Table Of Contents
Cisco Desktop as a Service Solution with Desktone
About Cisco Validated Design (CVD) Program
2 Cisco DaaS Solution with Desktone Overview
Virtualized Multiservice Data Center
Multi-Tenant Connection Broker
Cisco DaaS Solution with Desktone Components
Configuring the Cisco Unified Computing System
To configure the Cisco Unified Computing System, perform the following steps:
Installing and Configuring VMware vSphere
Install and Configure VMware vCenter
VMware vSphere Network Configuration for Desktone Appliances
VMware vSphere Network Configuration for Desktone Tenant Appliances
Steps to Customize the Golden Image Virtual Machine
Installing the Desktone DaaS Agent.
Installing the VMware View Agent
Installing the VMWare View Agent Connect
Installing and Configuring Desktone
Installing Desktone Primary Service Provider Appliance
Configuring the Network on Desktone Primary Service Provider Appliance
Configuring the Desktone Primary Service Provider Appliance
Installing the Desktone Secondary Service Provider Appliance
Installing the Desktone Tenant Resource Manager Appliances
Installing the Desktone Tenant Appliances
Assigning Hosts to Individual Tenants
Adding the Golden Template into Desktone Tenant Portal
Creating a Pool of Desktops in the Tenant Portal
5 Test Setup and Configuration
Cisco UCS Test Configuration for Single Blade Scalability
Detailed Windows Configuration
Testing Methodology and Success Criteria
User Workload Simulation - LoginVSI from Login Consultants
Pre-Test Setup for Single and Multi-Blade Testing
Single Blade Maximum Recommended Workload
Boot Phase Performance Results
Test Phase Performance Results
Cisco Desktop as a Service Solution with Desktone
August 6, 2013
Contents
About Cisco Validated Design (CVD) Program
The CVD program consists of systems and solutions designed, tested, and documented to facilitate faster, more reliable, and more predictable customer deployments. For more information visit http://www.cisco.com/go/designzone.
ALL DESIGNS, SPECIFICATIONS, STATEMENTS, INFORMATION, AND RECOMMENDATIONS (COLLECTIVELY, "DESIGNS") IN THIS MANUAL ARE PRESENTED "AS IS," WITH ALL FAULTS. CISCO AND ITS SUPPLIERS DISCLAIM ALL WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THE DESIGNS, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
THE DESIGNS ARE SUBJECT TO CHANGE WITHOUT NOTICE. USERS ARE SOLELY RESPONSIBLE FOR THEIR APPLICATION OF THE DESIGNS. THE DESIGNS DO NOT CONSTITUTE THE TECHNICAL OR OTHER PROFESSIONAL ADVICE OF CISCO, ITS SUPPLIERS OR PARTNERS. USERS SHOULD CONSULT THEIR OWN TECHNICAL ADVISORS BEFORE IMPLEMENTING THE DESIGNS. RESULTS MAY VARY DEPENDING ON FACTORS NOT TESTED BY CISCO.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at http://www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
Cisco Desktop as a Service Solution with Desktone
© 2013 Cisco Systems, Inc. All rights reserved.
1 Preface
Introduction
The Cisco Desktop as a Service (DaaS) Solution with Desktone enables service providers to offer desktops as a service to their customers. The Cisco DaaS Solution with Desktone is built to be highly scalable and supports multi-tenancy.
Cisco DaaS Solution with Desktone delivers desktops as a service on a common infrastructure. This common infrastructure is hosted in service provider data centers. Microsoft Windows 7 is the operating system of choice for the virtual desktops and is available in persistent and non- persistent flavors. The Cisco DaaS Solution with Desktone is built by combining data center, network, and security technologies from Cisco and desktop virtualization technologies from our ecosystem partners.
Cisco DaaS Solution with Desktone accomplishes complete separation between customers from desktops in the data center, through the data center network, across the wide area network, and down to the customer network. Customer visibility is restricted to only their virtual desktops. However, service providers have insight into how resources as a whole are utilized by different customers.
The pod-based approach adopted for the Cisco DaaS Solution with Desktone enables flexibility in growth based on business needs without requiring a redesign of the data center. This approach ultimately lowers operational costs for the service provider. The pod as a logical unit supports multiple customers at different scale on a common infrastructure.
Network services deliver exceptional user experience for a large number of users without requiring additional resources to be deployed on the customer end. Security policies are enforced between the customer's network and the virtual desktops in the service provider's data center.
Cisco DaaS Solution with Desktone has been tested end-to-end to confirm that all the different components interoperate. With Cisco DaaS Solution with Desktone, service providers are now able to build a multi-tenant desktop as a service solution faster and at reduced risk than ever before.
Target Audience
This document is intended for, but not limited to, solution architects and engineers involved in planning and designing Cisco DaaS Solution with Desktone. This document assumes the reader has an understanding of the following:
•Cisco Virtualized Multiservice Data Center
•Cisco Unified Computing System
•Cisco Nexus Switches
•Cisco Catalyst Switches and Service Modules
•Cisco Aggregation Services Router
•Cisco Adaptive Security Appliance
•MPLS VPN
•VMware vSphere
•Desktone
•NFS Storage
•Microsoft Windows 7 Operating System
2 Cisco DaaS Solution with Desktone Overview
This section describes the capabilities of the different products and solutions that are part of the Cisco DaaS Solution with Desktone reference architecture and how these elements are integrated to deliver a scalable, flexible and secure multi-tenant solution for service providers.
Figure 1 System Overview
The building blocks of the Cisco DaaS Solution with Desktone are:
•Virtualized Multiservice Data Center
•Wide Area Network
•Security
•Multi-Tenant Connection Broker
Virtualized Multiservice Data Center
The Cisco Virtualized Multiservice Data Center (VMDC) Version 2.2 is the platform used for Cisco DaaS Solution with Desktone. The platform is ideal for service providers as it is designed for cloud based offerings and provides a multi-tenant infrastructure on which any service can be delivered. The modular architecture is highly scalable and adapts easily to the changing business needs of the service provider. The design has been validated by end-to-end system level testing and offered as part of Cisco Validated Design Program.
The first building block in the Cisco VMDC architecture is an integrated compute stack (ICS) based on Cisco Unified Computing System (UCS).
Compact pod design is the one chosen for Cisco DaaS Solution with Desktone. It uses centralized service node architecture on a collapsed aggregation/core with top-of-rack access.
Multiple ICS blocks are connected through the network infrastructure to form a pod. New pods are built and added to the data center for additional capacity, thereby making the entire solution scalable.
Figure 2 VMDC Pod
VMDC Network is organized into core, aggregation and access layers similar to a campus network design.
The primary function of the core is to provide high performance Layer 3 switching for IP traffic.
The aggregation layer provides connectivity for the access layer switches in the server farm and aggregates them into a smaller number of interfaces to be connected into the core layer. Services are introduced into data flows at the aggregation layer.
With Cisco DaaS Solution with Desktone using the compact pod design, the core and aggregation layers are collapsed into one.
The access layer provides connectivity for server farm end nodes. Quality of Service (QoS) markings are done on the display protocol traffic at the access layer of the VMDC network and prioritized in the data center network.
The WAN Edge of the service provider's data center provides network traffic isolation between different customers as they come into the data center from the WAN.
Figure 3 Cisco VMDC Network Topology
Wide Area Network
The WAN is the primary method of delivery of virtual desktops to customers. A VPN connection extends the customer network into the data center of the service provider enabling seamless access of virtual desktop for users in the customer premises.
MPLS VPN is one of the VPN technologies supported in Cisco DaaS Solution on Desktone. With MPLS VPN, the traffic separation is built directly into the network without tunneling or encryption. Unique VPN route forwarding (VRFs) at the Provider Edge routers separates the traffic for every customer and allows overlapping IP addresses to exist. A customer's visibility is restricted to their network traffic only.
Based on the Service Level Agreement between the customer and WAN provider, the customer traffic of interest that are marked with appropriate Quality of Service markings is prioritized over the WAN, delivering an enhanced user experience.
Security
Cisco ASA Service Module (SM) is deployed on the Data Service Node, Catalyst 6500 to provide firewall functionality between the customer physical network and the virtual environment hosted by the service provider. The Cisco ASA SM supports multiple contexts, each of which is assigned to a tenant. The context will give every tenant a dedicated firewall to configure specific security policies that they desire.
Multi-Tenant Connection Broker
The Desktone platform supports connections to virtual desktops over multiple display protocols like Microsoft Remote Desktop Protocol (RDP), VMware PC over IP (PCoIP) from different customers. PCoIP was the one used in the study. The platform authenticates and connects users from different customers to the right desktops in the data center. The IT administrator of customers gets to view only their own desktops. The service provider is the only one who has the visibility on how the resources are used by different customers in the data center.
Cisco DaaS Solution with Desktone Components
Table 1 Cisco DaaS Solution on Desktone Components
3 Design Considerations
Cisco DaaS Solution with Desktone has been designed with the following objectives in mind.
•Tenant Separation
•High Availability
Tenant Separation
Desktops are deployed by enterprises in-house on dedicated infrastructure. To consume desktops on shared infrastructure, customers must be certain that their corporate information is secure and isolated end-to-end. Secure tenant separation is done at the following levels:
•Compute
•Network
•Network Services
•Storage
•Desktop
Figure 4 Tenant Separation
Compute
A separate blade server is assigned for the Desktone Platform management software. This host runs Desktone service provider appliances and tenant appliances for every customer.
Blade servers are dedicated as a whole to every tenant. This is done to comply with Microsoft licensing agreement. Microsoft Virtual Desktop Access license prohibits running Windows 7 virtual desktops for different customers on the same host. This makes sure that there is complete separation of compute between different customers. Dedicated hosts are maintained even in times of hardware crashes when virtual desktops are moved between hosts.
Network
A logically separate network infrastructure is created for every customer. The separation is done at both Layer 2 and Layer 3 using VLAN and VRF respectively.
Layer 3 VPN provides separate links for customers to connect into the service provider data center. VRF at the WAN edge of the data center provides path isolation of customer traffic at Layer 3. A separate routing table is used to make forwarding decisions for every customer's traffic. A separate routing table helps ensure support for overlapping IP address range of customers on a shared network.
Separation at Layer 2 is done using VLANs. A minimum of one VLAN is assigned to each customer. All virtual desktops and virtual machines that belong to a customer reside on the customer's assigned VLAN. The VLAN ensures that customer's traffic is logically isolated from one another as it traverses different devices in the service provider data center.
Figure 5 Network Separation in Desktone view
The Desktone management appliances are located in different networks depending on the application type. The Service Provider Appliance and Resource Manager Appliances reside on the service provider network. The Tenant Appliances reside in the tenant network and cannot be accessed from any other network. There is a backbone link local network which is used for different Desktone Appliances to talk to each other. The management network is used for the blade servers and storage appliances.
Figure 6 Desktone Service Grid
Network Services
Cisco ASA Service Module deployed on the Data Service Node, Catalyst 6500 is partitioned into multiple virtual firewalls, known as security contexts. The customer's security policies are configured and stored in the tenant configuration file.
Storage
Storage is managed by the VMware vCenter for Desktone. All storage options supported by vCenter are supported storage options for virtual desktops. If NFS is chosen as a storage option, file shares are created for every customer and also one for the Desktone platform. If FC is chosen, one or more Logical Unit Number (LUN) needs to be created for each customer and one for the Desktone platform.
The Desktone platform needs a file share/LUN to host the template used in creation of new tenant appliances on the Desktone platform. This file share/LUN is mounted on the hosts assigned to the Desktone platform.
The virtual desktops for each customer are stored in their corresponding file share/LUN. The file share/LUN of each customer is mounted on the hosts reserved for the customer as VMware datastore. No other host must have access to the datastore of the customer.
Desktop
The Desktone Platform manages all incoming connections to the virtual desktops. Based on the user and to which customer the user belongs to, the Desktone Platform connects the user to the right desktop over the preferred display protocol.
The service provider appliance is administered using the Service Center web based Graphical User Interface. The service center portal gives an overview of all the customers sharing the common data center. This portal is also used to manage the system resources for different customers. The service provider appliance should be installed first as it is the foundation for installing rest of the Desktone appliances.
A separate enterprise portal called Enterprise Center is powered by the customer's tenant appliance. The Enterprise Center is only accessible from the corresponding customer's network. This portal restricts visibility to only the desktops the customer owns.
There are two Resource Manager Appliances in a high available environment to manage the resources used for the tenants a whole.
Figure 7 Desktone Components
High Availability
High Availability (HA) is a mandatory requirement of any hosted or cloud-based service offerings. For a service to be adopted widely by businesses, service providers need to provide Service Level Assurance (SLA) to their business customers. To meet such SLA, the service provider needs to base their offering on a highly available infrastructure.
VMDC was chosen as platform of choice for Cisco DaaS Solution on Desktone because it can provide redundancy at different levels like Compute, Network and Storage. Redundancy is provided end-to-end all the way from the collapsed core/aggregation, access, compute, and storage layers.
Compute
Figure 8 Redundant paths for Virtual NICs
Cisco Unified Computing System is a fully redundant system. The network adapter is connected to both the fabric planes in active-active node utilizing the full bandwidth. The Fabric Interconnect Uplinks connects to the access layer switches to provide redundant paths for all the virtual machines hosted on the blade server. The Fabric Interconnects should always be deployed in pairs for redundancy and high availability.
As per VMDC recommendation, configure the Cisco UCS Fabric Interconnect uplinks in End Host Mode. In End Host mode, you get the following:
•Uplinks are fully utilized
•Uplinks can be connected to multiple access switches providing redundancy
•Spanning Tree Protocol is not required
Cisco Unified Computing System provides different system class of service to implement quality of service including:
•System classes that specify the global configuration for certain types of traffic across the entire system
•QoS policies that assign system classes for individual vNICs
•Flow control policies that determine how uplink Ethernet ports handle pause frames.
Note Time sensitive applications have to adhere to a strict QOS for optimal performance.
Systems Class is the global operation where entire system interfaces have defined QoS rules.
•By default system has Best Effort Class and FCoE Class.
Note Best effort is equivalent in MQC terminology as "match any"
–FCoE is special Class define for FCoE traffic. In MQC terminology "match cos 3"
•System class allowed with 4 more users define class with following configurable rules.
– CoS to Class Map
– Weight: Bandwidth
– Per class MTU
–Property of Class (Drop v/s no drop)
•Max MTU per Class allowed is 9216.
•Through Cisco Unified Computing System, we can map one CoS value to particular class.
•Apart from FCoE class there can be only one more class can be configured as no-drop property.
•Weight can be configured based on 0 to 10 numbers. Internally system will calculate the bandwidth based on following equation (there will be rounding off the number).
Cisco Unified Computing System defines user class names as follows:
•Platinum
•Gold
•Silver
•Bronze
Table 2 Map between Cisco Unified Computing System and the NXOS
Cisco UCS Names NXOS NamesBest effort
Class-default
FC
Class-fc
Platinum
Class-Platinum
Gold
Class-Gold
Silver
Class-Silver
Bronze
Class-Bronze
Table 3 Class to CoS Map by default in Cisco Unified Computing System
Cisco UCS Class Names Cisco UCS Default Class ValueBest effort
Match any
Fc
3
Platinum
5
Gold
4
Silver
2
Bronze
1
Table 4 Default Weight in Cisco Unified Computing System
Network
Figure 9 Redundant Network Layers
Virtual Port Channel (vPC) helps ensure high availability at Layer 2 in the data center. All available paths are utilized to deliver maximum bandwidth to the hosts. Two upstream Nexus switches act as one logical node delivering both hardware redundancy and load balancing.
Host StandBy Router Protocol (HSRP) provides hardware redundancy and high availability at Layer 3 by having two routers act as a single virtual router with shared IP address and MAC address. The shared address enables hosts to always have an active router to forward packets.
Network Services
Cisco ASA Service Module is deployed on the 2 Catalyst 6500 switches for redundancy. It supports high-speed failover between modules in separate chassis. Both Active-Active and Active-Standby failover is supported.
Storage
As per VMDC recommendation, it is required to have hardware redundancy for storage devices.
Desktop
The Desktone platform is installed on two separate blade servers. On each blade server, one instance of Service Provider Appliance, Tenant Appliances and Resource Manager Appliances are installed. One instance is the primary and the other is the secondary. Both primary and secondary instances of the appliances work in active mode. So, either of the appliances can crash with no service interruption. The same holds true if the whole blade server hosting the Desktone appliances were to crash.
When desktop hosts crash, the desktops can be moved over to a new host and the desktops would be available for users. It is recommended to have at least one spare host per tenant to handle blade crashes. This host needs to be on the VLAN assigned to the tenant. It then needs to be assigned to the Tenant Resource Manager to be available for hosting desktops. If and when the crash happens, the desktops need to be migrated to the new host.
4 Solution Validation
This section details the configuration and tuning that was performed on the individual components to produce a complete, validated solution.
Figure 10 Cisco DaaS Solution on Desktone Topology
Configuring the Cisco Unified Computing System
To configure the Cisco Unified Computing System, perform the following steps:
Step 1 Bring up the Cisco 6248UP Fabric Interconnect (FI) and from a serial console connection set the IP address, gateway, and the hostname of the primary FI.
Step 2 Bring up the second fabric interconnect after connecting the dual cables between them. The second FI automatically recognizes the primary and asks if you want to be part of the cluster, answer yes and set the IP address, gateway and the hostname.
Note When Step 2 is completed all access to the FI may be performed remotely. You will also configure the virtual IP address to connect to the FI; you need a total of three IP address to bring it online. You can also wire up the chassis to the FI, using 1, 2, 4 or 8 links per IO Module, depending on your application bandwidth requirement. In this study, four links were connected to each module.
Step 3 Connect using your favorite browser to the Virtual IP address and launch the Cisco UCS Manager. The Java based Cisco UCS Manager enables you to do everything that you could do from the CLI. The GUI methodology is highlighted here.
Step 4 Check the firmware on the system and see if it is current. Visit http://software.cisco.com/download/release.html?mdfid=283612660&softwareid=283655658&release=2.0(4d)&relind=AVAILABLE&rellifecycle=&reltype=latest to download the most current Cisco UCS Infrastructure and Cisco UCS Manager software. Use the UCS Manager Equipment tab in the left pane, then the Firmware Management tab in the right pane and Packages sub-tab to view the packages on the system. Use the Download Tasks tab to download needed software to the FI.
Note The firmware release used in this paper is 2.1(1a).
Step 5 Configure and enable the server ports on the FI. These are the ports that will connect the chassis to the FIs.
Step 6 Configure and enable uplink Ethernet ports
Step 7 On the LAN tab in the Navigator pane, configure the required Port Channels and Uplink Interfaces on both Fabric Interconnects
Step 8 Expand the Chassis node in the left pane and click on each chassis in the left pane.
Step 9 Click Acknowledge Chassis in the right pane to bring the chassis online and enable blade discovery.
Step 10 From the Admin tab in the left pane, to configure logging, users and authentication, key management, communications, statistics, time zone and NTP services, and licensing. Time zone Management (including NTP time source(s)) and uploading your license files are critical steps in the process.
Step 11 On the LAN tab, expand Pools, IP Pools. Right click on IP Pool ext-mgmt. Configuring your Management IP Pool (which provides IP based access to the KVM of each UCS Blade Server).
Step 12 From the LAN tab in the navigator, under the Pools node, create a MAC address pool of sufficient size for the environment.
Step 13 From the LAN tab in the navigator pane, configure the VLANs for the environment. You need one VLAN for Service Provider network, one for Link-Local Network and one for each tenant.
Note In this study, a separate VLAN is used for storage.
Step 14 Enable the different priorities, Platinum, Gold and Silver for QoS System Class
Step 15 Add the QoS policy with its corresponding priority
Step 16 From the LAN tab in the navigator pane, under the policies node configure the vNIC templates to be used in the Service Profiles.
Step 17 Create vNIC templates for both fabrics and select the VLANs to be supported, MTU size and QoS policy.
Step 18 New in Cisco UCS Manager 2.1(1a) is a method to set Host Firmware Package polices that can be set by package version across the Cisco UCS domain rather than by server model.
Note You can create specific packages for different models or for specific purposes.
Step 19 Create a BIOS policy under Servers -> Policies -> BIOS Policies for the Cisco UCS B200 M3 blade servers.
Step 20 Choose the highlighted settings for Processor.
Step 21 Enable VT for Directed IO.
Step 22 Choose the following Memory settings:
Step 23 Keep the default settings for the other options and click Finish.
Step 24 Create a service profile template using the pools, templates, and policies configured above.
Step 25 For the Identify Service Profile Template, enter a unique name, select the type Updating Template, and click Next.
Step 26 For the Networking option, select Expert and click Add in the adapters window.
Step 27 Create vNIC and check Use vNIC Template.
