Академический Документы
Профессиональный Документы
Культура Документы
BRKVIR-3005
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1
Agenda
Session Prerequisites
Introduction Cisco Nexus 1000V
Useful tool locations
Nexus 1000V Releases
Virtual Supervisor Module (VSM) troubleshooting
Virtual Ethernet Module (VEM) troubleshooting
Port-Profiles
Port Channels and Trunking
HA
Cisco Nexus 1010
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
Session Prerequisites
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Related Presentations
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Prerequisites
Unix CLI
Running commands on ESX Service Console
Cisco NXOS
Understand the CLI general switching concepts
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Cisco Nexus 1000V Introduction
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Cisco Nexus 1000V
VM VM VM VM
VM VM VM VM VM VM VM VM
Port Profiles
WEB Apps Nexus Nexus
1000V 1000V
HR VEM VEM
DB
vSphere vSphere
DMZ
VM Connection Policy
Defined in the network
Applied in Virtual Center
Linked to VM UUID
VM VM VM VM VM VM VM VM
VM VM VM VM
VMs Need to Move
VMotion Nexus Nexus
DRS 1000V 1000V
VEM VEM
SW Upgrade/Patch
Hardware Failure vSphere vSphere
Property Mobility
VMotion for the network
Ensures VM security
Maintains connection state
VM VM VM VM VM VM VM VM
VI Admin Benefits
Maintains existing VM mgmt Nexus Nexus
Reduces deployment time 1000V 1000V
Improves scalability VEM VEM
Reduces operational workload
vSphere vSphere
Enables VM-level visibility
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Locations of ESX Tools
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Nexus 1000V Releases
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Cisco Nexus 1000V Releases
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
1.2 New Features
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Virtual Supervisor Module
Troubleshooting
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Virtual Supervisor Module (VSM)
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
VSM Install
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
VSM Virtual Machine Requirements
3 network interfaces
Adapter 1 is always the Control
interface Must be on the control
VLAN
Adapter 2 is always the
Management interface Used for
VSM connectivity
Adapter 3 is always the Packet
interface Must be on the packet
VLAN
One vCPU
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
VSM Required Interfaces
Management
VSM terminal connectivity
Connecting to VMware vCenter
Backup connectivity for VSM HA
Control
Heartbeat between VSM and VEM
Heartbeat and information passing between Active and Standby VSMs
Packet
Passes CDP information
Used for ERSPAN sessions
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
VSM Control Modes
L2 mode
Default mode
Requires L2 connectivity through Control interface to all VEM
modules
Uses Control Interface of VSM VM
L3 Mode
Uses IP address to communicate with VEM
L3 uses UDP port 4785 for both source and destination
Uses Mgmt or Control interface of VSM VM
VSM mgmt 0 is default interface for L3
Can also use control 0
Ties to control adapter of the VM (Adapter 1)
Control 0 and mgmt 0 must be on different subnets
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
VSM to VMware vCenter Communication
Cisco VSMs
Virtual Center
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
VSM to VMware vCenter Connectivity
VSM registers to vCenter using extension key plug-in
Contains a public SSL Certificate
Extension key of the VSM
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Verify VSM to vCenter Connectivity
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
Connectivity Error Extension Key
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Check Extension Key on VMware MOB
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Connectivity Error Connection Refused
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
VSM to VMware vCenter Connectivity
To change port
n1000v(config)# svs connection vcenter
n1000v(config-svs-conn)# remote port 8080
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
VSM to VMware vCenter Connectivity
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
VSM to VMware vCenter Syncing
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
VSM to VMware vCenter Syncing
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
VSM and vMotion
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Removing Nexus 1000V from vCenter
L2 control is preferred
Management, Control, and Packet can use same
VLAN
Primary and Standby VSM in same L2 domain!!!
VSM on VEM is supported
Backup your config!!!
