Example: Configuring Network Director 1.6 for MetaFabric Architecture 1.1
This example shows how to configure Network
Director 1.6 for MetaFabric Architecture 1.1. For more details on
the MetaFabric architecture, see the MetaFabric™ Architecture Virtualized Data Center Design and
Implementation Guide
Requirements
This example uses the following hardware and software components:
Four QFX5100-24Q switches used as the spine layer in the mixed-mode VCF
Two QFX5100-24Q switches used in the leaf layer in the mixed-mode VCF
Four QFX5100-48S switches used in the leaf layer in the mixed-mode VCF
Two EX4300 switches used in the leaf layer in the mixed-mode VCF
Junos OS Release 13.2X51-D25 or later for all EX Series and QFX Series switches in the mixed-mode VCF
Network Director 1.6 for VCF orchestration
Overview and Topology
MetaFabric Architecture 1.1 continues to provide the proper foundation for a virtualized environment that supports virtual machine movement (VMware), robust application hosting (IBM), load balancing (F5), storage (EMC), and security (Firefly Host and SRX3600 devices). However, this evolved architecture now introduces Virtual Chassis Fabric as a next-generation fabric technology and Network Director 1.6 for orchestration and dynamic configuration.
In this example, Network Director 1.6 is used to provide orchestration services for a Virtual Chassis Fabric (VCF). The VCF replaces the core switches and QFabric systems seen in the original MetaFabric Architecture 1.0 solution. As a result, the VCF connects directly to servers, storage, and load balancers on the access side (also known as the leaf layer in a VCF), and SRX security devices on the core network side (also known as the spine layer in a VCF). Figure 1 shows the topology used in this example.

Network Director 1.6 can provision the Virtual Chassis Fabric, and use orchestration services to update the VCF configuration dynamically as virtual machines move between servers. The VCF used in this example is a mixed-mode fabric that implements four QFX5100-24Q switches in the spine layer. The leaf layer uses two QFX5100-24Q switches, four QFX5100-48S switches, and two EX4300 switches for a total of eight leaf layer devices. All server and storage destinations are a maximum of two hops from each other to keep latency to a minimum and application performance to a maximum.
Configuring Network Director 1.6 for MetaFabric Architecture 1.1
This section explains how to provision devices in a Virtual Chassis Fabric and enable orchestration services.
It includes the following sections:
Using Network Director 1.6 to Provision Devices into a Virtual Chassis Fabric
Using Network Director 1.6 and Junos Space to Verify Virtual Chassis Fabric Operations
Using Network Director 1.6 to Configure Orchestration for a Virtual Chassis Fabric
Using Network Director 1.6 to Provision Devices into a Virtual Chassis Fabric
GUI Step-by-Step Procedure
Do not use this procedure if you have already provisioned your Virtual Chassis Fabric with the preprovisioning method shown in Example: Configuring a Virtual Chassis Fabric for MetaFabric Architecture 1.1.
Network Director 1.6 enables you to autoprovision a Virtual Chassis Fabric. If you configure the serial number and role for each spine layer device, you can connect factory-default leaf devices to the spine devices and have these leaf devices automatically join the VCF. Using autoprovisioning enables you to get your VCF up and running quickly so you can offer new services to your customers more rapidly.
To use Network Director 1.6 to autoprovision the Virtual Chassis Fabric:
In Network Director, navigate to Views > Logical View > Device Management > Setup Virtual Chassis Fabric as shown in Figure 2. For the Select Provisioning Method step, click the Auto Provision radio button, check the Provision VCF in Mixed Mode box when using more than one device model in your VCF, and click the Next button:
Figure 2: Network Director 1.6 — VCF Autoprovisioning For the Add Devices step, click the Add Spines button, as shown in Figure 3:
Figure 3: Network Director 1.6 — Add Spine Devices to the VCF As shown in Figure 4, click the New Devices button in the Add Device as Spine Node(s) box, and add the serial numbers and Routing Engine role for the four QFX5100 switches that you want to act as the spine layer:
Figure 4: Network Director 1.6 — Specify the Serial Number and Role for VCF Spine Devices Connect the factory-default leaf devices to the 40-Gigabit Ethernet VCP ports of the four spine members by using fiber optic cables. The leaf devices will automatically sense their addition to the VCF, receive a configuration from the master VCF member, reboot, and join the VCF.
Using Network Director 1.6 and Junos Space to Verify Virtual Chassis Fabric Operations
Verifying VCF Operations with Network Director 1.6 and Junos Space
Purpose
Use the verification tools in Network Director 1.6 and Junos Space to ensure that your VCF is working correctly.
