A Deep Dive on the vSphere Distributed Switch Jason Nash VCDX #49, vExpert Data Center Solutions Principal Varrow.

Slides:



Advertisements
Similar presentations
Implementing vSphere David J Young. Implementing vSphere Agenda Virtualization vSphere ESXi vSphere Client vCenter Storage Implementation Benefits Lessons.
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
1 Confidential © 2010 VMware Inc. All rights reserved Confidential vSphere vNetwork Distributed Switch (vDS) Kris Hanks, Networking Escalation Engineer,
Virtual LANs.
Brocade VDX 6746 switch module for Hitachi Cb500
VLANs Virtual LANs CIS 278.
Ch. 9 – Basic Router Troubleshooting CCNA 2 version 3.0.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 W. Schulte Chapter 5: Inter-VLAN Routing Routing And Switching.
Keith Wiles DPACC vNF Overview and Proposed methods Keith Wiles – v0.5.
© 2009 VMware Inc. All rights reserved VMware Updates Orlando VMware User Group – April 2011 Ryan Johnson VMware, Inc. Technical Account Manager Professional.
Lesson 9: Creating and Configuring Virtual Networks
Introducing VMware vSphere 5.0
Virtualization Infrastructure Administration Cluster Jakub Yaghob.
Storage Management Module 5.
Server Access and Virtualization Business Unit Cisco Nexus 1010.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
High Availability Module 12.
Patch Management Module 13. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A Operations vSphere Environment Introduction.
VMware vCenter Server Module 4.
Scalability Module 6.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.

Additional SugarCRM details for complete, functional, and portable deployment.
Data Center Network Redesign using SDN
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.

Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
© 2010 VMware Inc. All rights reserved Patch Management Module 13.
Ch. 9 – Basic Router Troubleshooting CCNA 2 version 3.0 Rick Graziani Cabrillo College.
© 2006 Cisco Systems, Inc. All rights reserved.1 Microsoft Network Load Balancing Support Vivek V
VLAN Trunking Protocol (VTP)
Virtualization Infrastructure Administration Network Jakub Yaghob.
Microsoft Virtual Academy. 2 Competitive Advantages I - Core VirtualizationII - Private Cloud.
 Configuring a vSwitch Cloud Computing (ISM) [NETW1009]
Hubs to VLANs Cisco Networking Academy Program © Cisco Systems, Inc From Hubs to VLANs.
Access Control List (ACL) W.lilakiatsakun. ACL Fundamental ► Introduction to ACLs ► How ACLs work ► Creating ACLs ► The function of a wildcard mask.
CIM1600 VMware vCloud Networking Finally Explained Name, Title, Company.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Smart Switches FS526T / FS750T / GS748T / GS724T
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Cloud Scale Performance & Diagnosability Comprehensive SDN Core Infrastructure Enhancements vRSS Remote Live Monitoring NIC Teaming Hyper-V Network.
© 2009 Cisco Systems, Inc. All rights reserved. UC500 Integration with Telrex Call Recording Server (CallRex) Cisco Small Business Communications System.
Microsoft Virtual Academy Module 8 Managing the Infrastructure with VMM.
Windows Server 2012 Hyper-V Networking
GabesVirtualWorld.com vHangOut Session 01 Guest: Ryan Conley Host: Gabrie van Zanten.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
VApp Product Support Engineering Rev E VMware Confidential.
VMware vSphere Configuration and Management v6
A Deep Dive on the vSphere Distributed Switch Jason Nash VCDX #49, vExpert Director, Datacenter Practice Varrow.
You there? Yes Network Health Monitoring Heartbeats are sent to monitor health status of network interfaces Are sent over all cluster.
Module Objectives At the end of the module, you will be able to:
Deploying Highly Available SQL Server in Windows Azure A Presentation and Demonstration by Microsoft Cluster MVP David Bermingham.
Planning Server Deployments Chapter 1. Server Deployment When planning a server deployment for a large enterprise network, the operating system edition.
Level 300 Windows Server 2012 Networking Marin Franković, Visoko učilište Algebra.
LAN Switching Virtual LANs. Virtual LAN Concepts A LAN includes all devices in the same broadcast domain. A broadcast domain includes the set of all LAN-connected.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
Australian Institute of Marine Science Jukka Pirhonen.
Ethernet Packet Filtering - Part1 Øyvind Holmeide Jean-Frédéric Gauvin 05/06/2014 by.
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Implementing Cisco Data Center Unified Computing
Instructor Materials Chapter 5: Network Security and Monitoring
Alcatel-Lucent Security Products Configuration Example Series
Essentials of UrbanCode Deploy v6.1 QQ147
SECURITY ZONES.
Vmware 2V0-642 VMware Certified Professional 6 - Network Virtualization (NSX v6.2) VCE Question Answers.
Bruno Giovanini Manesco © 2016
Welcome! Thank you for joining us. We’ll get started in a few minutes.
Chapter 5: Network Security and Monitoring
Lessons Learned While Deploying vSAN Two-Node Clusters
Robert Down & Pranay Sadarangani Nov 8th 2011
Presentation transcript:

