IBM Flex System and Pureflex System Network Implementation

Total Page:16

File Type:pdf, Size:1020Kb

IBM Flex System and Pureflex System Network Implementation Front cover IBM Flex System and PureFlex System Network Implementation Learn how to implement the IBM Flex System and PureFlex System Understand the design and architecture Learn troubleshooting techniques Jon Tate Jure Arzensek David Cain Ken Corkins William King Gaston Sancassano Rodriguez Tiago Nunes dos Santos ibm.com/redbooks International Technical Support Organization IBM Flex System and PureFlex System Network Implementation July 2013 SG24-8089-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (July 2013) This edition applies to the IBM PureFlex System software and hardware available in September 2012. This may, or may not, include pre-GA code. © Copyright International Business Machines Corporation 2013. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix Authors. ix Now you can become a published author, too! . xi Comments welcome. xi Stay connected to IBM Redbooks . xii Chapter 1. Introduction to IBM PureFlex System Networking . 1 1.1 Introduction to IBM PureSystems . 2 1.1.1 IBM Flex System Enterprise Chassis . 2 1.2 IBM Flex System Networking product family. 3 1.2.1 IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switch . 4 1.2.2 IBM Flex System EN4091 10Gb Ethernet Pass-thru Module . 5 1.2.3 IBM Flex System EN2092 1Gb Ethernet Scalable Switch . 6 1.2.4 I/O modules and cables . 8 1.3 IBM Flex System Ethernet adapters . 9 1.3.1 IBM Flex System CN4054 10Gb Virtual Fabric Adapter . 9 1.3.2 IBM Flex System EN4054 4-port 10Gb Ethernet Adapter. 10 1.3.3 IBM Flex System EN2024 4-port 1Gb Ethernet Adapter. 11 1.3.4 IBM Flex System EN4132 2-port 10Gb Ethernet Adapter. 11 1.4 IBM Networking Operating System . 12 1.4.1 Command-line interface . 13 1.4.2 Browser-Based Interface . 13 Chapter 2. Data center design and architecture. 15 2.1 Open Data Center Interoperable Network. 17 2.2 VMready . 18 2.2.1 VMready benefits . 20 2.2.2 VMready compatibility. 20 2.2.3 VMready references . 20 2.3 IBM Flex System data center high availability components . 21 2.3.1 The Ethernet switch I/O module . 21 2.3.2 Virtual local area networks . 22 2.3.3 Scalability and performance . 23 2.3.4 Link aggregation . 25 2.3.5 Layer 2 failover . 27 2.3.6 NIC teaming . 28 2.4 Fibre Channel over Ethernet solution capabilities. 29 2.4.1 FCoE references. 30 2.5 Virtual Fabric vNIC solution capabilities . 30 2.5.1 Virtual Fabric mode vNIC . 31 2.5.2 Switch-independent mode vNIC . 32 2.5.3 Virtual Fabric references. 32 2.6 High availability use cases . 33 2.6.1 Highly available topologies . 34 2.7 Practical Use Case 1: Fully redundant with virtualized chassis technology (VSS/vPC/VLAG) . 38 © Copyright IBM Corp. 2013. All rights reserved. iii 2.8 Other use cases . 40 2.8.1 Practical Use Case 2: Fully redundant with traditional Spanning Tree . 40 2.8.2 Practical Use Case 3: Fully redundant with Open Shortest Path First . 40 2.9 Summary and conclusions . 41 Chapter 3. Planning and hardware selection . 43 3.1 Hardware selection and interoperability . 44 3.1.1 Selecting the Ethernet switch module. 44 3.1.2 Selecting the compute node NICs . 45 3.1.3 Interoperability considerations . 46 3.2 Virtual local area networks . 46 3.3 Scalability and performance . 47 3.4 High availability . 49 3.4.1 Examples of topologies. 50 3.4.2 Spanning Tree . 53 3.4.3 Link aggregation . 54 3.4.4 Network interface card teaming . 55 3.4.5 Trunk failover . 56 3.4.6 Virtual Router Redundancy Protocol. 58 3.5 Virtual Fabric vNIC solution capabilities . 59 3.5.1 Virtual Fabric mode vNIC . 60 3.5.2 Switch-independent mode vNIC . 61 3.6 Management . 61 3.6.1 Management tools and their capabilities. 62 Chapter 4. Initial configuration . 65 4.1 Initial hardware installation . 66 4.1.1 Installing a switch . 67 4.2 Initial Software Configuration . 69 4.2.1 Administration interfaces. 69 4.2.2 First boot of the IBM Flex System Ethernet I/O modules . 71 4.2.3 Connecting to the switch. ..
