I am currently working on a new vmware esxi 4.1 install and I need some assistance on the network layout. We have 2 Dell R710's with 12 nics each. 2 stacked powerconnect 6224 and 1 Equallogic's PS6000E SAN. My plans are to use 8 of the nics on each server for the SAN traffic and the other 6 for production, vmotion, HA , and FT. How would the ip addressing be assigned for each of the nics and what should the ip address be on the 2 esxi host. This is new install so I can use any network configuration scheme.
A PS6000 has only 4 active NICs (the second controller is stand by).
So with a single member does not really make sense use more than 4 NIC for iSCSI.
The other 8 NIC can be used: 3 for Management/HA, vMotion and FT
And the other 5 for VMs
That makes sense to use only 4 nics on PS6000, I don't know why i was thinking 8. So 1 nic for Management/HA, 1 for vMotion, and 1 for FT and the rest for VM's. With that being said what should the IP scheme be for this setup?
IP schema it's up to you
iSCSI, FT, vMotion is better if are isolated and separated networks...
So choose 3 class
About managemed it depends if you have a management network or you put them in the same LAN.
The iSCSI network IMHO is better that is a physical network... Note that it depends by your storage type (some will require more logical networks)... so check the specific documents from the vendor.
FT and vMotion usually are different networks, but can simple be different VLAN (or also simple different local networks). You do not need any routing, so just choose 2 private network that are not used in your enviroment.
Tell me if I am wrong, but from what I understand I should use the 2 stacked PowerConnect 6224s for iSCSI traffic only and not for vMotion/FT. I also have a 48 port Cisco Catalyst 3560g for my production/LAN environment, would it be wise to set-up two layer 2 vlans on the cisco catalyst 3560g for the vMotion and FT?
For iSCSI you can use also a couple of PowerConnect 5424, with a LAG with 4-6 ports.
You Catalyst can be partitioned in mode VLANs for the other traffics.