Вы находитесь на странице: 1из 274

G

Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l
Implementing the Cisco
Nexus 1000V (DCNX1K)
v2.0 Lab Guide
L5557C-001

December 2012

For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l
For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l
Implementing the Cisco Nexus 1000V
(DCNX1K) v2.0 Lab Guide
L5557C-001

December 2012

For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Copyright Information
Copyright 2012 by Global Knowledge Training LLC

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

The following publication, Implementing the Cisco Nexus 1000V (DCNX1K) v2.0 Lab Guide, is a Cisco Systems, Inc.
derivative work developed by Global Knowledge Training LLC. All rights reserved. No part of this publication may be
reproduced or distributed in any form or by any means without the prior written permission of the copyright holder.
Products and company names are the trademarks, registered trademarks, and service marks of their respective owners.

Global Knowledge Project Team


CARLY STOUGHTON
ERIC STRAUSE
JENNIFER SCOTT

9000 Regency Parkway


Cary, North Carolina 27518
Phone: 919-461-8600
1-800-COURSES
Fax: 919-461-8646
www.globalknowledge.com

Course Director
Product Director, Cisco Product Management
WW Product Manager, Cisco Products & Services

Printed in Canada

For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Table of Contents
Lab 0: Global Knowledge Remote Labs .................................................................. L0-1
Lab 1: Set Up the VMware vSphere Environment................................................... L1-1
Lab 2: Install and Configure the Cisco Nexus 1000V VSMs .................................. L2-1

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Lab 3: Install and Configure the Cisco Nexus 1000V VEMs .................................. L3-1
Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM .................................... L4-1
Lab 5: Optimize the Cisco Nexus 1000V Implementation ...................................... L5-1

Lab 6: Configuring Security Features ...................................................................... L6-1

Lab 7: Configuring Quality of Service ..................................................................... L7-1

Lab 8: Configuring Management Features ............................................................... L8-1

Lab 9: Configuring SPAN and ERSPAN ................................................................. L9-1

Global Knowledge Training LLC

TOC-1

For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Table of Contents

TOC-2

Global Knowledge Training LLC

For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L0
Global Knowledge Remote Labs
The purpose of this lab is to introduce you to the Global Knowledge Remote Labs
Environment used for this course.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L0-1

Lab 0: Global Knowledge Remote Labs

Activity Objectives
In this activity, you will be introduced to the Global Knowledge Remote Labs environment
and the labs contained in this course. You will familiarize yourself with the interface and
devices.
After completing this activity, you will be able to meet these objectives:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Understand the labs in the course and IP addressing scheme used


Login to the Global Knowledge Remote Labs environment

Become familiar with the lab topology and access all devices

Outline

This lab guide includes the following activities:


Lab 0: Global Knowledge Remote Labs

Lab 1: Set Up the VMware vSphere Environment

Lab 2: Install and Configure the Cisco Nexus 1000V VSMs

Lab 3: Install and Configure the Cisco Nexus 1000V VEMs


Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

Lab 5: Optimizing the Cisco Nexus 1000V Implementation


Lab 6: Configuring Security Features

Lab 7: Configuring Quality of Service

Lab 8: Configuring Management Features

Lab 9: Configuring SPAN and ERSPAN

L0-2

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 0: Global Knowledge Remote Labs

Visual Objective

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

The figure portrays the Global Knowledge DCNX1KV v2.0 lab topology you will be
accessing. Each pod (team of two students) will have three dedicated servers: a server
dedicated for VMware vCenter Server 5.0 and two VMware ESXi 5.0 hosts. Each pod will
leverage shared networking and storage.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L0-3

Lab 0: Global Knowledge Remote Labs

Lab IP Address and VLAN Scheme


This table lists the IP addresses and VLANs used in the Lab Topology.
Device

Interface

IP address

Mask

VLAN

vCenter Server

Management

10.0.1.50

/24

Production

10.0.14.50

/24

14

Management

10.0.1.1

/24

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

ESXi 1 Host

vMotion/Storage

10.0.11.1

/24

11

Management

10.0.1.2

/24

vMotion/Storage

10.0.11.2

/24

11

iSCSI Array

vMotion/Storage

10.0.11.99

/24

11

N1000V-VSM

Management

10.0.1.200

/24

Control

12

Packet

13

WinServer-1

Production

10.0.14.1

/24

14

WinServer-2

Production

10.0.14.2

/24

14

WinServer-3

Production

10.0.14.3

/24

14

ESXi 2 Host

L0-4

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 0: Global Knowledge Remote Labs

Required Resources
These are the resources and equipment that are required to complete this activity:
A computer with an Internet connection, a web browser, and Remote Desktop.
Lab logins assigned by your instructor.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:
Note

The Global Knowledge Remote Labs environment is accessed via a web browser.
Each pod (team of two) will have a unique login, which will grant access to the
equipment assigned to your pod.

1.

Examine the lab topology diagram in the Visual Objective of this lab to familiarize
yourself with the environment before we login.

2.

Your instructor will provide the credentials necessary to log into Global Knowledge
Remote Labs. Write them down here for your reference:

There is also a tear-out topology diagram as the last page of the lab guide where you can
note your username and password. This page also contains logins and IP addresses for all
lab devices you may need to reference throughout the labs.
Username

Note

3.

Password

When troubleshooting with your instructor you will need to provide them with your
pod number, and possibly your credentials.

From the classroom computer (or your own computer), launch a web browser. Navigate to
the following URL:
http://www.remotelabs.com/

Note

You can access Remote Labs from the classroom, and also from home/hotel using
the same steps outlined in this lab. For the duration of this class you will have 24hour access to your equipment.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L0-5

Lab 0: Global Knowledge Remote Labs


Note

You should see the Global Knowledge Live Labs login screen.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

4.

While at a Global Knowledge training center, you will need a wired Internet
connection to access www.remotelabs.com. You cannot connect to the site using
Global Knowledges wireless network.

5.

Log in using the credentials provided to you by your instructor. Click >Log In.

6.

Accept any terms and conditions and close any dialog boxes that appear.

7.

You should see the Live Labs start page when you have successfully logged in.

L0-6

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Lab 0: Global Knowledge Remote Labs

8.

In the upper left-hand side of the Live Labs page there is a countdown timer. This timer
indicates the amount time remaining in your lab reservation and will provide ample time to
complete the labs. Review the time you have left in your pod for the week.

9.

Expand + Pod P (where P is your pod number) so you can view information about your
pod and its initial setup. DO NOT use the Reset To link.

10. The Topology link is how you connect to your Lab Topology. This is the only link you
should click in this menu.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L0-7

Lab 0: Global Knowledge Remote Labs

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

11. Click the Topology link. This will open an RDP session to the Remote Labs equipment.
Click Open to launch the RDP session, trust connections to the server, and dismiss all other
dialog boxes.

L0-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Lab 0: Global Knowledge Remote Labs

Note

Both students in a single team can log in to the Topology at the same time. One
student can type the commands for a given lab, while the other student shadows on
their own computer.

12. If prompted, click your username and again enter the password provided by your instructor
in Step 2, and then click the arrow or hit Enter to login.

13. Once the Remote Desktop window opens, you will see the Remote Lab Panel, with the
Lab Topology tab open. You should see a picture of the Remote Labs topology.

14. There are several clickable icons in the Lab Topology. This is how you will access your
lab devices. Clicking an icon will open a new tab.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L0-9

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Lab 0: Global Knowledge Remote Labs

15. First, you will connect to the vCenter Server host. Click on the icon labeled vCenter
Server.

16. If you are not automatically logged into the server, click the Ctrl Alt Del icon in the
right-hand bar to login to the server.

L0-10

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 0: Global Knowledge Remote Labs

17. Click the Administrator user, and enter the password cisco123.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

This will open a session to a Windows Server system with a number of applications on the
desktop. This is where you will later install vCenter Server and perform most of the lab
configuration.

18. Go back to the Lab Topology tab at the top of the RDP window.

19. Next, click on the ESXi 1 host 10.0.1.1. Verify you see the following screen.

20. Last, click on the ESXi 2 host 10.0.1.2. Verify you see the same screen.

21. You have successfully connected to Global Knowledge Remote Labs!


Global Knowledge Training LLC
For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L0-11

Lab 0: Global Knowledge Remote Labs

Activity Verification
You have completed this task when you attain these results:
Understand all the devices and the lab IP addressing scheme
Logged into Global Knowledge Remote Labs using the credentials supplied by your
instructor.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Verified connectivity to vCenter Server and both ESXi hosts.

L0-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L1
Set Up the VMware vSphere
Environment

Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-1

Lab 1: Set Up the VMware vSphere Environment

Activity Objective
In this activity, you will install VMware vCenter Server on your server and configure it to
manage your ESXi hosts. After performing this lab, you should be able to do the following:
Install vCenter Server and the vSphere Client to manage your VMware environment.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Login to vCenter Server via the vSphere Client, create a data center, and add your ESXi
hosts to the data center.

View the default VMware vNetwork standard switches on your ESXi hosts.
Configure access to an iSCSI datastore.

Modify a virtual machine port group on vSwitch0.

Add a pre-configured Windows virtual machine, and connect the VMs vNICs to
vSwitch0 on the ESXi host.

Clone the first virtual machine and place the new VM on the seconds ESXi host.

Verify connectivity between the two virtual machines.

Required Resources

These are the resources and equipment required for each pod to complete this activity:

Two VMware ESXi 5 hosts

One server to install VMware vCenter 5 and vSphere Client 5 onto

All pods share the following lab core devices:


One switch for server networking
One iSCSI-based storage device

Job Aids

These job aids are available to help you complete the lab activity:
Appendix A: Answer Key
Lab Topology diagram

Tear-Out reference (last page of this lab guide)

L1-2

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

Task 1: Install vCenter Server


In this task, you will install vCenter Server 5 on your server in order to manage your ESXi
5 hosts.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


1.

From your vCenter Server machine, open the folder with the name VMware VIM 5.0.0
from your desktop and double-click on the autorun.exe application.

2.

The VMware vCenter Installer will open. Click vCenter Server, and then click Install.

3.

Accept the default language of English by clicking OK.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-3

Lab 1: Set Up the VMware vSphere Environment

Wait for the VMware vCenter installation window to start. You will have to wait for the
Microsoft C++ and .NET Framework to install.

5.

Click Next when you can.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

4.

6.

L1-4

Click Next to the End-User Patent Agreement.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

Click I agree to the terms in the license agreement and then click Next.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

7.

8.

Enter customer information and leave the License Key field blank, and then click Next.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-5

Lab 1: Set Up the VMware vSphere Environment

Accept the default Install a Microsoft SQL Server 2008 Express instance selection and
click Next. Click Yes on the pop up window.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

9.

Note

L1-6

Microsoft SQL Server 2008 Express is included with vCenter Server and is intended
for small deployments, including labs. Production-scale VMware deployments should
create a separate database first, and then install vCenter Server and point it to the
database DSN (Data Soure Name).

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

10. Accept the default SYSTEM account, and ensure the fully qualified domain name is listed
as LAB-VCENTER, and then click Next.

11. Click Okay to acknowledge if the fully qualified domain name cannot be resolved.
12. Accept the default installation folders and click Next.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-7

Lab 1: Set Up the VMware vSphere Environment

13. Accept the default to create a standalone instance of vCenter Server and click Next.
VMware vCenter Linked Mode allows you to view the inventory of multiple instances
of vCenter Server from a single vSphere Client session. You will only use a single
instance of vCenter Server.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

L1-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

14. Accept the default port numbers and click Next.

15. Accept the default Inventory Service ports.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-9

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

16. Accept the default JVM (Java Virtual Machine) memory size and click Next.

17. Click Install.

L1-10

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment


Note

The installation will take 20-30 minutes to complete. Kick off the installation, and then
take a break!

18. When the installation has completed, click Finish.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

19. Return to the vCenter Installer wizard. Click vSphere Client, and then click Install to
install the client application used to access vCenter Server.

20. Accept the default language of English by clicking OK. The install wizard will start.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-11

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

21. Click Next to begin the vSphere Client installation.

22. Click Next to accept the End-User Patent Agreement.

23. Click I agree to the terms in the license agreement to accept the EULA, and then click
Next.
24. Enter user Cisco and organization Cisco Systems, and then click Next.
25. Leave the default Destination Folder. Click Next.

26. Click Install. The install process will take approximately 5-10 minutes.
27. Click Finish when the installation has completed.

28. Click Exit on the VMware vSphere Installer page.

Activity Verification

You have completed this task when you attain these results:
Installed vCenter Server 5.0

Installed the vSphere Client 5.0 application

L1-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

Task 2: Create a Data Center and Add ESXi Hosts


In this task, you will create a new data center using vCenter Server and add two ESXi hosts
to the data center.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


29. Double-click the VMware vSphere Client on your desktop. Keep localhost in the IP
address / Name field and click the Use Windows Session Credentials checkbox. Click
Login.
Note

Since you are using the vSphere Client on the same physical server vCenter Server
is installed on, and your account has the same credentials as your Windows session,
you can connect to localhost using your Windows session credentials.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-13

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

30. If you receive a warning, click the Install this certificate checkbox and then click
Ignore.

31. Click OK. You are using the VMware evaluation license, which is valid for 60 days.

L1-14

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

32. Right-click your vCenter Server instance in the left-hand inventory pane and click New
Datacenter.

33. Name your data center Lab-Datacenter.

34. Right-click your data center and choose Add Host.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-15

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

35. Enter the first ESXi hosts IP address 10.0.1.1. Enter the username root and the password
cisco123.

36. Click Yes to trust the host.

L1-16

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

37. Click Next to proceed.

38. Click Next to use evaluation mode.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-17

Lab 1: Set Up the VMware vSphere Environment

39. Click Next. Do not enable lockdown mode.


Lockdown Mode is a feature that denies remote root user access to the ESXi host.
Lockdown Mode can be enabled and disabled at any point from vCenter Server. You
will not leverage this feature in the lab.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

L1-18

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

40. Click Next to place this host in your newly-created datacenter.

41. Click Finish to add the host to your datacenter.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-19

Lab 1: Set Up the VMware vSphere Environment

42. Repeat Steps 34 to 41 to add a second ESXi host with IP address 10.0.1.2. Enter the same
username root and password cisco123.
43. Note the progress on the Recent Tasks pane on the bottom. Confirm both ESXi hosts
appear under Lab-Datacenter.

Activity Verification

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

You have completed this task when you attain these results:
Created a datacenter and added two ESXi hosts using the vSphere Client, connected to
vCenter Server.

L1-20

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

Task 3: View the vNetwork Standard Switch


Configuration
In this task, you will use the VMware vSphere Client to view the default virtual network
configuration on your ESXi hosts.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

44. Using the navigation bar, navigate to the Hosts and Clusters inventory view Home >
Inventory > Hosts and Clusters, or use the shortcut Ctrl-Shift-H.
Note

There are shortcuts for each inventory view in vCenter Server. Each inventory view
controls what is visible in the left-land inventory pane.

Note

Use Ctrl-Shift-H for Hosts and Clusters, Ctrl-Shift-V for VMs and Templates,
Ctrl-Shift-N for Networking, or Ctrl-Shift-D for Datastores and Datastore
Clusters.

45. If necessary, maximize the inventory view and select your first ESXi host 10.0.1.1, then
click the Configuration tab.

46. In the Hardware section, click the Networking link. A vNetwork standard switch
vSwitch0 is created by default when the Global Knowledge labs team installed ESXi
during the course setup procedure. On vSwitch0 you should see a VMkernel port, a Virtual
Machine port group, and a physical NIC (Network Interface Card) uplink adapter, labeled
as vnmnic0.
Note

VMkernel ports are used to provide an IP stack to the VMware Hypervisor. They are
used for management, vMotion, Fault Tolerance, and IP-based storage like iSCSI
and NAS.

Note

The VMkernel port created by default is assigned the management IP address of the
ESXi server. This IP address was assigned upon initial configuration of the server by
the labs team. This port is named Management Network by default.

Note

Virtual Machine port groups connect Virtual Machine vNICs to the vSwitch, just like a
regular NIC would connect to a switchport. The VM port group named VM Network
is created by default. Currently, there are no virtual machines (VM) connected to it.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-21

Lab 1: Set Up the VMware vSphere Environment


The left side of vSwitch0 is virtual, and the right side of vSwitch0 is physical. You
should see one physical NIC (vmnic0) connected to vSwitch0. VMware enumerates
physical NIC ports as vmnic0, vmnic1, and so on. vmnics are physical adapters
despite the v in the naming convention.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

47. Now select your second ESXi host 10.0.1.2 in the left-hand inventory pane. Double check
that there is also a vSwitch0 that contains a similar configuration.
Note

vSwitch0 is what is called a standard virtual switch. Standard vSwitches must be


configured on each and every host (their configuration is not shared), and are limited
in their feature set. The Nexus 1000V is a distributed virtual switch, which permits
for a single point of network management, clear delineation of network and server
responsibility, VM policy mobility, and a much richer feature set closer to that of a
physical Ethernet switch.

Activity Verification

You have completed this task when you attain these results:

Viewed the configuration of vSwitch0 on both of your ESXi hosts.

L1-22

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

Task 4: Connect to iSCSI-Based Storage


In this task, you will configure both of your ESXi hosts to access iSCSI-connected storage
over the network.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

First, you will create a new VMkernel port on vSwitch0 and assign it an IP address on the
same subnet as the iSCSI storage target. As a best practice, iSCSI traffic should not be
routed, and it should run over a dedicated storage network (preferably physical separate,
otherwise logically separated using VLANs).

Second, you will enable the iSCSI software initiator process in the VMkernel Hypervisor.
You must use the software initiator since you dont have a dedicated iSCSI HBA you are
using a standard Ethernet NIC, so the VMkernel Hypervisor must handle the iSCSI/TCP
encapsulation and processing.

Third, you will verify storage visibility. You will also rename your local storage datastores.

Activity Procedure
Complete these steps:

48. Ensure you are in the Hosts and Clusters inventory view. Click on your first ESXi host.

49. Click the Configuration tab, and then click Networking under the Hardware pane.

50. Next to vSwitch0, click the Properties link.

51. Click the Add button to add another network to vSwitch0.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-23

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

52. The Add Network Wizard will appear. Select VMkernel as the new connection type, and
then click Next. You will use this port to connect to iSCSI storage.

L1-24

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

53. In the Network Label field, name the VMkernel port vMotion/Storage. Be sure to enter
this Network Label exactly the same on both ESXi hosts.
Enter VLAN 11 under the VLAN ID (Optional) field for both ESXi hosts. Note that the
pull-down menu wont show your VLAN, but you can still manually type in 11 as the
VLAN ID.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Check the box to Use this port group for vMotion. You will use the port for both IP
storage (iSCSI) and later, vMotion traffic.
Click Next to continue.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-25

Lab 1: Set Up the VMware vSphere Environment

54. Assign an IP address and subnet mask to the VMkernel port.


For your first server use IP address 10.0.11.1 as shown in the provided screen shot.
For your second server use IP address 10.0.11.2.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Use subnet mask 255.255.255.0 (/24) for both servers. Do not modify the VMkernel
Default Gateway. Click Next.

L1-26

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

55. Verify the VMkernel port configuration, and then click Finish to complete.

56. Click Close to close the vSwitch0 Properties window.

57. Now that you have a VMkernel port that can talk to the iSCSI storage target in VLAN 11,
you will enable the iSCSI software adapter to speak iSCSI over this network.

58. Under the Configuration tab, select Storage Adapters under the Hardware pane.
Click the Add link to add a new software storage adapter.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-27

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

59. Leave Add Software iSCSI Adapter selected, and then click OK. Click OK to dismiss
the notification.

60. Click the newly created iSCSI software adapter on top of the Storage Adapters pane, and
then click the Properties link on the lower Details pane.

L1-28

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

61. Click the General tab, and then click the Configure button.

62. Ensure the Enabled checkbox is clicked. Enter an (optional) iSCSI Alias of SW-Init-1 for
your first server as shown below, and then SW-Init-2 for your second server. Click OK.
Leave the iSCSI Name as it appears.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-29

Lab 1: Set Up the VMware vSphere Environment

63. Now that the iSCSI software initiator has been enabled, you can connect to iSCSI storage.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Click the Dynamic Discovery tab then click Add to connect to a storage target.

L1-30

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

64. Enter IP address 10.0.11.99 as the iSCSI server to connect to. Leave the default iSCSI
Port, click OK, and then click Close to return to the main vCenter screen.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

This IP may already be populated on your second ESXi host.

65. You may be prompted to rescan the host bus adapter. If so, select Yes. The rescan will
connect to the iSCSI array over the storage network and discover any available LUNs
(Logical Unit Numbers) and/or datastores. If you are not prompted to rescan, click the
Rescan All... link in the top right-hand side of the Storage Adapters pane, and press OK.
Note the event in the lower Recent Tasks pane.

66. Under the Hardware pane click Storage.

Verify a new datastore called ISCSIVMFS appears in the lists of available datastores.
You may have to click Rescan All... again if the datastore doesnt appear.

There should also be a datastore called datastore1 this is the local hard drive inside the
ESXi host.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-31

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

67. Right-click on datastore1 and select Rename. On your first host, name this datastore
local1. On your second host, name this datastore local2.

68. Repeat all of Task 4 for your second ESXi server, 10.0.1.2. When you create the VMkernel
port for IP storage for this server, use IP address 10.0.11.2/24. Connect to the same iSCSI
storage target.

Activity Verification

You have completed this task when you attain these results:

You have connected your two ESXi hosts to iSCSI-based storage, and the ISCSIVMFS
datastore is visible to both hosts.

L1-32

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

Task 5: Modify a Virtual Machine Port Group on


vSwitch0
In this task, you will rename the default virtual machine port group on vSwitch0, and
assign its ports to a VLAN on both ESXi hosts.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

69. Using the navigation bar, navigate to the Hosts and Clusters inventory view Home >
Inventory > Hosts and Clusters, or use the shortcut Ctrl-Shift-H.

70. Select your first ESXi host 10.0.1.1, and then click the Configuration tab.
71. In the Hardware pane, click the Networking link.

72. Click the Properties link next to vSwitch0.

73. Click the network called VM Network, and then click Edit
Note

VM Network is the default virtual machine port group created when ESXi is installed.
As a best practice, this port group should be renamed.

74. Under the General tab, enter the Network Label Production, overwriting the existing
name. Enter VLAN ID 14, click OK, and then click Close.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-33

Lab 1: Set Up the VMware vSphere Environment

75. Click Finish and Close. Repeat all of Task 5 on your second ESXi host. Verify the virtual
machine port group was successfully modified. Your vSwitch configuration should match
the provided screenshots one shown for each host.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

ESXi Host 1 (10.0.1.1):

ESXi Host 2 (10.0.1.2):

Activity Verification

You have completed this task when you attain these results:

Modified a virtual machine port groups name and VLAN assignment on vSwitch0 of
both ESXi hosts.

L1-34

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

Task 6: Add Virtual Machines to the vCenter


Server Inventory
In this task, you will add Windows virtual machines to the vCenter Server inventory to be
used as production VMs in later labs.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

76. Navigate to the Datastore inventory view by clicking Inventory > Datastores, or using
the shortcut Ctrl-Shift-D.
Expand your vCenter and Datacenter icons until you see your datastores listed in the
inventory pane.

77. Right-click on the ISCSIVMFS datastore in the inventory pane, and select Browse
Datastore...

78. In the Datastore Browser window, double-click the WinServer-1 folder. Locate the
WinServer-1.vmx file, right-click it, and then choose Add to Inventory.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-35

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

79. Leave the name WinServer-1 and then click Next.

80. Select your first ESXi host 10.0.1.1 as the destination for the VM and click Next.

L1-36

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

81. Click Finish and close the Datastore Browser window.

82. Navigate to Inventory > Hosts and Clusters, or use the shortcut Ctrl-Shift-H.

83. Expand host 10.0.1.1 and right-click the newly imported virtual machine WinServer-1,
and then select Edit Settings.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-37

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

84. Click Network Adapter 1 in the hardware list. On the right-hand side, click the Network
label dropdown and select the newly named Production virtual machine port group (if it is
not already selected). Click OK.

L1-38

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

85. Right-click the WinServer-1 VM in the inventory pane and click Open Console.

86. Click the green Power On icon.

87. If you are prompted, choose I moved it and click OK.

VMware asks this since you imported an existing VM, instead of creating a new one.

88. After Windows boots, in the menu bar of the console, click VM > Guest > Send
Ctrl+Alt+Del (if you do not see the login screen).

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-39

Lab 1: Set Up the VMware vSphere Environment

89. Log in with username administrator and password cisco123.


90. From within the Windows VM console window, click Start > Settings > Network
Connections.
If you see more than one network connection listed, you are likely looking at your
remote PC desktop. Make sure that you are clicking the Start button within the
Windows VM console window.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

91. Right-click the Local Area Connection and click Properties.

92. Select Internet Protocol (TCP/IP) and then click the Properties button.

L1-40

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

93. Ensure the IP address is 10.0.14.1 with a mask of 255.255.255.0, and no default gateway.
Correct the IP address/mask if necessary, and then click OK.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Select Show icon in notification area when connected. Click OK. Then close the
Network Connections window.

94. Next, confirm the Windows Firewall service is off so you can use ping to test VM-to-VM
connectivity once you create more VMs.
From within the VM console, click Start > Settings > Control Panel.

95. Double-click the Windows Firewall icon.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-41

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

96. Ensure Off is selected. Click OK.

97. Close the Control Panel window and return to the vSphere Client.

Activity Verification

You have completed this task when you attain these results:

Added a Windows virtual machine to the vCenter Server inventory

Connected the virtual machines vNIC to the Production virtual machine port group on
vSwitch0

Configured the IP address and subnet mask on the vNIC inside the virtual machine

L1-42

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

Task 7: Clone a Virtual Machine and Verify


Connectivity
In this task, you will clone (make an identical copy of) the Windows VM imported in the
previous task called WinServer-1, which is running on your first ESXi host. Place the
cloned VM, which will be called WinServer-2, on your second ESXi host.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

98. Ensure you are in the Hosts and Clusters inventory view or use the shortcut Ctrl-Shift-H.

99. Right-click the WinServer-1 VM and click Clone.

100. Enter the name WinServer-2 and click Next.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-43

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

101. Choose your second ESXi host 10.0.1.2 and click Next.

102. Choose the iSCSI datastore ISCSIVMFS as the destination for the VMs files. Click Next.

L1-44

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment


Being able to change the format of a cloned VMs hard disk is a significant benefit of
the VMware cloning feature. The source VM can remain powered on and
uninterrupted during the cloning process.

Note

VM disks (represented as .vmdk files) can be thick provisioned, which means the
space allocated to a VMs hard drive is shown as used on the datastore, whether
there is anything written to it or not. Alternately, a VM disk can be thin provisioned,
which leaves the unused space free for other VMs to use until the VM requests more
space to write to.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

103. On the Guest Customization page click Power on this virtual machine after creation,
and then click Next.

Note

If a VMware administrator wanted to have the ability to customize rollouts of multiple


similar virtual machines while customizing their identities before they were powered
on, Microsoft sysprep or a comparable customization tool could be loaded into
vCenter Server for this purpose.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-45

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

104. Select Power on this virtual machine after creation, verify the clone settings, and then
click Finish.

105. Monitor the progress of the cloning task by viewing the Recent Tasks pane at the bottom
of the vSphere Client window. This task may take several minutes to complete.

106. The cloned virtual machine, WinServer-2 should now appear in the Hosts and Clusters
inventory view under ESXi host 10.0.1.2 (you may need to expand the host to see the VM
once the cloning process is complete).
Note

L1-46

You can also view virtual machines in the VMs and Templates inventory view by
navigating to Home > Inventory > VMs and Templates, or using the shortcut CtrlShift-V. The Hosts and Clusters view shows inventory in a physical hierarchy, i.e.
which VMs belong to which physical hosts.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment


Note

The VMs and Templates view shows a logical view, without the physical hosts..
Folders created in one view will not appear in a different view, allowing a VMware
administrator to organize differently based on inventory object type.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

107. Right-click the VM WinServer-2 and select Open Console. Log in with username
Administrator and password cisco123.
Note

You may get an IP address and computer name conflict error message because
WinServer-2 initially has the same IP address and computer name as WinServer-1,
since a clone is a completely identical copy of VM. Next, you will change the IP
address and name of the WinServer-2 VM.

108. From within the Windows VM console window, click Start > Settings > Network
Connections.

109. Right-click Local Area Connection and click Properties.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-47

Lab 1: Set Up the VMware vSphere Environment

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

110. Select Internet Protocol (TCP/IP) and then click the Properties button.

111. Enter the IP address 10.0.14.2 with a mask of 255.255.255.0, and no default gateway.

Click OK. Select Show icon in notification area when connected. Click OK. Close the
Network Connections window.

