Ccie DC Full Scale Labs PDF
Ccie DC Full Scale Labs PDF
Introduction
All devices used in this scenario, with the exception of the UCS and Nexus 7K, will
be pre-configured for you with a basic initial configuration before starting. Do not
modify or remove this initial configuration, such as pre-configured MGMT0 IP
addresses, pre-configured VRFs, pre-configured routing, etc. These initial configs are
required to successfully complete this scenario.
NX-OS device logins are admin with the password Cciedc01. The UCS
Management VM's login is Administrator with the password cisco. Do not modify
the admin role on any platform, change the console speed, configure AAA, or make
any other configuration changes that would potentially lock you out of the CLI
interface. Rack rental tokens will not be refunded in cases where configuration errors
on your part cause you or the automation system to be locked out of the devices.
Pre-configured MGMT0 addresses for this scenario are as follows:
N5K1 192.168.101.51/24
N5K2 192.168.101.52/24
MDS1 192.168.101.61/24
MDS2 192.168.101.62/24
N7K1 192.168.101.71/24
Any references to "Y" in this scenario refer to the last octet of the MGMT0 interface.
Score: 3 Points
Configure N7K3 and N7K4 to peer BGP with the DCI provider. The provider uses
BGP AS 100, whereas N7K3 and N7K4 have been allocated BGP ASes 65001 and
65002, respectively. The DCI provider also requires MD5 authentication using the
password DCIPROVIDER.
Do not modify any DCI-related configuration on N5K1 or 3750G.
When complete, N7K1 and N7K2 should have IP reachability to each other over the
DCI.
Score: 5 Points
1.5 FabricPath
N5K1 and N7K4 should form Port-Channel20 using LACP on the links connecting
them according to the diagram.
Configure FabricPath on the port channel as well as the link connecting N7K4 and
N5K2 according to the diagram.
Create VLANs 200299 as FabricPath VLANs on these switches.
Authenticate all FabricPath IS-IS adjacencies using an MD5 hash of the password
FPAUTH.
Score: 6 Points
1.6 vPC+
Configure UCS-FI-A to form Port-Channel201 up to N5K1 and N5K2 using the links
in the diagram.
Configure UCS-FI-B to form Port-Channel202 up to N5K1 and N5K2 using the links
in the diagram.
From N5K1 and N5K2's perspective, these links should be vPC 201 and 202.
vPC 201 and 202 should be 802.1Q trunk links, STP edge ports, and only allow
VLANs 200299.
Use the vPC Domain ID 500 and the FabricPath Switch-ID 501.
Score: 6 Points
1.10 OTV
Configure OTV on N7K1 and N7K2 to bridge VLANs 200299 over the Data Center
Interconnect.
N7K1 should use the Site VLAN and Identifier 3001, and N7K2 should use the Site
VLAN and Identifier 3002.
Trunk the minimum number of necessary VLANs between N7K1 and N7K3, and
N7K2 and N7K4.
N7K3 and N7K4 should use PIM Sparse Mode for multicast routing with the DCI, and
use the RP address 10.0.0.51, which is hosted by the provider.
Multicast Control Plane traffic for the OTV should be tunneled over the DCI using the
group 224.71.72.0.
Multicast Data Plane traffic originating from N7K1 should use the group range
232.71.71.0/24.
Multicast Data Plane traffic originating from N7K2 should use the group range
232.72.72.0/24.
Authenticate the IS-IS adjacency between N7K1 and N7K2 using an MD5 hash of
the password OTVAUTH.
Create Interface VLAN 200 on N7K3 and N7K4 with the IP addresses
192.168.200.Y/24.
When complete, N7K3 and N7K4 should be able to ping each other over the DCI
through the OTV tunnel, as well as the VMKernel interfaces of the ESXi instances on
UCS Blades 1 and 2, and the C200 server. The ESXi addresses are
192.168.200.101, 192.168.200.102, and 192.168.200.104, respectively.
Score: 7 Points
MDS1 and MDS2's link to the SAN should be F ports in VSANs 103 and 104,
respectively.
Score: 6 Points
Ensure that the C200 is the only initiator that can use this target.
Do not add any additional zones to accomplish this.
Score: 6 Points
3. Unified Computing
3.1 Address Pools
Configure default pools in the Root ORG on UCS as follows:
UUIDs 0000-000000000001 - 0000-000000000080
MAC Addresses 00:CC:1E:DC:00:01 00:CC:1E:DC:00:FF
nWWNs 20:01:00:CC:1E:DC:01:01 - 20:01:00:CC:1E:DC:01:FF
Management IPs 192.168.101.210 - 192.168.101.219 (GW 192.168.101.1)
Score: 5 Points
Score: 6 Points
Score: 5 Points
Switch Fabric=A
System Name=UCS-FI
Enforced Strong Password=yes
Physical Switch Mgmt0 IP Address=192.168.101.201
Physical Switch Mgmt0 IP Netmask=255.255.255.0
Default Gateway=192.168.101.1
Cluster Enabled=yes
Cluster IP Address=192.168.101.200
NOTE: Cluster IP will be configured only after both Fabric Interconnects are initialized
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no):yes
Applying configuration. Please wait.
Configuration file - Ok
UCS-FI-B:
Enter the configuration method. (console/gui) ?console
Installer has detected the presence of a peer Fabric interconnect. This Fabric interconnect will be added to the c
y
Enter the admin password of the peer Fabric interconnect:Cciedc01
Connecting to peer Fabric interconnect... done
Retrieving config from peer Fabric interconnect... done
Peer Fabric interconnect Mgmt0 IP Address: 192.168.101.201
Peer Fabric interconnect Mgmt0 IP Netmask: 255.255.255.0
Cluster IP address
: 192.168.101.200
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no):yes
Configuration file - Ok
Like Nexus, UCS allows SSH access by default. Telnet can be enabled from the
UCSM GUI, or from the CLI as follows.
UCS-FI-A#scope system
UCS-FI-A /system #scope services
UCS-FI-A /system/services #enable telnet-server
UCS-FI-A /system/services* #commit-buffer
UCS-FI-A /system/services #end
UCS-FI-A#exit
Ethernet1/1
Ethernet1/2
Ethernet1/3
Ethernet1/4
Ethernet1/5
Ethernet1/6
Ethernet1/7
Ethernet1/8
Ethernet1/9
Ethernet1/10
Ethernet1/11
Ethernet1/12
Ethernet1/13
Ethernet1/14
Ethernet1/15
Ethernet1/16
Ethernet1/17
Ethernet1/18
Ethernet1/19
Ethernet1/20
Ethernet1/21
Ethernet1/22
Ethernet1/23
Ethernet1/24
Ethernet1/25
Ethernet1/26
Ethernet1/27
Ethernet1/28
Ethernet1/29
Ethernet1/30
Ethernet1/31
Ethernet1/32
Ethernet2/1
Ethernet2/2
Ethernet2/3
Ethernet2/4
Ethernet2/5
Ethernet2/6
Ethernet2/7
Ethernet2/8
Ethernet2/9
Ethernet2/10
Ethernet2/11
Ethernet2/12
Ethernet2/13
Ethernet2/14
Ethernet2/15
Ethernet2/16
Ethernet2/17
Ethernet2/18
Ethernet2/19
Ethernet2/20
Ethernet2/21
Ethernet2/22
Ethernet2/23
Ethernet2/24
Ethernet2/25
Ethernet2/26
Ethernet2/27
Ethernet2/28
Ethernet2/29
Ethernet2/30
Ethernet2/31
Ethernet2/32
Now change the default VDC back to allow both M1 and F1 ports, create the other
Moving ports will cause all config associated to them in source vdc to be removed. Are you sure you want to move the
yes
N7K1(config-vdc)#vdc N7K2 id 2
Note:
Moving ports will cause all config associated to them in source vdc to be removed. Are you sure you want to move the
yes
N7K1(config-vdc)#allocate interface Ethernet2/3-4
Moving ports will cause all config associated to them in source vdc to be removed. Are you sure you want to move the
yes
N7K1(config-vdc)#vdc N7K3 id 3
Note:
Moving ports will cause all config associated to them in source vdc to be removed. Are you sure you want to move the
yes
N7K1(config-vdc)#allocate interface Ethernet2/21-24
Moving ports will cause all config associated to them in source vdc to be removed. Are you sure you want to move the
yes
N7K1(config-vdc)#vdc N7K4 id 4
Note:
Moving ports will cause all config associated to them in source vdc to be removed. Are you sure you want to move the
yes
N7K1(config-vdc)#allocate interface Ethernet2/5-8,Ethernet2/13-14,Ethernet2/19-20
Moving ports will cause all config associated to them in source vdc to be removed. Are you sure you want to move the
yes
N7K1(config-vdc)#end
Now "switchto" the VDCs to configure the admin password as well as the MGMT0 IP
address.
N7K1#switchto vdc N7K2
This setup utility will guide you through the basic configuration of
the system. Setup configures only enough connectivity for management
of the system.
N7K2(config)#interface mgmt0
N7K2(config-if)#ip address 192.168.101.72/24
N7K2(config-if)#end
N7K2#switchback
N7K1#switchto vdc N7K3
This setup utility will guide you through the basic configuration of
the system. Setup configures only enough connectivity for management
of the system.
N7K3(config)#int mgmt0
N7K3(config-if)#ip address 192.168.101.73/24
N7K3(config-if)#end
N7K3#switchback
This setup utility will guide you through the basic configuration of
the system. Setup configures only enough connectivity for management
of the system.
N7K4(config)#interface mgmt 0
N7K4(config-if)#ip address 192.168.101.74/24
N7K4(config-if)#end
N7K4#switchback
N7K1#copy running-config startup-config vdc-all
[#######
17%
[############
29%
[######################
53%
[############################
69%
[#####################################
90%
[########################################] 100%
Verification
N7K1#show vdc membership
vdc_id: 0 vdc_name: Unallocated interfaces:
Ethernet2/1
Ethernet2/2
Ethernet2/9
Ethernet2/10
Ethernet2/11
Ethernet2/12
Ethernet2/15
Ethernet2/16
Ethernet2/17
Ethernet2/18
Ethernet2/25
Ethernet2/26
Ethernet2/27
Ethernet2/28
Ethernet2/29
Ethernet2/30
Ethernet2/31
Ethernet2/32
Ethernet1/2
Ethernet1/3
Ethernet1/4
Ethernet1/5
Ethernet1/6
Ethernet1/7
Ethernet1/8
Ethernet1/26
Ethernet1/27
Ethernet1/28
Ethernet1/29
Ethernet1/30
Ethernet1/31
Ethernet1/32
Ethernet2/3
Ethernet2/4
Ethernet1/10
Ethernet1/11
Ethernet1/12
Ethernet1/13
Ethernet1/14
Ethernet1/15
Ethernet1/16
Ethernet2/21
Ethernet2/22
Ethernet2/23
Ethernet2/24
Ethernet1/18
Ethernet1/19
Ethernet1/20
Ethernet1/21
Ethernet1/22
Ethernet1/23
Ethernet1/24
Ethernet2/5
Ethernet2/6
Ethernet2/7
Ethernet2/8
Ethernet2/13
Ethernet2/14
Ethernet2/19
Ethernet2/20
1,3,5,7
2,4,6,8
Ethernet1/3
Port Group Members:
1,3,5,7
Ethernet1/4
Port Group Members:
2,4,6,8
Ethernet1/5
Port Group Members:
1,3,5,7
Ethernet1/6
Port Group Members:
2,4,6,8
Ethernet1/7
Port Group Members:
1,3,5,7
Ethernet1/8
Port Group Members:
2,4,6,8
interface Vlan1050
no shutdown
ip address 10.50.73.0/31
N7K4:
feature interface-vlan
!
feature lacp
!
vlan 1051
!
interface Ethernet1/17
channel-group 10 mode active
no shutdown
!
interface Ethernet1/18
channel-group 10 mode active
no shutdown
!
interface port-channel10
ip address 10.72.74.74/24
!
interface Ethernet2/5
switchport access vlan 1051
spanning-tree port type edge
no shutdown
!
interface Vlan1051
no shutdown
ip address 10.51.74.0/31
Verification
N7K2#show port-channel summary
Flags:
D - Down
P - Up in port-channel (members)
I - Individual
s - Suspended
r - Module-removed
S - Switched
R - Routed
U - Up (port-channel)
M - Not in use. Min-links not met
-------------------------------------------------------------------------------Group Port-
Type
Protocol
Member Ports
Channel
-------------------------------------------------------------------------------10
Po10(RU)
Eth
LACP
Eth1/25(P)
Eth1/26(P)
--- 10.72.74.72 ping statistics --- 5 packets transmitted, 5 packets received, 0.00% packet loss
feature bgp
!
router bgp 65002
log-neighbor-changes
address-family ipv4 unicast
network 10.72.74.0/24
neighbor 10.51.74.1
remote-as 100
password 0 DCIPROVIDER
address-family ipv4 unicast
Verification
N7K3#show ip bgp neighbors
Peer index 1
Neighbor
10.50.73.1
AS MsgRcvd MsgSent
100
1301
1310
TblVer
8
State/PfxRcd
0 21:45:52 3
Network
Next Hop
*>e10.0.0.50/32
10.50.73.1
*>e10.0.0.51/32
10.50.73.1
*>l10.71.73.0/24
0.0.0.0
10.50.73.1
N7K3#show ip route bgp
IP Route Table for VRF "default"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
Metric
LocPrf
Weight Path
0 100 i
0 100 i
100
32768 i *>e10.72.74.0/24
0 100 65002 i
--- 10.71.73.71 ping statistics --- 5 packets transmitted, 5 packets received, 0.00% packet loss
1.5 FabricPath
Configuration
N5K1:
install feature-set fabricpath
feature-set fabricpath
feature lacp
!
