SlideShare a Scribd company logo
1 of 88
Download to read offline
Cisco ConfidentialĀ© 2015 Cisco and/or its affiliates. All rights reserved. 1
T-DC-15-I
Cisco Connect Toronto 2016
Hitchhikers Guide to Data
Center Virtualization &
Workload Consolidation
Joshua Craig Kaya
Technology Solution Architect - Data Center
May 19, 2016
In collaboration with
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 2
Agenda:
ā€¢ Introduction to Data Center Workload Consolidation
ā€¢ Modern Network Segmentation
ā€¢ Advanced Microsegmentation
ā€¢ Container Workload Consolidation
Cisco Confidential 3C97-732424-00 Ā© 2014 Cisco and/or its affiliates. All rights reserved.
Introduction to Data Center
Workload Consolidation
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 4
Mainframe Example: Workload Management
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 5
Midrange Example: Logical Partitions
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 6
Hypervisors & Containers
6
Hardware
Operating System
Hypervisor
Virtual Machine
Operating
System
Bins / libs
App App
Virtual Machine
Operating
System
Bins / libs
App App
Hardware
Hypervisor
Virtual Machine
Operating
System
Bins / libs
App App
Virtual Machine
Operating
System
Bins / libs
App App
Hardware
Operating System
Container
Bins / libs
App App
Container
Bins / libs
App App
Type 1 Hypervisor Type 2 Hypervisor Linux Containers (LXC)
Containers share the OS kernel of the host and thus are lightweight.
However, each container must have the same OS kernel.
Containers are isolated, but share OS
and, where appropriate, libs / bins.
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 7
VM Networking Example
Cisco Nexus 1000V - Bringing Network Edge to Hypervisor
VM Connection Policy
ļ‚§ Defined in the network
ļ‚§ Applied in vCenter
ļ‚§ Linked to VM UUID
CiscoĀ® Nexus
1000V VEM
Faster VM Deployment - Policy Based VM Connectivity
vCenter Cisco Nexus
1000V VSM
WEB Apps
HR
DB
DMZ
Port Profile Defined Policies
VMs Need to Move
ļ‚§ VMotion
ļ‚§ DRS
ļ‚§ SW upgrade/path
ļ‚§ Hardware failure
ļ‚§ VM policy mobility
ļ‚§ VMotion for the network
ļ‚§ Better VM security
Resulting in:
ļ‚§ A consistent connection state
ļ‚§ Operational efficiency for VI and network admins
Secure workload mobility with rich services
Cisco NexusĀ®
1000V Virtual
Ethernet Module
(VEM)
VMware vSphere
VMware vSphere
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 8
Cisco Nexus 1000V for Hyper-V
Consistent Multi-Hypervisor Platform
SCVMM Integration
VXLAN based Network Virtualization
Advance NX-OS feature-set
VSG based distributed Security
Nexus 1000V VSM
Extensible vSwitch
Capture
Filtering
Forwarding
VNICs
PNICs
Consistent operational model
VM VM VM VM
Nexus 1000V VEM
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 9
Application Centric Infrastructure Components
Application
Network Profile
Orchestration
Frameworks
Hypervisor
Management
OVM
Systems
Management
Centralized Policy Management
Open APIs, Open Source,
Open StandardsAPIC
Fabric
Automation Enterprise
MonitoringACI
Ecosystem
Partners
End Points
Physical &
Virtual
Physical
Networking
Nexus 2K
Nexus 7K
Hypervisors and
Virtual Networking
Compute L4ā€“L7
Services
Storage Multi DC
WAN and Cloud
Integrated
WAN Edge
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 10
ā€¢ OPFLEX enabled vSwitch
ā€¢ Single point of control via APIC
ā€¢ Consistent policy between virtual and physical
fabric ports.
ā€¢ Supports a Full Layer 2 Network (Nexus
7k/6k/5k/3k/2k/FI) between Nexus 9k and
AVS: Investment Protection
ā€¢ VDS (VMware Distributed Switch) can only
support a single L2 switch between N9k and
VDS
ā€¢ AVS enables Micro segmentation (VM
attributes based) and Distributed Firewall
AVS Providing Advanced Virtual Security Features for ACI
L2 NetworkOpFlex
OpFlex
OpFlex
VMVM VM VM
VMVM VM VM
VMVM VM VM
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 11
Unified Fabricā€™s SingleConnect Technology
Provides an Efficient Foundation for Growth
One connection type for all protocols
SINGLECONNECT TECHNOLOGY
Efficient capacity scaling
Automated I/O bandwidth allocation
Auto-discovery & self-integrating components:
network and compute
Direct SAN access
Wire once then manage through software
Traditional Cisco Unified Fabric
As you scale, simplified architecture reduces cost and facilitates growth
SAN A SAN BETH 1 ETH 2
10 GE Ethernet
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 12
UCSD Express
UCS 6200 Series
Fabric Interconnect
UCS Manager
UCS C240 M4 Series
Rack Server
UCS C3160 Rack
Server
Unified Management with UCSD Express for Big Data
Programmability, Scalability and Automation
Hadoop
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 13
Comparing Traditional Architectures to UCS CPA for Big Data
As your Big Data deployment grows, significant and ongoing savings create a compelling business case
# CABLES
Traditional Approach With Cisco UCS
At 32 Servers 180 80
At 64 Servers 360 128-160
At 160 Servers 530-870 320-400
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 14
Hyperconverged Scale Out and Distributed File System
CONTROLLE
R
VM
HYPERVISOR
VM VM VM
HYPERCONVERGED DATA PLATFORMHYPERCONVERGED DATA PLATFORMHYPERCONVERGED DATA PLATFORM
Start With as Few
as Three Nodes
Hyperconverged
Data Platform
Installs in Minutes
Add Servers, One
or More at a Time
Linearly Scale
Compute, Storage
Performance,
and Capacity
Distribute and
Rebalance Data
Across Servers
Automatically
Retire Older
Servers
HYPERCONVERGED DATA PLATFORM
CONTROLLE
R
VM
HYPERVISOR
VM VM VM
CONTROLLE
R
VM
HYPERVISOR
VM VM VM
CONTROLLE
R
VM
HYPERVISOR
VM VM VM
CONTROLLE
R
VM
HYPERVISOR
VM VM VM
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 15
High Resiliency, Fast Recovery
Platform Can Sustain
Simultaneous 2 Node Failure
Without Data Loss; Replication
Factor Is Tunable
If a Node Fails, the Evacuated
VMs Re-attach With No Data
Movement Required
Replacement Node Automatically
Configured Via UCS Service Profile
HX Data Platform Automatically
Re-Distributes Data to Node
CONTROLLERHYPERVISORCONTROLLERHYPERVISOR CONTROLLERHYPERVISOR CONTROLLERHYPERVISOR
VM VMVM VM VMVM VM VMVM VM VMVM
HX Data PlatformHX Data Platform
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 16
High SecurityInternalDMZ
Typical Network Topology - Shortcomings
ADC ADC
FW FW
(vlan/subnet)(vlan/subnet)
(vlan/subnet)(vlan/subnet)
(vlan/subnet)
(vlan/subnet)
Cisco Confidential 17C97-732424-00 Ā© 2014 Cisco and/or its affiliates. All rights reserved.
Modern Network Segmentation
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 18
EXISTING 2/3-TIER DESIGNS PROGRAMMABLE SDN OVERLAY MODEL
APPLICATION CENTRIC
INFRASTRUCTURE
Modernized Operating System
Programmable Open APIs
Linux Containers
Integrated Network Virtualization
(no Gateways)
VXLAN / BGP
Third Party Controller
Any Hypervisor
Physical & Virtual
Open APIā€™s & Controller
APIC
Modernizing the Data Center ā€“ Nexus 9K and ACI
Broad and Deep Ecosystem
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 19
ā€¢ VXLAN Provides the Ethernet L2 services as VLAN does,
but with greater extensibility and flexibility.
L2 overlay over L3 underlay with use of any IP routing protocol.
Uses MAC in IP (UDP) encapsulation, allowing 24-bit VXLAN id
enabling up to 16 million unique networks.
ā€¢ Optimized Flooding
Leverages multicast in the transport network to simulate flooding
behavior for broadcast, unknown unicast, and multicast in the L2
segment
ā€¢ Optimal Routing
Leverage ECMP (Equal Cost Multi-pathing) to achieve optimal path
usage over the transport network.
VXLANā€”Virtual Extensible LAN
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 21
Ā© 2015 Cisco and/or its affiliates. All rights reserved. Public
VxLAN & EVPN ā€“ Ethernet VPN
RFC 7348 Virtual eXtensible Local Area Network
RFC 7432 BGP MPLS based Ethernet VPNs
A Network Virtualization Overlay Solution using EVPN
ā€¢ draft-ietf-bess-evpn-overlay
Integrated Routing and Bridging in EVPN
ā€¢ draft-ietf-bess-evpn-inter-subnet-forwarding
IP Prefix Advertisement in E-VPN
ā€¢ draft-rabadan-l2vpn-evpn-evpn-prefix-advertisement
VXLAN/EVPN interoperability demonstrated during MPLS/SDN World Congress in Paris
Participating Vendors are Cisco, Juniper, Alcatel Lucent & Ixia
Independently Tested at EANTC with public available Whitepaper
Ciscohttp://www.eantc.de/showcases/mpls_sdn_2015/intro.html
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 22
Cisco Confidential 12Ā© 2013-2014 Cisco and/or its affiliates. All rights reserved.
ļ‚§
ļ‚§
ļ‚§
ļ‚§
ļ‚§
ļ‚§
Standards based Overlay (VXLAN) with Standards based Control-
Plane (EVPN MP-BGP)
Layer-2 MAC and Layer-3 IP information distribution by Control-Plane
(BGP)
Forwarding decision based on Control-Plane (minimizes flooding)
Integrated Routing/Bridging (IRB) for Optimized Forwarding in the
Overlay
Higher scalability than VXLAN Multicast-based only transport (F&L)
Control Plane only or with Data plane function (Leafs and Border)
What is VXLAN/EVPN?
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 23
Why VXLAN Overlay?
Customer Needs VXLAN Delivered
Any workload anywhere ā€“ VLANs limited
by L3 boundaries
Any Workload anywhere- across Layer 3
boundaries
VM Mobility Seamless VM Mobility
Scale above 4k Segments (VLAN
limitation)
Scale up to 16M segments
Secure Multi-tenancy Traffic & Address Isolation
VTEP VTEP VTEP VTEP VTEP
VXLAN Overlay
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 24
VXLAN provides a Fabric with Segmentation, IP Mobility &
Scale
Why VXLAN?
ā€œStandardsā€ based Overlay
Leverages Layer-3 ECMP ā€“ all links forwarding
Increased Name-Space to 16M identifier
Integration of Physical and Virtual
Itā€™s SDN ļŠ
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 25
Challenges with Traditional VXLAN Deployments
Scale and Mobility Limitations
LIMITED SCALE
Flood and learn (BUM)- Inefficient Bandwidth Utilization
Resource Intensive ā€“ Large MAC Tables
LIMITED WORKLOAD MOBILITY
Centralized Gateways ā€“ Traffic Hair-pining
Sub-Optimal Traffic Flow
VTEP VTEP VTEP VTEP VTEP
VXLAN Overlay
Barrier for Scaling out Large Data Centers and Cloud Deployments
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 26
Next-Gen VXLAN Fabric with BGP-EVPN Control Plane
Delivering Multi-Tenancy and Seamless Host Mobility at Cloud Scale
INCREASED SCALE
Eliminates Flooding
Conversational Learning
Policy-Based Updates
OPTIMIZED MOBILITY
Distributed Anycast Gwy
Integrated Routing /Bridging
vPC & ECMP
INTEROPERABLE
Standards Based
BGP-EVPN
VXLAN
VTEP VTEP VTEP VTEP VTEP
Route
Reflector
Route
Reflector
BGP-EVPN VXLAN Overlay
BGP Peers
Breaking the Traditional VXLAN Scale Barriers
OPERATIONAL FLEXIBILITY
Layer 2 or Layer 3
Controller Choice
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 27
ACI Fabric ā€“ An IP network with an Integrated Overlay
Virtual and Physical
ā€¢ Ciscoā€™s ACI solution leverages an integrated VXLAN based overlay
ā€¢ IP Network for Transport
ā€¢ VXLAN based tunnel end points (VTEP)
ā€¢ VTEP discovery via infrastructure routing
ā€¢ Directory (Mapping) service for EID (host MAC and IP address) to VTEP lookup
PayloadIPVXLANVTEP
APIC
VTEP VTEP VTEP VTEP VTEP VTEP
vSwitchvSwitch VTEPVTEP
IP Transport
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 28
VXLAN
VNID = 5789
VXLAN
VNID = 11348
NVGRE
VSID = 7456
Any to Any
802.1Q
VLAN 50
Normalized
Encapsulation
Localized
Encapsulation
IP Fabric Using
VXLAN Tagging
PayloadIPVXLANVTEP
ā€¢ All traffic within the ACI Fabric is encapsulated with an extended VXLAN header
ā€¢ External VLAN, VXLAN, NVGRE tags are mapped at ingress to an internal VXLAN tag
ā€¢ Forwarding is not limited to, nor constrained within, the encapsulation type or
encapsulation ā€˜overlayā€™ network
ā€¢ External identifies are localized to the Leaf or Leaf port, allowing re-use and/or translation
if required
Payload
Payload
Payload
Payload
Payload
Eth
IP
VXLAN
Outer
IP
IPNVGRE
Outer
IP
IP802.1Q
Eth
IP
Eth
MAC
Normalization of Ingress
Encapsulation
ACI Fabric ā€“ Integrated Overlay
Data Path - Encapsulation Normalization
28
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 29
ACI Fabric
IETF VXLAN Group Based Policy
ACI VXLAN (VXLAN) header provides a tagging mechanism to identify properties associated with frames forwarded through an
ACI capable fabric. It is an extension of the Layer 2 LISP protocol (draft-smith-lisp-layer2-01) with the additional of policy group,
load and path metric, counter and ingress port and encapsulation information. The VXLAN header is not associated with a
specific L2 segment or L3 domain but provides a multi-function tagging mechanism used in ACI Application Defined Networking
enabled fabric.
Ethernet
Header
Payload FCS
Outer
IP
Outer
UDP
VXLAN
Outer
Ethernet
Inner
Ethernet
Payload
New
FCS
VXLAN Instance ID (VNID) M/LB/SPSource GroupFlags
Rsvd
8 Bytes
1 Byte
N L Rsvd I
N: The N bit is the nonce-present bit
L: The L bit is the Locator-Status-Bits field enabled bit
I: The I bit is the Instance ID bit, Indicates the presence of the VXLAN Network ID
(VNID) field. When set, it indicates that the VNID field is valid
IP
Header
Inner IP
Header
Flags/DR
E
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 30
