Professional Documents
Culture Documents
Presentation_ID
Cisco Confidential
Legal Disclaimer
Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This roadmap is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.
Presentation_ID
Cisco Confidential
Agenda
Networking Challenges of Server Virtualization Cisco VN-Link Introduction
Additional Information
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
but its difficult to correlate network and storage back to virtual machines
Presentation_ID
Cisco Confidential
Scaling globally depends on maintaining transparency while also providing operational consistency
Presentation_ID
Cisco Confidential
Organizational Structure
Muddled ownership as server admin must configure virtual network Organizational redundancy creates compliance challenges
8
Presentation_ID
Cisco Confidential
Virtual machine aware network and storage services Abstract physical and logical infrastructure Virtual machines are the new data center building block
Presentation_ID
Cisco Confidential
Problems:
VMotion may move VMs across physical portspolicy must follow Impossible to view or apply policy to locally switched traffic Cannot correlate traffic on physical linksfrom multiple VMs
VLAN 101
10
Nexus 1000V provides enhanced VM switching for VMW ESX environments Features VN-Link capabilities:
Policy-based VM connectivity Mobility of network and security properties Non-disruptive operational model VM #1
Server 1
VM #2 VM #3 VM #4 VM VM #1 #5
Server 2
VM #5 #6 VM #7 VM #8
VMware vSwitch VMware vSwitch Nexus 1000V Nexus 1000V Nexus 1000V VMW ESX VMW ESX
11
Presentation_ID
Cisco Confidential
12
Server 2
VM #6 VM #7 VM #8 VM #9
Server 3
VM #10 VM #11 VM #12
VSM
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
13
VM #8
Defined Policies
WEB Apps HR DB Virtual Center
Cisco Confidential
VM Connection Policy
Compliance
Presentation_ID
Presentation_ID
VM #8
Server Benefits
Maintains existing VM mgmt Reduces deployment time Improves scalability Reduces operational workload Virtual Enables VM-level visibility Center
2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Benefits
Unifies network mgmt and ops Improves operational security Enhances VM network features Ensures policy persistence Enables VM-level visibility
16
Presentation_ID
Presentation_ID
Cisco Confidential
17
Server 1
Nexus 1000VVEM
VMW ESX
3.
2.
Nexus 1000V
Virtual Center
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
1.
VSM
18
Server N
Server 1
Nexus 1000VVEM
VMW ESX
VMW ESX
4.
Nexus 1000V
Virtual Center
VSM
19
Server 1
VM #1 VM #2 VM #3 VM #4
2.
VMW ESX
3.
WEB Apps:
PVLAN 108, Isolated Security Policy = Port 80 and 443 Rate Limit = 100 Mbps QoS Priority = Medium Remote Port Mirror = Yes
1.
Available Port Groups
Nexus 1000V
Virtual Center
WEB Apps DB
HR Compliance
VSM
20
Presentation_ID
Cisco Confidential
Server
VM #2 VM #3 VM #4
VMW ESX
Nexus 1000V
Virtual Center
VSM
21
Presentation_ID
Cisco Confidential
1.
Virtual Center kicks off a Vmotion (manual/DRS) and notifies Nexus 1000V During VM replication, Nexus 1000V copies VM port state to new host
Server 1
VM #1 VM #2 VM #3 VM #4 VM #5
Server 2
VM #6 VM #7 VM #8
2.
VMW ESX
VMW ESX
Port policy
1.
Network Persistence VMotion Notification
Virtual Center
Cisco Confidential
2.
Nexus 1000V onstate Server 1 Current: VM port VM1 config, New: VM1 on Server 2 VM monitoring statistics VSM
22
Presentation_ID
1.
Virtual Center kicks off a Vmotion (manual/DRS) & notifies Nexus 1000V During VM replication, Nexus 1000V copies VM port state to new host Once VMotion completes, port on new ESX host is brought up & VMs MAC address is announced to the network
Server 1
VM #1 VM #2 VM #3 VM #4 VM VM #1 #5
Server 2
VM #6 VM #7 VM #8
2.
3.