vlan 200-299
mode fabricpath
!
key chain FABRICPATH
key 1
key-string 0 FPAUTH
!
interface port-channel20
switchport
switchport mode fabricpath
fabricpath isis authentication-type md5
fabricpath isis authentication key-chain FABRICPATH
!
interface Ethernet1/4
feature-set fabricpath
!
vlan 200-299
mode fabricpath
!
key chain FABRICPATH
key 1
key-string 0 FPAUTH
!
interface port-channel20
switchport
switchport mode fabricpath
fabricpath isis authentication-type md5
fabricpath isis authentication key-chain FABRICPATH
!
interface Ethernet2/6
switchport mode fabricpath
fabricpath isis authentication-type md5
Verification
N7K4#show port-channel summary
Flags:
D - Down
P - Up in port-channel (members)
I - Individual
s - Suspended
r - Module-removed
S - Switched
R - Routed
U - Up (port-channel)
M - Not in use. Min-links not met
-------------------------------------------------------------------------------Group Port-
Type
Protocol
Member Ports
Channel
-------------------------------------------------------------------------------10
Po10(RU)
Eth
LACP
Eth1/17(P)
Eth1/18(P)
20
Po20(SU)
Eth
LACP
Eth2/7(P)
Eth2/13(P)
SNPA
Level
State
Hold Time
Interface
N5K1
N/A
UP
00:00:24
port-channel20
N5K2
N/A
UP
00:00:29
Ethernet2/6
Adjs
AdjsUp
Metric
CSNP
20
60
Next CSNP
Last LSP ID
00:00:55
ffff.ffff.ffff.ff-ff
Topologies enabled:
Topology Metric
MetricConfig Forwarding
no
20
UP
1.6 vPC+
Configuration
N5K1:
feature vpc
!
vpc domain 500
peer-keepalive destination 192.168.101.52
fabricpath switch-id 501
!
interface Ethernet1/1
switchport mode fabricpath
channel-group 500 mode active
no shutdown
!
interface Ethernet1/2
switchport mode fabricpath
channel-group 500 mode active
no shutdown
!
interface Ethernet1/8
switchport mode trunk
switchport trunk allowed vlan 200-299
channel-group 201 mode active
no shutdown
!
interface Ethernet1/9
switchport mode trunk
switchport trunk allowed vlan 200-299
channel-group 202 mode active
no shutdown
!
interface port-channel500
switchport mode fabricpath
vpc peer-link
feature vpc
feature lacp
!
vpc domain 500
peer-keepalive destination 192.168.101.51
fabricpath switch-id 501
!
interface Ethernet1/1
switchport mode fabricpath
channel-group 500 mode active
no shutdown
!
interface Ethernet1/2
switchport mode fabricpath
channel-group 500 mode active
no shutdown
!
interface Ethernet1/7
switchport mode trunk
switchport trunk allowed vlan 200-299
channel-group 201 mode active
no shutdown
!
interface Ethernet1/10
switchport mode trunk
switchport trunk allowed vlan 200-299
channel-group 202 mode active
no shutdown
!
interface port-channel500
Connect to the UCSM using the credentials that you previously configured. Next,
under the Fabric Interconnects on the Equipment tab, configure the Ethernet links
connecting northbound to the N5Ks in the diagram as Uplink Ports.
Now under the LAN tab, create and enable Port-Channels 201 and 202 on FI-A and
FI-B respectively.
Verification
N5K1# show vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id
vPC+ switch id
: 500
: 501
Peer status
: peer is alive
: success
: success
vPC role
: secondary
: 2
Peer Gateway
: Disabled
: -
: Enabled
Port
--
----
------ -------------------------------------------------- 1
Po500
vPC status
--------------------------------------------------------------------------id
Port
--
----------
------------ -----------
201
Po201
up
200-299
202
Po202
success
up
success
success
success
200-299
DF: Partial
DF: Partial
UCS-FI-A:
UCS-FI-A#connect nxos
UCS-FI-A(nxos)#show run interface ethernet 1/4 - 5
interface Ethernet1/4
description U: Uplink
pinning border
switchport mode trunk
switchport trunk allowed vlan 1,200-299
channel-group 201 mode active
no shutdown
interface Ethernet1/5
description U: Uplink
pinning border
switchport mode trunk
switchport trunk allowed vlan 1,200-299
channel-group 201 mode active
no shutdown
UCS-FI-A(nxos)#show port-channel summary
Flags:
D - Down
P - Up in port-channel (members)
I - Individual
s - Suspended
r - Module-removed
S - Switched
R - Routed
U - Up (port-channel)
--------------------------------------------------------------------------------
up
200-299
Group Port-
Type
Protocol
Member Ports
Channel
-------------------------------------------------------------------------------201
Po201(SU)
Eth
LACP
Eth1/4(P)
Eth1/5(P)
interface port-channel20
fabricpath isis metric 40
Verification
N5K1 and N5K2 share the emulated FabricPath Switch-ID 501 for the vPC+, as
shown below:
N7K4#show fabricpath switch-id
SYSTEM-ID
FLAGS
STATE
STATIC
EMULATED
----------+----------------+------------+-----------+-------------------501
547f.ee79.137c
501
*645
Primary
547f.ee7a.4d7c
Confirmed
Primary
No
Confirmed
Yes
No
Yes
64a0.e742.8dc4
Primary
Confirmed
No
No
1207
547f.ee79.137c
Primary
Confirmed
No
No
3550
547f.ee7a.4d7c
Primary
Confirmed
No
No
Total Switch-ids: 5
The port channel between N7K4 and N5K1 has an IS-IS metric of 20, whereas the
single 10GigE link from N7K4 to N5K2 has an IS-IS metric of 40. This means that
the shortest path from N7K4 to Switch-ID 501 (the vPC+ pair) is only via N5K1.
N7K4#show fabricpath route
To allow for Equal Cost Multipath (ECMP), the port channel to N5K1 and the single
link to N5K2 must have equal costs. This can be configured either by raising the
cost of the port channel or by lowering the cost of the link to N5K2.
N7K4#config t
Enter configuration commands, one per line.
N7K4(config-if)# end
Now Switch-ID 501 is reachable via both N5K1 and N5K2 with a metric of 40.
N7K4#show fabricpath route
Verification
In the below output, we can see that both N5K1 and N5K2 have collapsed all of their
STP instances into the single default MST0 instance. Additionally, both switches in
the vPC+ pair should always appear as the root of the Spanning-Tree, and share
the Bridge-ID c84c.75fa.6000. Note that Spanning-Tree only forwards southbound
toward the Classical Ethernet domain, and not northbound toward the FabricPath
domain.
N5K1#show spanning-tree mst 0
##### MST0 vlans mapped:
1-4094
Bridge
address c84c.75fa.6000
Root
priority
(0 sysid 0)
Configured
hello time 2 , forward delay 15, max age 20, max hops
20
Interface
Prio.Nbr Type
Po202
1-4094
Bridge
address c84c.75fa.6000
Root
priority
(0 sysid 0)
Configured
hello time 2 , forward delay 15, max age 20, max hops
Interface
20
Prio.Nbr Type
Po202
Eth1/11
128.139
feature-set fex
!
interface port-channel131
switchport
switchport mode fex-fabric
fex associate 131
!
interface port-channel132
switchport
switchport mode fex-fabric
fex associate 132
!
interface Ethernet1/13
switchport
switchport mode fex-fabric
fex associate 131
channel-group 131
no shutdown
P2p Bound(PVST)
!
interface Ethernet1/14
switchport
switchport mode fex-fabric
fex associate 131
channel-group 131
no shutdown
!
interface Ethernet1/15
switchport
switchport mode fex-fabric
fex associate 132
channel-group 132
no shutdown
!
interface Ethernet1/16
switchport
switchport mode fex-fabric
fex associate 132
channel-group 132
no shutdown
!
interface Ethernet131/1/1
switchport
switchport mode trunk
switchport trunk allowed vlan 200-299
no shutdown
!
interface Ethernet132/1/1
switchport
switchport mode trunk
switchport trunk allowed vlan 200-299
no shutdown
Verification
N7K3#show fex
FEX
Number
FEX
FEX
Description
State
FEX
Model
Serial
-----------------------------------------------------------------------131
FEX0131
Online
N2K-C2232PP-10GE
FOC17100NHX 132
N2K-C2232PP-10GE
FOC17100NHU
FEX0132
Online
state: Online
State
Up
Po131
state: Online
State
Up
Po132
1.10 OTV
Configuration
The OTV Site VLAN is in decimal, but the OTV Site Identifier is in hex,
which means that a decimal to hex conversion is required.
N7K1:
feature otv
!
vlan 200-299,3001
!
otv site-vlan 3001
otv site-identifier 0xbb9
!
spanning-tree vlan 3001 priority 0
!
key chain OTV
key 1
key-string 0 OTVAUTH
!
interface Overlay1
otv isis authentication-type md5
otv isis authentication key-chain OTV
otv join-interface Ethernet1/2
otv control-group 224.71.72.0
otv data-group 232.71.71.0/24
otv extend-vlan 200-299
no shutdown
!
interface Ethernet1/1
switchport
switchport mode trunk
switchport trunk allowed vlan 200-299,3001
no shutdown
!
interface Ethernet1/2
ip igmp version 3
N7K2:
feature otv
!
vlan 200-299,3002
!
otv site-vlan 3002
otv site-identifier 0xbba
!
key chain OTV
key 1
key-string 0 OTVAUTH
!
interface port-channel10
ip igmp version 3
!
interface Overlay1
otv isis authentication-type md5
otv isis authentication key-chain OTV
feature pim
!
vlan 3002
!
spanning-tree vlan 200-299 priority 0
!
interface Vlan200
no shutdown
ip address 192.168.200.74/24
!
interface Vlan1051
ip pim sparse-mode
!
interface port-channel10
ip pim sparse-mode
ip igmp version 3
!
interface Ethernet2/19
switchport mode trunk
switchport trunk allowed vlan 200-299,3002
no shutdown
!
ip pim rp-address 10.0.0.51 group-list 224.0.0.0/4
ip pim ssm range 232.0.0.0/8
Verification
To establish the OTV tunnel, the AEDs must have multicast reachability to each
other with the control group. The first step in verification, then, is to ensure that the
tree for the control multicast group is built in the DCI core. Both N7K3 and N7K4
should see the (S,G) entries for the control group 224.71.72.0.
N7K3#show ip mroute
IP Multicast Routing Table for VRF "default"
N7K4#show ip mroute
VPN name
: Overlay1
VPN state
: UP
Extended vlans
: 200-299 (Total:100)
Control group
: 224.71.72.0
: Eth1/2 (10.71.73.71)
AED-Capable
: Yes
Capability
: Multicast-Reachable
N7K2#show otv
Site vlan
: 3001 (up)
VPN name
: Overlay1
VPN state
: UP
Extended vlans
: 200-299 (Total:100)
Control group
: 224.71.72.0
: Po10 (10.72.74.72)
AED-Capable
: Yes
Capability
: Multicast-Reachable
Site vlan
: 3002 (up)
Now the AEDs should be able to form an IS-IS adjacency over the OTV tunnel.
N7K1#show otv isis adjacency
OTV-IS-IS process: default VPN: Overlay1
OTV-IS-IS adjacency database:
System ID
SNPA
Level
State
Hold Time
Interface Site-ID
N7K2
64a0.e742.8dc2
UP
00:00:08
Overlay1 0000.0000.0bba
Verify that MD5 authentication for IS-IS is enabled on the Overlay1 interface.
Metric
CSNP
40
10
Level
1
Adjs
AdjsUp Pri
64
Next CSNP
Hello
Inactive
10
Multi
Next IIH
00:00:03
Circuit ID
Since
N7K2.01
00:15:55
N7K3 and N7K4 should now be able to reach each other's VLAN 200 interfaces,
and the OTV AEDs should learn the routes to these MAC addresses.
