Design of Network\VLAN question

I have a network completely flat and Im not a networking guy, but I have two ESX host, I need to build with a Lefthand SAN

and I want to create a VLAN for vmotion traffic segmentation. Anyone know where I could find instructions to create the VLAN?

I have 6 NETWORK adapters per ESX host and plan on using iSCSI software. I have also dedicated physical switches for my iSCSI traffic.

How you prefer to use the 6-port network card?

Awared points to answers.

Hello

You can assign a VLAN on each port group. VSphere Client, click on ESX / I have server you want to configure > click on the Configuration tab > then click on link networking in the hardware Section. Then click on the properties link in one of the vSwitch > select one port group, and then click on edit. Finally, you can assign a VLAN in the VLAN ID properties.

The best way to use the NIC ports available, I think that there depends on your preferred configuration. For example, what kind of features you need to activate, the requirement for a network for each virtual computer speed, etc. But, basically, I have the same perception with the previous suggestion. You can allocate one or two ports for specific traffic.

Tags: VMware

Similar Questions

  • 4pnics networks VLAN

    Hello

    Well, I am new to vmware.

    I have 2 guests and 4 natachasery by each of them and a hitachi storage 10 hus and a hp procurve 2824.

    When I do a vlan in esx must be the same number in hp switch?

    I would do any other setup in hp except where ports will be to this vlan?

    my scenario is 1 Teddy in vlan 10 vmotion and mgmt, 2 natachasery with iscsi VLANs 20 and the other for VMS vlan 30 / vswitches so 3.

    so I have a thin client and I want to connect with vlan 30 with the thin client vms.my is connected in the hp switch in vlan 30 / when I want to connect in any other t vlan for example I have a vlan 40 with other virtual machines.

    the hp switch automatically routes because it works also in layer 3? is that correct?

    the only thing I have to do is in my virtual machine to the network vlan 40 to add.

    for example when I in a Teddy 3 VLANS configured in vswitch port in the hp switch needs to be referenced, but when I have a vlan in 1 Teddy bear not tagged to the hp switch?

    Yes

    in the routing for gateway what ip I type for the 3 VLAN?

    It is up to you.  You must come up with a model of IP address where all the VLANS are on a different subnet and the IP gateway is part of that subnet.

  • Design - Rack Edge or Edge VLAN question

    I have Cisco UCS and Nexus 7 k gear I design, so I use this design guide:

    https://www.VMware.com/files/PDF/products/NSX/VMware-NSX-on-Cisco-n7kucs-design-guide.PDF

    However, it is not totally clear on how the physical to virtual connections must be deployed.  Looking at this guide (page 11), it seems that 5 VLAN must be shared resources to each host (including the VLAN edge), and it would negate the need for a separate group of edge (or grid).  However, the same guide also speaks of a cluster of mgmt and edge and there is even a diagram (pg 13) that shows what looks like to me a host of edge.  Since both the mgmt, edge and compute clusters all share the same distributed switch, it seems that this design is indicating that there is no need for a separate edge cluster.   Does this sound right to you?

    Then the document proposed the edge VLAN to shared resources for all hosts, the VLAN Edge can simply be ignored and remain stagnant on the hosts of the calculation, thus linking the only living on the edge/edge management cluster VLAN edge elements.  He accomplishes the goal of the cluster Edge.  The edge vs no decision dashboard isn't so much on this VLAN are connected, but more info on how you plan to implement NSX and its components.

    Brad Hedlund did a good job, talking through the design, specific to the N7K decisions, who do not do in the Cisco Design here document and help you decide if needed/wanted a cluster of edge: http://bradhedlund.com/2015/02/06/going-over-the-edge-with-your-vmware-nsx-and-cisco-nexus/

  • Design of network for VMware/iSCSI SAN

    I am currently reshaping our business network to take account of the variation between stand-alone servers and an Equallogic/VMware environment. We will use iSCSI to connect to the virtual machine to the San.

    My question is this. How a proper network design should seek this kind of deployment? I've specified my current hardware less than what I have to work with. Given that I can't pay by port / vlan database MTU value on the 3750/2960 should I dedicate a switch for iSCSI?

