Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering.

Slides:



Advertisements
Similar presentations
Multi-Layer Switching Layers 1, 2, and 3. Cisco Hierarchical Model Access Layer –Workgroup –Access layer aggregation and L3/L4 services Distribution Layer.
Advertisements

Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Module – 7 network-attached storage (NAS)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Data Center Network Redesign using SDN
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
Yury Kissin Infrastructure Consultant Storage improvements Dynamic Memory Hyper-V Replica VM Mobility New and Improved Networking Capabilities.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Virtual LAN Design Switches also have enabled the creation of Virtual LANs (VLANs). VLANs provide greater opportunities to manage the flow of traffic on.
Common Devices Used In Computer Networks
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
VLAN V irtual L ocal A rea N etwork VLAN Network performance is a key factor in the productivity of an organization. One of the technologies used to.
Chapter 8: Virtual LAN (VLAN)
Module 11: Implementing ISA Server 2004 Enterprise Edition.
LAN Switching and Wireless – Chapter 1 Vilina Hutter, Instructor
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 MSE Virtual Appliance Presenter Name: Patrick Nicholson.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
VMware vSphere Configuration and Management v6
Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering.
Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Multicasting within UCS Qiese Dides.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Cisco Study Guide
Virtual Local Area Networks In Security By Mark Reed.
Basic Edge Core switch Training for Summit Communication.
InterVLAN Routing 1. InterVLAN Routing 2. Multilayer Switching.
Network Load Balancing Addressing
Chapter 1 Introducing Windows Server 2012/R2
Implementing Cisco Data Center Unified Computing
Instructor Materials Chapter 7: Access Control Lists
Cisco Exam Questions Dumps
SECURITY ZONES.
Instructor Materials Chapter 6: VLANs
Cisco UCS Director – Carmel (5.0)
Cisco Exam Questions Dumps
UCS Director: Tenant Onboarding
Securing the Network Perimeter with ISA 2004
UCS Director: Tenant Onboarding
Welcome! Thank you for joining us. We’ll get started in a few minutes.
100% REAL EXAM QUESTIONS ANSWERS
Chapter 4: Routing Concepts
CT1303 LAN Rehab AlFallaj.
NAT , Device Discovery Chapter 9 , chapter 10.
Virtual LANs.
If You are really Worried About your Cisco exam dumps practice-questions.html Introducing Cisco Data.
GGF15 – Grids and Network Virtualization
Chapter 3: Windows7 Part 4.
IS3120 Network Communications Infrastructure
Module – 7 network-attached storage (NAS)
Chapter 4: Access Control Lists (ACLs)
2018 Real Cisco Dumps IT-Dumps
2018 Real CompTIA N Exam Questions Killtest
Network+ Guide to Networks 6th Edition
Routing and Switching Essentials v6.0
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Chapter 3 VLANs Chaffee County Academy
Network+ Guide to Networks, Fourth Edition
Presentation transcript:

Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 1 Cisco UCS Director – Carmel (5.0) Ravikumar Pisupati Senior Manager, Engineering June, 2014

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Physical Infrastructure Management

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Objectives  Learn New Physical Infrastructure Enhancements Agenda  Compute Features  UCSM 2.2  HP OA  Storage Features  VPLEX  Storage - Isilon  RP  Network Features  ASAv  Nexus 9K  ISE  F5 Load Balancer support(BIG IP LTM only)

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Compute

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5  Inband Support  Enhanced Boot Order  KVM Console Direct Access  Connection policies (usNIC and VMQ)

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Inband management support o Added as part of service profile and service profile template action and task o IPV4 and IPV6 address type supported o Static IP address and IP pool support is added in service profile. o IP pool support is added in service profile template. [Static is not applicable for template]

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Legacy or UEFI boot mode support Enables the creation of boot policies with multiple local boot devices. Provides precision control over the actual boot order. Flex Flash (Local SD Card) Support: Limitation 1 : For Boot order change,we can change the order for parent element like LAN and SAN.But we cannot change the order in between primary vNIC and secondary vNIC within LAN. Limitation 2 : We can either select Local Disk or its sub options like Local LUN or SD card. Similarly for CD ROM and Floppy Device also

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Domain access the KVM for their servers directly using a web browser TPM Monitoring (P1) Trusted Platform Module (TPM) is included on all Cisco UCS M3 blade and rack-mount servers We need to enable the TPM for particular server. Then only we will able to see the inventory data in UCSD

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 VMQ and usNic policies association supported is added in vNIC template. If we choose the usNIC (User Space NIC) or VMQ (Virtual Machine Queue) connection policies we can select existing usNIC or VMQ connection policies else set default policy of Dynamic connection policy will be set.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 HP Onboard Administrator Support

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 HP Onboard Administrator Support

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12  Support for HP OA Device  Inventory Reports  Summary  Blade Servers  NIC  CPU/Memory  Boot Order  Power Management  Racks  FRUs  VLANs  Enclosure Power Supply  Fan  Enclosure Temperature  Server Firmware  Devices  Functionality Supported (both UI Actions/Workflow Tasks)  Power Off Blade  Power On Blade  Reboot Blade  Modify One Time Boot Order  Modify Boot Order  Resolve Network Address(only Workflow task)  Converged View