N7K4#show interface vlan 200 | include ddress
Hardware is EtherSVI, address is 64a0.e742.8dc4
Internet Address is 192.168.200.74/24
N7K3#ping 192.168.200.74
PING 192.168.200.74 (192.168.200.74): 56 data bytes
64 bytes from 192.168.200.74: icmp_seq=0 ttl=254 time=1.256 ms
64 bytes from 192.168.200.74: icmp_seq=1 ttl=254 time=0.938 ms
64 bytes from 192.168.200.74: icmp_seq=2 ttl=254 time=0.859 ms
64 bytes from 192.168.200.74: icmp_seq=3 ttl=254 time=0.924 ms
64 bytes from 192.168.200.74: icmp_seq=4 ttl=254 time=0.852 ms
--- 192.168.200.74 ping statistics --- 5 packets transmitted, 5 packets received, 0.00% packet loss
round-trip min/avg/max = 0.852/0.965/1.256 ms
N7K1#show otv route
VLAN MAC-Address
Metric
Uptime
Owner
Next-hop(s)
---- --------------
------
--------
---------
-----------
42
00:18:25
overlay
N7K2
200 000c.29bb.9b82
200 64a0.e742.8dc3
200 64a0.e742.8dc4
200 d48c.b5bd.460c
1
42
1
00:18:15
00:18:14
00:18:23
site
Ethernet1/1
overlay
site
N7K2
Ethernet1/1
VLAN MAC-Address
Metric
Uptime
Owner
Next-hop(s)
---- --------------
------
--------
---------
-----------
200 000c.29bb.9b82
00:19:03
site
Ethernet2/3
200 64a0.e742.8dc3
42
00:18:24
overlay
N7K1
200 64a0.e742.8dc4
200 d48c.b5bd.460c
42
00:18:24
00:18:32
site
Ethernet2/3
overlay
N7K1
--- 224.1.1.1 ping multicast statistics --5 packets transmitted, From member 192.168.200.73: 5 packets received, 0.00% packet loss
--- in total, 1 group member responded --N7K3#show ip mroute 232.72.72.0
IP Multicast Routing Table for VRF "default"
(10.72.74.72/32, 232.72.72.0/32)
, uptime: 00:02:44, igmp ip pim
feature fcoe
feature npiv
feature fport-channel-trunk
!
slot 1
port 28-32 type fc
!
interface fc1/28
channel-group 102
no shutdown
!
interface fc1/29
channel-group 102
no shutdown
!
interface fc1/30
switchport mode F
switchport trunk mode off
channel-group 104
no shutdown
!
interface fc1/31
switchport mode F
switchport trunk mode off
channel-group 104
no shutdown
!
interface san-port-channel 102
channel mode active
!
interface san-port-channel 104
channel mode active
switchport mode F
switchport trunk mode off
MDS1:
interface fc1/3
channel-group 101
no shutdown
!
interface fc1/4
channel-group 101
no shutdown
!
interface port-channel 101
channel mode active
MDS2:
interface fc1/3
channel-group 102
no shutdown
!
interface fc1/4
channel-group 102
no shutdown
!
interface port-channel 102
channel mode active
In UCSM, go to the Equipment tab, and then, under the Fabric Interconnects, go to
Configure Unified Ports. Just like on the 5Ks, changing the port type from Ethernet
to Fibre Channel requires a reboot, so to save time, start with FI-B first, and then
configure FI-A.
When the FIs have rebooted, go to the SAN tab and configure FC uplinks on FI-A
and FI-B as SAN-Port-Channels 103 and 104, respectively. Remember to enable
the port channels when created, because like on the 5Ks, they are in the shutdown
state when created.
Verification
Changing Unified Port types between Ethernet and Fibre Channel requires a reload
of the Nexus 5000 or the UCS Fabric Interconnect on which the change was made.
N5K2#config t
Enter configuration commands, one per line.
[########################################] 100%
Copy complete, now saving to disk (please wait)...
N5K2# reload
WARNING: This command will reboot the system Do you want to continue? (y/n) [n]y
Shutdown Ports..
writing reset reason 9,
When the SAN port channels are configured, you may need to flap the links for the
port channels to come up, as shown below.
N5K2#show san-port-channel database
san-port-channel 102
Last membership update is successful
2 ports in total, 2 ports up
fc1/28
[up] *
fc1/30
[down]
[up]
san-port-channel 104
Last membership update is successful
2 ports in total, 0 ports up
Age of the port-channel is 0d:00h:10m:14s Ports:
fc1/31
[down]
N5K2#conf t
Enter configuration commands, one per line.
N5K2(config-if)#shut
N5K2 %$ VDC-1 %$ %PORT-5-IF_DOWN_ADMIN_DOWN: %$VSAN 1%$ Interface san-port-channel 104 is down
(Administratively down)
N5K2(config-if)#no shut
N5K2(config-if)#end
N5K2 %$ VDC-1 %$ %PORT-5-IF_DOWN_PORT_CHANNEL_MEMBERS_DOWN: %$VSAN 1%$ Interface san-port-channel 104 is down (No op
N5K2 %$ VDC-1 %$ Apr
fc1/28
[up] *
fc1/30
[up]
[up]
san-port-channel 104
Last membership update is successful
2 ports in total, 2 ports up
First operational port is fc1/31
Age of the port-channel is 0d:00h:11m:15s Ports:
fc1/31
[up] *
On the UCS side, the SAN port channels are configured in Proxy Node Port (NP)
mode, for Node Port Virtualizer (NPV), or in other words, Fibre Channel End Host
Mode.
UCS-FI-A#connect nxos
UCS-FI-A(nxos)#show run interface fc1/31 - 32
[up]
fc1/31
[up] *
UCS-FI-B:
UCS-FI-B#connect nxos
UCS-FI-B(nxos)#show run | section "vsan database"
vsan database
vsan 104
vlan 1104
fcoe vsan 104
name fcoe-vsan-1104
In UCSM, browse to the SAN tab, and then, under SAN Cloud, right-click VSANs to
create new VSANs. Ensure that VSAN 103 is on the Fabric A side and VSAN 104 is
on the Fabric B side.
To assign the VSANs to the SAN-Port-Channels, go back to the SAN tab, and under
SAN Cloud, right-click the appropriate FC interface and click Show Navigator. SANPort-Channel 103 should be in VSAN 103, and Port-Channel 104 should be in
VSAN 104.
Verification
When all the VSANs are created and assigned, check N5K1 and N5K2 to ensure
that the UCS FIs have performed a Fabric Login (FLOGI) on the SAN port channel
interfaces.
N5K1#show flogi database vsan 103
-------------------------------------------------------------------------------INTERFACE
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------San-po103
103
0xbc0000
24:67:00:2a:6a:15:66:80 20:67:00:2a:6a:15:66:81
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------San-po104
104
0x6e0000
24:68:00:2a:6a:15:05:00 20:68:00:2a:6a:15:05:01
On MDS1 and MDS2, ensure that the Fibre Channel SAN has performed FLOGI.
MDS1#show flogi database vsan 103
-------------------------------------------------------------------------------INTERFACE
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------fc1/7
103
0x0d0000
21:00:00:1b:32:04:5e:dc 20:00:00:1b:32:04:5e:dc
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------fc1/7
104
0xaa0000
21:01:00:1b:32:24:5e:dc 20:01:00:1b:32:24:5e:dc
Both N5K1 and MDS1 on the SAN A side and N5K2 and MDS2 on the SAN B side
should agree on the Fibre Channel Name Service (FCNS) database. This verifies
that both the initiators and targets are logged in and have been assigned Fibre
Channel Identifiers (FCIDs) and that VSAN trunking in the fabric is end to end.
VSAN 103:
-------------------------------------------------------------------------FCID
TYPE
PWWN
(VENDOR)
FC4-TYPE:FEATURE
-------------------------------------------------------------------------0x0d0000
21:00:00:1b:32:04:5e:dc (Qlogic)
0xbc0000
24:67:00:2a:6a:15:66:80 (Cisco)
npv
VSAN 104:
-------------------------------------------------------------------------FCID
TYPE
PWWN
(VENDOR)
FC4-TYPE:FEATURE
-------------------------------------------------------------------------0x6e0000
24:68:00:2a:6a:15:05:00 (Cisco)
0xaa0000
21:01:00:1b:32:24:5e:dc (Qlogic)
npv
Verification
Devices on the SAN A side should agree on the Device Alias database and zoneset
for VSAN 103.
MDS1#show device-alias status
Fabric Distribution: Enabled
Database:- Device Aliases 3 Mode: Enhanced
Checksum: 0x252e3d5059933b2826cabfe0ee148
MDS1#show device-alias database
device-alias name FC-SAN-A pwwn 21:00:00:1b:32:04:5e:dc
device-alias name BLADE1-SAN-A pwwn 20:00:00:cc:1e:dc:01:0a
device-alias name BLADE2-SAN-A pwwn 20:00:00:cc:1e:dc:02:0a
VSAN: 103 default-zone: deny distribute: active only Interop: default mode: enhanced
merge-control: allow
session: none
hard-zoning: enabled broadcast: enabled
Default zone:
qos: none broadcast: disabled ronly: disabled
Full Zoning Database :
DB size: 224 bytes
Zonesets:1
:
DB size: 148 bytes Name: VSAN_103_ZONESET
Zonesets:1
Zones:1
MDS1 learned the zoning configuration applied on N5K1, but it does not yet see an
FCID for the UCS blades. This is because we haven't configured the service profiles
for the blades, which means they're not yet logged in to the fabric. When the SP
association is complete, we should see the FCIDs of the blades get dynamically
assigned, as well as the pWWNs we manually configure on them logged in to the
fabric.
MDS1#show zoneset active vsan 103
zoneset name VSAN_103_ZONESET vsan 103
zone name VSAN_103_ZONE vsan 103
* fcid 0x0d0000 [device-alias FC-SAN-A]
device-alias BLADE1-SAN-A
device-alias BLADE2-SAN-A
device-alias database
device-alias name UCS-C200-SAN-A pwwn 20:00:00:cc:1e:dc:03:0a
!
device-alias commit
!
feature iscsi
iscsi enable module 1
!
vsan database
vsan 103 interface iscsi1/1
!
iscsi virtual-target name iqn.1987-05.com.cisco:05.mds1.01-01.01234567890abcde
pWWN 21:00:00:1b:32:04:5e:dc
initiator ip address 192.168.202.104 permit
!
iscsi initiator ip-address 192.168.202.104
static pWWN 20:00:00:cc:1e:dc:03:0a
!
zone name VSAN_103_ZONE vsan 103
member device-alias UCS-C200-SAN-A
!
zoneset activate name VSAN_103_ZONESET vsan 103
zone commit vsan 103
!
interface GigabitEthernet1/1
ip address 192.168.202.61 255.255.255.0
no shutdown
!
interface iscsi1/1
no shutdown
Verification
When the iSCSI configuration is complete, MDS1 should see the UCS C200 server
log in as an iSCSI Initiator. The nWWN can be dynamic, but because zoning and
LUN Masking on the SAN is done based on the pWWN, this needs to be manually
assigned to the iSCSI Initiator.
MDS1#show iscsi initiator
iSCSI Node name is 192.168.202.104
iSCSI Initiator name: iqn.1998-01.com.vmware:localhost-7463f71b
iSCSI alias name:
Configured node (iSCSI)
Node WWN is 21:01:00:0d:ec:4a:21:02 (dynamic)
Member of vsans: 103
Number of Virtual n_ports: 1 Virtual Port WWN is 20:00:00:cc:1e:dc:03:0a (configured)
From the iSCSI Initiator's point of view, the MDS is an iSCSI Target. Note that only
the C200's IP address is allowed to use this target.
MDS1#show iscsi virtual-target
target: iqn.1987-05.com.cisco:05.mds1.01-01.01234567890abcde
Trespass support is
disabled
disabled
MDS1 should see the C200 server registered to the fabric in the FLOGI database.
MDS1#show flogi database
-------------------------------------------------------------------------------INTERFACE
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------fc1/7
103
0x0d0000
21:00:00:1b:32:04:5e:dc 20:00:00:1b:32:04:5e:dc
[FC-SAN-A] iscsi1/1
103
0x0d0100
20:00:00:cc:1e:dc:03:0a
21:01:00:0d:ec:4a:21:02 [UCS-C200-SAN-A]
The final verification for this task is to ensure that the ESXi instance has actually
mounted the iSCSI LUNs. To check this, go to the vSphere client, select the C200
host on the left, click the Configuration tab, and then click Storage Adapters.
Under the iSCSI Software Adapter, you should see the LUNs appear as shown
below.
3. Unified Computing
3.1 Address Pools
UUID Pools in UCSM are configured under the Servers tab, Pools, then UUID
Suffix Pools, as shown below.
MAC Address Pools are under the LAN tab, Pools, then MAC Pools.
Node World Wide Name Pools are under the SAN tab, Pools, then WWNN Pools.
Create a new Service Profile Template under the Servers tab, then Service Profile
Templates. The task requires that this be an Initial Template and get its addresses
from the default pools that were created in the previous task.
Under Storage, ensure that the vHBAs are assigned to VSANs 103 and 104 on
Fabric A and Fabric B, respectively.
For vNICs, use the Expert option, and add the five new vNICs according to the task
requirements. The VLANs needed are created in this step to save time, but could
also be configured as a separate step under the LAN Cloud.
Ensure that the vMotion vNIC has Fabric Failover enabled according to the task
requirements.
The vNICs for the VMGuests are trunks that carry the rest of the VLANs.
The Operational Policies define where the Management IP addresses of the Service
Profiles come from.
FIs to the Blade Chassis. To do so, configure them as Server ports under the
Fabric Interconnects on the Equipment tab.
Before we customize the boot options for the individual service profiles, a QoS
policy is created that will apply to the vHBAs. Note that this is just for clarity of the
configuration, so that we know for certain that the vHBAs are being assigned to a nodrop QoS policy.
Modify the vHBAs to have the appropriate pWWNs according to the task. Note that
if these values are incorrect, the blades will fail to boot from the SAN, because the
LUN masking on the SAN only allows specific initiating pWWNs to access their
LUNs.
We need to create a Boot Policy that tells the blade which SAN target it needs to
boot to.
Again, ensure 100% accuracy, because an incorrect pWWN value will cause the
blade to be unable to boot.
Repeat the above steps, but now for the backup boot target.
Don't forget to actually assign the Boot Policy to the service profile after it is
successfully created.
Repeat the above steps for the second service profile that will be assigned to blade
2.
When the blades begin to boot, you can track their progress by connecting to their
KVMs. When the blades are fully booted, you should see the console screen for the
ESXi instances, as shown below.
Configuration
First we need to determine which UUIDs were dynamically assigned to the blades,
and which VEMs they are currently inserted as. The below output shows us the
module number (VEM number), the UUID, and the IP address.
