Download presentation
Presentation is loading. Please wait.
Published byElijah Whitehead Modified over 7 years ago
1
Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering June, 2014
2
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Physical Infrastructure Management
3
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Objectives Learn New Physical Infrastructure Enhancements Agenda Compute Features UCSM 2.2 HP OA Storage Features VPLEX Storage - Isilon RP Network Features ASAv Nexus 9K ISE F5 Load Balancer support(BIG IP LTM only)
4
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Compute
5
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Inband Support Enhanced Boot Order KVM Console Direct Access Connection policies (usNIC and VMQ)
6
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Inband management support o Added as part of service profile and service profile template action and task o IPV4 and IPV6 address type supported o Static IP address and IP pool support is added in service profile. o IP pool support is added in service profile template. [Static is not applicable for template]
7
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Legacy or UEFI boot mode support Enables the creation of boot policies with multiple local boot devices. Provides precision control over the actual boot order. Flex Flash (Local SD Card) Support: Limitation 1 : For Boot order change,we can change the order for parent element like LAN and SAN.But we cannot change the order in between primary vNIC and secondary vNIC within LAN. Limitation 2 : We can either select Local Disk or its sub options like Local LUN or SD card. Similarly for CD ROM and Floppy Device also
8
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Domain access the KVM for their servers directly using a web browser TPM Monitoring (P1) Trusted Platform Module (TPM) is included on all Cisco UCS M3 blade and rack-mount servers We need to enable the TPM for particular server. Then only we will able to see the inventory data in UCSD
9
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 VMQ and usNic policies association supported is added in vNIC template. If we choose the usNIC (User Space NIC) or VMQ (Virtual Machine Queue) connection policies we can select existing usNIC or VMQ connection policies else set default policy of Dynamic connection policy will be set.
10
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 HP Onboard Administrator Support
11
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 HP Onboard Administrator Support
12
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Support for HP OA Device Inventory Reports Summary Blade Servers NIC CPU/Memory Boot Order Power Management Racks FRUs VLANs Enclosure Power Supply Fan Enclosure Temperature Server Firmware Devices Functionality Supported (both UI Actions/Workflow Tasks) Power Off Blade Power On Blade Reboot Blade Modify One Time Boot Order Modify Boot Order Resolve Network Address(only Workflow task) Converged View
13
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 ABOUT HP OA HP Onboard Administrator (OA) is the enclosure management processor, subsystem, and firmware base that supports the HP BladeSystem c-Class enclosure and all the managed devices contained within the enclosure. Using OA, you can perform the basic management tasks on server blades or switches within the enclosure. HP OA Specifications Supported and Tested: Version: 3.60 Module 3– Physical Infrastructure Management
14
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 HP OA- Management/Account Addition To UCSD
15
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
16
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 HP OA- Reports
17
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 UCSD supports the following reports Summary Blade Servers NIC CPU/Memory Boot Order Power Management Racks FRUs VLANs Enclosure Power Supply Fan Enclosure Temperature Server Firmware Devices
18
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
19
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
20
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
21
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
22
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
23
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
24
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
25
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
26
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
27
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
28
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
29
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
30
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
31
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
32
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 HP OA - Orchestrations Tasks/Actions
33
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 The below tasks are available from HP OA Tasks
34
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 HP OA – Converged View
35
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
36
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Storage
37
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 Support for VPLEX Local, Metro Inventory Reports (Summary, Clusters, Rule sets, Engines, Directors, FC Ports, Target Ports) CRUD operations (Create/Update/Delete - both UI Actions/Workflow Tasks) & Reports: Storage Arrays Storage Volumes Extents Devices Virtual Volumes Logging Volumes Consistency Groups Storage Views Initiators Distributed Devices Converged View Workflows: Provision Local and Distributed Device storage as Datastore (FC) Local and Remote device mirroring. Stack View
38
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 VPLEX - Management/Account Addition
39
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 VPLEX implements a distributed "virtualization" layer within and across geographically disparate Fibre Channel storage area networks and data centers
40
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
41
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
42
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 VPLEX - Reports
43
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Summary Clusters Storage Arrays Storage Volumes Extents Devices Components Virtual Volumes Storage Views Logging Volumes Consistency Groups Virtual Volumes Storage Views Initiators Target Ports Virtual Volumes Initiators Target Ports Virtual Volumes Initiators Storage Views Engines Directors FC Ports Distributed Devices Rule Sets
44
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
45
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
46
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
47
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
48
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
49
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
50
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
51
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
52
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
53
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
54
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
55
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
56
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
57
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
58
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
59
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
60
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
61
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
62
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 VPLEX Orchestrations Tasks/Actions
63
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
64
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Isilon- Management/Account Addition To UCSD
65
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Isilon System The core technology of the Isilon clustered storage consists of OneFS, which provides a single unified operating system. OneFS file system is a parallel distributed networked file system designed by Isilon Systems for use in its Isilon IQ storage appliances. OneFS is a FreeBSD variant and utilizes zsh as its shell. OneFS is equipped with options for accessing storage via NFS, CIFS/SMB, FTP, HTTP, iSCSI.
