Uploaded by Somit Maloo

511740241-BRKDCT-2378

advertisement
Everyone
in this
room is a
GENIUS
2
What are Best Practices ?
Learning from Others
Mistakes
3
Learning from your
mistakes makes you
SMART
Learning from others
mistakes makes you
GENIUS
4
vPC Best Practices and
Design on NXOS
Nazim Khan, CCIE#39502 (DC/SP)
Network Consulting Engineer, Data Center Group
BRKDCT-2378
Session Focus
• Best Practices and Designs for vPC
• Nexus 2000 (FEX) will only be
addressed from vPC standpoint
• Fabricpath / vPC+ Overview
• vPC with FCOE
• vPC with VXLAN
• vPC with ACI
.
Pick the great from the good
We Are Not Covering
• vPC troubleshooting
• Scalability
• Fabricpath
• vPC+
• VXLAN
• FCoE
• ACI
Related Sessions at Cisco Live Berlin
Session Id
Session Name
BRKDCT-2404
VXLAN deployment models - A practical perspective
BRKDCT-3313
Fabricpath Operations and Troubleshooting
BRKDCT-2458
Nexus 9000/7000/6000/5000 Operations and
Maintenance Best Practices
BRKACI-2601
Real World ACI Deployment and Migration
BRKDCT-2333
Data Centre Network Failure Detection
9
Agenda
•
Feature Overview
•
Configuration Best Practices
•
Design Best Practices
•
vPC Operations and Upgrade
•
vPC with Fabric Technologies
•
Reference Material
10
Data Center Technology Evolution
MPLS, OTV,
LISP
MPLS, OTV,
LISP
ACI
VXLAN
FabricPath with vPC+
FEX with vPC
VPC
2014-2015
STP
2013-2014
2010
2010
2009
2008
11
Why vPC?
13
there’s
something
about
vPC
14
Role of vPC in the Evolution of Data Center
•
vPC launched in 2009
•
Deployed by almost 95% of Nexus customers
•
Used to redundantly connect network entities at the
edge of the Fabric
Unified Fabric
−
Dual-homed servers (bare metal, blades, etc.)
− Network services (Firewalls, Load Balancers, etc.)
15
Agenda
•
Feature Overview
−
−
Concepts and Benefits
Terminology
16
vPC Feature Overview
vPC Concept & Benefits
S1
S2
S1
S3
STP
•
•
S2
S2
S1
S3
vPC Physical Topology
S3
vPC Logical Topology
No Blocked Ports, More Usable Bandwidth, Load Sharing
Fast Convergence
17
Feature Overview
vPC Terminology
Layer 3 Cloud
vPC
Peer
Orphan
Port
vPC Peer
Keepalive Link
vPC Domain
Peer-Link
S1
CFS
S2
vPC Member
Port
vPC
Orphan
Device
S3
18
For Your
Reference
vPC Failure Scenario
vPC Peer-Keepalive Link up & vPC Peer-Link down
vPC peer-link failure (link loss):
P
vPC Peer-keepalive
S
• vPC peer-keepalive up
• Status of other vPC peer known
S1
S2
vPC_PLink
• Both peers Active
Suspend secondary
vPC Member Ports
• Secondary vPC peer disables all vPC’s
• Traffic from vPC primary.
• Orphan devices connected to secondary peer will
be isolated
vPC1
vPC2
SW4
SW3
Keepalive Heartbeat
P
Primary vPC
S
Secondary vPC
19
vPC Failure Scenario – Dual Active
For Your
Reference
vPC Peer-Keepalive down followed by vPC Peer-Link down
1. vPC peer-keepalive DOWN
2. vPC peer-link DOWN
3. DUAL-ACTIVE or SPLIT BRAIN
P
S1
• vPC primary peer remains primary and
secondary peer becomes operational primary
role
• Result in traffic loss / uncertain traffic behavior
• When links are restored, the operational
primary (former secondary) keeps the primary
role & former primary becomes operational
secondary
P
S
vPC Peer-keepalive
S2
vPC_PLink
Traffic Loss / Uncertain Traffic
Behavior
vPC1
vPC2
SW3
SW4
P Primary vPC
S
Secondary vPC
20
Agenda
•
vPC Configuration Best Practices
−
−
−
−
−
−
−
−
−
Building a vPC domain
Domain-ID
Peer-Link
Peer-Keepalive Link
Spanning-Tree
Peer-switch
Private VLAN (PVLAN)
Auto-recovery
Object tracking
21
vPC Configuration Best Practices
Building a vPC domain – Configuration Steps
1. Define domains
S1
S2
2. Establish Peer Keepalive connectivity
3. Create a Peer link
CFS
4. Create vPCs
5. Make Sure Configurations are Consistent
(Order does Matter!)
