day 2014: NetScaler Cisco ACE
Citrix Day 2014: NetScaler Cisco ACECitrix Day 2014: NetScaler Cisco ACE
Citrix Day 2014: NetScaler Cisco ACE
 

More from VMworld

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld
 
VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld
 

More from VMworld (20)

VMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep DiveVMworld 2016: vSphere 6.x Host Resource Deep Dive
VMworld 2016: vSphere 6.x Host Resource Deep Dive
 
VMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for HorizonVMworld 2016: Troubleshooting 101 for Horizon
VMworld 2016: Troubleshooting 101 for Horizon
 
VMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSXVMworld 2016: Advanced Network Services with NSX
VMworld 2016: Advanced Network Services with NSX
 
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI AutomationVMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
VMworld 2016: Enforcing a vSphere Cluster Design with PowerCLI Automation
 
VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7VMworld 2016: What's New with Horizon 7
VMworld 2016: What's New with Horizon 7
 
VMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep DiveVMworld 2016: Virtual Volumes Technical Deep Dive
VMworld 2016: Virtual Volumes Technical Deep Dive
 
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
VMworld 2016: Advances in Remote Display Protocol Technology with VMware Blas...
 
VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations! VMworld 2016: The KISS of vRealize Operations!
VMworld 2016: The KISS of vRealize Operations!
 
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
VMworld 2016: Getting Started with PowerShell and PowerCLI for Your VMware En...
 
VMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts PanelVMworld 2016: Ask the vCenter Server Exerts Panel
VMworld 2016: Ask the vCenter Server Exerts Panel
 
VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way! VMworld 2016: Virtualize Active Directory, the Right Way!
VMworld 2016: Virtualize Active Directory, the Right Way!
 
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
VMworld 2016: Migrating from a hardware based firewall to NSX to improve perf...
 
VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6VMworld 2015: Troubleshooting for vSphere 6
VMworld 2015: Troubleshooting for vSphere 6
 
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
VMworld 2015: Monitoring and Managing Applications with vRealize Operations 6...
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!VMworld 2015: Virtualize Active Directory, the Right Way!
VMworld 2015: Virtualize Active Directory, the Right Way!
 
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
VMworld 2015: Site Recovery Manager and Policy Based DR Deep Dive with Engine...
 
VMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SANVMworld 2015: Building a Business Case for Virtual SAN
VMworld 2015: Building a Business Case for Virtual SAN
 
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes ConfigurationsVMworld 2015: Explaining Advanced Virtual Volumes Configurations
VMworld 2015: Explaining Advanced Virtual Volumes Configurations
 
VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep Dive
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

