Académique Documents
Professionnel Documents
Culture Documents
July 2014
Brocade, the B-wing symbol, Brocade Assurance, ADX, AnyIO, DCX, Fabric OS, FastIron, HyperEdge, ICX, MLX, MyBrocade, NetIron,
OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network and the On-Demand Data Center are trademarks
of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands and product names mentioned may be
trademarks of others.
Notice: This document is for informational purposes only and does not set forth any warranty, expressed or implied, concerning any
equipment, equipment feature, or service offered or to be offered by Brocade. Brocade reserves the right to make changes to this document
at any time, without notice, and assumes no responsibility for its use. This informational document describes features that may not be
currently available. Contact a Brocade sales office for information on feature and product availability. Export of technical data contained in
this document may require an export license from the United States government.
The authors and Brocade Communications Systems, Inc. assume no liability or responsibility to any person or entity with respect to the
accuracy of this document or any loss, cost, liability, or damages arising from the information contained herein or the computer programs that
accompany it.
The product described by this document may contain open source software covered by the GNU General Public License or other open
source license agreements. To find out which open source software is included in Brocade products, view the licensing terms applicable to
the open source software, and obtain a copy of the programming source code, please visit http://www.brocade.com/support/oscd.
Contents
Preface..................................................................................................................................... 7
Document conventions......................................................................................7
Text formatting conventions.................................................................. 7
Command syntax conventions.............................................................. 7
Notes, cautions, and warnings.............................................................. 8
Brocade resources............................................................................................ 9
Contacting Brocade Technical Support.............................................................9
Document feedback........................................................................................ 10
● Document conventions......................................................................................................7
● Brocade resources............................................................................................................ 9
● Contacting Brocade Technical Support.............................................................................9
● Document feedback........................................................................................................ 10
Document conventions
The document conventions describe text formatting conventions, command syntax conventions, and
important notice formats used in Brocade technical documentation.
Format Description
bold text Identifies command names
Identifies keywords and operands
Identifies the names of user-manipulated GUI elements
Identifies text to enter at the GUI
Convention Description
bold text Identifies command names, keywords, and command options.
italic text Identifies a variable.
Convention Description
value In Fibre Channel products, a fixed value provided as input to a command
option is printed in plain text, for example, --show WWN.
NOTE
A Note provides a tip, guidance, or advice, emphasizes important information, or provides a reference
to related information.
ATTENTION
An Attention statement indicates a stronger note, for example, to alert you when traffic might be
interrupted or the device might reboot.
CAUTION
A Caution statement alerts you to situations that can be potentially hazardous to you or cause
damage to hardware, firmware, software, or data.
DANGER
A Danger statement indicates conditions or situations that can be potentially lethal or
extremely hazardous to you. Safety labels are also attached directly to products to warn of
these conditions or situations.
Brocade resources
Visit the Brocade website to locate related documentation for your product and additional Brocade
resources.
You can download additional publications supporting your product at www.brocade.com. Select the
Brocade Products tab to locate your product, then click the Brocade product name or image to open the
individual product page. The user manuals are available in the resources module at the bottom of the
page under the Documentation category.
To get up-to-the-minute information on Brocade products and resources, go to MyBrocade. You can
register at no cost to obtain a user ID and password.
Release notes are available on MyBrocade under Product Downloads.
White papers, online demonstrations, and data sheets are available through the Brocade website.
Brocade customers
For product support information and the latest information on contacting the Technical Assistance
Center, go to http://www.brocade.com/services-support/index.html.
If you have purchased Brocade product support directly from Brocade, use one of the following methods
to contact the Brocade Technical Assistance Center 24x7.
Preferred method of contact for non- Required for Sev 1-Critical and Sev support@brocade.com
urgent issues: 2-High issues:
Please include:
• My Cases through MyBrocade • Continental US: 1-800-752-8061
• Problem summary
• Software downloads and licensing • Europe, Middle East, Africa, and
• Serial number
tools Asia Pacific: +800-AT FIBREE
(+800 28 34 27 33) • Installation details
• Knowledge Base
• For areas unable to access toll • Environment description
free number: +1-408-333-6061
• Toll-free numbers are available in
many countries.
• Brocade Supplemental Support augments your existing OEM support contract, providing direct
access to Brocade expertise. For more information, contact Brocade or your OEM.
• For questions regarding service levels and response times, contact your OEM/Solution Provider.
Document feedback
To send feedback and report errors in the documentation you can use the feedback form posted with
the document or you can e-mail the documentation team.
Quality is our first concern at Brocade and we have made every effort to ensure the accuracy and
completeness of this document. However, if you find an error or an omission, or you think that a topic
needs further development, we want to hear from you. You can provide feedback in two ways:
• Through the online feedback form in the HTML documents posted on www.brocade.com.
• By sending your feedback to documentation@brocade.com.
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
NOTE
For the latest list of supported features and the download instructions, refer to the release notes
relevant to your software release version.
NOTE
Guest OS, Linux and CentOS are used interchangeably in this document.
In the Brocade Virtual ADX software, the data interfaces are named as follows.
You can add or remove data interfaces from the Brocade Virtual ADX. Refer to Additional interfaces
on page 21 for information on adding and removing interfaces. The minimum and maximum
numbers of data interfaces are 1 and 8 respectively. A minimum of two virtual NICs must be assigned
to the Brocade Virtual ADX.
cURL
The cURL command line tool is for transferring data using URL syntax. For further information about
cURL, refer to http://curl.haxx.se/.
When 10 successive cURL transactions to an IP address are successful, the Brocade Virtual ADX can
initiate subsequent cURL sessions to the same IP address after waiting approximately two minutes.
However, the Brocade Virtual ADX can initiate cURL sessions for other IP addresses immediately.
NOTE
The Brocade Virtual ADX supports a maximum of 10 cURL sessions simultaneously.
You can run cURL from the Brocade Virtual ADX console. For example:
To specify cURL options (requires the use of quotes), enter a command similar to the following.
NOTE
If the cURL command specifies more than one word, then these words must be enclosed in quotes.