S3
22
vPC Configuration Best Practices
vPC Domain-ID
•
•
The vPC peer devices use the vPC domain ID to
automatically assign a unique vPC system MAC
address
vPC Domain 10
S1
S2
You MUST use unique Domain id’s for all vPC
pairs defined in a contiguous layer 2 domain
! Configure the vPC Domain ID – It should be unique within the layer 2
domain
NX-1(config)# vpc domain 20
vPC Domain 20
S4
S3
! Check the vPC system MAC address
NX-1# show vpc role
<snip>
vPC system-mac
: 00:23:04:ee:be:14
S5
23
vPC Configuration Best Practices
vPC Peer-Link
S1
S2
S3
•
•
•
•
S2
S1
S3
vPC Peer-link should be a point-to-point connection
Peer-Link member ports can be 10/40/100GE interfaces
Peer-Link bandwidth should be designed as per the vPC
vPC imposes the rule that peer-link should never be blocking
24
vPC Configuration Best Practices
vPC Peer-Keepalive link
Preference
Recommendations
(in order of
preference):
Nexus 7X00 /
9500 series
Nexus 9300 /6000 /
5X00 / 3X00 series
1
Dedicated link(s)
(1GE/10GE LC)
mgmt0 interface
2
mgmt0 interface
Dedicated link(s)
(1GE/10GE LC)
3
L3 infrastructure
L3 infrastructure
25
vPC Configuration Best Practices
For Your
Reference
vPC Peer-Keepalive link – Dual Supervisors
Management Switch
•
When using dual supervisors and mgmt0 interfaces
to carry the vPC peer-keepalive, DO NOT connect
them back to back between the two switches
Management
Network
vPC_PKL
vPC_PKL
vPC_PL
•
Only one management port will be active a given point
in time and a supervisor switchover may break keepalive connectivity
•
Use the management interface when you have an outof-band management network (management switch in
between)
vPC1
vPC2
Standby Management Interface
Active Management Interface
26
vPC Configuration Best Practices
Spanning Tree (STP)
STP is running to manage
loops outside of vPC domain,
or before initial vPC
configuration !
S1
S2
S4
S3
S5
•
•
All switches in Layer 2 domain should run either Rapid-PVST+ or MST
Do not disable spanning-tree protocol for any VLAN
•
Always define the vPC domain as STP root for all VLAN in that domain
27
vPC Configuration Best Practices
vPC Peer-Gateway
• Allows a vPC switch to act as the active
gateway for packets addressed to the peer
router MAC
S1
S2
• Keeps forwarding of traffic local to the vPC node
and avoids use of the peer-link
• Allows Interoperability with features of some NAS
or load-balancer devices
S3
S4
N7k(config-vpc-domain)# peer-gateway
28
vPC Configuration Best Practices
vPC Peer-switch
Primary
vPC
Secondary
vPC
Without Peer-switch
BPDUs
•STP for vPCs controlled by vPC primary.
•vPC primary send BPDU’s on STP designated ports
•vPC secondary device proxies BPDU’s to primary
With Peer-switch
• Peer-Switch makes the vPC peer devices to appear as a
single STP root
• BPDUs processed by the logical STP root formed by the 2
vPC peer devices
Primary
vPC
Secondary
vPC
N7k(config-vpc-domain)# peer-switch
29
vPC Configuration Best Practices
PVLAN on vPC
•
PVLAN configuration across both VPC switches
should be identical
•
PVLAN configuration not supported on Peer-Link
•
Type-1 Compatibility Check
• Port mode is a type-1 check
• vPC leg brought down if PVLAN port mode
different on vPC legs
•
Type-2 Compatibility Check
• PVLAN will bring down mismatched tuple
vPC Primary
S1
vPC Secondary
P
P
PVLANPROMISC
(3500, 3501)
S2
PVLANPROMISC
(3500, 3501)
C
Community
VLAN
Note : This feature is currently not supported on N9X00
30
vPC Configuration Best Practices
PVLAN VPC type 1 Consistency Check
vPC Primary
vPC Secondary
vPC Primary
S1
S2
S1
Pvlan
Promiscuous
trunk
S2
I
P
P
Pvlan Isolated trunk
S3
vPC Primary
I
S3
vPC Secondary
S1
S2
I
Type 1 Consistency
Failure
vPC Secondary
T
S3
31
vPC Configuration Best Practices
PVLAN VPC type 2 Consistency Check
vPC Primary
vPC Secondary
vPC Primary
S1
S2
S1
PVLANPROMISC
(10, 201)
I
S3
PVLANPROMISC
(10, 201)
vPC Primary
Type 2 Consistency
Failure
S2
P
P
vPC Secondary
Secondary
Trunk (2,31)
(3,30), (4,100)
I
S3
Secondary
Trunk (2,31)
(3,30), (4,100)
vPC Secondary
S1
S2
I
Secondary
Trunk (3,31)
(2,30), (4,100)
I
S3
Secondary
Trunk (2,31)
(3,30), (4,100)
32
vPC Configuration Best Practices
vPC auto-recovery
P
Operational
Primary
S
S
P
P
S2
S1
S3
S1
S2
S1
S3
S2
S3
1. vPC peer-link down : S2 - secondary shuts all its vPC member ports
2. S1 down : vPC peer-keepalive link down : S2 receives no keepalives
3. After 3 keepalive timeouts, S2 changes role and brings up its vPC
P vPC Primary
S vPC Secondary
33
vPC Configuration Best Practices
vPC auto-recovery
For Your
Reference
Auto-recovery addresses two cases of single switch behavior
•Peer-link fails and after a while primary switch (or keepalive link) fails
•Both VPC peers are reloaded and only one comes back up
How it works
•If Peer-link is down on secondary switch, 3 consecutive missing peer-keepalives will
trigger auto-recovery
•After reload (role is ‘none established’) auto-recovery timer (240 sec) expires while
peer-link and peer-keepalive still down, autorecovery kicks in
•Switch assumes primary role
•VPCs are brought up bypassing consistency checks
Nexus(config)# vpc domain 1
Nexus(config-vpc-domain)# auto-recovery
34
vPC Configuration Best Practices
Why Object-Tracking ?