    Equipment available:

    Core switch/router:

    WS-C37560G-24TS-1U

    Stacked switches:

    WS-C2960S-48TS-L access switch

    WS-C2960S-48TS-L access switch

    WS-C2960S-48LPS-L voice changer

    WS-C2960S-24TS-L Server switch (dedicated iSCSI Possible)

    Unused stacked switches:

    Dell Powerconnect 6224 x 2 reference

    Servers:

    Reference Dell R710 Quad NIC

    Reference Dell R610 Quad NIC

    Storage:

    EqualLogic PS4100 with two 2 x 1 GbE controllers = 4 GbE for iSCSI

    Best regards

    Markus

    given that the same logic has two controllers that you will have to use a pair of switches to cross connect for redundancy. You are going to need some maps as well. 1 sc, 1 for vmotion, 2 for iscsi (cross connected) and probably 2 for the production traffic.

    Sent by Cisco Support technique iPad App

  • VLANning questions about blades MXL

    Hello

    I have a new M100e with a SAN PS4110xs case, a few servers blade and two switches Force10 MXL (switches and SAN on fabric)

    I put it all in place and works fine, but using the default VLAN for all

    I want to connect the switches to a Juniper EX3300 via SFP ports + and send the subnet SAN out so that I can connect remotely to the IP address of the EqualLogic for VMM integration management

    However, every time I try to put SAN ports in a VLAN separate-, before even that I look into the chutes for the Juniper - I lose all connectivity on the San.

    I created a new VLAN (VLAN120), but as soon as I set the ports inside they cannot ping each other.

    int vlan120

    Tagged te0/1 (this is the port of SAN)

    Tagged te0/12 (it is a single server)

    Tagged te0/16 (that's the other server)

    as soon as I do that I lose all connectivity to the San and server cannot ping each other via the iSCSI network.

    I tried to use 'no label' instead of 'tag' with the same effect.

    The VLAN is active (non-stop)

    I am at a loss for what is the question.

    Any help gratefully received.

    Select this option.

    I understood the question - I got 2 trunk in the Juniper VLAN120 links - as soon as I disabled the second interface everything arises in life

    Now I need to try to find a way to implement a SHIFT between the two MXL in the stack and a Juniper ex3300 - I managed to get the connectivity that I need, but with only a single link - as it is a remote site I want redundancy :-)

  • Advice on network VLAN using RV180W

    Hello!

    I want to create a network that allows to separate the traffic between two or three VLANS. I want to be able to connect wireless using two SSID assigned to VLAN individual. Also, I would be able to extend the zone wireless using a different Access Point. So far, I tried the best solution of equipment and I plan to buy the wireless router RV180W and WAP121 as an extension of Access Point. This configuration is possible on these devices?

    The structure of the network should look like this:

    The second Point of access on PORT 4 is just a future extension. It is not necessary at the beginning. I just want to know if it will be possible.

    I also link 2 PORT VLAN2 and connect it to the computer via Ethernet switch.

    Should I do VLAN2 and VLAN3 labeled with PORT3, PORT4?

    Thanks in advance!

    Hi Michal,

    In theory, that you try should work perfectly and Yes, you should make VLANS 2 and 3 tag on ports 3 and 4. Unfortunately, there is a problem with the RV180W which does not work properly with enclosed access points. I hope that this problem will be fixed in a future firmware version, but right now, I can't recommend the router for your particular scenario. Other than that issue, I have like and recommend the RV180W for general use Small Business firwewall/router. There are a few threads on this forum that describe the AP issue more in detail:

    https://supportforums.Cisco.com/message/3770136#3770136

    https://supportforums.Cisco.com/message/3980504#3980504

    The foregoing is not a problem with other SMB wireless routers as far as I know. I recommend that you consider the RV220W which has a better than the RV180W integrated wireless AP. It also has a more powerful processor and is very stable with the latest firmware installed. I tested a RV180W home and ended up buying the RV220W. I found that the scope of my environment was much better with the RV220W.

    Answer please if you have any questions.

    -Marty

  • Design of network for a shared Business Center

    Hello

    I was asked to design a new shared business center network, but I need help.

