Citrix Systems 4.2 manual About Cisco Nexus 1000v Distributed Virtual Switch

Page 130

Chapter 10. Installing VMware for CloudPlatform

10.6.Configuring a vSphere Cluster with Nexus 1000v Virtual Switch

CloudPlatform supports Cisco Nexus 1000v dvSwitch (Distributed Virtual Switch) for virtual network configuration in a VMware vSphere environment. This section helps you configure a vSphere cluster with Nexus 1000v virtual switch in a VMware vCenter environment. For information on creating a vSphere cluster, see Chapter 10, Installing VMware for CloudPlatform

10.6.1. About Cisco Nexus 1000v Distributed Virtual Switch

The Cisco Nexus 1000V virtual switch is a software-based virtual machine access switch for VMware vSphere environments. It can span multiple hosts running VMware ESXi 4.0 and later. A Nexus virtual switch consists of two components: the Virtual Supervisor Module (VSM) and the Virtual Ethernet Module (VEM). The VSM is a virtual appliance that acts as the switch's supervisor. It controls multiple VEMs as a single network device. The VSM is installed independent of the VEM and is deployed in redundancy mode as pairs or as a standalone appliance. The VEM is installed on each VMware ESXi server to provide packet-forwarding capability. It provides each virtual machine with dedicated switch ports. This VSM-VEM architecture is analogous to a physical Cisco switch's supervisor (standalone or configured in high-availability mode) and multiple linecards architecture.

Nexus 1000v switch uses vEthernet port profiles to simplify network provisioning for virtual machines. There are two types of port profiles: Ethernet port profile and vEthernet port profile. The Ethernet port profile is applied to the physical uplink ports-the NIC ports of the physical NIC adapter on an ESXi server. The vEthernet port profile is associated with the virtual NIC (vNIC) that is plumbed on a guest VM on the ESXi server. The port profiles help the network administrators define network policies which can be reused for new virtual machines. The Ethernet port profiles are created on the VSM and are represented as port groups on the vCenter server.

10.6.2. Prerequisites and Guidelines

This section discusses prerequisites and guidelines for using Nexus virtual switch in CloudPlatform. Before configuring Nexus virtual switch, ensure that your system meets the following requirements:

A cluster of servers (ESXi 4.1 or later) is configured in the vCenter.

Each cluster managed by CloudPlatform is the only cluster in its vCenter datacenter.

A Cisco Nexus 1000v virtual switch is installed to serve the datacenter that contains the vCenter cluster. This ensures that CloudPlatform doesn't have to deal with dynamic migration of virtual

adapters or networks across other existing virtual switches. See Cisco Nexus 1000V Installation and Upgrade Guide1 for guidelines on how to install the Nexus 1000v VSM and VEM modules.

The Nexus 1000v VSM is not deployed on a vSphere host that is managed by CloudPlatform.

When the maximum number of VEM modules per VSM instance is reached, an additional VSM instance is created before introducing any more ESXi hosts. The limit is 64 VEM modules for each VSM instance.

CloudPlatform expects that the Management Network of the ESXi host is configured on the standard vSwitch and searches for it in the standard vSwitch. Therefore, ensure that you do not migrate the management network to Nexus 1000v virtual switch during configuration.

1http://www.cisco.com/en/US/docs/switches/datacenter/nexus1000/sw/4_2_1_s_v_1_5_1/install_upgrade/vsm_vem/guide/ n1000v_installupgrade.html

