Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering.

Similar presentations


Presentation on theme: "Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering."— Presentation transcript:

1 Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering June, 2014

2 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Physical Infrastructure Management

3 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Objectives  Learn New Physical Infrastructure Enhancements Agenda  Compute Features  UCSM 2.2  HP OA  Storage Features  VPLEX  Storage - Isilon  RP  Network Features  ASAv  Nexus 9K  ISE  F5 Load Balancer support(BIG IP LTM only)

4 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Compute

5 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5  Inband Support  Enhanced Boot Order  KVM Console Direct Access  Connection policies (usNIC and VMQ)

6 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Inband management support o Added as part of service profile and service profile template action and task o IPV4 and IPV6 address type supported o Static IP address and IP pool support is added in service profile. o IP pool support is added in service profile template. [Static is not applicable for template]

7 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Legacy or UEFI boot mode support Enables the creation of boot policies with multiple local boot devices. Provides precision control over the actual boot order. Flex Flash (Local SD Card) Support: Limitation 1 : For Boot order change,we can change the order for parent element like LAN and SAN.But we cannot change the order in between primary vNIC and secondary vNIC within LAN. Limitation 2 : We can either select Local Disk or its sub options like Local LUN or SD card. Similarly for CD ROM and Floppy Device also

8 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Domain access the KVM for their servers directly using a web browser TPM Monitoring (P1) Trusted Platform Module (TPM) is included on all Cisco UCS M3 blade and rack-mount servers We need to enable the TPM for particular server. Then only we will able to see the inventory data in UCSD

9 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 VMQ and usNic policies association supported is added in vNIC template. If we choose the usNIC (User Space NIC) or VMQ (Virtual Machine Queue) connection policies we can select existing usNIC or VMQ connection policies else set default policy of Dynamic connection policy will be set.

10 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 HP Onboard Administrator Support

11 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 HP Onboard Administrator Support

12 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12  Support for HP OA Device  Inventory Reports  Summary  Blade Servers  NIC  CPU/Memory  Boot Order  Power Management  Racks  FRUs  VLANs  Enclosure Power Supply  Fan  Enclosure Temperature  Server Firmware  Devices  Functionality Supported (both UI Actions/Workflow Tasks)  Power Off Blade  Power On Blade  Reboot Blade  Modify One Time Boot Order  Modify Boot Order  Resolve Network Address(only Workflow task)  Converged View

13 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 ABOUT HP OA HP Onboard Administrator (OA) is the enclosure management processor, subsystem, and firmware base that supports the HP BladeSystem c-Class enclosure and all the managed devices contained within the enclosure. Using OA, you can perform the basic management tasks on server blades or switches within the enclosure. HP OA Specifications Supported and Tested: Version: 3.60 Module 3– Physical Infrastructure Management

14 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 HP OA- Management/Account Addition To UCSD

15 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

16 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 HP OA- Reports

17 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 UCSD supports the following reports Summary Blade Servers NIC CPU/Memory Boot Order Power Management Racks FRUs VLANs Enclosure Power Supply Fan Enclosure Temperature Server Firmware Devices

18 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

19 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

20 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20

21 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21

22 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

23 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

24 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

25 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

26 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

27 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

28 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

29 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

30 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

31 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

32 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 HP OA - Orchestrations Tasks/Actions

33 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 The below tasks are available from HP OA Tasks

34 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 HP OA – Converged View

35 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35

36 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Storage

37 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37  Support for VPLEX Local, Metro  Inventory Reports (Summary, Clusters, Rule sets, Engines, Directors, FC Ports, Target Ports)  CRUD operations (Create/Update/Delete - both UI Actions/Workflow Tasks) & Reports:  Storage Arrays  Storage Volumes  Extents  Devices  Virtual Volumes  Logging Volumes  Consistency Groups  Storage Views  Initiators  Distributed Devices  Converged View  Workflows:  Provision Local and Distributed Device storage as Datastore (FC)  Local and Remote device mirroring.  Stack View

38 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 VPLEX - Management/Account Addition

39 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 VPLEX implements a distributed "virtualization" layer within and across geographically disparate Fibre Channel storage area networks and data centers

40 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40

41 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41

42 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 VPLEX - Reports

43 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Summary Clusters Storage Arrays Storage Volumes Extents Devices Components Virtual Volumes Storage Views Logging Volumes Consistency Groups Virtual Volumes Storage Views Initiators Target Ports Virtual Volumes Initiators Target Ports Virtual Volumes Initiators Storage Views Engines Directors FC Ports Distributed Devices Rule Sets

