SlideShare a Scribd company logo
1 of 56
Download to read offline
Softw
                                        a
                                   vSph re Switch
                                       ere an      fo
                                             d vClo r VMware
                                                    ud Dir
                                                           ector




Cisco Nexus 1010 Overview and Deployment

  Sal Lopez
  Technical Marketing Engineer
  SAVBU
Nexus 1000V Public Webinar Series


 Date	
                         Business	
  Sessions	
  	
                                                     Date	
                   Technical	
  Sessions	
  	
  
                                                                                                                           Nexus	
  1000V	
  New	
  Features	
  and	
  InstallaNon	
  
22-­‐Mar	
      Nexus	
  1000V	
  Family	
  Overview	
  and	
  Update	
                                     29-­‐Mar	
     Overview	
  
                Virtual Network Services
5-­‐Apr	
       (vPath, NAM, vWAAS)                                                                         12-­‐Apr	
     Nexus1010	
  InstallaNon	
  &	
  Upgrade	
  
                                                                                                                           Virtual	
  Security	
  Gateway	
  InstallaNon	
  and	
  Basic	
  
19-­‐Apr	
      Virtual Security Gateway Introduction                                                       26-­‐Apr	
     ConfiguraNon	
  	
  
                Journey	
  to	
  the	
  Cloud	
  w/	
  N1KV:	
  vCloud	
  Director	
  &	
  
3-­‐May	
       Long	
  Distance	
  vMoNon	
                                                                10-­‐May	
     Nexus	
  1000V	
  Advanced	
  ConfiguraNon	
  

17-­‐May	
      Secure	
  VDI	
  with	
  Nexus1000V	
  &	
  VSG	
                                           24-­‐May	
     Nexus	
  1000V	
  TroubleshooNng	
  




          N1K                              © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                                                                   2
Nexus 1000V “My Community”
        www.cisco.com/go/1000vcommunity




  N1K      © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   3
Nexus 1000V “My Community”
        www.cisco.com/go/1000vcommunity




  N1K      © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   4
Nexus 1000V “My Community”
        www.cisco.com/go/1000vcommunity




  N1K      © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   5
Nexus 1000V Screencasts




  N1K    © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   6
Nexus 1000V Screencasts




  N1K    © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   7
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   8
Nexus 1000V Architecture
Comparison to a Physical Switch




              Modular Switch

                    Supervisor-1
                    Supervisor-2
 Back Plane




                    Linecard-1
                    Linecard-2
                        …
                    Linecard-N




Server 1             Server 2      Server 3

              N1K                  © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   9
Nexus 1000V Architecture
Moving to a Virtual Environment




             Modular Switch

                   Supervisor-1
                   Supervisor-2
Back Plane




                   Linecard-1
                   Linecard-2
                       …
                   Linecard-N




                                                                                  ESX                             ESX   ESX




             N1K                  © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential               10
Nexus 1000V Architecture
Supervisors                                   Virtual Supervisor Modules (VSMs)
                                                                             Virtual Appliance
                                                                                             VSM1




                                                                                             VSM2


             Modular Switch

                   Supervisor-1
                   Supervisor-2
Back Plane




                   Linecard-1
                   Linecard-2
                       …
                   Linecard-N




                                                                                  ESX                              ESX   ESX




             N1K                  © 2011 Cisco and/or its affiliates. All rights reserved.    Cisco Confidential               11
Nexus 1000V Architecture
Linecards                            Virtual Ethernet Modules (VEMs)
                                                                             Virtual Appliance
                                                                                             VSM1




                                                                                             VSM2


             Modular Switch

                   Supervisor-1
                   Supervisor-2
Back Plane




                   Linecard-1
                   Linecard-2
                       …
                   Linecard-N

                                                                                 VEM-1                             VEM-2   VEM-N


                                                                                  ESX                              ESX     ESX




             N1K                  © 2011 Cisco and/or its affiliates. All rights reserved.    Cisco Confidential                   12
Nexus 1000V Architecture
  VSM + VEMs = Nexus 1000V Virtual Chassis
                                                                            Virtual Appliance
                                                                                            VSM1




                                                                                            VSM2

•  64 VEMs per 1000V
  (connected by L2 or L3)

•  200+ vEth ports per VEM




                                                                                                                  L2 Mode

                                                                                                                            L3 Mode
•  2K vEths per 1000V

•  Multiple 1000Vs can be
  created per vCenter


                                                                                VEM-1                                VEM-2            VEM-N


                                                                                 ESX                                   ESX            ESX
VSM: Virtual Supervisor Module
VEM: Virtual Ethernet Module


          N1K                    © 2011 Cisco and/or its affiliates. All rights reserved.    Cisco Confidential                               13
Nexus 1000V Architecture
   Customer Request: Host VSMs on a Physical Appliance
                                                                            Virtual Appliance                                         Physical Appliance?
                                                                                            VSM1




                                                                                            VSM2




                                                                                                                  L2 Mode

                                                                                                                            L3 Mode
•  200+ vEth ports per VEM
•  64 VEMs per 1000V                                                            VEM-1                                VEM-2                       VEM-N
•  2K vEths per 1000V
•  Multiple 1000Vs can be created per vCenter                                    ESX                                   ESX                       ESX
VSM: Virtual Supervisor Module
VEM: Virtual Ethernet Module


          N1K                    © 2011 Cisco and/or its affiliates. All rights reserved.    Cisco Confidential                                             14
Nexus 1000V Architecture
   VSMs hosted on a Physical Appliance: Nexus 1010
                                                                            Virtual Appliance                                          Nexus 1010
                                                                                                                                     VSM-A1   … VSM-A4


•  Up to 4 VSMs per Nexus 1010
                                                                                                                                     VSM-B1   …   VSM-B4




•  Nexus 1010s deployed in
 redundant pair




                                                                                                                 L2 Mode

                                                                                                                           L3 Mode
•  200+ vEth ports per VEM
•  64 VEMs per 1000V                                                            VEM-1                               VEM-2                            VEM-N
•  2K vEths per 1000V
•  Multiple 1000Vs can be created per vCenter                                    ESX                                  ESX                            ESX
VSM: Virtual Supervisor Module
VEM: Virtual Ethernet Module


          N1K                    © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                                               15
Embedding Intelligence for Virtual Services
        vPath – Virtual Service Datapath
                       Virtual Appliance


             vWAAS            VSG                         VSM




vPath
•  Virtual Service Datapath



                                                                                     L2 Mode

                                                                                                 L3 Mode
VSG
•  Virtual Security Gateway for 1000v
vWAAS                                                                                                                         vPath
•  Virtual WAAS
                                                                                                                       •  Traffic Steering

                                                            VEM-1                                             VEM-2
                                                                                                                       •  Fast -Path Offload
                                                             vPath                                             vPath

                                                             ESX                                               ESX     •  Nexus 1000V ver 1.4
                                                                                                                               & above


       N1K                    © 2011 Cisco and/or its affiliates. All rights reserved.         Cisco Confidential                               16
Nexus 1010 – Hosting Platform for
      Services
                    Virtual Appliance                                                                                    Nexus 1010

             vWAAS            VSG
                                                                                                                VSM-A1   VSM-A4   NAM




                                                                                                                VSM-B1   VSM-B4   NAM




vPath
•  Virtual Service Datapath



                                                                                     L2 Mode

                                                                                                 L3 Mode
VSG
•  Virtual Security Gateway for 1000v
vWAAS
•  Virtual WAAS


                                                            VEM-1                                             VEM-2
                                                             vPath                                             vPath

                                                             ESX                                               ESX

*VSG on 1010 target: 2Q CY11


       N1K                    © 2011 Cisco and/or its affiliates. All rights reserved.         Cisco Confidential                       17
Cisco Nexus 1010 Overview and Deployment

  Sal Lopez
  Technical Marketing Engineer
  SAVBU
Agenda

§  Nexus 1010 Hardware and Software
§  Nexus 1000V VSM connectivity on Nexus 1010
§  Nexus 1010 Network Integration and Data Center Design
§  Nexus 1010 Virtual Service Blade Configuration and Verification
§  Nexus 1010 Upgrade Process




 N1K          © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   19
Nexus 1010 Hardware
and Software


                                                                                       Software
                                                                                                Switch fo
                                                                                       vSphere            r
                                                                                               4.0 and 4
                                                                                                         .1




N1K    © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                          20
Nexus 1010 Hardware Configuration

Based on UCS Physical Appliance
       §  2 x Intel X5650- 2.66GHz, 6 core
       §  16 GB RAM
       §  2 x 500GB SATA-II HDD
       §  1 x Quadport GE NIC Card
       §  1 x Serial Port
       §  1 x Rail-Kit




 N1K                © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   21
Nexus 1010 Ports and Components
      §  Cisco Integrated Management Controller for lights out, out of band
          management (use KVM cable to setup), similar to CMP for other
          NX-OS switches
      §  6 Gigabit Ethernet ports (2 LOM for management/control, 4 on
          PCIe card)




1   Power supply (one)                                                                   2    CIMC port (RJ-45) 10/100 Mbps
3   USB 2.0 connectors (two)                                                             4    Serial connector (DB9)
5   Video connector (15-pin VGA)                                                         6    Gigabit Ethernet Ports (1 and 2)
7   Gigabit Ethernet ports (3 to 6)                                                      8    Standard-profile PCIe card slot (not used)




         N1K                  © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                                22
Nexus 1010 Virtual Service Blade
§  The Nexus 1010 comes with a new concept of Virtual
    Services called Virtual Service Blade (VSB)
§  Shipping today:
      VSM virtual service blade
      NAM virtual service blade
§  VSG, DCNM in future releases
                                                                                       Network Analysis Module*