    The scope is:

    -a building, access Internet 1

    -15 private offices

    -each Board can have up to 4 LAN connections

    -each office can have its own local network VIRTUAL (with Internet access)-max of VLAN 15 online

    -some offices can be merged (1 VLAN for many offices)

    -VLAN only have access to the Internet, but must be strictly isolated from others

    -DHCP must be available for each VIRTUAL local area network

    -WiFi must be available everywhere, but each user can connect only to its own LAN VIRTUAL (ID and PW) provided

    -management of connectivity and VLAN must be as simple as possible (GUI)

    What do I need put implement this configuration?

    Thanks in advance for your help.

    Hello

    A high level, you might want to switch support VLAN to connect and separate all individual offices. You could master this (3750/3560) switch to a Cisco ASA firewall, which, in turn, you may have interfaces on the trunk, a link on the side of the ASA. 1 for each VLAN configured. ACL security could be applied to each Sub Interface as well as a DHCP server for each VLAN can be configured on the SAA also. I would be not actually laid the present and let tenants handle their own LAN 'each office can have its own VIRTUAL LAN. " This would add unnecessary complexity.

    Wireless, can be as sophisticated as the installation of a wireless LAN Controller and several APs for centralized management of the APs. You can assign identifiers VLAN to different BSSIDs. Or you can use 1-2 Points of access and manage them individually. Cisco Aironet 2600 has GUI and allow VLAN tags by SSID. A site for the wireless range would be necessary.

    Haven install some of these types of networks, the above is all very high-level and depend on specific reuqirements, but should be a good starting point for you.

    Concerning

    Stephen

    ==========================
    http://www.rConfig.com

    A free, open-source network device configuration management tool customizable for your needs!

  • Mgmnt network vCenter question 5

    Our VMware environment is expanding - we are currently redesigning the network connections.  Can anyone offer recommendations or best practices on the following questions.
    (1) on new construction of host can use another range of IP for the management network without causing problems with already used by existing hosts subnets?  Can I change the IP address of the existing hosts without a reconstruction?
    (2) we are very shortage of Cisco ports.  My Network Services team asking if we can combine the network traffic with vMotion traffic on the same physical connection management.  Which would have ramifications

    be if we allow at the same time?  Unless you have a failure of the host all vMotion activities is controlled manually and very light.  We work (ongoing project) on a DR plan, but have nothing in place.

    Is it 2x1GbE or 2x10GbE?
    If it is 2x10GbE and that you have vSphere Ent +, I'd go for the unique design of VDS using NIOC

    Check out this blog on a design layout NIC: VMware vSphere 5 host NIC network design layout and vSwitch Configuration [Major Update] | Tech blog | Blog

  • Design of left/HP4330 question

    We just bought a san Lefthand/HP4330, composed of 6 knots, 3 knots, each placed in 2 separate buildings, configured in a cluster of stretched metro, so raid network will distribute data
    on both sites, to all the nodes.  Useful ability is to 18.  We plan to create two LUNS to meet the requirement of heartbeat of storage; a small lun for the ISO and the 2nd
    pulsation of storage of about 300 GB in size and other balance of space, approximately 17 + TB, as a large number of logical unit for all the virtual machines.

    The hosts are the esxi/vsphere 5.1

    Did anyone see drawbacks to this plan?

    Please ask questions if more information is needed to comment.

    With a 6 cluster Lefthand node, I would consider to create multiple LUNS for a better distribution of the workload. Each LUN will have a management controller, and with only a single production LUN concentrate traffic on a node and therefore lose benefits left design. In this cluster of Mutli-Site you are considering, you will be usually 4 Directors (two from each site) and a Failover Manager (FOM), then I would say at least 4 Mon.

    André

  • design of network of vSphere - thoughts?

    Hi all

    Looking for some advice/confirmation on a generation, that I am putting together

    Material Blade C3000, 4 switches Passhru

    x 2 servers BL460c G6 with 6 CARDS each.