122

Image 130
Contents Page Page Getting More Information and Help Upgrade InstructionsInstallation ConceptsUser Interface Installing XenServer for CloudPlatform 101Steps to Provisioning Your Cloud Infrastructure Installing VMware for CloudPlatform 117 Installing KVM for CloudPlatform 111Bare Metal Installation 135 Network Setup 161 Installing Oracle VM OVM for CloudPlatform 155Choosing a Deployment Architecture 157 Amazon Web Service Interface 177 Additional Installation Options 183Viii Citrix Knowledge Center Contacting Support Getting More Information and HelpAdditional Documentation Available ChapterPage What Can CloudPlatform Do? What Is CloudPlatform?Concepts Multiple Hypervisor SupportDeployment Architecture Overview Management Server Overview Cloud Infrastructure OverviewNetworking Overview More InformationFor more details, see , Network Setup Page About Regions Cloud Infrastructure ConceptsAbout Zones Cloud Infrastructure Concepts About Pods About Clusters About Hosts About Primary StorageAbout Secondary Storage About Physical NetworksBasic Zone Network Traffic Types Advanced Zone Network Traffic Types Basic Zone Guest IP AddressesAdvanced Zone Guest IP Addresses All zones Advanced Zone Public IP AddressesSystem Reserved IP Addresses A zone that uses advanced networkingPage Upgrade from 3.0.x to Upgrade InstructionsHypervisor Description Systemvmtemplate-2013-06-12-master-kvm.qcow2.bz2 Upgrade from 3.0.x to # service cloud-usage stop Copy the *.rpmnew file to create a new file. For example Iii. Update the existing password with the encrypted one Vii. Confirm that the table is updated Start the agent XenServer or KVM Upgrade from 2.2.x to Hypervisor Description Systemvmtemplate-2013-06-12-master-kvm.qcow2.bz2 Upgrade Name=rhel63 Baseurl=url-of-your-rhel6.3-repo Upgrade the host operating system from Rhel 6.0 to Copy the *.rpmnew file to create a new file. For example Update the agent software Restart libvirtd XenServer or KVM Upgrading and Hotfixing XenServer Hypervisor Hosts Upgrade from 2.1.x toUpgrading to a New XenServer Version Upgrade Instructions Applying Hotfixes to a XenServer Cluster Command displays the Uuid of the update file Page Page Overview of Installation Steps InstallationWho Should Read This Minimum System Requirements Host/Hypervisor System RequirementsHypervisor Compatibility Matrix CloudPlatformRhel Management Server Installation Overview Management Server InstallationPrepare the Operating System Edit the NTP configuration file to point to your NTP server Install the Management Server on the First Host Install and Configure the Database Install the Database on the Management Server NodeRestart the MySQL service Install the Database on a Separate Node # yum install mysql-server # chkconfig --level 35 mysqld on About Password and Key Encryption Changing the Default Password Encryption Using a Separate NFS Server Prepare NFS SharesUsing the Management Server As the NFS Server Edit the /etc/sysconfig/nfs file Prepare and Start Additional Management Servers Perform the steps in .4.2, Prepare the Operating SystemManagement Server Load Balancing Prepare the System VM Template Source Port Destination Port Protocol Persistence Required?Installation Complete! Next Steps Setting Configuration ParametersAbout Configuration Parameters Field Value Setting Local Configuration Parameters Setting Global Configuration ParametersGranular Global Configuration Parameters Between 0 and 1, of allocated Allocators will disable that pool Field Value Page Log In to the UI User InterfaceSupported Browsers End Users UI OverviewRoot Administrators UI Overview Logging In as the Root AdministratorChanging the Root Password Using SSH Keys for AuthenticationCreating an Instance from a Template that Supports SSH Keys Output is something similar to what is given below Creating the SSH KeypairResetting SSH Keys Logging In Using the SSH KeypairCreating an Instance Page Steps to Provisioning Your Cloud Infrastructure Overview of Provisioning StepsAdding Regions optional First Region The Default RegionAdding a Region Adding Third and Subsequent Regions Deleting a Region Create a Secondary Storage Mount Point for the New Zone Adding a ZoneSteps to Add a New Zone Basic Zone Configuration Network Offering DescriptionPage Steps to Provisioning Your Cloud Infrastructure Advanced Zone Configuration Steps to Provisioning Your Cloud Infrastructure Page Steps to Provisioning Your Cloud Infrastructure NFS Adding a Pod VmfsAdd Cluster KVM or XenServer Adding a ClusterAdd Cluster OVM VMware Cluster Size Limit Add Cluster vSphereAdding a vSphere Cluster Page Steps to Provisioning Your Cloud Infrastructure Adding a Host XenServer, KVM, or OVM Adding a HostRequirements for XenServer, KVM, and OVM Hosts Warning Adding a XenServer, KVM, or OVM Host KVM Host Additional RequirementsAdding Primary Storage Adding a Host vSphereAdding Secondary Storage Adding an NFS Secondary Staging Store for Each Zone Initialize and Test Page 100 Installing XenServer for CloudPlatform System Requirements for XenServer HostsInstalling XenServer for CloudPlatform XenServer Installation StepsConfigure XenServer dom0 Memory Username and Password Time SynchronizationLicensing Install CloudPlatform XenServer Support Package CSPGetting and Deploying a License Primary Storage