NOTE
The cURL tool should be run from the Brocade Virtual ADX console only. Using cURL from the Linux
shell may cause unpredictable behavior.
NOTE
Brocade Virtual ADX currently supports the use of cURL for HTTP protocol and IPv4 addresses only.
Software
• VMware Hypervisor ESX version 4.0 or later
• VMware vSphere Client version 4.0 or later
Hardware
• 2 GHz, Dual-core, 64-bit x86 CPU
• 4 GB RAM
• 40 GB disk space
• Network adaptor with 2 physical ports
By default, the Brocade Virtual ADX requests and reserves the following hardware resources from the
ESX host during configuration.
NOTE
The minimum memory requirement is dependent on the Brocade Virtual ADX licenses. For more
information on minimum memory requirements for the licenses, refer to the Brocade Virtual ADX
Licensing Guide.
NOTE
Skip steps 3 and 4 if you have already requested and been granted access.
3. Click on Request Special Site Access in the My Site Access section of the page.
4. Enter the access code provided with your certificate of entitlement in the input box next to the
Submit button on the screen, and click on Submit . The system will show a message that the
access you requested has been added to your account, and the access profile will be listed in the
Current Site Access section.
5. Click on Downloads on the main page.
6. Click on Application Delivery Controllers or Network Functions Virtualization from the
Download by dropdown list.
7. Click on Virtual ADX in the Product Name area.
8. Navigate the folder and click on the downloadable Brocade Virtual ADX file based on the requested
hypervisor support.
9. Select the OVA file link and follow the prompts to start the download and save the file.
10.If you are upgrading, select the .gz file link and follow the prompts to download and save the file.
NOTE
This section assumes that you are directly connected to the ESX host. If you are connecting to the
host through a vCenter, you will need to login to the vCenter server. Please refer to documentation
from VMware for further details.
1. Setup the VMware ESX server in preparation for installing the Brocade Virtual ADX.
NOTE
Use the recommended resource requirements or better to avoid unexpected results. Brocade
provides some preconfigured values with the Brocade Virtual ADX.
2. Start the vSphere client. If you do not have a vSphere client, you may use a web browser to login to
the host machine and download and install a vSphere client. You will need the IP address or name
for the ESX host.
3. Login to the ESX host machine using appropriate credentials.
4. Create the required vSwitches and port groups to be associated with the Brocade Virtual ADX virtual
NICs.
NOTE
If you have already configured the required port groups, proceed to step 5.
a) Click on the Configuration tab.
b) Select Networking in the Hardware area.
c) Click on Add Networking .
d) Select Connection Type as Virtual Machine (radio button). Click Next .
e) Select the pNIC port to assign to the vSwitch. Click Next .
f) Enter a Network Label of your choice.
NOTE
The Brocade Virtual ADX is preconfigured to connect its three data ports with
VADX_DATA_PG1, VADX_DATA_PG2, VADX_DATA_PG3. Brocade recommends you use
these labels while creating port groups.
g) Under VLAN ID (Optional) , enter the same VLAN ID as the Brocade Virtual ADX data port
connected to this port group. If that data port is a tagged member of more than one VLAN,
select All (4095) from the dropdown menu. Click Next .
h) Click Finish .
You will see a screen similar to the one shown.
NOTE
ESX host selection is required only if you are connecting to the vCenter and not directly
connecting to the ESX host.
d) Reserve minimum storage and compute resources for this instantiation of the Brocade
Virtual ADX.
f) In the left pane, click on the VM. Click on the Summary tab and click on Edit Settings in
the Commands area.
g) On the Hardware tab of the window that pops up, select a Network Adapter and click
Connect at power on in the Device Status area.
h) Repeat the above step for each of the remaining Network Adapters .
NOTE
For further information about adding or removing interfaces, refer to Additional interfaces on
page 21.
NOTE
Brocade Virtual ADX supports Layer 2 switching of broadcast and unknown unicast packets
so you must connect the three data ports to three distinct vSwitches to avoid network loops.
If you plan to connect the data ports to the same vSwitch, then you must use different
VLANs for each data port. You must take the same care when deploying multiple
instantiations of the Brocade Virtual ADX on the same ESX host.
The following is a typical vSphere screenshot for a deployed and powered on Brocade
Virtual ADX.
NOTE
The ESX host associates a default port group (VM Network) with all the Brocade Virtual
ADX interfaces. You must create different port group associations before you deploy the
Virtual Appliance because the default association by the ESX host could lead to
undesirable results (loops). If Brocade has assigned alternate port group names, you may
use them or modify them to suit your needs.
Enter root at the prompt. You do not require a password for logging in at this point. You should see
the following prompt.
Virtual ADX>
Execute the following commands.
Virtual ADX>enable
Virtual ADX#serial-number ser_num
Virtual ADX#show serial-number
The output of the second command should be the value of the ser_num you entered.
NOTE
The serial number is also your entitlement information for support. Please make a note of it for your
records. You will receive this information from Brocade at the time of order fulfillment.
NOTE
By default there is no password and you are logged in as root. Brocade recommends that you set a
password as soon as possible.
NOTE
You will need to enter Ctrl-Alt to get cursor control back from the vSphere console.
Additional interfaces
You can add up to five additional interfaces to the default configuration (four interfaces).
NOTE
Failure to perform a shutdown prior to adding or removing interfaces, will cause unexpected
behaviour on Brocade Virtual ADX .
2. In the left pane, right-click your Brocade Virtual ADX VM and select Edit Settings to add or remove
an interface as shown in the figure below.
NOTE
Interfaces must be added in interface number order i.e. 4, 5, 6, 7, 8 and removed in reverse order
i.e. 8, 7, 6, 5, 4. Adding or removing interfaces in any other order will generate a random order of
interfaces on the VM. To ensure proper functioning on the Brocade Virtual ADX, disable (rather than
remove) an interface from the middle of the configured range of interfaces.
3. If you want to add or remove another interface, return to Step 2.
NOTE
Brocade Virtual ADX supports a maximum of nine interfaces. Adding more than nine interfaces will
generate a random order of interfaces on the VM and interfere with normal processing on Brocade
Virtual ADX.
