Scenario 8-network Access Group in a Shared uplink set-ethernet and FCoE san-win2008r2
Introduced:
Network Access Group (NAG): A post-VC3.30 version enhancement that sets the VLAN Group according to the application or security boundary
Create an SUS, define the VLANs attached to the different applications, create the NAG to contain the VLANs, create the server profile, and assign the server profile to a different nag, which will limit the server Profiles are connected to the NAG network belonging to their external network.
In the following installation and configuration, we will first create 2 SUS a/a modes, followed by creating vlan-trunk-1 and vlan-trunk-2 for the entire network in two VC FlexFabric module, and then we will create 3 nag, Defined as Web-tier (allow only vlan2100-vlan2105 through), App-tier (allow only vlan2200-vlan2205 to pass), Db-tier (only allow vlan2300-vlan305 to pass), This method is used to access host hosts in different application environments respectively. Finally, we created 3 server profiles to give 3 hosts, corresponding access to different nag, to view various information to ensure that the configuration to achieve the pre-set purpose.
The configuration emphasis in each step is circled with a red rectangle, and some of the annotated text needs extra attention!
Demand:
Physical view
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 1 "border= "0" alt= "1" src= "http://img1.51cto.com/attachment/201410/21/718756_1413856693R0ei.jpg" height= "411"/>
Logical View-WEB-0001
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 2 "border= "0" alt= "2" src= "http://img1.51cto.com/attachment/201410/21/718756_1413856707Yle1.jpg" height= "432"/>
Logical View-APP-0001
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 3 "border= "0" alt= "3" src= "http://img1.51cto.com/attachment/201410/21/718756_1413856730Uuua.jpg" height= "409"/>
Logical View-DB-0001
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 4 "border= "0" alt= "4" src= "http://img1.51cto.com/attachment/201410/21/718756_1413856740c59k.jpg" height= "416"/>
Installation and Configuration
Configuring the VC Module
Switch_a_port_1 Connection bay1_x5
Switch_a_port_2 Connection bay1_x6
Switch_b_port_1 Connection bay1_x5
Switch_b_port_2 Connection bay2_x6
Define a new shared uplink Set (vlan-trunk-1)
Vlan-trunk-1
Module1 (X5, X6)
Multiple Networks
Name: vlan-
Suffix: 1
Range: 101-105, 2100-2400,
Enable Smart Link
Speed Limit (4GB-8GB)
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 5 "border= "0" alt= "5" src= "Http://img1.51cto.com/attachment/201410/21/718756_1413856748fzZw.jpg" height= "249"/>
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 6 "border= "0" alt= "6" src= "http://img1.51cto.com/attachment/201410/21/718756_1413856753DeD5.jpg" height= "284"/>
Define a new shared uplink Set (vlan-trunk-2 copy the first SUS to modify)
Vlan-trunk-2
Module2 (X5, X6)
Multiple Networks
Name: vlan-
Suffix: 2
Range: 101-105, 2100-2400,
Enable Smart Link
Speed Limit (4GB-8GB)
After two SUS configurations, a list of views. 650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 7 "border= "0" alt= "7" src= "Http://img1.51cto.com/attachment/201410/21/718756_1413856758f6ld.jpg" height= "175"/>
Define Network Access Group (web-tier)
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 8 "border= "0" alt= "8" src= "http://img1.51cto.com/attachment/201410/21/718756_1413856764LQPS.jpg" height= "347"/>
Define Network Access Group (app-tier)
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" 9 "border= "0" alt= "9" src= "http://img1.51cto.com/attachment/201410/21/718756_1413856774297k.jpg" height= "362"/>
Define Network Access Group (db-tier)
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "one" src= "http://img1.51cto.com/attachment/201410/21/718756_1413856793gMmE.jpg" height= "357"/>
After you define 3 network Access Group, you have a list of views.
650) this.width=650, "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" border = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_1413856803YlNV.jpg "height=" 336 "/>
Create the server profile WEB-0001 and assign this configuration to Bay11 host.
Note: The red callout is the configuration content
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_1413856809t07j.jpg "height=" 204 "/>
View BAY11 Host Network connection mapping information
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_1413856852lJDS.jpg "height=" 427 "/>
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_1413856858GCiR.jpg "height=" 306 "/>
Create the server profile APP-0001 and assign this configuration to BAY10 host.
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_1413856869M2EA.jpg "height=" 205 "/>
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; "title=" border = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_14138568903LpH.jpg "height="/>
Create the server profile DB-0001 and assign this configuration to Bay9 host.
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_141385689751rK.jpg "height=" 232 "/>
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_1413856907CxKA.jpg "height=" 348 "/>
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_1413856913bmzJ.jpg "height="/>
3 Summary of Server profile content
650) this.width=650; "style=" border-bottom:0px;border-left:0px;border-top:0px;border-right:0px; title= "Border" = "0" alt= "src=" http://img1.51cto.com/attachment/201410/21/718756_1413856924frng.jpg "height=" "/>"
Summarize:
In this section we created 2 SUS to support multiple VLAN data communication, one SUS per VC flexfabric module, two SUS for VC domain redundancy, 2 uplink ports per SUS, So we need to configure LACP to improve uplink performance. In this section
There are uplink all active.
We defined the use of network access Groups, (WEB, APP, DB Tier), while assigning the network to these group. 3 server profiles were created, each profile has two 10Gb ports, each profile belongs to a special nag, and, based on the NAG member properties, we can access the servers to only those VLANs that belong to them.
The VC network can be configured with one or more nags. This configuration provides the ability for all servers to access management, VMotion, Backup, Fcoe-san networks, and then differentiate between various server functions into different network groups.
San connection content is not configured in this section.
The end of this article, the series has not been continued ...
This article is from the "Dragon Kiss" blog, make sure to keep this source http://728756.blog.51cto.com/718756/1566170
Scenario 8-hp Virtual Connect flexfabricnag in a Shared uplink set-ethernet and FCoE SAN