About Vsphere Networking
About Vsphere Networking
About Vsphere Networking
Introduction to Networking
The basic concepts of ESXi networking and how to set up and configure a network in a vSphere environment are discussed. Subtopics Networking Concepts Overview Network Services View Networking Information in the vSphere Client View Network Adapter Information in the vSphere Client
3/11/13
also referred to as uplink adapters, to join virtual networks with physical networks. This type of connection is similar to connecting physical switches together to create a larger network. Even though a vSphere standard switch works much like a physical switch, it does not have some of the advanced functionality of a physical switch. A vSphere distributed switch acts as a single switch across all associated hosts on a datacenter. This allows virtual machines to maintain consistent network configuration as they migrate across multiple hosts. A distributed port is a port on a vSphere distributed switch that connects to a hosts VMkernel or to a virtual machines network adapter. A port group specifies port configuration options such as bandwidth limitations and VLAN tagging policies for each member port. Network services connect to standard switches through port groups. Port groups define how a connection is made through the switch to the network. Typically, a single standard switch is associated with one or more port groups. A distributed port group is a port group associated with a vSphere distributed switch and specifies port configuration options for each member port. Distributed port groups define how a connection is made through the vSphere distributed switch to the network. NIC teaming occurs when multiple uplink adapters are associated with a single switch to form a team. A team can either share the load of traffic between physical and virtual networks among some or all of its members, or provide passive failover in the event of a hardware failure or a network outage. VLANs enable a single physical LAN segment to be further segmented so that groups of ports are isolated from one another as if they were on physically different segments. The standard is 802.1Q. The VMkernel TCP/IP networking stack supports iSCSI, NFS, vMotion, and Fault Tolerance Logging. Virtual machines run their own systems TCP/IP stacks and connect to the VMkernel at the Ethernet level through standard and distributed switches. IP storage refers to any form of storage that uses TCP/IP network communication as its foundation. iSCSI can be used as a virtual machine datastore, and NFS can be used as a virtual machine datastore and for direct mounting of . S files, which are presented as CD-ROMs to virtual machines. IO TCP Segmentation Offload, TSO, allows a TCP/IP stack to emit large frames (up to 64KB) even though the maximum transmission unit (MTU) of the interface is smaller. The network adapter then separates the large frame into MTU-sized frames and prepends an adjusted copy of the initial TCP/IP headers. Migration with vMotion enables a virtual machine that is powered on to be transferred from one ESXi host to another without shutting down the virtual machine. The optional vMotion feature requires its own license key.
Network Services
A virtual network provides several different services to the host and virtual machines. You can to enable two types of network services in ESXi: Connecting virtual machines to the physical network and to each other. Connecting VMkernel services (such as NFS, iSCSI, or vMotion) to the physical network.
3/11/13
The vSphere Client shows general networking information and information specific to network adapters. Procedure 1 2 3 Log in to the vSphere Client and select the host from the inventory panel. Click the Configuration tab and click Networking. (Optional) Choose the type of networking to view. Option vSphere Standard Switch De s c r iption Displays vSphere standard switch networking on the host.
The vSphere Distributed Switch option appears only on hosts that are connected to one or more vSphere distributed switches. Networking information is displayed for each virtual switch on the host.
The network adapters panel shows the following information. Network Adapter Parameters Option Device De s c r iption Name of the network adapter.
Speed
Configured
Switch
vSphere standard switch or vSphere distributed switch that the network adapter is associated with.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/78
3/11/13
Observed IP ranges
Subtopics vSphere Standard Switches Standard Port Groups Port Group Configuration for Virtual Machines VMkernel Networking Configuration vSphere Standard Switch Properties
3/11/13
Each port group is identified by a network label, which is unique to the current host. Network labels are used to make virtual machine configuration portable across hosts. All port groups in a datacenter that are physically connected to the same network (in the sense that each can receive broadcasts from the others) are given the same label. Conversely, if two port groups cannot receive broadcasts from each other, they have distinct labels. A VLAN ID, which restricts port group traffic to a logical Ethernet segment within the physical network, is optional. For a port group to reach port groups located on other VLANs, the VLAN ID must be set to 4095. If you use VLAN IDs, you must change the port group labels and VLAN IDs together so that the labels properly represent connectivity.
3/11/13
3/11/13
vMotion. IP storage refers to any form of storage that uses TCP/IP network ESXi. Because these storage types are network based, they can use the same VMkernel interface and port group. Subtopics TCP/IP Stack at the VMkernel Level Set Up VMkernel Networking on a vSphere Standard Switch View VMkernel Routing Information on a vSphere Standard Switch
If you have two or more physical NICs for iSCSI, you can create multiple paths for the software iSCSI by configuring iSCSI Multipathing. For more information about iSCSI Multipathing, see the vSphere Storage documentation.
No t e
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
5 6
Select VMkernel and click Next. Select the vSphere standard switch to use, or select Create a vSphere standard switch to create a new vSphere standard switch.
Select the check boxes for the network adapters for your vSphere standard switch to use. Select adapters for each vSphere standard switch so that virtual machines or other services that connect through the adapter can reach the correct Ethernet segment. If no adapters appear under Create a new vSphere standard switch, all the network adapters in the system are being used by existing vSphere standard switches or vSphere distributed switches. You can either create a vSphere standard switch without a network adapter, or select a network adapter that an existing vSphere standard switch uses.
8 9
Click Next. Select or enter a network label and a VLAN ID. Option De s c r iption
Network A name that identifies the port group that you are creating. This is the label that you specify Label when you configure VMkernel services such as vMotion and IP storage and you configure a virtual adapter to be attached to this port group.
VLAN ID
Identifies the VLAN that the port groups network traffic will use.
10
(Optional) Select Use this port group for vMotion to enable this port group to advertise itself to another host as the network connection through which vMotion traffic should be sent. (Optional) Select Use this port group for fault tolerance logging. (Optional) Select Use this port group for management traffic. If IPv6 is enabled on the host, select IP (Default), IPv6, or IP and IPv6 networking. This option does not appear on hosts that do not have IPv6 enabled. IPv6 configuration cannot be used with dependent hardware iSCSI adapters.
11 12 13
14 15
Obtain IP Use DHCP to obtain IP settings. settings automatically Use the following IP settings Specify IP settings manually. a b Enter the IP address and subnet mask for the VMkernel interface. Click Edit to set the VMkernel Default Gateway for VMkernel services, such as vMotion, NAS, and iSCSI. On the DNS Configuration tab, the name of the host is entered by default. The DNS
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 8/78
3/11/13
server addresses that were specified during installation are also preselected, as is the domain. c 16 Click OK and click Next.
If you are using IPv6 for the VMkernel interface, select an option for obtaining IPv6 addresses. Option Obtain IPv6 addresses automatically through DHCP De s c r iption Use DHCP to obtain IPv6 addresses.
a b c
Click Add to add a new IPv6 address. Enter the IPv6 address and subnet prefix length, and click OK. To change the VMkernel default gateway, click Edit.
17 18
Click Next. Review the information, click Back to change any entries, and click Finish.
A routing table that includes network, prefix, and gateway information for the selected VMkernel network adapter appears.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
9/78
3/11/13
What to do next Changes will not take effect until the system is restarted.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
click Edit. 6 To select the connection speed manually, select the speed and duplex from the drop-down menu. Choose the connection speed manually if the NIC and a physical switch might fail to negotiate the proper connection speed. Symptoms of mismatched speed and duplex include low bandwidth or no link connectivity. The adapter and the physical switch port it is connected to must be set to the same value, such as auto and auto or ND and ND, where ND is some speed and duplex, but not auto and ND. 7 Click OK.