                Nexus 1000V VSM




                         Nexus 1010 Manager
N1K        © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential              * Optional virtual service blade add-on   23
Nexus 1010 Scalability



                                                                                                                    Network Analysis
                                                                                                                        Module



Nexus 1000V VSM        Nexus 1000V VSM                             Nexus 1000V VSM                Nexus 1000V VSM




                                Nexus 1010 Manager
Nexus 1010 Manager: Cisco management experience
Manages a total of 5 virtual service blades (ie. 4 VSMs and 1 NAM)
Each VSM can manage up to 64 VEMs (256 total VEMs)

N1K               © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                                        24
Feature Comparison


                                                                                              VSM as VM    VSM on
                                                                                                          Nexus 1010
Nexus 1000V features and scalability                                                                        
VEM running on vSphere 4 Enterprise Plus                                                                    
NX-OS high availability of VSM                                                                              
Software-only deployment                                                                         
Installation like a standard Cisco switch                                                                    
Network Team owns/manages the VSM                                                                            
VSM Isolation from production VM
environment in case of outage                                                                                
Least number of steps to deploy VSM                                                                          


N1K           © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                            25
Nexus 1010 Managed By Network Team

§  VSM planned and deployed on networking
    equipment
§  Access to console consistent with existing network
    gear (no additional software needed)
§  Troubleshoot via Cisco NX-OS CLI
§  Nexus 1010 platform can be managed via SNMP
§  Secured by AAA




N1K       © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   26
Nexus 1010 High Availability
§ Process HA at NX-OS level
    • Modular OS based on Linux

§ Virtual Service Blade redundancy
    • Nexus 1010 automation and state synchronization
    • Create primary VSM once and secondary VSM gets created for you

§ Chassis Level Redundancy
    • Deployed in pairs
    • Same mechanisms used as redundant supervisors on switches
    • Prevent split brain scenario with CIMC as backup connection

§ Network Level Redundancy
    • Flexible network integration options with traffic isolation, trunking and LACP




    N1K             © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   27
Nexus 1000V VSM
connectivity on Nexus
1010

                                                                                        Software
                                                                                                 Switch fo
                                                                                        vSphere            r
                                                                                                4.0 and 4
                                                                                                          .1




N1K     © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                          28
VSM to VEM Communications
Two virtual interfaces are used to communicate between the
VSM and VEM
                                                                    Control VLAN
      VM    VM       VM                VM                           • Extend the usual backplane of the switch
                                                                    over the network
                                                                    • Carries low level messages to ensure proper
                                                                    configuration of the VEM.
                                                                    • Maintains a 1 sec heartbeat with the VSM to
                                                                    the VEM (timeout of 6 seconds)
                                                                    • Maintains syncronization between primary
                 L2 Network                                         and secondary VSMs

Control VLAN
Packet VLAN                                                         Packet VLAN
                                                                    For control plane processing like CDP, IGMP
                                                                    snooping, or stat collections like SNMP,
           Nexus 1000V VSM                                          Netflow
            On Nexus 100
N1K                © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                  29
Layer 2 connectivity of the VSM and VEM


                                                                          § For L2 deployment, Control and Packet
      VM    VM       VM                VM                                 VLAN needs to be configured end to end
                                                                          to allow communication between the
                                                                          VSM and the VEM

                                                                          If those VLANs are not configured end to
                                                                          end the VEM will not show up even if it
                                                                          looks like it is in vCenter
                 L2 Network
                                                                          Control VLAN and Packet VLAN needs to
Control VLAN                                                              be configured as system VLAN on the
Packet VLAN                                                               uplink port-profile

                                                                          Can use 1 or 2 VLANs for Control/Packet
           Nexus 1000V VSM                                                traffic
            On Nexus 100


N1K                © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                     30
Layer 3 connectivity of the VSM and VEM


 VM      VM      VM                VM
                                                                    For L3 Control, L2 adjacency for
                                                                    Control and Packet not required



                                                      VSM uses a svs mode type layer 3 using either
              L3 Network
                                                      the control0 Interface or the mgmt0 interface

                                                      User can specify an IP address for control0 to use a
                                                      separate network for VEM – VSM communication

                                                      svs-domain
                                                        svs mode L3 interface (control0 | mgmt0)
      Nexus 1000V VSM
       On Nexus 100


N1K              © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential         31
Nexus 1010 Network
Integration and Data
Center Design

                                                                                        Software
                                                                                                 Switch fo
                                                                                        vSphere            r
                                                                                                4.0 and 4
                                                                                                          .1




N1K     © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                          32
Nexus 1010 Network Integration Design


There are 4 uplink options to connect the Nexus 1010 to the
Network
This will influence how the control, packet, management and
data information will be connected to rest of the network




   N1K        © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   33
Nexus 1010 Network Integration –
           Uplink Type 1
         §  Nexus 1010 uplink type 1:Ports 1 and 2 carry Management, Control and Data
             traffic


Sample Topology:
Common L2 Network with                                                                     Setup 1                                             Setup 2
upstream switch N5K/N2K
Upstream Switch Access Ports:

interface ethernet 101/1/1-2
!-- multiple vlans trunked across link
switchport mode trunk
!--only allow mgmt, control and data vlans
switchport trunk allowed vlan 170,250-251
!-- enable portfast edge
spanning-tree port type edge trunk
                                                                       Eth1            Eth2       Eth1             Eth2        Eth1            Eth2   Eth2     Eth1


                                                                          Active VSM                         HA-Standby           Active VSM                 HA-Standby
                                                                                                             VSM                                             VSM




                                                             N1010-1                              N1010-2                 N1010-1                     N1010-2
Nexus 1010                                                   Active Chassis                       HA-Standby Chassis      Active Chassis              HA-Standby Chassis
Eth1: active (forwarding)
Eth2: standby (not forwarding)
Total Bandwidth per device is 1Gbps

           N1K                  © 2011 Cisco and/or its affiliates. All rights reserved.      Cisco Confidential                                                          34
Nexus 1010 Network Integration –
           Uplink Type 2
         §  Nexus 1010 uplink type 2:Ports 1 and 2 carry Management and Control; Ports 3-6 carry
             Data traffic
         §  Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth
Sample Topology:
Common L2 Network, upstream switch N5K/N2K with vPC
Upstream LACP Ports (both switches):
interface ethernet 101/1/2, 101/1/4
!-- multiple vlans trunked across link
switchport mode trunk
                                                                                                                                                 1
!-- only allow mgmt, control and data vlans
switchport trunk allowed vlan 251                                                                                                       6
                                                                                                                                             2
!-- enable portfast edge                                                                                                       5                                     6
spanning-tree port type edge trunk                                                                 1      2     3          4                     3    4   5
!-- add interface to port-channel, this is a vpc
channel-group 1010 mode active

!-- this is a unique vpc for N1010-1                                                          E1       E2 E3 E4         E5         E6
                                                                                                                                            E1       E2 E3 E4   E5       E6
interface port-channel 1010
vpc 1010
                                                                                                                                                          HA-Standby
                                                                                                              Active VSM
                                                                                                                                                          VSM
**Config must be repeated for N1010-2 on interfaces 101/1/5-6
Nexus 1010                                                                                     N1010-1                                           N1010-2
Eth1: active (forwarding)                                                                      Active Chassis                                    HA-Standby Chassis
Eth2: standby (not forwarding)
Eth3-6:forwarding in LACP bundle
Total Bandwidth per device is 5Gbps

           N1K                     © 2011 Cisco and/or its affiliates. All rights reserved.        Cisco Confidential                                                         35
Nexus 1010 Network Integration –
           Uplink Type 3
           (Most Common for VSM Deployment)
         §  Nexus 1010 uplink type 3:Ports 1 and 2 carry Management; Ports 3-6 carry Control and
             Data traffic
         §  Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth
Sample Topology:
Common L2 Network, upstream switch N5K/N2K with vPC

Upstream LACP Ports (both switches):
interface ethernet 101/1/2, 101/1/4
!-- multiple vlans trunked across link
switchport mode trunk                                                                                                                             1
!-- only allow mgmt, control and data vlans                                                                                              6
switchport trunk allowed vlan 250-251                                                                                                         2
                                                                                                                                5                                     6
!-- enable portfast edge                                                                            1                       4                     3    4   5
                                                                                                           2     3
spanning-tree port type edge trunk
!-- add interface to port-channel, this is a vpc
channel-group 1010 mode active
                                                                                               E1       E2 E3 E4         E5         E6                E2 E3 E4
                                                                                                                                             E1                  E5       E6
!-- this is a unique vpc for N1010-1
interface port-channel 1010
vpc 1010                                                                                                       Active VSM
                                                                                                                                                           HA-Standby
                                                                                                                                                           VSM

**Config must be repeated for N1010-2 on interfaces 101/1/5-6
                                                                                                N1010-1                                           N1010-2
Nexus 1010                                                                                      Active Chassis                                    HA-Standby Chassis
Eth1: active (forwarding)
Eth2: standby (not forwarding)
Eth3-6:forwarding in LACP bundle
Total Bandwidth per device is 5Gbps
            N1K                     © 2011 Cisco and/or its affiliates. All rights reserved.        Cisco Confidential                                                         36
Nexus 1010 Network Integration –
         Uplink Type 4
       §  Nexus 1010 uplink type 4:Ports 1 and 2 carry Management; Ports 3 and 4
           carry Control, Ports 5 and 6 carry Data traffic


