Virtual Connect CLI Network Management Guide With Nexus VPC Configuration
Virtual Connect CLI Network Management Guide With Nexus VPC Configuration
Feedback: [email protected]
Page 1
Revision History
Page 2
Table of Contents
• Introduction
• Network Hardware Topology and Virtual Connect Port Numbering
• Virtual Connect Terminology and CLI Summary Table
• Virtual Connect CLI Snapshots
• Troubleshooting Scenario 1: Track Down MAC Address
• Troubleshooting Scenario 2: Display VLAN MAC table
• Appendix #1: vPC Configuration: Nexus5000-1
• Appendix #2: vPC Configuration: Nexus5000-2
• Appendix #3: Configuration: Virtual Connect
• Reference Links
Page 3
Introduction
Page 4
Introduction
• This guide is targeted to network administrators who want to manage Virtual Connect network part
of configuration by CLI. It also demos how to configure Nexus vPC with Virtual Connect.
• Most of Virtual Connect management tasks can be categorized into two parts: Network and Server
Profile. Some customers network team will handle VC network configuration while server team will
handle VC Server Profile configuration. Others may choose to have server admins to own the
configuration for the whole Virtual Connect module.
• Virtual Connect can be managed by GUI or CLI mode. Each mode offers full configuration
functionality.
• Many network admins like to manage VC by CLI and this guide is to help them on this task.
Network configuration can be done by GUI mode as well. Please refer to VC GUI user guide and
other links at the end of this presentation for more GUI configuration information.
• This guide does not cover server profile part of CLI management as many server admins prefer
VC GUI for server configuration. Please refer to VC CLI user guide link at the end of this
presentation on CLI syntax to manage server profile.
Page 5
Network Hardware Topology and
Virtual Connect Port Numbering
Page 6
Network Hardware Topology
VPC
N5K-1 po1000 N5K-2
X1 X2 X2 X1
d1 d1
VC-1 VC-2
Enclosure Internal Connection
LOM:1 LOM:2
X1 X2 X3 X4 X5 X6 X7 X8
Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Note:
• X1-X4: Besides 10G ethernet, these 4 ports can be configured as native Fibre Channel(Note: it’s FC, not
FCOE) on port-by-port basis to connect with SAN switches. Default port mode is ethernet.
• X5-X8: Support 1G or 10G ethernet on port-by-port basis
Page 8
Virtual Connect Flex-10 Module Port Numbering
X1 X1 X2 X3 X4 X5 X6 X7 X8
Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay Bay
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Note:
• X1 is a shared port between SFP+ and CX4 media. You can only use one media at a time.
• X1-X8: These SFP+ 10G ports can also support 1G on port-by-port basis with supported SFPs plugged in.
Page 9
VC Port Numbering Syntax in the VC Domain
d1
Enclosure Internal Connection
Page 11
Virtual Connect/Cisco Terminology Translation
Page 12
Virtual Connect/Cisco CLI Comparison
Cisco Virtual Connect
Show version Show version
Show module Show interconnect
Show device-bay
Show cdp neighbor N/A (VC doesn’t support CDP)
Show lldp neighbor Show lldp
Show interface brief Show uplinkport
Show server-port
System Show spanning-tree N/A (VC doesn’t use STP to communicate with network switches)
Information Show vlan Show network
• If ports are trunk ports • If ports are trunk ports
Show int switchport Show uplinkset <uplinkset name>
Show int trunk
• If ports are access ports
• If ports are access ports Show network <ethernet network name>
Show int switchport
• If ports are in LACP bundle
• If ports are in LACP bundle Show network <ethernet network name>
Show port-channel summary Show uplinkset
Show port-channel database Show uplinkset <uplinkset name>
Show uplinkport <port number>
• Configuring access port • Configuring upstream access port
Vlan <number> Add network <name>
Switchport mode access Add uplinkport <port> network=<name>
Switchport access vlan <number>
• Configuring upstream trunk port
• Configuring trunk port Add uplinkset <name>
Configuration Vlan <number> Add uplinkport <number> uplinkset=<name>
Switchport mode trunk Add network-range
Switchport trunk allowed vlan <number>
• Configuring upstream port-channel
• Configuring port-channel No need to configure manually. Automatically negotiated
Channel group <number> mode
• Note: Downlink server ports mode are configured in Server Profile
Page 13 Int port-channel <number>
Virtual Connect/Cisco CLI Comparison (Continue)
Management Dir bootflash: or flash: N/A (VC manage flash space internally)
Copy tftp flash or install Using HP SUM or VCSU
Copy run ftp/tftp Save configbackup
Page 14
How to Use CLI Online Help
• Virtual Connect CLI offers detailed online help.
