0% found this document useful (0 votes)
243 views62 pages

Nexus Docmento Troble PDF

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
243 views62 pages

Nexus Docmento Troble PDF

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

Nexus 5000 & 2000 Series

Configuration & Troubleshooting

Lucien Avramov
Thank You for Joining Us Today

The Live Ask the Expert Event


Will Begin at 10:00 am Pacific Time

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Thank You for Joining Us Today
Before We Begin
 To submit a question just type your question in the box below the speaker
image, and click submit
 To see the questions with answers please click on the Refresh Q&A
button below the slide window and use F11 to remove toolbars and
enable a full screen view
 If you can hear the music, your Flash player has been
installed correctly
 If you cannot hear the music now, please download the latest version of
Flash available in the Help section and reload the webcast console
 If you still cannot hear the music, please contact
[email protected]

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Thank You for Joining Us Today

Today’s presentation will include audience polling questions


We encourage you to participate!

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Thank You for Joining Us Today
Downloading the Presentation

 If you would like a copy of the presentation slides, click ―Download PDF‖
in the upper right corner of the webcast console.

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Cisco Support Community—Ask the Expert

 Today’s featured expert is


Lucien Avramov
 Ask him questions now
about Nexus 5000 & 2000 series
switches

Lucien Avramov, CCIE


TAC Data Center Team, Cisco

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Please Note

 To submit a question just type your question in the box below the speaker
image and click submit
 To see the questions with answers please click on the Refresh Q&A
button below the slide window and use F11 to remove toolbars and
enable a full screen view
 This event is fully streamed; the audio is heard via your Flash
media player
 You can download today’s presentation by clicking ―Download PDF‖ in
the upper right corner of the webcast console.
 To take part in the polls, please disable your pop-up blockers during the
event so you may see and answer the questions

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Win a Premiere Pass!

Each time you answer a polling question, you will have a chance to win a
Cisco Live & Networkers Virtual Premiere Pass, worth $395. The first
person to answer the question, will win a Premiere Pass.

Limit one per attendee

If you are already a Premiere Pass holder, you can gift the prize

Winners will be notified via email within 72 hours.

Premiere Pass membership is good for one (1) year.

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Nexus 5000 & 2000 Series
Configuration & Troubleshooting

Lucien Avramov
Cisco Support Community—Ask the Expert

 Today’s featured expert is


Lucien Avramov
 Ask him questions now
about Nexus 5000 & 2000 series
switches

Lucien Avramov, CCIE


TAC Data Center Team, Cisco

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Submit Your Questions Now
Use the Submit Text box Below the speaker image.
View Answers by Clicking on the ―Refresh‖ Button.

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Win a Premiere Pass!

Each time you answer a polling question, you will have a chance to win a
Cisco Live & Networkers Virtual Premiere Pass, worth $395. The first
person to answer the question, will win a Premiere Pass.

Limit one per attendee

If you are already a Premiere Pass holder, you can gift the prize

Winners will be notified via email within 72 hours.

Premiere Pass membership is good for one (1) year.

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Agenda

 Virtual Port-Channel—vPC
 Nexus 5000: Configuration/Troubleshooting
 Nexus 2000: Configuration/Troubleshooting
 Documentation

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
vPC: Virtual Port-Channel
vPC Terminology on N5K-N2K

vPC Domain  vPC Peer: A vPC switch, one of a pair


 vPC Member Port: One of a set of ports (port
channels) that form a vPC
vPC Peer Keepalive Link vPC Peer Link
 vPC: The combined port channel between the vPC
peers and the downstream device
 vPC Peer Link: Link used to synchronize state
between vPC peer devices, must be 10GbE; also
carry multicast/broadcast/ flooding traffic and data
vPC Peer
traffic in case of vpc member port failure
 vPC Peer Keepalive Link: The peer keepalive link
between vPC peer switches;
vPC it is used to carry heartbeat packets
vPC Member Port
 CFS: Cisco Fabric Services protocol, used for state
synchronization and configuration validation
between vPC peer devices

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Virtual Port-Channel
Feature Overview

 Allow a single device to use a port channel


across two upstream switches
 Eliminate STP blocked ports
 Uses all available uplink bandwidth
Logical Topology without vPC
 Dual-homed server operate in
active-active mode
 Provide fast convergence upon
link/device failure