4. Power on and access the Brocade Virtual ADX from the vSphere client to confirm that the interfaces
are now added or removed.
A vSwitch in trunk mode will not cause network loops. To avoid looping in other cases, add one
vSwitch only to each interface.
Port Link State Dupl Speed Trunk Tag Priori MAC Name
1 Up Forward Full 10G None No level0 000c.2973.098c
2 Up Forward Full 10G None No level0 000c.2973.0996
3 Up Forward Full 10G None No level0 000c.2973.09a0
4 Up Forward Full 10G None No level0 000c.2973.09aa
5 Up Forward Full 10G None No level0 000c.2973.09b4
6 Up Forward Full 10G None No level0 000c.2973.09be
7 Up Forward Full 10G None No level0 000c.2973.09c8
8 Up Forward Full 10G None No level0 000c.2973.09d2
mgmt1 Up Forward Full 10G None No level0 000c.2973.0982
To display information about a specific interface, enter a command such as the following:
NOTE
For details of where checksum calculation is performed, when virtual and physical NICs have different
TCP checksum offload settings, refer to the hypervisor documentation.
NOTE
Check the network adapter manual to know if it supports the hardware checksum offload functionality.
Incoming packets
Use the VMXNET3 driver which supports incoming packet checksum offload.
Brocade Virtual ADX relies on the network adapter to verify the TCP, UDP and IP checksums for
incoming packets. If the network adapter does not support checksum verification, the Brocade Virtual
ADX software does the checksum verification.
NOTE
If the network adapter returns a TCP, UDP or IP checksum error, the Brocade Virtual ADX software
will also verify the incoming packet, because it is possible that an undetermined fault on the network
adapter caused it to return the checksum error.
Outgoing packets
Use the VMXNET3 driver, which supports outgoing packet checksum offload.
By default, TCP checksum offload is disabled and checksum calculation is performed by the Brocade
Virtual ADX software.
NOTE
Please ensure that you have your entitlement information (serial number) available.
VMware tools
VMware Tools is a suite of utilities that improves management of the virtual machine. The CentOS 6.2
Linux distribution enables installation of the VMware tools. The VMware tools are not installed by
default.
To install the VMware tools:
• Deploy the OVA.
• After logging in, navigate to the Linux shell and run the script using the /root/install-tools command.
For more information on the VMware tools, refer to the VMware documentation.
Configuration overview
The configuration task involves configuring the KVM hypervisor and the Brocade Virtual ADX VM. The
hypervisor configuration involves setting up the network interfaces and the properties of the VM. This
configuration is managed by the KVM Virtual Machine Management tool or shell commands. The VM
properties include memory size allocation, disk space allocation, virtual CPUs allocation, and so on.
Software
• KVM host 0.10.0 or higher
Hardware
• Host CPU supporting virtual technology such as Intel VT or AMD-V
• 4 GB RAM
• 40 GB disk space
• Network adaptor with 2 physical ports
By default, the Brocade Virtual ADX requests and reserves the following hardware resources from the
KVM host during configuration.
• 2 virtual CPUs
• 20GB disk space
• 4 virtual ethernet ports
NOTE
The minimum memory requirement is dependent on the Brocade Virtual ADX licenses. For more
information on minimum memory requirements for the licenses, refer to the Brocade Virtual ADX
Licensing Guide.
NOTE
There must be four virtual ethernet ports defined for a Brocade Virtual ADX VM. Out of this, the first
interface as defined in Brocade Virtual ADX VM becomes mgmt1. This interface is used to access to
the guest VM, and becomes the management interface of the Brocade Virtual ADX. The other
interfaces can be used as data or HA.
NOTE
Skip steps 3 and 4 if you have already requested and been granted access.
3. Click on Request Special Site Access in the My Site Access section of the page.
4. Enter the access code provided with your certificate of entitlement in the input box next to the
Submit button on the screen, and click on Submit . The system will show a message that the
access you requested has been added to your account, and the access profile will be listed in the
Current Site Access section.
5. Click on Downloads on the main page.
6. Click on Application Delivery Controllers or Network Functions Virtualization from the
Download by dropdown list.
7. Click on Virtual ADX in the Product Name area.
8. Navigate the folder and click on the downloadable Brocade Virtual ADX file based on the requested
hypervisor support.
9. Select the qcow2 file link and follow the prompts to start the download and save the file.
10.If you are upgrading, select the .gz file link and follow the prompts to download and save the file.
NOTE
For Open vSwitch (OVS) deployment, use the guest_ovs.xml file.
2. Log on to the KVM host and change to the directory /home/user_name .
3. In the VM configuration file, change domain name from <name>__Virtual_ADX__</name> to
<name>virtual_adx</name>. You can specify the name of your choice. (For the purpose of
illustration, let us keep the name as virtual_adx, throughout this document section).
4. Modify the target device name if this is not the first Brocade Virtual ADX deployed. This is to ensure
that each Brocade Virtual ADX has a unique target name for each network port.
For example, the first Brocade Virtual ADX will have target name of mgmt1-manage1, eth1-client1,
eth2-server1 and eth3-HA1. For the second Brocade Virtual ADX deployed, it should be mgmt1-
manage2, eth1-client2, eth2-server2, and eth3-HA2 (i.e.; change <target dev='mgmt1-manage1'/> to
<target dev='mgmt1-manage2'/>).
NOTE
If you do not need to identify ports in Brocade Virtual ADX in the output of the ovs-vsctl show
command, you can remove them from the guest.xml file. When you start Brocade Virtual ADX, the
KVM host will automatically create unique sequentially increasing target names in the OVS, starting
from vnet0, vnet1, etc. Each Brocade Virtual ADX will have four virtual ports created in the OVS.
Therefore, the first Brocade Virtual ADX will have target name ranging from vnet0 to vnet3 and the
second Brocade Virtual ADX will have target names ranging from vnet4 to vnet7 and so on.
5. Change image name from
<source fiile=’/image_directory/your_virtual_adx_qcow_file.qcow2’> to
<source file=’/home/user_name/virtualadx_img.qcow2’>.
