VMware and Cisco Launching 'Extensible LAN for the Cloud'

VMware and Cisco are rolling out enhancements to their combined virtualization solutions, along with improvements to several desktop virtualization and cloud infrastructure solutions. The companies have also debuted the new Virtual Extensible Local Area Network (VXLAN) architecture, which forms the basis of a scalable LAN for the cloud.

VXLAN technology enables logical, virtual networks that can be created on demand. For running applications in the cloud, VXLAN can scale to support more than 16 million logical networks, so IT administrators can control each user's access to data and applications with logical networks for each instance of the application. VXLAN also supports applications running in hybrid public/private clouds, while using network resources efficiently. VXLAN has been submitted for standardization at the Internet Engineering Task Force (IETF).

"Together with VMware, Cisco has unlocked the power of the network to extend virtual machines beyond the confines of a single stack to the entire data center and cloud infrastructure from different locations," said Soni Jiandani, senior vice president, Server, Access, Virtualization Technology Group for Cisco. "VXLAN will provide the ability to scale networking segments to millions of VMs to ease the deployment of applications in the cloud. Also, by segmenting these VMs and applications via highly secure virtual networks, customers will be able to achieve the security required for multi-tenant cloud environments."

Announced updates to desktop virtualization solutions include:

Announced updates to cloud infrastructure include:

  • Enhancements to Cisco and VMware combined solutions using VMware vSphere 5 and Cisco UCS 2.0 solutions;
  • Support for VXLAN technology in VMware vSphere 5, VMware vCloud Director 1.5, and Cisco Nexus 1000V virtual switch;
  • Auto-deploy capabilities in Cisco Nexus 1000V and VMware vCloud Director 1.5, enabling simplified installation and delivery of VXLAN-based network isolation;
  • Plans to integrate Cisco's Virtual ASA firewall with VMware vCloud Director; and
  • Automated hypervisor provisioning by Cisco UCS 2.0 through integration of VMware vSphere 5 Auto Deploy with UCS Manager, enabling administrators to deploy many VMware vSphere nodes lined to a single Auto Deploy boot image in a single operation.

VXLAN technology in Cisco Nexus 1000V will be available for beta in September 2011. VMware View 5 is expected to be generally available later in the third quarter of 2011. A draft of the VXLAN specification is available on the IETF Web site. A white paper about VXLAN is available on the Cisco site.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • DreamBox Math

    Discovery Education Announces Updates to Experience, DreamBox Math

    K-12 learning solution provider Discovery Education has announced enhancements to its Discovery Education Experience and DreamBox Math products, designed to create a more personalized, engaging learning experience for students.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • digital dashboard featuring a shield icon, graphs, a world map, and network nodes

    IBM Launches Agentic AI Governance and Security Platform

    IBM has introduced a new software stack for enterprise IT teams tasked with managing the complex governance and security challenges posed by autonomous AI systems.

  • laptop and fish hook

    Security Researchers Identify Generative AI 'Vishing' Attack

    A new report from researchers at Ontinue's Cyber Defense Center has identified a complex, multi-stage cyber attack that leveraged social engineering, remote access tools, and signed binaries to infiltrate and persist within a target network.