Logical Topology with vPC


Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Nexus 5000/2000 Designs

Not Supported

Without vPC With vPC 4.2 with 2200


Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Unicast Forwarding
First Packet from Host A to Host C
SW
1. Host A send packet to Host C;
Host A runs hash algorithm to select
5 Host C one path
N5k-1 N5k-2
2. FEX runs hash algorithm to select one
3 fabric uplink
4
3. N5k-1 learns Host A and flood packets
to VLAN members; one copy is sent to
2 switch ―SW‖; one copy for Host B and
one copy for peer link
4. N5k-2 floods the packet to VLAN
EXCEPT the vPC member ports to
prevent duplicated packets
1 5. N5k-1 updates Host A entry to N5k-2

Host A Host B
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Unicast Forwarding
Return Packet from Host C to Host A
SW 1 1. Host C reply packet to Host A;
Host C SW runs algorithm and selects the path
N5k-1 N5k-2 to N5k-2
2 1. N5k-2 searches MAC table for Host A,
which points to its local FEX port that
belongs to vPC bundle for Host A;
N5k-2 sends packets to FEX
2. FEX forwards packet to Host A based
on the internal header constructed by
3 N5k-2

Host A Host B
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
vPC Interaction with STP
 STP is deployed to prevent vPC failure
cases
N5k-1 N5k-2  Only vPC primary switch runs STP
vPC Primary vPC Secondary  vPC secondary switch forward BPDU
frames to primary
 vPC peer link is not blocked via STP
 vPC primary election based on priority

MAC_A MAC_B
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Configuration: vPC to the Server
Active/Active NIC Team
N5K-1#feature vpc
N5K-1#feature lacp
Management N5K-1(config)#vpc domain 1
N5K-1(config-vpc-domain)#peer keep-alive dest y.y.y.y
Peer Keepalive Link
vPC Domain 1
vPC Peer vPC Peer N5K-1(config)# eth 1/17-18
Switch Switch N5K-1(config-if-range)#channel-group 1 mode active
Cisco Nexus Eth1/17 Eth1/17 Cisco Nexus N5K-1(config)#int po1
5000 Series 1
Eth1/18 Eth1/18
5000 Series 2 N5K-1(config-if)#vpc peer-link
N5K-1(config-if)#switchport mode trunk

Eth1/10
N5K-1(config-if)#switchport trunk allowed vlan 1,101
Eth1/1

Eth1/8

Eth1/9

Po100 Po100 N5K-1(config)# int e1/7-8


N5K-1(config-if-range)#channel-group 100
N5K-1(config)#int po100
N5K-1(config-if)#switchport mode fex-fabric
Eth100/1/1 Eth100/1/1 N5K-1(config-if)#fex associate 100
vPC 10
N5K-1(config)# int e100/1/1
N5K-1(config-if)#channel-group 10
N5K-1(config)#int po10
N5K-1(config-if)#vpc 10
N5K-1(config-if)#switchport access vlan 101
Note: Repeat configuration on N5K-2
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Configuration: vPC to the FEX
FEX Distributed Control Plane
N5K-1#feature vpc
N5K-1#feature lacp
N5K-1(config)#vpc domain 1
Management N5K-1(config-vpc-domain)#peer keep-alive dest y.y.y.y source
x.x.x.x vrf management
Peer Keepalive Link
vPC Domain 1
vPC Peer vPC Peer N5K-1(config)# eth 1/17-18
Switch Switch N5K-1(config-if-range)#channel-group 1 mode active
Cisco Nexus Eth1/17 Eth1/17 Cisco Nexus N5K-1(config)#int po1
5000 Series 1
Eth1/18 Eth1/18
5000 Series 2 N5K-1(config-if)#vpc peer-link
N5K-1(config-if)#switchport mode trunk
N5K-1(config-if)#switchport trunk allowed vlan 1,101

N5K-1(config)# int e1/7-8


N5K-1(config-if-range)#channel-group 100
N5K-1(config)#int po100
N5K-1(config)#vpc 100
Eth100/1/1 N5K-1(config-if)#switchport mode fex-fabric
N5K-1(config-if)#fex associate 100

Note: Repeat configuration on N5K-2


Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Troubleshooting vPC
Verify vPC Peer Configuration

N5K# show vpc brief

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Troubleshooting vPC
Verify vPC Peer Configuration

N5K# show vpc peer-keepalive

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Troubleshooting vPC
Verify vPC Peer Configuration