L1-48

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 1: Set Up the VMware vSphere Environment

112. Still from within the WinServer-2 VM console window, click Start > Settings > Control
Panel, then double-click System.
113. Click the Computer Name tab in the System Properties window

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Click Change, so you can change the computer name to avoid any duplicate names on the
network. Name the computer WinServer-2. Click OK.

114. Click OK to note you will have to restart the computer for the changes to take effect.

115. Click OK to close the System Properties window and click Yes to restart the VM.
116. After the VM has rebooted, log in to the virtual machine using Administrator and
password cisco123. Ignore the popup that Your computer might be at risk.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L1-49

Lab 1: Set Up the VMware vSphere Environment

117. Open the Command Prompt shortcut on the desktop.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

118. To verify connectivity between your two new VMs, ping the other VMs IP address at
10.0.14.1.

Activity Verification

You have completed this task when you attain these results:

Cloned the virtual machine WinServer-1 located on the first ESXi host to create a
second virtual machine, WinServer-2, located on your second ESXi host.

Verified connectivity between both virtual machines using ping.

L1-50

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L2
Install and Configure the Cisco
Nexus 1000V VSMs
Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-1

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

Activity Objective
In this activity, you will install and perform initial configuration of a primary and
secondary Cisco Nexus 1000V VSM (Virtual Supervisor Module) using VMware vCenter
Server v5.0. After performing this lab, you should be able to perform the following:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Install a primary Cisco Nexus 1000V VSM using the Open Virtualization Format
(OVF) template wizard-based method
Perform the initial configuration of the primary VSM
Establish the SVS connection to vCenter Server
Install a secondary Cisco Nexus 1000V VSM

Perform the initial configuration of the secondary VSM

Required Resources

These are the resources and equipment required for each pod to complete this activity:

Two VMware ESXi v5.0 hosts

One server running VMware vCenter Server v5.0 and VMware vSphere Client v5.0
Two Cisco Nexus 1000V VSM VM appliances

All pods share the following lab core devices (you will not be able to see other pods):
One switch for server networking
One iSCSI-based storage device

Command List

The table describes the commands used in this activity.

L2-2

Command

Description

svs-domain

Enters SVS domain configuration mode.

domain id <number>

Assigns a Cisco Nexus 1000V domain-id.

control vlan <vlan-number>

Assigns a control VLAN to the domain.

packet vlan <vlan-number>

Assigns a packet VLAN to the domain.

svs connection <name>

Enables an SVS connection.

remote {ip address


<address> | hostname
<name>}

Specifies the IP address or remote host name of


vCenter Server.

vmware dvs datacenter-name


<name>

Specifies the datacenter name in vCenter.

show svs connections


<conn_name>

Displays the current connections to the Cisco


Nexus 1000V for verification.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM


Displays the VSM domain configuration.

show interface brief

Displays a short version of the interface


configuration.

show system redundancy


status

Display the current redundancy status for the


VSM.

copy running-config
startup-config

Saves the running configuration.

system redundancy role


{primary | secondary |
standalone}

Configures a redundancy role for the VSM.

show module

Displays module information.

attach module 2

Access the standby VSM console from the active


VSM.

show system resources

Display system-related CPU and memory


statistics.

system switchover

Switches over to the standby VSM.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

show svs domain

Job Aids

These job aids are available to help you complete the lab activity.

Lab topology diagram in visual objective section in the beginning of this lab

Lab connections table in the general lab topology information section in the beginning
of the lab guide

Lab IP address and VLAN plan in the general lab topology information section in the
beginning of the lab guide

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-3

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

Task 1: Prepare the VLAN Infrastructure


In this task, you will prepare the VMware environment for Cisco Nexus 1000V
deployment. The Cisco Nexus 1000V requires several dedicated VLANs (networks),
including Management, Control, and Packet, when deployed in Layer 2 mode.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

The Nexus 1000V can also be deployed in routed mode (Layer 3), wherein the hosts
(VEMs) and Nexus 1000V VSM are on different subnets. Note the Nexus 1000V is not a
router. Routed mode simply means the VSM and VEMs are in different VLANs. Another
network device must actually perform the routing between the VLANs.

In this lab, you will deploy the Nexus 1000V in Layer 2 mode, where the VSM and VEMs
will have IP addresses in the same VLAN (subnet).
The Management VLAN is used for system login, configuration, and corresponds to the
mgmt0 interface. The management interface appears as the mgmt0 port on a Cisco Nexus
switch, and is assigned an IP address. Although the management interface is not used to
exchange data between the VSM and VEM, it is used to establish and maintain the
connection between the VSM and VMware vCenter Server.

The Control VLAN and the Packet VLAN are used for communication between the VSM
and the VEMs within a switch domain. The Packet VLAN is used by protocols such as
CDP, LACP, and IGMP. The Control VLAN is used for the following:
VSM configuration commands to each VEM, and their responses

VEM notifications to the VSM, for example a VEM notifies the VSM of the attachment
or detachment of ports to the DVS

VEM NetFlow exports are sent to the VSM, where they are then forwarded to a
NetFlow Collector.

VSM active to standby synchronization for high availability.

Activity Procedure
Complete these steps:

1.

Ensure you have clicked on the vCenter Server tab.

2.

Log in to vCenter Server via the vSphere Client using localhost and the Windows session
credentials if you are not already logged in.

3.

Go to the Hosts and Clusters inventory view, or use the shortcut Ctrl-Shift-H.

4.

Select your first ESXi host 10.0.1.1, and then click the Configuration tab.

5.

Click the Networking link, and then click the Properties link next to vSwitch0.

6.

Click the Add button.

L2-4

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

Choose Virtual Machine as the connection type, and then click Next.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

7.

8.

Change the name of the virtual machine port group to Management. Do not enter a VLAN
ID. Click Next.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-5

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

9.

Verify the configuration details, and then click Finish.

10. Repeat Step 5 Step 8 to create the following additional two virtual machine port groups
and assign the VLAN numbers specified below. Add all virtual machine port groups to
vSwitch0.
VLAN

Control

12

Packet

13

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Network Label

11. Repeat Steps 3 to 10 for your second ESXi host, 10.0.1.2. Ensure you enter the Label and
VLAN exactly the same on both hosts.

12. Verify your final vSwitch configurations on both your ESXi hosts match the following
screenshots:
ESXi Host 1 (10.0.1.1):

L2-6

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

ESXi Host 2 (10.0.1.2)

Activity Verification

You have completed this task when you attain these results:

Added the virtual machines port groups Management, Control, and Packet to vSwitch0
on both ESXi hosts.
The Management port group should not be a member of any VLAN.
The Control port group should be a member of VLAN 12.
The Packet port group should be a member of VLAN 13.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-7

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

Task 3: Install the Cisco Nexus 1000V VSM


In this task, you will install a Cisco Nexus 1000V VSM (Virtual Supervisor Module).

Activity Procedure
Complete these steps:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

13. Ensure you are in the Host and Clusters inventory view, or use the shortcut Ctrl-Shift-H.
Select your first ESXi host, 10.0.1.1.

14. Click the File Menu. Click Deploy OVF Template. The Deploy OVF Template wizard
opens.

Note

The OVF import wizard is an easy way to deploy the Nexus 1000V as a preconfigured virtual appliance. Alternately, you could configure the VSM manually
without the use of a wizard, by creating a VM from scratch and installing the Nexus
1000V NX-OS.

15. Click Browse and navigate to the OVA file in the following location:
N:\Nexus1000v.4.2.1.SV1.4a\Nexus1000v.4.2.1.SV1.4a\VSM\Install\nexus1000v.4.2.1.SV1.4a.ova.

L2-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

16. Select the OVA template nexus-1000v.4.2.1.SV1.4.ova and click Open.

17. Click Next to deploy the VM from the OVA file.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-9

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

18. Click Next to confirm the OVF Template Details screen.

19. Click Accept to the End User License Agreement and click Next to proceed.
20. Enter the name N1000V-VSM1 and click Next.

L2-10

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

21. Ensure Nexus 1000V Installer is selected from the Configuration drop-down menu and
click Next.

22. Choose the ISCSIVMFS datastore, and then click Next.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-11

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

23. Accept the default disk format and click Next.

L2-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

24. Make sure the VSM source and destination networks are properly mapped: Control
Control, Management Management, Packet Packet. Click Next.
How you can click below the Destination Networks and a pull down option exists to
change the selection if needed.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-13

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

25. Configure the following values on the Properties page:


VSM Domain ID: 1
Nexus 1000V Admin User Password: cisco123
Management IP Address: 10.0.1.200
Management IP Subnet Mask: 255.255.255.0

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Management IP Gateway: 10.0.1.254

26. Click Next.

L2-14

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

27. Click the Power on after deployment checkbox, verify your configuration, and then click
Finish to complete the wizard and begin importing the VSM.

28. Wait for the deployment to complete, and then click Close.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-15

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

29. Click the N1000V-VSM1 VSM virtual machine in the left-hand inventory pane and click
the Summary tab. You should see the VSM deployed on the ISCSIVMFS datastore, and
connected to the three new networks.
If you accidentally deployed the VSM on the wrong host, simply drag and drop the
VM to the correct host to initiate a vMotion.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

30. Right-click the VSM and select Open Console (or click the Open Console icon in the
menu bar). Wait for the VSM to finish booting up, at which point the switch login prompt
will appear. This process can take several minutes.
31. Do not login to the VSM at this time. Close the console window when the VSM has
finished booting.
Note

If you clicked within the console window, you will need to press CTRL+ALT to
release the cursor out of the focus of the console.

32. From your vCenter Server host, open Internet Explorer and navigate to your VSM at the
URL http://10.0.1.200.
The Nexus 1000V has a web interface where you can access an installer application, the
extension (plug-in) required for vCenter Server, and VEM software.

L2-16

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

33. If the browser prompts you to add a security exception, do so. Close the window when you
are done.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-17

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

34. Right-click on cisco_nexus_1000v_extension.xml. Click Save Target As and save the file
to the desktop.
Close the download dialog when the download is complete. Close Internet Explorer.

L2-18

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM


Note

The extension is an XML-based plug-in used to authenticate the VSM to vCenter


Server, and enable communication between the two. The extension is unique per
VSM, and must therefore be downloaded directly from each VSM via the web
interface.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

35. Go back to the vSphere Client connected to vCenter Server. Click Plug-ins > Manage
Plug-ins from the menu bar.

36. Right-click in the white space and select New Plug-in

37. Click Browse and navigate to your desktop. Double-click the XML file you just
downloaded.

38. Click Register Plug-in to bind your VSM to vCenter Server using its unique extension
key.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-19

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

39. Click Ignore to continue using the default certificate.

40. Click OK to close the dialog box.

41. Once your Nexus 1000V plug-in appears as pictured, click Close in the Plug-in Manager
window.

L2-20

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

Activity Verification
You have completed this task when you attain these results:
Installed the Cisco Nexus 1000V VSM on your first ESXi host

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Registered the Cisco Nexus 1000V extension to VMware vCenter

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-21

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

Task 3: Install the Cisco Nexus 1000V VSM


In this task, you will login to the Cisco Nexus 1000V VSM (Virtual Supervisor Module),
connect it to vCenter Server, and do some initial exploration.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


42. From the desktop of vCenter Server open a Putty SSH session to your VSM at IP address
10.0.1.200.

43. Choose Yes if prompted to trust the host.

44. Log in to the switch by using username admin and password cisco123.
Note

SSH is the recommended method to access the VSM after you have installed the
Cisco Nexus 1000V.

Note

Currently, the VSM is running in a VM on a server vCenter manages, but there is no


relationship or special communication between the two. Currently, it looks like any
other VM to vCenter.

45. Configure the switch hostname.

switch# configure
switch(config)# hostname N1000V-VSM

46. Configure the SVS domain, including the Control and Packet VLANs. SVS domain stands
for Server Virtualization Switch, and represents the 1000V domain configuration.
N1000V-VSM(config)# svs-domain
N1000V-VSM(config-svs-domain)# domain id 1
Warning: Config saved but not pushed to vCenter Server due to inactive connection!
N1000V-VSM(config-svs-domain)# control vlan 12
Warning: Config saved but not pushed to vCenter Server due to inactive connection!
N1000V-VSM(config-svs-domain)# packet vlan 13
Warning: Config saved but not pushed to vCenter Server due to inactive connection!
N1000V-VSM(config-svs-domain)# exit

Note

L2-22

You get warnings when configuring your SVS domain: Warning: Config saved but
not pushed to vCenter Server due to inactive connection. This is normal because we
have not yet made the connection between the VSM and vCenter Server.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

47. Configure a connection to your vCenter Server.


N1000V-VSM(config)# svs connection LAB-VCENTER
N1000V-VSM(config-svs-conn)# protocol vmware-vim
N1000V-VSM(config-svs-conn)# remote ip address 10.0.1.50
N1000V-VSM(config-svs-conn)# vmware dvs datacenter-name Lab-Datacenter
N1000V-VSM(config-svs-conn)# connect
N1000V-VSM(config-svs-conn)# end

The first line in the configuration specifies the name of the connection. This name
does not have to match the name of your vCenter instance. Multiple connections can
be stored in a single configuration. The second line specifies the protocol to use to
speak to vCenter Server, which is VIM (VMware). By default, VIM runs on SSL over
HTTP (HTTPS). The third and fourth lines specify the IP address of vCenter Server,
and the VMware Datacenter the Nexus 1000V should be a part of. Lastly, the
connect command uses the connection information entered to initiate a connection
to vCenter.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

48. Verify the connection to vCenter from the NX-OS CLI.


Note

If you are monitoring the Recent Tasks pane in vCenter Server, you can see the
VSM being added to the inventory.

N1000V-VSM# show svs connections

connection LAB-VCENTER:
ip address: 10.0.1.50
remote port: 80
protocol: vmware-vim https
certificate: default
datacenter name: Lab-Datacenter
admin:
max-ports: 8192
DVS uuid: 32 fe 2d 50 62 2c db 59-4e d7 c2 52 c9 aa f5 34
config status: Enabled
operational status: Connected
sync status: Complete
version: VMware vCenter Server 5.0.0 build-455964

Note

Your DVS (Distributed Virtual Switch) universally unique identifier (UUID) will vary.
UUIDs uniquely identify servers. The UUID shown is for this DVS. Each Nexus
1000V DVS will have a different UUID.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-23

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

49. Verify the status of the SVS domain.


N1000V-VSM# show svs domain

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

SVS domain config:


Domain id:
1
Control vlan: 12
Packet vlan: 13
L2/L3 Control mode: L2
L3 control interface: NA
Status: Config push to VC successful.

50. Inspect the connected interfaces on the Nexus 1000V.


N1000V-VSM# show interface brief

--------------------------------------------------------------------Port
VRF
Status IP Address
Speed
MTU
--------------------------------------------------------------------mgmt0
-up
10.0.1.200
1000
1500
--------------------------------------------------------------------Port
VRF
Status IP Address
Speed
MTU
--------------------------------------------------------------------control0 -up
-1000
1500

51. Verify the VSM is installed and active.


N1000V-VSM# show module
Mod
--1

Ports
----0

Module-Type
-------------------------------Virtual Supervisor Module

Mod
--1

Sw
---------------4.2(1)SV1(4a)

Mod
--1

MAC-Address(es)
-------------------------------------00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8

Mod
--1

Server-IP
--------------10.0.1.200

Model
-----------------Nexus1000V

Status
-----------active *

Hw
-----------------------------------------------0.0
Serial-Num
---------NA

Server-UUID
-----------------------------------NA

Server-Name
-----------------NA

* this terminal session

L2-24

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

52. Confirm this VSM is the only Supervisor in the virtual Nexus 1000V chassis.
N1000V-VSM# show system redundancy status

standalone
standalone

Redundancy mode
--------------administrative:
operational:

HA
None

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Redundancy role
--------------administrative:
operational:

This supervisor (sup-1)


----------------------Redundancy state:
Active
Supervisor state:
Active
Internal state:
Active with no standby
Other supervisor (sup-2)
-----------------------Redundancy state:
Not present

Note

You have not yet installed a secondary VSM (Supervisor) or any VEMs, but note how
this looks like the output of a physical chassis-based switchs modules, although our
switch is completely virtual.

53. Save the configuration.

N1000V-VSM# copy run start


[########################################] 100%

54. Return to the vCenter Server window.

55. You should see in the Recent Tasks pane at the bottom of the window a new Distributed
Virtual Switch (dvS) has been added to vCenter.

56. Navigate to the Networking inventory view, or use the shortcut Ctrl-Shift-N.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-25

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

57. Expand the networking tree in the left pane to view the new vSwitch.

Note

Any ports not specifically placed in a port group will be placed in the Quarantine
port groups. Also notice that a VMware administrator cannot edit the settings of the
1000V dvS or its port groups all networking configuration is now the responsibility
of the network administrator.

Activity Verification

You have completed this task when you attain these results:
Performed initial configuration of the primary VSM

Registered and connected the Cisco Nexus 1000V VSM to VMware vCenter Server

L2-26

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

Task 4: Install a Secondary Cisco Nexus 1000V


VSM
In this task, you will install a secondary VSM so you can run the Nexus 1000V in a highly
available Active/Standby configuration. This simulates having two Supervisors in a switch
chassis.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

58. Return to the Putty SSH session to your VSM at IP address 10.0.1.200.
59. Change the VSM HA role from standalone to primary.

N1000V-VSM# configure
N1000V-VSM(config)# system redundancy role primary

60. Verify the VSMs role is now listed as primary, instead of standalone.
N1000V-VSM(config)# show system redundancy status
Redundancy role
--------------administrative:
operational:

primary
primary

Redundancy mode
--------------administrative:
operational:

HA
None

This supervisor (sup-1)


----------------------Redundancy state:
Active
Supervisor state:
Active
Internal state:
Active with no standby
Other supervisor (sup-2)
-----------------------Redundancy state:
Not present

Note

You MUST change the redundancy role before installing the secondary VSM.
Otherwise, both VSMs will become active and independent control planes as they
are not expecting to see a secondary VSM.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-27

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

61. Save your configuration.


N1000V-VSM(config)# copy run start
[########################################] 100%

62. Now, you will add another VSM to fill the secondary role. Return to the vCenter Server
screen and go to the Hosts and Clusters view, or use the Ctrl-Shift-H shortcut.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

63. Make sure your second ESXi host 10.0.1.2 is selected.

64. Click File. Then click Deploy OVF Template The Deploy OVF Template wizard
opens.
65. Verify that the OVA nexus-1000v.4.2.1.SV1.4.ova is selected.
66. Click Next to confirm the OVF Template Details.

67. Click Accept to accept the EULA and click Next to proceed.
68. Enter the name N1000V-VSM2 and click Next.

69. Select Nexus 1000V Secondary and click Next.

Note

Ensure you have selected the Secondary installer before moving on.

70. Select your second ESXi host.

71. Choose the datastore ISCSIVMFS, Click Next.


L2-28

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

72. Accept the default Disk Format (Thick Provision Lazy Zeroed) and click Next.
73. Make sure the networks are properly mapped and click Next.
74. Configure domain ID 1 and password cisco123.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

For the secondary VSM, do not enter an IP address, subnet mask and gateway, since the
information will be shared between the primary and secondary. Click Next.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-29

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

75. Click the Power on after deployment checkbox, verify your configuration, and then click
Finish to complete the wizard and begin importing the secondary VSM.

76. Wait for the deployment to complete and click Close.

77. Right-click the N1000V-VSM2 VM and select Open Console.

78. Wait for boot up to complete and the switch login message to appear.
Note

L2-30

The VSM power on process can take several minutes. The primary VSM may cause
the secondary VSM to reboot for HA synchronization.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

79. Login with username admin and password cisco123. If you cannot login via the VMware
console, move on to the next step. There is an alternate method to connect. Close the
console to the secondary when you have verified you can login.
The switch prompt should contain (standby) after the hostname, which indicates
this is the standby, or secondary VSM.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

80. Return to the Putty window to your primary VSM. Verify that the secondary VSM now
appears in the output of show module command.

You must wait for the secondary VSM to completely finish booting before it will show the
ha-standby state. While booting, it will appear as powered-up.

N1000V-VSM(config)# show module


Mod
--1
2

Ports
----0
0

Module-Type
-------------------------------Virtual Supervisor Module
Virtual Supervisor Module

Mod
--1
2

Sw
---------------4.2(1)SV1(4a)
4.2(1)SV1(4a)

Mod
--1
2

MAC-Address(es)
-------------------------------------00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8

Mod
--1
2

Server-IP
--------------10.0.1.200
10.0.1.200

Model
-----------------Nexus1000V
Nexus1000V

Status
-----------active *
ha-standby

Hw
-----------------------------------------------0.0
0.0
Serial-Num
---------NA
NA

Server-UUID
-----------------------------------NA
NA

Server-Name
-----------------NA
NA

* this terminal session

Note

You may see a console message on the primary VSM regarding dropped frames
while the secondary VSM boots. This is normal.

Note

You should see a console message indicating the secondary VSM is now online:
switch %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial number
:unavailable) Module-Type Virtual Supervisor Module Model : unavailable

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-31

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

81. Verify that VSM is now in operational HA mode.


N1000V-VSM(config)# show system redundancy status

primary
primary

Redundancy mode
--------------administrative:
operational:

HA
HA

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Redundancy role
--------------administrative:
operational:

This supervisor (sup-1)


----------------------Redundancy state:
Active
Supervisor state:
Active
Internal state:
Active with HA standby
Other supervisor (sup-2)
-----------------------Redundancy state:
Standby
Supervisor state:
Internal state:

HA standby
HA standby

82. Use the attach command to connect directly to the secondary VSM.
N1000V-VSM1(config)# attach module 2

Attaching to module 2 ...


To exit type 'exit', to abort type '$.'
Cisco Nexus Operating System (NX-OS) Software
TAC support: http://www.cisco.com/tac
Copyright (c) 2002-2011, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under
license. Certain components of this software are licensed under
the GNU General Public License (GPL) version 2.0 or the GNU
Lesser General Public License (LGPL) Version 2.1. A copy of each such license is
available at
http://www.opensource.org/licenses/gpl-2.0.php and
http://www.opensource.org/licenses/lgpl-2.1.php

83. Display the secondary VSMs system resources utilization.


N1000V-VSM(standby)# show system resources
Load average:
Processes
:
CPU states :
Memory usage:

L2-32

1 minute: 0.02
5 minutes: 0.25
15 minutes: 0.15
197 total, 1 running
0.0% user,
1.0% kernel,
99.0% idle
2075740K total,
865364K used,
1210376K free
62632K buffers, 469044K cache

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

84. Return to your primary VSM.


N1000V-VSM(standby)# exit
rlogin: connection closed.
N1000V-VSM(config)#

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

85. On the active VSM, initiate a manual switchover to the standby VSM.
N1000V-VSM(config)# system switchover

Note

Once you enter this command, the standby VSM becomes active. The formerly
active VSM reboots which causes your SSH session to terminate and the VSM
becomes standby after reboot.

86. Open a new Putty session to the VSM IP address 10.0.1.200.

87. Examine the connected modules. Eventually, you should see the reloaded VSM reappear,
this time in the standby status, and the VSM in module 2 is now the active VSM.
N1000V-VSM# show module
Mod
--1
2

Ports
----0
0

Mod
--1
2

Sw
--------------4.2(1)SV1(4a)
4.2(1)SV1(4a)

Mod
--1
2

MAC-Address(es)
-------------------------------------00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8

Mod
--1
2

Server-IP
--------------10.0.1.200
10.0.1.200

Note

Module-Type
-------------------------------Virtual Supervisor Module
Virtual Supervisor Module

Model
-----------------Nexus1000V
Nexus1000V

Status
-----------ha-standby
active *

Hw
-----0.0
0.0

Serial-Num
---------NA
NA

Server-UUID
-----------------------------------NA
NA

Server-Name
----------------NA
NA

It takes a little while for the primary VSM to reboot and change its status form
powered-up to ha-standby. Wait a minute, and then issue the command again
until the VSM in module one shows state ha-standby.

88. Do not proceed until the VSM in module 1 shows a status of ha-standby.
Global Knowledge Training LLC
For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-33

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

89. Open a Command Prompt window from your vCenter Server desktop.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

90. Start a continuous ping to the VSM IP address 10.0.1.200, using the command ping
10.0.1.200 t.

91. Switchover again to make the VSM in module 1 the active primary VSM again.
N1000V-VSM# system switchover

92. Verify connectivity to the VSM is maintained from the continuous ping. Although a couple
pings may be lost, there is no interruption to the data plane or end application user on the
failure of a VSM in a highly available configuration.
93. Open a Putty session to 10.0.1.200, login, and verify the active VSM is in module one and
that the VSM in module two changes from powered-up to ha-standby as follows.

N1000V-VSM# show module


Mod
--1
2

Ports
----0
0

Mod
--1
2

Sw
--------------4.2(1)SV1(4a)
4.2(1)SV1(4a)

Mod
--1
2

MAC-Address(es)
-------------------------------------00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8

L2-34

Module-Type
-------------------------------Virtual Supervisor Module
Virtual Supervisor Module

Model
-----------------Nexus1000V
Nexus1000V

Status
-----------active *
ha-standby

Hw
-----0.0
0.0

Serial-Num
---------NA
NA

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 2: Install and Configure the Cisco Nexus 1000V VSM


Mod
--1
2

Server-IP
--------------10.0.1.200
10.0.1.200

Server-UUID
-----------------------------------NA
NA

Server-Name
----------------NA
NA

94. Close the Command Prompt continuous ping window.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Verification
You have completed this task when you attain these results:
Installed a secondary VSM on your second ESXi host

Verified operational VSM high availability by manually issuing a system switchover

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L2-35

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Lab 2: Install and Configure the Cisco Nexus 1000V VSM

L2-36

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L3
Install and Configure the Cisco
Nexus 1000V VEMs
Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-1

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

Activity Objective
In this activity, you will install the Cisco Nexus 1000V VEM on each ESXi host, add hosts
to the distributed virtual switch, and configure Cisco Nexus 1000V port profiles. After
performing this lab, you should be able to perform the following:
Create a port profile for the Cisco Nexus 1000V uplinks

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Create a Cisco Nexus 1000V virtual machine data port profile

Install Cisco Nexus 1000V VEM on each ESX host


Add hosts to the Cisco Nexus 1000V VSM
Verify that the VSM can see the VEMs

Migrate virtual machines to the Cisco Nexus 1000V

Required Resources

These are the resources and equipment required for each pod to complete this activity:

Two VMware ESXi 5.0 hosts

One server running VMware vCenter Server 5.0 and VMware vSphere Client 5.0
Two Cisco Nexus 1000V VSM VM appliances
All pods share the following lab core devices:
One switch for server networking
One iSCSI-based storage device

Command List

The table describes the commands used in this activity.

L3-2

Command

Description

hostname <name>

Configures the hostname for the switch.

port-profile [type
{ethernet | vethernet}]
<profile_name>

Creates a port profile.

vmware port-group <name>

Creates a VMware port group.

switchport mode trunk

Configures an interface as a trunk port.

switchport trunk allowed


vlan <vlan-list>

Configures the allowed VLANs for a trunk


interface.

no shutdown

Activates an interface.

system vlan <vlan-list>

Adds a system VLAN to a port profile.

state enabled

Enables a port profile.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM


Saves the running configuration.

show port-profile name


<profile_name>

Specifies to display information about a specific


port profile.

vmware -v

Displays ESX version and build number.

esxcli software vib


install -v
/<VIBpath>/cross<tabkey>

Installs the Cisco Nexus 1000V VEM image into


the ESX host.

vem status

Displays whether the VEM agent is running.

vemcmd show port

Displays a summary of VEM interfaces.

vemcmd show card

Displays detailed information of a VEM.

show module

Displays module information.

show interface ethernet


status

Displays information about the interface


configuration.

show mac address-table

Displays the MAC address table.

show module vem mapping

Displays information about the VEM mapping.

switchport mode access

Sets the port mode to access interface.

switchport access vlan


<id>

Sets the VLAN membership of an access


interface.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

copy running-config
startup-config

Job Aids

These job aids are available to help you complete the lab activity.

Lab topology diagram in the visual objectives section in the beginning of this lab

Lab connections table in the general lab topology information section in the beginning
of the lab guide

Lab IP address and VLAN plan in the general lab topology information section in the
beginning of the lab guide

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-3

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

Task 1: Create VLANs


In this task, you will create the required VLANs on your Cisco Nexus 1000V virtual
switch. These VLANs will be used for Nexus 1000V traffic, storage and vMotion traffic,
and production VM traffic.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

1.

From the desktop of vCenter Server open a Putty SSH session to your VSM at IP address
10.0.1.200. Log in to the switch with username admin and password cisco123.