Step 28 Select No vHBAs option since SAN is not used in this study.
Step 29 Click Next since no Zoning is required.
Step 30 Accept Default placement and click Next.
Step 31 Select default boot policy.
Step 32 A Maintenance policy was not used in this study. Click Next to continue.
Step 33 For the Server Assignment option select default pool created or create a new server pool. Select Host Firmware package to be applied and click Next.
Step 34 Choose the BIOS policy created and click Finish to complete the Service Profile Template.
Step 35 Create a Service Profile from Template.
Step 36 Provide a Naming Prefix and the number of service profiles to be created from the template.
Step 37 Service profiles are assigned to the servers.
Installing and Configuring VMware vSphere
Install VMware ESXi
ESXi was installed from the Cisco UCS Manager (UCSM) KVM console using a ESXi 5.1 ISO image downloaded from the VMware site.
The IP address, hostname, and NTP server were configured using Direct Console ESXi Interface accessed from Cisco UCS Manager KVM console.
See the following VMware documentation for details about configuring network settings:
Install and Configure VMware vCenter
A Cisco UCS B200 M3 blade server was used to host the virtual machines used for SP management including Microsoft Active Directory, DNS, DHCP server, etc., and also for hosting the vCenters used for Desktone environment.
To manage hypervisors and virtual machines on hosts reserved for Desktone Appliances, a dedicated vCenter server instance was installed on a Windows 2008R2 virtual machine.
An identical vCenter server was dedicated for managing the hypervisors and desktops for all tenants.
Table 5 vCenter Server Configuration
VMware vCenter ServerOS:
Windows 2008 R2
Service Pack:
CPU:
4vCPUs
RAM:
16GB
Disk:
80GB
Network:
1x10Gbps
To support vCenter instance, one Microsoft SQL Server 2008 R2 was created to host vCenter database.
It is recommended to utilize fault tolerance at the SQL Server level, refer to Microsoft documentation about configuring SQL Server clusters:
http://msdn.microsoft.com/en-us/library/ms189134(v=sql.105).aspx
To install and configure vCenter, perform the following steps:
Step 1 Install the Microsoft® SQL Server® 2008 R2 Native Client for ODBC connections
(http://www.microsoft.com/en-us/download/details.aspx?id=16978 look for Native Client for your architecture)
Step 2 Create a System DSN (control panel, administrative tools, Data Sources ODBC) and connect to your vCenter-SQL server.
Note Make sure to use FQDNs throughout this installation.
Step 3 Install vCenter server package and connect to the database.
Step 4 Connect your vSphere client to vCenter and create a datacenter.
Step 5 Create a self-signed certificate. (http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1021514).
Install Licenses
Step 1 Connect to vCenter using vSphere client.
Step 2 Go to Home --> Administration --> Licensing and click Manage vSphere Licenses.
Step 3 Add License keys for vCenter and Hosts and click Next.
Step 4 Enter the license key and add an optional label.
Step 5 Repeat the above-mentioned procedure to create another instance of vCenter; one for Desktone appliances and another one for tenant desktops.
VMware vSphere Network Configuration for Desktone Appliances
The VLANs for service provider network is added in vSwitch of the vCenter reserved for Desktone appliances.
A separate VLAN is used for Desktone Platform management traffic. It is a non-routable subnet with a link-local address. A link-local address is an IP address used only for communications within a link (segment of a local network) or a point-to-point connection to which a host is connected. Routers do not forward packets with link-local addresses. The address block 169.254.1.0 through 169.254.254.255 is reserved for link-local addressing in Internet Protocol Version 4. You cannot choose addresses outside this range.
Note If you have more than one data center, the link-local address space must be unique (non- overlapping) across data centers.
The configured VLANs must be the same across all management hosts.
•VLAN 864 for Service Provider Network
•VLAN 980 for Link Local
•VLAN 844 for Storage
Figure 11 vSwitch for Desktone Appliances
VMware vSphere Network Configuration for Desktone Tenant Appliances
The tenant VLANs and the VLAN for storage are added to the vSwitch of the vCenter reserved for tenant desktops. Tenant 1 was used for this study. The VLAN assigned for Tenant 1 is 711.
Figure 12 vSwitch for Tenant hosts
Creating the Golden Image
Before defining a virtual machine as your gold template you need to create your template. A new OS installation is strongly recommended, which should be customized to VDI best practices.
For details about Windows 7 VDI best practices, see http://www.vmware.com/files/pdf/VMware-View-OptimizationGuideWindows7-EN.pdf
Note 32bit Windows 7 OS with 1 vCPU, 1.5GB RAM, 24GB HDD, and one 10GB vNIC were used for testing.
Steps to Customize the Golden Image Virtual Machine
Step 1 Install VMware tools on Windows 7 VM.
Step 2 Verify NIC settings. Confirm the adapter type is VMXNET3.
Step 3 Set the power option to High Performance.
Step 4 Enable Administrator account and RDP access.
Step 5 Right-click Computer and select Manage.
Step 6 Select Local Users and Groups --> Users.
Step 7 Right click the Administrator user and select Properties.
Step 8 From the General tab, uncheck Account is disabled.
Step 9 From the Member Of tab, confirm Administrator is a member of "Remote Desktop Users"
Step 10 Set the Administrator password.
Step 11 Apply PCoIP GPO (.adm file) and configure protocol settings.
Step 12 Confirm the Windows firewall is disabled.
Step 13 Confirm the Windows Updates are current and then disable Windows Updates.
Step 14 Log in as Administrator and remove all other accounts on the virtual machine.
Installing the Desktone DaaS Agent.
Step 1 Copy the DaaSAgent_5.3.1.msi installer file onto the Windows 7 VM and double- click to start the Install.
Step 2 Click Next.
Step 3 Select a specific path for installation or leave it as default. Click Next.
Step 4 Click Next.
Step 5 Click Finish.
Note The DHCP option code 74 needs to be configured with the tenant appliance IP addresses. This will be utilized by the DaaS Agent to register the virtual desktop to the tenant appliance.
Installing the VMware View Agent
Step 1 Copy the VMware-viewagent-5.2.0-987719.exe file onto the Windows 7 virtual machine.
Step 2 Click Next.
Step 3 Accept the User License Agreement. Click Next.
Step 4 Click Next.
Step 5 Click Install.
Step 6 Click Finish. A pop-up will then display and prompt a reboot.
Installing the VMWare View Agent Connect
Step 1 Copy the VMware-viewagent-direct-connection-5.2.0-987719.exe installer file to Windows 7 Golden virtual machine.
Step 2 Click Next.
Step 3 Accept the End User License Agreement. Click Next.
Step 4 Click Next.
Step 5 Click Install.
Step 6 Click Finish.
Note Golden virtual machine must exist on the same datastore and VLAN where the desktops would reside.
Repeat the steps outlined in section Creating the Golden Image for preparing the Windows 7 golden image for other tenants.
Installing and Configuring Desktone
Building a Desktone environment requires the installation of the following components:
•Desktone Service Provider Appliances
•Desktone Resource Manager Appliances
•Desktone Tenant Appliances
Installing Desktone Primary Service Provider Appliance
Download the following required files for installation.
Note Use the worksheets from Desktone to make sure you capture all the required information before you begin the installation.
Table 6
File Contents File NamesAppliance template
AugustaSP3Template20130305.ova
5.3 debians
dt-platform-5_3_0.deb and dt-aux-1_1_0.deb
Patch
Dt-platform-5_3_0_patch_1.tgz,
Dt-platform-5_3_0_patch_2.tgz
Note On both management hosts, add the Service Provider datastore. Be sure to use the same name on each host.
Step 1 From the vSphere Client for Service Provider, click on File, Select File and select Deploy OVF Template to deploy the first copy of the ova file.
Note This ova file becomes the first Service Provider appliance.
Step 2 Click Browse and select AugustaSP3Template.ova file
Step 3 Click Next.
Step 4 Review the OVF template details and click Next.
Step 5 Select a Name and the data center for Service Provider Appliance.
Note Do not use any special characters for the name.
Step 6 Select the host where the virtual machine will reside on and click Next.
Step 7 Deploy the Desktone Service Provider Appliance to local storage on one of the two management hosts.
Note•By default, the Desktone Platform will clone out management appliances on the local disk (through a localdatastore). This is considered a best practice. However, if desired, it is possible to use shared storage for management appliances.
•If using shared storage for management appliances on vCenter, there are a few guidelines:
•Any shared storage (NFS, iSCSI, or FC) can be used.
•Datastores must be manually created on each of the management hosts.The datastore name must be identical (case sensitive) on each management host.
Step 8 Select Thin Provision.
Step 9 Click Next.
Step 10 Select the service provider network as the destination for the first source network; Virtual Machine Network and Link Local for the second source network, Dev Network.
Step 11 Review the deployment settings and select the check box to power on the virtual machine after deployment
Step 12 Click Finish.
Step 13 Repeat the steps 1-12 to deploy the second copy of the ova file, which becomes the template for all subsequent Desktone management appliances. For the template, do not check the box to power on after deployment.
Note The name of the template must be unique across all datacenters.
Configuring the Network on Desktone Primary Service Provider Appliance
Step 1 From the vSphere Client open a console for Desktone Primary Service Provider Appliance.
Step 2 Logon using the default credentials:
•Username: desktone
•Password: Desktone1
Step 3 Begin the bootstrap process by executing the following command:
sudo /usr/local/desktone/scripts/bootstrap.shEnter password for Desktone: Desktone1Step 4 The bootstrap script prompts you to enter the network information.
Note The host reboots after entering the network information. Because the node is not configured until the reboot completes, disregard any error messages displayed on the console.
Step 5 After rebooting, login with the configured username/password: desktone/Password123
Step 6 Copy the following files to the /tmp directory on the service provider appliance.
dt-platform-5_3_0.debdt-aux-1_1_0.debStep 7 ssh into the service provider appliance using login credentials. Move the files copied to /tmp directory into the /data/repo directory on the appliance using the commands:
sudo mv /tmp/dt-platform-5_3_0.deb /data/reposudo mv /tmp/dt-aux-1_1_0.deb /data/repoStep 8 Run the bootstrap script a second time to install the Desktone software:
sudo /usr/local/desktone/scripts/bootstrap.sh
Note It might take up to five minutes for the appliance to start after the reboot. Because the node is not configured until the reboot cycle completes, you can disregard any error messages displayed on the console.
Configuring the Desktone Primary Service Provider Appliance
Step 1 Browse to the Desktone service provider portal by entering the URL or IP address:
https://<IP address of service provider appliance>/serviceStep 2 Enter the information from the service provider Active Directory and click Save.
Note The first time, browsing the service center, you will be prompted for Domain Bind and Group Info.
Step 3 Enter a username, password and domain based on the Active Directory information on the service center login page.
Step 4 Enter the IP address or FQDN for vCenter hosting primary Service Provider Appliance, username and password and click Discover Server.
Step 5 Enter the memory over allocation ratio for each discovered host.
Note If the server is too small to accommodate the ratios, you may be prompted to re-configure them. Click Save to set the ratios.
Step 6 Repeat step 5 for the other ESXi host.
Step 7 After setting the ratios, the Service Center displays a pop-up listing the virtual machines on your host or in your vCenter Data Center.
Step 8 Select the Desktone appliance template to be used for cloning additional management appliances.
Step 9 Go to service grid --> resources. In the Resource Managers panel on the left, click the IP address of the resource manager.
Step 10 From the General tab, in the Name field, double-click on the IP address of the resource manager. Change the name to a user-friendly name and click OK.
Step 11 Apply the patches for the base image of service provider appliance by clicking appliances --> software update.
Step 12 Browse to the patches to be applied and click on Upload.
Step 13 SSH into the service provider appliance using login credentials and execute the following commands:
cd /data/reposudo dpkg -i dt-platform-5_3_0_patch_1.debsudo dpkg -i dt-platform-5_3_0_patch_2.debsudo service dtService restartInstalling the Desktone Secondary Service Provider Appliance
Step 1 Go to Service grid --> data center and click Edit.
Step 2 Verify the displayed information and click Add Appliances.
Step 3 Select Service Provider Appliance from the Appliances and enter values for the fields to create the Appliance.
Note Reservation will create a virtual machine for the second service provider appliance for High Availability, customize and install. This screen is accessible by navigating to Appliances --> Reservations and clicking the details on the appropriate reservation. From here, you can check the status of the SP2 appliance.
Installing the Desktone Tenant Resource Manager Appliances
Step 1 In the service center console, select service grid --> data centers.
Step 2 Click Add Appliances.
Step 3 Select the Appliance Type as Resource Manager and fill in the appropriate information in the value field for Primary and Secondary appliance and new reservation fields.
Step 4 From the general tab, in the name field double-click on the IP address and change the name for the Resource Manager. For example, TenantRMGR and click OK. You can do this by going to the Service Center console, select Service grid --> resources. In the Resource Managers panel select the IP address for the newly created resource manager.
Step 5 Select the Tenant Resource Manager as the default for the Datacenter.
Note It is very important to verify that the default Resource Manager for the Datacenter is the Tenant Resource Manager, not the Service Provider Resource Manager.
Adding Desktop Models
Step 1 Desktop Model is used to create multiple desktops of a certain configuration and priced accordingly. Tenants can then choose from the available desktop models.
Step 2 Add Desktop Model by going into the Service Center console, Select Configuration --> Desktop Models and click Add Desktop Model.
Installing the Desktone Tenant Appliances
Step 1 In the service center console, select tenants --> register a tenant.
Step 2 From the General Info tab, enter the required fields of Tenant Name, Administrator Name, and Database Password.
Step 3 Enter the Network Information.
Note Network ID is an install time decision and cannot be changed after the tenant has been installed. Additional networks can be added to a tenant at any time. The first network added would be the default for the tenant and also the network that the tenant appliances will reside on.
Step 4 From the Custom Fields tab, enter any site-specific information you want to maintain. These are freeform text fields with no data validation; the content is optional.
Step 5 Click Save and Create Appliances.
Step 6 From the Tenant Install page, enter the values for the tenant Appliances and click Create Appliances.
Step 7 To monitor the status of the tenant appliances being created, go to the service center console, Select Appliances --> Reservations and click on details to the view the reservation of interest.
Step 8 Repeat the steps 1-7 to create Tenant Appliances for every new tenant.
Assigning Hosts to Individual Tenants
Step 1 Assign a host by clicking Add host. Do this by going to the service center console, Select service grid --> resources.
Step 2 From the left side of the screen select Hosts.
Step 3 Click Add Host.
Step 4 Enter the IP address or FQDN for vCenter created for Tenant Desktop Hosts and credentials.
Step 5 Edit the host by selecting the vCenter for Tenant desktop hosts.
Step 6 Change the memory overallocation ratio if required and click Save.
Note This option only allows for ratios to be increased and may not be decreased after the inital setup.
Step 7 Repeat the above steps 1-6 for all ESXi hosts reserved for the tenant.
Step 8 Assign a host to the Desktop Manager by clicking on Assign under Available Hosts from the Desktop Managers tab.
Step 9 Select the hosts in the vCenter for this tenant.
Step 10 Repeat steps 9 and 10 for the other hosts reserved for the tenant.
Assigning Quotas for Tenants
Step 1 To assign a quota, go in the Service Center console -> tenants and edit the tenant.
Step 2 Enter the values in the VM Quota column for respective Desktop Models and click Update.
Note If the quota you entered in the VM Quota field is too large, the system will automatically reduce the quota to the largest possible quota.
Step 3 Check the desired protocols for the tenant and click Update.
Configuring Tenant Appliance
Step 1 Browse to the Desktone Enterprise Center by entering the URL or IP address in a browser:
https://<IP address of Tenant Appliance>/adminStep 2 Enter the values under Domain Bind, Group Info and Domain Join Info when prompted and click Save.
Step 3 Enter the values under Group Info and click Save.
Step 4 Enter the values under Domain Join Info and click Save.
Step 5 Login into the Desktone Enterprise Center login screen again to continue the configuration.
Adding the Golden Template into Desktone Tenant Portal
Step 1 Click on Pool Management -> Pattern Management and type in the Golden Windows 7 VM and click Reserve.
Step 2 Click Convert to Gold Pattern.
Step 3 Enter the values for the fields shown below and click Convert to Pattern.
Note Do not check the Override Licensing option if you want to use KMS.
Step 4 Verify the progress under Configuration -> Task and Events.
Step 5 Enable the Gold pattern by clicking Enable.
Step 6 Click Update.
Note Reseal option is required only when the Golden Pattern virtual machine is powered on.
Creating a Pool of Desktops in the Tenant Portal
Step 1 Click Pool Management -> Create Pool and select Individual Desktop Based.
Step 2 Enter the values and click Customize Pool.
Note There are two desktop types: Static and Dynamic. Static desktops are assigned to individual users and the same desktop is available to users at all times. Dynamic desktops are available to any user for the duration of their session.
Step 3 Enter the values under Policies as applicable for each tenant and click Review Pool.
Step 4 Click Create.
Step 5 You can monitor the task of new desktops being created under Pool Management --> Tasks and Events.
Note•Desktops will go through restart several times for customization steps like obtaining DHCP IP address, joining Domain, etc.,
•Two virtual displays with 128MB of video memory configuration are used by default when Desktone creates desktops for any desktop pool using PCoIP.
Figure 13 Desktops Created on a Tenant
5 Test Setup and Configuration
For this project, a single Cisco UCS B200 M3 blade server in a single chassis for performance was used in testing.
Cisco UCS Test Configuration for Single Blade Scalability
Figure 14 Cisco UCS B200 M3 Blade Server for Single Server Scalability
Hardware Components:
•2 X Cisco Nexus 7009
•2 X Cisco Catalyst 6506 with ASA-SM
•2 X Cisco ASR 9006
•2 X Cisco Nexus 5548UP Access Switches
•2 X Cisco UCS Fabric Interconnect 6248UPs
•1 X Cisco UCS B200-M3 - Virtual Desktop host:
–2 x E5-2690 @ 2.9 GHz CPUs
–256GB of memory (16 GB X 16 DIMMS @ 1666 MHz)
–1 x VIC-1240 Converged Network Adapter/Blade
•2 X Cisco UCS B series - Desktone Management hosts with minimum of:
–2 x Intel Xeon 5680 @ 3.333 GHz CPUs
–96 GB of memory
–1 X Converged Network Adapter/Blade
•1 X NFS System storage array:
–2 x Service Controllers
–2 x 10 GBe Ports per Controller
–SSD/SAS drives to support atleast 25 IOPS per desktop
Boot - The ratio of Read/Write is 9:1 (approx)
Run - The ratio of Read/Write is 4:3 (approx)
Detailed Windows Configuration
•215 Desktop Configuration: Windows 7 SP1 32 bit, 1vCPU, 1 GB of memory (1GB Reserved), 24 GB/VM, 2 virtual displays with 128MB of Video Memory.
•155 Desktop Configuration: Windows 7 SP1 32 bit, 1vCPU, 1.5 GB of memory (1GB Reserved), 24 GB/VM, 2 virtual displays with 128MB of Video Memory.
Testing Methodology and Success Criteria
All validation testing was conducted on-site within the Cisco RTP labs with joint support from Desktone. The test results focused on the entire process of the virtual desktop lifecycle by capturing metrics during the desktop boot-up, user logon and virtual desktop acquisition (also referred to as ramp-up,) user workload execution (also referred to as steady state), and user logoff for the Hosted VDI model under test.
Test metrics were gathered from the hypervisor, virtual desktop, storage, and load generation software to assess the overall success of an individual test cycle. Each test cycle was not considered passing unless all of the planned test users completed the ramp-up and steady state phases (described below) and unless all metrics were within the permissible thresholds as noted as success criteria.
Three successfully completed test cycles were conducted for this hardware configuration and the results were found to be relatively consistent from one test to the next.
Load Generation
Within the test environment, load generators were utilized to put demand on the system to simulate multiple users accessing the Desktone 5.3.2 environment and executing a typical end-user workflow. To generate load within the environment, an auxiliary software application was required to generate the end user connection to the Desktone environment, to provide unique user credentials, to initiate the workload, and to evaluate the end user experience.
In the Hosted VDI test environment, session launchers were used to simulate multiple users making a direct connection to the Desktone 5.3.2 connection server through a VMware PCoIP protocol connection.
User Workload Simulation - LoginVSI from Login Consultants
One of the most critical factors of validating a Desktone 5.3.2 deployment is identifying a real-world user workload that is easy for customers to replicate and standardized across platforms to allow customers to realistically test the impact of a variety of worker tasks. To accurately represent a real-world user workload, a third-party tool from Login Consultants was used throughout the Hosted VDI testing.
The tool has the benefit of taking measurements of the in-session response time, providing an objective way to measure the expected user experience for individual desktop throughout large scale testing, including login storms.
