VMware by default comes with “vSwitch0”, the standard vSwitch which is at host level providing essential networking features such as 802.1Q VLAN tagging, egress traffic shaping, basic security, and NIC teaming required for the virtualisation setup. Then comes a vDS (vSphere Distributed Switch) which essentially operates at Data center level making configuration of multiple hosts easies to manage with added advantages like ingress/egress traffic shaping, PVLANs (Private VLANs), and network vMotion.
Nexus 1000v comes with added advantages like DHCP Snooping, IP Source Guard, Dynamic ARP Inspection, VxLAN support, Cisco TrustSec SGA support, Cisco VSG support and VN-Tagging
Nexus 1000v can be seen as another flavor of software-defined networking. The Cisco Nexus 1000V is made from 2 components VSM and VEM. The VSM provides the management and control plane functions for the Cisco Nexus 1000V Switches. The VEM provides the Cisco Nexus 1000V with network connectivity and forwarding capabilities much like a line card in a modular switching platform.
Figure 1
The Control VLAN and the Packet VLAN are used for communication between the VSM and the VEM.
Management VLAN is used by VSM Management interface to communicate with a Vcenter to publish port configuration, remote access (Management Access)
The Packet VLAN is used by protocols such as CDP, LACP, and IGMP.
This installation covers Layer 3 mode which is also the recommended mode, because of ease of troubleshooting and Packet VLAN is not needed.

Figure3

Figure4
As you will see during the installation steps we have created Kernel interface and assigned an IP address to it. The VSM to VEM communication requires a special type of port profile with the L3 capability. This has to be created from the Nexus soft switch 1000v. Ensure that you have the necessary L3 connectivity between the components and the default gateways by doing some ping pong tests. Use vmkping command to verify the VMkernel networking configuration, Ping from the VSM and the L3 routing element to all the components having L3 interface.
Let us now straight away jump to deployment of Cisco Nexus 1000v on vSphere 5.5. These steps were captured in my Home lab during the installation of Nexus 1000v .
In my lab I have 3 Dell Servers named Ganga,Yamuna and Saraswati. I also have 2 stand alone separate servers running Microsoft Active directory services/ Domain controller and the DNS. Nexus 1000v deployment needs the software like Windows 20008r2, VSphere client, ESXI5.5, Vcenter 5.5, and tools like Winscp, Putty telnet client.
The following figure depicts the logical and the physical connectivity with the following subnets and the VLAN’s.
| My Vlan | My Network Label | Subnet |
| 200 | VLAN200-N1KV_VSM_CONTROL_badhe | 192.168.200.x |
| 201 | VLAN201_N1KV_VSM_MGMT_badhe | 192.168.201.x |
| 205 | VEM | 192.168.205.x |
| 100 | VMkernel_servers | 192.168.100.X |
Table1
We are on a low budget and I have a Layer 2 Cisco Switch 2950 and with a router Cisco 2600 to perform routing between the the VLAN’s , configured in “Router on a Stick” topolgy. Alternatively you can also use virtual router to route between the VLANS used in Nexus 1000v.This setup solves the purpose of routing between VSM, Packet and the Management newtwork.
The logical diagram (Figure 1) depicts logical connections with the Vlans and the subnet assigments.The third octet in the subnet matches the vlan number and each subnet will have 192.168.x.254 as the default gateway configured on the logical interface on the router Cisco2600.