•
S5
S4
Modules hosting peer-link and uplink fail on
the vPC primary
Primary
•
Peer-Link is down and vPC Secondary
shut all its vPC
•
Auto-Recovery does not kick in as peerkeepalive link is active
•
Traffic is black holed
Secondary
S1
S2
S3
35
vPC Configuration Best Practices
Object-tracking
•
vPC object tracking, tracks both peer-link and
uplinks in a list of Boolean OR
• Object Tracking triggered when the track object
goes down
• Suspends the vPCs on the impaired device
• Traffic forwarded over the remaining vPC peer
! Track
track 1
! Track
track 2
track 3
the vpc peer link
interface port-channel11 line-protocol
the uplinks
interface Ethernet1/1 line-protocol
interface Ethernet1/2 line-protocol
S4
S5
S1
S2
! Combine all tracked objects into one.
! “OR” means if ALL objects are down, this object will go down
track 10 list boolean OR
object 1
object 2
object 3
! If object 10 goes down on the primary vPC peer,
! system will switch over to other vPC peer and disable all local vPCs
vpc domain 1
track 10
S3
36
vPC Configuration Best Practices
Spanning Tree Bridge Assurance
Stopped receiving
BPDUS!
Root
Malfunctioning
switch
BPDUs
Network
Network
BA Inconsistent
Network
Network
BPDUs
BPDUs
Network
Network
BA Inconsistent
Blocked
Stopped receiving
BPDUS!
Edge
Edge
%STP-2-BRIDGE_ASSURANCE_BLOCK: Bridge Assurance blocking port Ethernet2/48
VLAN0700
switch# show spanning vl 700 | in -i bkn
Eth2/48
Altn BKN*4
128.304 Network P2p *BA_Inc
Spanning Tree Bridge Assurance
For Your
Reference
Almost like a routing protocol…
•
Turns STP into a bidirectional protocol
•
Ensures spanning tree fails “closed” rather than “open”
•
All ports with “network” port type send BPDUs regardless of state
•
If network port stops receiving BPDUs, port is placed in BA-Inconsistent state
(blocked)
%STP-2-BRIDGE_ASSURANCE_BLOCK: Bridge Assurance blocking port
Ethernet2/48 VLAN0700.
switch# sh spanning vl 700 | in -i bkn
Eth2/48
Desg BKN*4
128.304 Network P2p *BA_Inc
38
vPC Configuration Best Practices
vPC & Bridge Assurance (BA)
• STP Bridge Assurance is enabled by default on vPC Peer-Link
• DON’T disable Bridge Assurance on vPC Peer-link
• NO Bridge Assurance on vPC member ports (even with peer-switch)
39
For Your
Reference
vPC Configuration Best Practices
Unidirectional Link Detection (UDLD)
•
Light-weight Layer 2 failure detection protocol
•
Designed for detecting:
•
One-way connections due to physical or soft failure
• Mis-wiring detection (loopback or triangle)
•
Cisco proprietary, but listed in informational RFC 5171
•
Runs on any single Ethernet link, even inside bundle
•
Centralized implementation in switching platforms
•
Message interval: 7 - 90 sec (default: 15 seconds)
•
Detection: 2.5 x interval + timeout value (4 sec)  ~ 41 sec
Rx
Tx
Rx
Tx
40
vPC Configuration Best Practices
UDLD with vPC
• UDLD NOT recommended on vPC peer-link
• UDLD NOT recommended on vPC member ports if LACP is used
• UDLD only in normal mode on vPC member ports if required
41
Agenda
•
vPC Design Best Practices
−
Mixed Hardware across vPC Peers
−
FHRP with vPC
−
Hybrid topology (vPC and non-vPC)
−
vPC and Network Services
−
vPC Fex Supported Topologies
−
Physical port vPC
−
vPC as Data Center Interconnect (DCI)
−
Dynamic Routing over VPC
−
vPC and Multicast
42
Design Best Practices
Mixed Hardware across vPC Peers : Line Cards
Always use identical line cards on either sides of the peer link and VPC legs !
