An Overview of FlexPod and Enhanced Secure Multi-Tenancy



Similar documents
Potecting your business assets in The Cloud, with. Secure Multitency Environment from CloudHPT.

Cisco Unified Data Center

FlexPod for VMware The Journey to Virtualization and the Cloud

What Is Microsoft Private Cloud Fast Track?

MANAGEMENT AND ORCHESTRATION WORKFLOW AUTOMATION FOR VBLOCK INFRASTRUCTURE PLATFORMS

Cisco Unified Data Center: The Foundation for Private Cloud Infrastructure

Cisco Virtualized Multiservice Data Center Reference Architecture: Building the Unified Data Center

Understanding Cisco Cloud Fundamentals CLDFND v1.0; 5 Days; Instructor-led

Implementing and Troubleshooting the Cisco Cloud Infrastructure **Part of CCNP Cloud Certification Track**

Implementing Enhanced Secure Multi-tenancy Solutions (IESMT)

Cisco, Citrix, Microsoft, and NetApp Deliver Simplified High-Performance Infrastructure for Virtual Desktops

Data Center Networking Designing Today s Data Center

WHITE PAPER. Building Blocks of the Modern Data Center

What Is Microsoft Private Cloud Fast Track?

PROPRIETARY CISCO. Cisco Cloud Essentials for EngineersV1.0. LESSON 1 Cloud Architectures. TOPIC 1 Cisco Data Center Virtualization and Consolidation

Deliver Fabric-Based Infrastructure for Virtualization and Cloud Computing

The Future of Computing Cisco Unified Computing System. Markus Kunstmann Channels Systems Engineer

Building the Virtual Information Infrastructure

A Platform Built for Server Virtualization: Cisco Unified Computing System

VMware vcloud Networking and Security Overview

Brocade One Data Center Cloud-Optimized Networks

ABC of Storage Security. M. Granata NetApp System Engineer

Unified Computing Systems

Cloud Ready: Architectural Integration into FlexPod with Microsoft Private Cloud Solution

Private cloud computing advances

The Production Cloud

VMware vcloud Networking and Security

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance

Optimally Manage the Data Center Using Systems Management Tools from Cisco and Microsoft

The Advantages of Cloud Services

Cisco Data Center 3.0 Roadmap for Data Center Infrastructure Transformation

Cisco Unified Computing Remote Management Services

NetApp Storage. Krzysztof Celmer NetApp Poland. Virtualized Dynamic Infrastructure. Applications. Virtualized Storage. Servers

Software-Defined Networks Powered by VellOS

Who Will Be The Cloud Service Broker?

OmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman

Cloud Computing the Path to Increased Efficiencies and Cost Savings for Government Agencies

WHITE PAPER: Egenera Cloud Suite for EMC VSPEX. The Proven Solution For Building Cloud Services

VMware vsphere on NetApp. Course: 5 Day Hands-On Lab & Lecture Course. Duration: Price: $ 4, Description:

Accelerate Your Enterprise Private Cloud Initiative

Cisco Virtual Wide Area Application Services: Technical Overview

Enabling Multi-Tenancy with NetApp MultiStore

Cisco Unified Computing System: Meet the Challenges of Virtualization with Microsoft Hyper-V

DCICT: Introducing Cisco Data Center Technologies

Vyatta Network OS for Network Virtualization

CloudLink - The On-Ramp to the Cloud Security, Management and Performance Optimization for Multi-Tenant Private and Public Clouds

Federated Application Centric Infrastructure (ACI) Fabrics for Dual Data Center Deployments

Simplified Private Cloud Management

vcloud Suite Architecture Overview and Use Cases

Designing Secure Multi-Tenancy into Virtualized Data Centers

Vblock Infrastructure Platforms 2010 Vblock Platforms Architecture Overview

Empowering Private Cloud with Next Generation Infrastructure. Martin Ip, Head of Advanced Solutions and Services Macroview Telecom

Cisco Secure Network Container: Multi-Tenant Cloud Computing

VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition

Journey to the Private Cloud. Key Enabling Technologies

Why is the V3 appliance so effective as a physical desktop replacement?

Consolidate and Virtualize Your Windows Environment with NetApp and VMware

EMC Integrated Infrastructure for VMware

Cisco Virtual Network Management Center

What s New with VMware Virtual Infrastructure

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST

How To Protect Your Cloud From Attack

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services

VMware vcloud Powered Services

SPEED your path to virtualization.

VMware vsphere Design. 2nd Edition

F5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity

Storage Infrastructure for Cloud Computing NetApp Is the Technology Partner of Choice

Private Cloud: A Key Strategic Differentiator

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware

Converged Networking Solution for Dell M-Series Blades. Spencer Wheelwright

A Comprehensive Cloud Management Platform with Vblock Systems and Cisco Intelligent Automation for Cloud

Why Cisco for Cloud? IT Service Delivery, Orchestration and Automation

SQL Server Consolidation Using Cisco Unified Computing System and Microsoft Hyper-V

Virtualization, SDN and NFV

ANZA Formación en Tecnologías Avanzadas

BUILDING A NEXT-GENERATION DATA CENTER

EMC DATA DOMAIN OPERATING SYSTEM

Cisco Data Center Optimization Services

Best Practices Guide: Network Convergence with Emulex LP21000 CNA & VMware ESX Server

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

FlexPod from Cisco and NetApp:

EMC VSPEX SOLUTION FOR INFRASTRUCTURE AS A SERVICE WITH VMWARE VCLOUD SUITE

VXLAN: Scaling Data Center Capacity. White Paper

With Red Hat Enterprise Virtualization, you can: Take advantage of existing people skills and investments

Softverski definirani data centri - 2. dio

VBLOCK TM INFRASTRUCTURE PLATFORMS: A TECHNICAL OVERVIEW

Transcription:

White Paper An Overview of FlexPod and Enhanced Secure Multi-Tenancy August 2011 WP-7113-PS EXECUTIVE SUMMARY This document shows how the FlexPod data center solution and the SMT architecture deliver the key benefit that unlocks all the other positive aspects of cloud computing: security for data, applications, and systems.

TABLE OF CONTENTS 1 INTRODUCTION... 3 AUDIENCE... 3 OBJECTIVE... 3 KEY FEATURES... 4 FOUNDATIONAL COMPONENTS... 4 TENANT-DRIVEN REQUIREMENTS... 4 PROBLEM IDENTIFICATION... 5 CONCERNS ABOUT CLOUD COMPUTING AS A SOLUTION... 5 2 ARCHITECTURE OVERVIEW... 8 INTRODUCING THE FOUR PILLARS... 8 ARCHITECTURAL COMPONENTS... 9 FLEXPOD FOUNDATIONAL COMPONENTS... 10 FLEXPOD TENANT-DRIVEN COMPONENTS... 16 END-TO-END BLOCK DIAGRAM... 21 3 LOGICAL TOPOLOGY... 23 PRIMARY SITE DESIGN... 24 SECONDARY SITE DESIGN... 31 4 ACKNOWLEDGMENTS... 34 LIST OF FIGURES Figure 1) Architecture overview (graphic provided by Cisco).... 8 Figure 2) Architectural components (graphic provided by Cisco).... 10 Figure 3) End-to-end block diagram (graphic provided by Cisco).... 22 Figure 4) Logical topology production cluster (graphic provided by Cisco).... 24 Figure 5) Primary data center cluster design (graphic provided by Cisco).... 25 Figure 6) Generic tenant model (graphic provided by Cisco).... 26 Figure 7) Infrastructure tenant (graphic provided by Cisco).... 27 Figure 8) Tenant 1: SharePoint (graphic provided by Cisco).... 29 Figure 9) Tenant 2: Exchange (graphic provided by Cisco).... 30 Figure 10) Tenant 3: SQL Server (graphic provided by Cisco).... 31 Figure 11) Secondary data center cluster design (graphic provided by Cisco).... 32 Figure 12) Self-service dev/test tenant model enabled by vcloud director (graphic provided by Cisco)... 33 2 An Overview of the Enhanced Secure Multi-Tenancy Architecture