    Design is similar to the following,

    2 NIC team for production, service on the same vSwitch0, thoughts on this console?

    1 NETWORK adapter on each host for Vmotion

    x 2 card NETWORK ISCSI SAN and SC (ISCSI are not used before just FC)

    1 NETWORK DMZ map on each host

    It work ok? Using PassThru to keep things simple and main switch patch and DMZ appearance.  No security concerns?

    Look forward to the comments.

    See you soon

    Use only 2 NIC for iSCSI... no SC.

    If you have 4 NIC free and you might consider (if possible) to use the VLAN tagging for vMotion, DMZ, management, LAN on the same vSwitch.

    Then for each group of port use the tag VLAN right and bind it on different NIC

    André

  • Wiring of VMotion and VLan question...

    Hello

    I understand the VLANS and how they work, but I'm not really a 'network' guy and I have a few questions...

    My servers are dl380 g6 with 8 network ports. I intend using two for console service, two for vmotion and the other 4 for my virtual switch of production. I know there is no way of vswitches configuration, but it's my game to date plan.

    My question is how can I configure a vlan and segment the traffic for vmotion? I have 4 ports on my physical switch that I put aside for this vlan vmotion. How can I set this up? Wwhat can I do on the switch and how do I have to create a separate subnet in the DNS? ABLES

    My plan is to pass the cables from the ports on esx hosts I put aside for vmotion to the physical switch ports...

    I'm not too sure about that...

    Thank you! points will be awarded to anyone.

    Hello.

    My question is how can I configure a vlan and segment the traffic for vmotion? I have 4 ports on my physical switch that I put aside for this vlan vmotion. How can I set this up? Wwhat can I do on the switch and how do I have to create a separate subnet in the DNS? ABLES

    What kind of physical switch are you using?  Here is a link to the Cisco documentation to create the VLAN on Catalyst switches.  Create a layer 2 VLAN and create VMkernel interfaces with the appropriate IP addresses.  Don't worry about DNS or Routing and keep things simple, if you can.

    Good luck!

  • Help! Network newbie question

    Hi Experts,

    I just started using VMware and I had a simple kind of question. I inherited 4 Dell R900 x servers. Each server has fiber 2 x 10G, 2xHBA cards, NIC integrated 4 x 1 G and an additional 4 x 1 G NIC. I built all the 4 ESX servers and sort the storage that is be an EMC DMX. The only problem I have now is that I am wise networking? Clearly, it would seem logical to Crete the VLAN of server on 10g cards, but what to do with the other?

    Help, please! Thanks in advance.

    James

    Misread the post above...

    Since you have a sound network cards, you might want to consider this:

    vSwitch0 (Service Console)-> onboard 1 G NIC1 and 1 G NIC1 PCI as a failover pair. The best practice is to have the Service Console on a segment controlled far from virtual machines and networks vmkernel

    vSwitch1 (VMS)-> the two cards of 10 G in a connection to very. Use VLAN tagging to provide access to multiple networks

    vSwitch2 (vmkernel/vMotion - if used)-> onboard 1 G NIC2 and PCI 1 G NIC2 as a failover pair. This should be on one VLAN isolated to enhance security while ensuring that all the bandwidth is dedicated to vMotion

    In addition, make sure that all network adapters are on the VMware HCL.

  • watching storage NFS since FC storage, have network config question

    I have a lot of hosts running ESX3.5 U3. 4 network cards each have... 1 SC, 2 for VM, 1 for SC2 and VMotion. My question is when I go to use storage NFS I should use the vswitch which has the port of VKernel configured on it, correct? and I can only have a VKernel port on a host, correct? If those who are both good while I have my storage VMotion traffic and NFS on the same vswitch (NIC), correct? for my tests, I added a quad-port nic to a couple of hosts and predicted the addition of these NICs to the existing vswitch SC2/VMotion.

    current:

    vmnic0 = SC (vswitch0)

    vmnic1 = VM (vswitch1)

    vmnic2 = VM (vswitch1)

    No nic (vswitch2) network

    vmnic3 = VMotion/SC2/NFS (vswitch3)

    Futures:

    vmnic0 = SC (vswitch0)

    vmnic1 = VM (vswitch1)

    vmnic2 = VM (vswitch1)

    No nic (vswitch2) network

    vmnic3 = unassigned or add to VM vswitch network

    vmnic4 = VMotion/SC2/NFS (vswitch3)

    vmnic5 = VMotion/SC2/NFS (vswitch3)

    vmnic6 = unassigned or add to vswitch3

    vmnic7 = unassigned or add to vswitch3

    control at will!