Examples
vPC Primary
vPC Secondary
vPC Peer-link
S1
N7000
F2E
S2
N7700
F2E
F3
vPC Primary
vPC Secondary
vPC Peer-link
S1
S2
M2
M1
F3
vPC
vPC
43
Design Best Practices
Mixed Hardware across vPC Peers : Nexus 9500
X
vPC Primary
vPC Secondary
vPC Peer-link
S1
N9500
X
S2
N9500
Y
X
Y
vPC
Y
N9K-X9636PQ
N9K-X9432PQ
N9K-X9564PX
N9K-X9464PX
N9K-X9564TX
N9K-X9464TX
N9K-X9536PQ
N9K-X9736PQ
vPC
44
Design Best Practices
Mixed Hardware across vPC Peers : Chassis & Supervisors
•
•
•
•
N7000 and N7700 in same vPC Construct -Supported
VDC type should match on both peer device
vPC peers can have mixed SUP version* (SUP1, SUP2, SUP2E)
N5500 and N5600 in same vPC Construct –Not Supported
vPC Primary
S1
N7000
vPC Secondary
S2
N7700
vPC Primary
vPC Secondary
S2
S1
N5500
N5600
*Recommended only for short period such as migration
45
Design Best Practices
FHRP with vPC
FHRP
“Active”:
Active for
shared L3 MAC
•
•
•
FHRP
“Standby”:
Active for
shared L3 MAC
S1
S2
S3
S4
FHRP in Active/Active mode with vPC
No requirement for aggressive FHRP timers
Best Practice : Use default FHRP timers
46
Design Best Practices
Use one transit vlan to establish L3 routing
backup path over the vPC peerlink in case L3
uplinks were to fail, all other SVIs can use
passive-interfaces
Backup Routing Path
•
•
•
•
Point-to-point dynamic routing protocol
adjacency between the vPC peers to
establish a L3 backup path to the core
through PL in case of uplinks failure
Define SVIs associated with FHRP as
routing passive-interfaces in order to avoid
routing adjacencies over vPC peer-link
A single point-to-point VLAN/SVI (aka
transit vlan) will suffice to establish a L3
neighbor
Alternatively, use an L3 point-to-point link
between the vPC peers to establish a L3
backup path
S3
S4
P
P
OSPF/EIGRP
L3
P
VLAN 99
P
OSPF/EIGRP
L2
S1
Primary
vPC
Secondary
vPC
S2
S5
P
Routing Protocol Peer
47
Hybrid topology (vPC and non-vPC)
STP Root
VLAN 1
VLAN 2
STP Root
VLAN 1
Bridge Priority
VLAN 1  4K
VLAN 2  8K
vPC Primary
STP Root
VLAN 2
vPC Secondary
S1
S2
peer-switch
VLAN 1
(blocked)
vPC1
S3
Bridge Priority
VLAN 1  8K
VLAN 2  4K
S4
VLAN 2
(blocked)
•
Supports hybrid topology where vPC and non-vPC are connected to the same vPC domain
•
Need additional configuration parameters : spanning-tree pseudo-information
•
STP pseudo configuration takes precedence over global STP configuration
48
Design Best Practices
ASA Cluster
Cluster
Control Link
Cluster
Data Link
ASA Cluster Mode
•
Use unique vPC for ASA Cluster Data Links to vPC domain
•
Use vPC per ASA device for Cluster Control Link (CCL) to vPC domain
•
Leverage peer-switch configuration
49
Nexus 2000 (FEX) Straight-Through Deployment with VPC
• Port-channel connectivity from the server
• Two Nexus switches bundled into a vPC
pair
S1
S2
Fabric Links
• Suited for servers with Dual NIC and
capable of running Port-Channel
HIF
Fex 100
HIF
Fex 101
VPC
50
Nexus 2000 (FEX)Active-Active Deployment with VPC
S1
•
•
•
Fabric Extender connected to two Nexus
5X00 / 6000
Suited for servers with Single NIC or
Dual NIC not having port-channel
capability.
Scale implications of less FEX per
system and less VPC
Note :
• This design is currently not supported on Nexus 9X00
• Nexus 7X00 will support this from release 7.2
S2
Fabric Links
Fex 101
Fex 100
HIF
HIF
51
Nexus 2000 (FEX) Active-Active Scale &
Limitations (N7X00)
•
N7X00 can support up to 64 FEXs
•
N7X00 supports only 15 Active-Active FEX in 7.2(0)D1(1)
•
Straight-Through FEX and Active-Active FEX cannot exist on the
same ASIC instance
•
Layer 3 HIF ports are not supported with Active-Active FEX
•
Active-Active FEX is not supported with vPC+
Nexus 2000 (FEX) - Enhanced VPC
•
•
•
•
Port-channel connectivity to dual-homed
FEXs
From the server perspective a single access
switch with port-channel support – each line
card supported by redundant supervisors
Ideal design for a combination of single
NIC and Dual NIC servers with portchannel capability
Scale implications of less FEX per
system and less VPC
S2
S1
Fabric Links
Fex 100
Fex 101
HIF
HIF
Note :
This design is currently not supported on N7000 / N7700 and
N9X00
53
Nexus 2000 (FEX) Active-Active (Unsupported)
54
Physical Port vPC
vPC domain
vPC domain
FEX101
e101/1/1
Port-channel vPC
FEX101
FEX102
Po1
VPC1
VPC1
Po1
e101/1/1
e102/1/1
FEX102
VPC1
interface e101/1/1
switchport
vpc 1
lacp mode active
VPC1
e102/1/1
Physical port vPC
• vPC configuration on a physical Layer 2 port as opposed to a port-channel
• Front panel ports and FEX ports connected to F2/F2e/F3 only
• Improves scaling as separate PC interface not created for single-link VPC leg
• Key benefit: more than 1000 host facing VPCs with FEX
55
vPC - Data Center Interconnect(DCI)
DC 1
DC 2
E
-
F
Long Distance
Dark Fiber
F
E
CORE
CORE
vPC domain 11
vPC domain 21
-
N
N
N
N
N
Network port
E
Edge or portfast
-
Normal port type
B
BPDUguard
F
BPDUfilter
R
Rootguard
802.1AE (Optional)
- R
F E
R
R
-
-
N
N
-
N
R
R
N
-
vPC domain 10
vPC domain 20
R
R
-
-
E
E
B
B
Server Cluster
ACCESS
ACCESS
E F
AGGR
AGGR
-
R
Server Cluster
56
Design Best Practices
vPC as Data Center Interconnect (DCI)
PROS
• vPC is easy to configure and it provides robust and resilient interconnect solution
CONS
• Maximum of only two Data Centers can be interconnected
• Layer 3 peering between Data Centers cannot be done through vPC and separate
links are required
57
Design Best Practices
vPC -Data Center Interconnect (DCI)
•
vPC Domain id for vPC layers should be UNIQUE
•
BPDU Filter on the edge devices to avoid BPDU propagation
•
STP Edge Mode to provide fast Failover times
•
No Loop must exist outside the vPC domain
•
No L3 peering between Nexus 7000 devices (i.e. pure layer 2)
58
Dynamic routing over vPC ?
