VMware Cloud Community
Balteck71
Enthusiast
Enthusiast
Jump to solution

Mixed 10Gb and 1Gb devices

hello, in my lab I've 3 ESXi 6.5U1 and a VCSA 6.5U1 with vsan enabled.

Each host have 4 1gb NICs and 2 10gb NICs.

Currently I have:

1 (per host) 1gb NIC connected to a gigabit switch for management

1 (per host) 1gb NIC connected to a gigabit switch for DMZ VMs with public IPs (4 VLANs)

1 (per host) 1gb NIC connected to a gigabit switch fo NAS backup and logs

1 (per host) 10gb NIC connected to a 10gb switch for vSAN traffic

the 3 gigabit switch are connected to a different port of a firewall that provides internet access for management (with VPN), for public web and mail servers on DMZ and for alerts on NAS boxes.

the 10gb switch (DELL X4012) is isolated, because I don't have a 10gb port on firewall and I think vsan subnet doesn't need internet access.

Now I wish to create a LAN with 10 clients and a server in a different VLAN called OFFICE. Because I've enable DRS, vsphere dynamically moves VMs from a host to another host (or in case of failure) and it is impossible to have all VMs of VLAN OFFICE that stay on a single host, I need to connect these VMs on physical switch that is the most fast possible.

My idea is to use the last 10gb NIC of each host as VM portgroup for VLAN OFFICE, but I also need that clients and server could access to internet.

Because the 10gb switch has only 10gb SFP+ ports and I have another 1gb NIC free of each host, is it possible to create a vDS (or 3 standard vswitch) that have both 10gb and 1gb uplink to 2 different physical switch not connected each other (one 10gb only and one 10/100/1000mb only) where put the OFFICE portgroup ??

and I'll wish to have for VMs in VLAN OFFICE:

1) intra-lan VMs communication using 10gb physical switch

2) internet access, network printer, access point and so on outside vsphere cluster using gigabit switch

thank you in advanced for any help

0 Kudos
1 Solution

Accepted Solutions
bayupw
Leadership
Leadership
Jump to solution

What you can do is create a VM (router or firewall such as pfSense®​), create 2 network adapter on that VM

network adapter 1 for internal connected to Dell 10G

network adapter 2 for external/DMZ connected to DMZ 1G

Set the VMs gateway to the IP address of network adapter 2

This way between VMs you can use 10G but to the Internet will go through that VM and to Internet via 1G

Bayu Wibowo | VCIX6-DCV/NV
Author of VMware NSX Cookbook http://bit.ly/NSXCookbook
https://github.com/bayupw/PowerNSX-Scripts
https://nz.linkedin.com/in/bayupw | twitter @bayupw

View solution in original post

0 Kudos
12 Replies
bayupw
Leadership
Leadership
Jump to solution

Hi, as this is a long explanation/scenario, would be great if you can share a diagram that shows all the physical switches, hosts, VLANs, etc so no one misunderstood your explanation Smiley Happy

Bayu Wibowo | VCIX6-DCV/NV
Author of VMware NSX Cookbook http://bit.ly/NSXCookbook
https://github.com/bayupw/PowerNSX-Scripts
https://nz.linkedin.com/in/bayupw | twitter @bayupw
0 Kudos
Balteck71
Enthusiast
Enthusiast
Jump to solution

This is the diagram:

Grey - 1 gbit link

Pink - 10 gbit link

netdiag1.png

0 Kudos
bayupw
Leadership
Leadership
Jump to solution

Hi, I would put the NAS on 10G too if possible and if the NAS supports 10G and have the Dell connected to DMZ switch

assuming you don't have anything else on the storage switch and you can effectively remove the storage switch and use all 4 1G vmnics on management switch and DMZ switch for redundancy and bandwidth (each 2 vmnics)

You mentioned that DRS moves VMs between hosts and impossible to have all VMs of VLAN OFFICE on a single host,

you can actually provision all VLANs and portgroups on all ESXi hosts so even if DRS moves VMs they will still connect to the correct VLANs regardless of ESXi host location

What I don't understand is that you have LAN OFFICE VLAN on DMZ and also VLAN 50 LAN OFFICE, are these same VLAN or same purpose?

If this is related to your question is it possible to create vSwitch with uplink to different physical switches, the answer is you can configure it but it won't work as you expected.

vSwitch (or vDS) need to have uplinks to a common physical switch

Bayu Wibowo | VCIX6-DCV/NV
Author of VMware NSX Cookbook http://bit.ly/NSXCookbook
https://github.com/bayupw/PowerNSX-Scripts
https://nz.linkedin.com/in/bayupw | twitter @bayupw
0 Kudos
Balteck71
Enthusiast
Enthusiast
Jump to solution

The problem is that I cannot connect Dell with DMZ Switch because the latter is an HP with RJ45 and SFP ports (1gb max), while the Dell is 10gb SFP+ fixed.

Because of it, I would know if there was a software configuration or trick for having VMs that traffic each other on Dell (faster) and access to internet or to printer on HP Switch (slower).

If I was only one host is simple: VMs traffic is naturally faster because is inside virtual switch, while external is naturally on physical switch.

But with 3 hosts, I need to use Dell to have the same performance, because Office VMs are not only to a single host. That's why I 'd like to have VLAN 50 on both switch, but separated.