ACI leverages VXLAN
(RFC Draft)
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 31
Troubleshooting Workflows (e.g. EP to EP)
ā€¢ Webserver and
Application servers
are having issues.
ā€¢ Used the tool and
gave us logical
topology and helped
us in isolating the
issue.
ā€¢ We found issue is -
LLDP neighbor is
bridge and its port
vlan 1 mismatches
with the local port vlan
Unspecified
Go see all this working in the World of Solutions ļŠ
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 32
Drag and Drop GUI ā€“ 11.2 Release
Cisco Confidential 33C97-732424-00 Ā© 2014 Cisco and/or its affiliates. All rights reserved.
Advanced Microsegmentation
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 34
IP Routing SPT
VLAN
IP
Bridging
Start putting aside your networking notions
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 35
High SecurityInternalDMZ
Review: Typical Network Topology - Shortcomings
ADC ADC
FW FW
(vlan/subnet)(vlan/subnet)
(vlan/subnet)(vlan/subnet)
(vlan/subnet)
(vlan/subnet)
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 36
Current Security Zone Practices
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 37
DB DB
Web Web App Web App
ā€¢ The Cisco Application Centric Infrastructure
Fabric (ACI) fabric includes Cisco Nexus
9000 Series switches with the APIC to run
in the leaf/spine ACI fabric mode
ā€¢ These switches form a ā€œfat-treeā€ network by
connecting each leaf node to each spine
node; all other devices connect to the leaf
nodes
ACI Terminology ā€“ ACI Fabric
Highlights:
ā€¢ Turnkey integrated solution with security, centralized
management, compliance and scale
ā€¢ Automated application centric-policy model with
embedded security
ā€¢ Broad and deep ecosystem
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 38
ACI Terminology ā€“ Application Policy Infrastructure Controller
Centralized Point of Management, Automation and Policy Enforcement
POLICY: Application centric network policy
SECURE: Security and performance at scale
VISIBILITY: System-wide visibility, telemetry and health
OPENNESS: Open Northbound and Southbound
EXTENSIBLE: Hypervisors, L4-7 services
integration/chaining
INTEGRATED OVERLAY
(Physical/Virtual)
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 39
Reviewing: Tenant Model
39
Tenant
Bridge
Domain
Bridge
Domain
Bridge
Domain
Subnet A
Subnet B
Subnet D
Subnet B
Subnet F
EPG
A
EPG
C
EPG
B
EPG
A EPG
B
EPG
C
Customer/ BU/ Group
VRF
L2 Boundary
IP Space(s)
Groups of end-
points and the
policies that define
their connection
Context Context
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 40
Tight Coupling with the Network
L4-L7 Services, Location, Identity, Connectivity
Physical Servers Virtual Machines
network
Interface, VLAN, Subnet, Gateway
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 41
ACI Abstraction Policy Model
End Point Group (EPG)
End Points
Physical Servers Virtual Machines
EPGs are a grouping of end-points representing
application or application components independent of
other network constructs.
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 42
Reviewing: Defining EPG Relationships Via Contracts
42
EPG Web
EP
1
EP
2
EPG App
EP
1
EP
2
Contract
Subject 1 Filter | Action | Label
EPG communication is defined by mapping EPGs to one another via contracts.
Subject 2
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 43
Applying Policy between EPGs: ACI contracts
EPG
A
EPG
B
EPG
CContract 02
The policy model allows for
both unidirectional and
bidirectional policies.
Contracts define the way in which EPGs interact.
Unidirectional
Communication
Bidirectional
Communication
Contract 01
Ex: ACI Logical Model applied to the ā€œ3-Tier Appā€ ANP
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 44
Reviewing: ACI Contracts
Application Network Profile
C ContractContracts define what an EPG
exposes to other app tiers and how
Contracts are reusable
for multiple EPGs and
EPGs can inherit multiple
contracts
The use of contracts separates ā€˜whatā€™ a policy is from ā€˜whereā€™ it exists, extending its use.
C
C
EPG NFS
EPG MGMT
EPG DBEPG AppEPG WebC CC
44
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 51
ACI ā€“ Prescriptive Microsegmentation Design Options
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 52
Summary: Network Profiles
52
Entity Description
Tenant Tenant represents a policy owner in the virtual fabric.
Application Network Profile Application Profile is the definition of tenant's policy representing a set of requirements that given application instance has on
virtualizable fabric. Such policy regulates connectivity and visibility amongst end-points in-scope.
End Point Group (EPG)
End point groups represent groups of elements (virtual machines, physical servers, etc.) essentially identified by port on a
network. EPGā€™s essentially capture groups of machines with the same policies. This is highly efficient as policy changes are
propagated from higher level orchestration systems
Contracts Contracts represent policies between EPGs. Contracts are ā€œprovidedā€ by one EPG and ā€œconsumedā€ by another.
Filters Filters encode specific rules within a contract
Bridge Domain Bridge domain is a L2 context (may or may not include broadcast semantics)
Context L3 context, essentially a VRF
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 53
Hypervisor Interaction with Cisco ACI
Integrated Mode
ā€¢ Cisco ACI fabric as a policy authority
ā€¢ Encapsulations normalized and dynamically provisioned
ā€¢ Integrated policy domains across physical and virtual
APP WEB DB DB
Nonintegrated Mode
ā€¢ CiscoĀ® ACI fabric as an IP-Ethernet transport
ā€¢ Encapsulations manually allocated
ā€¢ Separate policy domains for physical and virtual
VLAN
10
VLAN
10
VXLAN
10000
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 54
Hypervisor Integration with Cisco ACI
Control Channel - VMM Domains
ā€¢ Relationship is formed between CiscoĀ®
APIC and Virtual Machine Manager
(VMM)
ā€¢ Multiple VMMs likely on a single Cisco
ACI Fabric
ā€¢ Each VMM and associated virtual hosts
are grouped within Cisco APIC
ā€¢ Called VMM domain
ā€¢ There is 1:1 relationship between
a virtual switch and VMM domain
VMware
vCenter DVS
VMM Domain 1
VMware
vCenter AVS
VMM Domain 2 VMM Domain 3
VMware
vSphere
VMware
vSphere
Microsoft System
Center
Virtual Machine
Manager 2012
Microsoft
SCVMM
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 55
Hypervisor Integration with Cisco ACI
ā€¢ CiscoĀ® ACI fabric implements policy on
virtual networks by mapping endpoints to
EPGs
ā€¢ Endpoints in a virtualized environment
are represented as the vNICs
ā€¢ VMM applies network configuration by
placement of vNICs into port groups or
VM networks
ā€¢ EPGs are exposed to the VMM as a 1:1
mapping to port groups or VM networks
Application Network Profile
F/W L/B
EPGA
PP
APP PORT
GROUP
EPG
DB
DB PORT
GROUP
EPG
WEB
WEB PORT
GROUP
VM VMVM
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 60
VMware Integration
Three Options
Application Virtual Switch
(AVS)
ā€¢ Encapsulations: VLAN, VXLAN
ā€¢ Installation: VIB through VUM or
Console
ā€¢ VM discovery: OpFlex
ā€¢ Software/Licenses: VMware vCenter
with Enterprise+ License
vCenter + vShield
ā€¢ Encapsulations: VLAN, VXLAN
ā€¢ Installation: Native
ā€¢ VM discovery: LLDP
ā€¢ Software/Licenses: VMware vCenter
with Enterprise+ License, vShield
Manager with vShield License
Distributed Virtual Switch
(DVS)
ā€¢ Encapsulations: VLAN
ā€¢ Installation: Native
ā€¢ VM discovery: LLDP
ā€¢ Software/Licenses: VMware vCenter
with Enterprise+ License
VMware vSphere +
VMware
vShield
VMware
vSphere
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 61
Microsoft Interaction with Cisco ACI
Two Options
Integration with Microsoft SCVMM
ā€¢ Policy management: Through CiscoĀ® APIC
ā€¢ Software and license: Microsoft Windows Server with
HyperV and SCVMM
ā€¢ VM discovery: OpFlex
ā€¢ Encapsulations: VLAN and NVGRE (future)
ā€¢ Plug-in installation: Manual
Microsoft System Center
Virtual Machine Manager
Integration with Microsoft Azure Pack
ā€¢ Superset of Microsoft SCVMM
ā€¢ Policy management: Through Cisco APIC or Microsoft Azure Pack
ā€¢ Software and license: Microsoft Windows Server with HyperV,
SCVMM, and Azure Pack (free)
ā€¢ VM discovery: OpFlex
ā€¢ Encapsulations: VLAN and NVGRE (future)
ā€¢ Plug-in installation: Integrated
Windows Azure
Microsoft System Center
Virtual Machine Manager
+
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 65
Cisco OpenStack Cisco ACI Model
Neutron API Mapping
OpenStack CiscoĀ® ACI
Tenant Tenant
No Equivalent Application Profile
Network EPG + Bridge Domain
Subnet Subnet
Security Group Handled by Host
Security Group Rule Handled by Host
Router Layer 3 Context
Network: External Layer 3 Outside
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 66
Group-Based Policy in OpenStack
Juno Release
https://blueprints.launchpad.net/neutron/+spec/
group-based-policy-abstraction
ā€¢ Messy mapping CiscoĀ® ACI to current
OpenStack component
āˆ’ Endpoint groups (ports + security groups)
āˆ’ Contracts (security groups + security group
rules)
ā€¢ Goal: Introduce Cisco ACI model into
OpenStack
ā€¢ Starting with groups and group-based
policies
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 67
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 71
Embedded ACI Security
ACI Embedded Security
L4-7 Services
Cisco Security
ACI Services Graph
Worldā€™s Most
Deployed NGFW
Highest Rated NGIPS and
Breach Detection
White-list Policy, Micro-Segmentation
L4-L7 Service Automation
L4 Distributed Firewall, Multi-Tenancy
ASA / FirePOWER / AMP
Deep Forensic Analysis
Dynamic Workload Quarantine
Advanced Protection with ASA,
FirePOWER, AMP
Integrated protection
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 72
L4-L7 Service Automation ā€“ Support for All Devices
Any device and cluster manager support
Cisco Confidential
L4-7 Services
Virtual Firewalls
L4-7 Service Automation from Virtual/Physical
Fabrics
Full L4-L7 Centralized Service Automation
(With Device Package)
Large Ecosystem and Investment Protection
Centralized Network Automation
(With NO Device Package)
New support for L4-L7 Cluster Managers
L4- L7 Device
Package
No Device
Package
Service Cluster
Manager
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 73
ACI Ecosystem:
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 74
Issues with stateless firewall
Source class Source Port Dest class Destination Port Action
Consumer * Provider 80 Permit
Provider 80 Consumer * permit
Stateless Filter
Problem: Server can connect to any client port
Consumer Provider
IP_C, 1234, IP_P, 80, SYN
IP_P, 80, IP_C, 1234, SYN+ACK
IP_P, 80, IP_C, 2000, SYN+ACK
IP_P, 80, IP_C, 4000, SYN
Not blocked by fabric
Not blocked by fabric
Connection Established
IP_P, 80, IP_C, 4000, SYN+ACK
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 75
Hardware Assisted Stateful firewall
Provider
B
Consumer
A
Src
clas
s
Src
port
Dest
Clas
s
Dest
port
Flag Action
A * B 80 * Allow
B 80 A * ACK Allow
ā€¢ Create flow table entry
ā€¢ Forward packet to iLeaf
Leaf evaluates
stateless
policy
Hardware policy
permits the packet
Create flow state only for TCP SYN
packet received from PNIC
Deliver packet to destination VM
Vlan Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
Vlan Prot
o
Src ip Src
port
Dst ip Dst
port
Vlan Proto Src
ip
Src
port
Dst ip Dst
port
A tcp IP_A 1234 IP_B 80
A tcp IP_B 80 IP_A 1234
Vlan Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
B tcp IP_
A
1234 IP_B 80
B tcp IP_
B
80 IP_A 1234
1
2
3
4
5
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 76
Hardware Assisted Stateful firewall
Provider
B
Consumer
A
Src
clas
s
Src
port
Dest
Clas
s
Dest
port
Flag Action
A * B 80 * Allow
B 80 A * ACK Allow Hardware policy
permits the packet
Vlan Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
Vlan Prot
o
Src ip Src
port
Dst ip Dst
port
Vlan Proto Src
ip
Src
port
Dst ip Dst
port
A tcp IP_A 1234 IP_B 80
A tcp IP_B 80 IP_A 1234
Vlan Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
B tcp IP_
A
1234 IP_B 80
B tcp IP_
B
80 IP_A 1234
Response from VM
Perform flow table lookup
On flow table hit forward packet to ileaf
Policy Enforcement done
at iLeaf
Connection
Tracking at vLeaf
8
6
7
9
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 77
Hardware Assisted Stateful firewall
Case 1: SYN + ACK attack from Provider
Provider
B
Consumer
A
Entr
y
Src
clas
s
Src
port
Dest
Clas
s
Dest
port
Flag Action
100 A * B 80 * Allow
200 B 80 A * ACK Allow
Vla
n
Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
Vla
n
Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
Vlan Proto Src
ip
Src
port
Dst
ip
Dst
port
A tcp IP_
A
123
4
IP_B 80
A tcp IP_
B
80 IP_A 1234
Vlan Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
B tcp IP_
A
1234 IP_B 80
B tcp IP_
B
80 IP_A 1234
SYN + ACK packets Attack from Provider,
for which connection is not initiated by
Consumer (dest Port != 1234)
Packet dropped by vLeaf
because of missing flow
entry
1
2
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 78
Hardware Assisted Stateful firewall
Case 2: SYN attack from Provider
Provider
B
Consumer
A
Entr
y
Src
clas
s
Src
port
Des
t
Clas
s
Dest
port
