Sunteți pe pagina 1din 37

BRKDCT-1870

14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1

Data Center Virtualization

BRKDCT-1870

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 2

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Housekeeping

ƒ We value your feedback—don’t forget to complete your


online session evaluations after each session and
complete the Overall Conference Evaluation which will
be available online from Thursday
ƒ Visit the World of Solutions
ƒ Please switch off your mobile phones
ƒ Please remember to wear your badge at all times
including the Customer Appreciation Event

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 3

Before We Get Started


ƒ Introduction level session focused on data center
virtualization technologies and solutions, including both
front-end and back-end networks as well as server
virtualization
ƒ Prerequisites: Being familiar with the basic LAN and SAN
design models as well as server virtualization technologies
ƒ Other recommended sessions
BRKDCT-2840 Data Center Networking: Taking Risk Away
Layer 2 Interconnects
BRKDCT-2866 Data Center Architecture Strategy and Planning
BRKDCT-2868 Network Integration of VMware Server
Virtualization—LAN and Storage
BRKDCT-3831 Advanced Data Center Virtualization

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 4

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Data Center Trends
Days to Deploy Applications 60–180

Server/Storage Utilization < 25%

Annual Storage Growth 40–400%

DC Records Retention (Years) 7–10

DC Power and Cooling Costs ~ 25–30%

Data Center Operations > 30%

“By 2008, 50% of Today’s Data Centers Will Have Insufficient Power
and Cooling Capacity to Meet the Demands of High-Density Equipment”
Source: Gartner, 2008
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 5

Data Center Virtualization

ƒ Enables consolidation or sharing of


physical assets to increase utilization

ƒ Reduces physical devices and cabling,


space, power, and cooling

ƒ Enables rapid deployment and redeployment


of resources to meet business objectives

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 6

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
“[Virtualization is] a technique for hiding the physical
characteristics of computing resources from the way in which
other systems, applications, or end users interact with those
resources. This includes making a single physical resource
(such as a server, an operating system, an application, or
storage device) appear to function as multiple logical
resources; or it can include making multiple physical
resources (such as storage devices or servers) appear as a
single logical resource.”

Mann, Andi, Virtualization 101


Enterprise Management Associates (EMA)

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 7

Consolidation and Isolation


Share All or Share Nothing?

No Isolation
ƒ Applications compete
Device 1
for resources
Application 1
One Physical ƒ Changes to one application
Device Application 2 can impact others
Application 3 ƒ Security and compliance
can be complex
Or Inefficient Isolation
Device 1
Application 1
ƒ Device sprawl
ƒ Underutilized resources
Many Physical Device 2
Devices Application 2 ƒ Complex to upgrade
Device 3 ƒ Complex service chaining
Application 3

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 8

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Data Center Virtualization
Physical Consolidation and Logical Isolation
Ideal Isolation
One Physical ƒ Partitioning enables
Device Virtual Device 1 segmentation of traffic
Security Admin and/or resources
Sys Admin ƒ Abstraction hides
Apps Admin physical resources
Network Admin ƒ Ideally per partition
RBAC enables
Virtual Device 2
customized,
Virtual Device 3
autonomous policies
Virtual Device 4
Multiple Virtual
Devices ..
Virtual Device 5

Virtual Device n

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 9

Data Center Virtualization


Network
Network Virtualization Virtualization
ƒ Consolidation of physical networks
ƒ Greater flexibility
ƒ Improved capacity utilization
Server
Virtualization
Server Virtualization App
App App App App

OS OS OS OS
ƒ Consolidation of physical servers OS
Hypervisor

ƒ Improved server utilization


ƒ Greater flexibility
Storage
Virtualization
Storage Virtualization
ƒ Consolidation of physical SANs
ƒ Improved storage utilization
ƒ Greater flexibility
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 10

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Network Virtualization

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 11

What Is Network Virtualization?