2.

Rename the VSM to N1000V.

N1000V-VSM# configure
N1000V-VSM(config)# hostname N1000V
N1000V(config)#

3.

L3-4

Return to vCenter Server and note that VSM has already pushed this configuration change
to vCenter Server. Navigate to the Networking inventory view, or use the shortcut CtrlShift-N.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

4.

Return to your putty session to the VSM and create all the VLANs required for the labs.
11
name
vlan
name
vlan
name
vlan
name
exit

vMotion/Storage
12
Control
13
Packet
14
Production

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config)# vlan
N1000V(config-vlan)#
N1000V(config-vlan)#
N1000V(config-vlan)#
N1000V(config-vlan)#
N1000V(config-vlan)#
N1000V(config-vlan)#
N1000V(config-vlan)#
N1000V(config-vlan)#

Note

5.

In NX-OS you must explicitly create VLANs. Simply putting a port into a VLAN that
does not exist will not create the VLAN for you. VLAN naming is optional.

Verify your configuration.

N1000V(config)# show vlan

VLAN
---1
11
12
13
14

Name
-------------------------------default
vMotion/Storage
Control
Packet
Production

VLAN
---1
11
12
13
14

Type
----enet
enet
enet
enet
enet

Status
Ports
--------- -----------------------------active
active
active
active
active

Remote SPAN VLANs


-----------------------------------------------------------------------------Primary
-------

Secondary
---------

Type
---------------

Ports
-----------------------------------------

Activity Verification

You have completed this task when you attain these results:

Changed the hostname of the VSM and noted the change pushed to vCenter
Created and named the required VLANs on the VSM

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-5

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

Task 2: Create an Uplink Port Profile


In this task, you will create a type Ethernet port profile, which will be applied on the
physical uplink interface NICs on the ESXi hosts. You will also create an NX-OS CLI
alias.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

In vCenter, physical NICs are referred to as vmnics. For example, the first NIC on the
server will be labeled vmnic0.

Activity Procedure
Complete these steps:

6.

Return to the Putty SSH session to your VSM at IP address 10.0.1.200.

7.

Create an uplink system port profile.

N1000V(config)# port-profile type ethernet Host-Uplinks


N1000V(config-port-prof)# description Uplinks from ESXi hosts to switch
N1000V(config-port-prof)# vmware port-group VMNIC-Uplinks
N1000V(config-port-prof)# switchport mode trunk
N1000V(config-port-prof)# switchport trunk allowed vlan 1,11-14
N1000V(config-port-prof)# no shutdown
N1000V(config-port-prof)# system vlan 1, 12-13
N1000V(config-port-prof)# state enabled
N1000V(config-port-prof)# exit

L3-6

Note

The vmware port-group command allows you to present a different port group
name to vCenter. If you type the command vmware port-group with no name, the
name of the port profile will be pushed to vCenter instead (i.e. Host-Uplinks). The
vmware port-group command is required, but an alternate name is not.

Note

The system vlan command is crucial to understand and configure. System VLANs
behave differently than other VLANs in that they will always remain in a forwarding
state. Systems VLANs will forward traffic even before a VEM connects to the VSM.
System VLANs need to forward traffic in order for the VEM and VSM to
communicate, and must therefore be added to any port profile that will be applied to
uplinks that carry system VLAN traffic.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

8.

Create a CLI alias to ease saving your configuration.


IOS devices traditionally supported the write memory command to commit runningconfig to startup-config. NX-OS does not support the write memory command. NXOS uses copy run start. This can be shortened to an alias of your choosing, or wr if
you are feeling nostalgic.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

N1000V(config)# cli alias name wr copy running-config startup-config

9.

Save your VSM configuration using your CLI alias.

N1000V(config)# wr
[########################################] 100%

10. Note the port profile configuration was pushed to vCenter when you entered the state
enabled command.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-7

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

11. Verify the port profile from the NX-OS CLI.


N1000V(config)# show port-profile name Host-Uplinks

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

port-profile Host-Uplinks
type: Ethernet
description: Uplinks from ESXi hosts to switch
status: enabled
max-ports: 32
min-ports: 1
inherit:
config attributes:
switchport mode trunk
switchport trunk allowed vlan 1,11-14
no shutdown
evaluated config attributes:
switchport mode trunk
switchport trunk allowed vlan 1,11-14
no shutdown
assigned interfaces:
port-group: VMNIC-Uplinks
system vlans: 1,12-13
capability l3control: no
capability iscsi-multipath: no
port-profile role: none
port-binding: static

Note

No assigned interfaces are shown because there are no vmnics (physical NICs)
connected to the port profile. So far you have created the port profile and pushed it to
vCenter. From vCenter you will associate a VMs vNIC to a port group, which
attaches a VM to a port profile. This draws a clear line where the network
responsibility ends (create port profiles and push to vCenter), and where the server
teams responsibility begins (associate vNICs or physical vmnics to a port group
the VMware name for a Nexus 1000V port profile).

Activity Verification

You have completed this task when you attain these results:

Configured an uplink port profile on the VSM and verified its presence in the vCenter
Server Networking inventory view.

Created a CLI alias in NX-OS to simplify saving your configuration.

L3-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

Task 3: Install the Cisco Nexus 1000V VEM


In this task, you will install the Cisco Nexus 1000V VEM (Virtual Ethernet Module) on
each ESXi host. There are several ways to install the VEM software: Use VMware Update
Manager (VUM), or via several command line options on the ESXi hosts (i.e. SSH, vCLI).

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

In this task, you will use the command line method to install the VEM software. The VEM
software is packaged as a VIB: vSphere Installation Bundle.

Activity Procedure
Complete these steps:

12. From vCenter, go to the Datastores and Datastore Clusters view (Home > Inventory >
Datastores and Datastore Clusters or use the shortcut Ctrl-Shift-D).
13. Right-click the datastore ISCSIVMFS, and select Browse Datastore.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-9

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

14. Verify the following file is present on the datastore: cross_cisco-vem-v131-4.2.1.1.4.1.03.0.4.vib.

If the file is not present, click the Upload files icon and navigate to the file at the following
location: N:\Nexus1000v.4.2.1.SV1.4a\ Nexus1000v.4.2.1.SV1.4a\
Nexus1000v.4.2.1.SV1.4a\VEM\cross_cisco-vem-v131-4.2.1.1.4.1.0-3.0.4.vib.
Note

The VIB will be used to install the VEM software on each of the ESXi hosts. You
must have the VEM VIB version that matches both the VMware vSphere version and
the VSM version. For more information, refer to the Cisco Nexus 1000V and VMware
Compatibility Information documentation for the host software version compatibility
table. The compatibility table lists VIB version cross_cisco-vem_v131-4.2.1.1.4.1.03.0.4.vib for ESX/ESXi version 5.0.0 build 469512 used in the lab environment.

15. In vCenter server in the Hosts and Clusters view, highlight your first ESXi host. Select
Configuration, and select Security Profile in the Software pane.

16. Click on Properties link next to the Firewall pane.

17. Check the box for SSH Server. Click on Options.


L3-10

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

18. Select Start and stop with host and click Start. Click Yes on the firewall popup message.
Click OK and OK again to close the Firewall Properties window.
19. Open a separate Putty SSH session to your ESXi host at IP address 10.0.1.1.
20. Choose Yes when prompted to confirm the SSH key.
21. Log in to the server using username root and password cisco123. You are now in ESXi
Tech Support Mode.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

22. Type the following command to obtain the ESXi version and build number. Compare the
output to the software version compatibility table in the previous steps for ESXi 5.0.0.

~ # vmware -v
VMware ESX 5.0.0 build-469512

Note

The output shows which ESXi version and build number you are running. You can
also view the build number in vCenter by clicking on a host and looking at the top of
the screen to view the IP address, ESXi version, build number, and license level.

23. Navigate to the directory where the Cisco Nexus 1000V VEM VIB file is stored.
Note

You can use the tab key to assist with typing the names. Also note that the
ISCSIVMFS directory name will change to a long set of alphanumeric characters
after you change to its directory - this is expected.

~ # cd /vmfs/volumes/ISCSIVMFS

24. List the contents of the directory (the ISCSIVMFS datastore) and verify the VEM VIB is
visible to the host. This is the same as browsing the datastore from vCenter.
/vmfs/volumes/4bab21a5-e7608223-4c78-003048bdc94f # ls
AddOns.iso
N1000V-VSM1
N1000V-VSM2
WinServer-1
WinServer-2
WindowsXP.iso
cross_cisco-vem-v131-4.2.1.1.4.1.0-3.0.4.vib
cross_cisco-vem-v144-4.2.1.1.5.2.0-3.0.1.vib

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-11

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

25. Install the Cisco Nexus 1000V VEM image into the ESXi host.
Note

Use tab completion on the file name so you do not have to type the entire string.

/vmfs/volumes/4bab21a5-e7608223-4c78-003048bdc94f # esxcli software vib install v


/vmfs/volumes/ISCSIVMFS/cross_cisco-vem-v131-4.2.1.1.4.1.0-3.0.4.vib

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Installation Result
Message: Operation finished successfully
Reboot Required: false
VIBs Installed: Cisco_bootbank_cisco-vem-v131-esx_4.2.1.1.4.1.0-3.0.4
VIBs Removed:
VIBs Skipped:

Note

This command loads the software onto the ESXi host, loads the kernel modules, and
starts the VEM Agent on the running system.

26. Change back to the root directory.

/vmfs/volumes/4bab21a5-e7608223-4c78-003048bdc94f # cd
~ #

27. Verify the VEM was installed successfully. This command can also display the version
installed by adding the v option.
~ # vem status v

Package vssnet-esxmn-ga-release
Version 4.2.1.1.4.1.0-3.0.4
Build 4
Date Wed Jul 27 20:31:30 PDT 2011
Number of PassThru NICs are 0
VEM modules are loaded
Switch Name
vSwitch0

Num Ports
128

Used Ports
8

Configured Ports
128

MTU
1500

Uplinks
vmnic0

Number of PassThru NICs are 0


VEM Agent (vemdpa) is running

28. Go back to vCenter and go to the Networking inventory view (Home > Inventory >
Networking), or use the shortcut Ctrl-Shift-N.

L3-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

29. Right-click on the N1000V switch icon and click Add Host.

30. Select ONLY vmnic1 of ESXi host 10.0.1.1 and choose the VMNIC-Uplinks port group
from the Uplink port group drop-down menu. Click Next.
Warning

DO NOT select any vmnics that are currently in use by any vSwitches. DO NOT
select vmnic0.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-13

Lab 3: Install and Configure the Cisco Nexus 1000V VEM


Note

It is possible migrate port groups to the Cisco Nexus 1000V using this wizard,
instead of manually reconfiguring each VM vNIC. Since you have not created VM
port profiles for this purpose yet, you will migrate later.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

31. Do not select anything on the Network connectivity page. Click Next.

32. Leave Migrate virtual machine networking UNCHECKED and click Next.

L3-14

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

33. You are presented with an overview of the uplink ports that are created for the systemuplink port profile. You can have a maximum of 32 physical uplink ports per each v5.0
ESXi host. Click Finish.

34. Click the VMNIC-Uplinks port profile icon and then click the Hosts tab to ensure that
your ESXi host is listed as a member of the Nexus 1000V distributed virtual switch. Be
patient, this may take a few seconds to show up.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-15

Lab 3: Install and Configure the Cisco Nexus 1000V VEM


Note

It is normal to see a warning on your host. When you started an SSH session to the
host, Remote Tech Support mode (SSH access) was enabled. VMware recommends
you only leave this enabled when you need it (initial installation), and then disable it
since direct SSH access to ESXi hosts poses a security threat.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

35. Return to the Putty SSH window to your ESXi host and look at the VEM status again. You
should now see the VEM connected to the DVS (Distributed vSwitch) via the vmnic1
uplink adapter.
~ # vem status

VEM modules are loaded


Switch Name
vSwitch0
DVS Name
N1000V

Num Ports
128
Num Ports
256

Used Ports
8
Used Ports
12

Configured Ports
128
Configured Ports
256

MTU
1500
MTU
1500

Uplinks
vmnic0
Uplinks
vmnic1

VEM Agent (vemdpa) is running

36. Verify the status of the VEM uplink interface, vmnic1.


~ # vemcmd show port
LTL
18

VSM Port
Eth3/2

Admin Link
UP
UP

State
FWD

PC-LTL
0

SGID

Vem Port
vmnic1

37. Inspect the VLANs allowed on vmnic1 (displayed as Eth3/2 on the Nexus 1000V).
~ # vemcmd show port vlans

LTL
18

VSM Port
Eth3/2

Note

L3-16

Mode
T

Native
VLAN
1

VLAN
State
FWD

Allowed
Vlans
1,11-14

VEM commands can be run remotely from the VSM NX-OS CLI, for example,
module vem 3 execute vemcmd show port on the VSM would give the same
output.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

38. Validate that the VEMs Control VLAN, Packet VLAN, and the domain ID match the
VSM configuration.
~ # vemcmd show card

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Card UUID type 2: 44454c4c-5400-104a-8036-c7c04f43344a


Card name: esx01
Switch name: N1000V
Switch alias: DvsPortset-0
Switch uuid: e2 b2 08 50 c5 08 10 c2-09 ca 49 61 83 48 e5 2e
Card domain: 1
Card slot: 3
VEM Tunnel Mode: L2 Mode
VEM Control (AIPC) MAC: 00:02:3d:10:01:02
VEM Packet (Inband) MAC: 00:02:3d:20:01:02
VEM Control Agent (DPA) MAC: 00:02:3d:40:01:02
VEM SPAN MAC: 00:02:3d:30:01:02
Primary VSM MAC : 00:50:56:87:35:27
Primary VSM PKT MAC : 00:50:56:87:35:29
Primary VSM MGMT MAC : 00:50:56:87:35:28
Standby VSM CTRL MAC : 00:50:56:87:35:24
Management IPv4 address: 10.0.1.1
Management IPv6 address: 0000:0000:0000:0000:0000:0000:0000:0000
Secondary VSM MAC : 00:00:00:00:00:00
Secondary L3 Control IPv4 address: 0.0.0.0
Upgrade : Default
Max physical ports: 32
Max virtual ports: 216
Card control VLAN: 12
Card packet VLAN: 13
Card Headless Mode : No
Processors: 2
Processor Cores: 2
Processor Sockets: 1
Kernel Memory:
8388084
Port link-up delay: 5s
Global UUFB: DISABLED
Heartbeat Set: True
PC LB Algo: source-mac
Datapath portset event in progress: no

39. Return to the VSM SSH session at 10.0.1.200. Verify the Nexus 1000V sees the ESXi
VEM as a module in the virtual chassis.
N1000V(config)# show module
Mod
--1
2
3

Ports
----0
0
248

Module-Type
-------------------------------Virtual Supervisor Module
Virtual Supervisor Module
Virtual Ethernet Module

Model
-----------------Nexus1000V
Nexus1000V
NA

Status
-----------active *
ha-standby
ok

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-17

Lab 3: Install and Configure the Cisco Nexus 1000V VEM


Sw
--------------4.2(1)SV1(4a)
4.2(1)SV1(4a)
4.2(1)SV1(4a)

Hw
-----0.0
0.0
VMware ESX 5.0.0 Releasebuild-469512 (3.0)

Mod
--1
2
3

MAC-Address(es)
-------------------------------------00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
02-00-0c-00-03-00 to 02-00-0c-00-03-80

Mod
--1
2
3

Server-IP
--------------10.0.1.200
10.0.1.200
10.0.1.1

Serial-Num
---------NA
NA
NA

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Mod
--1
2
3

Server-UUID
-----------------------------------NA
NA
44454c4c-5400-104a-8036-c7c04f43344a

Server-Name
----------------NA
NA
10.0.1.1

* this terminal session

40. Verify the VSM has learned the MAC address of the VEM via Control VLAN 12.
N1000V(config)# show mac address-table vlan 12

VLAN
MAC Address
Type
Age
Port
Mod
---------+-----------------+-------+---------+------------------------------+12
0002.3d40.0102
static 0
N1KV Internal Port
3
12
0002.3d80.0102
static 0
N1KV Internal Port
3
12
0050.5687.3524
dynamic 0
Eth3/2
3
12
0050.5687.3527
dynamic 0
Eth3/2
3
Total MAC Addresses: 2

Note

The MAC address in the table should match the VEM Control Agent (DPA) MAC
from the previous vemcmd show card output on the ESXi host

41. Exit ESXi SSH Tech Support Mode.


~ # exit

42. Repeat Steps 15 to 41 for your second ESXi host, 10.0.1.2.


43. Return to the Putty session to your VSM at 10.0.1.200.

L3-18

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

44. Verify that the VEM agent on both of your ESXi hosts is properly communicating with the
VSM.
N1000V(config)# show module
Ports
----0
0
248
248

Module-Type
-------------------------------Virtual Supervisor Module
Virtual Supervisor Module
Virtual Ethernet Module
Virtual Ethernet Module

Model
-----------------Nexus1000V
Nexus1000V
NA
NA

Mod
--1
2
3
4

Sw
---------------4.2(1)SV1(4a)
4.2(1)SV1(4a)
4.2(1)SV1(4a)
4.2(1)SV1(4a)

Mod
--1
2
3
4

MAC-Address(es)
-------------------------------------00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
02-00-0c-00-03-00 to 02-00-0c-00-03-80
02-00-0c-00-04-00 to 02-00-0c-00-04-80

Mod
--1
2
3
4

Server-IP
Server-UUID
--------------- -----------------------------------10.0.1.200
NA
10.0.1.200
NA
10.0.1.1
44454c4c-5400-104a-8036-c7c04f43344a
10.0.1.2
44454c4c-5400-104a-8036-c4c04f43344a

Status
-----------active *
ha-standby
ok
ok

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Mod
--1
2
3
4

Hw
-----------------------------------------------0.0
0.0
VMware ESX 5.0.0 Releasebuild-469512 (3.0)
VMware ESX 5.0.0 Releasebuild-469512 (3.0)
Serial-Num
---------NA
NA
NA
NA

Server-Name
-----------------NA
NA
10.0.1.1
10.0.1.2

* this terminal session

Note

Modules 1 and 2 are reserved for VSMs, one active and one standby (like reserved
SUP slots on a Nexus 7000 chassis,). Modules 3 and 4 represent each VEM. As
shown at the bottom of the screen, each VEM corresponds to a physical ESXi host,
identified by the server IP address.

N1000V(config)# show module vem mapping


Mod
--3
4

Status
----------powered-up
powered-up

UUID
-----------------------------------44454c4c-5400-104a-8036-c7c04f43344a
44454c4c-5400-104a-8036-c4c04f43344a

License Status
-------------licensed
licensed

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-19

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

45. Look at the uplink port profile you created again.


N1000V(config)# show port-profile name Host-Uplinks

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

port-profile Host-Uplinks
type: Ethernet
description: Uplinks from ESXi hosts to switch
status: enabled
max-ports: 32
min-ports: 1
inherit:
config attributes:
switchport mode trunk
switchport trunk allowed vlan 1,11-14
no shutdown
evaluated config attributes:
switchport mode trunk
switchport trunk allowed vlan 1,11-14
no shutdown
assigned interfaces:
Ethernet3/2
Ethernet4/2
port-group: VMNIC-Uplinks
system vlans: 1,11-12
capability l3control: no
capability iscsi-multipath: no
port-profile role: none
port-binding: static

Note

You should now see interfaces assigned to the port profile, as you connected vmnic1
on each host to the port profile in vCenter.

Activity Verification

You have completed this task when you attain these results on both ESXi hosts:
Installed and verified the Cisco Nexus 1000V VEM

Assigned vmnic1 to the uplink port group on both hosts to connect the hosts to the
Cisco Nexus 1000V DVS

L3-20

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

Task 4: Create a vEthernet Port Profile for Virtual


Machines
In this task, you will create a Cisco Nexus 1000V virtual machine data port profile. This
profile will be type vEthernet, as VM vNICs will connect to it, as opposed to type Ethernet,
which you already created for physical NICs.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

46. Return to the Putty SSH session to your VSM at 10.0.1.200.

47. Create a vEthernet port profile for your production Virtual Machines to use.

N1000V(config)# port-profile type vethernet Production-VMs


N1000V(config-port-prof)# description Production VM network
N1000V(config-port-prof)# vmware port-group
N1000V(config-port-prof)# switchport mode access
N1000V(config-port-prof)# switchport access vlan 14
N1000V(config-port-prof)# no shutdown
N1000V(config-port-prof)# state enabled

48. Verify the port profile configuration virtual machine data port profile.
N1000V(config)# show port-profile name Production-VMs
port-profile Production-VMs
type: Vethernet
description: Production VM network
status: enabled
max-ports: 32
min-ports: 1
inherit:
config attributes:
switchport mode access
switchport access vlan 14
no shutdown
evaluated config attributes:
switchport mode access
switchport access vlan 14
no shutdown
assigned interfaces:
port-group: Production-VMs
system vlans: none
capability l3control: no
capability iscsi-multipath: no
port-profile role: none
port-binding: static

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-21

Lab 3: Install and Configure the Cisco Nexus 1000V VEM


Note

No interfaces are shown because none have been assigned yet. Virtual interfaces
are assigned automatically when you add virtual machines to this port group in
vCenter.

49. Save your configuration using your CLI alias.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config)# wr
[########################################] 100%

50. Return to the Networking inventory view in vCenter. The Production-VMs port profile
should now be visible as a port group on the Cisco Nexus 1000V.

Note

Ethernet port profiles have different icons than vEthernet port profiles. Ethernet
shows a green card to indicate physical NICs connect to it, and vEthernet shows a
blue icon to represent a VM network that vNICs should connect to.

Activity Verification

You have completed this task when you attain these results:

Created a vEthernet port profile for your production VMs to use on the VSM and
verified propagation to vCenter.

L3-22

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

Task 5: Test Cisco Nexus 1000V Functionality


In this task, you will migrate your production Windows virtual machines from standard
vSwitch0 to a Cisco Nexus 1000V DVS port group and verify connectivity between your
VMs.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

51. Using the navigation bar in vCenter, go to the Networking inventory view (Home >
Inventory > Networking), or use the shortcut Ctrl-Shift-N.

52. Right-click on the N1000V switch icon and select Migrate Virtual Machine Networking.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-23

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

53. Select the source network Production and destination network Production-VMs
(N1000V). One network is a port group on a standard vSwitch, and the other is a port
group on the Nexus 1000V DVS. Click Next.

54. Click All Virtual Machines to select both of your Windows VMs. Click Next.

L3-24

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

55. Verify you have selected the correct source and destination networks, and that both your
Windows VMs will be migrated. Click Finish.

56. Wait for the task to complete in vCenter, and then click on N1000V switch icon and select
the Configuration tab.

57. Expand the port groups by clicking the plus icon. Verify the Windows VMs are connected
to the Production-VMs port group.
Note

You can click the information icon next to vmnic1 of each ESXi hosts uplink NIC for
Cisco Discovery Protocol (CDP) information. You may need to minimize the Pan and
Zoom box to view the icon.

58. Using the navigation bar in vCenter, go to the Hosts and Clusters view (Home > Inventory
> Hosts and Clusters), or use the shortcut Ctrl-Shift-H.

59. Right-click the WinServer-1 VM and click Edit Settings.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-25

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

60. Select Network adapter 1 and verify that it is now connected to the Cisco Nexus 1000V
port group Production (N1000V). Click Cancel.
The port number is also shown underneath the network label. This is the port the VM
is connected to on the Nexus 1000V.

Note

Clicking Switch to advanced settings allows you to connect to other Nexus 1000V
switches, as well as manually specify the port number. Do not modify this now.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

Note

L3-26

Instead of using the Migrating Virtual Machine Networking wizard as you did
earlier in this Task, you could also move your virtual machines to a Cisco Nexus
1000V port group by changing the network adapter connection in this window,
although this would have to be done one VM at a time.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

61. Return to the Putty session connected to the VSM at 10.0.1.200.


Look at the interface output.
N1000V(config)# show interface brief

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

-----------------------------------------------------------------------------Port
VRF
Status IP Address
Speed
MTU
-----------------------------------------------------------------------------mgmt0
-up
10.0.1.200
1000
1500
-----------------------------------------------------------------------------Ethernet
VLAN
Type Mode
Status Reason
Speed
Port
Interface
Ch #
-----------------------------------------------------------------------------Eth3/2
1
eth trunk up
none
1000
Eth4/2
1
eth trunk up
none
1000
-----------------------------------------------------------------------------Vethernet
VLAN
Type Mode
Status Reason
Speed
-----------------------------------------------------------------------------Veth1
14
virt access up
none
auto
Veth2
14
virt access up
none
auto
-----------------------------------------------------------------------------Port
VRF
Status IP Address
Speed
MTU
-----------------------------------------------------------------------------control0 -up
-1000
1500

Note

Ports Veth1 and Veth2 connect to your Windows VMs vNICs that were just
connected to the Nexus 1000V DVS. The vEth ports were automatically created
when you migrated your VMs to the Production-VMs port group. Whenever the VM
moves, the vEth port moves with it, therefore the VM will always appear to be
connected to the same vEth port.

62. View the interfaces corresponding to each port profile. This command also lists the
configuration on each port, which is inherited from the port profile configuration.
N1000V# show port-profile expand-interface

port-profile Host-Uplinks
Ethernet3/2
switchport mode trunk
switchport trunk allowed vlan 1,11-14
no shutdown
Ethernet4/2
switchport mode trunk
switchport trunk allowed vlan 1,11-14
no shutdown
port-profile Production-VMs
Vethernet1

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-27

Lab 3: Install and Configure the Cisco Nexus 1000V VEM


switchport mode access
switchport access vlan 14
no shutdown
Vethernet2
switchport mode access
switchport access vlan 14
no shutdown
port-profile Unused_Or_Quarantine_Uplink

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

port-profile Unused_Or_Quarantine_Veth

63. Explore some interface commands on your vEth interfaces, which are connected to your
Windows VMs.
N1000V(config)# show interface vethernet 1 status

-----------------------------------------------------------------------------Port
Name
Status
Vlan
Duplex Speed
Type
-----------------------------------------------------------------------------Veth1
WinServer-1, Netwo up
14
auto
auto
--

N1000V(config)# show interface vethernet 1

Vethernet1 is up
Port description is WinServer-1, Network Adapter 1
Hardware is Virtual, address is 0050.569c.3db7 (bia 0050.569c.3db7)
Owner is VM "WinServer-1", adapter is Network Adapter 1
Active on module 3
VMware DVS port 100
Port-Profile is Production-VMs
Port mode is access
5 minute input rate 0 bytes/second, 0 packets/second
5 minute output rate 0 bytes/second, 0 packets/second
Rx
20 Input Packets 0 Unicast Packets
0 Multicast Packets 20 Broadcast Packets
2135 Bytes
Tx
13 Output Packets 0 Unicast Packets
0 Multicast Packets 13 Broadcast Packets 13 Flood Packets
780 Bytes
0 Input Packet Drops 0 Output Packet Drops

N1000V(config)# show interface vethernet 2 status

-----------------------------------------------------------------------------Port
Name
Status
Vlan
Duplex Speed
Type
-----------------------------------------------------------------------------Veth2
WinServer-2, Netwo up
14
auto
auto
--

N1000V(config-port-prof)# show interface vethernet 2

L3-28

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Vethernet2 is up
Port description is WinServer-2, Network Adapter 1
Hardware: Virtual, address: 0050.56a9.0000 (bia 0050.56a9.0000)
Owner is VM "WinServer-2", adapter is Network Adapter 1
Active on module 4
VMware DVS port 161
Port-Profile is Production-VMs
Port mode is access
5 minute input rate 0 bits/second, 0 packets/second
5 minute output rate 0 bits/second, 0 packets/second
Rx
15 Input Packets 0 Unicast Packets
0 Multicast Packets 15 Broadcast Packets
900 Bytes
Tx
16 Output Packets 0 Unicast Packets
0 Multicast Packets 16 Broadcast Packets 16 Flood Packets
1708 Bytes
0 Input Packet Drops 0 Output Packet Drops

Note

Note that the owner is listed as the name of the virtual machine, and that the module
the VM is connected to corresponds to the host that is currently running the VM (i.e.
module 3 for ESXi 1 or module 4 for ESXi 2 VEMs).

