The original vision of a ‘borderless’ continues to play out this week at Interop and we have a TechWiseTV episode covering all the details. ’Simplified and Secure’ is how Inbar Lasser-Raab put it. The power of ONE: Network, Managment and Policy
Sachin Gupta is our first guest expert here to explain how Cisco’s Unified Access Network offers simplified IT operations, reduced operational costs, and better scaling to accommodate the proliferation of devices and applications now and in the future.
The flexibility enabled by an IP based communication system is exemplified in how Cisco handles Session Management. In fact, the combination of ‘Session Management Edition and CUBE (Cisco Unified Border Element) remain the most cost effective way to transition from a traditional PBX environment without sacrificing previous investments.
The benefits can be grouped in three areas:
Save -- Lower costs and improve efficiency by using SIP trunking to interconnect networks using Cisco Unified Border Element
Simplify -- Reduce complexity by aggregating third-party PBXs, and easing migration to an all-IP environment.
Extend -- Deploy collaboration applications at the network core and extend them to users, even those on third-party PBXs
In this latest in the Fundamentals series from TechWiseTV, we tackle the core technology hopefully explains it in a fun way. Get your head wrapped around Session Management and make sure you are not missing anything!
Internet cookies seem to have the best name with a somewhat negative perception. Its really not the cookie thats to blame. Most geeks will laugh that we even would consider this topic for a video but the fact remains, too many people misunderstand the value and besides, its part of the Networking 101 series..its supposed to be basic!
The negative reputation seems to have started back in 2000 as the never ending privacy debates were reaching a fever pitch. And just like people who love to blame powerpoint for their crummy presentations, the fact is, the cookie is not to blame..its a tool that frankly adds a lot of value to our web experience.
Lots of misinformation has fed this debate over the years, much of it led by false information that stated cookie are programs.
Virtualization news continues to move to the forefront as we head towards the start of VMworld in San Francisco. Last week we unveiled the upcoming Nexus 1000V 2.1 major release here. Perhaps the biggest news on the virtual security front is the availability last week of the ASA 1000V Cloud Firewall (download a free trial here). We’re also announcing special introductory pricing on the ASA 1000V of 50% off the list price, which also includes our new Virtual Network Management Center (VNMC) 2.0. Other promotional pricing bundles are available as well.
We’re excited about the ASA 1000V because it brings virtually all the features of our physical ASA appliances to virtual environments, providing greater consistency across the physical, virtual and cloud domains, however your applications are deployed. The ASA 1000V will primarily be deployed to protect tenants in a multi-tenant cloud environment with traditional edge security services including VPN, NAT, attack prevention and DHCP. This will complement our Virtual Security Gateway (VSG) firewall which has greater visibility to VM-specific policy attributes, and will be used to isolate VM-VM traffic within a tenant.
Both ASA 1000V and VSG use vPath 2.0 in the new Nexus 1000V to steer appropriate traffic to the right firewall, or other virtual service nodes, in the right sequence, while automatically keeping policies consistent and the service paths properly configured after vMotion events. And the ASA 1000V comes bundled with the new Virtual Network Management Center (VNMC) 2.0 that we announced this week as well, for easy management and deployment of virtual security policies.
But since there’s still a lot to do prepping for this week’s activities, like #v0dgeball, I’ll wrap up here and let Jimmy Ray from TechWiseTV share some of his thoughts on ASA 1000V and VSG (and remember, if you are around #VMworld this week, give us a shout out on twitter using Cisco hash tag #ciscovmw or to me @gkinghorn).:
What is vPath? Well, if VXLANs can set up secure tunnels over a shared, multi-tenant virtual network, vPath is a feature of the Nexus 1000V virtual switch that can redirect traffic to virtual application services before the switch sends the packets down into the virtual machine. Very important stuff, but how does it do that? I find that my blog posts are more popular the less I type, and the more I embed cool TechWiseTV videos that illustrate the concept, so I’m dusting off this classic from the TWTV team on just how vPath does that with our Virtual Security Gateway (VSG). Take it away Robb…