I’m wondering if they’re gonna phase out the BE6K (and the 4000 ISr eventually) 
in lieu of these:

https://www.cisco.com/c/en/us/products/routers/5000-series-enterprise-network-compute-system/index.html

I stumbled across this new device while researching the UCS-E stuff.

It sounds rather interesting.


---
Lelio Fulgenzi, B.A.
Senior Analyst, Network Infrastructure
Computing and Communications Services (CCS)
University of Guelph

519-824-4120 Ext 56354
le...@uoguelph.ca
www.uoguelph.ca/ccs
Room 037, Animal Science and Nutrition Building
Guelph, Ontario, N1G 2W1

From: Ben Amick [mailto:bam...@humanarc.com]
Sent: Tuesday, September 12, 2017 1:00 PM
To: Chris Osborne (Americas); Lelio Fulgenzi; cisco-voip voyp list
Subject: RE: UCS-E and using both internal and external connections.

I know I’ve read they’re phasing out the existing BE6KS, but I do wonder if 
that might just be on due to the fact that it’s built on the 2900 platform, and 
they just haven’t announced a formal solution on 4400 series units yet. I mean, 
people were essentially doing the BE6KS prior to its inception, so I wouldn’t 
be surprised if that’s the end objective.

Ben Amick
Unified Communications Analyst

From: cisco-voip [mailto:cisco-voip-boun...@puck.nether.net] On Behalf Of Chris 
Osborne (Americas)
Sent: Tuesday, September 12, 2017 12:51 PM
To: Lelio Fulgenzi <le...@uoguelph.ca<mailto:le...@uoguelph.ca>>; cisco-voip 
voyp list <cisco-voip@puck.nether.net<mailto:cisco-voip@puck.nether.net>>
Subject: Re: [cisco-voip] UCS-E and using both internal and external 
connections.

Correct.

Happy to help. I spent a year and half deploying stores in a box for a retail 
org in the US. I’ve built over 100 -  E140M2s.  Then Cisco came out with the 
BEK6S and I had to two of them ( a little less complex) but interesting to 
plan/figure out best ways to do things. Now I hear Cisco is getting rid of the 
BEK6S combo.


Chris Osborne
Sr Solution Architect
T: 704-969-2771
M: 864-423-8288
E: chris.osbo...@dimensiondata.com<mailto:chris.osbo...@dimensiondata.com>
For more information, please go to 
www.dimensiondata.com/en-US<http://cp.mcafee.com/d/avndy1J5-XWrbWaqpKVJ55BZBcsehd79J55BZBcsY-Orhhpvuv7ffK6Qkn3hOqerTKzsSgRmlyEa9JGX3oSVsSjrlS6NJOVJ4xt5Uwqen-LObPzPadSuLsKCOe7sOyeosd7bbfkhjmKCHtdPBgY-F6lK1FJ4SUrLRQnSmhRQTS3tPo092iLMFaI4dDLbVY2Uj63tFkJkKpH9oKgGT2TQ1iPtyL0QDYu1FJYQsTpd79I5-Aq83iTqlblbCqOmdbFEw2oAc5NEQgr10QgdQB0yq825pAPh1a4_z3jPh1I43h1UvfUMQYQgmH27SDaIasr79CTD3UVlvPOFA>






From: Lelio Fulgenzi [mailto:le...@uoguelph.ca]
Sent: Tuesday, September 12, 2017 12:48 PM
To: Chris Osborne (Americas) 
<chris.osbo...@dimensiondata.com<mailto:chris.osbo...@dimensiondata.com>>; 
cisco-voip voyp list 
<cisco-voip@puck.nether.net<mailto:cisco-voip@puck.nether.net>>
Subject: RE: UCS-E and using both internal and external connections.


Excellent examples. I’m thinking of going with example 2.

In your case then, your collab apps are using the IP address of ge0/0 (which 
I’m assuming is 10.180.X.2) as their default gateway, correct?


