In this posting we’ll move from server virtualization and its potential impact on both WANs and IT organizational structures to desktop virtualization (also known as VDI, or virtualized desktop infrastructure). The emerging set of VDI technologies and solutions has many benefits to offer, many ways to deploy, and even more complexity and interdependency across IT teams than server virtualization. Clearly desktop virtualization adds a new level of complexity to, and new operating models for, IT groups — technology-wise for supporting end users via the network, possible new types of devices used, and a further increased requirement for security. Read More »
With our Cisco Nexus 1000V beta wrapping up, I had a chance to ping a couple of our customers about their experiences testing the Cisco Nexus 1000V/vSphere combo in their environments. The excerpt is from Julien Mousqueton, who is the Technical Solution Architect for Groupe AGRICA, a European insurance and benefits company--thank you Julien for taking the time to answer questions.What was your overall impression of the Cisco Nexus 1000V distributed virtual switch?My overall impression of the Cisco Nexus 1000V is very positive. It fully integrated with the Cisco architecture that was already in place (CDP). The network team now no longer distinguishes between a virtual machine and a physical server; as such, with the Cisco Nexus 1000V, the network team is given full control of the network. The main impact was the possibility to solve network analysis problems between the various virtual machines. Finally, taking control of the new NXOS operating system was greatly facilitated by our team’s in-depth knowledge of the IOS.Will the ability to apply network and security policy to specific VMs/applications increase the number and types of applications you move to a VM environment? Why or why not? What other impacts do you see to your server virtualization plans?The possibility of applying our security policy to virtual machines is real, because we are going to give VLAN network segmentation to the network to partition our development, validation and production environments and make our DMZ secure (dematerialized zones such as our various websites for example) using n-tier architecture. This represents a very meaningful advance in data security.How easy or difficult was it for your network and server/virtualization admin to implement and access the features of the Cisco Nexus 1000V? Was their any significant training or change in operational procedures required? What do you see as the impact on day-to-day operations when you deploy this in your production environment?Our network teams liked the Cisco Nexus 1000V immediately, because it integrated with the Cisco architecture that was already in place and required no time to adapt. The transition was even easier when you’re already familiar with the Cisco world; taking control of the Cisco Nexus 1000V was simplified and intuitive.Based on the functionality delivered by the vSphere + N1KV, will you accelerate your datacenter virtualization plans--do you see a higher percentage of your x86 workloads being virtualized? Why?The process of virtualization of our datacenter will in fact accelerate. As such we will be able to virtualize our DMZ that previously has relied on physical architectures, and overall we will be able to virtualize everything that has been not possible in the past. We will hence be able to partition environments more easily in order to avoid impacting production environments.I have a couple more excepts to post in the near future. In the meantime, our engineering elves are putting the finishing touches on the software itself. While you are waiting, head on over to cisco.com/go/nexusnow and sign up for the free 60-day eval license
The fine folks at our ESE team are putting on what looks to be a very cool session on implementing security in the data center. The session is based on the information of the latest Cisco Validated Design and will reflect current best practices for the deployment and design of key technology innovations in the Data Center such as VDCs, VPCs, new STP features, VSS and Services deployment.Topics will include:
- Security and the Virtualized Infrastructure
- Deploying ASA, Network IPS, Application Services
- Maintaining Policy Enforcement, Isolation, and Visibility
- Security and Server Virtualization
The session is on May 8 at 8am (PT). To register for the session, go to here.BTW, for more info on the Cisco Validated Design program, check out http://www.cisco.com/go/designzone
OK, so it took a bit longer than I planned, but here is the first of a two-part walk-through of Cisco UCS Manager with Brian Schwarz. As context, I would also suggest you check out the prior two posts on UCS Manager here and here.Here is the embedded video, but I suggest you click through and look at the larger format video (to click through, mouse over the upper left corner of the running video and click on the word “facebook” when it appears).
The second video covers the service profiles in more depth.
Here is the second video video walk-through for the Cisco UCS Manager. In this one, we dig into the service profiles a bit more and then talk a bit about the use models for the Unified Computing System XML API.Again, while you can watch the embedded video here, if you click through you can get a bigger viewing window (to click through, mouse over the upper left corner of the running video and click on the word “facebook” when it appears).