Cisco Blogs


Cisco Blog > Data Center and Cloud

New Nexus 1000V Virtual Switch Release 3.1 Now Available

There has been some seismic activity happening in Bay Area and the epicenter for all Virtual Networking shifts is right here at Cisco HQ in San Jose. (Our sympathies go to all those affected by the real earthquake further to the north.)  At Cisco, it’s all about the applications and the shift to dynamic network virtualization. Cisco pioneered virtual networking with Nexus 1000V virtual switch and recently incorporated it in the application aware Application Virtual Switch (AVS), for Cisco ACI-enabled networks. Cisco is excited to announce the availability of  Nexus 1000 Release 3.1 of Nexus1000V for vSphere (available for download here). We are showing the upcoming generation of the virtual switch at VMworld in San Francisco this week.

Nexus1000V is the edge switch for virtual environments, bringing the network edge right up to the virtual machine, and connecting virtual ports to the physical network and beyond. The Nexus 1000V is the foundation for our virtual network overlay portfolio, including all of our virtual L4-7 application and security services, our cloud orchestration software, VXLANs and more. It is also at the heart of AVS, a purpose-built, hypervisor-resident virtual network edge switch designed for the Application Centric Infrastructure.

Release 3.1 is a new major release enabling enterprise and cloud provider customers running the vSphere hypervisor to leverage the distributed virtual firewall VSG, expand VXLAN footprint in the datacenter, improve secure isolation thru Cisco TrustSec and dramatically simplify updates through Cisco VSUM (Virtual Switch Update Manager).  Most of the new features are value add to the Advanced Edition.  New customers will need a Ver 3 specific license to use the full functionality of Ver 3.  Existing customers with support contract are automatically entitled to free upgrade to Ver 3. AVS incorporates Nexus 1000V capabilities with consistent application policy enforcement for virtual workloads and unprecedented end-to-end visibility for applications in your data center.

Features of the new Nexus 1000V Release 3.1:

  • Scale
    • Increased Scalability (Advanced Edition) – More than doubles the scale from the previous release. The virtual switch now supports 250 hosts/servers per switch with 10,000 ports per switch. In addition it supports 4094 active VLANs and  16 million VXLAN (6144 active VXLANs) per switch across 6144 port profiles.
    • VXLAN control plane: BGP based control plane across multiple virtual switches provide expanded Layer 2 domain footprint that can potentially support nearly 40,000 VMs in a single domain
    • Increased Resiliency – Supports headless Port bring up where Virtual Machines can be bought up on the host even if VEM is offline i.e. the VSM is not reachable by VEM. Both VSM headful and headless VM vMotion is supported.
  • Security
    • Cisco TrustSec 2.0 (Advanced Edition) – Continues to extended Cisco TrustSec solutions for network based segmentation of users and physical workloads, leveraging Security Group Tags (SGT) for defining security segments and SGACL support  (Enforcement) and Native(in-line) SGT tagging.
    • BPDU Guard -- Keeps virtual network safe from misconfigured VLANs and strictly enforces VLAN boundries.  It prevents Misconfigured VLAN Rogue devices from flooding the network
    • Storm Control -- Prevent network disruptions from a broadcast, multicast, or unknown-unicast traffic storm.
  • Simplification
    • Simplified Deployment, upgrade and visibility with Cisco VSUM – Cisco VSUM is a FREE virtual appliance that enables Server and Network administrators to Deploy, Upgrade and Monitor Nexus1000V and to Deploy and Upgrade Cisco AVS from within their vCenter web interface.
    • Customer Experience - Here’s what one of our Beta customers, Josh Coen says about Cisco VSUM. Josh is a Principal Cloud Architect with Varrow and has been working in the IT industry since 1999, with a heavy focus on virtualization and storage since 2008.

Nexus 1000V has already reached the 10,000 customer milestone with some customers purchasing 1000+ CPU licenses.  Nexus 1000V continues to provide the foundation for the most advanced virtual networks by supporting, 1) multiple hypervisor environments, such as VMware vSphere, Microsoft Hyper-V and Openstack KVM 2) the most extensive set of virtual network services, including ASA 1000V Cloud Firewall, distributed zone-based virtual firewall, vWAAS WAN optimization, the Cloud Services Router (CSR) 1000V, Cisco Prime Network Analysis Module (NAM) and advanced service insertion and chaining technology, vPath and 3) a true management control plane that provides greater policy and control features for richer networking functionality.

We’ll be showing a lot of these features this week. Come by our booth and check it out. If you are around #VMworld this week, give us a shout out on twitter using Cisco hash tag #ciscovmw. For those of you that can’t make it out to VMworld, listen to the review of these new features in Ver 3.1 in this webcast.

Tags: , , , , , , , , , , , , , , , , ,

Evolution of Cisco Prime Network Services Controller

Cisco Prime Network Services Controller 3.2.2 is available for download, follow this link to download the software and documentation. The 3.2.2 release incorporates a number of new features on top of 3.2.1 release. Refer to an earlier blog for the features introduced in 3.2.1 release. Following video provides a brief introduction to Prime Network Services Controller.

Following are some of the key capabilities introduced in Cisco Prime Network Services Controller 3.2.2 release:

  • Prime Network Services Controller operating in OpenStack environment supporting Edge Router and Load Balancer network services
  • License automation for CSR 1000V, Citrix NetScaler VPX and Citrix NetScaler 1000V
  • Automatic instantiation of Compute Firewall, Edge Router and Load Balancer network services with Dynamic Fabric Automation

OpenStack support

The Cisco Prime Network Services Controller 3.2.1 supports Microsoft Hyper-V and VMware vSphere environments. Prime Network Services Controller 3.2.2 extends multi-hypervisor capabilities by introducing the support for OpenStack (KVM) in addition to Microsoft Hyper-V and VMware vSphere.