VMworld 2016: How to Deploy VMware NSX with Cisco Infrastructure

  • 1. How to Deploy VMware NSX with Cisco Infrastructure Ron Fuller, VMware Paul Mancuso, VMware NET8364R #NET8364R
  • 2. Growing NSX Momentum A rapid journey of customer adoption across industries 1700+ Customers 8 out of VMware’s top 10 deals in Q216 included NSX 100% YoY growth Consistent year-to-year Q216
  • 3. Security Inherently secure infrastructure Automation IT at the speed of business Application continuity Data center anywhere NSX customer use cases Micro-segmentation DMZ anywhere Secure end user IT automating IT Multi-tenant infrastructure Developer cloud Disaster recovery Cross cloud Multi data center pooling
  • 4. • This presentation may contain product features that are currently under development. • This overview of new technology represents no commitment from VMware to deliver these features in any generally available product. • Features are subject to change, and must not be included in contracts, purchase orders, or sales agreements of any kind. • Technical feasibility and market demand will affect final delivery. • Pricing and packaging for any new technologies or features discussed or presented have not been determined. Disclaimer CONFIDENTIAL 4
  • 5. Session Abstract Many enterprises rely on both VMware vSphere and Cisco Nexus/UCS to build the foundation of their data center infrastructure. While VMware NSX brings advanced network automation and security capabilities to vSphere on any network infrastructure, this session will cover the NSX design considerations specific to environments using Cisco Nexus switches for the physical network, and Cisco UCS for the vSphere compute resources. This session will also show how to run NSX while utilizing the underlay functionality of Cisco ACI. The session will provide a review of the most important topics from the two VMware NSX + Cisco Nexus/ACI design guides already published, while adding additional “lessons learned” from real deployments in the field since those publications. CONFIDENTIAL 5
  • 6. Session Goals • Session is a complement to the NSX & Cisco Design Guide available here and the Deploying NSX with Cisco ACI design guide available here • Understand how to implement a Nexus and ACI based design with NSX • Covers both Cisco Nexus 9K in NX-OS mode and ACI mode CONFIDENTIAL 6
  • 7. Ron Fuller • Staff Systems Engineer – NSBU • Cisco Certified Internetwork Expert (CCIE) #5851 Emeritus (R&S/Storage) • More than 20 years of networking experience • 9 Years at Cisco – SE/CSE/Data Center TSA/TME • CiscoPress Published Author • VMwarePress Published Author CONFIDENTIAL 7
  • 8. Paul Mancuso Technical Product Manager – NSBU • VCDX#159 • VCIX-NV • VCI • CCSI • CCNP; CCNP Data Center • MCSE • CISSP • 25 years of networking experience • Author of 5 books • Author of over 3 dozen courses on Cisco and Microsoft CONFIDENTIAL 8
  • 9. Agenda 9 1 NSX Architecture 2 NSX Connectivity Requirements 3 Nexus Switching Connectivity 4 ACI Fabric Connectivity 5 Deep Dive on NSX Cluster Connectivity 6 Summary & Question CONFIDENTIAL
  • 10. Provides 11 A Faithful Reproduction of Network & Security Services in Software Management APIs, UI Load Balancing Policies, Groups, Tags Activity Monitoring Switching ECMP Connectivity to Physical Networks DLR Reference Architecture NET7857R & NET7858R VPN ServicesFirewall CONFIDENTIAL