59
Dynamic routing over vPC
Use Case 1 : Firewall at Aggregation layer
L3 Cloud
•
Peering Firewalls in routed mode over vPC
•
Firewalls may be in active-standby mode
•
Static routing / L3 P2P links NOT required
•
S1
External and internal traffic traverse same
port channel to firewall.
S2
FW-A
FW-B
Dynamic Peering Relationship
60
Dynamic routing over vPC
Use Case 2 : Remote Orphan Site Peering in DCI Deployment
• vPC as Data Center Interconnect (DCI)
• Each Switch has routing adjacency with both
vPC device in other DC
Remote Site 1
S1
Remote Site 2
S2
• Each DC connected to a remote site by
orphan port
• Remote sites forms routing adjacency with
both peers of its directly connected DC
S3
S4
61
Dynamic Routing over vPC
New Supported Designs
Dynamic routing over vPC
Supported Designs
Layer 3 over DCI - vPC
Layer 3 services devices with vPC
P
P
P
P
P
P
P
Note : Supported only in Nexus 7X00 on F3 and F2E Line Cards starting from release 7.2.
Supported on Nexus 9X00 in ACI mode
Currently not supported on Nexus 5X00, Nexus 3X00, Nexus 9X00 (standalone mode), Nexus 7000 M-series Line card
63
Dynamic routing over vPC
Supported Designs
STP inter-connection using a vPC VLAN
P
P
Orphan device with vPC peers over vPC VLAN
P
P
P
P
Note : Supported only in Nexus 7X00 on F3 and F2E Line Cards starting from release 7.2.
Supported on Nexus 9X00 in ACI mode
Currently not supported on Nexus 5X00, Nexus 3X00, Nexus 9X00 (standalone mode), Nexus 7000 M-series Line card
64
Dynamic routing over vPC
Supported Designs
Peering with vPC peers over FEX vPC host interfaces
P
P
P
Note : Supported only in Nexus 7X00 on F3 and F2E Line Cards starting from release 7.2(0)D1(1)
Currently not supported on Nexus 5X00, Nexus 3X00, Nexus 9X00 (standalone mode), Nexus 7000 M-series Line card
65
Dynamic Routing over vPC
Unsupported Designs
66
Dynamic routing over vPC
Unsupported Design
B
Peering across vPC interfaces with unequal L3
metrics
•
•
•
SVI
Router2
Int VLAN 20
The routing metric on S1 is less than the routing
metric on S2 (preferred path using S1).
Traffic from A to B may hash to S2. This traffic
will need to traverse to peer-link to get to B
through S1.
Po2
Int VLAN 20
S2
Int VLAN 20
S1
Po100
Int VLAN 10
Metric 10
Int VLAN 10
Metric 20
Due to the vPC loop avoidance rule S1 will not
allow traffic to flow to B.
Po1
Router1
Int VLAN 10
SVI
A
67
Dynamic routing over vPC
Configuration
L3 over vPC Configuration on Nexus 7x00 platform
Command: Layer3 peer-router
Mode: config-vpc-domain
Default: Disabled
Need to configure on BOTH the
peers
•Requirements
•
•
•
•
Command configured on both the peers.
“Peer-Gateway” should be enabled.
Peer link should be up.
Both peer should run image supporting L3 over vPC feature.
•Auto Enabling “Peer-Gateway”
• If “Layer3 peer-router” command is enabled without “Peer-Gateway” a syslog will be
displayed to enable “Peer-Gateway”.