Flag Action
100 A * B 80 * Allow
200 B 80 A * ACK Allow
Leaf evaluates
stateful policy
Vla
n
Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
Vla
n
Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
Vlan Proto Src
ip
Src
port
Dst
ip
Dst
port
A tcp IP_
A
123
4
IP_B 80
A tcp IP_
B
80 IP_A 1234
Vlan Prot
o
Src
ip
Src
port
Dst
ip
Dst
port
B tcp IP_
A
1234 IP_B 80
B tcp IP_
B
80 IP_A 1234
SYN Attack from Provider
SYN packets dropped by
hardware on iLeaf due to
policy
1
2
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 79
Distributed Firewall (DFW) on AVS
ā€¢ Connection tracking support (TCP) on AVS
ā€¢ DFW is only applicable to Virtual End Points.
ā€¢ DFW is not applicable to system ports (vmkernel ports) and uplinks.
ā€¢ Global (per AVS host) flow limit: 250,000
ā€¢ Per Interface (End Point) flow limit: 10,000
ā€¢ Aging Interval: Adaptive aging (5 minutes ā€“ 2 hours)
ā€¢ States for a flow:-
ā€¢STATE_SYN_RECV
ā€¢STATE_SYN_ACK_RECV
ā€¢STATE_ESTABLISHED
ā€¢STATE_FIN_RECV
ā€¢STATE_ESTABLISHED_ONE_DIR
ā€¢STATE_2ND_FIN_RECV
ā€¢STATE_FTP_DATA
Container Work Consolidation:
Docker and Cisco Contiv
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 81
Docker ā€“ What is it and its goal ?
Docker is an open platform for Sys Admins and developers
to build, ship and run distributed applications.
Docker enables applications to be easy and quickly
assembled from reusable components, therefore
eliminating the silo-ed approach between development,
QA, and production environments.
At a high-level, Docker is build of :
ā€¢ Docker Engine: portable and lightweight, runtime and
packaging tool;
ā€¢ Docker Hub: a cloud service for sharing applications and
automating workflows,
Dockerā€™s main purpose: the lightweight packaging and
deployment of applications
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 82
ā€¢ Open-Source Container for Dummies
ā€¢ Open Source engine to commoditize LXC
ā€¢ Create lightweight, portable, isolated, self-
sufficient container from any application.
ā€¢ Delivers on full DevOps goal:
Build onceā€¦ run anywhere.
Configure onceā€¦ run anything
ā€¢ Ecosystems! OS, VMā€™s, PaaS, IaaSā€¦
What is containers ?
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 84
Docker ā€“ How isolation works ?
Processes executing in a Docker container are isolated
from processes running on the host OS or in other Docker
containers. Nevertheless, all processes are executing in
the same Linux kernel.
Docker leverages LXC to provide separate namespaces
for containers, a technology that has been present in
Linux kernels for 5+ years.
It also uses Control Groups (cgroups), which have been
in the Linux kernel even longer, to implement resource
auditing and limiting.
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 85
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 86
Running Docker on your own machine
Directly at OS-X
On a VM ā€œwrapā€ (Vagrant)
At Windows, Linux or OS-X
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 87
Docker misconceptions
From a multi-host & mission critical applications perspective.
ā€¢ If I use Docker then I don't need a configuration management (CM) tool (Ansible, Puppet, etc.);
ā€¢ If I learn Docker then I don't have to learn the other systems and CM tools;
ā€¢ You should have only one process per Docker container;
ā€¢ I should use Docker right now for all!
ā€¢ I have to use Docker in order to get the speed and consistency advantages
ā€¦ but, using Docker makes all the above easier from a DevOps perspectiveā€¦
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 88
Hypervisors vs. Linux Containers
Hardware
Operating System
Hypervisor
Virtual Machine
Operating
System
Bins / libs
App App
Virtual Machine
Operating
System
Bins / libs
App App
Hardware
Hypervisor
Virtual Machine
Operating
System
Bins / libs
App App
Virtual Machine
Operating
System
Bins / libs
App App
Hardware
Operating System
Container
Bins / libs
App App
Container
Bins / libs
App App
Type 1 Hypervisor Type 2 Hypervisor Linux Containers (LXC)
Containers share the OS kernel of the host and thus are lightweight.
However, each container must have the same OS kernel.
Containers are isolated, but
share OS and, where
appropriate, libs / bins.
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 89
Hypervisor VM vs. LXC vs. Docker containers
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 90
Container Networking Solutions
Flannel CoreOS
WeaveNet WeaveWorks
OVN VMWare
Contiv Cisco
Calico MetaSwitch Networks
Libnetwork Docker
OpenShift SDN RedHat
Nuage-SDN Nokia
OpenContrail Juniper
Contiv
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 91
Considerations Containers (Docker / LXC) Hypervisors
Virtualization approach At the Operating System (OS) level At the Hardware Level
Abstraction Application from OS OS from Hardware
Applications availability Linux apps able to run on kernel 3.8 and
beyond
Any that could run into a VM
ā€œApplication-readyā€ time ~ 0.5 s (for fire up) ~ 20 s (for VM boot up)
Storage consumption Single storage + per layer storage delta Storage space for each instance
Save of ā€œnew statusā€ New app ā€œdeltaā€ layer added to the image VM Snapshot or boot new VM (*)
Performance Run directly on top of Linux Kernel (**) Hypervisor as a performance ā€œshimā€
Security Via cGroups and namespaces. SELinux
helps.
Per-VM basis, leverages hypervisor
Linux Space User-Space (can leverage Linux kernel
modules)
Isolated into the VM space. Access to Hypervisor
kernel functions varies per solution / vendor.
(*) If itā€™s the same OS in every VM, why keep duplicating it in each VM (and then have the storage array de-duplicate it) ?
(**) For an application in need of network performance, why put it on a VM in the first place and then bypass the hypervisor
for kernel-based performance ?
Considerations on VM vs. Docker containers
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 92
Docker in OpenStack
ā€¢ Havana
Nova virt driver which integrates with docker REST API on backend
Glance translator to integrate docker images with Glance
ā€¢ Icehouse
Heat plugin for docker
ā€¢ Both options are still under development
nova-docker virt driver docker heat plugin
DockerInc::Docker::C
ontainer
(plugin)
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 93
VM or BM
Basics of Container Networking
Minimally Provides:
-IP Connectivity in
Containerā€™s Network
Namespace
-IPAM, and Network
Device Creation (eth0)
-Route Advertisement
or Host NAT for
external connectivity
Container
eth0
Container
eth0
Physical Network
Linux/Windows OS Networking
ensp0
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 94
Container
CNM (Container Network Model)
Network Namespace
eth0 eth1
Network BlueNetwork Green
Endpoint
Sandbox
Network
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 95
CNM (Container Network Model) - Details
ā€¢ An endpoint is container's interface into a network
ā€¢ A network is collection of arbitrary endpoints
ā€¢ A container can belong to multiple endpoints (and therefore multiple networks)
ā€¢ CNM allows for co-existence of multiple drivers, with a network managed by one driver
ā€¢ Provides Driver APIs for IPAM and Endpoint creation/deletion
ā€¢ IPAM Driver APIs: Create/Delete Pool, Allocate/Free IP Address
ā€¢ Network Driver APIs: Network Create/Delete, Endpoint Create/Delete/Join/Leave
ā€¢ Used by docker engine, docker swarm, and docker compose
ā€¢ Also works with other schedulers that runs standard docker containers e.g. Nomad or
Mesos docker containerizer
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 96
Container
(aka Network Namespace)
eth0 . . . eth1
CNI (Container Network Interface)
Driver Plumbing
Differences (from CNM):
- Gives Driver freedom to
manipulate network namespace
- Provide Container Id, Params to
drivers
- Just Two APIs:
-Add Container to Network
-Delete Container from Network
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 97
CNI (Container Network Interface) - Details
ā€¢ Provide Container Create/Delete events
ā€¢ Provides access to network namespace to the driver to plumb networking
ā€¢ Provides container id (uuid) for which network interface is being created
ā€¢ No separate IPAM Driver
Container Create returns the IAPM information along with other data
ā€¢ Used by Kubernetes i.e. supported by various Kubernetes network plugins
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 98
Mac/Windows/Linux
Self Guided Hands on Lab ā€“ Topology, etc.
ā€¢ Two Linux VMs, interconnected on two networks
ā€¢ Self Paced: https://github.com/jainvipin/tutorial
tutorial-node1
C1, C2, ā€¦
eth0 eth1 eth2
External Network
tutorial-node1
C1, C2, ā€¦
eth0 eth1 eth2
Vlan Bridge
Control/VXLAN IP-Router
Mgmt Mgmt
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 99
Basic Container Networking ā€“ Hands on Lab
ā€¢ Default Network Drivers: null, host, bridge
ā€¢ Running Containers in default ā€˜bridgeā€™ driver
ā€¢ Inspecting Container Network and Container
ā€¢ Peeking Inside the Container
ā€¢ Reaching outside world
vanilla-c
eth0
docker0 linux bridge
vethxxxx
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 100
Networking with Scheduler Integration
ā€¢ In a very basic terms, scheduler determines the best place to run an App
The algorithm is selectable, and varies e.g. pack a host before scheduling on another
Often, takes into consideration the constraints of the application against resources
Supports scale-out model for applications to grow/shrink
Supports many features and is the substrate of the agile application deployment
ā€¢ Networking becomes more application centric with scheduler integrated
Application tiers, their network connectivity, policies come and go with Apps
Must integrate the association of Apps to their policy and domain
The network, policies, priority, etc. must move with the application
ā€¢ Popular Schedulers
Dockerā€™s Swarm, Googleā€™s Kubernetes, Apache Mesos, Hashicorpā€™s Nomad, etc.
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 101
Container Networking Challenges
1. Scale: 200-500 containers per host may not be unusual
More Endpoints i.e. IPs
More Networks
More of Everything!
2. Speed: Comes up in a second (many more simultaneously in a cluster)
Automation is a MUST
Network (IPAM, DNS, Route-Advertisement) must be quick to provision
And work at scale!
3. Layers of Networking: Container Layer, VM Layer, Physical Layer
Challenges Visibility: Encap in encap in encap makes it obscure
Makes Monitoring/Diagnostics difficult
Reduces Performance: Processing at each layer, and Encaps reduce performance
More Orchestration layers to deal with (if present)
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 102
Container Networking Challenges, Contā€¦
4. Application Centric (vs. Infrastructure centric)
Creating networks as applications need, and dispose them accordingly
Must integrate with application blue-print
Keeping it easy to consume for application
5. Shared Resources ā€“ Resource Acquisition
Ops Policies to define deployment structure
6. Hybrid Cloud
Consistency, Security, Connectivity
7. Security
Tenancy, Isolation, white-list of specific ports
8. Telemetry and Diagnostics
Need to be real time, Must work at the scale/speed
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 103
ā€¢ Container industry is focused on
creating ability to define applications
through Docker Compose,
Kubernetes Pod definition etc.
ā€¢ As applications move from
development to production, there is
need to able to define and enforce
infrastructure operational policies
ā€¢ Contiv is creating industry thought
leadership around need for
infrastructure policies for
containerized applications in a
shared infrastructure
ā€¢ Contiv provides framework and
implementation to address operation
intent for Infrastructure.
Contiv Addressing Enabling Infrastructure to Run
Production Containerized Applications Better
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 104
Takeaways
1. Container Networking is pluggable; there are two flavors
- (CNI,CNM) for (Kubernetes, Docker) ecosystem respectively
2. Container Networking is met with a new set of challenges
- There are solutions to those problems
- Some are being addressed
3. Native Connectivity brings better performance, visibility and scale
- Layering may obscure visibility, decrease scale and performance
4. Contiv Networking provides a variety of container connectivity options
- With Native connectivity, it can provide scale, performance and visibility
- It provides secure connectivity to group of applications
Ā© 2016 Cisco and/or its affiliates. All rights reserved. 105
Container References
1. CNI Specification
https://github.com/containernetworking/cni/blob/master/SPEC.md
2. CNM Design
https://github.com/docker/libnetwork/blob/master/docs/design.md
3. Contiv User Guide
http://docs.contiv.io
4. Contiv Networking Code
https://github.com/contiv/netplugin
5. Basic Networking Tutorial ā€“ Self Guided
https://github.com/jainvipin/tutorial
6. Contiv Policy Tutorial ā€“ Self Guided
https://github.com/jainvipin/libcompose/tree/deploy/deploy
7. Other Documentation:
https://docs.docker.com, http://docs.kubernetes.io
Thank you.
In collaboration with

