Cisco Cisco UCS Central Integrations Merkblatt

Seite von 6
Increase Efficiency with  
VMware Software and Cisco UCS 
© 2015 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. 
Page 3 of 6
the physical and virtual infrastructure 
that was impossible to achieve 
until the development of the Cisco 
Nexus® 9000 Series Switches. 
With Cisco ACI, your applications 
are secure within policy-based 
network containers that isolate 
applications and tenants from one 
another. Other software-defined 
networks hide the network under 
a layer of software, obscuring the 
hardware that may be responsible 
for performance or connectivity 
problems. With Cisco ACI, we unify 
the software overlay so that virtual 
networks can be viewed in the same 
way as physical networks, with the 
capability to view application health 
in real time correlated with the 
underlying hardware that supports 
every network connection. This 
application-centric support goes 
far beyond what generic server and 
switching infrastructure can provide.
Policy-Based Automation: Get More 
Done Faster with Increased Visibility 
and Control
Cisco UCS was designed with role- 
and policy-based automation, and 
Cisco ACI extends this approach 
to unify network and computing 
resources. Our approach encourages 
a process by which administrators 
create policies that dictate server and 
network configuration. You can deploy 
secure and compliant servers directly 
through Cisco UCS or through vRealize 
Operations. This approach helps you 
achieve compliant configurations and 
hardens your security beyond what any 
other vendor can provide.
• 
Configuration and compliance: 
vRealize Operations helps you 
establish server configurations 
that comply with your standards. 
With Cisco UCS management, 
compliant server configurations are 
prepared in minutes, without human 
intervention. Creating a noncompliant 
server is impossible. Configuration 
creep doesn’t occur because 
the mechanism that establishes 
compliance to begin with—Cisco UCS 
management—prevents unauthorized 
changes. You can be confident with 
Cisco UCS that every aspect of the 
system’s configuration adheres to 
defined policy.
• 
Security hardening: Cisco UCS 
eliminates the need to make 
trade-offs between flexibility and 
security, because there is no 
difference between physical and 
virtual networks. Both networks 
are implemented in hardware and 
have the same visibility, control, and 
security. Whether you connect your 
virtual machines using Data Center 
VM-FEX or you use Cisco software 
VM 3
VM 3
VM 3
VM 1
VM 2
VM 3
VM 4
VM 5
VM 3
Physical Port
Cisco UCS
Fabric Interconnect
Cisco UCS
Virtual
Interface Card
Cisco UCS
Server
VMware vSphere
Virtual Ports
Association of
Virtual Ports with
Physical Port Changes
in Fabric Interconnect
Cisco UCS Manager
Moves Port Profile
Physical 10-Gbps
Unified Fabric Link
Virtual Link
Physical Port
Cisco Data Center
VM-FEX
Virtualization Manager
Moves Port Group
Virtualization Manager
Moves Virtual Machine
Figure 1. Cisco Data Center VM-FEX Attaches Network Interface Cards (NICs) and Their 
Network Policies to Individual Virtual Machines, Maintaining the Connection as Virtual 
Machines Move Between Physical Servers