Action
In Network Director, navigate to Views > Logical View > Device Management > Manage Virtual Chassis Fabric to verify VCF members, as shown in Figure 5:
Figure 5: Network Director 1.6 — Verifying VCF Membership In Junos Space, navigate to Applications > Network Management Platform > Audit Logs > Audit Log to verify all login events and configuration changes in the audit trail, as shown in Figure 6:
Figure 6: Junos Space — Verifying Login Events and Configuration Changes In Network Director, navigate to Views > Logical View and Task Categories > Monitor > Summary to view alarms for VCF members, as shown in Figure 7:
Figure 7: Network Director 1.6 — Verifying VCF Alarms In Network Director, navigate to Views > Logical View and Task Categories > Monitor > Fabric Analysis to view a fabric health check for connections between members in the VCF, as shown in Figure 8:
Figure 8: Network Director 1.6 — Verifying Fabric Health In Network Director, navigate to Views > Logical View and Task Categories > Monitor > Equipment to verify CPU memory utilization and status of the VCF, as shown in Figure 9:
Figure 9: Network Director 1.6 — Verifying VCF Status and CPU Memory Utilization
Using Network Director 1.6 to Configure Orchestration for a Virtual Chassis Fabric
GUI Step-by-Step Procedure
A data center network that contains a significant number of virtual machines (VMs) can be challenging to maintain. Either the administrator needs to change the configuration for access devices manually (which requires additional monitoring and configuration revisions) or enter a generic configuration that allows all VLANs on all ports (which decreases security for the network).
To alleviate this situation, Network Director 1.6 enables you to dynamically change the configuration of a Virtual Chassis Fabric as VMs migrate to new servers. Orchestration tracks VM movement automatically and updates the configuration to reflect the new location of the VM. The result is real-time configuration management that adapts VCF devices to network conditions and configures the correct VLANs on the applicable ports so that VM and application traffic can continue flowing to end users without administrator intervention.
To use Network Director 1.6 to perform orchestration services on the Virtual Chassis Fabric:
Discover the vCenter network through Virtual View in Network Director. Navigate to Views > Virtual View > Virtual Networks Management > Discover Virtual Networks and enter the vCenter IP address and hostname as shown in Figure 10:
Figure 10: Network Director 1.6 — Entering the vCenter IP Address and Hostname Enter your username and password as shown in Figure 11:
Figure 11: Network Director 1.6 — Logging In to vCenter Discover the virtual network by completing the steps in the wizard, as shown in Figure 12:
Figure 12: Network Director 1.6 — Discovering the Virtual Network Navigate to Views > Virtual View > Virtual Networks Management > View Discovery Status to verify the discovery of the virtual network, as shown in Figure 13:
Figure 13: Network Director 1.6 — Verifying Network Discovery Navigate to Views > Virtual View > Connectivity > Manage NIC Associations to verify that LLDP is configured on the VMware dvSwitches, as shown in Figure 14:
Note If LLDP is not running, use vCenter WebGUI 5.1 to configure LLDP. For more information about vCenter WebGUI 5.1, see the MetaFabric™ Architecture Virtualized Data Center Design and Implementation Guide
Figure 14: Network Director 1.6 — Verifying LLDP on the dvSwitches Navigate to Views > Virtual View > Virtual Networks Management > Manage Virtual Networks, click the network you want to orchestrate, and click Configure Orchestration to start orchestration services, as shown in Figure 15:
Figure 15: Network Director 1.6 — Configuring Orchestration Select the Enable Orchestration radio button in the popup window and click the OK button, as shown in Figure 16:
Figure 16: Network Director 1.6 — Enabling Orchestration When you see the successful status box appear (as shown in Figure 17), click the OK button. The orchestration services are now operating:
Figure 17: Network Director 1.6 — Orchestration Enabled Successfully After orchestration services are operational, Network Director scans the virtual network. Based on the current network topology, Network Director creates a Junos® operating system group configuration for the VCF that maps the ports and VLANs of the VCF to the corresponding VMs and servers that access the VCF. After creating the configuration, Network Director sends the configuration to the VCF and performs a commit operation.
From this point forward, Network Director monitors VMotion. If a VM moves to a different server that accesses the VCF on a different port than the one contained in the configuration, Network Director changes the group configuration, sends it to the VCF, and performs another commit operation to update the port and VLAN mappings as needed. The following is an example of a group configuration created by Network Director orchestration services:
Note The process to create the group configuration and push it to the VCF takes awhile, and the completion time varies depending on how many servers and VMs exist in the network.