More Related Content

What's hot

Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018   Accelerating the secure digital business through...Cisco Connect Halifax 2018   Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...Cisco Canada
Ā 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper diveCisco Canada
Ā 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the NetworkCisco Canada
Ā 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Canada
Ā 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewallCisco Canada
Ā 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA AutomationCisco Canada
Ā 
Innovations in Switching
Innovations in SwitchingInnovations in Switching
Innovations in SwitchingCisco Canada
Ā 
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural design
Cisco Connect Halifax 2018   Cisco Spark hybrid services architectural designCisco Connect Halifax 2018   Cisco Spark hybrid services architectural design
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural designCisco Canada
Ā 
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Canada
Ā 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...Cisco Canada
Ā 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRCisco Canada
Ā 
Cisco Digital Network Architecture ā€“ Deeper Dive, ā€œFrom the Gates to the GUI
Cisco Digital Network Architecture ā€“ Deeper Dive, ā€œFrom the Gates to the GUICisco Digital Network Architecture ā€“ Deeper Dive, ā€œFrom the Gates to the GUI
Cisco Digital Network Architecture ā€“ Deeper Dive, ā€œFrom the Gates to the GUICisco Canada
Ā 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on LabCisco Canada
Ā 
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...Cisco Canada
Ā 
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Cisco Canada
Ā 
Gain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingGain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingCisco Canada
Ā 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...Cisco Canada
Ā 
The Enhanced Cisco Container Platform
The Enhanced Cisco Container PlatformThe Enhanced Cisco Container Platform
The Enhanced Cisco Container PlatformRobb Boyd
Ā 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Canada
Ā 

What's hot (20)

Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Cisco Connect Halifax 2018   Accelerating the secure digital business through...Cisco Connect Halifax 2018   Accelerating the secure digital business through...
Cisco Connect Halifax 2018 Accelerating the secure digital business through...
Ā 
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Cisco Connect Halifax 2018   Cisco dna - deeper diveCisco Connect Halifax 2018   Cisco dna - deeper dive
Cisco Connect Halifax 2018 Cisco dna - deeper dive
Ā 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
Ā 
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Cisco Connect Toronto 2017 - NFV/SDN Platform for Orchestrating Cloud and vBr...
Ā 
The Cloudification of the Data Center Network
The Cloudification of the Data Center NetworkThe Cloudification of the Data Center Network
The Cloudification of the Data Center Network
Ā 
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Cisco Connect Halifax 2018   Putting firepower into the next generation firewallCisco Connect Halifax 2018   Putting firepower into the next generation firewall
Cisco Connect Halifax 2018 Putting firepower into the next generation firewall
Ā 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
Ā 
Innovations in Switching
Innovations in SwitchingInnovations in Switching
Innovations in Switching
Ā 
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural design
Cisco Connect Halifax 2018   Cisco Spark hybrid services architectural designCisco Connect Halifax 2018   Cisco Spark hybrid services architectural design
Cisco Connect Halifax 2018 Cisco Spark hybrid services architectural design
Ā 
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Cisco Connect Vancouver 2017 - Gain insight and programmability with Cisco DC...
Ā 
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...Cisco Connect Halifax 2018   cloud and on premises collaboration security exp...
Cisco Connect Halifax 2018 cloud and on premises collaboration security exp...
Ā 
Network Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XRNetwork Function Virtualization (NFV) using IOS-XR
Network Function Virtualization (NFV) using IOS-XR
Ā 
Cisco Digital Network Architecture ā€“ Deeper Dive, ā€œFrom the Gates to the GUI
Cisco Digital Network Architecture ā€“ Deeper Dive, ā€œFrom the Gates to the GUICisco Digital Network Architecture ā€“ Deeper Dive, ā€œFrom the Gates to the GUI
Cisco Digital Network Architecture ā€“ Deeper Dive, ā€œFrom the Gates to the GUI
Ā 
ACI Hands-on Lab
ACI Hands-on LabACI Hands-on Lab
ACI Hands-on Lab
Ā 
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...Cisco connect winnipeg 2018   gain insight and programmability with cisco dc ...
Cisco connect winnipeg 2018 gain insight and programmability with cisco dc ...
Ā 
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Architecture of NFV Platform for Orchestrating Cloud-based & vBranch Managed ...
Ā 
Gain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC NetworkingGain Insight and Programmability with Cisco DC Networking
Gain Insight and Programmability with Cisco DC Networking
Ā 
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Ā 
The Enhanced Cisco Container Platform
The Enhanced Cisco Container PlatformThe Enhanced Cisco Container Platform
The Enhanced Cisco Container Platform
Ā 
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WANCisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
Ā 

Viewers also liked

Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy
Ā 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlanMohammed Umair
Ā 
Vxlan frame format and forwarding
Vxlan frame format and forwardingVxlan frame format and forwarding
Vxlan frame format and forwardingMohammed Umair
Ā 
Nano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security JourneyNano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security JourneyYun Zhi Lin
Ā 
Dropwizard and Friends
Dropwizard and FriendsDropwizard and Friends
Dropwizard and FriendsYun Zhi Lin
Ā 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Anthony Burke
Ā 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...CA Technologies
Ā 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...Adi Gazit Blecher
Ā 
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0WebNMS
Ā 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)VMware
Ā 
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...CA Technologies
Ā 
Tutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerTutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerShu Sugimoto
Ā 
Expectation for SDN as Carrier's Network
Expectation for SDN as Carrier's NetworkExpectation for SDN as Carrier's Network
Expectation for SDN as Carrier's NetworkOpen Networking Summits
Ā 
Managing Tomorrowā€™s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrowā€™s Networks: The Impacts of SDN and Network Virtualization o...Managing Tomorrowā€™s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrowā€™s Networks: The Impacts of SDN and Network Virtualization o...CA Technologies
Ā 
VXLAN Practice Guide
VXLAN Practice GuideVXLAN Practice Guide
VXLAN Practice GuidePrasenjit Sarkar
Ā 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routingWilfredzeng
Ā 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecturesidneel
Ā 
How VXLAN works on Linux
How VXLAN works on LinuxHow VXLAN works on Linux
How VXLAN works on LinuxEtsuji Nakai
Ā 

Viewers also liked (20)

Ansible 2.2
Ansible 2.2Ansible 2.2
Ansible 2.2
Ā 
Mellanox VXLAN Acceleration
Mellanox VXLAN AccelerationMellanox VXLAN Acceleration
Mellanox VXLAN Acceleration
Ā 
Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016
Ā 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
Ā 
Vxlan frame format and forwarding
Vxlan frame format and forwardingVxlan frame format and forwarding
Vxlan frame format and forwarding
Ā 
Nano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security JourneyNano Segmentation - A Docker Security Journey
Nano Segmentation - A Docker Security Journey
Ā 
Dropwizard and Friends
Dropwizard and FriendsDropwizard and Friends
Dropwizard and Friends
Ā 
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Ā 
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
How To Track Performance and Fault in a Multi-layer, Software-Defined Network...
Ā 
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
How to-migrate-and-manage-security-policies-in-a-segmented-data-center---webi...
Ā 
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Demystifying Orchestration and Assurance Across SDN NFV CE2.0
Ā 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Ā 
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
Ā 
Tutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting routerTutorial: Using GoBGP as an IXP connecting router
Tutorial: Using GoBGP as an IXP connecting router
Ā 
Expectation for SDN as Carrier's Network
Expectation for SDN as Carrier's NetworkExpectation for SDN as Carrier's Network
Expectation for SDN as Carrier's Network
Ā 
Managing Tomorrowā€™s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrowā€™s Networks: The Impacts of SDN and Network Virtualization o...Managing Tomorrowā€™s Networks: The Impacts of SDN and Network Virtualization o...
Managing Tomorrowā€™s Networks: The Impacts of SDN and Network Virtualization o...
Ā 
VXLAN Practice Guide
VXLAN Practice GuideVXLAN Practice Guide
VXLAN Practice Guide
Ā 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
Ā 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecture
Ā 
How VXLAN works on Linux
How VXLAN works on LinuxHow VXLAN works on Linux
How VXLAN works on Linux
Ā 