N1Kv#show module
Mod
Ports
Module-Type
Model
Status
---
-----
--------------------------------
------------------
------------
Nexus1000V
active *
Nexus1000V
ha-standby
248
NA
ok
248
NA
ok
248
NA
ok
Mod
Sw
Hw
---
------------------
------------------------------------------------
4.2(1)SV2(1.1)
0.0
4.2(1)SV2(1.1)
0.0
4.2(1)SV2(1.1)
4.2(1)SV2(1.1)
4.2(1)SV2(1.1)
Mod
MAC-Address(es)
Serial-Num
---
--------------------------------------
----------
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
NA
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
NA
02-00-0c-00-04-00 to 02-00-0c-00-04-80
NA
02-00-0c-00-05-00 to 02-00-0c-00-05-80
NA
02-00-0c-00-06-00 to 02-00-0c-00-06-80
NA
Mod
Server-IP
Server-UUID
Server-Name
---
---------------
------------------------------------
--------------------
192.168.200.200
NA
NA
192.168.200.200
NA
NA
192.168.200.102
6220349f-9cc4-e211-0000-00000000007f
NA 5
192.168.200.104
d57068d1-dfa4-11e1-a49d-30f70d088146
NA 6
192.168.200.101
6220349f-9cc4-e211-0000-00000000006f
NA
vem 3
host vmware id 2e2baff2-03bd-e211-0000-00000000007f
vem 4
host vmware id 6220349f-9cc4-e211-0000-00000000007f
vem 5
host vmware id d57068d1-dfa4-11e1-a49d-30f70d088146
vem 6
host vmware id 6220349f-9cc4-e211-0000-00000000006f
vem 7
host vmware id 2e2baff2-03bd-e211-0000-00000000006f
Power cycle blade 2, which will cause its VEM to be removed. Then we can delete
its current VEM number and move it to module 20.
N1Kv#
N1Kv %PLATFORM-2-MOD_REMOVE: Module 2 removed (Serial number T5056BB0E4A)
N1Kv %VEM_MGR-2-VEM_MGR_REMOVE_NO_HB: Removing VEM 4 (heartbeats lost) N1Kv %VEM_MGR-2-MOD_OFFLINE:
Module 4 is offline
N1Kv#config t
Enter configuration commands, one per line.
N1Kv(config)#vem 20
N1Kv(config-vem-slot)#host vmware id 6220349f-9cc4-e211-0000-00000000007f
N1Kv(config-vem-slot)#end
N1Kv#copy run start
[########################################] 100%
N1Kv#
N1Kv %VEM_MGR-2-VEM_MGR_DETECTED: Host 192.168.200.102 detected as module 20
N1Kv %VEM_MGR-2-MOD_ONLINE: Module 20 is online
N1Kv %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number :unavailable) Module-Type Virtual Supervisor Module Mo
Finally, power cycle blade 1, which will cause its VEM to be removed. Because the
primary VSM also runs on this blade, you will have to disconnect and reconnect
your terminal session. Before blade 1 fully reboots, delete its current VEM number
and move it to module 10.
N1Kv#conf t
Enter configuration commands, one per line.
N1Kv(config)#vem 10
N1Kv(config-vem-slot)#host vmware id 6220349f-9cc4-e211-0000-00000000006f
N1Kv(config-vem-slot)#end
N1Kv %VEM_MGR-2-VEM_MGR_DETECTED: Host 192.168.200.101 detected as module 10
N1Kv %VIM-5-IF_ATTACHED: Interface Vethernet1 is attached to vmk0 on port 1 of module 10 with dvport id 1216
N1Kv %VEM_MGR-2-MOD_ONLINE: Module 10 is online
N1Kv#show module
Mod
Ports
Module-Type
Model
Status
---
-----
--------------------------------
------------------
------------
Nexus1000V
ha-standby
Nexus1000V
active *
248
NA
ok
10
248
NA
ok
20
248
NA
ok
Mod
Sw
Hw
---
------------------
------------------------------------------------
4.2(1)SV2(1.1)
0.0
4.2(1)SV2(1.1)
0.0
4.2(1)SV2(1.1)
10
4.2(1)SV2(1.1)
20
4.2(1)SV2(1.1)
Mod
MAC-Address(es)
Serial-Num
---
--------------------------------------
----------
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
NA
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
NA
02-00-0c-00-05-00 to 02-00-0c-00-05-80
NA
10
02-00-0c-00-0a-00 to 02-00-0c-00-0a-80
NA
20
02-00-0c-00-14-00 to 02-00-0c-00-14-80
NA
Mod
Server-IP
Server-UUID
Server-Name
---
---------------
------------------------------------
--------------------
192.168.200.200
NA
NA
192.168.200.200
NA
NA
192.168.200.104
d57068d1-dfa4-11e1-a49d-30f70d088146
192.168.200.104
10
192.168.200.101
6220349f-9cc4-e211-0000-00000000006f
192.168.200.101
20
192.168.200.102
6220349f-9cc4-e211-0000-00000000007f
192.168.200.102
vlan 203
private-vlan isolated
vlan 204
private-vlan primary
private-vlan association 203
!
port-profile type ethernet VMGuests_UPLINK
switchport mode private-vlan trunk promiscuous
switchport private-vlan mapping trunk 204 203
!
port-profile type vethernet VLAN203
switchport mode private-vlan host
switchport private-vlan host-association 204 203
Introduction
General Lab Guidelines
You may not use any links that may physically be present but not specifically pictured
and labeled in this topology.
Name and number all VLANs, port channels, SAN port channels, service profiles,
templates, and so on exactly as described in this lab. Failure to do so will result in
missed points for that task.
You may not change any passwords on any devices unless explicitly directed to do
so.
You may not change any management IP addresses or default routes on any
devices or VDCs unless explicitly directed to do so (you may add them if they do not
exist, but you may not change existing).
You may not disable telnet on any device. Telnet must work properly on all devices
and VDCs.
You may not log on to the 3750G switch for this particular lab. It is fully functional and
pre-configured for you.
1.1 VLANs
Do not create any unnecessary VLANs on any switch.
Create VLANs 120, 125, 130, 135, 140, 200, 201, 710, and 711 on N7K1.
Create VLANs 120, 125, 130, 135, 140, 200, 201, 720, and 721 on N7K2.
Create VLANs 120, 125, 130, 135, 200, 201, and 140 on N7K3.
Create VLANs 120, 125, 130, 135, 200, 201 and 140 on N7K4
Create VLANs 120, 125, 130, 135, 200, and 201 on N5K1 and N5K2.
Name VLANs on every device they appear on according to Table 1.
Table 1
VLAN
Name
120
VM-DATA1
125
VM-DATA2
130
VM-DATA3
135
VM-DATA4
140
OTV-SITE
150
BACKUP
200
DCI-ESXI
201
DCI-VMOTION
710
DC1-ISP-1
VLAN
Name
711
DC1-ISP-2
720
DC2-ISP-1
721
DC2-ISP-2
forwarding traffic.
Ensure that the N7K1 is the primary device in LACP negotiation.
Ensure that the hashing algorithm takes L3 and L4 for both source and
destination into account.
Trunk only previously created VLANs 120-135 and 200-201 southbound
from N7K1 to both FIs.
1.5 HSRP
Using information from Table 2, configure SVIs on N7K1 and N7K2 for all VLANs that
are present on that switch.
Assume that a second Nexus 7000 will be added to each Data Center, and with that
in mind, go ahead and provision HSRP for all SVIs at both sites, as follows:
Use the newest version of HSRP supported.
Make HSRP group numbers correspond with their respective VLAN/SVI
numbers.
Use the virtual IP address of .254 for SVIs on both switches.
Use the host IP address of .251 for each current SVIs on N7K1.
(.250 will be used in the future for the other HSRP member at DC1).
Use the host IP address of .252 for each current SVIs on N7K2.
(.253 will be used in the future for the other HSRP member at DC1).
These current SVIs will be the primary HSRP group member even after the
other N7K is put into service at each DC; ensure that these SVIs have a
higher preference for being the Active forwarder assuming the others come
online with defaults.
Have the SVIs for VLAN 200 use the fastest possible hello and hold timers.
Table 2
VLAN
IP Subnet / Mask
VRF
120
192.168.120.0 255.255.255.0
default
125
192.168.125.0 255.255.255.0
default
VLAN
IP Subnet / Mask
VRF
130
192.168.130.0 255.255.255.0
default
135
192.168.135.0 255.255.255.0
default
200
192.168.200.0 255.255.255.0
default
201
192.168.201.0 255.255.255.0
default
1.6 vPC
Configure vPC between N5K1 and N5K2 with the Domain ID 12.
Configure the peer-link with an LACP trunking over ports e1/1-2 on Port Channel 512
between N5K1 and N5K2 according to the diagram.
Ensure that any vPC numbers correspond with their designated port channel
numbers, as listed in the tasks that follow.
You are not permitted to create any additional links that are not explicitly pictured in
the diagram.
Ensure that N5K1 is the root for all STP instances; however, you may not configure
any spanning tree priority or root commands globally or at the interface level on
N5K1.
Ensure that N5K1 holds the primary role for the vPC domain.
Ensure that N5K1 always decides which links are active in any port channel.
Synchronize all ARP tables.
Ensure that if our SAN was an EMC VPLEX or VMAX using IP technologies, vPC
would not cause any problems with forwarding frames.
1.10 OTV
Extend only previously created VLANs 120-135 and 200-201 between Data Centers
using OTV.
Use the OTV site VLAN of 140 on both sides of the DCI.
You may use whatever site identifiers you prefer.
The ISP supports SSM and ASM, and for ASM it provides a PIM RP of 10.10.10.25;
use this as your only RP.
OTV should be authenticated using a hashed value from the word "DCIOTV".
Any of the SVIs on N7K1 or N7K2 for the VLANs that are extended across the DCI
should be able to ping each other.
Prevent HSRP groups at DC1 from becoming active/standby members of the same
HSRP group numbers at DC2, and vice-versa.
Prevent any device ARPing at either DC from getting the virtual MAC address of the
HSRP group from the 7K at the opposite side of the DCI.
When finished, both N7K1 and N7K2 should be able to ping the actual host IP
address of the SVI at the opposite data center traversing the overlay.
Each N7K1 and N7K2 should also be able to ping the virtual IP address of .254,
which should keep traffic local to the site from which the ping originates.
2.5 FCIP
Configure FCIP between MDS1 and MDS2 on interfaces G1/1 and G1/2 on each
switch.
Use the IP address of 12.12.12.1/30 on MDS1 G1/1 and 12.12.12.2/30 on MDS2
G1/1 over FCIP Profile 10 and interface FCIP 10 on both sides.
Use the IP address of 12.12.12.5/30 on MDS1 G1/2 and 12.12.12.6/30 on MDS2
2.6 Zoning
Ensure that MDS1 appears to the fabric as domain 0x61 for VSAN 10 and 20.
Ensure that MDS2 appears to the fabric as domain 0x62 for VSAN 10 and 20.
Ensure that N5K2 appears to the fabric as domain 0x52 for VSAN 10 and 20.
Ensure that N5K1 appears to the fabric as domain 0x51 for VSAN 10 and 20.
Zone according to the following information.
You may only make zoning changes for both Fabric A and Fabric B from MDS1.
According to information given in Table 3:
Zone so that "ESXi1", "ESXi2", and "ESXi3" all have access to their FCTARGET-SAN-x for the appropriate Fabrics (fc0's to Fabric A; fc1's to Fabric
B).
Fabric A uses VSAN 10.
Fabric B uses VSAN 20.
Zoning for Fabric A should use the zone name "ZONE-A".
Zoning for Fabric B should use the zone name "ZONE-B".
The zoneset for Fabric A should be named "ZoneSet_VSAN10".
The zoneset for Fabric B should be named "ZoneSet_VSAN20".
Aliases must be created according to Table 3 and must be used in the zoning
configuration.
Many pWWN's are the same below. They are sorted first by FC-4
Type and then by Fabric.
Table 3
Fabric
pWWN
LUN
20:aa:00:25:b5:01:01:01
FC-4
Type
Description
Alias
N/A
ESXi1 vHBA
"fc0"
ESXi1A-fc0
Init
20:aa:00:25:b5:01:01:02
N/A
ESXi2 vHBA
"fc0"
ESXi2A-fc0
Init
20:00:d4:8c:b5:bd:46:0e
N/A
ESXi3 vHBA
"fc0"
ESXi3A-fc0
Init
20:bb:00:25:b5:01:01:01
N/A
ESXi1 vHBA
"fc1"
ESXi1B-fc1
Init
20:bb:00:25:b5:01:01:02
N/A
ESXi2 vHBA
"fc1"
ESXi2B-fc1
Init
20:00:d4:8c:b5:bd:46:0f
N/A
ESXi3 vHBA
"fc1"
ESXi3B-fc1
Init
ESXi1 Boot
Volume
FCTARGETSAN-A
Target
ESXi2 Boot
Volume
FCTARGETSAN-A
Target
FC_Datastore
1
FCTARGETSAN-A
Target
FC_Datastore
2
FCTARGETSAN-A
Target
21:03:00:1b:32:64:5e:dc
21:03:00:1b:32:64:5e:dc
21:03:00:1b:32:64:5e:dc
21:03:00:1b:32:64:5e:dc
Fabric
pWWN
21:01:00:1b:32:24:5e:dc
21:01:00:1b:32:24:5e:dc
21:01:00:1b:32:24:5e:dc
21:01:00:1b:32:24:5e:dc
Alias
FC-4
Type
ESXi1 Boot
Volume
FCTARGETSAN-B
Target
ESXi2 Boot
Volume
FCTARGETSAN-B
Target
FC_Datastore
1
FCTARGETSAN-B
Target
FC_Datastore
2
FCTARGETSAN-B
Target
LUN
Description
3. Unified Computing
3.1 UCS Initialization
Initialize both UCS Fabric Interconnects (FIs).