Sample Topology:
Common L2 Network with
upstream switch N5K/N2K
Upstream Switch Access Ports:
interface ethernet 101/1/1
!-- multiple vlans trunked across link
switchport mode trunk
!-- only allow mgmt, control and data vlans
switchport trunk allowed vlan 170
!-- enable portfast edge
spanning-tree port type edge trunk
                                                                                         E1     E2 E3 E4           E5   E6          E2 E3 E4
                                                                                                                             E1                 E5     E6


                                                                                                                                          HA-Standby
Nexus 1010                                                                                              Active VSM
                                                                                                                                          VSM

Eth1: active (forwarding)
Eth2: standby (not forwarding)                                                            N1010-1                                 N1010-2
Eth3: active (forwarding)                                                                 Active Chassis                          HA-Standby Chassis
Eth4: standby (not forwarding)
Eth5: active (forwarding)
Eth6: standby (not forwarding)
Total Bandwidth per device is 3Gbps
          N1K                 © 2011 Cisco and/or its affiliates. All rights reserved.        Cisco Confidential                                            37
Nexus 1010 Network Connectivity
     Summary

Uplink                            Description

Option 1                          Ports 1-2 Carry All Management, Control, and
                                  Data Traffic
                                  • Really easy to deploy
Option 2                          Ports 1-2 Carry Management and Control,
                                  Ports 3-6 Carry Data Traffic
                                  • Most of the bandwidth available for other Virtual
                                  Service Blades (ie. NAM)
Option 3                          Ports 1-2 Carry Management, Ports 3-6 Carry
                                  Control and Data Traffic
                                  • Most bandwidth for VSM Virtual Service Blades
                                  and other VSBs
Option 4                          Ports 1-2 Carry Management, Ports 3-4 Carry
                                  Control, Ports 5-6 Carry Data Traffic
                                  • Clear separation of all the different types of traffic

     N1K    © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential    38
Nexus 1010 in the Access Layer
                                                                           Core



§  L2 Control for VSM to
    VEM is easier here
                                                                           Aggregation
       All servers/switches below
                                                                                                 L3
       need Control/Packet
                                                                                                 L2
       VLANs
       L2 Network Services such                                            Access
       as VSG (future)                                                     Nexus 1000V VSM VSB


§  L3 Control for VSM
    possible
§  HA pair can be dedicated
                                                                           Compute/Virtual Access

                                                                               Nexus
    per POD or customer                                                        1000V
                                                                               VEM
       More VSBs available per
       POD or customer
                                                                               ESXi




 N1K            © 2011 Cisco and/or its affiliates. All rights reserved.    Cisco Confidential        39
Nexus 1010 in the Aggregation Layer
§  L3 Control for VSM to
                                                                           Core



    VEM is more flexible
    here                                                                   Aggregation

       IP routing should be robust                                         Nexus 1000V VSM VSB      L3

       Suitable for long distance                                                                   L2
       (future)

§  L2 Control for VSM                                                     Access



    possible
§  HA pair can be shared
    among PODs or                                                          Compute/Virtual Access


    customers                                                                 Nexus
                                                                              1000V
                                                                              VEM
       If using L3, there should be
       IP connectivity to VSM VSB
       from each POD                                                          ESXi




 N1K            © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential            40
Nexus 1010 and VSB
Configuration

                                                                                       Software
                                                                                                Switch fo
                                                                                       vSphere            r
                                                                                               4.0 and 4
                                                                                                         .1




N1K    © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                          41
Nexus 1010 Initial Setup - CIMC




N1K    © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   42
Nexus 1010 Initial Configuration
§  Access Console via Telnet or Serial over LAN
§  Setup System Admin Account and Basic System Configuration
         telnet 172.25.182.99 2005
         Trying 172.25.182.99...
         Connected to 172.25.182.99.
         Escape character is '^]'

         ---- System Admin Account Setup ----


         Enter the password for "admin":
           Confirm the password for "admin":                                                             HA Role for each chassis
           Enter HA role[primary/secondary]: primary


             Enter network-uplink type <1-4>:
             1. Ports 1-2 carry all management, control and data vlans
             2. Ports 1-2 management and control, ports 3-6 data                                          Network uplink type for
             3. Ports 1-2 management, ports 3-6 control and data
             4. Ports 1-2 management, ports 3-4 control, ports 5-6 data                                   network integration
         3


             Enter control vlan <1-3967, 4048-4093>: 250


             Enter the domain id<1-4095>: 201                                                           Domain ID must be unique
             Enter management vlan <1-3967, 4048-4093>: 170

                                                                                                        Mgmt VLAN is shared with
             Saving boot configuration. Please wait...
                                                                                                        VSM
         [########################################] 100%
   N1K                  © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                           43
VSM VSB Installation Steps on Nexus
1010

§  Create VSM as VSB on N1010
§  Register certificate as plug-in in vCenter
§  Define ethernet and vethernet port-profile
      Includes VLANs and physical settings to upstream switch
      For mac-pinning, upgrade feature level

§  Install VEM using vCenter




N1K          © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   44
Creating and Configuring a VSM VSB
tme-1010-1(config)# virtual-service-blade VSM-1010-1
                                                                                                      Create and name the VSB
tme-1010-1(config-vsb-config)# virtual-service-blade-type new nexus-1000v.4.0.4.SV1.3a.iso

tme-1010-1(config-vsb-config)# interface control vlan 251

tme-1010-1(config-vsb-config)# interface packet vlan 252

tme-1010-1(config-vsb-config)# enable

Enter vsb image: [nexus-1000v.4.0.4.SV1.3.iso]
                                                                                                     One command deploys both
Enter domain id[1-4095]: 203                                                                         Primary and Secondary VSM
Management IP version [V4/V6]: [V4]

Enter Management IP address: 10.29.170.84
                                                                                                     This is done only for HA
                                                                                                     aware VSBs
Enter Management subnet mask: 255.255.255.0

IPv4 address of the default gateway: 10.29.170.1

Enter HostName: VSM-1010-1

Enter the password for 'admin': P@ssw0rd1

tme-1010-1(config-vsb-config)#no shut


     N1K             © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                              45
VSB Control and HA Verification
§  The Network Admin has total control over the VSB deployment
tme-1010-1# show virtual-service-blade
virtual-service-blade AV2-1010-VSM
  Description:
  Slot id:          2
  Host Name:        AV2-VSM-1
  Management IP:    10.29.170.254
  VSB Type Name :       VSM-1.0
  Interface:               control          vlan:            254                                             Verify VSB IP address and Control,
  Interface:            management          vlan:            170
  Interface:                packet          vlan:            255
                                                                                                             Mgmt and Packet VLANs
  Interface:              internal          vlan:              NA
  Ramsize:          2048
  Disksize:         3
  Heartbeat:        132670
  HA Admin role: Primary
    HA Oper role: ACTIVE
    Status:         VSB POWERED ON
    Location:       PRIMARY
    SW version:     4.0(4)SV1(3a)
                                                                                                             VSBs deployed in an HA pair by
  HA Admin role: Secondary                                                                                   default (result of enable
    HA Oper role: STANDBY
                                                                                                             command).
    Status:         VSB POWERED ON
    Location:       SECONDARY
    SW version:     4.0(4)SV1(3a)
  VSB Info:
    Domain ID : 401
   N1K                       © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                                    46
Nexus 1010 and VSB Network
Verification
tme-1010-1# show network-uplink type

Administrative topology id: 3                                                                      Configured and actual operating
Operational topology id: 3                                                                         topology are shown
tme-1010-1# show network summary

-----------------------------------------------------------------------

                  Port               State                  Speed                 MTU

-----------------------------------------------------------------------

      GigabitEthernet1                      up                1000              1500

      GigabitEthernet2                      up                1000              1500

      GigabitEthernet3                      up                1000              1500

      GigabitEthernet4                      up                1000              1500
                                                                                                   Po1 represents active/standby
      GigabitEthernet5                      up                1000              1500
                                                                                                   bundle between E1 and E2
      GigabitEthernet6                      up                1000              1500

          PortChannel1                      up                1000              1500               Po2 represents the LACP bundle
          PortChannel2                      up                1000              1500               between E3-E6
         VbEthernet1/1                      up                1000              1500

         VbEthernet1/2                      up                1000              1500

         VbEthernet1/3                      up                1000              1500
N1K                © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                                   47
NAM Virtual Blade on Nexus 1010
Optimize Application Performance and Network Resources

       VM      VM      VM               VM                               §  Application Performance Monitoring
                                                                         §  Traffic Analysis and Reporting
       Nexus                                                                     Applications, Host, Conversations, VLAN,
       1000V                                                                     QoS, etc.
        VEM
                                                                                 Per-application, per-user traffic analysis
                       vSphere
                                                                         §  View VM-level Interface Statistics
                                                                         §  Packet Capture and Decodes
                                                                         §  Historical Reporting and Trending



                                                                                 ERSPAN
                                                                                                                        NAM
                                                                                                                       Virtual
                                                                                                                      Blade on
                                                                                  NetFlow                              Nexus
                             Nexus 1000V
                                VSM                                                                                     1010
 vCenter


 N1K                © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                                48
Creating and Configuring a NAM VSB

N1010-1(config)# virtual-service-blade NAM-VSB

N1010-1(config-vsb-config)# virtual-service-blade-type name NAM-1.0

N1010-1(config-vsb-config)# interface data vlan 180

N1010-1(config-vsb-config)# enable
                                                                                               Data VLAN for Non-VSM
                                                                                               VSBs
Enter vsb image: nam-app-x86_64.4-2-1-fc5.iso

