Cisco Intelligent Traffic Director (ITD) is an innovative solution to bridge the performance gap between a multi-terabit switch and gigabit servers and appliances. It is a hardware based multi-terabit layer 4 load-balancing, traffic steering and clustering solution on the Nexus 5k/6k/7k/9k series of switches.
It allows customers to deploy servers and appliances from any vendor with no network or topology changes. With a few simple configuration steps on a Cisco Nexus switch, customers can create an appliance or server cluster and deploy multiple devices to scale service capacity with ease. The servers or appliances do not have to be directly connected to the Cisco Nexus switch.
ITD won the Best of Interop 2015 in Data Center Category.
With our patent pending innovative algorithms, ITD (Intelligent Traffic Director) supports IP-stickiness, resiliency, consistent hash, exclude access-list, NAT (EFT), VIP, health monitoring, sophisticated failure handling policies, N+M redundancy, IPv4, IPv6, VRF, weighted load-balancing, bi-directional flow-coherency, and IPSLA probes including DNS. There is no service module or external appliance needed. ITD provides order of magnitude CAPEX and OPEX savings for the customers. ITD is much superior than legacy solutions like PBR, WCCP, ECMP, port-channel, layer-4 load-balancer appliances.
ITD provides :
- Hardware based multi-terabit/s L3/L4 load-balancing at wire-speed.
- Zero latency load-balancing.
- CAPEX savings : No service module or external L3/L4 load-balancer needed. Every Nexus port can be used as load-balancer.
- Redirect line-rate traffic to any devices, for example web cache engines, Web Accelerator Engines (WAE), video-caches, etc.
- Capability to create clusters of devices, for example, Firewalls, Intrusion Prevention System (IPS), or Web Application Firewall (WAF), Hadoop cluster
- Resilient (like resilient ECMP), Consistent hash
- VIP based L4 load-balancing
- NAT (available for EFT/PoC). Allows non-DSR deployments.
- Weighted load-balancing
- Load-balances to large number of devices/servers
- ACL along with redirection and load balancing simultaneously.
- Bi-directional flow-coherency. Traffic from A–>B and B–>A goes to same node.
- Order of magnitude OPEX savings : reduction in configuration, and ease of deployment
- Order of magnitude CAPEX savings : Wiring, Power, Rackspace and Cost savings
- The servers/appliances don’t have to be directly connected to Nexus switch
- Monitoring the health of servers/appliances.
- N + M redundancy.
- Automatic failure handling of servers/appliances.
- VRF support, vPC support, VDC support
- Supported on all linecards of Nexus 9k/7k/6k/5k series.
- Supports both IPv4 and IPv6
- Cisco Prime DCNM Support
- exclude access-list
- No certification, integration, or qualification needed between the devices and the Cisco NX-OS switch.
- The feature does not add any load to the supervisor CPU.
- ITD uses orders of magnitude less hardware TCAM resources than WCCP.
- Handles unlimited number of flows.
- Load-balance traffic to 256 servers of 10Gbps each.
- Load-balance to cluster of Firewalls. ITD is much superior than PBR.
- Scale IPS, IDS and WAF by load-balancing to standalone devices.
- Scale the NFV solution by load-balancing to low cost VM/container based NFV.
- Scale the WAAS / WAE solution.
- Scale the VDS-TC (video-caching) solution.
- Scale the Layer-7 load-balancer, by distributing traffic to L7 LBs.
- ECMP/Port-channel cause re-hashing of flows. ITD is resilient, and doesn’t cause re-hashing on node add/delete/failure.
Documentation, slides, videos:
Email Query or feedback:email@example.com
Please note that ITD is not a replacement for Layer-7 load-balancer (URL, cookies, SSL, etc). Please email: firstname.lastname@example.org for further questions.
Connect on twitter: @samar4
Tags: #BestofInterop, #CiscoITD, #CiscoLive2015, #CLUS, ACE, ACI, ASA, ASA 1000V Cloud Firewall, best of interop, Best of Interop 2015, Best of Interop Finalist, Big Data, cache engines, Cisco, Cisco Nexus, Cisco Nexus 5600, Cisco Nexus 7000, Cisco Nexus 9000, Cisco Nexus Switches, Cisco Prime NAM, Cisco WAAS, ciscolive, citrix, cloud, Cloud Computing, container, data center, Data Center container, F5, FirePOWER, Imperva, Imperva SecureSphere WAF, innovation, interop, IPS, ITD, load balancer, Load Balancing, nexus, Nexus 7000, NFV, SDN, security, server load balancer, Service Provider, Sourcefire, video, Web Application Firewall
Data traffic has grown dramatically in the recent years, leading to increased deployment of network service appliances and servers in enterprise, data center, and cloud environments. To address the corresponding business needs, network switch and router architecture has evolved to support multi-terabit capacity. However, service appliance and server capacity remained limited to a few gigabits, far below switch capacity.