Similar to Hitchhikers Guide to Data Center Virtualization & Workload Consolidation

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
Ā 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
Ā 
ļæ¼ Network Innovations Driving Business Transformation
ļæ¼ Network Innovations Driving Business Transformationļæ¼ Network Innovations Driving Business Transformation
ļæ¼ Network Innovations Driving Business TransformationCisco Service Provider
Ā 
Cisco at v mworld 2015 theater presentation brfarnha
Cisco at v mworld 2015 theater presentation brfarnhaCisco at v mworld 2015 theater presentation brfarnha
Cisco at v mworld 2015 theater presentation brfarnhaldangelo0772
Ā 
BRKCRS-2110.pdf
BRKCRS-2110.pdfBRKCRS-2110.pdf
BRKCRS-2110.pdfAsif Qureshi
Ā 
Understanding Ciscoā€™ Next Generation SD-WAN Technology
Understanding Ciscoā€™ Next Generation SD-WAN TechnologyUnderstanding Ciscoā€™ Next Generation SD-WAN Technology
Understanding Ciscoā€™ Next Generation SD-WAN TechnologyCisco Canada
Ā 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
Ā 
Presentation data center virtualization ā€“setting the foundation
Presentation   data center virtualization ā€“setting the foundationPresentation   data center virtualization ā€“setting the foundation
Presentation data center virtualization ā€“setting the foundationxKinAnx
Ā 
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Canada
Ā 
NFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesNFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesCisco Canada
Ā 
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...Kristoffer Sheather
Ā 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)SDNRG ITB
Ā 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
Ā 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...Cisco Canada
Ā 
Open vSwitch Implementation Options
Open vSwitch Implementation Options Open vSwitch Implementation Options
Open vSwitch Implementation Options Netronome
Ā 
Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Canada
Ā 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsFab Fusaro
Ā 
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Connect Halifax 2018   Application agility and programmability with cis...Cisco Connect Halifax 2018   Application agility and programmability with cis...
Cisco Connect Halifax 2018 Application agility and programmability with cis...Cisco Canada
Ā 
Open coud networking at full speed - Avi Alkobi
Open coud networking at full speed - Avi AlkobiOpen coud networking at full speed - Avi Alkobi
Open coud networking at full speed - Avi AlkobiOpenInfra Days Poland 2019
Ā 
Cisco storage networking protect scale-simplify_dec_2016
Cisco storage networking   protect scale-simplify_dec_2016Cisco storage networking   protect scale-simplify_dec_2016
Cisco storage networking protect scale-simplify_dec_2016Tony Antony
Ā 

Similar to Hitchhikers Guide to Data Center Virtualization & Workload Consolidation (20)

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
Ā 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
Ā 
ļæ¼ Network Innovations Driving Business Transformation
ļæ¼ Network Innovations Driving Business Transformationļæ¼ Network Innovations Driving Business Transformation
ļæ¼ Network Innovations Driving Business Transformation
Ā 
Cisco at v mworld 2015 theater presentation brfarnha
Cisco at v mworld 2015 theater presentation brfarnhaCisco at v mworld 2015 theater presentation brfarnha
Cisco at v mworld 2015 theater presentation brfarnha
Ā 
BRKCRS-2110.pdf
BRKCRS-2110.pdfBRKCRS-2110.pdf
BRKCRS-2110.pdf
Ā 
Understanding Ciscoā€™ Next Generation SD-WAN Technology
Understanding Ciscoā€™ Next Generation SD-WAN TechnologyUnderstanding Ciscoā€™ Next Generation SD-WAN Technology
Understanding Ciscoā€™ Next Generation SD-WAN Technology
Ā 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Ā 
Presentation data center virtualization ā€“setting the foundation
Presentation   data center virtualization ā€“setting the foundationPresentation   data center virtualization ā€“setting the foundation
Presentation data center virtualization ā€“setting the foundation
Ā 
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WANCisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Cisco Connect Toronto 2017 - Understanding Cisco Next Generation SD-WAN
Ā 
NFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch servicesNFV orchestration for cloud and virtual branch services
NFV orchestration for cloud and virtual branch services
Ā 
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Scaling Your SDDC Network: Building a Highly Scalable SDDC Infrastructure wit...
Ā 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Ā 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
Ā 
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...Cisco Connect Toronto 2018   sd-wan - delivering intent-based networking to t...
Cisco Connect Toronto 2018 sd-wan - delivering intent-based networking to t...
Ā 
Open vSwitch Implementation Options
Open vSwitch Implementation Options Open vSwitch Implementation Options
Open vSwitch Implementation Options
Ā 
Cisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation BranchCisco Intelligent Branch - Enabling the Next Generation Branch
Cisco Intelligent Branch - Enabling the Next Generation Branch
Ā 
Design and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANsDesign and Deployment of Enterprise WLANs
Design and Deployment of Enterprise WLANs
Ā 
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Cisco Connect Halifax 2018   Application agility and programmability with cis...Cisco Connect Halifax 2018   Application agility and programmability with cis...
Cisco Connect Halifax 2018 Application agility and programmability with cis...
Ā 
Open coud networking at full speed - Avi Alkobi
Open coud networking at full speed - Avi AlkobiOpen coud networking at full speed - Avi Alkobi
Open coud networking at full speed - Avi Alkobi
Ā 
Cisco storage networking protect scale-simplify_dec_2016
Cisco storage networking   protect scale-simplify_dec_2016Cisco storage networking   protect scale-simplify_dec_2016
Cisco storage networking protect scale-simplify_dec_2016
Ā 

More from Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
Ā 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
Ā 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
Ā 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
Ā 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
Ā 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
Ā 
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec CiscoCisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec CiscoCisco Canada
Ā 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
Ā 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
Ā 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
Ā 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
Ā 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
Ā 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
Ā 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
Ā 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
Ā 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
Ā 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
Ā 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
Ā 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
Ā 
Cisco Connect Toronto 2018 model-driven programmability for cisco ios xr-v1
Cisco Connect Toronto 2018   model-driven programmability for cisco ios xr-v1Cisco Connect Toronto 2018   model-driven programmability for cisco ios xr-v1
Cisco Connect Toronto 2018 model-driven programmability for cisco ios xr-v1Cisco Canada
Ā 

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
Ā 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
Ā 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Ā 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
Ā 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Ā 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
Ā 
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec CiscoCisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Cisco Connect Montreal 2018 SecuritƩ : SƩcuriser votre mobilitƩ avec Cisco
Ā 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
Ā 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
Ā 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
Ā 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
Ā 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Ā 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Ā 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Ā 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
Ā 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
Ā 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
Ā 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Ā 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
Ā 
Cisco Connect Toronto 2018 model-driven programmability for cisco ios xr-v1
Cisco Connect Toronto 2018   model-driven programmability for cisco ios xr-v1Cisco Connect Toronto 2018   model-driven programmability for cisco ios xr-v1
Cisco Connect Toronto 2018 model-driven programmability for cisco ios xr-v1
Ā 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
Ā 
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024BookNet Canada
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
Ā 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationRadu Cotescu
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Ā 
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜RTylerCroy
Ā 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024The Digital Insurer
Ā 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
Ā 

Recently uploaded (20)

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Ā 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Ā 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ā 
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Ā 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Ā 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Ā 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Ā 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Ā 
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
Ā 
Scaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organizationScaling API-first ā€“ The story of a global engineering organization
Scaling API-first ā€“ The story of a global engineering organization
Ā 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ā 
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 āœ“Call Girls In Kalyan ( Mumbai ) secure service
Ā 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 
šŸ¬ The future of MySQL is Postgres šŸ˜
šŸ¬  The future of MySQL is Postgres   šŸ˜šŸ¬  The future of MySQL is Postgres   šŸ˜
šŸ¬ The future of MySQL is Postgres šŸ˜
Ā 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Ā 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Ā 
Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024Finology Group ā€“ Insurtech Innovation Award 2024
Finology Group ā€“ Insurtech Innovation Award 2024
Ā 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ā 

