Simply means you can create and build a branch with few steps from a centralized location, where you can build your branch with routers, switches, WLCs , Firewall, Win/Linux Servers, and WAN Edge routers.
Actually, all these branch gears and servers I mentioned above will be Virtual machines (VMs) we call it in this solution Virtual Network Functions (VNFs) using Cisco Enterprise Network Functions Virtualization (NFV)
Which Hypervisor will be used?
Cisco had its own answer called Enterprise NFV Infrastructure Software (NFVIS)
The Viptela REST API calls expose the functionality of Viptela software and hardware features and of the normal operations you perform to maintain Viptela devices and the overlay network itself.
In REST API terminology, each of these features or operations is called a resource.
A resource is an object with a type, associated data, relationships to other resources, and a set of methods that operate on it.
Resources are grouped into collections.
Each collection contains a single type of resource, and so is homogeneous.
In the Viptela REST API, the collection of resources is present at the top level of the API.
The Viptela REST API resources are grouped into the following collections:
•Monitoring: This collection views status, statistics, and other information about operational devices in the overlay network. Viptela devices collect monitoring information about themselves every 10 minutes. After collecting these statistics, each Viptela device places them in a zip file. The vManage server retrieves these zip files every 10 minutes or, if the vManage server cannot log in to the device, it retrieves them whenever it is next able to log in.
•Real-Time Monitoring: This collection retrieves, views, and manages real-time statistics and traffic information. Real-time monitoring information is gathered in real time, approximately once per second.
•Configuration: This collection creates feature and device configuration templates, retrieves the configurations in existing templates, and creates and configures vManage clusters.
•Administration: This collection manages users and user groups, views audit logs, and manages the local vManage server.
•Device Inventory: This collection collects device inventory information including serial numbers and system status.
•Certificate Management: This collection manages certificates and security keys.
•Troubleshooting Tools: This collection provides tools to help troubleshoot devices, determine the effect of policy, update software, and retrieve software version information.
Cisco FTD is unified code for firewall capabilities AND IPS capabilities Cisco FMC is your application to manage FTD devices (off-box) Cisco FDM is your application to manage one FTD device (on-box) Cisco FXOS is underlay OS in Cisco Firepower 4100/9300 chassis where you can install above it ASA , FTD , Radware DDoS software ( AS three physical modules in one chassis )
Cisco CDO is your cloud application to manage ASA , ASA 5500-X with FirePOWER Services , Firepower 2100/4100/9300
Cisco Firewalls that can use FTD are ASA 5500-X with FirePOWER Services , Firepower 2100/4100/9300.
Cisco FMC can manage also Firepower 7000/8000 and Firepower Services for Cisco ASA.
Cisco FXOS is the underlying operating system that manages hardware platforms like FP4100 and FP9300.
Those platforms can run different applications on them, such as FTD ,Cisco ASA image, or even a third-party software like Radware anti-DoS.
In old days we used to have the following: ASA is device with code for firewall capabilities only ASDM is your application to manage ASA devices Firepower 7000/8000 device with code for IPS capabilities only Cisco FMC (aka FireSIGHT) is your application to manage Firepower 7000/8000 and other Firepower devices ASA with Firepower is device for firewall capabilities AND IPS capabilities, this code could be unified (FTD) or separate ASA code + Firepower (ips) code , in this case only Firepower code can be managed by Cisco FMC , for ASA we use ASDM.
Lets not forget Cisco firewall for ICS and IoT networks ISA 3000:
Cisco Industrial Security Appliance 3000 platforms can run either the Cisco ASA Firewall, Cisco ASA Firewall plus Sourcefire FirePOWER (ASA+FP) or Cisco Firepower Threat Defense (FTD).
Also for small business we have Meraki MX Series Firewall