64. Right-click VM WinServer-1, and then select Open Console.

Open command prompt and confirm the vNIC MAC address using the command ipconfig
/all. Repeat this step on your second virtual machine WinServer-2.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-29

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

65. In the WinServer-1 command prompt, start a continuous ping to WinServer-2 at 10.0.14.2.

66. Display the VLAN 14 MAC address table in VLAN 14. This should now contain your
Windows VMs MAC addresses.

N1000V(config-port-prof)# show mac address-table vlan 14

VLAN
MAC Address
Type
Age
Port
Mod
---------+-----------------+-------+---------+------------------------------+14
0050.5687.5a40
static 0
Veth1
3
14
000c.29ca.c69e
dynamic 4
Eth3/2
3
14
0050.5687.5a3f
dynamic 110
Eth3/2
3
14
0050.5687.5a3f
static 0
Veth2
4
14
000c.29ca.c69e
dynamic 4
Eth4/2
4
14
0050.5687.5a40
dynamic 110
Eth4/2
4
Total MAC Addresses: 6

Note

The MAC address of each VM appears twice. This is because each VEM learns the
MAC address of the VM connected to the other VEM on its uplink interface.

Note

You may see other MAC addresses in the table.

67. Shut down the virtual Ethernet port connected to the WinServer-1 VM.
N1000V(config-port-prof)# interface vethernet 1
N1000V(config-if)# shutdown

L3-30

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 3: Install and Configure the Cisco Nexus 1000V VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

68. Return to the WinServer-1 VM console and observe that since the vEth port is down, the
pings cannot reach the virtual network and therefore time out.

Note

Because you shutdown the vEth port this VM is attached to, you essentially
disconnected the VM from the network. The VM receives a link-down status.
Essentially, this is like the [virtual] cable from the vNIC is unplugged from the vEth
port on the Nexus 1000V.

69. Re-enable the virtual Ethernet port that the WinServer-1 VM is connected to.
N1000V(config-if)# no shutdown
N1000V(config-if)# exit

70. Inspect the port statistics on vEth1. Just like a physical Ethernet port, you can view traffic
metrics on a vEth interface for an individual VM.
N1000V(config)# show interface vethernet 1

Vethernet1 is up
Port description is WinServer-1, Network Adapter 1
Hardware is Virtual, address is 0050.569c.3db7 (bia 0050.569c.3db7)
Owner is VM "WinServer-1", adapter is Network Adapter 1
Active on module 3
VMware DVS port 100
Port-Profile is Production-VMs
Port mode is access
5 minute input rate 96 bytes/second, 0 packets/second
5 minute output rate 808 bytes/second, 0 packets/second
Rx
1751332 Input Packets 1743367 Unicast Packets

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L3-31

Lab 3: Install and Configure the Cisco Nexus 1000V VEM


6 Multicast Packets 9007 Broadcast Packets
134534671 Bytes
Tx
4434676 Output Packets 1745670 Unicast Packets
1483586 Multicast Packets 1206728 Broadcast Packets 2689062 Flood Packets
371987465 Bytes
0 Input Packet Drops 340 Output Packet Drops

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

71. From the 1000V VSM, save your configuration using your CLI alias.
N1000V# wr
[########################################] 100%

72. Verify that you are receiving ping replies again in the console of the WinServer-1 VM.

73. Stop the continuous ping session by closing the command prompt window, or by typing
Ctrl-C.

Activity Verification

You have completed this task when you attain these results:

Migrated VMs WinServer-1 and WinServer-2 to the Cisco Nexus 1000V ProductionVMs port group.

Verified connectivity between both virtual machines in the new Production-VMs port
group.

L3-32

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L4
Upgrading the Cisco Nexus
1000V VSM and VEM

Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-1

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

Activity Objective
In this activity, you will upgrade the Cisco Nexus 1000V VSMs and VEMs. After
performing this lab, you should be able to perform the following:
Upload the VSM upgrade software to the VSM
Upgrade your VSM VMs to NX-OS release 4.2(1)SV1(5.2)

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Upgrade your VEM modules to NX-OS release 4.2(1)SV1(5.2)

Required Resources

These are the resources and equipment required for each pod to complete this activity:

Two VMware ESXi 5.0 hosts with the Cisco Nexus 1000V VEM installed

One server running VMware vCenter Server 5 and VMware vSphere Client 5.0
Two Cisco Nexus 1000V VSM VM appliances
All pods share the following lab core devices:
One switch for server networking
One iSCSI-based storage device

Command List

The table describes the commands used in this activity.

L4-2

Command

Description

show version

Display the version of Cisco Nexus operating


system software running on the Cisco Nexus
1000V and the name of the files

directory bootflash

Display the contents of the bootflash: partition

Copy tftp://<ipaddress>/<filename>
bootflash:<filename>

Copy the contents of a file from a tftp server to the


bootflash partition

show module

Displays module information

Copy running startup

Saves the running configuration

show vmware vem upgrade


status

Displays the required VEM version to upgrade to

vmware vem upgrade notify

Notification from the Cisco Nexus 1000V VSM to


vSphere of desire to perform a VEM upgrade

esxcli software vib


install v <VIB location>

Upgrade manually the VEM software version

vmware vem upgrade


complete

Notification from the Cisco Nexus 1000V VSM to


vSphere that VEM upgrade is complete

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

Job Aids
These job aids are available to help you complete the lab activity.
Lab topology diagram in the visual objectives section in the beginning of this lab
Lab connections table in the general lab topology information section in the beginning
of the lab guide

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Lab IP address and VLAN plan in the general lab topology information section in the
beginning of the lab guide

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-3

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

Task 1: Upload the New VSM Software to the VSM


The Cisco 1000V VSM should be upgraded first. The version of software running currently
in the Cisco 1000V VSM is Release 4.2(1)SV1(4a). You will be upgrading to NX-OS
release 4.2(1)SV1.(5.2).

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

In this task, you will upload the new image to the Cisco Nexus 1000V VSM from your
vCenter desktop via TFTP server.

Activity Procedure
Complete these steps:

1.

Return to the PuTTY SSH session to your VSM at 10.0.1.200.

Verify the current version running on the Cisco Nexus 1000V is 4.2(1)SV1(4a).

N1000V(config)# show version

Cisco Nexus Operating System (NX-OS)


Software TAC support: http://www.cisco.com/tac
Copyright (c) 2002-2012, Cisco Systems, Inc. All rights reserved
The copyrights to certain works contained herein are owned by other third parties
and are used and distributed under license.
Some parts of this software are covered under the GNU Public License. A copy of the
license is available at http://www.gnu.org/licenses/gpl.html.

Software
loader: version unavailable [last: loader version not available]
kickstart: version 4.2(1)SV1(4a)
system: version 4.2(1)SV1(4a)
kickstart image file is: bootflash:/nexus-1000v-kickstart-mz.4.2.1.SV1.4a.bin
kickstart compile time: 7/27/2012 3:00:00 [07/27/2012 12:49:49]
system image file is: bootflash:/nexus-1000v-mz.4.2.1.SV1.4a.bin
system compile time: 7/27/2011 3:00:00 [07/27/2011 13:42:57]
Hardware
cisco Nexus 1000V Chassis ("Virtual Supervisor Module")
Intel(R) Xeon(R) CPU with 2075740 kB of memory.
Processor Board ID T5056B1802D

Device name: Nexus1000v


bootflash: 1557496 kB
Kernel uptime is 1 day(s), 8 hour(s), 31 minute(s), 3 second(s)
plugin
Core Plugin, Ethernet Plugin, Virtualization Plugin

L4-4

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

2.

Go to the vCenter Server desktop. You will need to disable the firewall on vCenter so you
can use a TFTP server to get the new NX-OS files to the VSM.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Click Start and type firewall.cpl into the command panel and press the enter key.

3.

Click Turn Windows Firewall on or off.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-5

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

Choose Turn off Windows Firewall in both Home and Public locations and click OK.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

4.

5.

L4-6

Close the Windows Firewall panel.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

From the vCenter Server desktop, navigate to the following directory:


N:\Nexus1000v.4.2.1.SV1.5.2\VSM\Upgrade

7.

Highlight both files, right-click, and select Copy.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

6.

8.

Navigate to the C:\ drive, and paste the files here.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-7

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

9.

From the desktop of your vCenter Server system, open 3CDaemon.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

You will setup 3CDaemon as a TFTP server so the VSM can connect and copy the NX-OS
kickstart and system files to bootflash.

L4-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

10. Click the TFTP Server tab in the left-hand pane. Ensure the TFTP Server is started. Click
Configure TFTP Server, and then click the icon to change the default
Upload/Download directory.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-9

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

11. Click Local Disk (C:), and then click OK.

12. Click OK, and then click Yes to save changes on the page.
13. Leave 3CDaemon open. Go back to the C:\ drive.

14. Right-click the kickstart file, and select Rename. Do not rename the file; simply copy the
filename to the clipboard so you do not have to type it in the NX-OS CLI in a later step.

15. Return to the PuTTY SSH session to your VSM at 10.0.1.200. Examine the contents of
bootflash on the Cisco Nexus 1000V VSM.

N1000V(config)# dir
19
77824
4096
4096
16384
2521
19642880
103922265
14441

L4-10

May
May
May
May
Jan
May
Jan
Jan
May

04
07
07
07
27
07
27
27
07

05:50:14
11:58:11
11:14:39
11:14:36
17:00:51
11:58:07
17:01:09
17:01:13
11:59:06

2012
2012
2012
2012
2011
2012
2011
2011
2012

.ovfconfigured
accounting.log
core/
log/
lost+found/
mts.log
nexus-1000v-kickstart-mz.4.2.1.SV1.4a.bin
nexus-1000v-mz.4.2.1.SV1.4a.bin
stp.log.1

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM


2569
4096
4096
4096
20827098

May
Jan
Jan
Jan
Jan

07
27
27
27
27

11:57:46
17:01:48
17:01:48
17:01:48
17:01:20

2012
2011
2011
2011
2011

system.cfg.new
vdc_2/
vdc_3/
vdc_4/
vnmc-vsmpa.1.2.1a.bin

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Usage for bootflash://sup-local


264097792 bytes used
1330778112 bytes free
1594875904 bytes total

Note

You should see two NX-OS files with the same version. NX-OS always comes as a
pair of files for any version: system and kickstart. The kickstart image is the kernel
image, and the system file is the NX-OS operating system.

16. Upload the new NX-OS kickstart file to bootflash.

N1000V(config)# copy tftp://10.0.1.50/<right-click> bootflash:<right-click>


Enter vrf (If no input, current vrf defaultis considered): management
Trying to connect to tftp server......
Connection to Server Established.
TFTP get operation was successful

17. Go back to the C:/ drive and copy the name of the new NX-OS system image. The system
file is the one that doesnt have kickstart in the name.
18. Upload the new NX-OS system file to bootflash.

N1000V(config)# copy tftp://10.0.1.50/<right-click> bootflash:<right-click>


Enter vrf (If no input, current vrf defaultis considered): management
Trying to connect to tftp server......
Connection to Server Established.
TFTP get operation was successful

Note

Copying the system file to booflash make take ~20 minutes. Feel free to take a break
while the file copies.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-11

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

19. Verify both the new kickstart and system NX-OS files are available on the VSM bootflash.
N1000V(config)# dir
May
May
May
May
Jan
May
Jan
Sep
Jan
Sep
May
May
Jan
Jan
Jan
Jan

04
07
07
07
27
07
27
28
27
28
07
07
27
27
27
27

05:50:14
11:58:11
11:14:39
11:14:36
17:00:51
11:58:07
17:01:09
02:40:37
17:01:13
02:44:54
11:59:06
11:57:46
17:01:48
17:01:48
17:01:48
17:01:20

2012
2012
2012
2012
2011
2012
2011
2012
2011
2012
2012
2012
2011
2011
2011
2011

.ovfconfigured
accounting.log
core/
log/
lost+found/
mts.log
nexus-1000v-kickstart-mz.4.2.1.SV1.4a.bin
nexus-1000v-kickstart-mz.4.2.1.SV1.5.2.bin
nexus-1000v-mz.4.2.1.SV1.4a.bin
nexus-1000v-mz.4.2.1.SV1.5.2.bin
stp.log.1
system.cfg.new
vdc_2/
vdc_3/
vdc_4/
vnmc-vsmpa.1.0.1j.bin

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

19
77824
4096
4096
16384
2521
19642880
19540480
103922265
80806200
14441
2569
4096
4096
4096
20827098

Usage for bootflash://sup-local


364560384 bytes used
1230315520 bytes free
1594875904 bytes total

Activity Verification

You have completed this task when you attain these results:

Uploaded Cisco Nexus 1000V system and kickstart files for NX-OS release
4.2(1)SV1(5.2) to the bootflash directory of your VSM.

L4-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

Task 2: Upgrade your VSM to NX-OS Release


4.2(1)SV1(5.2)
In this task, you will upgrade your VSM virtual machines to NX-OS release
4.2(1)SV1(5.2).

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:
Note

Before upgrading a VSM in production, Cisco recommends you close any 1000V
configuration sessions, commit all changes to startup-config, save a backup copy of
the running-config on external storage, and perform a backup of the VSM.

20. Return to the vSphere Client. Open a console session to your WinServer-1 virtual
machine. Start a continuous ping to the WinServer-2 VM at address 10.0.14.2.

21. From the Nexus 1000V VSM, save your configuration before testing and proceeding with
the upgrade. Save your configuration using your CLI alias.

N1000V(config)# wr
[########################################] 100%

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-13

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

22. Examine the impact of upgrading NX-OS to release 4.2(1)SV1(5.2) kickstart and system
software. It is best practice to see the impact of the install before actually doing the install.
Be patient as this impact step goes thru all steps.
N1000V(config)# show install all impact kickstart bootflash:nexus-1000v-kickstartmz.4.2.1.SV1.5.2.bin system bootflash:nexus-1000v-mz.4.2.1.SV1.5.2.bin

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Verifying image bootflash:/nexus-1000v-kickstart-mz.4.2.1.SV1.5.2.bin for boot


variable "kickstart".
[####################] 100% -- SUCCESS
Verifying image bootflash:/nexus-1000v-mz.4.2.1.SV1.5.2.bin for boot variable
"system".
[####################] 100% -- SUCCESS
Verifying image type.
[####################] 100%% -- SUCCESS

Extracting "system" version from image bootflash:/nexus-1000v-mz.4.2.1.SV1.5.2.bin.


[####################] 100% -- SUCCESS
Extracting "kickstart" version from image bootflash:/nexus-1000v-kickstartmz.4.2.1.SV1.5.2.bin.
[####################] 100% -- SUCCESS
Notifying services about system upgrade
SUCCESS

Compatibility check is done:


Module
bootable
Impact
------ -------- -------------- -----------1
yes
non-disruptive
2
yes
non-disruptive

[####################] 100% --

Install-type
-----reset
reset

Reason

Images will be upgraded according to following table:


Module
Image
Running-Version
New-Version Upg-Required
------ ---------- ---------------------- ---------------------- --------1
system
4.2(1)SV1(4a)
4.2(1)SV1(5.2)
yes
1
kickstart
4.2(1)SV1(4a)
4.2(1)SV1(5.2)
yes
2
system
4.2(1)SV1(4a)
4.2(1)SV1(5.2)
yes
2
kickstart
4.2(1)SV1(4a)
4.2(1)SV1(5.2)
yes

Module
Running-Version
ESX Version
VSM Compatibility
ESX Compatibility
------ ---------------------- --------------------------------------------3
4.2(1)SV1(4a)
VMware ESXi 5.0.0 Releasebuild-469512 (3.0)
COMPATIBLE
COMPATIBLE
4
4.2(1)SV1(4a)
VMware ESXi 5.0.0 Releasebuild-469512 (3.0)
COMPATIBLE
COMPATIBLE

Note

L4-14

The install all command performs an In-Service Software Upgrade (ISSU) on dual
VSMs in a highly available environment. By including the show and impact
keywords, you can determine the potential impact of an upgrade before actually
performing one.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

23. Install the new Nexus 1000V image on the VSM. Note you will have to confirm by typing
y and then Enter once the images have been verified. It is expected that your Putty session
will close (fail) at the end of this install. Again, be patient as the install goes thru each of
the steps as follows.
N1000V(config)# install all kickstart bootflash:nexus-1000v-kickstartmz.4.2.1.SV1.5.2.bin system bootflash:nexus-1000v-mz.4.2.1.SV1.5.2.bin

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Verifying image bootflash:/nexus-1000v-kickstart-mz.4.2.1.SV1.5.2.bin for boot


variable "kickstart".
[####################] 100% -- SUCCESS
Verifying image bootflash:/nexus-1000v-mz.4.2.1.SV1.5.2.bin for boot variable
"system".
[####################] 100% -- SUCCESS
Verifying image type.
[####################] 100% -- SUCCESS

Extracting "system" version from image bootflash:/nexus-1000v-mz.4.2.1.SV1.5.2.bin.


[####################] 100% -- SUCCESS
Extracting "kickstart" version from image bootflash:/nexus-1000v-kickstartmz.4.2.1.SV1.5.2.bin.
[####################] 100% -- SUCCESS
Notifying services about system upgrade
SUCCESS

Compatibility check is done:


Module bootable
Impact
------ -------- -------------- -----------1
yes
non-disruptive
2
yes
non-disruptive

[####################] 100% --

Install-type
-----reset
reset

Reason

Images will be upgraded according to following table:


Module
Image
Running-Version
New-Version Upg-Required
------ ---------- ---------------------- ---------------------- --------1
system
4.2(1)SV1(4a)
4.2(1)SV1(5.2)
yes
1
kickstart
4.2(1)SV1(4a)
4.2(1)SV1(5.2)
yes
2
system
4.2(1)SV1(4a)
4.2(1)SV1(5.2)
yes
2
kickstart
4.2(1)SV1(4a)
4.2(1)SV1(5.2)
yes

Module
Running-Version
ESX Version
VSM Compatibility
ESX Compatibility
------ ---------------------- --------------------------------------------3
4.2(1)SV1(4a)
VMware ESXi 5.0.0 Releasebuild-469512 (3.0)
COMPATIBLE
COMPATIBLE
4
4.2(1)SV1(4a)
VMware ESXi 5.0.0 Releasebuild-469512 (3.0)
COMPATIBLE
COMPATIBLE
Do you want to continue with the installation (y/n)?

[n] y

Install is in progress, please wait.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-15

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM


Syncing image bootflash:/nexus-1000v-kickstart-mz.4.2.1.SV1.5.2.bin to standby.
[####################] 100% -- SUCCESS
Syncing image bootflash:/nexus-1000v-mz.4.2.1.SV1.5.2.bin to standby.
[####################] 100% -- SUCCESS
Setting boot variables.
[####################] 100% -- SUCCESS

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Performing configuration copy.


[####################] 100% -- SUCCESS

2012 Sep 30 04:44:41 N1000V %PLATFORM-2-MOD_REMOVE: Module 2 removed (Serial number


T5056BD0005)
2012 Sep 30 04:45:17 N1000V %PLATFORM-2-MOD_DETECT: Module 2 detected (Serial
number :unavailable) Module-Type Virtual Supervisor Module Model :unavailable
Module 2: Waiting for module online.
-- SUCCESS

Notifying services about the switchover.


[####################] 100% -- SUCCESS
"Switching over onto standby".

24. Go back to the VM WinServer-2. Ensure the ping is still successfuly without interruption
during the upgrade process.

L4-16

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

25. Open a new Putty SSH session to your VSM at 10.0.1.200. Login with username admin
and password cisco123.
It is necessary to open a new session due to the VSM switchover during the upgrade.
Verify the version of the NX-OS software that is now running.
N1000V# show version

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Software TAC support: http://www.cisco.com/tac


Copyright (c) 2002-2012, Cisco Systems, Inc. All rights reserved
The copyrights to certain works contained herein are owned by other third parties
and are used and distributed under license.
Some parts of this software are covered under the GNU Public License. A copy of the
license is available at http://www.gnu.org/licenses/gpl.html.
Software
loader: version unavailable [last: loader version not available]
kickstart: version 4.2(1)SV1(5.2)
system: version 4.2(1)SV1(5.2)
kickstart image file is: bootflash:/nexus-1000v-kickstart-mz.4.2.1.SV1.5.2.bin
kickstart compile time: 7/27/2012 3:00:00 [07/27/2012 12:49:49]
system image file is: bootflash:/nexus-1000v-mz.4.2.1.SV1.5.2.bin
system compile time: 8/2/2011 3:00:00 [08/2/2012 13:42:57]
Hardware
cisco Nexus 1000V Chassis ("Virtual Supervisor Module")
Intel(R) Xeon(R) CPU with 2075740 kB of memory.
Processor Board ID T5056B1802D

Device name: Nexus1000v


bootflash: 1557496 kB
Kernel uptime is 0 day(s), 0 hour(s), 5 minute(s), 41 second(s)
plugin
Core Plugin, Ethernet Plugin, Virtualization Plugin

26. Verify the VSMs are still in a highly available redundant configuration.
N1000V-VSM(config)# show system redundancy status
Redundancy role
--------------administrative:
operational:

primary
primary

Redundancy mode
--------------administrative:
operational:

HA
HA

This supervisor (sup-1)


----------------------Redundancy state:
Active
Supervisor state:
Active
Internal state:
Active with HA standby

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-17

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM


Other supervisor (sup-2)
-----------------------Redundancy state:
Standby
Supervisor state:
Internal state:

HA standby
HA standby

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Verification

You have completed this task when you attain these results:

Upgraded the VSM primary and secondary modules in your Cisco Nexus 1000V Series
Switch to Release 4.2(1)SV1(5.2) software.

L4-18

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

Task 3: Upgrade Your VEMs to Release


4.2(1)SV1(5.2)
In this task, you will upgrade your Cisco Nexus 1000V VEM software to NX-OS release
4.2(1)SV1(5.2).

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:
Note

Before performing a VEM upgrade in production, Cisco recommends you are logged
into the VSM CLI, have VMware documentation handy, have not placed the VEM
image in the root host directory (use /tmp instead), and have the following configured
on your upstream (physical) switches: PortFast (STP edge port), BPDU Filtering, and
BPDU Guard.

Note

Starting with VMware vCenter v5.0 Update 1, it is possible to do a combined upgrade


of both the ESXi Hypervisor version and the VEM Nexus 1000V module version. In
the lab, you will only upgrade the Nexus 1000V VEM component. In production, the
only extra step in a combined upgrade would be to upgrade ESXi first, and then
upgrade the VEM (both while the host is in maintenance mode).

27. The VEM software component of the Nexus 1000V in your ESXi hosts is upgraded
separately from the VSM. Up to this point, the only pieces that have been upgraded are the
VSMs on the Cisco Nexus 1000V (both active and standby).

28. Start by verifying the current version running on the VEM components of the Cisco Nexus
1000V. Note how the VEMs are still on the prior version (4a) from the upgraded VSMs
(5.2).
N1000V# show module
Mod
--1
2
3
4

Ports
----0
0
248
248

Module-Type
-------------------------------Virtual Supervisor Module
Virtual Supervisor Module
Virtual Ethernet Module
Virtual Ethernet Module

Mod
--1
2
3
4

Sw
---------------4.2(1)SV1(5.2)
4.2(1)SV1(5.2)
4.2(1)SV1(4a)
4.2(1)SV1(4a)

Model
-----------------Nexus1000V
Nexus1000V
NA
NA

Status
-------active *
ha-standby
ok
ok

Hw
-----------------------------------------------0.0
0.0
VMware ESX 5.0.0 Releasebuild-469512 (3.0)
VMware ESX 5.0.0 Releasebuild-469512 (3.0)

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-19

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM


Mod
--1
2
3
4

MAC-Address(es)
-------------------------------------00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
02-00-0c-00-03-00 to 02-00-0c-00-03-80
02-00-0c-00-04-00 to 02-00-0c-00-04-80

Mod
--1
2
3
4

Server-IP
--------------10.0.1.200
10.0.1.200
10.0.1.1
10.0.1.2

Serial-Num
---------NA
NA
NA
NA
Server-Name
---------------------NA
NA
10.0.1.1
10.0.1.2

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Server-UUID
---------------------------------NA
NA
564d26cf-7fdf-86a8-020d-def2e60ef1f9
564d525c-eb5d-d3a9-1edb-544c059d43af

* this terminal session

29. To upgrade the VEM you will need to make the 4.2(1)SV1(5.2)VEM bundle available to
your ESXi hosts.
Since you are not using the VMware Update Manager (VUM), a manual upgrade is
necessary. Determine the VEM version required.

N1000V# show vmware vem upgrade status


Upgrade
Upgrade
Upgrade
Upgrade
Upgrade
Upgrade
Upgrade
Upgrade

VIBs: System VEM Image


Status:
Notification Sent Time:
Status Time(vCenter):
Start Time:
End Time(vCenter):
Error:
Bundle ID:
VSM: VEM410-201208144101-BG
DVS: VEM400-201107031-RG

Note

Referring to the document entitled Cisco Nexus 1000V and VMware Compatibility
Information, Release 4.2(1)SV1(5.2), this VEM bundle corresponds to the
cross_cisco-vem_v144-4.2.1.1.5.2.0-3.0.1.vib VIB version. You will use the
cross_cisco-vem_v144-4.2.1.1.5.2.0-3.0.1.vib VIB to manually upgrade the VEM
modules.

30. Return to the vSphere Client. Use the navigation bar in vCenter to go to the Hosts and
Clusters view (Home > Inventory > Hosts and Clusters).

L4-20

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

31. Choose your first ESXi host 10.0.1.1. In the Summary tab, right-click the ISCSIVMFS
and choose Browse Datastore.

32. Ensure the following file is present in the root directory of the ISCSIVMFS datastore:
cross_cisco-vem_v144-4.2.1.1.5.2.0-3.0.1.vib.

If the file is not present, upload it from the DVD in the N: drive of your vCenter Server
host.

33. Open an SSH session to your ESXi host at IP address 10.0.1.1.

34. Log into the ESXi host with username root and password cisco123.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-21

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

35. With the CD command, navigate to the directory /vmfs/volumes/ISCSIVMFS and list the
contents of this directory. Verify that the VEM VIB file is located in this directory.
/vmfs/volumes/4bab21a5-e7608223-4c78-003048bdc94f # ls

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

AddOns.iso
N1000V-VSM1
N1000V-VSM2
WinServer-1
WinServer-2
WindowsXP.iso
cross_cisco-vem-v131-4.2.1.1.4.1.0-3.0.4.vib
cross_cisco-vem_v144-4.2.1.1.5.2.0-3.0.1.vib

36. Change back to the root directory of your ESXi host.

/vmfs/volumes/4bab21a5-e7608223-4c78-003048bdc94f # cd
~ #

37. Return to the PuTTY SSH session to your VSM. Send notification of the VEM upgrade to
vSphere as you would in a standard production environment.
After notification, the administrator has the capability to accept or deny the upgrade, or to
defer to a time when it is more suitable.

N1000V# vmware vem upgrade notify

Warning:
Please ensure the hosts are running compatible ESX versions for the upgrade. Refer
to corresponding "Cisco Nexus 1000V and VMware Compatibility Information" guide.

38. Return to your vSphere Client. Use the navigation bar in vCenter to go to the Networking
view (Home > Inventory > Networking).

L4-22

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

39. Choose your N1000V switch and click the Summary tab.

40. You should see configuration issue notifying you that an upgrade for the vDS (Nexus
1000V) is available. This is the result of the upgrade notify command you issued on the
VSM. Click Apply upgrade.

41. The Summary panel displays a new Configuration Issue alerting you that the upgrade is in
progress. Return to the console of the WinServer-2 VM and ensure that the ping is still
running to 10.0.14.2.
Note

The upgrade will show in progress until the network administrator has completed the
Nexus 1000 component upgrade and signaled its completion.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-23

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

42. You must put your ESXi host into maintenance mode in order to update the VEM software.
Using the navigation bar in vCenter, go to the Hosts and Clusters view (Home >
Inventory > Hosts and Clusters).
You will upgrade the ESXi 1 host (10.0.1.1) first. You must migrate powered-on VMs
running on ESXi 1 onto ESXi 2 before being able to place the host in maintenance mode.
If you had enabled VMware DRS (Distribued Resource Scheduler) on a cluster of
servers, DRS would automatically evaculate hosts when DRS detected a host
attempting to enter maintenance mode.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

43. Right-click the WinServer-1 virtual machine and choose Migrate.

L4-24

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

44. Keep the default Change host setting (a vMotion) and click Next.

45. Choose the second ESXi host 10.0.1.2, and then click Next.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-25

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

46. Leave the default High priority setting.

47. Click Finish to initiate the vMotion of WinServer-1 to host 10.0.1.2.

48. Repeat the vMotion steps to move the last VM, N1000V-VSM1, off of host 10.0.1.1 onto
host 10.0.1.2. Your first host 10.0.1.1 should not have any running VMs left.
Note

You can also drag and drop VMs to initiate a vMotion from the Hosts and Clusters
inventory view.