1 INTRODUCTION The federal Cloud-First policy asks agencies to migrate three must move services to cloud solutions within 18 months. The Federal Data Center Consolidation Initiative requires agencies to downsize to a more manageable, affordable, and sustainable number of computing facilities. Even where compliance is not a primary consideration, agencies are looking toward shared solutions to help them simplify and lower the cost of providing data and application services. They want cloud benefits such as agility, speed, reliability, and flexibility. However, many agencies see a very large obstacle in the way the same attributes of the cloud that should deliver expected benefits also raise significant security concerns. Jointly designed by NetApp, Cisco, and VMware, the FlexPod data center solution is a complete, integrated cloud architecture consisting of leading storage, networking, and server technologies. It was designed to reduce the cost and complexity of implementing the federal Cloud-First policy and other cloud initiatives, with a secure, pretested, shared infrastructure solution that has been validated in a lab environment. Security and isolation in the FlexPod data center solution are provided by enhanced secure multi-tenancy (SMT) architecture. Also designed jointly by NetApp, Cisco, and VMware, the SMT architecture is a labvalidated solution for achieving availability, secure separation, service assurance, and resource management. This means that the FlexPod data center solution functions with the SMT architecture as a security solution, not just a cloud platform. This white paper provides a detailed overview of the secure cloud architecture. It shows how FlexPod and SMT work as a single solution to address common security concerns and to mitigate the risks of the cloud with four pillars of protection in a secure cloud environment. NetApp, Cisco, and VMware jointly designed the FlexPod data center solution as a secure cloud architecture and validated its design in a lab environment. This white paper provides an overview of a secure cloud architecture based on the FlexPod data center solution and enhanced secure multi-tenancy (SMT) architecture. It also discusses the problems that this architecture solves and the four pillars of a secure cloud environment. FlexPod is a defined set of hardware and software that serves as an integrated infrastructure stack for all virtualization solutions. FlexPod for VMware includes NetApp storage, Cisco networking, the Cisco Unified Computing System, and VMware virtualization software in a single package in which the computing and storage components fit in one data center rack and the networking components reside in a separate rack. Enhanced secure multi-tenancy is a component architecture that can be integrated into a FlexPod data center solution to facilitate dynamic shared resource management while maintaining secure and isolated environments. SMT integrates additional NetApp, Cisco, and VMware technologies into a FlexPod solution that satisfies stringent requirements for availability, separation, service assurance, and manageability within cloud deployments. AUDIENCE The primary audience for this white paper includes chief information officers, chief information security officers, program managers, system architects, and security architects who are considering secure multitenancy environments as a foundation for cloud, consolidation, and other initiatives. OBJECTIVE This white paper offers an overview of the architecture required to design, deploy, back up, and provide disaster recovery for a virtual IT as a service (ITaaS) environment based on the FlexPod data center solution and the SMT architecture. 3 An Overview of the Enhanced Secure Multi-Tenancy Architecture

KEY FEATURES The following new features are included in the FlexPod design with SMT: Virtualization of physical Cisco Unified Computing System (Cisco UCS ) adapters with Cisco VIC adapters Enhanced environment security and visibility with Cisco Services and VMware vshield App and vshield Edge Tenant backup and replication for data recovery and disaster recovery with NetApp SnapDrive and SnapManager products and VMware Site Recovery Manager FCoE initiator and target capabilities with Cisco UCS and NetApp storage Preproduction development and test environment with VMware vcloud Director Open management framework for third-party orchestration FOUNDATIONAL COMPONENTS Each implementation of FlexPod and SMT is likely to be somewhat different because of the dynamic nature and flexibility of the architecture. It doesn t lock agencies into fixed configurations. For this reason, this white paper should be viewed as a reference for designing a customized solution based on specific tenant requirements. To provide a stable base for configuration, the following components are required as a foundation for all FlexPod and SMT environments: Cisco Nexus data center switches Cisco UCS Cisco Nexus 1000v Distributed Virtual Switch NetApp Data ONTAP VMware vsphere VMware vcenter Server VMware vshield Customized environments can be designed for specific tenant requirements by adding features based on these foundational components. TENANT-DRIVEN REQUIREMENTS An environment based on FlexPod and SMT gives agencies the flexibility and agility to address a myriad of tenant requirements originating from mission applications, policies, and regulations. To meet these requirements, agencies may be required to provide tenants with additional services such as: Load balancing SSL offload Intrusion prevention and detection Network analysis The design does not preclude the introduction of additional network or compute components to meet these specific objectives. One or more network services may be required to meet the security, the scalability, and/or the availability requirements of numerous tenant applications. The example applications in this design are based on previous efforts that focused on the use of network services to create: Architectural flexibility. Services are readily deployable and fulfill a role in which the mode of deployment and the model are also options. Predictable traffic patterns. Steady and nonsteady state should result in reliable flows. 4 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Consistent convergence. The high-availability requirements are supported within the data center. Client-to-server services. Network services for data center ingress and egress traffic are introduced. These services offer a comprehensive solution to meet the requirements of a multi-tenant environment. PROBLEM IDENTIFICATION The traditional IT model suffers from resources located in different, unrelated silos, leading to low utilization, wide-spread inefficiencies, and an inability to respond quickly to changing mission requirements. Enterprise servers reside in one area of the data center, and network switches and storage arrays reside in another area. In many cases, different organizations own the same type of equipment, and use it in the same way and in the same data center row, yet require separate physical systems to separate their processes and data from other groups. This separation is often ineffective and therefore costly. In addition, it complicates the delivery of IT services and sacrifices alignment with the mission activity. As the IT landscape rapidly changes, costreduction pressure, a focus on time to deployment, and employee empowerment are compelling agencies to develop innovative strategies to address these challenges. The current separation of servers, networks, and storage between different mission units is commonly divided by physical server racks and a separate network. By deploying a FlexPod and SMT virtual ITaaS solution, each mission unit benefits from the transparency of the virtual environment while it still looks and feels the same as a traditional, all-physical topology. From the viewpoint of the end customer, each system is still separate, with its own network and storage; however, the divider is not a server rack, but a FlexPod and SMT solution. The servers, networks, and storage are all still securely separated, in some cases much more so than in a traditional environment. Finally, when a mission unit needs more servers, the IT team simply deploys a few more virtual machines (VMs) in the existing environment, instead of having to order new physical equipment for every deployment. CONCERNS ABOUT CLOUD COMPUTING AS A SOLUTION According to the National Institute of Standards and Technology (NIST), cloud computing is defined as a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (for example, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. CLOUD MODELS The NIST cloud model promotes availability and is composed of three service models and four deployment models. Cloud service models include: Infrastructure as a service (IaaS). Processing, storage, networks, and other fundamental computing resources are provided as environments where agencies can deploy and run operating systems and applications. Software as a service (SaaS). Access is provided to applications running in the provider s environment. Platform as a service (PaaS). Hardware and a solution stack are provided to run specific applications. The FlexPod and SMT architecture represents an IaaS model. Both SaaS and PaaS models can be deployed on top of the base solution described in this document. 5 An Overview of the Enhanced Secure Multi-Tenancy Architecture

CLOUD DEPLOYMENT CATEGORIES Cloud environments can be separated into four categories, based on the consumers they serve: Private cloud is operated solely for an organization. It can be managed by the organization or by a third party and can exist on premise or off premise. Public cloud is made available to the general public or to a large industry group and is owned by an organization that sells cloud services. Hybrid cloud is a composite of two or more clouds (private, community, or public) that retain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (for example, cloud bursting for load-balancing between clouds). Community cloud is shared by several organizations and supports a specific community that has shared concerns (for example, mission, security requirements, policy, and compliance considerations). This cloud can be managed by the organizations or by a third party and can exist on premise or off premise. Whether the focus is on public or private cloud services, these efforts share several objectives: Increase operational efficiency through the cost-effective use of expensive infrastructure Drive up economies of scale through shared resourcing Deploy customer environments or applications by using a rapid and agile process Improve service quality and accelerate delivery through standardization Reduce deployment risks of integrating into an existing environment Promote green computing by maximizing the efficient use of shared resources and by lowering energy consumption CLOUD BENEFITS ARE OFFSET BY SECURITY CHALLENGES Achieving these goals can have a profound positive impact on affordability, productivity, and service delivery. However, leveraging shared infrastructure and resources in a cloud-services architecture introduces additional challenges, hindering widespread adoption by agencies that require securely isolated customer or application environments. As enterprise IT environments have grown dramatically in scale, complexity, and diversity of services, they have typically deployed application and customer environments in silos of dedicated infrastructure. These silos are built around specific applications, customer environments, organization missions, operational requirements, and regulatory compliance (Sarbanes-Oxley, HIPAA, and PCI) or to address specific proprietary data confidentiality. For example: Agencies must isolate different levels of classified information, as well as sensitive-but-unclassified and personally identifiable information. Information exposed for public use must be separated from internal environments. Resources externally exposed to outside providers must be separated from those for internal use only. Fee-for-service providers must separate billing, CRM, payment systems, access portals, and hosted environments. Healthcare, HR, and payroll organizations must protect many different types of personnel records. Enabling enterprises to migrate such environments to cloud architecture demands the capability to provide secure isolation while still delivering the management and flexibility benefits of shared resources. Both private and public cloud providers must enable all customer data, communication, and application environments to be securely separated, protected, and isolated from other tenants. They must also be protected from typical security threats as well as those that specifically exploit secure environments. 6 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Separations and protections must be so complete that tenants have no visibility of each other and resources are as secure as they would be on a physically isolated system. Otherwise any cloud-related benefits would be completely offset by the exponentially higher costs of losing, recovering, or replacing mission-critical assets. Cloud environments must deliver the secure separation required by agencies organizational structure, application requirements, policies, and regulations. Currently, many agencies lack confidence that such secure isolation can be achieved while also delivering resilient resource management flexibility. This is perhaps the most significant obstacle to widespread agency adoption of cloud service models. FLEXPOD AND SMT ADDRESS AND RESOLVE THESE SECURITY CONCERNS NetApp, Cisco, and VMware realized that the foremost requirement for a shared infrastructure solution in government agencies is the ability to facilitate dynamic shared resource management while maintaining secure and isolated environments. VMware vsphere, VMware vshield, Cisco Unified Computing System, Cisco Nexus Switches, and NetApp MultiStore with NetApp DataMotion work together in the FlexPod and SMT architecture to deliver a powerful solution that fulfills agencies demanding requirements for secure isolation and flexibility in cloud deployments of all scales. One of the main differences between traditional shared hosting (internal or external) and a typical IaaS cloud service is the level of control available to the user. Traditional hosting services provide agencies with general application or platform administrative control, whereas IaaS deployments typically give agencies broader control over the compute resources. A secure cloud architecture based on FlexPod and SMT offers even greater end-to-end controls, allowing agencies to govern just about every aspect of the environment, including the compute platform, network connectivity, storage resources, and data management. This architecture enables agencies to exert unprecedented control over security throughout their entire application environment. Unique isolation technologies combined with extensive management flexibility enable all of the benefits of cloud computing while maintaining complete security compliance for multitenant deployments and consolidated resources. 7 An Overview of the Enhanced Secure Multi-Tenancy Architecture