Enter Management IPV4 address: 10.29.180.99

Enter Management subnet mask: 255.255.255.0                                                    IP address for Web GUI
IPv4 address of the default gateway: 10.29.180.1                                               administration
Enter HostName: vNAM-1

Setting Web user/passwd will enable port 80. Enter[y|n]: [n] y

Web User name: [admin]

Web User password: P@ssw0rd

N1010-1(config-vsb-config)# no shut



N1K            © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                            49
Access NAM VSB via Web GUI
§  Use the previously defined IP address and credentials




N1K       © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   50
Nexus 1010 Upgrade
Process

                                                                                       Software
                                                                                                Switch fo
                                                                                       vSphere            r
                                                                                               4.0 and 4
                                                                                                         .1




N1K    © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                          51
Upgrading the Nexus 1010 Appliance
 Software (1 of 2)

§  Download new ISO image from CCO
§  Log into active N1010 via console
§  Copy new image over to bootflash
§  Use the install command
       install nexus1010 bootflash:nexus-1010.4.2.1.SP1.2.iso

§  Save configuration
§  Log into VSM VSB
§  Switch over HA active VSM VSBs to active N1010


 N1K           © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   52
Upgrading the Nexus 1010 Appliance
Software (2 of 2)


§  From N1010 CLI, reload standby when all active VSM
    VSBs are switched over to active
      ie. reload module 2 if Secondary is standby
§  From withing VSM VSB CLI, switchover HA active VSBs
    to newly upgraded N1010 (originally standby from
    above)
§  Reload the original active N1010
      Non HA VSBs may experience disruption (NAM)
§  To upgrade VSM NX-OS, please follow N1KV upgrade
    procedure
      Note: Must make Secondary VSM the active first


N1K          © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   53
For More Information
See the following Resources
§  Nexus 1010 Virtual Services Appliance Hardware
    Installation Guide
§  Nexus 1010 Software Installation and Upgrade
    Guide
§  Nexus 1010 Deployment Guide
§  Nexus 1000V Configuration, Installation and
    Upgrade Guides
§  NAM VSB Configuration Guide
§  Nexus 1000V Webinar Series


N1K       © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   54
Sign up at: http://tinyurl.com/1000v-webinar

 Date	
                         Business	
  Sessions	
  	
                                                     Date	
                   Technical	
  Sessions	
  	
  
                                                                                                                           Nexus	
  1000V	
  New	
  Features	
  and	
  InstallaNon	
  	
  
22-­‐Mar	
      Nexus	
  1000V	
  Family	
  Overview	
  and	
  Update	
                                     29-­‐Mar	
     Overview	
  
                Virtual Network Services (vPath, vWAAS,
5-­‐Apr	
       NAM)
                                                                                                            12-­‐Apr	
     Nexus1010	
  InstallaNon	
  &	
  Upgrade	
  
                                                                                                                           Virtual	
  Security	
  Gateway	
  InstallaNon	
  and	
  Basic	
  
19-­‐Apr	
      Virtual Security Gateway Introduction                                                       26-­‐Apr	
     ConfiguraNon	
  	
  Overview	
  
                Journey	
  to	
  the	
  Cloud	
  w/	
  N1KV:	
  vCloud	
  Director	
  &	
  
3-­‐May	
       Long	
  Distance	
  vMoNon	
                                                                10-­‐May	
     Nexus	
  1000V	
  Advanced	
  ConfiguraNon	
  

17-­‐May	
      Secure	
  VDI	
  with	
  Nexus1000V	
  &	
  VSG	
                                           24-­‐May	
     Nexus	
  1000V	
  TroubleshooNng	
  


                                                                                           Web Sites
                                                          www.cisco.com/go/1000v
                                                          www.cisco.com/go/nexus1010
                                                          www.cisco.com/go/vsg
                                                          www.cisco.com/go/vnmc
                                                          www.cisco.com/go/1000vcommunity
                                                            (Preso and Q&A posted here)
          N1K                              © 2011 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential                                                                     55
Thank you.

More Related Content

What's hot

Cisco data center switch nexus series training presentation by zerone
Cisco data center switch nexus series training presentation by zeroneCisco data center switch nexus series training presentation by zerone
Cisco data center switch nexus series training presentation by zerone零壹科技股份有限公司
 
Cisco Nexus Family Platform Overview
Cisco Nexus Family Platform OverviewCisco Nexus Family Platform Overview
Cisco Nexus Family Platform OverviewCybera Inc.
 
Presentation cisco plus tech datacenter virtualisering
Presentation   cisco plus tech datacenter virtualiseringPresentation   cisco plus tech datacenter virtualisering
Presentation cisco plus tech datacenter virtualiseringxKinAnx
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG IT
 
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...VMworld
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsxsolarisyougood
 
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware  NSXThe Vision for the Future of Network Virtualization with VMware  NSX
The Vision for the Future of Network Virtualization with VMware NSXScott Lowe
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuVirtSGR
 
Cisco Virtualized Network Services
Cisco Virtualized Network ServicesCisco Virtualized Network Services
Cisco Virtualized Network ServicesSoumen Chatterjee
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Netgear Italia
 
VMware NSX + Cumulus Networks: Software Defined Networking
VMware NSX + Cumulus Networks: Software Defined NetworkingVMware NSX + Cumulus Networks: Software Defined Networking
VMware NSX + Cumulus Networks: Software Defined NetworkingCumulus Networks
 
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationVMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationBayu Wibowo
 
Cisco asr 1000 series embedded services processors data sheet.
Cisco asr 1000 series embedded services processors data sheet.Cisco asr 1000 series embedded services processors data sheet.
Cisco asr 1000 series embedded services processors data sheet.Amanda Meng
 
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...VMworld
 
NSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep DiveNSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep DivePooja Patel
 
CELC_Новые возможности Cisco UCS
CELC_Новые возможности Cisco UCSCELC_Новые возможности Cisco UCS
CELC_Новые возможности Cisco UCSCisco Russia
 
SEC8022_Securing_SDDC_NSX_Hammad_Shahzad
SEC8022_Securing_SDDC_NSX_Hammad_ShahzadSEC8022_Securing_SDDC_NSX_Hammad_Shahzad
SEC8022_Securing_SDDC_NSX_Hammad_Shahzadshezy22
 
EMC VSPEX for Virtualizing Your Data Center
EMC VSPEX for Virtualizing Your Data CenterEMC VSPEX for Virtualizing Your Data Center
EMC VSPEX for Virtualizing Your Data CenterCTI Group
 
네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성NAIM Networks, Inc.
 
Cisco at v mworld 2015 vmworld - cisco mds and emc xtrem_io-v2
Cisco at v mworld 2015 vmworld - cisco mds and emc xtrem_io-v2Cisco at v mworld 2015 vmworld - cisco mds and emc xtrem_io-v2
Cisco at v mworld 2015 vmworld - cisco mds and emc xtrem_io-v2ldangelo0772
 

What's hot (20)

Cisco data center switch nexus series training presentation by zerone
Cisco data center switch nexus series training presentation by zeroneCisco data center switch nexus series training presentation by zerone
Cisco data center switch nexus series training presentation by zerone
 
Cisco Nexus Family Platform Overview
Cisco Nexus Family Platform OverviewCisco Nexus Family Platform Overview
Cisco Nexus Family Platform Overview
 
Presentation cisco plus tech datacenter virtualisering
Presentation   cisco plus tech datacenter virtualiseringPresentation   cisco plus tech datacenter virtualisering
Presentation cisco plus tech datacenter virtualisering
 
VMUG - NSX Architettura e Design
VMUG - NSX Architettura e DesignVMUG - NSX Architettura e Design
VMUG - NSX Architettura e Design
 
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...
vVMworld 2013: Deploying, Troubleshooting, and Monitoring VMware NSX Distribu...
 
Reference design for v mware nsx
Reference design for v mware nsxReference design for v mware nsx
Reference design for v mware nsx
 
The Vision for the Future of Network Virtualization with VMware NSX
The Vision for the Future of Network Virtualization with VMware  NSXThe Vision for the Future of Network Virtualization with VMware  NSX
The Vision for the Future of Network Virtualization with VMware NSX
 
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.RuCisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
Cisco VSG_Конкурс продуктов портала VirtualizationSecurityGroup.Ru
 
Cisco Virtualized Network Services
Cisco Virtualized Network ServicesCisco Virtualized Network Services
Cisco Virtualized Network Services
 
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
Webinar NETGEAR - Acronis e Netgear per la protezione e l'efficienza dei sist...
 
VMware NSX + Cumulus Networks: Software Defined Networking
VMware NSX + Cumulus Networks: Software Defined NetworkingVMware NSX + Cumulus Networks: Software Defined Networking
VMware NSX + Cumulus Networks: Software Defined Networking
 
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway IntegrationVMware NSX and Arista L2 Hardware VTEP Gateway Integration
VMware NSX and Arista L2 Hardware VTEP Gateway Integration
 
Cisco asr 1000 series embedded services processors data sheet.
Cisco asr 1000 series embedded services processors data sheet.Cisco asr 1000 series embedded services processors data sheet.
Cisco asr 1000 series embedded services processors data sheet.
 
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
VMworld 2013: Datacenter Transformation with Network Virtualization: Today an...
 
NSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep DiveNSX for vSphere Logical Routing Deep Dive
NSX for vSphere Logical Routing Deep Dive
 
CELC_Новые возможности Cisco UCS
CELC_Новые возможности Cisco UCSCELC_Новые возможности Cisco UCS
CELC_Новые возможности Cisco UCS
 
SEC8022_Securing_SDDC_NSX_Hammad_Shahzad
SEC8022_Securing_SDDC_NSX_Hammad_ShahzadSEC8022_Securing_SDDC_NSX_Hammad_Shahzad
SEC8022_Securing_SDDC_NSX_Hammad_Shahzad
 
EMC VSPEX for Virtualizing Your Data Center
EMC VSPEX for Virtualizing Your Data CenterEMC VSPEX for Virtualizing Your Data Center
EMC VSPEX for Virtualizing Your Data Center
 
네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성
 
Cisco at v mworld 2015 vmworld - cisco mds and emc xtrem_io-v2
Cisco at v mworld 2015 vmworld - cisco mds and emc xtrem_io-v2Cisco at v mworld 2015 vmworld - cisco mds and emc xtrem_io-v2
Cisco at v mworld 2015 vmworld - cisco mds and emc xtrem_io-v2
 

Viewers also liked

DCI NetApp Benefits
DCI NetApp BenefitsDCI NetApp Benefits
DCI NetApp BenefitsMainstay
 
11 applications of factoring
11 applications of factoring11 applications of factoring
11 applications of factoringelem-alg-sample
 
FAQ on Dedupe NetApp
FAQ on Dedupe NetAppFAQ on Dedupe NetApp
FAQ on Dedupe NetAppAshwin Pawar
 
Parallel testing overview
Parallel testing overviewParallel testing overview
Parallel testing overviewBarbara Getter
 
Analysis of pk data- Pop PK analysis
Analysis of pk data- Pop PK analysisAnalysis of pk data- Pop PK analysis
Analysis of pk data- Pop PK analysisGayathri Ravi
 
Top 5 Mistakes in Mobile Affiliate Marketing
Top 5 Mistakes in Mobile Affiliate MarketingTop 5 Mistakes in Mobile Affiliate Marketing
Top 5 Mistakes in Mobile Affiliate MarketingAffiliate Summit
 
Robot Framework Introduction & Sauce Labs Integration
Robot Framework Introduction & Sauce Labs IntegrationRobot Framework Introduction & Sauce Labs Integration
Robot Framework Introduction & Sauce Labs IntegrationSauce Labs
 
Use of Analytics in Procurement
Use of Analytics in ProcurementUse of Analytics in Procurement
Use of Analytics in ProcurementRajat Dhawan, PhD
 
Simplify your CSS with Stylus and Nib
Simplify your CSS with Stylus and NibSimplify your CSS with Stylus and Nib
Simplify your CSS with Stylus and NibChristian Joudrey
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Sverige
 
New Product Development Report
New Product Development ReportNew Product Development Report
New Product Development ReportGlen Chan
 
Honda International Case Study
Honda International Case StudyHonda International Case Study
Honda International Case StudyJacob Hostetler
 
Regions of the United States: The Northeast
Regions of the United States: The NortheastRegions of the United States: The Northeast
Regions of the United States: The NortheastJohn Pascoe
 
AEM GEMS Session SAML authentication in AEM
AEM GEMS Session SAML authentication in AEMAEM GEMS Session SAML authentication in AEM
AEM GEMS Session SAML authentication in AEMAdobeMarketingCloud
 
HORMONAL REGULATION OF OVULATION,PREGNANCY,PARTURITION
HORMONAL REGULATION OF OVULATION,PREGNANCY,PARTURITIONHORMONAL REGULATION OF OVULATION,PREGNANCY,PARTURITION
HORMONAL REGULATION OF OVULATION,PREGNANCY,PARTURITIONSudarshan Gokhale
 
Precancerous lesions & conditions
Precancerous lesions & conditionsPrecancerous lesions & conditions
Precancerous lesions & conditionsArsalan Wahid Malik
 

Viewers also liked (20)

DCI NetApp Benefits
DCI NetApp BenefitsDCI NetApp Benefits
DCI NetApp Benefits
 
11 applications of factoring
11 applications of factoring11 applications of factoring
11 applications of factoring
 
Chiller Plant Room Layout 3D
Chiller Plant Room Layout 3DChiller Plant Room Layout 3D
Chiller Plant Room Layout 3D
 
FAQ on Dedupe NetApp
FAQ on Dedupe NetAppFAQ on Dedupe NetApp
FAQ on Dedupe NetApp
 
Parallel testing overview
Parallel testing overviewParallel testing overview
Parallel testing overview
 
Analysis of pk data- Pop PK analysis
Analysis of pk data- Pop PK analysisAnalysis of pk data- Pop PK analysis
Analysis of pk data- Pop PK analysis
 
Top 5 Mistakes in Mobile Affiliate Marketing
Top 5 Mistakes in Mobile Affiliate MarketingTop 5 Mistakes in Mobile Affiliate Marketing
Top 5 Mistakes in Mobile Affiliate Marketing
 
Robot Framework Introduction & Sauce Labs Integration
Robot Framework Introduction & Sauce Labs IntegrationRobot Framework Introduction & Sauce Labs Integration
Robot Framework Introduction & Sauce Labs Integration
 
Use of Analytics in Procurement
Use of Analytics in ProcurementUse of Analytics in Procurement
Use of Analytics in Procurement
 
Simplify your CSS with Stylus and Nib
Simplify your CSS with Stylus and NibSimplify your CSS with Stylus and Nib
Simplify your CSS with Stylus and Nib
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
New Product Development Report
New Product Development ReportNew Product Development Report
New Product Development Report
 
NetApp & Storage fundamentals
NetApp & Storage fundamentalsNetApp & Storage fundamentals
NetApp & Storage fundamentals
 
Romeo and Juliet Act 1 Summary
Romeo and Juliet Act 1 SummaryRomeo and Juliet Act 1 Summary
Romeo and Juliet Act 1 Summary
 
Honda International Case Study
Honda International Case StudyHonda International Case Study
Honda International Case Study
 
Regions of the United States: The Northeast
Regions of the United States: The NortheastRegions of the United States: The Northeast
Regions of the United States: The Northeast
 
AEM GEMS Session SAML authentication in AEM
AEM GEMS Session SAML authentication in AEMAEM GEMS Session SAML authentication in AEM
AEM GEMS Session SAML authentication in AEM
 
HORMONAL REGULATION OF OVULATION,PREGNANCY,PARTURITION
HORMONAL REGULATION OF OVULATION,PREGNANCY,PARTURITIONHORMONAL REGULATION OF OVULATION,PREGNANCY,PARTURITION
HORMONAL REGULATION OF OVULATION,PREGNANCY,PARTURITION
 
Surgical dressings
Surgical dressingsSurgical dressings
Surgical dressings
 
Precancerous lesions & conditions
Precancerous lesions & conditionsPrecancerous lesions & conditions
Precancerous lesions & conditions
 

Similar to Nexus 1010 Overview and Deployment

Presentation cisco nexus 1010 overview and deployment
Presentation   cisco nexus 1010 overview and deploymentPresentation   cisco nexus 1010 overview and deployment
Presentation cisco nexus 1010 overview and deploymentxKinAnx
 
Cisco & VMware partnership overview July 20, 2011
Cisco & VMware partnership overview July 20, 2011Cisco & VMware partnership overview July 20, 2011
Cisco & VMware partnership overview July 20, 2011bvizza
 
Cisco & VMware partnership overview July 20, 2011
Cisco & VMware partnership overview July 20, 2011Cisco & VMware partnership overview July 20, 2011
Cisco & VMware partnership overview July 20, 2011bvizza
 
Managing The Impact Of Virtualization Technology On Your Network
Managing The Impact Of Virtualization Technology On Your NetworkManaging The Impact Of Virtualization Technology On Your Network
Managing The Impact Of Virtualization Technology On Your NetworkSolarWinds
 
ASBIS: Virtualization Aware Networking - Cisco Nexus 1000V
ASBIS: Virtualization Aware Networking - Cisco Nexus 1000VASBIS: Virtualization Aware Networking - Cisco Nexus 1000V
ASBIS: Virtualization Aware Networking - Cisco Nexus 1000VASBIS SK
 
Dc tco in_a_nutshell
Dc tco in_a_nutshellDc tco in_a_nutshell
Dc tco in_a_nutshellerjosito
 
BRKVIR-3013 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
BRKVIR-3013  Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...BRKVIR-3013  Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
BRKVIR-3013 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...Rassul Ismailov
 
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27EYWA Presentation v0.1.27
EYWA Presentation v0.1.27JungIn Jung
 
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...Ixia
 
VMWorld 2009 Presentation
VMWorld 2009 PresentationVMWorld 2009 Presentation
VMWorld 2009 PresentationAhmed Sallam
 
云计算平台存储架构设计@邓海韬Nicko
云计算平台存储架构设计@邓海韬Nicko云计算平台存储架构设计@邓海韬Nicko
云计算平台存储架构设计@邓海韬Nickolooneyren
 
VMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptx
VMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptxVMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptx
VMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptxHythamsaadeh
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectDavid Pasek
 
PLNOG 13: Jacek Wosz: User Defined Network
PLNOG 13: Jacek Wosz: User Defined NetworkPLNOG 13: Jacek Wosz: User Defined Network
PLNOG 13: Jacek Wosz: User Defined NetworkPROIDEA
 
PLNOG 5: Piotr Szołkowski - Data Center i nie tylko...
PLNOG 5: Piotr Szołkowski - Data Center i nie tylko...PLNOG 5: Piotr Szołkowski - Data Center i nie tylko...
PLNOG 5: Piotr Szołkowski - Data Center i nie tylko...PROIDEA
 