49. Right-click ESXi host 10.0.1.1 and choose Enter Maintenance Mode.

L4-26

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

50. Click Yes to confirm.

51. Verify that the host has successfully entered maintenance mode before continuing.

52. Return to your SSH session to your ESXi host, and perform a manual upgrade of the VEM
module. Again, use tab to autocomplete the file names.
~ # esxcli software vib install v /vmfs/volumes/ISCSIVMFS/cross_cisco-vem_v1444.2.1.1.5.2.0-3.0.1.vib
Installation Result
Message: Operation finished successfully.
Reboot Required: false
VIBs Installed: Cisco_bootbank_cisco-vem-v144-esx_4.2.1.1.5.2.0-3.0.1
VIBs Removed: Cisco_bootbank_cisco-vem-v131-esx_4.2.1.1.4.1.0-3.0.4

53. On the upgraded host, verify the VEM and VSM versions now match.
~ # vemcmd show version

VEM Version: 4.2.1.1.5.2.0-3.0.1


VSM Version: 4.2(1)SV1(5.2)
System Version: VMware ESXi 5.0.0 Releasebuild-469512

54. Close the Putty SSH session to your ESXi host.


Global Knowledge Training LLC
For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-27

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

55. Return to the Putty SSH session on your WinServer-2 VM verify the continuous ping is
running interrupted.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

56. From the vSphere Client, right-click the ESXi 1 host you just upgraded and choose Exit
Maintenance Mode.

57. Migrate all the VMs to ESXi 1 at 10.0.1.1 to prepare to upgrade the second host, 10.0.1.2.

58. Perform Steps 42 to 56 on the ESXi 2 host 10.0.1.2.

L4-28

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

59. Once both ESXi hosts VEMs have been upgraded, vMotion the VMs back to their original
hosts (either drag and drop, or right-click and Migrate to change hosts).
Place N1000V-VSM1 and WinServer-1 on 10.0.1.1.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Place N1000V-VSM2 and WinServer-2 on 10.0.1.2.

60. Return to the SSH session to your N1000V switch. You should see console messages you
alerting you the VEMs went down and came back up during the upgrade process.
Note

Since the host was in maintenance mode (no running VMs), there was no disruption
to your Virtual Machine traffic. You can verify by checking the continuous ping from
VM WinServer-1.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-29

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

61. Verify that the upgrade is complete by confirming the versions of the VSMs and VEMs
now all match (5.2).
N1000V# show module
Ports
----0
0
248
248

Module-Type
-------------------------------Virtual Supervisor Module
Virtual Supervisor Module
Virtual Ethernet Module
Virtual Ethernet Module

Mod
--1
2
3
4

Sw
-----------------4.2(1)SV1(5.2)
4.2(1)SV1(5.2)
4.2(1)SV1(5.2)
4.2(1)SV1(5.2)

Mod
--1
2
3
4

MAC-Address(es)
-------------------------------------00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
00-19-07-6c-5a-a8 to 00-19-07-6c-62-a8
02-00-0c-00-03-00 to 02-00-0c-00-03-80
02-00-0c-00-04-00 to 02-00-0c-00-04-80

Mod
--1
2
3
4

Server-IP
--------------10.0.1.200
10.0.1.200
10.0.1.1
10.0.1.2

Model
-----------------Nexus1000V
Nexus1000V
NA
NA

Status
-----------active *
ha-standby
ok
ok

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Mod
--1
2
3
4

Hw
-----------------------------------------------0.0
0.0
VMware ESXi 5.0.0 Releasebuild-469512 (3.0)
VMware ESXi 5.0.0 Releasebuild-469512 (3.0)
Serial-Num
---------NA
NA
NA
NA

Server-UUID
---------------------------------NA
NA
564d26cf-7fdf-86a8-020d-def2e60ef1f9
564d525c-eb5d-d3a9-1edb-544c059d43af

Server-Name
---------------------NA
NA
10.0.1.1
10.0.1.2

* this terminal session

62. Notify vCenter that the upgrade is complete.


N1000V# vmware vem upgrade complete

L4-30

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

63. Using the navigation bar in vCenter, go to the Networking view in vSphere (Home >
Inventory > Networking). Verify that the configuration issue alerting the administrator
that the upgrade is in progress is now gone. The upgrade process is complete.

64. You should see yellow warnings on your hosts. These warnings were triggered when you
connected to your host via Putty SSH. VMware recommends you disable SSH access to
hosts for security reasons. You can clear the warnings and re-secure your hosts by
disabling Putty SSH access in the security settings.

65. Click your first host 10.0.1.1, click the Configuration tab, and then click Security Profile
in the Software pane.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L4-31

Lab 4: Upgrading the Cisco Nexus 1000V VSM and VEM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

66. Click the SSH service, and then click Options Stop the service. Click OK to close both
windows.

67. Repeat the process of disabling SSH access on your second ESXi host, 10.0.1.2. You
should not see any warnings on either of the hosts now.

68. From the Nexus 1000V VSM, save your configuration using your CLI alias.

N1000V# wr
[########################################] 100%

Activity Verification

You have completed this task when you attain these results:

Updated both ESXi hosts to NX-OS release 4.2(1)SV1(5.2) software using the VEM
VIB bundle.

L4-32

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L5
Optimize the Cisco Nexus 1000V
Implementation
Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-1

Lab 5: Optimize the Cisco Nexus 1000V Implementation

Activity Objective
In this activity, you will add additional uplinks, configure MAC pinning, migrate port
groups from standard vSwitch0 to the distributed Cisco Nexus 1000V, and configure
virtual Port Channels (vPCs). After performing this lab, you should be able to perform the
following:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Configure MAC pinning


Migrate Management, Control, Packet and VMkernel ports from vSwitch0 to the Cisco
Nexus 1000V

Perform a VMware vMotion (live migration of a powered-on VM from one physical


host to another physical host)

Required Resources

These are the resources and equipment required for each pod to complete this activity:
Two VMware ESXi 5.0 hosts with the Cisco Nexus 1000V VEM installed

One server running VMware vCenter Server 5.0 and VMware vSphere Client 5.0
Two Cisco Nexus 1000V VSM VM appliances
All pods share the following lab core devices:
One switch for server networking
One iSCSI-based storage device

Command List

The table describes the commands used in this activity.

L5-2

Command

Description

channel-group auto mode on


mac-pinning

Creates a port-channel for all interfaces that


belong the port profile to attach VEMs to upstream
switches that do not support clustering.

show port-channel summary

Displays summary information about all port


channels.

show port-profile name


<profile_name>

Displays information about a specific port profile.

show interface brief

Displays a brief summary of the interface


configuration information.

vmware port-group <name>

Creates a VMware port group.

system vlan <vlan-list>

Adds a system VLAN to a port profile.

state enabled

Enables a port profile.

show port-profile name


<profile_name>

Specifies to display information about a specific


port profile.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 5: Optimize the Cisco Nexus 1000V Implementation


Displays information about all trunk interfaces.

vemcmd show port

Displays a summary of VEM interfaces.

show module

Displays module information.

pinning id <sub-group-id>

Pins vEthernet traffic to a specific sub-group.

port-profile [type
{ethernet | vethernet}]
<profile_name>

Creates a port profile.

vmware port-group <name>

Creates a VMware port group.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

show interface trunk

switchport mode access

Sets the port mode to access interface.

switchport access vlan


<id>

Sets the VLAN membership of an access


interface.

system vlan <vlan-list>

Adds a system VLAN to a port profile.

state enabled

Enables a port profile.

show interface virtual

Displays information about virtual interfaces.

show port-profile virtual


usage

Displays port profile usage by interface.

reload

Reloads the switch.

Job Aids

These job aids are available to help you complete the lab activity.

Lab topology diagram in visual objective section in the beginning of this lab

Lab connections table in the general lab topology information section in the beginning
of the lab guide

Lab IP address and VLAN plan in the general lab topology information section in the
beginning of the lab guide

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-3

Lab 5: Optimize the Cisco Nexus 1000V Implementation

Task 1: Modify the Uplink Port Profile to


Implement MAC Pinning

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

For redundancy and throughput purposes, the Cisco Nexus 1000V VEM should be
connected to upstream switches using multiple uplinks rather than an individual uplink. If
the upstream switches that you connect your ESXi hosts to can be clustered (vPC, VSS,
VBS stacking), configure Multichassis EtherChannel (MEC) that terminate on both
upstream switches using LACP. For example, configure vPCs from the hosts to the Nexus
7000, 5000, or 2000 platforms. This will provide physical redundancy as well as greater
throughput than an Active/Standby NIC team.

If the upstream switches cannot support MEC, use MAC pinning. MAC pinning is a
special port channel configuration on Cisco Nexus 1000V and other Nexus devices that
does not require configuration of a port channel on the upstream switches, and as the name
implies, statically pins VM source MAC addresses to a particular uplink.
In this task, you will modify the Cisco Nexus 1000V uplink port profile to implement
MAC pinning.

Activity Procedure
Complete these steps:

1.

Return to the Putty SSH session connected to your VSM at 10.0.1.200.

2.

Modify your uplink port profile Host-Uplinks to implement MAC pinning.

N1000V# configure
Enter configuration commands, one per line. End with CNTL/Z.
N1000V(config)# port-profile type ethernet Host-Uplinks
N1000V(config-port-prof)# channel-group auto mode on mac-pinning
N1000V(config-port-prof)# exit

Activity Verification

You have completed this task when you attain these results:

Modified the uplink port profile Host-Uplinks to implement MAC pinning

L5-4

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 5: Optimize the Cisco Nexus 1000V Implementation

Task 2: Assign Additional VMNIC Uplinks to the


MAC Pinning Uplink Port Profile
In this task, you will add three additional VMNICs (physical NIC uplinks) on each ESXi
host to the MAC pinning uplink port profile Host-Uplinks.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

3.

In the vCenter Networking inventory view (Ctrl-Shift-N), right-click the N1000V switch
icon and select Manage Hosts.

4.

Select both of your ESXi hosts and then click Next.

5.

Leave vmnic1 selected and additionally select vmnic3 under both ESXi hosts.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-5

Lab 5: Optimize the Cisco Nexus 1000V Implementation


Note

6.

DO NOT SELECT VMNIC0 or VMNIC2. THIS WILL DISCONNECT YOUR HOST


FROM THE MANAGEMENT NETWORK, RENDERING IT UNREACHABLE.

Choose the port group VMNIC-Uplinks from the drop-down menu by vmnic3 on both
hosts, and then click Next.
VMNIC-Uplinks is the same port profile as Host-Uplinks in the Nexus 1000V.
Recall that you can configure the VMware port group name to display differently than
the port profile name in the Nexus 1000V CLI.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

7.

Do not modify anything on the Network connectivity page. Click Next.

8.

Leave Migrate virtual machine networking unchecked and click Next.

L5-6

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 5: Optimize the Cisco Nexus 1000V Implementation

Review the new uplink ports that will be added to the VMNIC-Uplinks ethernet port
profile. Click Finish.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

9.

10. Wait for the task to complete and return to the Cisco Nexus 1000V VSM Putty session to
verify the uplinks have been added to the dVS. Look at the port channel configuration.
N1000V(config)# show port-channel summary
Flags:

D
I
s
S
U

Down
P - Up in port-channel (members)
Individual H - Hot-standby (LACP only)
Suspended
r - Module-removed
Switched
R - Routed
Up (port-channel)

-----------------------------------------------------------------------------Group PortType
Protocol Member Ports
Channel
-----------------------------------------------------------------------------1
Po1(SU)
Eth
NONE
Eth3/2(P)
Eth3/4(P)
2
Po2(SU)
Eth
NONE
Eth4/2(P)
Eth4/4(P)

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-7

Lab 5: Optimize the Cisco Nexus 1000V Implementation

11. Look at the port profile and verify you see the new port channel interfaces assigned to the
port profile.
N1000V(config)# show port-profile name Host-Uplinks

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

port-profile Host-Uplinks
type: Ethernet
description: "Uplink from ESXi hosts to switch"
status: enabled
max-ports: 32
min-ports: 1
inherit:
config attributes:
switchport mode trunk
switchport trunk allowed vlan 1,11-14
channel-group auto mode on mac-pinning
no shutdown
evaluated config attributes:
switchport mode trunk
switchport trunk allowed vlan 1,11-14
channel-group auto mode on mac-pinning
no shutdown
assigned interfaces:
port-channel1
port-channel2
Ethernet3/2
Ethernet3/4
Ethernet4/2
Ethernet4/4
port-group: VMNIC-Uplinks
system vlans: 1,12-13
capability l3control: no
capability iscsi-multipath: no
port-profile role: none
port-binding: static

12. Look at the brief interface output to verify the new ESXi uplink interfaces are visible to the
VSM.
N1000V(config)# show interface brief

-----------------------------------------------------------------------------Port
VRF
Status IP Address
Speed
MTU
-----------------------------------------------------------------------------mgmt0
-up
10.0.1.200
1000
1500
-----------------------------------------------------------------------------Ethernet
VLAN
Type Mode
Status Reason
Speed
Port
Interface
Ch #
-----------------------------------------------------------------------------Eth3/2
1
eth trunk up
none
1000
1
Eth3/4
1
eth trunk up
none
1000
1
Eth4/2
1
eth trunk up
none
1000
2
Eth4/4
1
eth trunk up
none
1000
2

L5-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 5: Optimize the Cisco Nexus 1000V Implementation


-----------------------------------------------------------------------------Port-channel VLAN Type Mode
Status Reason
Speed Protocol
Interface
-----------------------------------------------------------------------------Po1
1
eth trunk up
none
a-1000(D) none
Po2
1
eth trunk up
none
a-1000(D) none

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

-----------------------------------------------------------------------------Vethernet
VLAN
Type Mode
Status Reason
Speed
-----------------------------------------------------------------------------Veth1
14
virt access up
none
auto
Veth2
14
virt access up
none
auto
-----------------------------------------------------------------------------Port
VRF
Status IP Address
Speed
MTU
-----------------------------------------------------------------------------control0 -up
-1000
1500

Note

MAC pinning treats all uplinks coming out of the ESXi host as standalone links and
pins different MAC addresses to each link in a round-robin fashion. This approach
helps ensure that the MAC address of a virtual machine will never be seen on
multiple interfaces on the upstream switches. Therefore, no additional configuration
is required on the upstream switches. Notice that this configuration created two port
channels one for each ESXi host.

13. Find out to which physical vmnic uplink the MAC address of the WinServer-1 VM is
currently pinned to.
N1000V(config)# module vem 3 execute vemcmd show port
LTL
18
20
49
305

VSM Port
Eth3/2
Eth3/4
Veth1
Po1

Admin Link
UP
UP
UP
UP
UP
UP
UP
UP

State
FWD
FWD
FWD
FWD

PC-LTL
305
305
0
0

SGID
1
3
1

Vem Port
vmnic1
vmnic3
WinServer-1.eth0

* F/B: Port is BLOCKED on some of the vlans.


Please run "vemcmd show port vlans" to see the details.

Note

The virtual machine WinServer-1 is currently pinned to the sub-group id 1, which


represents vmnic1. The .eth0 in the WinServer-1.eth0 line represents vNIC0. These
VMs only have one vNIC, so we will always see .eth0. Your VM may be pinned to
vmnic1 or vmnic3.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-9

Lab 5: Optimize the Cisco Nexus 1000V Implementation

14. Find out to which physical vmnic uplink the MAC address of the WinServer-2 VM is
currently pinned to.
N1000V(config)# module vem 4 execute vemcmd show port
VSM Port
Eth4/2
Eth4/4
Veth2
Po2

Admin Link
UP
UP
UP
UP
UP
UP
UP
UP

State
FWD
FWD
FWD
FWD

PC-LTL
305
305
0
0

SGID
1
3
3

Vem Port
vmnic1
vmnic3
WinServer-2.eth0

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

LTL
18
20
49
305

Note

The virtual machine WinServer-2 is currently pinned to the sub-group id 3, which


represents vmnic3. Your VM may be pinned to vmnic1 or vmnic3.

15. Save your configuration using your CLI alias.

N1000V(config)# wr
[########################################] 100%

Activity Verification

You have completed this task when you attain these results:

Assigned additional VMNIC on each ESXi host to the MAC pinning uplink port profile
named Host-Uplinks.

L5-10

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 5: Optimize the Cisco Nexus 1000V Implementation

Task 3: Migrate Management, Control, and Packet


VM Port Groups from Standard vSwitch0 to the
Cisco Nexus 1000V Distributed Switch

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

It is recommended to move all interfaces from the vSwitch to the Cisco Nexus 1000V and
thereby completely replace any existing standard vSwitches. One of the key advantages of
the Cisco Nexus 1000V is the segmentation of responsibilities as well as the improved
monitoring and troubleshooting capabilities.
Only by moving all interfaces to the Cisco Nexus 1000V can you ensure that the server
team can fully rely on the network team for network configuration. Therefore the network
team is able to handle complete management and troubleshooting capabilities of the
physical and virtual networks.

In this task, you will migrate the control, packet, and management virtual machine port
groups to the Cisco Nexus 1000V. To ensure continuous lab connectivity since we are not
able to physically access the hosts, we will leave VMkernel ports on the standard
vSwitch0.

Activity Procedure
Complete these steps:

16. Return to the Putty SSH session to your VSM at IP 10.0.1.200.

17. Create a port profile for the Cisco Nexus 1000V Control connection.

N1000V(config)# port-profile type vethernet VSM-Control


N1000V(config-port-prof)# description "VSM Control"
N1000V(config-port-prof)# vmware port-group
N1000V(config-port-prof)# switchport mode access
N1000V(config-port-prof)# switchport access vlan 12
N1000V(config-port-prof)# 2012 Oct 1 16:31:53 N1000V %PORT-PROFILE-1VLAN_CONFIGURED_CONTROL_VLAN: Port-profile is configured to carry the control VLAN
12. Also configure the vlan as system VLAN in this port-profile and other uplink
port-profiles that are configured to carry the VLAN for VSM-VEM traffic.
N1000V(config-port-prof)# no shutdown
N1000V(config-port-prof)# system vlan 12
N1000V(config-port-prof)# state enabled

18. Create a port profile for the Cisco Nexus 1000V Packet connection.

N1000V(config-port-prof)# port-profile type vethernet VSM-Packet


N1000V(config-port-prof)# description "VSM Packet"
N1000V(config-port-prof)# vmware port-group
N1000V(config-port-prof)# switchport mode access
N1000V(config-port-prof)# switchport access vlan 13
N1000V(config-port-prof)# 2012 Oct 1 16:35:53 N1000V %PORT-PROFILE-1VLAN_CONFIGURED_CONTROL_VLAN: Port-profile is configured to carry the control VLAN

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-11

Lab 5: Optimize the Cisco Nexus 1000V Implementation


12. Also configure the vlan as system VLAN in this port-profile and other uplink
port-profiles that are configured to carry the VLAN for VSM-VEM traffic.
N1000V(config-port-prof)# no shutdown
N1000V(config-port-prof)# system vlan 13
N1000V(config-port-prof)# state enabled

19. Create a port profile for the Cisco Nexus 1000V Management connection.
port-profile type vethernet VSM-Management
description "VSM Management"
vmware port-group
switchport mode access
switchport access vlan 1
no shutdown
system vlan 1
state enabled
exit

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config-port-prof)#
N1000V(config-port-prof)#
N1000V(config-port-prof)#
N1000V(config-port-prof)#
N1000V(config-port-prof)#
N1000V(config-port-prof)#
N1000V(config-port-prof)#
N1000V(config-port-prof)#
N1000V(config-port-prof)#

20. From the vSphere Client in vCenter Server go to the Networking inventory view (Home
> Inventory > Networking), or use the shortcut Ctrl-Shift-N.
The new port profiles should be visible under the N1000V switch.

21. Right-click the N1000V switch icon and select Migrate Virtual Machine Networking.

L5-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 5: Optimize the Cisco Nexus 1000V Implementation

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

22. Select Source Network Control and Destination Network VSM-Control (N1000V).

23. Click All Virtual Machines and then click Next.

24. Click Finish to complete the vNIC migration.


25. Wait for the task to complete in vCenter.

Click the N1000V switch icon and select the Configuration tab.
Global Knowledge Training LLC
For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-13

Lab 5: Optimize the Cisco Nexus 1000V Implementation

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

26. Expand the port group VSM-Control by clicking the plus icon and validate that the
Control connection of the primary and secondary Cisco Nexus 1000V VSMs appear in the
VSM-Control port group.

27. Right-click N1000V and select Migrate Virtual Machine Networking again.

28. Select Source Network Packet and Destination Network VSM-Packet (N1000V). Click
Next, and then click All Virtual Machines. Click Next, and then click Finish.

29. Wait for the task to complete in vCenter and click N1000V and select the Configuration
tab.

30. Expand the port group VSM-Packet by clicking the plus icon and validate that the Packet
connection of the primary and secondary Cisco Nexus 1000V VSMs appears in the VSMPacket port group.
31. Right-click N1000V and click Migrate Virtual Machine Networking again.

32. Select Source Network Management and Destination Network VSM-Management


(N1000V). Click Next, and then click All Virtual Machines. Click Next, and then click
Finish.

33. Wait for the task to complete in vCenter and click N1000V and select the Configuration
tab.

34. Expand the port group VSM-Management by clicking the plus icon and validate that the
Management connection of the primary and secondary Cisco Nexus 1000V VSMs appear
in the VSM-Management port group.

L5-14

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 5: Optimize the Cisco Nexus 1000V Implementation

35. Return to the Putty SSH session to your VSM at 10.0.1.200 and verify the successful
migration of your virtual machine port groups to the distributed switch.
N1000V(config)# show interface virtual

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

-----------------------------------------------------------------------------Port
Adapter
Owner
Mod Host
-----------------------------------------------------------------------------Veth1
Net Adapter 1 WinServer-1
3
10.0.1.1
Veth2
Net Adapter 1 WinServer-2
4
10.0.1.2
Veth3
Net Adapter 1 N1000V-VSM1
3
10.0.1.1
Veth4
Net Adapter 1 N1000V-VSM2
4
10.0.1.2
Veth5
Net Adapter 3 N1000V-VSM1
3
10.0.1.1
Veth6
Net Adapter 3 N1000V-VSM2
4
10.0.1.2
Veth7
Net Adapter 2 N1000V-VSM1
3
10.0.1.1
Veth8
Net Adapter 2 N1000V-VSM2
4
10.0.1.2

N1000V(config)# show port-profile virtual usage

-----------------------------------------------------------------------------Port Profile
Port
Adapter
Owner
-----------------------------------------------------------------------------Host-Uplinks
Po1
Po2
Eth3/2
vmnic1
10.0.1.1
Eth3/4
vmnic3
10.0.1.1
Eth4/2
vmnic1
10.0.1.2
Eth4/4
vmnic3
10.0.1.2
Production
Veth1
Net Adapter 1 WinServer-1
Veth2
Net Adapter 1 WinServer-2
Control
Veth3
Net Adapter 1 N1000V-VSM1
Veth4
Net Adapter 1 N1000V-VSM2
Packet
Veth5
Net Adapter 3 N1000V-VSM1
Veth6
Net Adapter 3 N1000V-VSM2
Management
Veth7
Net Adapter 2 N1000V-VSM1
Veth8
Net Adapter 2 N1000V-VSM2

36. Save your configuration using your CLI alias.

N1000V(config)# wr
[########################################] 100%

Activity Verification

You have completed this task when you attain these results:

Migrated the Control, Packet, and Management VM port groups to the Cisco Nexus
1000V

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-15

Lab 5: Optimize the Cisco Nexus 1000V Implementation

Task 4: Perform VMware vMotion


In this task, you will start a continuous ping between your VMs and perform a VMware
vMotion. This task will demonstrate operation of vMotion when using the Cisco Nexus
1000V with no interruption to the server application user.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:

37. Go to your virtual machine WinServer-1 console and ensure a continuous ping to
WinServer-2 at IP 10.0.14.2 is running. If not, start one from the Command Prompt.

38. Using the navigation bar in vCenter, go to the Hosts and Clusters view (Home > Inventory
> Hosts and Clusters) or use the shortcut Ctrl-Shift-H.

39. Drag and drop the virtual machine WinServer-1 from your first ESXi host to your second
ESXi host.

L5-16

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 5: Optimize the Cisco Nexus 1000V Implementation

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

40. Step through the vMotion wizard by leaving the default settings. Click Next.

41. Click Finish.

42. While the vMotion task is completing, return to your virtual machine WinServer-1 console
and ensure that the ping session is still successful.

43. Perform another vMotion to move WinServer-1 back to the first ESXi host 10.0.1.1.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L5-17

Lab 5: Optimize the Cisco Nexus 1000V Implementation

44. Leave the ping session active and return to the VSM and reload both VSMs to demonstrate
that VEMs continue forwarding packets while the control plane is reloading.
N1000V(config)# reload
This command will reboot the system. (y/n)?

[n] y

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

45. Return to your virtual machine WinServer-1 console and observe that the continuous ping
session continues.

Activity Verification

You have completed this task when you attain these results:
Performed successful vMotion of your virtual machines

Verified virtual machine connectivity while VSMs are reloading

L5-18

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L6
Configuring Security Features
Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-1

Lab 6: Configuring Security Features

Activity Objective
In this activity, you will configure security features on the Cisco Nexus 1000V Distributed
Virtual Switch. After performing this lab, you should be able to perform the following:
Configure access control lists (ACLs)
Configure port security

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Configure DHCP Snooping and IP Source Guard

Required Resources

These are the resources and equipment required for each pod to complete this activity:
Two VMware ESXi 5.0 hosts with the Cisco Nexus 1000V VEM installed

One server running VMware vCenter Server 5.0 and VMware vSphere Client 5.0
Two Cisco Nexus 1000V VSM VM appliances
All pods share the following lab core devices:
One switch for server networking
One iSCSI-based storage device

Command List

The table describes the commands used in this activity.

L6-2

Command

Description

ip access-list <name>

Defines an IP access list.

statistics per-entry

Enables the gathering of statistics for an access


list.

ip port access-group
<name> {in | out}

Associates an access list with a port profile or an


interface.

show access-lists <name>

Displays the access list configuration.

show access-list summary

Displays the access list usage.

copy running-config
startup-config

Saves the running configuration.

switchport port-security

Enables port security on an interface.

switchport port-security
mac-address <address>

Configures a static port security MAC address for


an interface.

show port-security address

Shows the static and dynamic port security


addresses in the system.

switchport port-security
mac-address <address>

Configures a static port security MAC address for


an interface.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features


Disables the VSM to remove all manual
configuration on a vEthernet interface when the
system administrator changes a port profile on the
interface.

show port-security
interface

Shows interface port security information.

feature dhcp

Enables DHCP.

ip dhcp snooping

Enables DHCP snooping globally.

ip dhcp snooping vlan <id>

Enables DHCP snooping for a VLAN.

show ip dhcp snooping

Displays general status information for DHCP


snooping.

show ip dhcp snooping


statistics

Displays DHCP snooping statistics.

show interface virtual

Displays information about virtual interfaces.

ip dhcp snooping trust

Configure an interface as a trusted source of


DHCP messages.

ipconfig /release

Releases IP address configuration of a Windows


machine.

ipconfig /renew

Renews IP address configuration of a Windows


machine.

copy running-config
startup-config

Saves the running configuration.

ip verify source dhcpsnooping-vlan

Enables IP Source Guard.

show ip verify source

Displays the IP Source Guard configuration and


IP-to-MAC address bindings.

show ip dhcp snooping


binding

Displays IP-MAC address bindings.

ip source binding <ipaddress> <MAC-address>


vlan <vlan-id> interface
vethernet <interfacenumber>

Creates a static IP source entry.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

no svs veth auto-configpurge

Job Aids

These job aids are available to help you complete the lab activity.

Lab topology diagram in visual objective section in the beginning of this lab

Lab connections table in the general lab topology information section in the beginning
of the lab guide

Lab IP address and VLAN plan in the general lab topology information section in the
beginning of the lab guide

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-3

Lab 6: Configuring Security Features

Task 1: Clone a Virtual Machine and Verify


Connectivity
In this task, you will make a hot clone of the Windows virtual machine WinServer-1
located on your first ESXi host.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

1.

Using the navigation bar in vCenter, navigate to the Hosts and Clusters inventory view
(Home > Inventory > Hosts and Clusters), or use the shortcut Ctrl-Shift-H.

2.

Right-click the WinServer-1 VM and click Clone.

3.

Enter the name WinServer-3 and click Next

4.

Choose your first ESXi host 10.0.1.1 and click Next.

5.

Choose the datastore ISCSIVMFS. Click Next.

6.

Leave the disk format Same format as source and click Next.

7.

Click Next in the Guest Customization window.

8.

Review your new settings and then click Finish.

9.

Wait for the task to complete. Right-click the new virtual machine WinServer-3 and select
Edit Settings.

