端到端数据中心虚拟化 数据中心解决方案部 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 日程 • Data Center Virtualization Overview • Front-End Data Center Virtualization Core Layer Aggregation Layer Networking Services Access Layer • Server Virtualization Hypervisors Virtual Access Layer Virtualized Services Server IO Virtualization • Back-End Virtualization Virtual HBA & NPV Unified IO & FCoE SAN & Storage • Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 影响IT和数据中心的关键趋势 The need to reduce costs and/or maximize profits IT as business enabler Applications availability Drive for Green—power, cooling and space Server Virtualization — higher performance LAN and Storage convergence VM-Level awareness Workload provisioning © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Virtualization Touches Half (at Least …) The need to reduce costs and/or maximize profits IT as business enabler Applications availability Drive for Green—power, cooling and space Server Virtualization — higher performance LAN and Storage convergence VM-Level awareness Workload provisioning © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 虚拟化数据中心方法论 © 2010 Cisco and/or its affiliates. All rights reserved. • The Application Services provided by the Network need to respond and be aligned to meet the new geometry of the VMs • Close interaction required between the assets provisioning Virtualized infrastructure and the Application Services supporting the Virtual Machines. Cisco Confidential 5 迈向统一网络 Moving to a fully virtualized Data Center, with Any to Any Connectivity • Fully unified I/O delivers the following characteristics: Ultra High Capacity 10Gbps+ Low latency Loss Free (FCoE) • © 2010 Cisco and/or its affiliates. All rights reserved. True ―Any to Any‖ Connectivity is possible as all devices are connected to all other devices. Cisco Confidential 6 Access Layer SAN Edge Aggregation Layer SAN Core Core Layer 虚拟化数据中心 架构(3 层) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 数据中心架构演化 对传统网络设计的挑战 Hypervisor based server virtualization and the associated capabilities (vMotion, Live Migration, etc.) are changing multiple aspects of the Data Center design Data Center Row 1 Where is the server now? Where is the access port? Where does the VLAN exist? Any VLAN Anywhere? How large do we need to scale Layer 2? Data Center Row 2 What are the capacity planning requirements for flexible workloads? Where are the policy boundaries with flexible workload (Security, QoS, WAN acceleration, …)? © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 虚拟化网络架构 演进和考虑点 Typical DC Challenges What are the implications… L2 Fate-sharing Dynamic ―routing protocol‖ for L2 (e.g.: IS-IS) VLAN Location Any VLAN anywhere resonates well L2 Adjacency Lower oversubscription Higher Scale Larger subnet sizes L3 Access Global VLANs App Environments Specific app environments Designs Density & quantity of aggregation switches Density and Capabilities of access switch Classic Pod © 2010 Cisco and/or its affiliates. All rights reserved. Access Ports in management domain Modern Pod Cisco Confidential 9 DR Data Center 虚拟化数据中心 架构(2 层) VDC: Virtual Device ACE Contexts ACE NX-OS – Modular Operating System common across the DC vPC – Between Nexus layers for bi-sectional bandwidht use (no STP loops) DCNM – Consolidated Configuration and Management ASA 5500 FEX Architecture FET + FEX: Cabling cost efficiencies Host Facing vPC Nexus 1000v & vPATH VSG, vWAAS © 2010 Cisco and/or its affiliates. All rights reserved. FC VM #2 VM #3 VM #4 Leaf Layer ISSU – True non-stop operations FCoE Spine Layer OTV: Layer 2 Extension Virtualized Interfaces Adapter FEX, VM-FEX & FCoE Unified Fabric: Multi-Hop FCoE Unified Ports 1 / 10GE FC Converged FCoE link Dedicated FCoE link Cisco Confidential 10 虚拟化数据中心 架构(2 层) 用二层多路径(FabricPath)来支持双网SAN架构 1 / 10GE FC Converged FCoE link Dedicated FCoE link FabricPath enabled for LAN traffic Fabric ‗A‘ • Dual Switch core for SAN A & SAN B Fabric ‗B‘ • All Access and Aggregation switches are FCoE