Cisco Virtual Networking Solutions for Hyper-VAppaji Malla, Sr. Product ManagerChakri Avala, Sr. Product ManagerData Center Group, Cisco Systems
IM-B291
Legal Disclaimer
Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This roadmap is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.
Agenda• Cisco Virtual Networking Solutions• Cisco Nexus 1000V for Hyper-V
• Product Overview• Public Beta• Nexus 1000V Demo
• Cisco VM-FEX for Hyper-V• Product Overview • Demo
Overlay Technology
Support
Operational Complexity
Managing networks across physical & virtual environments
Maturing Hypervisor
market Economics Use-cases
requiring different hypervisors
Public Cloud
Security concerns for public cloud
Mobility concerns
Resource Utilization
VM Mobility across DC
Mobility across DCs and across clouds
Customer Issues in virtualized environments
Virtual Services
Secure virtual environment
Rich network services
Diverse Virtualization Requirements for DataCenter Customers
Multi-services support with
vPath
Multi-hypervisor
Support
Consistent Operational
ModelMulti-cloud
support
Cisco Vision
• One app per Server• Static• Manual provisioning
• Many apps per Server• Mobile• Dynamic provisioning
• Multi-tenant per Server• Elastic• Automated Scaling
HYPERVISORVDC-1 VDC-2
CONSISTENCY: Policy, Features, Security, Management
Nexus 1000V, VM-FEX
Virtual WAAS, VSG, ASA 1000V, vNAM*UCS for Virtualized Workloads
Nexus 7K/5K/3K/2K
WAAS, ASA, NAMUCS for Bare Metal
Cloud Services Router (CSR 1000V)ASR
SwitchingRoutingServicesCompute
PHYSICAL WORKLOAD
VIRTUAL WORKLOAD
CLOUDWORKLOAD
Cisco Virtual Networking & Services Vision
Multi-Hypervisor
Multi-Services
Multi-Cloud
Nexus 1000V
Certified for various Microsoft applications
Cisco Nexus 1000V Cisco UCS VM-FEX
Cisco UCS Manager Cisco UCS PowerTool
Cisco Unified Computing (UCS)
Cisco Delivers Optimum IT Infrastructure For Your Microsoft Windows Server 2012 Environment
ManageabilityCompute Networking
Bring network to the hypervisor(Cisco Nexus 1000V Switch)
UCS VICUCSServer
Bring VM awareness to physical network(Cisco UCS VM-FEX)
Cisco Nexus 1000V
AdapterServer
VM-FEX
IEEE 802.1Q NetworkUCS
Fabric Inter-connect
Cisco Virtual Networking Solutions Cisco Nexus 1000V and UCS VM-FEX
VM VM VM VM VM VM VM VM
Cisco Nexus 1000V for Microsoft Hyper-V
Cisco Nexus 1000V Open for Public Beta
Cisco Nexus 1000V PricingTiered Licensing – Essential & Advanced Editions
Essential ($0) Advanced ($695/cpu)VLANs, ACL, QoS vPath LACP Multicast Netflow, SPAN, ERSPAN Management (SNMP etc.) SCVMM Integration DHCP Snooping IP Source Guard Dynamic ARP Inspection Virtual Security Gateway**
** Only supports network-attributes
Cisco Nexus 1000V ArchitectureUtilizes Hyper-V Extensible Switch Platform
Nexus 1000V VSM
Extensible vSwitch
Capture ExtensionFilter Extension
ForwardingNexus 1000V VEM
VM VM VM VM
VNICs Advanced NX-OS feature-set
Innovative Services architecture (vPath)
Consistent operational model
SCVMM IntegrationPNICs
Cisco Nexus 1000V ArchitectureConsistent operational model across physical and virtual
WS 2012 Hyper-V
Modular Switch
…Linecard-N
Supervisor-1 (Active)Supervisor-2 (StandBy)
Linecard-1Linecard-2
Back
Pla
ne
VEM-NVEM-1 VEM-2
VSM: Virtual Supervisor ModuleVEM: Virtual Ethernet Module
VSM-1 (active)
VSM-2 (standby)
Virtual ApplianceNetworkAdmin
ServerAdmin
NX-OSControl Plane
NX-OSData Plane