A Deep Dive on the vSphere Distributed Switch Jason Nash VCDX #49, vExpert Data Center Solutions Principal Varrow

The purpose of this session is to give you a good understanding of the vSphere Distributed Swtich (vDS) – That includes complexity, features, cost, deployment considerations, and management My goal is for you to see how this could fit your environment and decide if you want to migrate This is a very open presentation so feel free to ask questions What We’ll Cover

Standard vSwitches are not all bad – Easy to understand – Very easy to troubleshoot – Great deal of flexibility But they are also not all good – No advancement of features – Can become very cumbersome Quickly Discuss vSwitches

vDS is the second vSwitch included with vSphere Easier administration for medium and larger environments – Add a Port-Group once and all servers can use it Provides features that standard vSwitches don’t – Network I/O Control (NIOC) – Port mirroring – NetFlow – Private VLANs – Ingress and egress traffic shaping Not JUST for large environments – Many can take advantage of the advanced features Why Bother With the vDS?

Right now you have two distributed options (Well, 3 counting the non-existent IBM vSwitch) – vDS (vSphere Distributed Switch) – Cisco Nexus 1000v With the release of vSphere 5 the vDS now stacks up pretty well to the 1Kv – NetFlow v5 (1Kv is v9) – Port Mirroring (not as flexible as 1Kv) – 802.1p QoS tagging Though, the 1Kv still has many things going for it Compared to Others?

The Good – Innovative features such Network I/O Control (NIOC) Load-based Teaming – Very low complexity No external components to deploy or manage – Included in Enterprise Plus licensing – No special hardware (NICs or switches) required The Bad – Doesn’t include some advanced features of the N1Kv NetFlow v9 ACLs vPath for vWAAS and VSG Other security features (ARP Inspection, DHCP Snooping, etc) – Requires Enterprise Plus licensing Let’s Look at the vDS

The vDS architecture has two main components – Management or Control plane – Integrating in to vCenter – I/O or Data plane – Made up of hidden vSwitches on each vSphere host that is part of the vDS The Control plane is responsible for all configuration and management The I/O plane handles data flow in and out of each vSphere host No extra modules or components to install, manage, or upgrade Terms and Ideas

Controlled and managed by vCenter, so making VC resilient becomes important – Backup that database! – vCenter outage won’t affect general VM operation Virtual vCenter or Physical vCenter? – Both fully supported just a few things to think about Couple of ways to physically separate traffic – DMZ or other SSLF (Specialized Security Limited Functionality) environments – NAS or iSCSI traffic Confirm standard physical switch port config – Make them all the same! vDS Deployment Considerations

Designing the deployment of your vDS can be simple or a bit more involved – Depends on depth of features you plan to use Can get a bit more complex if you want to physically separate traffic – Storage on its own set of NICs – DMZ or other network with different security requirements Suggested to start with basic deployment and then start adding in other features such as NIOC Design Considerations

