By now, VxLAN is becoming the standard way of tunneling in the Datacenter.
Using VxLAN, i will show how to use the CSR1Kv to extend your Datacenter L2 reach between sites as well.
First off, what is VxLAN?
It stands for Virtual Extensible LAN. Basically you have a way of decoupling your vlan’s into a new scheme.
You basically map your VLAN into a VNI (Virtual Network Identifier), which in essence makes your VLAN numbering scheme locally significant.
Also, since the numbering for VNI’s is a 24 bit identifier, you have alot more flexibility than just the regular 4096 definable VLAN’s. (12 Bits .1q tags)
Each endpoint that does the encapsulation/decapsulation is called a VTEP (VxLAN Tunnel EndPoint). In our example this would be CSR3 and CSR5.
After the VxLAN header, the packet is further encapsulated into a UDP packet and forwarded across the network. This is a great solution as it doesnt impose any technical restrictions on the core of the network. Only the VTEPs needs to understand VxLAN (and probably have hardware acceleration for it as well).
Since we wont be using BGP EVPN, we will rely solely on multicasting in the network to establish who is the Continue reading
Make sure to include the network in your data protection planning.
Cisco-Springpath deal induces yawns as hyperconverged infrastructure space continues to shake out.
Cut through the marketing hype with these questions for potential suppliers.
The post Worth Reading: Transitioning to a single root appeared first on rule 11 reader.
Versa sees uptick now that Viptela belongs to Cisco.
MoNArch is the second European coalition to focus on network slicing.
Companies cite enterprise demand for easier container integration.
“We’re not talking about IPO,” a Druva exec says.
Note, this is a reposting of the blog that I initially posted here on humairahmed.com. In a prior blog, VMware NSX and SRM: Disaster Recovery Overview and Demo, I described and demoed how VMware NSX and SRM with vSphere Replication combined provide for an enhanced disaster recovery (DR) solution. SRM also provides additional integration with NSX when Storage Policy Protection Groups (SPPGs) are used by providing the ability to automate network mappings. One of the great things about the NSX-V platform, is it can be used with any DR orchestration tool that supports the VMware vSphere ESXi hypervisor. Some of the tools customers are using with NSX include VMware SRM, Dell EMC RP4VM, Zerto, and Veeam. As SRM was discussed and demonstrated in a prior blog, Zerto and NSX together is explained in more detail below. Continue reading
D-Line has already certified a Pluribus OS to run on the open hardware.
This weekend, I experienced one of those moments that make me question the value of information technology. My trusty windows phone, for whatever reason, failed. Given I was traveling in less than 24 hours, I needed to find a replacement. So I traipsed to the local phone store, and was told “I’m sorry, we don’t sell windows phones. They aren’t popular enough.” So there I stood, like the shopper in the proverbial aisle of cereal, trying to choose which new phone to get.
After staring at all the different phones for a while, it dawned on me that the apparent variety is fake. I really only had two choices.
The first is the iPhone. The iPhone is a throwback to the late 1990’s, at least one generation behind current hardware, and with a user interface that falls into the “cute retro gamified Windows 3.11/Xerox Star” sort of thing. Getting anything done requires jumping through multiple hoops. There is no way to pin anything you use on a regular basis to the screen, no information available without entering an app, the icons are tiny candies, etc. Sorry Apple fanfolk, but Apple hasn’t innovated in at least 10 years in Continue reading
New security platform features focus on visualization and security policy development.