ƒ Virtualization: Many-to-one
ƒ One network consolidates many physical networks

Security Network

Guest/Partner Network

Backup Network

Out-of-Band Management Network

Data Center Network


BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 12

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Various Degrees of Virtualization

ƒ VPN, VRF, and VLAN Data/Control Plane

Logical separation of data plane


(and some control plane) functionality Data/Control Plane
+
ƒ Virtual contexts Management Plane

Logical separation of configuration Data/Control Plane


or management and data plane +
Management Plane
+
ƒ Virtual device contexts Resources
+
Logical separation of control plane, Operating Environment

data plane, management, resources,


and system processes

Hypervisor Model

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 13

Virtualized Network Devices

ƒ Switch virtualization: VLANs


ƒ Router virtualization: Virtual Routing/Forwarding (VRFs)

802.1q, GRE, LSP,


802.1q or Others
Physical Int, Others

VRF

VRF

Global
Logical or Logical or
Physical Int Physical Int
(Layer 3) (Layer 3)

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 14

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
IEEE 802.1q VLANs
ƒ Hardware-based isolation
of tagged traffic belonging
to different VLANs VLAN Header Is
Removed at Egress Point
ƒ No special drivers or
Cisco Catalyst Series
configuration required Cisco Nexus Series Trunk Port
for end nodes
(hosts, disks, etc.) IEEE802.1Q Trunk
Carries Tagged Traffic
from Multiple VLANs
ƒ Traffic tagged at ingress
Trunk Port
and carried across 802.1q VLAN Header Is
Added at Ingress Point
links between switches Indicating Membership

ƒ Servers may also No Special Support


be connected using Required by End Nodes

802.1q trunks
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 15

Virtual LANs
The Basics

ƒ All hosts on a VLAN typically communicate directly


ƒ A VLAN typically represents one IP subnet
ƒ Inter-VLAN traffic must use a router to communicate…
typically

.11 .12 .13 .11 .12 .13 .11 .12 .13


10.1.1.0/24 10.1.2.0/24 10.1.3.0/24
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 16

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Private VLANs
ƒ Promiscuous
ports receive Promiscuous Promiscuous
Port Port
and transmit Only One Subnet
to all hosts
ƒ Communities allow
communications
between groups
x x
ƒ Isolated ports talk
to promiscuous
ports only x

Primary VLAN
Community VLAN
.11 .12 .13 .14 .15 .16 .17 .18
Community VLAN
Community Community Isolated
Isolated VLAN
‘A’ ‘B’ Ports
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 17

Private VLAN Use Cases

ƒ Hosting environments
Multiple hosts can share a single .1
subnet while maintaining separation
Conserves IP addresses
Provides traffic separation, i.e. gold
.11 .12 .13 .14 .15 .16
customer cannot affect green
ƒ Security
Segmentation of DMZ attached or .1
public-facing servers
Remember to use ACLs on the
router
.11 .12 .13 .14 .15 .16
Can be used for worm mitigation

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 18

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Introduction to VRF
(Virtual Route Forwarding)

ƒ All routes learned are, by default, placed into a


consolidated routing table, which is referred to as
the “global” routing table
eigrp 1
Routes 10.2.1.0
10.5.3.0
Show ip route
10.1.2.0/24 ospf 1
10.2.1.0/24 10.4.6.0
10.5.3.0/24 Global Routing 10.5.1.0
10.6.3.0/24 Table
10.6.7.0/24
10.9.2.0/24

router eigrp 1 eigrp 1


network 10.1.1.0 255.255.255.0
! 10.6.7.0
router ospf 1 Routes 10.1.8.0
network 10.2.1.0 0.7.255.255 area 0
ospf 1
10.9.2.0
10.7.5.0

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 19

VRF Overview
What Is a VRF (Virtual Routing and Forwarding)?

ƒ VRFs allow dividing up your routing table into multiple virtual tables
ƒ Routing protocol extensions allow binding a process/address
family to a VRF
ƒ Interfaces are bound to a VRF using eigrp 1
Routes 10.2.1.0
ip vrf forwarding <vrf-name> 10.5.3.0

ospf 1
10.4.6.0
10.5.1.0
router eigrp 1
network 10.1.1.0 255.255.0.0
!
router ospf 1 vrf orange
network 10.2.1.0 0.7.255.255 area 0 …

eigrp 1
10.6.7.0
Show ip route Show ip route vrf orange 10.1.8.0
10.2.1.0 10.4.6.0 Routes
10.5.3.0 10.5.1.0 ospf 1
10.6.7.0 10.9.2.0 10.9.2.0
10.1.8.0 10.7.5.0 10.7.5.0

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 20

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Simplifying Data Center Operations
with Virtualization

ƒ Complex, error-prone service chaining and cabling


ƒ Indirect failure detection difficult to troubleshoot
ƒ Inefficient use of resources

