The flexibility enabled by an IP based communication system is exemplified in how Cisco handles Session Management. In fact, the combination of ‘Session Management Edition and CUBE (Cisco Unified Border Element) remain the most cost effective way to transition from a traditional PBX environment without sacrificing previous investments.
The benefits can be grouped in three areas:
Save -- Lower costs and improve efficiency by using SIP trunking to interconnect networks using Cisco Unified Border Element
Simplify -- Reduce complexity by aggregating third-party PBXs, and easing migration to an all-IP environment.
Extend -- Deploy collaboration applications at the network core and extend them to users, even those on third-party PBXs
In this latest in the Fundamentals series from TechWiseTV, we tackle the core technology hopefully explains it in a fun way. Get your head wrapped around Session Management and make sure you are not missing anything!
Internet cookies seem to have the best name with a somewhat negative perception. Its really not the cookie thats to blame. Most geeks will laugh that we even would consider this topic for a video but the fact remains, too many people misunderstand the value and besides, its part of the Networking 101 series..its supposed to be basic!
The negative reputation seems to have started back in 2000 as the never ending privacy debates were reaching a fever pitch. And just like people who love to blame powerpoint for their crummy presentations, the fact is, the cookie is not to blame..its a tool that frankly adds a lot of value to our web experience.
Lots of misinformation has fed this debate over the years, much of it led by false information that stated cookie are programs.
Virtualization news continues to move to the forefront as we head towards the start of VMworld in San Francisco. Last week we unveiled the upcoming Nexus 1000V 2.1 major release here. Perhaps the biggest news on the virtual security front is the availability last week of the ASA 1000V Cloud Firewall (download a free trial here). We’re also announcing special introductory pricing on the ASA 1000V of 50% off the list price, which also includes our new Virtual Network Management Center (VNMC) 2.0. Other promotional pricing bundles are available as well.
We’re excited about the ASA 1000V because it brings virtually all the features of our physical ASA appliances to virtual environments, providing greater consistency across the physical, virtual and cloud domains, however your applications are deployed. The ASA 1000V will primarily be deployed to protect tenants in a multi-tenant cloud environment with traditional edge security services including VPN, NAT, attack prevention and DHCP. This will complement our Virtual Security Gateway (VSG) firewall which has greater visibility to VM-specific policy attributes, and will be used to isolate VM-VM traffic within a tenant.
Both ASA 1000V and VSG use vPath 2.0 in the new Nexus 1000V to steer appropriate traffic to the right firewall, or other virtual service nodes, in the right sequence, while automatically keeping policies consistent and the service paths properly configured after vMotion events. And the ASA 1000V comes bundled with the new Virtual Network Management Center (VNMC) 2.0 that we announced this week as well, for easy management and deployment of virtual security policies.
But since there’s still a lot to do prepping for this week’s activities, like #v0dgeball, I’ll wrap up here and let Jimmy Ray from TechWiseTV share some of his thoughts on ASA 1000V and VSG (and remember, if you are around #VMworld this week, give us a shout out on twitter using Cisco hash tag #ciscovmw or to me @gkinghorn).:
What is vPath? Well, if VXLANs can set up secure tunnels over a shared, multi-tenant virtual network, vPath is a feature of the Nexus 1000V virtual switch that can redirect traffic to virtual application services before the switch sends the packets down into the virtual machine. Very important stuff, but how does it do that? I find that my blog posts are more popular the less I type, and the more I embed cool TechWiseTV videos that illustrate the concept, so I’m dusting off this classic from the TWTV team on just how vPath does that with our Virtual Security Gateway (VSG). Take it away Robb…
Two of my favorite geeks are presenting a workshop today on Bringing the Cloud to your Remote Offices. Jimmy Ray is hosting his ‘brother from another mother’ (as we fondly refer to him) Matt Bolick. Matt first blew our doors off back in 2009 as we featured the then new ISR G2 in our ‘Routers are Dead…Long Live the Router show (now retired). Well, Matt was a featured guest recently on another big show we did, the Cisco Cloud Intelligent Network. You can see Matt’s segment on Application Visibility and Control from that show right now as a great pre-study for the workshop above. I also recommend our recent ‘Fundamentals of the Cloud Services Router’ as a secondary study resource. Matt was instrumental in our writing and creation of this tool as well and I think you will find it valuable.
Heres the thing -- The Cloud and the Network are very co-dependent. The network is poised for incredible leaps of intelligence now more than ever with this pressure from cloud implementations being quick to reveal weakness. I have even heard where the WAN has been re-defined as “Weak Area Network.” Why? Poor performance, inadequate security, lack of visibility and complex management, just to name a few An intelligent network endows the WAN with the efficiency of cloud and and the confidence of a private network.