• Virtual Connect CLI configuration is one level architecture instead of 3 levels (Exec, Global Config and Interface Config) like
Cisco CLI.
• Configuration is saved automatically after each CLI line.
Page 16 16
CLI Filter Function
• Often in show commands, you want to filter information to something you focus on. VC show commands will have column
name at the top and you can filter by one column or several columns at the same time.
Show
network
Show
network,
Filter by
VLAN ID
Show network,
Filter by VLAN
ID and SUS
name at the
same time
Page 17
Virtual Connect CLI Snapshots
Page 18
Show Version
(Cisco: show version)
VC 3.30 release
Page 19
Show Interconnect
(Cisco: show module)
VC Model Name
Enc0:1 VC in I/O bay 1 Virtual Connect Manager (VCM) status. VCM is VC control
Enc0:2 VC in I/O bay 2 process. For control plane management, only one VC module
is active in a VC domain. A typical VC domain is a pair of VC
Enc0 means local enclosure. In the case of modules inside a HP blade enclosure.
VC stacking, you may see enc1, enc2 or
enc3 for remote enclosures. Both modules can forward user traffic at the same time from
data plane perspective.
Page 20
Show devicebay
(Cisco: show module)
Page 21
Show lldp
(Cisco: show lldp neighbor)
Page 22
Show Uplinkport
(Cisco: show int brief for uplinks)
Which Ethernet
Network or SUS owns
the port. In this case,
it’s SUS “n5k-trunk-a”.
Page 23
Show server-port
(Cisco: show int brief for downlinks)
Server in
device bay 1
VC module port
number for this
server 10G port
First 10G port Enc0:1:d1 means
on this blade local enclosure, VC
server module in I/O bay 1,
the first downlink
port
Page 24
Show network
(Cisco: show vlan)
The network (VLAN) is defined
under the SUS (trunk) “n5k-trunk-
a”
Ethernet
network name
Page 25
Show Uplinkset
(Cisco: sh int trunk, show int switchport, show port-channel summary)
“n5k-trunk-a” is the SUS(trunk) defined for VC module in I/O
Shows the list bay 1 and “n5k-trunk-b” is the SUS(trunk) defined for VC
of all Shared module in I/O bay 2. Both links under each SUS are active.
Uplink Set (SUS) This shows successful LACP bundle negotiation with
defined. upstream switch. Two LAG ID(one for each LACP bundle)
will be generated.
vnets (VLANs)
Page 26 defined under the
trunk
Show network <ethernet network name>
(Cisco: show int switchport for an access port)
Page 27
Add network <name>
Configuring an access port to upstream switch
Page 28
Add uplinkset <name>
Configuring a trunk port to upstream switch
New in VC3.30
Note: In 3.30, “show config” will show the defined network line by line
instead of network-range like what we did here in “add network-range”.
“show config” display will be enhanced in future version.
Page 29
Show statistics
(Cisco: show interface counter)
Page 30
Show statistics-throughput New in VC3.30
(Cisco: show interface traffic throughput counters)
Enc0:2:d1 Local Enclosure, VC module 2, first 10G downlink port, which is connected
to the second 10G motherboard NIC of blade server in device bay 1.
Page 31
Reset statistics
(Cisco: clear counter)
Page 32
Show interconnect-mac-table New in VC3.30
(Cisco: show mac address-table)
For detailed MAC address troubleshooting, please check section Troubleshooting Scenario 1: Track a MAC
address inside Virtual Connect
Page 33
Show interconnect <module>
(Cisco: show proc cpu/mem)
New in VC3.30
The CPU load number here is not a % value like show proc cpu on Cisco platforms. It’s Linux “Load Averages”. A good link
to explain this number is at:
http://blog.scoutapp.com/articles/2009/07/31/understanding-load-averages
For memory utilization, in general as long as free memory is above 10%, users shouldn’t be concerned.
Page 34
Show config New in VC3.30
(Cisco: show run)
Source Port: It’s “Monitor Port” in VC term, enc0:1:d6 means to capture traffic on local enclosure, VC module in I/O bay 1,
10G downlink port 6, which is connected to the first 10G port of server in device bay 6.
Destination Port: It’s “Analyzer Port” in VC term, enc0:1:4 means to send captured server traffic to uplink port 4 on local
enclosure, VC module in I/O bay 2. You can connect a traffic analyzer on this port.
Note: Currently VC only supports server link traffic capture. VC uplink traffic capture needs to be done at network switch side.