Hitchhikers Guide to Data Center Virtualization & Workload Consolidation

  • 1. Cisco ConfidentialĀ© 2015 Cisco and/or its affiliates. All rights reserved. 1 T-DC-15-I Cisco Connect Toronto 2016 Hitchhikers Guide to Data Center Virtualization & Workload Consolidation Joshua Craig Kaya Technology Solution Architect - Data Center May 19, 2016 In collaboration with
  • 2. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 2 Agenda: ā€¢ Introduction to Data Center Workload Consolidation ā€¢ Modern Network Segmentation ā€¢ Advanced Microsegmentation ā€¢ Container Workload Consolidation
  • 3. Cisco Confidential 3C97-732424-00 Ā© 2014 Cisco and/or its affiliates. All rights reserved. Introduction to Data Center Workload Consolidation
  • 4. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 4 Mainframe Example: Workload Management
  • 5. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 5 Midrange Example: Logical Partitions
  • 6. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 6 Hypervisors & Containers 6 Hardware Operating System Hypervisor Virtual Machine Operating System Bins / libs App App Virtual Machine Operating System Bins / libs App App Hardware Hypervisor Virtual Machine Operating System Bins / libs App App Virtual Machine Operating System Bins / libs App App Hardware Operating System Container Bins / libs App App Container Bins / libs App App Type 1 Hypervisor Type 2 Hypervisor Linux Containers (LXC) Containers share the OS kernel of the host and thus are lightweight. However, each container must have the same OS kernel. Containers are isolated, but share OS and, where appropriate, libs / bins.
  • 7. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 7 VM Networking Example Cisco Nexus 1000V - Bringing Network Edge to Hypervisor VM Connection Policy ļ‚§ Defined in the network ļ‚§ Applied in vCenter ļ‚§ Linked to VM UUID CiscoĀ® Nexus 1000V VEM Faster VM Deployment - Policy Based VM Connectivity vCenter Cisco Nexus 1000V VSM WEB Apps HR DB DMZ Port Profile Defined Policies VMs Need to Move ļ‚§ VMotion ļ‚§ DRS ļ‚§ SW upgrade/path ļ‚§ Hardware failure ļ‚§ VM policy mobility ļ‚§ VMotion for the network ļ‚§ Better VM security Resulting in: ļ‚§ A consistent connection state ļ‚§ Operational efficiency for VI and network admins Secure workload mobility with rich services Cisco NexusĀ® 1000V Virtual Ethernet Module (VEM) VMware vSphere VMware vSphere
  • 8. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 8 Cisco Nexus 1000V for Hyper-V Consistent Multi-Hypervisor Platform SCVMM Integration VXLAN based Network Virtualization Advance NX-OS feature-set VSG based distributed Security Nexus 1000V VSM Extensible vSwitch Capture Filtering Forwarding VNICs PNICs Consistent operational model VM VM VM VM Nexus 1000V VEM
  • 9. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 9 Application Centric Infrastructure Components Application Network Profile Orchestration Frameworks Hypervisor Management OVM Systems Management Centralized Policy Management Open APIs, Open Source, Open StandardsAPIC Fabric Automation Enterprise MonitoringACI Ecosystem Partners End Points Physical & Virtual Physical Networking Nexus 2K Nexus 7K Hypervisors and Virtual Networking Compute L4ā€“L7 Services Storage Multi DC WAN and Cloud Integrated WAN Edge
  • 10. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 10 ā€¢ OPFLEX enabled vSwitch ā€¢ Single point of control via APIC ā€¢ Consistent policy between virtual and physical fabric ports. ā€¢ Supports a Full Layer 2 Network (Nexus 7k/6k/5k/3k/2k/FI) between Nexus 9k and AVS: Investment Protection ā€¢ VDS (VMware Distributed Switch) can only support a single L2 switch between N9k and VDS ā€¢ AVS enables Micro segmentation (VM attributes based) and Distributed Firewall AVS Providing Advanced Virtual Security Features for ACI L2 NetworkOpFlex OpFlex OpFlex VMVM VM VM VMVM VM VM VMVM VM VM
  • 11. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 11 Unified Fabricā€™s SingleConnect Technology Provides an Efficient Foundation for Growth One connection type for all protocols SINGLECONNECT TECHNOLOGY Efficient capacity scaling Automated I/O bandwidth allocation Auto-discovery & self-integrating components: network and compute Direct SAN access Wire once then manage through software Traditional Cisco Unified Fabric As you scale, simplified architecture reduces cost and facilitates growth SAN A SAN BETH 1 ETH 2 10 GE Ethernet
  • 12. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 12 UCSD Express UCS 6200 Series Fabric Interconnect UCS Manager UCS C240 M4 Series Rack Server UCS C3160 Rack Server Unified Management with UCSD Express for Big Data Programmability, Scalability and Automation Hadoop
  • 13. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 13 Comparing Traditional Architectures to UCS CPA for Big Data As your Big Data deployment grows, significant and ongoing savings create a compelling business case # CABLES Traditional Approach With Cisco UCS At 32 Servers 180 80 At 64 Servers 360 128-160 At 160 Servers 530-870 320-400
  • 14. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 14 Hyperconverged Scale Out and Distributed File System CONTROLLE R VM HYPERVISOR VM VM VM HYPERCONVERGED DATA PLATFORMHYPERCONVERGED DATA PLATFORMHYPERCONVERGED DATA PLATFORM Start With as Few as Three Nodes Hyperconverged Data Platform Installs in Minutes Add Servers, One or More at a Time Linearly Scale Compute, Storage Performance, and Capacity Distribute and Rebalance Data Across Servers Automatically Retire Older Servers HYPERCONVERGED DATA PLATFORM CONTROLLE R VM HYPERVISOR VM VM VM CONTROLLE R VM HYPERVISOR VM VM VM CONTROLLE R VM HYPERVISOR VM VM VM CONTROLLE R VM HYPERVISOR VM VM VM
  • 15. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 15 High Resiliency, Fast Recovery Platform Can Sustain Simultaneous 2 Node Failure Without Data Loss; Replication Factor Is Tunable If a Node Fails, the Evacuated VMs Re-attach With No Data Movement Required Replacement Node Automatically Configured Via UCS Service Profile HX Data Platform Automatically Re-Distributes Data to Node CONTROLLERHYPERVISORCONTROLLERHYPERVISOR CONTROLLERHYPERVISOR CONTROLLERHYPERVISOR VM VMVM VM VMVM VM VMVM VM VMVM HX Data PlatformHX Data Platform
  • 16. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 16 High SecurityInternalDMZ Typical Network Topology - Shortcomings ADC ADC FW FW (vlan/subnet)(vlan/subnet) (vlan/subnet)(vlan/subnet) (vlan/subnet) (vlan/subnet)
  • 17. Cisco Confidential 17C97-732424-00 Ā© 2014 Cisco and/or its affiliates. All rights reserved. Modern Network Segmentation
  • 18. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 18 EXISTING 2/3-TIER DESIGNS PROGRAMMABLE SDN OVERLAY MODEL APPLICATION CENTRIC INFRASTRUCTURE Modernized Operating System Programmable Open APIs Linux Containers Integrated Network Virtualization (no Gateways) VXLAN / BGP Third Party Controller Any Hypervisor Physical & Virtual Open APIā€™s & Controller APIC Modernizing the Data Center ā€“ Nexus 9K and ACI Broad and Deep Ecosystem
  • 19. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 19 ā€¢ VXLAN Provides the Ethernet L2 services as VLAN does, but with greater extensibility and flexibility. L2 overlay over L3 underlay with use of any IP routing protocol. Uses MAC in IP (UDP) encapsulation, allowing 24-bit VXLAN id enabling up to 16 million unique networks. ā€¢ Optimized Flooding Leverages multicast in the transport network to simulate flooding behavior for broadcast, unknown unicast, and multicast in the L2 segment ā€¢ Optimal Routing Leverage ECMP (Equal Cost Multi-pathing) to achieve optimal path usage over the transport network. VXLANā€”Virtual Extensible LAN
  • 20. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 21 Ā© 2015 Cisco and/or its affiliates. All rights reserved. Public VxLAN & EVPN ā€“ Ethernet VPN RFC 7348 Virtual eXtensible Local Area Network RFC 7432 BGP MPLS based Ethernet VPNs A Network Virtualization Overlay Solution using EVPN ā€¢ draft-ietf-bess-evpn-overlay Integrated Routing and Bridging in EVPN ā€¢ draft-ietf-bess-evpn-inter-subnet-forwarding IP Prefix Advertisement in E-VPN ā€¢ draft-rabadan-l2vpn-evpn-evpn-prefix-advertisement VXLAN/EVPN interoperability demonstrated during MPLS/SDN World Congress in Paris Participating Vendors are Cisco, Juniper, Alcatel Lucent & Ixia Independently Tested at EANTC with public available Whitepaper Ciscohttp://www.eantc.de/showcases/mpls_sdn_2015/intro.html
  • 21. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 22 Cisco Confidential 12Ā© 2013-2014 Cisco and/or its affiliates. All rights reserved. ļ‚§ ļ‚§ ļ‚§ ļ‚§ ļ‚§ ļ‚§ Standards based Overlay (VXLAN) with Standards based Control- Plane (EVPN MP-BGP) Layer-2 MAC and Layer-3 IP information distribution by Control-Plane (BGP) Forwarding decision based on Control-Plane (minimizes flooding) Integrated Routing/Bridging (IRB) for Optimized Forwarding in the Overlay Higher scalability than VXLAN Multicast-based only transport (F&L) Control Plane only or with Data plane function (Leafs and Border) What is VXLAN/EVPN?
  • 22. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 23 Why VXLAN Overlay? Customer Needs VXLAN Delivered Any workload anywhere ā€“ VLANs limited by L3 boundaries Any Workload anywhere- across Layer 3 boundaries VM Mobility Seamless VM Mobility Scale above 4k Segments (VLAN limitation) Scale up to 16M segments Secure Multi-tenancy Traffic & Address Isolation VTEP VTEP VTEP VTEP VTEP VXLAN Overlay
  • 23. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 24 VXLAN provides a Fabric with Segmentation, IP Mobility & Scale Why VXLAN? ā€œStandardsā€ based Overlay Leverages Layer-3 ECMP ā€“ all links forwarding Increased Name-Space to 16M identifier Integration of Physical and Virtual Itā€™s SDN ļŠ
  • 24. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 25 Challenges with Traditional VXLAN Deployments Scale and Mobility Limitations LIMITED SCALE Flood and learn (BUM)- Inefficient Bandwidth Utilization Resource Intensive ā€“ Large MAC Tables LIMITED WORKLOAD MOBILITY Centralized Gateways ā€“ Traffic Hair-pining Sub-Optimal Traffic Flow VTEP VTEP VTEP VTEP VTEP VXLAN Overlay Barrier for Scaling out Large Data Centers and Cloud Deployments
  • 25. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 26 Next-Gen VXLAN Fabric with BGP-EVPN Control Plane Delivering Multi-Tenancy and Seamless Host Mobility at Cloud Scale INCREASED SCALE Eliminates Flooding Conversational Learning Policy-Based Updates OPTIMIZED MOBILITY Distributed Anycast Gwy Integrated Routing /Bridging vPC & ECMP INTEROPERABLE Standards Based BGP-EVPN VXLAN VTEP VTEP VTEP VTEP VTEP Route Reflector Route Reflector BGP-EVPN VXLAN Overlay BGP Peers Breaking the Traditional VXLAN Scale Barriers OPERATIONAL FLEXIBILITY Layer 2 or Layer 3 Controller Choice
  • 26. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 27 ACI Fabric ā€“ An IP network with an Integrated Overlay Virtual and Physical ā€¢ Ciscoā€™s ACI solution leverages an integrated VXLAN based overlay ā€¢ IP Network for Transport ā€¢ VXLAN based tunnel end points (VTEP) ā€¢ VTEP discovery via infrastructure routing ā€¢ Directory (Mapping) service for EID (host MAC and IP address) to VTEP lookup PayloadIPVXLANVTEP APIC VTEP VTEP VTEP VTEP VTEP VTEP vSwitchvSwitch VTEPVTEP IP Transport
  • 27. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 28 VXLAN VNID = 5789 VXLAN VNID = 11348 NVGRE VSID = 7456 Any to Any 802.1Q VLAN 50 Normalized Encapsulation Localized Encapsulation IP Fabric Using VXLAN Tagging PayloadIPVXLANVTEP ā€¢ All traffic within the ACI Fabric is encapsulated with an extended VXLAN header ā€¢ External VLAN, VXLAN, NVGRE tags are mapped at ingress to an internal VXLAN tag ā€¢ Forwarding is not limited to, nor constrained within, the encapsulation type or encapsulation ā€˜overlayā€™ network ā€¢ External identifies are localized to the Leaf or Leaf port, allowing re-use and/or translation if required Payload Payload Payload Payload Payload Eth IP VXLAN Outer IP IPNVGRE Outer IP IP802.1Q Eth IP Eth MAC Normalization of Ingress Encapsulation ACI Fabric ā€“ Integrated Overlay Data Path - Encapsulation Normalization 28
  • 28. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 29 ACI Fabric IETF VXLAN Group Based Policy ACI VXLAN (VXLAN) header provides a tagging mechanism to identify properties associated with frames forwarded through an ACI capable fabric. It is an extension of the Layer 2 LISP protocol (draft-smith-lisp-layer2-01) with the additional of policy group, load and path metric, counter and ingress port and encapsulation information. The VXLAN header is not associated with a specific L2 segment or L3 domain but provides a multi-function tagging mechanism used in ACI Application Defined Networking enabled fabric. Ethernet Header Payload FCS Outer IP Outer UDP VXLAN Outer Ethernet Inner Ethernet Payload New FCS VXLAN Instance ID (VNID) M/LB/SPSource GroupFlags Rsvd 8 Bytes 1 Byte N L Rsvd I N: The N bit is the nonce-present bit L: The L bit is the Locator-Status-Bits field enabled bit I: The I bit is the Instance ID bit, Indicates the presence of the VXLAN Network ID (VNID) field. When set, it indicates that the VNID field is valid IP Header Inner IP Header Flags/DR E