Recommended publications
  • Etherchannel & Highly Available Cluster Multiprocessing (HACMP) in AIX V5.2
    EtherChannel & Highly Available Cluster Multiprocessing (HACMP) in AIX V5.2 How-to and Test Experiences Abstract: This document gives tips and a working example of how to a Highly Available Cluster Multiprocessing (HACMP) user could implement EtherChannel with HACMP. Support for this combination was announced in May, 2004. Authors: Shawn Bodily (HACMP) and Cindy Young (EtherChannel) of IBM pSeries Advanced Technical Support and Michael Herrera (HACMP) of IBM pSeries AIX Support Introduction IBM AIX pSeries administrators have expressed interest in combining these components for several reasons. Those accustomed to other software availability solutions object to HACMP’s additional “standby” adapter. With EtherChannel, HACMP setups could mask the standby adapter giving an outward appearance familiar to these users. Other users like the aggregated bandwidth, load balancing, or high availability benefits of EtherChannel. The result is a lower cost, high performance network that is also popular as a high speed private (non-switch) interconnect between machines. In this test, we successfully implemented a “single adapter network” HACMP IP Address Takeover (IPAT) with the EtherChannel function included in AIX V 5.2. The EtherChannel was responsible for providing local adapter swapping – outside of HACMP. HACMP has no knowledge of EtherChannel and is completely independent. While a single adapter network is normally not ideal, EtherChannel makes this okay because there are multiple physical adapters within the single EtherChannel pseudo device. Thus, we could safely ignore the insufficient adapter warning messages posted during cluster synchronization. Our configuration consisted of a rotating resource group with a single adapter network using IP aliasing. Our testing proved to be beneficial in simplifying the HACMP setup.
    [Show full text]
  • Etherchannel Configuration Guide, Cisco IOS XE 17 (Cisco NCS 520 Series)
    EtherChannel Configuration Guide, Cisco IOS XE 17 (Cisco NCS 520 Series) First Published: 2019-11-26 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Symbols Numerics A
    I N D E X GLOP, 484–485 Symbols IP multicast, 480 limited-scope, 484 ! (exclamation point) character, 105 MAC address notification, 317–318 # (pound sign) character, 105 NAT, 649 reserved link local, 483–484 Numerics source-specific multicast, 484 virtual MAC, 573 10-Gigabit, 54 adjacencies, 393–394, 408 10-Mbps Ethernet, 48 ADSL (asymmetric digital subscriber line), 56 802.1D, compatibility with RSTP, 230 agents, relay (DHCP), 379 802.1Q, 156–158 aggregate policers, 448 802.1X Aggressive mode UDLD (A-UDLD), 336–338, 604 configuration exercise, 663–669 configuration exercises, 354 network access security, 639–641 versus Loop Guard, 272 AppleTalk Remote, 624 applications A Auto QoS, 463 Cisco AVVID, 16 AAA statistics, 291 accounting, 625, 629 voice, 596 authentication, 173, 623–626 Application-Specific Integrated Circuits. See ASICs authorization, 624, 627 applying RACLs, 643 configuration exercise, 663–669 Architecture for Voice, Video and integrated Data. configuring, 630–631 See Cisco AVVID aaa authentication login command, 626 ARP (Address Resolution Protocol), 12 aaa new-model command, 87, 626 DAI, 654–658 access as a security feature, 658–659 firewalls, 647–648 throttling, 396–398 hopping attacks (VLAN), 660–661 ASICs (Application-Specific Integrated Circuits), physical, 619 5–6, 275 unauthorized, 77 assured forwarding, 431–432 access control lists. See ACLs asymmetric digital subscriber line (ADSL), 56 access layer, 18 attacks, 655, 660–661 access-layer switches, 50 attenuation, 720 accounting, 625, 629 A-UDLD (Aggressive mode UDLD), ACLs (access control lists), 4, 618, 643 336–338, 604 PACLs, 646 configuration exercises, 354 RACLs, 643 versus Loop Guard, 272 security, 642 authentication, 173, 623–626 VACLs, 644 authorization, 624, 627 vty lines, 619 auth-proxy, 627 active keyword, 513 Auto QoS, 463 adding switches, 186 auto-negotiation, 53, 767 Address Resolution Protocol.