VMware snapshots and cloning are not supported
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Virtual Ethernet Module
Troubleshooting
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
Topology for VEM Troubleshooting
VM VM VM VM VM VM VM VM VM VM VM VM
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Virtual Ethernet Module (VEM)
Troubleshooting Agenda
VEM installation
VEM patches
VEM removal
VEM does not show up on VSM
VEM useful commands
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
VEM Installation With VUM
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
VEM Installation Manual
ESX - Esxupdate
Download vib file to ESX server via scp/sftp/ftp
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
VEM Manual Installation Issues
Dependency error
[root@cae-esx-180 ~]# esxupdate -b ./cross_cisco-vem-v100-4.0.4.1.1.27-0.4.2-release.vib u
pdate
cross_cisco-vem-v100-4.0.4.1.1.27.. ############################################## [100%]
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
VEM Patches
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Determining ESX Patch Version
Check /proc
root@cae-cali-host6 vmware]# cat /proc/vmware/version |
grep vmkernel
vmkernel build: 193498, vmkcall: 45.0 driver interface: 9.0
kernel: 0.4096
vmkernelID: 0xb1d912ac
vmkernel Version Releasebuild-193498
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Matching a VEM Patch to a VIB Version
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
VEM VIB Versions
4.0.4.1.2.0.80-0.4.179
4.0.4.1.2 = N1KV version (show version)
0.80 = Cisco NXOS build number
0.4 = VEM VIB version
.179 = Cisco VIB build version
VEM hardware version in show module correlates to
VIB version
Mod Sw Hw
--- --------------- ------
2 4.0(4)SV1(2) 0.0
5 4.0(4)SV1(2) 1.9
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
VEM Removal
ESXi
vihostupdate.pl --server 192.168.10.10 --username root -
query
vihostupdate.pl --server 192.168.10.10 --username root -B
VEM400-200906002-BG remove
reboot
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
VEM Seeding
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Checking Opaque Data
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
VEM VSM Connectivity
Troubleshooting
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
VEM VSM Troubleshooting Steps
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Step 1: Useful Commands
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
Useful Commands
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
VSM MAC
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Step 2: VSM vCenter Connectivity
connection MV-testing:
ip address: 172.18.217.241
protocol: vmware-vim https
certificate: default
datacenter name: Harrison
DVS uuid: 34 21 01 50 8e 07 cf 03-77 80 29 55 4f 77 4e 89
config status: Enabled
operational status: Connected
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Step 3: Verify VSM VM Control interface
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Step 4: Verify Uplink Port-Profile
The first ESX interface added to the N1KV must have Control
VLAN
Verify uplink port-profile has Control VLAN defined and
system VLAN
n1000v# show port-profile name uplink
port-profile uplink
description:
status: enabled
capability uplink: yes
capability l3control: no
system vlans:2,10,150-152
port-group: uplink
max-ports: -
inherit:
config attributes:
switchport mode trunk
switchport trunk allowed vlan all
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Step 5: Verify VEM Sees Control VLAN
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Vemcmd show card
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Vemcmd show port
Ports with LTLs 8(l20), 9(l21), 10(l22) are UP and CBL states are 4.
ESX Physical ports are UP and CBL states 4.
[root@cae-cali-host6 ~]# vemcmd show port
LTL IfIndex Vlan Bndl SG_ID Pinned_SGID Type Admin State CBL Mode Name
8 0 3969 0 2 2 VIRT UP UP 4 Access l20
9 0 3969 0 2 2 VIRT UP UP 4 Access l21
10 0 150 0 2 0 VIRT UP UP 4 Access l22
11 0 3968 0 2 2 VIRT UP UP 4 Access l23
12 0 151 0 2 1 VIRT UP UP 4 Access l24
13 0 1 0 2 2 VIRT UP UP 0 Access l25
14 0 3967 0 2 2 VIRT UP UP 4 Access l26
15 1a030000 1 T 303 0 2 PHYS UP UP 4 Trunk vmnic0
16 1a030100 1 T 303 1 2 PHYS UP UP 4 Trunk vmnic1
47 1b030000 10 0 2 0 VIRT UP UP 4 Access vmk0
48 1b030010 10 0 2 0 VIRT UP UP 4 Access vmk1
49 1b030020 2 0 2 1 VIRT UP UP 4 Access vswif0
50 1b030030 152 0 2 1 VIRT UP UP 4 Access linux1.eth0
303 16000002 1 T 0 2 2 VIRT UP UP 4 Trunk
Local Target Logic (LTL) is an index to address a port, or group of ports. Data path lookup
engine takes LTL as input, and gives LTL as output.
