Premium Content

Access "How virtual switching integrates the network edge "

David Geer Published: 25 Mar 2013

Editor's note: In the first part of this series on integrating physical and virtual networks, we examine the role of virtual switching in networking across environments. In part two, we highlight two examples of virtual switching in action. Not every company is ready to move to full SDN or network virtualization, but there are plenty of measures to take along the way to be sure the virtual and physical worlds are communicating. Cloud provider Iland, which is primarily a Cisco switch and router shop, takes advantage of VMware’s integration of the Cisco Discovery Protocol (CDP) Messaging System into its VMware virtual switches. When a network team member adds network components, creates a VLAN on a physical switch, or works with MAC addresses, the CDP Messaging System integration makes these things clear, said Iland’s Giardina. “When we bring up a VM, whether we need to make sure it follows an IP address policy or a port security policy or a VLAN policy, this is all transparent to the hardware side,” he said. Engineers trained on Cisco hardware can easily ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • How to manage and monitor the converged network
    modern_converged_network.png
    E-Handbook

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?
    net_evo_0914.png
    E-Zine

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier
    network_evo_0814.jpg
    E-Zine

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...