  • 11. Cloud Consumption Data Plane ESXi Hypervisor Kernel Modules Distributed Services • High – Performance Data Plane • Scale-out Distributed Forwarding Model Management Plane NSX Manager • Single configuration portal • REST API entry-point Control Plane NSX Controller • Manages Logical networks • Control-Plane Protocol • Separation of Control and Data Plane … … FirewallDistributed Logical Router Logical Switch Edge • Self Service Portal • vRealize Automation, OpenStack, Custom NSX Logical Router Control VM NSX Architecture and Components CONFIDENTIAL 12
  • 12. Agenda CONFIDENTIAL 13 1 NSX Architecture 2 NSX Connectivity Requirements 3 Nexus Switching Connectivity 4 ACI Fabric Connectivity 5 Deep Dive on NSX Cluster Connectivity 6 Summary & Question
  • 13. 14 Compute Cluster Consolidated Infrastructure & Mgmt. Cluster Nexus Leaf Edge Leaf DC Core Internet/DMZ Nexus Spine L3 L2 L3 L2 Edge Cluster UCS C-Series 95xx 95xx 95xx95xx 93xx 93xx 93xx 93xx 93xx 93xx 93xx 93xx NSX Connectivity with Cisco UCS and Nexus Switches CONFIDENTIAL
  • 14. vSphere Host (ESXi) 15 Layer 2 or Layer 3 Uplinks based on topology VLAN Trunk (802.1Q) VLAN 66 Mgmt 10.66.1.2/26 DGW: 10.66.1.1 VLAN 77 vMotion 10.77.1.2/26 DGW: 10.77.1.1 VLAN 88 VXLAN 10.88.1.2/26 DGW: 10.88.1.1 VLAN 99 Storage 10.99.1.2/26 DGW: 10.99.1.1 SVI 66: 10.66.1.1/26 SVI 77: 10.77.1.1/26 SVI 88: 10.88.1.1/26 SVI 99: 10.99.1.1/26 SpanofVLANs SpanofVLANs VMkernel Networking – L2 OR L3 Topology CONFIDENTIAL
  • 15. VLANs Requirements for NSX • At minimum 4 VLANs for compute • Minimum two additional VLANs for N-S traffic for edge hosts only • P-V bridging VLANs as needed • VLAN ID for VXLAN needs to be consistent across transport zone • The dedicated TCP/IP stack for VXLAN and vMotion – “Default” used for everything else • Starting with vSphere 6.0, routed vmkernel network for vMotion no longer requires RPQ CONFIDENTIAL 16 Traffic Type Function VLAN ID Management ESXi and NSX Management 100 vMotion VM Mobility 101 IP Storage VLAN Application and infrastructure DS connectivity 102 VXLAN Guest VM Traffic 103 N-S Traffic Route Peering 105/106 Bridging Optional Migration and non IP traffic 107 ComputeCluster EdgeCluster VLAN values shown are for example use
  • 16. NSX VXLAN Capability – No Multicast Required • Standard VXLAN requires multicast on physical network – L2 network – relatively easy IGMP Snooping & Querier – L3 network – additionally requires PIM • NSX offers a choice in which multicast configuration is not required • L2 frame is encapsulated at the hypervisor – reducing complex configuration on physical network • VTEP (VXLAN Tunnel EndPoint) is a logical interface (VMkernel) connects to TZ for encap/decap VXLAN traffic 17 VM Sends a standard L2 Frame Source Hypervisor (VTEP) encapsulates VXLAN, UDP & IP Headers Destination Hypervisor (VTEP) decapsulate headers Physical Network forwards frame as standard IP frame Original L2 Frame delivered to VM VXLAN VTEP VXLAN VTEP IP FrameL2 Frame L2 Frame 1 2 43 5 L2 IP UDP VXLAN PayloadL2 1 2 3 4 3 UDP VXLAN PayloadL2 5 Nexus 93XX NX-OS Mode Nexus 93XX NX-OS Mode CONFIDENTIAL
  • 17. Transport Zone, VTEP, Logical Networks and VDS • Transport Zone: Collection of VXLAN prepared ESXi clusters • VTEP is a VMkernel interface created dynamically during the cluster VXLAN preparation – Belongs to a specific VLAN backed port-group – vDS uplink configuration requires consistency for the vDS – VLAN ID for the VXLAN Transport must be the same • Only 1 vDS per ESXi cluster can be enabled for VXLAN • Logical Switch is represented as a dvPortgroup may span multiple vDS • vDS is licensed with NSX on any vSphere version – Enterprise+ is required for Non-NSX use of vSphere hosts • vDS is the ONLY vSwitch that supports NSX – MUST be managed by vSphere • N1Kv is not supported but may co-exist for non-NSX cluster usage 18 vSphere Host VXLAN Transport Network 10.20.10.10 Host 1 10.20.10.11 VTEP1 VTEP2 VM VXLAN 5002 MAC2 vSphere Host 10.20.10.12 Host 2 10.20.10.13 VM MAC4 VM MAC1 VM MAC3 VTEP3 VTEP4 Compute VDS Edge VDS CONFIDENTIAL