The Virtual Session Indexer (Login Consultants' Login VSI 3.6) methodology, designed for benchmarking Server Based Computing (SBC) and Virtual Desktop Infrastructure (VDI) environments is completely platform and protocol independent and hence allows customers to easily replicate the testing results in their environment.
Note In this testing, the tool was used to benchmark in a VDI environment only.
Login VSI calculates an index based on the amount of simultaneous sessions that can be run on a single machine.
Login VSI simulates a medium workload user (also known as knowledge worker) running generic applications such as: Microsoft Office 2007 or 2010, Internet Explorer 8 including a Flash video applet and Adobe Acrobat Reader (Note: For the purposes of this test, applications were installed locally).
Like real users, the scripted Login VSI session will leave multiple applications open at the same time. The medium workload is the default workload in Login VSI and was used for this testing. This workload emulated a medium knowledge working using Office, IE, printing and PDF viewing.
•Once a session has been started the medium workload will repeat every 12 minutes.
•During each loop the response time is measured every 2 minutes.
•The medium workload opens up to 5 apps simultaneously.
•The type rate is 160ms for each character.
•Approximately two minutes of idle time is included to simulate real-world users.
Each loop will open and use:
•Outlook 2007/2010, browse 10 messages.
•Internet Explorer, one instance is left open (BBC.co.uk), one instance is browsed to Wired.com, Lonelyplanet.com and gettheglass.com.
•480 p Flash application.
•Word 2007/2010, one instance to measure response time, one instance to review and edit document.
•Bullzip PDF Printer & Acrobat Reader, the word document is printed and reviewed to PDF.
•Excel 2007/2010, a very large randomized sheet is opened.
•PowerPoint 2007/2010, a presentation is reviewed and edited.
•7-zip: using the command line version the output of the session is zipped.
A graphical representation of the medium workload is shown below.
Figure 15 Graphical overview
You can obtain additional information on Login VSI from http://www.loginvsi.com.
Testing Procedure
The following protocol was used for each test cycle in this study to insure consistent results.
Pre-Test Setup for Single and Multi-Blade Testing
All virtual machines were shut down utilizing VMware vCenter. All Launchers for the test were also shut down from VMware vCenter. Then they were started until the required number of launchers was running with the Login VSI Agent at a "waiting for test to start" state.
Test Run Protocol
To simulate severe, real-world environments, Cisco requires the log-on and start-work sequence, known as Ramp Up, to complete in thirty minutes. Additionally, Cisco requires all sessions started to become active within two minutes after the session is launched.
For each of the three consecutive runs on single blade (155 or 215 User) the process detailed below was followed:
1. Time 0:00:00 Start ESXtop Logging on VDI host blade used in test run.
2. Time 0:05 Power-on desktops with the Desktone Tenant Appliance.
3. Time 0:35 All desktops started on a single blade.
4. Time 0:50 Start Login VSI 3.6 Test utilizing 11 Launchers.
5. Time 1:20 Launch desktop sessions.
6. Time 1:22 Desktop sessions become active.
7. Time 1:35 Login VSI Test Ends.
8. Time 1:50 Logoff desktop sessions.
9. Time 2:00 Terminate all logging.
Success Criteria
There were multiple metrics that were captured during each test run, but the success criteria for determining the maximum workload per blade maintaining acceptable end-user experience for a single test run was based on the key metric, VSI Max. The Login VSI Max evaluates the user response time during increasing user load and assesses the point at which end-user experience becomes unacceptable.
Login VSI Max
VSI Max represents the maximum number of users the environment can handle before serious performance degradation occurs. VSI Max is calculated based on the response times of individual users as indicated during the workload execution. The user response time has a threshold of 4000ms and all users response times are expected to be less than 4000ms in order to assume that the user interaction with the virtual desktop is at a functional level. VSI Max is reached when the response times reaches or exceeds 4000ms for 6 consecutive occurrences. If VSI Max is reached, that indicates the point at which the user experience has significantly degraded. The response time is generally an indicator of the host CPU resources, but this specific method of analyzing the user experience provides an objective method of comparison that can be aligned to host CPU performance.
Note In the prior version of Login VSI, the threshold for response time was 2000ms. The workloads and the analysis have been upgraded in Login VSI 3 to make the testing more aligned to real-world use. In the medium workload in Login VSI 3.0, a CPU intensive 480p flash movie is incorporated in each test loop. In general, the redesigned workload would result in an approximate 20% decrease in the number of users passing the test versus Login VSI 2.0 on the same server and storage hardware.
Calculating VSIMax
Typically the desktop workload is scripted in a 12-14 minute loop when a simulated Login VSI user is logged on. After the loop is finished it will restart automatically. Within each loop the response times of seven specific operations is measured in a regular interval: six times in within each loop. The response times if these seven operations are used to establish VSImax. The seven operations from which the response times are measured are:
•Copy new document from the document pool in the home drive
–This operation will refresh a new document to be used for measuring the response time. This activity is mostly a file-system operation.
•Starting Microsoft Word with a document.
–This operation will measure the responsiveness of the Operating System and the file system. Microsoft Word is started and loaded into memory; also the new document is automatically loaded into Microsoft Word. When the disk I/O is extensive or even saturated, this will impact the file open dialogue considerably.
•Starting the "File Open" dialogue.
–This operation is handled for small part by Word and a large part by the operating system. The file open dialogue uses generic subsystems and interface components of the OS. The OS provides the contents of this dialogue.
•Starting Notepad.
–This operation is handled by the OS (loading and initiating notepad.exe) and by the Notepad.exe itself through execution. This operation seems instant from an end-user's point of view.
•Starting the "Print" dialogue.
–This operation is handled for a large part by the OS subsystems, as the print dialogue is provided by the OS. This dialogue loads the print-subsystem and the drivers of the selected printer. As a result, this dialogue is also dependent on disk performance.
•Starting the "Search and Replace" dialogue.
–This operation is handled within the application completely; the presentation of the dialogue is almost instant. Serious bottlenecks on application level will impact the speed of this dialogue.
•Compress the document into a zip file with 7-zip command line.
–This operation is handled by the command line version of 7-zip. The compression will very briefly spike CPU and disk I/O.
These measured operations with Login VSI do hit considerably different subsystems such as CPU (user and kernel), Memory, Disk, the OS in general, the application itself, print, GDI, etc. These operations are specifically short by nature. When such operations are consistently long: the system is saturated because of excessive queuing on any kind of resource. As a result, the average response times will then escalate. This effect is clearly visible to end-users. When such operations consistently consume multiple seconds the user will regard the system as slow and unresponsive.
With Login VSI 3.0 and later it is now possible to choose between `VSImax Classic' and 'VSImax Dynamic' results analysis. For these tests, VSImax Dynamic analysis was utilized.
VSIMax Dynamic
VSImax Dynamic is calculated when the response times are consistently above a certain threshold. However, this threshold is now dynamically calculated on the baseline response time of the test.
Five individual measurements are weighted to better support this approach:
•Copy new doc from the document pool in the home drive: 100%
•Microsoft Word with a document: 33.3%
•Starting the "File Open" dialogue: 100%
•Starting "Notepad": 300%
•Starting the "Print" dialogue: 200%
•Starting the "Search and Replace" dialogue: 400%
•Compress the document into a zip file with 7-zip command line 200%
•A sample of the VSImax Dynamic response time calculation is displayed below:
Figure 16 VSIMax Dynamic Response Time
Then the average VSImax response time is calculated based on the amount of active Login VSI users logged on to the system. For this the average VSImax response times need to consistently higher than a dynamically calculated threshold.
To determine this dynamic threshold, first the average baseline response time is calculated. This is done by averaging the baseline response time of the first 15 Login VSI users on the system.
The formula for the dynamic threshold is: Avg. Baseline Response Time x 125% + 3000. As a result, when the baseline response time is 1800, the VSImax threshold will now be 1800 x 125% + 3000 = 5250ms.
Especially when application virtualization is used, the baseline response time can wildly vary per vendor and streaming strategy. Therefore it is recommend to use VSImax Dynamic when comparisons are made with application virtualization or anti-virus agents. The resulting VSImax Dynamic scores are aligned again with saturation on a CPU, Memory or Disk level, also when the baseline response time are relatively high.
Determining VSIMax
The Login VSI analyzer will automatically identify the VSImax. In the example below the VSImax is 98. The analyzer will automatically determine "stuck sessions" and correct the final VSImax score.
•Vertical axis: Response Time in milliseconds
•Horizontal axis: Total Active Sessions
Figure 17 Sample Login VSI Analyzer Graphic Output
•Red line: Maximum Response (worst response time of an individual measurement within a single session)
•Orange line: Average Response Time within for each level of active sessions
•Blue line: the VSImax average.
•Green line: Minimum Response (best response time of an individual measurement within a single session)
In testing, the total number of users in the test run had to login, become active and run at least one test loop and log out automatically without reaching the VSI Max to be considered a success.
Note A technical issue was discovered with the VSIMax dynamic calculation in testing on Cisco UCS B200 M3 blade servers where the VSIMax Dynamic was not reached during extreme conditions. Working with Login Consultants, a methodology was devised to validate the testing without reaching VSIMax Dynamic until such time as a new calculation is available.
The Login VSI "pass" criteria, accepted by Login Consultants for this testing, is as follows:
•Cisco will run tests at a session count level that effectively utilizes the blade capacity measured by CPU utilization, Memory utilization, Storage utilization and Network utilization.
•Will utilize Login VSI to launch version 3.6 medium workloads, including flash.
•Number of Launched Sessions must equal Active Sessions within two minutes of the last session launched in a test.
•The Desktone Enterprise Center will be monitored throughout the steady state to insure that:
– All running sessions report in use throughout the steady state
– No sessions move to unregistered or agent not available state at any time during Steady State
•Within 20 minutes of the end of the test, all sessions on all Launchers must have logged out automatically and the Login VSI Agent must have shut down.
•The Cisco Validated Design will be published with the process recommended above and will note that VSIMax dynamic was not reached during testing due to a technical issue with the analyzer formula that calculates VSIMax.
6 VDI Test Results
The purpose of this testing is to provide the data needed to validate Desktone 5.3.2 infrastructure in an end-to-end Cisco environment.
Server scalability based on desktops supported in a single server is very useful to determine the total number of servers needed for a deployment. Different CPU, memory, storage and network metrics can be used to estimate sizing guidelines for necessary data center components and overall deployment. The information contained in this section provides data points that a customer may reference in designing their own implementations. These validation results are an example of what is possible under the specific environment conditions outlined here, and do not represent the full characterization of Desktone 5.3.2 with VMware vSphere 5.1.
The results provided in this section are based on the testing done on a Cisco UCS B200 M3 blade server running ESXi 5.1 hypervisor managed by vCenter 5.1 to host Desktone automated pools with static assignment and provision Windows 7 SP1 full virtual desktops using a NFS storage system.
Two test sequences, each containing three consecutive test runs generating the same result, were performed to establish single server performance.
Login VSIMax Score
One of the stress tests on a single blade server was conducted to establish the official Login VSI Max Score. Test results show that 215 Medium Workload (with flash) Windows 7 SP1 sessions on a single server achieved a Login VSI Max score of 203. The Login VSI score was achieved on three consecutive runs and is shown in Figure 18 below.
Figure 18 Login VSIMax Reached: 203 Users
Single Blade Maximum Recommended Workload
This section details the results from the Desktone 5.3.2 Hosted VDI single blade server validation testing. The primary success criteria used to validate the overall success of the test cycle is an output chart from Login Consultants' VSI Analyzer Professional Edition, VSIMax Dynamic for the Medium workload (with Flash.)
Note VSIMax Dynamic in testing was not reached due to a technical issue with the analyzer formula that calculates VSIMax. See section Determining VSIMax for a discussion of this issue.
A single server test using approximately 24% lower user density than prescribed by the Login VSI Max was executed to achieve a successful pass of the test with server hardware performance in a realistic range. The recommended maximum load for Desktone 5.3.2 Hosted Virtual Desktops on a Cisco UCS B200 M3 blade sever running the Login VSI Medium workload is 155 desktops given adequate storage capability and enough CPU resources. CPU utilization limit of 90% was a consideration to determine the maximum virtual machine density per blade.
Additionally, graphs detailing the CPU, Memory and network utilization during boot phase and peak session loads are also presented.
The charts below present the recommended maximum Login VSI Medium workload loading on a single blade server. The maximum recommended workload for Desktone 5.3.2 Windows 7 32-bit virtual desktops is 155 per B200 M3 blade server. This charts shows that the average and maximum application response times are below 1.5secs and 2.5secs respectively.
Figure 19 155 Desktone 5.3.2 Desktop Sessions on VMware ESXi 5.1 below 2500 ms
Boot Phase Performance Results
The following graphs detail CPU, Memory, Disk and Network performance on a single Cisco UCS B200-M3 blade server during the boot phase collected by esxtop polling data every 10 secs.
The first two charts show the CPU and Core utilizations well below 35% during the boot phase.
The third chart is the memory utilization chart showing the memory allocated to the virtual desktops as they boot up. Because enough memory is available, 1.5GB of RAM was assigned to each VM. A 1GB memory reservation for each VM was configured to minimize or prevent the hypervisor from swapping.
Subsequent charts show the storage performance, in terms of read and write I/O load on the storage system generated by 155 VMs on a single server during the boot phase. The I/O Bandwidth data chart shows the network bandwidth utilization associated with the storage traffic.
Note Some of the charts are in Mbytes/sec instead of Mbits/sec. and can be a starting point for estimating the bandwidth needs in the data center.
Figure 20 155 Users Single Cisco UCS B200 M3 CPU Core Utilization - Boot Phase
Figure 21 155 Users Single Cisco UCS B200 M3 Processor Time - Boot Phase
Figure 22 155 Users Single Cisco UCS B200 M3 NonKernel Memory - Boot Phase
Figure 23 155 Users Single Cisco UCS B200 M3 Cisco VIC1240 MLOM Network Adapter Mbps Receive/Transmit - Boot Phase
Figure 24 155 Users Single Cisco UCS B200 M3 NFS Read/Write IOPS - Boot Phase
Figure 25 155 Users Single Cisco UCS B200 M3 NFS Read/Write Latency - Boot Phase
Figure 26 155 Users Single Cisco UCS B200 M3 NFS MBps Read/Write - Boot Phase
Test Phase Performance Results
The following graphs detail CPU, Memory, Disk and Network performance on the Single Cisco UCS B200-M3 blade servers during the test phase collected by esxtop polling data every 10 secs at the recommended maximum load of 155 Windows 7 virtual desktops.
The first charts show the Core utilizations of ~90% during the steady workload phase. The second chart shows the CPU utilization time of ~55% which indicates that the CPU resources were not overcommitted.
The third chart is the memory utilization chart showing the memory allocated to the virtual desktops during the entire workload. Because enough memory is available, 1.5GB of RAM was assigned to each virtual machine. A 1GB memory reservation for each virtual machine was configured to minimize or prevent the hypervisor from swapping.
The next few charts show storage and network performance, in terms of read and write I/O load on the network and the storage system generated 155 VMs on a single server during the entire workload. The I/O Bandwidth data chart shows the network bandwidth utilization associated with the storage traffic.
NOTE: Some of the charts are in Mbytes/sec instead of Mbits/sec. and can be a starting point for estimating the bandwidth needs in the data center.