Good idea to create vDS for management, VLANs and NAS using 2 switch in HA (HP 1820-24G is capable?), but I don't know how to connect both to firewall (Sonicwall NSA3500).

Maybe using 2 Firewall (I have a spare part) in active/passive HA mode and connect one on first switch and one to second switch letting ESXi to decide the path that has Internet access?

0 Kudos
bayupw
Leadership
Leadership
Jump to solution

What you can do is create a VM (router or firewall such as pfSense®​), create 2 network adapter on that VM

network adapter 1 for internal connected to Dell 10G

network adapter 2 for external/DMZ connected to DMZ 1G

Set the VMs gateway to the IP address of network adapter 2

This way between VMs you can use 10G but to the Internet will go through that VM and to Internet via 1G

Bayu Wibowo | VCIX6-DCV/NV
Author of VMware NSX Cookbook http://bit.ly/NSXCookbook
https://github.com/bayupw/PowerNSX-Scripts
https://nz.linkedin.com/in/bayupw | twitter @bayupw
0 Kudos
Balteck71
Enthusiast
Enthusiast
Jump to solution

Thank you very much!

And what do you think about connect 2 switches for redundancy at the firewall(s)?

0 Kudos
bayupw
Leadership
Leadership
Jump to solution

I'm sorry I don't get on what are you referring to about connecting 2 switches for redundancy at the firewalls.

Could you explain more about this or provide a diagram of your idea on this so?

Bayu Wibowo | VCIX6-DCV/NV
Author of VMware NSX Cookbook http://bit.ly/NSXCookbook
https://github.com/bayupw/PowerNSX-Scripts
https://nz.linkedin.com/in/bayupw | twitter @bayupw
0 Kudos
Balteck71
Enthusiast
Enthusiast
Jump to solution

netdiag2.png

0 Kudos
bayupw
Leadership
Leadership
Jump to solution

That looks better in my opinion as you have redundancy across all connectivity with this design.

Using redundant connectivity to firewall as per your diagram is common setup, as per the SonicWall KB here: How to Configure High Availability (HA) | Knowledge Base | SonicWall

pastedImage_0.png

Things to note as you would have multiple vmnics to same switch, vmnic0 & vmnic1 to switch2 and vmnic2 & vmnic3 to switch1

You can use IP Hash or LACP if your switch supports MC-LAG, if not you may want to split or alternate the VLANs across vmnics on same switches, assuming you will use route based on originating port ID

Here's an example

vmnic0 - switch2
vmnic1 - switch2vmnic2 - switch1
vmnic3 - switch1
Management (Active)Management (Standby)Management (Active)Management (Standby)
DMZ (Standby)DMZ (Active)DMZ (Standby)DMZ (Active)
LAN VPN (Active)LAN VPN (Standby)LAN VPN (Active)LAN VPN (Standby)
NAS (Standby)NAS (Active)NAS (Standby)NAS (Active)
Bayu Wibowo | VCIX6-DCV/NV
Author of VMware NSX Cookbook http://bit.ly/NSXCookbook
https://github.com/bayupw/PowerNSX-Scripts
https://nz.linkedin.com/in/bayupw | twitter @bayupw
0 Kudos
Balteck71
Enthusiast
Enthusiast
Jump to solution

I know very well this diagram and it works with only one switch on server side. (LAN Switch)

But if I have 2 switches on server side like my diagram as using vDS with Route based on physical NIC load and all vmnics active, how can I connect both switched to x0 port of both firewalls?

0 Kudos
bayupw
Leadership
Leadership
Jump to solution

I don't know much about Dell Sonicwall setup but I was assuming that the diagram from that KB is a logical diagram.

The physical diagram would probably look like below taken from this doc High_Availability where each switch connects to x0 and x2 (I guess the x2 is optional redundant link)

But as I said, I don't know much about Sonicwall but to me this looks like a common setup

pastedImage_0.png

Bayu Wibowo | VCIX6-DCV/NV
Author of VMware NSX Cookbook http://bit.ly/NSXCookbook
https://github.com/bayupw/PowerNSX-Scripts
https://nz.linkedin.com/in/bayupw | twitter @bayupw
0 Kudos
Balteck71
Enthusiast
Enthusiast
Jump to solution

the last diagram is for Supermassive line of Sonicwall that they costs from 15000 euros and up.

With NSA3500 I can only pair X0 with X2 in "layer2 Bridge mode" or in "2-wire mode" (How to Configure Wire / Tap mode in SonicOS | Knowledge Base | Sonicwall )

I think that Layer2 Bridge mode is the more appropriate as the schema below: (http://www.andovercg.com/datasheets/sonicwall-Bridge_Mode_and_Transparent_Mode_Deployment_Guide.pdf )

l2-sonicwall.jpg

But in this way I would have 2 switches connected with an uplink LAG (2 or more cables) and an uplink passing through the Sonicwall in L2 brigde.

I miss something: Looking at your previous schema without firewalls, for example, a packet from a server enters on Switch B, goes in Switch A and reach the second server.

With firewalls, a packet from a server could enter in the Switch B, then goes to x0 of cluster 2 (inactive Sonicwall), then exits from x2 going to Switch1 and reaches the second server.

Or more complicated scenario: it enters on Switch B, then X0 inactive firewall, then x2 bridged, then Switch A, then x0 active firewall, then WAN.

Am I right or am I wrong?

0 Kudos