The lack of programmability in existing networking hardware is certainly a problem, but VMware’s acquisition of Nicira does not mean that Cisco and its ilk will be marginalized… It does mean the role and management of the physical network is changing, and I think Cisco is further ahead than most of its competitors in creating a vision for the next phase of networking.
My take here was that the VMware-Nicira acquisition did not portend a strategic break with Cisco, and while there are some obvious overlaps in our product lines, there are still a number of areas of collaboration, cooperation and interoperability. The virtual network infrastructure is just one piece of a larger software stack and the differentiation will likely be decided in the orchestration, management and applications built on top of the newly programmable infrastructures sometime down the road. Read More »
Continuing on our theme of virtual network overlays and programmable networks, today we’ll look at how to increase workload mobility over more data center and cloud resources. If server virtualization increases resource utilization and reduces costs, and data center consolidation is a good thing, then it follows that the larger the resource pool that your virtual workloads can migrate over, the more cost effective your IT operation can be. And if your mobility diameter spans multiple sites, you can obviously improve your fault tolerance as well. We call this increasing your mobility diameter, and we’ll complement what we’ve already learned about VXLAN and virtual overlays with some new technologies to seamlessly scale your diameter up. (Sounds like some sort of bizarre reverse Weight Watchers program, doesn’t it?).
As we noted in our VXLAN overview, VXLANs enable private virtual overlays over layer 3 boundaries via their MAC in UDP encapsulation and the cool way they filter MAC address broadcasts to only the right subnets. However, when you are doing full on application migration over a layer 3 boundary, VXLAN alone isn’t going to do it alone. In order to extend virtual workload mobility beyond layer 2 boundaries, Cisco came up with Overlay Transport Virtualization (OTV) that can work in conjunction with VXLAN to extend application mobility to any point the VXLAN virtual overlay can reach. And not surprisingly, the media wizards over at TechWise TV have a great video that takes all the complexity of OTV and makes it cartoonishly simple.
What is vPath? Well, if VXLANs can set up secure tunnels over a shared, multi-tenant virtual network, vPath is a feature of the Nexus 1000V virtual switch that can redirect traffic to virtual application services before the switch sends the packets down into the virtual machine. Very important stuff, but how does it do that? I find that my blog posts are more popular the less I type, and the more I embed cool TechWiseTV videos that illustrate the concept, so I’m dusting off this classic from the TWTV team on just how vPath does that with our Virtual Security Gateway (VSG). Take it away Robb…
At Cisco live last month I spent several days talking to a lot of customers about all the new enhancements to our Nexus 1000V portfolio, especially the programmable virtual network overlays that are part of the Cisco ONE framework for SDN/network programmability. While the Nexus 1000V-based virtual networks are really gaining traction (6,000+ Nexus 1000V virtual switch customers to date), I still found a lot of folks weren’t all that familiar with the concept of VXLAN, and why they are so important to building scalable cloud networks and multi-tenant data centers.
Well, not to fear, VXLAN MAN is here! Well, not really, but we have just released a great new fundamentals video on VXLAN from the creative geniuses at Techwise TV (Thanks to @JimmyRay_Purser and @robbboyd!). We’ve gotten great reviews on this so far, and I know the guys really had a fun time in creating this one.
ESG points out that virtual network overlays are important to building out multi-tenant environments like private and hybrid clouds, as well as overcoming scalability issues in those environments that have traditionally been based on VLANs. As ESG notes, and as Cisco mentioned in it’s ONE announcement, programmability of the virtual networks is what really separates them from classic overlays based on MPLS or GRE tunnels. The Nexus 1000V will achieve this programmability capability by SDN API’s such as OpenStack on top of the Nexus 1000V virtual supervisor module.