Home Networking Cisco introduces first DNA building bricks

Cisco's Digital Network Architecture - originally announced earlier this month at the company's Partner Summit in the US - was presented to customers at the first time at Cisco Live in Melbourne today.

Cisco ANZ director of enterprise networking described it as "a major, major change" that "facilitates our customers' change to digital business."

Digital Network Architecture (DNA) encompasses virtualisation, automation, analytics and cloud, explained Cisco vice president of enterprise infrastructure and solutions Jeff Reed.

The first three products are APIC-EM (automation for software-defined networks, including the ability to deploy switches and other equipment at other locations without pre-configuration), Enterprise NFV (for rapid deployment of network services), and CMX Cloud (a cloud implementation of Cisco's CMX presence analytics software).

The basic APIC-EM product is available now, with a cloud version expected in May. The IWAN (intelligent wide area network) app is also available, with the EasyQoS service for policy-based quality-of-service adjustments expected this month.

Enterprise NFV will be released to selected customers this month.

CMX Cloud is already available to US customers, and will be released elsewhere as local laws permit, said Reed.

He explained that Cisco has already applied these technologies internally, for example using data from CMX showing where people move and congregate to redesign workspaces with the appropriate number of meeting rooms and so on.

DNA changes the way Cisco develops products and the way customers use their networks, he said, as it makes it easier to consume networks.

If, in a few years time a customer is forced to use the command line interface (as opposed to merely choosing to do so), then DNA will have failed, said Cisco APJ vice president of enterprise networking sales and CTO Dave West.

Cisco senior vice president and chief security and trust officer John Stewart (pictured) said DNA will help with security in various ways, including the introduction of trusted devices, the ability to move policies along with workloads in a sophisticated way, and reducing the opportunities for attackers by adding resilience to network devices.

EPIC-EM abstracts all of the technology beneath it, providing a platform for orchestration, automation, management and analytics, said West.

"Customers have never been able to take full advantage of what we've done" because of the complexity, but that's changing with DNA, he said. There will be a series of apps to simplify routine network tasks, and "this changes networking forever."


Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.

· Best valued product
· Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
· Aesthetically pleasing and light weigh (blend into any room deco)
· Wireline backhauls supported
· Product units are pre-paired and easy to setup
· Not requiring phone number or email address to set up
· Wall penetration (better than other similar brands)
· Seamless WiFi roaming
· User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more



Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.


Popular News




Sponsored News