Fabric Interconnect A should use the IP address of 192.168.101.201/24.
Fabric Interconnect B should use the IP address of 192.168.101.202/24.
Both Fabric Interconnects should use a VIP of 192.168.101.200.
3.5 Pools
Create a UUID pool called "Global-UUIDs" and allocate suffixes from the range of
0001-000000000101 to 0001-00000000010f.
Create a MAC address pool called "Global-MACs" ranging from 00:25:b5:0a:0a:01 to
00:25:b5:0a:0a:11.
Create an nWWN pool called "Global-nWWNs" ranging from 20:ff:00:25:b5:01:01:01
to 20:ff:00:25:b5:01:01:11.
Create a Management IP address pool ranging from 192.168.101.210 to
192.168.101.219 with the default gateway of 192.168.101.1.
Anything changed in this service profile template should never affect any service
profiles instantiated from it.
UUIDs should be dynamically allocated from the Global-UUIDs pool.
2 vHBAs should be created with the following information:
Name them "fc0" and "fc1".
"fc0" must be assigned the initiator pWWN of 20:aa:00:25:b5:01:01:01.
"fc1" must be assigned the initiator pWWN of 20:bb:00:25:b5:01:01:01.
Both vHBAs must be able to dynamically obtain nWWNs from the GlobalnWWNs pool.
Neither of these vHBAs should be allowed to re-attempt FLOGIs more than
3 times.
Configure a specific boot policy to boot from SAN with the following information:
"fc0" should attempt first to boot from Fabric A using the pWWN for "ESXi1
Boot Volume" in Table 3.
"fc1" should attempt first to boot from Fabric B using the pWWN for "ESXi1
Boot Volume" in Table 3.
5 vNICs should be created with the following information:
Name them "eth0", "eth1", "eth2", "eth3", and "eth4".
"eth0" and "eth3" should only be allowed to ever use Fabric A.
"eth1" and "eth4" should only be allowed to ever use Fabric B.
"eth2" primarily uses Fabric A, but should automatically use Fabric B if all
uplinks on FI-A are down.
MAC addresses should must be allocated dynamically from the GlobalMACs pool.
All VLANs should be allowed on all vNICs except for VLAN 1 and VLAN
150; these should not be allowed on any vNICs.
All hosts will explicitly tag their VLAN IDs.
Any changes to the service profile requiring a reboot should force the administrator to
manually allow it.
Any service profile created from this template should not automatically associate with
any blades in the chassis.
Only allow this service profile to ever associate with blades that have a Palo
mezzanine adapter.
Do not allow blade to automatically boot after this service profile is associated.
Ensure that when booting, the KVM console viewer can see the FC disk that
attaches directly after the FC drivers load.
Configure the management IP addresses to be dynamically assigned from the global
pool.
Manually associate this profile with blade 1 and boot the blade.
Introduction
General Lab Guidelines
You may not use any links that may physically be present but are not specifically
pictured and labeled in this topology.
Name and number all VLANs, port channels, SAN port channels, service profiles,
templates, and so on exactly as described in this lab. Failure to do so will result in
missed points for that task.
You may not change any passwords on any devices unless explicity directed to do
so.
You may not change any management IP addresses or default routes on any
devices or VDCs unless explicitly directed to do so (you may add them if they do not
exist, but you may not change existing).
You may not disable telnet on any device. Telnet must work properly on all devices
and VDCs.
You may not log on to the 3750G switch for this particular lab. It is fully functional and
pre-configured for you.
1.1 VLANs
Configuration
This task doesn't seem like it would be a difficult one, and it obviously isn't hard to
create VLANs. What can be difficult is getting them all in exactly as instructed. Other
than VLAN 1, if you entered additional VLANs beyond what was asked of you, or if
you simply mis-typed a name, you would have missed the points for this task.
N7K1:
vlan 120
name VM-DATA1
vlan 125
name VM-DATA2
vlan 130
name VM-DATA3
vlan 135
name VM-DATA4
vlan 140
name OTV-SITE
vlan 200
name DCI-ESXI
vlan 201
name DCI-VMOTION
vlan 710
name DC1-ISP-1
vlan 711
name DC1-ISP-2
N7K2:
vlan 120
name VM-DATA1
vlan 125
name VM-DATA2
vlan 130
name VM-DATA3
vlan 135
name VM-DATA4
vlan 140
name OTV-SITE
vlan 200
name DCI-ESXI
vlan 201
name DCI-VMOTION
vlan 710
name DC1-ISP-1
vlan 711
name DC1-ISP-2
N7K3:
vlan 120
name VM-DATA1
vlan 125
name VM-DATA2
vlan 130
name VM-DATA3
vlan 135
name VM-DATA4
vlan 140
name OTV-SITE
vlan 200
name DCI-ESXI
vlan 201
name DCI-VMOTION
N7K4:
vlan 120
name VM-DATA1
vlan 125
name VM-DATA2
vlan 130
name VM-DATA3
vlan 135
name VM-DATA4
vlan 140
name OTV-SITE
vlan 200
name DCI-ESXI
vlan 201
name DCI-VMOTION
N5K1:
vlan 120
name VM-DATA1
vlan 125
name VM-DATA2
vlan 130
name VM-DATA3
vlan 135
name VM-DATA4
vlan 200
name DCI-ESXI
vlan 201
name DCI-VMOTION
N5K2:
vlan 120
name VM-DATA1
vlan 125
name VM-DATA2
vlan 130
name VM-DATA3
vlan 135
name VM-DATA4
vlan 200
name DCI-ESXI
vlan 201
name DCI-VMOTION
feature ospf
feature interface-vlan
vdc N7K1 id 1
allocate interface Ethernet1/1-8,Ethernet1/18,Ethernet1/20,Ethernet1/22,Ethernet1/24
interface Vlan710
no shutdown
vrf member DC1
ip address 10.71.71.0/31
ip ospf mtu-ignore
ip router ospf DC1 area 0.0.0.5
ip pim sparse-mode
interface Vlan711
no shutdown
vrf member DC1
ip address 10.71.71.2/31
ip ospf mtu-ignore
ip router ospf DC1 area 0.0.0.5
ip pim sparse-mode
interface Ethernet2/29
switchport access vlan 710
spanning-tree port type edge
spanning-tree bpduguard enable
speed 1000
mtu 9000
no shutdown
interface Ethernet2/31
switchport access vlan 711
spanning-tree port type edge
spanning-tree bpduguard enable
speed 1000
mtu 9000
no shutdown
feature ospf
feature interface-vlan
interface Vlan720
no shutdown
vrf member DC2
ip address 10.72.72.0/31
ip ospf mtu-ignore
ip router ospf DC2 area 0.0.0.3
ip pim sparse-mode
interface Vlan721
no shutdown
vrf member DC2
ip address 10.72.72.2/31
ip ospf mtu-ignore
ip router ospf DC2 area 0.0.0.3
ip pim sparse-mode
interface Ethernet2/21
switchport access vlan 720
spanning-tree port type edge
spanning-tree bpdufilter enable
speed 1000
mtu 9000
no shutdown
interface Ethernet2/23
switchport access vlan 721
spanning-tree port type edge
spanning-tree bpdufilter enable
speed 1000
mtu 9000
no shutdown
Verification
N7K1(config)#sh ip ospf neighbors vrf DC1
OSPF Process ID DC1 VRF DC1
Total number of neighbors: 2
Neighbor ID
10.10.10.25
10.10.10.25
Pri State
1 FULL/DR
1 FULL/DR
Up Time
Address
01:27:26 10.71.71.3
01:27:20 10.71.71.1
Interface
Vlan711
Vlan710
Neighbor ID
10.10.10.25
10.10.10.25
Pri State
1 FULL/BDR
1 FULL/BDR
Up Time
Address
01:28:17 10.72.72.3
01:28:18 10.72.72.1
Interface
Vlan721
Vlan720
interface Ethernet1/1
vrf member DC1
ip address 10.13.13.0/31
ip router ospf DC1 area 0.0.0.5
no shutdown
interface Ethernet2/1
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,140,200-201
no shutdown
N7K3:
interface Ethernet1/9
ip address 10.13.13.1/31
no shutdown
interface Ethernet2/9
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,140,200-201
no shutdown
N7K2:
interface Ethernet1/17
vrf member DC2
ip address 10.24.24.0/31
ip router ospf DC2 area 0.0.0.3
no shutdown
interface Ethernet2/11
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,140,200-201
no shutdown
N7K4:
interface Ethernet1/25
ip address 10.24.24.1/31
no shutdown
interface Ethernet2/20
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,140,200-201
no shutdown
Verification
N7K1(config)#sh ip route vrf DC1
IP Route Table for VRF "DC1"
'*' denotes best ucast next-hop
'**' denotes best mcast next-hop
'[x/y]' denotes [preference/metric]
'%<string>' in via output denotes VRF <string>
lacp system-priority 1
port-channel load-balance src-dst ip-l4port
interface port-channel215
switchport
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
spanning-tree port type edge trunk
interface port-channel218
switchport
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
spanning-tree port type edge trunk
interface Ethernet1/22
switchport
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
channel-group 215 mode active
no shutdown
interface Ethernet1/24
switchport
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
channel-group 218 mode active
no shutdown
Verification
These won't show up until you complete the UCS side, but once you have, they should show:
D - Down
P - Up in port-channel (members)
I - Individual
s - Suspended
r - Module-removed
S - Switched
R - Routed
U - Up (port-channel)
M - Not in use. Min-links not met
-------------------------------------------------------------------------------Group Port-
Type
Protocol
Member Ports
Channel
-------------------------------------------------------------------------------215
Po215(SU)
Eth
LACP
N7K1(config)#
1.5 HSRP
Configuration
N7K1:
interface Vlan120
no shutdown
ip address 192.168.120.251/24
hsrp version 2
hsrp 120
priority 110
preempt
ip 192.168.120.254
interface Vlan125
no shutdown
ip address 192.168.125.251/24
hsrp version 2
hsrp 125
priority 110
preempt
ip 192.168.125.254
interface Vlan130
no shutdown
Eth1/22(P)
218
Po218(SU)
Eth
LACP
Eth1/24(P)
ip address 192.168.130.251/24
hsrp version 2
hsrp 130
priority 110
preempt
ip 192.168.130.254
interface Vlan135
no shutdown
ip address 192.168.135.251/24
hsrp version 2
hsrp 135
priority 110
preempt
ip 192.168.135.254
interface Vlan200
no shutdown
ip address 192.168.200.251/24
hsrp version 2
hsrp 200
priority 110
preempt
timers msec 250 msec 750
ip 192.168.200.254
interface Vlan201
no shutdown
ip address 192.168.201.251/24
hsrp version 2
hsrp 201
priority 110
preempt
ip 192.168.201.254
N7K2:
interface Vlan120
no shutdown
ip address 192.168.120.252/24
hsrp version 2
hsrp 120
priority 110
preempt
ip 192.168.120.254
interface Vlan125
no shutdown
ip address 192.168.125.252/24
hsrp version 2
hsrp 125
priority 110
preempt
ip 192.168.125.254
interface Vlan130
no shutdown
ip address 192.168.130.252/24
hsrp version 2
hsrp 130
priority 110
preempt
ip 192.168.130.254
interface Vlan135
no shutdown
ip address 192.168.135.252/24
hsrp version 2
hsrp 135
priority 110
preempt
ip 192.168.135.254
interface Vlan200
no shutdown
ip address 192.168.200.252/24
hsrp version 2
hsrp 200
priority 110
preempt
timers msec 250 msec 750
ip 192.168.200.254
interface Vlan201
no shutdown
ip address 192.168.201.252/24
hsrp version 2
hsrp 201
priority 110
preempt
ip 192.168.201.254
Verification
These HSRP group are shown after task 1.10 has been completed. At
that time, even though the vlans are extended, because both the
HSRP Hellos and the Virtual MAC addresses are both blocked by
ACLs, each side responds to ARP requests locally and also considers
itself the Active router.
N7K1(config)# sh hsrp
Vlan120 - Group 120 (HSRP-V2) (IPv4)
Local state is Active, priority 100 (Cfged 100), may preempt
Forwarding threshold(for vPC), lower: 1 upper: 100
Hellotime 3 sec, holdtime 10 sec
Next hello sent in 0.634000 sec(s)
Virtual IP address is 192.168.120.254 (Cfged) Active router is local
Standby router is unknown
Authentication text "cisco"
Virtual mac address is 0000.0c9f.f078 (Default MAC)
2 state changes, last state change 01:34:10
IP redundancy name is hsrp-Vlan120-120 (default)
N7K1(config)#
N7K2(config)# sh hsrp
Vlan120 - Group 120 (HSRP-V2) (IPv4)
Local state is Active, priority 100 (Cfged 100), may preempt
Forwarding threshold(for vPC), lower: 1 upper: 100
1.6 vPC
Configuration
N7K2:
N5K1:
feature lacp
feature vpc
lacp system-priority 1
vpc domain 12
role priority 1
system-priority 1
peer-keepalive destination 192.168.101.52 source 192.168.101.51
peer-gateway
ip arp synchronize
interface port-channel512
switchport mode trunk
spanning-tree port type network
speed 10000
vpc peer-link
interface Ethernet1/1
switchport mode trunk
channel-group 512 mode active
interface Ethernet1/2
switchport mode trunk
channel-group 512 mode active
N5K2:
feature lacp
feature vpc
lacp system-priority 1
vpc domain 12
system-priority 1
peer-keepalive destination 192.168.101.51 source 192.168.101.52
peer-gateway
ip arp synchronize
interface port-channel512
switchport mode trunk
spanning-tree port type network
speed 10000
vpc peer-link
interface Ethernet1/1
switchport mode trunk
channel-group 512 mode active
interface Ethernet1/2
switchport mode trunk
Verification
N5K1(config)# sh vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id
: 12
Peer status
: success
: 67 Peer Gateway
: -
: -
: Enabled
: primary
: Enabled
Port
--
----
------ --------------------------------------------------
Po512
up
1,120,125,130,135,200-201
N5K2(config)# sh vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id
: 12
Peer status
: peer is alive
: success
: 67
Peer Gateway
: Enabled
: -
: -
: Enabled
: secondary
id
Port
--
----
------ --------------------------------------------------
Po512
up
1,120,125,130,135,200-201
This spanning-tree show command is after the next task has been performed.