Simple process, just a few steps (video to follow) 1.Navigate to Inventory -> Networking in vCenter 2.Right-click, Create New vSphere Distributed Switch 3.Choose vDS version 4.Provide a name and number of uplinks 5.Optionally add vSphere hosts 6.Optionally create a port-group 7.Done Deploying the vDS

A single vDS can only have one uplink configuration – This means all pNICs added to the vDS must trunk the same VLANs What if you want to physically separate traffic? Two options: – Active/Standby/Unused – In each Port-Group configure Active/Standby/Unused configurations for NICs – Multiple vDS Switches – Yes, you can have more than one vDS in a cluster, each with their own uplinks Which you choose depends on which you think is easier to manage Traffic Separation with vDS

vDS Uplink Diagram – Multiple vDS vSphere Host vDS - DMZ vDS - Prod DMZ Network Prod Network

vDS Uplink Table – Single vDS with 1Gb This is a suggested configuration for a server with 8 NICs showing multi-link vMotion and iSCSI

vDS Uplink Table – Single vDS with 10Gb This is a suggested configuration for a server with 2 10Gb NICs. The idea is to balance traffic types across the two NICs.

Some configuration items are set on the main vDS (video to follow) – Names and number of uplinks – Private VLAN designations – NetFlow collector configuration – Port-mirror sessions – vDS MTU size – Discovery protocol (CDP or LLDP) configuration Configuring the Main vDS

The vDS only allows you to have one uplink configuration – This is in contrast to the Nexus 1000v, as we will see later Only a few settings in the uplink configuration, most set on port- group – Which VLANs to trunk through these physical NICs – NetFlow status (enabled or disabled) – Allow you to block all ports Configuring the Uplink

Since the vDS allows for only one uplink, how do we physically separate traffic? Two options: – Single vDS – Add all physical adapters to a single uplink and then do individual port-group configuration using Active/Standby/Unused – Multiple vDS – Deploy multiple vDS (Yes, you can do that!). You can deploy a vDS for each different environment. Partitioning Traffic

Creating port-groups is very straight forward Few key decisions – Port-group Name – I’m a fan of using the VLAN number – Number of virtual ports – Default is 128 but size as needed – VLAN Type which specifies who does the VLAN tagging Creating Port-Groups

SettingWho Tags the Frame NonePhysical switch tags the frame. This assumes the physical NIC(s) in the uplink are connected to access ports. VLANThe vDS will tag the frame. When you choose VLAN you must also specify which VLAN tag for this port-group. VLAN TrunkingPass frames through to/from the VM with VLAN tags in place. You will define which range of VLANs are allowed. Private VLANSelect corresponding Private VLAN as defined in the main vDS configuration. Selecting the Right VLAN Type

Most settings are done at the port-group level – Security (Promisc/MAC Changes/Forged Transmits) – NIC Teaming – Traffic Shaping – Monitoring – Resource Allocation (New for NIOC) – Port Binding Type (Static, Dynamic, Ephemeral) One big change with vDS is the availability of Load-Based Teaming Configuring Port-Groups

Once you have created all necessary port-groups the last tasks are: – Move hosts in to the vDS – Wizard makes migrating a host very easy. It will also migrate things such as vmkernel interfaces. – Move VMs to vDS port-groups – Another wizard automates this task. You simply choose the “source” and “destination” port-groups. Finishing the Deployment

Let’s get away from slides and in to the lab In this lab we’ll try and show a full vDS deployment – Create new switch – Configure uplink and main vDS – Create port-groups – Migrate hosts and VMs – Show advanced options Lab Time!

Use static port binding unless absolutely necessary – Especially if you have a virtual vCenter Try and let physical switches do tagging and trunk all VLANs – Not a fan of using native VLAN Recommended to use Load Based Teaming as it is simple and works about anywhere Best Practice Recommendations

Both dVS options are very flexible and powerful The vSphere 5 vDS adds a lot of features that close the gap with the 1Kv with reduced complexity and cost The Nexus 1000v is still king of features, especially with the integration of vWAAS and Virtual Security Gateway – In addition to more complexity and higher financial cost Consider all variables when deciding which meets your requirements Let’s Recap

My Blog: Twitter My Louis Watta’s Preso: Questions?