  • 18. VDS Uplink Design • NSX create dvUplink port-groups for VXLAN enabled hosts. This uplink connectivity carrying VXLAN traffic. • Must be consistent for all hosts belonging to the VDS • Must carry same teaming policy – For the VXLAN traffic, the choice in teaming mode depends on • Simplicity • Bandwidth requirement – Recommended teaming mode with standard rack servers • Dependent upon functional goals as listed in table – Recommended teaming mode with UCS Blade System is “route Based on Originating Port” • LACP is not possible from UCS blade – Having multiple VDS for compute and Edge allow flexibility of teaming mode for uplink configuration 19 Teaming and Failover Mode NSX Supp ort Multi- VTEP Support Uplink Behavior 2 x 10G Nexus Port Configuration Route based on Originating Port ✓ ✓ Both Active Standard Route based on Source MAC hash ✓ ✓ Both Active Standard LACP ✓ × Flow based – both active vPC Port-Channel - LACP Route based on IP Hash (Static EtherChannnel) ✓ × Flow based – both active vPC Port-Channel – LACP mode OFF Explicit Failover Order ✓ × Only one link is active Standard Route based on Physical NIC Load (LBT) × × × Standard CONFIDENTIAL
  • 19. Agenda 20 1 NSX Architecture 2 NSX Connectivity Requirements 3 Nexus Switching Connectivity 4 ACI Fabric Connectivity 5 Deep Dive on NSX Cluster Connectivity 6 Summary & Question CONFIDENTIAL
  • 20. NSX is AGNOSTIC to Underlay Network Topology L2 or L3 or Any Combination Regardless of switched infrastructure Only Two Requirements 2) IP Connectivity 1) MTU of 1600 NSX Switching Overview and Requirements 21CONFIDENTIAL
  • 21. Jumbo MTU Considerations • VXLAN encap traffic is >= 1600 UDP frame • VDS Max MTU is 9000 Byte • Nexus 7xxx, 9xxx Series – L2 only requires global configuration – L3 requires per interface MTU change • Nexus 5xxx, 56xx and 6xxx requires – MTU to be changed with Policy-Map – L3 requires per interface MTU change • All links belonging to fabric must be enabled with Jumbo MTU 22 Layer 2 Interface Layer 3 Interface system jumbomtu 9216  Global configurations interface Ethernet1/9 description to esx-vmnic3-VMK switchport mode trunk switchport trunk allowed vlan 22-25 spanning-tree port type edge trunk mtu 9216  Layer 2 MTU channel-group 9 mode active interface Vlan151  SVI Interface no ip redirects ip address 10.114.221.34/27 hsrp 1 ip 10.114.221.33 description VXLAN Transport Zone no shutdown mtu 9216 interface Ethernet2/12  Layer 3 Interface description L3 Link to Spine no switchport speed 40000 duplex full mtu 9216 ip address 10.114.211.117/31 no shutdown Nexus 7000 / 9000 series CONFIDENTIAL
  • 22. • VXLAN encap traffic is >= 1600 UDP frame • VDS Max MTU is 9000 Byte • Nexus 7xxx, 9xxx Series – L2 only requires global configuration – L3 requires per interface MTU change • Nexus 5xxx, 56xx and 6xxx requires – MTU to be changed with Policy-Map – L3 requires per interface MTU change • All links belonging to fabric must be enabled with Jumbo MTU 23 All L2 interfaces Layer 3 Interface Only global configurations Create policy-map: policy-map type network-qos jumbo class type network-qos class-default mtu 9216 Apply policy-map: system qos service-policy type network-qos jumbo interface Vlan151  SVI Interface no ip redirects ip address 10.114.221.34/27 hsrp 1 ip 10.114.221.33 description VXLAN Transport Zone no shutdown mtu 9216 interface Ethernet2/12  Layer 3 Interface description L3 Link to Spine no switchport speed 40000 duplex full mtu 9216 ip address 10.114.211.117/31 no shutdown Nexus 5xxx and 6xxx series Jumbo MTU Considerations CONFIDENTIAL