66
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
67
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 Isilon- Reports
68
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 Summary Storage Pool Tiers Node Pools Storage Pool Settings SMB Shares Permissions NFS Exports NFS Datastores Users Groups Namespace Access Zones Quotas Quota Reports Quota Report Settings Snapshots Snapshot Schedules System Jobs Job Summary System Job Policies Schedules System Job Reports Report Result Deduplication Report Result Datastores
69
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69
70
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70
71
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
72
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
73
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
74
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
75
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75
76
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76
77
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77
78
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78
79
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79
80
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80
81
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81
82
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82
83
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83
84
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84
85
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85
86
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86
87
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87
88
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88
89
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89
90
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90
91
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91
92
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92
93
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93
94
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
95
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95 Storage - Isilon Orchestrations Tasks/Actions
96
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
97
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
98
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98 RecoverPoint is a continuous data protection solution offered by EMC Corporation which supports asynchronous and synchronous data replication of block-based storagecontinuous data protectionEMC Corporationasynchronoussynchronous replication
99
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99 Capabilities Block-based journaling. Synchronous and asynchronous replication. Any-Point-In-Time - Every write is tracked and stored as a different snapshot. Alternatively, groups of writes can be aggregated according to configuration in order to reduce storage space and network traffic. Heterogeneous (multi-vendor) storage arrays via Fibre Channel. WAN-based compression. Tracking multiple volumes as a single consistency group.
100
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100 RecoverPoint- Management/Account Addition To UCSD
101
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101
102
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102 RecoverPoint- Reports
103
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103 Clusters Cluster Info Cluster Gateway Splitters Volumes Attached RPAs Initiators Volume Status Splitter Status Local RPA Fiber Connectivity Status Remote RPA Connectivity Status Remote RPA Data Link Status Interface Status VCenter Servers VCenter Server Filters Repository Volumes Cluster Volumes Consistency Groups Group Policy Link Policy Consistency Groups Copies Journal Volumes Copy Policy Replication Sets Replication Set Volumes Splitters
104
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104
105
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105
106
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 106
107
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 107
108
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108
109
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109
110
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110
111
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111
112
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112
113
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113
114
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114
115
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115
116
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116
117
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 117
118
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 118
119
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 119
120
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 120
121
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 121
122
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 122
123
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123
124
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 124
125
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 125
126
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 126
127
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 127
128
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 128
129
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 129
130
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 130
131
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 131 RecoverPoint - Orchestrations Tasks
132
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 132
133
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 133 Network
134
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 134 ASAv (Adaptive Security Virtual Appliance) Support
135
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 135 Support for ASAv Device Inventory Reports Summary Configuration Interfaces (VLAN) SR Details License ACL SGT SXP Connections Functionality Supported (both UI Actions/Workflow Tasks) Configure ACL Configure NAT Configure SXP Peer - Create/Modify/Delete Refresh Trust Sec Environment Port Channel – Create/Delete Converged View
136
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 136 ABOUT ASAv ASAv is a Single Context Device and the support provided in UCSD relates to both the existing physical ASA device support together with the SEA requirements. ASAv Specifications Supported and Tested: Model: ASAv OS Type: ASA Version: 9.2(0)3
137
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 137 ASAv- Management/Account Addition To UCSD
138
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 138
139
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 139 ASAv- Reports
140
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 140 UCSD supports the following reports Summary Configuration Interface (VLAN) License ACL SR Detail Reports specific to SEA SGT SXP Connection
141
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 141
142
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 142
143
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 143
144
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 144
145
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 145