Standby Adapters
Adapters that become active if one or more of the active adapters fails.
8 9
Click Next. Review the information on the Adapter Summary page, click Back to change any entries, and click Finish. The list of network adapters reappears, showing the adapters that the standard switch now claims.
10
Click Close to exit the dialog box. The Networking section in the Configuration tab shows the network adapters in their designated order and categories.
3/11/13
With vSphere distributed switches you can set up and configure networking in a vSphere environment. Subtopics vSphere Distributed Switch Architecture Configuring a vSphere Distributed Switch Distributed Port Groups Working with Distributed Ports Private VLANs Configuring vSphere Distributed Switch Network Adapters Configuring Virtual Machine Networking on a vSphere Distributed Switch
Like a vSphere standard switch, each vSphere distributed switch is a network hub that virtual machines can use. A distributed switch can forward traffic internally between virtual machines or link to an external network by connecting to physical Ethernet adapters, also known as uplink adapters. Each distributed switch can also have one or more distributed port groups assigned to it. Distributed port groups group multiple ports under a common configuration and provide a stable anchor point for virtual machines connecting to labeled networks. Each distributed port group is identified by a network label, which is unique to the current datacenter. A VLAN ID, which restricts port group traffic to a logical Ethernet segment within the physical network, is optional. Network resource pools allow you to manage network traffic by type of network traffic.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 12/78
3/11/13
In addition to vSphere distributed switches, vSphere 5 also provides support for third-party virtual switches. For information about configuring the Cisco Nexus 1000v switch, go to http://www.cisco.com/go/1000vdocs .
Compatible with ESX/ESXi version 4.1 and later. Features released with later vSphere distributed switch versions are not supported.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
13/78
3/11/13
4 5 6
Click Next. In the Name text box, type a name for the new vSphere distributed switch. Use the arrow buttons to select the Number of uplink ports, and click Next. Uplink ports connect the distributed switch to physical NICs on associated hosts. The number of uplink ports is the maximum number of allowed physical connections to the distributed switch per host.
Select whether to add hosts and their physical adapters to the vSphere distributed switch now or later. If you select Add now, select the hosts and physical adapters to use by clicking the check box next to each host or adapter. You can only free physical adapters to a vSphere distributed switch during distributed switch creation.
(Optional) Set the maximum number of ports on a host. a b c Click View Details for the host. Select the maximum number of ports for the host from the drop-down menu. Click OK.
9 10
Click Next. (Optional) Select whether to Automatically create a default port group. This option creates a distributed port group with default settings.
11
Click Finish.
What to do next If you chose to add hosts later, you must add hosts to the distributed switch before adding network adapters. Network adapters can be added from the host configuration page of the vSphere Client, using Manage Hosts, or by using Host Profiles.
Moving a physical adapter to a distributed switch without moving any associated virtual adapters can cause
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 14/78
3/11/13
those virtual adapters to lose network connectivity. 5 For each virtual adapter, select Destination port group and select a port group from the drop-down menu to migrate the virtual adapter to the distributed switch or select Do not migrate. (Optional) Set the maximum number of ports on a host. a b c 7 8 Click View Details for the host. Select the maximum number of ports for the host from the drop-down menu. Click OK.
Click Next. (Optional) Migrate virtual machine networking to the distributed switch. a b Select Migrate virtual machine networking. For each virtual machine, select Destination port group and select a port group from the drop-down menu or select Do not migrate.
9 10 11
Click Next. (Optional) If you need to make any changes, click Back to the appropriate screen. Review the settings for the distributed switch and click Finish.
6 7
Click Next. (Optional) If you need to make any changes, click Back to the appropriate screen. Review the settings for the distributed switch, and click Finish.
15/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
What to do next If you are changing the maximum number of ports for a host after the host is added to the distributed switch, you must restart the host before the new maximum takes effect.
Notes
(Optional) Edit uplink port names. a b c Click Edit uplink names. Type new names for one or more uplink ports. Click OK.
16/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Click OK.
Maximum Maximum MTU size for the vSphere distributed switch. MTU
Discovery Choose the status for discovery protocol on the vSphere distributed switch. Protocol Enabled. Enabled discovery protocol for the vSphere distributed switch. Status a Select Cisco Discovery Protocol or Link Layer Discovery Protocol from the Type drop-down menu. b Admin Contact Info Set Operation to Listen, Advertise, or Both.
Disabled.
Enter the Name and Other Details for the vSphere distributed switch administrator.
Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
This tab is read-only. Distributed switch network adapters must be configured at the host level. 4 Click OK.
Click Next. The upgrade wizard lists the hosts associated with this vSphere distributed switch and whether or not they are compatible with the upgraded vSphere distributed switch version. You can proceed with the upgrade only if all hosts are compatible with the new vSphere distributed switch version. Next to each incompatible host is the reason for the incompatibility.
6 7
Click Next. Verify that the upgrade information listed is correct and click Finish.
3/11/13
Edit General Distributed Port Group Settings Edit Advanced Distributed Port Group Settings
VLAN
Private VLAN
Select a private VLAN entry. If you did not create any private VLANs, this menu is empty.
5 6
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Number of Ports
Port binding
Choose when ports are assigned to virtual machines connected to this distributed port group. Select Static binding to assign a port to a virtual machine when the virtual machine connects to the distributed port group. This option is not available when the vSphere Client is connected directly to ESXi. Select Dynamic binding to assign a port to a virtual machine the first time the virtual machine powers on after it is connected to the distributed port group. Dynamic binding is depricated in ESXi 5.0. Select Ephemeral for no port binding. This option is not available when the vSphere Client is connected directly to ESXi.
Click OK.
When a distributed port is disconnected from a virtual machine, the configuration of the distributed port is reset to the distributed port group setting. Any per-port overrides are discarded.
Click OK.
20/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
The table on the Ports tab for the distributed switch now displays runtime statistics for each distributed port, including broadcast, multicast, and unicast ingress and egress traffic and packets. The State column displays the current state for each distributed port. Distributed Port States Sta te Link Up De s c r iption The link for this distributed port is up.
Link Down
Blocked
--
3/11/13
You can change general distributed port settings such as the port name and description. Procedure 1 2 3 4 5 6 Log in to the vSphere Client and select the Networking inventory view. Select the vSphere distributed switch in the inventory pane. On the Ports tab, right-click the port to modify and select Edit Settings. Click General. Modify the port name and description. Click OK.
Private VLANs
Private VLANs are used to solve VLAN ID limitations and waste of IP addresses for certain network setups. A private VLAN is identified by its primary VLAN ID. A primary VLAN ID can have multiple secondary VLAN IDs associated with it. Primary VLANs are Promiscuous, so that ports on a private VLAN can communicate with ports configured as the primary VLAN. Ports on a secondary VLAN can be either Isolated, communicating only with promiscuous ports, or Community, communicating with both promiscuous ports and other ports on the same secondary VLAN. To use private VLANs between a host and the rest of the physical network, the physical switch connected to the host needs to be private VLAN-capable and configured with the VLAN IDs being used by ESXi for the private VLAN functionality. For physical switches using dynamic MAC+VLAN ID based learning, all corresponding private VLAN IDs must be first entered into the switch's VLAN database. To configure distributed ports to use Private VLAN functionality, you must create the necessary Private VLANs on the vSphere distributed switch to which the distributed ports are connected. Subtopics Create a Private VLAN Remove a Primary Private VLAN Remove a Secondary Private VLAN
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Click anywhere in the dialog box, and then select the primary private VLAN that you just added. The primary private VLAN you added appears under Secondary Private VLAN ID.