N5K# show vpc role

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Troubleshooting vPC
Consistency

N5K# show vpc consistency-parameters global

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Troubleshooting vPC
Consistency

N5K# show vpc consistency-parameters interface port-channel FEX_PO#

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Nexus 5000: Configuration/Troubleshooting
Lucien Avramov
Connectivity
Management vrf Is the Preferred Method

Enable Telnet or Use SSH N5K#feature telnet

N5K(config)# interface mgmt 0


1. Configure mgmt0:
N5K(config-if)#ip address

Default route for the mgmt vrf


N5K(config)# vrf context management
OR N5K(config-vrf)#ip route 0.0.0.0 0.0.0.0 gw_ip

2. Configure a vlan:
N5K#feature interface-vlan
Default route for default vrf
(use with caution) N5K(config)#vlan x

N5K(config)# interface vlan x


N5K(config-if)#ip address

N5K(config)# vrf context default


N5K(config-vrf)#ip route 0.0.0.0 0.0.0.0 gw_ip

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Image Installation/Upgrade
N5K# install all kickstart <path> system <path>

 Two images: kickstart and system


 Preferred upgrade method, compared to the manual copy of the images
and update of the boot variables
 Updates the FEX Primary image, in addition to installing the switch images
 FEX is online while installation is in progress
 After installation FEX is rebooted along with the switch
 Service downtime: seven minutes; five minutes for 5k and two minutes
for FEX
 Configuration check is performed during image install
N5K# show install all impact kickstart <path> system <path>

N5K# show install all status

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Jumbo Frames
Six Times Bigger MTU Size Optimized for 10 GE Traffic

 Max MTU is 9216 for jumbo


 Enable jumbo on the servers and OS (ESX)
N5K(config)# policy-map type network-qos jumbo
N5K(config-pmap-nq)# class type network-qos class-default
N5K(config-pmap-c-nq)# mtu 9216
N5K(config-pmap-c-nq)# exit
N5K(config)# system qos
N5K(config-sys-qos)# service-policy type network-qos jumbo

 The system jumbomtu command defines the maximum MTU size for
the switch; however, jumbo MTU is only supported for system classes
that have mtu configured

N5K(config)#system jumbo mtu <2240-9216>

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Password Recovery

 Login console port


 Power cycle the switch
 During booting press Ctrl-] to get to N5K(boot)#
 4.0(0)N1(2a) or earlier, use the Ctrl-B (Ctrl+Shift+B)
 Change admin password

N5K(boot)#conf t
N5K(boot-config)#admin-password <new-password>

 Load system image

N5K(boot)#dir bootflash:
N5K(boot)#load bootflash:nx-os-system.bin

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Ethanalyzer
Packet Capture Utility Built in NX-OS for Packets to CPU

 What interface type to monitor? Inbound/management


 Display the output or save as file? Write
 Filter for a specific port and/or protocol?
 Read an existing packet capture file: Read
 Preview capture of the first 100 packets: Brief

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Ethanalyzer
Prior to 4.2 Default Is 100 Packets; After It Is 10

 What interface type to monitor?


N5K# ethanalyzer local sniff-interface [mgmt inbound-hi inbound-low]

 Save packet capture as a file?


N5K# ethanalyzer local sniff-interface mgmt write bootflash:file.pcap

 Filter for a specific port and/or protocol


N5K# ethanalyzer local sniff-interface mgmt capture-filter ―udp port 161‖
N5K# ethanalyzer local sniff-interface mgmt capture-filter ―dest host x.x.x.x‖
N5K#ethanalyzer local sniff-interface mgmt display-filter ―ip.address==x.x.x.y‖

 Read an existing packet capture file


N5K# ethanalyzer local read bootflash:file.pcap
 Preview capture of the first 100 packets
N5K# ethanalyzer local sniff-interface mgmt limit-captured-frames
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
SPAN
Switched Port Analyzer or Port Mirroring/Port Monitoring

N5K(config)#monitor session #
 Create Span session
N5K(config)#int e x/y
 Configure destination port N5K(config-if)#switchport monitor
N5K(config)#monitor session #
N5K(config-monitor)# dest int e x/y
 Configure fc destination port N5K(config)#int fc x/y
N5K(config-if)#switchport mode SD
N5K(config-if)#switchport speed 1000
N5K(config)#monitor session #
 Configure source port N5K(config-monitor)# dest fc e x/y