44 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44

45 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45

46 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46

47 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47

48 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48

49 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49

50 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50

51 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51

52 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52

53 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53

54 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54

55 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55

56 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56

57 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57

58 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58

59 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59

60 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60

61 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61

62 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 VPLEX Orchestrations Tasks/Actions

63 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63

64 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Isilon- Management/Account Addition To UCSD

65 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Isilon System The core technology of the Isilon clustered storage consists of OneFS, which provides a single unified operating system. OneFS file system is a parallel distributed networked file system designed by Isilon Systems for use in its Isilon IQ storage appliances. OneFS is a FreeBSD variant and utilizes zsh as its shell. OneFS is equipped with options for accessing storage via NFS, CIFS/SMB, FTP, HTTP, iSCSI.

66 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66

67 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 Isilon- Reports

68 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 Summary Storage Pool Tiers Node Pools Storage Pool Settings SMB Shares Permissions NFS Exports NFS Datastores Users Groups Namespace Access Zones Quotas Quota Reports Quota Report Settings Snapshots Snapshot Schedules System Jobs Job Summary System Job Policies Schedules System Job Reports Report Result Deduplication Report Result Datastores

69 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69

70 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70

71 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71

72 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72

73 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73

74 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74

75 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75

76 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76

77 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77

78 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78

79 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79

80 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80

81 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81

82 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82

83 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83

84 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84

85 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85

86 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86

87 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87

88 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88

89 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89

90 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90

91 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91

92 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92

93 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93

94 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94

95 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95 Storage - Isilon Orchestrations Tasks/Actions

96 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96

97 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97

98 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98 RecoverPoint is a continuous data protection solution offered by EMC Corporation which supports asynchronous and synchronous data replication of block-based storagecontinuous data protectionEMC Corporationasynchronoussynchronous replication

99 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99 Capabilities Block-based journaling. Synchronous and asynchronous replication. Any-Point-In-Time - Every write is tracked and stored as a different snapshot. Alternatively, groups of writes can be aggregated according to configuration in order to reduce storage space and network traffic. Heterogeneous (multi-vendor) storage arrays via Fibre Channel. WAN-based compression. Tracking multiple volumes as a single consistency group.

100 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100 RecoverPoint- Management/Account Addition To UCSD

101 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101

102 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102 RecoverPoint- Reports

103 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103 Clusters Cluster Info Cluster Gateway Splitters Volumes Attached RPAs Initiators Volume Status Splitter Status Local RPA Fiber Connectivity Status Remote RPA Connectivity Status Remote RPA Data Link Status Interface Status VCenter Servers VCenter Server Filters Repository Volumes Cluster Volumes Consistency Groups Group Policy Link Policy Consistency Groups Copies Journal Volumes Copy Policy Replication Sets Replication Set Volumes Splitters

104 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104

105 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105

106 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 106

107 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 107

108 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108

109 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109

110 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110

111 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111

112 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112

113 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113

114 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114

115 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115

116 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116

117 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 117

118 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 118

119 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 119

120 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 120

121 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 121

122 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 122

123 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123

124 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 124

125 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 125

126 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 126

127 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 127

128 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 128

129 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 129

130 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 130

131 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 131 RecoverPoint - Orchestrations Tasks

132 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 132

133 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 133 Network

134 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 134 ASAv (Adaptive Security Virtual Appliance) Support

135 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 135  Support for ASAv Device  Inventory Reports  Summary  Configuration  Interfaces (VLAN)  SR Details  License  ACL  SGT  SXP Connections  Functionality Supported (both UI Actions/Workflow Tasks)  Configure ACL  Configure NAT  Configure SXP Peer - Create/Modify/Delete  Refresh Trust Sec Environment  Port Channel – Create/Delete  Converged View

136 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 136 ABOUT ASAv ASAv is a Single Context Device and the support provided in UCSD relates to both the existing physical ASA device support together with the SEA requirements. ASAv Specifications Supported and Tested: Model: ASAv OS Type: ASA Version: 9.2(0)3

137 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 137 ASAv- Management/Account Addition To UCSD

138 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 138

139 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 139 ASAv- Reports

140 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 140 UCSD supports the following reports Summary Configuration Interface (VLAN) License ACL SR Detail Reports specific to SEA SGT SXP Connection

141 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 141

142 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 142

143 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 143

144 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 144

145 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 145

146 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 146

147 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 147

148 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 148

149 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 149 ASAv- Orchestrations Tasks/Actions