For each new secondary private VLAN, click [Enter a Private VLAN ID here] under Secondary Private VLAN ID, and enter the number of the secondary private VLAN. Click anywhere in the dialog box, select the secondary private VLAN that you just added, and select either Isolated or Community for the port type. Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
23/78
3/11/13
3/11/13
You can remove an uplink, or physical network adapter, from a vSphere distributed switch. Procedure 1 Log in to the vSphere Client and select the host from the inventory panel. The hardware configuration page for this server appears. 2 3 4 5 6 Click the Configuration tab and click Networking. Select the vSphere Distributed Switch view. Click Manage Physical Adapters. Click Remove to remove the uplink from the vSphere distributed switch. Click OK.
3/11/13
Select port
Type the port ID of the distributed port for the virtual network adapter to connect to.
10
Select Use this virtual adapter for vMotion to enable this port group to advertise itself to another ESXi host as the network connection where vMotion traffic is sent. You can enable this property for only one vMotion and IP storage port group for each host. If this property is not enabled for any port group, migration with vMotion to this host is not possible.
11 12 13
Choose whether to Use this virtual adapter for fault tolerance logging. Choose whether to Use this virtual adapter for management traffic, and click Next. Under IP Settings, specify the IP address and subnet mask. IPv6 cannot be used with a dependent hardware iSCSI adapter.
14 15
Click Edit to set the VMkernel default gateway for VMkernel services, such as vMotion, NAS, and iSCSI. On the DNS Configuration tab, the name of the host is entered by default. The DNS server addresses and domain that were specified during installation are also preselected. On the Routing tab, enter gateway information for the VMkernel. A gateway is needed for connectivity to machines not on the same IP subnet as the VMkernel. Static IP settings is the default. Do not use routing with software iSCSI Multipathing configurations or
16
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
26/78
3/11/13
dependent hardware iSCSI adapters. 17 18 Click OK, and then click Next. Click Finish.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
27/78
3/11/13
3/11/13
1 2 3 4 5
Log in to the vSphere Client and select the Hosts and Clusters inventory view. Select the host in the inventory pane. On the host Configuration tab, click Networking. In the vSphere Distributed Switch view, click Manage Virtual Adapters. Select the VMkernel adapter to view, and click View Routing Table under IP Settings or IPv6 Settings.
A routing table that includes network, prefix, and gateway information for the selected VMkernel adapter appears.
3/11/13
network. Procedure 1 2 Log in to the vSphere Client and select the Networking inventory view. Right-click the datacenter and select Migrate Virtual Machine Networking. The Migrate Virtual Machine Networking wizard appears. 3 Select a Source Network to migrate adapters from. Option Include all virtual machine network adapters that are connected to the following network (Filter by Network) De s c r iption Migrates virtual machine network adapters from a particular network. Select the source network from the Network drop-down menu.
Include all virtual machine network adapters that are connected to the following network (Filter by VDS)
Migrates virtual machine network adapters from a network on a particular vSphere distributed switch. To migrate from a network, select Switch and Network from the drop-down menus.
Include all virtual machine network adapters that are not connected to any network
Migrates virtual machine network adapters that are not connected to any network.
Filter by Migrates virtual machine network adapters to a particular network. Select the destination Network network from the Network drop-down menu.
Filter by VDS
Migrates virtual machine network adapters to a network on a particular vSphere Distritubed Switch. To migrate to a network, select Switch and Network from the drop-down menus.
5 6 7 8
Click Next. (Optional) Highlight a virtual machine or adapter to view their details. Select the virtual machines and adapters to migrate to the destination network and click Next. Verify that the source network, destination network, and number of virtual machines to migrate are correct and click OK.
3/11/13
configuration. Procedure 1 2 3 4 Log in to the vSphere Client and select the virtual machine from the inventory panel. On the Summary tab, click Edit Settings. On the Hardware tab, select the virtual network adapter. Select the distributed port group to migrate to from the Network Label drop-down menu, and click OK.
No t e
The iSCSI traffic resource pool shares do not apply to iSCSI traffic on a dependent hardware iSCSI adapter.
The host limit of a network resource pool is the upper limit of bandwidth that the network resource pool can use.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 31/78
3/11/13
Assigning a QoS priority tag to a network resource pool applies an 802.1p tag to all outgoing packets associated with that network resource pool. Enable Network I/O Control on a vSphere Distributed Switch Enable network resource management to use network resource pools to prioritize network traffic by type. Create a Network Resource Pool Create user-defined network resource pools for customized network resource management. Add or Remove Distributed Port Groups from a Network Resource Pool Add a distributed port group to a user-defined network resource pool to include in the network resource pool all virtual machine network traffic from that distributed port group. Edit Network Resource Pool Settings You can change network resource pool settings such as allocated shares and limits for each network resource pool to change the priority network traffic for that network resource pool is given. Delete a Network Resource Pool You can delete user-defined network resource pools that are no longer in use.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
5 6
(Optional) Type a Description for the network resource pool. Select the Physical adapter shares for the network resource pool. Option Custom De s c r iption Type a specific number of shares, from 1 to 100, for this network resource pool.
High
Normal
Low
7 8 9
Set the Host limit for the network resource pool in megabits per second or select Unlimited. (Optional) Select the QoS priority tag for the network resource pool. Click OK.
The new resource pool appears on the Resource Allocation tab under User-defined network resource pools. What to do next Add one or more distributed port groups to the network resource pool.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
High
Normal
Low
5 6
Set the Host limit for the network resource pool in megabits per second or select Unlimited. (Optional) Select the QoS priority tag from the drop-down menu. The QoS priority tag specifies an IEEE 802.1p tag, allowing quality of service at the media access control level
Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
2 3
Select the vSphere distributed switch in the inventory pane. On the Resource Allocation tab, right-click the user-defined network resource pool to delete, and select Delete. Click Yes.
Enabling TSO
To enable TSO at the virtual machine level, you must replace the existing vmxnet or flexible virtual network adapters with enhanced vmxnet virtual network adapters. This replacement might result in a change in the MAC address of the virtual network adapter. TSO support through the enhanced vmxnet network adapter is available for virtual machines that run the following guest operating systems: Microsoft Windows 2003 Enterprise Edition with Service Pack 2 (32 bit and 64 bit) Red Hat Enterprise Linux 4 (64 bit) Red Hat Enterprise Linux 5 (32 bit and 64 bit) SUSE Linux Enterprise Server 10 (32 bit and 64 bit)
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
35/78
3/11/13
4 5 6 7 8 9 10 11
Record the network settings and MAC address that the network adapter is using. Click Remove to remove the network adapter from the virtual machine. Click Add. Select Ethernet Adapter and click Next. In the Adapter Type group, select Enhanced vmxnet. Select the network setting and MAC address that the old network adapter was using and click Next. Click Finish and then click OK. If the virtual machine is not set to upgrade VMware Tools at each power on, you must upgrade VMware Tools manually.