  • 29. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 30 ACI leverages VXLAN (RFC Draft)
  • 30. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 31 Troubleshooting Workflows (e.g. EP to EP) ā€¢ Webserver and Application servers are having issues. ā€¢ Used the tool and gave us logical topology and helped us in isolating the issue. ā€¢ We found issue is - LLDP neighbor is bridge and its port vlan 1 mismatches with the local port vlan Unspecified Go see all this working in the World of Solutions ļŠ
  • 31. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 32 Drag and Drop GUI ā€“ 11.2 Release
  • 32. Cisco Confidential 33C97-732424-00 Ā© 2014 Cisco and/or its affiliates. All rights reserved. Advanced Microsegmentation
  • 33. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 34 IP Routing SPT VLAN IP Bridging Start putting aside your networking notions
  • 34. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 35 High SecurityInternalDMZ Review: Typical Network Topology - Shortcomings ADC ADC FW FW (vlan/subnet)(vlan/subnet) (vlan/subnet)(vlan/subnet) (vlan/subnet) (vlan/subnet)
  • 35. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 36 Current Security Zone Practices
  • 36. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 37 DB DB Web Web App Web App ā€¢ The Cisco Application Centric Infrastructure Fabric (ACI) fabric includes Cisco Nexus 9000 Series switches with the APIC to run in the leaf/spine ACI fabric mode ā€¢ These switches form a ā€œfat-treeā€ network by connecting each leaf node to each spine node; all other devices connect to the leaf nodes ACI Terminology ā€“ ACI Fabric Highlights: ā€¢ Turnkey integrated solution with security, centralized management, compliance and scale ā€¢ Automated application centric-policy model with embedded security ā€¢ Broad and deep ecosystem
  • 37. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 38 ACI Terminology ā€“ Application Policy Infrastructure Controller Centralized Point of Management, Automation and Policy Enforcement POLICY: Application centric network policy SECURE: Security and performance at scale VISIBILITY: System-wide visibility, telemetry and health OPENNESS: Open Northbound and Southbound EXTENSIBLE: Hypervisors, L4-7 services integration/chaining INTEGRATED OVERLAY (Physical/Virtual)
  • 38. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 39 Reviewing: Tenant Model 39 Tenant Bridge Domain Bridge Domain Bridge Domain Subnet A Subnet B Subnet D Subnet B Subnet F EPG A EPG C EPG B EPG A EPG B EPG C Customer/ BU/ Group VRF L2 Boundary IP Space(s) Groups of end- points and the policies that define their connection Context Context
  • 39. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 40 Tight Coupling with the Network L4-L7 Services, Location, Identity, Connectivity Physical Servers Virtual Machines network Interface, VLAN, Subnet, Gateway
  • 40. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 41 ACI Abstraction Policy Model End Point Group (EPG) End Points Physical Servers Virtual Machines EPGs are a grouping of end-points representing application or application components independent of other network constructs.
  • 41. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 42 Reviewing: Defining EPG Relationships Via Contracts 42 EPG Web EP 1 EP 2 EPG App EP 1 EP 2 Contract Subject 1 Filter | Action | Label EPG communication is defined by mapping EPGs to one another via contracts. Subject 2
  • 42. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 43 Applying Policy between EPGs: ACI contracts EPG A EPG B EPG CContract 02 The policy model allows for both unidirectional and bidirectional policies. Contracts define the way in which EPGs interact. Unidirectional Communication Bidirectional Communication Contract 01 Ex: ACI Logical Model applied to the ā€œ3-Tier Appā€ ANP
  • 43. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 44 Reviewing: ACI Contracts Application Network Profile C ContractContracts define what an EPG exposes to other app tiers and how Contracts are reusable for multiple EPGs and EPGs can inherit multiple contracts The use of contracts separates ā€˜whatā€™ a policy is from ā€˜whereā€™ it exists, extending its use. C C EPG NFS EPG MGMT EPG DBEPG AppEPG WebC CC 44
  • 44. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 51 ACI ā€“ Prescriptive Microsegmentation Design Options
  • 45. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 52 Summary: Network Profiles 52 Entity Description Tenant Tenant represents a policy owner in the virtual fabric. Application Network Profile Application Profile is the definition of tenant's policy representing a set of requirements that given application instance has on virtualizable fabric. Such policy regulates connectivity and visibility amongst end-points in-scope. End Point Group (EPG) End point groups represent groups of elements (virtual machines, physical servers, etc.) essentially identified by port on a network. EPGā€™s essentially capture groups of machines with the same policies. This is highly efficient as policy changes are propagated from higher level orchestration systems Contracts Contracts represent policies between EPGs. Contracts are ā€œprovidedā€ by one EPG and ā€œconsumedā€ by another. Filters Filters encode specific rules within a contract Bridge Domain Bridge domain is a L2 context (may or may not include broadcast semantics) Context L3 context, essentially a VRF
  • 46. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 53 Hypervisor Interaction with Cisco ACI Integrated Mode ā€¢ Cisco ACI fabric as a policy authority ā€¢ Encapsulations normalized and dynamically provisioned ā€¢ Integrated policy domains across physical and virtual APP WEB DB DB Nonintegrated Mode ā€¢ CiscoĀ® ACI fabric as an IP-Ethernet transport ā€¢ Encapsulations manually allocated ā€¢ Separate policy domains for physical and virtual VLAN 10 VLAN 10 VXLAN 10000
  • 47. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 54 Hypervisor Integration with Cisco ACI Control Channel - VMM Domains ā€¢ Relationship is formed between CiscoĀ® APIC and Virtual Machine Manager (VMM) ā€¢ Multiple VMMs likely on a single Cisco ACI Fabric ā€¢ Each VMM and associated virtual hosts are grouped within Cisco APIC ā€¢ Called VMM domain ā€¢ There is 1:1 relationship between a virtual switch and VMM domain VMware vCenter DVS VMM Domain 1 VMware vCenter AVS VMM Domain 2 VMM Domain 3 VMware vSphere VMware vSphere Microsoft System Center Virtual Machine Manager 2012 Microsoft SCVMM
  • 48. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 55 Hypervisor Integration with Cisco ACI ā€¢ CiscoĀ® ACI fabric implements policy on virtual networks by mapping endpoints to EPGs ā€¢ Endpoints in a virtualized environment are represented as the vNICs ā€¢ VMM applies network configuration by placement of vNICs into port groups or VM networks ā€¢ EPGs are exposed to the VMM as a 1:1 mapping to port groups or VM networks Application Network Profile F/W L/B EPGA PP APP PORT GROUP EPG DB DB PORT GROUP EPG WEB WEB PORT GROUP VM VMVM
  • 49. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 60 VMware Integration Three Options Application Virtual Switch (AVS) ā€¢ Encapsulations: VLAN, VXLAN ā€¢ Installation: VIB through VUM or Console ā€¢ VM discovery: OpFlex ā€¢ Software/Licenses: VMware vCenter with Enterprise+ License vCenter + vShield ā€¢ Encapsulations: VLAN, VXLAN ā€¢ Installation: Native ā€¢ VM discovery: LLDP ā€¢ Software/Licenses: VMware vCenter with Enterprise+ License, vShield Manager with vShield License Distributed Virtual Switch (DVS) ā€¢ Encapsulations: VLAN ā€¢ Installation: Native ā€¢ VM discovery: LLDP ā€¢ Software/Licenses: VMware vCenter with Enterprise+ License VMware vSphere + VMware vShield VMware vSphere
  • 50. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 61 Microsoft Interaction with Cisco ACI Two Options Integration with Microsoft SCVMM ā€¢ Policy management: Through CiscoĀ® APIC ā€¢ Software and license: Microsoft Windows Server with HyperV and SCVMM ā€¢ VM discovery: OpFlex ā€¢ Encapsulations: VLAN and NVGRE (future) ā€¢ Plug-in installation: Manual Microsoft System Center Virtual Machine Manager Integration with Microsoft Azure Pack ā€¢ Superset of Microsoft SCVMM ā€¢ Policy management: Through Cisco APIC or Microsoft Azure Pack ā€¢ Software and license: Microsoft Windows Server with HyperV, SCVMM, and Azure Pack (free) ā€¢ VM discovery: OpFlex ā€¢ Encapsulations: VLAN and NVGRE (future) ā€¢ Plug-in installation: Integrated Windows Azure Microsoft System Center Virtual Machine Manager +
  • 51. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 65 Cisco OpenStack Cisco ACI Model Neutron API Mapping OpenStack CiscoĀ® ACI Tenant Tenant No Equivalent Application Profile Network EPG + Bridge Domain Subnet Subnet Security Group Handled by Host Security Group Rule Handled by Host Router Layer 3 Context Network: External Layer 3 Outside
  • 52. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 66 Group-Based Policy in OpenStack Juno Release https://blueprints.launchpad.net/neutron/+spec/ group-based-policy-abstraction ā€¢ Messy mapping CiscoĀ® ACI to current OpenStack component āˆ’ Endpoint groups (ports + security groups) āˆ’ Contracts (security groups + security group rules) ā€¢ Goal: Introduce Cisco ACI model into OpenStack ā€¢ Starting with groups and group-based policies
  • 53. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 67
  • 54. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 71 Embedded ACI Security ACI Embedded Security L4-7 Services Cisco Security ACI Services Graph Worldā€™s Most Deployed NGFW Highest Rated NGIPS and Breach Detection White-list Policy, Micro-Segmentation L4-L7 Service Automation L4 Distributed Firewall, Multi-Tenancy ASA / FirePOWER / AMP Deep Forensic Analysis Dynamic Workload Quarantine Advanced Protection with ASA, FirePOWER, AMP Integrated protection
  • 55. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 72 L4-L7 Service Automation ā€“ Support for All Devices Any device and cluster manager support Cisco Confidential L4-7 Services Virtual Firewalls L4-7 Service Automation from Virtual/Physical Fabrics Full L4-L7 Centralized Service Automation (With Device Package) Large Ecosystem and Investment Protection Centralized Network Automation (With NO Device Package) New support for L4-L7 Cluster Managers L4- L7 Device Package No Device Package Service Cluster Manager
  • 56. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 73 ACI Ecosystem:
  • 57. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 74 Issues with stateless firewall Source class Source Port Dest class Destination Port Action Consumer * Provider 80 Permit Provider 80 Consumer * permit Stateless Filter Problem: Server can connect to any client port Consumer Provider IP_C, 1234, IP_P, 80, SYN IP_P, 80, IP_C, 1234, SYN+ACK IP_P, 80, IP_C, 2000, SYN+ACK IP_P, 80, IP_C, 4000, SYN Not blocked by fabric Not blocked by fabric Connection Established IP_P, 80, IP_C, 4000, SYN+ACK
  • 58. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 75 Hardware Assisted Stateful firewall Provider B Consumer A Src clas s Src port Dest Clas s Dest port Flag Action A * B 80 * Allow B 80 A * ACK Allow ā€¢ Create flow table entry ā€¢ Forward packet to iLeaf Leaf evaluates stateless policy Hardware policy permits the packet Create flow state only for TCP SYN packet received from PNIC Deliver packet to destination VM Vlan Prot o Src ip Src port Dst ip Dst port Vlan Prot o Src ip Src port Dst ip Dst port Vlan Proto Src ip Src port Dst ip Dst port A tcp IP_A 1234 IP_B 80 A tcp IP_B 80 IP_A 1234 Vlan Prot o Src ip Src port Dst ip Dst port B tcp IP_ A 1234 IP_B 80 B tcp IP_ B 80 IP_A 1234 1 2 3 4 5
  • 59. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 76 Hardware Assisted Stateful firewall Provider B Consumer A Src clas s Src port Dest Clas s Dest port Flag Action A * B 80 * Allow B 80 A * ACK Allow Hardware policy permits the packet Vlan Prot o Src ip Src port Dst ip Dst port Vlan Prot o Src ip Src port Dst ip Dst port Vlan Proto Src ip Src port Dst ip Dst port A tcp IP_A 1234 IP_B 80 A tcp IP_B 80 IP_A 1234 Vlan Prot o Src ip Src port Dst ip Dst port B tcp IP_ A 1234 IP_B 80 B tcp IP_ B 80 IP_A 1234 Response from VM Perform flow table lookup On flow table hit forward packet to ileaf Policy Enforcement done at iLeaf Connection Tracking at vLeaf 8 6 7 9
  • 60. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 77 Hardware Assisted Stateful firewall Case 1: SYN + ACK attack from Provider Provider B Consumer A Entr y Src clas s Src port Dest Clas s Dest port Flag Action 100 A * B 80 * Allow 200 B 80 A * ACK Allow Vla n Prot o Src ip Src port Dst ip Dst port Vla n Prot o Src ip Src port Dst ip Dst port Vlan Proto Src ip Src port Dst ip Dst port A tcp IP_ A 123 4 IP_B 80 A tcp IP_ B 80 IP_A 1234 Vlan Prot o Src ip Src port Dst ip Dst port B tcp IP_ A 1234 IP_B 80 B tcp IP_ B 80 IP_A 1234 SYN + ACK packets Attack from Provider, for which connection is not initiated by Consumer (dest Port != 1234) Packet dropped by vLeaf because of missing flow entry 1 2
