Need for Speed
This blog contains brief coverage about some Nexus 9K and optics-related items that might be of interest.
The N93240YC-FX2 switch is the N93180YC switch’s new relative. The difference is 12 rather than 6 x 40/100 Gbps uplink (etc.) ports. Both have 48 x 1/10/25 Gbps access ports.
Whether you’re doing classic VPC or spine and leaf topology, this gives you room to handle a few more access switch pairs, which is quite useful when the data center consists of a small number of racks.
Have you read the Cisco 100 Gbps QSFP Modules document yet? Well, that and checked pricing?
Some of the 100 Gbps options are relatively inexpensive.
I was recently exploring 2-10 km options as far as 40 and 100 Gbps, as the next logical step beyond 10 Gbps.
Another thing: if you’ve been assuming twinax is only for 10 Gbps, think again. So, if you’re doing VPC cross-links, or doing leaf to spine (access to core) uplinks in a small number of racks, the 100 Gbps copper or “active optical” options cost not much more than 10 Gbps twinax used to.
Conclusion: Building a 100 Gbps fabric in your data center may be far more affordable than you thought, particularly for smaller fabrics!
I’d recently been noticing that doing VPC ties up a lot of the 40/100 Gbps ports on various Nexus 9K switches. Apparently, Cisco did too!
The new alternative is “VPC with Fabric Peering”. It’s for MLAG in a VXLAN / EVPN fabric. The fabric carries the CFS messages in place of the VPC peer link!
And yes, you’ll want a high priority DSCP marking so you don’t lose your VPC communications when there’s congestion.
Follow the above link for more details, and to decide if this feature is for you.
The VXLAN / EVPN Multi-Site Design / Deployment White Paper is some useful and interesting reading! One key point to this approach is scalable VXLAN at multiple sites with some degree of L2 control.
Among other things, that document presents some major use cases. It also has some useful configuration snippets and diagrams, if you’re thinking of building a lab model or deploying this functionality.
One use case that caught my eye recently for two design projects was the pseudo-Border Gateway use case. It is described as providing support for tying legacy data center sites to VXLAN / EVPN sites. It looks like an OTV replacement but isn’t quite presented that way. The new code does support traffic storm-control for VXLAN EVPN.
I do wish any of the storm-control documentation describes whether the “unicast” option caps all unicast or just unknown unicast traffic. I suspect it’s the former — and why would anybody want that? The latter is what I’d like to have. Failure to document clearly means a feature might as well have not been implemented?
One caution: VIRL’s virtual N9K NXOS image does not yet support Multi-Site (as of April 2019).
Second caution: If you’re thinking of building a VIRL model for VXLAN anything, you’d best have a VM with 4+ cores and a lot of RAM, like 80-128 GB or more. The N9K images are large, and when you load VXLAN features, they get even larger.
Comments are welcome, both in agreement or constructive disagreement about the above. I enjoy hearing from readers and carrying on deeper discussion via comments. Thanks in advance!
Hashtags: #CiscoChampion #TechFieldDay #TheNetCraftsmenWay #Switches #DataCenter
Did you know that NetCraftsmen does network /datacenter / security / collaboration design / design review? Or that we have deep UC&C experts on staff, including @ucguerilla? For more information, contact us at firstname.lastname@example.org.
Need for Speed
Container-Based WAN Monitoring
What is NVMe and How Does It Impact My Network?
Nick has over 20 years of experience in Security Operations and Security Sales. He is an avid student of cybersecurity and regularly engages with the Infosec community at events like BSides, RVASec, Derbycon and more. The son of an FBI forensics director, Nick holds a B.S. in Criminal Justice and is one of Cisco’s Fire Jumper Elite members. When he’s not working, he writes cyberpunk and punches aliens on his Playstation.
Virgilio “Bong” has sixteen years of professional experience in IT industry from academe, technical and customer support, pre-sales, post sales, project management, training and enablement. He has worked in Cisco Technical Assistance Center (TAC) as a member of the WAN and LAN Switching team. Bong now works for Tech Data as the Field Solutions Architect with a focus on Cisco Security and holds a few Cisco certifications including Fire Jumper Elite.
John is our CTO and the practice lead for a talented team of consultants focused on designing and delivering scalable and secure infrastructure solutions to customers across multiple industry verticals and technologies. Previously he has held several positions including Executive Director/Chief Architect for Global Network Services at JPMorgan Chase. In that capacity, he led a team managing network architecture and services. Prior to his role at JPMorgan Chase, John was a Distinguished Engineer at Cisco working across a number of verticals including Higher Education, Finance, Retail, Government, and Health Care.
He is an expert in working with groups to identify business needs, and align technology strategies to enable business strategies, building in agility and scalability to allow for future changes. John is experienced in the architecture and design of highly available, secure, network infrastructure and data centers, and has worked on projects worldwide. He has worked in both the business and regulatory environments for the design and deployment of complex IT infrastructures.