2 ARCHITECTURE OVERVIEW One of the essential characteristics of cloud architecture is the ability to pool resources. The provider s compute, network, and storage resources are pooled to serve multiple consumers by using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. The customer generally has no knowledge of or control over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (for example, country, state, or data center). Examples of resources include storage, processing, memory, network bandwidth, and VMs. Each tenant subscribed to compute, network, and storage resources in a cloud is entitled to a given service-level agreement. One tenant may have higher SLA requirements than another based on a mission model or organizational hierarchy. For example, tenant A may have higher compute and network bandwidth requirements than tenant B, while tenant B may have a higher storage capacity requirement. The main design objective is to make sure that tenants in this environment properly receive the subscribed SLA while their data, communication, and application environments are securely separated, protected, and isolated from other tenants. Figure 1) Architecture overview (graphic provided by Cisco). THE FOUR PILLARS The keys to developing a robust design are to clearly define the requirements and to apply proven methodology and design principles. The following four requirements are defined as pillars of the secure cloud architecture: Availability. This pillar allows the infrastructure to meet the expectation of compute, network, and storage to always be available, even in the event of failure. Similar to the secure separation pillar, each layer has its own method of providing a high-availability configuration that works seamlessly with adjacent layers. Security and availability are best deployed from a layered approach. Secure separation. This pillar prevents one tenant from having access to another tenant s resources, such as VMs, network bandwidth, and storage. Each tenant must be securely separated by using techniques such as access control, VLAN segmentation, and virtual storage controllers. Also, each layer has its own means of enforcing policies that help reinforce the policies of the adjacent layers. 8 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Service assurance. This pillar provides isolated compute, network, and storage performance during both steady state and nonsteady state. For example, the network can provide each tenant with a certain bandwidth guarantee using quality of service (QoS). Resource pools in VMware help balance and guarantee CPU and memory resources, while NetApp FlexShare quality of service tool can balance resource contention across storage volumes. Management. This pillar is required to rapidly provision and manage resources and view resource availability. Domain and element management offer comprehensive administration of the shared resources that compose the secure cloud architecture. The demarcation point for managing this design is defined by the interactive and programmable interfaces delivered by NetApp, VMware, and Cisco. The administrative interfaces and APIs in this portfolio address infrastructure components such as vcenter, vcloud Director, Cisco UCS Manager, DC Network Manager, and the NetApp Manageability Suite. These element managers and their associated open APIs provide the foundation for delivering cohesive service lifecycle orchestration with solution partners. ARCHITECTURAL COMPONENTS The architectural components of the FlexPod and SMT designs address the availability, secure separation, service assurance, and management requirements of its tenants. These design goals do not vary; however, mission, compliance, and application requirements of any one tenant vary a good deal from tenant to tenant. To address this reality, the FlexPod and SMT designs are flexible and extensible. The actual architectural components implemented in the enterprise to meet any one tenant's objectives may differ. However, all of them are built starting with a specific set of foundational components. There are two categories: the foundational components of FlexPod and SMT and those components driven by tenant requirements. 9 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Figure 2) Architectural components (graphic provided by Cisco). FLEXPOD AND SMT FOUNDATIONAL COMPONENTS COMPUTE VMware vsphere and vcenter Server VMware vsphere and vcenter Server offer the highest levels of availability and responsiveness for all applications and services with VMware vsphere, a highly reliable platform for data center virtualization. Optimize IT service delivery and deliver high levels of application service agreements with low total-costper-application workload by decoupling mission-critical applications from the underlying hardware for flexibility and reliability. VMware vcenter Server is a scalable and extensible platform that forms the foundation for virtualization management (www.vmware.com/solutions/virtualization-management/). VMware vcenter Server (formerly VMware VirtualCenter) centrally manages VMware vsphere (www.vmware.com/products/vsphere/) environments, giving IT administrators dramatically improved control over the virtual environment compared to other management platforms. VMware vcenter Server: Provides centralized control and visibility at every level of the virtual infrastructure Unlocks the power of vsphere through proactive management Is a scalable and extensible management platform with a broad partner ecosystem For more information, refer to www.vmware.com/products/. 10 An Overview of the Enhanced Secure Multi-Tenancy Architecture

VMware vshield For organizations that want to leverage the benefits of cloud computing without sacrificing security, control, or compliance, the VMware vshield family of security solutions offers virtualization-aware protection for virtual data centers and cloud environments, enabling customers to strengthen application and data security, improve visibility and control, and accelerate IT compliance efforts across the organization. The vshield family of products includes vshield App and vshield Edge. vshield App vshield App provides firewalling capability between VMs by placing a firewall filter on every virtual network adapter. The firewall filter operates transparently and does not require network changes or modification of IP addresses to create security zones. Rules can be written by using vcenter groupings, such as Datacenter, Cluster, Resource Pools, and vapps, or by using network objects such as Port Group and VLAN to reduce the number of firewall rules and to make the rules easier to track. vshield Edge vshield Edge offers network edge security and services to isolate the VMs in a port group from the external network. vshield Edge connects isolated tenant stub networks to the shared (uplink) networks and provides common perimeter security services such as DHCP, VPN, and NAT. Common deployments of vshield Edge occur on DMZ, VPN extranets, and multi-tenant cloud environments. vshield Edge provides perimeter security for virtual data centers in these environments. It is compatible with Standard vswitch, vnetwork Distributed Switch, and the Cisco Nexus 1000V. vshield Edge is also leveraged by VMware vcloud to isolate organization and vapp networks. VMware vshield Zones is a centrally managed, stateful, distributed virtual firewall bundled with vsphere 4.1 that takes advantage of ESXi host proximity and virtual network visibility to create security zones. By leveraging various VMware logical containers, it is possible to greatly reduce the number of rules required to secure a multi-tenant environment, thereby reducing the operational burden that accompanies the isolation and segmentation of tenants and applications. This new way of creating security policies closely ties to the VMware VM objects, follows the VMs during migration with VMware VMotion, and is completely transparent to IP address changes and network renumbering. Using vshield Zones within Distributed Resource Scheduler (DRS) clusters secures compute load-balancing operations without performance compromise because the security policy follows the VM. In addition to being an endpoint and asset-aware firewall, the vshield Zones contain microflow-level virtual network reporting. This feature is critical in understanding and monitoring virtual traffic flows and in implementing zoning policies based on rich information available to security and network administrators. This flow information is categorized into allowed and blocked sessions and can be organized by protocol, port and application, and direction. This information can also be seen at any level of the inventory hierarchy. It can also find rogue services, prohibit VM communication, serve as a regulatory compliance visualization tool, and troubleshoot access and firewall rule configurations. Flexible user configuration allows role-based duty separation for network, security, and vsphere administrator duties. The Flow Monitoring feature displays allowed and blocked network flows at application-protocol granularity. This feature can be used to audit network traffic and as an operational troubleshooting tool. For more information, refer to www.vmware.com/products/vshield-zones/. Cisco UCS and UCSM The Cisco Unified Computing System is a revolutionary new architecture for blade server computing. It is a next-generation data center platform that unites compute, network, storage access, and virtualization into a cohesive system designed to reduce total cost of ownership (TCO) and increase mission agility. The system integrates a low-latency, lossless 10-Gigabit Ethernet (10GbE) unified network fabric with enterprise-class, x86-architecture servers. The system is an integrated, scalable, multichassis platform in which all resources participate in a unified management domain. Managed as a single system, whether it 11 An Overview of the Enhanced Secure Multi-Tenancy Architecture