Figure5
I have installed Windows 2008R2 , Data Center version, for Domain controller (Active directory service) and DNS.All the nodes are registered in the DNS statically as shown in the figure 3
Configuration on Cisco router 2600
Here is the router configuration for inter VLAN configuration, pretty simple “router on the stick configuration”.
NEWYORK#show ip int br
Interface IP-Address OK? Method Status Protocol
FastEthernet0/0 unassigned YES NVRAM up down
FastEthernet0/1 unassigned YES NVRAM up up
FastEthernet0/1.1 192.168.0.254 YES NVRAM up up
FastEthernet0/1.100 192.168.100.254 YES manual up up
FastEthernet0/1.200 192.168.200.254 YES manual up up
FastEthernet0/1.201 192.168.201.254 YES manual up up
FastEthernet0/1.202 192.168.202.254 YES manual up up
FastEthernet0/1.203 192.168.203.254 YES manual up up
FastEthernet0/1.204 192.168.204.254 YES manual up up
FastEthernet0/1.205 192.168.205.254 YES manual up up
Loopback0 97.9.15.127 YES NVRAM up up
interface Loopback0
ip address 97.9.15.127 255.255.255.255
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
!
interface FastEthernet0/1.1
encapsulation dot1Q 1 native
ip address 192.168.0.254 255.255.255.0
!
interface FastEthernet0/1.100
description badhe_all_servers
encapsulation dot1Q 100
ip address 192.168.100.254 255.255.255.0
!
interface FastEthernet0/1.200
description badhe_vsm_control
encapsulation dot1Q 200
ip address 192.168.200.254 255.255.255.0
!
interface FastEthernet0/1.201
description badhe_vsm_manage
encapsulation dot1Q 201
ip address 192.168.201.254 255.255.255.0
!
interface FastEthernet0/1.202
description badhe_vmotion
encapsulation dot1Q 202
ip address 192.168.202.254 255.255.255.0
!
interface FastEthernet0/1.203
description badhe_storage
encapsulation dot1Q 203
ip address 192.168.203.254 255.255.255.0
!
interface FastEthernet0/1.204
encapsulation dot1Q 204
ip address 192.168.204.254 255.255.255.0
!
interface FastEthernet0/1.205
description Towards VMDK
encapsulation dot1Q 205
ip address 192.168.205.254 255.255.255.0
Configuration on Cisco Switch 2950
Switch#show running-config
Building configuration…
Current configuration : 2250 bytes
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Switch
!
!
ip subnet-zero
!
!
spanning-tree mode pvst
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
!
!
!
interface Port-channel5
switchport mode trunk
spanning-tree portfast trunk
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
!
interface Port-channel6
switchport mode trunk
spanning-tree portfast trunk
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
!
interface FastEthernet0/1
!
interface FastEthernet0/2
!
interface FastEthernet0/3
switchport mode access
!
interface FastEthernet0/4
switchport mode access
!
interface FastEthernet0/5
switchport mode trunk
channel-group 5 mode active
spanning-tree portfast trunk
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
!
interface FastEthernet0/6
switchport mode trunk
channel-group 5 mode active
spanning-tree portfast trunk
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
!
interface FastEthernet0/7
switchport mode trunk
channel-group 6 mode active
spanning-tree portfast trunk
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
!
interface FastEthernet0/8
switchport mode trunk
channel-group 6 mode active
spanning-tree portfast trunk
spanning-tree bpdufilter enable
spanning-tree bpduguard enable
!
interface FastEthernet0/9
!
interface FastEthernet0/10
!
interface FastEthernet0/11
switchport mode trunk
!
interface FastEthernet0/12
switchport mode trunk
!
interface FastEthernet0/13
!
interface FastEthernet0/14
switchport trunk allowed vlan 1,100,200-206
switchport mode trunk
!
interface FastEthernet0/15
description “To Yamuna vmnic1”
switchport mode trunk
!
interface FastEthernet0/16
description “To Saraswati vmnic1 ”
switchport mode trunk
!
interface FastEthernet0/17
!
interface FastEthernet0/18
!
interface FastEthernet0/19
!
interface FastEthernet0/20
!
interface FastEthernet0/21
!
interface FastEthernet0/22
!
interface FastEthernet0/23
!
interface FastEthernet0/24
!
interface Vlan1
no ip address
no ip route-cache
shutdown
!
ip http server
!
line con 0
line vty 0 4
login
line vty 5 15
login
!
!
end
ESXI Server Configuration
On my ESXI host Saraswati, I have planned two virtual machines to run, the VSM as appliance and the Vcenter running on Windows server 2008r2 having hostname Vcenter2 IP address 192.168.0.14)
We will port Vswitch on host Yamuna to Nexus 1000v. We start the configuration process with the manual port group creation for test VM’s (running 64bits Windows8 Operating system) in VLAN 100 with the addition of Virtual switch vSwitch1.

Figure 3

Figure4

Figure 5

Figure 6

Figure 7

Figure 8

Figure9

Figure 10

Figure 11

Figure 12

Figure 13

Figure 14

Figure 15

Figure 16

Figure 17

Figure 18

Figure 19

Figure 22

Figure 23

Figure 24

Figure 25

Figure 26

Figure27

Figure 28

Figure 29

Figure 30

Figure 31

Figure 32

Figure 33

Figure 34

Figure 35

Figure 36

Figure 37

Figure 38

Figure 39

Figure 40

Figure 41

Figure 42

Figure 43

Figure 44

Figure 45

Figure 46

Figure 47

Figure 48

Figure 49
Adding the Nexus 1000v VM onSever Saraswati

Figure 50

Figure 51

Figure 52

Figure 53

Figure 54

Figure 55

Figure 56
Map the VLAN’s

Figure 57
Provide the Management IP address , subnet mask and the default gateway as per the design.

Figure 58
Click next to proceed with the deployment of VSM

Figure 59
Once the VSM is deployed , the Nexus softswitch will boot .

Figure 60
Open your browser and provide the management IP address of the Nexus switch

Figure 61
Download the Plugins and the VIB files.

Figure 62

Figure 63
Now lets us install the Plugins in Vcenter . This plugin will enable communication between the Vcenter and the VSM.

Figure 64
Right click on the screen, choose “New Plugin” and provide the path where you downloaded the Plug-ins.

Figure 65

Figure 66
Register the Plugins

Figure 67

Figure 68

Figure 69

Figure 70

Figure 71

Figure 72

Figure 73

Figure 74

Figure 75

Figure 76

Figure 77

Figure 78

Figure 79

Figure 80

Figure 81

Figure 82

Figure 83

Figure 84

Figure 85

Figure 86

Figure 87

Figure 88

Figure 89

Figure 90

Figure91

Figure 92

Figure 93

Figure 94

Figure 95

Figure 96

Figure 97

Figure 98

Figure 99

Figure 100

Figure 101

Figure 102