Describe the following1. Describe Cisco OTV Nexus 7000 and how th.pdf
Describe the following1. Describe Cisco OTV Nexus 7000 and how th.pdfDescribe the following1. Describe Cisco OTV Nexus 7000 and how th.pdf
Describe the following1. Describe Cisco OTV Nexus 7000 and how th.pdfakukukkusarees
 
Logical_Routing_NSX_T_2.4.pptx.pptx
Logical_Routing_NSX_T_2.4.pptx.pptxLogical_Routing_NSX_T_2.4.pptx.pptx
Logical_Routing_NSX_T_2.4.pptx.pptxAnwarAnsari40
 

Similar to Nexus 1010 Overview and Deployment (20)

Presentation cisco nexus 1010 overview and deployment
Presentation   cisco nexus 1010 overview and deploymentPresentation   cisco nexus 1010 overview and deployment
Presentation cisco nexus 1010 overview and deployment
 
Cisco & VMware partnership overview July 20, 2011
Cisco & VMware partnership overview July 20, 2011Cisco & VMware partnership overview July 20, 2011
Cisco & VMware partnership overview July 20, 2011
 
Cisco & VMware partnership overview July 20, 2011
Cisco & VMware partnership overview July 20, 2011Cisco & VMware partnership overview July 20, 2011
Cisco & VMware partnership overview July 20, 2011
 
Managing The Impact Of Virtualization Technology On Your Network
Managing The Impact Of Virtualization Technology On Your NetworkManaging The Impact Of Virtualization Technology On Your Network
Managing The Impact Of Virtualization Technology On Your Network
 
ASBIS: Virtualization Aware Networking - Cisco Nexus 1000V
ASBIS: Virtualization Aware Networking - Cisco Nexus 1000VASBIS: Virtualization Aware Networking - Cisco Nexus 1000V
ASBIS: Virtualization Aware Networking - Cisco Nexus 1000V
 
Dc tco in_a_nutshell
Dc tco in_a_nutshellDc tco in_a_nutshell
Dc tco in_a_nutshell
 
BRKVIR-3013 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
BRKVIR-3013  Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...BRKVIR-3013  Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
BRKVIR-3013 Deploying and Troubleshooting the Nexus 1000v Virtual Switch on ...
 
EYWA Presentation v0.1.27
EYWA Presentation v0.1.27EYWA Presentation v0.1.27
EYWA Presentation v0.1.27
 
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSXOVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
OVHcloud Hosted Private Cloud Platform Network use cases with VMware NSX
 
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
BreakingPoint & Juniper RSA Conference 2011 Presentation: Securing the High P...
 
VMWorld 2009 Presentation
VMWorld 2009 PresentationVMWorld 2009 Presentation
VMWorld 2009 Presentation
 
云计算平台存储架构设计@邓海韬Nicko
云计算平台存储架构设计@邓海韬Nicko云计算平台存储架构设计@邓海韬Nicko
云计算平台存储架构设计@邓海韬Nicko
 
VMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptx
VMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptxVMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptx
VMware NSX-T Design for Small to Mid-Sized Data Centers v1.0 EN.pptx
 
Nexus 1000_ver 1.1
Nexus 1000_ver 1.1Nexus 1000_ver 1.1
Nexus 1000_ver 1.1
 
VMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real projectVMware NSX - Lessons Learned from real project
VMware NSX - Lessons Learned from real project
 
PLNOG 13: Jacek Wosz: User Defined Network
PLNOG 13: Jacek Wosz: User Defined NetworkPLNOG 13: Jacek Wosz: User Defined Network
PLNOG 13: Jacek Wosz: User Defined Network
 
MetaFabric Architecture
MetaFabric ArchitectureMetaFabric Architecture
MetaFabric Architecture
 
PLNOG 5: Piotr Szołkowski - Data Center i nie tylko...
PLNOG 5: Piotr Szołkowski - Data Center i nie tylko...PLNOG 5: Piotr Szołkowski - Data Center i nie tylko...
PLNOG 5: Piotr Szołkowski - Data Center i nie tylko...
 
Describe the following1. Describe Cisco OTV Nexus 7000 and how th.pdf
Describe the following1. Describe Cisco OTV Nexus 7000 and how th.pdfDescribe the following1. Describe Cisco OTV Nexus 7000 and how th.pdf
Describe the following1. Describe Cisco OTV Nexus 7000 and how th.pdf
 
Logical_Routing_NSX_T_2.4.pptx.pptx
Logical_Routing_NSX_T_2.4.pptx.pptxLogical_Routing_NSX_T_2.4.pptx.pptx
Logical_Routing_NSX_T_2.4.pptx.pptx
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Nexus 1010 Overview and Deployment