has 1 server or 320 servers, with thousands of VMs, the Cisco UCS decouples scale from complexity. The Cisco UCS accelerates the delivery of new services simply, reliably, and securely through end-to-end provisioning and migration support for both virtualized and nonvirtualized systems. Cisco UCS Components The Cisco UCS is built from the following components: Cisco UCS 6100 Series Fabric Interconnects. This is a family of line-rate, low-latency, lossless, 10Gb/sec Ethernet and Fibre Channel over Ethernet interconnect switches. For more information, refer to www.cisco.com/en/us/partner/products/ps10276/index.html. Cisco UCS 5100 Series Blade Server Chassis. This component supports up to eight blade servers and up to two fabric extenders in a six-rack unit enclosure. For more information, refer to www.cisco.com/en/us/partner/products/ps10279/index.html. Cisco UCS 2100 Series Fabric Extenders. This component brings unified fabric into the bladeserver chassis, providing up to four 10Gb/sec connections each between blade servers and the fabric interconnect. For more information, refer to www.cisco.com/en/us/partner/products/ps10278/index.html. Cisco UCS B-Series Blade Servers. This component adapts to application demands, intelligently scales energy use, and offers best-in-class virtualization. For more information, refer to www.cisco.com/en/us/partner/products/ps10280/index.html. Cisco UCS B-Series Network Adapters. This component offers a range of options, including adapters optimized for virtualization; compatibility with existing driver stacks; or efficient, highperformance Ethernet. For more information, refer to www.cisco.com/en/us/partner/products/ps10280/index.html. Cisco UCS Manager. This component provides centralized management capabilities for the Cisco UCS. For more information, refer to www.cisco.com/en/us/partner/products/ps10281/index.html. For more information about all Cisco UCS components, refer to www.cisco.com/en/us/partner/netsol/ns944/index.html. NETWORK Cisco Nexus 7000 Cisco s flagship switching platform, the Cisco Nexus 7000 Series, is a modular switching system designed to deliver 10GbE and unified fabric in the data center. This new platform delivers exceptional scalability, continuous operation, and transport flexibility. It is primarily designed for the core and aggregation layers of the data center. The Cisco Nexus 7000 Platform is powered by Cisco NX-OS (www.cisco.com/en/us/products/ps9372/index.html), a state-of-the-art operating system, and was designed with the features and capabilities needed in the most mission-critical place in the network, the data center. For more information, refer to www.cisco.com/en/us/products/ps9402/index.html. Cisco Nexus 5000 The Cisco Nexus 5000 Series (www.cisco.com/en/us/products/ps9670/index.html), part of the Cisco Nexus family of data center class switches, delivers an innovative architecture that simplifies data center transformation. These switches deliver high performance, standards-based Ethernet, and Fibre Channel over Ethernet (FCoE) that enable the consolidation of local area network (LAN), storage area network (SAN), and cluster network environments onto a single unified fabric. Backed by a broad group of industry-leading complementary technology vendors, the Cisco Nexus 5000 Series is designed to meet the challenges of next-generation data centers, including dense multisocket, multicore, VM-optimized deployments, in which infrastructure sprawl and increasingly demanding workloads are common. 12 An Overview of the Enhanced Secure Multi-Tenancy Architecture

The Cisco Nexus 5000 Series is built around two custom components: a unified crossbar fabric and a unified port controller application-specific integrated circuit (ASIC). Each Cisco Nexus 5000 Series Switch contains a single unified crossbar fabric ASIC and multiple unified port controllers to support fixed ports and expansion modules within the switch. The unified port controller is an interface between the unified crossbar fabric ASIC and the network media adapter; it makes forwarding decisions for Ethernet, Fibre Channel, and FCoE frames. The ASIC supports the cut-through design of the switch by transmitting packets to the unified crossbar fabric before the entire payload has been received. The unified crossbar fabric ASIC is a single-stage, nonblocking crossbar fabric capable of meshing all ports at wire speed. It offers superior performance by implementing QoSaware scheduling for unicast and multicast traffic. Moreover, the tight integration of the unified crossbar fabric with the unified port controllers helps provide low-latency lossless fabric for ingress interfaces requesting access to egress interfaces. For more information, refer to www.cisco.com/en/us/products/ps9670/index.html. Cisco Nexus 1000V The Nexus 1000V switch is a distributed software switch on a VMware ESX or ESXi server that delivers Cisco VN-Link services to VMs hosted on that server. It takes advantage of the VMware vsphere framework to offer tight integration between server and network environments and helps to provide consistent, policy-based network capabilities to all servers in the data center. It allows policy to move with a VM during live migration, providing persistent network, security, and storage compliance. In addition, it results in improved mission continuance, performance management, and security compliance. And it aligns management of the operational environment for VMs and physical server connectivity in the data center, reducing the TCO by providing operational consistency and visibility throughout the network. It offers flexible collaboration between the server, network, security, and storage teams while supporting various organizational boundaries and individual team autonomy. The Cisco Nexus 1000V supports VMware vcloud Director. The vcloud Director has three layers of networking: provider, organizational, and vapp. The Nexus 1000V supports all three of these network types by using port-group-backed network pools and their associated VLANs. The combination of vcloud and Nexus 1000V allows enterprises to offer self-service isolated network provisioning for multi-tenant environments. Note: The Nexus 1000V does not currently support VCNI, which is a new VMware technology available in vcloud Director. In addition to the security features offered by the Nexus 1000V, the Cisco virtual distributed switch supports VMware vshield Edge technology. To achieve secure multi-tenancy, it is important to carve off one or more isolated L2 adjacent segments on the Nexus 1000V for each tenant. These VLAN segments are further secured at the perimeter by using vshield Edge, which allows certain services such as the domain name system or Microsoft Active Directory to be consumed by the tenant VMs. For more information, refer to www.cisco.com/en/us/products/ps9902/index.html. The Nexus 1010 Virtual Services Appliance hosts the Cisco Nexus 1000V Virtual Supervisor Module (VSM) and supports the Cisco Nexus 1000V Network Analysis Module (NAM) Virtual Service Blade to offer a comprehensive solution for virtual access switching. The Cisco Nexus 1010 provides dedicated hardware for the VSM, making the virtual access switch deployment much easier for the network administrator. For more information on Nexus 1000v, refer to www.cisco.com/en/us/partner/products/ps10785/index.html. For more information on Cisco VN-Link technologies, refer to www.cisco.com/en/us/netsol/ns894/index.html. 13 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Cisco Data Center Network Manager Data Center Network Manager (DCNM) is a management solution that maximizes overall data center infrastructure uptime and reliability, which improves mission continuity. Focused on the management requirements of the data center network, DCNM provides a robust framework and a rich feature set that fulfill the switching needs of present and future data centers. In particular, DCNM automates the provisioning process. DCNM is a solution designed for Cisco NX-OS-enabled hardware platforms. Cisco NX-OS provides the foundation for the Cisco Nexus product family, including the Cisco Nexus 7000 Series. For more information, refer to www.cisco.com/en/us/docs/switches/datacenter/sw/4_1/dcnm/fundamentals/configuration/guide/fund_ov erview.html. Cisco Fabric Manager Fabric Manager (FM) is a management solution for storage networks across all Cisco SANs and unified fabric. FM provides a robust centralized management station for SAN and unified fabric enabled devices such as the MDS family of switches and the Nexus 5000. FM reduces TCO by performing the tasks needed during a device s deployment cycle, such as discovery, inventory, configuration, performance monitoring, and troubleshooting. FM is designed for management of the MDS family of switches, the Nexus 5000 SAN features, and the UCS Fabric Interconnect with limited support. For more information, refer to www.cisco.com/en/us/partner/docs/switches/datacenter/mds9000/sw/5_0/configuration/guides/fund/fm/f mfund_5_0_1.html. STORAGE NetApp FAS Unified Storage Each NetApp fabric-attached storage (FAS) controller shares a NetApp Unified Storage Architecture based on the Data ONTAP 7G operating system and uses an integrated suite of application-aware manageability software. This efficiently consolidates SAN, network-attached storage (NAS), primary storage, and secondary storage on a single platform while allowing concurrent support for block and file protocols by using Ethernet and Fibre Channel interfaces. These interfaces include FCoE, Network File System (NFS), Common Internet File System protocol (CIFS), and iscsi. This common architecture allows missions to start with an entry-level storage platform and easily migrate to the higher-end platforms as storage requirements increase, without learning a new operating system, requiring new management tools, or changing the provisioning processes. To provide resilient system operation and high data availability, Data ONTAP 7G is tightly integrated into the hardware systems. The FAS systems use redundant, hot-swappable components. Combined with Double Parity RAID-DP (NetApp high-performance RAID 6), the result can be superior data protection with little or no performance loss. For a higher level of data availability, Data ONTAP offers optional mirroring, backup, and disaster recovery solutions. For more information, refer to www.netapp.com/us/products/platform-os/data-ontap/. NetApp Snapshot technology provides the added benefit of near-instantaneous file-level or full dataset recovery, while using a very small amount of additional storage. The Snapshot technology creates up to 255 data-in-place, point-in-time images per volume. For more information, refer to www.netapp.com/us/products/platform-os/snapshot.html. Important applications require a quick response time, even during times of heavy loading. NetApp FlexShare quality-of-service software is included as part of the Data ONTAP operating system to enable a fast response time when serving data for multiple applications. FlexShare allows storage administrators to set and dynamically adjust workload priorities. For more information, refer to www.netapp.com/us/products/platform-os/flexshare.html. 14 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Although this solution focuses on specific hardware, including the FAS6080 and FAS3170, all of the FAS platforms, including the FAS6040 and FAS3140, are supported based on sizing requirements and expansion needs, with all of the same software functionality and features. Similarly, the quantity, size, and type of disks used in this environment may also vary depending on storage and performance needs. Additional add-on cards, such as Flash Cache, can be used in this architecture to increase performance by adding system cache for fast data access. However, they are not required for secure cloud functionality. For more information, refer to www.netapp.com/us/products. Ethernet Storage Ethernet storage using NFS is a key technology in this architecture, providing tremendous efficiency and functional gains. Some key benefits of Ethernet-based storage are: Reduced hardware costs for implementation Reduced training costs for support personnel Simplified infrastructure supported by internal IT groups The initial solution is to deploy a clustered pair of enterprise-class NetApp storage controllers onto a dedicated virtual Ethernet storage network that is hosted by a pair of core IP Cisco switches and an expandable number of edge switches. The virtual Ethernet storage network also extends to each host server through two fabric interconnects, enabling direct IP storage access from within the compute layer. For more information, refer to www.netapp.com/us/company/leadership/ethernet-storage/. In addition, NetApp storage now supports the Cisco Discovery Protocol (CDP), which enables greater visibility into the Ethernet network from the storage perspective. CDP provides the storage administrator with information about the name of each Cisco switch that is attached and also on which port or ports the storage system is attached. This feature helps to simplify the initial Ethernet configuration as well as the process to troubleshoot any issues that arise. Stateless Computing Using FCoE Boot FCoE is an encapsulation of Fibre Channel frames transported over Ethernet networks with certain provisions to make sure that Fibre Channel standards are followed. FCoE architectures significantly reduce management complexity, required cable count, number of mezzanine cards for fabric segmentation, and power and cooling costs. FCoE is an inherent design element in the FlexPod and SMT architecture because it is a core component available in the Cisco UCS in the form of virtualized server adapters and unified storage adapters on the NetApp controller. Fibre Channel and IP traffic from the UCS fabric interconnects are passed northbound to a Storage Protocols License enabled Nexus 5000 with attached NetApp IP and FCoE storage interfaces. The deployment of an architecture consisting of FCoE booted physical resources gives great flexibility and resiliency to a multi-tenant infrastructure. An FCoE booted deployment consists of hosts in the environment with converged network adapters capable of translating SCSI commands. Cisco UCS hosts access their boot operating system by using logical unit numbers (LUNs) on the NetApp unified storage controller. FCoE booted hosts that use NetApp controllers have superior RAID protection and increased performance compared to traditional local disk arrays. Furthermore, FCoE booted resources can easily be recovered, are better utilized, and scale much faster than local disk installations. Operating systems and hypervisors provisioned by using NetApp controllers take advantage of storage efficiencies inherent in NetApp products. Another major benefit of FCoE booted architectures is that they can be deployed and recovered in minutes, depending on the operating system installed. FCoE booted deployments effectively reduce provisioning time, increase utilization, and aid in the stateless nature of service profiles in Cisco UCS. An FCoE booted environment can be preconfigured and, through the use of NetApp technologies, can perform better, have greater data protection, and be easier to restore. 15 An Overview of the Enhanced Secure Multi-Tenancy Architecture

