Cisco Cisco DWDM Transceiver Modules 백서

다운로드
페이지 19
 
 
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. 
Page 8 of 19 
Figure 3.    Examples of Monitoring Views Provided by Cisco UCS Director 
 
Security and Compliance 
With the increased pace of infrastructure convergence with cloud models, it is increasingly common for multiple 
tenant, organizations, and applications to share the same infrastructure. In such an environment, it is very 
important to gain visibility across the entire infrastructure to help ensure not just the security goals of the 
infrastructure team, but also the security and compliance expectations of the individual tenants and organizations. 
The visibility and audit requirements from the network require the network to embody certain characteristics. The 
network must be: 
● 
Observable: The network needs to provide visibility into resource use, secure resource segmentation, 
statistics, and performance across tenants and organizations. 
● 
Controllable: The network should provide capabilities to change security parameters to meet security, 
compliance, and visibility needs. 
● 
Automatable: The s
cale and complexity of today’s networks dictate automated collection and monitoring of 
information for security and compliance needs. The same level of collection and monitoring cannot be 
accomplished with manual intervention. 
To meet these needs, networks need to expose a very large amount of very detailed configuration and operation 
information to external tools and entities. A robust set of APIs, such as that exposed by Cisco NX-API, that tools 
can use to query network information can be critical for a secure data center. Automation capabilities such as those 
provided by Python scripting and Puppet and Chef integration, can help ensure that the network stays in 
compliance throughout the duration of its operation, even in the event of new threats and requirements.