N5K(config-monitor)#source interface eth | fc x/y [ rx|tx|both]


N5K(config-monitor)#source [interface port-channel san-port-channel] # rx | vlan | vsan

 Activating suspending SPAN


N5K#show monitor N5K(config)# no monitor session # shut
N5K#show monitor session # N5K(config)#monitor session # shut
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
SFP Issues: Port Not Coming Up

 SFP validation failed


 Unsupported transceiver N5K#show logging

%ETHPORT-3-IF_UNSUPPORTED_TRANSCEIVER: Transceiver for interface Ethernet1/7 is not supported

 Ports 1–8 on 5010 and 1–16 on 5020 can be set to 1G


 Compatibility guide/matrix for supported SFP and wavelengths

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Temperature

 Look in logs for symptoms; example:


%SATCTRL-2-SOHMS_ENV_ERR_TEMPMINALRM: FEX-102 System minor temperature alarm on module 1.
Sensor Inlet-1 crossed minor threshold 40C

%SATCTRL-2-SOHMS_ENV_ERR_TEMPRECOVER: FEX-102 Recovered: System minor temperature alarm


on module 1. Sensor Outlet-1 crossed minor threshold 50C

 Check environment:
N5K# show environment
N5K#show environment fex all

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Crash

 Crash is usually recorded with a core file on the switch


 show version output or show system reset-reason

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Crash

 show core will display for a core file


N5K#show core

 Check logging information/syslog server look at the timestamp and


succession of events prior to reboot

N5K#show logging
 Get the core file

N5K#copy core://<module-id>/<instance-num>/<process-id> ftp: vrf management

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Nexus 2000: Configuration/Troubleshooting
Fabric EXtender: Design Scenarios

 Pinning single link/multiple uplinks


 Pinning multiple uplinks with port-channel
 VPC

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Fabric EXtender: Configuration Steps

 Define the number of uplink for FEX (valid range: 1–4)


N5K# configure terminal
N5K(config)# fex 101
N5K(config-fex)# pinning max-links 4

 Associate FEX to an Ethernet interface on N5K


N5K# configure terminal
N5K(config)# interface ethernet 1/3
N5K(config-if)# switchport mode fex-fabric
N5K(config-if)# fex associate 101

 Verifying

N5K# show interface ethernet 1/3 fex-intf

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Fabric EXtender: Verifying Configuration
Connectivity to FEX

 Fex status and configuration:


1. N5K#show fex

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Fabric EXtender: Verifying Configuration
Connectivity to FEX

2. N5K# show fex [#] detail

Fabric Ports

Pinned fabric port

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Fabric EXtender: Fabric Ports

 How to find out which port on the N5K are connected to which FEX from
a summary display

N5K# show interface fex-fabric

Serial Number
Switch port
Fex Id

Port Status

Uplink number

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
FEX Troubleshooting
FEX Not Discovered

 Power/Fans: Chassis lights


 L1: Verify cable/links
 Check transceiver N5K# show interface e1/3 transceiver fex-fabric

 Version compatibility between FEX hardware and NX-OS


 Connectivity/Single connection to 5k/different 5k
 Contact TAC
Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
FEX Troubleshooting
FEX Not Coming Online—4.2 Must Be Used for 2200s

 Flash Failure
1. Both primary image and golden images are failing to boot
2. FEX will not come online; ―show interface fex-fabric‖ will not show fabric
ports as Active
3. Locator LED will flash when FEX fails to boot
 Asic Failure
1. Upper asic goes bad; FEX will never come online
2. Lower redwood fails, FEX comes online
―show diagnostics‖ will show further details on the HW failure

3. Locator LED will flash when there is HW redwood fail: attach fex

Fex-101# show platform software redwood sts

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
FEX Troubleshooting
Identity Mismatch

%FEX-2-FEX_PORT_STATUS_CRIT: Uplink-ID 1 of Fex 100 that is connected with Ethernet1/19 changed


its status from Fabric Up to Identity-Mismatch

 Misconfiguration between both Nexus 5000s


 Not proper cabling between FEX and Nexus 5000s

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Performance Issues: 5000/2000

 Slow traffic? Traffic loss? Application not performing as expected?