WS 2012 Hyper-V WS 2012 Hyper-V
System Center Virtual Machine Manager
CiscoNexus1000V VEM
CiscoNexus1000V VEM
Cisco Nexus1000V VEM
VM VM VM VMVM VM VM VMVM VM VM VM
Cisco Nexus 1000V VSM
Virtual Supervisor Module (VSM)• Virtual or Physical appliance running
Cisco NXOS (supports Hi-availability)• Performs management, monitoring,
and configuration• Tight integration with management
platforms
Virtual Ethernet Module (VEM)
• Enables advanced networking capability on the hypervisor
• Provides each virtual machine with dedicated “switch port”
• Collection of VEMs :1 virt. Distributed Switch
WS 2012 Hyper-V WS 2012 Hyper-VWS 2012 Hyper-V
Server Server Server
Cisco Nexus 1000V Architecture A simple Deployment Scenario
Switching L2 Switching, 802.1Q Tagging, Rate Limiting (TX) IGMP Snooping, QoS Marking (COS & DSCP)
Security Policy Mobility, Private VLANs w/ local PVLAN Enforcement Access Control Lists (L2–4 w/ Redirect), Port Security Dynamic ARP inspection*, IP Source Guard*, DHCP Snooping*
Provisioning
Visibility Live Migration Tracking, NetFlow v.9 w/ NDE, CDP v.2 VM-Level Interface Statistics SPAN & ERSPAN (policy-based)
Management VM Network Provisioning (port-profiles), CiscoWorks, Cisco DCNM Cisco CLI, Radius, TACACs, Syslog, SNMP (v.1, 2, 3) Hitless upgrade, SW Installer
Network Services Virtual Services Datapath (vPath) support for traffic steering & fast-path
off-load [leveraged by Virtual Security Gateway (VSG) and other services]
Full integration with System Center – VM Manager (SCVMM) Faster network policy provisioning through port profiles
Cisco Nexus 1000V Features
* Only with Advanced Edition
Port Profiles: Faster VM Deployment
Port ProfilesDefined PoliciesWEB AppsHRDBDMZ
Policy-Based VM Connectivity
Mobility of Network and Security Properties
Non-Disruptive Operational Model
Cisco Virtual Networking
Nexus1000V VEM
Nexus1000V VEM
VM Connection Policy• Defined in the network• Applied in SCVMM
VMVM VM VM VMVM VM VM
VM Mgmt Station Nexus 1000V VSM
Server Server
Hypervisor Hypervisor
Port Profiles: Policy Mobility with VM Migration
VMs Need to Move• VM Migration• Resource Scheduling• SW upgrade/patch• Hardware failure
Policy-Based VM Connectivity
Mobility of Network and Security Properties
Non-Disruptive Operational Model
Cisco Virtual Networking
VM VM VM VM
VMVM VM VM
VM Mgmt Station Nexus 1000V VSM
VMVM VM VM
VM NetworkingMobility
• Live Migration• Ensures VM security• Maintains connection
state
Nexus1000V VEM
Nexus1000V VEM
Server Server
Hypervisor Hypervisor
Microsoft SCVMM Networking Concepts• Logical Networks• Network Sites• VM Networks• Port Classification• IP-Pools
Host5
VM VM VM
Host6
VM VM VM
Host3
VM VM VM
Host4
VM VM VM
Host1
VM VM VM
Host2
VM VM VM
Logical Network
Microsoft SCVMM Networking Concepts
Logical Network represents a network with a certain type of connectivity characteristics (for eg. DMZ network, intranet, isolation)
20
Network Site
San Jose Seattle
Network SiteNetwork Site
An instantiation of a Logical network on a set of host-groups (for eg. hosts in a POD) is called a Network Site
Logical Networks and Network Sites
Microsoft SCVMM Networking Concepts
21
VMs are Connected to VM-networks; these can be backed by either VLANs or other overlay mechanisms (e.g. NVGRE segments). The first release of the Cisco Nexus 1000V Switch only supports VLAN-backed VM-networks.
