Premium Content

Access "How virtual switching integrates the network edge "

David Geer Published: 25 Mar 2013

Editor's note: In the first part of this series on integrating physical and virtual networks, we examine the role of virtual switching in networking across environments. In part two, we highlight two examples of virtual switching in action. Not every company is ready to move to full SDN or network virtualization, but there are plenty of measures to take along the way to be sure the virtual and physical worlds are communicating. Cloud provider Iland, which is primarily a Cisco switch and router shop, takes advantage of VMware’s integration of the Cisco Discovery Protocol (CDP) Messaging System into its VMware virtual switches. When a network team member adds network components, creates a VLAN on a physical switch, or works with MAC addresses, the CDP Messaging System integration makes these things clear, said Iland’s Giardina. “When we bring up a VM, whether we need to make sure it follows an IP address policy or a port security policy or a VLAN policy, this is all transparent to the hardware side,” he said. Engineers trained on Cisco hardware can easily ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Harvesting business intelligence with network monitoring tools
    network_evolution_august_2013.png
    E-Zine

    Network technologies and architectures are rapidly changing due to a wide range of innovations from software-defined networking to gigabit wireless. ...

  • WAN optimization policy goes deep
    sNetworking_Network_evolution_june_2013.png
    E-Zine

    The nature of the branch office is changing. Previously, branch offices were small remote sites with groups of workers that had a single focus, such ...

  • BYOD challenges that lurk beyond network security
    Evolution_Jan_2013_cover_lg.jpg
    E-Zine

    Every access network now must be engineered to enable, manage and secure BYOD. In this edition of Network Evolution, we offer insight into ...