TSO is enabled on a VMkernel interface. If TSO becomes disabled for a particular VMkernel interface, the only way to enable TSO is to delete that VMkernel interface and recreate it with TSO enabled.
3/11/13
Enable a vSphere distributed switch for jumbo frames by changing the MTU size for that distributed switch. Procedure 1 2 3 4 Log in to the vSphere Client and select the Networking inventory view. Right-click the vSphere distributed switch in the inventory pane, and select Edit Settings. On the Properties tab, select Advanced. Set the Maximum MTU to the largest MTU size among all the virtual network adapters connected to the vSphere distributed switch, and click OK.
15
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
37/78
3/11/13
NetQueue takes advantage of the ability of some network adapters to deliver network traffic to the system in multiple receive queues that can be processed separately, allowing processing to be scaled to multiple CPUs, improving receive-side networking performance. Subtopics Enable NetQueue on a Host Disable NetQueue on a Host
2 3
DirectPath I/O
DirectPath I/O allows virtual machine access to physical PCI functions on platforms with an I/O Memory Management Unit.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 38/78
3/11/13
The following features are unavailable for virtual machines configured with DirectPath: Hot adding and removing of virtual devices Suspend and resume Record and replay Fault tolerance High availability DRS (limited availability. The virtual machine can be part of a cluster, but cannot migrate across hosts) Snapshots
The following features are only available for virtual machines configured with DirectPath I/O on Cisco Unified Computing Systems (UCS) through Cisco Virtual Machine Fabric Extender (VM-FEX) distributed switches. vMotion Hot adding and removing of virtual devices Suspend and resume High availability DRS Snapshots
See Cisco VM-FEX documentation for details on supported switches and switch configuration information. Configure Passthrough Devices on a Host You can configure passthrough networking devices on a host. Configure a PCI Device on a Virtual Machine You can configure a passthrough PCI device on a virtual machine. Enable DirectPath I/O with vMotion on a Virtual Machine You can enable DirectPath I/O with vMotion for virtual machines in a datacenter on a Cisco UCS system that has at least one supported Cisco UCS Virtual Machine Fabric Extender (VM-FEX) distributed switch.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Adding a DirectPath device to a virtual machine sets memory reservation to the memory size of the virtual machine.
Procedure 1 2 3 4 5 6 7 Log in to the vSphere Client and select the VMs and Templates inventory view. Right-click the virtual machine to modify and click Edit Settings. On the Resources tab, select Memory. Select Unlimited. On the Hardware tab, select the network adapter to configure as a passthrough device. Select a port profile with high performance enabled from the network label drop-down menu, and click OK. Power on the virtual machine. After the virtual machine is powered on, DirectPath I/O appears as Active on the Hardware tab of the virtual machine properties dialog box.
Networking Policies
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 40/78
3/11/13
Policies set at the standard switch or distributed port group level apply to all of the port groups on the standard switch or to ports in the distributed port group. The exceptions are the configuration options that are overridden at the standard port group or distributed port level. Subtopics Load Balancing and Failover Policy VLAN Policy Security Policy Traffic Shaping Policy Resource Allocation Policy Monitoring Policy Port Blocking Policies Manage Policies for Multiple Port Groups on a vSphere Distributed Switch
No t e
Incoming traffic is controlled by the load balancing policy on the physical switch.
Failover Detection controls the link status and beacon probing. Beaconing is not supported with guest VLAN tagging. Network Adapter Order can be active or standby.
Subtopics Edit Failover and Load Balancing Policy for a vSphere Standard Switch Edit the Failover and Load Balancing Policy on a Standard Port Group Edit the Teaming and Failover Policy on a Distributed Port Group Edit Distributed Port Teaming and Failover Policies
Edit Failover and Load Balancing Policy for a vSphere Standard Switch
Use Load Balancing and Failover policies to determine how network traffic is distributed between adapters and how to reroute traffic in the event of an adapter failure.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 41/78
3/11/13
The Failover and Load Balancing policies include the following parameters: Load Balancing policy: The Load Balancing policy determines how outgoing traffic is distributed among the network adapters assigned to a standard switch. Incoming traffic is controlled by the Load Balancing policy on the physical switch. Failover Detection: Link Status/Beacon Probing Network Adapter Order (Active/Standby)
In some cases, you might lose standard switch connectivity when a failover or failback event occurs. This causes the MAC addresses used by virtual machines associated with that standard switch to appear on a different switch port than they previously did. To avoid this problem, put your physical switch in portfast or portfast trunk mode. Procedure 1 Log in to the vSphere Client and select the server from the inventory panel. The hardware configuration page for this server appears. 2 3 4 5 6 Click the Configuration tab and click Networking. Select a standard switch and click Edit. Click the Ports tab. To edit the Failover and Load Balancing values, select the standard switch item and click Properties. Click the NIC Teaming tab. You can override the failover order at the port group level. By default, new adapters are active for all policies. New adapters carry traffic for the standard switch and its port group unless you specify otherwise. 7 In the Load Balancing list, select an option for how to select an uplink. Option Route based on the originating port ID De s c r iption Select an uplink based on the virtual port where the traffic entered the standard switch.
Route based on ip Select an uplink based on a hash of the source and destination IP addresses of hash each packet. For non-IP packets, whatever is at those offsets is used to compute the hash.
Route based on Select an uplink based on a hash of the source Ethernet. source MAC hash
Always use the highest order uplink from the list of Active adapters that passes failover detection criteria.
In the Network failover detection list, select the option to use for failover detection. Option De s c r iption
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
42/78
3/11/13
Relies solely on the link status that the network adapter provides. This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning tree or misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch.
Beacon Sends out and listens for beacon probes on all NICs in the team and uses this information, in Probing addition to link status, to determine link failure. This option detects many of the failures mentioned above that are not detected by link status alone.
No t e
Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the standard switch or whenever that virtual NICs traffic is routed over a different physical NIC in the team because of a failover event, a notification is sent over the network to update the lookup tables on the physical switches. In almost all cases, this is desirable for the lowest latency of failover occurrences and migrations with vMotion. Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing (NLB) in unicast mode. No such issue exists with NLB running in multicast mode.
10
Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes, the adapter is returned to active duty immediately on recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another active adapter fails, requiring its replacement.
11
Set Failover Order to specify how to distribute the work load for adapters. To use some adapters but reserve others for emergencies, you can set this condition using the drop-down menu to place them into groups. Option Active Adapters De s c r iption Continue to use the adapter when the network adapter connectivity is available and active.
Standby Adapters
Unused Adapters
If you are using iSCSI Multipathing, your VMkernel interface must be configured to have one active adapter and no standby adapters. See the vSphere Storage documentation.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
43/78
3/11/13
No t e
Edit the Failover and Load Balancing Policy on a Standard Port Group
Failover and load balancing policies allow you to determine how network traffic is distributed between adapters and how to re-route traffic in the event of an adapter failure. Procedure 1 2 3 4 5 Log in to the vSphere Client and select the host from the inventory panel. Click the Configuration tab and click Networking. Select a port group and click Edit. In the Properties dialog box, click the Ports tab. To edit the Failover and Load Balancing values for the port group, select the port group and click Properties. Click the NIC Teaming tab. You can override the failover order at the port-group level. By default, new adapters are active for all policies. New adapters carry traffic for the standard switch and its port group unless you specify otherwise. 7 Specify the settings in the Policy Exceptions group. Option De s c r iption
Load Specify how to choose an uplink. Balancing Route based on the originating port ID. Choose an uplink based on the virtual port where the traffic entered the virtual switch. Route based on ip hash. Choose an uplink based on a hash of the source and destination IP addresses of each packet. For non-IP packets, whatever is at those offsets is used to compute the hash. Route based on source MAC hash. Choose an uplink based on a hash of the source Ethernet. Use explicit failover order. Always use the highest order uplink from the list of Active adapters which passes failover detection criteria.