You can specify the image name of your choice (For the purpose of illustration, let us keep the
name as virtualadx_img.qcow2, throughout this document section).
If the KVM host uses OVS, add <virtualport type='openvswitch'/> to all four interface entries. For
example,
<interface type=’bridge’>
<source bridge='br0'/>
<virtualport type='openvswitch'/>
<target dev='mgmt1-manage1'/>
<model type=’e1000’/>
<address type='pci' domain='0x0000' bus='0x00' slot='0x03' function='0x0'/>
</interface>
NOTE
Ensure that all four interfaces have no duplicated PCI address entry. The first interface entry must
have the pci configuration <address type='pci' domain='0x0000' bus='0x00' slot='0x03'
function='0x0'/>.
NOTE
For further information about adding or removing interfaces refer to Additional interfaces on page 21
6. Create bridges and OVS ports on the KVM host to enable traffic to the Brocade Virtual ADX.
7. Define the KVM guest VM by entering the virsh define guest.xml shell command. Based on the
given guest VM configuration file "guest.xml", the Universally Unique Identifier (UUID) and four
MAC addresses starting with "52:54:00" will be generated and stored in /etc/libvirt/qemu/
virtual_adx.xml file.
To check whether the guest VM is defined, enter the virsh list -all shell command. If the guest VM
is defined, the Brocade Virtual ADX name which you assigned will be displayed in shut off state, in
the list displayed.
4. Enter the name of the new guest VM and select Import existing disk image radio button. Then,
click Forward button to navigate to the next step.
5. Enter the complete path to the Brocade Virtual ADX qcow2 image. Alternately, you can use the
Browse button and then click Browse Local to select the Brocade Virtual ADX qcow2 image. Click
Open to insert the complete path.
6. Select Linux as the OS type and Red Hat Enterprise Linux 6 as the Version. Then, click Forward
to go to next step.
NOTE
If you see a pop up message indicating that the Disk qcow2 image is already in use by another
guest, select no to the question "Do you really want to use the disk?". Then, select the one that is
not in use.
7. Set the Memory to 2048 MB and CPUs to 2 . Click Forward button to navigate to the next step.
8. Select the Customize configuration before install checkbox and click Finish button. The virtual
machine configuration details are displayed, which you can edit before creating the VM.
9. Select Processor tab from the left menu and click Copy host CPU configuration in the right panel
to copy CPU configuration from the KVM host. Then, click Apply.
NOTE
This allows Brocade Virtual ADX to use the CPU configuration, which might speed up the processing
speed in the guest OS. Ensure that the features that you copied match with the features supported
on your host CPU. You may skip this step if you are not sure. If you change the configuration while
the VM is running, it will not be applied until the next time when the guest VM is rebooted.
10.Select Disk from the left menu. From the Advanced Options in the right panel, select IDE as the
Disk bus and qcow2 as the Storage format.
11.To change the network setting for mgmt1 of the Brocade Virtual ADX, select the NIC from the left
menu. The NIC configuration is display on the right panel.
12.Select Specify shared device name from the Source device dropdown and assign a name to the
bridge (example: br0) in the Bridge name field.
13.From the Device model field, select the model as e1000 or virtio and click Apply.
14.Click the Add Hardware button below the left menu. The Add New Virtual Hardware dialog box is
displayed.
15.Select Network tab on the left menu and then select the host device from the Host device drop
down. Alternately, you can select Specify shared device name form the Host device drop down
and then enter the name in the Bridge name field.
16.Select the device model as e1000 or virtio from the Device model dropdown and then click Finish.
17.Repeat step 11 to Step 16 to configure all the NICs. Then, click Apply.
NOTE
For further information about adding or removing interfaces refer to Additional interfaces on page 21
18.Click Begin Installation on top of the left menu to create the Brocade Virtual ADX VM.
To check whether the guest VM is defined, run the virsh edit domain_name command to view the
VM configuration. The default editor in virsh is vi. To change it, setup the environment variables
$VISUAL or $EDITOR to the editor which you want to use.
NOTE
The Brocade Virtual ADX supports DHCP. By default, DHCP is enabled on mgmt1. If there is a
DHCP server available, it will assign the IP address to the Brocade Virtual ADX.
ONBOOT=yes
DEVICE=mgmt1
BOOTPROTO=static
IPADDR=x.x.x.x
NETMASK=x.x.x.x
GATEWAY=x.x.x.x
TYPE=ETHERNET
Change the IP address and netmask as applicable for your network environment. This mgmt1
interface will be used to remotely access the Brocade Virtual ADX.
To access the console, click Console radio button from the View menu. Click anywhere in the
console window and enter any key to see the console output.
Additional interfaces
You can add up to five additional interfaces to the default configuration (four interfaces).
a) in Linux, open the Virtual Machine Manager application from Application > System
Tools.
b) Right click on Brocade Virtual ADX in the guest VM list and select Open to access to the
console.
c) Select Virtual Machine > Shutdown > Shutdown, to shut down the VM.
NOTE
Failure to perform a shutdown prior to adding or removing interfaces, will cause unexpected
behavior on Brocade Virtual ADX.
2. Select Show Virtual Hardware Details > Add Hardware to add or remove an interface as shown
in the figure below.
NOTE
Interfaces must be added in interface number order i.e. 4, 5, 6, 7, 8 and removed in reverse order
i.e. 8, 7, 6, 5, 4. Adding or removing interfaces in any other order will generate a random order of
interfaces on the VM. To ensure proper functioning on the Brocade Virtual ADX, disable (rather than
remove) an interface from the middle of the configured range of interfaces.
3. If you want to add or remove another interface, return to Step 2.
NOTE
Brocade Virtual ADX supports a maximum of nine interfaces. Adding more than nine interfaces will
generate a random order of interfaces on the VM and interfere with normal processing on Brocade
Virtual ADX.
4. Power on and access the Brocade Virtual ADX to confirm that the interfaces are now added or
removed.
