Top
ServerView Resource Orchestrator Cloud Edition V3.0.0 Setup Guide

4.2.1 Defining the Network Environment

When defining a network environment, the physical network device configuration should be designed considering the virtual systems that will actually be provided to the users.


Resource Orchestrator Networks

Resource Orchestrator networks are categorized into the following three types:

For keeping operations secure, it is recommended to physically configure each network separately.

The maximum value of the subnet mask of the network that Resource Orchestrator support is 255.255.255.255(32bit mask). The minimum value is 255.255.0.0(16bit mask). However, 255.255.255.254 is not supported.

Information

The admin LAN and iSCSI LAN are the networks that only infrastructure administrators need to be concerned about in normal operation.

Figure 4.1 Network Environment Example


4.2.1.1 Admin LAN Network Design

Managed devices (servers, storage units, and network devices), the admin server, and the admin client are connected to the admin LAN.

An admin LAN can be divided into multiple admin LANs. Using this function, communication among tenants on physical L-Servers performed through an admin LAN can be prevented.

When using multi-tenant functions, prepare a separate admin LAN for each tenant, and configure the admin LAN for each tenant for network pools.

This improves the security of the network.


Information Necessary for Design

When designing an admin LAN, the following information needs to be defined beforehand:

Admin LAN for Servers

For each server, choose the network interfaces to use for the following purposes.

Choose the following settings to fit the system environment.

Admin LAN for Network Devices

Choose the LAN ports of the network devices (firewalls, L2 switches, and L3 switches) to be used.

Figure 4.2 Admin LAN Connection Example

See

When the manager is Windows, and the admin LAN is operated among multiple subnets, install DHCP servers referring to "2.1.2 Installation [Windows]" in the "Installation Guide CE".

Note

  • Do not place DHCP servers between the manager and managed servers.

  • For the admin server, only a single IP address can be used on the admin LAN.

  • When the manager OS is Linux, DHCP servers cannot be installed.

  • A network address that was set when installing the manager has been registered as an admin LAN network resource.

  • Change the admin LAN network resource specifications, and register the IP address of a device that is not managed by Resource Orchestrator as an IP address to exclude from allocation.
    If the IP address is not registered, it may conflict with the IP addresses of devices that are not managed by Resource Orchestrator.

  • When using blade servers, connecting the management blade to a LAN switch blade will make the management blade inaccessible in the event of a LAN switch blade failure. Therefore, it is recommended that the management blade be connected to the admin LAN using a LAN switch outside the chassis.

  • When performing I/O virtualization using HBA address rename, if specifying a 10Gbps expansion card (NIC) for the admin LAN, backup and restore, and cloning cannot be used.

  • Do not place a DHCP server or a PXE server on the admin LAN.

  • Do not configure multiple IP addresses for network interfaces used on the admin LAN.

  • When the same cloning image is deployed to multiple servers, IGMP snooping should be enabled on admin LAN switches. If IGMP snooping is not enabled, transfer performance may deteriorate in the following cases:

    • When ports with different speeds co-exist in the same network

    • When multiple image operations are being executed simultaneously

  • For PRIMERGY BX900/BX400 LAN switch blades operating in IBP mode, the admin LAN should not be included in the ServiceLAN or the ServiceVLAN group configuration.


Safer Communication

For environments where virtual L-Servers and the admin server (manager) communicate, it is recommended to perform the following configuration to improve security:

Installing firewalls or configuring OS firewalls according to the description in "Appendix A Port List" enables secure operation of the admin LAN.

In Resource Orchestrator, the manager accesses agents using HTTPS communication.

Figure 4.3 Network Configuration Example


Required Network Configuration when Using HBA address rename

At startup a managed server set with HBA address rename needs to communicate with the Resource Orchestrator manager. To enable startup of managed servers even when the manager is stopped, Resource Orchestrator should be set according to one of the following configurations.

This section describes the network configuration that is required for an environment with a dedicated HBA address rename server.
For details about the HBA address rename setup service, refer to "8.2.1 Settings for the HBA address rename Setup Service".

[Linux]

Note

The HBA address rename setup service cannot operate on the same server as ServerView Deployment Manager, or on a server where any other DHCP or PXE service is running.

The following diagram shows an example of how the HBA address rename setup service can be configured.

Figure 4.4 Sample Configuration Showing the HBA address rename Setup Service (with PRIMERGY BX600)

4.2.1.2 Virtual System Design

Design virtual systems for users.


Information Necessary for Design

When designing virtual systems, the following information needs to be defined beforehand:

4.2.1.3 Physical Network Design for the Public LAN and iSCSI LAN

Managed devices (server machines and network devices) are connected using the public LAN.
Managed devices (server machines and storage units) are connected using the iSCSI LAN.

Design of an iSCSI LAN is required to connect the iSCSI-enabled storage devices and servers to which physical L-Servers will be deployed.


Information Necessary for Designing a Public LAN

When designing a public LAN, the following information needs to be defined beforehand:

Information Necessary for Designing an iSCSI LAN

When designing an iSCSI LAN, the following information needs to be defined beforehand:

Determine the physical network configuration by defining devices necessary for the public LAN and iSCSI LAN that meet the requirements for the designed virtual system.

A sample image of virtual systems and the corresponding physical network configuration is shown below:

Figure 4.7 Sample Image of Virtual Systems and the Corresponding Physical Network Configuration

By defining how many virtual systems should be configured for each tenant and how many tenants are to be prepared, the required number of devices can be determined, making the overall configuration clear.

An example of the overall configuration of the physical system is shown below:

Figure 4.8 Example of Overall Physical Network Configuration


4.2.1.4 Relationship between Physical Network Configuration and Resources

This section explains the relationship between the defined physical system and the resources managed by Resource Orchestrator.

Using Resource Orchestrator, you can provide users with virtual systems and also operate those virtual systems. Therefore, it is necessary to understand the relationship between physical systems and the resources configuring the virtual systems in advance.

Depending on how the physical devices are used in the virtual system, physical devices and resources can be in "one-to-one" or "one-to-n" relationships.

The relationship between physical networks and resources is shown below, using "Figure 4.8 Example of Overall Physical Network Configuration" as an example.

Figure 4.9 Relationship between Physical Network Configuration and Resources

The following figure shows a sample image when physical devices and resources are allocated for a single virtual system (L-Platform).

In this sample image, resources are allocated for firewalls and L2 switches on a one-to-one basis, while resources are allocated for servers and storage devices on a one-to-n basis.

Resource Orchestrator manages L2 switches as network devices. However, when allocated to a virtual system, L2 switches are not displayed on the virtual system because they are included as network resource components.

Figure 4.10 Virtual System and Resource Allocation Example