Remember the whole topology when thinking about where the STP domain will
reach. Only one VLAN is shown, although all have same result.
N5K1(config)# sh spanning-tree vlan 120
VLAN0120
Spanning tree enabled protocol rstp
Root ID
32888
Address
Hello Time
Priority
32888
Address
547f.ee7a.4d7c
Hello Time
Bridge ID
Priority
Interface
sec
sec
Prio.Nbr Type
Desg FWD 1
Po512
Desg FWD 1
Eth113/1/1
Desg FWD 1
128.1
Eth123/1/1
Desg FWD 1
128.1
N5K1(config)#
VLAN0120
Spanning tree enabled protocol rstp
Root ID
Bridge ID
Interface
Priority
32888
Address
547f.ee7a.4d7c
Cost
Port
4607 (port-channel512)
Hello Time
Priority
61560
Address
547f.ee79.137c
Hello Time
sec
sec
Prio.Nbr Type
Desg FWD 1
Root FWD
Eth113/1/1
Desg FWD 1
Eth123/1/1
Desg FWD 1
N5K2(config)#
VLAN0120
Spanning tree enabled protocol rstp
Root ID
32888
Address
547f.ee7a.4d7c
Cost
Port
4195 (port-channel100)
Hello Time
Priority
57464
Address
64a0.e742.8dc2
Hello Time
Bridge ID
Priority
Interface
sec
sec
Prio.Nbr Type
128.4195 P2p
Eth2/11
Desg FWD 2
128.267
P2p
N7K2(config)#
interface port-channel100
switchport
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
interface Ethernet2/5
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
Root FWD
interface Ethernet2/6
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
channel-group 100 mode passive
no shutdown
N5K1:
fex 113
pinning max-links 1
description "FEX0113"
fex 123
pinning max-links 1
description "FEX0123"
slot 113
provision model N2K-C2232P
slot 123
provision model N2K-C2232P
interface port-channel100
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
speed 10000
vpc 100
interface port-channel113
switchport mode fex-fabric
fex associate 113
vpc 113
interface port-channel123
switchport mode fex-fabric
fex associate 123
vpc 123
interface port-channel1550
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
speed 10000
interface Ethernet1/3
switchport mode trunk
interface Ethernet1/12
switchport mode fex-fabric
fex associate 113
channel-group 113
interface Ethernet1/13
shutdown
interface Ethernet1/14
switchport mode fex-fabric
fex associate 123
channel-group 123
interface Ethernet1/15
shutdown
N5K2:
fex 113
pinning max-links 1
description "FEX0113"
fex 123
pinning max-links 1
description "FEX0123"
slot 113
provision model N2K-C2232P
slot 123
provision model N2K-C2232P
interface port-channel100
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
speed 10000
vpc 100
interface port-channel113
switchport mode fex-fabric
fex associate 113
vpc 113
interface port-channel123
switchport mode fex-fabric
interface port-channel1550
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
speed 10000
interface Ethernet1/3
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
channel-group 100 mode active
interface Ethernet1/12
switchport mode fex-fabric
fex associate 113
channel-group 113
interface Ethernet1/13
shutdown
interface Ethernet1/14
switchport mode fex-fabric
fex associate 123
channel-group 123
interface Ethernet1/15
shutdown
Verification
N5K1(config)# sh fex
FEX
Number
FEX
FEX
Description
State
FEX
Model
Serial
-----------------------------------------------------------------------113
FEX0113
Online
N2K-C2232PP-10GE
SSI165204YC
123
FEX0123
Online
N2K-C2232PP-10GE
SSI16510AWF
N5K1(config)# sh vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id
: 12
Peer status
: peer is alive
: success
: success
vPC role
: primary
: 67
Peer Gateway
: Enabled
: -
: -
: Enabled
Port
--
----
------ --------------------------------------------------
Po512
up
1,120,125,130,135,200-201
vPC status
---------------------------------------------------------------------------id
Port
Active vlans
Po100
up
success
success
1,10,120,12
5,130,135,2
00-201
113
Po113
up
success
success
123
Po123
up
success
success
N5K2(config)# sh fex
FEX
Number
FEX
FEX
Description
State
FEX
Model
Serial
-----------------------------------------------------------------------113
FEX0113
Online
N2K-C2232PP-10GE
SSI165204YC
123
FEX0123
Online
N2K-C2232PP-10GE
SSI16510AWF
N5K2(config)# sh vpc
Legend:
(*) - local vPC is down, forwarding via vPC peer-link
vPC domain id
: 12
Peer status
: peer is alive
: success
: success
vPC role
: secondary
: 67
Peer Gateway
: Enabled
: -
: -
: Enabled
Port
--
----
------ --------------------------------------------------
Po512
up
1,120,125,130,135,200-201
vPC status
---------------------------------------------------------------------------id
Port
Active vlans
Po100
up
success
success
1,10,20,120
,125,130,13
5,200-201
113
Po113
up
success
success
123
Po123
up
success
success
D - Down
P - Up in port-channel (members)
I - Individual
s - Suspended
r - Module-removed
S - Switched
R - Routed
U - Up (port-channel)
M - Not in use. Min-links not met
-------------------------------------------------------------------------------Group Port-
Type
Protocol
Member Ports
Channel
-------------------------------------------------------------------------------100
Po100(SU)
Eth
LACP
Eth1/3(P)
113
Po113(SU)
Eth
NONE
Eth1/12(P) 123
512
Po512(SU)
Eth
LACP
Eth1/1(P)
Po123(SU)
Eth
NONE
Eth1/2(P)
N5K1(config)#
D - Down
P - Up in port-channel (members)
I - Individual
s - Suspended
r - Module-removed
S - Switched
R - Routed
U - Up (port-channel)
M - Not in use. Min-links not met
-------------------------------------------------------------------------------Group Port-
Type
Protocol
Member Ports
Eth1/14(P)
Channel
-------------------------------------------------------------------------------100
Po100(SU)
Eth
LACP
Eth1/3(P)
113
Po113(SU)
Eth
NONE
Eth1/12(P) 123
512
Po512(SU)
Eth
LACP
Eth1/1(P)
Po123(SU)
Eth
NONE
Eth1/2(P)
N5K2(config)#
interface Ethernet1/11
switchport access vlan 200
spanning-tree port type edge
spanning-tree bpduguard enable
speed 1000
Verification
N5K1(config)# sh int e1/11 | in up|1000 Ethernet1/11 is up
Hardware: 1000/10000 Ethernet, address: 547f.ee7a.4d32 (bia 547f.ee7a.4d32)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec
N5K1(config)#
Vlan
Prio.Nbr Type
Desg FWD 4
128.139
Edge P2p
Eth1/14(P)
Configuration
N5K1:
interface Ethernet113/1/1
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
spanning-tree port type edge trunk
interface Ethernet123/1/1
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
spanning-tree port type edge trunk
N5K2:
interface Ethernet113/1/1
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
spanning-tree port type edge trunk
interface Ethernet123/1/1
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,200-201
spanning-tree port type edge trunk
1.10 OTV
Configuration:
The L2 inside and L3 join interfaces have already been configured from both the
Aggregation and OTV layers, but we are displaying them here again just to bring
everything necessary into contextual view, and adding the necessary PIM and IGMP
configuration where necessary. You may notice that the ISP RP address of
10.10.10.25 doesn't appear in our RIB; this is because OSPF didn't advertise it to
us. We weren't instructed not to use static routes, so those will certainly suffice here
to point us toward it. We can only hope it has a route back, and when we confiure
redundant static routes out each of our links, we ping it and see that it, in fact, does.
Note that we must do this under our VRF, as well as set up PIM there.
N7K1:
interface Ethernet1/1
vrf member DC1
ip address 10.13.13.0/31
ip router ospf DC1 area 0.0.0.5
ip pim sparse-mode
ip igmp version 3
no shutdown
interface Ethernet2/1
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,140,200-201
no shutdown
N7K3:
feature otv
ip access-list ALL_IPs
10 permit ip any any
ip access-list HSRP_IP
10 permit udp any 224.0.0.2/32 eq 1985
20 permit udp any 224.0.0.102/32 eq 1985
vlan access-map HSRP_Localization 10
match ip address HSRP_IP
action drop
vlan access-map HSRP_Localization 20
match ip address ALL_IPs
action forward
vlan filter HSRP_Localization vlan-list 120,125,130,135,200-201
interface Overlay1
otv isis authentication-type md5
otv isis authentication key-chain OTV
otv join-interface Ethernet1/9
otv control-group 224.1.1.1
otv data-group 232.1.1.0/24
otv extend-vlan 120, 125, 130, 135, 200-201
no otv suppress-arp-nd
no shutdown
interface Ethernet1/9
ip address 10.13.13.1/31
ip igmp version 3
no shutdown
interface Ethernet2/9
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,140,200-201
no shutdown
otv-isis default
vpn Overlay1
redistribute filter route-map OTV_HSRP_filter
N7K2:
interface Ethernet1/17
vrf member DC2
ip address 10.24.24.0/31
ip router ospf DC2 area 0.0.0.3
ip pim sparse-mode
ip igmp version 3
no shutdown
interface Ethernet2/11
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,140,200-201
no shutdown
N7K4:
feature otv
ip access-list ALL_IPs
10 permit ip any any
ip access-list HSRP_IP
10 permit udp any 224.0.0.2/32 eq 1985
20 permit udp any 224.0.0.102/32 eq 1985
vlan access-map HSRP_Localization 10
match ip address HSRP_IP
action drop
vlan access-map HSRP_Localization 20
match ip address ALL_IPs
action forward
vlan filter HSRP_Localization vlan-list 120,125,130,135,200-201
interface Overlay1
otv isis authentication-type md5
otv isis authentication key-chain OTV
otv join-interface Ethernet1/25
otv control-group 224.1.1.1
otv data-group 232.1.1.0/24
otv extend-vlan 120, 125, 130, 135, 200-201
no otv suppress-arp-nd
no shutdown
interface Ethernet1/25
ip address 10.24.24.1/31
ip igmp version 3
no shutdown
interface Ethernet2/20
switchport mode trunk
switchport trunk allowed vlan 120,125,130,135,140,200-201
no shutdown
otv-isis default
vpn Overlay1
redistribute filter route-map OTV_HSRP_filter
Verification
First, let's look at general OTV information from both sides of the tunnel.
N7K3(config)#sh otv
VPN name
: Overlay1
VPN state
: UP
Extended vlans
Control group
: 224.1.1.1
: Eth1/9 (10.13.13.1)
Site vlan
: 140 (up)
AED-Capable
: Yes
Capability
Overlay-Interface Overlay1
Hostname
System-ID
N7K4
64a0.e742.8dc4 10.24.24.1
Dest Addr
Up Time
State
13:18:15
VLAN
Vlan State
Overlay
----
-----------------------------------
----------
-------
120*
N7K3
active
Overlay1
125*
N7K3
active
Overlay1
130*
N7K3
active
Overlay1
135*
N7K3
active
Overlay1
200*
N7K3
active
Overlay1
201*
N7K3
active
Overlay1
N7K3(config)#
N7K4(config)#sh otv
VPN name
: Overlay1
VPN state
: UP
Extended vlans
Control group
: 224.1.1.1
: Eth1/25 (10.24.24.1)
Site vlan
: 140 (up)
AED-Capable
: Yes
Capability
Overlay-Interface Overlay1
Hostname
System-ID
Dest Addr
N7K3
64a0.e742.8dc3 10.13.13.1
Up Time
State
13:35:44
VLAN
Vlan State
Overlay
----
-----------------------------------
----------
-------
120*
N7K4
active
Overlay1
125*
N7K4
active
Overlay1
130*
N7K4
active
Overlay1
135*
N7K4
active
Overlay1
200*
N7K4
active
Overlay1
201*
N7K4
active
Overlay1
N7K4(config)#
We will ping the SVI for VLAN 200 on N7K2 in DC2, but first let's see what its MAC
and IP are.
N7K2(config)# sh int vlan200 | in ddress
Hardware is EtherSVI, address is
64a0.e742.8dc2
Let's look at the OTV routing table before we ping this particular IP; notice that the
MAC is not in the table.
N7K3(config)# sh otv route
VLAN MAC-Address
Metric
Uptime
Owner
Next-hop(s)
---- --------------
------
--------
---------
-----------
200 000c.29bb.9b82
42
13:18:17
overlay
N7K4
200 0025.b50a.0a06
13:18:16
site
Ethernet2/9
200 0025.b50a.0a0b
13:18:12
site
Ethernet2/9
200 d48c.b5bd.460c
42
13:18:17
overlay
N7K4
N7K3(config)#
Now we try to ping 192.168.200.252 and see that after a while, the OTV tunnel
routes traffic for the newly learned MAC address of 64a0.e742.8dc2.