---
Lelio Fulgenzi, B.A.
Senior Analyst, Network Infrastructure
Computing and Communications Services (CCS)
University of Guelph

519-824-4120 Ext 56354
le...@uoguelph.ca<mailto:le...@uoguelph.ca>
www.uoguelph.ca/ccs<http://cp.mcafee.com/d/2DRPoOrhvK-CO-yCCrKrhhpvpj73AjhOrhhpvpj7ffICQkmnTDNPPXxJ55MQsCzCZXETdAdlBoG2yrqKMSdKndASRtxIrsKrh8nhu86zB_HYyYUYOztDHTbFIzxTcEzC73hOOPR4kRHFGTjsVkffGhBrwqrjdK6XZt5ZBAttdZwTsS02rGhrYZoDRJORG6XiFqFsPmiNsxlK5LE2BCX5u1FfUY3jrVEVKOqejobZ8Qg6BKQGmGncRAIqnjh04N8obzhEwS21EwrFa14Qg4aP9Cy2k9_66DCy3o86y3M-vNxFVEwJm4fJelokUSejdw_81>
Room 037, Animal Science and Nutrition Building
Guelph, Ontario, N1G 2W1

From: Chris Osborne (Americas) [mailto:chris.osbo...@dimensiondata.com]
Sent: Tuesday, September 12, 2017 11:47 AM
To: Lelio Fulgenzi; cisco-voip voyp list
Subject: RE: UCS-E and using both internal and external connections.

Here are two examples I’ve used in the past

----example 1  -------
ip unnumbered and Vlans  – so you have some ip range flexibility.  ( also I 
think the external NIC is just a layer 2 interface that is for outside switch 
connectivity)

I this case I only used 2/0 for the CIMC and esxi and the 2/1 for all host 
communications ( voice, firewall, vmware)  broke out onto vlans

interface ucse2/0
ip unnumbered Vlan11
imc ip address 10.20.X.X 255.255.255.192 default-gateway 10.20.X.X (where this 
is the IP of Vlan11)
imc access-port shared-lom console
!
( if you plan on using the other IP”s in the vlan 11 range you have to put 
static routes to this interface)
ip route 10.20.X.132 255.255.255.255 ucse2/0 name cimc
ip route 10.20.X.133 255.255.255.255 ucse2/0 name exsi


interface ucse2/1
description Internal switch interface connected to Service Module
switchport trunk native vlan 11
switchport trunk allowed vlan 1-5,7,8,12
switchport mode trunk
no ip address

interface Vlan11
description Management Vlan
ip address 10.20.X.X 255.255.255.192

interface Vlan2
description Voice Vlan
ip address 10.20.99.X 255.255.255.128

….


---- example 2 -----

Basic voice installation with a BEK6S – nothing fancy since it was a base 100 
user system with Router as SRST to a single CUCM/CUC/IMP

interface ucse1/0
description Internal interface connected to UCSE Port 0
ip unnumbered GigabitEthernet0/0
imc ip address 10.180.X.5 255.255.254.0 default-gateway 10.180.X.2
 imc access-port shared-lom console
!
interface ucse1/1
description Internal switch interface connected to UCSE Port 1
no ip address

ip route 10.180.X.5 255.255.255.255 ucse1/0 name cimc
ip route 10.180.X.6 255.255.255.255 ucse1/0 name esxi
ip route 10.180.X.7 255.255.255.255 ucse1/0 name CUCM
ip route 10.180.X.8 255.255.255.255 ucse1/0 name CUPS
ip route 10.180.X.9 255.255.255.255 ucse1/0 name CUC