FCF switches • Dedicated links between switches are VE_Ports • Storage VDC (Nexus 7000 only) for additional operation separation at high function agg/core (aka spine) Spine Layer • FabricPath L3 L2 FCF FCF VE RPF, … and N+1 redundancy) SAN can utilize higher performance, higher density, lower cost Ethernet switches (including unified ports) (*) FC connectivity to storage only available on Nexus 5000/5500. FCoE target and NAS / iSCSI target connectivity to any Nexus switch. © 2010 Cisco and/or its affiliates. All rights reserved. Leaf Layer Improved HA and scale over vPC (ISIS, FCF CNA FCF FCoE FC (*) NAS iSCSI Cisco Confidential 11 日程 • Data Center Virtualization Overview • Front-End Data Center Virtualization Core Layer Aggregation Layer Networking Services Access Layer • Server Virtualization Hypervisors Virtual Access Layer Virtualized Services Server IO Virtualization • Back-End Virtualization Virtual HBA & NPV Unified IO & FCoE SAN & Storage • Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 前端:核心层 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 13 虚拟交换机@ Nexus 7000 Protocol Stack … Process XYZ Process DEF Process ABC … VDC B Process XYZ Process DEF Process ABC VDC A Process ―DEF‖ in VDC B Crashes Process DEF in VDC A Is Not Affected and Will Continue to Run Unimpeded Protocol Stack VDCA VDCB A B Infrastructure Kernel Nexus 7000 Physical Switch © 2010 Cisco and/or its affiliates. All rights reserved. C D B D C A Cisco Confidential 14 虚拟交换机 1:N 隔离的资源分配域(3层) VDC-2 Linecard 1 Linecard 2 IP routes: 100K ACL entries: 50K ACL TCAM Size 64K ACL TCAM Size 64K FIB TCAM Size 128K FIB TCAM Size 128K VDC-1 IP routes: 20K ACL entries: 10K Linecard 4 ACL TCAM Size 64K FIB TCAM Size 128K © 2010 Cisco and/or its affiliates. All rights reserved. Linecard 3 VDC-3 IP routes: 100K ACL entries: 50K ACL TCAM Size 64K FIB TCAM Size 128K Cisco Confidential 15 前端: 汇聚层 Gigabit Ethernet 10 Gigabit Ethernet 10 Gigabit DCB 4/8Gb Fiber Channel 10 Gigabit FCoE/DCB © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 16 Catalyst 6500 虚拟交换系统(VSS) 转发运作 Switch 1—Control Plane Active Switch 2—Control Plane Hot Standby Virtual Switch Domain Switch 1—Data Plane Active Switch 2—Data Plane Active Virtual Switch Domain © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Virtual Port Channel (vPC) 双活2层连接 L2 Si Si Non-vPC vPC Physical Topology Logical Topology Virtual Port Channel Bi-sectional BW with vPC vPC is a Port-channeling concept extending link aggregation to two separate physical switches Allows the creation of resilient L2 topologies based on Link Aggregation. Eliminates the need for STP in the access-distribution Layer © 2010 Cisco and/or its affiliates. All rights reserved. Enable seamless VM Mobility, Server HA Clusters Scale Available Layer 2 Bandwidth Dual-homed server operate in active-active mode Simplify Network Design Available on Nexus 7000 and Nexus 5000 / 5500 Cisco Confidential 18 双vPC 域实现与设计 32-Way Port-Channel – Double-sided VPC • Multilayer vPC can join eight active Double-sided vPC architecture member ports of the port-channels in a unique 16-way port-channel* • vPC peer load-balancing is LOCAL to the peer device • Each vPC peer has only eight active links, but the pair has 16 active load balanced links (M-series LC) Nexus 7000 32-way port channel Nexus 5000 • F-series Nexus 7000 line cards support 16 way active port-channel load balancing, providing for a 32 way vPC port channel © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Layer 3 and vPC 设计 Router/Firewall on a stick with VDC P P Router/Firewall Router/Firewall Po1 Po1 7k4 7k1 P P 7k2 7k1 7k2 7k3 P P Po2 Po2 Switch Switch Physical Device P Routing Protocol Peer Dynamic Peering Relationship vPC Domain © 2010 Cisco and/or its affiliates. All rights reserved. Layer 3 VDC Layer 2 VDC no Dynamic Routing on vPC VLANs Layer 2 vPC Cisco Confidential 20 思科 FabricPath 扩展简化二层以太网 Up to 16 Agg switches 160+ Tbps switching capacity Traditional Spanning Tree Based Network -Blocked Links Cisco FabricPath Network -All Links Active Eliminate Spanning tree limitations Multi-pathing across all links, high cross-sectional bandwidth High resiliency, faster network re-convergence Any VLAN, any where in the fabric eliminate VLAN Scoping © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 思科Nexus 架构的灵活性 Spanning-Tree vPC FabricPath Up to 16 Switches Active Paths Pod Bandwidth Single Dual 16 Way Up to 10 Tbps Up to 20 Tbps Up to 160 Tbps Layer 2 Scalability Infrastructure Virtualization and Capacity © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 前端:网络服务 Gigabit Ethernet 10 Gigabit Ethernet 10 Gigabit DCB 4/8Gb Fiber Channel 10 Gigabit FCoE/DCB Networking Services © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 23 数据中心虚拟化服务 VRF VRF v5 VRF v6 v7 1 v8 3 v107 v105 2 ―Front-End‖ VRFs (MSFC) VRF 4 Firewall Module Contexts v108 3 4 ACE Module Contexts v206 v207 v208 VRF BU-1 v105 BU-2 v206 BU-3 v207 ―Back-End‖ VRFs (MSFC) BU-4 v2081 v2082 v2083 Server Side VLANs ... * vX = VLAN X **BU = Business Unit © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 三明治式的虚拟服务设计 Services are ―Sandwiched‖ between Nexus VDCs Stateful Firewall: Virtual Contexts, Transparent mode Agg VDC ACE Load-balancer: Routed Two-arm mode, Virtual Contexts VDC 1 Rationale for VDC sandwich design Merging access/aggregation without sacrificing the functional management of each layer Services Contexts Cat6500 VSS Inter Tenant (VM-to-VM and Multi-tier Flows), policy Management (Security, QoS, BW etc) Operational isolation (change mgmt, span of control) of access-layer versus core/aggregation Sub-Agg VDC VDC 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 虚拟服务机箱设计 L3 Reduced complexity with multi-tenant design. Network Multi-tenancy definition and scope will not be limited to service blade. Container definition is not tied just to services blade Core Improved Convergence and Scalability Service will be isolated via L3 port-channel to/from VSS. Isolation and flexibility on insertion of appliance based model. Aggregation Services Reduced ―always inline‖ effect between VSS and Aggregation-layer Better technology and feature integration Ease of Multicast support VSS Separation of core VDC – freeing VDC resources at the aggregation layer for Storage & OTV Aggregation VDC will not be split (agg / sub-agg) and will represent single L2/L3 boundary for all compute/storage flows © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 在FC刀片交换机上采用NPV • Eliminates edge FC switch Domain ID • Edge FC switch acts as an NPIV host • Simplifies server and SAN management and operations • Increases fabric scalability © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Overlay Transport Virtualization (OTV) OTV at a Glance • Ethernet traffic between sites is encapsulated in IP: ―MAC in IP‖ • Dynamic encapsulation based on MAC routing table • No Pseudo-Wire or Tunnel state maintained IP A IP B MAC1 MAC2 Encap MAC IF MAC1 Eth1 MAC2 IP B MAC3 IP B MAC1 MAC2 MAC1 MAC2 Decap OTV OTV Server 1 MAC 1 © 2010 Cisco and/or its affiliates. All rights reserved. IP A IP B Communication between 2 MAC1 (site 1) and MAC2 Server (site 2) MAC 2 Cisco Confidential 28 OTV 数据平面: 单播 MAC Table contains MAC addresses reachable through IP addresses MAC TABLE OTV Inter-Site Traffic 1 Layer 2 Lookup MAC TABLE VLAN MAC IF 100 MAC 1 Eth 2 100 MAC 2 Eth 1 100 MAC 3 IP B 100 MAC 4 IP B 5 Layer 2 Lookup OTV OTV MAC 2 Eth 2 MAC 1 MAC 3 MAC 1 MAC 3 L2 L3 2 Encap MAC 1 MAC 100 MAC 1 IP A 100 MAC 2 IP A 100 MAC 3 Eth 3 100 MAC 4 Eth 4 External IP B External IP A Eth 1 VLAN IP A IP B Core 3 IF MAC 4 Eth 4 Eth 3 1 3MACIP 3 A IP B MAC 1MAC MAC 6 L3 L2 MAC 1 MAC 3 4 Decap MAC 3 East West No Pseudo-Wire state is maintained. The encapsulation is done based on a Layer 2 destination lookup. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 跨POD网络扩展 Cisco Innovation towards an end-end Fabric: • Cisco FabricPath: Scalable Fabric for Application Deployment Flexibility • OTV : Layer 2 extensions over Layer 3 for distributed Clustered Applications • LISP: IP mobility, optimized routing Data Center Interconnect Extension Overlay Transport Virtualization (OTV) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 前端: 接入层 Gigabit Ethernet 10 Gigabit Ethernet 10 Gigabit DCB 4/8Gb Fiber Channel 10 Gigabit FCoE/DCB © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 31 架顶@ 1/10GE/FCoE: Nexus 2200 (网络扩展器— FEX) Nexus 2200 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Cisco Nexus 2000 Unified Server Access Architecture • N2K inherits the features from parent switch Nexus 7000 Nexus 5000 Unified Access Layer Direct Attach 10GE Nexus 2000 1GE Rack Mount Servers Nexus 2000 10GE Rack Mount Servers © 2010 Cisco and/or its affiliates. All rights reserved. Nexus 2000 1 & 10GE Blade Servers w/ Pass-Thru 10GE Rack Mount Servers Nexus 4000 10GE Blade Switch w/ FCoE (IBM/Dell) Cisco UCS UCS Compute Blade & Rack Cisco Confidential 33 To2R: Nexus 2200 部署举例 Nexus 7000 Nexus 7000 Aggregation Layer vPC Nexus 5500 Nexus 2200 Rack Rack 11 x4 x4 Rack22 Rack © 2010 Cisco and/or its affiliates. All rights reserved. Access Layer vPC x4 Rack 1 x4 Rack Rack 122 Nexus 5500 x4 x4 x4 Rack11 Rack Nexus 2200 x4 Rack22 Rack Rack 1 Rack12 2 Rack Cisco Confidential 34 虚拟接入交换机POD • Cisco Nexus 5x00 and 2200 VPC pair represent a virtual access switch POD • Nexus 7000 at Aggregation Layer NO Loop Nexus 5x00/2200 Virtualized Access Switch PODs © 2010 Cisco and/or its affiliates. All rights reserved. ... NO STP Cisco Confidential 35 采用FabricPath的逻辑图: 无二层环路的分布式拓扑 S10 S20 L5 L1 L2 S100 Virtual Blade Switching (VBS) L6 L3 L4 S101 S30 S40 L7 L8 L9 L10 FabricPath L11 L12 S200 Virtual Access Switch POD (Nexus 7000 / 5x00 + Nexus 2200) Server Unified Computing System (UCS) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 日程 • Data Center Virtualization Overview • Front-End Data Center Virtualization Core Layer Aggregation Layer Networking Services Access Layer • Server Virtualization Hypervisors Virtual Access Layer Virtualized Services Server IO Virtualization • Back-End Virtualization Virtual HBA & NPV Unified IO & FCoE SAN & Storage • Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 前端: 服务器层 Gigabit Ethernet 10 Gigabit Ethernet 10 Gigabit DCB 4/8Gb Fiber Channel 10 Gigabit FCoE/DCB Servers Layer © 2010 Cisco and/or its affiliates. All rights reserved. Cisco UCS Cisco Confidential 38 38 什么是思科UCS? • UCS = Unified Computing System Network + compute Virtualization • Single, scalable integrated system Dynamic resource provisioning Mgmt LAN SAN A SAN B © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 网络对服务器完全可见 •UCS Service Profiles Capture more than MAC & WWN MAC, WWN, Boot Order, Firmware, network & storage policy •Stateless compute where network & storage see all movement Better diagnostics and QoS from network to blade, policy follows Server Name: SP-A UUID: 56 4d cd 3f 59 5b 61… MAC : 08:00:69:02:01:FC WWN: 5080020000075740 Boot Order: SAN, LAN LAN Chassis-1/Blade-5 Chassis-9/Blade-2 © 2010 Cisco and/or its affiliates. All rights reserved. Service Profiles deliver Service Agility regardless of Physical or Virtual Machine SAN Cisco Confidential 40 以Service Profiles构建弹性数据中心 Workload Server Capacity Needed Server HW HA Total Servers Oct Nov Dec Jan Web Servers 5 7 6 5 1 hot spare 8 Oracle RAC 3 3 3 4 1 hot spare 5 VMware 3 3 4 4 1 hot spare 5 Web Servers Today‘s Deployment: Oracle RAC VMware Blade Blade Blade Provisioned for peak capacity Blade Blade Blade Spare node per workload Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Total Server Deployment 18 Servers Blade © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 无状态计算@ UCS Old Deployment: Web Servers Oracle RAC VMware Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Total Server Deployment 14 Servers Reduction of 4 Servers 22% CapEx Savings Blade Blade Blade Cisco’s Deployment: • Resources provisioned based on business need • Still HA with fewer spares Cisco UCS Deployment: (still 