No t e
IP-based teaming requires that the physical switch be configured with etherchannel. For all other options, etherchannel should be disabled.
Network Failover
Specify the method to use for failover detection. Link Status only. Relies solely on the link status that the network adapter provides.
44/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Detection
This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning tree or that is misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch. Beacon Probing. Sends out and listens for beacon probes on all NICs in the team and uses this information, in addition to link status, to determine link failure. This detects many of the failures previously mentioned that are not detected by link status alone.
Notify Switches
Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the standard switch or whenever that virtual NICs traffic would be routed over a different physical NIC in the team because of a failover event, a notification is sent out over the network to update the lookup tables on physical switches. In almost all cases, this process is desirable for the lowest latency of failover occurrences and migrations with vMotion.
No t e
Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing in unicast mode. No such issue exists with NLB running in multicast mode.
Failback
Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes (default), the adapter is returned to active duty immediately upon recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another currently active adapter fails, requiring its replacement.
Failover Order
Specify how to distribute the work load for uplinks. If you want to use some uplinks but reserve others for emergencies in case the uplinks in use fail, set this condition by moving them into different groups: Active Uplinks. Continue to use the uplink when the network adapter connectivity is up and active. Standby Uplinks. Use this uplink if one of the active adapters connectivity is down. Unused Uplinks. Do not use this uplink.
Click OK.
3/11/13
Procedure 1 2 3 4 Log in to the vSphere Client and select the Networking inventory view. Right-click the distributed port group in the inventory pane, and select Edit Settings. Select Policies. In the Teaming and Failover group specify the following. Option De s c r iption
Load Specify how to choose an uplink. Balancing Route based on the originating virtual port Choose an uplink based on the virtual port where the traffic entered the distributed switch. Route based on ip hash Choose an uplink based on a hash of the source and destination IP addresses of each packet. For non-IP packets, whatever is at those offsets is used to compute the hash. Route based on source MAC hash Choose an uplink based on a hash of the source Ethernet. Route based on physical NIC load Choose an uplink based on the current loads of physical NICs. Use explicit failover order Always use the highest order uplink from the list of Active adapters which passes failover detection criteria.
No t e
IP-based teaming requires that the physical switch be configured with etherchannel. For all other options, etherchannel should be disabled.
Network Specify the method to use for failover detection. Failover Link Status only Relies solely on the link status that the network adapter provides. Detection This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning tree or that is misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch. Beacon Probing Sends out and listens for beacon probes on all NICs in the team and uses this information, in addition to link status, to determine link failure. This detects many of the failures previously mentioned that are not detected by link status alone.
No t e
Notify Switches
Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the distributed switch or whenever that virtual NICs traffic would be routed over a different physical NIC in the team because of a
46/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
failover event, a notification is sent out over the network to update the lookup tables on physical switches. In almost all cases, this process is desirable for the lowest latency of failover occurrences and migrations with vMotion.
No t e
Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing in unicast mode. No such issue exists with NLB running in multicast mode.
Failback
Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes (default), the adapter is returned to active duty immediately upon recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another currently active adapter fails, requiring its replacement.
Failover Order
Specify how to distribute the work load for uplinks. If you want to use some uplinks but reserve others for emergencies in case the uplinks in use fail, set this condition by moving them into different groups: Active Uplinks Continue to use the uplink when the network adapter connectivity is up and active. Standby Uplinks Use this uplink if one of the active adapters connectivity is down. Unused Uplinks Do not use this uplink.
No t e
Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
47/78
3/11/13
Option
De s c r iption
Load Specify how to choose an uplink. Balancing Route based on the originating virtual port Choose an uplink based on the virtual port where the traffic entered the vSphere distributed switch. Route based on ip hash Choose an uplink based on a hash of the source and destination IP addresses of each packet. For non-IP packets, whatever is at those offsets is used to compute the hash. Route based on source MAC hash Choose an uplink based on a hash of the source Ethernet. Route based on physical NIC load Choose an uplink based on the current loads of physical NICs. Use explicit failover order Always use the highest order uplink from the list of Active adapters which passes failover detection criteria.
No t e
IP-based teaming requires that the physical switch be configured with etherchannel. For all other options, etherchannel should be disabled.
Specify the method to use for failover detection. Link Status only Relies solely on the link status that the network adapter provides. This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning tree or that is misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch. Beacon Probing Sends out and listens for beacon probes on all NICs in the team and uses this information, in addition to link status, to determine link failure. This detects many of the failures previously mentioned that are not detected by link status alone.
No t e
Notify Switches
Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the vSphere distributed switch or whenever that virtual NICs traffic would be routed over a different physical NIC in the team because of a failover event, a notification is sent out over the network to update the lookup tables on physical switches. In almost all cases, this process is desirable for the lowest latency of failover occurrences and migrations with vMotion.
No t e
Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing in unicast mode. No such issue exists with NLB running in
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 48/78
3/11/13
multicast mode.
Failback
Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes (default), the adapter is returned to active duty immediately upon recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another currently active adapter fails, requiring its replacement.
Failover Order
Specify how to distribute the work load for uplinks. If you want to use some uplinks but reserve others for emergencies in case the uplinks in use fail, set this condition by moving them into different groups: Active Uplinks Continue to use the uplink when the network adapter connectivity is up and active. Standby Uplinks Use this uplink if one of the active adapters connectivity is down.
No t e
When using IP-hash load balancing, do not configure standby uplinks. 6 Click OK. Unused Uplinks Do not use this uplink.
VLAN Policy
The VLAN policy allows virtual networks to join physical VLANs. Subtopics Edit the VLAN Policy on a Distributed Port Group Edit Distributed Port or Uplink Port VLAN Policies
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Option None
VLAN
VLAN Trunking
Private VLAN
Click OK.
VLAN
VLAN Trunking
Private VLAN
Click OK.
Security Policy
Networking security policies determine how the adapter filters inbound and outbound frames.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 50/78
3/11/13
Layer 2 is the Data Link Layer. The three elements of the security policy are promiscuous mode, MAC address changes, and forged transmits. In nonpromiscuous mode, a guest adapter listens only to traffic forwarded to own MAC address. In promiscuous mode, it can listen to all the frames. By default, guest adapters are set to nonpromiscuous mode. Subtopics Edit Security Policy for a vSphere Standard Switch Edit the Layer 2 Security Policy Exception for a Standard Port Group Edit the Security Policy for a Distributed Port Group Edit Distributed Port Security Policies
Promiscuous Mode
MAC Address
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Changes
the . m configuration file, all inbound frames are dropped. vx If the Guest OS changes the MAC address back to match the MAC address in the . m configuration file, inbound frames are passed again. vx Accept Changing the MAC address from the Guest OS has the intended effect: frames to the new MAC address are received. Reject Any outbound frame with a source MAC address that is different from the one currently set on the adapter are dropped. Accept No filtering is performed and all outbound frames are passed.
Forged Transmits
Click OK.