68
Dynamic routing over vPC
Example Configuration and Verification on Nexus 7x00
vpc domain 200
peer-keepalive destination
10.10.12.42 source 10.10.12.52
peer-gateway
layer3 peer-router
P
P
show vpc brief
Peer Gateway : Enabled
Operational Layer3 Peer : Enabled
(output truncated for display)
vpc domain 200
peer-keepalive destination
10.10.12.52 source 10.10.12.42
peer-gateway
layer3 peer-router
show vpc brief
Peer Gateway : Enabled
Operational Layer3 Peer : Enabled
(output truncated for display)
P
69
Benefits of Dynamic Routing over vPC
• No Static routes
• No Parallel links
• No design changes and loss of business
• Route peering across vPC’s over existing infrastructure
• Routing between vPC DCI
• Most wanted by majority vPC customers
70
Dynamic Routing over vPC
Devices without L3 over vPC support
•
Don’t attach routers to VPC domain via L2 port-channel
•
Common workarounds:
• Individual L3 links for routed traffic
• Static route to FHRP VIP
A
SVI 1
IP Z
VIP A
SVI 1
IP Y
VIP A
S2
S1
SVI 2
IP X
B
SVI 1
IP Z
VIP A
SVI 1
IP Y
VIP A
S1
L3 ECMP
SVI 2
IP X
Router
S2
Router
SVI 1
IP Z
VIP A
SVI 1
IP Y
VIP A
S1
S2
SVI 2
IP X
Router
Static Route to VIP A
71
Design Best Practices
vPC and Multicast
• vPC supports PIM-SM only
Source
• vPC uses CFS to sync IGMP state
• Sources in vPC domain
− both vPC peers are forwarders
− Duplicates avoided via vPC loop-avoidance logic
S1
Source
S2
• Sources in Layer 3 cloud
− Active forwarder elected on unicast metric
− vPC Primary elected active forwarder in case metric
are equal
Receivers
72
Agenda
•
vPC Operations and Upgrade
−
−
−
−
vPC Self Isolation
vPC Shutdown
Graceful Insertion and Removal
ISSU / ISSD with vPC
73
vPC Configuration Best Practices
vPC Self-Isolation
Error
Triggered
Operational
Primary
ISOLATED
P
S
P
Self- Isolate
S
P
S2
S1
S3
S1
S2
S1
S2
S3
S3
1. Error Triggered : All Line cards Fail or All Vlans’s down on peer-link
2. S1 sends “self-isolation” message through the peer-keepalive
3. S2 takes over as operational Primary and S1 is isolated from the vPC domain
P
vPC Primary
S vPC Secondary
74
vPC Configuration Best Practices
Example Configuration and Verification on Nexus 7x00
vPC domain 100
peer-keepalive destination
10.126.216.44
peer-gateway
self-isolation
vPC domain 100
peer-keepalive destination
10.126.216.41
peer-gateway
self-isolation
sh vPC brief
vPC domain id
: 100
Self-isolation
: Enabled
(output truncated for display)
sh vPC brief
vPC domain id
: 100
Self-isolation
: Enabled
(output truncated for display)
75
vPC Configuration Best Practices
vPC Self-Isolation
• vPC self-isolation is turned OFF by default
• No Impact on vPC operation if sellf-isolation enabled
• Functional only when enabled on both vPC peers.
• Not part of vPC type-1 and type-2 consistency checks
76
vPC Configuration Best Practices
vPC Shutdown
•
Isolates a switch from the vPC complex
•
Isolated switch can be debugged, reloaded, or
even removed physically, without affecting the
vPC traffic going through the non-isolated switch
Primary
Secondary
vPC
S2
S1
switch# configure terminal
switch(config)# vpc domain 100
switch(config-vpc)# shutdown
S3
77
Graceful Insertion and Removal
Change window begins
vPC
vPC
system mode maintenance
One command!
Pre-change System Snapshot
78
Graceful Insertion and Removal
Change window complete
vPC
vPC
system mode normal
One command!
Pre/Post-change Snapshot Comparison
79
Graceful Insertion and Removal
•
Flexible framework providing a comprehensive, systemic method to isolate a
node.
•
Configuration profile foundation in NX-OS
•
Initial support for:
•
•
•
•
•
•
•
vPC/vPC+
ISIS
OSPF
EIGRP
BGP
Interface
Per VDC on Nexus 7x00
Platform
Release
Nexus 5x00/6000
NX-OS 7.1
Nexus 7x00
NX-OS 7.2
Nexus 9000
NX-OS 7.X
80
ISSU / ISSD with vPC
•
ISSU is the recommended system upgrade in a
multi-device vPC environment
•
vPC system can be independently upgraded with
no disruption to traffic
•
Upgrade is serialized and must be run one peer at
a time (config lock will prevent synchronous
upgrades)
•
Configuration is locked on “other” vPC peer during
ISSU
•
Similar process of downgrades (ISSD)
•
Check ISSU / ISSD compatibility matrix & ensure
ISSU is supported from current to target release
5.2(x) / 6.2(x)
81
Agenda
•
vPC with Fabric Technologies
−
vPC with Fabricpath (vPC+)
−
vPC with FCOE
−
vPC with VXLAN
−
vPC with ACI
82
FabricPath: an Ethernet Fabric
Shipping on Nexus 7x00, Nexus 600x and Nexus 5x00
FabricPath
•
•
•
•
•
Eliminates Spanning tree limitations
High resiliency, fast network re-convergence
Any VLAN, Anywhere in the Fabric
Connect a group of switches using an arbitrary topology
With a simple CLI, aggregate them into a Fabric
N7K(config)# interface ethernet 1/1
N7K(config-if)# switchport mode fabricpath
83
VPC vs VPC+
Architecture of vPC and FabricPath with vPC+
CE
FP
CE Port
FP Port
CE VLAN’s
FP VLAN’s
vPC
vPC+
• Physical architecture of vPC and vPC+ is the same from the access edge
• Functionality/Concepts of vPC and vPC+ are the same
• Key differences are addition of Virtual Switch ID and Peer Link is a FP Core Port
• vPC+ is not supported on Nexus 9X00 & Nexus 3X00 Series
84
Dynamic Routing over vPC+
• Layer 3 devices can form routing adjacencies with
both the vPC+ peers over vPC
Fabricpath Core
• The peer link ports and VLAN are configured in
FabricPath mode.