18 Service Profiles) Web Servers Oracle RAC VMware Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Blade Burst Capacity Blade HA Spare Blade Blade © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 What Happens When We Mix Network and Server Virtualization ? © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 43 服务器虚拟化时网络面临的问题 Problems: • Dynamic Migration of VMs may move them across physical server ports— policy must follow • Impossible to view or apply policy to locally switched traffic VLAN 101 • Need collaboration between network and Virtualization admin © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 虚拟接入层 @ 虚拟化服务器 Gigabit Ethernet 10 Gigabit Ethernet 10 Gigabit DCB 4/8Gb Fiber Channel 10 Gigabit FCoE/DCB Virtual Access Layer © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Nexus 1000v Cisco Confidential 45 45 Cisco Nexus 1000V 架构 VM VM VM VM Nexus 1000V VEM VM VM VM Physical Server VM VM VM VM Nexus 1000V VEM Nexus 1000V VEM vSphere VM vSphere vSphere Physical Server Physical Server Virtual Supervisor Module (VSM) Virtual or Physical appliance running Cisco NXOS Virtual(supports EthernetHA) Module (VEM) Performs management, monitoring,capability & Enables advanced networking on the configuration hypervisor Cisco Nexus 1000V Installation Tight integration with VMware vCenter ―switch port‖ Provides each VM with dedicated ESX & ESXi VEM is installed/upgraded like an ESX patch Nexus 1000V VSM Nexus 1000V VSM Collection of VEMs = 1 vNetwork distributed Switch VUM & Manual Installation © 2010 Cisco and/or its affiliates. All rights reserved. vCenter Cisco Confidential 46 单一的控制和管理平面 Even if the Nexus 1000V is a distributed switch. It looks like a single switch from control plane and management plane perspective A B C Protocol like CDP, Netflow, SNMP are manage from one location the VSM (Virtual Supervisor Module) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47 Nexus 1010: ―Virtual Service Blade‖ Manager Network Analysis Module* Nexus 1000V VSM Nexus 1000V VSM Nexus 1000V VSM Nexus 1000V VSM Nexus 1010 Manager Nexus 1010 Manager: Cisco management experience Manages virtual service blades © 2010 Cisco and/or its affiliates. All rights reserved. * Optional virtual service blade add-onCisco Confidential 48 分布式数据平面 The Virtual Ethernet Module (VEM) is in the Data path The Virtual Supervisor Module is only doing control plane and management function Each Virtual Ethernet Module forwards packets independent of each other A B C © 2010 Cisco and/or its affiliates. All rights reserved. A B C D E F Cisco Confidential 49 虚拟服务节点 @ 虚拟化服务器 Gigabit Ethernet 10 Gigabit Ethernet 10 Gigabit DCB 4/8Gb Fiber Channel 10 Gigabit FCoE/DCB vWAAS Nexus 1000v © 2010 Cisco and/or its affiliates. All rights reserved. Virtualized Services (VSN) Virtual Service Gateway Cisco Confidential 50 50 VSN部署模式 (Virtual Service Nodes) 1 Redirect VM traffic via VLANs to external (physical) appliances Web Server App Server Database Server Hypervisor 2 Apply hypervisor-based network services Web Server App Server Database Server Hypervisor VLANs Virtual Contexts VSN VSN Virtual Service Nodes Traditional Service Nodes © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51 Single VNMC Manager Tenant 2 Tenant 1 VDC vApp VDC vApp Nexus 1000V VMWare Hypervisor UCS (physical web servers) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52 Nexus 1000v的vPATH 截取 VSN vPATH Interception is configured on Server VM‘s Port Profile in both directions to redirect to a VSN Server VM vPATH Interception In/Out VEM Server traffic is intercepted by vPATH interception in VEM and redirected to a VSN VSN egress traffic forwarded without further vPATH interception. Upstream Switch VSM © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53 Cisco 虚拟安全网关(VSG) 以vPATH智能导引流量 VNMC VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM Nexus 1000V vPATH Distributed Virtual Switch VSG 1 © 2010 Cisco and/or its affiliates. All rights reserved. Initial Packet Flow