Today, we announced we will be delivering VM networking support for Hyper-V in Microsoft’s forthcoming Windows 8. Specifically, we are working with Microsoft to deliver integrated support for the Nexus 1000V and VM-FEX technology in their next generation server platform, thus extending the benefits customers have seen from both these technologies to another server/hypervisor environment. For more info, check out the announcement and this brief and this Q&A.
With this latest announcement, we offer (or will offer) Nexus 1000V functionality for VMware vSphere and Microsoft Hyper-V as well as VM-FEX support for those two hypervisors and RedHat Enterprise Virtualization. For folks building out virtualization architectures and cloud environments, we think this is a key benefit, since it maintains their choice and flexibility and allows them to build out hyper-visor agnostic infrastructure that delivers consistent features and functionality.
So, that’s about it for now. Stay tuned to this space and we’ll keep you apprised as things progress.
Tags: data center, Data Center Business Advantage, Hyper-V, Nexus 1000v, virtualization, VM-FEX
A guest post by:
Appaji Malla, Nexus Product Manager
Arnab Basu, UCS Product Manager
At last week’s Microsoft Build event in Anaheim, CA. we presented & demonstrated our Cisco Nexus 1000V and Cisco UCS VM-FEX technologies running on Windows 8 Server Hyper-V.
Read More »
Tags: Cisco, Hyper-V, Microsoft, Nexus 1000v, virtualization, VM-FEX, Windows 8
Before going on to an interview on SiliconAngle.tv and speaking at a Super Session on “How Cisco and VMware Collaborate to Build the Cloud”, Soni Jiandani gave me a couple of minutes to sum up the Cisco innovations announced and on display at VMworld 2011.
Some things Soni mentions:
Read More »
Tags: @ciscoDC, Cisco, data center, Nexus 1000v, UCS, virtualization, vmworld, VMworld 2011
At VMworld this week in Las Vegas, Cisco will be providing a preview of a virtual implementation of our ASA security appliance. A “preview” implies that we aren’t ready to announce ultimate pricing or availability, but we are demonstrating a strategic direction for the ASA product line. Earlier, I alluded to important new advances in our virtual security story upcoming at VMworld in the comments section of a recent blog post I wrote responding to HP criticisms of our Virtual Security Gateway (VSG) product.
With security concerns being the most frequently cited obstacle to large scale virtualization projects and adopting cloud computing models, Cisco will be greatly enhancing its industry-leading virtual security infrastructure with this product. The new virtual ASA introduces a wide range of security services that have not been available from Cisco before in a virtual form factor. The virtual ASA will enable more sophisticated security policies that better align with business and compliance needs in the virtual data center.
Some of the key aspects of this new virtual ASA product:
- The ASA family is one of the most deployed and trusted security products in the industry, with over 15 years of security experience and more than 1 million appliances installed, and now is available in a virtual form factor for greater flexibility in the data center
- Virtual ASA runs the ASA feature set, so important capabilities such as VPN , NAT, and much more will be available in addition to firewall capabilities
- The Virtual ASA will run on top of the Nexus 1000V virtual switch, fully leveraging the VM and traffic visibility provided by the Cisco virtual fabric, as well as optimal traffic steering to the security node from the VM and virtual switch
Rather than replacing our VSG virtual firewall, the virtual ASA will be a strong complement for the current VSG capabilities. The virtual ASA includes security functionality most often deployed at the edge of an organization and the edge of the data center. As such, it is better suited for North-South traffic into the data center and virtual applications. VSG, with its greater visibility to VM-specific and application attributes, enforces security policies between applications and virtual machines, and is more East-West traffic oriented.
Across the whole ASA product line, customers will be able to get consistent functionality, management and policy enforcement across all form factors (stand-alone appliance, modular blade, and now virtual instances). And with Nexus 1000V integration, Virtual ASA customers will also get consistency in management, provisioning and service routing with Cisco’s other virtual services including VSG and vWAAS. At a minimum, this should alleviate all objections that we just offered a virtual firewall and not other key security services.
If you are in Las Vegas next week, we encourage you to come by the Cisco booth (#700) for a look. If not, stay tuned for more details…
Tags: ASA, Nexus 1000v, virtual security, Virtual Security Gateway, vsg
So, VMworld 2011 is upon us and Irene is bearing down on us. (For those RTP based)
Here is a list of a few sessions I think are hot topics at VMworld this year.
Performance and Scalability Enhancements in VMware vStorage VMFS 5
A Deep Dive on Virtual Distributed Switching and Cisco Nexus 1000v by Jason Nash – Twitter (@nash_j) (Session Twitter hashtag: #VSP2757)
Innovating Together: How Cisco and VMware Collaborate to Build the Cloud by Soni Jiandani (Session Twitter hashtag: #SUP1010)
Deploying vCloud Director with Cisco Nexus 1000V (Twitter hashtag: #HOL25)
Read More »
Tags: Cisco, LISP, Nexus 1000v, OTV, SMT, VMDC, vmworld