Figure 27 155 Users Single Cisco UCS B200 M3 CPU Core Utilization - Test Phase
Figure 28 155 Users Single Cisco UCS B200 M3 CPU Processor Time - Test Phase
Figure 29 155 Users Single Cisco UCS B200 M3 NonKernel Memory - Test Phase
Figure 30 155 Users Single Cisco UCS B200 M3 Cisco VIC1240 MLOM Network Adapter Mbps Receive/Transmit - Test Phase
Figure 31 155 Users Single Cisco UCS B200 M3 NFS Read/Write IOPS - Test Phase
Figure 32 155 Users Single Cisco UCS B200 M3 NFS Read/Write Latency - Test Phase
Figure 33 155 Users Single Cisco UCS B200 M3 NFS MBps Read/Write - Test Phase
7 Appendix
Cisco Nexus 5548 configurations
!Time: Sat Jun 1 11:53:31 2013version 5.2(1)N1(2a)hostname VXIaaS-N5K-1no feature telnetcfs eth distributefeature udldfeature interface-vlanfeature lacpfeature vpcfeature lldpfeature fexusername admin password 5 $1$yZIj2hxG$uOooTIZcF1u4hbEkhFK1z. role network-adminno password strength-checkbanner motd #Nexus 5000 Switchip domain-lookupip access-list BULK-DATA10 permit tcp any eq 32111 anyip access-list CALL-SIGNALING10 permit tcp any any eq 274820 permit tcp any any eq 506030 permit tcp any any eq 2000ip access-list MULTIMEDIA-STREAMING10 permit tcp any eq 9427 anyip access-list TRANSACTIONAL-DATA10 permit tcp any eq 3389 any20 permit udp any eq 50002 any30 permit tcp any eq 50002 any40 permit udp any eq 4172 any50 permit tcp any eq 4172 any60 permit tcp any eq 1494 anyclass-map type qos class-fcoeclass-map type qos match-any BULK-DATAmatch access-group name BULK-DATAclass-map type qos match-any CALL-SIGNALINGmatch access-group name CALL-SIGNALINGclass-map type qos match-any TRANSACTIONAL-DATAmatch access-group name TRANSACTIONAL-DATAclass-map type qos match-any MULTIMEDIA-STREAMINGmatch access-group name MULTIMEDIA-STREAMINGclass-map type queuing BULKclass-map type queuing BULK-DATAclass-map type queuing class-fcoematch qos-group 1class-map type queuing class-all-floodmatch qos-group 2class-map type queuing class-ip-multicastmatch qos-group 2policy-map type qos HVD-ACCESS-PORTclass CALL-SIGNALINGset dscp 24class MULTIMEDIA-STREAMINGset dscp 26class TRANSACTIONAL-DATAset dscp 18class BULK-DATAset dscp 10class class-defaultpolicy-map type queuing UPSTREAM-PORTclass type queuing class-defaultclass-map type network-qos class-fcoematch qos-group 1class-map type network-qos class-all-floodmatch qos-group 2class-map type network-qos class-ip-multicastmatch qos-group 2policy-map type network-qos jumboclass type network-qos class-fcoepause no-dropmtu 2158class type network-qos class-defaultmtu 9216multicast-optimizesystem qosservice-policy type network-qos jumbopolicy-map type control-plane copp-system-policy-customizedclass copp-system-class-defaultpolice cir 2048 kbps bc 6400000 byteshardware profile tcam feature interface-qos limit 50fex 110pinning max-links 1description "FEX0110"diagnostic bootup level completesnmp-server user admin network-admin auth md5 0x5b310d304479611ca2ebf839f5c267d7 priv 0x5b310d304479611ca2ebf839f5c267d7 localizedkeyntp server 10.8.79.254 prefervrf context managementip route 0.0.0.0/0 10.8.66.1vlan configuration 731service-policy type qos input HVD-ACCESS-PORTvlan 1vlan 505name VXIaaS-DH-Machinesvlan 711name Tenant-1-VM-Avlan 721name Tenant-2-VM-Avlan 731name Tenant-3-VM-Avlan 741name Tenant-4-VM-Avlan 751name Tenant-5-VM-Avlan 761name Tenant-6-VM-Avlan 844name HVXI -NFSvlan 864name VXIaaS-SP-Infravlan 865name VXIaaS-SP-DHvlan 867name VXIaaS-SP-Hypervisor-MGMTvlan 868name VXIaaS-SP-vMotionvlan 941name Tenant-4-vWAASvlan 980name Desktone-L2-Link-Localvpc domain 500peer-keepalive destination 10.8.66.9 source 10.8.66.8port-profile default max-ports 512interface Vlan1interface port-channel1description VXIaaS-N5K VPC Peerswitchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980spanning-tree port type networkspeed 10000vpc peer-linkinterface port-channel55description VXIaaS-N7K Pairswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865,867-868,941,980spanning-tree port type normalspeed 10000vpc 55interface port-channel60description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867spanning-tree port type edgeinterface port-channel65description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867spanning-tree port type edgeinterface port-channel100description VXIaaS-6100-1-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,941,980spanning-tree port type edge trunkspanning-tree bpdufilter enablespeed 10000vpc 100interface port-channel110switchport mode fex-fabricfex associate 110spanning-tree port type edge trunkvpc 110interface port-channel150description VXIaaS-6100-2-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980spanning-tree port type edge trunkspanning-tree bpdufilter enablespeed 10000vpc 150interface port-channel151description VXIaaS-6100-2-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980spanning-tree port type edge trunkspanning-tree bpdufilter enablespeed 10000vpc 151interface port-channel200description VXIaaS-6100-1-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,941,980spanning-tree port type edge trunkspanning-tree bpdufilter enablespeed 10000vpc 200interface Ethernet1/1description VXIaaS-N5K-1switchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 1 mode activeinterface Ethernet1/2description VXIaaS-N5K-1switchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 1 mode activeinterface Ethernet1/3description VXIaaS-N5K-1switchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 1 mode activeinterface Ethernet1/4description VXIaaS-N5K-1switchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 1 mode activeinterface Ethernet1/5interface Ethernet1/6interface Ethernet1/7interface Ethernet1/8interface Ethernet1/9interface Ethernet1/10interface Ethernet1/11interface Ethernet1/12interface Ethernet1/13description VXIaaS-N7Kswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 55 mode activeinterface Ethernet1/14description VXIaaS-N7Kswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 55 mode activeinterface Ethernet1/15interface Ethernet1/16interface Ethernet1/17interface Ethernet1/18interface Ethernet1/19interface Ethernet1/20interface Ethernet1/21interface Ethernet1/22interface Ethernet1/23interface Ethernet1/24interface Ethernet1/25description VXIaaS-6100-2-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980channel-group 150 mode activeinterface Ethernet1/26description VXIaaS-6100-2-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980channel-group 150 mode activeinterface Ethernet1/27description VXIaaS-6100-2-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980channel-group 151 mode activeinterface Ethernet1/28description VXIaaS-6100-2-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980channel-group 151 mode activeinterface Ethernet1/29interface Ethernet1/30interface Ethernet1/31description VXIaaS-6100-1-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,941,980channel-group 100 mode activeinterface Ethernet1/32description VXIaaS-6100-1-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,941,980channel-group 200 mode activeinterface Ethernet2/1interface Ethernet2/2interface Ethernet2/3interface Ethernet2/4interface Ethernet2/5interface Ethernet2/6interface Ethernet2/7interface Ethernet2/8interface Ethernet2/9interface Ethernet2/10interface Ethernet2/11interface Ethernet2/12interface Ethernet2/13interface Ethernet2/14interface Ethernet2/15switchport mode fex-fabricfex associate 110channel-group 110interface Ethernet2/16switchport mode fex-fabricfex associate 110channel-group 110interface mgmt0ip address 10.8.66.8/24interface Ethernet110/1/1description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 60 mode activeinterface Ethernet110/1/2description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 60 mode activeinterface Ethernet110/1/3description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 60 mode activeinterface Ethernet110/1/4description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 60 mode activeinterface Ethernet110/1/5description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 65 mode activeinterface Ethernet110/1/6description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 65 mode activeinterface Ethernet110/1/7description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 65 mode activeinterface Ethernet110/1/8description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 65 mode activeinterface Ethernet110/1/9interface Ethernet110/1/10interface Ethernet110/1/11interface Ethernet110/1/12interface Ethernet110/1/13interface Ethernet110/1/14interface Ethernet110/1/15interface Ethernet110/1/16interface Ethernet110/1/17interface Ethernet110/1/18interface Ethernet110/1/19interface Ethernet110/1/20interface Ethernet110/1/21interface Ethernet110/1/22interface Ethernet110/1/23interface Ethernet110/1/24interface Ethernet110/1/25interface Ethernet110/1/26interface Ethernet110/1/27interface Ethernet110/1/28interface Ethernet110/1/29interface Ethernet110/1/30interface Ethernet110/1/31interface Ethernet110/1/32interface Ethernet110/1/33interface Ethernet110/1/34interface Ethernet110/1/35interface Ethernet110/1/36interface Ethernet110/1/37interface Ethernet110/1/38interface Ethernet110/1/39interface Ethernet110/1/40interface Ethernet110/1/41interface Ethernet110/1/42interface Ethernet110/1/43interface Ethernet110/1/44interface Ethernet110/1/45interface Ethernet110/1/46interface Ethernet110/1/47interface Ethernet110/1/48clock timezone EST -5 0clock summer-time EDT 2 Sun Mar 2:00 1 Sun Nov 2:00 60line consoleexec-timeout 0line vtyboot kickstart bootflash:/n5000-uk9-kickstart.5.2.1.N1.2a.binboot system bootflash:/n5000-uk9.5.2.1.N1.2a.bin!Time: Sat Jun 1 12:19:44 2013version 5.2(1)N1(2a)hostname VXIaaS-N5K-2no feature telnetcfs eth distributefeature udldfeature interface-vlanfeature lacpfeature vpcfeature lldpfeature fexusername admin password 5 $1$vab55EyW$H21ygbp9047zkiTIjFkx60 role network-adminno password strength-checkbanner motd #Nexus 5000 Switchssh key rsa 2048ip domain-lookupip access-list BULK-DATA10 permit tcp any any eq 2748ip access-list CALL-SIGNALING10 permit tcp any any eq 274820 permit tcp any any eq 506030 permit tcp any any eq 2000ip access-list MULTIMEDIA-STREAMING10 permit tcp any eq 9427 anyip access-list TRANSACTIONAL-DATA10 permit tcp any eq 3389 any20 permit udp any eq 50002 any30 permit tcp any eq 50002 any40 permit udp any eq 4172 any50 permit tcp any eq 4172 any60 permit tcp any eq 1494 anyclass-map type qos class-fcoeclass-map type qos match-any BULK-DATAmatch access-group name BULK-DATAclass-map type qos match-any CALL-SIGNALINGmatch access-group name CALL-SIGNALINGclass-map type qos match-any TRANSACTIONAL-DATAmatch access-group name TRANSACTIONAL-DATAclass-map type qos match-any MULTIMEDIA-STREAMINGmatch access-group name MULTIMEDIA-STREAMINGclass-map type queuing class-fcoematch qos-group 1class-map type queuing class-all-floodmatch qos-group 2class-map type queuing class-ip-multicastmatch qos-group 2policy-map type qos HVD-ACCESS-PORTclass CALL-SIGNALINGset dscp 24class MULTIMEDIA-STREAMINGset dscp 26class TRANSACTIONAL-DATAset dscp 18class BULK-DATAset dscp 10class class-defaultclass-map type network-qos class-fcoematch qos-group 1class-map type network-qos class-all-floodmatch qos-group 2class-map type network-qos class-ip-multicastmatch qos-group 2policy-map type network-qos jumboclass type network-qos class-fcoepause no-dropmtu 2158class type network-qos class-defaultmtu 9216multicast-optimizesystem qosservice-policy type network-qos jumbopolicy-map type control-plane copp-system-policy-customizedclass copp-system-class-defaultpolice cir 2048 kbps bc 6400000 byteshardware profile tcam feature interface-qos limit 50fex 110pinning max-links 1description "FEX0110"diagnostic bootup level completesnmp-server user admin network-admin auth md5 0x5fad43c003bbc5cc41071a4c7ca92e5e priv 0x5fad43c003bbc5cc41071a4c7ca92e5e localizedkeyntp server 10.8.79.254vrf context managementip route 0.0.0.0/0 10.8.66.1vlan configuration 731service-policy type qos input HVD-ACCESS-PORTvlan 1vlan 505name VXIaaS-DH-Machinesvlan 711name Tenant-1-VM-Avlan 721name Tenant-2-VM-Avlan 731name Tenant-3-VM-Avlan 741name Tenant-4-VM-Avlan 751name Tenant-5-VM-Avlan 761name Tenant-6-VM-Avlan 844name HVXI- NFSvlan 864name VXIaaS-SP-Infravlan 865name VXIaaS-SP-DHvlan 867name VXIaaS-SP-Hypervisor-MGMTvlan 868name VXIaaS-SP-vMotionvlan 941name Tenant-4-vWAASvlan 980name Desktone-L2-Link-Localvpc domain 500peer-keepalive destination 10.8.66.8 source 10.8.66.9auto-recoveryport-profile default max-ports 512interface Vlan1interface port-channel1description VXIaaS-N5K VPC Peerswitchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980spanning-tree port type networkspeed 10000vpc peer-linkinterface port-channel55description VXiaaS-N7K Pairswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865,867-868,941,980spanning-tree port type normalspeed 10000vpc 55interface port-channel60description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867spanning-tree port type edgeinterface port-channel65description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867spanning-tree port type edgeinterface port-channel100description VXIaaS-6100-1-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,941,980spanning-tree port type edge trunkspanning-tree bpdufilter enablespeed 10000vpc 100interface port-channel110switchport mode fex-fabricfex associate 110spanning-tree port type edge trunkvpc 110interface port-channel150description VXIaaS-6100-2-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980spanning-tree port type edge trunkspanning-tree bpdufilter enablespeed 10000vpc 150interface port-channel151description VXIaaS-6100-2-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980spanning-tree port type edge trunkspanning-tree bpdufilter enablespeed 10000vpc 151interface port-channel200description VXIaaS-6100-1-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,941,980spanning-tree port type edge trunkspanning-tree bpdufilter enablespeed 10000vpc 200interface Ethernet1/1description VXIaaS-N5K-1switchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 1 mode activeinterface Ethernet1/2description VXIaaS-N5K-1switchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 1 mode activeinterface Ethernet1/3description VXIaaS-N5K-1switchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 1 mode activeinterface Ethernet1/4description VXIaaS-N5K-1switchport mode trunkswitchport trunk allowed vlan 505,711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 1 mode activeinterface Ethernet1/5interface Ethernet1/6interface Ethernet1/7interface Ethernet1/8interface Ethernet1/9interface Ethernet1/10interface Ethernet1/11interface Ethernet1/12interface Ethernet1/13description VXIaaS-N7Kswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 55 mode activeinterface Ethernet1/14description VXIaaS-N7Kswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865,867-868,941,980channel-group 55 mode activeinterface Ethernet1/15interface Ethernet1/16interface Ethernet1/17interface Ethernet1/18interface Ethernet1/19interface Ethernet1/20interface Ethernet1/21interface Ethernet1/22interface Ethernet1/23interface Ethernet1/24interface Ethernet1/25description VXIaaS-6100-2-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980channel-group 150 mode activeinterface Ethernet1/26description VXIaaS-6100-2-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980channel-group 150 mode activeinterface Ethernet1/27description VXIaaS-6100-2-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980channel-group 151 mode activeinterface Ethernet1/28description VXIaaS-6100-2-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,980channel-group 151 mode activeinterface Ethernet1/29interface Ethernet1/30interface Ethernet1/31description VXIaaS-6100-1-aswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,941,980channel-group 100 mode activeinterface Ethernet1/32description VXIaaS-6100-1-bswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864,867-868,941,980channel-group 200 mode activeinterface Ethernet2/1interface Ethernet2/2interface Ethernet2/3interface Ethernet2/4interface Ethernet2/5interface Ethernet2/6interface Ethernet2/7interface Ethernet2/8interface Ethernet2/9interface Ethernet2/10interface Ethernet2/11interface Ethernet2/12interface Ethernet2/13interface Ethernet2/14interface Ethernet2/15switchport mode fex-fabricfex associate 110channel-group 110interface Ethernet2/16switchport mode fex-fabricfex associate 110channel-group 110interface mgmt0ip address 10.8.66.9/24interface Ethernet110/1/1description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 60 mode activeinterface Ethernet110/1/2description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 60 mode activeinterface Ethernet110/1/3description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 60 mode activeinterface Ethernet110/1/4description vxiaas-n1010-aswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 60 mode activeinterface Ethernet110/1/5description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 65 mode activeinterface Ethernet110/1/6description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 65 mode activeinterface Ethernet110/1/7description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 65 mode activeinterface Ethernet110/1/8description vxiaas-n1010-bswitchport mode trunkswitchport trunk native vlan 867switchport trunk allowed vlan 711,867channel-group 65 mode activeinterface Ethernet110/1/9interface Ethernet110/1/10interface Ethernet110/1/11interface Ethernet110/1/12interface Ethernet110/1/13interface Ethernet110/1/14interface Ethernet110/1/15interface Ethernet110/1/16interface Ethernet110/1/17interface Ethernet110/1/18interface Ethernet110/1/19interface Ethernet110/1/20interface Ethernet110/1/21interface Ethernet110/1/22interface Ethernet110/1/23interface Ethernet110/1/24interface Ethernet110/1/25interface Ethernet110/1/26interface Ethernet110/1/27interface Ethernet110/1/28interface Ethernet110/1/29interface Ethernet110/1/30interface Ethernet110/1/31interface Ethernet110/1/32interface Ethernet110/1/33interface Ethernet110/1/34interface Ethernet110/1/35interface Ethernet110/1/36interface Ethernet110/1/37interface Ethernet110/1/38interface Ethernet110/1/39interface Ethernet110/1/40interface Ethernet110/1/41interface Ethernet110/1/42interface Ethernet110/1/43interface Ethernet110/1/44interface Ethernet110/1/45interface Ethernet110/1/46interface Ethernet110/1/47interface Ethernet110/1/48clock timezone EST -5 0clock summer-time EDT 2 Sun Mar 2:00 1 Sun Nov 2:00 60line consoleexec-timeout 0line vtyboot kickstart bootflash:/n5000-uk9-kickstart.5.2.1.N1.2a.binboot system bootflash:/n5000-uk9.5.2.1.N1.2a.binCisco Nexus 7009 configurations:!Time: Sat Jun 1 12:22:38 2013version 6.1(2)hostname VXIaaS-DC-N7K-1vdc VXIaaS-DC-N7K-1 id 1limit-resource module-type f2allocate interface Ethernet4/1-48allocate interface Ethernet5/1-48limit-resource vlan minimum 16 maximum 4094limit-resource monitor-session minimum 0 maximum 2limit-resource monitor-session-erspan-dst minimum 0 maximum 23limit-resource vrf minimum 2 maximum 4096limit-resource port-channel minimum 0 maximum 768limit-resource u4route-mem minimum 96 maximum 96limit-resource u6route-mem minimum 24 maximum 24limit-resource m4route-mem minimum 58 maximum 58limit-resource m6route-mem minimum 8 maximum 8limit-resource monitor-session-inband-src minimum 0 maximum 1feature telnetcfs eth distributefeature ospffeature bgpfeature eigrpfeature interface-vlanfeature dot1xfeature hsrpfeature lacpfeature dhcpfeature vpcfeature wccplogging level pixm 2username admin password 5 $1$QAUkrln2$EgIAciPkN0CLqHbf7SmQf/ role network-adminno password strength-checkip domain-lookupip domain-name vxiaas.localip domain-list cisco.comip domain-list vxiaas.localip name-server 10.8.64.100class-map type qos match-any VOICEmatch dscp 46class-map type qos match-all BULK-DATAmatch dscp 10,12,14class-map type qos match-any SCAVENGERmatch dscp 8class-map type qos match-any CALL-SIGNALINGmatch dscp 24class-map type qos match-any NETWORK-CONTROLmatch dscp 48class-map type qos match-any TRANSACTIONAL-DATAmatch dscp 18,20,22class-map type qos match-any MULTIMEDIA-STREAMINGmatch dscp 26,28,30class-map type qos match-any MULTIMEDIA-CONFERENCINGmatch dscp 34,36,38class-map type queuing match-any BROADCAST-VIDEOpolicy-map type queuing VPN-EDGEcopp profile strictsnmp-server user admin network-admin auth md5 0xde4b54725e78b89933e0602c1a882917 priv 0xde4b54725e78b89933e0602c1a882917 localizedkeyrmon event 1 log trap public description FATAL(1) owner