146
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 146
147
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 147
148
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 148
149
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 149 ASAv- Orchestrations Tasks/Actions
150
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 150 The below tasks are available from Cisco Security Tasks
151
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 151 The below tasks are available from Cisco Network Tasks
152
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 152 The below tasks are available from Cisco Network Tasks
153
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 153 Cisco Nexus 9300/9500 Module 3 – Physical Infrastructure Management
154
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 154
155
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 155 The Cisco N9K Series Switches include both modular and fixed-port switches that are designed as a flexible, agile, low-cost, application centric infrastructure (ACI). Account addition
156
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 156 VLAN Trunking Protocol (VTP) reduces the administration in a switched network. When you configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the domain, which reduces the need to configure the same VLAN everywhere. Task: Configure VTP Report:
157
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 157 The Media Access Control (MAC) address is a unique value that is associated with a network device. Layer 2 ports correlate the MAC address on a packet with the Layer 2 port information for that packet using the MAC address table. A MAC address table is built using the MAC source addresses of the frames received. Report:
158
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 158 Switch ports are Layer 2-only interfaces that are associated with a physical port. Switch ports belong to one or more VLANs. A switch port can be an access port, a trunk port, or a tunnel port. Switch ports are used to manage the physical interface and associated Layer 2 protocols; they do not handle routing or bridging. Tasks: Report:
159
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 159 VLAN trunks reduce networking costs by reducing the need for expensive physical connections and conserving the number of ports used on switches. The trunk connection can be passed between two switches or between a switch and a computer. Ethernet interfaces can be configured either as access ports or a trunk ports. Tasks: Access ports in switches are used to connect end devices such as workstations and printers. When configuring an access port, you need to define which VLAN that the port belongs to. In Cisco UCS Director, you can configure access ports on the Cisco Nexus 9300 and 9500 Series switches. Tasks:
160
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 160 A VLAN is a group of devices on one or more LANs that are configured so that they can communicate as if they were attached to the same wire, when they are really located on a number of different LAN segments. Because VLANs are based on logical instead of physical connections, they are extremely flexible. Tasks: Report:
161
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 161 An ACL is a sequential collection of permit and deny conditions that apply to packets. When a packet is received on an interface, the switch compares the fields in the packet against any applied ACLs to verify that the packet has the required permissions to be forwarded. Tasks:
162
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 162 You use the quality of service (QoS) feature to provide the most desirable flow of traffic through a network. QoS allows you to classify the network traffic and prioritize the traffic flow, which helps to avoid traffic congestion in a network. Task: Report:
163
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 163 A service policy is defined to apply multiple actions to an interface. The service policy provides the following two policy-map configuration modes: qos—Classification mode. This is the default mode. The input QoS policy is applied to incoming traffic on an Ethernet interface for classification. queuing—Queuing mode. The output policy is applied to all outgoing traffic that matches the specified class. Tasks:
164
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 164 Cisco Identity Security Engine Module 3 – Physical Infrastructure Management
165
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 165 Cisco ISE offers a centralized control point for comprehensive policy management and enforcement. ISE is the policy control point for Cisco TrustSec®, unique network technology that provides policy-defined network segmentation to take the complexity out of network security. Cisco TrustSec makes it easy for customers to migrate their network infrastructure, thereby increasing the value of their ISE investment while ending the pain of excessive VLAN, ACL, and firewall rule administration.
166
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 166
167
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 167
168
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 168 F5 LTM Load Balancer support
169
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 169 Support for LTM Virtual Edition, Physical devices – iControl API Version 11.1 Inventory Reports LTM operations (both UI Actions/Workflow Tasks) & Reports: Application Services Virtual Servers Pools Nodes Pool Members Protocol profiles Converged View Workflows: Application Service Management Virtual Server Management Pool and Pool Member Management.
170
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 170
171
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 171 F5 BIG-IP LTM- Management/Account Addition To UCSD Module 3 – Physical Infrastructure Management
172
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 172
173
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 173 F5 LTM - Reports
174
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 174 BIG-IP LTM- Virtual Edition and LTM physical devices Application Service Application Template Virtual Servers Virtual Addresses Nodes Pools Pool Members Protocol Profiles(TCP and UDP) Virtual Server statistics Node statistics Pool statistics
175
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 175
176
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 176
177
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 177
178
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 178
179
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 179
180
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 180
181
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 181
182
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 182
183
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 183
184
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 184
185
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 185
186
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 186 F5 LTM BIG-IP Orchestrations Tasks/Actions
187
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 187
188
Thank you.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.