Proper design?
 Nexus 5000
Identify drops N5k# show platform fwm info pif ethernet 1/1

N5k# show hard internal gatos port e1/1 | include instance | mac
Expected / Logical drops
N5k# show platform fwm info gatos-error #
Queue is full N5k# show queuing interface e1/1
 Nexus 2148 / FEX
N5K#attach fex 101
Fex-101# show platform software redwood sts

Fex-101# show platform software redwood drops

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Documentation: Nexus 5000
www.cisco.com/go/nexus5000
 Product Page
http://www.cisco.com/en/US/products/ps9670/tsd_products_support_series_home.html
 Configuration Guides
http://www.cisco.com/en/US/products/ps9670/products_installation_and_configuration_guides_l
ist.html
 Release Notes
http://www.cisco.com/en/US/products/ps9670/prod_release_notes_list.html
 Installation/Hardware Guides
http://www.cisco.com/en/US/products/ps9670/prod_installation_guides_list.html

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Documentation: Nexus 2000—FEX
www.cisco.com/go/nexus2000

 Product Page
http://www.cisco.com/en/US/products/ps10110/tsd_products_support_series_home.html
 Release Notes
http://www.cisco.com/en/US/products/ps10110/prod_release_notes_list.html
 Configuration Guide
http://www.cisco.com/en/US/products/ps10110/products_installation_and_configuration_guides
_list.html
 Hardware Guide
http://www.cisco.com/en/US/products/ps10110/prod_installation_guides_list.html

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Documentation

 Password Recovery
http://www.cisco.com/en/US/docs/switches/datacenter/sw/password_recovery/nx_os_pw.html
 Ethanalyzer
http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/guide/cli_re
l_4_0_1a/tsf.html#wp1219544
 SPAN
http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/nxos/Cisco
_Nexus_5000_Series_NX-
OS_Software_Configuration_Guide_chapter51.html#topic_64BF925367764DFC9D100CF26D
805D22
http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/configuration/nxos/Cisco
_Nexus_5000_Series_NX-OS_Software_Configuration_Guide_chapter51.html

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Documentation: vPC

 vPC Configuration Guide


http://www.cisco.com/en/US/docs/switches/datacenter/nexus5000/sw/layer2/421_n1_1/Cisco_n5k_layer2_
config_gd_rel_421_n1_1_chapter8.html

 vPC Quick Start Guide (FEX)


http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/configuration_guide_c07-543563.html

 vPC White Paper


http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9402/white_paper_c11-516396.html

 vPC and VSS Interoperability White Paper


http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/white_paper_c11_589890.html

 vPC Design Guidelines Paper


http://www.cisco.com/en/US/products/ps9670/products_implementation_design_guides_list.html

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
We Appreciate Your Feedback!

The first 10 listeners


who fill out an Evaluation
will receive a free:
$20 USD
Amazon Gift Certificate

To complete the evaluation, please click on Evaluation


button under the slides.

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Q&A

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Post Questions on Our Forum Here:
https://supportforums.cisco.com/community/netpro/ask-the-expert
Join us for our next ―Ask The Expert‖ webinar!

Topic: T.38 Fax over IP Design Best Practices


November 18th, 10am PT

Register at:
http://www.ciscolive.com/ate
Join us for our premiere TechWise TV Episode & Technology Workshop

Topic: Beyond the Virtualized Data Center


October 14, 10-11 a.m. Pacific Time
Learn how the newest data center and virtualization innovations can maximize the benefits of
virtualization across your entire network, strengthen security, and simplify management.
And join us October 27th for a deeper dive into the Virtualized Data Center with an Interactive Technology
Workshop featuring live Q&A.
Cisco Live and Networkers Virtual Premier Pass:
Full Access for $395 USD or 5 Cisco Learning Credits
In addition to the benefits of the above pass the Premier pass will give you a wider array of technical
programming including hundreds of technical sessions in the Session Catalog. Register today for your
Cisco Live and Networkers Virtual Premier pass and start experiencing the power of knowledge for
yourself.

Cisco Live and Networkers Virtual "A La Carte" Pass:


Purchase individual sessions for $45 USD
In addition to the benefits of the free pass, you can purchase individual sessions selected from the
hundreds of technical sessions available in the Session Catalog. Register and start experiencing the
power of knowledge for yourself.
Join The Industry’s Best Education and Training for Network and
IT Professionals In Person and Online in 2011

London January 31 – February 3


Melbourne March 29 – April 1
Bahrain April 10 –13

Las Vegas July 10 - 14

Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Thank You for Your Time
Please Take a Moment to Complete the Evaluation

You might also like