Edit the Layer 2 Security Policy Exception for a Standard Port Group
Control how inbound and outbound frames are handled by editing Layer 2 Security policies. Procedure 1 2 3 4 5 6 7 Log in to the vSphere Client and select the Hosts and Clusters inventory view. Select the host in the inventory pane. On the host Configuration tab, click Networking. Choose the vSphere Standard Switch view and click Properties for the port group to edit. In the Properties dialog box, click the Ports tab. Select the port group item and click Edit. In the Properties dialog box for the port group, click the Security tab. By default, Promiscuous Mode is set to Reject. MAC Address Changes and Forged Transmits are set to Accept. The policy exception overrides any policy set at the standard switch level. 8 In the Policy Exceptions pane, select whether to reject or accept the security policy exceptions. Policy Exceptions Mode Promiscuous Mode Re je c t Placing a guest adapter in promiscuous mode has no effect on which frames are received by the adapter. Ac c e pt Placing a guest adapter in promiscuous mode causes it to detect all frames passed on the standard switch that are allowed under the VLAN policy for the port group that the adapter is connected to.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
52/78
3/11/13
If the guest OS changes the MAC address of the adapter to anything other than what is in the . m configuration file, all vx inbound frames are dropped. If the guest OS changes the MAC address back to match the MAC address in the . m vx configuration file, inbound frames are sent again.
If the MAC address from the guest OS changes, frames to the new MAC address are received.
Forged Transmits
Outbound frames with a source No filtering is performed, and all MAC address that is different from outbound frames are passed. the one set on the adapter are dropped.
Click OK.
Promiscuous Mode
MAC
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Address Changes
system changes the MAC address of the adapter to anything other than what is in the . m configuration file, all inbound frames are dropped. vx If the Guest OS changes the MAC address back to match the MAC address in the . m configuration file, inbound frames are passed again. vx Accept Changing the MAC address from the Guest OS has the intended effect: frames to the new MAC address are received. Reject Any outbound frame with a source MAC address that is different from the one currently set on the adapter are dropped. Accept No filtering is performed and all outbound frames are passed.
Forged Transmits
Click OK.
Promiscuous Mode
3/11/13
Accept Changing the MAC address from the Guest OS has the intended effect: frames to the new MAC address are received. Reject Any outbound frame with a source MAC address that is different from the one currently set on the adapter are dropped. Accept No filtering is performed and all outbound frames are passed.
Forged Transmits
Click OK.
Subtopics Edit the Traffic Shaping Policy for a vSphere Standard Switch Edit the Traffic Shaping Policy for a Standard Port Group Edit the Traffic Shaping Policy for a Distributed Port Group Edit Distributed Port or Uplink Port Traffic Shaping Policies
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
55/78
3/11/13
Establishes the number of bits per second to allow across a port, averaged over timethe allowed average load. The maximum number of bytes to allow in a burst. If this parameter is set, a port may gain a burst bonus when it doesnt use all its allocated bandwidth. Whenever the port needs more bandwidth than specified by Average Bandwidth, it may be allowed to temporarily transmit data at a higher speed if a burst bonus is available. This parameter tops the number of bytes that may be accumulated in the burst bonus and thus transferred at a higher speed. The maximum number of bits per second to allow across a port when it is sending a burst of traffic. This tops the bandwidth used by a port whenever it is using its burst bonus. This parameter can never be smaller than the average bandwidth.
Peak Bandwidth
Procedure 1 2 3 4 5 6 7 Log in to the vSphere Client and select the server from the inventory panel. Click the Configuration tab and click Networking. Select a standard switch and click Properties. Click the Ports tab. Select the standard switch and click Edit. Click the Traffic Shaping tab. Select Enabled from the Status drop-down menu to enable traffic shaping policy exceptions. The Status policy here is applied to each virtual adapter attached to the port group, not to the standard switch as a whole. If you enable the policy exception in the Status field, you set limits on the amount of networking bandwidth allocation for each virtual adapter associated with this particular port group. If you disable the policy, services have a clear connection to the physical network by default. 8 For each traffic shaping policy, enter a bandwidth value.
3/11/13
Option Status
De s c r iption If you enable the policy exception in the Status field, you are setting limits on the amount of networking bandwidth allocated for each virtual adapter associated with this particular port group. If you disable the policy, services have a free and clear connection to the physical network.
Peak Limits the maximum bandwidth during a burst. It can never be smaller than the average Bandwidth bandwidth.
Burst Size
Average Establishes the number of bits per second to allow across a port, averaged over timethe Bandwidth allowed average load.
Peak
The maximum number of bits per second to allow across a port when it is sending/receiving
57/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Bandwidth a burst of traffic. This tops the bandwidth used by a port whenever it is using its burst bonus.
Burst Size
The maximum number of bytes to allow in a burst. If this parameter is set, a port may gain a burst bonus when it doesnt use all its allocated bandwidth. Whenever the port needs more bandwidth than specified by Average Bandwidth, it may be allowed to temporarily transmit data at a higher speed if a burst bonus is available. This parameter tops the number of bytes that may be accumulated in the burst bonus and thus transferred at a higher speed.
Click OK.
Click OK.
58/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Monitoring Policy
The monitoring policy enables or disables NetFlow monitoring on a distributed port or port group. NetFlow settings are configured at the vSphere distributed switch level. See Configure NetFlow Settings . Subtopics Edit the Monitoring Policy on a Distributed Port Group Edit the Monitoring Policy on a Distributed Port
Enabled
NetFlow is enabled on the distributed port group. You can configure NetFlow settings at the vSphere distributed switch level. See Configure NetFlow Settings .
Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
3 4 5
On the Ports tab, right-click the port to modify and select Edit Settings. Select Policies. In the Monitoring group, select NetFlow status. Option De s c r iption
Enabled
NetFlow is enabled on the port. You can configure NetFlow settings at the distributed switch level. See Configure NetFlow Settings .
Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
2 3 4 5 6
Select the vSphere distributed switch in the inventory pane. On the Ports tab, right-click the port to modify and select Edit Settings. Click Policies. In the Miscellaneous group, select whether to Block this port. Click OK.
Traffic Shaping
Set the average bandwidth, peak bandwidth, and burst size for inbound and outband traffic on the selected port groups.
VLAN
Set load balancing, failover detection, switch notification, and failover order for the selected port groups.
Resource Allocation
Set network resource pool association for the selected port groups. This option is available for vSphere distributed switch versions 5.0.0 and later only.
Monitoring
Enable or disable NetFlow on the selected port groups. This option is available for vSphere distributed switch versions 5.0.0 and later only.
Click Next.
62/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Select one or more port groups to modify and click Next. The policy configuration page appears. Only the policy categories you previously selected are displayed.
(Optional) In the Security group, select whether to reject or accept the Security policy exceptions. Option De s c r iption Reject Placing a guest adapter in promiscuous mode has no effect on which frames are received by the adapter. Accept Placing a guest adapter in promiscuous mode causes it to detect all frames passed on the vSphere distributed switch that are allowed under the VLAN policy for the port group that the adapter is connected to. Reject If you set the MAC Address Changes to Reject and the guest operating system changes the MAC address of the adapter to anything other than what is in the . m configuration file, all inbound frames are dropped. vx If the Guest OS changes the MAC address back to match the MAC address in the . m configuration file, inbound frames are passed again. vx Accept Changing the MAC address from the Guest OS has the intended effect: frames to the new MAC address are received. Reject Any outbound frame with a source MAC address that is different from the one currently set on the adapter are dropped. Accept No filtering is performed and all outbound frames are passed.