Chris Osborne
Sr Solution Architect
T: 704-969-2771
M: 864-423-8288
E: chris.osbo...@dimensiondata.com<mailto:chris.osbo...@dimensiondata.com>
For more information, please go to 
www.dimensiondata.com/en-US<http://cp.mcafee.com/d/k-Kr4zqbZTQSnQkQPtPqabbXaoUsyqejqabbXaoVVZASyyO-Y-euvsdEEK6zAQsTLt6VIxGIH5gkjrlS6NJOVICSHIdzrBPq92WbN0QsLZvAnD7CkrIZuVtdAseVB4sMUqemmuEyCJtdmWrDaxVZicHs3jr9JMTvHELIIzHFLI6XCM0i4Bvxilo8rfunPU5MCc6XiFqFsPmiNsxlK5LE2BCX5u1FfUY3jrVEVKOqejobZ8Qg6BKQGmGncRAIqnjh04N8obzhEwS21EwrFa14Qg4aP9Cy2k9_66DCy3o86y3M-vNxFVEwJm4fJelokUSejdxKmDR9LS>






From: Lelio Fulgenzi [mailto:le...@uoguelph.ca]
Sent: Tuesday, September 12, 2017 11:31 AM
To: Chris Osborne (Americas) 
<chris.osbo...@dimensiondata.com<mailto:chris.osbo...@dimensiondata.com>>; 
cisco-voip voyp list 
<cisco-voip@puck.nether.net<mailto:cisco-voip@puck.nether.net>>
Subject: RE: UCS-E and using both internal and external connections.


Thanks Chris. This is the answer I seem to be getting from different avenues. I 
like to get comments about design and deployment options from various sources.

The TAC confirmed using all interfaces at once, but cautioned that they are not 
bonded together. So in my case, I’d have vSwitch zero for management using 
ge<slot>/2 (external) and vSwitch one for applications using ge<slot>/0 
(internal L3 interface).

I’m still working out how to configure things  with respect to what the default 
gateway of the guest applications would be, but I think I’m there. Essentially 
create a loopback and assign that loopback to the ip unnumbered configuration 
on the UCS-E blade itself. This loopback would be a subnet of, say, /29, with 6 
usable ip addresses, one for router, 5 for guests. Overkill, but I can’t go 
with just two host ip address that you get with a /30. This loopback would then 
be the default gateway of the guest application on the same subnet.

I’ve also asked the TAC to confirm what type of port is the external GE 
connection – L2 or L3 or selectable? I’d want to be able to plug the external 
GE connection into an upstream switch configured for the campus ESXi host VLAN.

If you have thoughts on any of the above, that would be great!


---
Lelio Fulgenzi, B.A.
Senior Analyst, Network Infrastructure
Computing and Communications Services (CCS)
University of Guelph

519-824-4120 Ext 56354
le...@uoguelph.ca<mailto:le...@uoguelph.ca>
www.uoguelph.ca/ccs<http://cp.mcafee.com/d/5fHCNEgdELTvjpvhjjdTdEEILIFzxO9EVdEEILIFzDDSjqabbXPUVVZMSyyUqejhPuZQrCO6GOIl1hdJnor6TbCOrqKMSdKndEAbEL43hO_R-husuphKPRXBQShMXCkhP3xEVppWyaqRQRrFKsG7DR8OJMddI6T3t-Ky-OOeKC-MrKr01dR8J-uIjWSVqR3tFkJkKpH9oKgGT2TQ1iPtyL0QDYu1FJYQsTpd79I5-Aq83iTqlblbCqOmdbFEw2oAc5NEQgr10QgdQB0yq825pAPh1a4_z3jPh1I43h1UvfUMQYQgmH27SDaIasr79CSmMR-eHbi9ku>
Room 037, Animal Science and Nutrition Building
Guelph, Ontario, N1G 2W1

From: Chris Osborne (Americas) [mailto:chris.osbo...@dimensiondata.com]
Sent: Tuesday, September 12, 2017 11:04 AM
To: Lelio Fulgenzi; cisco-voip voyp list
Subject: RE: UCS-E and using both internal and external connections.

Lelio

I’m my experience you will have two internal (router) interfaces to the E140 
blade 2/0 and 2/1 plus an external NIC on the card blade itself (I’ve never 
used it, couldn’t find a reason to)

So you could definitely setup one NIC as internal and the other as External 
inside the router and or use the external NIC as well as a backup to switch.