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 description 10.94.47.148:vmnic1
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 unit 0 family ethernet-switching vlan members Sharepoint
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 unit 0 family ethernet-switching vlan members Storage-POD2
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1248332 interfaces ae8 unit 0 family ethernet-switching vlan members Tera-VM
set groups ND-ORCHESTRATION-GROUP-1248423 interfaces ae9 description 10.94.47.149:vmnic1
set groups ND-ORCHESTRATION-GROUP-1248423 interfaces ae9 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1248423 interfaces ae9 unit 0 family ethernet-switching vlan members Sharepoint
set groups ND-ORCHESTRATION-GROUP-1248423 interfaces ae9 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1248423 interfaces ae9 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1248423 interfaces ae9 unit 0 family ethernet-switching vlan members Storage-POD2
set groups ND-ORCHESTRATION-GROUP-1248423 interfaces ae9 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1248452 interfaces ae7 description 10.94.47.147:vmnic0
set groups ND-ORCHESTRATION-GROUP-1248452 interfaces ae7 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1248452 interfaces ae7 unit 0 family ethernet-switching vlan members Sharepoint
set groups ND-ORCHESTRATION-GROUP-1248452 interfaces ae7 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1248452 interfaces ae7 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1248452 interfaces ae7 unit 0 family ethernet-switching vlan members Storage-POD2
set groups ND-ORCHESTRATION-GROUP-1248452 interfaces ae7 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1248452 interfaces ae7 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1248486 interfaces ae1 description 10.94.47.136:vmnic25
set groups ND-ORCHESTRATION-GROUP-1248486 interfaces ae1 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1248486 interfaces ae1 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1248486 interfaces ae1 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1248486 interfaces ae1 unit 0 family ethernet-switching vlan members Storage-POD1
set groups ND-ORCHESTRATION-GROUP-1248486 interfaces ae1 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1248486 interfaces ae1 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1248486 interfaces ae1 unit 0 family ethernet-switching vlan members Exchange
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 description 10.94.47.137:vmnic0
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 unit 0 family ethernet-switching vlan members Exchange
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 unit 0 family ethernet-switching vlan members Storage-POD1
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 unit 0 family ethernet-switching vlan members Exchange-Cluster
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1248527 interfaces ae2 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1249039 interfaces ae3 description 10.94.47.138:vmnic1
set groups ND-ORCHESTRATION-GROUP-1249039 interfaces ae3 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1249039 interfaces ae3 unit 0 family ethernet-switching vlan members Infra
set groups ND-ORCHESTRATION-GROUP-1249039 interfaces ae3 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1249039 interfaces ae3 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1249039 interfaces ae3 unit 0 family ethernet-switching vlan members Storage-POD1
set groups ND-ORCHESTRATION-GROUP-1249039 interfaces ae3 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1249039 interfaces ae3 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1249142 interfaces ae5 description 10.94.47.140:vmnic25
set groups ND-ORCHESTRATION-GROUP-1249142 interfaces ae5 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1249142 interfaces ae5 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1249142 interfaces ae5 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1249142 interfaces ae5 unit 0 family ethernet-switching vlan members Storage-POD1
set groups ND-ORCHESTRATION-GROUP-1249142 interfaces ae5 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1249142 interfaces ae5 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1249168 interfaces ae10 description 10.94.47.150:vmnic25
set groups ND-ORCHESTRATION-GROUP-1249168 interfaces ae10 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1249168 interfaces ae10 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1249168 interfaces ae10 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1249168 interfaces ae10 unit 0 family ethernet-switching vlan members Storage-POD2
set groups ND-ORCHESTRATION-GROUP-1249168 interfaces ae10 unit 0 family ethernet-switching vlan members Compute-MGMTset groups ND-ORCHESTRATION-GROUP-1249168 interfaces ae10 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1249192 interfaces ae23 description 10.94.47.130:vmnic5
set groups ND-ORCHESTRATION-GROUP-1249192 interfaces ae23 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1249192 interfaces ae23 unit 0 family ethernet-switching vlan members Infra
set groups ND-ORCHESTRATION-GROUP-1249192 interfaces ae23 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1249192 interfaces ae23 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1249192 interfaces ae23 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1249192 interfaces ae23 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1249192 interfaces ae23 unit 0 family ethernet-switching vlan members Tera-VM
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 description 10.94.47.129:vmnic4
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 unit 0 family ethernet-switching vlan members Infra
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 unit 0 family ethernet-switching vlan members Storage-POD1
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1248939 interfaces ae22 unit 0 family ethernet-switching vlan members Remote-Access
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 description 10.94.47.146:vmnic0
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 unit 0 family ethernet-switching vlan members Sharepoint
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 unit 0 family ethernet-switching vlan members Storage-POD2
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 unit 0 family ethernet-switching vlan members Security-Mgmt
set groups ND-ORCHESTRATION-GROUP-1248378 interfaces ae6 unit 0 family ethernet-switching vlan members Tera-VM
set groups ND-ORCHESTRATION-GROUP-1249073 interfaces ae4 description 10.94.47.139:vmnic1
set groups ND-ORCHESTRATION-GROUP-1249073 interfaces ae4 unit 0 family ethernet-switching interface-mode trunk
set groups ND-ORCHESTRATION-GROUP-1249073 interfaces ae4 unit 0 family ethernet-switching vlan members Vmotion
set groups ND-ORCHESTRATION-GROUP-1249073 interfaces ae4 unit 0 family ethernet-switching vlan members VM-FT
set groups ND-ORCHESTRATION-GROUP-1249073 interfaces ae4 unit 0 family ethernet-switching vlan members Storage-POD1
set groups ND-ORCHESTRATION-GROUP-1249073 interfaces ae4 unit 0 family ethernet-switching vlan members Compute-MGMT
set groups ND-ORCHESTRATION-GROUP-1249073 interfaces ae4 unit 0 family ethernet-switching vlan members Security-Mgmt
Verification
Confirm that the configuration is working properly.
