Contents

DCv2 Topology Information

Last updated: December 7, 2017

Click the "Resources" link on the right for the topology diagram.

Topology Overview

INE's CCIE DCv2 Topology is made up of six "racks" of equipment, which interconnect to form larger topologies. Equipment in the topology includes a mix of the following:

  • Nexus 9300s (Running in ACI mode)
  • Application Policy Infrastructure Controller (APIC)
  • Nexus 7000s w/ F3 Linecards
  • Nexus 5600s
  • Nexus 2300 & 2200 Fabric Extenders (FEXes)
  • UCS 6200 Fabric Interconnects (FIs)
  • UCS B Series Blade Servers
  • UCS C Series Rack Mount Servers
  • Fibre Channel Storage Array
  • iSCSI Storage Array
  • Nexus 1000v Virtual Switches
  • CSR1000v Virtual Routers
  • ASAv Virtual Firewalls
  • UCS Director
  • UCS Central
  • VMWare ESXi Servers
  • VMWare vCenter Servers
  • Windows Servers

Rack Rental Devices

Each rack includes dedicated access to Nexus 7Ks, 5Ks, & Windows Server Jumpboxes, and shared access to ACI, UCS, FEXes, and other Virtual Machines. See the table below for the specific rack number to device assignments, and the attached diagram for the physical wiring details.

Rack Nexus 7Ks Nexus 5Ks Windows Servers Nexus 2Ks (FEXes) UCS C Servers
Rack 1 N7K1 & N7K2 N5K1 & N5K2 Server 1 & 2 N2K3 & N2K4 C200-1
Rack 2 N7K3 & N7K4 N5K3 & N5K4 Server 3 & 4 N2K3 & N2K4 C200-1
Rack 3 N7K5 & N7K6 N5K5 & N5K6 Server 5 & 6 N2K5 & N2K6 C200-2
Rack 4 N7K7 & N7K8 N5K7 & N5K8 Server 7 & 8 N2K5 & N2K6 C200-2
Rack 5 N7K9 & N7K10 N5K9 & N5K10 Server 9 & 10 N2K7 & N2K8 C200-3
Rack 6 N7K11 & N7K12 N5K11 & N5K12 Server 11 & 12 N2K7 & N2K8 C200-3

Nexus 9000s (ACI)

Each rack includes shared access to two Nexus 9300 ACI Leafs, one Nexus 9300 ACI Spine, and the Cisco APIC Controller. The Nexus 9K Leafs physically connect to the Nexus 7Ks, and to a pair of Nexus 2300 Fabric Extenders (FEXes) which are dual 10GigE attached to a UCS C-Series Server.

Nexus 7000s

Each rack includes dedicated access to two Nexus 7K VDCs with F3 linecards, supporting both layer 2 & layer 3 features. The Nexus 7Ks physically connect to both the Nexus 5Ks and Nexus 9K ACI Leafs.

Nexus 5000s

Each rack includes dedicated access to two Nexus 5600s, supporting layer 2 & layer 3 Ethernet/IP LAN Switching and FC/FCoE SAN Switching. The Nexus 5Ks physically connect northbound (upstream) to the Nexus 7Ks, and southbound (downstream) to the Windows Server Jumpboxes, Nexus 2K Fabric Extenders (FEXes), UCS Fabric Interconnects (UCS FIs), and both Fibre Channel & iSCSI Storage Arrays.

Windows Servers

Each rack includes dedicated access to two Windows Server Jumpboxes, each with dual 10GigE links connecting to the Nexus 5Ks, and an out-of-band NIC used to manage the ACI, UCS, and other GUI devices.

Nexus 2000s & UCS C-Series Servers

Each rack includes shared access to two Nexus 2200 Fabric Extenders, which connect to shared UCS C-Series Servers. See the Fabric Extender labs for more information on accessing these devices.

UCS B-Series Servers

Each rack includes shared access to two pairs of UCS 6200 Fabric Interconnects (FIs), with each pair of FIs connecting to a unique UCS B-Series Blade Chassis. UCS FIs connect upstream to the Nexus 5Ks through both Ethernet and Native Fibre Channel.

Backbone Devices

Each rack includes shared access to backbone devices such as Fibre Channel & iSCSI Storage Arrays, VMWare ESXi Servers, CSR1000v Virtual Routers, etc. Login credentials for these devices are listed below.

Device Numbering & Management IP Addressing

Use the below numbering scheme for any task that references "use X, where X is the device number". Devices in the topology are pre-configured with management IP addressing as follows. Do not modify any management IP addresses.

Device Device Number Management IP
N5K1 51 192.168.0.51/22
N5K2 52 192.168.0.52/22
N5K3 53 192.168.0.53/22
N5K4 54 192.168.0.54/22
N5K5 55 192.168.0.55/22
N5K6 56 192.168.0.56/22
N5K7 57 192.168.0.57/22
N5K8 58 192.168.0.58/22
N5K9 59 192.168.0.59/22
N5K10 60 192.168.0.60/22
N5K11 61 192.168.0.61/22
N5K12 62 192.168.0.62/22
N7K1 71 192.168.0.71/22
N7K2 72 192.168.0.72/22
N7K3 73 192.168.0.73/22
N7K4 74 192.168.0.74/22
N7K5 75 192.168.0.75/22
N7K6 76 192.168.0.76/22
N7K7 77 192.168.0.77/22
N7K8 78 192.168.0.78/22
N7K9 79 192.168.0.79/22
N7K10 80 192.168.0.80/22
N7K11 81 192.168.0.81/22
N7K12 82 192.168.0.82/22

Login Credentials & Additional Device Addressing

All NX-OS logins/passwords are cisco/cisco. Additional devices pre-configured management IP addresses and credentials, such as the UCS Fabric Interconnects, are listed below. Do not modify any management IP addresses or username/password credentials on any of these boxes.