    You can have multiple vmkernel ports, but not on the same subnet.  If you segment your NFS traffic in a separate network, you can create another vmkernel port to take advantage of this way.

    In addition, the only reason to have multiple sc ports is if you didn't trust your configuration VLAN switch.  To provide redundancy, I pair a 2nd NETWORK card with the first port of sc and get the hardware redundancy rather than adding complexity with a 2nd service console IP.  Then use a 2nd pair for vmotion, a 3rd pair for the vm traffic and a 4th pair for NFS.  That would give you redundancy at each layer, and if you use separate network segments with each type of data, provide you a better level of security as well.

    -KjB

  • EA4500 + ADSL router: networking noob question

    Then... I'm not sure of the right words to use, but this is the case I would appreciate the help. I tried to figure out how to survive myself, but I find it a little confusing - however, if you think I just need a networking 101 do not hesitate to send me to appropriate information sources (I've tried a few, as I say, but I have not yet found a place where my situation fits!).

    Quick back story: I have a cheap TalkTalk ADSl router (D-Link 3680) where the Wireless does not properly in the House. So I just got a DSL EA4500 router for better strength/speed/compliance wireless - you'll just have to forgive me for not having an ADSL router, which I realize may have been a simpler solution!

    First of all, I put the (D-Link of TalkTalk 3680) ADSL router in Bridge mode and got this and the EA4500 work together which was great as it goes. However, I would be hard...

    I have a tower PC and wish to receive wired ethernet network. While I know in the set - up above I can run a cable from the 3680 to the EA4500 and then another cable to the PC because the PC is closer to the telephone (with the ADSL router) Jack, physically it seems wiser, if I take the PC of the 3680 ethernet connection (along with a second cable 3680 to EA4500 connection for the wireless). It may or may not be relevant that the 3680 is a Fast Ethernet output, as is the network PC card (i.e. are not Gigabit).

    I don't know (a) whether the above configuration is possible and if yes, how, or (b) the question whether in terms of networking, it is best to cable to the EA4500 computer (even if this will create a longer path to the PC and the wiring more).

    Meaning, and if yes maybe someone could give me also a term for what I'm doing?

    Help gratefully received! Garreth

    3680 port LAN (bridge) => EA4500 Port WAN (router)-online PC peripherals and wireless

    It's the best configuration and nothing should be connected to the 3680 other than the EA4500.

    The physical location of the electronics is not important, unless you can not run cable or wireless signal is low.

  • New Network Configuration Question

    Out of my element here, have a new building we are evolving towards and want to check the right way to install our network. Rooms include 1 - TZ-200, 1 - LAN + Modem wireless switch dell 1-2824 (data), switch dell 1-2824 (voice), 1 - security DVR. If I configure the TZ-200 to the dhcp server, remove the dsl, taken in the wan port modem dhcp will be the sonicwall pick up the wireless and purge the IP for wireless addresses, as well as configure the remaining ports on TZ-200 LAN will all devices to be on the same subnet/nat for easy access? can provide simple schema, if that helps.

    Forget the feature wireless modem from your Internet service provider. You cannot have two routers 'work' (not in this configuration in any case). The only jobs of the modem is to feed the WAN in the Sonic and the Sonic is one that will manage all SonicOS is designed for, such as the creation and serving Dhcp. unless you are forced by the ISP contract to use the material they gave you, it may be more easy to get just a modem ADSL2 + regular that you can find in any * sale because they are unpopular with the houses of our days.

    To get WiFi in your network, you will fill a WiFi 'something' to one of the LAN in the Sonic ports. It can be of any router wireless of quality home set in Bridge mode (all DLink, Netgear, Linksys, etc, they can all work such as bridges), or a wireless bridge of commercial quality (as Unifi AP).

Maybe you are looking for