PMON@FATALrmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICALrmon event 3 log trap public description ERROR(3) owner PMON@ERRORrmon event 4 log trap public description WARNING(4) owner PMON@WARNINGrmon event 5 log trap public description INFORMATION(5) owner PMON@INFOntp server 10.8.79.254vlan 1,711,721,731,741,751,761,844,864-868,941,980vrf context GT-Outvrf context T1-Invrf context T1-Outvrf context T2-Invrf context T2-Outvrf context T3-Invrf context T3-Outvrf context T4-Invrf context T4-Outip wccp 61ip wccp 62vrf context T5-Invrf context T5-Outvrf context managementip route 0.0.0.0/0 10.8.66.1vlan 711name Tenant-1-VM-Avlan 721name Tenant-2-VM-Avlan 731name Tenant-3-VM-Avlan 741name Tenant-4-VM-Avlan 751name Tenant-5-VM-Avlan 761name Tenant-6-VM-Avlan 844name HVXI-NFSvlan 864name VXIaaS-SP-Infravlan 865name VXIaaS-SP-DHvlan 866name VXIaaS-OOB-MGMTvlan 867name VXIaaS-SP-Hypervisor-MGMTvlan 868name VXIaaS-SP-vMotionvlan 941name Tenant-4-vWAASvlan 980name Desktone-L2-Link-Localspanning-tree vlan 711,721,731,741,751,761,864-868,980 priority 4096ip prefix-list BGP-DIRECT seq 5 permit 10.8.0.0/16 le 30ip prefix-list COMMON-SUM seq 5 permit 10.10.0.0/17ip prefix-list EIGRP-BGP seq 5 permit 10.10.0.0/17route-map BGP-DIRECT permit 10match ip address prefix-list BGP-DIRECTroute-map COMMON-SUM permit 10match ip address prefix-list COMMON-SUMroute-map EIGRP-BGP permit 10match ip address prefix-list EIGRP-BGPservice dhcpip dhcp relayvpc domain 42peer-switchrole priority 100peer-keepalive destination 10.8.66.22 source 10.8.66.21peer-gatewayauto-recoveryip arp synchronizeinterface Vlan1interface Vlan711vrf member T1-Inno ip redirectsip address 10.9.104.2/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 711priority 110ip 10.9.104.1ip dhcp relay address 10.9.10.150ip dhcp relay address 10.9.10.151description Tenant 1 VMsno shutdownmtu 9216interface Vlan721vrf member T2-Inno ip redirectsip address 10.9.112.2/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 721preemptpriority 110ip 10.9.112.1ip dhcp relay address 10.9.20.150ip dhcp relay address 10.9.20.151description Tenant 2 VMsno shutdownmtu 9216interface Vlan731vrf member T3-Inno ip redirectsip address 10.9.120.2/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 731preemptpriority 110ip 10.9.120.1ip dhcp relay address 10.9.30.150ip dhcp relay address 10.9.30.151description Tenant 3 VMsno shutdownmtu 9216interface Vlan741vrf member T4-Inno ip redirectsip address 10.9.128.2/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 741preemptpriority 110ip 10.9.128.1ip dhcp relay address 10.9.40.150ip dhcp relay address 10.9.40.151description Tenant 4 VMsno shutdownmtu 9216interface Vlan751vrf member T5-Inno ip redirectsip address 10.9.136.2/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 751preemptpriority 110ip 10.9.136.1ip dhcp relay address 10.9.50.150ip dhcp relay address 10.9.50.151description Tenant 5 VMsno shutdownmtu 9216interface Vlan864no ip redirectsip address 10.8.64.2/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 864priority 110ip 10.8.64.1description VXIaaS-SP-Infrano shutdownmtu 9216interface Vlan865no ip redirectsip address 10.8.65.2/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 865priority 110ip 10.8.65.1description VXIaaS-SP-DHno shutdownmtu 9216interface Vlan866no ip redirectsip address 10.8.66.2/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 866priority 110ip 10.8.66.1description VXIaaS-OOB-MGMTno shutdownmtu 9216interface Vlan867no ip redirectsip address 10.8.67.2/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 867priority 110ip 10.8.67.1description VXIaaS-SP-Hypervisor-MGMTno shutdownmtu 9216interface Vlan868no ip redirectsip address 10.8.68.2/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 868priority 110ip 10.8.68.1description VXIaaS-SP-vMotionno shutdownmtu 9216interface Vlan941vrf member T4-Outno ip redirectsip address 10.9.192.26/29ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.10hsrp version 2hsrp 941preemptpriority 110ip 10.9.192.25ip dhcp relay address 10.9.40.150ip dhcp relay address 10.9.40.151description Tenant 4 vWAASno shutdownmtu 9216interface port-channel1description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980spanning-tree port type networkmtu 9216vpc peer-linkinterface port-channel2description NON-vPC Peer Link Between N7Ksmtu 9216interface port-channel2.718description Tenant 1 N7K-N7K Outsidemtu 9216encapsulation dot1q 718vrf member T1-Outno ip redirectsip address 10.8.78.25/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.719description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 719vrf member T1-Inno ip redirectsip address 10.8.78.29/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.728description Tenant 2 N7K-N7K Outsidemtu 9216encapsulation dot1q 728vrf member T2-Outno ip redirectsip address 10.8.78.57/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.729description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 729vrf member T2-Inno ip redirectsip address 10.8.78.61/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.738description Tenant 3 N7K-N7K Outsidemtu 9216encapsulation dot1q 738vrf member T3-Outno ip redirectsip address 10.8.78.89/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.739description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 739vrf member T3-Inno ip redirectsip address 10.8.78.93/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.748description Tenant 4 N7K-N7K Outsidemtu 9216encapsulation dot1q 748vrf member T4-Outno ip redirectsip address 10.8.78.121/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.749description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 749vrf member T4-Inno ip redirectsip address 10.8.78.125/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.758description Tenant 5 N7K-N7K Outsidemtu 9216encapsulation dot1q 758vrf member T5-Outno ip redirectsip address 10.8.78.153/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.759description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 759vrf member T5-Inno ip redirectsip address 10.8.78.157/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.788description Global Tenant N7K-N7K Outsidemtu 9216encapsulation dot1q 788vrf member GT-Outno ip redirectsip address 10.8.78.249/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel3description VXIaaS-OOB-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866vpc 3interface port-channel4description VXIaaS-OOB-Tenant-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866vpc 4interface port-channel5description Common N5K Pairswitchportswitchport mode trunkswitchport trunk allowed vlan 844,864-865spanning-tree port type edge trunkmtu 9216vpc 5interface port-channel6description VXIaaS-OOB-SP-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866vpc 6interface port-channel55description VXIaaS-SP-5K-Pairswitchportswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865switchport trunk allowed vlan add 867-868,941,980spanning-tree port type normalmtu 9216vpc 55interface port-channel103description L3 Link To Service 6500 VSSno lacp graceful-convergenceinterface port-channel103.611description T1 Outside Service 6500encapsulation dot1q 611vrf member T1-Outno ip redirectsip address 10.8.76.1/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel103.613description T1 Inside Service 6500encapsulation dot1q 613vrf member T1-Inno ip redirectsip address 10.8.76.9/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel103.621description T2 Outside Service 6500encapsulation dot1q 621vrf member T2-Outno ip redirectsip address 10.8.76.65/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel103.623description T2 Inside Service 6500encapsulation dot1q 623vrf member T2-Inno ip redirectsip address 10.8.76.73/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel103.631description T3 Outside Service 6500encapsulation dot1q 631vrf member T3-Outno ip redirectsip address 10.8.76.129/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel103.633description T3 Inside Service 6500encapsulation dot1q 633vrf member T3-Inno ip redirectsip address 10.8.76.137/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel103.641description T4 Outside Service 6500encapsulation dot1q 641vrf member T4-Outno ip redirectsip address 10.8.76.193/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdownip wccp 61 redirect ininterface port-channel103.643description T4 Inside Service 6500encapsulation dot1q 643vrf member T4-Inno ip redirectsip address 10.8.76.201/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel103.651description T5 Outside Service 6500encapsulation dot1q 651vrf member T5-Outno ip redirectsip address 10.8.77.1/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel103.653description T5 Inside Service 6500encapsulation dot1q 653vrf member T5-Inno ip redirectsip address 10.8.77.9/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel103.681description Global Tenant Outside Service 6500encapsulation dot1q 681vrf member GT-Outno ip redirectsip address 10.8.77.193/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface Ethernet4/1description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980mtu 9216channel-group 1 mode activeno shutdowninterface Ethernet4/2description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980mtu 9216channel-group 1 mode activeno shutdowninterface Ethernet4/3interface Ethernet4/4interface Ethernet4/5description NON-vPC Peer Link Between N7Ksmtu 9216channel-group 2 mode activeno shutdowninterface Ethernet4/6description NON-vPC Peer Link Between N7Ksmtu 9216channel-group 2 mode activeno shutdowninterface Ethernet4/7interface Ethernet4/8interface Ethernet4/9interface Ethernet4/10interface Ethernet4/11interface Ethernet4/12interface Ethernet4/13interface Ethernet4/14interface Ethernet4/15interface Ethernet4/16interface Ethernet4/17description Common N5K Pairswitchportswitchport mode trunkswitchport trunk allowed vlan 844,864-865spanning-tree port type edge trunkmtu 9216channel-group 5 mode activeno shutdowninterface Ethernet4/18interface Ethernet4/19interface Ethernet4/20interface Ethernet4/21interface Ethernet4/22interface Ethernet4/23interface Ethernet4/24interface Ethernet4/25interface Ethernet4/26interface Ethernet4/27interface Ethernet4/28interface Ethernet4/29interface Ethernet4/30interface Ethernet4/31interface Ethernet4/32interface Ethernet4/33interface Ethernet4/34interface Ethernet4/35interface Ethernet4/36interface Ethernet4/37interface Ethernet4/38interface Ethernet4/39interface Ethernet4/40interface Ethernet4/41interface Ethernet4/42interface Ethernet4/43interface Ethernet4/44interface Ethernet4/45interface Ethernet4/46interface Ethernet4/47interface Ethernet4/48interface Ethernet5/1description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980mtu 9216channel-group 1 mode activeno shutdowninterface Ethernet5/2description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980mtu 9216channel-group 1 mode activeno shutdowninterface Ethernet5/3switchportinterface Ethernet5/4switchportinterface Ethernet5/5description NON-vPC Peer Link Between N7Ksmtu 9216channel-group 2 mode activeno shutdowninterface Ethernet5/6description NON-vPC Peer Link Between N7Ksmtu 9216channel-group 2 mode activeno shutdowninterface Ethernet5/7interface Ethernet5/8interface Ethernet5/9interface Ethernet5/10interface Ethernet5/11interface Ethernet5/12interface Ethernet5/13interface Ethernet5/14interface Ethernet5/15interface Ethernet5/16interface Ethernet5/17description Common N5K Pairswitchportswitchport mode trunkswitchport trunk allowed vlan 844,864-865spanning-tree port type edge trunkmtu 9216channel-group 5 mode activeno shutdowninterface Ethernet5/18interface Ethernet5/19interface Ethernet5/20interface Ethernet5/21interface Ethernet5/22interface Ethernet5/23interface Ethernet5/24interface Ethernet5/25description VXIaaS-OOB-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866channel-group 3 mode activeno shutdowninterface Ethernet5/26description VXIaaS-OOB-Tenant-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866channel-group 4 mode activeno shutdowninterface Ethernet5/27description VXIaaS-GW (10.81 net)ip address 10.8.79.242/30ip router eigrp 42ip summary-address eigrp 42 10.8.0.0/16no shutdowninterface Ethernet5/28description VXIaaS-OOB-SP-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866channel-group 6 mode activeno shutdowninterface Ethernet5/29interface Ethernet5/30interface Ethernet5/31interface Ethernet5/32interface Ethernet5/33description Common N5K-1 L3mtu 9216no ip redirectsip address 10.10.0.26/30ip router eigrp 42ip passive-interface eigrp 42no shutdowninterface Ethernet5/34description Common N5K-2 L3mtu 9216no ip redirectsip address 10.10.0.34/30ip router eigrp 42ip passive-interface eigrp 42no shutdowninterface Ethernet5/35interface Ethernet5/36interface Ethernet5/37description VXIaaS-DC-ASR9K-1no shutdowninterface Ethernet5/37.712description T1 Link to ASR9K-1encapsulation dot1q 712vrf member T1-Outno ip redirectsip address 10.8.78.1/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/37.722description T2 Link to ASR9K-1encapsulation dot1q 722vrf member T2-Outno ip redirectsip address 10.8.78.33/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/37.732description T3 Link to ASR9K-1encapsulation dot1q 732vrf member T3-Outno ip redirectsip address 10.8.78.65/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/37.742description T4 Link to ASR9K-1encapsulation dot1q 742vrf member T4-Outno ip redirectsip address 10.8.78.97/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0ip wccp 62 redirect inno shutdowninterface Ethernet5/37.752description T5 Link to ASR9K-1encapsulation dot1q 752vrf member T5-Outno ip redirectsip address 10.8.78.129/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/37.782description Global Tenant Link to ASR9K-1encapsulation dot1q 782vrf member GT-Outno ip redirectsip address 10.8.78.225/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38description VXIaaS-DC-ASR9K-2no shutdowninterface Ethernet5/38.713description T1 Link to ASR9K-2encapsulation dot1q 713vrf member T1-Outno ip redirectsip address 10.8.78.5/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38.723description T2 Link to ASR9K-2encapsulation dot1q 723vrf member T2-Outno ip redirectsip address 10.8.78.37/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38.733description T3 Link to ASR9K-2encapsulation dot1q 733vrf member T3-Outno ip redirectsip address 10.8.78.69/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38.743description T4 Link to ASR9K-2encapsulation dot1q 743vrf member T4-Outno ip redirectsip address 10.8.78.101/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0ip wccp 62 redirect inno shutdowninterface Ethernet5/38.753description T5 Link to ASR9K-2encapsulation dot1q 753vrf member T5-Outno ip redirectsip address 10.8.78.133/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38.783description Global Tenant Link to ASR9K-2encapsulation dot1q 783vrf member GT-Outno ip redirectsip address 10.8.78.229/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/39interface Ethernet5/40interface Ethernet5/41description L3 Link To Service 6500 VSSchannel-group 103 mode activeno shutdowninterface Ethernet5/42description L3 Link To Service 6500 VSSchannel-group 103 mode activeno shutdowninterface Ethernet5/43interface Ethernet5/44interface Ethernet5/45description VXIaaS-SP-5Kswitchportswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865switchport trunk allowed vlan add 867-868,941,980mtu 9216channel-group 55 mode activeno shutdowninterface Ethernet5/46description VXIaaS-SP-5Kswitchportswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865switchport trunk allowed vlan add 867-868,941,980mtu 9216channel-group 55 mode activeno shutdowninterface Ethernet5/47interface Ethernet5/48interface mgmt0vrf member managementip address 10.8.66.21/24interface loopback0description MGMT Loopbackip address 10.8.79.250/32ip router eigrp 42ip passive-interface eigrp 42interface loopback1description T1 Outside Loopbackvrf member T1-Outip address 192.168.10.5/32ip router ospf VXIaaS area 0.0.0.0interface loopback2description T2 Outside Loopbackvrf member T2-Outip address 192.168.20.5/32ip router ospf VXIaaS area 0.0.0.0interface loopback3description T3 Outside Loopbackvrf member T3-Outip address 192.168.30.5/32ip router ospf VXIaaS area 0.0.0.0interface loopback4description T4 Outside Loopbackvrf member T4-Outip address 192.168.40.5/32ip router ospf VXIaaS area 0.0.0.0interface loopback5description T5 Outside Loopbackvrf member T5-Outip address 192.168.50.5/32ip router ospf VXIaaS area 0.0.0.0interface loopback8description Global Tenant Outside Loopbackvrf member GT-Outip address 192.168.80.5/32ip router ospf VXIaaS area 0.0.0.0interface loopback10description T1 Inside Loopbackvrf member T1-Inip address 192.168.10.9/32ip router ospf VXIaaS area 0.0.0.20interface loopback20description T2 Inside Loopbackvrf member T2-Inip address 192.168.20.9/32ip router ospf VXIaaS area 0.0.0.20interface loopback30description T3 Inside Loopbackvrf member T3-Inip address 192.168.30.9/32ip router ospf VXIaaS area 0.0.0.20interface loopback40description T4 Inside Loopbackvrf member T4-Inip address 192.168.40.9/32ip router ospf VXIaaS area 0.0.0.20interface loopback50description T5 Inside Loopbackvrf member T5-Inip address 192.168.50.9/32ip router ospf VXIaaS area 0.0.0.20clock timezone EST -5 0clock summer-time EDT 2 Sun Mar 02:00 1 Sun Nov 02:00 60line consoleexec-timeout 0line vtyexec-timeout 420boot kickstart bootflash:/n7000-s1-kickstart.6.1.2.bin sup-1boot system bootflash:/n7000-s1-dk9.6.1.2.bin sup-1boot kickstart bootflash:/n7000-s1-kickstart.6.1.2.bin sup-2boot system bootflash:/n7000-s1-dk9.6.1.2.bin sup-2router eigrp 42default-metric 10000 100 255 1 1500redistribute bgp 42 route-map EIGRP-BGProuter ospf VXIaaSvrf GT-Outrouter-id 8.8.8.15area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T1-Inrouter-id 1.1.1.15area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T1-Outrouter-id 1.1.1.10area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T2-Inrouter-id 2.2.2.15area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T2-Outrouter-id 2.2.2.10area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T3-Inrouter-id 3.3.3.15area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T3-Outrouter-id 3.3.3.10area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T4-Inrouter-id 4.4.4.15area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T4-Outrouter-id 4.4.4.10area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T5-Inrouter-id 5.5.5.15area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T5-Outrouter-id 5.5.5.10area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsrouter bgp 42address-family ipv4 unicastredistribute direct route-map BGP-DIRECTaggregate-address 10.8.0.0/16 summary-onlymaximum-paths 4neighbor 10.10.0.25 remote-as 1000address-family ipv4 unicastroute-map COMMON-SUM inneighbor 10.10.0.33 remote-as 1000address-family ipv4 unicastroute-map COMMON-SUM inTime: Sat Jun 1 12:21:48 2013version 6.1(2)hostname VXIaaS-DC-N7K-2vdc VXIaaS-DC-N7K-2 id 1limit-resource module-type f2allocate interface Ethernet4/1-48allocate interface Ethernet5/1-48limit-resource vlan minimum 16 maximum 4094limit-resource monitor-session minimum 0 maximum 2limit-resource monitor-session-erspan-dst minimum 0 maximum 23limit-resource vrf minimum 2 maximum 4096limit-resource port-channel minimum 0 maximum 768limit-resource u4route-mem minimum 96 maximum 96limit-resource u6route-mem minimum 24 maximum 24limit-resource m4route-mem minimum 58 maximum 58limit-resource m6route-mem minimum 8 maximum 8limit-resource monitor-session-inband-src minimum 0 maximum 1feature telnetcfs eth distributefeature ospffeature bgpfeature eigrpfeature interface-vlanfeature dot1xfeature hsrpfeature lacpfeature dhcpfeature vpcfeature wccplogging level pixm 2username admin password 5 $1$EBvmxlZW$V1JNHlNyrvy6kVcEtaTbI1 role network-adminno password strength-checkip domain-lookupip domain-name vxiaas.localip domain-list cisco.comip domain-list vxiaas.localip name-server 10.8.64.100class-map type qos match-any VOICEmatch dscp 46class-map type qos match-all BULK-DATAmatch dscp 10,12,14class-map type qos match-any SCAVENGERmatch dscp 8class-map type qos match-any CALL-SIGNALINGmatch dscp 24class-map type qos match-any NETWORK-CONTROLmatch dscp 48class-map type qos match-any TRANSACTIONAL-DATAmatch dscp 18,20,22class-map type qos match-any MULTIMEDIA-STREAMINGmatch dscp 26,28,30class-map type qos match-any MULTIMEDIA-CONFERENCINGmatch