NetApp FilerView NetApp FilerView is the primary, element-level graphical management interface that is available on every NetApp storage system. FilerView is an intuitive, browser-based tool that can be used to monitor and manage administrative tasks on individual NetApp storage systems. In addition to extensive configuration control over storage services, providers can leverage FilerView to assess storage resource capacity and utilization for the following: Physical disk aggregates NetApp FlexVol logical volumes Quotas Block storage allocation for SAN attachments NFS or CIFS implementation for NAS attachments FilerView gives control over administrative and user access to the NetApp storage system. Storage providers can use FilerView to inspect the health and status of NetApp storage systems and to configure notification and alerting services for resource monitoring. NetApp MultiStore NetApp MultiStore enables cloud providers to quickly and easily create separate and completely private logical partitions on a single NetApp storage system as discrete administrative domains called vfiler units. These units make a single physical storage controller appear to be many logical controllers. Each vfiler unit can be individually managed with different sets of performance and policy characteristics. Providers can leverage MultiStore to enable multiple customers to share the same storage resources with a minimal compromise in privacy or security. Administrative control of the virtual storage container can even be delegated directly to the customer. Up to 130 vfiler units can be created on most NetApp highavailability pairs by using MultiStore technology. For more information, refer to www.netapp.com/us/products/platform-os/multistore.html. TENANT-DRIVEN COMPONENTS COMPUTE VMware vcloud Director VMware vcloud Director builds on the VMware vsphere foundation and exposes virtualized shared infrastructure as multi-tenant virtual data centers that are completely decoupled from the underlying hardware. VMware vcloud Director also allows IT to expose virtual data centers to users through a Webbased portal and to define and expose a catalog of IT services that can be deployed in the virtual data center. By using VMware technology, standardized IT services can now be delivered on shared infrastructure through a Web-based catalog. By standardizing service offerings, many IT management tasks from troubleshooting and patching to change management can be simplified, and administrative maintenance that burdens IT teams today can be eliminated. Provisioning can also be automated through policy-based workflows that empower validated users to deploy preconfigured services with the click of a button, translating into new opportunities for end users to procure IT resources exactly when they need them. Standardizing processes, increasing automation, and delivering ITaaS drive additional savings beyond virtualization, while significantly reducing the amount of maintenance required per IT administrator. A private cloud built on VMware technology enables IT departments to transform themselves into efficient, agile, and user-friendly internal service providers. IT departments can then deliver on the 16 An Overview of the Enhanced Secure Multi-Tenancy Architecture

promise of ITaaS, providing fully automated, catalog-based services to internal users through a Webbased portal. VMware vcenter Chargeback vcenter Chargeback is an end-to-end cost-reporting solution for virtual environments using vsphere. This Web-based application interacts with the vcenter database to retrieve usage information, calculate the cost by using the defined chargeback formulas, and generate reports. Starting with version 1.5, vcenter Chargeback is integrated with VMware vcloud Director and vshield to collect usage statistics and to report for the new abstraction layer. VMware vcenter Site Recovery Manager VMware vcenter Site Recovery Manager (SRM) is a mission continuity and disaster recovery solution that helps administrators plan, test, and execute a scheduled migration or emergency failover of vcenter inventory from one site to another. The SRM offers the following features: Disaster recovery management Nondisruptive disaster recovery testing Automated disaster recovery failover NETWORK Cisco Catalyst 6500 Virtual Switching System 1440 The Cisco Catalyst 6500 Series Virtual Switching System (VSS) 1440 allows the merging of two physical Cisco Catalyst 6500 Series Switches into a single, logically managed entity. The key enabler of a VSS 1440 is the Virtual Switching Supervisor 720-10G. After a VSS 1440 is created, it acts as a single virtual catalyst switch that delivers the following benefits: Operational manageability. Two Catalyst 6500s share a single point of management, single gateway IP address, and single routing instance, eliminating the dependence on First Hop Redundancy Protocols (FHRPs) and Spanning Tree Protocols (STPs). Availability. The VSS delivers deterministic, sub-200 millisecond layer 2 link recovery through interchassis stateful failovers and the predictable resilience of EtherChannel. Scalability. The VSS scales system bandwidth capacity to 1.4 Tb/sec by activating all available bandwidth across redundant Catalyst 6500 switches. The VSS platform fully supports the use of Cisco integrated service modules such as the Cisco Application Control Engine, the Firewall Services module, and the Network Analysis module. In addition, the VSS platform is capable of supporting both gigabit and 10GbE devices, allowing network-based services by using a variety of appliance form factors. Cisco Firewall Services The Cisco Firewall Services module is a stateful firewall residing in a Catalyst 6500 switching platform. This integrated module employs the power, cooling, and space available in the chassis to provide data center security services. It offers device-level redundancy and scalability through multiple virtual security contexts. Each virtual security context can be transparently introduced at the layer 2 network level or as a router hop at layer 3. With either deployment model, the security policies associated with each virtual context are consistently applied to protect the related data center networks. For more information, refer to www.cisco.com/en/us/products/hw/modules/ps2706/ps4452/index.html. Cisco Application Control Engine The Cisco Application Control Engine (ACE) module and application platforms perform server load balancing, network traffic control, service redundancy, resource management, encryption and security, and application acceleration and optimization, all in a single network device. The Cisco ACE technologies offer device and network service-level availability, scalability, and security features to the data center. 17 An Overview of the Enhanced Secure Multi-Tenancy Architecture