LTL scheme: [0-14: internal ports] [15-271: pNICs,VMs, etc]
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Vemcmd show trunk
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Step 6: VEM and VSM
See Each Others MAC
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
VEM and VSM See Each Others MAC
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Step 7: Physical Switch Mac Table
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Step 8: VEM VSM Heartbeat
One Heartbeat per second per VEM to VSM
Timeout for VEM to VSM is 6 seconds of missed
heartbeats
After 6 seconds VSM will drop VEM
When you insert a VEM it is as if you installed a
physical blade
We need to initialize the blade and bring it online in the
switch
On VSM
N1K-VSM# show module vem counters
--------------------------------------------------------------------------------
Mod InNR OutMI InMI OutHBeats InHBeats InAipcMsgs OutTO OutTOC InsCnt RemCnt
--------------------------------------------------------------------------------
3 1 1 1 82243 246554 247526 0 0 1 0
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
View Heartbeat Messages on VEM
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 67
View Heartbeat Messages With L3
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Verifying Modules with vem status
Switch Name Num Ports Used Ports Configured Ports MTU Uplinks
vSwitch0 32 1 32 1500
DVS Name Num Ports Used Ports Configured Ports Uplinks
n1000v-MV 256 13 256 vmnic1,vmnic0
Reboot the ESX host if not all the modules have loaded.
This an ESX bug that prevents VEM from getting all the resources it needs at startup
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Verifying Modules With esxcfg-module
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
VEM Memory Leaks
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
VEM Best Practices
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Port-Profiles
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
Uplink Port-Profile Troubleshooting
Do not add multiple pnics from same ESX host to same uplink port-
profile if no port-channeling is configured
While it may work you will end up with the ESX host receiving duplicate packets and
require extra processing from CPU to deal with this improper configuration
All data can pass over one uplink port-profile carrying all vlans
Documentation makes it seem like an uplink for system and an uplink for VM data is
required
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
VM Port-Profile Troubleshooting
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Cisco Nexus 1000V System VLANs
System VLANs enable interface connectivity before
an interface is programmed
Address chicken and egg issue
VEM needs to be programmed, but it needs a working
network for this to happen
Port profiles that contain system VLANs are system port profiles
Limit of 16 port-profiles with system vlan defined
The system VLAN list must be a subset of the allowed VLAN list on
trunk ports
There must be only one system VLAN on an access port (the access
VLAN)
The no system vlan command can be given only when no interface
is using the profile.
Once a system profile is in use by at least one interface, you can only
add to the list of system VLANs, but not delete any VLANs from the
list.
For a profile with system VLANs, no port-profile SysProfile, no
vmware port-group and no state enabled commands can be given
only when no interface is using that profile
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
System VLAN Example
Migrate VMware Service Console to VEM
SC interface uses VLAN 2
Uplink port-profile must define VLAN 2 as system
n1000v# show run port-profile uplink-pinning
port-profile type ethernet uplink-pinning
vmware port-group
switchport mode trunk
switchport trunk allowed vlan all
channel-group auto mode on mac-pinning
no shutdown
system vlan 2,10,150-151
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
How do I recover?
As of 1.3 you can now set system vlan on LTLs on ESX host
Currently only works for vethernet type LTL
From ESX/ESXi console
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
Port Channels
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
Port Channels
3 load balancing modes
LACP Port-channels require support on physical switch
vPC Host Mode (HM) allows balancing to multiple physical
switches
If more then one connection per physical switch then port-channel is
required
vPC HM MAC pinning (New in 1.2) works with any switch
Preferred Channeling method moving forward
Allows for pinning of veths to specific links.