Port Link State Dupl Speed Trunk Tag Priori MAC Name
1 Up Forward Full 10G None No level0 000c.2973.098c
2 Up Forward Full 10G None No level0 000c.2973.0996
3 Up Forward Full 10G None No level0 000c.2973.09a0
4 Up Forward Full 10G None No level0 000c.2973.09aa
5 Up Forward Full 10G None No level0 000c.2973.09b4
6 Up Forward Full 10G None No level0 000c.2973.09be
7 Up Forward Full 10G None No level0 000c.2973.09c8
8 Up Forward Full 10G None No level0 000c.2973.09d2
mgmt1 Up Forward Full 10G None No level0 000c.2973.0982
To display information about a specific interface, enter a command such as the following:
NOTE
For details of where checksum calculation is performed, when virtual and physical NICs have different
TCP checksum offload settings, refer to the hypervisor documentation.
Incoming packets
TCP checksum offload may be applied to incoming packets.
SR-IOV
Use the ixgbevf driver which supports incoming packet checksum offload.
When checksum verification is not performed by the virtual network adaptor, the Brocade Virtual ADX
software does the checksum verification.
Non SR-IOV
By default, TCP checksum offload is disabled and checksum calculation is performed by the Brocade
Virtual ADX software.
Outgoing packets
By default, TCP checksum offload is disabled and checksum calculation is performed by the Brocade
Virtual ADX software.
System requirements
You will need an x86 server running the XenServer hypervisor from Citrix and a XenCenter client
installed on a Windows-based machine. The recommended minimum resources required by Brocade
Virtual ADX are shown below.
Hardware
The list of server hardware currently certified and supported for use with Citrix XenServer can be found
at http://hcl.vmd.citrix.com/.
The server hardware will require the following minimum resources:
• 4GB RAM
• 40GB disk space (One instance of Brocade Virtual ADX VM and XenServer)
• 2 physical ethernet port
Brocade Virtual ADX will require the following resources:
• 2 virtual CPUs
• 20GB disk space
• 4 virtual ethernet ports
NOTE
The minimum memory requirement is dependent on the Brocade Virtual ADX licenses. For more
information on minimum memory requirements for the licenses, refer to the Brocade Virtual ADX
Licensing Guide.
Refer to Brocade Virtual ADX Interfaces for further information on virtual port requirements.
Software
• Citrix XenServer hypervisor version 6.2.0 or higher
• Citrix XenCenter client version 6.2.
Configuration requirements
NOTE
Skip steps 3 and 4 if you have already requested and been granted access.
3. Click on Request Special Site Access in the My Site Access section of the page.
4. Enter the access code provided with your certificate of entitlement in the input box next to the
Submit button on the screen, and click on Submit . The system will show a message that the
access you requested has been added to your account, and the access profile will be listed in the
Current Site Access section.
5. Click on Downloads on the main page.
6. Click on Application Delivery Controllers or Network Functions Virtualization from the
Download by dropdown list.
7. Click on Virtual ADX in the Product Name area.
8. Navigate the folder and click on the downloadable Brocade Virtual ADX file based on the requested
hypervisor support.
9. Select the OVA file link for your host environment and follow the prompts to start the download and
save the file.
10.If you are upgrading, select the .gz file link and follow the prompts to download and save the file.
NOTE
These commands will only become effective after a server reboot.
OpenvSwitch is a multi-layer software switch that is well suited to function as a virtual switch in virtual
machine environments. Brocade Virtual ADX requires configuration of the following OVS entities:
• ovs-bridge - An ovs-bridge represents an ethernet switch with one or more "ports" and can be
considered equivalent to a vSwitch on the VMware ESX Server.
• ovs-port - An ovs-port represents a port within an ovs-bridge; it logically corresponds to a port on a
physical ethernet switch.
For further information about the ovs-bridge and ovs-port entities, refer to VLAN configuration using
OpenvSwitch on page 51.
2. Start the XenCenter client.
NOTE
XenCenter client can be downloaded free from http://www.citrix.com/xenserver/download. You must
be registered on the Citrix site to download the XenCenter client.
3. Create the XenServer "networks" required by the Brocade Virtual ADX VM.
• Brocade Virtual ADX VM requires a minimum of four virtual interfaces.
NOTE
For information about adding or removing interfaces, refer to Additional interfaces on page 21.
• XenServer does not support the concept of port groups. A "network" on the XenCenter GUI is
equivalent to a vSwitch on vSphere from VMware and is used to bind a Brocade Virtual ADX
virtual interface.
• XenServer creates a "Network" for each physical NIC on the host on bootup. These networks are
named Network 0 for NIC0, Network 1 for NIC1 etc., as shown in the figure below. These
networks are used:
‐ When deploying the Brocade Virtual ADX VM mgmt1 interface
‐ For data ports that need connectivity to a physical NIC
• A XenServer "External Network" must be created and used for a data port that needs a physical
NIC connection and to be on a single vlan.
a) Select the xenserver on left panel as shown in the figure below. Then select the
Networking tab.
Brocade Virtual ADX uses two of the four network types supported on the XenServer
platform:
• Single-Server Private Network - This type of network has no physical NIC connectivity
and is used to establish an internal virtual switch for connecting the virtual interfaces of
VMs on the XenServer host. Create a "Single-Server Private Network" for each Brocade
Virtual ADX data port that does not need physical NIC connectivity. If none of the three
Brocade Virtual ADX data ports require physical NIC connectivity, then create three
networks of this type; one for each data port.
NOTE
For a data port that does not need physical NIC connectivity but needs to be on one or
more VLANs, create a "Single-Server Private Network" and use the OVS configuration for
VLAN support described in VLAN configuration using OpenvSwitch on page 51.
• External Network - This type of network is equivalent to a VLAN access port on a
hardware switch. An "External Network" passes traffic over the VLAN it is configured with
and provides connectivity to a physical NIC. Create an "External Network" for each
Brocade Virtual ADX data port that needs to be on a single VLAN and connected to a
physical NIC.
NOTE
If a data port needs to be on more than one VLAN with physical NIC connectivity, it
needs to use a default network (Network 0, Network 1, etc.) created by XenServer on
bootup and to use the OVS configuration for VLAN support described in VLAN
configuration using OpenvSwitch on page 51.
c) Select the type of network that you want to create and click Next to provide a Name and
Description for the new network.
d) After entering a name and description for the new network, click Next .