For more information, refer to www.cisco.com/en/us/products/ps5719/products_sub_category_home.html. Cisco Intrusion Prevention System Appliances The Cisco Intrusion Prevention System (IPS) appliances are network sensors that can be positioned throughout the data center as promiscuous network analysis devices or inline intrusion prevention systems. The Cisco IPS sensors protect the data center by detecting, classifying, and blocking networkbased threats by using attack signatures associated with worms, viruses, and various application abuse scenarios. This process occurs on a per-connection basis, allowing legitimate traffic to flow unobstructed. The Cisco IPS appliances support logical partitioning, allowing one physical sensor to become multiple virtual sensors. In this configuration, the virtual sensors can be deployed in any combination of promiscuous or inline modes. Each sensor, virtual or physical, can be finely tuned to inspect the application traffic pertinent to its network locale. For more information, refer to www.cisco.com/en/us/products/hw/modules/ps2706/ps4452/index.html. Cisco Network Analysis Module Products The Cisco Network Analysis Module (NAM) comes in several form factors, including: Integrated service module for the Catalyst 6500 switching platform Physical appliance with multiple gigabit or 10GbE support Virtual service blade for Cisco Nexus 1000v deployments Regardless of the model, the NAM offers flow-based traffic analysis of applications, hosts, and conversations; performance-based measurements on application, server, and network latency; quality-ofexperience metrics for network-based services; and problem analysis using deep, insightful packet captures. The Cisco NAM includes an embedded Web-based Traffic Analyzer GUI that gives quick access to the configuration menus and presents easy-to-read performance reports on the Web for different types of services and traffic. The Cisco NAM line of products improves visibility into, and monitors the performance of, the many physical and virtual layers in the data center. For more information, refer to www.cisco.com/en/us/products/ps5740/products_sub_category_home.html. Cisco Application Network Manager The Cisco Application Network Manager (ANM) is a client-server application that enables administrators to provision, monitor, and maintain application network services in the data center. By employing RBAC, the Cisco ANM allows application owners and server administrators to create ACE-enforced application policies in the network without affecting network configurations. In addition to supporting the Cisco ACE line of products, the Cisco ANM communicates with VMware vcenter to allow seamless workflows across the virtualized data center as application policies and environments are deployed and evolve. For more information, refer to www.cisco.com/en/us/products/ps6904/index.html. Cisco Security Manager Cisco Security Manager is an enterprise-class management application designed to configure firewall, VPN, and IPS security services on Cisco network and security devices. The application can be used in networks of all sizes from small networks to large networks consisting of thousands of devices by using policy-based management techniques. Security Manager offers the following features and capabilities: Service-level and device-level provisioning of VPN, firewall, and intrusion-prevention systems from one desktop Device configuration rollback 18 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Network visualization in the form of topology maps Workflow mode Predefined and user-defined service templates Integrated inventory, credentials, grouping, and shared policy objects Integrated monitoring of events generated by ASA and IPS devices (The Event Viewer feature, introduced in Security Manager 4.0, enables users to selectively monitor, view, and examine events from ASA and IPS devices.) STORAGE NetApp Virtual Storage Console The NetApp Virtual Storage Console (VSC) provides integrated, comprehensive storage management for VMware infrastructures, including discovery, health monitoring, capacity management, provisioning, cloning, backup, restore, and disaster recovery. VMware administrators can access and execute all of these capabilities directly from VMware vcenter, enhancing both server and storage efficiencies without affecting the policies created by storage administrators. VSC operations can also be automated by using Java or XML APIs. NetApp SnapDrive NetApp SnapDrive enables the automation of storage-provisioning tasks and simplifies the process of taking error-free, host-consistent Snapshot copies of data. Server administrators use a wizard-based approach to map, manage, and migrate data between new and existing storage resources. SnapDrive can also eliminate the need to preallocate storage resources based on forecasted demand. NetApp SnapManager Products for Microsoft Applications NetApp SnapManager is an integrated data management solution that enhances the availability, scalability, and reliability of application data. SnapManager offers rapid online backup and restoration of databases and application data, along with local or remote backup set mirroring for disaster recovery. SnapManager uses online Snapshot technology that is part of the NetApp Data ONTAP operating system, and it integrates application backup and restore APIs and Volume Shadow Copy Service. SnapManager provides the following data management capabilities: Migrating application databases and transaction logs to LUNs on storage systems Backing up application databases and transaction logs from LUNs on storage systems Verifying the backed-up application databases and transaction logs Managing backup sets Archiving backup sets Restoring application databases and transaction logs from previously created backup sets NetApp SnapMirror NetApp SnapMirror is a Data ONTAP feature that provides data replication between two NetApp storage controllers or vfiler units. SnapMirror is typically deployed in disaster recovery scenarios in which mission-critical data must be replicated off site to protect against data loss and corruption if a failure or catastrophic event occurs at the primary site. If such an event occurs, the replicated data at the DR site can quickly and easily become writable, reducing recovery time and providing mission continuity. NetApp Adapter for Site Recovery Manager The NetApp Disaster Recovery Adapter for SRM is a storage-vendor specific plug-in to VMware SRM. This plug-in enables interaction between the SRM and the storage controller. The adapter interacts with the storage controller on behalf of the SRM to discover storage arrays and replicated datastores, and to fail over or perform a failover test against the replicated datastores on which the VMs reside. 19 An Overview of the Enhanced Secure Multi-Tenancy Architecture

NetApp Data Motion NetApp Data Motion software enables the easy and quick migration of data across multiple storage systems while maintaining continuous user and client access to applications. Fully integrated with the Data ONTAP software platform, NetApp Data Motion integrates three proven NetApp software technologies MultiStore, SnapMirror, and Provisioning Manager to provide live data migration for shared storage infrastructure and to manage physical or virtualized data center environments nondisruptively. NetApp Provisioning Manager NetApp Provisioning Manager allows service providers to streamline the deployment of cloud infrastructure and the delivery of tenant storage resources according to established policies. Provisioning Manager enables the cloud administrator to: Automate deployment of storage supporting the cloud compute infrastructure, the vfiler units, and the storage delivered to tenant environments Enable storage deployments to conform to provisioning policies defined by administrators or by tenant SLAs Provision multiprotocol storage with secure separation between tenant environments Automate deduplication and thin provisioning of storage Simplify data migration across the cloud storage infrastructure Delegate control to tenant administrators Through the NetApp Management Console, Provisioning Manager delivers dashboard views that display a variety of metrics. These metrics can be leveraged to craft policies that further increase resource utilization and operational efficiency, and to make sure that storage provisions satisfy the desired levels of capacity, availability, and security. Provisioning policies can be defined within the context of resource pools that are aligned with administrative or tenant requirements. Cloud administrators can delegate Provisioning Manager access and control to tenant administrators within the confines of their separated storage environment, directly extending many of these benefits to their customers. NetApp Protection Manager By using NetApp Protection Manager, cloud and tenant administrators can group data with similar protection requirements and apply preset policies to automate data protection processes. Administrators can easily apply consistent data protection policies across the cloud storage infrastructure and within tenant environments designed to suit operational and service-level requirements. Protection Manager automatically correlates logical datasets and the underlying physical storage resources, enabling administrators to design and apply policies according to mission-level or service-level requirements, free from the details of the cloud storage infrastructure. Within the confines of established policies, secondary storage is dynamically allocated as primary storage grows. Protection Manager is integrated within the NetApp Management Console, offering a centralized facility for monitoring and managing all data protection operations. In addition, it allows cloud providers to appropriately grant control to tenant administrators. The integration of Provisioning Manager and Protection Manager in a single console allows cloud and tenant administrators to seamlessly provision and protect data through unified, policy-driven workflows. NetApp Operations Manager NetApp Operations Manager delivers centralized management, monitoring, and reporting tools, which enable cloud service providers to consolidate and streamline management of their NetApp storage infrastructure. With Operations Manager, cloud administrators can reduce costs by leveraging comprehensive dashboard views to optimize storage utilization and minimize the IT resources needed to manage their shared storage infrastructure. At the same time, they can improve the availability and quality of services delivered to their tenant customers. Cloud administrators can also use Operations 20 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Manager to establish thresholds and alerts to monitor key indicators of storage system performance, enabling them to detect potential bottlenecks and to manage resources proactively. Through the use of configuration templates and policy controls, Operations Manager enables administrators to achieve standardization and policy-based configuration management across their cloud storage infrastructure. This accelerates tenant deployments and mitigates operational risks. Operations Manager gives cloud providers comprehensive visibility into their storage infrastructure. Providers can continuously monitor storage resources, analyze utilization and capacity management, and gain insight into the growth trends and resource impact of their tenants. Operations Manager also addresses the mission requirements of multi-tenant service providers, enabling chargeback accounting through customized reporting and workflow process interfaces. NetApp SANscreen NetApp SANscreen enables cloud administrators to further improve the quality and efficiency of their service delivery with real-time, multiprotocol, service-level views of their cloud storage infrastructure. SANscreen is a suite of integrated products that delivers global, end-to-end visibility into the cloud service provider s entire networked storage infrastructure. SANscreen Service Insight offers providers a comprehensive view of their SAN and NAS environments, storage attachment paths, storage availability, and change management to closely monitor service-level delivery to their customers. Service Insight provides the baseline framework for the SANscreen product suite and gives cloud providers a central repository for their inventory information. In addition, it contains reporting facilities that can be integrated into the provider s existing resource management systems and mission processes for financial accounting and asset management. SANscreen Service Assurance applies policy-based management to the provider s networked storage infrastructure. This enables cloud administrators to flexibly define best-practice policies to enforce storage network performance and availability requirements for each tenant environment. SANscreen Application Insight allows cloud service providers to discover near-real-time performance data from their networked storage environment and map it to their tenant deployments. Administrators can then proactively loadbalance storage networks and systems to meet customers SLAs. SANscreen Capacity Manager offers real-time visibility into global storage resource allocations and a flexible report-authoring solution. It also delivers decision support to the cloud service provider's capacity planning, storage tier analysis, storage service catalogs, trending and historical usage, audit, chargeback, and other mission processes. SANscreen VM Insight extends the administrator s comprehensive networked storage visibility into the realm of virtual servers. The service path relationships between VMs and the networked storage infrastructure are correlated to enable the wealth of NetApp SANscreen service-oriented management for VM environments. Administrators can access SANscreen data from a unified console and also through VMware vcenter plug-in interfaces. From the virtual server environments to the shared storage allocations that provisiona hosted tenant deployment, NetApp SANscreen delivers end-to-end visibility, flexible and proactive management, and service-level assurance for multi-tenant cloud service providers. END-TO-END PATH Understanding the flow from application to storage is key in building a FlexPod and SMT environment. Figure 3 shows an end-to-end path, such as ESXi FCoE boot starting from the ESXi VMkernel at the compute layer, to the network layer, and then to the storage layer. This model has a single Fibre Channel hop between the Cisco UCS 6100 and the Nexus 5000 fabric. 21 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Figure 3) End-to-end block diagram (graphic provided by Cisco). 22 An Overview of the Enhanced Secure Multi-Tenancy Architecture