    [Show full text]
  • S83G 7789 08.Pdf
    IBM Personal Computer 300/700 Series HMM Book Cover COVER Book Cover -------------------------------------------------------------------------- IBM Personal Computer 300 Series (Type 65XX) 700 Series (Type 68XX) Hardware Maintenance Manual February 1997 We Want Your Comments! (Please see page 2.33) Document Number S83G-7789-08 Part Number 84H7174 -------------------------------------------------------------------------- +--- Note ---------------------------------------------------------------+ ¦ ¦ ¦ Before using this information and the product it supports, be sure to ¦ ¦ read the general information under "Notices" in topic 2.36 . ¦ ¦ ¦ +------------------------------------------------------------------------+ Ninth Edition (February 1997) The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time. It is possible that this publication may contain reference to, or information about, IBM products (machines and programs), programming, or services that are not announced in your country. Such references or information must not be construed to mean that IBM intends to announce such IBM products, programming, or services in your country. Requests for technical information about IBM products should be made to your IBM reseller or IBM marketing representative.
    [Show full text]
  • Cisco NX-OS Software Virtual Portchannel: Fundamental Concepts
    Chapter 3: Cisco NX-OS Software Virtual PortChannel: Fundamental Concepts © 2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Design Guide Contents Virtual PortChannel Technology ................................................................................................................................3 vPC Topologies.........................................................................................................................................................3 Virtual PortChannel Components..............................................................................................................................5 Traffic Flows..............................................................................................................................................................6 Dual-Control Plane with Single Layer 2 Node Behavior............................................................................................7 The Link Aggregation Group Identifier..................................................................................................................7 System ID in a vPC System .................................................................................................................................9 Primary and Secondary vPC Roles ......................................................................................................................9 Spanning Tree....................................................................................................................................................10
    [Show full text]
  • Application Notes
    A Sample Configuration with Design Guidelines for Link Aggregation Between Avaya™ P580/P882 Gigabit Ethernet Switch Hunt Groups and Cisco EtherChannel - Issue 1.0 Abstract These Application Notes describe a sample Hunt Group/EtherChannel Link Aggregation Group (LAG) configuration between an Avaya™ P882 Gigabit Ethernet switch and a Cisco Catalyst 6509 switch. Design guidelines for deploying LAG in a mixed Avaya/Cisco infrastructure are included as an aid for network designers. A sample configuration diagram has been included along with provisioning notes. These Application Notes were created as a result of field requests for information on interoperability between Avaya P580/P882 Hunt group trunks and Cisco EtherChannel. GAK; Reviewed: Solution & Interoperability Test Lab Application Notes 1 of 15 WCH 7/18/2003 ©2003 Avaya Inc. All Rights Reserved. cislaginterop.doc 1. Introduction The Avaya™ P580/P882 Gigabit Ethernet Switch Hunt Group feature aggregates multiple switch ports together, combining the bandwidth into a single connection. This feature is normally deployed between switches to provide added bandwidth and fault tolerance. If one segment in a hunt group fails, the remaining active members will service the traffic for that segment. The Hunt Group Load-Sharing feature (enabled by default) distributes traffic load among the hunt group members for improved throughput performance. Hunt group member ports can be configured using various trunk modes including IEEE 802.1Q, Multi-layer, 3Com and Clear. Hunt group ports may also be assigned a router IP interface for layer 3 forwarding. The Avaya™ Hunt Group feature is a manual (or static) implementation of link aggregation. This means the feature does not support dynamic LAG configuration or binding via some standard or proprietary protocol.
    [Show full text]
  • Business Partner Guide
    EIGHTH EDITION CLICK HERE for Updates IBM Power Systems Business Partner Guide Your Roadmap to Success with IBM Power Systems Edited by Jim Hoskins 1 OTHER IBM BUSINESS PARTNER GUIDES IBM PureSystems IBM PureSystems Business Partner Business Partner Guide Guide, Mobile Edition for iPhone/iPad Jim Hoskins free download Jim Hoskins ebook (PDF) free download ebook (PDF) IBM Storage Business Partner Guide Jim Hoskins IBM Storage Business Partner free download Guide, Mobile ebook (PDF) Edition for iPhone/iPad Jim Hoskins free download FEBRUARY 2014 CLICK HERE IBM Smarter for ebook (PDF) IBM Smarter Updates Workforce Workforce Business Partner Business Partner Guide Guide A Seller’s Roadmap to Success Jim Hoskins free download ebook (PDF) This report was sponsored by IBM. This report utilized information provided by IBM and other companies including publicly available data. This report represents Maximum Press’s viewpoint and does not necessarily represent IBM’s position on these issues. 1 For more information email us at [email protected] 2 Notices Acknowledgments specifications and capabilities of computer hardware and software products are subject to frequent modification. This publication is designed to provide accurate and Many people gave assistance in preparation of this The reader is solely responsible for the choice of computer authoritative information in regard to the subject matter guidebook. Some provided information concerning their hardware and software. All configurations and applications covered. It is offered with the understanding that the pub- product area of expertise. Others acted as reviewers and of computer hardware and software should be reviewed lisher is not engaged in rendering professional services.
