Cisco Cisco UCS Central Integrations Merkblatt
Increase Efficiency with
VMware Software and Cisco UCS
© 2015 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 6
the physical and virtual infrastructure
that was impossible to achieve
until the development of the Cisco
Nexus® 9000 Series Switches.
With Cisco ACI, your applications
are secure within policy-based
network containers that isolate
applications and tenants from one
another. Other software-defined
networks hide the network under
a layer of software, obscuring the
hardware that may be responsible
for performance or connectivity
problems. With Cisco ACI, we unify
the software overlay so that virtual
that was impossible to achieve
until the development of the Cisco
Nexus® 9000 Series Switches.
With Cisco ACI, your applications
are secure within policy-based
network containers that isolate
applications and tenants from one
another. Other software-defined
networks hide the network under
a layer of software, obscuring the
hardware that may be responsible
for performance or connectivity
problems. With Cisco ACI, we unify
the software overlay so that virtual
networks can be viewed in the same
way as physical networks, with the
capability to view application health
in real time correlated with the
underlying hardware that supports
every network connection. This
application-centric support goes
far beyond what generic server and
switching infrastructure can provide.
way as physical networks, with the
capability to view application health
in real time correlated with the
underlying hardware that supports
every network connection. This
application-centric support goes
far beyond what generic server and
switching infrastructure can provide.
Policy-Based Automation: Get More
Done Faster with Increased Visibility
and Control
Done Faster with Increased Visibility
and Control
Cisco UCS was designed with role-
and policy-based automation, and
and policy-based automation, and
Cisco ACI extends this approach
to unify network and computing
resources. Our approach encourages
a process by which administrators
create policies that dictate server and
network configuration. You can deploy
secure and compliant servers directly
through Cisco UCS or through vRealize
Operations. This approach helps you
achieve compliant configurations and
hardens your security beyond what any
other vendor can provide.
to unify network and computing
resources. Our approach encourages
a process by which administrators
create policies that dictate server and
network configuration. You can deploy
secure and compliant servers directly
through Cisco UCS or through vRealize
Operations. This approach helps you
achieve compliant configurations and
hardens your security beyond what any
other vendor can provide.
•
Configuration and compliance:
vRealize Operations helps you
establish server configurations
that comply with your standards.
With Cisco UCS management,
compliant server configurations are
prepared in minutes, without human
intervention. Creating a noncompliant
server is impossible. Configuration
creep doesn’t occur because
the mechanism that establishes
compliance to begin with—Cisco UCS
management—prevents unauthorized
changes. You can be confident with
Cisco UCS that every aspect of the
system’s configuration adheres to
defined policy.
vRealize Operations helps you
establish server configurations
that comply with your standards.
With Cisco UCS management,
compliant server configurations are
prepared in minutes, without human
intervention. Creating a noncompliant
server is impossible. Configuration
creep doesn’t occur because
the mechanism that establishes
compliance to begin with—Cisco UCS
management—prevents unauthorized
changes. You can be confident with
Cisco UCS that every aspect of the
system’s configuration adheres to
defined policy.
•
Security hardening: Cisco UCS
eliminates the need to make
trade-offs between flexibility and
security, because there is no
difference between physical and
virtual networks. Both networks
are implemented in hardware and
have the same visibility, control, and
security. Whether you connect your
virtual machines using Data Center
VM-FEX or you use Cisco software
eliminates the need to make
trade-offs between flexibility and
security, because there is no
difference between physical and
virtual networks. Both networks
are implemented in hardware and
have the same visibility, control, and
security. Whether you connect your
virtual machines using Data Center
VM-FEX or you use Cisco software
VM 3
VM 3
VM 3
VM 1
VM 2
VM 3
VM 4
VM 5
VM 3
Physical Port
Cisco UCS
Fabric Interconnect
Cisco UCS
Virtual
Interface Card
Cisco UCS
Server
VMware vSphere
Virtual Ports
Association of
Virtual Ports with
Physical Port Changes
in Fabric Interconnect
Cisco UCS Manager
Moves Port Profile
Physical 10-Gbps
Unified Fabric Link
Virtual Link
Virtual Link
Physical Port
Cisco Data Center
VM-FEX
Virtualization Manager
Moves Port Group
Virtualization Manager
Moves Virtual Machine
Figure 1. Cisco Data Center VM-FEX Attaches Network Interface Cards (NICs) and Their
Network Policies to Individual Virtual Machines, Maintaining the Connection as Virtual
Machines Move Between Physical Servers
Network Policies to Individual Virtual Machines, Maintaining the Connection as Virtual
Machines Move Between Physical Servers