1 / 17

A Deep Dive on the vSphere Distributed Switch Jason Nash VCDX #49, vExpert

A Deep Dive on the vSphere Distributed Switch Jason Nash VCDX #49, vExpert Data Center Solutions Principal Varrow. The purpose of this session is to give you a good understanding of the vSphere Distributed Swtich ( vDS )

vivi
Télécharger la présentation

A Deep Dive on the vSphere Distributed Switch Jason Nash VCDX #49, vExpert

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Deep Dive on the vSphere Distributed Switch Jason Nash VCDX #49, vExpert Data Center Solutions Principal Varrow

  2. The purpose of this session is to give you a good understanding of the vSphere Distributed Swtich (vDS) • That includes complexity, features, cost, deployment considerations, and management • My goal is for you to see how this could fit your environment and decide if you want to migrate • This is a very open presentation so feel free to ask questions • What We’ll Cover

  3. Standard vSwitches are not all bad • Easy to understand • Very easy to troubleshoot • Great deal of flexibility • But they are also not all good • No advancement of features • Can become very cumbersome • Quickly Discuss vSwitches

  4. vDS is the second vSwitch included with vSphere • Easier administration for medium and larger environments • Add a Port-Group once and all servers can use it • Provides features that standard vSwitchesdon’t • Network I/O Control (NIOC) • Port mirroring • NetFlow • Private VLANs • Ingress and egress traffic shaping • Not JUST for large environments • Many can take advantage of the advanced features • Why Bother With the vDS?

  5. Right now you have two distributed options (Well, 3 counting the non-existent IBM vSwitch) • vDS (vSphere Distributed Switch) • Cisco Nexus 1000v • With the release of vSphere 5 the vDS now stacks up pretty well to the 1Kv • NetFlow v5 (1Kv is v9) • Port Mirroring (not as flexible as 1Kv) • 802.1p QoS tagging • Though, the 1Kv still has many things going for it • Compared to Others?

  6. The Good • Innovative features such • Network I/O Control (NIOC) • Load-based Teaming • Very low complexity • No external components to deploy or manage • Included in Enterprise Plus licensing • No special hardware (NICs or switches) required • The Bad • Doesn’t include some advanced features of the N1Kv • NetFlow v9 • ACLs • vPath for vWAAS and VSG • Other security features (ARP Inspection, DHCP Snooping, etc) • Requires Enterprise Plus licensing • Let’s Look at the vDS

  7. The vDS architecture has two main components • Management or Control plane – Integrating in to vCenter • I/O or Data plane – Made up of hidden vSwitches on each vSphere host that is part of the vDS • The Control plane is responsible for all configuration and management • The I/O plane handles data flow in and out of each vSphere host • No extra modules or components to install, manage, or upgrade • Terms and Ideas

  8. Controlled and managed by vCenter, so making VC resilient becomes important • Backup that database! • vCenter outage won’t affect general VM operation • Virtual vCenter or Physical vCenter? • Both fully supported just a few things to think about • Couple of ways to physically separate traffic • DMZ or other SSLF (Specialized Security Limited Functionality) environments • NAS or iSCSI traffic • Confirm standard physical switch port config • Make them all the same! • vDS Deployment Considerations

  9. Designing the deployment of your vDS can be simple or a bit more involved • Depends on depth of features you plan to use • Can get a bit more complex if you want to physically separate traffic • Storage on its own set of NICs • DMZ or other network with different security requirements • Suggested to start with basic deployment and then start adding in other features such as NIOC • Design Considerations

  10. A single vDS can only have one uplink configuration This means all pNICs added to the vDS must trunk the same VLANs What if you want to physically separate traffic? Two options: Active/Standby/Unused – In each Port-Group configure Active/Standby/Unused configurations for NICs Multiple vDS Switches – Yes, you can have more than one vDS in a cluster, each with their own uplinks Which you choose depends on which you think is easier to manage Traffic Separation with vDS

  11. vDS Uplink Diagram – Multiple vDS vSphere Host vDS - DMZ vDS - Prod Prod Network DMZ Network

  12. vDS Uplink Table – Single vDS with 1Gb This is a suggested configuration for a server with 8 NICs showing multi-link vMotion and iSCSI

  13. vDS Uplink Table – Single vDS with 10Gb This is a suggested configuration for a server with 2 10Gb NICs. The idea is to balance traffic types across the two NICs.

  14. Let’s get away from slides and in to the lab • In this lab we’ll try and show a full vDS deployment • Create new switch • Configure uplink and main vDS • Create port-groups • Migrate hosts and VMs • Show advanced options • Lab Time!

  15. Use static port binding unless absolutely necessary • Especially if you have a virtual vCenter • Try and let physical switches do tagging and trunk all VLANs • Not a fan of using native VLAN • Recommended to use Load Based Teaming as it is simple and works about anywhere • Best Practice Recommendations

  16. Both dVS options are very flexible and powerful • The vSphere 5 vDS adds a lot of features that close the gap with the 1Kv with reduced complexity and cost • The Nexus 1000v is still king of features, especially with the integration of vWAAS and Virtual Security Gateway • In addition to more complexity and higher financial cost • Consider all variables when deciding which meets your requirements • Let’s Recap

  17. Questions? • My Blog: http://www.jasonnash.com • Twitter is @nash_J • My Email: jason@varrow.com • Louis Watta’sPreso: https://communities.cisco.com/docs/DOC-26204

More Related