  • 61. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 78 Hardware Assisted Stateful firewall Case 2: SYN attack from Provider Provider B Consumer A Entr y Src clas s Src port Des t Clas s Dest port Flag Action 100 A * B 80 * Allow 200 B 80 A * ACK Allow Leaf evaluates stateful policy Vla n Prot o Src ip Src port Dst ip Dst port Vla n Prot o Src ip Src port Dst ip Dst port Vlan Proto Src ip Src port Dst ip Dst port A tcp IP_ A 123 4 IP_B 80 A tcp IP_ B 80 IP_A 1234 Vlan Prot o Src ip Src port Dst ip Dst port B tcp IP_ A 1234 IP_B 80 B tcp IP_ B 80 IP_A 1234 SYN Attack from Provider SYN packets dropped by hardware on iLeaf due to policy 1 2
  • 62. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 79 Distributed Firewall (DFW) on AVS ā€¢ Connection tracking support (TCP) on AVS ā€¢ DFW is only applicable to Virtual End Points. ā€¢ DFW is not applicable to system ports (vmkernel ports) and uplinks. ā€¢ Global (per AVS host) flow limit: 250,000 ā€¢ Per Interface (End Point) flow limit: 10,000 ā€¢ Aging Interval: Adaptive aging (5 minutes ā€“ 2 hours) ā€¢ States for a flow:- ā€¢STATE_SYN_RECV ā€¢STATE_SYN_ACK_RECV ā€¢STATE_ESTABLISHED ā€¢STATE_FIN_RECV ā€¢STATE_ESTABLISHED_ONE_DIR ā€¢STATE_2ND_FIN_RECV ā€¢STATE_FTP_DATA
  • 64. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 81 Docker ā€“ What is it and its goal ? Docker is an open platform for Sys Admins and developers to build, ship and run distributed applications. Docker enables applications to be easy and quickly assembled from reusable components, therefore eliminating the silo-ed approach between development, QA, and production environments. At a high-level, Docker is build of : ā€¢ Docker Engine: portable and lightweight, runtime and packaging tool; ā€¢ Docker Hub: a cloud service for sharing applications and automating workflows, Dockerā€™s main purpose: the lightweight packaging and deployment of applications
  • 65. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 82 ā€¢ Open-Source Container for Dummies ā€¢ Open Source engine to commoditize LXC ā€¢ Create lightweight, portable, isolated, self- sufficient container from any application. ā€¢ Delivers on full DevOps goal: Build onceā€¦ run anywhere. Configure onceā€¦ run anything ā€¢ Ecosystems! OS, VMā€™s, PaaS, IaaSā€¦ What is containers ?
  • 66. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 84 Docker ā€“ How isolation works ? Processes executing in a Docker container are isolated from processes running on the host OS or in other Docker containers. Nevertheless, all processes are executing in the same Linux kernel. Docker leverages LXC to provide separate namespaces for containers, a technology that has been present in Linux kernels for 5+ years. It also uses Control Groups (cgroups), which have been in the Linux kernel even longer, to implement resource auditing and limiting.
  • 67. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 85
  • 68. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 86 Running Docker on your own machine Directly at OS-X On a VM ā€œwrapā€ (Vagrant) At Windows, Linux or OS-X
  • 69. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 87 Docker misconceptions From a multi-host & mission critical applications perspective. ā€¢ If I use Docker then I don't need a configuration management (CM) tool (Ansible, Puppet, etc.); ā€¢ If I learn Docker then I don't have to learn the other systems and CM tools; ā€¢ You should have only one process per Docker container; ā€¢ I should use Docker right now for all! ā€¢ I have to use Docker in order to get the speed and consistency advantages ā€¦ but, using Docker makes all the above easier from a DevOps perspectiveā€¦
  • 70. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 88 Hypervisors vs. Linux Containers Hardware Operating System Hypervisor Virtual Machine Operating System Bins / libs App App Virtual Machine Operating System Bins / libs App App Hardware Hypervisor Virtual Machine Operating System Bins / libs App App Virtual Machine Operating System Bins / libs App App Hardware Operating System Container Bins / libs App App Container Bins / libs App App Type 1 Hypervisor Type 2 Hypervisor Linux Containers (LXC) Containers share the OS kernel of the host and thus are lightweight. However, each container must have the same OS kernel. Containers are isolated, but share OS and, where appropriate, libs / bins.
  • 71. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 89 Hypervisor VM vs. LXC vs. Docker containers
  • 72. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 90 Container Networking Solutions Flannel CoreOS WeaveNet WeaveWorks OVN VMWare Contiv Cisco Calico MetaSwitch Networks Libnetwork Docker OpenShift SDN RedHat Nuage-SDN Nokia OpenContrail Juniper Contiv
  • 73. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 91 Considerations Containers (Docker / LXC) Hypervisors Virtualization approach At the Operating System (OS) level At the Hardware Level Abstraction Application from OS OS from Hardware Applications availability Linux apps able to run on kernel 3.8 and beyond Any that could run into a VM ā€œApplication-readyā€ time ~ 0.5 s (for fire up) ~ 20 s (for VM boot up) Storage consumption Single storage + per layer storage delta Storage space for each instance Save of ā€œnew statusā€ New app ā€œdeltaā€ layer added to the image VM Snapshot or boot new VM (*) Performance Run directly on top of Linux Kernel (**) Hypervisor as a performance ā€œshimā€ Security Via cGroups and namespaces. SELinux helps. Per-VM basis, leverages hypervisor Linux Space User-Space (can leverage Linux kernel modules) Isolated into the VM space. Access to Hypervisor kernel functions varies per solution / vendor. (*) If itā€™s the same OS in every VM, why keep duplicating it in each VM (and then have the storage array de-duplicate it) ? (**) For an application in need of network performance, why put it on a VM in the first place and then bypass the hypervisor for kernel-based performance ? Considerations on VM vs. Docker containers
  • 74. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 92 Docker in OpenStack ā€¢ Havana Nova virt driver which integrates with docker REST API on backend Glance translator to integrate docker images with Glance ā€¢ Icehouse Heat plugin for docker ā€¢ Both options are still under development nova-docker virt driver docker heat plugin DockerInc::Docker::C ontainer (plugin)
  • 75. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 93 VM or BM Basics of Container Networking Minimally Provides: -IP Connectivity in Containerā€™s Network Namespace -IPAM, and Network Device Creation (eth0) -Route Advertisement or Host NAT for external connectivity Container eth0 Container eth0 Physical Network Linux/Windows OS Networking ensp0
  • 76. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 94 Container CNM (Container Network Model) Network Namespace eth0 eth1 Network BlueNetwork Green Endpoint Sandbox Network
  • 77. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 95 CNM (Container Network Model) - Details ā€¢ An endpoint is container's interface into a network ā€¢ A network is collection of arbitrary endpoints ā€¢ A container can belong to multiple endpoints (and therefore multiple networks) ā€¢ CNM allows for co-existence of multiple drivers, with a network managed by one driver ā€¢ Provides Driver APIs for IPAM and Endpoint creation/deletion ā€¢ IPAM Driver APIs: Create/Delete Pool, Allocate/Free IP Address ā€¢ Network Driver APIs: Network Create/Delete, Endpoint Create/Delete/Join/Leave ā€¢ Used by docker engine, docker swarm, and docker compose ā€¢ Also works with other schedulers that runs standard docker containers e.g. Nomad or Mesos docker containerizer
  • 78. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 96 Container (aka Network Namespace) eth0 . . . eth1 CNI (Container Network Interface) Driver Plumbing Differences (from CNM): - Gives Driver freedom to manipulate network namespace - Provide Container Id, Params to drivers - Just Two APIs: -Add Container to Network -Delete Container from Network
  • 79. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 97 CNI (Container Network Interface) - Details ā€¢ Provide Container Create/Delete events ā€¢ Provides access to network namespace to the driver to plumb networking ā€¢ Provides container id (uuid) for which network interface is being created ā€¢ No separate IPAM Driver Container Create returns the IAPM information along with other data ā€¢ Used by Kubernetes i.e. supported by various Kubernetes network plugins
  • 80. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 98 Mac/Windows/Linux Self Guided Hands on Lab ā€“ Topology, etc. ā€¢ Two Linux VMs, interconnected on two networks ā€¢ Self Paced: https://github.com/jainvipin/tutorial tutorial-node1 C1, C2, ā€¦ eth0 eth1 eth2 External Network tutorial-node1 C1, C2, ā€¦ eth0 eth1 eth2 Vlan Bridge Control/VXLAN IP-Router Mgmt Mgmt
  • 81. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 99 Basic Container Networking ā€“ Hands on Lab ā€¢ Default Network Drivers: null, host, bridge ā€¢ Running Containers in default ā€˜bridgeā€™ driver ā€¢ Inspecting Container Network and Container ā€¢ Peeking Inside the Container ā€¢ Reaching outside world vanilla-c eth0 docker0 linux bridge vethxxxx
  • 82. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 100 Networking with Scheduler Integration ā€¢ In a very basic terms, scheduler determines the best place to run an App The algorithm is selectable, and varies e.g. pack a host before scheduling on another Often, takes into consideration the constraints of the application against resources Supports scale-out model for applications to grow/shrink Supports many features and is the substrate of the agile application deployment ā€¢ Networking becomes more application centric with scheduler integrated Application tiers, their network connectivity, policies come and go with Apps Must integrate the association of Apps to their policy and domain The network, policies, priority, etc. must move with the application ā€¢ Popular Schedulers Dockerā€™s Swarm, Googleā€™s Kubernetes, Apache Mesos, Hashicorpā€™s Nomad, etc.
  • 83. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 101 Container Networking Challenges 1. Scale: 200-500 containers per host may not be unusual More Endpoints i.e. IPs More Networks More of Everything! 2. Speed: Comes up in a second (many more simultaneously in a cluster) Automation is a MUST Network (IPAM, DNS, Route-Advertisement) must be quick to provision And work at scale! 3. Layers of Networking: Container Layer, VM Layer, Physical Layer Challenges Visibility: Encap in encap in encap makes it obscure Makes Monitoring/Diagnostics difficult Reduces Performance: Processing at each layer, and Encaps reduce performance More Orchestration layers to deal with (if present)
  • 84. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 102 Container Networking Challenges, Contā€¦ 4. Application Centric (vs. Infrastructure centric) Creating networks as applications need, and dispose them accordingly Must integrate with application blue-print Keeping it easy to consume for application 5. Shared Resources ā€“ Resource Acquisition Ops Policies to define deployment structure 6. Hybrid Cloud Consistency, Security, Connectivity 7. Security Tenancy, Isolation, white-list of specific ports 8. Telemetry and Diagnostics Need to be real time, Must work at the scale/speed
  • 85. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 103 ā€¢ Container industry is focused on creating ability to define applications through Docker Compose, Kubernetes Pod definition etc. ā€¢ As applications move from development to production, there is need to able to define and enforce infrastructure operational policies ā€¢ Contiv is creating industry thought leadership around need for infrastructure policies for containerized applications in a shared infrastructure ā€¢ Contiv provides framework and implementation to address operation intent for Infrastructure. Contiv Addressing Enabling Infrastructure to Run Production Containerized Applications Better
  • 86. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 104 Takeaways 1. Container Networking is pluggable; there are two flavors - (CNI,CNM) for (Kubernetes, Docker) ecosystem respectively 2. Container Networking is met with a new set of challenges - There are solutions to those problems - Some are being addressed 3. Native Connectivity brings better performance, visibility and scale - Layering may obscure visibility, decrease scale and performance 4. Contiv Networking provides a variety of container connectivity options - With Native connectivity, it can provide scale, performance and visibility - It provides secure connectivity to group of applications
  • 87. Ā© 2016 Cisco and/or its affiliates. All rights reserved. 105 Container References 1. CNI Specification https://github.com/containernetworking/cni/blob/master/SPEC.md 2. CNM Design https://github.com/docker/libnetwork/blob/master/docs/design.md 3. Contiv User Guide http://docs.contiv.io 4. Contiv Networking Code https://github.com/contiv/netplugin 5. Basic Networking Tutorial ā€“ Self Guided https://github.com/jainvipin/tutorial 6. Contiv Policy Tutorial ā€“ Self Guided https://github.com/jainvipin/libcompose/tree/deploy/deploy 7. Other Documentation: https://docs.docker.com, http://docs.kubernetes.io