Vmware just see’s the 3 NIC’s and you can use them as you see fit with VSwitch 
setups as normal UCS seriers servers.


Chris Osborne
Sr Solution Architect
T: 704-969-2771
M: 864-423-8288
E: chris.osbo...@dimensiondata.com<mailto:chris.osbo...@dimensiondata.com>
For more information, please go to 
www.dimensiondata.com/en-US<http://cp.mcafee.com/d/2DRPoOrhvK-CO-yCCrKrhhpvpj73AjhOrhhpvpj7ffICQkmnTDNPPXxJ55MQsCzCZXETdAdlBoG2yrqKMSdKndASRtxIrsKrh8nhu86zB_HYyYUYOztDHTbFIzxTcEzC73hOOPR4kRHFGTjsVkffGhBrwqrvdK6XZt5ZBAttdZwTsS02gAHYaiH13pXO-v0K4NwTqlblbCqOmbAaJMJZ0kIToHMd9_7wqrvd7dSjhOr1vF6y0QJSBiRiVCIBziWq80C931sqd46Mgd43t9g8Cy0xmpcQgixfUMQYQgr10Qgu7P-cdfd45GMxZFOH2D6NOpLG6apoto>






From: cisco-voip [mailto:cisco-voip-boun...@puck.nether.net] On Behalf Of Lelio 
Fulgenzi
Sent: Saturday, September 09, 2017 9:49 PM
To: cisco-voip voyp list 
<cisco-voip@puck.nether.net<mailto:cisco-voip@puck.nether.net>>
Subject: [cisco-voip] UCS-E and using both internal and external connections.





I'm in the process of designing a new demployment of four ucs-E blades 
(e140s-m2) into four ISR-G2 routers (2x3945,1x3925,1x2921).

The question I have is whether or not I can use _both_ an internal interface 
and external interface to communicate with the blade? External for ESXi and 
internal for guests (unity express) running on ESXi.

I'd like to use external for ESXi to stick with existing models but to also 
remove the router internals as a failure point. The guest itself would need to 
talk with the router internals to ensure unity express can register with SRST 
without any infrastructure requirements.

What are people's thoughts about this?

Sent from my iPhone
_______________________________________________
cisco-voip mailing list
cisco-voip@puck.nether.net<mailto:cisco-voip@puck.nether.net>
https://puck.nether.net/mailman/listinfo/cisco-voip<http://cp.mcafee.com/d/k-Kr6xEqdELTvjpvhjjdTdEEILIFzxO9EVdEEILIFzDDSjqabbXPUVVZMSyyUqejhPuZQrCO6GOIl1hdJnor6TbCOrqKMSdKndEAbEL43hO_R-husuphKPRXBQShMXCkhP3xEVppWyaqRQRrFKsG7DR8OJMddK6T3t-Ky-OOeKC-MrKr9PCJhbcmrIlU6A_zMdMjlS67OFek7qVqlblbCqOmdSBiRiVCIByV2Hsbvg5bdSaY3ivNU6CTPhPtAQsCMnWhEwdbtFkJkKpH9oQKCy09ygMn6zh1I43h0Tik29Ew8lCjd44Ej-cdfd46Mgd47xY_z3jPh1qI8vqsGMFNIsCrRINB>


itevomcid

Confidentiality Note: This message is intended for use only by the individual 
or entity to which it is addressed and may contain information that is 
privileged, confidential, and exempt from disclosure under applicable law. If 
the reader of this message is not the intended recipient or the employee or 
agent responsible for delivering the message to the intended recipient, you are 
hereby notified that any dissemination, distribution or copying of this 
communication is strictly prohibited. If you have received this communication 
in error, please contact the sender immediately and destroy the material in its 
entirety, whether electronic or hard copy. Thank you
_______________________________________________
cisco-voip mailing list
cisco-voip@puck.nether.net
https://puck.nether.net/mailman/listinfo/cisco-voip

Reply via email to