• N55xx, N56xx, N6000 support this design with
IPv4/IPv6 unicast and PIM-SM multicast
vPC
P
P
• This design is not supported on N7X00
N55xx, N56xx,
N6000
Router/ Firewall
P
Fabricpath Link
Dynamic Peering Relationship
Routing Protocol Peer
P
85
vPC with FCoE
Unified Fabric Design
•
vPC with FCoE is ONLY supported between hosts and
N5X00 or N5X00 & N2232 pairs.
•
Must follow specific rules:
•
•
A ‘vfc’ interface can only be associated with a
single-port port-channel.
•
While the port-channel configurations are the
same on both switches, the FCoE VLANs are
different.
FCoE VLANs are ‘not’ carried on the vPC peer-link
(automatically pruned):
•
LAN Fabric
Fabric A
VLAN 10 ONLY HERE!
Nexus 5000
FCF-A
Nexus 5000
FCF-B
VLAN 10,20
STP Edge Trunk
FCoE and FIP ethertypes are ‘not’ forwarded
over the vPC peer link.
•
vPC carrying FCoE between two FCF’s is NOT
supported.
•
Best Practice: Use static port channel rather than LACP
with vPC and boot from SAN.
[If NX-OS is prior to 5.1(3)N1(1)]
Fabric B
VLAN 10,30
vPC contains only 2 X 10GE
links – one to each Nexus 5X00
86
Why VXLAN ?

Problems being addressed:
•
VLAN scale – VXLAN extends the L2 segment ID field to 24-bits, potentially
allowing for up to 16 million unique L2 segments over the same network
•
Layer 2 segment elasticity over Layer 3 boundary – VXLAN encapsulates L2
frame in IP-UDP header

High Level Technology Overview:
•
MAC-in-UDP encapsulation.
•
Leverages multicast in the transport network to simulate flooding behavior for
broadcast, unknown unicast and multicast in the same segment
•
Leverage ECMP to achieve optimal path usage over the transport network
87
For Your
Reference
VXLAN Packet Format
16
16
Reserved
16
VNID
16
Reserved
32
8 Bytes
VXLAN
RRRR1RRR
32
Checksum
0x0000
UDP
Src. Port
16
VXLAN Port
Outer
Dst. IP
8
Outer
Src. IP
72
FCS
8 Bytes
Header
Checksum
Protocol
0x11
16
Original
FCS L2 Frame
20 Bytes
IP Header
Misc Data
16
Ether Type
0x0800
16
VLAN ID
Tag
VLAN Type
48
0x8100
Src.
MAC Addr.
Dst.
MAC Addr.
14 Bytes
(4 bytes optional)
48
VXLAN
Header
UDP Header
UDP Length
Outer
IP Header
Outer
Mac Header
8
24
24
8
•
VXLAN is a Layer 2 overlay scheme over a Layer 3 network.
•
VXLAN uses Ethernet in UDP encapsulation
•
VXLAN uses a 24-bit VXLAN Segment ID (VNI) to identify Layer-2 segments
88
VXLAN Terminology
VTEP – Virtual Tunnel End Point
Transport IP Network
VTEP
•
•
VTEP
IP Interface
IP Interface
Local LAN Segment
Local LAN Segment
End System
End System
End System
End System
VXLAN terminates its tunnels on VTEPs (Virtual Tunnel End Point).
VTEP has two interfaces :
1. Bridging functionality for local hosts
2. IP identification in the core network for VXLAN encapsulation / de-encapsulation.
89
vPC VTEP
•
When vPC is enabled an ‘anycast’ VTEP
address is programmed on both vPC
peers
•
Multicast topology prevents BUM traffic
being sent to the same IP address across
the L3 network (prevents duplication of
flooded packets)
•
vPC peer-gateway feature must be
enabled on both peers
•
VXLAN header is ‘not’ carried on the vPC
Peer link
VXLAN
vPC VTEP
vPC VTEP
VLAN
90
VXLAN & VPC
For Your
Reference
VPC Configuration
VTEP1
vlan 10
vn-segment 10000
Map VNI to VLAN
interface loopback 0
ip address <VTEP individual IP – orphan)
ip address <VTEP anycast IP – per VPC domain> secondary
!