3 LOGICAL TOPOLOGY The tenant is the primary building block of the FlexPod and SMT architecture. Therefore, the definition of a tenant is fundamental to the successful design and deployment of the architecture in any given enterprise. By definition, a tenant is an occupant. In terms of this design, the tenant resides in or owns part of the shared data center infrastructure. Each enterprise defines a tenant by its own terms. Typically, the enterprise defines the tenant along the lines of mission or organizational units defined by corporate structure. However, functional roles or individual application environments can also be used to construct a tenant. Note: In this design, the tenant is a single application or workload in the enterprise. The logical topology represents the underlying virtual components and their virtual connections that exist in the physical topology. The logical architecture consists of many partitions falling into one of two categories: infrastructure or tenant. Infrastructure VMs are used in configuring and maintaining the environment, while tenant VMs are owned and leveraged by tenant applications and users. VM configuration and disk files for both infrastructure and tenant VMs are stored in distinct NetApp virtual storage controllers and are presented to each ESXi host s appropriate VMkernel interfaces as an NFS export or iscsi target. Each VMware virtual interface type, VMkernel, and individual VM interface connects directly to the Cisco Nexus 1000V software distributed virtual switch. At this layer, packets are tagged with the appropriate VLAN header, and all outbound traffic is aggregated to the Cisco 6100 through two 10Gb/sec Cisco Virtual Interface Card (VIC) Ethernet uplinks per ESXi host. Each Cisco VIC presents five virtual interfaces to the ESXi host, known as UCS vnics, enabling further traffic segmentation and categorization across all traffic types based on vnic network policies. Using port aggregation between the Fabric A and B vnic pairs enhances the availability and capacity of each traffic category. All inbound traffic is stripped of its VLAN header and switched to the appropriate destination virtual Ethernet interface. In addition, the Cisco VIC allows the creation of multiple virtual host bus adapters, permitting an FCoE-enabled boot across the same physical infrastructure. The two physical 10GbE interfaces per physical NetApp storage controller are aggregated together into a single virtual interface. The virtual interface is further segmented into VLAN interfaces, with each VLAN interface corresponding to a specific VLAN ID throughout the topology. Each VLAN interface is administratively associated with a specific IP space and vfiler unit. Each IP space provides an individual IP routing table per vfiler unit. The association between a VLAN interface and a vfiler unit allows all outbound packets from the specific vfiler unit to be tagged with the appropriate VLAN ID specific to that VLAN interface. Accordingly, all inbound traffic with a specific VLAN ID is sent to the appropriate VLAN interface, effectively securing storage traffic, regardless of the Ethernet storage protocol, and allowing visibility to only the associated vfiler unit. Note: Infrastructure VMs may reside on a dedicated ESXi cluster (which is not shown in Figure 4), or they may share the same resources as the other tenant VMs. In either case, the partitioning of network, storage, and compute remains constant. Infrastructure VMs are considered to be tenants. 23 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Figure 4) Logical topology production cluster (graphic provided by Cisco). PRIMARY SITE DESIGN Production environments are designed to support the current generation of mission-critical applications leveraged by tenants in the enterprise. These essential applications may include enterprise resource planning (ERP), customer relationship management (CRM), supply chain management (SCM), and sales force tracking. Production applications require varying levels of data center services to meet the security, availability, and scalability requirements of the mission. The FlexPod and SMT production environment topology addresses these objectives by giving each tenant the flexibility and control to meet its particular application needs. The application and the mission requirements of the application drive the implementation of services. The production environment consists of shared compute, network, and storage resources that are virtualized to promote enterprise efficiency and agility. Figure 5 depicts the primary data center VMware DRS cluster configuration. As shown, there are two dedicated clusters: Production and Infrastructure. The Production cluster supports three tenants, each with an independent enterprise application: Microsoft Exchange 2010, SQL Server 2008, and SharePoint 2010. The Infrastructure cluster houses the Infrastructure tenant that contains VMs required to manage the FlexPod and SMT architecture. Although the Infrastructure tenant could be deployed on the Production cluster, it is still considered a best practice to employ dedicated physical resources for operational efficiency, troubleshooting, and future growth of the management environment. 24 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Figure 5) Primary data center cluster design (graphic provided by Cisco). PRODUCTION TENANT MODEL Figure 6 illustrates the generic tenant model employed in the validation of this design in which network, compute, and storage resources are allocated to support one or more applications contained on a VM. The basic tenant leverages the following features and services: Layer 2 segmentation by way of VLANs Dedicated virtual route forwarding (VRF) for layer 3 services Dedicated virtual firewall context to enforce stateful security services on ingress and egress data center tenant traffic vshield security services applied across the virtual compute layer to enforce inter-vm security policies VMware resource pools to impose compute resource allocation policy (not shown) Allocated vfiler unit for storage services, including file based and block based The tenant model does not restrict the number of VLANs, network services, or VMs employed. These are design considerations that must be revisited upon each tenant deployment in a data center invoking FlexPod and SMT design principles. 25 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Figure 6) Generic tenant model (graphic provided by Cisco). Tenant X Container Nexus 7000-1: VRF-TENX FWSM-1: FWVC-X (active) VLAN X VLAN Y VLAN Z HSRP: 10.x.y.z/24 HSRP.1.3.2 External to tenant: Failover VLAN:A State VLAN: B Public Interface vshield VLAN Y VLAN Z VLAN X Nexus 7000-2: VRF-TENX FWSM-2: FWVC-X (standby) OOB Public Interface VLAN Y Private Interface VLAN X Management Interface VLAN M.101 VM.100 VLAN E (Storage Services).100 VLAN F (NFS).101 VLAN G (iscsi) vfiler Tenant X NFS LUN Tenant Details The following sections detail the tenant containers and associated applications housed in the enterprise Production environment. At a minimum, each of the tenants employs the generic tenant model described previously and invokes other application services as necessary. Tenant 0 Infrastructure The Infrastructure tenant accommodates the management components of the virtualized data center. Therefore it is a special tenant, requiring the highest levels of service availability, scalability, security, 26 An Overview of the Enhanced Secure Multi-Tenancy Architecture

and resource management. Ideally, all compute, network, and storage element managers leverage this tenant as a foundation. Figure 7 illustrates the Infrastructure tenants logical topology and a sampling of the management applications services within the tenant container. In this figure, the Nexus 7000 aggregation switches dedicate a virtual routing instance as the first-hop IP router for the tenant. The HSRP virtual IP address.1 serves as the default gateway for all VMs in the container. The VRF is the layer 3 tenant boundary; all other services are transparent from the server perspective. Figure 7) Infrastructure tenant (graphic provided by Cisco). Tenant Infrastructure Container Nexus 7000-1: VRF-TEN50 FWSM-2: FWVC-50 (active) VLAN 590 VLAN 591 HSRP: 10.50.y.z/24 HSRP.1.3.2 External to tenant: Failover VLAN: 2001: 10.200.1.x/24 State VLAN: 2002: 10.200.2.x/24.11.12 VLAN 590 VLAN 591 Nexus 7000-2: VRF-TEN50 FWSM-1: FWVC-50 (standby) vshield OOB Service Sampling N1k-vsm1a vsheild-mgr AD-1 Private Interface VLAN 590 Management Interface VLAN 162 Management Services N1k-vsm1b vcenter DFM.100 VLAN 592 (Storage Services).100 VLAN 600 (NFS).101 VLAN 599 (iscsi) DCNM CSM SanScrn vfiler Tenant Infrastructure NFS LUN The Infrastructure tenant uses three types of firewalls to secure the virtual management server farm: 27 An Overview of the Enhanced Secure Multi-Tenancy Architecture

A Firewall Service Module virtual context A vshield App (vapp) firewall virtual appliance A vshield Edge Tenant 1 Workload SharePoint Figure 8 illustrates the logical topology of a tenant implementing a Microsoft SharePoint 2010 application environment. This tenant maintains the fundamental tenant structures of virtual routing instances, firewall instances, machines, and datastores. In addition, the SharePoint farm uses the application services available in the ACE virtual load balancer context and intrusion prevention technologies offered by using multiple IPS virtual sensors. These devices provide application availability, scalability, and security enhancements to the tenant s application. Each of these features is introduced transparently at layer 2 as bumps in the wire. 28 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Figure 8) Tenant 1: SharePoint (graphic provided by Cisco). Tenant 1 Container Nexus 7000-1: VRF-TEN3 FWSM-1: FWVC-1 (active) ACE-SM-1: ACEVC-1 (active) VLAN 106 VLAN 101 VLAN 102 HSRP: 10.1.101.x/25 HSRP.1.3.2 External to tenant: Failover VLAN: 2001: 10.200.1.x/24 State VLAN: 2002: 10.200.2.x/24.11.12 External to tenant: Fault Tolerant VLAN: 2003:.11 10.200.3.x/24.12 VLAN 101 VLAN 102 VLAN 106 Nexus 7000-2: VRF-TEN3 FWSM-2: FWVC-2 (standby) ACE-SM-2: ACEVC-1 (standby) IPS-1: VS-1 IPS-2: VS-1 VLAN 103 VLAN 103 IPS-3: VS-1 IPS-4: VS-1 vshield VLAN 104 VLAN 104 OOB. Tenant VLAN 104 10.1.101.x/25 (public) Web Front-end/ Web Front-end/ Index Query Role Query Role Server.101.102.103.104 ten1-wfe1 ten1-wfe2 ten1-idx1 SQL Node ten1-sql1 (Primary) Tenant VLAN 106 10.1.102.x/25 (private).100 VLAN 106 (Storage Services).100 VLAN 110 (NFS).101 VLAN 109 (iscsi) Tenant VLAN 107 10.1.107.x/25 (management) vfiler Tenant 3 NFS LUN Tenant 2 Workload Exchange The Tenant 2 exchange is shown in Figure 9. The Microsoft Exchange 2010 application environment employs a subset of the services available to the SharePoint tenant environment. The Nexus 7000 VRF is the default gateway for the tenant servers. The use of Cisco firewall services and load balancers offers security and availability services from a client-server perspective, while VMware vshield vapp and Edge technologies secure inter-vm communication within, and outside of, the Exchange tenant application environment. 29 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Figure 9) Tenant 2: Exchange (graphic provided by Cisco). Tenant 2 Container vrf-ten2 dc09-n7k1-1-vdca dc07-fwsm-1 ten2-vc1 BVI.10 dc07-acesm-1 ten2-vc1 BVI.20 Alias.22 VIP.100 VLAN 111 VLAN 112 HSRP: 10.2.101.x/24 HSRP.1.3.2 External to tenant: Failover VLAN: 2001: 10.200.1.x/24 State VLAN: 2002: 10.200.2.x/24.11.12 External to tenant: Fault Tolerant VLAN: 2003:.11 10.200.3.x/23.12 VLAN 111 VLAN 112 vrf-ten2 dc10-n7k1-1-vdca dc08-fwsm-1 ten2-vc1 BVI.11 dc08-acesm-1 ten2-vc1 BVI.21 Tenant VLAN 107 (private) VLAN 113 OOB vshield VLAN 113 (public).105 VLAN 113.106 ten2-hub1 ten2-hub2.103.104 Hub Role ten2-cas1.101 CAS Role ten2-cas2.102 CAS Role Primary Secondary Primary Secondary Primary Mailbox Role Secondary DAG Group Primary Secondary ten2-mbx1 ten2-mbx2 Tenant VLAN 107 (management) Tenant 3 Workload SQL Server Tenant 3 supports a single SQL Server instance in the data center. This instance of SQL Server may support application environments residing on other tenants in the enterprise, depending on intertenant security policies. Figure 10 details the deployment model in which firewall services are positioned to protect the database server. Again, the FWSM virtual context is in transparent mode and the virtual access layer uses a virtual application firewall. Tenant 3 supports a single SQL Server instance in the data center. This instance of SQL Server may support application environments residing on other tenants in the enterprise, depending on intertenant security policies. 30 An Overview of the Enhanced Secure Multi-Tenancy Architecture