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 ABOUT HP OA HP Onboard Administrator (OA) is the enclosure management processor, subsystem, and firmware base that supports the HP BladeSystem c-Class enclosure and all the managed devices contained within the enclosure. Using OA, you can perform the basic management tasks on server blades or switches within the enclosure. HP OA Specifications Supported and Tested: Version: 3.60 Module 3– Physical Infrastructure Management

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 HP OA- Management/Account Addition To UCSD

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 HP OA- Reports

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 UCSD supports the following reports Summary Blade Servers NIC CPU/Memory Boot Order Power Management Racks FRUs VLANs Enclosure Power Supply Fan Enclosure Temperature Server Firmware Devices

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 HP OA - Orchestrations Tasks/Actions

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 The below tasks are available from HP OA Tasks

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 HP OA – Converged View

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Storage

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37  Support for VPLEX Local, Metro  Inventory Reports (Summary, Clusters, Rule sets, Engines, Directors, FC Ports, Target Ports)  CRUD operations (Create/Update/Delete - both UI Actions/Workflow Tasks) & Reports:  Storage Arrays  Storage Volumes  Extents  Devices  Virtual Volumes  Logging Volumes  Consistency Groups  Storage Views  Initiators  Distributed Devices  Converged View  Workflows:  Provision Local and Distributed Device storage as Datastore (FC)  Local and Remote device mirroring.  Stack View

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 VPLEX - Management/Account Addition

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 VPLEX implements a distributed "virtualization" layer within and across geographically disparate Fibre Channel storage area networks and data centers

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 VPLEX - Reports

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Summary Clusters Storage Arrays Storage Volumes Extents Devices Components Virtual Volumes Storage Views Logging Volumes Consistency Groups Virtual Volumes Storage Views Initiators Target Ports Virtual Volumes Initiators Target Ports Virtual Volumes Initiators Storage Views Engines Directors FC Ports Distributed Devices Rule Sets

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62 VPLEX Orchestrations Tasks/Actions

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64 Isilon- Management/Account Addition To UCSD

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65 Isilon System The core technology of the Isilon clustered storage consists of OneFS, which provides a single unified operating system. OneFS file system is a parallel distributed networked file system designed by Isilon Systems for use in its Isilon IQ storage appliances. OneFS is a FreeBSD variant and utilizes zsh as its shell. OneFS is equipped with options for accessing storage via NFS, CIFS/SMB, FTP, HTTP, iSCSI.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67 Isilon- Reports

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68 Summary Storage Pool Tiers Node Pools Storage Pool Settings SMB Shares Permissions NFS Exports NFS Datastores Users Groups Namespace Access Zones Quotas Quota Reports Quota Report Settings Snapshots Snapshot Schedules System Jobs Job Summary System Job Policies Schedules System Job Reports Report Result Deduplication Report Result Datastores

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 70

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 75

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 76

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 77

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 78

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 79

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 80

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 81

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 82

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 83

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 84

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 85

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 86

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 87

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 88

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 89

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 90

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 91

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 92

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 93

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95 Storage - Isilon Orchestrations Tasks/Actions

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98 RecoverPoint is a continuous data protection solution offered by EMC Corporation which supports asynchronous and synchronous data replication of block-based storagecontinuous data protectionEMC Corporationasynchronoussynchronous replication

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 99 Capabilities Block-based journaling. Synchronous and asynchronous replication. Any-Point-In-Time - Every write is tracked and stored as a different snapshot. Alternatively, groups of writes can be aggregated according to configuration in order to reduce storage space and network traffic. Heterogeneous (multi-vendor) storage arrays via Fibre Channel. WAN-based compression. Tracking multiple volumes as a single consistency group.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 100 RecoverPoint- Management/Account Addition To UCSD

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 101

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 102 RecoverPoint- Reports

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 103 Clusters Cluster Info Cluster Gateway Splitters Volumes Attached RPAs Initiators Volume Status Splitter Status Local RPA Fiber Connectivity Status Remote RPA Connectivity Status Remote RPA Data Link Status Interface Status VCenter Servers VCenter Server Filters Repository Volumes Cluster Volumes Consistency Groups Group Policy Link Policy Consistency Groups Copies Journal Volumes Copy Policy Replication Sets Replication Set Volumes Splitters

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 104

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 105

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 106

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 107

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 108

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 109

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 110

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 111

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 112

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 113

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 114

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 115

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 116

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 117

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 118

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 119

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 120

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 121

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 122

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 123

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 124

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 125

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 126

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 127

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 128

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 129

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 130

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 131 RecoverPoint - Orchestrations Tasks

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 132

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 133 Network

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 134 ASAv (Adaptive Security Virtual Appliance) Support

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 135  Support for ASAv Device  Inventory Reports  Summary  Configuration  Interfaces (VLAN)  SR Details  License  ACL  SGT  SXP Connections  Functionality Supported (both UI Actions/Workflow Tasks)  Configure ACL  Configure NAT  Configure SXP Peer - Create/Modify/Delete  Refresh Trust Sec Environment  Port Channel – Create/Delete  Converged View