Virtual Machine Networks
Microsoft SCVMM Networking Concepts
Extensible vSwitch
CaptureFiltering
Forwarding
VM VM VM VM
VNICs
Bundling of profiles from each extension is the port-classification
PNICs
Port-Classifications
Microsoft SCVMM Networking Concepts
• Choose network• VM Network• VM Subnet is tied to the Network (1:1)
• Choose IP address type • Can be dynamic (DHCP) or statically assigned• Choose IP pool for static IPs
• Choose Port Profile Classification• Policy (QoS, Security, Monitoring)• A Classification refers to a Port Profile
Associating VM VNICs to VM Networks & Port-classifications
Logical Network ‘DMZ’
Microsoft SCVMM Networking Concepts
24
Network Site ‘DMZ_POD1’
VM Netwrk:DMZ_Pod1_Subn1
VM Netwrk:DMZ_Pod1_Subn2
VM Netwrk:DMZ_Pod1_Subn3 Network Site
‘DMZ_POD2’
DMZ_Pod2_Subnet1
DMZ_Pod2_Subnet2
DMZ_Pod2_Subnet3
ClientsVM VM VM
Putting everything together
IP-Pool1
IP-Pool2
IP-Pool3
IP-Pool4
IP-Pool5
IP-Pool6
GuestsVM VM
ServersVM VM
Guest AccessApplication Server
Intranet ClientPrivileged Client
Port-profiles
Cisco Nexus 1000V TerminologySCVMM Terminology Cisco Nexus 1000V Terminology
Logical Networks Logical Networks
Network Sites Network Segment Pools
VM Networks Network Segments
IP-Pools IP-Pools & IP-Pool Templates
Port-Classifications Port-profiles
# logical-network DMZ…..# network-segment-pool DMZ_POD1…..# network-segment DMZ_POD1_SUBNET1 switchport mode accessswitchport access vlan 20ip-pool DMZ_POD1_Pool1network-segment-pool DMZ_POD1
# network-segment DMZ_POD1_SUBNET2switchport mode accessswitchport access vlan 21ip-pool DMZ_POD1_Pool2network-segment-pool DMZ_POD1
# network-segment DMZ_POD1_SUBNET3switchport mode accessswitchport access vlan 22ip-pool DMZ_POD1_Pool2network-segment-pool DMZ_POD1
Defining “Network sites” and “VM Networks”
Network Site “DMZ_POD1”VM Network DMZ_POD1_SUBNET1VM Network DMZ_POD1_SUBNET2VM Network DMZ_POD1_SUBNET3
Logical network “DMZ”
• Networks and Profiles are Two Different Things• Different ports need different protection on the
same network
27
Network Segments and Port Profiles
One network, multiple profiles for access
Network SegmentIntranet
Clients Guests Servers
VM VM VM VMVMVMVM
Guest AccessApplication Server
Intranet ClientPrivileged Client
Port-profiles
And many networks can share the same protection requirements
28
Network Segments and Port Profiles
Multiple networks use the same profiles
Tenant A Intranet
Clients Guests Servers
VM VM VM VMVMVMVM
Tenant B Intranet
Clients Guests Servers
VM VM VM VMVMVMVM
Tenant C Intranet
Clients Guests Servers
VM VM VM VMVMVMVM
Guest AccessApplication Server
Intranet ClientPrivileged Client
Port-profiles
Cisco Nexus 1000V for VMware vSphere Cisco Nexus 1000V for Microsoft Hyper-V
Defining Port-profiles
# port-profile applicatoin-clientip port access-group application-client inno shutstate enabled
# port-profile application-serverip port access-group application-server inno shutstate enabled
# network-segment application-networkswitchport mode accessswitchport access vlan 10
Application Clients Application Servers
Application Network (VLAN 10)
VM VMVM VM
# port-profile application-clientswitchport mode accessswitchport access vlan 10ip port access-group applicatoin-client inno shutstate enabled
# port-profile intranet-serverswitchport mode accessswitchport access vlan 10ip port access-group application-server inno shutstate enabled
Cisco Nexus 1000V Operational Model
Networks & policies synced to SCVMM
Adds hosts to N1KVConnects VMs (VNICs) to VM NetworksConfiguration data and
policies sent to N1KV VEM
Nexus1000V VEM
Server
Nexus 1000VVSM
WS 2012 Hyper-V
SCVMM
NetworkAdmin Create networks and
policies (logical networks, network sites, VMnetworks)
SCVMM manages the placement and live-migration of the VMs based on the constraints between VM networks and the network sites.