Log/Audit Cisco Confidential 54 Cisco 虚拟安全网关(VSG) 以vPATH智能导引流量 VM VM VM VM VM VM VM VM VM VNMC VM VM VM VM VM VM VM VM VM VM Nexus 1000V vPATH Distributed Virtual Switch VSG 1 © 2010 Cisco and/or its affiliates. All rights reserved. Initial Packet Flow 2 Flow Access Control Log/Audit Cisco Confidential 55 Cisco 虚拟安全网关(VSG) 以vPATH智能导引流量 VM VM VM VM VM VM VM VM VM VNMC VM VM VM VM VM VM VM VM VM VM Nexus 1000V vPATH Distributed Virtual Switch Decision Caching 1 © 2010 Cisco and/or its affiliates. All rights reserved. Initial Packet Flow 2 3 VSG Flow Access Control Log/Audit Cisco Confidential 56 Cisco 虚拟安全网关(VSG) 以vPATH智能导引流量 VM VM VM VM VM VM VM VM VM VNMC VM VM VM VM VM VM VM VM VM VM 4 Nexus 1000V vPATH Distributed Virtual Switch Decision Caching 1 © 2010 Cisco and/or its affiliates. All rights reserved. Initial Packet Flow 2 Flow Access Control 3 VSG Log/Audit Cisco Confidential 57 Cisco 虚拟安全网关(VSG) 以vPATH智能导引流量 VNMC VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM VM Nexus 1000V vPATH Distributed Virtual Switch ACL offloaded to Nexus 1000V VSG Remaining packets from flow Log/Audit © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58 Cisco 虚拟安全网关(VSG) 更优的安全解决方案 Virtual Security Gateway (VSG) Context aware Security VM context aware rules Zone based Controls Establish zones of trust Dynamic, Agile Policies follow vMotion Best-in-class Architecture Virtual Network Management Center (VNMC) Non-disruptive Operations Security team manages security Policy Based Administration Central mgmt, scalable deployment, multi-tenancy Designed for Automation © 2010 Cisco and/or its affiliates. All rights reserved. Efficient, Fast, Scale-out Software XML API, security profiles Cisco Confidential 59 vWAAS vPATH截取 • Interception based on port-profile policy Web Server 1 vWAAS App Server configured in Nexus 1000v • Bidirectional Interception - (no IN/OUT configuration) • Pass-through traffic automatic bypass Nexus 1000V vPATH VMware ESXi Server Cisco UCS x86 Server Nexus 1000v VSM © 2010 Cisco and/or its affiliates. All rights reserved. vCenter Server Cisco Confidential 60 服务器 IO 虚拟化 Gigabit Ethernet 10 Gigabit Ethernet 10 Gigabit DCB 4/8Gb Fiber Channel 10 Gigabit FCoE/DCB FIP FIP Nexus 5500 5000 & Nexus 2200 2000 Top-of-Rack Nexus 5500 & Nexus 4000 Cisco UCS Server IO Virtualization © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61 61 网络扩展器演进 分布式模块化系统 One Network Parent Switch to Top of Rack Network Administrator Many applications require multiple interfaces FEX Architecture IEEE 802.1 Qbh* FEX Consolidates network management FEX managed as line card of parent switch Uses Pre-standard IEEE 802.1Qbh Legacy *IEEE 802.1Qbh Pre-Standard © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 网络扩展器演进 分布式模块化系统 One Network Parent Switch to Adapter Network Administrator IEEE 802.1 Qbh* FEX Many applications require multiple interfaces Adapter FEX Consolidates multiple 1Gb interface into a single 10Gb interface Extends network into server Uses Pre-standard IEEE 802.1Qbh IEEE 802.1 Qbh* Legacy Adapter FEX *IEEE 802.1Qbh Pre-Standard © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63 网络扩展器演进 分布式模块化系统 One Network Virtual Same As Physical Network Administrator IEEE 802.1 Qbh* FEX VM-FEX Consolidates virtual and physical network IEEE 802.1 Qbh* IEEE 802.1 Qbh* Each VM gets a dedicated port on switch Uses Pre-standard IEEE 802.1Qbh Hypervisor Legacy Adapter FEX VM network managed by Server administrator VM-FEX *IEEE 802.1Qbh Pre-Standard © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 网络扩展器演进 分布式模块化系统 One Network Parent Switch to Application Single Point of Management Network Administrator FEX Architecture Consolidates network management FEX managed as line card of parent switch IEEE 802.1 Qbh* Manage network all the way to the OS interface – Physical and Virtual FEX IEEE 802.1 Qbh* IEEE 802.1 Qbh* Hypervisor Legacy © 2010 Cisco and/or its affiliates. All rights reserved. Adapter FEX Adapter FEX Consolidates multiple 1Gb interface