Figure 10) Tenant 3: SQL Server (graphic provided by Cisco). Tenant 3 Container Nexus 7000-1: VRF-TEN3 FWSM-1: FWVC-1 (active) VLAN 122 VLAN 121 HSRP: 10.3.101.0/25 HSRP: 10.3.102.0/25 HSRP.1.3.2 External to tenant: Failover VLAN: 2001: 10.200.1.x/24 State VLAN: 2002: 10.200.2.x/24.11.12 Public Interface VLAN 122 VLAN 121 Nexus 7000-2: VRF-TEN3 FWSM-1: FWVC-1 (standby) OOB Tenant VLAN 123 10.3.123.x/25 (mgmt) Tenant VLAN 122 10.3.101.x/25 (private) vshield Ten3-sql1 (.101) Tenant VLAN 124 10.3.102.x/25 (private).100 VLAN 124 (Storage Services).100 VLAN 130 (NFS).101 VLAN 129 (iscsi) vfiler Tenant 3 NFS LUN SECONDARY SITE DESIGN Due to the increase in data center expansion, complexity, and mission needs, a secondary data center site is often required for mission continuity and disaster recovery. These sites can be designed for load balancing, which allows clustering and virtualization across the two sites, or disaster prevention when the secondary site is a mirror of the primary and is used only when resources in the primary site are not 31 An Overview of the Enhanced Secure Multi-Tenancy Architecture

available. This design employs a mix of both methods by providing an environment for disaster recovery and also by providing an environment from which to run a Preproduction tenant during normal operation. Investing in a secondary site for disaster recovery is important to many enterprises because it helps to protect against the negative impacts of unavailable services and data. From a component perspective, secondary sites typically involve similar, if not the same, hardware and software configurations as the primary site data center. Therefore, when tenant workloads are shifted from the primary to the secondary site, they function normally due to identical supporting environments at each site. In this design, the secondary data center is configured as an exact replica in both physical and logical aspects. Some parameters, such as IP address schemes and VLAN IDs, may differ across sites. Certain infrastructure services and applications are also required to exist at each site and cannot be replicated between sites. Such services and applications include but are not limited to VMware vcenter, VMware SRM, and Cisco Nexus 1000v Virtual Supervisor Module. One disadvantage to building a secondary site for disaster recovery is that this site is typically idle during normal operation, which leads to a very low return on investment. For this reason, this design includes a Preproduction tenant running at the secondary site during normal operation. This enables the enterprise to leverage the investment made in a secondary site, and also makes sure that the primary site workloads (tenants) can be shifted to provide mission continuity and disaster recovery. Figure 11 depicts the secondary data center VMware DRS cluster configuration. As shown, three dedicated clusters are included: Production, Infrastructure, and Preproduction. The Production cluster is a disaster recovery destination for the three tenants located on the primary site. The Infrastructure cluster houses another Infrastructure tenant that contains VMs required to manage the FlexPod and SMT architecture at the secondary site. These machines are unique and are not recovered as part of the disaster recovery strategy. Similar to the primary site, the Infrastructure tenant could be deployed on the Production cluster, but it is still considered a best practice to employ dedicated physical resources. Figure 11) Secondary data center cluster design (graphic provided by Cisco). 32 An Overview of the Enhanced Secure Multi-Tenancy Architecture

TENANT 4 VCLOUD: PREPRODUCTION The fourth tenant in the FlexPod and SMT architecture is the Preproduction environment, which typically consists of development and test teams in an enterprise. The compute, network, and storage resource needs for this tenant are provided by a self-service model, enabled by VMware vcloud Director. The entire environment is deployed in the recovery data center to enable an active-active model in which both the primary and secondary sites serve active workloads. The design principles of the four pillars are also applied in the Preproduction vcloud environment in the secondary site. Tenant 4 vcloud New Abstraction Layer vcloud Director creates a new layer of abstraction for consumers of compute, network, and storage resources. Figure 12 illustrates the self-service development and test tenant model enabled by vcloud Director. In this model, all underlying compute, network, and storage resources are abstracted by vcloud Director as a virtual data center (vdc). Each tenant in a preproduction environment is identified by vcloud as an organization. Each organization is assigned one or more vdcs. The vdc represents the compute and storage resources for end-user consumption. Network connectivity is provisioned in the form of an organization network, which can connect directly to the preproduction VLAN, or a private organization network that is self-contained or routed to the preproduction VLAN. Figure 12) Self-service dev/test tenant model enabled by vcloud director (graphic provided by Cisco). 33 An Overview of the Enhanced Secure Multi-Tenancy Architecture

4 ACKNOWLEDGMENTS Chris O'Brien (Cisco) Alex Nadimi (Cisco) Ramesh Isaac (Cisco) Aeisha Duncan (Cisco) Michael Zimmerman (NetApp) John George (NetApp) Jon Benedict (NetApp) David Klem (NetApp) Henry Vail (NetApp) Christopher Reno (NetApp) Tyler Bletsch (NetApp) Abhinav Joshi (NetApp) Larry Touchette (NetApp) Jeremy Merrill (NetApp) Ronald Demery (NetApp) Wen Yu (VMware) Serge Maskalik (VMware) Carlos Camacho (VMware) Let s Get Started To learn how the FlexPod infrastructure solution can help you to transform your data center into a shared infrastructure, go to www.cdgwg.com/federal. About CDW-G CDW-G, the public sector subsidiary of CDW, is a leading provider of technology solutions to federal government agencies. Dedicated account managers help customers choose the right technology products and services to meet their needs. The company s solution architects offer expertise designing customized solutions, while our advanced technology engineers assist customers with the implementation and long-term management of those solutions. Areas of focus include software, network communications, notebooks/mobile devices, data storage, video monitors, desktops and printers and solutions such as virtualization, collaboration, security, mobility, data center optimization and cloud computing. For information call 800.808.4239 or visit CDWG.com/federal. About NetApp NetApp creates innovative storage and data management solutions that deliver outstanding cost efficiency and accelerate business breakthroughs. Discover our passion for helping organizations around the world go further, faster at www.netapp.com. NetApp provides no representations or warranties regarding the accuracy, reliability, or serviceability of any information or recommendations provided in this publication, or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS, and the use of this information or the implementation of any recommendations or techniques herein is a customer s responsibility and depends on the customer s ability to evaluate and integrate them into the customer s operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document. 2011 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc. Specifications are subject to change without notice. NetApp, the NetApp logo, Go further, faster, DataMotion, Data ONTAP, FilerView, FlexPod, FlexShare, FlexVol, MultiStore, RAID-DP, SANscreen, SnapDrive, SnapManager, SnapMirror, Snapshot, and vfiler are trademarks or registered trademarks of NetApp, Inc. in the United States and/or other countries. Cisco and Cisco Nexus are registered trademarks and Cisco UCS and Cisco Unified Computing System are trademarks of Cisco Systems, Inc. Microsoft, Active Directory, SharePoint, and SQL Server are registered trademarks of Microsoft Corporation. Java 34 An Overview of the Enhanced Secure Multi-Tenancy Architecture is a registered trademark of Oracle Corporation. VMware and VMotion are registered trademarks and vcloud, vshield, and vsphere are trademarks of VMware, Inc. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. WP-7113-0811-PS