    [Show full text]
  • It's Who You Know
    CDW.com/ibm CDW.com/datacenter | 800.800.4239 IT’S WHO YOU KNOW: CDW + IBM DATA CENTER WHEN IT COMES TO THE DATA CENTER, IT’S NOT JUST WHAT YOU KNOW. IT’S WHO YOU KNOW. Th at’s why we partner with leading vendors like IBM. Th eir advanced technologies and customized implementation services help transform any data center into a lean, mean, integrated and fl exible machine. And as a leading IBM Premier Business Partner, we have the experts and experience to help you do it. Together, we can help you lay the foundation for a more effi cient, agile data center that is primed for the future. IBM GETS DATA CENTERS. IBM BUSINESS ANALYTICS IBM PURESYSTEMS IBM FLEX SYSTEM V7000 IBM Business Analytics Software is at the core Built on decades of experience, this integrated STORAGE NODE of IBM’s revolutionary data center off ering. system delivers resource fl exibility, data A groundbreaking, virtualized storage Using software, services and best practices, center scalability and reduced data center system that consolidates block and fi le it leverages the power of analytics to deliver management burdens. storage into a single system. It off ers smart insights, increase operational effi ciency • IBM PureFlex™ System: A converged scalability, high availability and ease of and improve performance management. infrastructure solution that combines computing, management. To improve efficiency, • IBM® Cognos®: Th is cutting-edge business storage, networking and virtualization capabilities fl exibility and deployment speed, it features: intelligence and performance management into a single, unifi ed management console. • Built-in fl ash storage optimization software provides integrated dashboards, • IBM Flex System: This system integrates • Th in-provisioning scorecards, reporting and analysis to transform components to create a foundation for • Nondisruptive storage migration how your organization makes decisions.
    [Show full text]
  • Chapter 2 Lab 2-2, Configuring Etherchannel
    CCNPv6 SWITCH Chapter 2 Lab 2-2, Configuring EtherChannel Topology Objective • Configure EtherChannel. Background Four switches have just been installed. The distribution layer switches are Catalyst 3560 switches, and the access layer switches are Catalyst 2960 switches. There are redundant uplinks between the access layer and distribution layer. Usually, only one of these links could be used; otherwise, a bridging loop might occur. However, using only one link utilizes only half of the available bandwidth. EtherChannel allows up to eight redundant links to be bundled together into one logical link. In this lab, you configure Port Aggregation Protocol (PAgP), a Cisco EtherChannel protocol, and Link Aggregation Control Protocol (LACP), an IEEE 802.3ad open standard version of EtherChannel. Note: This lab uses Cisco WS-C2960-24TT-L switches with the Cisco IOS image c2960-lanbasek9-mz.122- 46.SE.bin, and Catalyst 3560-24PS with the Cisco IOS image c3560-advipservicesk9-mz.122-46.SE.bin. You can use other switches (such as a 2950 or 3550) and Cisco IOS Software versions if they have comparable capabilities and features. Depending on the switch model and Cisco IOS Software version, the commands available and output produced might vary from what is shown in this lab. Required Resources • 2 switches (Cisco 2960 with the Cisco IOS Release 12.2(46)SE C2960-LANBASEK9-M image or comparable) • 2 switches (Cisco 3560 with the Cisco IOS Release 12.2(46)SE C3560- ADVIPSERVICESK9-M image or comparable) All contents are Copyright © 1992–2010 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
    [Show full text]
  • Chapter 4: Etherchannel and HSRP
    Chapter 4: EtherChannel and HSRP CCNA Routing and Switching Scaling Networks Chapter 4 - Sections & Objectives . 4.1 Link Aggregation Concepts • Explain link aggregation operation in a switched LAN environment. • Describe link aggregation. • Describe EtherChannel technology. 4.2 Link Aggregation Configuration • Implement link aggregation to improve performance on high-traffic switch links. • Configure link aggregation. • Troubleshoot a link aggregation implementation. 4.3 First Hop Redundancy Protocols • Implement HSRP • Explain the purpose and operation of first hop redundancy protocols. • Explain how HSRP operates. • Configure HSRP using Cisco IOS commands. • Troubleshoot HSRP. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 4.1 Link Aggregation Concepts © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Link Aggregation Introduction to Link Aggregation . It is possible to combine the number of physical links between switches to increase the overall speed of switch-to-switch communication. • STP will block redundant links to prevent routing loops. Redundant Links with STP (by default blocked) © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Link Aggregation Advantages of EtherChannel . Most configuration tasks can be done on the EtherChannel interface instead of on each individual port. EtherChannel relies on existing switch ports. Load balancing takes place between links that are part of the same EtherChannel. EtherChannel creates an aggregation that is seen as one logical link. EtherChannel provides redundancy because the overall link is seen as one logical connection. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 EtherChannel Operation Implementation Restrictions . EtherChannel groups multiple physical ports into one or more logical EtherChannel links.