Can push all control traffic up one link and all VM traffic up the second link
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Port Channels vPC HM
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
Port Channels vPC HM MAC Pinning
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Port Channels How to Tell Pinning
LTL IfIndex Vlan Bndl SG_ID Pinned_SGID Type Admin State CBL Mode Name
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Port Channels Best Practice
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Spanning-tree and BPDU Best
Practice
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
High Availability
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
VSM High Availability (HA)
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
VSM VSM Heartbeat
n1000v-MV# show system internal redundancy info
tx_set_ver_rsp_pkts: 2
status: RDN_ST_AC
tx_heartbeat_req_pkts: 168155
state: RDN_DRV_ST_AC_SB
tx_heartbeat_rsp_pkts: 318
intr: enabled
rx_set_ver_req_pkts: 2
power_off_reqs: 0
rx_set_ver_rsp_pkts: 1
reset_reqs: 1
rx_heartbeat_req_pkts: 318
Other CP:
rx_heartbeat_rsp_pkts: 168148
slot: 1 Standby VSM
rx_drops_wrong_domain: 0
status: RDN_ST_SB
rx_drops_wrong_slot: 0
active: true
rx_drops_short_pkt: 0
ver_rcvd: true
rx_drops_queue_full: 0
degraded_mode: false
rx_drops_inactive_cp: 0
Redun Device 0:
rx_drops_bad_src: 0
name: ha0
rx_drops_not_ready: 0
rx_unknown_pkts: 0
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
VSM Active Standby Connection
Failure Scenarios
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Reference Topology
switch switch
Mgmt
4 Mgmt
VSM1 VSM2
Active Standby
2 Control/Packet 1 Control/Packet
switch 3 switch
2 Control/ 1 Control/
Packet
Exit: (when communication
Packet
restored)
3
No VEM flap
VSM2 resets and comes
back up in HA mode
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 93
Fail Scenario 2
Failed
Interface
#2- VSM1 Effect:
4 Control
Mgmt Mgmt VSM1 drops VEMs.
VSM2 stays as Standby
VSM1 keeps resetting
VSM2 until connectivity is
restored
2 Control/ 1 Control/
Packet Packet
3
Exit:
VSM2 comes back up in
HA mode
VEM Reconnect to VSM1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 94
Fail Scenario 3
Failed
Interface
#3 - Split Effect:
Mgmt
4 Mgmt DVS VSM1 drops VEM3,4.
Otherwise, same as Fail
Scenario 2
VSM1 keeps resetting
VSM2 until connectivity is
2 Control/ 1 Control/ restored
Packet Packet
3 Exit:
VEM3,4 reconnect to
VSM1
VSM2 comes back up in
HA mode
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
Fail Scenario 4
Failed
Interface
#2 & #4 - Effect:
Mgmt
4 Mgmt Split VSM2 becomes Active,
Brain taking over VEM1-4
VSM1 stays active but
drops all VEMs
VSM1 and VSM2 use
2 Control/ 1 Control/ same IP address
Packet Packet
3 Exit:
VSM1 is reset when 1
and 4 are up again
VEMs stay connected to
VSM2
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Fail Scenario 5
Failed
Interface
#1 & #4 Effect:
4 VSM2 becomes Active,
Mgmt Mgmt - Split
Brain but does not see any
VEMs
VSM1 stays active,
handling all VEMs
2 Control/ 1 Control/ VSM1 and VSM2 use
Packet Packet same IP address
3
Exit:
VSM2 resets VSM1 when
2 and 4 are up again
VEM1-4 connect to
VEM1 VEM2 VEM3 VEM4 VSM2
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
Cisco Nexus 1010
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Cisco Nexus 1010
Runs NXOS
Supports 4 VSMs and 1 Virtual NAM
VSMs mgmt must be on same L2 as 1010 mgmt
Troubleshooting VSMs on 1010 is identical to VSM
on ESX/ESXi
All VLANs must be tagged
Native VLAN connectivity will not work with 1010
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Virtual Service Blades (VSB)
-------------------------------------------------------------------------------
Name Role State Nexus1010-Module
-------------------------------------------------------------------------------
VSM-1 PRIMARY VB POWERED OFF Nexus1010-PRIMARY
VSM-1 SECONDARY VB POWERED OFF Nexus1010-SECONDARY
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Virtual Service Blades (VSB)
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Summary
BRKVIR-3005_c1
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 102
Summary
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Complete Your Online
Session Evaluation
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 104
Q&A
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
BRKVIR-3005_c2 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 106