  • 1. Softw a vSph re Switch ere an fo d vClo r VMware ud Dir ector Cisco Nexus 1010 Overview and Deployment Sal Lopez Technical Marketing Engineer SAVBU
  • 2. Nexus 1000V Public Webinar Series Date   Business  Sessions     Date   Technical  Sessions     Nexus  1000V  New  Features  and  InstallaNon   22-­‐Mar   Nexus  1000V  Family  Overview  and  Update   29-­‐Mar   Overview   Virtual Network Services 5-­‐Apr   (vPath, NAM, vWAAS) 12-­‐Apr   Nexus1010  InstallaNon  &  Upgrade   Virtual  Security  Gateway  InstallaNon  and  Basic   19-­‐Apr   Virtual Security Gateway Introduction 26-­‐Apr   ConfiguraNon     Journey  to  the  Cloud  w/  N1KV:  vCloud  Director  &   3-­‐May   Long  Distance  vMoNon   10-­‐May   Nexus  1000V  Advanced  ConfiguraNon   17-­‐May   Secure  VDI  with  Nexus1000V  &  VSG   24-­‐May   Nexus  1000V  TroubleshooNng   N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. Nexus 1000V “My Community” www.cisco.com/go/1000vcommunity N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Nexus 1000V “My Community” www.cisco.com/go/1000vcommunity N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Nexus 1000V “My Community” www.cisco.com/go/1000vcommunity N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. Nexus 1000V Screencasts N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Nexus 1000V Screencasts N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Nexus 1000V Architecture Comparison to a Physical Switch Modular Switch Supervisor-1 Supervisor-2 Back Plane Linecard-1 Linecard-2 … Linecard-N Server 1 Server 2 Server 3 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Nexus 1000V Architecture Moving to a Virtual Environment Modular Switch Supervisor-1 Supervisor-2 Back Plane Linecard-1 Linecard-2 … Linecard-N ESX ESX ESX N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. Nexus 1000V Architecture Supervisors Virtual Supervisor Modules (VSMs) Virtual Appliance VSM1 VSM2 Modular Switch Supervisor-1 Supervisor-2 Back Plane Linecard-1 Linecard-2 … Linecard-N ESX ESX ESX N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. Nexus 1000V Architecture Linecards Virtual Ethernet Modules (VEMs) Virtual Appliance VSM1 VSM2 Modular Switch Supervisor-1 Supervisor-2 Back Plane Linecard-1 Linecard-2 … Linecard-N VEM-1 VEM-2 VEM-N ESX ESX ESX N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Nexus 1000V Architecture VSM + VEMs = Nexus 1000V Virtual Chassis Virtual Appliance VSM1 VSM2 •  64 VEMs per 1000V (connected by L2 or L3) •  200+ vEth ports per VEM L2 Mode L3 Mode •  2K vEths per 1000V •  Multiple 1000Vs can be created per vCenter VEM-1 VEM-2 VEM-N ESX ESX ESX VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. Nexus 1000V Architecture Customer Request: Host VSMs on a Physical Appliance Virtual Appliance Physical Appliance? VSM1 VSM2 L2 Mode L3 Mode •  200+ vEth ports per VEM •  64 VEMs per 1000V VEM-1 VEM-2 VEM-N •  2K vEths per 1000V •  Multiple 1000Vs can be created per vCenter ESX ESX ESX VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Nexus 1000V Architecture VSMs hosted on a Physical Appliance: Nexus 1010 Virtual Appliance Nexus 1010 VSM-A1 … VSM-A4 •  Up to 4 VSMs per Nexus 1010 VSM-B1 … VSM-B4 •  Nexus 1010s deployed in redundant pair L2 Mode L3 Mode •  200+ vEth ports per VEM •  64 VEMs per 1000V VEM-1 VEM-2 VEM-N •  2K vEths per 1000V •  Multiple 1000Vs can be created per vCenter ESX ESX ESX VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Embedding Intelligence for Virtual Services vPath – Virtual Service Datapath Virtual Appliance vWAAS VSG VSM vPath •  Virtual Service Datapath L2 Mode L3 Mode VSG •  Virtual Security Gateway for 1000v vWAAS vPath •  Virtual WAAS •  Traffic Steering VEM-1 VEM-2 •  Fast -Path Offload vPath vPath ESX ESX •  Nexus 1000V ver 1.4 & above N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Nexus 1010 – Hosting Platform for Services Virtual Appliance Nexus 1010 vWAAS VSG VSM-A1 VSM-A4 NAM VSM-B1 VSM-B4 NAM vPath •  Virtual Service Datapath L2 Mode L3 Mode VSG •  Virtual Security Gateway for 1000v vWAAS •  Virtual WAAS VEM-1 VEM-2 vPath vPath ESX ESX *VSG on 1010 target: 2Q CY11 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. Cisco Nexus 1010 Overview and Deployment Sal Lopez Technical Marketing Engineer SAVBU
  • 19. Agenda §  Nexus 1010 Hardware and Software §  Nexus 1000V VSM connectivity on Nexus 1010 §  Nexus 1010 Network Integration and Data Center Design §  Nexus 1010 Virtual Service Blade Configuration and Verification §  Nexus 1010 Upgrade Process N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. Nexus 1010 Hardware and Software Software Switch fo vSphere r 4.0 and 4 .1 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. Nexus 1010 Hardware Configuration Based on UCS Physical Appliance §  2 x Intel X5650- 2.66GHz, 6 core §  16 GB RAM §  2 x 500GB SATA-II HDD §  1 x Quadport GE NIC Card §  1 x Serial Port §  1 x Rail-Kit N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. Nexus 1010 Ports and Components §  Cisco Integrated Management Controller for lights out, out of band management (use KVM cable to setup), similar to CMP for other NX-OS switches §  6 Gigabit Ethernet ports (2 LOM for management/control, 4 on PCIe card) 1 Power supply (one) 2 CIMC port (RJ-45) 10/100 Mbps 3 USB 2.0 connectors (two) 4 Serial connector (DB9) 5 Video connector (15-pin VGA) 6 Gigabit Ethernet Ports (1 and 2) 7 Gigabit Ethernet ports (3 to 6) 8 Standard-profile PCIe card slot (not used) N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Nexus 1010 Virtual Service Blade §  The Nexus 1010 comes with a new concept of Virtual Services called Virtual Service Blade (VSB) §  Shipping today: VSM virtual service blade NAM virtual service blade §  VSG, DCNM in future releases Network Analysis Module* Nexus 1000V VSM Nexus 1010 Manager N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential * Optional virtual service blade add-on 23
  • 24. Nexus 1010 Scalability Network Analysis Module Nexus 1000V VSM Nexus 1000V VSM Nexus 1000V VSM Nexus 1000V VSM Nexus 1010 Manager Nexus 1010 Manager: Cisco management experience Manages a total of 5 virtual service blades (ie. 4 VSMs and 1 NAM) Each VSM can manage up to 64 VEMs (256 total VEMs) N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. Feature Comparison VSM as VM VSM on Nexus 1010 Nexus 1000V features and scalability   VEM running on vSphere 4 Enterprise Plus   NX-OS high availability of VSM   Software-only deployment  Installation like a standard Cisco switch  Network Team owns/manages the VSM  VSM Isolation from production VM environment in case of outage  Least number of steps to deploy VSM  N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. Nexus 1010 Managed By Network Team §  VSM planned and deployed on networking equipment §  Access to console consistent with existing network gear (no additional software needed) §  Troubleshoot via Cisco NX-OS CLI §  Nexus 1010 platform can be managed via SNMP §  Secured by AAA N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. Nexus 1010 High Availability § Process HA at NX-OS level • Modular OS based on Linux § Virtual Service Blade redundancy • Nexus 1010 automation and state synchronization • Create primary VSM once and secondary VSM gets created for you § Chassis Level Redundancy • Deployed in pairs • Same mechanisms used as redundant supervisors on switches • Prevent split brain scenario with CIMC as backup connection § Network Level Redundancy • Flexible network integration options with traffic isolation, trunking and LACP N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. Nexus 1000V VSM connectivity on Nexus 1010 Software Switch fo vSphere r 4.0 and 4 .1 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. VSM to VEM Communications Two virtual interfaces are used to communicate between the VSM and VEM Control VLAN VM VM VM VM • Extend the usual backplane of the switch over the network • Carries low level messages to ensure proper configuration of the VEM. • Maintains a 1 sec heartbeat with the VSM to the VEM (timeout of 6 seconds) • Maintains syncronization between primary L2 Network and secondary VSMs Control VLAN Packet VLAN Packet VLAN For control plane processing like CDP, IGMP snooping, or stat collections like SNMP, Nexus 1000V VSM Netflow On Nexus 100 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
  • 30. Layer 2 connectivity of the VSM and VEM § For L2 deployment, Control and Packet VM VM VM VM VLAN needs to be configured end to end to allow communication between the VSM and the VEM If those VLANs are not configured end to end the VEM will not show up even if it looks like it is in vCenter L2 Network Control VLAN and Packet VLAN needs to Control VLAN be configured as system VLAN on the Packet VLAN uplink port-profile Can use 1 or 2 VLANs for Control/Packet Nexus 1000V VSM traffic On Nexus 100 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. Layer 3 connectivity of the VSM and VEM VM VM VM VM For L3 Control, L2 adjacency for Control and Packet not required VSM uses a svs mode type layer 3 using either L3 Network the control0 Interface or the mgmt0 interface User can specify an IP address for control0 to use a separate network for VEM – VSM communication svs-domain svs mode L3 interface (control0 | mgmt0) Nexus 1000V VSM On Nexus 100 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
  • 32. Nexus 1010 Network Integration and Data Center Design Software Switch fo vSphere r 4.0 and 4 .1 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
  • 33. Nexus 1010 Network Integration Design There are 4 uplink options to connect the Nexus 1010 to the Network This will influence how the control, packet, management and data information will be connected to rest of the network N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. Nexus 1010 Network Integration – Uplink Type 1 §  Nexus 1010 uplink type 1:Ports 1 and 2 carry Management, Control and Data traffic Sample Topology: Common L2 Network with Setup 1 Setup 2 upstream switch N5K/N2K Upstream Switch Access Ports: interface ethernet 101/1/1-2 !-- multiple vlans trunked across link switchport mode trunk !--only allow mgmt, control and data vlans switchport trunk allowed vlan 170,250-251 !-- enable portfast edge spanning-tree port type edge trunk Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 Eth2 Eth1 Active VSM HA-Standby Active VSM HA-Standby VSM VSM N1010-1 N1010-2 N1010-1 N1010-2 Nexus 1010 Active Chassis HA-Standby Chassis Active Chassis HA-Standby Chassis Eth1: active (forwarding) Eth2: standby (not forwarding) Total Bandwidth per device is 1Gbps N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
  • 35. Nexus 1010 Network Integration – Uplink Type 2 §  Nexus 1010 uplink type 2:Ports 1 and 2 carry Management and Control; Ports 3-6 carry Data traffic §  Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth Sample Topology: Common L2 Network, upstream switch N5K/N2K with vPC Upstream LACP Ports (both switches): interface ethernet 101/1/2, 101/1/4 !-- multiple vlans trunked across link switchport mode trunk 1 !-- only allow mgmt, control and data vlans switchport trunk allowed vlan 251 6 2 !-- enable portfast edge 5 6 spanning-tree port type edge trunk 1 2 3 4 3 4 5 !-- add interface to port-channel, this is a vpc channel-group 1010 mode active !-- this is a unique vpc for N1010-1 E1 E2 E3 E4 E5 E6 E1 E2 E3 E4 E5 E6 interface port-channel 1010 vpc 1010 HA-Standby Active VSM VSM **Config must be repeated for N1010-2 on interfaces 101/1/5-6 Nexus 1010 N1010-1 N1010-2 Eth1: active (forwarding) Active Chassis HA-Standby Chassis Eth2: standby (not forwarding) Eth3-6:forwarding in LACP bundle Total Bandwidth per device is 5Gbps N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