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 21

Enhancing Application
Availability with VRF

ƒ Direct detection of component


failure
ƒ Simplifies topology and VRF VRF

troubleshooting
ƒ Predictable traffic flows
ƒ Improved availability VRF VRF

VRF VRF

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 22

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Virtual Switch Networking

ƒ Traditional data center designs require switched


(Layer 2) adjacencies between server nodes due
to prevalence of VMware virtualization technology
ƒ Large Layer 2 networks, placing more burden
on loop-detection protocols such as Spanning Tree
ƒ Virtual switch networks enable extended switched
networks to be built

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 23

Cisco Virtual Switch Networks


ƒ Virtualizes identity of two or more
switches into a single entity
ƒ Simplifies large scale data center
networks topology and operations
Single switch configuration and O/S
ƒ Scales data center performance
and density
Multichassis EtherChannel
Reduces protocol adjacencies
ƒ Maximizes application availability
Stateful, interchassis NSF/SSO
ƒ Maintains investment in Cisco
Catalyst features and hardware

BRKRST-3468: Cisco Catalyst Virtual Switching System (VSS)


BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 24

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Common Data Center Challenges
L3 Core
FHRP, HSRP, VRRP
Spanning Tree
Policy Management

L2/L3 Distribution
Single Active Uplink
per VLAN, L2
Reconvergence,
Excessive BPDUs

L2 Access
Single Active Uplink
per VLAN, L2
Reconvergence

Servers
Dual-Homed
Active/Standby,
Limited VM Mobility
Due to L3 Constraints
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 25

Virtual Switch System at Data Center


A Virtual Switch-Enabled Data Center Allows for Maximum Scalability so
Bandwidth Can Be Added When Required, but Still Providing a Larger
Layer 2 Hierarchical Architecture Free of Reliance on Spanning Tree

L3 Core
Single L2/L3 Node, Fast
Convergence, Scalable, VLAN
Extension Without Spanning Tree

L2/L3 Distribution
Fast L2 Convergence, Minimized
L2 Control Plane, Scalable,
No Spanning Tree

L2 Access
Multichassis EtherChannel,
Fast L2 Convergence,
No Spanning Tree

Servers
Dual-Homed Active/Active,
Multichassis EtherChannel
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 26

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Enhancing Data Center Availability
and Mobility with VSS

Root

Active Active

Stdby Stdby

Data Center 1 Data Center 2

ƒ Extending VLANs between data centers required for application


HA and mobility
Geoclustering, Veritas, VMware
ƒ Requires careful consideration of spanning tree behavior
ƒ Inefficient bandwidth utilization
Spanning tree operation blocks paths
NIC teaming requires Active/Standby
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 27

Enhancing Availability and


Mobility with VSS
VSS VSS VSS VSS
Root
Active Active

Active Active

Data Center 1 Data Center 2


Multichassis EtherChannel

ƒ Simplifies network configuration and topology


Single adjacency between VSS switches
ƒ Multichassis EtherChannel between VSS switches
Eliminates Spanning Tree*
ƒ Efficient bandwidth utilization
All paths forwarding—increased throughput

*Spanning Tree runs in the background as a safety net


BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 28

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Virtual Private LAN Services (VPLS)
Layer 2 Extension Across Layer 3

10.1.1.12
10.1.1.11 Routed
IP Network
10.1.1.13

ƒ Multipoint Layer 2 VPN


ƒ Enables extension of Layer 2 VLAN across routed infrastructure
for Geoclustering or VMotion
ƒ Connects two or more customer devices using Ethernet bridging
techniques
ƒ Requires MPLS for forwarding
ƒ For more information BRKAGG-2000 or BRKDCT-2840
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 29

Virtual Device Contexts


ƒ Enables coexistence of disparate networks on the same
physical infrastructure
Physical Switch

L2
L2 Protocols
Protocols L3
L3 Protocols
Protocols L2
L2 Protocols
Protocols L3
L3 Protocols
Protocols L2
L2 Protocols
Protocols L3
L3 Protocols
Protocols

VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP
VLAN
VLAN Mgr
LACP
LACP
Mgr UDLD
UDLD
CTS
CTS
BGP
BGP
EIGRP
EIGRP
HSRP
HSRP
VRRP
VRRP
VLAN
VLAN Mgr
LACP
LACP
Mgr UDLD
UDLD
CTS
CTS
BGP
BGP
EIGRP
EIGRP
HSRP
HSRP
VRRP
VRRP
… VLAN
VLAN Mgr
LACP
LACP
Mgr UDLD
UDLD
CTS
CTS
BGP
BGP
EIGRP
EIGRP
HSRP
HSRP
VRRP
VRRP
IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP

L2
L2 Table
Table RIB
RIB RIB
RIB RIB
RIB RIB
RIB RIB
RIB

Protocol
Protocol Stack
Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack
Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack
Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2)
VDC1 VDC2 VDCn

Infrastructure
NX-OS Kernel
Hardware

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 30

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Virtual Device Context
ƒ Enables consolidation of networks on a single infrastructure
For example, production, stage and development

ƒ Isolated configuration and management environments


ƒ Independent isolated processes (OSPF, Spanning Tree, etc.)
per VDC

L2
L2 Protocols
Protocols L3
L3 Protocols
Protocols L2
L2Protocols
Protocols L3
L3 Protocols
Protocols L2
L2Protocols
Protocols L3
L3 Protocols
Protocols L2
L2 Protocols
Protocols L3
L3 Protocols
Protocols L2
L2 Protocols
Protocols L3
L3 Protocols
Protocols L2
L2Protocols
Protocols L3
L3 Protocols
Protocols L2
L2 Protocols
Protocols L3
L3 Protocols
Protocols L2
L2Protocols
Protocols L3
L3 Protocols
Protocols L2
L2Protocols
Protocols L3
L3 Protocols
Protocols L2
L2 Protocols
Protocols L3
L3 Protocols
Protocols

VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP VLAN
VLAN Mgr
Mgr UDLD
UDLD OSPF
OSPF GLBP
GLBP
VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP VLAN
VLAN Mgr
Mgr UDLD
UDLD BGP
BGP HSRP
HSRP
LACP
LACP CTS
CTS EI GRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EIGRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EIGRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EI GRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EI GRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EIGRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EI GRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EIGRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EIGRP
EIGRP VRRP
VRRP LACP
LACP CTS
CTS EI GRP
EIGRP VRRP
VRRP
IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PI
PIMM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PI
PIMM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PI
PIMM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP IGMP
IGMP 802.1x
802.1x PIM
PIM SNMP
SNMP

L2
L2 Table
Table RIB
RIB RIB
RIB RIB
RIB RIB
RIB RIB
RIB L2
L2 Table
Table RIB
RIB L2
L2 Table
Table RIB
RIB RIB
RIB RIB
RIB L2
L2 Table
Table RIB
RIB RIB
RIB RIB
RIB RIB
RIB RIB
RIB L2
L2 Table
Table RIB
RIB

Protocol
Protocol Stack
Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack
Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack
Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack
Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2) Protocol
Protocol Stack
Stack (IPv4/IPv6/L2)
(IPv4/IPv6/L2)
VDC1 VDC2 VDCn VDC4 VDC1 VDC2 VDC4 VDC2 VDCn VDC4

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 31

Application
Infrastructure
“Virtualization”

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 32

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Application Infrastructure Virtualization
DNS
Global Site Selector
www.cisco.com: A 10.1.1.1 10.1.1.1

10.1.1.1
10.1.2.1

10.1.2.2

10.1.2.3

ƒ Defines services that can be used to abstract and segment


applications, for example:
DNS abstracts service from IP address
Virtual IP abstracts physical servers
Abstracts SSL from servers

ƒ Improves performance, availability, and operations


BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 33

Application Networking Services


Global Site Selection and Application Awareness
ACE
Advanced
Data Center #1 Server Load
10.1.1.1 Balancing

DNS Request DNS Response


www.foo.com 10.1.1.1
10.1.1.2

10.1.1.2
GSS
Fully Integrated DNS
Server with Intelligent
Site Selection Data Center #2

ƒ Intelligent site selection enables Active/Active data center


ƒ Intelligent failover based on site, device, or virtual device failure
ƒ Stateful operation limits business impact of an outage
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 34

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
SLB: Layer 4
10.1.1.1: 80

SYN 192.1.1.1 10.1.1.1 SYN 192.1.1.1 10.1.2.2


10.1.2.1
192.1.1.1 10.1.1.1 SYN-ACK 192.1.1.1 10.1.2.2 SYN-ACK
10.1.2.2
ACK 192.1.1.1 10.1.1.1 ACK 192.1.1.1 10.1.2.2
10.1.2.3

ƒ Layer 4 load balancing decision made upon TCP


connection set up to VIP and TCP port
ƒ Does not inspect HTTP/SOAP headers
ƒ Load balancer rewrites destination IP address
ƒ May rewrite source IP address
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 35