Promiscuous Mode
Forged Transmits
(Optional) In the Traffic Shaping group, you can configure both Ingress Traffic Shaping and Egress Traffic Shaping. When traffic shaping is disabled, the tunable features are dimmed. Status If you enable the policy exception for either Ingress Traffic Shaping or Egress Traffic Shaping in the Status field, you are setting limits on the amount of networking bandwidth allocated for each distributed port associated with the selected port groups. If you disable the policy, the amount of network bandwidth is not limited before it reaches the physical network .
Average Establishes the number of bits per second to allow across a port, averaged over timethe Bandwidth allowed average load.
Peak The maximum number of bits per second to allow across a port when it is sending/receiving Bandwidth a burst of traffic. This tops the bandwidth used by a port whenever it is using its burst bonus.
Burst Size
The maximum number of bytes to allow in a burst. If this parameter is set, a port may gain a burst bonus when it doesnt use all its allocated bandwidth. Whenever the port needs more
63/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
bandwidth than specified by Average Bandwidth, it may be allowed to temporarily transmit data at a higher speed if a burst bonus is available. This parameter tops the number of bytes that may be accumulated in the burst bonus and thus transferred at a higher speed.
(Optional) Select the VLAN Type to use. Option None De s c r iption Do not use VLAN.
VLAN
VLAN Trunking
Private VLAN
10
(Optional) In the Teaming and Failover group specify the following. Option De s c r iption
Load Specify how to choose an uplink. Balancing Route based on the originating virtual port Choose an uplink based on the virtual port where the traffic entered the distributed switch. Route based on ip hash Choose an uplink based on a hash of the source and destination IP addresses of each packet. For non-IP packets, whatever is at those offsets is used to compute the hash. Route based on source MAC hash Choose an uplink based on a hash of the source Ethernet. Route based on physical NIC load Choose an uplink based on the current loads of physical NICs. Use explicit failover order Always use the highest order uplink from the list of Active adapters which passes failover detection criteria.
No t e
IP-based teaming requires that the physical switch be configured with etherchannel. For all other options, etherchannel should be disabled.
Network Specify the method to use for failover detection. Failover Link Status only Relies solely on the link status that the network adapter provides. Detection This option detects failures, such as cable pulls and physical switch power failures, but not configuration errors, such as a physical switch port being blocked by spanning
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 64/78
3/11/13
tree or that is misconfigured to the wrong VLAN or cable pulls on the other side of a physical switch. Beacon Probing Sends out and listens for beacon probes on all NICs in the team and uses this information, in addition to link status, to determine link failure. This detects many of the failures previously mentioned that are not detected by link status alone.
No t e
Notify Switches
Select Yes or No to notify switches in the case of failover. If you select Yes, whenever a virtual NIC is connected to the distributed switch or whenever that virtual NICs traffic would be routed over a different physical NIC in the team because of a failover event, a notification is sent out over the network to update the lookup tables on physical switches. In almost all cases, this process is desirable for the lowest latency of failover occurrences and migrations with vMotion.
No t e
Do not use this option when the virtual machines using the port group are using Microsoft Network Load Balancing in unicast mode. No such issue exists with NLB running in multicast mode.
Failback
Select Yes or No to disable or enable failback. This option determines how a physical adapter is returned to active duty after recovering from a failure. If failback is set to Yes (default), the adapter is returned to active duty immediately upon recovery, displacing the standby adapter that took over its slot, if any. If failback is set to No, a failed adapter is left inactive even after recovery until another currently active adapter fails, requiring its replacement.
Failover Order
Specify how to distribute the work load for uplinks. If you want to use some uplinks but reserve others for emergencies in case the uplinks in use fail, set this condition by moving them into different groups: Active Uplinks Continue to use the uplink when the network adapter connectivity is up and active. Standby Uplinks Use this uplink if one of the active adapters connectivity is down. Unused Uplinks Do not use this uplink.
No t e
11
(Optional) In the Resource Allocation group, choose the Network Resource Pool to associate the distributed port group with from the drop-down menu.
65/78
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
12
(Optional) In the Monitoring group, choose the NetFlow status. Option De s c r iption
Enabled
NetFlow is enabled on the distributed port group. NetFlow settings can be configured at the vSphere distributed switch level.
13 14
(Optional) In the Miscellaneous group, choose whether to Block all ports in this distributed port group. Click Next. All displayed policies are applied to all selected port groups, inculding those policies that have not been changed.
15 16
(Optional) If you need to make any changes, click Back to the appropriate screen. Review the port group settings and click Finish.
Advanced Networking
Advanced networking configuration options allow you greater control over your vSphere networking environment. Subtopics Enable Internet Protocol Version 6 Support VLAN Configuration Working With Port Mirroring Configure NetFlow Settings Switch Discovery Protocol Change the DNS and Routing Configuration MAC Addresses Mounting NFS Volumes
3/11/13
IPv6 is disabled by default. Prerequisites Required privilege: Host.Configuration.Network Configuration Procedure 1 2 3 4 5 6 From the vSphere Client Home page, click Hosts and Clusters. Select the host and click the Configuration tab. Click the Networking link under Hardware. In the vSphere Standard Switch view, click the Properties link. Select Enable IPv6 support on this host and click OK. Reboot the host.
VLAN Configuration
Virtual LANs (VLANs) enable a single physical LAN segment to be further segmented so that groups of ports are isolated from one another as if they were on physically different segments. Configuring ESXi with VLANs is recommended for the following reasons. It integrates the host into a pre-existing environment. It secures network traffic. It reduces network traffic congestion. iSCSI traffic requires an isolated network.
You can configure VLANs in ESXi using three methods: External Switch Tagging (EST), Virtual Switch Tagging (VST), and Virtual Guest Tagging (VGT). With EST, all VLAN tagging of packets is performed on the physical switch. Host network adapters are connected to access ports on the physical switch. Port groups that are connected to the virtual switch must have their VLAN ID set to 0. With VST, all VLAN tagging of packets is performed by the virtual switch before leaving the host. Host network adapters must be connected to trunk ports on the physical switch. Port groups that are connected to the virtual switch must have an appropriate VLAN ID specified. With VGT, all VLAN tagging is performed by the virtual machine. VLAN tags are preserved between the virtual machine networking stack and external switch when frames are passed to and from virtual switches. Physical switch ports are set to trunk port.
No t e
When using VGT, you must have an 802.1Q VLAN trunking driver installed on the virtual machine.
3/11/13
Port mirroring allows you to mirror a distributed port's traffic to other distributed ports or specific physical switch ports. Subtopics Create a Port Mirroring Session View Port Mirroring Session Details Edit Port Mirroring Name and Session Details Edit Port Mirroring Sources Edit Port Mirroring Destinations
3/11/13
(Optional) Select Encapsulation VLAN to create a VLAN ID that encapsulates all frames at the destination ports. If the original frames have a VLAN and Preserve original VLAN is not selected, the encapsulation VLAN replaces the original VLAN.
(Optional) Select Preserve original VLAN to keep the original VLAN in an inner tag so mirrored frames are double encapsulated. This option is available only if you select Encapsulation VLAN.
(Optional) Select Mirrored packet length to put a limit on the size of mirrored frames. If this option is selected, all mirrored frames are truncated to the specified length.