VM VM VM VM
ServerAdmin
1
2
3
4
5
Cisco Nexus 1000V REST API Support
Construct the URL using the above
template
Arguments are passed to APIs in
JSON format
Use a web-browser or Powershell to
query VSM
Parse XML response to get the
required information
URI: http://<VSM-IP-address>/api/<object-locator>
CRUD Operations through VSM RESTful APIsCreate an object* HTTP POST
Read an object HTTP GETUpdate an object HTTP POSTDelete an object HTTP DELETE*Objects can be VM networks, Port-profiles, IP-Pools etc.
Write/Update Operations are only supported on limited set of objects
Accessing Cisco Nexus 1000V from Powershell• #Set up the basic Parameters Required for API Calls
• $User = "admin"• $Password = ConvertTo-SecureString –String "Secret123" –AsPlainText -Force• $VSMIPaddress = "10.105.228.108"• $URI = "http://"+ $VSMIPaddress + “/api/”• $Credentials = New-Object –TypeName System.Management.Automation.PSCredential –
ArgumentList $User, $Password
• #Create IP-Pool Information - HTTP POST• $IPPURI=$URI +"hyper-v/ip-address-pool"• $IPPArg = '{"name":"pool1", "addressRangeStart":"192.168.0.2",
"addressRangeEnd":"192.168.0.16"}‘• ConvertFrom-Json -InputObject $IPPArg• Invoke-RestMethod -Uri $IPPURI -Credential $Credential -Method Post -Body $IPPArg
Accessing Cisco Nexus 1000V from Powershell• #Update IP-Pool Information - HTTP POST
• $IPPURI=$URI +"hyper-v/ip-address-pool/pool1"• $IPPArg = '{ "addressRangeStart":"192.168.0.5", "addressRangeEnd":"192.168.0.20"}‘• ConvertFrom-Json -InputObject $IPPArg• Invoke-RestMethod -Uri $IPPURI -Credential $Credential -Method Post -Body $IPPArg
• #Read VSEM Information - HTTP GET• $VersionURI = $URI + "/api/hyper-v/vsem-system-info“• Invoke-RestMethod -Uri $VersionURI -Credential $Credential -Method Get -Outfile testout.xml
• #Delete VM Network – HTTP DELETE• $VMNURI = $URI +"hyper-v/vm-network-definition/vmn4"• $VMNArg = '{"name":"VMN4"}‘• ConvertFrom-Json -InputObject $VMNArg• Invoke-RestMethod -Uri $VMNURI -Credential $Credential -Method Delete -Body $VMNArg
Cisco Nexus 1000V SCOM Plugin from Jalasoft• Xian SCOM Plugin for Nexus 1000V• Monitors various metrics:
• Availability (ICMP and SNMP)• TCP Connections• Uptime• Traffic, total, error etc.• Bandwidth
34
Consistent Network Services
• Leverage existing virtual servicesVirtual Security Gateway, virtual NAM, NAM on Nexus 1010
• Services can be hosted on Nexus 1010
Consistent Networking Features
• NX-OS feature across multiple hypervisors & across physical• Advanced NX-OS switching features, including security, visibility,
QoS, segmentation, port channelling etc.