1. If you are creating a Single-Server Private Network (Step 3.c above), the following
window will display showing the network that you have just created. If you need to add
another network, return to Step 3. If you have created all the networks required by the
Brocade Virtual ADX VM, proceed to Step 4.
2. If you are creating an External Network (Step 3.c above), the following window will
display. Choose the physical NIC this network will connect with and specify the VLAN
ID.
3. Click Finish. The following window will display showing the new external network that
you have just created. If you need to add another network, return to Step 3.
b) The Import window displays. Select the OVA file and click Next .
c) Select the default options until you arrive at the Networking section. In the Networking
section you will map the the Brocade Virtual ADX VM’s virtual network interfaces to the
XenServer Target Networks.
d) Map the Brocade Virtual ADX virtual network interfaces to XenServer host networks, as
shown in the Import OVF/OVA Package window below:
1. Select one of the XenServer default networks for Ethernet 1 (mgmt1 on Brocade Virtual
ADX). If the XenServer host has only one physical NIC, choose Network 0 .
2. Select a network created in Step 3 above, for each of the three data ports.
e) Click Next , and select the default options until the Transfer VM Settings section.
f) In the Transfer VM Settings section select the Network through which the XenServer host
can connect to the OVA file location and provide a static IP address if that network does not
have a DHCP server running.
NOTE
The static IP address is only needed until the Brocade Virtual ADX VM deployment
completes. It is not related to the mgmt1 IP assignment.
g) Click Next .
h) Complete the rest of the deployment with default options and click Finish .
XenServer automatically generates locally administered MAC addresses for the virtual
interfaces as specified in the OVA file. Locally administered addresses are MAC
addresses with the second least-significant bit of the most significant byte set. Locally
administered MAC addresses are typically assigned by a user to devices that lack a
manufacturer-specific encoding known as the Organizationally Unique Identifier (OUI).
Typically, manufacturers "burn-in" MAC addresses in which the first three octets indicate
the device manufacturer.
The locally administered MAC addresses generated by XenServer will not clash with
addresses from hardware devices on your network. XenServer generates MAC addresses
at random, based on the VM.otherconfig:mac-seed parameter of the VM and the device
number of the virtual interface (a sequence number for the VIF in the range 0 - 6).
NOTE
A particular combination of a MAC seed and device number always results in the same
MAC address. Therefore, if you remove a virtual interface from a VM and recreate it later,
the new virtual interface will get the same MAC address as before.
MAC addresses can also be assigned manually after completing the Brocade Virtual ADX
VM deployment. To assign MAC addresses manually, select the Networking tab, and
modify the virtual network interfaces properties as shown below.
The virtual interfaces of VMs correspond to ovs-ports and are named vif1.1, vif1.2, vif2.1 etc. For
example, were a virtual interface is named "vif1.2" the number "1" identifies the VM and remains the
same for all virtual interfaces belonging to a particular VM, while the number "2" identifies the interface
index within the VM.
Configuring VLANs
Once you have identified the ovs-bridge and ovs-port mappings, you can configure VLANs on ovs-
ports corresponding to the Brocade Virtual ADX data ports. OVS supports the following VLAN modes
on ovs-ports:
• trunk - a trunk port carries packets on one or more specified VLANs. A packet that ingresses on a
trunk port is in the VLAN specified in its 802.1Q header or VLAN 0 if the packet has no 802.1Q
header. A packet that egresses through a trunk port will have an 802.1Q header if it has a non-zero
VLAN ID. Any packet that ingresses on a trunk port tagged with a VLAN that the port does not trunk
is dropped.
• access - an access port carries packets on exactly one specified VLAN. Packets egressing on an
access port do not have an 802.1Q header. Any packet with an 802.1Q header and a non-zero
VLAN ID that ingresses on an access port is dropped, regardless of whether the VLAN ID in the
header is the access port’s VLAN ID.
• native-tagged - a native-tagged port resembles a trunk port, with the exception that a packet without
an 802.1Q header that ingresses on a native-tagged port is in the ‘‘native VLAN’’ (specified in the
tag field).
• native-untagged - a native-untagged port resembles a native-tagged port, with the exception that a
packet that egresses on a native-untagged port in the native VLAN will not have an 802.1Q header.
[root@xenserver ~]# ovs-vsctl set port <vifx.y> trunks=< vlan-id1, vlan-id2, vlan-
id3, vlan-id4,...>
[root@xenserver ~]# ovs-vsctl set port <vifx.y> trunks=< vlan-id1, vlan-id2, vlan-
id3, vlan-id4,...>
Additional interfaces
You can add up to five additional interfaces to the default configuration (four interfaces).
NOTE
Failure to perform a shutdown prior to adding or removing interfaces, will cause unexpected
behaviour on Brocade Virtual ADX .
2. Open Citrix XenCenter and select the Brocade Virtual ADX VM from the left menu as shown in the
figure below.
FIGURE 23
3. On the Networking tab, select Add Interface to add an interface or Remove Interface to remove
an interface.
NOTE
Brocade Virtual ADX supports a maximum of nine interfaces. Adding more than nine interfaces will
generate a random order of interfaces on the VM and interfere with normal processing on Brocade
Virtual ADX.
4. To add or remove another interface, return to Step 3.
NOTE
Interfaces must be added in interface number order i.e. 4, 5, 6, 7, 8 and removed in reverse order
i.e. 8, 7, 6, 5, 4. Adding or removing interfaces in any other order will generate a random order of
interfaces on the VM. To ensure proper functioning on the Brocade Virtual ADX, disable (rather than
remove) an interface from the middle of the configured range of interfaces.
5. Verify that the interfaces have been added or removed, by opening Citrix XenCenter again,
selecting the Brocade Virtual ADX VM from the left menu and viewing the available interfaces on
the Networking tab.
A vSwitch in trunk mode will not cause network loops. To avoid looping in other cases, add one
vSwitch only to each interface.