Verifying the Insertion of the Generated Group Configuration into the VCF, VM Movement, and Successful Orchestration
Purpose
To verify that the VCF has received the group configuration generated by Network Director, and that orchestration occurs when a VM moves to another server.
Action
Issue the show interfaces | display inheritance command to confirm that the group configuration has been applied correctly for the original host interface for the Exchange application:
user@vcf> show interfaces ae4 | display inheritance
description "Towards Server-Farm1 Passthrough CN4"; mtu 9192; aggregated-ether-options { lacp { active; periodic fast; } } unit 0 { family ethernet-switching { interface-mode trunk; vlan { ## ## 'Exchange' was inherited from group 'ND-ORCHESTRATION-GROUP-1249073' ## 'Vmotion' was inherited from group 'ND-ORCHESTRATION-GROUP-1249073' ## 'VM-FT' was inherited from group 'ND-ORCHESTRATION-GROUP-1249073' ## 'Storage-POD1' was inherited from group 'ND-ORCHESTRATION-GROUP-1249073' ## 'Compute-MGMT' was inherited from group 'ND-ORCHESTRATION-GROUP-1249073' ## 'Security-Mgmt' was inherited from group 'ND-ORCHESTRATION-GROUP-1249073' ## members [ all Exchange Vmotion VM-FT Storage-POD1 Compute-MGMT Security-Mgmt ]; } } }
Issue the show interfaces | display inheritance command to verify that the group configuration has not been applied to a host interface that is not currently running the Exchange application:
user@vcf> show interfaces ae1 | display inheritance
description "Towards Server-Farm1 Passthrough CN1"; mtu 9192; aggregated-ether-options { lacp { active; periodic fast; } } unit 0 { family ethernet-switching { interface-mode trunk; vlan { ## ## 'Security-Mgmt' was inherited from group 'ND-ORCHESTRATION-GROUP-1248486' ## ’Exchange’ has not been inherited ## members [ Storage-POD1 Storage-POD2 Infra VM-FT Vmotion OOB-Transport Compute-MGMT Security-Mgmt ]; } } }
Use VMware vCenter to migrate the Exchange VM from CN4 to CN1.
Issue the show interfaces | display inheritance command to verify that the group configuration has now been applied to the new host interface running the Exchange application:
user@vcf> show interfaces ae1 | display inheritance
description "Towards Server-Farm1 Passthrough CN1"; mtu 9192; aggregated-ether-options { lacp { active; periodic fast; } } unit 0 { family ethernet-switching { interface-mode trunk; vlan { ## ## 'Security-Mgmt' was inherited from group 'ND-ORCHESTRATION-GROUP-1248486' ## 'Exchange' was inherited from group 'ND-ORCHESTRATION-GROUP-1248486' <<<<<<<<< ################# Exchange VLAN added by ND in the groups configuration ####### members [ Storage-POD1 Storage-POD2 Infra VM-FT Vmotion OOB-Transport Compute-MGMT Security-Mgmt Exchange ]; } } }
In Network Director, navigate to Views > Virtual View > Virtual Networks Management > Manage Virtual Networks, and click the network that was orchestrated. As shown in Figure 18, the Exchange application migrated correctly to the new server and Network Director performed the orchestration successfully:
Figure 18: Network Director 1.6 — Orchestration Performed Successfully
Meaning
The initial orchestration performed by Network Director placed the Exchange application on server CN4 and connected the server to the VCF on interface ae4. As expected, the group configuration for the Exchange application was applied to interface ae4 but not to interface ae1.
After the VM move of the Exchange application to server CN1, Network Director modified the group configuration, and pushed it to the VCF. As a result, the Exchange application moved to interface ae1 and Network Director reported the successful orchestration of this VM move.