--- 192.168.200.252 ping statistics --5 packets transmitted, 2 packets received, 60.00% packet loss
round-trip min/avg/max = 1.003/1.261/1.52 ms
N7K1(config)#
Verify that route was added. We also see our local address (64a0.e742.8dc1) as
now known by our internal interface.
N7K3(config)# sh otv route
VLAN MAC-Address
Metric
Uptime
Owner
Next-hop(s)
---- --------------
------
--------
---------
-----------
200 000c.29bb.9b82
42
13:19:00
overlay
N7K4
200 0025.b50a.0a06
13:18:59
site
Ethernet2/9
200 0025.b50a.0a0b
13:18:55
site
Ethernet2/9
200 64a0.e742.8dc1
00:00:26
site
Ethernet2/9
200 64a0.e742.8dc2
42
00:00:26
overlay
N7K4
200 d48c.b5bd.460c
42
13:19:00
overlay
N7K4
N7K3(config)#
feature fcoe
vlan 10
fcoe vsan 10
vsan database
vsan 10
N5K2:
feature fcoe
vlan 10
fcoe vsan 10
vlan 20
fcoe vsan 20
vsan database
vsan 10
vsan 20
MDS1:
vsan database
vsan 10
vsan 20
MDS2:
vsan database
vsan 10
vsan 20
feature npiv
vsan database
vsan 10 interface fc1/1
vsan 10 interface fc1/2
interface fc1/1
switchport mode F
no shutdown
interface fc1/2
switchport mode F
no shutdown
interface fc1/9
switchport mode F
no shutdown
interface fc1/10
switchport mode F
no shutdown
Verification
This verification is pulled after the UCS side has been configured.
MDS1(config)# sh flogi d
-------------------------------------------------------------------------------INTERFACE
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------fc1/1
10
0x610000
20:1d:00:2a:6a:15:66:80 20:0a:00:2a:6a:15:66:81
fc1/1
10
0x610002
20:aa:00:25:b5:01:01:01 20:ff:00:25:b5:01:01:0f
[ESXi1-A-fc0]
fc1/2
10
0x610001
20:1e:00:2a:6a:15:66:80 20:0a:00:2a:6a:15:66:81
fc1/2
10
0x610003
20:aa:00:25:b5:01:01:02 20:ff:00:25:b5:01:01:0e
[ESXi1-B-fc1]
fc1/9
20
0x610000
20:1b:00:2a:6a:15:05:00 20:14:00:2a:6a:15:05:01
fc1/9
20
0x610002
20:bb:00:25:b5:01:01:01 20:ff:00:25:b5:01:01:0f
[ESXi2-A-fc0]
fc1/10
20
0x610001
20:1c:00:2a:6a:15:05:00 20:14:00:2a:6a:15:05:01
fc1/10
20
0x610003
20:bb:00:25:b5:01:01:02 20:ff:00:25:b5:01:01:0e
[ESXi2-B-fc1]
fc1/2 is up
Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN)
Port WWN is 20:02:00:0d:ec:4a:21:00
Admin port mode is F, trunk mode is on
snmp link state traps are enabled
Port mode is F, FCID is 0x610001
Port vsan is 10
Speed is 2 Gbps
Transmit B2B Credit is 16
Receive B2B Credit is 16
fc1/10 is up
Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN)
Port WWN is 20:0a:00:0d:ec:4a:21:00
Admin port mode is F, trunk mode is on
snmp link state traps are enabled
Port mode is F, FCID is 0x610001
Port vsan is 20
Speed is 2 Gbps
Transmit B2B Credit is 16
Receive B2B Credit is 16
MDS1(config)#
slot 1
port 26-32 type fc (reboot)
vsan database
vsan 10 interface fc1/32
interface fc1/26
switchport trunk mode on
switchport mode E
channel-group 256 force
no shutdown
interface fc1/27
switchport trunk mode on
switchport mode E
channel-group 256 force
no shutdown
interface fc1/32
switchport mode F
no shutdown
N5K2:
slot 1
port 26-32 type fc (reboot)
interface fc1/26
switchport trunk mode on
switchport mode E
channel-group 256 force
no shutdown
interface fc1/27
switchport trunk mode on
switchport mode E
channel-group 256 force
no shutdown
interface fc1/28
switchport trunk mode on
switchport trunk allowed vsan 10
switchport trunk allowed vsan add 20
switchport mode E
no shutdown
MDS2:
vsan database
vsan 20 interface fc1/7
interface fc1/3
switchport trunk mode on
switchport trunk allowed vsan 10
switchport trunk allowed vsan add 20
switchport mode E
no shutdown
interface fc1/7
switchport mode F
no shutdown
Verification
N5K1(config)# sh int fc1/26-27
fc1/26 is trunking
Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN)
Port WWN is 20:1a:54:7f:ee:7a:4d:40
Peer port WWN is 20:1a:54:7f:ee:79:13:40
()
()
(10)
0 unknown class
fc1/27 is trunking
Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN)
Port WWN is 20:1b:54:7f:ee:7a:4d:40
Peer port WWN is 20:1b:54:7f:ee:79:13:40 Admin port mode is E, trunk mode is on
snmp link state traps are enabled Port mode is TE
Port vsan is 1
Speed is 2 Gbps
Transmit B2B Credit is 255
Receive B2B Credit is 16
Receive data field Size is 2112
Beacon is turned off
Trunk vsans (admin allowed and active) (10) Trunk vsans (up)
Trunk vsans (isolated)
()
()
(10)
0 CRC,
0 unknown class
N5K1(config)#
summary header
-------------------------------------------------------------------------------Group
Port-
Type
Protocol
Member Ports
Channel
-------------------------------------------------------------------------------_256
San-po256
FC
PCP
(U)
FC
fc1/26(P)
fc1/27(P)
_
N5K1(config-if)#
()
()
0 unknown class
(10)
()
()
0 unknown class
fc1/27 is trunking
Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN)
Port WWN is 20:1b:54:7f:ee:79:13:40
Peer port WWN is 20:1b:54:7f:ee:7a:4d:40 Admin port mode is E, trunk mode is on
snmp link state traps are enabled Port mode is TE
Port vsan is 1
Speed is 2 Gbps
(10)
()
()
(10)
0 unknown class
N5K2(config)#
summary header
-------------------------------------------------------------------------------Group
Port-
Type
Protocol
Member Ports
Channel
-------------------------------------------------------------------------------256
San-po256
FC
PCP
(U)
FC
fc1/26(P)
fc1/27(P)
N5K2(config-if)#
(10)
()
()
0 unknown class
()
()
0 unknown class
(10,20)
0 unknown class
N5K2(config-if)#
N5K2(config-if)#
N5K2(config-if)# sh flogi d
-------------------------------------------------------------------------------INTERFACE
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------fc1/32
10
0x520100
21:03:00:1b:32:64:5e:dc 20:03:00:1b:32:64:5e:dc
[FC-TARGET-SAN-A]
N5K2(config-if)#
fc1/3 is trunking
Hardware is Fibre Channel, SFP is short wave laser w/o OFC (SN)
Port WWN is 20:03:00:0d:ec:28:cf:00
Peer port WWN is 20:1c:54:7f:ee:79:13:40 Admin port mode is E, trunk mode is on
snmp link state traps are enabled Port mode is TE
Port vsan is 1
Speed is 2 Gbps
Transmit B2B Credit is 16
Receive B2B Credit is 255
Receive data field Size is 2112
Beacon is turned off
Trunk vsans (admin allowed and active) (10,20) Trunk vsans (up)
Trunk vsans (isolated)
()
()
0 unknown class
8 21:20:15 2013
MDS2(config)#
MDS2(config)# sh flog d
-------------------------------------------------------------------------------INTERFACE
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------fc1/7
20
0x620000
21:01:00:1b:32:24:5e:dc 20:01:00:1b:32:24:5e:dc
[FC-TARGET-SAN-B]
MDS2(config)#
(10,20)
fex 113
fcoe
vsan database
vsan 10 interface vfc113
interface vfc113
bind interface e113/1/1
switchport mode F
interface Ethernet113/1/1
switchport mode trunk
switchport trunk allowed vlan 10,120,125,130,135,200-201
spanning-tree port type edge trunk
N5K2:
fex 123
fcoe
vsan database
vsan 20 interface vfc123
interface vfc123
bind interface e123/1/1
switchport mode F
interface Ethernet123/1/1
switchport mode trunk
switchport trunk allowed vlan 20,120,125,130,135,200-201
spanning-tree port type edge trunk
Verification
N5K1(config-if)# sh flogi d
--------------------------------------------------------------------------------
INTERFACE
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------vfc113
10
0x510001
20:00:d4:8c:b5:bd:46:0e 10:00:d4:8c:b5:bd:46:0e
[ESXi3-A-fc0]
N5K1(config-if)#
N5K2(config-if)# sh flogi d
-------------------------------------------------------------------------------INTERFACE
VSAN
FCID
PORT NAME
NODE NAME
-------------------------------------------------------------------------------fc1/32
10
0x520100
21:03:00:1b:32:64:5e:dc 20:03:00:1b:32:64:5e:dc
[FC-TARGET-SAN-A]
vfc123
20
0x520004
20:00:d4:8c:b5:bd:46:0f 10:00:d4:8c:b5:bd:46:0f
[ESXi3-B-fc1]
N5K2(config-if)#
2.5 FCIP
Configuration
MDS1:
feature fcip
fcip profile 10
ip address 12.12.12.1
tcp max-bandwidth-mbps 1000 min-available-bandwidth-mbps 300
round-trip-time-us 300
fcip profile 20
ip address 12.12.12.5
tcp max-bandwidth-mbps 1000 min-available-bandwidth-mbps 300
tcp cwm burstsize 100
interface port-channel 50
channel mode active
round-trip-time-us 300
interface fcip10
use-profile 10
peer-info ipaddr 12.12.12.2
switchport mode E
channel-group 50 force
no shutdown
interface fcip20
use-profile 20
peer-info ipaddr 12.12.12.6
switchport mode E
channel-group 50 force
no shutdown
interface GigabitEthernet1/1
ip address 12.12.12.1 255.255.255.252
switchport mtu 3000
no shutdown
interface GigabitEthernet1/2
ip address 12.12.12.5 255.255.255.252
switchport mtu 3000
no shutdown
MDS2:
feature fcip
fcip profile 10
ip address 12.12.12.2
tcp max-bandwidth-mbps 1000 min-available-bandwidth-mbps 300
round-trip-time-us 300
fcip profile 20
ip address 12.12.12.6
tcp max-bandwidth-mbps 1000 min-available-bandwidth-mbps 300
tcp cwm burstsize 100
interface port-channel 50
round-trip-time-us 300
interface fcip10
use-profile 10
peer-info ipaddr 12.12.12.1
switchport mode E
channel-group 50 force
no shutdown
interface fcip20
use-profile 20
peer-info ipaddr 12.12.12.5
switchport mode E
channel-group 50 force
no shutdown
interface GigabitEthernet1/1
ip address 12.12.12.2 255.255.255.252
switchport mtu 3000
no shutdown
interface GigabitEthernet1/2
ip address 12.12.12.6 255.255.255.252
switchport mtu 3000
no shutdown
Verification
MDS1(config)# sh int fcip10 - 20
fcip10 is trunking
Hardware is GigabitEthernet
Port WWN is 20:10:00:0d:ec:4a:21:00
Peer port WWN is 20:10:00:0d:ec:28:cf:00
Admin port mode is E, trunk mode is on
snmp link state traps are enabled Port mode is TE
Port vsan is 1
Speed is 1 Gbps Belongs to port-channel 50
Trunk vsans (admin allowed and active) (10,20) Trunk vsans (up)
(10,20)
()
()
Using Profile id 10
(interface GigabitEthernet1/1)
Peer Information
fcip20 is trunking
Hardware is GigabitEthernet
Port WWN is 20:14:00:0d:ec:4a:21:00
Peer port WWN is 20:14:00:0d:ec:28:cf:00
Admin port mode is E, trunk mode is on
snmp link state traps are enabled Port mode is TE
Port vsan is 1
Speed is 1 Gbps Belongs to port-channel 50
Trunk vsans (admin allowed and active) (10,20) Trunk vsans (up)
Trunk vsans (isolated)
()
()
Using Profile id 20
(interface GigabitEthernet1/2)
Peer Information
MDS1(config)#
(10,20)
Interface
Total Ports
Oper Ports
-----------------------------------------------------------------------------port-channel 50
MDS1(config)#
MDS1(config)# sh int port-channel 50
port-channel 50 is trunking
Hardware is Fibre Channel
Port WWN is 24:32:00:0d:ec:4a:21:00
Admin port mode is E, trunk mode is on
snmp link state traps are enabled
Port mode is TE
Port vsan is 1
Speed is 2 Gbps
Trunk vsans (admin allowed and active) (10,20)
Trunk vsans (up)
(10,20)
()
()
MDS1(config)#
(10,20)
fcip10
()
()
Using Profile id 10
(interface GigabitEthernet1/1)
Peer Information
Peer Internet address is 12.12.12.1 and port is 3225
Write acceleration mode is configured off
Tape acceleration mode is configured off
Tape Accelerator flow control buffer size is automatic
FICON XRC EMulator mode is configured off
Ficon Tape acceleration configured off for all vsans
IP Compression is disabled
Maximum number of TCP connections is 2
QOS control code point is 0
QOS data code point is 0