VMW ESX
VMW ESX
3.
Nexus 1000V
Network Update
Virtual Center
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
ARP for VM1 sent to network Flows to VM1 MAC redirected to Server 2
VSM
23
Network Admin
Same as physical network
Automated
Unchanged (Virtual Center based) Automated (assign NIC & go) Automated Unchanged Policy Based VM Specific Unchanged (Virtual Center)
Cisco Confidential
Policy Based
Unchanged EtherChannel Optimized Policy Based ACL, PVLAN, IP Redirect, Port Security, TrustSec VM Specific Cisco CLI, XML API, SNMP, DCNM
24
Presentation_ID
Mirror VM interface traffic to a remote sniffer Identify root cause for connectivity issues No host-based sniffer virtual appliance to maintain Follows your VM with VMotion or DRS
View flow-based stats for individual VMs Captures multi-tiered app traffic inside a single ESX host
Great for mixed use ESX clusters Segment VMs w/o burning IP addresses Supports isolated, community and promiscuous trunk ports Follows your VM with VMotion or DRS
Presentation_ID
Cisco Confidential
25
Server
VM #2 VM #3 VM #4 VM #1
Server
VM #2 VM #3 VM #4
P
VMW ESX
I
VMW ESX
I
VMW ESX
26
Presentation_ID
Cisco Confidential
L2 Switching, 802.1Q Tagging, VLAN Segmentation, Rate Limiting (TX) IGMP Snooping, QoS Marking/Queuing
Security
Provisioning Visibility Management
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved.
Policy Mobility, PVLAN, ACL (L24 w/ Redirect), Port Security Cisco TrustSecAuthentication, Admission, Access Control
Automated vSwitch Config, Port Profiles, Virtual Center Integration Optimized NIC Teaming
Historical VMotion Tracking, ERSPAN, NetFlow v.9 w/ NDE, CDP v.2 VM-Level Interface Statistics, Wireshark
Virtual Center VM Provisioning, Cisco Network Provisioning Cisco CLI, XML API, SNMP (v.1, 2, 3)
Cisco Confidential
27
1. Works with all types of servers (rack optimized, blade servers, etc.)
2. Works with any type of upstream switch (Blade, Top or Rack, Modular) 3. Works at any speed (1G or 10G) 4. Nexus 1000V VSM can be deployed as a VM or a physical appliance
Nexus 1000V
Virtual Center
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
VSM
28
Roadmap Summary
Nexus 1000V
N1KV Beta 1 N1KV Beta 2 N1KV Beta 3 N1KV Appliance Beta
Q2 CY08
Q3 CY08
Q4 CY08
Q1 CY09
Q2 CY09
Q3 CY09
Q4 CY09
N1K-VA GA - VMW
N1K-PA GA - VMW
Note: Nexus 1000V GA dates dependent on VMware release schedule Target for VMware release is 1st half CY2009
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential
29
30
Security and Policy Enforcement Enable VM-level security and policy Scale the use of VMotion and DRS
Operation & Management Simplify management and troubleshooting with VM-level visibility
Organizational Structure Enable flexible collaboration with individual team autonomy Simplify and maintain existing VM mgmt model
Presentation_ID
Cisco Confidential
31
Presentation_ID
Cisco Confidential
32
Presentation_ID
Cisco Confidential
33
Server
Nexus 1000V Leverages Virtual Center for server VMW ESX admin; Cisco CLI for network admin
NIC NIC
Nexus 1000V
LAN
34
Server
VM #1 VM #2 VM #3 VM #4
Nexus 1000V
VMW ESX
NIC NIC
Nexus 1000V
LAN
Policy-Based VM Connectivity
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved.
Server
VM #1 VM #2 VM #3 VM #4
Allows scalable hardware-based implementations through hardware switches Standards-based initiative: Cisco & VMware proposal in IEEE 802 to specify Network Interface Virtualization Combines VM and physical network operations into one managed node
VMW ESX
VN-Link
Nexus
Policy-Based VM Connectivity
Presentation_ID 2006 Cisco Systems, Inc. All rights reserved.