Consistent Operational Model
• NX-OS CLI across multiple hypervisors & across physical• Separation of duties between network & server admins• Dynamic provisioning and VM mobility awareness• Leverage existing monitoring and management tools
Cisco Nexus 1000V: Customer Benefits
Nexus 1000V Services Architecture (vPath)
Nexus 1000VDistributed Virtual Switch
VM VM VM
VM VM
VM
VM VM VM
VM
VM
VM VM VM
VM VM VMVM
VM
vPath
Log/AuditInitial Packet Flow
Virtual Security Gateway (VSG)*
1 Flow Access Control(policy evaluation)
2
DecisionCaching 3
4
Intelligent Traffic Steering with vPath
* First version only supports network attributes
Nexus 1000VDistributed Virtual Switch
VM VM VM
VM VM
VM
VM VM VM
VM
VM
VM VM VM
VM VM VMVM
VM
vPath
Remaining packets from flow
ACL offloaded to Nexus 1000V
(policy enforcement)
Log/Audit
Virtual Security Gateway (VSG)*
Performance Acceleration with vPath
* First version only supports network attributes
Public Beta Participation
Open for Public Beta: [email protected]
Beta Bundle on N1KV Community page• Cisco Nexus 1000V software
• Virtual Supervisor Module (VSM) ISO • Virtual Ethernet Module (VEM) MSI package• VSEM Provider MSI Package• Cisco Nexus 1000V Installer Application
• Beta Test-cases Document• Feature Documentation & Videos
Cisco Nexus 1000V Installater Application
Provide SCVMM Credentials Provide Host info for Primary & Secondary VSM
Cisco Nexus 1000V for Hyper-V Demo
Win 2012 Hyper-V Win 2012 Hyper-V
NAM
Cisco Nexus 1000V Demo Topology
Nexus 1000V VSM
Nexus1000V VEM
Nexus1000V VEM
Configure the port-profiles so that web-server access is restricted:• Employee can access• Contractor is restricted
NAM (or any other monitoring tool) can be configured to analyze the VM-to-VM traffic using ERSPAN on N1KV.
ContractorEmployee Web Server
Cisco UCS VM-FEX
Bring network to the hypervisor(Cisco Nexus 1000V Switch)
UCS VICUCSServer
Bring VM awareness to physical network(Cisco UCS VM-FEX)
Cisco Nexus 1000V
AdapterServer
VM-FEX
IEEE 802.1Q NetworkUCS
Fabric Inter-connect
VM VM VM VM VM VM VM VM
Cisco Virtual Networking Solutions Cisco Nexus 1000V and UCS VM-FEX
47
Cisco UCS VM-FEX • Unify the virtual
and physical network• Same Port Profiles for various
hypervisors and bare metal servers
• Consistent functions, performance, management
Simplifying the Access InfrastructurePhysical Network
Virtual Network
Hyp
ervi
sor
Hyp
ervi
sor
VMVMVMVMVMVMVMVM
VETH
VNIC
Server Server
48
Cisco UCS VM-FEX• Removing performance
dependencies from VM location
• Offloading software switching functionalities from host CPU
• More on this in upcoming slides
Traffic ForwardingPhysical Network
Hyp
ervi
sor
Hyp
ervi
sor
VMVMVMVMVMVMVMVM
VETH
VNIC
UCS VM-FEX Modes of OperationEnumeration vs. Hypervisor Bypass
49
Hyper-V 2012
Emulated Mode
vEthvEth
dvNICdvNIC
Hypervisor Bypass
dvNICdvNIC
Hyper-V 2012
vEthvEth
Standard (Emulated) Mode
Each VM gets a dedicated PCIe device
~12%-15% CPU performance improvement
Appears as distributed virtual switch to hypervisor
LiveMigration supported
High Performance Mode Co-exists with Standard
mode Bypasses Hypervisor layer ~30% improvement in I/O
performance Appears as distributed virtual
switch to hypervisor Currently supported through
SR-IOV with Hyper-V 2012 Live Migration supported
VF VFVF VF
PF
SvNIC