L6-4

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

10. Click Network Adapter 1, and change the Network label from Production (N1000V) to
Production. Click OK.

Note

We are changing the network connection of WinServer-3 to the Production port


group on the standard vSwitch0. This means that packets from WinServer-3 to the
other two Windows virtual machines will traverse the core switch, since the VMs are
on different vSwitches on the host (one standard, one distributed Nexus 1000V) they
cannot be locally switched.

Note

We will use this setup to simulate a remote PC running network scans to our internal
virtual machines in the next task.

11. Open a console to virtual machine WinServer-3 and click Power On.
12. Log in by using username Administrator and password cisco123.

13. Since you will get a Windows error about duplicate addresses, change the IP address of the
Local Area Connection to 10.0.14.3 and assign a subnet mask of 255.255.255.0. Leave the
other values empty.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-5

Lab 6: Configuring Security Features

14. Making sure that you are within the WinServer-3 VM console window, go to the desktop,
right-click Computer > Properties.
15. Click the Computer Name tab in the System Properties window and click the Change
button. Change the computer name to WinServer-3. Click OK.
16. Click OK to close the System Properties window and click Yes to reboot the virtual
machine.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

17. After reboot log in to the virtual machine and open the Command Prompt.

18. Verify successful connectivity to the other virtual machines by pinging the IP addresses
10.0.14.1 and 10.0.14.2.

Activity Verification

You have completed this task when you attain these results:

Cloned the virtual machine WinServer-1 to create another virtual machine WinServer-3

Verified successful connectivity between the virtual machines

L6-6

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

Task 2: Mount the Utility CD to the Virtual


Machines
In this task, you will mount the CD that will give you access to the utilities necessary to
perform the next labs.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

19. From vCenter Server, select inventory then Hosts and Clusters, or use the shortcut CtrlShift-H.

20. Right-click on the WinServer-1 VM and select Edit Settings

21. Under the Hardware tab, select the CD/DVD component and select the Browse button in
the Datastore ISO file section.

22. Browse the ISCSIVMFS datastore, select the AddOns.iso file, and then click OK.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-7

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

23. Make sure to select the Connected checkbox on top of the page and click OK. This will
mount the CD for your VM.

24. Repeat mounting this ISO file to the CD drive to both the WinServer-2 and WinServer-3
VMs.

L6-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

Task 3: Complete a Network Scan


In this task, you will use SuperScan to discover open ports.

Activity Procedure
Complete these steps:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

25. On the virtual machine WinServer-3 open the superscan4.exe utility on the newlymounted D:\ drive image, under the superscan4 folder.

26. In the Start IP field, enter 10.0.14.1 (virtual machine WinServer-1) and in the End IP
field, enter 10.0.14.2 (virtual machine WinServer-2).

27. Click the arrow button next to the Start IP and End IP fields to populate the range in the
box.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-9

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

28. Click the play button in the lower left-hand corner to start the scan.

L6-10

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

29. Scroll up in the results pane to view the open ports on both ESXi hosts.

30. Which open ports did you discover?

Activity Verification

You have completed this task when you attain these results:

You have scanned WinServer-1 and WinServer-2 and discovered open ports on these
virtual machines

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-11

Lab 6: Configuring Security Features

Task 4: Configure Access Control Lists


In this task, you will configure an IP-based access list, which blocks access to the open
ports discovered in the previous task and permits any other IP traffic.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


31. Return to the Putty SSH session to your VSM at IP address 10.0.1.200.

32. Create an IP-based access list named ProtectVM that blocks access to the open ports
discovered in the previous task and permits all other IP traffic.

N1000V(config)# ip access-list ProtectVM


N1000V(config-acl)# statistics per-entry
N1000V(config-acl)# deny udp any any eq 123
N1000V(config-acl)# deny udp any any eq 137
N1000V(config-acl)# permit ip any any

Note

For each ACL that you configure, you can specify whether the device maintains
statistics for the ACL by using the command statistics per-entry. If an ACL is
applied to multiple interfaces, the maintained rule statistics are the sum of packet
matches (hits) on all the interfaces on which the ACL is applied.

33. Apply the access list to the port profile Production as an outbound rule.
N1000V(config-acl)# port-profile Production-VMs
N1000V(config-port-prof)# ip port access-group ProtectVM out
N1000V(config-port-prof)# exit

Note

As the vEth interfaces of WinServer-1 and WinServer-2 leverage the port profile
Production, adding the access list to this port profile will automatically update all
associated vEth interfaces and assign the access list to them. Here the concept of
port profiles comes very handy in simplifying the work. Alternatively, you can also
apply an access list directly to vEth interfaces.

Note

The directions in and out of an ACL have to be viewed from the perspective of the
VEM, not the virtual machine. Thus in specifies traffic flowing into the VEM from the
VM, while out specifies traffic flowing out from the VEM to the VM.

L6-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

34. Verify your access list configuration and usage.


N1000V(config)# show access-list

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

IP access list ProtectVM


statistics per-entry
10 deny udp any any eq ntp [match=0]
20 deny udp any any eq netbios-ns [match=0]
30 permit ip any any [match=0]

N1000V(config)# show access-lists summary


IP access list ProtectVM
statistics per-entry
Total ACEs Configured:3

Configured on interfaces:
Vethernet1 Vethernet2 -

egress (Port ACL)


egress (Port ACL)

Active on interfaces:

Vethernet1 Vethernet2 -

egress (Port ACL)


egress (Port ACL)

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-13

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

35. Return to the virtual machine WinServer-3 and click the play button in the lower left-hand
corner of the SuperScan window to repeat the scan process. You should not see any open
ports after this scan now that the access-list is in place.

36. Return to your VSM and display the access list configuration.

N1000V(config)# show access-list

IP access list ProtectVM


statistics per-entry
10 deny udp any any eq ntp [match=2]
20 deny udp any any eq netbios-ns [match=2]
30 permit ip any any [match=197]

L6-14

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features


Note

As the result of your access list rules, access to open ports on your virtual machines
has been blocked. You should see your hit counters (line matches) have increased.
The actual match counts may vary.

37. Save your configuration.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config)# wr
[########################################] 100%

Activity Verification

You have completed this task when you attain these results:

You have configured, applied, and verified an access list to block access to open ports
on your virtual machines in the Cisco Nexus 1000V vEth port profile Production-VMs.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-15

Lab 6: Configuring Security Features

Task 5: Configure Port Security


In this task, you will configure port security to secure a virtual Ethernet port.

Activity Procedure
Complete these steps:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

38. Enable terminal monitoring.

N1000V(config)# terminal monitor

39. Through the VSM, determine the MAC address of the virtual machine connected to
vEthernet 1. Also note which VM is connected to VEthernet 1. Your output may vary.
N1000V(config)# show interface vethernet 1

Vethernet1 is up
Port description is WinServer-1, Network Adapter 1
Hardware: Virtual, address: 0050.569c.3db7 (bia 0050.569c.3db7)
Owner is VM "WinServer-1", adapter is Network Adapter 1
Active on module 3
VMware DVS port 160
Port-Profile is Production
Port mode is access
5 minute input rate 0 bits/second, 0 packets/second
5 minute output rate 0 bits/second, 0 packets/second
Rx
3239 Input Packets 1077 Unicast Packets
0 Multicast Packets 2162 Broadcast Packets
530187 Bytes
Tx
4595 Output Packets 723 Unicast Packets
0 Multicast Packets 3872 Broadcast Packets 3872 Flood Packets
598194 Bytes
28 Input Packet Drops 0 Output Packet Drops

40. Shut down the interface.

N1000V(config)# interface vethernet 1


N1000V(config-if)# shutdown

Note

With the interface connected to the VM shut down, the continuous ping should fail to
this VM.

41. Enable port security on the interface.

N1000V(config-if)# switchport port-security

L6-16

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

42. Configure a static entry for the MAC address of the virtual machine using the address you
recorded in Step 1.
N1000V(config-if)# switchport port-security mac-address xxxx.xxxx.xxxx
(where xxxx.xxxx.xxxx is the MAC address of the virtual machine connected to
interface Vethernet1)

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

43. Bring up the interface. The continuous ping should begin responding again.
N1000V(config-if)# no shutdown

Note

Optionally, you can use the switchport port-security mac-address sticky


command to add all the secure MAC addresses that are dynamically learned to the
running configuration.

44. Return to vCenter and open a console to virtual machine WinServer-1 and log in by using
username Administrator and password cisco123
45. Click Start > Settings > Network Connections > Local Area Connection.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-17

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

46. Right-click the NIC and select Properties. Click the Configure button.

47. Click the Advanced tab.

L6-18

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

48. Click NetworkAddress, select Value, change the MAC address to 123456123456 and
click OK.

Note

The expected behavior is that changing the MAC address should trigger a security
violation to occur and the virtual Ethernet interface to be placed in error-disabled
mode, but this does not actually happen. We will investigate the reason in the next
step.

49. Verify the running configuration of the virtual Ethernet interface.

50. Ensure you inspect the Vethernet interface your WinServer-1 VM is connected to. In the
sample output, WinServer-1 is connected to Vethernet 1.
N1000V(config-if)# show running-config interface vethernet 1

interface Vethernet1
inherit port-profile Production-VMs
description WinServer-1,Network Adapter 1
vmware dvport 160 dvswitch uuid "fa ca 0e 50 c2 0a 21 91-df 49 4a f8 4d d6 c0f6"
vmware vm mac 1234.5612.3456

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-19

Lab 6: Configuring Security Features


Note

Here you can see that the MAC address change appears in the configuration but the
port security commands have disappeared due to the default behavior of the VSM.
The VSM removes all manual configurations on a Vethernet interface when the
corresponding port profile of that interface is changed or reassigned to the port.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

51. Prevent the manual configuration of virtual Ethernet interfaces from being deleted.
N1000V(config-if)# no svs veth auto-config-purge

52. Repeat Steps 39 to 42 to reconfigure port security.

53. After enabling the vEthernet interface, you should get an error message and the interface
should become error-disabled.
N1000V %ETHPORT-2-IF_DOWN_ERROR_DISABLED: Interface Vethernet1 is down (Error
disabled. Reason:error)
N1000V %ETH-PORT-SEC-2-ETH_PORT_SEC_SECURITY_VIOLATION_MAX_MAC_VLAN: Port
Vethernet1 moved to SHUTDOWN state as host 1234.5612.3456 is trying to access the
port in vlan 14

54. Display the port security status.

N1000V(config-if)# show port-security address

Total Secured Mac Addresses in System (excluding one mac per port)
Max Addresses limit in System (excluding one mac per port) : 8192

: 0

---------------------------------------------------------------------Secure Mac Address Table


---------------------------------------------------------------------Vlan
Mac Address
Type
Ports
Configured Age
(mins)
----------------------------------14
0050.569C.3DB7
STATIC
Vethernet1
0
======================================================================

N1000V(config-if)# show port-security interface vethernet 1


Port Security
Port Status
Violation Mode
Aging Time
Aging Type
Maximum MAC Addresses
Total MAC Addresses
Configured MAC Addresses
Sticky MAC Addresses
Security violation count

L6-20

:
:
:
:
:
:
:
:
:
:

Enabled
Secure Down
Shutdown
0 mins
Absolute
1
1
1
0
1

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features


N1000V(config-if)# show port-security
Total Secured Mac Addresses in System (excluding one mac per port)
Max Addresses limit in System (excluding one mac per port) : 8192

: 0

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

---------------------------------------------------------------------------Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action


(Count)
(Count)
(Count)
---------------------------------------------------------------------------Vethernet1
1
1
1
Shutdown
============================================================================

N1000V(config-if)# show interface vethernet 1

Vethernet1 is down (Error disabled)


Port description is WinServer-1, Network Adapter 1
Hardware: Virtual, address: 1234.5612.3456 (bia 1234.5612.3456)
Owner is VM "WinServer-1", adapter is Network Adapter 1
Active on module 3
VMware DVS port 160
Port-Profile is Production-VMs
Port mode is access
5 minute input rate 568 bits/second, 0 packets/second
5 minute output rate 624 bits/second, 0 packets/second
Rx
98389 Input Packets 2178827 Unicast Packets
0 Multicast Packets 10524 Broadcast Packets
7390895 Bytes
Tx
522231 Output Packets 80291 Unicast Packets
0 Multicast Packets 183364 Broadcast Packets 171546 Flood Packets
54489905 Bytes
90 Input Packet Drops 0 Output Packet Drops

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-21

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

55. Remove the MAC address from the network adapter of the virtual machine. Set
NetworkAddress back to Not Present and click OK.

56. The vEthernet interface should come up again. The continuous ping should be successful.
N1000V(config-if)# show port-security interface vethernet 1
Port Security
Port Status
Violation Mode
Aging Time
Aging Type
Maximum MAC Addresses
Total MAC Addresses
Configured MAC Addresses
Sticky MAC Addresses
Security violation count

L6-22

:
:
:
:
:
:
:
:
:
:

Enabled
Secure UP
Shutdown
0 mins
Absolute
1
1
1
0
0

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

57. Remove the port security commands and save your configuration.
N1000V(config-if)# no switchport port-security
N1000V(config-if)# no switchport port-security mac-address xxxx.xxxx.xxxx
(where xxxx.xxxx.xxxx is the actual MAC address of the virtual machine connected to
interface veth1)

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config-if)# exit
N1000V(config)# wr
[########################################] 100%

Activity Verification

You have completed this task when you attain these results:
You have configured port security on a vEth interface

The vEth interface was disabled because of a security violation

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-23

Lab 6: Configuring Security Features

Task 6: Configure IP Source Guard


In this task, you will you will configure IP Source Guard, which uses the DHCP Snooping
table to mitigate IP spoofing attacks.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


58. Go to the Hosts and Clusters inventory view, or use the shortcut Ctrl-Shift-H.

59. Move your WinServer-3 VM to the Cisco Nexus 1000V. Right-click on the WinServer-3
VM and click Edit Settings
60. Click Network Adapter 1 and select Production-VMs (N1000V) from the Network
Label dropdown box. Click OK.
61. On the VSM, first enable DHCP Snooping globally on the Nexus 1000V.

N1000V(config)# feature dhcp


N1000V(config)# ip dhcp snooping
N1000V(config)# ip dhcp snooping vlan 14

62. Enable IP Source Guard for the port profile Production-VMs, which is used by your
Windows virtual machines.
N1000V(config)# port-profile Production-VMs
N1000V(config-port-prof)# ip verify source dhcp-snooping-vlan

Note

IP Source Guard is a traffic filter that permits IP traffic only when the IP address and
MAC address of each packet matches the IP and MAC address bindings in the
DHCP snooping table or a configured static entry.

63. Verify the DHCP snooping configuration, including the IP Source Guard configuration.
N1000V(config-port-prof)# show running-config dhcp
version 4.2(1)SV1(5.2)
feature dhcp

interface Vethernet1
ip verify source dhcp-snooping-vlan
interface Vethernet2
ip verify source dhcp-snooping-vlan
interface Vethernet9
ip verify source dhcp-snooping-vlan

L6-24

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features


ip dhcp snooping
ip dhcp snooping vlan 14
no ip dhcp relay

64. A DHCP server has been setup on the vCenter Server system. You will configure your
Windows VMs to obtain IP addresses from the DHCP server. Go to the console of the
WinServer-1 VM.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

65. Click Start > Settings > Network Connections, right-click Local Area Connection, and
click Properties.

66. Click Internet Protocol (TCP/IP), and then click the Properties button.

67. Select Obtain an IP address automatically to request an IP address from the DHCP
server. Click OK, then click Close.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-25

Lab 6: Configuring Security Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

68. Open a command prompt and type ipconfig. Verify the Windows machine has been
assigned an IP address from the DHCP server from the pool 10.0.14.51-10.0.14.53 /24.

69. Repeat Steps 64 68 on your WinServer-2 VMs. DO NOT modify your WinServer-3
VM.

70. Display the IP Source Guard configuration.


N1000V(config)# show ip verify source

IP source guard is enabled on the following interfaces:


-----------------------------------------------------Vethernet1
Vethernet2
Vethernet9

IP source guard operational entries:


----------------------------------Interface
Filter-mode
---------------------Vethernet1
active
Vethernet2
active

Note

L6-26

IP-address
---------10.0.14.51
10.0.14.52

Mac-address
-------------00:50:56:9c:3d:b7
00:50:56:a9:00:00

Vlan
--14
14

IP source guard was enabled in the Production-VMs port profile, so IP source guard
has also been enabled on the WinServer-3 VM (bound to Vethernet9 in the sample
show command output). However, this VM is still using a static IP address so it does
not have an entry in the switchs DHCP snooping table for IP source guard to verify.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 6: Configuring Security Features

71. Verify successful ping connectivity between WinServer-1 and WinServer-2 (these VMs
should now have IPs 10.0.14.51 and 10.0.14.52).
This should succeed because both VMs have valid entries in the DHCP snooping table,
which allows IP source guard to permit the traffic.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

72. Try to ping WinServer-3 at 10.0.14.3 from one of your other VMs. This should fail because
the VM has a static IP address, thus never sent a DHCP request that could be snooped by
the Nexus 1000V.
73. Examine the DHCP snooping binding table.

N1000V(config)# show ip dhcp snooping binding


MacAddress
----------------00:50:56:9c:3d:b7
00:50:56:a9:00:00

Note

IpAddress
--------------10.0.14.51
10.0.14.52

LeaseSec
-------690320
690410

Type
---------dhcp-snoop
dhcp-snoop

VLAN
---14
14

Interface
---------Vethernet1
Vethernet2

IP Source Guard is a per-interface traffic filter that permits IP traffic only when the IP
address and MAC address of each packet matches the IP and MAC address
bindings of dynamic or static IP source entries in the DHCP snooping binding table.
IP packets to or from WinServer-3 are dropped because there is no entry in the
binding table for WinServer-3.

74. Return to WinServer-3 and configure it to obtain an IP address from the DHCP server by
repeating Steps 7 11 of this task.
75. Examine again the DHCP snooping binding table.

N1000V(config)# show ip dhcp snooping binding


MacAddress
----------------00:50:56:9c:3d:b7
00:50:56:a9:00:00
00:50:56:a9:00:07

IpAddress
--------------10.0.14.51
10.0.14.52
10.0.14.53

LeaseSec
-------690320
690410
691194

Type
---------dhcp-snoop
dhcp-snoop
dhcp-snoop

VLAN
---14
14
14

Interface
---------Vethernet1
Vethernet2
Vethernet9

76. Now try to ping WinServer-3 again from one of your other VMs. This should now succeed
since there is an entry for this VM in the DHCP snooping table.

77. Disable the DHCP feature on the Nexus 1000V. This will remove all related configuration,
including the IP Source Guard configuration from the Production-VMs port profile.

N1000V(config)# no feature dhcp

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L6-27

Lab 6: Configuring Security Features

78. Verify the IP Source Guard configuration (ip verify source dhcp-snooping-vlan) is gone
from your running-configuration. The grep should not return any results.
N1000V(config)# show running-config | grep dhcp-snooping-vlan
N1000V(config)#

79. Save your VSM configuration.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config)# wr
[########################################] 100%

80. Return to your virtual machine consoles and configure static IP addresses again. Click
Start > Settings > Network Connections, right-click Local Area Connection and select
Properties. Click Internet Protocol (TCP/IP) and click the Properties button.
81. Select Use the following IP address and assign IPs to your Windows VMs according to
the provided table. Do not include a default gateway or any DNS servers.
VM Name

IP Address

Mask

WinServer-1

10.0.14.1

255.255.255.0

WinServer-2

10.0.14.2

255.255.255.0

WinServer-3

10.0.14.3

255.255.255.0

82. Verify you can ping between all of your Windows VMs.

Activity Verification

You have completed this task when you attain these results:
Configured DHCP snooping and IP Source Guard

Configured the Windows VMs to obtain their IP addresses from a DHCP server
Verified IP Source Guard operation

Removed DHCP snooping and IP Source Guard configuration and returned the
Windows VMs to their normal static IP configuration

L6-28

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L7
Configuring Quality of Service
Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-1

Lab 7: Configuring Quality of Service

Activity Objective
In this activity, you will configure Quality of Service (QoS) features on the Cisco Nexus
1000V. After performing this lab, you should be able to perform the following:
Use the network testing tool Iperf to generate network traffic
Configure classification policies

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Configure policing

Configure class-based weighted fair queuing

Required Resources

These are the resources and equipment required for each pod to complete this activity:
Two VMware ESXi 5.0 hosts with the Cisco Nexus 1000V VEM installed

One server running VMware vCenter Server 5 and VMware vSphere Client 5.0
Two Cisco Nexus 1000V VSM VM appliances
All pods share the following lab core devices:
One switch for server networking
One iSCSI-based storage device

Command List

The table describes the commands used in this activity.

L7-2

Command

Description

class-map type qos <name>

Creates a class-map of type QoS.

match ip rtp <port-list>

Matches Real Time Protocol packets using the


specified UDP port list.

show class-map type qos

Displays the class map configuration for all class


maps of type QoS.

policy-map type qos <name>

Creates a policy map of type QoS.

class type qos <name>

Enters class configuration mode for a class within


the policy map.

set cos <cos>

Sets the CoS value.

set dscp <dscp>

Sets the DSCP value.

show policy-map type qos

Displays all policy maps of type QoS on the


switch.

service-policy type qos


{input | output} <name>

Associates an ingress policy map of type QoS with


a port profile or an interface.

show port-profile name


<profile_name>

Displays information about a specific port profile.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service


Shows the elements of the running configuration
that are related to QoS.

show policy-map interface


brief

Displays a summary of used policy maps.

show policy-map interface


<intf>

Displays the policy map of type QoS that is


associated with an interface, including packet
statistics for that interface.

ip access-list <name>

Defines an IP access list.

statistics per-entry

Enables the gathering of statistics for an access


list.

show access-lists <name>

Displays the access list configuration.

match access-group name


<name>

Matches packets that are permitted by an access


list.

police <options>

Configures traffic rate control.

class-map type queuing


<name>

Creates a class-map of type Queuing.

match protocol <name>

Configures a match criteria based on one of the


predefined protocol types.

show policy-map type


queuing

Displays all policy-maps of type Queuing on the


switch.

bandwidth percent
<percentage>

Sets the minimum guaranteed bandwidth for a


specific traffic class in a QoS policy map.

copy running-config
startup-config

Saves the running configuration.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

show running-config ipqos

Job Aids

These job aids are available to help you complete the lab activity.

Lab topology diagram in the visual objectives section in the beginning of this lab

Lab connections table in the general lab topology information section in the beginning
of the lab guide

Lab IP address and VLAN plan in the general lab topology information section in the
beginning of the lab guide

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-3

Lab 7: Configuring Quality of Service

Task 1: Generate Traffic


During this task, you will use the network-testing tool Iperf to generate network traffic
from the virtual machine WinServer-1 to WinServer-2.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


1.

Open a console to WinServer-2.

2.

Open a command prompt and verify that the Iperf utility is present on the server by typing
iperf -h. This should present you with the help text for the Iperf utility.

C:\Documents and Settings\Administrator> d:


D:\> cd Iperf
D:\Iperf> iperf h

Usage: iperf [-s|-c host] [options]


iperf [-h|--help] [-v|--version]

Client/Server:
-f, --format
[kmKM]
format to report: Kbits, Mbits, KBytes, MBytes
-i, --interval #
seconds between periodic bandwidth reports
-l, --len
#[KM]
length of buffer to read or write (default 8 KB)
-m, --print_mss
print TCP maximum segment size (MTU - TCP/IP header)
-o, --output
<filename> output the report or error message to this specifie
d file
-p, --port
#
server port to listen on/connect to
-u, --udp
use UDP rather than TCP
-w, --window
#[KM]
TCP window size (socket buffer size)
-B, --bind
<host>
bind to <host>, an interface or multicast address
-C, --compatibility
for use with older versions does not sent extra msgs
-M, --mss
#
set TCP maximum segment size (MTU - 40 bytes)
-N, --nodelay
set TCP no delay, disabling Nagle's Algorithm
-V, --IPv6Version
Set the domain to IPv6
Server specific:
-s, --server
-D, --daemon
-R, --remove

Client specific:
-b, --bandwidth #[KM]
-c,
-d,
-n,
-r,
-t,
-F,
-I,
-L,
-P,

L7-4

--client
<host>
--dualtest
--num
#[KM]
--tradeoff
--time
#
--fileinput <name>
--stdin
--listenport #
--parallel #

run in server mode


run the server as a daemon
remove service in win32

for UDP, bandwidth to send at in bits/sec


(default 1 Mbit/sec, implies -u)
run in client mode, connecting to <host>
Do a bidirectional test simultaneously
number of bytes to transmit (instead of -t)
Do a bidirectional test individually
time in seconds to transmit for (default 10 secs)
input the data to be transmitted from a file
input the data to be transmitted from stdin
port to recieve bidirectional tests back on
number of parallel client threads to run

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service


-T, --ttl

Miscellaneous:
-h, --help
-v, --version

time-to-live, for multicast (default 1)

print this message and quit


print version information and quit

[KM] Indicates options that support a K or M suffix for kilo- or mega-

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

The TCP window size option can be set by the environment variable
TCP_WINDOW_SIZE. Most other options can be set by an environment variable
IPERF_<long option name>, such as IPERF_BANDWIDTH.
Report bugs to <dast@nlanr.net>

Note

3.

Iperf is a commonly used network-testing tool that can create TCP and UDP data
streams and measure the throughput of the network that is carrying them. If the Iperf
utility is not present on the server, ask the instructor for assistance.

Start Iperf on WinServer-2. Use the Real Time Transport Protocol (RTP) UDP port 16384
as destination port.

D:\Iperf> iperf -s u -p 16384


-----------------------------------------------------------Server listening on UDP port 16384
Receiving 1470 byte datagrams
UDP buffer size: 8.0 KByte (default)
------------------------------------------------------------

Note

4.

RTP is used extensively in communication and entertainment systems that involve


streaming media, such as telephony, video teleconference applications, and webbased push-to-talk features. RTP is used in conjunction with the RTP Control
Protocol (RTCP). While RTP carries the media streams (such as audio and video),
RTCP is used to monitor transmission statistics and QoS, and aid synchronization of
multiple streams. When both protocols are used in conjunction, RTP is originated
and received on even port numbers and the associated RTCP communication uses
the next higher odd port number. RTP and RTCP use the UDP port range 16384 to
32767.

Open a console to WinServer-1.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-5

Lab 7: Configuring Quality of Service

5.

Open a command prompt and use the Iperf client to connect to the Iperf service on
WinServer-2 using the IP address 10.0.14.2. Use the UDP port 16384 as destination port.

C:\Documents and Settings\Administrator> d:


D:\> cd Iperf
D:\Iperf> iperf c 10.0.14.2 u -p 16384

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

-----------------------------------------------------------Client connecting to 10.0.14.2, UDP port 16384


Sending 1470 byte datagrams
UDP buffer size: 8.0 KByte (default)
-----------------------------------------------------------[1916] local 10.0.14.1 port 1099 connected with 10.0.14.2 port 16384
[ ID] Interval
Transfer
Bandwidth
[1916] 0.0-10.0 sec 1.25 MBytes 1.05 Mbits/sec
[1916] Server Report:
[1916] 0.0-10.0 sec 1.25 MBytes 1.05 Mbits/sec 0.000ms
0/ 893 (0%)
[1916] Sent 893 datagrams

Activity Verification

You have completed this task when you attain these results:

Transferred data from WinServer-1 to WinServer-2 using the Iperf utility

L7-6

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service

Task 2: Configure Classification Policies


During this task, you will configure a class map and policy map of type QoS to classify and
mark traffic and verify their operation.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


6.

Connect to your VSM at IP address 10.0.1.200.

7.

Create a class map of type QoS named RTP and configure this class map to match the RTP
traffic with a port range 16384 to 32767.

N1000V(config)# class-map type qos RTP


N1000V(config-cmap-qos)# match ip rtp 16384-32767

8.

Examine the class maps of type QoS.

N1000V(config-cmap-qos)# show class-map type qos


Type qos class-maps
====================

class-map type qos match-all RTP


match ip rtp 16384-32767

9.

Create a policy map of type QoS named VMQoS and associate the class map RTP with it.