Port Link State Dupl Speed Trunk Tag Priori MAC Name
1 Up Forward Full 10G None No level0 000c.2973.098c
2 Up Forward Full 10G None No level0 000c.2973.0996
3 Up Forward Full 10G None No level0 000c.2973.09a0
4 Up Forward Full 10G None No level0 000c.2973.09aa
5 Up Forward Full 10G None No level0 000c.2973.09b4
6 Up Forward Full 10G None No level0 000c.2973.09be
7 Up Forward Full 10G None No level0 000c.2973.09c8
8 Up Forward Full 10G None No level0 000c.2973.09d2
mgmt1 Up Forward Full 10G None No level0 000c.2973.0982
To display information about a specific interface, enter a command such as the following:
NOTE
For details of where checksum calculation is performed, when virtual and physical NICs have different
TCP checksum offload settings, refer to the hypervisor documentation.
Incoming packets
Brocade Virtual ADX uses e1000 vNICs on the XenServer platform. e1000 vNICs do not support
incoming checksum vierification. The Brocade Virtual ADX software performs TCP checksum
verification on incoming packets.
Outgoing packets
By default, TCP checksum offload is disabled and checksum calculation is performed by the Brocade
Virtual ADX software.
The last command will get you back to the Brocade Virtual ADX console.
NOTE
The system will prompt you for a stronger password as appropriate.
IPADDR=x.x.x.x
NETMASK=x.x.x.0
GATEWAY=x.x.x.1
TYPE=ETHERNET
ONBOOT=yes
NOTE
You must reboot the system for these changes to take effect or enter the service network restart
command after making network-related changes.
IP addresses are for illustration purposes only. You can use addresses relevant to your deployment.
Although Linux ifconfig command displays mgmt1, it does not display eth1 to eth3 because they are
not controlled by Linux. Do not perform any IP address configuration on these ports.
NOTE
You may get to the Linux prompt when connecting through SSH. Use the vadx-console command to
get to the Brocade Virtual ADX console. Telnet and AAA services are not supported for console
access.
● Overview......................................................................................................................... 59
● Accessing Brocade Virtual ADX......................................................................................59
● Navigating a console CLI session................................................................................... 61
● Single IP address for Management Port......................................................................... 62
● Accessing Linux console from Brocade Virtual ADX Management Interface .................62
● Executing Linux application commands from Virtual ADX Management Interface ........ 62
● Linux console access command .................................................................................... 63
● Configuration Commands .............................................................................................. 64
● Show commands ............................................................................................................64
● Notifications ....................................................................................................................65
Overview
This section describes how to access the Brocade Virtual ADX command line interface (CLI) and the
Brocade Virtual ADX guest OS (Linux).
NOTE
This software may not be user-friendly due to limited terminal emulation facilities on hypervisor
management tools.
• Network access to the guest OS.
• Network access to the Brocade Virtual ADX.
A single management IP address is shared between the Brocade Virtual ADX and Linux so that you
can connect directly to the CLI when the default Telnet or SSH port is used. For more information on
single management IP address, refer to Single IP address for Management Port on page 62.
After installation, the Brocade Virtual ADX console lands in the guest OS console. This is a Linux bash
shell. Use the vadx-console command to switch the console to a Brocade Virtual ADX CLI session
where Brocade Virtual ADX commands can be issued. Use Ctrl+y+m to switch back to the Linux shell.
Switch to a Brocade Virtual ADX CLI session from the Linux shell
[root@VirtualADX ~]# vadx-console
Virtual ADX>
Switch to the Linux shell from a Brocade Virtual ADX CLI session
Virtual ADX> ctrl+y+m
[root@VirtualADX ~]#
Switch to the Linux shell from a Brocade Virtual ADX CLI session
Virtual ADX> ctrl+y+m
[root@VirtualADX ~]#
NOTE
Only one active Brocade Virtual ADX console CLI session is allowed at any time. A new session
terminates an existing session and the following message will be seen on the terminating session.
Virtual ADX>
[remote detached]
[root@VirtualADX ~]#
This type of CLI session does not involve the guest OS. The Telnet or SSH connection lands directly
in the Brocade Virtual ADX CLI session; not the Linux bash shell. To access Linux shell, use the linux-
console command.
Switch to the Linux shell from a Brocade Virtual ADX CLI session (Telnet)
telnet@Virtual ADX# linux-console
Entering linux-console mode (session ID: 4)...
[root@VirtualADX ADX]# vadx-console
telnet@Virtual ADX#
NOTE
The Telnet or SSH connection must be authenticated when using the linux-console command.
Otherwise, you will see the following error.
telnet@Virtual ADX#linux-console
Error: For linux-console access, re-login with username/password
telnet@Virtual ADX#
For information on setting up the authentication username and password, refer to the Brocade Virtual
ADX Administration Guide.
Use the show who command to view details about your current CLI session. For example:
telnet@Virtual ADX> show who
Console connections:
established, in config mode
6 minutes 23 seconds in idle
1 established, client ip address 10.70.42.27
you are connecting to this session
2 closed
Telnet connection (outbound):
3 closed
1 closed
2 closed
User:
global: manager
Context: default manager Default Current
telnet@Virtual ADX>
The Brocade Virtual ADX can also be accessed and configured via a web user interface. For more
information, refer to the Brocade Virtual ADX Graphical User Interface Guide.
For further information about logging into a BP, refer to the Brocade Virtual ADX Administration Guide.
grep Used to search text. It searches the given file for the line
which contains the matching string or words.
Configuration Commands
• Disable Linux console Access: Execute the following command to disable the Linux console
access.
Virtual ADX(config)# linux-console disable
Show commands
Execute the show linux-console active-sessions command to displays the list of active Linux
console sessions
ADX(config)# show linux-console active-sessions
This command has no argument. In the output displayed, Session ID identifies a particular Linux
console session. User is the name of the user who initiated a Linux console. Start Time is the starting
time of the console access.
Execute the show linux-cli active-sessions command to display the list of active Linux CLI execution
sessions:
ADX(config)# show linux-cli active-sessions
In the output displayed, Session ID identifies a Linux CLI execution session. User is the name of the
user who executed Linux CLI. Start Time is the starting time of the Linux CLI execution.