Setup for XenServer ISCSI Multipath Setup for XenServer Optional Physical Networking Setup for XenServer Configuring Multiple Guest Networks for XenServer OptionalSeparate Storage Network for XenServer Optional NIC Bonding for XenServer OptionalPublic Network Bonding Management Network BondingCreating a Private Bond on the First Host in the Cluster Creating a Public Bond on the First Host in the ClusterComplete the Bonding Setup Across the Cluster Adding More Hosts to the Cluster110 Supported Operating Systems for KVM Hosts Installing KVM for CloudPlatformSystem Requirements for KVM Hypervisor Hosts System Requirements for KVM HostsInstalling the CloudPlatform Agent on a KVM Host Install and configure the AgentInstalling KVM for CloudPlatform Physical Network Configuration for KVM Primary Storage Setup for KVM Optional Time Synchronization for KVM HostsPage 116 Software requirements Installing VMware for CloudPlatformSystem Requirements for vSphere Hosts Hardware requirementsVCenter Server requirements Installing VMware for CloudPlatformOther requirements Networking Checklist for VMware Preparation Checklist for VMwareVCenter Checklist VCenter Requirement ValueConfigure Virtual Switch VSphere Installation StepsESXi Host setup Physical Host NetworkingConfigure NIC Bonding for vSphere Configure vCenter Management NetworkIncreasing Ports About Cisco Nexus 1000v Distributed Virtual Switch Prerequisites and GuidelinesNexus vSwitch Requirements Value Nexus 1000v Virtual Switch PreconfigurationPreparation Checklist Network Requirements ValueVSM Configuration Value Parameters Value Notes Creating a Port ProfileAssigning Physical NIC Adapters Adding Vlan RangesConfiguring Nexus 1000v Virtual Switch in CloudPlatform Enabling Nexus Virtual Switch in CloudPlatformParameters Description About VMware Distributed Virtual Switch Removing Nexus Virtual SwitchPrerequisites and Guidelines Preparation Checklist Fields Name Description Vmware.use.dvswitch Enabling Virtual Distributed Switch in CloudPlatformVmware.use.nexus.vswitch Configuring Distributed Virtual Switch in CloudPlatform ParametersStorage Preparation for vSphere iSCSI only Enable iSCSI initiator for ESXi hostsAdd iSCSI target Create an iSCSI datastore Add Hosts or Configure Clusters vSphereMultipathing for vSphere Optional 134 About Bare Metal Kickstart Installation Bare Metal InstallationBare Metal Host System Requirements Bare Metal Installation Limitations of Kickstart Baremetal InstallationSet Up Ipmi Provisioning a Bare Metal Host with KickstartEnable PXE on the Bare Metal Host Install the PXE and Dhcp ServersSet Up a File Server Output should show the following services running Create a Bare Metal Image Create a Bare Metal Compute OfferingSet Up the Security Group Agent Optional Create a Bare Metal Network OfferingFor example, if the RPMs are in the following directory Optional Set Bare Metal Configuration Parameters Add a Bare Metal ZoneAdd a Bare Metal Cluster Add a Bare Metal HostAdd the PXE Server and Dhcp Server to Your Deployment Create a Bare Metal Template Provision a Bare Metal Instance Test Bare Metal InstallationExample CentOS 6.x Kickstart File Example Fedora 17 Kickstart File Example Ubuntu 12.04 Kickstart File 150 Using Cisco UCS as Bare Metal Host CloudPlatform Registering a UCS ManagerAssociating a Profile with a UCS Blade Disassociating a Profile from a UCS Blade 154 Installing OVM on the Hosts Installing Oracle VM OVM for CloudPlatformOVM Installation Overview System Requirements for OVM HostsSet Up Hosts for System VMs Primary Storage Setup for OVMInstalling Oracle VM OVM for CloudPlatform Choosing a Deployment Architecture Small-Scale DeploymentLarge-Scale Redundant Setup Choosing a Deployment ArchitectureMulti-Node Management Server Separate Storage NetworkMulti-Site Deployment 160 Networking Feature Basic Network Advanced Network Network SetupBasic and Advanced Networking Vlan Allocation Example Example Hardware ConfigurationNetwork Setup DellLayer-2 Switch CiscoHardware Firewall Generic Firewall ProvisionsExternal Guest Firewall Integration for Juniper SRX Optional Ge-0/0/3 unit External Guest Firewall Integration for Cisco Vnmc Optional GuidelinesPrerequisites Using Cisco ASA 1000v Services Adding a Vnmc InstanceAdding an ASA 1000v Instance Creating a Network Offering Using Cisco ASA Reusing ASA 1000v Appliance in new Guest NetworksExternal Guest Load Balancer Integration Optional Security Requirements Topology RequirementsRuntime Internal Communications Requirements Guest Network Usage Integration for Traffic Sentinel Setting Zone Vlan and Running VM Maximums Guest.vlan.bits Maximum Running VMs per Maximum Zone VLANs176 Amazon Web Service Interface Amazon Web Services EC2 Compatible InterfaceAmazon Web Service Interface AWS API User Setup Steps Soap OnlyAWS API User Registration EC2 command Soap / Rest call CloudPlatform API call AWS API Command-Line Tools SetupSupported AWS API Calls Architecture, use Keys Pairs EC2 command Soap / Rest call CloudPlatform API call Requirements for Installing the Usage Server Additional Installation OptionsInstalling the Usage Server Optional Steps to Install the Usage ServerAdditional Installation Options Database Replication OptionalRestart MySQL Failover
Related manuals
Manual 6 pages 23.94 Kb Manual 272 pages 63.23 Kb