N1000V(config-cmap-qos)# policy-map type qos VMQoS


N1000V(config-pmap-qos)# class type qos RTP
N1000V(config-pmap-c-qos)#

10. Set high priority markings for RTP traffic. Use CoS value 5 and DSCP value EF (which
corresponds to the decimal value 46).
N1000V(config-pmap-c-qos)# set cos 5
N1000V(config-pmap-c-qos)# set dscp ef

Note

A common QoS principle is to classify and mark packets as close to the edge of the
network as possible. The objective of this task is to set the layer 2 CoS and layer 3
DSCP marking in the packets for the traffic generated by your virtual machines. This
allows other QoS policies for the uplink connections either on the VSM or for
upstream switches to act on the markings without a need to reclassify the packets
using access lists.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-7

Lab 7: Configuring Quality of Service

11. All other traffic will have low priority markings. Set the CoS value to 0 and DSCP value to
Default (which corresponds to the decimal value 0).
N1000V(config-pmap-c-qos)# class class-default
N1000V(config-pmap-c-qos)# set cos 0
N1000V(config-pmap-c-qos)# set dscp default

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

12. Examine the policy maps of type QoS.


N1000V(config-pmap-c-qos)# show policy-map type qos

Type qos policy-maps


====================

policy-map type qos VMQoS


class RTP
set cos 5
set dscp ef
class class-default
set cos 0
set dscp default

13. Apply the policy map VMQoS of type QoS to the port profile Production-VMs in the input
direction.
N1000V(config-pmap-c-qos)# port-profile Production-VMs
N1000V(config-port-prof)# service-policy type qos input VMQoS

14. Verify that the policy map is assigned and evaluated in the port profile configuration.
N1000V(config-port-prof)# show port-profile name Production-VMs
port-profile Production-VMs
type: Vethernet
description: "Production VM Network"
status: enabled
max-ports: 32
min-ports: 1
inherit:
config attributes:
switchport mode access
switchport access vlan 14
ip port access-group ProtectVM out
ip verify source dhcp-snooping-vlan
service-policy type qos input VMQoS
no shutdown
evaluated config attributes:
switchport mode access
switchport access vlan 14
ip port access-group ProtectVM out
ip verify source dhcp-snooping-vlan

L7-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

service-policy type qos input VMQoS


no shutdown
assigned interfaces:
Vethernet1
Vethernet2
Vethernet9
port-group: Production-VMs
system vlans: none
capability l3control: no
capability iscsi-multipath: no
port-profile role: none
port-binding: static

15. Examine the QoS elements of the running configuration.


N1000V(config-port-prof)# show run ipqos
version 4.2(1)SV1(5.2)
class-map type qos match-all RTP
match ip rtp 16384-32767
policy-map type qos VMQoS
class RTP
set cos 5
set dscp 46
class class-default
set cos 0
set dscp 0

interface Vethernet1
service-policy type qos input VMQoS
interface Vethernet2
service-policy type qos input VMQoS
interface Vethernet9
service-policy type qos input VMQoS

16. Examine used policy maps for all interfaces.

N1000V(config-port-prof)# show policy-map interface brief

Interface/VLAN [Status]:INP QOS


OUT QOS
INP QUE
OUT QUE
==========================================================================
Vethernet1
[Active]:VMQoS
Vethernet2
[Active]:VMQoS
Vethernet9
[Active]:VMQoS
==========================================================================

17. Return to WinServer-1.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-9

Lab 7: Configuring Quality of Service

18. Repeat the connection tests performed in Task 1. Use the Iperf client to connect to the Iperf
service on WinServer-2 using the IP address 10.0.14.2. Use the UDP port 16384 as
destination port.
D:\Iperf> iperf -c 10.0.14.2 u -p 16384

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

-----------------------------------------------------------Client connecting to 10.0.14.2, UDP port 16384


Sending 1470 byte datagrams
UDP buffer size: 64.0 KByte (default)
-----------------------------------------------------------[1916] local 10.0.14.1 port 1099 connected with 10.0.14.2 port 16384
[ ID] Interval
Transfer
Bandwidth
[1916] 0.0-10.0 sec 1.25 MBytes 1.05 Mbits/sec
[1916] Server Report:
[1916] 0.0-10.0 sec 1.25 MBytes 1.05 Mbits/sec 0.000ms
0/ 893 (0%)
[1916] Sent 893 datagrams

19. Examine the policy map on the interface that connects to WinServer-1.
N1000V(config-port-prof)# show policy-map interface vethernet 1
Global statistics status :

enabled

Vethernet1

Service-policy (qos) input:


policy statistics status:

VMQoS
enabled

Class-map (qos):
RTP (match-all)
894 packets
Match: ip rtp 16384-32767
set cos 5
set dscp ef

Class-map (qos):
class-default (match-any)
29 packets
set cos 0
set dscp default

Note

You should see hit counts for RTP packets.

20. Save your configuration.

N1000V(config-port-prof)# exit
N1000V(config)# copy run start
[########################################] 100%

L7-10

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service

Activity Verification
You have completed this task when you attain these results:
Defined a class map of type QoS for RTP traffic
Defined a policy map of type QoS to mark traffic generated by your virtual machines

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Verified the operation of the classification and marking policy through testing using
Iperf

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-11

Lab 7: Configuring Quality of Service

Task 3: Configure Policing


During this task, you will configure QoS policing of a traffic class and verify its operation.

Activity Procedure
Complete these steps:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

21. Return to WinServer-2.

22. Break out of the current Iperf session by issuing Ctrl-C. Start an Iperf server using the FTP
control port 21 as destination port using the default window size of 64 KB.

Ctrl-C

D:\Iperf> iperf -s -p 21

-----------------------------------------------------------Server listening on TCP port 21


TCP window size: 8.0 Kbyte (default)

23. Return to WinServer-1.

24. Use the Iperf client to connect to the Iperf service on WinServer-2 using the TCP port 21
as destination port using the default window size.
D:\Iperf> iperf -c 10.0.14.2 -p 21

-----------------------------------------------------------Client connecting to 10.0.14.2, TCP port 21


TCP window size: 8.0 Kbyte (default)
-----------------------------------------------------------[1916] local 10.0.14.1 port 1101 connected with 10.0.14.2 port 21
[ ID] Interval
Transfer
Bandwidth
[1916] 0.0-10.0 sec 427 MBytes 358 Kbits/sec

25. What is the transfer speed that you achieved?

26. Configure an access list named FTP that matches TCP ports 21 and 20 for either the source
or the destination port. Enable statistics gathering for the access list.
N1000V(config)# ip access-list
N1000V(config-acl)# permit tcp
N1000V(config-acl)# permit tcp
N1000V(config-acl)# permit tcp
N1000V(config-acl)# permit tcp
N1000V(config-acl)# statistics

L7-12

FTP
any any eq 21
any eq 21 any
any any eq 20
any eq 20 any
per-entry

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service

27. Examine the access list.


N1000V(config-acl)# show access-lists FTP

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

IP access list FTP


statistics per-entry
10 permit tcp any any eq ftp
20 permit tcp any eq ftp any
30 permit tcp any any eq ftp-data
40 permit tcp any eq ftp-data any

28. Create a class map of type QoS named FTP.


N1000V(config-acl)# class-map type qos FTP
N1000V(config-cmap-qos)#

29. Configure this class map to match the traffic permitted by access list FTP.
N1000V(config-cmap-qos)# match access-group name FTP

30. Examine the class map.

N1000V(config-cmap-qos)# show class-map type qos FTP


Type qos class-maps
====================

class-map type qos match-all FTP


match access-group name FTP

31. Add the class map FTP to your existing policy map VMQoS.
N1000V(config-cmap-qos)# policy-map type qos VMQoS
N1000V(config-pmap-qos)# class type qos FTP

32. Configure a 1-rate, 2-color policer that allows 1Mbps traffic and drops packets exceeding
this bandwidth limit.
N1000V(config-pmap-c-qos)# police 1 Mbps conform transmit violate drop

33. Examine the policy map.

N1000V(config-pmap-c-qos)# show policy-map VMQoS


Type qos policy-maps
====================

policy-map type qos VMQoS


class RTP

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-13

Lab 7: Configuring Quality of Service


set cos 5
set dscp ef
class FTP
police cir 1 mbps bc 200 ms conform transmit violate drop
class class-default
set cos 0
set dscp default

The default Bc (committed burst) value is 200 milliseconds of traffic at the configured
rate.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

34. Return to WinServer-1.

35. Repeat the connection test.

D:\Iperf> iperf -c 10.0.14.2 -p 21

-----------------------------------------------------------Client connecting to 10.0.14.2, TCP port 21


TCP window size: 8.00 Kbyte (default)
-----------------------------------------------------------[1916] local 10.0.14.1 port 1102 connected with 10.0.14.2 port 21
[ ID] Interval
Transfer
Bandwidth
[1916] 0.0-10.3 sec
608 KBytes
482 Kbits/sec

36. What is the transfer speed that you achieved?

Note

TCP has automatic recovery from dropped packets, which it interprets as congestion
on the network. The sender reduces its sending rate for a certain amount of time,
and then tries to find out if the network is no longer congested by increasing the rate
again subject to a ramp-up. This is known as the slow-start algorithm and is the
reason that the transmission rate is below the configured policing rate of 1 Mbps.

37. Examine the policy map on the interface that connects to WinServer-1.
N1000V(config-pmap-c-qos)# show policy-map interface vethernet 1
Global statistics status :

enabled

Vethernet1

Service-policy (qos) input:


policy statistics status:
Class-map (qos):
894 packets

L7-14

VMQoS
enabled

RTP (match-all)

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service


Match: ip rtp 16384-32767
set cos 5
set dscp ef

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Class-map (qos):
FTP (match-all)
491 packets
Match: access-group FTP
police cir 1 mbps bc 200 ms
conformed 601188 bytes, 0 bps action: transmit
violated 134746 bytes, 0 bps action: drop
Class-map (qos):
class-default (match-any)
7 packets
set cos 0
set dscp default

38. Mark FTP packets with the DSCP value AF11 (which corresponds to the decimal value
10).
N1000V(config-pmap-c-qos)# set dscp af11

39. Modify the policer to transmit 1 Mbps traffic with the original marking of AF11 and mark
down packets above this limit instead of dropping to the DSCP marking AF13 (which
equals to decimal value 14) using the system-defined default table map pir-markdownmap.
N1000V(config-pmap-c-qos)# police 1 Mbps conform transmit violate set dscp dscp
table pir-markdown-map

40. Examine the policy map.

N1000V(config-pmap-c-qos)# show policy-map VMQoS


Type qos policy-maps
====================

policy-map type qos VMQoS


class RTP
set cos 5
set dscp ef
class FTP
police cir 1 mbps bc 200 ms conform transmit violate set dscp dscp table pirmarkdown-map
set dscp af11
class class-default
set cos 0
set dscp default

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-15

Lab 7: Configuring Quality of Service

41. Examine the policy map.


N1000V(config-pmap-c-qos)# show run ipqos all

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

version 4.2(1)SV1(5.2)
qos statistics
class-map type qos match-all FTP
match access-group name FTP
class-map type qos match-all RTP
match ip rtp 16384-32767
table-map cir-markdown-map
default copy
from 10,12 to 12
from 18,20 to 20
from 26,28 to 28
from 34,36 to 36
table-map pir-markdown-map
default copy
from 10,12 to 14
from 18,20 to 22
from 26,28 to 30
from 34,36 to 38
policy-map type qos VMQoS
class RTP
set cos 5
set dscp 46
class FTP
police cir 1 mbps bc 200 ms conform transmit violate set dscp dscp table pirmarkdown-map
set dscp 10
class class-default
set cos 0
set dscp 0
interface Vethernet1
service-policy type qos input VMQoS
interface Vethernet2
service-policy type qos input VMQoS
interface Vethernet9
service-policy type qos input VMQoS
interface port-channel1
priority-flow-control mode auto
interface port-channel2
priority-flow-control mode auto

42. Return to WinServer-1.

L7-16

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service

43. Repeat the connection test.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

D:\Iperf> iperf -c 10.0.14.2 -p 21


-----------------------------------------------------------Client connecting to 10.0.14.2, TCP port 21
TCP window size: 64.0 Kbyte (default)
-----------------------------------------------------------[1916] local 10.0.14.1 port 1105 connected with 10.0.14.2 port 21
[ ID] Interval
Transfer
Bandwidth
[1916] 0.0-10.0 sec 414 MBytes 347 Mbits/sec

Note

The transmission rate is back to approximately the original value with the difference
that now all packets above the CIR rate of 1 Mbps are marked down to AF31.

44. Save your configuration.

N1000V(config-pmap-c-qos)# end
N1000V# copy run start
[########################################] 100%

Activity Verification

You have completed this task when you attain these results:

Defined a class map of type QoS for FTP traffic based on an access list

Added the class map to your existing policy map to mark and police FTP traffic

Verified the operation of the classification, marking, and policing through testing using
Iperf

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-17

Lab 7: Configuring Quality of Service

Task 4: Configure Class-Based Weighted Fair


Queuing
During this task, you will configure class-based weighted fair queuing on the Cisco Nexus
1000V.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Procedure
Complete these steps:

45. Create a class map of type queuing named Control.

N1000V# configure
N1000V(config)# class-map type queuing match-all Control

46. Configure this class map to match the predefined protocol type n1k_control, which
automatically matches VSM control traffic. There are similar traffic classifications for the
other required 1000V networks.
N1000V(config-cmap-qos)# match protocol n1k_control

47. Create a class map of type queuing named Packet to match VSM packet traffic.
N1000V(config-cmap-qos)# class-map type queuing match-all Packet
N1000V(config-cmap-qos)# match protocol n1k_packet

48. Create a class map of type queuing named Management to match Cisco VSM or VMware
management traffic.
N1000V(config-cmap-qos)# class-map type queuing match-any Management
N1000V(config-cmap-qos)# match protocol n1k_mgmt
N1000V(config-cmap-qos)# match protocol vmw_mgmt

Note

Make sure you configure match type match-any.

Note

Type match protocol v? to view other NetFlow traffic classifications for VMware
traffic.

L7-18

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service

49. Create a class map of type queuing named vMotion_FT to match VMware vMotion or
VMware fault tolerance traffic.
N1000V(config-cmap-qos)# class-map type queuing match-any vMotion_FT
N1000V(config-cmap-qos)# match protocol vmw_vmotion
N1000V(config-cmap-qos)# match protocol vmw_ft

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

50. Create a class map of type queuing named Storage to match VMware NFS or VMware
iSCSI traffic.
N1000V(config-cmap-qos)# class-map type queuing match-any Storage
N1000V(config-cmap-qos)# match protocol vmw_nfs
N1000V(config-cmap-qos)# match protocol vmw_iscsi

51. Examine all class maps of type queuing.

N1000V(config-cmap-qos)# show class-map type queuing


Type queuing class-maps
========================

class-map type queuing match-all Packet


match protocol n1k_packet

class-map type queuing match-all Control


match protocol n1k_control
class-map type queuing match-any Storage
match protocol vmw_nfs
match protocol vmw_iscsi

class-map type queuing match-any Management


match protocol n1k_mgmt
match protocol vmw_mgmt
class-map type queuing match-any vMotion_FT
match protocol vmw_vmotion
match protocol vmw_ft

52. Create a policy map of type queuing named CBWFQ and associate the class map Control
with it.
N1000V(config-cmap-qos)# policy-map type queuing CBWFQ
N1000V(config-pmap-qos)# class type queuing Control

53. Set the minimum guaranteed bandwidth for this traffic class to 5 percent of the total
available bandwidth.
N1000V(config-pmap-c-qos)# bandwidth percent 5

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-19

Lab 7: Configuring Quality of Service


Control traffic is generated by the Cisco Nexus 1000V Series and exchanged
between the primary and secondary VSMs, as well as between the VSMs and VEMs.
It requires little bandwidth (less than 7 MB) but demands absolute priority. Control
traffic is crucial to the ability of the Cisco Nexus 1000V Series to function properly,
and its importance cannot be overstated.

Note

Control traffic should be considered the most important traffic in a Cisco Nexus
1000V Series network. The configured value of 5 percent is an example and does
not reflect a fixed value for every Cisco Nexus 1000V installation.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

54. Add the class map Packet to the policy map and set the minimum guaranteed bandwidth
for this traffic class to 5 percent of the total available bandwidth.
N1000V(config-pmap-c-qos)# class type queuing Packet
N1000V(config-pmap-c-qos)# bandwidth percent 5

Note

Packet traffic transports selected packets to the VSM for processing. The bandwidth
required for packet interface is extremely low, and its use is intermittent. The
configured value of 5 percent is an example and does not reflect a fixed value for
every Cisco Nexus 1000V installation.

55. Add the class map Management to the policy map and set the minimum guaranteed
bandwidth for this traffic class to 5 percent of the total available bandwidth.
N1000V(config-pmap-c-qos)# class type queuing Management
N1000V(config-pmap-c-qos)# bandwidth percent 5

Note

Management traffic usually has low bandwidth requirements, but should be treated
as high-priority traffic. The configured value of 5 percent is an example and does not
reflect a fixed value for every Cisco Nexus 1000V installation.

56. Add the class map vMotion_FT to the policy map and set the minimum guaranteed
bandwidth for this traffic class to 10 percent of the total available bandwidth.
N1000V(config-pmap-c-qos)# class type queuing vMotion_FT
N1000V(config-pmap-c-qos)# bandwidth percent 10

L7-20

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service


VMware vMotion traffic does not occur on a constant basis, meaning that most of the
time VMware vMotion does not use any bandwidth. The amount of vMotion traffic
depends on the features configured. For example, with DRS (Distributed Resource
Scheduler) configured, vMotion operations can be frequent.

Note

When VMware vMotion is initiated, it usually generates a burst of data over a period
of 10 to 60 seconds. VMware vMotion is not bandwidth sensitive. When this type of
traffic is faced with bandwidth that is lower than line rate, the duration of the virtual
machine move event is extended based on the amount of bandwidth available.
Despite the popularity of VMware vMotion as a feature, VMware vMotion traffic can
usually be considered of medium priority relative to other traffic types. The
configured value of 10 percent is an example and does not reflect a fixed value for
every Cisco Nexus 1000V installation.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

57. Add the class map Storage to the policy map and set the minimum guaranteed bandwidth
for this traffic class to 15 percent of the total available bandwidth.
N1000V(config-pmap-c-qos)# class type queuing Storage
N1000V(config-pmap-c-qos)# bandwidth percent 15

Note

IP storage traffic must be lossless and receive priority over other traffic. The
configured value of 15 percent is an example and does not reflect a fixed value for
every Cisco Nexus 1000V installation.

58. Examine policy maps of type queuing.

N1000V(config-pmap-c-que)# show policy-map type queuing


Type queuing policy-maps
========================

policy-map type queuing CBWFQ


class type queuing Control
bandwidth percent 5
class type queuing Packet
bandwidth percent 5
class type queuing Management
bandwidth percent 5
class type queuing vMotion_FT
bandwidth percent 10
class type queuing Storage
bandwidth percent 15

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-21

Lab 7: Configuring Quality of Service

59. Apply the policy map CBWFQ of type queuing to the uplink port profile Host-Uplinks in
the output direction.
N1000V(config-pmap-c-qos)# port-profile type ethernet Host-Uplinks
N1000V(config-port-prof)# service-policy type queuing output CBWFQ

60. Verify that the policy map is assigned and evaluated in the port profile configuration.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config-port-prof)# show port-profile name Host-Uplinks


port-profile Host-Uplinks
type: Ethernet
description: "Uplinks from ESXi hosts to switch"
status: enabled
max-ports: 32
min-ports: 1
inherit:
config attributes:
switchport mode trunk
switchport trunk allowed vlan 1,11-14
service-policy type queuing output CBWFQ
channel-group auto mode active
no shutdown
evaluated config attributes:
switchport mode trunk
switchport trunk allowed vlan 1,11-14
service-policy type queuing output CBWFQ
channel-group auto mode active
no shutdown
assigned interfaces:
port-channel1
port-channel2
Ethernet3/2
Ethernet3/4
Ethernet4/2
Ethernet4/4
port-group: system-uplinlk
system vlans: 1,11-13
capability l3control: no
capability iscsi-multipath: no
port-profile role: none
port-binding: static

Note

L7-22

Weighted fair queuing only works with ESX 4.1 and later because it makes use of the
new Network I/O Control feature VMware introduced in version 4.1. It provides
support for 64 queues/resource pools per host and is only supported on egress
uplink ports.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 7: Configuring Quality of Service

61. Examine used policy maps for all interfaces.


N1000V(config-port-prof)# show policy-map interface brief

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Interface/VLAN [Status]:INP QOS


OUT QOS
INP QUE
OUT QUE
==========================================================================
port-channel1
[Active]:
CBWFQ
port-channel2
[Active]:
CBWFQ
Vethernet1
[Active]:VMQoS
Vethernet2
[Active]:VMQoS
Vethernet9
[Active]:VMQoS
Ethernet3/2
[Active]:
CBWFQ
Ethernet3/4
[Active]:
CBWFQ
Ethernet4/2
[Active]:
CBWFQ
Ethernet4/4
[Active]:
CBWFQ
==========================================================================

N1000V(config-port-prof)# show policy-map interface type queuing


Global statistics status :

enabled

port-channel1

Service-policy (queuing) output:


CBWFQ
policy statistics status:
enabled

Class-map (queuing):
Control (match-all)
Match: protocol n1k_control
bandwidth percent 5
queue dropped pkts : 0
Class-map (queuing):
Packet (match-all)
Match: protocol n1k_packet
bandwidth percent 5
queue dropped pkts : 0

Class-map (queuing):
Management (match-any)
Match: protocol n1k_mgmt
Match: protocol vmw_mgmt
bandwidth percent 5
queue dropped pkts : 0
Class-map (queuing):
vMotion_FT (match-any)
Match: protocol vmw_vmotion
Match: protocol vmw_ft
bandwidth percent 10
queue dropped pkts : 0
Class-map (queuing):
Storage (match-any)
Match: protocol vmw_nfs
Match: protocol vmw_iscsi
bandwidth percent 15
queue dropped pkts : 0

port-channel2

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L7-23

Lab 7: Configuring Quality of Service


Service-policy (queuing) output:
CBWFQ
policy statistics status:
enabled
Class-map (queuing):
Control (match-all)
Match: protocol n1k_control
bandwidth percent 5
queue dropped pkts : 0

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Class-map (queuing):
Packet (match-all)
Match: protocol n1k_packet
bandwidth percent 5
queue dropped pkts : 0

Class-map (queuing):
Management (match-any)
Match: protocol n1k_mgmt
Match: protocol vmw_mgmt
bandwidth percent 5
queue dropped pkts : 0
Class-map (queuing):
vMotion_FT (match-any)
Match: protocol vmw_vmotion
Match: protocol vmw_ft
bandwidth percent 10
queue dropped pkts : 0
Class-map (queuing):
Storage (match-any)
Match: protocol vmw_nfs
Match: protocol vmw_iscsi
bandwidth percent 15
queue dropped pkts : 0

62. Save your configuration.

N1000V(config-port-prof)# exit
N1000V(config)# copy run start
[########################################] 100%

Activity Verification

You have completed this task when you attain these results:

Configured class maps of type queuing to match critical traffic in your Cisco Nexus
1000V environment using predefined protocols

Configured a policy map of type queuing that allocates minimum guaranteed bandwidth
for the traffic classes

Assigned the policy map to the uplink port profile to implement class-based weighted
fair queuing

L7-24

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L8
Configuring Management Features
Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L8-1

Lab 8: Configuring Management Features

Activity Objective
In this activity, you will configure management features on the Cisco Nexus 1000V. After
performing this lab, you should be able to perform the following:
Configure and verify AAA

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Configure and verify role-based access control

Required Resources

These are the resources and equipment required for each pod to complete this activity:
Two VMware ESXi 5.0 hosts with the Cisco Nexus 1000V VEM installed

One server running VMware vCenter Server 5 and VMware vSphere Client 5.0
Two Cisco Nexus 1000V VSM VM appliances
All pods share the following lab core devices:
One switch for server networking
One iSCSI-based storage device

Command List

The table describes the commands that are used in this activity.

L8-2

Command

Description

radius-server host <ipv4address> key <sharedsecret>

Configures RADIUS server parameters.

show radius-server

Displays the RADIUS server configuration.

aaa group server radius


<group-name>

Creates a RADIUS server group.

server {<ipv4-address> |
<server-name>}

Configures the RADIUS server as a member of


the RADIUS server group.

source-interface
<interface-type>
<interface-id>

Specifies a source interface for reaching a


RADIUS or TACACS+ server group,

use-vrf <vrf-name>

Specifies the virtual routing and forwarding


instance (VRF) to use to contact this server group.

show radius-server groups

Displays information about the RADIUS server


group configuration.

test aaa group <groupname> <user-name>


<password>

Tests AAA for a RADIUS server group.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 8: Configuring Management Features


Configures periodic RADIUS server monitoring.

radius-server deadtime
<minutes>

Specifies the time before Cisco Nexus 1000C


checks a RADIUS server that was previously
unresponsive.

aaa authentication login


default group <group-list>
local

Configures the default AAA authentication


methods.

aaa authentication login


error-enable

Configures AAA authentication failure messages


to display.

show aaa authentication


login error-enable

Displays the authentication login error message


enable configuration.

show role

Displays user roles.

username <user-name>
password <password> role
<role-name>

Creates a user account.

show password strengthcheck

Displays whether password strength is being


checked.

show user-account [username]

Displays user account configuration.

role name <role-name>

Create a user role.

rule <number> {deny |


permit} {read | read-write
feature <feature-name>}

Creates a rule defining criteria for a user role.

where [detail]

Displays your user name and location in the


command-line interface.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

radius-server host <ipv4address> test <user-name>


<password> idle-time
<minutes>

Job Aids

These job aids are available to help you complete the lab activity.

Lab topology diagram in the visual objectives section in the beginning of this lab

Lab connections table in the general lab topology information section in the beginning
of the lab guide

Lab IP address and VLAN plan in the general lab topology information section in the
beginning of the lab guide

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L8-3

Lab 8: Configuring Management Features

Task 1: Configure RADIUS Server Group


During this task, you will configure a RADIUS server group and verify availability of your
RADIUS server.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


1.

Connect to your VSM at IP address 10.0.1.200.

2.

Configure a RADIUS server with IP address 10.0.1.50, Configure secretkey as the


RADIUS server key.

N1000V(config)# radius-server host 10.0.1.50 key secretkey

Note

3.

Your vCenter Server with IP address 10.0.1.50 is set up as a RADIUS server using
Microsoft Internet Authentication Service (IAS). Cisco Nexus 1000V also supports
TACACS+.

Verify the RADIUS server configuration.

N1000V(config)# show radius-server


retransmission count:1
timeout value:5
deadtime value:0
source interface:any available
total number of servers:1

following RADIUS servers are configured:


10.0.1.50:
available for authentication on port:1812
available for accounting on port:1813
RADIUS shared secret:********

4.

Configure a RADIUS server group named RadiusSG and add your server to it.

N1000V(config)# aaa group server radius RadiusSG


N1000V(config-radius)# server 10.0.1.50

5.

Specify the management interface as source interface and management VRF to be used to
reach the RADIUS server.

N1000V(config-radius)# source-interface mgmt 0


N1000V(config-radius)# use-vrf management
N1000V(config-radius)# exit

L8-4

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 8: Configuring Management Features

6.

Display the RADIUS server group configuration.

N1000V(config)# show radius-server groups


total number of groups:2

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

following RADIUS server groups are configured:


group radius:
server: all configured radius servers
deadtime is 0
group RadiusSG:
server: 10.0.1.50 on auth-port 1812, acct-port 1813
deadtime is 0
vrf is management
Source interface mgmt0

Note

7.

RADIUS server group radius is a system-defined default group.

Manually send a test message to the RADIUS server group to confirm the availability of
the server. Use the username radius and password cisco123 for authentication.

N1000V(config)# test aaa group RadiusSG radius cisco123


user has been authenticated

Note

8.

The RADIUS server is set up with these user credentials. You should get a
successful authentication message user has been authenticated before you
proceed to the next step.

Configure periodic RADIUS server monitoring. Configure as test username radius and
password cisco123 for authentication and set the idle timer to three minutes.

N1000V(config)# radius-server host 10.0.1.50 test username radius password cisco123


idle-time 3

Note

An unresponsive RADIUS server can cause a delay in processing AAA requests.


You can periodically monitor a RADIUS server to check whether it is responding (or
alive) to save time in processing AAA requests. Unresponsive RADIUS servers are
marked as dead and are not sent AAA requests. Dead RADIUS servers are
periodically monitored and returned to the alive state once they respond. Whenever
a RADIUS server changes to the dead or alive state, a Simple Network Management
Protocol (SNMP) trap is generated and an error message is displayed indicating that
a failure is taking place.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L8-5

Lab 8: Configuring Management Features


Note

9.

The default idle timer value is 0 minutes. When the idle time interval is 0 minutes, the
Cisco Nexus 1000V does not perform periodic RADIUS server monitoring.

Examine your configuration, replacing P with your pod number.