interface nve1
source-interface loopback0
member vni 10000 mcast-group 235.1.1.1
Source Interface
individual IP is used for single attached Hosts
anycast IP is used for VPC attached Hosts
VXLAN Tunnel Interface
vtep
1
vtep
2
vtep
3
vtep
4
VTEP2
vlan 10
vn-segment 10000
interface loopback 0
ip address <VTEP individual IP - orphan>
ip address <VTEP anycast IP – per VPC domain> secondary
!
interface nve1
source-interface loopback0
member vni 10000 mcast-group 235.1.1.1
H1
10.10.10.10
VLAN 10
(vpc)
H2
10.10.10.20
VLAN 10
(vpc)
91
VXLAN & VPC
For Your
Reference
VPC Configuration
VTEP1
vlan 10
vn-segment 10000
VTEP3
vlan 10
vn-segment 10000
interface loopback 0
ip address 1.1.1.1/32
ip address 1.1.1.201/32 secondary
!
Interface nve1
source-interface loopback0
member vni 10000 mcast-group 235.1.1.1
interface loopback 0
ip address 1.1.1.3/32
ip address 1.1.1.202/32 secondary
!
Interface nve1
source-interface loopback0
member vni 10000 mcast-group 235.1.1.1
vtep
1
vtep
2
vtep
3
vtep
4
VTEP2
vlan 10
vn-segment 10000
VTEP4
vlan 10
vn-segment 10000
interface loopback 0
ip address 1.1.1.2/32
ip address 1.1.1.201/32 secondary
!
Interface nve1
source-interface loopback0
member vni 10000 mcast-group 235.1.1.1
interface loopback 0
ip address 1.1.1.4/32
ip address 1.1.1.202/32 secondary
!
Interface nve1
source-interface loopback0
member vni 10000 mcast-group 235.1.1.1
H1
10.10.10.10
VLAN 10
(vpc)
H2
10.10.10.20
VLAN 10
(vpc)
92
VXLAN & VPC
Dual attached Host to dual attached Host (Layer-2)
•
Host 1 (H1) and Host 2 (H2) are dual
connected to a VPC domain
•
As H1 is behind a VPC interface, the
anycast VTEP IP is the source for
the the VXLAN encapsulation
•
vtep
1
vtep
2
vtep
20
vtep
3
vtep
4
vtep
30
As H2 is behind a VPC interface, the
anycast VTEP IP is the target
H1
10.10.10.10
VLAN 10
(vpc)
H2
10.10.10.20
VLAN 10
(vpc)
93
Nexus 9000 + APIC = ACI
APIC
APIC
APIC
94
ACI uses a
policy based approach
that focuses on
the application.
QoS
QoS
QoS
Filter
Service
Filter
Web
App
DB
External
Network
95
vPC and ACI
ACI fabric utilised for control-plane
•
vPC
peers
vPC
Domains
No dedicated peer-link between vPC peers:
Fabric itself serves as the MCT
•
No out-of-band mechanism to detect peer
liveliness:
Due to rich fabric-connectivity (leaf-spine), it is
very unlikely that peers will have no active
path between them
•
CFS (Cisco Fabric Services) is replaced by
Zero Message Queue (ZMQ)
•
As ACI fabric is VXLAN-based, an anycast
VTEP is shared by both leaf switches in a
vPC domain
ACI
fabric
vtep
1
vtep
2
vtep
3
vPC
vPC
96
Agenda
•
Reference Material
97
Reference Material
For Your
Reference
•
vPC Best Practices Design Guide:
http://www.cisco.com/c/dam/en/us/td/docs/switches/datacenter/sw/design/vpc_design/vpc_best_practices_design_guid
e.pdf
•
vPC design guides:
http://www.cisco.com/en/US/partner/products/ps9670/products_implementation_design_guides_list.html
•
vPC and VSS Interoperability white Paper:
http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/white_paper_c11_589890.html
•
VXLAN Overview :
http://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/white-paper-c11-729383.html
•
Fabrcipath whitepaper :
http://www.cisco.com/c/en/us/products/collateral/switches/nexus-7000-series-switches/white_paper_c11-687554.html

ACI Overview
http://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/aci-fabric-controller/white-paper-c11-729587.html
98
Key Take-Aways
vPC in 2016
VXLAN, ACI, Fabricpath
VXLAN
• L2 segment scalability
• VTEP redundancy with
vPC
vPC Benefits
ACI
• No Blocked Ports
• High availability
• Fast Convergence
• Policy Based
• Fabric for vPC control
plane
Fabricpath
FCoE
•
•
•
Eliminates Spanning-Tree *
High resiliency
vPC+ for legacy switches,
servers, hosts
• Unified Fabric for LAN &
SAN
99
Call to Action
•
Visit the World of Solutions for
•
Cisco Campus
• Walk in Labs
• Technical Solution Clinics
•
Meet the Engineer
•
Lunch and Learn Topics
•
DevNet zone related sessions
100
Complete Your Online Session Evaluation
•
Please complete your online session
evaluations after each session.
Complete 4 session evaluations
& the Overall Conference Evaluation
(available from Thursday)
to receive your Cisco Live T-shirt.
•
All surveys can be completed via
the Cisco Live Mobile App or the
Communication Stations
101
Many Things
there’s Something About
vPC
102
Thank you
103
Download