  • 36. Nexus 1010 Network Integration – Uplink Type 3 (Most Common for VSM Deployment) §  Nexus 1010 uplink type 3:Ports 1 and 2 carry Management; Ports 3-6 carry Control and Data traffic §  Can use clustered switch technology (MCEC, vPC, VSS, etc.) for max bandwidth Sample Topology: Common L2 Network, upstream switch N5K/N2K with vPC Upstream LACP Ports (both switches): interface ethernet 101/1/2, 101/1/4 !-- multiple vlans trunked across link switchport mode trunk 1 !-- only allow mgmt, control and data vlans 6 switchport trunk allowed vlan 250-251 2 5 6 !-- enable portfast edge 1 4 3 4 5 2 3 spanning-tree port type edge trunk !-- add interface to port-channel, this is a vpc channel-group 1010 mode active E1 E2 E3 E4 E5 E6 E2 E3 E4 E1 E5 E6 !-- this is a unique vpc for N1010-1 interface port-channel 1010 vpc 1010 Active VSM HA-Standby VSM **Config must be repeated for N1010-2 on interfaces 101/1/5-6 N1010-1 N1010-2 Nexus 1010 Active Chassis HA-Standby Chassis Eth1: active (forwarding) Eth2: standby (not forwarding) Eth3-6:forwarding in LACP bundle Total Bandwidth per device is 5Gbps N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  • 37. Nexus 1010 Network Integration – Uplink Type 4 §  Nexus 1010 uplink type 4:Ports 1 and 2 carry Management; Ports 3 and 4 carry Control, Ports 5 and 6 carry Data traffic Sample Topology: Common L2 Network with upstream switch N5K/N2K Upstream Switch Access Ports: interface ethernet 101/1/1 !-- multiple vlans trunked across link switchport mode trunk !-- only allow mgmt, control and data vlans switchport trunk allowed vlan 170 !-- enable portfast edge spanning-tree port type edge trunk E1 E2 E3 E4 E5 E6 E2 E3 E4 E1 E5 E6 HA-Standby Nexus 1010 Active VSM VSM Eth1: active (forwarding) Eth2: standby (not forwarding) N1010-1 N1010-2 Eth3: active (forwarding) Active Chassis HA-Standby Chassis Eth4: standby (not forwarding) Eth5: active (forwarding) Eth6: standby (not forwarding) Total Bandwidth per device is 3Gbps N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  • 38. Nexus 1010 Network Connectivity Summary Uplink Description Option 1 Ports 1-2 Carry All Management, Control, and Data Traffic • Really easy to deploy Option 2 Ports 1-2 Carry Management and Control, Ports 3-6 Carry Data Traffic • Most of the bandwidth available for other Virtual Service Blades (ie. NAM) Option 3 Ports 1-2 Carry Management, Ports 3-6 Carry Control and Data Traffic • Most bandwidth for VSM Virtual Service Blades and other VSBs Option 4 Ports 1-2 Carry Management, Ports 3-4 Carry Control, Ports 5-6 Carry Data Traffic • Clear separation of all the different types of traffic N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
  • 39. Nexus 1010 in the Access Layer Core §  L2 Control for VSM to VEM is easier here Aggregation All servers/switches below L3 need Control/Packet L2 VLANs L2 Network Services such Access as VSG (future) Nexus 1000V VSM VSB §  L3 Control for VSM possible §  HA pair can be dedicated Compute/Virtual Access Nexus per POD or customer 1000V VEM More VSBs available per POD or customer ESXi N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
  • 40. Nexus 1010 in the Aggregation Layer §  L3 Control for VSM to Core VEM is more flexible here Aggregation IP routing should be robust Nexus 1000V VSM VSB L3 Suitable for long distance L2 (future) §  L2 Control for VSM Access possible §  HA pair can be shared among PODs or Compute/Virtual Access customers Nexus 1000V VEM If using L3, there should be IP connectivity to VSM VSB from each POD ESXi N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
  • 41. Nexus 1010 and VSB Configuration Software Switch fo vSphere r 4.0 and 4 .1 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
  • 42. Nexus 1010 Initial Setup - CIMC N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
  • 43. Nexus 1010 Initial Configuration §  Access Console via Telnet or Serial over LAN §  Setup System Admin Account and Basic System Configuration telnet 172.25.182.99 2005 Trying 172.25.182.99... Connected to 172.25.182.99. Escape character is '^]' ---- System Admin Account Setup ---- Enter the password for "admin": Confirm the password for "admin": HA Role for each chassis Enter HA role[primary/secondary]: primary Enter network-uplink type <1-4>: 1. Ports 1-2 carry all management, control and data vlans 2. Ports 1-2 management and control, ports 3-6 data Network uplink type for 3. Ports 1-2 management, ports 3-6 control and data 4. Ports 1-2 management, ports 3-4 control, ports 5-6 data network integration 3 Enter control vlan <1-3967, 4048-4093>: 250 Enter the domain id<1-4095>: 201 Domain ID must be unique Enter management vlan <1-3967, 4048-4093>: 170 Mgmt VLAN is shared with Saving boot configuration. Please wait... VSM [########################################] 100% N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
  • 44. VSM VSB Installation Steps on Nexus 1010 §  Create VSM as VSB on N1010 §  Register certificate as plug-in in vCenter §  Define ethernet and vethernet port-profile Includes VLANs and physical settings to upstream switch For mac-pinning, upgrade feature level §  Install VEM using vCenter N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
  • 45. Creating and Configuring a VSM VSB tme-1010-1(config)# virtual-service-blade VSM-1010-1 Create and name the VSB tme-1010-1(config-vsb-config)# virtual-service-blade-type new nexus-1000v.4.0.4.SV1.3a.iso tme-1010-1(config-vsb-config)# interface control vlan 251 tme-1010-1(config-vsb-config)# interface packet vlan 252 tme-1010-1(config-vsb-config)# enable Enter vsb image: [nexus-1000v.4.0.4.SV1.3.iso] One command deploys both Enter domain id[1-4095]: 203 Primary and Secondary VSM Management IP version [V4/V6]: [V4] Enter Management IP address: 10.29.170.84 This is done only for HA aware VSBs Enter Management subnet mask: 255.255.255.0 IPv4 address of the default gateway: 10.29.170.1 Enter HostName: VSM-1010-1 Enter the password for 'admin': P@ssw0rd1 tme-1010-1(config-vsb-config)#no shut N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
  • 46. VSB Control and HA Verification §  The Network Admin has total control over the VSB deployment tme-1010-1# show virtual-service-blade virtual-service-blade AV2-1010-VSM Description: Slot id: 2 Host Name: AV2-VSM-1 Management IP: 10.29.170.254 VSB Type Name : VSM-1.0 Interface: control vlan: 254 Verify VSB IP address and Control, Interface: management vlan: 170 Interface: packet vlan: 255 Mgmt and Packet VLANs Interface: internal vlan: NA Ramsize: 2048 Disksize: 3 Heartbeat: 132670 HA Admin role: Primary HA Oper role: ACTIVE Status: VSB POWERED ON Location: PRIMARY SW version: 4.0(4)SV1(3a) VSBs deployed in an HA pair by HA Admin role: Secondary default (result of enable HA Oper role: STANDBY command). Status: VSB POWERED ON Location: SECONDARY SW version: 4.0(4)SV1(3a) VSB Info: Domain ID : 401 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
  • 47. Nexus 1010 and VSB Network Verification tme-1010-1# show network-uplink type Administrative topology id: 3 Configured and actual operating Operational topology id: 3 topology are shown tme-1010-1# show network summary ----------------------------------------------------------------------- Port State Speed MTU ----------------------------------------------------------------------- GigabitEthernet1 up 1000 1500 GigabitEthernet2 up 1000 1500 GigabitEthernet3 up 1000 1500 GigabitEthernet4 up 1000 1500 Po1 represents active/standby GigabitEthernet5 up 1000 1500 bundle between E1 and E2 GigabitEthernet6 up 1000 1500 PortChannel1 up 1000 1500 Po2 represents the LACP bundle PortChannel2 up 1000 1500 between E3-E6 VbEthernet1/1 up 1000 1500 VbEthernet1/2 up 1000 1500 VbEthernet1/3 up 1000 1500 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
  • 48. NAM Virtual Blade on Nexus 1010 Optimize Application Performance and Network Resources VM VM VM VM §  Application Performance Monitoring §  Traffic Analysis and Reporting Nexus Applications, Host, Conversations, VLAN, 1000V QoS, etc. VEM Per-application, per-user traffic analysis vSphere §  View VM-level Interface Statistics §  Packet Capture and Decodes §  Historical Reporting and Trending ERSPAN NAM Virtual Blade on NetFlow Nexus Nexus 1000V VSM 1010 vCenter N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
  • 49. Creating and Configuring a NAM VSB N1010-1(config)# virtual-service-blade NAM-VSB N1010-1(config-vsb-config)# virtual-service-blade-type name NAM-1.0 N1010-1(config-vsb-config)# interface data vlan 180 N1010-1(config-vsb-config)# enable Data VLAN for Non-VSM VSBs Enter vsb image: nam-app-x86_64.4-2-1-fc5.iso Enter Management IPV4 address: 10.29.180.99 Enter Management subnet mask: 255.255.255.0 IP address for Web GUI IPv4 address of the default gateway: 10.29.180.1 administration Enter HostName: vNAM-1 Setting Web user/passwd will enable port 80. Enter[y|n]: [n] y Web User name: [admin] Web User password: P@ssw0rd N1010-1(config-vsb-config)# no shut N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
  • 50. Access NAM VSB via Web GUI §  Use the previously defined IP address and credentials N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
  • 51. Nexus 1010 Upgrade Process Software Switch fo vSphere r 4.0 and 4 .1 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
  • 52. Upgrading the Nexus 1010 Appliance Software (1 of 2) §  Download new ISO image from CCO §  Log into active N1010 via console §  Copy new image over to bootflash §  Use the install command install nexus1010 bootflash:nexus-1010.4.2.1.SP1.2.iso §  Save configuration §  Log into VSM VSB §  Switch over HA active VSM VSBs to active N1010 N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
  • 53. Upgrading the Nexus 1010 Appliance Software (2 of 2) §  From N1010 CLI, reload standby when all active VSM VSBs are switched over to active ie. reload module 2 if Secondary is standby §  From withing VSM VSB CLI, switchover HA active VSBs to newly upgraded N1010 (originally standby from above) §  Reload the original active N1010 Non HA VSBs may experience disruption (NAM) §  To upgrade VSM NX-OS, please follow N1KV upgrade procedure Note: Must make Secondary VSM the active first N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
  • 54. For More Information See the following Resources §  Nexus 1010 Virtual Services Appliance Hardware Installation Guide §  Nexus 1010 Software Installation and Upgrade Guide §  Nexus 1010 Deployment Guide §  Nexus 1000V Configuration, Installation and Upgrade Guides §  NAM VSB Configuration Guide §  Nexus 1000V Webinar Series N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
  • 55. Sign up at: http://tinyurl.com/1000v-webinar Date   Business  Sessions     Date   Technical  Sessions     Nexus  1000V  New  Features  and  InstallaNon     22-­‐Mar   Nexus  1000V  Family  Overview  and  Update   29-­‐Mar   Overview   Virtual Network Services (vPath, vWAAS, 5-­‐Apr   NAM) 12-­‐Apr   Nexus1010  InstallaNon  &  Upgrade   Virtual  Security  Gateway  InstallaNon  and  Basic   19-­‐Apr   Virtual Security Gateway Introduction 26-­‐Apr   ConfiguraNon    Overview   Journey  to  the  Cloud  w/  N1KV:  vCloud  Director  &   3-­‐May   Long  Distance  vMoNon   10-­‐May   Nexus  1000V  Advanced  ConfiguraNon   17-­‐May   Secure  VDI  with  Nexus1000V  &  VSG   24-­‐May   Nexus  1000V  TroubleshooNng   Web Sites www.cisco.com/go/1000v www.cisco.com/go/nexus1010 www.cisco.com/go/vsg www.cisco.com/go/vnmc www.cisco.com/go/1000vcommunity (Preso and Q&A posted here) N1K © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55