SLB: Delayed Binding


SYN 192.1.1.1 10.1.1.1 10.1.1.1

192.1.1.1 10.1.1.1 SYN-ACK

ACK 192.1.1.1 10.1.1.1


10.1.2.1
http://foo 192.1.1.1 10.1.1.1
10.1.2.2
SYN 192.1.1.1 10.1.2.2
10.1.2.3
192.1.1.1 10.1.2.2 SYN-ACK

ACK 192.1.1.1 10.1.2.2

http://foo 192.1.1.1 10.1.2.2

ƒ Delayed binding negotiates TCP handshake first


ƒ Makes SLB decision based upon http header
ƒ Enables TCP reuse—can improve server performance
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 36

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Simplifying Data Center
Operations with Virtualization

ƒ Per application
SLB/SSL/firewalls
C1 C2 C3
ƒ Underutilized devices
ƒ Inefficient space,
power, cooling …

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 37

Enhancing Data Center


Operations with Virtualization
ƒ Consolidate multiple
devices into a single device
ƒ Separate, autonomous
policies with guaranteed
resources per virtual device
ƒ On-demand, virtual device
creation accelerates
deployment
C1 C2 C3 C4
ƒ Reduces physical
infrastructure
ƒ Space, power and
cooling, and cabling

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 38

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Storage Virtualization

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 39

Today’s Storage Area Networks


Siloed, Inflexible, Inefficient

ƒ Storage aligned by application or department


ƒ Underutilized islands of storage
ƒ Duplicated inefficient resources
ƒ Limited flexibility to share storage, or migrate data and workloads

Back-Up E-Mail OLTP

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 40

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
VSAN Advantages for Consolidation
SAN Islands Consolidated SANs
Blade Server VSAN-Specific
VSAN_1 Array
(Access via IVR)
OLTP OLTP
VSAN_1 VSAN_1

E-Mail
VSAN_2
Overlay Isolated Virtual IVR
IVR

Fabrics (VSANs) on Same Back-up


Physical Infrastructure VSAN_3

Tape
OLTP VSAN_4
Back-Up E-Mail IVR
(Access
via IVR)

E-Mail Back-Up
VSAN_2 VSAN_3

Attribute
More Number of SAN Switches Fewer
No Share Disk/Tape Yes
No Share DR Facilities Yes
Complex SAN Management Simple
Very Hard Virtualization and Mobility Easy
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 41

VSAN Technology
The Virtual SANs Feature
Consists of Two Primary
Functions Fiber Channel
Services for
ƒ Hardware-based isolation of tagged VSAN Header Is
Blue VSAN

Removed at Egress Fiber Channel


traffic belonging to different VSANs Point Services for
Red VSAN
No special drivers or configuration Cisco MDS 9000
required for end nodes (hosts, disks, etc.) Family with VSAN Trunking
Service E_Port
Traffic tagged at Fx_Port ingress and (TE_Port)
carried across EISL (enhanced ISL) links
Enhanced ISL (EISL)
between switches Trunk Carries
Tagged Traffic from
ƒ Create independent instance of fiber Multiple VSANs
channel services for each newly Trunking
E_Port
created VSAN—services include: VSAN Header Is (TE_Port)
Added at Ingress
Zone server, name server, management Point Indicating Fiber Channel
Membership Services for
server, principle switch election, etc. Blue VSAN

Each service runs independently and No Special Fiber Channel


Support Required Services for
is managed/configured independently by End Nodes Red VSAN

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 42

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Inter-VSAN Routing
ƒ Similar to L3 Blade Server with Integrated
MDS 9100 Switch
interconnection Blade Server
VSAN_1
VSAN-Specific
Disk

between VLAN (Access via IVR)


Engineering
Engineering VSAN_1
VSAN_1

ƒ Allows sharing of Marketing


centralized storage VSAN_2

IVR
services such as tape IVR
HR
VSAN_3

libraries and disks


without merging
separate VSANs IVR

ƒ Network address Marketing


VSAN_2
Tape
VSAN_4

translation allow (Access via IVR)

interconnection of VSANs
HR
without a predefined VSAN_3

addressing schema
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 43

Inter-VSAN Routing (IVR)


Resilient SAN Extension Solutions

ƒ IVR minimizes the impact of change in fabric services across


geographically dispersed sites
Limit fabric control traffic such as SW-RSCNs and build/reconfigure fabric
(BF/RCF) to local VSANs
Flexible connectivity with the highest availability
Works with any transport service (FC, SONET, DWDM/CWDM, FCIP)
Inter-VSAN
Connection with Completely
Primary Data Center Isolated Fabrics Secondary Data Center

