Data traffic has grown dramatically in the recent years, leading to increased deployment of network service appliances and servers in enterprise, data center, and cloud environments. To address the corresponding business needs, network switch and router architecture has evolved to support multi-terabit capacity. However, service appliance and server capacity remained limited to a few gigabits, far below switch capacity.
Cisco Intelligent Traffic Director (ITD) is an innovative solution to bridge the performance gap between a multi-terabit switch and gigabit servers and appliances. It is an hardware based multi-terabit layer 4 load-balancing, traffic steering and clustering solution on the Nexus 7000 and 7700 series of switches.
It allows customers to deploy servers and appliances from any vendor with no network or topology changes. With a few simple configuration steps on a Cisco Nexus 7000/7700 series switch, customers can create an appliance or server cluster and deploy multiple devices to scale service capacity with ease. The servers or appliances do not have to be directly connected to the Cisco Nexus switch.
ITD (Intelligent Traffic Director) is a hardware based multi-Tbps Layer 4 load-balancing, traffic steering and clustering solution on Nexus 5k/6k/7k series of switches. It supports IP-stickiness, resiliency, NAT (EFT), VIP, health monitoring, sophisticated failure handling policies, N+M redundancy, IPv4, IPv6, VRF, weighted load-balancing, bi-directional flow-coherency, and IPSLA probes including DNS. There is no service module or external appliance needed. ITD provides order of magnitude CAPEX and OPEX savings for the customers. ITD is available on Nexus 7000/7700 series in NX-OS 6.2(8) or later. It is available for demo/EFT on Nexus 5k/6k. ITD is much superior than legacy solutions like PBR, WCCP, ECMP, port-channel, layer-4 load-balancer appliances.
ITD provides :
ASIC based multi-terabit/s L3/L4 load-balancing at line-rate
No service module or external L3/L4 load-balancer needed. Every N7k port can be used as load-balancer.
Redirect line-rate traffic to any devices, for example web cache engines, Web Accelerator Engines (WAE), video-caches, etc.
Capability to create clusters of devices, for example, Firewalls, Intrusion Prevention System (IPS), or Web Application Firewall (WAF), Hadoop cluster
Resilient (like resilient ECMP)
VIP based L4 load-balancing
NAT (available for EFT/PoC). Allows non-DSR deployments.
Load-balances to large number of devices/servers
ACL along with redirection and load balancing simultaneously.
Bi-directional flow-coherency. Traffic from A-->B and B-->A goes to same node.
Order of magnitude OPEX savings : reduction in configuration, and ease of deployment
Order of magnitude CAPEX savings : Wiring, Power, Rackspace and Cost savings
The servers/appliances don’t have to be directly connected to N7k
Monitoring the health of servers/appliances.
N + M redundancy.
Automatic failure handling of servers/appliances.
VRF support, vPC support, VDC support
Supported on both Nexus 7000 and Nexus 7700 series.
Supports both IPv4 and IPv6
N5k / N6k support : coming soon
Load-balance traffic to 256 servers of 10Gbps each.
Load-balance to cluster of Firewalls. ITD is much superior than PBR.
Scale up NG IPS and WAF by load-balancing to standalone devices.
Scale the WAAS / WAE solution.
Scale the VDS-TC (video-caching) solution.
Replace ECMP/Port-channel to avoid re-hashing. ITD is resilient.
ITD is already shipping in Nexus 7000 releases from 6.2(8) and scheduled to be release with more enhancements in 6.2(10). Please send us an email if you would like an EFT/PoC/demo on Nexus 5k/6k. It requires the ENHANCED LAYER2 PKG license.
Good afternoon, I'm experiencing a problem with my branch offices (with LANLite catalyst SW) when ISE (located on our DC) is not reachable due to a WAN failure. People on branch office cannot access local resources when the ISE is marked as dead from...
Hi community,Is there an API and code sample to connect to VPN from .Net app?The idea is to be able to connect to VPN from application and not to ask user to do so as credentials need to be stored from, this as a security request.Thanks in advance.
Hi.I would like to know if it is possible to implement ISE 2.2 on a WS-C2950G-48-EI,because it does not appear in the compatibility matrix of the respective version.https://www.cisco.com/c/en/us/td/docs/security/ise/2-2/compatibility/ise_sdt.html#24274Reg...
Hi Team, We are using one Cisco 695 ESA device for our network. We have one requirement to integrate our Non-Cisco APT with Cisco ESA.Please suggest Is it possible to integrate Non-Cisco APT with Cisco ESA.
I have what I hope is a fairly quick question, I want to know how the authentication latency times are calculated in ISE 2.4 with an external identity source of an RSA server. I assume that the timer starts from the point a request is made...