150 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 150 The below tasks are available from Cisco Security Tasks

151 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 151 The below tasks are available from Cisco Network Tasks

152 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 152 The below tasks are available from Cisco Network Tasks

153 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 153 Cisco Nexus 9300/9500 Module 3 – Physical Infrastructure Management

154 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 154

155 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 155 The Cisco N9K Series Switches include both modular and fixed-port switches that are designed as a flexible, agile, low-cost, application centric infrastructure (ACI). Account addition

156 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 156  VLAN Trunking Protocol (VTP) reduces the administration in a switched network. When you configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the domain, which reduces the need to configure the same VLAN everywhere. Task: Configure VTP Report:

157 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 157  The Media Access Control (MAC) address is a unique value that is associated with a network device. Layer 2 ports correlate the MAC address on a packet with the Layer 2 port information for that packet using the MAC address table. A MAC address table is built using the MAC source addresses of the frames received. Report:

158 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 158  Switch ports are Layer 2-only interfaces that are associated with a physical port. Switch ports belong to one or more VLANs. A switch port can be an access port, a trunk port, or a tunnel port. Switch ports are used to manage the physical interface and associated Layer 2 protocols; they do not handle routing or bridging. Tasks: Report:

159 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 159  VLAN trunks reduce networking costs by reducing the need for expensive physical connections and conserving the number of ports used on switches. The trunk connection can be passed between two switches or between a switch and a computer. Ethernet interfaces can be configured either as access ports or a trunk ports. Tasks:  Access ports in switches are used to connect end devices such as workstations and printers. When configuring an access port, you need to define which VLAN that the port belongs to.  In Cisco UCS Director, you can configure access ports on the Cisco Nexus 9300 and 9500 Series switches. Tasks:

160 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 160  A VLAN is a group of devices on one or more LANs that are configured so that they can communicate as if they were attached to the same wire, when they are really located on a number of different LAN segments. Because VLANs are based on logical instead of physical connections, they are extremely flexible. Tasks: Report:

161 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 161  An ACL is a sequential collection of permit and deny conditions that apply to packets. When a packet is received on an interface, the switch compares the fields in the packet against any applied ACLs to verify that the packet has the required permissions to be forwarded. Tasks:

162 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 162  You use the quality of service (QoS) feature to provide the most desirable flow of traffic through a network. QoS allows you to classify the network traffic and prioritize the traffic flow, which helps to avoid traffic congestion in a network. Task: Report:

163 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 163  A service policy is defined to apply multiple actions to an interface. The service policy provides the following two policy-map configuration modes:  qos—Classification mode. This is the default mode. The input QoS policy is applied to incoming traffic on an Ethernet interface for classification.  queuing—Queuing mode. The output policy is applied to all outgoing traffic that matches the specified class. Tasks:

164 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 164 Cisco Identity Security Engine Module 3 – Physical Infrastructure Management

165 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 165 Cisco ISE offers a centralized control point for comprehensive policy management and enforcement. ISE is the policy control point for Cisco TrustSec®, unique network technology that provides policy-defined network segmentation to take the complexity out of network security. Cisco TrustSec makes it easy for customers to migrate their network infrastructure, thereby increasing the value of their ISE investment while ending the pain of excessive VLAN, ACL, and firewall rule administration.

166 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 166

167 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 167

168 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 168 F5 LTM Load Balancer support

169 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 169  Support for LTM Virtual Edition, Physical devices – iControl API Version 11.1  Inventory Reports  LTM operations (both UI Actions/Workflow Tasks) & Reports:  Application Services  Virtual Servers  Pools  Nodes  Pool Members  Protocol profiles  Converged View  Workflows:  Application Service Management  Virtual Server Management  Pool and Pool Member Management.

170 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 170

171 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 171 F5 BIG-IP LTM- Management/Account Addition To UCSD Module 3 – Physical Infrastructure Management

172 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 172

173 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 173 F5 LTM - Reports

174 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 174 BIG-IP LTM- Virtual Edition and LTM physical devices Application Service Application Template Virtual Servers Virtual Addresses Nodes Pools Pool Members Protocol Profiles(TCP and UDP) Virtual Server statistics Node statistics Pool statistics

175 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 175

176 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 176

177 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 177

178 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 178

179 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 179

180 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 180

181 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 181

182 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 182

183 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 183

184 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 184

185 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 185

186 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 186 F5 LTM BIG-IP Orchestrations Tasks/Actions

187 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 187

188 Thank you.


Download ppt "Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering."

Similar presentations


Ads by Google