Replication
Replication
VSAN_4
VSAN_1 EISL#1 in
Port Channel

Metro DWDM
CWDM
SONET/SDH
FCIP
IVR IVR
Transit EISL#2 in
VSAN_3 (IVR) Port Channel

Local Local
VSAN_2 VSAN_5

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 44

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Storage Volume Virtualization

Initiator Target

Initiator Target

SAN
Fabric

ƒ Adding more storage requires administrative changes


ƒ Administrative overhead, prone to errors
ƒ Complex coordination of data movement between arrays

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 45

Storage Volume Virtualization


Virtual Virtual
Target 1 Initiator
VSAN_10 VSAN_30

Initiator Virtual Volume


VSAN_10 1

Virtual Virtual Volume Virtual


Initiator 2
Target 2 Initiator
VSAN_20
VSAN_20 VSAN_30
SAN
Fabric

ƒ A SCSI operation from the host is mapped in one or more


SCSI operations to the SAN-attached storage
ƒ Zoning connects real initiator and virtual target or virtual
initiator and real storage
ƒ Works across heterogeneous arrays
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 46

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Sample Use: Seamless Data Mobility
Virtual Virtual
Target 1 Initiator
VSAN_10 VSAN_30

Initiator Virtual Volume


VSAN_10 1 Tier_2 Array

Virtual Virtual Volume Virtual


Initiator 2
Target 2 Initiator
VSAN_20 Tier_2 Array
VSAN_20 VSAN_30
SAN
Fabric

ƒ Works across heterogeneous arrays


ƒ Nondisruptive to application host
ƒ Can be utilized for “end-of-lease” storage migration
ƒ Movement of data from one tier class to another tier

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 47

N-Port ID Virtualization (NPIV)


Application Server

ƒ Separate network port per


application for SAN segmentation
on server
File
E-Mail Web
ƒ Fabric port applies access control, Services

zoning, Port Security (PSM)


N_Port N_Port N_Port
ƒ Inefficient resource utilization ID-2 ID-2 ID-3

Multiple Host BUS Adapters (HBA)


Multiple SAN ports
F_Port F_Port F_Port
ƒ New applications may require
another HBA E_Port
E_Port
ƒ Expansion ports connect switches
ƒ SAN Fundamentals:
BRKSAN-2000 E-Mail Web File and Print
VSAN_3 VSAN_2 VSAN_1

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 48

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
NPIV Usage Examples
Virtual Machine Aggregation
ESX 3.5-Enabled Server

ƒ Associates multiple N_Port


IDs to a single N_Port
File
E-Mail Web
ƒ N_Port IDs are associated Services

to the same VSAN N_Port N_Port N_Port


ID-2 ID-2 ID-3
ƒ Inter-VSAN routing
compliments access vHBA

control, zoning, Port Security NPIV-


Enabled HBA
(PSM) implemented at
application level F_Port

E_Port
ƒ Efficient use of HBA and E_Port

SAN resources
ƒ Add new applications
without adding hardware E-Mail
VSAN_3
Web
VSAN_2
File and Print
VSAN_1

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 49

Blade Switch/Top-of-Rack
Domain ID Explosion
ƒ Domain ID used for
addressing, routing, and
access control
Blade Switch
ƒ One domain ID per
SAN switch
ƒ Theoretically 239 domain
ID, practically much less
supported
ƒ Limits SAN fabric scalability Blade Switches
Increase Domain MDS
Theoretical
Maximum: 239
IDs, Increase 9500 Domain IDs

ƒ SAN Fundamentals: Fabrics per SAN

BRKSAN-2000
Tier 1 Tier 2 Tape Farm

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 50

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Cisco MDS Network Port Virtualization
ƒ Eliminates edge switch
Domain ID
ƒ Edge switch acts as an Blade Switch
NPIV host
ƒ Simplifies server and
SAN management and
operations NPV NPV NPV NPV

ƒ Increases fabric scalability


NPV-Enabled Edge Switch
ƒ SAN Fundamentals: Switches Do
Not Use
MDS
9500
Acts as a
NPIV Host
Domain IDs NPV NPV
BRKSAN-2000
Supports
Up to 100 Edge
Switches