  • 23. 24 VLANs & IP Subnet Defined at each ToR SVI Interface VLAN ID IP Subnet Management 100 10.100.R_ID.x/24 vMotion 101 10.101.R_ID.x/24 Storage 102 10.102.R_ID.x/24 VXLAN 103 10.103.R_ID.x/24 VLANs & IP Subnet Defined at 95xx for POD A SVI Interface VLAN ID IP Subnet Management 100 10.100.A.x/24 vMotion 101 10.101.A.x/24 Storage 102 10.102.A.x/24 VXLAN 103 10.103.A.x/24 VLANs & IP Subnet Defined at 95xx for POD B SVI Interface VLAN ID IP Subnet Management 200 10.200.B.x/24 vMotion 201 10.201.B.x/24 Storage 202 10.202.B.x/24 VXLAN 103 10.103.B.x/24 VXLAN VLAN ID 103 - Transport Zone Scope (extends across ALL PODs/clusters) Compute Cluster A Compute Cluster B VLAN ID 100, 101 & 102 Scope VLAN ID 200, 201 and 203 Scope POD A L3 L2 UCS B-Series 95xx95xx 93xx 93xx 93xx 93xx 95xx 95xx 93xx93xx93xx93xx POD B UCS B-Series L3 Core L3 L2 Compute Cluster A Compute Cluster B VLAN ID 100, 101 & 102 Scope VLAN ID 200, 201 and 203 Scope L3 L2 UCS B-Series 95xx95xx 93xx 93xx 93xx 93xx 95xx 95xx 93xx93xx93xx93xx UCS B-Series L3 Core Rack 1 Rack N Rack 1 Rack N VXLAN VLAN ID 103 - Transport Zone Scope (extends across ALL PODs/clusters) POD A POD B L3 L2 95xx95xx 95xx95xx Cisco DC Topologies – Pod design – NSX is Agnostic CONFIDENTIAL
  • 24. Cisco DC Topologies – Fabric Path / DFA NSX is Agnostic 25 VLAN ID 100, 101 and 102 Scope – VXLAN VLAN ID 103 - Transport Zone Scope (extends across ALL PODs/clusters) Compute Cluster A Compute Cluster B 77xx 77xx UCS B-Series 55xx55xx 55xx 55xx UCS B-Series 56xx 56xx 60xx 60xx 70xx 70xxSpine Leaf UCS B-Series UCS B-Series Border Leaf Mgt / Edge Cluster VLANs & IP Subnet Defined at each ToR SVI Interface VLAN ID IP Subnet Management 100 10.100.100.x/24 vMotion 101 10.101.101.x/24 Storage 102 10.102.102.x/24 VXLAN 103 10.103.103.x/24 L3 Spine Management Cluster DC Core Internet/DMZ CONFIDENTIAL
  • 25. Cisco DC Topologies – ACI NSX is Agnostic 26 VLAN ID 100, 101 and 102 Scope – VXLAN VLAN ID 103 - Transport Zone Scope (extends across ALL PODs/clusters) Compute Cluster A Compute Cluster B UCS B-Series UCS B-Series Spine Leaf UCS B-Series UCS B-Series Border Leaf Mgt / Edge Cluster VLANs & IP Subnet Defined at each ToR SVI Interface VLAN ID IP Subnet Management 100 10.100.100.x/24 vMotion 101 10.101.101.x/24 Storage 102 10.102.102.x/24 VXLAN 103 10.103.103.x/24 DC Core Internet/DMZ CONFIDENTIAL
  • 26. NSX Component Mapping • Separation of compute, management and Edge function with following design advantage • Management Cluster – Can co-exist with Edge Cluster in same UCS Chassis – Minimum three hosts – more if needed – LACP can be used on rack-mount • Edge Cluster – Should be independent UCS C series – Edge VM for North-south traffic – Active-standby Control-VM – Can hold NSX Controller is optimization of resources is desired • Compute Cluster – VXLAN is enabled per cluster – Can co-exist with physical bare-metal compute 27 Function NSX Components Recommended Cluster Designation Management Plane NSX Manager & VC Management Cluster Control Plane NSX Controller Cluster Management or Edge Cluster Logical Router Control VM Edge Cluster Data Plane East-West VXLAN forwarding - compute and edge VDS kernel components & DLR(Distributed Logical Routers) Compute and Edge Cluster Data Plane North-South ECMP Edge or Edge Services Edge Cluster Bridging Traffic DLR Control VM Edge Cluster CONFIDENTIAL