vEth
SvNIC
vEth
PF
50
VM-FEX Operational ModelLive Migration with Hypervisor Bypass
vNICvNIC
Hyper-V 2012
vEthvEth vNIC
vSphere 4
vEth
Temporary transition from SR- IOVto
standard I/O
• VM Sending TCP stream (1500MTU) • UCS B200 M2 blades with UCS VIC card
19:0
6:19
19:0
6:21
19:0
6:23
19:0
6:25
19:0
6:27
19:0
6:29
19:0
6:31
19:0
6:33
19:0
6:35
19:0
6:37
19:0
6:39
19:0
6:41
19:0
6:43
19:0
6:45
19:0
6:47
19:0
6:49
19:0
6:52
0
2500
5000
7500
10000
Time (secs)
Mbp
s
LiveMigration to secondary
host
1 sec silent period
Hyper-V 2012
UCS VM-FEX with SCVMM Architecture
Server Admin
Network Admin
UCS Provider
Plugin
Hyper-V Host
UCS VM-FEX Forwarding Extension
Fabric Interconnect
UCS Manager
NX-OS
Dynamic VM-FEX Veth link provisioning
Pull Fabric, VM Network and Port Profile Definitions
SCVMM
FND: PRIVATE-NYC
FND: PUBLIC-NYC
VM1 VM2
vSwitch
SAVBU-NET, Silver-VPP
NMTG-NET, Silver-VPP
VM3
vSwitch
NMTG, Gold-VPP
VM4 VM5
vSwitch
SAVBU-NET, Silver-VPP
WEB, Bronze-VPP
VM6
vSwitch
NMTG-NET, Silver-VPP
HOST GROUP: ENGG-NYC HOST GROUP: SALES-NYC
L o g i c a l S w i t c h ( D V S )
Uplink PP-Engg
Uplink PP-Sales
Gold-VPP Bronze-VPP
Host 1 Host 2 Host 3 Host 4
VMND: WEB, VLAN: 155
VMND: SAVBU-NET, VLAN: 110
VMND: NMTG-NET, VLAN: 120
SAVBU-NET, Gold-VPP
Silver-VPP
FND: PRIVATE-SJC
FND: PUBLIC-SJC
VM1 VM2
vSwitch
SAVBU-NET, Silver-VPP
NMTG-NET, Silver-VPP
VM3
vSwitch
NMTG, Gold-VPP
VM4 VM5
vSwitch
SAVBU-NET, Silver-VPP
WEB, Bronze-VPP
VM6
vSwitch
NMTG-NET, Silver-VPP
HOST GROUP: ENGG-SJC HOST GROUP: SALES-SJC
L o g i c a l S w i t c h ( D V S )
Uplink PP-Engg
Uplink PP-Sales
Gold-VPP Bronze-VPP
Host 1 Host 2 Host 3 Host 4
VMND: WEB, VLAN: 55
VMND: SAVBU-NET, VLAN: 10
VMND: NMTG-NET, VLAN: 20
SAVBU-NET, Gold-VPP
Silver-VPP
UCS – Single Logical Switch per UCSM
UCS-SJC UCS-NYC
PUBLIC
PUBLIC
VM Live Migration Boundary
1 •Define Networks in UCSM
2 •Setup SCVMM to use UCS networks
3 •Assign VM networks
4 •Provision Hyper-V hosts
5 •Provision VM
6 •Use VM
SCVMM with UCS WorkflowStep by Step
•Define Fabric & VM networks, port-profiles (port-classification)•Create SCVMM and associated logical switch instance
• Install UCS Plugin & Forwarding Extension, Create VSEM instance as provider• Provider will fetch all the network definitions from UCS and periodically poll for updates
• Associate SCVMM Native VM network to externally (UCS) provided VM networks
• Assign Hyper-V hosts to above logical switch instance• VM-FEX Forwarding Extension driver is automatically installed on Hyper-V host by
SCVMM• Create VM Instance• Assign VM NIC to a VM Network & port classification• Upon power on of VM, VMFEX driver establishes network link with UCS Fabric
Interconnect• FI enforces port classification as per assigned port profile properties
UCS SCVMM Example
54
VM-FEX Forwarding Extension View in SCVMM
UCS SCVMM Example
55
VM-FEX Virtual Machine View in SCVMM
UCS SCVMM Example
56
SCVMM VM Instance View in UCSM
Cisco VM-FEX for Hyper-V Demo
Additional Resources• Cisco Nexus 1000V for Microsoft Hyper-V: http://
www.cisco.com/en/US/products/ps13056/index.html• Cisco Nexus 1000V: http://www.cisco.com/go/nexus1000v • UCS VM-FEX: http://www.cisco.com/go/vmfex • Cisco-Microsoft Partnership:
http://www.cisco.com/go/microsoft • Cisco N1KV/Hyper-V Mailer-list:
[email protected] • Cisco N1KV/Hyper-V Beta Mailer:
