Cisco Enterprise Network Functions Virtualization

Network functions virtualization (NFV) is becoming the next disruptive wave in networking. NFV is an architectural approach that focuses on decoupling individual services such as Network Address Translation (NAT), access control lists (ACL), quality of service (QoS), Layer 3 routing, intrusion prevention and intrusion detection systems (IPS and IDS), and more from the underlying hardware platform. Allowing such functions to run inside virtual machines, on top of standard x86 resources, increases the deployment flexibility in the network. NFV is typically accompanied by software-defined networking (SDN) approaches (network controllers and orchestration) to offer automation and rapid service deployment of networking functions.Therefore, it promises to significantly contribute to network operating expenditure (OpEx) reductions.The APIC-EM with Cisco Prime Infrastructure (APIC-EM/PI) support provides the controller and monitoring functionality for Cisco Enterprise NFV. 

Spotlight

TeleData Select

TeleData Select is an independent telecommunications agent and consulting company that provides companies comprehensive Telecommunication Audits that provide an independent review of your company’s telecom bills to better manage your investment.

OTHER WHITEPAPERS
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | January 20, 2023

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

Cisco ACI and F5 BIG-IP Design Guide

whitePaper | May 12, 2022

The document discusses load balancer design considerations and deployment options in Cisco ACI, specifically with F5 BIG-IP from three aspects: network design, F5 design, and multi-tenant design. This document covers features up to Cisco ACI Release 5.2. One of the key considerations of the network design with load balancer is to ensure incoming and return traffic go through the same load balancer (one exception is direct server return (DSR), which doesn't have this requirement). There are various options you can use to insert the load balancer. One way is to use the load balancer as a gateway for servers or as a routing next hop for routing instances. Another option is to use Source Network Address Translation (SNAT) on the load balancer or use ACI Policy-Based Redirect (PBR) to make the return traffic go back to the load balancer.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

Network Slicing for Beyond 5G Systems: An Overview of theSmart Port Use Case

whitePaper | May 10, 2021

: As the idea of a new wireless communication standard (5G) started to circulate around the world, there was much speculation regarding its performance, making it necessary to carry out further research by keeping in view the challenges presented by it. 5G is considered a multi-system support network due to its ability to provide benefits to vertical industries. Due to the wide range of devices and applications, it is essential to provide support for massively interconnected devices.

Read More
news image

Overcoming IT Monitoring Tool Sprawl with a Single-Pane-of-Glass Solution

whitePaper | January 8, 2020

For years, IT managers have been seeking a single-pane-of-glass tool that can help them monitor and manage all aspects of their IT infrastructure – from desktops to servers, hardware to application code, and network to storage. But many fail to achieve this as they do not know how to implement a single-pane-of-glass solution.

Read More
news image

Exploring the future of the network

whitePaper | February 23, 2023

The 5TONIC co-creation laboratory was launched in 2015 to provide an open environment where members from services, users and SMEs can collaborate with the telecom community on specific 5G mobile research and innovation projects. The aim is to support innovation and help organizations work together to develop and deliver market-ready 5G solutions, technology applications and business ventures. 5TONIC promotes joint project development, entrepreneurial ventures, discussion fora, events and conferences with focus on 5G mobile technology, supporting members along the technological cycle from research to practical business application.

Read More

Spotlight

TeleData Select

TeleData Select is an independent telecommunications agent and consulting company that provides companies comprehensive Telecommunication Audits that provide an independent review of your company’s telecom bills to better manage your investment.

Events