  • 27. Agenda 28 1 NSX Architecture 2 NSX Connectivity Requirements 3 Nexus Switching Connectivity 4 ACI Fabric Connectivity 5 Deep Dive on NSX Cluster Connectivity 6 Summary & Question CONFIDENTIAL
  • 28. NSX + Cisco ACI for the physical network underlay functions • ACI EPG’s will map to VLANs • NSX to create overlay network and provide all network virtualization functions Customer Benefits • Customer can use APIC to program all switches and perform tasks like config, upgrades, etc. from APIC • Leverage fabric for enforcing infrastructure traffic isolation via EPG • Full SDDC capabilities are available Customer Proof Points • Some deployments of ACI and NSX 29 NSX provides the VXLAN overlay networks ACI EPG maps to a VLAN to enforce the overlay NSX with Cisco Underlay in ACI Mode CONFIDENTIAL
  • 29. NSX Using Cisco Nexus Switches as Underlay • Full NSX Stack over ACI to leverage – Core network use case – Security • Cisco ACI Specific Design Highlights – L2 fabric underlay with min 1600 MTU – EPG = BD = VLAN – 4 EPGs for fabric (compute and edge) – 2 EPG for Edge ECMP connectivity – NSX Edge maps to border leaf – BGP to ACI Border Leaf, active-active design • Design Guide: Deploying NSX on ACI Underlay – https://communities.vmware.com/docs/DOC-30849 30 Recommended Design CONFIDENTIAL
  • 30. 32 Web DB DLR E1 Border Leaf App ECMP E8 EPG/VLAN 20 Transit VXLAN Active Standby Routing Adjacency … EPG/VLAN 10 L3 L2 DC Core ACI Spine Edge Cluster Host 1 Host 2 Host 3 L3 L2 ACI Border Leaf Host 4 DC CoreACI Spine NSX Edge Mapping to ACI Border Leaf CONFIDENTIAL
  • 31. Active-active Deployment Application active on both sides VIP-active APP A APP B APP C GSLB VIP-active APP A APP B APP E vCenter-A vCenter-B Active-active application pair Active-active application pair CONFIDENTIAL 33
  • 32. Site A Host 1 Host 2 Host 3 L3 L2 ACI Border Leaf Host 4 DC Core ACI Spine Site B Host 1 Host 2 Host 3 L3 L2 Non ACI Network Host 4 Even with Multi-DC: • NSX is always agnostic to the underlay • Zero requirement for identical hardware infrastructure at each site • Use non-proprietary L3 connectivity between sites • Still require the same few underlay features • Jumbo MTU • Stabile L2/L3 IP infrastructure Multi-DC Heterogeneous DR CONFIDENTIAL 34
  • 33. Agenda 35 1 NSX Architecture 2 NSX Connectivity Requirements 3 Nexus Switching Connectivity 4 ACI Fabric Connectivity 5 Deep Dive on NSX Cluster Connectivity 6 Summary & Question CONFIDENTIAL
  • 34. 95xx UCS and NSX • Fabric Connectivity • The Cisco Fabric Interconnect runs in end-host mode • The uplinks from Cisco UCS Fabric Interconnects have vPC connectivity to Nexus switches to provide loop-free topology • Network Connectivity • vNICs (UCS logical interface) are either dedicated or shared based on bandwidth and isolation requirements • VDS uplinks are equal to the number of VMNIC exposed per UCS blade for each VDS • Cisco UCS Blade Server multiple VTEPs are recommended with each VTEP mapping to different vNICs • The VDS uplink teaming mode cannot use LACP (its an orphaned connection) since fabric interconnect does not support server side LACP nor pass-through – vSphere Teaming Mode of Src ID • Fabric Connectivity for Edge Cluster (N-S Traffic) is a separate straight through connection UCS Edge Leaf L3 L2 95xx 93xx Edge Cluster UCS C-Series DC Core Internet/DMZ DC Fabric 93xx VPN VPN VPN VPN CONFIDENTIAL 36
