Forum Discussion
vCMP guest VLAN assignment question
hi guys.
I need to transform several Cisco ACE installations to an f5 viprion platform. On the ACEs, we have 50+ contexts. Each of them will be transformed into a separate set of Admin-partition, traffic-group and route-domain on several vCMP guests. Normal approach for migration of a single context is:
-
create VLANs but leave them without assigned interfaces on the vCMP host, thus avoiding interference with the affected production net and the current ACE installation
-
assign them to the appropriate guest -> they will be propagated and appear in the Common partition of the guest
-
create partition and traffic-group on the vCMP guest.
-
delete VLAN in Common partition and re-create it in the dedicated partition (because it cannot be moved once it was propagated to the guest by the host)
-
do proper configuration of all elements on the vCMP guest (in appropriate partition with dedicated default RD and traffic-group), leaving all IP addresses the same as on the ACE.
-
enable VLANs on the uplinks to the viprions (still no interference with old system because of step 1).
-
In the maintenance window, disable VLANs to the ACE, then add interfaces to the VLANs on the vCMP host.
-
if needed, perform a failover of the dedicated traffic-group in order to generate gratouitious ARPs for all floating IP objects
This approach works very well, we've already done 20+ migrations like this.
Now, I have the problem that I have two contexts that share a single VLAN. The first one was already shifted to the f5, the second one needs to get prepared and moved soon (to a different vCMP guest). Because of that situation, the VLAN already has some interfaces assigned to it on the vCMP host, so my normal approach is not feasible here.
My current plan is to create the VLAN on the second vCMP guest directly within the appropriate partition without assigning it to the guest on the vCMP host, then do all the config stuff and as a last step assign the VLAN to the guest during cutover. I'm a bit unsure though what will happen when the vCMP host tries to propagate a "new" VLAN to a vCMP guest that already exists. Will this collide somehow? Does anybody have experience with a similar situation? Any hint is appreciated!
Many thanks in advance!
Martin
4 Replies
- Hamish
Cirrocumulus
You can't create VLAN's on a guest.
IIUC you're doing it this way because you don't want to change the IP's of the VS's that are cutting over. You're shifting them from the Cisco ACE to the BigIP.
You could however try creating the VS's etc on the guest ahead of time. Then at cutover time you just need to attach the already created VLAN to the vCMP Guest and on the guest create any required selfIP's (Note that for INBOUND traffic to VS's with defined IP's you don't need selfIP's. They're only mandatory for targeting the BigIP itself (i.e. as a router) or when big needs to route traffic OUT of the interface to somewhere else (So you can add a next-hop route or communicate with directly attached hosts on that connected VLAN).
The approach above should work. You don't need the VLAN to be present when creating VS's (In fact VS IP's don't even need to exist on attached VLANS as long as you have the appropriate routing setup in your network).
H
- Jim_43841Historic F5 Account
My current plan is to create the VLAN on the second vCMP guest directly within the appropriate >partition without assigning it to the guest on the vCMP host, then do all the config stuff and as a >last step assign the VLAN to the guest during cutover. I'm a bit unsure though what will happen when >the vCMP host tries to propagate a "new" VLAN to a vCMP guest that already exists. Will this collide >somehow? Does anybody have experience with a similar situation? Any hint is appreciated!
This plan will work just fine. The host matches vlans up to the guest based on the vlan id (not name), it will match up the vlan when you eventually assign it to the guest on the host in the same manner as it would have if you'd done it in the other order.
- amshaffer_24494
Nimbostratus
In this configuration, did you need a dedicated failover vlan per partition/traffic group. I am doing an ACE to F5 migration with 50 contexts - tatmotiv
Cirrostratus
No, you don't need a dedicated failover VLAN per traffic-group. Not even one per vCMP guest. You can use one shared failover VLAN for all guests, provided you use unicast failover.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com