What is vPath? Well, if VXLANs can set up secure tunnels over a shared, multi-tenant virtual network, vPath is a feature of the Nexus 1000V virtual switch that can redirect traffic to virtual application services before the switch sends the packets down into the virtual machine. Very important stuff, but how does it do that? I find that my blog posts are more popular the less I type, and the more I embed cool TechWiseTV videos that illustrate the concept, so I’m dusting off this classic from the TWTV team on just how vPath does that with our Virtual Security Gateway (VSG). Take it away Robb…
After our Open Network Environment (Cisco ONE) announcement at Cisco live!, where we unveiled our strategy for network programmability, Jim Duffy at NetworkWorld had a very interesting article that asks a key question, “What are the killer apps for software defined networks?” While SDN technology is very exciting and holds a great deal of promise, the answer to that question will ultimately determine how quickly it is adopted and by who. The consensus is that network virtualization or virtual network overlays are one of the early killer apps that software defined networks can certainly enable (when coupled with other technologies), which is exactly why Cisco made virtual overlays one of the three solution pillars of its ONE announcement. As I mentioned in my TechwiseTV video on virtual overlays, the primary use case for SDN/OpenFlow research in universities is also campus network slicing or creating virtual network partitions for test and production environments, e.g., to share a physical network. As noted in Duffy’s article, virtual overlays can be done with or without OpenFlow.
In the aftermath of a major launch, after reading the press and analyst coverage of the news, I always ask what we could have made clearer, what could have been highlighted better, or how could we have made the complexity of some of the details easier to understand. One such point that probably could have been clarified is just how “open” the Open Network Environment (what’s in a name anyway?). Specifically, regarding our Nexus 1000V virtual overlay framework, there were some comments and questions about how open and interoperable this overlay framework was, especially compared to other vendors touting programmable overlays. One financial analyst firm even stated that our overlay networks had some great advantages, but only worked with Cisco switches. Read More »
For anyone who has ventured to a tech conference, flown into an airport or even driven down CA highway 101 this past year, it’s clear that cloud is still top of mind for many technical and business decision makers. We believe this means that enterprises are no longer just talking the talk, but are looking deeper into their networking infrastructure to see if they are ready to meet the challenges of cloud, virtualization and workload mobility. At Cisco, it is our job to help build clouds that can handle elastic demand and efficiently use the networking infrastructure at both a virtual and physical level. This week, we are announcing several key upgrades to the Nexus 1000V family that bring scalability and cloud readiness to the network.
In this show, we cover the new ASA 1000V and how this security family represents the oldest yet most future ready security platform.
What is the relevance of a Firewall in today’s modern world where security must encompass every part of increasingly distributed operations? What is really meant by a Cloud Ready Firewall? What the heck is this new ‘virtual ASA’…didn’t we already have the Virtual Security Gateway? Perhaps its all just marketing hype…
In my estimation, the cloud is overhyped in the short run, but underestimated in the long run. Every enterprise is now exploring some aspect of a cloud based service model – whether this represents you now or in the future, the notion of a flexible security solution remains important. Incredible advances for data center infrastructure with the flexibility and speed enabled by the virtualized tools we are all now using – MUST be accompanied by equally capable security tools.
The original maxim still rings true: Security must be addressed at every layer.
With all the of the changes happening with the Data Center, the IT department is constantly faced with the challenge of balancing “the new coolness” (Virtualization, 10Gb Ethernet, Cloud Computing, Unified <insert_technology_here>) and still being able to manage the daily operations of the business. Adding to the challenge is the changing architectures that these new technologies bring to the Data Center. Read More »