Read More »

Tags: , , , , , , , ,

Introducing Cisco Prime Network Services Controller 3.2

The Cisco Prime Network Services Controller team is pleased to announce the availability of 3.2 release. This release incorporates a number of new features and functionalities to build virtual data centers (VDCs) with various network topologies. Follow this link to download the software and documentation.

Designed for multi-tenant cloud deployments, Cisco Prime Network Services Controller offers scalable, and automation-centric management for virtualized data center and cloud environments.  The Cisco Prime Network Services Controller is a virtual appliance that provides centralized device and policy management of virtual networking services. It provides a unified northbound API (XML payload over HTTPS) to allow the creation of dynamic data center that includes switching, routing, fire-walling and load-balancing functions.

Cisco Prime Network Services Controller is built on an information-model architecture in which each managed device is represented by its subcomponents (or objects), which are parametrically defined. It also uses Services profiles for model-based configuration of virtual devices policies. A service profile is a collection of device policies and configuration templates that can be predefined and applied on demand at the time of virtual appliance instantiation or later. Cisco Prime Network Services Controller enables

  • Flexible and simple mechanism to managing virtualized infrastructure using Cisco VSG, Cisco ASA 1000V, Cisco CSR 1000V virtual services as well as Citrix’s NetScaler virtual load balancers (NetScaler VPX and NetScaler 1000V)
  • Cisco InterCloud for virtual machine (VM) workload management and migration between the enterprise data center (private cloud) and public clouds
  • Cisco VSG, Cisco ASA 1000V, Cisco CSR 1000V, NetScaler VPX and NetScaler 1000V services in Dynamic Fabric Automation (DFA) solution

Read More »

Tags: , , , , , , , , ,

Cisco live Redux: Nexus 1000V InterCloud, Now Available, is a Hit to Enable Hybrid Cloud

July 8, 2013 at 9:00 am PST
Cisco live party

Who doesn’t love a Cisco Live! party?

If you live in the US, I hope you had a good 4th of July holiday last week. It’s already been over a week since a very exciting Cisco live! If you were there in person, or you caught much of it on video, I’m sure you know about the enthusiasm and excitement from an unexpectedly large number of attendees. Crowds in the World of Solutions were amazing, especially trying to learn about our new Cisco Dynamic Fabric Automation (DFA) technology, as well as the new enhancements in our Nexus 1000V virtual networking portfolio, like Citrix NetScaler 1000V.

While on the Nexus 1000V topic, I would like to point out a great blog write-up by the always insightful Jason Edelman, a Solution Architect at a national solution provider, on our Nexus 1000V InterCloud hybrid cloud solution. Nexus 1000V InterCloud received a great deal of interest and attention at Cisco live and may have been the busiest pod in our virtual networking area in the World of Solutions. The concept of hybrid cloud is really gaining traction and organizations appreciate the importance of now seamlessly extending virtual overlays from the on-premises data center to public cloud providers as Nexus 1000V InterCloud now enables. Nexus 1000V InterCloud began shipping last week, as well (with vPath and the Virtual Services Gateway coming soon), so the timing of all this interest couldn’t be better. To download the Nexus 1000V InterCloud GA image for evaluation, go here.

One of the aspects of InterCloud that we were talking about in more detail at Cisco live! was the internal security. The architecture supports complete encryption of all traffic not only between the enterprise or on-premises data center and the service provider cloud, but encrypts all data-in-motion within the provider cloud, to protect traffic from exposure to the service provider and other tenants. This encrypted tunnel includes all traffic going to the virtual services residing in the cloud. And this is on top of the security provided by the virtual services (when supported in InterCloud in Q4 CY 13), such as the virtual firewalls, VSG and ASA 1000V Cloud Firewall.

InterCloud Security Architecture

Read More »

Tags: , , , , , , , , , ,

Public Beta of Nexus 1000V virtual switch for Microsoft Hyper-V is Now Available

March 7, 2013 at 2:07 pm PST

If you missed our webcast on the upcoming Nexus 1000V release for Microsoft Hyper-V, you missed the announcement that we are now making available a beta version to the general public, as of March 6. (Note: Everyone asks, so, no, we haven’t announced the availability date for the GA version yet, but it’s coming soon). This should be great news for the large number of folks that we had to turn away that we couldn’t support in our earlier alpha and high-touch beta releases.

In the webcast, Damian Flynn, a 2012 Microsoft MVP for Data Center and Cloud, and IT Architect for Lionbridge Technologies in Ireland, who was one of the early beta-testers for the Nexus 1000V Hyper-V version, gave an outstanding overview of the Nexus 1000V in a Hyper-V and System Center environment. It’s worth listening to the webcast replay if you have the time. Damian had some really exciting things to say about his experiences. The webcast was admirably co-hosted by our own Appaji Malla, product manager for  Nexus 1000V for Hyper-V.

Hyper-V Beta ProcessThe new beta version is available to anyone with a valid email address, and who provide their company name and contact address. Beta users must be willing to test the product and provide constructive feedback. Beta users are also encouraged to participate in the discussion forums and contribute to the Nexus 1000V beta community site.

As described in this week’s webcast (download the slides here; or watch the replay here), the beta process starts with an email to: beta-n1kv-hyperv@cisco.com. A link to a beta site will be sent in an email invitation (you must have a userID on Cisco.com to access this site). You will then be prompted to accept the beta agreement, and then get access to the beta code and documentation. Please use the available discussion forums for support, questions and feedback.   Read More »

Tags: , , , , ,