Cisco Intelligent Traffic Director (ITD) is an innovative solution to bridge the performance gap between a multi-terabit switch and gigabit servers and appliances. It is an hardware based multi-terabit layer 4 load-balancing, traffic steering and clustering solution on the Nexus 7000 and 7700 series of switches.
Read More »
Tags: ACE, ASA, ASA 1000V Cloud Firewall, cache engines, Cisco Prime NAM, Cisco WAAS, citrix, F5, Imperva, Imperva SecureSphere WAF, IPS, ITD, load balancer, Load Balancing, server load balancer, Web Application Firewall
There’s been a great deal of excitement, interest and certainly follow-on questions after we announced our new hybrid cloud integration solution, Nexus 1000V InterCloud. My earlier three-part blog consisted of Part 1 on the architecture and features, Part 2 on the hybrid cloud management specifics, and Part 3 a recap of the frequently asked questions.
And now, we have the video demonstration. At Cisco live! last month in London, TechWise TV‘s Robb Boyd caught up with Prashant Gandhi, Sr. Director of Product Management in our Server Access and Virtualization Business Unit, before the trade show floor opened and recorded a demonstration of the new hybrid cloud infrastructure.
In this demo, Prashant quickly migrates a few virtual machines from our simulated private cloud to Amazon Web Services hosting servers. Part of the ease of use is through integration of Cisco’s Virtual Network Management Center (VNMC) InterCloud to Amazon cloud management tools, and the ability to view and manage virtual machines in both the private data center as well as those hosted in the cloud. The other important point about Nexus 1000V InterCloud is not only how it provides all the seamless layer 2 connectivity and security to connect the data center to public cloud resources quickly and easily, but security and application policies can be mirrored and migrated just as easily in the public cloud through the use and deployment of Cisco Cloud Network Services, such as our Virtual Security Gateway, the ASA 1000V Cloud Firewall or vWAAS. Take it away Robb and Prashant…
Tags: ASA 1000V Cloud Firewall, cisco live, Hybrid Cloud, Nexus 1000v, Nexus 1000V InterCloud, Virtual Security Gateway, vWAAS
We had some sneak peeks at CiscoLive in London but as you probably know by now, this stuff was just formally announced last week. Several demos worth looking at give you the foundation for what is important. Shashi Kiran is leading this effort and you can always count on a good quote:
“Cisco takes Unified Fabric to the next level delivering compelling customer value in an evolutionary manner, we offer a switch with the industry’s highest 40GbE density per rack unit, the simplest solution for the hybrid cloud model, and the most extensible network controller.”
Interesting….tell us more…
Three areas of innovation: How we Scale (Nexus 6000), how we enable the Hybrid deployment model (Nexus 1000v InterCloud) and how we open it all up with Cisco ONE (Open Networking Environment)
The family expands with the Nexus 6000
The new Nexus 6004 switch offers extremely
Tags: ASA 1000V Cloud Firewall, Cisco Intelligent Automation for Cloud, Cisco Prime NAM, forrester, Hybrid Cloud, InterCloud, LISP, Nexus 1000v, OTV, private cloud, Public Cloud, Virtual Security Gateway, vPath, vsg, vWAAS, VXLAN
Today we wrap up our three part introduction of Cisco’s new hybrid cloud infrastructure, Nexus 1000V InterCloud. In Part 1, we provided an overview of the architecture and the components that make up Nexus 1000V InterCloud. In Part 2, we looked a bit more closely into the single pane management of the cloud network and resources across the on-premises private cloud and the cloud service provider. In Part 3, we’ll answer some of the most frequently asked questions we’ve been getting from customers, analysts and the press in the early stages of this announcement.
Q: What is Nexus 1000V InterCloud? What part of the hybrid cloud infrastructure does it comprise? Is it software, hardware, some combination of both? Is it a switch, a server or an application?
A: Nexus 1000V InterCloud is a set of software components that run as virtual machines on a variety of servers. It forms the infrastructure that extendss your existing on-premises virtual network and virtual services to cloud providers in a seamless and secure manner. It provides all the infrastructure and protocols to support VM migration from the data center to the cloud provider. Effectively, Nexus 1000V InterCloud (with VNMC InterCloud management software) creates a secure, on-demand layer-2 virtual private cloud (VPC).
Read More »
Tags: ASA 1000V Cloud Firewall, Citrix NetScaler VPX, Hybrid Cloud, Imperva SecureSphere WAF, Intelligent Automation for Cloud, Nexus 1000v, Nexus 1000V InterCloud, vsg, vWAAS