Click Next.
Previous topic: Specify Port Mirroring Name and Session Details Next topic: Choose Port Mirroring Destinations
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Uplink
Select one or more uplinks to use as a destination for the port mirroring session.
2 3 4
Click >> to add the selected destinations to the port mirroring session. (Optional) Repeat the above steps to add multiple destinations. Click Next.
Previous topic: Choose Port Mirroring Sources Next topic: Verify New Port Mirroring Settings
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
70/78
3/11/13
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
Separate multiple IDs with commas. 7 (Optional) Select a source in the right-hand list and click << to remove the source from the port mirroring session. Click OK.
Uplink
Select one or more uplinks to use as a destination for the port mirroring session.
(Optional) Type one or more port IDs or ranges of port IDs to add as a destination for the port mirroring session and click >>. Separate multiple IDs with commas.
(Optional) Select a destination from the right-hand column and click << to remove the destination from the port mirroring session. Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
3/11/13
2 3 4 5
Right-click the vSphere distributed switch in the inventory pane, and select Edit Settings. Navigate to the NetFlow tab. Type the IP address and Port of the NetFlow collector. Type the VDS IP address. With an IP address to the vSphere distributed switch, the NetFlow collector can interact with the vSphere distributed switch as a single switch, rather than interacting with a separate, unrelated switch for each associated host.
(Optional) Use the up and down menu arrows to set the Active flow export timeout and Idle flow export timeout. (Optional) Use the up and down menu arrows to set the Sampling rate. The sampling rate determines what portion of data NetFlow collects, with the sampling rate number determining how often NetFlow collects the packets. A collector with a sampling rate of 2 collects data from every other packet. A collector with a sampling rate of 5 collects data from every fifth packet.
(Optional) Select Process internal flows only to collect data only on network activity between virtual machines on the same host. Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
73/78
3/11/13
Procedure 1 2 3 4 5 6 Log in to the vSphere Client and select the Networking inventory view. Right-click the vSphere distributed switch in the inventory pane, and select Edit Settings. On the Properties tab, select Advanced. Select Enabled from the Status drop-down menu. Select Cisco Discovery Protocol from the Type drop-down menu. Select the CDP mode from the Operation drop-down menu. Option Listen De s c r iption ESXi detects and displays information about the associated Cisco switch port, but information about the vSphere distributed switch is not available to the Cisco switch administrator.
Advertise ESXi makes information about the vSphere distributed switch available to the Cisco switch administrator, but does not detect and display information about the Cisco switch.
Both
ESXi detects and displays information about the associated Cisco switch and makes information about the vSphere distributed switch available to the Cisco switch administrator.
Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
74/78
3/11/13
Listen
ESXi detects and displays information about the associated physical switch port, but information about the vSphere distributed switch is not available to the switch administrator.
Advertise ESXi makes information about the vSphere distributed switch available to the switch administrator, but does not detect and display information about the physical switch.
Both
ESXi detects and displays information about the associated physical switch and makes information about the vSphere distributed switch available to the switch administrator.
Click OK.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
75/78
3/11/13
MAC Addresses
MAC addresses are generated for virtual network adapters that virtual machines and network services use. In most cases, the generated MAC addresses are appropriate. However, you might need to set a MAC address for a virtual network adapter, as in the following cases: Virtual network adapters on different physical hosts share the same subnet and are assigned the same MAC address, causing a conflict. To ensure that a virtual network adapter always has the same MAC address.
To circumvent the limit of 256 virtual network adapters per physical machine and possible MAC address conflicts between virtual machines, system administrators can manually assign MAC addresses. By default, VMware uses the Organizationally Unique Identifier (OUI) 00:50:56 for manually generated addresses, but all unique manually generated addresses are supported. You can set the addresses by adding the following line to a virtual machines configuration file:
ehrenme.drsTp=sai" tentubradesye"ttc
Because ESXi virtual machines do not support arbitrary MAC addresses, you must use the above format. As long as you choose a unique value for X : Y Z among your hard-coded addresses, conflicts between the XY:Z automatically assigned MAC addresses and the manually assigned ones should never occur. Subtopics MAC Address Generation Set Up a MAC Address
The first three bytes of the MAC address that is generated for each virtual network adapter consists of the OUI. The MAC address-generation algorithm produces the other three bytes. The algorithm guarantees unique MAC
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html 76/78
3/11/13
addresses within a machine and attempts to provide unique MAC addresses across machines. The network adapters for each virtual machine on the same subnet should have unique MAC addresses. Otherwise, they can behave unpredictably. The algorithm puts a limit on the number of running and suspended virtual machines at any one time on any given host. It also does not handle all cases when virtual machines on distinct physical machines share a subnet. The VMware Universally Unique Identifier (UUID) generates MAC addresses that are checked for conflicts. The generated MAC addresses are created by using three parts: the VMware OUI, the SMBIOS UUID for the physical ESXi machine, and a hash based on the name of the entity that the MAC address is being generated for. After the MAC address has been generated, it does not change unless the virtual machine is moved to a different location, for example, to a different path on the same server. The MAC address in the configuration file of the virtual machine is saved. All MAC addresses that have been assigned to network adapters of running and suspended virtual machines on a given physical machine are tracked. The MAC address of a powered off virtual machine is not checked against those of running or suspended virtual machines. It is possible that when a virtual machine is powered on again, it can acquire a different MAC address. This acquisition is caused by a conflict with a virtual machine that was powered on when this virtual machine was powered off.
3/11/13
Consider these best practices when you configure your network. Separate network services from one another to achieve greater security and better performance. Put a set of virtual machines on a separate physical NIC. This separation allows for a portion of the total networking workload to be shared evenly across multiple CPUs. The isolated virtual machines can then better serve traffic from a Web client, for example Keep the vMotion connection on a separate network devoted to vMotion. When migration with vMotion occurs, the contents of the guest operating systems memory is transmitted over the network. You can do this either by using VLANs to segment a single physical network or by using separate physical networks (the latter is preferable). When using passthrough devices with a Linux kernel version 2.6.20 or earlier, avoid MSI and MSI-X modes because these modes have significant performance impact. To physically separate network services and to dedicate a particular set of NICs to a specific network service, create a vSphere standard switch or vSphere distributed switch for each service. If this is not possible, separate network services on a single switch by attaching them to port groups with different VLAN IDs. In either case, confirm with your network administrator that the networks or VLANs you choose are isolated in the rest of your environment and that no routers connect them. You can add and remove network adapters from a standard or distributed switch without affecting the virtual machines or the network service that is running behind that switch. If you remove all the running hardware, the virtual machines can still communicate among themselves. If you leave one network adapter intact, all the virtual machines can still connect with the physical network. To protect your most sensitive virtual machines, deploy firewalls in virtual machines that route between virtual networks with uplinks to physical networks and pure virtual networks with no uplinks. For best performance, use vmxnet3 virtual NICs. Every physical network adapter connected to the same vSphere standard switch or vSphere distributed switch should also be connected to the same physical network. Configure all VMkernel network adapters to the same MTU. When several VMkernel network adapters are connected to vSphere distributed switches but have different MTUs configured, you might experience network connectivity problems.
pubs.vmware.com/vsphere-50/advanced/print.jsp?topic=/com.vmware.vsphere.networking.doc_50/GUID-35B40B0B-0C13-43B2-BC85-18C9C91BE2D4.html
78/78