This is a review post for the Big Compute and Big Data, NoSQL session. Hmm, when signing up for the session I was concerned about being a little lost on the topic, but the panel was very good.
Daily Blogger Techminute is back in Vegas Baby, Vegas!! This time it’s for VMworld 2011. So far the show has been huge (20,000+ attendees) and past paced with announcements from Cisco, VMware and our partners. The Cisco booth is focused on Cloud/Virtualization, VDI/VXI and Automation, so we thought it would be great to kick off the week with experts in all of those areas.
Our techblogger guests today were:
- Jay Cuthrell (@qthrul, Principal Lead vArchitect at VCE, http://fudge.org)
- Steve Kaplan (@roidude, VP Virtualization Practice at INX, http://bythebell.com)
- Nick Weaver (@lynxbat, Sr.vSpecialist at EMC, http://nickapedia.com) Read More »
From my perspective, Cisco continues to be a fun place to work for a couple of reasons. First of all, we have a company full of really smart geeks with networking chops second to none. Second, we have the freedom to push boundaries and find ways to make our customers’ lives easier.
Bring those two together and you get some interesting results, like the new VXLAN technology we announced at VMworld today. Working with industry notables, Cisco contributed our networking smarts to help develop a technology that will make a big difference for our customers who want to build clouds. VXLAN is the basis of a scalable cloud network where lots of logical networks (over 16M, courtesy of a 24 bit of logical network identifier) can be created instantly to meet the needs of the even the most complex and dynamic cloud. Indeed, the technology even pushes the boundary of virtual machine migration beyond a layer 2 domain. A group of networking and server virtualization companies have submitted a joint proposal to the IETF to have the VXLAN technology standardized.
To read the IETF submittal, click here. To learn more about why VXLAN should be part of you cloud plans, read this white paper. If you are at VMworld, by all means, swing by the Cisco or VMware booth to see a demo and get your questions answered.
If you are interested in putting VXLAN to test, stay tuned for the upcoming 1.5 release of Nexus 1000V (entering beta in September 2011).
Look for more posts on the topic, but, in the interim, if you have questions, post them here and we’ll get them answered.
VMworld is upon us, and this week marks the official announcement of VMware’s View 5.0. Read More »
At VMworld this week in Las Vegas, Cisco will be providing a preview of a virtual implementation of our ASA security appliance. A “preview” implies that we aren’t ready to announce ultimate pricing or availability, but we are demonstrating a strategic direction for the ASA product line. Earlier, I alluded to important new advances in our virtual security story upcoming at VMworld in the comments section of a recent blog post I wrote responding to HP criticisms of our Virtual Security Gateway (VSG) product.
With security concerns being the most frequently cited obstacle to large scale virtualization projects and adopting cloud computing models, Cisco will be greatly enhancing its industry-leading virtual security infrastructure with this product. The new virtual ASA introduces a wide range of security services that have not been available from Cisco before in a virtual form factor. The virtual ASA will enable more sophisticated security policies that better align with business and compliance needs in the virtual data center.
Some of the key aspects of this new virtual ASA product:
- The ASA family is one of the most deployed and trusted security products in the industry, with over 15 years of security experience and more than 1 million appliances installed, and now is available in a virtual form factor for greater flexibility in the data center
- Virtual ASA runs the ASA feature set, so important capabilities such as VPN , NAT, and much more will be available in addition to firewall capabilities
- The Virtual ASA will run on top of the Nexus 1000V virtual switch, fully leveraging the VM and traffic visibility provided by the Cisco virtual fabric, as well as optimal traffic steering to the security node from the VM and virtual switch
Rather than replacing our VSG virtual firewall, the virtual ASA will be a strong complement for the current VSG capabilities. The virtual ASA includes security functionality most often deployed at the edge of an organization and the edge of the data center. As such, it is better suited for North-South traffic into the data center and virtual applications. VSG, with its greater visibility to VM-specific and application attributes, enforces security policies between applications and virtual machines, and is more East-West traffic oriented.
Across the whole ASA product line, customers will be able to get consistent functionality, management and policy enforcement across all form factors (stand-alone appliance, modular blade, and now virtual instances). And with Nexus 1000V integration, Virtual ASA customers will also get consistency in management, provisioning and service routing with Cisco’s other virtual services including VSG and vWAAS. At a minimum, this should alleviate all objections that we just offered a virtual firewall and not other key security services.
If you are in Las Vegas next week, we encourage you to come by the Cisco booth (#700) for a look. If not, stay tuned for more details…