TCP Connection Information
2 Active TCP connections
Control connection: Local 12.12.12.2:65532, Remote 12.12.12.1:3225
Data connection: Local 12.12.12.2:65534, Remote 12.12.12.1:3225
2 Attempts for active connections, 0 close of connections
TCP Parameters
Path MTU 3000 bytes
Current retransmission timeout is 200 ms
Round trip time: Smoothed 2 ms, Variance: 1 Jitter: 150 us
Advertized window: Current: 25 KB, Maximum: 25 KB, Scale: 4
Peer receive window: Current: 28 KB, Maximum: 30 KB, Scale: 4
Congestion window: Current: 100 KB, Slow start threshold: 790 KB
Current Send Buffer Size: 25 KB, Requested Send Buffer Size: 0 KB
CWM Burst Size: 100 KB
Measured RTT : 0 us Min RTT: 0 us Max RTT: 0 us
5 minutes input rate 4432 bits/sec, 554 bytes/sec, 2 frames/sec
5 minutes output rate 4680 bits/sec, 585 bytes/sec, 2 frames/sec
238440 frames input, 138435012 bytes
33018 Class F frames input, 3023464 bytes
205422 Class 2/3 frames input, 135411548 bytes
0 Reass frames
0 Error frames timestamp error 0
557350 frames output, 742568228 bytes
32742 Class F frames output, 3697768 bytes
524608 Class 2/3 frames output, 738870460 bytes
0 Error frames
fcip20 is trunking
Hardware is GigabitEthernet
Port WWN is 20:14:00:0d:ec:28:cf:00
Peer port WWN is 20:14:00:0d:ec:4a:21:00
Admin port mode is E, trunk mode is on
(10,20)
()
()
Using Profile id 20
(interface GigabitEthernet1/2)
Peer Information
Peer Internet address is 12.12.12.5 and port is 3225
Write acceleration mode is configured off
Tape acceleration mode is configured off
Tape Accelerator flow control buffer size is automatic
FICON XRC EMulator mode is configured off
Ficon Tape acceleration configured off for all vsans
IP Compression is disabled
Maximum number of TCP connections is 2
QOS control code point is 0
QOS data code point is 0
TCP Connection Information
2 Active TCP connections
Control connection: Local 12.12.12.6:3225, Remote 12.12.12.5:65532
Data connection: Local 12.12.12.6:3225, Remote 12.12.12.5:65534
0 Attempts for active connections, 0 close of connections
TCP Parameters
Path MTU 3000 bytes
Current retransmission timeout is 200 ms
Round trip time: Smoothed 2 ms, Variance: 1 Jitter: 150 us
Advertized window: Current: 25 KB, Maximum: 25 KB, Scale: 4
Peer receive window: Current: 28 KB, Maximum: 31 KB, Scale: 4
Congestion window: Current: 100 KB, Slow start threshold: 844 KB
Current Send Buffer Size: 25 KB, Requested Send Buffer Size: 0 KB
CWM Burst Size: 100 KB
Measured RTT : 0 us Min RTT: 0 us Max RTT: 0 us
5 minutes input rate 3160 bits/sec, 395 bytes/sec, 1 frames/sec
5 minutes output rate 864 bits/sec, 108 bytes/sec, 1 frames/sec
191971 frames input, 122641452 bytes
20 Class F frames input, 2296 bytes
191951 Class 2/3 frames input, 122639156 bytes
0 Reass frames
0 Error frames timestamp error 0
499649 frames output, 704764028 bytes
296 Class F frames output, 40560 bytes
499353 Class 2/3 frames output, 704723468 bytes
0 Error frames
Total Ports
Oper Ports
-----------------------------------------------------------------------------port-channel 50
fcip10
()
()
MDS2(config)#
2.6 Zoning
Configuration
MDS1:
(10,20)
device-alias database
device-alias name ESXi1-A-fc0 pwwn 20:aa:00:25:b5:01:01:01
device-alias name ESXi1-B-fc1 pwwn 20:aa:00:25:b5:01:01:02
device-alias name ESXi2-A-fc0 pwwn 20:bb:00:25:b5:01:01:01
device-alias name ESXi2-B-fc1 pwwn 20:bb:00:25:b5:01:01:02
device-alias name ESXi3-A-fc0 pwwn 20:00:d4:8c:b5:bd:46:0e
device-alias name ESXi3-B-fc1 pwwn 20:00:d4:8c:b5:bd:46:0f
device-alias name FC-TARGET-SAN-A pwwn 21:03:00:1b:32:64:5e:dc
device-alias name FC-TARGET-SAN-B pwwn 21:01:00:1b:32:24:5e:dc
device-alias commit
[ESXi1-A-fc0]
member pwwn 20:bb:00:25:b5:01:01:01
[ESXi2-A-fc0]
member pwwn 20:00:d4:8c:b5:bd:46:0e
[ESXi3-A-fc0]
member pwwn 21:03:00:1b:32:64:5e:dc
[FC-TARGET-SAN-A]
[ESXi1-B-fc1]
member pwwn 20:bb:00:25:b5:01:01:02
[ESXi2-B-fc1]
member pwwn 20:00:d4:8c:b5:bd:46:0f
[ESXi3-B-fc1]
member pwwn 21:01:00:1b:32:24:5e:dc
[FC-TARGET-SAN-B]
member ZONE-B
N5K1:
Verification
MDS1(config)# sh zoneset active
zoneset name ZoneSet_VSAN10 vsan 10
zone name ZONE-A vsan 10
* fcid 0x610002 [pwwn 20:aa:00:25:b5:01:01:01] [ESXi1-A-fc0]
* fcid 0x610003 [pwwn 20:bb:00:25:b5:01:01:01] [ESXi2-A-fc0]
* fcid 0x510001 [pwwn 20:00:d4:8c:b5:bd:46:0e] [ESXi3-A-fc0]
* fcid 0x520100 [pwwn 21:03:00:1b:32:64:5e:dc] [FC-TARGET-SAN-A]
3. Unified Computing
3.1 UCS Initialization
Configuration
UCS-FI-A:
Enter the configuration method. (console/gui) ?console
Enter the setup mode; setup newly or restore from backup. (setup/restore) ?setup
You have chosen to setup a new Fabric interconnect. Continue? (y/n):y
Enforce strong password? (y/n) [y]:y
Enter the password for "admin":Cciedc01
Confirm the password for "admin":Cciedc01
Is this Fabric interconnect part of a cluster(select 'no' for standalone)? (yes/no) [n]:yes
Enter the switch fabric (A/B) []:A
Enter the system name:UCS-FI
Physical Switch Mgmt0 IPv4 address :192.168.101.201
Physical Switch Mgmt0 IPv4 netmask :255.255.255.0
IPv4 address of the default gateway :192.168.101.1
Cluster IPv4 address :192.168.101.200
Switch Fabric=A
System Name=UCS-FI
Enforced Strong Password=yes
Physical Switch Mgmt0 IP Address=192.168.101.201
Physical Switch Mgmt0 IP Netmask=255.255.255.0
Default Gateway=192.168.101.1
Cluster Enabled=yes
Cluster IP Address=192.168.101.200
NOTE: Cluster IP will be configured only after both Fabric Interconnects are initialized
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no):yes
Configuration file - Ok
UCS-FI-B:
Enter the configuration method. (console/gui) ?console
Installer has detected the presence of a peer Fabric interconnect. This Fabric interconnect will be added to the c
y
Enter the admin password of the peer Fabric interconnect:Cciedc01
Connecting to peer Fabric interconnect... done
Retrieving config from peer Fabric interconnect... done
Peer Fabric interconnect Mgmt0 IP Address: 192.168.101.201
Peer Fabric interconnect Mgmt0 IP Netmask: 255.255.255.0
Cluster IP address
: 192.168.101.200
Apply and save the configuration (select 'no' if you want to re-enter)? (yes/no):yes
Configuration file - Ok
Click Yes.
Slide the slider to the right to just under port 27/28, as shown in the diagram. When
you click Finish, the FI will reboot.
Click Yes.
After the FIs both return to an UP state, on FI-A click SAN Uplinks Manager.
On FI-A, disable port 31, and do the same for port 32.
On FI-B, disable port 29, and do the same for ports 30-32
Note that both ports now show up, assuming that the MDS1 was configured properly
before in F mode.
Note that both ports now show up, assuming that the MDS1 was configured properly
before in F mode.
Fill in the information as shown below for VLAN 120, and repeat for the rest of the
VLANs.
To configure the links from the FIs to the FEX/IOMs, click the Equipment tab, click
Equipment category on left, click the Policies tab, click the Global Policies tab,
and choose Port Channel.
Back on FI-A, Unconfigured Ethernet Ports, choose ports 1 and 2, right-click, and
change them to Server Ports.
Click Yes.
Choose port 11 and Configure as Uplink for your BACKUP VLAN port. Do the
same for ports 8 and 11 on FI-B.
vem 4 hosttype
N1Kv(config)#
policy-map
vmware
shqos
modMod
id
SetCoS4
625366c3-3bc9-e211-0001-00000000010evem
Ports
class
Module-Type
class-default
set cos 4port-profile
5 host
Model
vmware
type
idethernet
625366c3-3bc9-e211-0001-00000000010f
Status--vMotion_UPLINK
----- policy-map
-----------------------SetCoS4
Back
215
It
218
M
R
VLANs
VLAN
Port
BACKUP
Interface
Do
Fabric
Everything
Enable
Best
Navigator
Show
1Gbps
UP
Local
The
Admin
U
Create
Change
FLOGI
Note
IExpert
eth0
eth1
eth3
D
eth4
.Repeat
Things
Next
Down
Assign
Choose
Management
Pooled
S
Yes
Note
Before
Fill
E
From
fc0
fc1
SAN
Save
Repeat
vHBA
,Change
OK
VMWare
We
Servers
Threshold
F
C
vNIC
O
Add
So
T
Finish
Click
Assign
ESXi1
ESXi2
If
On
LAN
Create
N
Host
.A
Full
eth2
ESX1
ESX2
class
UI
MPORTANT:
(obscured
tab.
at
class.
tab,
to
on
and
service
but
If
Click
and
change
boot
ill
hings
elect
nter
ssign
ight-click
o
se
ouble-click
ote
lick
hoose
ame
ur
ove
should
you
configure
3.
you
add
be
the
((3,000,000,000
in
for
the
left
the
both
won't
calculation
Backup
results
the
SAN
to
then
Select
this
to
right-click
click
Channel
Boot
Pin
itto
on
that
Effort
that
Control
in
click
Stats
the
as
Changes
port
change
pulled
the
to
Disk
itInterface
Manager
150
fc0
fc1
that
Blade
one
bottom
going
same
we
A
B
should
this
the
your
to
do
Retries
right,
itleft,
Port
UUID
MAC
WWNN
Block
Service
Maintenance
BIOS
SAN
a
Threshold
QoS
the
VLAN
Primary
Secondary
for
the
Later
and
profiles.
UUIDs
to
blade
the
this
the
service
World
Service
shown
use
appear
time
as
the
ESXi
should
Group
Local
Clone
newly
itchange
name.
add
11
8
server.
the
VLAN
Boot
this
not
8do
configure
the
port.
new
should
in
you
Policies
newly
should
should
LAN
all
Config
proper
Equipment
a
Fibre
over
for
VLAN
Channel
change
Policy
from
Pin
storage,
jumbo
and
1.
through
Pool
thing
for
this
Suffix
Policy
anything
from
the
device
itfill
IP
of
right
If
2.
215
look
other
port
step
5.1
the
just
pool.
is:
Pool
Wide
QoS
to
below
below.
cloned
Disk
for
Target
Profile
you
profiles
boot.
the
port
Uplinks
up
150
this
After
IP
Address
Group
and
Profile
click
picture),
this,
created
VLANs
Channel
create
Delta
look
should
find
service
for
look
Policy
the
uses
channel
port
like
when
created.
Addresses
frames
ifis
/8)
VLANs
Pool
accidentally
LAN
policy
11
in,
from
Config
association.
upstream
and
Port
Policy
click
the
you
to
but
completely
the
with
*service
like
this
tab,
like
channel
(expert)
the
on
=
a60)
Manager...
create
Association
finished.
allowed
connectivity
rest
threshold
boot.
choose
we
((Gbps/8)*SamplingInterval)
1Gbps
which
and
profile
have
proper
Name
Adapter
this
with
to
FI-B.
when
service
this.
and
system
on
Click
for
Policy
need
of
choose
profile,
the
Server
when
Nexus
the
an
enable
clicked
ID
to
the
Then
select
completed.
link,
on
boot
the
right,
optional
MTU
from
boot.
profiles,
to
rising
Policy
will
policy
VLANs
each
finished.
WWNN
know
as
so
expand
1,
is
they
to
LUN
still
the
it.before:
and
of
configured
that
we
value
from
to
of
9000.
assign
BACKUP
should
that
let's
ifand
vNIC
need
click
the
Click
the
your
pool
the
this
of
itclick
port
service
blade
is
22,500,000,000
vHBAs,
CoS
to
previously
upstream
both
window.
prperly
60
go
channel
VLAN
has
seconds
3appear
into
profiles
and
right-click
a
from
(150),
(You
the
zoning
service
created.
but
be associated
to
before.Again,
put
again
may
because
GB/Hr.
calculate
was
in
profile
have
the
from
completed
proper
of
to
association,
opted
our
the
the
the
click
value
disjointed
802.1Qbb
blades
toproperly.
dointhis
and
our
one
L2
before
PFC
vNIC
that
atuplinks,
aitlane.
time,
Thresho
is
beginni
curre
you
an
Configuration
Verification
3.4
3.5
3.6
3.7
3.8
4.1
4.2
Disk Policies
Pools
Service
Cloning
Traffic
VSM
N1Kv
and
QoS
Monitoring
Profiles
Service
VEM
Connectivity
Profiles
4. Data
Center
Virtualization