[email protected]• Cisco UCS VM-FEX Mailer-list:
N1K Public Webcasts, Spring 2013Webinar Link: www.cisco.com/go/1000vcommunity
Date Technical Track Topic Webinar Preso2/21/13 Cisco Open Network Environment (Cisco ONE) – SDN Play PDF2/28/13 Cisco One Platform Kit (onePK): Technical Deep Dive and key use cases Play PDF3/06/13 Nexus 1000V for Hyper-V with Microsoft SCVMM integration w/ live
demo Play PDF3/13/13 Cisco ONE Controller: Technical Deep Dive and Key Use Cases Play PDF3/20/13 5000 Seat VDI Architecture: Cisco UCS & N1KV, Citrix XenDesktop, and
EMC VNX Play PDF
3/27/13 N1KV v2.2 for vSphere: More scale, Multicast-less VXLAN, VXLAN Gateway Play PDF
4/03/13 Cloud Services Router (CSR 1000V): Technical deep dive and key use cases Play PDF
4/10/13 Cloud Security with ASA 1000V and Virtual Security Gateway v2.1 (VSG) Register
4/17/13 Secure Hybrid Cloud solution with Nexus 1000V InterCloud & VNMC InterCloud Register
4/24/13 Nexus 1100 for Cloud Network Services: New Services & Ecosystem Register 5/01/13 Cloud Networking Services: vNAM and vWAAS Register 05/08/13 VMDC solution with Cloud Networking Services Register 5/15/13 Nexus 1000V for KVM (with OpenStack and VXLAN) Register
N1K Public Webcasts, Fall 2012Webinar Link: www.cisco.com/go/1000vcommunity
Date Technical Track Topics Webinar Preso9/26/2012 Nexus 1000V on Hyper-V with Windows Server 2012 (Blog) Play PDF9/27/2012 Nexus 1000V 2.1: Latest Innovations in Virtual Machine Networking (w/
demo) Play PDF10/3/2012 Best Practices for Deploying VXLAN w/ N1KV Play PDF
10/10/2012Cisco's Open Network Environment (ONE) update – includes network programmability, controller & OF, virtual overlays & open clouds
Play PDF
10/24/2012 Securing Clouds with ASA 1000V and VSG w/ vPath 2.0 Play PDF10/31/2012 Cloud Services Router (CSR) 1000V: Connect to provider-
hosted clouds Play PDF
11/7/2012 Openstack @ Cisco & Quantum support for Nexus 1000V on KVM Play PDF
11/14/2012 Nexus 1000V for Hyper-V: Enable Multi-hypervisor & Multi-service Clouds (w/ demo) Play PDF
N1K Public Webcasts, Spring 2012Webinar Link: www.cisco.com/go/1000vcommunity
Date Technical Track Topics Webinar Preso2/14/12 Virtual Security Gateway (VSG) v1.3 Play PDF2/22/12 Nexus 1000V v1.5 Technical Deep Dive Play PDF2/29/12 Nexus 1010-X v1.4 Technical Deep Dive Play PDF3/7/12 vWAAS and Nexus 1000V Technical Deep Dive Play PDF3/14/12 FlexPod & Nexus 1000V/1010 Play PDF
3/21/12VMDC QoS for Hybrid Cloud-based Multimedia Services with N1KV Play PDF
3/28/12 Vblock & Nexus 1000V / VSG / vWAAS Play PDF
4/4/12vCloud Director, Nexus 1000V, and VXLAN Technical Deep Dive Play PDF
4/11/12Cisco's CloudLab Deep Dive: Hands-on labs for N1KV, VSG & VXLAN Play PDF
4/18/12 NAM and DCNM on the Nexus 1010 and 1010-X Play PDF
Evaluation
Complete your session evaluations today and enter to win prizes daily. Provide your feedback at a CommNet kiosk or log on at www.2013mms.com.Upon submission you will receive instant notification if you have won a prize. Prize pickup is at the Information Desk located in Attendee Services in the Mandalay Bay Foyer. Entry details can be found on the MMS website.
We want to hear from you!
Resources
http://channel9.msdn.com/Events
Access MMS Online to view session recordings after the event.
Appendix