into a single 10Gb interface Extends network into server VM-FEX Consolidates virtual and physical network Each VM gets a dedicated port on switch VM FEX Cisco Confidential 65 Cisco UCS VIC 简介 Mezzanine Card for B-Series and C-Series Converged Network Adapter (CNA) designed for both single-OS and VM-based deployments • Virtualized in Hardware • PCIe compliant 10GbE / FCoE High Performance • 2x 10Gb • 500K+ IOPS The OS/Hypervisor sees up to ~58 distinct PCIe devices • Ethernet vNIC and FC vHBA • Management from the network Eth FC FC Eth User Definable vNICs 0 1 2 3 58 VM-FEX (aka VN-Link in Hardware): Ideal for Virtualization Environments • Bypass vSwitch to deliver VN-Link in hardware • Tight integration with Vmware vCenter PCIe x16 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66 VN-Link功能小结 Generic Adapter + Nexus 1000V Generic adapter Cisco VIC + Nexus 1000V (suggested deployment) Cisco VIC as Adapter FEX Cisco VIC as VM-FEX GREATER FLEXIBILITY/SCALABILITY, RICH FEATURE SET AND FASTER TIME TO MARKET VN-Link in Software Generic Adapter & Nexus 1000v © 2010 Cisco and/or its affiliates. All rights reserved. VIC & Nexus 1000v Cisco VIC + UCS with VMDirectPath Cisco VIC + UCS Cisco VIC as VM-FEX HIGHER PERFORMANCES & BETTER I/O MANAGEMENT VM-FEX (VN-Link in Hardware) VIC + UCS 6100 VIC + UCS 6100 VMDirectPath Cisco Confidential 67 优化虚拟环境下的IO 场景 1: 软件VN-LINK 和VIC VM VM ooo VM VM VM Nexus 1000V hypervisor switch Hypervisor Cisco Virtualized Adapter VN-LINK in SW = Nexus 1000V • Each VM vnic connects to Nexus 1000V hypervisor switch • Nexus 1000V switch uplinks connect to multiple distinct Cisco virtual interfaces (VIFs) Likely Use Case: • Customer has already standardized on Nexus 1000V • Customer deployment needs higher scalability and number of VMs © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 优化虚拟环境下的IO 场景 2: 硬件VN-LINK(VM-FEX) ) Cisco VIC adapter VM-FEX dVIF1 dVIF2 dVIF3 dVIF4 … dVIF45 dVIF46 dVIF47 dVIF48 dVIF49 dVIF50 dVIF51 dVIF52 dVIF53-Veth5 Profile VMK dVIF54-Veth10 Profile COS Kernel Service Console VM-FEX (aka VN-LINK in Hardware) • Each VM vnic maps to a different virtual interface (VIF) • IO to/from VM enters Cisco hypervisor switch module and passes thru to Cisco VIF (switching not done on CPU) Likely Use Case: • Customer benefits from centralized Management through UCSM • Customer needs higher performance © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69 日程 • Data Center Virtualization Overview • Front-End Data Center Virtualization Core Layer Aggregation Layer Networking Services Access Layer • Server Virtualization Hypervisors Virtual Access Layer Virtualized Services Server IO Virtualization • Back-End Virtualization Virtual HBA & NPV Unified IO & FCoE SAN & Storage • Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70 网络行为和特征 • Ethernet is non-deterministic. Flow control is destination-based Relies on TCP drop-retransmission / sliding window • Fibre-Channel is deterministic. Flow control is source-based (B2B credits) Services are fabric integrated (no loop concept) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71 数据中心以太网(DCB) 特性 PFC Priority-based Flow Control (PFC) Enables lossless Fabrics for each class of service PAUSE sent per virtual lane when buffers limit exceeded Network resources are partitioned between VL’s (E.g. input buffer and output queue) The switch behavior is negotiable per VL © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72 DCB / FCoE 相关标准 FCoE is fully defined in the FC-BB-5 standard (since Jun/2009) FCoE works with additional technologies to make I/O Consolidation a reality T11 IEEE 802.1 FCoE DCB FC on FC on Other other network Network media PFC ETS DCBX Lossless Ethernet Priority Grouping Configuration Verification 802.1Qbb 802.1Qaz 802.1Qaz Media FC-BB-5 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73 DCB / FCoE 相关标准 FCoE is fully defined in the FC-BB-5 standard (since Jun/2009) FCoE works with additional technologies to make I/O Consolidation