Tier 1 Tier 2 Tape Farm

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 51

Flex Attach (Virtual PWWN)


ƒ Assign virtual PWWN Before
on NPV switch port
ƒ Zone vPWWN to storage FC1/1
vPWWN1

ƒ LUN masking is done PWWN1

on vPWWN pwwn1 pwwnX vpwwn1 pwwnX

ƒ Reduce operational overhead


Enables server or physical
HBA replacement After
No need for zoning modification
No LUN masking change FC1/1
vPWWN1
ƒ Automatic link to new PWWN PWWN2

No manual relinking to new PWWN


pwwn2 pwwnX vpwwn1 pwwnX
is needed

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 52

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Server Virtualization

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 53

Data Center Virtualization Technologies


Server Virtualization

ƒ A single physical server


hosting multiple independent
Guest OS + application(s)
ƒ Hypervisor abstracts physical
hardware from Guest O/S
and application
CPU
Presents a standard “server”
to the O/S and application vNIC Hypervisor Virtual Machine
Virtual SMP Virtual Switch File System
May present multiple
Identities (IP + MAC) VMFS
RAM
ƒ Partitions systems resources
RAM, CPU, disk, etc. pNIC HBA
ƒ Multiple implementations
VMware, XEN, Microsoft,
Sun containers
Each implementation is different
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 54

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Virtual Machine Hypervisor Networking
ƒ Each VM vNIC has a unique MAC
address (and IP address)
Be aware of IP subnetting and MAC address

ƒ vSwitch forwards traffic using standard


bridge forwarding rules
Virtual Machines
ƒ vSwitch does not learn MAC addresses
nor participate in Spanning Tree VLANs VLAN
“A” “B”
ƒ IP multicast constrained by vNIC
programming forwarding entries on
vSwitch pNIC0 pNIC1 pNIC2 pNIC3

ƒ vSwitch does not forward traffic received


on one pNIC to another
ƒ VLANs can be used traffic segmentation
and security purposes
pNIC filters “noninteresting”
VLAN-tagged traffic
ƒ vSwitches and associated VLANs are
managed independently of the main
data center network
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 55

Virtual Machine Considerations


ƒ Virtual machines
multiply network
resource utilization
ƒ Increased control
and data plane Virtual
demands Servers
Real
Servers
Port Address
Port Address
Port Address
ƒ Switch and network Port 2/1 Address
Port 2/1 Address
Port 2/1 Address
aa.aa.aa
aa.aa.aa
Port Addressaa.aa.aa
architecture are Port 2/1
2/1 Address
2/1 2/1
2/1
2/1
aa.aa.aa
aa.aa.aa
aa.aa.aa
bb.bb.bb
bb.bb.bb
2/1 aa.aa.aabb.bb.bb
critical considerations 2/1 2/1 2/1
aa.aa.aa
2/1
2/1
bb.bb.bb
bb.bb.bbcc.cc.cc
cc.cc.cc
12,000
10,000
16,000
14,000
8,000
6,000
4,000
2,000 2/1
2/1 2/1
2/1 2/1
bb.bb.bb
bb.bb.bb
bb.bb.bb
cc.cc.cc
cc.cc.cc
dd.dd.dd
2/1cc.cc.cc
ƒ Network availability is 2/1
2/1 2/1
2/1
dd.dd.dd
2/1cc.cc.cc
dd.dd.dd
cc.cc.cc
2/1 2/1 dd.dd.dd
2/1cc.cc.cc ee.ee.ee
of paramount 2/1 2/1 dd.dd.dd
ee.ee.ee
2/1 2/1 dd.dd.dd
ee.ee.ee
2/1 2/1 dd.dd.dd
dd.dd.ddee.ee.ee
2/1 2/1 2/1 11.11.11
importance 2/1
2/1 2/1
2/1
2/1
ee.ee.ee
ee.ee.ee
ee.ee.ee
11.11.11
11.11.11
2/1 11.11.11
2/1 ee.ee.ee
11.11.11
2/1 11.11.11
2/1
2/1 11.11.11
11.11.11
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 56

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Virtual Machine Considerations
ƒ Hardware MAC learning Virtual Servers

ƒ Control plane policing


ƒ Topology-based forwarding
ƒ Broadcast suppression
ƒ Layer 2 trace

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 57

Physical and Virtual Machine Security


ƒ Security policies for physical servers must be mapped to virtual servers
ƒ The network “sees” no difference between physical and virtual machines
ƒ Can be achieved today by synchronizing VLANs between VM
and network, and collaborating