Page 36
Show status
(Cisco: Show diagnostics)
Page 37
Show systemlog
(Cisco: show logging)
Page 38
Show all *
(Cisco: Show tech)
Page 39
Save Supportinfo
(Cisco: show tech)
Page 40
Virtual Connect Upgrade Using Virtual Connect Support Utility (VCSU)
10.1.63.2: OA address
-u: OA username
-p: OA password
-vcu: VC username
-vcp: VC password
VC can be upgraded by HP
Smart Update Manager
(SUM) or VCSU.
41
Page 41
Save configbackup
The exported config file is a binary file which you can load it
back to the same enclosure to restore domain config. To
see config in text format, please use “show config”.
Page 42
Troubleshooting Scenario 1:
Page 43
Step 1: Show Interconnect-mac-table New in VC3.30
4
This entry shows
the VC-1 learned 1
the MAC in another First show VC-1 mac table
VLAN (internal matching this address
ID=235) from
internal stack link
(LAG ID=26). For
the server data
forwarding, this
entry won’t be used
by VC-1 as “d1” port
5
is not associated But How about these
with this VLAN. LAG IDs and Internal
IDs? We’ll find out in
the next 2 slides for
full topology
3 Now we know this MAC is learned from d1 port on VC-1 module, 2
this port is mapped to the server motherboard 10G NIC1 (LOM:1)
Then show VC-2 mac table
in bay 1. Vswitch uses the FlexNIC inside LOM:1 as its uplink and
hashed vm1 MAC address to the FlexNIC on server side. That’s
matching this address
the reason the incoming traffic from this MAC comes in d1 port
Page 44
Step 2: Show Network * for VLAN Info
Which VLAN does
Which VLAN does “Internal ID” 235 refer to?
“Internal ID” 233 refer to?
It’s VLAN 400 mapped to vnet (VLAN) It’s VLAN 400 mapped to vnet (VLAN)
vnet-400-a under SUS (trunk) n5k-trunk- vnet-400-b under SUS (trunk) n5k-trunk-
a. We know this SUS is defined in VC-1 b. We know this SUS is defined in VC-2
using X1 and X2 ports. Or you can use using X1 and X2 ports. Or you can use
“show uplinkset <name> to find out this “show uplinkset <name> to find out this
info info
Page 45
Step 3: Show Uplinkport * for Port-Channel Info
Which Port-channel is using
LAG ID 26 in VC-1
Which Port-channel is using
LAG ID 25 in VC-2
N5K vPC
po1 po2
LAG25 LAG26
VC-1 VC-2
LAG26
LAG25
vnet-400-a Internal Stacking Link vnet-400-b
VLAN ID=400, Internal ID=233 Only for VC internal VLAN ID=400, Internal ID=235
heartbeat and config
synch. No user traffic
d1 traversed d1
MAC A vSwitch
00:50:56:12:12:12
vm1 Blade 1
HP BladeSystem Enclosure
Page 47
Network Logical Diagram with CLI Captures
N5K vPC
po1 po2
LAG25 LAG26
LAG25
vnet-400-a Internal Stacking Link vnet-400-b
VLAN ID=400, Internal ID=233 VLAN ID=400, Internal ID=235
Only for VC internal
heartbeat and config
synch. No user traffic
d1 traversed d1
vswitch
vm1 Blade 1
Page 48
HP BladeSystem Enclosure
Troubleshooting Scenario 2:
Page 49
Step 1: Show Network * for Internal ID
Page 50
Step 2: Show Uplinkset to See Where Is the SUS/vnet
Page 51
Step 3: Show Interconnect-mac-table for VLAN MAC
Table
In VC-1, do “show
interconnect-mac-table” for
VLAN 400 (internal id=233)
In VC-2, do “show
interconnect-mac-table” for
VLAN 400 (internal id=235)
Page 52
Nexus5000-1 vPC Configuration and
Show Information
Page 53
N5K-1 vPC Configuration
Best Practice:
Configure STP edge port and enable BPDU Guard feature on
ports connecting with Virtual Connect. VC doesn’t talk STP with
network switch, treat VC uplink ports as server ports.
Page 54
N5K-1 Show vPC
Page 55
N5K-1 Show LLDP and LLCP
Page 56
N5K-1 Show Spanning-tree
Page 58
N5K-2 vPC Configuration
Best Practice:
Configure STP edge port and enable BPDU Guard feature on
ports connecting with Virtual Connect. VC doesn’t talk STP with
network switch, treat VC uplink ports as server ports.
Page 59
N5K-2 Show vPC
Page 60
N5K-2 Show LLDP and LLCP
Page 61
Topology N5K-2
Page 63
Configuration Virtual Connect
Page 64
References
Page 65