From my perspective, Cisco continues to be a fun place to work for a couple of reasons. First of all, we have a company full of really smart geeks with networking chops second to none. Second, we have the freedom to push boundaries and find ways to make our customers’ lives easier.
Bring those two together and you get some interesting results, like the new VXLAN technology we announced at VMworld today. Working with industry notables, Cisco contributed our networking smarts to help develop a technology that will make a big difference for our customers who want to build clouds. VXLAN is the basis of a scalable cloud network where lots of logical networks (over 16M, courtesy of a 24 bit of logical network identifier) can be created instantly to meet the needs of the even the most complex and dynamic cloud. Indeed, the technology even pushes the boundary of virtual machine migration beyond a layer 2 domain. A group of networking and server virtualization companies have submitted a joint proposal to the IETF to have the VXLAN technology standardized.
To read the IETF submittal, click here. To learn more about why VXLAN should be part of you cloud plans, read this white paper. If you are at VMworld, by all means, swing by the Cisco or VMware booth to see a demo and get your questions answered.
If you are interested in putting VXLAN to test, stay tuned for the upcoming 1.5 release of Nexus 1000V (entering beta in September 2011).
Look for more posts on the topic, but, in the interim, if you have questions, post them here and we’ll get them answered.
Tags: Cisco, data center, virtualization, VMware, VXLAN
VMworld is upon us, and this week marks the official announcement of VMware’s View 5.0. Read More »
Tags: UCS, VCE, vdi, vmworld, vxi
At VMworld this week in Las Vegas, Cisco will be providing a preview of a virtual implementation of our ASA security appliance. A “preview” implies that we aren’t ready to announce ultimate pricing or availability, but we are demonstrating a strategic direction for the ASA product line. Earlier, I alluded to important new advances in our virtual security story upcoming at VMworld in the comments section of a recent blog post I wrote responding to HP criticisms of our Virtual Security Gateway (VSG) product.
With security concerns being the most frequently cited obstacle to large scale virtualization projects and adopting cloud computing models, Cisco will be greatly enhancing its industry-leading virtual security infrastructure with this product. The new virtual ASA introduces a wide range of security services that have not been available from Cisco before in a virtual form factor. The virtual ASA will enable more sophisticated security policies that better align with business and compliance needs in the virtual data center.
Some of the key aspects of this new virtual ASA product:
- The ASA family is one of the most deployed and trusted security products in the industry, with over 15 years of security experience and more than 1 million appliances installed, and now is available in a virtual form factor for greater flexibility in the data center
- Virtual ASA runs the ASA feature set, so important capabilities such as VPN , NAT, and much more will be available in addition to firewall capabilities
- The Virtual ASA will run on top of the Nexus 1000V virtual switch, fully leveraging the VM and traffic visibility provided by the Cisco virtual fabric, as well as optimal traffic steering to the security node from the VM and virtual switch
Rather than replacing our VSG virtual firewall, the virtual ASA will be a strong complement for the current VSG capabilities. The virtual ASA includes security functionality most often deployed at the edge of an organization and the edge of the data center. As such, it is better suited for North-South traffic into the data center and virtual applications. VSG, with its greater visibility to VM-specific and application attributes, enforces security policies between applications and virtual machines, and is more East-West traffic oriented.
Across the whole ASA product line, customers will be able to get consistent functionality, management and policy enforcement across all form factors (stand-alone appliance, modular blade, and now virtual instances). And with Nexus 1000V integration, Virtual ASA customers will also get consistency in management, provisioning and service routing with Cisco’s other virtual services including VSG and vWAAS. At a minimum, this should alleviate all objections that we just offered a virtual firewall and not other key security services.
If you are in Las Vegas next week, we encourage you to come by the Cisco booth (#700) for a look. If not, stay tuned for more details…
Tags: ASA, Nexus 1000v, virtual security, Virtual Security Gateway, vsg
As a new member of the UCS Marketing team and a self-proclaimed data center efficiency evangelist, I keep an eye on developments in the operations and management of data centers. I looked at the Data Center Decisions 2011 survey special report on searchdatacenter.com and saw some interesting results. According to the survey, Data Center managers are most often turning to “off the shelf “ Systems Management tools for automation. They rely on these tools for routine tasks that can be automated, but still don’t trust them to automate responses to changes in the environment, such as thresholds being crossed. This has been the general consensus for a while (years, really) and it is not surprising. It takes a lot of effort to build trust.
Although automation and productivity increases were cited as reasons to purchase Systems Management software, tools were actually purchased for performance management, monitoring and capacity management. So, customers only paid for Systems Management tools that helped in service assurance and meeting business commitments. I expect capacity management, an area where customers currently spent their dollars, to become less important in a cloud-computing environment. Do you agree?
The survey on virtualization showed that VMWare was by far the leading hypervisor this year as in 2010. With VMWorld 2011 just round the corner it will be interesting to see how VMWare intends to help customers with the VM sprawl issue. Personally I think that attaching a monetary value to a running VM in a data center will fix some of the sprawl problems. This means anyone who requisitions a virtual machine pays a certain rate from the moment it is provisioned until it is de-provisioned. What do you think? Another challenge to virtualization highlighted in the survey was performance of a virtual server. I expect a number of developments to be unveiled at VMWorld 2011 on this front. See you at the conference.
So, VMworld 2011 is upon us and Irene is bearing down on us. (For those RTP based)
Here is a list of a few sessions I think are hot topics at VMworld this year.
Performance and Scalability Enhancements in VMware vStorage VMFS 5
A Deep Dive on Virtual Distributed Switching and Cisco Nexus 1000v by Jason Nash – Twitter (@nash_j) (Session Twitter hashtag: #VSP2757)
Innovating Together: How Cisco and VMware Collaborate to Build the Cloud by Soni Jiandani (Session Twitter hashtag: #SUP1010)
Deploying vCloud Director with Cisco Nexus 1000V (Twitter hashtag: #HOL25)
Read More »
Tags: Cisco, LISP, Nexus 1000v, OTV, SMT, VMDC, vmworld