    [Show full text]
  • IBM Puredata System for Analytics Architecture a Platform for High Performance Data Warehousing and Analytics
    Front cover IBM PureData System for Analytics Architecture A Platform for High Performance Data Warehousing and Analytics Redguides for Business Leaders Phil Francisco Take advantage of the power and simplicity of a purpose-built appliance for high speed metrics Improve the quality and timeliness of business intelligence Query data quickly, efficiently, and economically Executive overview Success in any enterprise depends on having the best available information in time to make sound decisions. Anything less can waste opportunities, cost time and resources, and even put the organization at risk. But finding crucial information to guide the best possible actions can mean analyzing billions of data points and petabytes of data, whether to predict an outcome, identify a trend, or chart the best course through a sea of ambiguity. Companies with this type of intelligence on demand can react faster and make better decisions than their competitors. Continuing innovations in analytics provide companies with an intelligence windfall that benefits all areas of the business. When you need critical information urgently, the platform that delivers this information should be the last thing on your mind. The platform needs to be as simple, reliable, and immediate as a light switch, able to handle almost incomprehensible workloads without complexity getting in the way. It must be built for longevity, with a technology foundation that can sustain performance as more users run increasingly complex workloads and as data volumes continue to grow. Furthermore, to maximize returns to the business, it needs the lowest total cost of ownership. The IBM® PureData® System for Analytics, powered by Netezza® technology, transforms the data warehouse and analytics landscape with a platform that is built to deliver price-performance with appliance simplicity.
    [Show full text]
  • A Deep Dive Into the Cost Benefits of KVM and Open Virtualization
    LinuxCon North America August 2012 A Deep Dive Into The Cost Benefits of KVM and Open Virtualization David Hsu Program Director IBM Linux and Open Virtualization © 2012 IBM Corporation Why KVM? An Open Alternative Most recent step in the evolution of x86 virtualization technology An open source alternative to other hypervisors for both Windows and Linux workloads A Smarter Choice Lower total cost of ownership compared to other providers Enterprise-class performance, scalability and security Technical leadership and business agility through open source development community Open : avoids vendor lock-in Ecosystem of Virtualization Management tools and ISV applications 2 © 2012 IBM Corporation How to get KVM As part of a Linux distribution Full Linux including virtualization Virtual Virtual Available as Machine Machine Red Hat Enterprise Linux Linux Windows RHEL 5.4 and above Applications Applications SUSE Linux Enterprise Server SLES 11 SP1 and above Linux Windows Guest OS Guest OS Canonical Ubuntu Linux Ubuntu 10.04 LTS and above Applications Linux As a standalone hypervisor KVM Optimized, stripped-down hypervisor Available as x86 platform Red Hat Enterprise Virtualization – Hypervisor RHEV-H 2.2 and above 3 © 2012 IBM Corporation IBM and KVM IBM Products Supporting KVM IBM PureSystems PureFlex and PureApplication Systems support KVM, delivering hypervisor choice and flexibility in next generation integrated systems IBM Software Group Portfolio KVM is a tier 1 virtualization technology for SWG with majority of SWG products supporting KVM today. Tivoli system management solutions manage KVM IBM SmartCloud Enterprise Agile cloud computing infrastructure as a service (IaaS) designed to provide rapid access to security-rich, enterprise-class virtual server environments, well suited for + development and test activities and other dynamic workloads uses KVM.
    [Show full text]