dscp 34,36,38class-map type queuing match-any BROADCAST-VIDEOpolicy-map type queuing VPN-EDGEcopp profile strictsnmp-server user admin network-admin auth md5 0x7b83230d09d201df578c1f817cb425da priv 0x7b83230d09d201df578c1f817cb425da localizedkeyrmon event 1 log trap public description FATAL(1) owner PMON@FATALrmon event 2 log trap public description CRITICAL(2) owner PMON@CRITICALrmon event 3 log trap public description ERROR(3) owner PMON@ERRORrmon event 4 log trap public description WARNING(4) owner PMON@WARNINGrmon event 5 log trap public description INFORMATION(5) owner PMON@INFOntp server 10.8.79.254vlan 1,711,721,731,741,751,761,844,864-868,941,980vrf context GT-Outvrf context T1-Invrf context T1-Outvrf context T2-Invrf context T2-Outvrf context T3-Invrf context T3-Outvrf context T4-Invrf context T4-Outip wccp 61ip wccp 62vrf context T5-Invrf context T5-Outvrf context managementip route 0.0.0.0/0 10.8.66.1vlan 711name Tenant-1-VM-Avlan 721name Tenant-2-VM-Avlan 731name Tenant-3-VM-Avlan 741name Tenant-4-VM-Avlan 751name Tenant-5-VM-Avlan 761name Tenant-6-VM-Avlan 844name HVXI-NetApp-NFSvlan 864name VXIaaS-SP-Infravlan 865name VXIaaS-SP-DHvlan 866name VXIaaS-OOB-MGMTvlan 867name VXIaaS-SP-Hypervisor-MGMTvlan 868name VXIaaS-SP-vMotionvlan 941name Tenant-4-vWAASvlan 980name Desktone-L2-Link-Localspanning-tree vlan 711,721,731,741,751,761,864-868,980 priority 4096ip prefix-list BGP-DIRECT seq 5 permit 10.8.0.0/16 le 30ip prefix-list COMMON-SUM seq 5 permit 10.10.0.0/17ip prefix-list EIGRP-BGP seq 5 permit 10.10.0.0/17route-map BGP-DIRECT permit 10match ip address prefix-list BGP-DIRECTroute-map COMMON-SUM permit 10match ip address prefix-list COMMON-SUMroute-map EIGRP-BGP permit 10match ip address prefix-list EIGRP-BGPservice dhcpip dhcp relayvpc domain 42peer-switchpeer-keepalive destination 10.8.66.21 source 10.8.66.22peer-gatewayauto-recoveryip arp synchronizeinterface Vlan1interface Vlan711vrf member T1-Inno ip redirectsip address 10.9.104.3/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 711ip 10.9.104.1ip dhcp relay address 10.9.10.150ip dhcp relay address 10.9.10.151description Tenant 1 VMsno shutdownmtu 9216interface Vlan721vrf member T2-Inno ip redirectsip address 10.9.112.3/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 721ip 10.9.112.1ip dhcp relay address 10.9.20.150ip dhcp relay address 10.9.20.151description Tenant 2 VMsno shutdownmtu 9216interface Vlan731vrf member T3-Inno ip redirectsip address 10.9.120.3/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 731ip 10.9.120.1ip dhcp relay address 10.9.30.150ip dhcp relay address 10.9.30.151description Tenant 3 VMsno shutdownmtu 9216interface Vlan741vrf member T4-Inno ip redirectsip address 10.9.128.3/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 741ip 10.9.128.1ip dhcp relay address 10.9.40.150ip dhcp relay address 10.9.40.151description Tenant 4 VMsno shutdownmtu 9216interface Vlan751vrf member T5-Inno ip redirectsip address 10.9.136.3/21ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.20hsrp version 2hsrp 751ip 10.9.136.1ip dhcp relay address 10.9.50.150ip dhcp relay address 10.9.50.151description Tenant 5 VMsno shutdownmtu 9216interface Vlan864no ip redirectsip address 10.8.64.3/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 864ip 10.8.64.1description VXIaaS-SP-Infrano shutdownmtu 9216interface Vlan865no ip redirectsip address 10.8.65.3/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 865ip 10.8.65.1description VXIaaS-SP-DHno shutdownmtu 9216interface Vlan866no ip redirectsip address 10.8.66.3/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 866ip 10.8.66.1description VXIaaS-OOB-MGMTno shutdownmtu 9216interface Vlan867no ip redirectsip address 10.8.67.3/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 867ip 10.8.67.1description VXIaaS-SP-Hypervisor-MGMTno shutdownmtu 9216interface Vlan868no ip redirectsip address 10.8.68.3/24ip router eigrp 42ip passive-interface eigrp 42hsrp version 2hsrp 868ip 10.8.68.1description VXIaaS-SP-vMotionno shutdownmtu 9216interface Vlan941vrf member T4-Outno ip redirectsip address 10.9.192.27/29ip ospf passive-interfaceip router ospf VXIaaS area 0.0.0.10hsrp version 2hsrp 941ip 10.9.192.25ip dhcp relay address 10.9.40.150ip dhcp relay address 10.9.40.151description Tenant 4 vWAASno shutdownmtu 9216interface port-channel1description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980spanning-tree port type networkmtu 9216vpc peer-linkinterface port-channel2description NON-vPC Peer Link Between N7Ksmtu 9216interface port-channel2.718description Tenant 1 N7K-N7K Outsidemtu 9216encapsulation dot1q 718vrf member T1-Outno ip redirectsip address 10.8.78.26/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.719description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 719vrf member T1-Inno ip redirectsip address 10.8.78.30/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.728description Tenant 2 N7K-N7K Outsidemtu 9216encapsulation dot1q 728vrf member T2-Outno ip redirectsip address 10.8.78.58/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.729description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 729vrf member T2-Inno ip redirectsip address 10.8.78.62/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.738description Tenant 3 N7K-N7K Outsidemtu 9216encapsulation dot1q 738vrf member T3-Outno ip redirectsip address 10.8.78.90/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.739description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 739vrf member T3-Inno ip redirectsip address 10.8.78.94/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.748description Tenant 4 N7K-N7K Outsidemtu 9216encapsulation dot1q 748vrf member T4-Outno ip redirectsip address 10.8.78.122/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.749description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 749vrf member T4-Inno ip redirectsip address 10.8.78.126/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.758description Tenant 5 N7K-N7K Outsidemtu 9216encapsulation dot1q 758vrf member T5-Outno ip redirectsip address 10.8.78.154/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel2.759description Tenant 1 N7K-N7K Insidemtu 9216encapsulation dot1q 759vrf member T5-Inno ip redirectsip address 10.8.78.158/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel2.788description Global Tenant N7K-N7K Outsidemtu 9216encapsulation dot1q 788vrf member GT-Outno ip redirectsip address 10.8.78.250/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel3description VXIaaS-OOB-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866vpc 3interface port-channel4description VXIaaS-OOB-Tenant-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866vpc 4interface port-channel5description Common N5K Pairswitchportswitchport mode trunkswitchport trunk allowed vlan 844,864-865spanning-tree port type edge trunkmtu 9216vpc 5interface port-channel6description VXIaaS-OOB-SP-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866vpc 6interface port-channel55description VXIaaS-SP-5K-Pairswitchportswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865switchport trunk allowed vlan add 867-868,941,980spanning-tree port type normalmtu 9216vpc 55interface port-channel104description L3 Link To Service 6500 VSSno lacp graceful-convergenceinterface port-channel104.612description T1 Outside Service 6500encapsulation dot1q 612vrf member T1-Outno ip redirectsip address 10.8.76.5/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel104.614description T1 Inside Service 6500encapsulation dot1q 614vrf member T1-Inno ip redirectsip address 10.8.76.13/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel104.622description T2 Outside Service 6500encapsulation dot1q 622vrf member T2-Outno ip redirectsip address 10.8.76.69/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel104.624description T2 Inside Service 6500encapsulation dot1q 624vrf member T2-Inno ip redirectsip address 10.8.76.77/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel104.632description T3 Outside Service 6500encapsulation dot1q 632vrf member T3-Outno ip redirectsip address 10.8.76.133/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel104.634description T3 Inside Service 6500encapsulation dot1q 634vrf member T3-Inno ip redirectsip address 10.8.76.141/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel104.642description T4 Outside Service 6500encapsulation dot1q 642vrf member T4-Outno ip redirectsip address 10.8.76.197/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdownip wccp 61 redirect ininterface port-channel104.644description T4 Inside Service 6500encapsulation dot1q 644vrf member T4-Inno ip redirectsip address 10.8.76.205/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel104.652description T5 Outside Service 6500encapsulation dot1q 652vrf member T5-Outno ip redirectsip address 10.8.77.5/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface port-channel104.654description T5 Inside Service 6500encapsulation dot1q 654vrf member T5-Inno ip redirectsip address 10.8.77.13/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.20no shutdowninterface port-channel104.682description Global Tenant Outside Service 6500encapsulation dot1q 682vrf member GT-Outno ip redirectsip address 10.8.77.197/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.10no shutdowninterface Ethernet4/1description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980mtu 9216channel-group 1 mode activeno shutdowninterface Ethernet4/2description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980mtu 9216channel-group 1 mode activeno shutdowninterface Ethernet4/3interface Ethernet4/4interface Ethernet4/5description NON-vPC Peer Link Between N7Ksmtu 9216channel-group 2 mode activeno shutdowninterface Ethernet4/6description NON-vPC Peer Link Between N7Ksmtu 9216channel-group 2 mode activeno shutdowninterface Ethernet4/7interface Ethernet4/8interface Ethernet4/9interface Ethernet4/10interface Ethernet4/11interface Ethernet4/12interface Ethernet4/13interface Ethernet4/14interface Ethernet4/15interface Ethernet4/16interface Ethernet4/17description Common N5K Pairswitchportswitchport mode trunkswitchport trunk allowed vlan 844,864-865spanning-tree port type edge trunkmtu 9216channel-group 5 mode activeno shutdowninterface Ethernet4/18interface Ethernet4/19interface Ethernet4/20interface Ethernet4/21interface Ethernet4/22interface Ethernet4/23interface Ethernet4/24interface Ethernet4/25interface Ethernet4/26interface Ethernet4/27interface Ethernet4/28interface Ethernet4/29interface Ethernet4/30interface Ethernet4/31interface Ethernet4/32interface Ethernet4/33interface Ethernet4/34interface Ethernet4/35interface Ethernet4/36interface Ethernet4/37interface Ethernet4/38interface Ethernet4/39interface Ethernet4/40interface Ethernet4/41interface Ethernet4/42interface Ethernet4/43interface Ethernet4/44interface Ethernet4/45interface Ethernet4/46interface Ethernet4/47interface Ethernet4/48interface Ethernet5/1description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980mtu 9216channel-group 1 mode activeno shutdowninterface Ethernet5/2description vPC Peer Link Between N7Ksswitchportswitchport mode trunkswitchport trunk allowed vlan 711,714-715,721,724-725,731,734-735switchport trunk allowed vlan add 741,744-745,751,754-755,761,844switchport trunk allowed vlan add 864-868,941,980mtu 9216channel-group 1 mode activeno shutdowninterface Ethernet5/3interface Ethernet5/4interface Ethernet5/5description NON-vPC Peer Link Between N7Ksmtu 9216channel-group 2 mode activeno shutdowninterface Ethernet5/6description NON-vPC Peer Link Between N7Ksmtu 9216channel-group 2 mode activeno shutdowninterface Ethernet5/7interface Ethernet5/8interface Ethernet5/9interface Ethernet5/10interface Ethernet5/11interface Ethernet5/12interface Ethernet5/13interface Ethernet5/14interface Ethernet5/15interface Ethernet5/16interface Ethernet5/17description Common N5K Pairswitchportswitchport mode trunkswitchport trunk allowed vlan 844,864-865spanning-tree port type edge trunkmtu 9216channel-group 5 mode activeno shutdowninterface Ethernet5/18interface Ethernet5/19interface Ethernet5/20interface Ethernet5/21interface Ethernet5/22interface Ethernet5/23interface Ethernet5/24interface Ethernet5/25description VXIaaS-OOB-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866channel-group 3 mode activeno shutdowninterface Ethernet5/26description VXIaaS-OOB-Tenant-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866channel-group 4 mode activeno shutdowninterface Ethernet5/27description VXIaaS-GW (10.81 net)ip address 10.8.79.246/30ip router eigrp 42ip summary-address eigrp 42 10.8.0.0/16no shutdowninterface Ethernet5/28description VXIaaS-OOB-SP-MGMT-SWswitchportswitchport mode trunkswitchport trunk allowed vlan 866channel-group 6 mode activeno shutdowninterface Ethernet5/29interface Ethernet5/30interface Ethernet5/31interface Ethernet5/32interface Ethernet5/33description Common N5K-1 L3mtu 9216no ip redirectsip address 10.10.0.30/30ip router eigrp 42ip passive-interface eigrp 42no shutdowninterface Ethernet5/34description Common N5K-2 L3mtu 9216no ip redirectsip address 10.10.0.38/30ip router eigrp 42ip passive-interface eigrp 42no shutdowninterface Ethernet5/35interface Ethernet5/36interface Ethernet5/37description desc VXIaaS-DC-ASR9K-1no shutdowninterface Ethernet5/37.714description T1 Link to ASR9K-1encapsulation dot1q 714vrf member T1-Outno ip redirectsip address 10.8.78.9/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/37.724description T2 Link to ASR9K-1encapsulation dot1q 724vrf member T2-Outno ip redirectsip address 10.8.78.41/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/37.734description T3 Link to ASR9K-1encapsulation dot1q 734vrf member T3-Outno ip redirectsip address 10.8.78.73/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/37.744description T4 Link to ASR9K-1encapsulation dot1q 744vrf member T4-Outno ip redirectsip address 10.8.78.105/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0ip wccp 62 redirect inno shutdowninterface Ethernet5/37.754description T5 Link to ASR9K-1encapsulation dot1q 754vrf member T5-Outno ip redirectsip address 10.8.78.137/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/37.784description Global Tenant Link to ASR9K-1encapsulation dot1q 784vrf member GT-Outno ip redirectsip address 10.8.78.233/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38description VXIaaS-DC-ASR9K-2no shutdowninterface Ethernet5/38.715description T1 Link to ASR9K-2encapsulation dot1q 715vrf member T1-Outno ip redirectsip address 10.8.78.13/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38.725description T2 Link to ASR9K-2encapsulation dot1q 725vrf member T2-Outno ip redirectsip address 10.8.78.45/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38.735description T3 Link to ASR9K-2encapsulation dot1q 735vrf member T3-Outno ip redirectsip address 10.8.78.77/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38.745description T4 Link to ASR9K-2encapsulation dot1q 745vrf member T4-Outno ip redirectsip address 10.8.78.109/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0ip wccp 62 redirect inno shutdowninterface Ethernet5/38.755description T5 Link to ASR9K-2encapsulation dot1q 755vrf member T5-Outno ip redirectsip address 10.8.78.141/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/38.785description Global Tenant Link to ASR9K-2encapsulation dot1q 785vrf member GT-Outno ip redirectsip address 10.8.78.237/30ip ospf network point-to-pointip router ospf VXIaaS area 0.0.0.0no shutdowninterface Ethernet5/39interface Ethernet5/40interface Ethernet5/41description L3 Link To Service 6500 VSSchannel-group 104 mode activeno shutdowninterface Ethernet5/42description L3 Link To Service 6500 VSSchannel-group 104 mode activeno shutdowninterface Ethernet5/43interface Ethernet5/44interface Ethernet5/45description VXIaaS-SP-5Kswitchportswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865switchport trunk allowed vlan add 867-868,941,980mtu 9216channel-group 55 mode activeno shutdowninterface Ethernet5/46description VXIaaS-SP-5Kswitchportswitchport mode trunkswitchport trunk allowed vlan 711,721,731,741,751,761,844,864-865switchport trunk allowed vlan add 867-868,941,980mtu 9216channel-group 55 mode activeno shutdowninterface Ethernet5/47interface Ethernet5/48interface mgmt0vrf member managementip address 10.8.66.22/24interface loopback0description MGMT Loopbackip address 10.8.79.251/32ip router eigrp 42ip passive-interface eigrp 42interface loopback1description T1 Outside Loopbackvrf member T1-Outip address 192.168.10.6/32ip router ospf VXIaaS area 0.0.0.0interface loopback2description T2 Outside Loopbackvrf member T2-Outip address 192.168.20.6/32ip router ospf VXIaaS area 0.0.0.0interface loopback3description T3 Outside Loopbackvrf member T3-Outip address 192.168.30.6/32ip router ospf VXIaaS area 0.0.0.0interface loopback4description T4 Outside Loopbackvrf member T4-Outip address 192.168.40.6/32ip router ospf VXIaaS area 0.0.0.0interface loopback5description T5 Outside Loopbackvrf member T5-Outip address 192.168.50.6/32ip router ospf VXIaaS area 0.0.0.0interface loopback8description Global Tenant Outside Loopbackvrf member GT-Outip address 192.168.80.6/32ip router ospf VXIaaS area 0.0.0.0interface loopback10description T1 Inside Loopbackvrf member T1-Inip address 192.168.10.10/32ip router ospf VXIaaS area 0.0.0.20interface loopback20description T2 Inside Loopbackvrf member T2-Inip address 192.168.20.10/32ip router ospf VXIaaS area 0.0.0.20interface loopback30description T3 Inside Loopbackvrf member T3-Inip address 192.168.30.10/32ip router ospf VXIaaS area 0.0.0.20interface loopback40description T4 Inside Loopbackvrf member T4-Inip address 192.168.40.10/32ip router ospf VXIaaS area 0.0.0.20interface loopback50description T5 Inside Loopbackvrf member T5-Inip address 192.168.50.10/32ip router ospf VXIaaS area 0.0.0.20clock timezone EST -5 0clock summer-time EDT 2 Sun Mar 02:00 1 Sun Nov 02:00 60line consoleexec-timeout 0line vtyexec-timeout 420boot kickstart bootflash:/n7000-s1-kickstart.6.1.2.bin sup-1boot system bootflash:/n7000-s1-dk9.6.1.2.bin sup-1boot kickstart bootflash:/n7000-s1-kickstart.6.1.2.bin sup-2boot system bootflash:/n7000-s1-dk9.6.1.2.bin sup-2router eigrp 42default-metric 10000 100 255 1 1500redistribute bgp 42 route-map EIGRP-BGProuter ospf VXIaaSvrf GT-Outrouter-id 8.8.8.11area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T1-Inrouter-id 1.1.1.16area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T1-Outrouter-id 1.1.1.11area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T2-Inrouter-id 2.2.2.16area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T2-Outrouter-id 2.2.2.11area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T3-Inrouter-id 3.3.3.16area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T3-Outrouter-id 3.3.3.11area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T4-Inrouter-id 4.4.4.16area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T4-Outrouter-id 4.4.4.11area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T5-Inrouter-id 5.5.5.16area 0.0.0.20 nssalog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsvrf T5-Outrouter-id 5.5.5.11area 0.0.0.10 nssa default-information-originatelog-adjacency-changes detailauto-cost reference-bandwidth 100 Gbpsrouter bgp 42address-family ipv4 unicastredistribute direct route-map BGP-DIRECTaggregate-address 10.8.0.0/16 summary-onlymaximum-paths 4neighbor 10.10.0.29 remote-as 1000address-family ipv4 unicastroute-map COMMON-SUM inneighbor 10.10.0.37 remote-as 1000address-family ipv4 unicastroute-map COMMON-SUM inCisco Catalyst 6506 configuration:
!version 12.2service timestamps debug datetime msecservice timestamps log datetime msecno service password-encryptionservice counters max age 5hostname VXIaaS-DC-SVC-6500boot-start-markerboot system flash bootflash:s72033-ipservicesk9_wan-mz.122-33.SXJ1.binboot-end-markersecurity passwords min-length 1no logging consoleenable password cisco_123username admin password 0 cisco_123aaa new-modelaaa authentication login default localaaa session-id commonclock timezone EST -5clock summer-time EDT recurringfirewall autostatefirewall multiple-vlan-interfacesfirewall switch 1 module 3 vlan-group 1,3firewall switch 2 module 3 vlan-group 1,3firewall vlan-group 1 910,915firewall vlan-group 3 616,617,626,627,636,637,646,647,656,657ip vrf GT-Inip vrf GT-Outip vrf T1-Inip vrf T1-Outip vrf T2-Inip vrf T2-Outip vrf T3-Inip vrf T3-Outip vrf T4-Inip vrf T4-Outip vrf T5-Inip vrf T5-Outip vrf T6-Inip vrf T6-Outip vrf T7-Inip vrf T7-Outip ssh source-interface Vlan866no ip domain-lookupip domain-name vxiaas.localvtp mode transparentswitch virtual domain 42switch mode virtualmls netflow interfacespanning-tree mode rapid-pvstspanning-tree extend system-iddiagnostic bootup level completeredundancymain-cpuauto-sync running-configmode ssovlan internal allocation policy ascendingvlan access-log ratelimit 2000vlan 616name T1-ASA-Outvlan 617name T1-ASA-Invlan 626name T2-ASA-Outvlan 627name T2-ASA-Invlan 636name T3-ASA-Outvlan 637name T3-ASA-Invlan 646name T4-ASA-Outvlan 647name T4-ASA-Invlan 656name T5-ASA-Outvlan 657name T5-ASA-Invlan 686name GT-ASA-Outvlan 687name GT-ASA-Invlan 866name VXIaaS-OOB-MGMTvlan 910name ASA-FW-LAN-FOvlan 915name ASA-FW-STATE-FOnterface Loopback1description T1 Outside Loopbackip vrf forwarding T1-Outip address 192.168.10.7 255.255.255.255interface Loopback2description T2 Outside Loopbackip vrf forwarding T2-Outip address 192.168.20.7 255.255.255.255interface Loopback3description T3 Outside Loopbackip vrf forwarding T3-Outip address 192.168.30.7 255.255.255.255interface Loopback4description T4 Outside Loopbackip vrf forwarding T4-Outip address 192.168.40.7 255.255.255.255interface Loopback5description T5 Outside Loopbackip vrf forwarding T5-Outip address 192.168.50.7 255.255.255.255interface Loopback8description GT Outside Loopbackip vrf forwarding GT-Outip address 192.168.80.7 255.255.255.255interface Loopback10description T1 Inside Loopbackip vrf forwarding T1-Inip address 192.168.10.8 255.255.255.255interface Loopback20description T2 Inside Loopbackip vrf forwarding T2-Inip address 192.168.20.8 255.255.255.255interface Loopback30description T3 Inside Loopbackip vrf forwarding T3-Inip address 192.168.30.8 255.255.255.255interface Loopback40description T4 Inside Loopbackip vrf forwarding T4-Inip address 192.168.40.8 255.255.255.255interface Loopback50description T5 Inside Loopbackip vrf forwarding T5-Inip address 192.168.50.8 255.255.255.255interface Loopback80description GT Inside Loopbackip vrf forwarding GT-Inip address 192.168.80.8 255.255.255.255interface Port-channel10no switchportno ip addressswitch virtual link 1mls qos trust cosno mls qos channel-consistencyinterface Port-channel15description VPN ASA Outsideno switchportip vrf forwarding GT-Outip address 10.8.77.209 255.255.255.248no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel16description VPN ASA Insideno switchportno ip addressno ip redirectsno ip unreachablesno ip proxy-arpinterface Port-channel16.635encapsulation dot1Q 635ip vrf forwarding T3-Outip address 10.8.76.153 255.255.255.248no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel20no switchportno ip addressswitch virtual link 2mls qos trust cosno mls qos channel-consistencyinterface Port-channel103description N7K-1 Uplinkno switchportno ip addressinterface Port-channel103.611description T1 Outside N7K-1encapsulation dot1Q 611ip vrf forwarding T1-Outip address 10.8.76.2 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.613description T1 Inside N7K-1encapsulation dot1Q 613ip vrf forwarding T1-Inip address 10.8.76.10 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.621description T2 Outside N7K-1encapsulation dot1Q 621ip vrf forwarding T2-Outip address 10.8.76.66 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.623description T2 Inside N7K-1encapsulation dot1Q 623ip vrf forwarding T2-Inip address 10.8.76.74 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.631description T3 Outside N7K-1encapsulation dot1Q 631ip vrf forwarding T3-Outip address 10.8.76.130 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointshutdowninterface Port-channel103.633description T3 Inside N7K-1encapsulation dot1Q 633ip vrf forwarding T3-Inip address 10.8.76.138 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.641description T4 Outside N7K-1encapsulation dot1Q 641ip vrf forwarding T4-Outip address 10.8.76.194 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.643description T4 Inside N7K-1encapsulation dot1Q 643ip vrf forwarding T4-Inip address 10.8.76.202 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.651description T5 Outside N7K-1encapsulation dot1Q 651ip vrf forwarding T5-Outip address 10.8.77.2 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.653description T5 Inside N7K-1encapsulation dot1Q 653ip vrf forwarding T5-Inip address 10.8.77.10 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel103.681description GT Outside N7K-1encapsulation dot1Q 681ip vrf forwarding GT-Outip address 10.8.77.194 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104description N7K-2 Uplinkno switchportno ip addressinterface Port-channel104.612description T1 Outside N7K-2encapsulation dot1Q 612ip vrf forwarding T1-Outip address 10.8.76.6 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.614description T1 Inside N7K-2encapsulation dot1Q 614ip vrf forwarding T1-Inip address 10.8.76.14 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.622description T2 Outside N7K-2encapsulation dot1Q 622ip vrf forwarding T2-Outip address 10.8.76.70 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.624description T2 Inside N7K-2encapsulation dot1Q 624ip vrf forwarding T2-Inip address 10.8.76.78 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.632description T3 Outside N7K-2encapsulation dot1Q 632ip vrf forwarding T3-Outip address 10.8.76.134 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointshutdowninterface Port-channel104.634description T3 Inside N7K-2encapsulation dot1Q 634ip vrf forwarding T3-Inip address 10.8.76.142 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.642description T4 Outside N7K-2encapsulation dot1Q 642ip vrf forwarding T4-Outip address 10.8.76.198 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.644description T4 Inside N7K-2encapsulation dot1Q 644ip vrf forwarding T4-Inip address 10.8.76.206 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.652description T5 Outside N7K-2encapsulation dot1Q 652ip vrf forwarding T5-Outip address 10.8.77.6 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.654description T5 Inside N7K-2encapsulation dot1Q 654ip vrf forwarding T5-Inip address 10.8.77.14 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface Port-channel104.682description GT Outside N7K-2encapsulation dot1Q 682ip vrf forwarding GT-Outip address 10.8.77.198 255.255.255.252no ip redirectsno ip unreachablesno ip proxy-arpip ospf network point-to-pointinterface TenGigabitEthernet1/1/1description N7K-1 Uplinkno switchportno ip addresschannel-group 103 mode activeinterface TenGigabitEthernet1/1/2description N7K-2 Uplinkno switchportno ip addresschannel-group 104 mode activeinterface TenGigabitEthernet1/1/3description VPN ASA Outsideno switchportno ip addresschannel-group 15 mode activeinterface TenGigabitEthernet1/1/4description VPN ASA Insideno switchportno ip addresschannel-group 16 mode activeinterface GigabitEthernet1/5/1no switchportno ip addressshutdowninterface GigabitEthernet1/5/2no switchportno ip addressshutdowninterface GigabitEthernet1/5/3description VXIaaS-OOB-MGMT SW1switchportswitchport access vlan 866switchport mode accessarp timeout 1500interface TenGigabitEthernet1/5/4no switchportno ip addressmls qos trust coschannel-group 10 mode oninterface TenGigabitEthernet1/5/5no switchportno ip addressmls qos trust coschannel-group 10 mode oninterface TenGigabitEthernet2/1/1description N7K-1 Uplinkno switchportno ip addresschannel-group 103 mode activeinterface TenGigabitEthernet2/1/2description N7K-2 Uplinkno switchportno ip addresschannel-group 104 mode activeinterface TenGigabitEthernet2/1/3description VPN ASA Insideno switchportno ip addresschannel-group 16 mode activeinterface TenGigabitEthernet2/1/4description VPN ASA Outsideno switchportno ip addresschannel-group 15 mode activeinterface GigabitEthernet2/5/1no switchportno ip addressshutdowninterface GigabitEthernet2/5/2no switchportno ip addressshutdowninterface GigabitEthernet2/5/3description VXIaaS-OOB-MGMT SW2switchportswitchport access vlan 866switchport mode accessarp timeout 1500interface TenGigabitEthernet2/5/4no switchportno ip addressmls qos trust coschannel-group 20 mode oninterface TenGigabitEthernet2/5/5no switchportno ip addressmls qos trust coschannel-group 20 mode oninterface Vlan1no ip addressshutdowninterface Vlan616description T1 ASA Outsideip vrf forwarding T1-Outip address 10.8.76.33 255.255.255.248interface Vlan617description T1 ASA Insideip vrf forwarding T1-Inip address 10.8.76.41 255.255.255.248interface Vlan626description T2 ASA Outsideip vrf forwarding T2-Outip address 10.8.76.97 255.255.255.248interface Vlan627description T2 ASA Insideip vrf forwarding T2-Inip address 10.8.76.105 255.255.255.248interface Vlan636description T3 ASA Outsideip vrf forwarding T3-Outip address 10.8.76.161 255.255.255.248interface Vlan637description T3 ASA Insideip vrf forwarding T3-Inip address 10.8.76.169 255.255.255.248interface Vlan646description T4 ASA Outsideip vrf forwarding T4-Outip address 10.8.76.225 255.255.255.248interface Vlan647description T4 ASA Insideip vrf forwarding T4-Inip address 10.8.76.233 255.255.255.248interface Vlan656description T5 ASA Outsideip vrf forwarding T5-Outip address 10.8.77.33 255.255.255.248interface Vlan657description T5 ASA Insideip vrf forwarding T5-Inip address 10.8.77.41 255.255.255.248interface Vlan866description VXIaaS-OOB-MGMTip address 10.8.66.13 255.255.255.0no ip redirectsno ip unreachablesno ip proxy-arparp timeout 1500router ospf 10 vrf T1-Outrouter-id 1.1.1.12log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 10 nssaredistribute static subnetspassive-interface Loopback1passive-interface Vlan616network 10.8.76.2 0.0.0.0 area 10network 10.8.76.6 0.0.0.0 area 10network 10.8.76.33 0.0.0.0 area 10network 192.168.10.7 0.0.0.0 area 10router ospf 20 vrf T2-Outrouter-id 2.2.2.12log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 10 nssaredistribute static subnetspassive-interface Loopback2passive-interface Vlan626network 10.8.76.66 0.0.0.0 area 10network 10.8.76.70 0.0.0.0 area 10network 10.8.76.97 0.0.0.0 area 10network 192.168.20.7 0.0.0.0 area 10router ospf 30 vrf T3-Outrouter-id 3.3.3.12log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 10 nssaredistribute static subnetspassive-interface Loopback3passive-interface Vlan636network 10.8.76.130 0.0.0.0 area 10network 10.8.76.134 0.0.0.0 area 10network 10.8.76.153 0.0.0.0 area 10network 10.8.76.161 0.0.0.0 area 10network 192.168.30.7 0.0.0.0 area 10router ospf 40 vrf T4-Outrouter-id 4.4.4.12log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 10 nssaredistribute static subnetspassive-interface Loopback4passive-interface Vlan646network 10.8.76.194 0.0.0.0 area 10network 10.8.76.198 0.0.0.0 area 10network 10.8.76.225 0.0.0.0 area 10network 192.168.40.7 0.0.0.0 area 10router ospf 50 vrf T5-Outrouter-id 5.5.5.12log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 10 nssaredistribute static subnetspassive-interface Loopback5passive-interface Vlan656network 10.8.77.2 0.0.0.0 area 10network 10.8.77.6 0.0.0.0 area 10network 10.8.77.33 0.0.0.0 area 10network 192.168.50.7 0.0.0.0 area 10router ospf 15 vrf T1-Inrouter-id 1.1.1.13log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 20 nssa default-information-originatepassive-interface Loopback10passive-interface Vlan617network 10.8.76.10 0.0.0.0 area 20network 10.8.76.14 0.0.0.0 area 20network 10.8.76.41 0.0.0.0 area 20network 192.168.10.8 0.0.0.0 area 20router ospf 25 vrf T2-Inrouter-id 2.2.2.13log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 20 nssa default-information-originatepassive-interface Vlan627network 10.8.76.74 0.0.0.0 area 20network 10.8.76.78 0.0.0.0 area 20network 10.8.76.105 0.0.0.0 area 20network 192.168.20.8 0.0.0.0 area 20router ospf 35 vrf T3-Inrouter-id 3.3.3.13log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 20 nssa default-information-originatepassive-interface Loopback30passive-interface Vlan637network 10.8.76.138 0.0.0.0 area 20network 10.8.76.142 0.0.0.0 area 20network 10.8.76.169 0.0.0.0 area 20network 192.168.30.8 0.0.0.0 area 20router ospf 45 vrf T4-Inrouter-id 4.4.4.13log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 20 nssa default-information-originatepassive-interface Loopback40passive-interface Vlan647network 10.8.76.202 0.0.0.0 area 20network 10.8.76.206 0.0.0.0 area 20network 10.8.76.233 0.0.0.0 area 20network 192.168.40.8 0.0.0.0 area 20router ospf 55 vrf T5-Inrouter-id 5.5.5.13log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 20 nssa default-information-originatepassive-interface Loopback50passive-interface Vlan657network 10.8.77.10 0.0.0.0 area 20network 10.8.77.14 0.0.0.0 area 20network 10.8.77.41 0.0.0.0 area 20network 192.168.50.8 0.0.0.0 area 20router ospf 80 vrf GT-Outrouter-id 8.8.8.12log-adjacency-changes detailauto-cost reference-bandwidth 100000nsf ietfcapability vrf-litearea 10 nssaredistribute static subnetspassive-interface Loopback8network 10.8.77.194 0.0.0.0 area 10network 10.8.77.198 0.0.0.0 area 10network 10.8.77.209 0.0.0.0 area 10network 192.168.80.7 0.0.0.0 area 10ip classlessip forward-protocol ndip route 0.0.0.0 0.0.0.0 10.8.66.1ip route vrf T1-In 0.0.0.0 0.0.0.0 10.8.76.43ip route vrf T1-Out 10.9.104.0 255.255.248.0 10.8.76.35ip route vrf T2-In 0.0.0.0 0.0.0.0 10.8.76.107ip route vrf T2-Out 10.9.112.0 255.255.248.0 10.8.76.99ip route vrf T3-In 0.0.0.0 0.0.0.0 10.8.76.171ip route vrf T3-Out 10.9.120.0 255.255.248.0 10.8.76.163ip route vrf T4-In 0.0.0.0 0.0.0.0 10.8.76.235ip route vrf T4-Out 10.9.128.0 255.255.248.0 10.8.76.227ip route vrf T5-In 0.0.0.0 0.0.0.0 10.8.77.43ip route vrf T5-Out 10.9.136.0 255.255.248.0 10.8.77.35no ip http serverno ip http secure-servercontrol-planedial-peer cor customline con 0exec-timeout 0 0logging synchronousline vty 0 4exec-timeout 300 0password cisco_123logging synchronoustransport input telnet sshmac-address-table aging-time 1800module provision switch 1slot 1 slot-type 148 port-type 60 number 4 virtual-slot 17slot 2 slot-type 207 port-type 106 number 1 virtual-slot 18slot 3 slot-type 330 port-type 111 number 3 virtual-slot 19slot 5 slot-type 254 port-type 31 number 2 port-type 61 number 1 port-type 60 number 2 virtual-slot 21module provision switch 2slot 1 slot-type 148 port-type 60 number 4 virtual-slot 33slot 2 slot-type 207 port-type 106 number 1 virtual-slot 34slot 3 slot-type 330 port-type 111 number 3 virtual-slot 35slot 5 slot-type 254 port-type 31 number 2 port-type 61 number 1 port-type 60 number 2 virtual-slot 37endCisco ASA Service Module Tenant 1 configuration:
ASA Version 8.5(1) <context>hostname T1enable password MkHB0dBXOzv6EXRs encryptedpasswd 2KFQnbNIdI.2KYOU encryptednamesinterface Vlan616nameif outsidesecurity-level 10ip address 10.8.76.35 255.255.255.248 standby 10.8.76.36interface Vlan617nameif insidesecurity-level 100ip address 10.8.76.43 255.255.255.248 standby 10.8.76.44access-list inside-acl extended permit ip any anyaccess-list inside-acl extended permit udp any anyaccess-list inside-acl extended permit tcp any anyaccess-list inside-acl extended permit icmp any anyaccess-list outside-acl extended permit ip any anyaccess-list outside-acl extended permit udp any anyaccess-list outside-acl extended permit tcp any anyaccess-list outside-acl extended permit icmp any anyaccess-list mgmt-acl extended permit icmp any anyaccess-list mgmt-acl extended permit tcp any anyaccess-list mgmt-acl extended permit udp any anyaccess-list mgmt-acl extended permit ip any anypager lines 24logging buffered debuggingmtu outside 1500mtu inside 1500icmp unreachable rate-limit 1 burst-size 1icmp permit any outsideicmp permit any insideno asdm history enablearp timeout 1500access-group outside-acl in interface outside per-user-overrideaccess-group inside-acl in interface inside per-user-overrideroute outside 0.0.0.0 0.0.0.0 10.8.76.33 1route inside 10.9.104.0 255.255.248.0 10.8.76.41 1timeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolutetimeout tcp-proxy-reassembly 0:01:00timeout floating-conn 0:00:00no snmp-server locationno snmp-server contacttelnet timeout 5ssh timeout 5no threat-detection statistics tcp-interceptclass-map inspection_defaultmatch default-inspection-trafficpolicy-map type inspect dns preset_dns_mapparametersmessage-length maximum client automessage-length maximum 512policy-map global_policyclass inspection_defaultinspect dns preset_dns_mapinspect ftpinspect h323 h225inspect h323 rasinspect ip-optionsinspect netbiosinspect rshinspect rtspinspect skinnyinspect esmtpinspect sqlnetinspect sunrpcinspect tftpinspect sipinspect xdmcpservice-policy global_policy globalCryptochecksum:bc9bd98b298c334af9d76007204a043b: endCisco ASR 9006 configurations:
!! IOS XR Configuration 4.2.0!! Last configuration change at Mon Jan 14 18:43:43 2013 by adminhostname VXIaaS-DC-9K-1logging disabledomain name vxiaas.localcdpvrf GTvrf T1vrf T2vrf T3vrf T4vrf T5vrf managementline consoleexec-timeout 0 0length 32interface Loopback1description Tenant 1 VRF Loopbackvrf T1ipv4 address 192.168.10.1 255.255.255.255interface Loopback2description Tenant 2 VRF Loopbackvrf T2ipv4 address 192.168.20.1 255.255.255.255interface Loopback3description Tenant 3 VRF Loopbackvrf T3ipv4 address 192.168.30.1 255.255.255.255interface Loopback4description Tenant 4 VRF Loopbackvrf T4ipv4 address 192.168.40.1 255.255.255.255interface Loopback5description Tenant 5 VRF Loopbackvrf T5ipv4 address 192.168.50.1 255.255.255.255interface Loopback8description Global Tenant VRF Loopbackvrf GTipv4 address 192.168.80.1 255.255.255.255interface MgmtEth0/RSP0/CPU0/0description MGMT Interfacevrf managementipv4 address 10.8.66.15 255.255.255.0interface MgmtEth0/RSP0/CPU0/1shutdowninterface GigabitEthernet0/1/0/0description Global Tenant Internetvrf GTipv4 point-to-pointipv4 address 192.168.200.2 255.255.255.252interface GigabitEthernet0/1/0/1shutdowninterface GigabitEthernet0/1/0/2shutdowninterface GigabitEthernet0/1/0/3shutdowninterface GigabitEthernet0/1/0/4shutdowninterface GigabitEthernet0/1/0/5shutdowninterface GigabitEthernet0/1/0/6shutdowninterface GigabitEthernet0/1/0/7shutdowninterface GigabitEthernet0/1/0/8shutdowninterface GigabitEthernet0/1/0/9shutdowninterface GigabitEthernet0/1/0/10shutdowninterface GigabitEthernet0/1/0/11shutdowninterface GigabitEthernet0/1/0/12shutdowninterface GigabitEthernet0/1/0/13shutdowninterface GigabitEthernet0/1/0/14shutdowninterface GigabitEthernet0/1/0/15shutdowninterface GigabitEthernet0/1/0/16shutdowninterface GigabitEthernet0/1/0/17shutdowninterface GigabitEthernet0/1/0/18shutdowninterface GigabitEthernet0/1/0/19shutdowninterface GigabitEthernet0/1/0/20shutdowninterface GigabitEthernet0/1/0/21shutdowninterface GigabitEthernet0/1/0/22shutdowninterface GigabitEthernet0/1/0/23shutdowninterface GigabitEthernet0/1/0/24shutdowninterface GigabitEthernet0/1/0/25shutdowninterface GigabitEthernet0/1/0/26shutdowninterface GigabitEthernet0/1/0/27shutdowninterface GigabitEthernet0/1/0/28shutdowninterface GigabitEthernet0/1/0/29shutdowninterface GigabitEthernet0/1/0/30shutdowninterface GigabitEthernet0/1/0/31shutdowninterface GigabitEthernet0/1/0/32shutdowninterface GigabitEthernet0/1/0/33shutdowninterface GigabitEthernet0/1/0/34shutdowninterface GigabitEthernet0/1/0/35shutdowninterface GigabitEthernet0/1/0/36shutdowninterface GigabitEthernet0/1/0/37shutdowninterface GigabitEthernet0/1/0/38shutdowninterface GigabitEthernet0/1/0/39shutdowninterface TenGigE0/0/0/0description VXIaaS-N7K-1cdpinterface TenGigE0/0/0/0.712description T1 N7K-1vrf T1ipv4 point-to-pointipv4 address 10.8.78.2 255.255.255.252encapsulation dot1q 712interface TenGigE0/0/0/0.722description T2 N7K-1vrf T2ipv4 point-to-pointipv4 address 10.8.78.34 255.255.255.252encapsulation dot1q 722interface TenGigE0/0/0/0.732description T3 N7K-1vrf T3ipv4 point-to-pointipv4 address 10.8.78.66 255.255.255.252encapsulation dot1q 732interface TenGigE0/0/0/0.742description T4 N7K-1vrf T4ipv4 point-to-pointipv4 address 10.8.78.98 255.255.255.252encapsulation dot1q 742interface TenGigE0/0/0/0.752description T5 N7K-1vrf T5ipv4 point-to-pointipv4 address 10.8.78.130 255.255.255.252encapsulation dot1q 752interface TenGigE0/0/0/0.782description Global Tenant N7K-1vrf GTipv4 point-to-pointipv4 address 10.8.78.226 255.255.255.252encapsulation dot1q 782interface TenGigE0/0/0/1description VXIaaS-N1K-2cdpinterface TenGigE0/0/0/1.714description T1-N7K-2vrf T1ipv4 point-to-pointipv4 address 10.8.78.10 255.255.255.252encapsulation dot1q 714interface TenGigE0/0/0/1.724description T2-N7K-2vrf T2ipv4 point-to-pointipv4 address 10.8.78.42 255.255.255.252encapsulation dot1q 724interface