4.2 specifications

Citrix Systems, a leading provider of virtualization solutions and cloud computing technologies, released version 4.2 of its popular software, Citrix XenApp, which was previously known as Presentation Server. This version marked a significant evolution in providing users with remote access to applications and desktops, emphasizing simplicity, performance, and security.

One of the standout features of Citrix XenApp 4.2 is its improved application streaming capabilities. This technology allows applications to be delivered to users in real-time, reducing the need for extensive local installations and enhancing the user experience. With application streaming, administrators can efficiently manage applications on a central server while ensuring that users have immediate access to the necessary tools.

Another highlight of this version is the enhanced security measures put in place to protect sensitive data. Citrix XenApp 4.2 includes support for SSL encryption, providing a secure communication channel for data transmitted between the server and clients. This is particularly crucial for businesses that need to comply with strict data protection regulations. Additionally, the integration of endpoint security features ensures that unauthorized access to applications is minimized.

Performance enhancements are also a critical focus in this release. Citrix optimized the delivery of applications over various network conditions, ensuring that users experience minimal latency regardless of their location. This was achieved through the incorporation of SmartAccess and SmartControl technologies, which allow administrators to set policies based on user roles, device types, and network conditions. This level of granularity enables organization-wide security without compromising on usability.

The user experience was further improved with a revamped interface, making it easier for end-users to access their applications and data. Simplified menus, clear navigation paths, and the ability to customize user settings contributed to a more efficient workflow, allowing users to focus on their tasks rather than struggling with the software.

Finally, Citrix XenApp 4.2 was designed to be highly scalable. Organizations of all sizes could deploy this solution to deliver applications efficiently, adapting to their specific needs as their user base grows or changes. This flexibility is crucial for businesses looking to future-proof their IT investments while maintaining optimal performance.

In summary, Citrix XenApp 4.2 stands out with its enhanced application streaming, robust security features, improved performance under varying conditions, user-friendly interface, and scalability, making it an ideal choice for organizations seeking to leverage virtualization for remote access to applications and desktops.