  • 35. VXLAN dvPortgroup (VTEP) UCS Network Adapter & VXLAN • Assumes single UCS adaptor * • Two VTEPs per blade is recommended – VXLAN VDS is exposed with two uplinks vNICs – Improves VXLAN throughput – Each VTEP is mapped to unique vNIC which then maps to fabric A and B • VXLAN traffic can be shared with other traffic on single VDS • On UCS B-Series, recommend a dedicated VDS for the non-VPC transit VLAN used for routing N-S traffic • * If more then one UCS network adaptor employed, recommendation is to expose two uplinks for the VDS that carries VXLAN traffic which will utilize two VTEPs when using vSphere Src ID Teaming VMNIC 0 VMNIC 1 UCS B-Series Blade vNIC 1 Teaming Mode VMkernel VXLAN VTEP – 1 Traffic Type SRC_ID vNIC 0 dvUplink VMkernel VXLAN VTEP – 2 SRC_ID VDS - 1 MGMT, vMotion, NFS, VXLAN & Bridging CONFIDENTIAL 37
  • 36. Routing Adjacency Uplink Teaming Mode Non-VPC VXLAN 5020 Transit Link VXLAN 5020 Transit Link Routing Adjacency vSphere Host vSphere Host Uplink Teaming Mode VPC Peering over VPC Not Supported on Cisco Nexus Few exception Nexus 7K with Release 7.2 Nexus 3K – BGP Peering over non-VPC Non-LACP Teaming UCS C Series Peering over non-VPC Parallel Links UCS FI vPC L3 L2 L3 L2 vPC and Routing Peer Termination
  • 37. NSX Edge Routing Design with UCS C Series & Intel NICs 39 • 1:1 mapping is created between Edge uplinks (VLAN backed networks) and routing neighbors on the ToR A/B – Map each of these VLANs (portgroups) to a different dvUplink on Edge VDS to ensures distribution of N/S traffic across dvUplinks – The VLANs used for dynamic routing are local to each router – Edge Uplink = Host Uplink = VLAN = Adjacency – Avoid using VPC to ToR for route peering due to vendor dependencies – Teaming mode is “route Based on Originating Port” • Redundancy is handled by Dynamic Routing as Edges have adjacencies with both routers • eBGP is used between NSX ESG and routers A/B • Equally applicable to OSPF • Default route must follow the uplink status NSX Edge Gateway (all ESGs use same uplink configuration) VLAN 10 SVI (9K-A Only) VLAN 20 SVI (9K-B Only) Uplink A VLAN 10 vNIC1 Uplink A Uplink B VLAN20 vNIC2 Uplink B Edge Uplink Int 1 from VLAN 10 dvPortgroup (vmnicX active vmnicY unused) Edge Uplink Int 1 from VLAN 10 dvPortgroup (vmnicX active vmnicY unused) eBGP Peering Default route advertised downstream to 9K ToRs. Loss of both uplinks should withdraw all routes 9K-B9K-A 95xx 95xx VDS-Edge CONFIDENTIAL
  • 38. NSX Edge Routing Design with UCS B Series 40 • Dedicated non-VPC links from FI to ToR (pinned) VLANs used for Edge peering with N9Ks • Port-Channel is used to maintain redundancy and scaling BW based on number of Edge VMs deployed • 1:1 mapping between Edge uplinks (VLAN backed networks) and BGP neighbors on N9Ks. • Redundancy with Dynamic Routing as Edges have adjacencies with both N9Ks • Dedicated vNICs are created in UCS so that traffic for these VLANs is pinned to the FI uplinks • eBGP is used between NSX ESG and N9Ks • Default route must follow the uplink status VLAN 10 SVI (9K-A Only) VLAN 20 SVI (9K-B Only) Dedicated non- vPC pinned for VLAN 10 1 vNIC maps to Fabric A Edge Uplink Int 1 from VLAN 10 dvPortgroup (vmnicX active vmnicY unused) Dedicated non- vPC pinned for VLAN 20 1 vNIC maps to Fabric B Default route advertised downstream to 9K ToRs. Loss of both uplinks should withdraw all routes UCS FI-A UCS FI-B NSX Edge Gateway (all ESGs use same uplink configuration) eBGP Peering Edge Uplink Int 2 from VLAN 20 dvPortgroup (vmnicX active vmnicY unused) 95xx 95xx 9K-A 9K-B VDS-Edge CONFIDENTIAL