TenGigE0/0/0/1.734description T3-N7K-2vrf T3ipv4 point-to-pointipv4 address 10.8.78.74 255.255.255.252encapsulation dot1q 734interface TenGigE0/0/0/1.744description T4-N7K-2vrf T4ipv4 point-to-pointipv4 address 10.8.78.106 255.255.255.252encapsulation dot1q 744interface TenGigE0/0/0/1.754description T5-N7K-2vrf T5ipv4 point-to-pointipv4 address 10.8.78.138 255.255.255.252encapsulation dot1q 754interface TenGigE0/0/0/1.784description GT-N7K-2vrf GTipv4 point-to-pointipv4 address 10.8.78.234 255.255.255.252encapsulation dot1q 784interface TenGigE0/0/0/2cdpshutdowninterface TenGigE0/0/0/3cdpshutdowninterface TenGigE0/0/0/4description SP-ASR9K-1cdpinterface TenGigE0/0/0/4.511vrf T1ipv4 point-to-pointipv4 address 10.8.2.2 255.255.255.252encapsulation dot1q 511interface TenGigE0/0/0/4.521vrf T2ipv4 point-to-pointipv4 address 10.8.2.10 255.255.255.252encapsulation dot1q 521interface TenGigE0/0/0/4.531vrf T3ipv4 point-to-pointipv4 address 10.8.2.18 255.255.255.252encapsulation dot1q 531interface TenGigE0/0/0/4.541vrf T4ipv4 point-to-pointipv4 address 10.8.2.26 255.255.255.252encapsulation dot1q 541interface TenGigE0/0/0/4.551vrf T5ipv4 point-to-pointipv4 address 10.8.2.34 255.255.255.252encapsulation dot1q 551interface TenGigE0/0/0/5description SP-ASR9K-2cdpinterface TenGigE0/0/0/5.513vrf T1ipv4 point-to-pointipv4 address 10.8.2.66 255.255.255.252encapsulation dot1q 513interface TenGigE0/0/0/5.523vrf T2ipv4 point-to-pointipv4 address 10.8.2.74 255.255.255.252encapsulation dot1q 523interface TenGigE0/0/0/5.533vrf T3ipv4 point-to-pointipv4 address 10.8.2.82 255.255.255.252encapsulation dot1q 533interface TenGigE0/0/0/5.543vrf T4ipv4 point-to-pointipv4 address 10.8.2.90 255.255.255.252encapsulation dot1q 543interface TenGigE0/0/0/5.553vrf T5ipv4 point-to-pointipv4 address 10.8.2.98 255.255.255.252encapsulation dot1q 553interface TenGigE0/0/0/6description VXIaaS-ASR9K-2cdpinterface TenGigE0/0/0/6.716description T1 ASR9K-2vrf T1ipv4 point-to-pointipv4 address 10.8.78.17 255.255.255.252encapsulation dot1q 716interface TenGigE0/0/0/6.726description T2 ASR9K-2vrf T2ipv4 point-to-pointipv4 address 10.8.78.49 255.255.255.252encapsulation dot1q 726interface TenGigE0/0/0/6.736description T3 ASR9K-2vrf T3ipv4 point-to-pointipv4 address 10.8.78.81 255.255.255.252encapsulation dot1q 736interface TenGigE0/0/0/6.746description T4 ASR9K-2vrf T4ipv4 point-to-pointipv4 address 10.8.78.113 255.255.255.252encapsulation dot1q 746interface TenGigE0/0/0/6.756description T5 ASR9K-2vrf T5ipv4 point-to-pointipv4 address 10.8.78.145 255.255.255.252encapsulation dot1q 756interface TenGigE0/0/0/6.786description GT ASR9K-2vrf GTipv4 point-to-pointipv4 address 10.8.78.241 255.255.255.252encapsulation dot1q 786interface TenGigE0/0/0/7description VXIaaS-ASR9K-2cdpinterface TenGigE0/0/0/7.717description T1 ASR9K-2vrf T1ipv4 point-to-pointipv4 address 10.8.78.21 255.255.255.252encapsulation dot1q 716interface TenGigE0/0/0/7.727description T2 ASR9K-2vrf T2ipv4 point-to-pointipv4 address 10.8.78.53 255.255.255.252encapsulation dot1q 726interface TenGigE0/0/0/7.737description T3 ASR9K-2vrf T3ipv4 point-to-pointipv4 address 10.8.78.85 255.255.255.252encapsulation dot1q 736interface TenGigE0/0/0/7.747description T4 ASR9K-2vrf T4ipv4 point-to-pointipv4 address 10.8.78.117 255.255.255.252encapsulation dot1q 746interface TenGigE0/0/0/7.757description T5 ASR9K-2vrf T5ipv4 point-to-pointipv4 address 10.8.78.149 255.255.255.252encapsulation dot1q 756interface TenGigE0/0/0/7.787description GT ASR9K-2vrf GTipv4 point-to-pointipv4 address 10.8.78.245 255.255.255.252encapsulation dot1q 786rd-set 100:110end-setrd-set 200:220end-setrd-set 300:330end-setrd-set 400:440end-setrd-set 500:550end-setrd-set 800:880end-setroute-policy allpassend-policyroute-policy GT-BGPpassend-policyroute-policy T1-BGPpassend-policyroute-policy T2-BGPpassend-policyroute-policy T3-BGPpassend-policyroute-policy T4-BGPpassend-policyroute-policy T5-BGPpassend-policyroute-policy GT-OSPFpassend-policyroute-policy T1-OSPFpassend-policyroute-policy T2-OSPFpassend-policyroute-policy T3-OSPFpassend-policyroute-policy T4-OSPFpassend-policyroute-policy T5-OSPFpassend-policyrouter staticvrf managementaddress-family ipv4 unicast0.0.0.0/0 10.8.66.1router ospf VXIaaSvrf GTrouter-id 8.8.8.1auto-cost reference-bandwidth 100000default-information originateredistribute bgp 42 route-policy GT-BGParea 0interface Loopback8network point-to-pointpassive enableinterface TenGigE0/0/0/0.782network point-to-pointneighbor 10.8.78.225interface TenGigE0/0/0/1.784network point-to-pointneighbor 10.8.78.233interface TenGigE0/0/0/6.786network point-to-pointneighbor 10.8.78.242interface TenGigE0/0/0/7.787network point-to-pointneighbor 10.8.78.246vrf T1router-id 1.1.1.1auto-cost reference-bandwidth 100000default-information originateredistribute bgp 42 route-policy T1-BGParea 0interface Loopback1network point-to-pointpassive enableinterface TenGigE0/0/0/0.712network point-to-pointneighbor 10.8.78.1interface TenGigE0/0/0/1.714network point-to-pointneighbor 10.8.78.9interface TenGigE0/0/0/6.716network point-to-pointneighbor 10.8.78.18interface TenGigE0/0/0/7.717network point-to-pointneighbor 10.8.78.22vrf T2router-id 2.2.2.1auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback2network point-to-pointpassive enableinterface TenGigE0/0/0/0.722network point-to-pointneighbor 10.8.78.33interface TenGigE0/0/0/1.724network point-to-pointneighbor 10.8.78.41interface TenGigE0/0/0/6.726network point-to-pointneighbor 10.8.78.50interface TenGigE0/0/0/7.727network point-to-pointneighbor 10.8.78.54vrf T3router-id 3.3.3.1auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback3network point-to-pointpassive enableinterface TenGigE0/0/0/0.732network point-to-pointneighbor 10.8.78.65interface TenGigE0/0/0/1.734network point-to-pointneighbor 10.8.78.73interface TenGigE0/0/0/6.736network point-to-pointneighbor 10.8.78.82interface TenGigE0/0/0/7.737network point-to-pointneighbor 10.8.78.86vrf T4router-id 4.4.4.1auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback4network point-to-pointpassive enableinterface TenGigE0/0/0/0.742network point-to-pointneighbor 10.8.78.97interface TenGigE0/0/0/1.744network point-to-pointneighbor 10.8.78.105interface TenGigE0/0/0/6.746network point-to-pointneighbor 10.8.78.114interface TenGigE0/0/0/7.747network point-to-pointneighbor 10.8.78.118vrf T5router-id 5.5.5.1auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback5network point-to-pointpassive enableinterface TenGigE0/0/0/0.752network point-to-pointneighbor 10.8.78.129interface TenGigE0/0/0/1.754network point-to-pointneighbor 10.8.78.137interface TenGigE0/0/0/6.756network point-to-pointneighbor 10.8.78.146interface TenGigE0/0/0/7.757network point-to-pointneighbor 10.8.78.150router bgp 42address-family ipv4 unicastaddress-family vpnv4 unicastvrf GTrd 800:880bgp router-id 8.8.8.1address-family ipv4 unicastredistribute ospf VXIaaS route-policy GT-OSPFneighbor 192.168.200.1remote-as 40address-family ipv4 unicastroute-policy all inroute-policy all outvrf T1rd 100:110bgp router-id 1.1.1.1address-family ipv4 unicastredistribute ospf VXIaaS route-policy T1-OSPFneighbor 10.8.2.1remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.65remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outvrf T2rd 200:220bgp router-id 2.2.2.1address-family ipv4 unicastredistribute ospf VXIaaS route-policy T2-OSPFneighbor 10.8.2.9remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.73remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outvrf T3rd 300:330bgp router-id 3.3.3.1address-family ipv4 unicastredistribute ospf VXIaaS route-policy T3-OSPFneighbor 10.8.2.17remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.81remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outvrf T4rd 400:440bgp router-id 4.4.4.1address-family ipv4 unicastredistribute ospf VXIaaS route-policy T4-OSPFneighbor 10.8.2.25remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.89remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outvrf T5rd 500:550bgp router-id 5.5.5.1address-family ipv4 unicastredistribute ospf VXIaaS route-policy T5-OSPFneighbor 10.8.2.33remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.97remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outssh server vrf managementend!! IOS XR Configuration 4.2.0!! Last configuration change at Mon Jan 14 18:48:08 2013 by adminhostname VXIaaS-DC-9K-2logging disabledomain name vxiaas.localcdpvrf GTvrf T1vrf T2vrf T3vrf T4vrf T5vrf managementline consoleexec-timeout 0 0length 23interface Loopback1description Tenant 1 VRF Loopbackvrf T1ipv4 address 192.168.10.2 255.255.255.255interface Loopback2description Tenant 2 VRF Loopbackvrf T2ipv4 address 192.168.20.2 255.255.255.255interface Loopback3description Tenant 3 VRF Loopbackvrf T3ipv4 address 192.168.30.2 255.255.255.255interface Loopback4description Tenant 4 VRF Loopbackvrf T4ipv4 address 192.168.40.2 255.255.255.255interface Loopback5description Tenant 5 VRF Loopbackvrf T5ipv4 address 192.168.50.2 255.255.255.255interface Loopback8description Global Tenant VRF Loopbackvrf GTipv4 address 192.168.80.2 255.255.255.255interface MgmtEth0/RSP0/CPU0/0description MGMT Interfacevrf managementipv4 address 10.8.66.16 255.255.255.0interface MgmtEth0/RSP0/CPU0/1shutdowninterface GigabitEthernet0/1/0/0description Global Tenant Internetvrf GTipv4 point-to-pointipv4 address 192.168.200.6 255.255.255.252interface GigabitEthernet0/1/0/1shutdowninterface GigabitEthernet0/1/0/2shutdowninterface GigabitEthernet0/1/0/3shutdowninterface GigabitEthernet0/1/0/4shutdowninterface GigabitEthernet0/1/0/5shutdowninterface GigabitEthernet0/1/0/6shutdowninterface GigabitEthernet0/1/0/7shutdowninterface GigabitEthernet0/1/0/8shutdowninterface GigabitEthernet0/1/0/9shutdowninterface GigabitEthernet0/1/0/10shutdowninterface GigabitEthernet0/1/0/11shutdowninterface GigabitEthernet0/1/0/12shutdowninterface GigabitEthernet0/1/0/13shutdowninterface GigabitEthernet0/1/0/14shutdowninterface GigabitEthernet0/1/0/15shutdowninterface GigabitEthernet0/1/0/16shutdowninterface GigabitEthernet0/1/0/17shutdowninterface GigabitEthernet0/1/0/18shutdowninterface GigabitEthernet0/1/0/19shutdowninterface GigabitEthernet0/1/0/20shutdowninterface GigabitEthernet0/1/0/21shutdowninterface GigabitEthernet0/1/0/22shutdowninterface GigabitEthernet0/1/0/23shutdowninterface GigabitEthernet0/1/0/24shutdowninterface GigabitEthernet0/1/0/25shutdowninterface GigabitEthernet0/1/0/26shutdowninterface GigabitEthernet0/1/0/27shutdowninterface GigabitEthernet0/1/0/28shutdowninterface GigabitEthernet0/1/0/29shutdowninterface GigabitEthernet0/1/0/30shutdowninterface GigabitEthernet0/1/0/31shutdowninterface GigabitEthernet0/1/0/32shutdowninterface GigabitEthernet0/1/0/33shutdowninterface GigabitEthernet0/1/0/34shutdowninterface GigabitEthernet0/1/0/35shutdowninterface GigabitEthernet0/1/0/36shutdowninterface GigabitEthernet0/1/0/37shutdowninterface GigabitEthernet0/1/0/38shutdowninterface GigabitEthernet0/1/0/39shutdowninterface TenGigE0/0/0/0description VXIaaS-N1K-1cdpinterface TenGigE0/0/0/0.713description T1 N7K-1vrf T1ipv4 point-to-pointipv4 address 10.8.78.6 255.255.255.252encapsulation dot1q 713interface TenGigE0/0/0/0.723description T2 N7K-1vrf T2ipv4 point-to-pointipv4 address 10.8.78.38 255.255.255.252encapsulation dot1q 723interface TenGigE0/0/0/0.733description T3 N7K-1vrf T3ipv4 point-to-pointipv4 address 10.8.78.70 255.255.255.252encapsulation dot1q 733interface TenGigE0/0/0/0.743description T4 N7K-1vrf T4ipv4 point-to-pointipv4 address 10.8.78.102 255.255.255.252encapsulation dot1q 743interface TenGigE0/0/0/0.753description T5 N7K-1vrf T5ipv4 point-to-pointipv4 address 10.8.78.134 255.255.255.252encapsulation dot1q 753interface TenGigE0/0/0/0.783description Global Tenant N7K-1vrf GTipv4 point-to-pointipv4 address 10.8.78.230 255.255.255.252encapsulation dot1q 783interface TenGigE0/0/0/1description VXIaaS-N1K-2cdpinterface TenGigE0/0/0/1.715description T1 N7K-2vrf T1ipv4 point-to-pointipv4 address 10.8.78.14 255.255.255.252encapsulation dot1q 715interface TenGigE0/0/0/1.725description T2 N7K-2vrf T2ipv4 point-to-pointipv4 address 10.8.78.46 255.255.255.252encapsulation dot1q 725interface TenGigE0/0/0/1.735description T3 N7K-2vrf T3ipv4 point-to-pointipv4 address 10.8.78.78 255.255.255.252encapsulation dot1q 735interface TenGigE0/0/0/1.745description T4 N7K-2vrf T4ipv4 point-to-pointipv4 address 10.8.78.110 255.255.255.252encapsulation dot1q 745interface TenGigE0/0/0/1.755description T5 N7K-2vrf T5ipv4 point-to-pointipv4 address 10.8.78.142 255.255.255.252encapsulation dot1q 755interface TenGigE0/0/0/1.785description GT-N7K-2vrf GTipv4 point-to-pointipv4 address 10.8.78.238 255.255.255.252encapsulation dot1q 785interface TenGigE0/0/0/2cdpshutdowninterface TenGigE0/0/0/3cdpshutdowninterface TenGigE0/0/0/4description SP-ASR9K-1cdpinterface TenGigE0/0/0/4.512vrf T1ipv4 point-to-pointipv4 address 10.8.2.6 255.255.255.252encapsulation dot1q 512interface TenGigE0/0/0/4.522vrf T2ipv4 point-to-pointipv4 address 10.8.2.14 255.255.255.252encapsulation dot1q 522interface TenGigE0/0/0/4.532vrf T3ipv4 point-to-pointipv4 address 10.8.2.22 255.255.255.252encapsulation dot1q 532interface TenGigE0/0/0/4.542vrf T4ipv4 point-to-pointipv4 address 10.8.2.30 255.255.255.252encapsulation dot1q 542interface TenGigE0/0/0/4.552vrf T5ipv4 point-to-pointipv4 address 10.8.2.38 255.255.255.252encapsulation dot1q 552interface TenGigE0/0/0/5description SP-ASR9K-2cdpinterface TenGigE0/0/0/5.514vrf T1ipv4 point-to-pointipv4 address 10.8.2.70 255.255.255.252encapsulation dot1q 514interface TenGigE0/0/0/5.524vrf T2ipv4 point-to-pointipv4 address 10.8.2.78 255.255.255.252encapsulation dot1q 524interface TenGigE0/0/0/5.534vrf T3ipv4 point-to-pointipv4 address 10.8.2.86 255.255.255.252encapsulation dot1q 534interface TenGigE0/0/0/5.544vrf T4ipv4 point-to-pointipv4 address 10.8.2.94 255.255.255.252encapsulation dot1q 544interface TenGigE0/0/0/5.554vrf T5ipv4 point-to-pointipv4 address 10.8.2.102 255.255.255.252encapsulation dot1q 554interface TenGigE0/0/0/6description VXIaaS-ASR9K-1cdpinterface TenGigE0/0/0/6.716description T1 ASR9K-1vrf T1ipv4 point-to-pointipv4 address 10.8.78.18 255.255.255.252encapsulation dot1q 716interface TenGigE0/0/0/6.726description T2 ASR9K-1vrf T2ipv4 point-to-pointipv4 address 10.8.78.50 255.255.255.252encapsulation dot1q 726interface TenGigE0/0/0/6.736description T3 ASR9K-1vrf T3ipv4 point-to-pointipv4 address 10.8.78.82 255.255.255.252encapsulation dot1q 736interface TenGigE0/0/0/6.746description T4 ASR9K-1vrf T4ipv4 point-to-pointipv4 address 10.8.78.114 255.255.255.252encapsulation dot1q 746interface TenGigE0/0/0/6.756description T5 ASR9K-1vrf T5ipv4 point-to-pointipv4 address 10.8.78.146 255.255.255.252encapsulation dot1q 756interface TenGigE0/0/0/6.786description GT ASR9K-1vrf GTipv4 point-to-pointipv4 address 10.8.78.242 255.255.255.252encapsulation dot1q 786interface TenGigE0/0/0/7description VXIaaS-ASR9K-1cdpinterface TenGigE0/0/0/7.717description T1 ASR9K-1vrf T1ipv4 point-to-pointipv4 address 10.8.78.22 255.255.255.252encapsulation dot1q 716interface TenGigE0/0/0/7.727description T2 ASR9K-1vrf T2ipv4 point-to-pointipv4 address 10.8.78.54 255.255.255.252encapsulation dot1q 726interface TenGigE0/0/0/7.737description T3 ASR9K-1vrf T3ipv4 point-to-pointipv4 address 10.8.78.86 255.255.255.252encapsulation dot1q 736interface TenGigE0/0/0/7.747description T4 ASR9K-1vrf T4ipv4 point-to-pointipv4 address 10.8.78.118 255.255.255.252encapsulation dot1q 746interface TenGigE0/0/0/7.757description T5 ASR9K-1vrf T5ipv4 point-to-pointipv4 address 10.8.78.150 255.255.255.252encapsulation dot1q 756interface TenGigE0/0/0/7.787description GT ASR9K-1vrf GTipv4 point-to-pointipv4 address 10.8.78.246 255.255.255.252encapsulation dot1q 786rd-set 100:110end-setrd-set 200:220end-setrd-set 300:330end-setrd-set 400:440end-setrd-set 500:550end-setrd-set 800:880end-setroute-policy allpassend-policyroute-policy GT-BGPpassend-policyroute-policy T1-BGPpassend-policyroute-policy T2-BGPpassend-policyroute-policy T3-BGPpassend-policyroute-policy T4-BGPpassend-policyroute-policy T5-BGPpassend-policyroute-policy GT-OSPFpassend-policyroute-policy T1-OSPFpassend-policyroute-policy T2-OSPFpassend-policyroute-policy T3-OSPFpassend-policyroute-policy T4-OSPFpassend-policyroute-policy T5-OSPFpassend-policyrouter staticvrf managementaddress-family ipv4 unicast0.0.0.0/0 10.8.66.1router ospf VXIaaSredistribute bgp 42 route-policy GT-BGPvrf GTrouter-id 8.8.8.2auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback8network point-to-pointpassive enableinterface TenGigE0/0/0/0.783network point-to-pointneighbor 10.8.78.229interface TenGigE0/0/0/1.785network point-to-pointneighbor 10.8.78.237interface TenGigE0/0/0/6.786network point-to-pointneighbor 10.8.78.241interface TenGigE0/0/0/7.787network point-to-pointneighbor 10.8.78.245vrf T1router-id 1.1.1.2auto-cost reference-bandwidth 100000default-information originateredistribute bgp 42 route-policy T1-BGParea 0interface Loopback1network point-to-pointpassive enableinterface TenGigE0/0/0/0.713network point-to-pointneighbor 10.8.78.5interface TenGigE0/0/0/1.715network point-to-pointneighbor 10.8.78.13interface TenGigE0/0/0/6.716network point-to-pointneighbor 10.8.78.17interface TenGigE0/0/0/7.717network point-to-pointneighbor 10.8.78.21vrf T2router-id 2.2.2.2auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback2network point-to-pointpassive enableinterface TenGigE0/0/0/0.723network point-to-pointinterface TenGigE0/0/0/1.725network point-to-pointneighbor 10.8.78.45interface TenGigE0/0/0/6.726network point-to-pointneighbor 10.8.78.49interface TenGigE0/0/0/7.727network point-to-pointneighbor 10.8.78.53vrf T3router-id 3.3.3.2auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback3network point-to-pointpassive enableinterface TenGigE0/0/0/0.733network point-to-pointneighbor 10.8.78.69interface TenGigE0/0/0/1.735network point-to-pointneighbor 10.8.78.77interface TenGigE0/0/0/6.736network point-to-pointneighbor 10.8.78.81interface TenGigE0/0/0/7.737network point-to-pointneighbor 10.8.78.85vrf T4router-id 4.4.4.2auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback4network point-to-pointpassive enableinterface TenGigE0/0/0/0.743network point-to-pointneighbor 10.8.78.101interface TenGigE0/0/0/1.745network point-to-pointneighbor 10.8.78.109interface TenGigE0/0/0/6.746network point-to-pointneighbor 10.8.78.113interface TenGigE0/0/0/7.747network point-to-pointneighbor 10.8.78.117vrf T5router-id 5.5.5.2auto-cost reference-bandwidth 100000default-information originatearea 0interface Loopback5network point-to-pointpassive enableinterface TenGigE0/0/0/0.753network point-to-pointneighbor 10.8.78.133interface TenGigE0/0/0/1.755network point-to-pointneighbor 10.8.78.141interface TenGigE0/0/0/6.756network point-to-pointneighbor 10.8.78.145interface TenGigE0/0/0/7.757network point-to-pointneighbor 10.8.78.149router bgp 42address-family ipv4 unicastaddress-family vpnv4 unicastvrf GTrd 800:880bgp router-id 8.8.8.2address-family ipv4 unicastredistribute ospf VXIaaS route-policy GT-OSPFneighbor 192.168.200.5remote-as 40address-family ipv4 unicastroute-policy all inroute-policy all outvrf T1rd 100:110bgp router-id 1.1.1.2address-family ipv4 unicastredistribute ospf VXIaaS route-policy T1-OSPFneighbor 10.8.2.5remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.69remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outvrf T2rd 200:220bgp router-id 2.2.2.2address-family ipv4 unicastredistribute ospf VXIaaS route-policy T2-OSPFneighbor 10.8.2.13remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.77remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outvrf T3rd 300:330bgp router-id 3.3.3.2address-family ipv4 unicastredistribute ospf VXIaaS route-policy T3-OSPFneighbor 10.8.2.21remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.85remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outvrf T4rd 400:440bgp router-id 4.4.4.2address-family ipv4 unicastredistribute ospf VXIaaS route-policy T4-OSPFneighbor 10.8.2.29remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.93remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outvrf T5rd 500:550bgp router-id 5.5.5.2address-family ipv4 unicastredistribute ospf VXIaaS route-policy T5-OSPFneighbor 10.8.2.37remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outneighbor 10.8.2.101remote-as 20address-family ipv4 unicastroute-policy all inroute-policy all outssh server vrf managementend8 Related Documents
The following links provide more detailed information regarding:
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)