a reality Standard / Feature T11 BB-5 Status of the Standard T11 Fibre Channel over Ethernet (FCoE) IEEE 802.1 FCoE Standard (Jun 3, 2009) DCB IEEE 802.1Qbb Priority-based Flow (PFC) FCControl on FC on Other other network Network media IEEE 802.3bd Media Frame Format for PFC Forwarded to RevCom for publication in April 2011 PFC © 2010 Cisco and/or its affiliates. All rights reserved. DCBX Forwarded to RevCom for publication Lossless Priority in April 2011 Configuration Ethernet IEEE 802.1Qaz Enhanced Transmission Selection (ETS) and Data FC-BB-5 Center Bridging eXchange protocol (DCBX) ETS Grouping Verification Forwarded to RevCom for publication in April 2011 802.1Qbb 802.1Qaz 802.1Qaz Cisco Confidential 74 以太网承载光纤通道(FCoE)一瞥 FCoE Benefits • Mapping of FC frames • Wire Server Once over Ethernet • Fewer cables and adapters • Enables FC to run • Software Provisioning of I/O on a lossless Data Center Ethernet network • Interoperates with existing SANs • No gateway—stateless Ethernet • Standard – June 3, 2009 Fibre Channel © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75 统一 I/O 架构整合 No Consolidated IO LAN SAN A I/O Consolidation with FCoE SAN B LAN SAN A SAN B Nexus 5000 Ethernet © 2010 Cisco and/or its affiliates. All rights reserved. FC FCoE Cisco Confidential 76 SAN Core VSAN, NPIV, NPV, 及存储访问 SAN Edge SAN & Storage © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77 虚拟存储区域网(VSAN) • Consolidation of SAN islands Department A Increased utilization of fabric ports with Just-InTime provisioning • SAN Islands Deployment of large fabrics Dividing a large fabric in smaller VSANs Disruptive events isolated per VSAN RBAC for administrative tasks Zoning is independent per VSAN • Department B Advanced traffic management Department C Defining the paths for each VSAN VSANs may share the same EISL Virtual SANs (VSANs) Cost effective on WAN links • Resilient SAN Extension • Standard solution (ANSI T11 FC-FS-2 section 10) Department A Department B Department C © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78 理解 VSANs (或 Virtual Fabrics) Production SAN Test SAN Tape SAN FC FC FC FC FC FC FC FC FC FC SAN A DomainID=1 SAN B DomainID=2 DomainID=7 DomainID=8 © 2010 Cisco and/or its affiliates. All rights reserved. SAN C DomainID=3 SAN D DomainID=4 SAN E DomainID=5 SAN F Domain ID=6 Cisco Confidential 79 什么是NPIV? • N-Port ID Virtualization (NPIV) provides a means to assign multiple FC IDs to a single N port. • This feature was intended to allow multiple applications to share the same Fiber Channel HBA • The use of different pWWN allows access control, zoning, and port security to be implemented at the application level. • Usage applies to applications such as Vmware vSphere, Microsoft Hyper-V and Citrix XenServer Application Server Email Email I/O N_Port_ID 1 Web Web I/O N_Port_ID 2 File Services © 2010 Cisco and/or its affiliates. All rights reserved. FC Switch F_Port File Services I/O N_Port_ID 3 Cisco Confidential 80 什么是NPV? • N-Port Virtualizer (NPV) utilizes NPIV functionality to allow a ―switch‖ to act like a Server doing multiple logins through 1 physical link • Real server connected (via CNAs) to Nexus 5x00 do not login to the Nexus 5x00 but to upstream FC switch. The same applies to FC edge switches (ex.: MDS blade switches and MDS 91xx FC fabric switches). • No local switching is done on an FC switch in NPV mode • FC edge switch in NPV mode Does NOT take up a Domain ID Nexus 5x00, MDS 91xx, MDS blade switches, UCS Fabric Interconnect FC Core Switch Server1 Eth1/1 Server1 N_Port_ID 1 Eth1/2 Server2 N_Port_ID 2 Eth1/3 Server3 N_Port_ID 3 Server2 Server3 © 2010 Cisco and/or its affiliates. All rights reserved. F_Port Cisco Confidential 81 在FC刀片交换机上采用NPV • Eliminates edge FC switch Domain ID • Edge FC switch acts as an NPIV host • Simplifies server and SAN management and operations • Increases fabric scalability © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82 Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83