  • 39. VMNIC 0 VMNIC 1 VMNIC 2 VMNIC 3 UCS B-Series Blade vNIC 3vNIC 1 2204 FEX2204 FEX 6248 (A) 6248 (B) Teaming Mode VMkernel VXLAN VTEP – 1 Traffic Type VMkernel VXLAN VTEP - 2 VMkernel vMotion VMkernel Mgmt VMkernel IP Storage LBT SRC_ID SRC_ID Explicit Failover LBT Nexus 93XX NX-OS Mode Nexus 93XX NX-OS Mode vNIC 4vNIC 2 VDS – 2 Routing Routing VLAN PG 2 Bridging PG dvUplink Routing VLAN PG 1 VXLAN dvPg VDS - 1 MGMT, vMotion, NFS, VXLAN & Bridging VDS Design, Uplink & Traffic Mapping • Recommend a minimum of two vDS for Edge Cluster • VDS 1 – All traffic except N-S routing • VDS 2 – N-S Traffic Routing VLANs – External Connectivity requires dedicated non-VPC Links – Recommend a VDS for routing VLAN pinned on dedicated straight through links – Dual VTEP – each VTEP active on Fabric A and B respectively – The teaming recommendation for VTEP is SRC_ID – For the rest of the traffic teaming is based on local requirements – For UCS C-series Edge cluster, a single VDS would suffice CONFIDENTIAL 41
  • 40. • MTU: 9K – For line rate performance – 9000 MTU on the Fabric, VDS and pNIC – 8900 MTU on the VM – vNIC – Disable VXLAN Offload – Enable NetQueue – Number of VTEPs: Two – 2 Policies • VMQ Connection Policy • Adapter Policy Settings for B-Series • Regardless of VLAN or VXLAN Tuning Guideline for B-Series Blade 42 Adapter Policy VMQ Connection Policy CONFIDENTIAL
  • 41. NSX Design Guides • Reference Design: Deploying NSX with Cisco UCS and Nexus 9000 Infrastructure https://communities.vmware.com/docs/DOC-29373 • Design Guide for Vmware NSX running with a Cisco ACI Underlay Fabric https://communities.vmware.com/docs/DOC-30849 • VMware® NSX for vSphere Network Virtualization Design Guide version 3.0 https://communities.vmware.com/docs/DOC-27683 • More design documents https://www.vmware.com/support/pubs/vmware- validated-design-pubs.html CONFIDENTIAL 43
  • 42. Related VMworld Sessions • Introduction to Vmware NSX [NET7834] • Vmware NSX Deep Dive [9152] • Practical Path to NSX [8675] • NSX on ACI Customer Panel [8729] • Explore NSX Feature Labs – Vmware NSX Feature Tour [SPL-1703-SDC-1] • Self Paced Labs – Vmware NSX Feature Tour [ELW-1703-SDC-1] • Expert Led Workshop 44CONFIDENTIAL
  • 43. NSX partner ecosystem Physical Infrastructure Security Application Delivery Operations and Visibility DYNAMIC INSERTION OF PARTNER SERVICES
  • 44. Learn Connect & Engage communities.vmware.com NSX Product Page & Technical Resources vmware.com/products/nsx Network Virtualization Blog blogs.vmware.com/networkvirtualization VMware NSX on YouTube youtube.com/user/vmwarensx Where to get started Experience 70+ Unique NSX Sessions Spotlights, breakouts, quick talks & group discussions Visit the VMware Booth Use case demos, chat with NSX experts Visit NSX Technical Partner Booths Integration demos – EPSec & NetX, Hardware VTEP, Ops & Visibility Test Drive NSX with free Hands-on Labs Expert-led or Self-paced. labs.hol.vmware.com Use NSX Proactive Support Service Optimize performance based on data monitoring and analytics to help resolve problems, mitigate risk and improve operational efficiency. vmware.com/consulting Take Training and Certification Several paths to professional certifications. Learn more at the Education & Certification Lounge. vmware.com/go/nsxtraining
  • 45.
  • 46.
  • 47. How to Deploy VMware NSX with Cisco Infrastructure Ron Fuller, VMware Paul Mancuso, VMware NET8364R #NET8364R