Physical Virtual

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 58

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
VM Hypervisor Storage Networking
ƒ VMFS abstracts physical
storage from Guest O/S
and application
Presents a SCSI Disk to the O/S
O/S cannot discover physical CPU
HBA or LUNs
vDisk vDisk VMFS vDisk
ƒ Presents a single HBA to
vDisk

the SAN RAM


Prior to ESX 3.5 pHBA

May require SAN consolidation


Can introduce scaling or
compliance problems

ƒ Distributed file system ensures


operation across clusters

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 59

VM Hypervisor Storage Networking


ƒ ESX 3.5 raw device
mode enables vHBA to
be presented to the
SAN fabric
Guest OS accesses CPU

VMFS using SCSI VMFS


vDisk vDisk vDisk vDisk

ƒ IVR and NPIV support


RAM vHBA vHBA vHBA vHBA
maintains SAN separation
and VM mobility NPIV HBA

Consistent separation and


policy enforcement ensures
compliance

HR Marketing Engineering
BRKDCT-1870 VSAN_3 VSAN_2 VSAN_1
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 60

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Virtual Machine: Mobility and
Business Continuance
E-Mail Web File and Print
VSAN_3 VSAN_2 VSAN_1

ƒ Process migration increases


application availability
VMotion Control network
recommended for VM migration

IVR IVR ƒ LAN requires Layer 2 path


pHBA pHBA to maintain user sessions
vHBA vHBA
during migration
ƒ Embedded network services
enable consistent policy
VLAN
“A”
VLAN
“B”
VLAN
“A”
VLAN
“B”
enforcement and user
experience
ƒ Inter-VSAN routing enables
mobility with secure fabric
isolation

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 61

Orchestrating
Virtual IT

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 62

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Data Center Virtualization

FC

Security LAN SLB LAN Servers SAN Storage


BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 63

Application Service Provisioning


Design, Orchestration, and Deployment
VLAN_A VLAN_B VLAN_D VLAN_E Server VSAN_Z
Service
Delivery
Chain Partition_1 Partition_1

Firewall VLANs L4–L7 Server Boot OS/ VSANs


Service Application
Components

Firewall, Switch VIPs, LB CPU Boot Zones,


Service Context, Config Policies, Memory, Image, VM, VSANs,
Policies, VLAN, Port Probes IO, etc. Application LUNs,
Policies etc. SVIs, etc. Volumes

Automated Failover Policy-Based Resource Optimization


Automate
Management Integration API Service Maintenance

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 64

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Data Center Virtualization
The Foundation for Data Center Automation

FC

Security LAN SLB LAN Servers SAN Storage

End-to-End Service Provisioning


BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 65

Data Center Virtualization


and Automation

ƒ Simplify and accelerate application deployment


ƒ Programmatic, repeatable deployment patterns
improves operations by automating error prone,
repetitive tasks
ƒ Dynamically react to data center conditions
Allocate servers based upon workload, time of day, etc.
Turn down unused servers to reduce power load
Rapidly deploy new applications

ƒ Web Services API integration


Integrates with upstream management tools

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 66

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Summary

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 67

Data Center Virtualization


Summary

ƒ The foundation for Utility


Computing…
ƒ Can significantly improve asset
utilization
ƒ More than one single
technology
ƒ Can reduce power & cooling, &
cabling overhead
ƒ May increase operational
complexity

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 68

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Q and A

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 69

Recommended Reading

ƒ Continue your Cisco


Live learning experience
with further reading from
Cisco Press
ƒ Check the Recommended
Reading flyer for
suggested books

Available Onsite at the Cisco Company Store


BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 70

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
Recommended Reading

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 71

Complete Your Online


Session Evaluation
ƒ Give us your feedback and you could win Don’t forget to activate
fabulous prizes. Winners announced daily. your Cisco Live virtual
account for access to
ƒ Receive 20 Passport points for each session all session material
evaluation you complete. on-demand and return
for our live virtual event
ƒ Complete your session evaluation online now in October 2008.
(open a browser through our wireless network Go to the Collaboration
to access our portal) or visit one of the Internet Zone in World of
stations throughout the Convention Center. Solutions or visit
www.cisco-live.com.

BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 72

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr
BRKDCT-1870
14484_04_2008_c2 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 73

© 2006, Cisco Systems, Inc. All rights reserved.


Presentation_ID.scr

S-ar putea să vă placă și