Notifications
Following are the notifications provided:
• When you initiate a Linux console:
Linux-console initiated (sessionID: 3) from Telnet, src IP IP Address, src MAC MAC
Address
• When the Linux console is inactive for more than configured idle-timeout:
Inactive linux-console (session ID: num) terminated
NOTE
To access Linux console, additional information like SSH/Telnet clients IP address and MAC address
can be provided in the logs (if available).
NOTE
Skip this step if you do not want to apply your existing configuration to the new installation.
a) Execute the write memory command from the Brocade Virtual ADX console to save the
configuration files such as startup-config and others.
Virtual ADX(config)#write memory
Write /opt/ADX/conf/startup-config in progress.
Write /opt/ADX/conf/startup-config done.
Virtual ADX(config)#
b) Zip up the files in and under the /opt/ADX/openscripts/ directory.
c) Copy the zipped files and the /opt/ADX/conf/startup-config file using scp .
2. Download the new SSx.ova file and follow instructions for a new install.
NOTE
Skip the next step if you did not save your existing configuration.
3. Copy the saved files to the relevant locations in the Guest OS directory structure from the system
console after the installation is complete using scp .
NOTE
It is mandatory to enter primary or secondary.
5. Reboot your VM. The new binaries are part of the image now.
NOTE
For detailed instructions on downloading, refer to the Installation section of this guide.
2. Copy the zipped file to the primary or secondary image location using the tftp command.
Virtual ADX# copy tftp file 10.10.10.1 ssrbin03100.tar.gz
primary
3. Enter Ctrl+y+m to get to the Linux console.
4. Reboot the Virtual Machine from the Linux prompt to complete the upgrade.
[root@Virtual ADX misc]# reboot
[root@Virtual ADX misc]#
Broadcast message from root@Virtual ADX
(/dev/pts/3) at 17:39 ...
The system is going down for reboot NOW!
[root@Virtual ADX misc]#
NOTE
For detailed instructions on downloading, refer to the Installation section of this guide.
2. From the Linux console, copy the downloaded zipped file to the /opt/ADX/misc directory using the
SCP command.
3. Change to the /opt/ADX/misc directory, and issue tar xvf Virtual-ADX-gzip-file.
[root@VirtualADX ~]# cd /opt/ADX/misc
[root@VirtualADX misc]# tar -xvf Virtual-ADX-gzip-file
4. Issue the ./install_vadx.sh primary | secondary command to upgrade the image to either the
Primary or Secondary image location.
[root@VirtualADX misc]# ./install_vadx.sh primary | secondary
5. Reboot the Virtual Machine from the Linux prompt to complete the upgrade.
[root@VirtualADX misc]# reboot
[root@VirtualADX misc]#
Broadcast message from root@VirtualADX
(/dev/pts/3) at 17:39 ...
The system is going down for reboot NOW!
[root@VirtualADX misc]#
NOTE
You can choose the tar file name of your choice. A tar file with the given name is generated.
./backup.sh vadx_3.1_backup generates a tar file called vadx_3.1_backup.tar.gz
2. Copy the tar file on to the target VM in the /opt/ADX/tools directory, where the configuration is to be
copied.
3. Use the ./restore.sh <copied tar file name> to copy the configuration on to the new VM.
./restore.sh vadx_3.1_backup
NOTE
By using the above steps, you effectively copy the entire relevant configuration on to the new VM.
The following folders are excluded as they do not pertain to a new VM installation.
• /opt/ADX/bin
• /opt/ADX/log
• /opt/ADX/tools
• /opt/ADX/pcap
• /opt/ADX/eventlog-mp
• /opt/ADX/evenlog-bpX, where X is the BP number. The number of files will be equal to the number
of BPs
Virtual ADX(config-vif-2)#exit
Virtual ADX(config)#server real rs1 192.168.1.10
Virtual ADX(config-rs-rs1)#port http
Virtual ADX(config-rs-rs1)#exit
Virtual ADX(config)#server real rs2 192.167.1.10
Virtual ADX(config-rs-rs2)#port http
Virtual ADX(config-rs-rs2)#server virtual v1 192.166.1.10
Virtual ADX(config-vs-v1)#port http
Virtual ADX(config-vs-v1)#bind http rs1 http rs2 http
Virtual ADX(config-rs-rs1)#exit
Virtual ADX(config)#server real rs2 192.168.1.11
Virtual ADX(config-rs-rs2)#port http
Virtual ADX(config-rs-rs2)#server virtual v1 192.166.1.10
Virtual ADX(config-vs-v1)#port http
Virtual ADX(config-vs-v1)#bind http rs1 http rs2 http
Virtual ADX(config-vs-v1)#show server bind
NOTE
Hot-Standby HA configuration illustrated in the following section is only for ESX.
NOTE
The Brocade Virtual ADX currently supports GSLB site-specific functionalities only. RTT is not
supported in this release. For steps to configure GSLB Controller and site, refer to the ServerIron ADX
Global Server Load Balancing Guide
Use the kill -9 command with the PID to terminate the unresponsive process.
Question: The Brocade Virtual ADX failed to boot. What may have occurred?
The Brocade Virtual ADX will not boot due to lack of resources. The console may display appropriate
error messages that are also captured in the eventlog and bootup log files. One of the following
message may be printed when an error is encountered.
• Error: Initialization failed. Minimum number of cores required is 2.
• Error: Initialization failed. Minimum memory required is 2 GB.
Use the following commands for more information:
• The show version and show license commands should provide information about the availabe
license.
• The show bp-status command displays the number of BPs launched and their status.
• The show mem command displays the state of the system memory.
Determine the minimum requirements for your host machine and verify that the machine meets these
requirements.
Question: I am using KVM with OVS and not able to do L2 forwarding. How can I make it to work?
After the VM is deployed, an XML file is saved at /etc/libvirt/qemu/virtual_adx.xml. In this file, make sure
that the interface type and virtualport type are defined correctly for all of the interfaces. If the virtualport
type is not there, you need to add it as shown below.
<interface type='bridge'>
<source bridge='br0'/>
<virtualport type='openvswitch'/>