N1000V(config)# show radius-server 10.0.1.50

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

10.0.1.50:
available for authentication on port:1812
available for accounting on port:1813
RADIUS shared secret:********
idle time:3
test user:administrator
test password:********

10. Set the dead timer to five minutes.

N1000V(config)# radius-server deadtime 5

Note

Specifies the number of minutes to wait before sending a test packet to a RADIUS
server that was declared dead.

11. Examine your configuration.

N1000V(config)# show radius-server


timeout value:5
deadtime value:5
source interface:any available
total number of servers:1

following RADIUS servers are configured:


10.0.1.50:
available for authentication on port:1812
available for accounting on port:1813
RADIUS shared secret:********

12. Save your configuration.

N1000V(config)# copy run start


[########################################] 100%

L8-6

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 8: Configuring Management Features

Activity Verification
You have completed this task when you attain these results:
Configured a RADIUS server group
Confirmed availability of the RADIUS server group

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Configured periodic RADIUS server monitoring

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L8-7

Lab 8: Configuring Management Features

Task 2: Configure AAA


During this task, you will configure RADIUS-based authentication for administrative
access to your Cisco Nexus 1000V.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


13. Configure the default login authentication method to use your RADIUS server group and,
as fall back method, the local user database.

N1000V(config)# aaa authentication login default group RadiusSG local

Note

The local user database will be used when the RADIUS server is down and fails to
respond.

14. Examine the configured login authentication method.


N1000V(config)# show aaa authentication
default: group RadiusSG local
console: group RadiusSG local

15. Enable login authentication failure messages.

N1000V(config)# aaa authentication login error-enable

16. Examine the login authentication failure message configuration.


N1000V(config)# show aaa authentication login error-enable
enabled

17. Open a new Putty SSH session to your VSM and log in with the RADIUS server user
credentials radius and password cisco123. This should succeed.
18. Close the Putty session.

19. On your remote lab server click Start > Administrative Tools > Services.

L8-8

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 8: Configuring Management Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

20. Locate the Network Policy Server service. Right-click the service and select Stop.

21. Open once again a Putty SSH session to your VSM and try to log in with the RADIUS
server user credentials radius and password cisco123. This should fail since the RADIUS
service is no longer running and the radius user does not exist locally on the VSM.
login as: radius
Nexus 1000v Switch
Using keyboard-interactive authentication.
Password: cisco123

Access denied

22. You should be able to log in using the local user database with the username admin and
password cisco123. You should also see a message informing you the AAA server was
unreachable, so local authentication is performed. This works for user admin since they
exist locally on the VSM, whereas user radius is defined on the vCenter server machine.
login as: admin
Nexus 1000v Switch
Using keyboard-interactive authentication.
Password: cisco123

Remote AAA servers unreachable; local authentication done

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L8-9

Lab 8: Configuring Management Features

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Cisco Nexus Operating System (NX-OS) Software


TAC support: http://www.cisco.com/tac
Copyright (c) 2002-2011, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under
license. Certain components of this software are licensed under
the GNU General Public License (GPL) version 2.0 or the GNU
Lesser General Public License (LGPL) Version 2.1. A copy of each
such license is available at
http://www.opensource.org/licenses/gpl-2.0.php and
http://www.opensource.org/licenses/lgpl-2.1.php
N1000V#

23. Close the Putty session.

24. Examine the statistics of your RADIUS server.

N1000V(config)# show radius-server statistics 10.0.1.50


Server is dead since 0 hrs, 6 min, 9 sec

Monitoring Statistics
Time in previous state: 0 hrs, 56 min, 9 sec
Number of times dead: 1
Total time in dead state: 0 hrs, 6 min, 9 sec
Authentication Statistics
failed transactions: 1
sucessfull transactions: 2
requests sent: 4
requests timed out: 2
responses with no matching requests: 0
responses not processed: 0
responses containing errors: 0
Accounting Statistics
failed transactions: 0
sucessfull transactions: 0
requests sent: 0
requests timed out: 0
responses with no matching requests: 0
responses not processed: 0
responses containing errors: 0

25. Leave the Network Policy Server service disabled.


26. Save your configuration.

N1000V(config)# copy run start


[########################################] 100%

L8-10

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 8: Configuring Management Features

Activity Verification
You have completed this task when you attain these results:
Configured and verified RADIUS-based authentication for administrative access to
your VSM

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Configured and verified local authentication for administrative access to your VSM
when the RADIUS server is not available

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L8-11

Lab 8: Configuring Management Features

Task 3: Configure RBAC


During this task, you will configure role-based access control and apply roles to users.

Activity Procedure
Complete these steps:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

27. Examine the predefined user roles of the Cisco Nexus 1000V.

N1000V(config)# show role

Role: network-admin
Description: Predefined network admin role has access to all commands
on the switch
------------------------------------------------------------------Rule
Perm
Type
Scope
Entity
------------------------------------------------------------------1
permit read-write
Role: network-operator
Description: Predefined network operator role has access to all read
commands on the switch
------------------------------------------------------------------Rule
Perm
Type
Scope
Entity
------------------------------------------------------------------1
permit read

Note

The role network-admin allows full access to all commands on the Cisco Nexus
1000V. The role network-operator allows read-only access to all commands. These
two predefined roles can be assigned to user accounts but cannot be modified.

28. Create a new user account with the username readonly and try to assign the password
readonly to it. This should fail.
N1000V(config)# username readonly password readonly

password is weak
Password should contain characters from at least three of the following classes:
lower case letters, upper case letters, digits and special characters.

29. Display the configuration for checking password strength.


N1000V(config)# show password strength-check
Password strength check enabled

L8-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 8: Configuring Management Features


Note

Password-strength checking is enabled by default and can be disabled with the


command no password strength-check.

30. Create the user account with the username readonly and the password 1234QWerRO and
assign the role network-operator to it.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config)# username readonly password 1234QWerRO role network-operator

31. Display the new user account configuration.


N1000V(config)# show user-account readonly

user:readonly
this user account has no expiry date
roles:network-operator

32. Define a new role named network-support.


N1000V(config)# role name network-support

33. Add a description to the role.

N1000V(config-role)# description First level support

34. Add a rule that permits read access to all commands.


N1000V(config-role)# rule 1 permit read

35. Add three additional rules to allow read-write rights for the features ping, vlan, and syslog.
N1000V(config-role)# rule 2 permit read-write feature ping
N1000V(config-role)# rule 3 permit read-write feature vlan
N1000V(config-role)# rule 4 permit read-write feature syslog

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L8-13

Lab 8: Configuring Management Features

36. Examine the configuration of the new role.


N1000V(config-role)# show role name network-support

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Role: network-support
Description: First Level Support
-----------------------------------------------------------Rule
Perm
Type
Scope
Entity
-----------------------------------------------------------4
permit read-write feature
syslog
3
permit read-write feature
vlan
2
permit read-write feature
ping
1
permit read

37. Create a new user account with the username support and the password 1234QWerSU
and assign the role network-support to it.
N1000V(config-role)# username support password 1234QWerSU role network-support

38. Display the new user account configuration.


N1000V(config)# show user-account support

user:support
this user account has no expiry date
roles:network-support

39. Open a new Putty SSH session to your VSM and log in with the user credentials readonly
and password 1234QWerRO.

40. Change into the global configuration mode and display your current username and location
in the CLI.
N1000V(config)# where
conf
readonly@N1000V

41. Display a summary of the current VLAN configuration.


N1000V(config)# show vlan brief
VLAN
---1
11
12
13
14

L8-14

Name
-------------------------------default
vMotion/Storage
Control
Packet
Production

Status
--------active
active
active
active
active

Ports
-----------------------------Po1, Po2, Veth7, Veth8
Po1, Po2
Po1, Po2, Veth3, Veth4
Po1, Po2, Veth5, Veth6
Po1, Po2, Veth1, Veth2, Veth9

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 8: Configuring Management Features

42. Try to add a VLAN, for example VLAN 100.


N1000V(config)# vlan 100
% Permission denied

This should fail because you have read-only access.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

43. Try to ping your vCenter Server. This should also fail.
N1000V(config)# ping 10.0.1.50
% Permission denied

44. Close the Putty session.

45. Open a new Putty session to your VSM and log in with the user credentials support and
password 1234QWerSU.

46. Change into the global configuration mode and display your current username and location
in the CLI.

N1000V# configure
N1000V(config)# where
conf
support@N1000V

47. Try to add a VLAN, for example VLAN 100. This should work.
N1000V(config)# vlan 100

48. Delete the VLAN and try to ping your vCenter Server. This should also work.
N1000V(config)# no vlan 100

N1000V(config)# ping 10.0.1.50

PING 10.0.1.50 (10.0.1.50): 56 data


64 bytes from 10.0.1.50: icmp_seq=0
64 bytes from 10.0.1.50: icmp_seq=1
64 bytes from 10.0.1.50: icmp_seq=2
64 bytes from 10.0.1.50: icmp_seq=3
64 bytes from 10.0.1.50: icmp_seq=4

bytes
ttl=127
ttl=127
ttl=127
ttl=127
ttl=127

time=1.268 ms
time=0.828 ms
time=0.846 ms
time=0.789 ms
time=0.79 ms

--- 10.0.1.50 ping statistics --5 packets transmitted, 5 packets received, 0.00% packet loss
round-trip min/avg/max = 0.789/0.904/1.268 ms

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L8-15

Lab 8: Configuring Management Features

49. Try to change the hostname to VSM. This should fail.


N1000V(config)# hostname VSM
% Permission denied

The role applied to the user permits only specific commands to be performed.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Note

50. Close the Putty session.

51. Return to your original Putty session with network-admin rights and save your
configuration.
N1000V(config)# copy run start
[########################################] 100%

Activity Verification

You have completed this task when you attain these results:

Configured a user account with read-only access to the commands

Configured a new role with read-only access and some additional privileges and
assigned a user account to it

Logged in as a new user and verified that the role applied to the user permits only
specific commands to be performed

L8-16

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

L9
Configuring SPAN and ERSPAN
Complete this lab activity to practice what you learned in the related lesson.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-1

Lab 9: Configuring SPAN and ERSPAN

Activity Objective
In this activity, you will configure SPAN and ERSPAN sessions on the Cisco Nexus
1000V to inspect network traffic. After performing this lab, you should be able to perform
the following:
Configure and verify a local SPAN session

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Configure and verify an ERSPAN session

Use Wireshark to capture and display the monitored traffic


Perform vMotion while Wireshark is running

Required Resources

These are the resources and equipment required for each pod to complete this activity:
Two VMware ESXi 5.0 hosts with the Cisco Nexus 1000V VEM installed

One server running VMware vCenter Server 5 and VMware vSphere Client 5.0
Two Cisco Nexus 1000V VSM VM appliances
All pods share the following lab core devices:
One switch for server networking
One iSCSI-based storage device

Command List

The table describes the commands that are used in this activity.

L9-2

Command

Description

monitor session <sessionnumber>

Creates a local SPAN session.

description <description>

Adds a description to the SPAN session.

source interface <type>


<id> [rx | tx | both]

Configures the sources and the direction of traffic


to monitor.

destination interface
<type> <id>

Configures the destination interface for copied


source packets.

no shutdown

Enables the SPAN session.

show monitor session


<session-number>

Displays the configured monitor session.

monitor session <sessionnumber> type erspan-source

Creates an ERSPAN session.

destination ip <ipaddress>

Configures the IP address of the host to which the


encapsulated traffic is sent.

erspan-id <flow-id>

Adds an ERSPAN ID to the session configuration.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN


Configures the port profile to carry ERSPAN
traffic.

module vem <module-number>


execute vemcmd show span

Displays SPAN configuration on a VEM.

Vmkping <ip-address>

Sources a ping from the VMkernel interface of an


ESX host to a specified IP address.

ip source binding <ipaddress> <MAC-address>


vlan <vlan-id> interface
vethernet <interfacenumber>

Creates a static IP source entry.

mtu <mtu_value>

Sets the maximum transmission unit for packets in


an ERSPAN session.

username <user-name>
password <password> role
<role-name>

Creates a user account.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

capability l3control

Job Aids

These job aids are available to help you complete the lab activity.

Lab topology diagram in the visual objectives section in the beginning of this lab

Lab connections table in the general lab topology information section in the beginning
of the lab guide

Lab IP address and VLAN plan in the general lab topology information section in the
beginning of the lab guide

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-3

Lab 9: Configuring SPAN and ERSPAN

Task 1: Configure Local SPAN


During this task, you will configure a local SPAN session to monitor the traffic of virtual
machines.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


1.

Connect to your VSM and identify the vEthernet ports of the virtual machines WinServer-1
and WinServer-3.

N1000V(config)# show interface virtual

-------------------------------------------------------------------Port
Adapter
Owner
Mod Host
-------------------------------------------------------------------Veth1
Net Adapter 1 WinServer-1
3
10.0.1.1
Veth2
Net Adapter 1 WinServer-2
4
10.0.1.2
Veth3
Net Adapter 1 N1000V-VSM2
4
10.0.1.2
Veth4
Net Adapter 2 N1000V-VSM2
4
10.0.1.2
Veth5
Net Adapter 3 N1000V-VSM2
4
10.0.1.2
Veth6
Net Adapter 1 N1000V-VSM1
3
10.0.1.1
Veth7
Net Adapter 2 N1000V-VSM1
3
10.0.1.1
Veth8
Net Adapter 3 N1000V-VSM1
3
10.0.1.1
Veth9
Net Adapter 1 WinServer-3
3
10.0.1.1

Note

2.

Make sure that WinServer-1 and WinServer-3 are located on the same ESXi host,
which should be host 10.0.1.1.

Create a local SPAN session to monitor the traffic of the virtual machine WinServer-1.
Configure one as session number and add a description.

N1000V(config)# monitor session 1


N1000V(config-monitor)# description "Local SPAN of WinServer-1"

3.

Configure the SPAN source as the vethernet interface of WinServer-1 in both (transmit and
receive) traffic directions.
Note

Ensure you use the correct vethernet interface for your pod, which may or may not
be vethernet 1.

N1000V(config-monitor)# source interface vethernet 1 both

L9-4

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN

4.

Configure as SPAN destination the vEthernet interface of WinServer-3. Ensure you use the
vethernet port your WINXP3 VM is connected to on your 1000V pod.

N1000V(config-monitor)# destination interface vethernet 9

5.

Display your configured monitor session.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config-monitor)# show monitor session 1


session 1
--------------description
: "Monitor WinServer-1"
type
: local
state
: down (Session admin shut)
source intf
:
rx
: Veth1
tx
: Veth1
both
: Veth1
source VLANs
:
rx
:
tx
:
both
:
source port-profile :
rx
:
tx
:
both
:
filter VLANs
: filter not specified
destination ports : Veth9
destination port-profile :

6.

Enable the SPAN session and examine again the configuration.

N1000V(config-monitor)# no shutdown

N1000V(config-monitor)# show monitor session 1


session 1
--------------description
:
type
:
state
:
source intf
:
rx
:
tx
:
both
:
source VLANs
:
rx
:
tx
:
both
:
source port-profile
rx
:
tx
:
both
:

"Local SPAN of WinServer-1"


local
up
Veth1
Veth1
Veth1

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-5

Lab 9: Configuring SPAN and ERSPAN


filter VLANs
: filter not specified
destination ports : Veth9
destination port-profile :

Connect to WinServer-1 and issue a continuous ping from the command prompt to
WinServer-2 with the command ping 10.0.14.2 -t.

8.

From WinServer-3, open the Wireshark program using the desktop shortcut.

9.

Click on Interface List.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

7.

10. Click Start.

L9-6

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

11. Click the icon named Stop the running live capture to stop the capture once you have
recorded some packets.

12. As a result of your local SPAN session you should see ICMP echo requests and replies
exchanged between WinServer-1 and WinServer-2.

13. Initiate a vMotion of WinServer-3 from your first ESXi host to your second ESXi host by
dragging the virtual machine to your second ESXi host.
14. Wait for vMotion to complete. Start a new capture session in Wireshark by clicking
Capture > Start, while the ping session on WinServer-1 is still active.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-7

Lab 9: Configuring SPAN and ERSPAN

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

15. Do not save the previous capture by clicking Continue without Saving.

16. You should not see any ICMP packets captured now that the VM has moved.

L9-8

Note

A characteristic of local SPAN on Cisco Nexus 1000V is that a destination port can
only monitor sources on the same VEM. But WinServer-1 and WinServer-3 are on
different VEMs after vMotion.

Note

This loss of local SPAN visibility after a VM moves to a different host applies just to
SPAN other features and configurations applied to the port profiles move with the
VM across the datacenter. Local SPAN, as its name implies, occurs between a local
source and destination on the same host.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN

17. Perform another vMotion to move WinServer-3 back to your first ESXi host where
WinServer-1 is located.
18. After vMotion is complete you should see again ICMP packets being captured in
Wireshark.
19. Stop the packet capture and close Wireshark. Quit without saving.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Activity Verification
You have completed this task when you attain these results:

Configured a local SPAN session to send traffic from a virtual machine to Wireshark
running on another virtual machine located on the same VEM

Captured and displayed the monitored traffic using Wireshark

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-9

Lab 9: Configuring SPAN and ERSPAN

Task 2: Configure ERSPAN


During this task, you will configure an ERSPAN session to send the traffic to Wireshark on
a remote virtual machine.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:


20. Connect to your VSM and remove the local SPAN session from the previous task.

N1000V(config-monitor)# no monitor session 1

21. Create an ERSPAN session to monitor the traffic of the virtual machine WinServer-1.
Configure one as session number and add a description.
N1000V(config)# monitor session 2 type erspan-source
N1000V(config-erspan-src)# description "ERSPAN of WinServer-1"

22. As the ERSPAN source use the vEthernet interface of WinServer-1 in both (transmit and
receive) traffic directions.
N1000V(config-erspan-src)# source interface vethernet 1 both

23. Configure as ERSPAN destination the IP address of WinServer-3.


N1000V(config-erspan-src)# destination ip 10.0.14.3

24. Configure ID 1 as the ERSPAN ID.

N1000V(config-erspan-src)# erspan-id 1

25. Enable the ERSPAN session and display your configured monitor session.
N1000V(config-erspan-src)# no shutdown

N1000V(config-erspan-src)# show monitor session 2


session 2
--------------description
type
state
source intf
rx
tx
both

L9-10

:
:
:
:
:
:
:

ERSPAN of WinServer-1
erspan-source
up
Veth1
Veth1
Veth1

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN

filter not specified


10.0.14.3
1
64
0
0
1500
2

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

source VLANs
:
rx
:
tx
:
both
:
source port-profile
rx
:
tx
:
both
:
filter VLANs
:
destination IP
:
ERSPAN ID
:
ERSPAN TTL
:
ERSPAN IP Prec.
:
ERSPAN DSCP
:
ERSPAN MTU
:
ERSPAN Header Type:

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-11

Lab 9: Configuring SPAN and ERSPAN

Task 3: Configure a Port Profile for ERSPAN


During this task, you will configure a new port profile for ERSPAN traffic and assign new
VMkernel interfaces to it.

Activity Procedure

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

Complete these steps:

26. Create a port profile named ERSPAN.

N1000V(config-erspan-src)# port-profile type vethernet ERSPAN


N1000V(config-port-prof)# description "ERSPAN"
N1000V(config-port-prof)# vmware port-group
N1000V(config-port-prof)# switchport mode access
N1000V(config-port-prof)# switchport access vlan 14
N1000V(config-port-prof)# no shutdown
N1000V(config-port-prof)# system vlan 14
N1000V(config-port-prof)# state enabled

27. Configure the port profile to carry ERSPAN traffic.


N1000V(config-port-prof)# capability l3control
N1000V(config-port-prof)# exit

Note

Cisco Nexus 1000V leverages a VMkernel interface to transport ERSPAN traffic. In


this task we define a port profile which will be by the VMkernel interface. We could
configure the interface directly, but using the port profile concept is a more scalable
approach. In case you need to update the VLAN used for the ERSPAN traffic, this
change can easily be accomplished.

28. Examine the port profile configuration.

N1000V(config)# show port-profile name ERSPAN


port-profile ERSPAN
type: Vethernet
description: "ERSPAN"
status: enabled
max-ports: 32
min-ports: 1
inherit:
config attributes:
switchport mode access
switchport access vlan 14
no shutdown
evaluated config attributes:
switchport mode access

L9-12

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN


switchport access vlan 14
no shutdown
assigned interfaces:
port-group: ERSPAN
system vlans: none
capability l3control: yes
capability iscsi-multipath: no
port-profile role: none
port-binding: static

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

29. Using the navigation bar in vCenter, go to the Host and Clusters view.

30. Select your first ESXi host and click the Configuration tab.

31. In the Hardware pane, select Networking and click the vNetwork Distributed Switch
button.

32. Click Manage Virtual Adapters.

33. Click Add.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-13

Lab 9: Configuring SPAN and ERSPAN

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

34. Select New virtual adapter and click Next.

35. Select VMkernel and click Next.

L9-14

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

36. Select the port group ERSPAN from the drop-down menu and click Next. Do not select
any checkboxes.

37. Configure the IP address 10.0.14.111 and subnet mask 255.255.255.0, and click Next.

38. Click Finish and select No if you are asked to configure a default gateway. Click Close.

39. Repeat Steps 6 to 14 for your second ESXi host using the following IP address and subnet
mask:
Fields/Settings

Values

IP Address

10.0.14.112

Subnet Mask

255.255.255.0

40. Examine your ERSPAN configuration on both VEMs.

N1000V(config)# module vem 3 execute vemcmd show span


VEM SOURCE IP: 10.0.14.111
HW SSN ID
2

ERSPAN ID
1

HDR VER
2

DST LTL/IP
10.0.14.3

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-15

Lab 9: Configuring SPAN and ERSPAN


N1000V(config)# module vem 4 execute vemcmd show span
VEM SOURCE IP: 10.0.14.112
HW SSN ID
2

ERSPAN ID
1

HDR VER
2

DST LTL/IP
10.0.14.3

41. Open an SSH session to your ESXi host at IP address 10.0.1.1.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

42. Log in to the server using username root and password cisco123.

43. Run the following command to verify connectivity between the VEM ERSPAN source IP
address and the ERSPAN destination IP address, which belongs toWinServer-3.

~ # vmkping 10.0.14.3
PING 10.0.14.3 (10.0.14.3): 56 data bytes

--- 10.0.14.3 ping statistics --3 packets transmitted, 0 packets received, 100% packet loss

Note

The same issue exists on your second ESX host. This is because we have
configured IP Source Guard for the port profile of WinServer-3 in the security lab. IP
Source Guard is a per-interface traffic filter that permits IP traffic only when the IP
address and MAC address of each packet matches the IP and MAC address
bindings of dynamic or static IP source entries in the DHCP snooping binding table.
You need to add a static IP source entry for the ERSPAN IP address of each VEM.

44. Using the navigation bar in vCenter, go to the Host and Clusters view and select your first
ESXi host and click the Configuration tab.

45. In the Hardware pane, select Networking and click the vNetwork Distributed Switch
view.
46. Click Manage Virtual Adapters.

L9-16

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

47. Select vmk2 (or the VMkernel port you created in the ERSPAN port group) and write
down the MAC address and click Close.

48. Repeat Steps 44 to 47 to record the MAC address of the VMkernel port on your second
ESXi host.

49. On your VSM identify the vEthernet ports used by the ERSPAN VMkernel interfaces of
your ESXi hosts.
N1000V(config)# show port-profile virtual usage

-----------------------------------------------------------------------------Port Profile
Port
Adapter
Owner
-----------------------------------------------------------------------------Host-Uplinks
Po1
Po2
Eth3/2
vmnic1
10.0.1.1
Eth3/4
vmnic3
10.0.1.1
Eth4/2
vmnic1
10.0.1.2
Eth4/4
vmnic3
10.0.1.2
Production-VMs
Veth1
Net Adapter 1 WinServer-1
Veth2
Net Adapter 1 WinServer-2
Veth9
Net Adapter 1 WinServer-3
Control
Veth3
Net Adapter 1 N1000V-VSM2
Veth4
Net Adapter 1 N1000V-VSM1
Packet
Veth5
Net Adapter 3 N1000V-VSM2
Veth6
Net Adapter 3 N1000V-VSM1
Management
Veth7
Net Adapter 2 N1000V-VSM1
Veth8
Net Adapter 2 N1000V-VSM2
ERSPAN
Veth10
vmk2
Module 3
Veth11
vmk2
Module 4

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-17

Lab 9: Configuring SPAN and ERSPAN

50. Add a static IP source entry for the ERSPAN IP address of your first ESX host, using its
VMkernel MAC address and the vEthernet interface.
N1000V(config)# ip source binding 10.0.14.111 <MAC ADDRESS> vlan 14 interface
vethernet <VETH INTERFACE>

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

51. Add another static IP source entry for the ERSPAN IP address of your second ESX host,
using its VMkernel MAC address and vEthernet interface. Replace P with your pod
number.
N1000V(config)# ip source binding 10.0.14.112 <MAC ADDRESS> vlan 14 interface
vethernet <VETH INTERFACE>

52. Examine the DHCP snooping binding table.

N1000V(config)# show ip dhcp snooping binding


MacAddress
----------------00:50:56:75:19:8c
00:50:56:7f:22:0f
[output omitted]

IpAddress
--------------10.0.14.112
10.0.14.111

LeaseSec
-------infinite
infinite

Type
---------static
static

VLAN
---14
14

Interface
------------Vethernet11
Vethernet10

53. On your first or second ESXi host verify connectivity between the VEM ERSPAN source
IP address and the ERSPAN destination IP address that belongs to WinServer-3. This
should work now.
~ # vmkping 10.0.14.3
PING 172.16.P4.13 (10.0.14.3): 56 data bytes
64 bytes from 10.0.14.3: icmp_seq=0 ttl=128 time=0.390 ms
64 bytes from 10.0.14.3: icmp_seq=1 ttl=128 time=0.231 ms
64 bytes from 10.0.14.3: icmp_seq=2 ttl=128 time=0.239 ms
--- 10.0.14.3 ping statistics --3 packets transmitted, 3 packets received, 0% packet loss
round-trip min/avg/max = 0.231/0.287/0.390 ms

L9-18

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Lab 9: Configuring SPAN and ERSPAN

Task 4: Capture and Display ERSPAN Traffic


During this task, you will capture and display ERSPAN traffic using Wireshark.

Activity Procedure
Complete these steps:

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

54. Connect to WinServer-1 and issue a continuous ping to WinServer-2 at 10.0.14.2.


55. Connect to WinServer-3 and start a new capture session in Wireshark.

56. Wait a few seconds and stop the capture and finetune the selection of the traffic by entering
the following in the Filter field: erspan.spanid==1 && (icmp.type==0 | | icmp.type==8).
Click Apply.

Note

As a result of the filter, you will see ICMP requests and replies received via
ERSPAN.

57. Start a new capture session and while the session is active initiate a vMotion of WinServer3 from your first ESX host to your second ESX host. Observe that even during vMotion
Wireshark is receiving the spanned traffic, since this is now an Encapsulated Remote
SPAN (ERSPAN).
58. On W2K1-ESX1 increase the size of the ping packets to 1500 bytes using the command
ping 10.0.14.2 t l 1500.

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

L9-19

Lab 9: Configuring SPAN and ERSPAN

59. Observe that as a result of the previous step, on WinServer-3 the packet size of the
captured ICMP packets is increased in Wireshark. To see this, click on one of the recently
captured packets, then look at the frame size in the middle window.
60. On the VSM decrease the size of the spanned packets to 128 bytes using the MTU
command.

G
Co lo
b
py a
rig l K
n
ht ow
ed l
e
M dg
at e
er
ia
l

N1000V(config)# monitor session 2 type erspan-source


N1000V(config-erspan-src)# mtu 128

Note

One of the powerful features of the Cisco Nexus 1000V is the ability to use truncated
ERSPAN. Unlike any other switch, it can change the size of the ERSPAN packets to
receive only the useful information desired by the network administrator. By changing
the MTU to 128, it will only send the GRE header plus some of the packet header,
but it will not saturate the link by sending too much information.

61. Return to WinServer-3 and observe that as a result of the previous step. The packet size of
the captured ICMP packets should have decreased in Wireshark.

62. On WinServer-1 stop the continuous ping session.


63. Save your VSM configuration.

N1000V(config-erspan-src)# copy run start


[########################################] 100%

Activity Verification

You have completed this task when you attain these results:

Configured an ERSPAN session to send traffic from a virtual machine to Wireshark


running on another virtual machine located on the same ESXi host

Performed vMotion to move the virtual machine capturing spanned traffic to another
ESXi host
Captured and displayed the monitored traffic using Wireshark

Configured and verified truncated ERSPAN by decreasing the MTU size of the spanned
traffic

L9-20

Global Knowledge Training LLC


For individual use only; may not be reprinted, reused, or distributed without the express written consent of Global Knowledge.

Вам также может понравиться