Device Management IP Username Password
Access Server 192.168.0.1/22 N/A
APIC CIMC 192.168.0.3/22 N/A
APIC GUI 192.168.0.4/22 cisco cisco
N7K1-ADMIN 192.168.0.5/22 cisco cisco
N7K2-ADMIN 192.168.0.6/22 cisco cisco
DC Rack1 Server 1 192.168.0.11/22 administrator cisco
DC Rack1 Server 2 192.168.0.12/22 administrator cisco
DC Rack2 Server 3 192.168.0.13/22 administrator cisco
DC Rack2 Server 4 192.168.0.14/22 administrator cisco
DC Rack3 Server 5 192.168.0.15/22 administrator cisco
DC Rack3 Server 6 192.168.0.16/22 administrator cisco
DC Rack4 Server 7 192.168.0.17/22 administrator cisco
DC Rack4 Server 8 192.168.0.18/22 administrator cisco
DC Rack5 Server 9 192.168.0.19/22 administrator cisco
DC Rack5 Server 10 192.168.0.20/22 administrator cisco
DC Rack6 Server 11 192.168.0.21/22 administrator cisco
DC Rack6 Server 12 192.168.0.22/22 administrator cisco
N7K_SAN_A 192.168.0.83/22 cisco cisco
N7K_SAN_B 192.168.0.84/22 cisco cisco
UCS1 FI Cluster 192.168.0.100/22 cisco cisco
UCS1 FI-A 192.168.0.101/22 cisco cisco
UCS1 FI-B 192.168.0.102/22 cisco cisco
UCS Director 192.168.0.103/22 cisco cisco
UCS Central 192.168.0.104/22 cisco cisco
UCS C220-M4 CIMC 192.168.0.111/22 cisco cisco
UCS C200-M2-1 CIMC 192.168.0.112/22 cisco cisco
UCS C200-M2-2 CIMC 192.168.0.113/22 cisco cisco
UCS C200-M2-3 CIMC 192.168.0.114/22 cisco cisco
UCS2 FI Cluster 192.168.0.200/22 cisco cisco
UCS2 FI-A 192.168.0.201/22 cisco cisco
UCS2 FI-B 192.168.0.202/22 cisco cisco
iSCSI-SAN Eth0 192.168.0.234/22 N/A N/A
Nexus-MGMT-SW 192.168.0.254/22 cisco cisco

UCS & VMWare IP Addressing

Use the following IP addresses for UCS C Series & B Series servers to talk to VMWare vCenter and Nexus 1000v. Specific instructions for accessing these boxes are included in the individual lab exercises that require the usage of them.

Device IP Address Username Password
CSR1000v (DNS) 10.0.1.1/24 cisco cisco
N1Kv-1 10.0.1.11/24 admin Cciedc01
N1Kv-2 10.0.1.12/24 admin Cciedc01
N1Kv-3 10.0.1.13/24 admin Cciedc01
ESXi-1 10.0.1.101/24 root Cciedc01
ESXi-2 10.0.1.102/24 root Cciedc01
ESXi-3 10.0.1.103/24 root Cciedc01
VCSA-1 10.0.1.111/24 administrator@ine.local Cciedc01!
VCSA-2 10.0.1.112/24 administrator@ine.local Cciedc01!
VCSA-3 10.0.1.113/24 administrator@ine.local Cciedc01!
C200-M2-1 ESXi 10.0.1.201/24 root Cciedc01
C200-M2-2 ESXi 10.0.1.202/24 root Cciedc01
C200-M2-3 ESXi 10.0.1.202/24 root Cciedc01
UCS1-Blade-1 10.0.1.211/24 root Cciedc01
UCS1-Blade-2 10.0.1.212/24 root Cciedc01
UCS1-Blade-3 10.0.1.213/24 root Cciedc01
UCS1-Blade-4 10.0.1.214/24 root Cciedc01
UCS1-Blade-5 10.0.1.215/24 root Cciedc01
UCS1-Blade-6 10.0.1.216/24 root Cciedc01
UCS1-Blade-7 10.0.1.217/24 root Cciedc01
UCS1-Blade-8 10.0.1.218/24 root Cciedc01
UCS2-Blade-1 10.0.1.221/24 root Cciedc01
UCS2-Blade-2 10.0.1.222/24 root Cciedc01
UCS2-Blade-3 10.0.1.223/24 root Cciedc01
UCS2-Blade-4 10.0.1.224/24 root Cciedc01
UCS2-Blade-5 10.0.1.225/24 root Cciedc01
UCS2-Blade-6 10.0.1.226/24 root Cciedc01
UCS2-Blade-7 10.0.1.227/24 root Cciedc01
UCS2-Blade-8 10.0.1.228/24 root Cciedc01
Default Gateway 10.0.1.254/24 N/A N/A
^ back to top