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 136 ABOUT ASAv ASAv is a Single Context Device and the support provided in UCSD relates to both the existing physical ASA device support together with the SEA requirements. ASAv Specifications Supported and Tested: Model: ASAv OS Type: ASA Version: 9.2(0)3

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 137 ASAv- Management/Account Addition To UCSD

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 138

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 139 ASAv- Reports

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 140 UCSD supports the following reports Summary Configuration Interface (VLAN) License ACL SR Detail Reports specific to SEA SGT SXP Connection

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 141

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 142

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 143

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 144

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 145

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 146

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 147

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 148

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 149 ASAv- Orchestrations Tasks/Actions

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 150 The below tasks are available from Cisco Security Tasks

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 151 The below tasks are available from Cisco Network Tasks

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 152 The below tasks are available from Cisco Network Tasks

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 153 Cisco Nexus 9300/9500 Module 3 – Physical Infrastructure Management

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 154

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 155 The Cisco N9K Series Switches include both modular and fixed-port switches that are designed as a flexible, agile, low-cost, application centric infrastructure (ACI). Account addition

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 156  VLAN Trunking Protocol (VTP) reduces the administration in a switched network. When you configure a new VLAN on one VTP server, the VLAN is distributed through all switches in the domain, which reduces the need to configure the same VLAN everywhere. Task: Configure VTP Report:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 157  The Media Access Control (MAC) address is a unique value that is associated with a network device. Layer 2 ports correlate the MAC address on a packet with the Layer 2 port information for that packet using the MAC address table. A MAC address table is built using the MAC source addresses of the frames received. Report:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 158  Switch ports are Layer 2-only interfaces that are associated with a physical port. Switch ports belong to one or more VLANs. A switch port can be an access port, a trunk port, or a tunnel port. Switch ports are used to manage the physical interface and associated Layer 2 protocols; they do not handle routing or bridging. Tasks: Report:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 159  VLAN trunks reduce networking costs by reducing the need for expensive physical connections and conserving the number of ports used on switches. The trunk connection can be passed between two switches or between a switch and a computer. Ethernet interfaces can be configured either as access ports or a trunk ports. Tasks:  Access ports in switches are used to connect end devices such as workstations and printers. When configuring an access port, you need to define which VLAN that the port belongs to.  In Cisco UCS Director, you can configure access ports on the Cisco Nexus 9300 and 9500 Series switches. Tasks:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 160  A VLAN is a group of devices on one or more LANs that are configured so that they can communicate as if they were attached to the same wire, when they are really located on a number of different LAN segments. Because VLANs are based on logical instead of physical connections, they are extremely flexible. Tasks: Report:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 161  An ACL is a sequential collection of permit and deny conditions that apply to packets. When a packet is received on an interface, the switch compares the fields in the packet against any applied ACLs to verify that the packet has the required permissions to be forwarded. Tasks:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 162  You use the quality of service (QoS) feature to provide the most desirable flow of traffic through a network. QoS allows you to classify the network traffic and prioritize the traffic flow, which helps to avoid traffic congestion in a network. Task: Report:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 163  A service policy is defined to apply multiple actions to an interface. The service policy provides the following two policy-map configuration modes:  qos—Classification mode. This is the default mode. The input QoS policy is applied to incoming traffic on an Ethernet interface for classification.  queuing—Queuing mode. The output policy is applied to all outgoing traffic that matches the specified class. Tasks:

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 164 Cisco Identity Security Engine Module 3 – Physical Infrastructure Management

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 165 Cisco ISE offers a centralized control point for comprehensive policy management and enforcement. ISE is the policy control point for Cisco TrustSec®, unique network technology that provides policy-defined network segmentation to take the complexity out of network security. Cisco TrustSec makes it easy for customers to migrate their network infrastructure, thereby increasing the value of their ISE investment while ending the pain of excessive VLAN, ACL, and firewall rule administration.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 166

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 167

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 168 F5 LTM Load Balancer support

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 169  Support for LTM Virtual Edition, Physical devices – iControl API Version 11.1  Inventory Reports  LTM operations (both UI Actions/Workflow Tasks) & Reports:  Application Services  Virtual Servers  Pools  Nodes  Pool Members  Protocol profiles  Converged View  Workflows:  Application Service Management  Virtual Server Management  Pool and Pool Member Management.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 170

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 171 F5 BIG-IP LTM- Management/Account Addition To UCSD Module 3 – Physical Infrastructure Management

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 172

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 173 F5 LTM - Reports

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 174 BIG-IP LTM- Virtual Edition and LTM physical devices Application Service Application Template Virtual Servers Virtual Addresses Nodes Pools Pool Members Protocol Profiles(TCP and UDP) Virtual Server statistics Node statistics Pool statistics

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 175

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 176

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 177

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 178

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 179

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 180

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 181

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 182

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 183

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 184

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 185

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 186 F5 LTM BIG-IP Orchestrations Tasks/Actions

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 187

Thank you.