PQ Show 12 – Cisco vPath 2.0 and Nexus 1000v with Prashant Ghandi – Sponsored

In this sponsored podcast, Cisco vPath 2.0 is part of the Nexus 1000v software switching architecture and it’s important part of the Nexus 1000V purpose and product architecture. We take a deep dive into it.

vPath is the name for the software pathway from the physical network adapter and through the VMware hypervisor kernel and onto the virtual servers. Cisco Nexus 1000V is growing from being a virtual switch, to a platform for a range of functions and services – today it’s the Virtual Security Gateway (VSG) and soon to expand to new functions. Also coming soon is support for the Hyper-V and

Another significant advance is the VXLAN termination support in NX1010 supervisor which provides a VXLAN gateway that is available today.

Show Topics

  • Recap on Nexus 1000v and vPath 1.0
  • Introduction vPath 2.0
  • Use of chaining services such as the VSG in the vPath and their value.
  • VXLAN to VLAN gateway features of Nexus 1000v

Show Links

  • Cisco Nexus 1000V home page – here
  • Cisco Nexus 1000V Series Switches: Deploy Cisco vPath Service-Chaining Architecture – white paper (describes the vPath architecture and it’s positioning)
  • Cisco Virtual Security Gateway – here

 

Thanks to Cisco Data Center for sponsoring this show and supporting the Packet Pushers. Stay tuned for more podcasts on these topics. 

 

Greg Ferro
Greg Ferro is a Network Engineer/Architect, mostly focussed on Data Centre, Security Infrastructure, and recently Virtualization. He has over 20 years in IT, in wide range of employers working as a freelance consultant including Finance, Service Providers and Online Companies. He is CCIE#6920 and has a few ideas about the world, but not enough to really count. He is a host on the Packet Pushers Podcast, blogger at EtherealMind.com and on Twitter @etherealmind and Google Plus.
Greg Ferro
Greg Ferro
Greg Ferro
  • http://marathon-networks.com/ Dan Shechter

    Good show.

    For enterprise networks, where multi tenancy is not an issue, how would vPath help us?

    With a typical enterprise servers farm is far a way from being 100% virtualized are we to use vPath based virtual appliances? Even if so, do we want each and every packet from/to virtual server to be going through some firewall engine?

    How does this technology applies to real world enterprise networks?

    I have a feeling that the only reason people use Nexus 1000v is to keep their political control over the switch which the servers are connected to.

    I guess that for the 90% of us, we are good with vSwitch or vDS, and there is no technical reason to use Nexus 1000v.