HP Virtual Connect for the Cisco Network Administrator

HP Virtual Connect for Cisco Network Administrators (version 4.x)
Document Number: C01386629 Date: January 2014
page 40
A server reverts to the factory-default MAC address when removed from the enclosure or
when no VC Server Profile is applied to
it.
VC generates 2 MAC addresses per NIC port in order to support multi-function adapters
that may require more than one MAC address per port.
Customers requiring a centralized database for managing the VC managed MAC
address pools should consider implementing Virtual Connect Enterprise Manager. See
www.hp.com/go/vcem for more details.
Spanning Tree
Since Virtual Connect does not present itself to the external Cisco network as another Ethernet
switch”, the subject of spanning tree interoperability is not an applicable topic when discussing
the two products. In other words, in the same way that a server (with multiple NICs) does not need
to be configured for spanning tree, Virtual Connect (with multiple uplinks that look like NICs to
the external Cisco network) does not need to be configured for spanning tree either. This means
that the network administrator does not have to worry about STP interoperability issues between VC
and Cisco since VC uplink ports do not transmit or receive STP BPDUs (Spanning Tree
configuration frames) and cannot interfere with the external switched infrastructure’s
implementation of STP any more than a multihomed server can. This also means that all questions
about PVST+ support, Rapid Spanning Tree, MST, etc. are not applicable for Virtual Connect
deployment discussions.
Since VC uplink ports simply look to the network like “regular old server ports” with multiple
MAC addresses, HP recommends that Cisco downlink ports connected to the VC uplink ports be
configured as if they are connected directly to server NIC ports. In other words, configure the Cisco
downlink ports as access or trunk ports with PortFast enabled. Enabling BPDUGuard is also
an acceptable option for customers that regularly enable it for other Cisco switch ports
connected directly to server ports. In summary, since Virtual Connect allows the c-Class enclosure
to connect to the external network in much the same way as a VMware ESX server connects to
the external network, it is easy to understand why Virtual Connect, just like a VMware ESX
server, does not participate in the external network’s spanning tree domain.
Unidirectional Link Detection (UDLD)
UDLD is a Cisco proprietary feature that only operates between two directly connected Cisco
devices. The purpose of UDLD is to detect unidirectional links (UniDirectional Link Detection)
in situations where spanning tree is being used to detect and prevent loops. If a unidirectional
link goes undetected, spanning tree wont properly detect the loop and wont block the port to
prevent a loop on the network. Since spanning tree is not used between VC uplinks and external
Cisco switches, a spanning tree loop caused by a unidirectional link is not possible. Therefore,
UDLD is not required nor supported on Virtual Connect uplinks.
Quality of Service
In the current version of firmware, Virtual Connect does support user-configurable settings for
traffic classification, marking, or prioritization. VC does utilize layer 2 quality of service
markings (802.1p Class of Service) and layer 3 quality of service markings (TOS, DSCP) for
frame prioritization. There are three modes of operation, 1. No QOS First in First out. 2. Honoring
mode, VC will honor the markings already made